0% found this document useful (0 votes)
585 views

Oracle - PLSQL

PL/SQL is a procedural extension of SQL that offers programming constructs like imperative languages (question 1). It combines the data manipulation power of SQL with the data processing capability of procedural languages (question 2). Oracle has made PL/SQL code run faster without requiring additional work from the programmer (question 3). A PL/SQL line of text contains lexical units that are groups of characters (question 4). We use identifiers to name PL/SQL program objects and units (question 5). A literal is an explicit numeric, character, string or Boolean value not represented by an identifier (question 6). An anonymous PL/SQL block has no specified header (question 7). A string literal is a sequence of characters enclosed in single quotes (question 8

Uploaded by

Leo Mallick
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
585 views

Oracle - PLSQL

PL/SQL is a procedural extension of SQL that offers programming constructs like imperative languages (question 1). It combines the data manipulation power of SQL with the data processing capability of procedural languages (question 2). Oracle has made PL/SQL code run faster without requiring additional work from the programmer (question 3). A PL/SQL line of text contains lexical units that are groups of characters (question 4). We use identifiers to name PL/SQL program objects and units (question 5). A literal is an explicit numeric, character, string or Boolean value not represented by an identifier (question 6). An anonymous PL/SQL block has no specified header (question 7). A string literal is a sequence of characters enclosed in single quotes (question 8

Uploaded by

Leo Mallick
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

1.

…………………… is a procedural extension of Oracle – SQL that offers language constructs similar to
those in imperative programming languages.

A) SQL

B) PL/SQL

C) Advanced SQL

D) PQL

2. ……………….. combines the data manipulating power of SQL with the data processing power of
Procedural languages.

A) PL/SQL

B) SQL

C) Advanced SQL

D) PQL

3. ………………. has made PL/SQL code run faster without requiring any additional work on the part of the
programmer.

A) SQL Server

B) My SQL

C) Oracle

D) SQL Lite

4. A line of PL/SQL text contains groups of characters known as …………………..

A) Lexical Units

B) Literals

C) Textual Units

D) Identifiers

5. We use …………………… name PL/SQL program objects and units.


A) Lexical Units

B) Literals

C) Delimiters

D) Identifiers

6. A ……………….. is an explicit numeric, character, string or Boolean value not represented by an


identifier.

A) Comments

B) Literals

C) Delimiters

D) Identifiers

7. If no header is specified, the block is said to be an …………………. PL/SQL block.

A) Strong

B) Weak

C) Empty

D) Anonymous

8. …………. is a sequence of zero or more characters enclosed by single quotes.

A) Integers literal

B) String literal

C) String units

D) String label

9. In ……………………, the management of the password for the account can be handled outside of oracle
such as operating system.

A) Database Authentication
B) Operating System Authentication

C) Internal Authentication

D) External Authentication

10. In ………………………. of Oracle, the database administrator creates a user account in the database for
each user who needs access.

A) Database Authentication

B) Operating System Authentication

C) Internal Authentication

D) External Authentication

11. ………………….. are used to recreate if trigger already exists.

A) Cursor

B) Trigger

C) Keywords

D) Replace

12. ………………………… is used to define code that is executed / fired when certain actions or event occur.

A) Cursor

B) Trigger

C) Keywords

D) Replace

13. …………….. provide a way for your program to select multiple rows of data from the database and
then process each row individually.

A) PL/SQL Cursors
B) PL/SQL Trigger

C) PL/SQL Select

D) PL/SQL Process

14. ……………………… cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL
commands.

A) Implicit

B) Explicit

C) Internal

D) External

15. ……………………. cursors are declared and used by the user to process multiple row, returned by
SELECT statement.

A) Implicit

B) Explicit

C) Internal

D) External

16. ………………….. contain a pointer that keeps track of current row being accessed, which enables your
program to process the rows at a time.

A) Tracker

B) Cursor

C) Accesser

D) Trigger

17. ………………….. a cursor enables you to define the cursor and assign a name to it.

A) Declearing

B) Stating
C) Extracting

D) Importing

18. In ………………. the cursor advances to the next row in the active set each time the fetch command is
executed.

A) recreating process

B) redefining process

C) iterative process

D) None of the above

19. A ……………………. is a database object that groups logically related PL/SQL types, objects and
subprograms.

A) Module

B) Package

C) Body

D) Name

20. In the PL/SQL, the package specification contains ………………….. declarations.

A) Public

B) Private

C) Friend

D) Protected

21. The …………………… consists of physical files and memory components.

A) Oracle Client

B) Oracle Server

C) Oracle Middle-ware

D) Oracle Instance
22. The ……………………… consists of the memory components of Oracle and various background
processes.

