Saturday, 30 January 2016

IT Officer Exam PL/SQL MCQs Question Bank 152

Dear readers- In this article we are presenting latest and updated asked mix databse and PLSQL questions and answers. IBPS SO Database Digest – IT officer Database Multiple Choice Question and answers for you upcoming bank exam. These questions and answers are asked in various previous exam conducted by ibps asked questions. Today's every govt jobs in India required computer knowledge so must for every aspirants. Our Computer knowledge quiz is most important for all competitive exams. You are requested to also read our latest   IBPS SO Complete Database Digest MCQs Package For – IT officer Exam Multiple Choice Question and answers article will be published posting tomorrow after 8.00 A.M. All the best.

IT Officer Exam PL/SQL MCQs Question Bank 152

Part-1
1. ........................ is the full form of SQL.
A) Standard Query Language
B) Sequential Query Language
C) Structured Query Language
D) Server Side Query Language

2. SQL Server 2005 NOT includes the following system database .............
A) tempdb Database
B) Master Database
C) Model Database
D) sqldb Database

3. SQL Server stores index information in the ..................... system table.
A) sysindexes
B) systemindexes
C) sysind
D) sysindexes

4. ..................... is a read-only database that contains system objects that are included with SQL Server 2005.
A) Resource Database
B) Master Database
C) Model Database
D) msdb Database

5. The SQL Server services includes .....................
A) SQL server agent
B) Microsoft distribution transaction coordinator
C) Both a & b
D) None of the above

6. ...................... is a utility to capture a continuous record of server activity and provide auditing capability.
A) SQL server profile
B) SQL server service manager
C) SQL server setup
D) SQL server wizard

7. The query used to remove all references for the pubs and newspubs databases from the system tables is ..........................
A) DROP DATABASE pubs, newpubs;
B) DELETE DATABASE pubs, newpubs;
C) REMOVE DATABASE pubs, newpubs;
D) DROP DATABASE pubs and newpubs;

8. ...................... clause specifies the groups into which output rows are to be placed and, if aggregate functions are included in the SELECT clause.
A) ORDER BY
B) GROUP
C) GROUP BY
D) GROUP IN

9. .................. are predefined and maintained SQL Server where users cannot assign or directly change the values.
A) Local Variables
B) Global Variables
C) Assigned Variables
D) Direct Variables

10. Microsoft SQL Server NOT uses which of the following operator category?
A) Bitwise Operator
B) Unary Operator
C) Logical Operator
D) Real Operator

Answers:

1.  C) Structured Query Language
2.  D) sqldb Database
3.  D) sysindexes
4.  A) Resource Database
5.  C) Both a & b
6.  B) SQL server service manager
7.  A) DROP DATABASE pubs, newpubs;
8.  C) GROUP BY
9.  B) Global Variables
10.D) Real Operator

Part-2
1. ......................... are predefined and maintained SQL Server and users cannot assign or directly change the values.
A) Global variables
B) Local Variables
C) Integer Variables
D) Floating Variables

2. A local variable is shown ........................... preceding its name.
A) One @ symbol
B) Two @@ symbol
C) One # symbol
D) Two ## symbol

3. Constraint checking can be disabled on existing ........... and ............. constraints so that any data you modify or add to the table is not checked against the constraint.
A) CHECK, FOREIGN KEY
B) DELETE, FOREIGN KEY
C) CHECK, PRIMARY KEY
D) PRIMARY KEY, FOREIGN KEY

4. ................ and ................... are the Transact - SQL control-of-flow key words.
A) Continue, Stop
B) Break, Stop
C) Continue, While
D) While, Going to

5. The type of constraint ........................ specifies data values that are acceptable in a column.
A) DEFAULT
B) CHECK
C) PRIMARY
D) UNIQUE

6. The ..................... constraint defines a column or combination of columns whose values match the primary key of the same or another table.
A) DEFAULT