A) Oracle Parameter

B) Oracle Profile

C) Oracle Process

D) Oracle Instance

23. The Oracle Instance is made up of the ………………………. and the background processes.

A) System Global Area (SGA)

B) Oracle Global Area (OGA)

C) Program Global Area (PGA)

D) Private SQL Area (PSA)

24. The background processes of the Oracle instance are responsible for performing …………………. I/O
functions.

A) Synchronous

B) Asynchronous

C) Both of the above

D) None of the above

25. The PGA is used to process ………………………… and to hold logon and other session information.

A) SQL Statements

B) Server Processes

C) User Processes

D) Shared Statements

26. In SGA, the contents of the memory area are shared by multiple users is called as …………………..

A) Redo Log Buffer


B) Database Buffer Cache

C) Shared Pool

D) Large Pool

27. In Oracle Database ………………….. Contain the data dictionary and user created data.

A) Data Files

B) Control Files

C) Redo Log Files

D) Password Files

28. The ………………………….. keeps a record of the names, size locations different physical files of the
Oracle Database.

A) Data File

B) Control File

C) Redo Log File

D) Password File

29. In Oracle Database, ……………………………… is used to hold the names of privileged users who have
been granted the SYSDBA or SYSOPR roles.

A) Data File

B) Control File

C) Redo Log File

D) Password File

30. In Oracle, the end of the transaction is recorded in the ……………………….. files.

A) Data

B) Control
C) Redo Log

D) Password

31) If the transaction is rolled back, all the database changes made inside the transaction are ……

A. made permanent

B. made temporary

C. copied to the log

D. undone

32) Which of the following is not a property of transactions?

A. Atomicity

B. Concurrency

C. Isolation

D. Durability

33) A ……… ensures that transactions are performed as expected.

A. transaction processing monitor

B. transaction procedure monitor

C. isolation monitor

D. transaction log

34) A transaction that completes its execution successfully is said to be …….

A. committed

B. rolled back

C. partially committed

D. Aborted
35) …….. means that a transaction must execute exactly once completely or not at all.

A. durability

B. consistency

C. atomicity

D. isolation

36) Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.

A. It will result in a deadlock situation

B. It will immediately be rejected

C. It will immediately be granted

D. It will be granted as soon as it is released by A

37) ……….. means that when it ends, a transaction must leave the database in a consistent state.

A. Data isolation

B. Data duration

C. Data consistency

D. Data non-reputability

38) The number of transactions executed in a given amount of time is called ………

A. utilization

B. execution rate

C. throughput

D. atomicity

39) Isolation means ……

A. transaction must not interfere with each other

B. transaction must interfere with each other


C. transaction must be in a consistent state

D. transaction must be executed immediately

40) Which of the following ensures the atomicity of the transaction?

A. Transaction management component of DBMS

B. Application Programmer

C. The concurrency control component of DBMS

D. Recovery management component of DBMS

41) …….. means that a transaction must make its changes permanent to the database ends.

A. isolation

B. locking

C. durability

D. consistency

42) Throughput means

A. number of transactions that are committed in one hour

B. number of operations in a transaction

C. number of transaction that can be aborted in a given amount of time

D. number of transaction that can be executed in a given amount of time

43) …….. deals with individual transactions.

A. isolate transactions

B. transaction recovery

C. system recovery

D. media recovery

44) The part of a database management system which ensures that the data remains in a consistent
state is
A. authorization and integrity manager

B. buffer manager

C. transaction manager

D. file manager

45) ……… protocol is used to perform multiple transactions that execute on a different database.

A. commit

B. two-phase lock

C. two-phase commit

D. locking

46) A transaction can do read and write operation on a data item when it acquires ……

A. read mode

B. exclusive mode

C. shared mode

D. write mode

47) In ………. one transaction overwrites the changes of another transaction.

A. uncommitted read problem

B. lost update problem

C. update lost problem

D. dirty read problem

48) Isolation of the transactions is ensured by

A. Transaction management

B. Application programmer

C. Concurrency control

D. Recovery management
49) In a dirty read problem …….

A. one transaction reads an uncommitted value of another transaction

B. one transaction reads the committed value for another transaction

C. one transaction reads another transaction

D. one transaction commits another transaction.

50) A transaction can do only read operation and not write operation on a data item when it acquires
……. lock.

A. read mode

B. exclusive mode

C. shared mode

D. write mode

51. ………………….. is the collection of memory structures and Oracle background processes that operates
against an Oracle database.

A) Database

B) Instance

C) Tablespace

D) Segment

52. A ………………………… is a logical grouping of database objects, usually to facilitate security,


performance, or the availability of database objects such as tables and indexes.

A) tablespace

B) segments

C) extents

D) blocks

53. A tablespace is further broken down into …………………


A) tablespace

B) segments

C) extents

D) blocks

54. ……………………….. is a contiguous group of blocks allocated for use as part of a table, index, and so
forth.

A) tablespace

B) segment

C) extent

D) block

55. ……………… is the smallest unit of allocation in an Oracle database.

A) Database

B) Instance

C) Tablespace

D) Database Block

56. An Oracle ………………………..is a set of tables and views that are used as a read-only reference about
the database.

A) Database dictionary

B) Dictionary table

C) Data dictionary

D) Dictionary

57. A data dictionary is created when a …………………. created.

A) Instance
B) Segment

C) Database

D) Dictionary

58. An Oracle object type has two parts the …………………. and …………………….

A) Instance and body

B) Segment and blocks

C) Specification and body

D) Body and segment

59. By, default, Oracle object types are ………………………

A) INSTANTIABLE

B) NOT INSTANTIABLE

C) FINAL

D) OVERRIDING

60. A method modifier tells Oracle that new subtypes may not override a method is called …………….

A) INSTANTIABLE

B) NOT INSTANTIABLE

C) FINAL

D) OVERRIDING

61) In the …………, one transaction inserts a row in the table while the other transaction is halfway
through its browsing of the table.

A. transaction read a problem

B. one way read a problem

C. serial read problem

D. phantom read problem


62) Transaction processing is associated with everything below except.

A. producing detail, summery, or exception reports

B. recording a business activity

C. confirming an action or triggering a response

D. maintaining data

63) ………. helps solve concurrency problem.

A. locking

B. transaction monitor

C. transaction serializability

D. two-phase commit

64) If a transaction acquires a shared lock, then it can perform ………. operation.

A. read

B. write

C. read and write

D. update

65) If a transaction obtains a shared lock on a row, it means that the transaction wants to ….. that row.

A. write

B. insert

C. execute

D. read

66) The node where the distributed transaction originates is called the …….

A. local coordinator

B. starting coordinator

C. global coordinator
D. originating node

67) If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ……. that
row.

A. select

B. update

C. view

D. read

68) If a transaction acquires an exclusive lock, then it can perform ………. operation.

A. read

B. write

C. read and write

D. update

69) …….. is a specific concurrency problem wherein two transactions depend on each other for
something.

A. phantom read problem

B. transaction read a problem

C. deadlock

D. locking

70) If a database server is referenced in a distributed transaction, the value of its commit point strength
determines which role it plays in the ………

A. two-phase commit

B. two-phase locking

C. transaction locking

D. checkpoints
71) Transaction ………. ensures that the transaction is being executed successfully.

A. concurrency

B. consistency

C. serializability

D. non serialiasability

72) The situation in which a transaction holds a data item and waits for the release of data item held by
some other transaction, which in turn waits for another transaction, is called …….

A. serializable schedule

B. process waiting

C. concurrency

D. deadlock

73) ………… protocol grantees that a set of transactions becomes serializable.

A. two-phase locking

B. two-phase commit

C. transaction locking

D. checkpoints

74) The global coordinator forgets about the transaction phase is called ………

A. Prepare phase

B. Commit phase

C. Forget phase

D. Global phase

75) In two-phase commit, ………. coordinates the synchronization of the commit or rollback operations.

A. database manager

B. central coordinator
C. participants

D. concurrency control manager

76) In two-phase locking protocol, a transaction obtains locks in ……..phase.

A. shrinking phase

B. growing phase

C. running phase

D. initial phase

77) A transaction processing system is also called as ……..

A. processing monitor

B. transaction monitor

C. TP monitor

D. monitor

78) After the nodes are prepared, the distributed transaction is said to be ……

A. in-doubt

B. in-prepared

C. prepared transaction

D. in-node

79) In ………., we have many mini transactions within the main transaction.

A. transaction control

B. chained transaction

C. nested transaction

D. calling transaction

80) In a two-phase locking protocol, a transaction release locks in ……… phase.

A. shrinking phase
B. growing phase

C. running phase

D. initial phase

81) A mechanism which ensures that simultaneous execution of more than one transaction does not
lead to any database inconsistencies is called ……………… mechanism.

A. transaction control

B. transaction management

C. concurrency parallelism

D. concurrency control

82) The transaction wants only to read the data item of the mode is called as …….

A. Exclusive Mode

B. Shared Mode

C. Inclusive Mode

D. Unshared Mode

83) Any execution of a set of transactions is called as its ………

A. non-serial schedule

B. serial schedule

C. schedule

D. interleaved schedule

84) ………… is a program or set of program that interacts with the database at some point in its
execution.

A. A database system

B. A database application
C. Both

D. none

85) ………. component of a database is responsible for ensuring atomicity and durability.

A. recovery management

B. concurrency control

C. storage management

D. query evaluation engine

86) The activity of ensuring atomicity in the presence of Transaction aborts is called ……….

A. transaction control

B. transaction management

C. transaction recovery

D. concurrency control

87) A ………….is a set of rules that state when a transaction may lock or unlock each of the data items in
the database

A. concurrency control

B. transaction control

C. validation control

D. locking protocol

88) ……………… is a collection of programs performing all necessary action associated with a database.

A. Database associated

B. Database administrator

C. Database application

D. Database management system


89) Which protocol permits the release of exclusive locks only at the end of the transaction?

A. Graph-based protocol

B. The strict two-phase locking protocol

C. Two-phase locking protocol

D. Rigorous Two-phase locking protocol

90) The activity of providing Durability of the transaction is called …..

A. database control

B. transaction management

C. transaction recovery

D. database recovery

91) Which protocol allows a transaction to lock a new data item only if that transaction has not yet
unlocked data item?

A. Graph-based protocol.

B. The strict two-phase locking protocol

C. Two-phase locking protocol

D. Timestamp ordering scheme

92) ………. is a collection of application programs that interact with the database along with DBMS.

A. A database system

B. A database application

C. Database administration

D. Data system

93) …….. ensures that once the transaction completes successfully, the results of the operations become
permanent.

A. serializability
B. synchronizability

C. atomicity

D. durability

94) A ……. contains information for undoing or redoing all the actions performed by the transactions.

A. save point

B. log

C. node

D. commit_point

95) A …………. is a unit of program execution that accesses and possibly updates various data items.

A. DBMS

B. monitor

C. transaction

D. transistor

96) A transaction is an action used to perform some manipulation on data stored in the ……..

A. Memory

B. Record

C. Database

D. All of these

97) A transaction is terminated if it has ……..

A. aborted

B. committed

C. running state

D. aborted or committed

98) The two possible communication errors are, Lost messages and …….
A. Network Partitions

B. Lost acknowledgment

C. Timeout

D. log error

99) The only way to undo the effects of a committed transaction is to execute a …….

A. committed transaction

B. compensating transaction

C. supplementary transaction

D. update query

100) In ………., one or more users/programs attempt to access the same data at the same time.

A. concurrency

B. transaction control

C. locking

D. two-phase locking

101) Commit and rollback are related to ……….

A. data integrity

B. data consistency

C. data sharing

D. data security

102) The transaction wants to edit the data item is called as …….

A. Exclusive Mode

B. Shared Mode

C. Inclusive Mode

D. Unshared Mode
103) For committing a transaction, the DBMS might discard all the records.

A. after image

B. before image

C. log

D. redo log

104) A sophisticated locking mechanism is known as 2-phase locking which includes Growing phase and
…….

A. Shrinking Phase

B. Release phase

C. Commit phase

D. Acquire Phase

105) A Transaction ends

A. only when it is Committed.

B. only when it is Rolled-back

C. when it is Committed or Rolled-back

D. only when it is initialized

106) In ………., each transaction there is a first phase during which new lock is acquired.

A. Shrinking Phase

B. Release phase

C. Commit phase

D. Growing Phase

107) A transaction processing system is also called as …….


A. processing monitor

B. transaction monitor

C. TP monitor

D. monitor

108) The transactions are always ……… if it always locks a data item in the shared mode before reading
it.

A. well-formed

B. well distributed

C. well locked

D. well shared

109) ………. servers which is widely used in relational database systems.

A. Data servers

B. Transaction servers

C. Query servers

D. Client servers

110) If a distributed transactions are well-formed and 2-phase locked, then ……………. is the correct
locking mechanism in the distributed transaction as well as in centralized databases.

A. two-phase locking

B. three phase locking

C. transaction locking

D. well-formed locking

111) ……… property will check whether all the operation of a transaction completed or none.

A. Atomicity

B. Consistency

C. Isolation
D. Durability

112) The total ordering of operations across groups ensures ………..of transactions.

A. serializability

B. synchronizability

C. atomicity

D. durability

113) In which state, the transaction will wait for the final statement has been executed?

A. Active

B. Failed

C. Aborted

D. partially committed

114) The ORDER concurrency control technique is based on the property.

A. ordering mechanism

B. inherent ordering

C. total ordering

D. partial ordering

115) Transactions per rollback segment is derived from …..

A. Db_Block_Buffers

B. Processes

C. shared_Pool_size

D. buffers

116) The …………is responsible for ensuring the correct execution in the presence of failures.

A. Database Manager

B. Transaction Manager
C. Recovery Manager

D. Executive Manager

117) A distributed transaction can be …………. if queries are issued at one or more nodes.

A. fully read-only

B. partially read-only

C. fully read-write

D. partially read-write

118) The distributed transaction can be completely read-only and the transaction is started with a ……….
READ ONLY statement.

A. DISTRIBUTED_TRANSACTIONS

B. TRANSACTION

C. SET TRANSACTION

D. READ TRANSACTION

119) The initialization parameter …………….. controls the number of possible distributed transactions in
which a given instance can concurrently participate, both as a client and a server.

A. DISTRIBUTED_TRANSACTIONS

B. TRANSACTION

C. SET TRANSACTION

D. CONTROL TRANSACTION

120) A database administrator can manually force the COMMIT or ROLLBACK of a local …………
distributed transaction.

A. in-force

B. in-doubt

C. in-local

D. in-manual

121) Which of the following is not a recovery technique?


A. Deferred update

B. Immediate update

C. Two-phase commit

D. Recovery management

122)Checkpoints are a part of

A. Recovery measures

B. Security measures

C. Concurrency measures

D. Authorization measures

123) ……. deals with soft errors, such as power failures.

A. system recovery

B. media recovery

C. database recovery

D. failure recovery

124) ……….. is an essential part of any backup system.

A. Filter

B. Recovery

C. Security

D. Scalability

125) Media recovery deals with ………..

A. disk errors

B. hard errors

C. system errors
D. power failures

126) For a backup/restore system, …………. is a prerequisite for service in a enterprise.

A. Filter

B. Recovery

C. Security

D. Scalability

127) Failure recovery and media recovery fall under ……..

A. transaction recovery

B. database recovery

C. system recovery

D. value recovery

128) The ………. consists of the various applications and database that play a role in a backup and
recovery strategy.

A. Recovery Manager environment

B. Recovery Manager suit

C. Recovery Manager file

D. Recovery Manager database

129) In which the database can be restored up to the last consistent state after the system failure?

A. Backup

B. Recovery

C. Both

D. None
130) A ……….. is a block of Recovery Manager(RMAN)job commands that is stored in the recovery
catalogue.

A. recovery procedure

B. recovery block

C. stored block

D. stored script

131) In log based recovery, the log is sequence of ………

A. filter

B. records

C. blocks

D. numbers

132) The enrolling of a database in a recovery catalogue is called ………

A. set up

B. registration

C. start up

D. enrollment

133) ………. is an alternative of log based recovery.

A. Disk recovery

B. Shadow paging

C. Dish shadowing

D. Crash recovery

134) Most backup and recovery commands in ……….. are executed by server sessions.

A. Backup Manager

B. Recovery Manager

C. Backup and Recovery Manager


D. Database Manager

135) …….. systems typically allows to replace failed disks without stopping access to the system.

A. RAM

B. RMAN

C. RAD

D. RAID

136) An ……… is an exact copy of a single data-file, archived redo log file, or control file.

A. image copy

B. data file copy

C. copy log

D. control copy

137) ………. known as memory-style error correcting-code(ECC) organization, employs parity bits.

A. RAID level 1

B. RAID level 2

C. RAID level 3

D. RAID level 4

138) The remote backup site is sometimes called the ………. site.

A. primary

B. secondary

C. ternary

D. None of the above

139) EXP command is used ………..

A. to take Backup of the Oracle Database

B. to import data from the exported dump file


C. to create Rollback segments

D. to create Schedule.

140) The simplest approach to introducing redundancy is to duplicate every disk is called …..

A. mirroring

B. imaging

C. copying

D. All of the above

You might also like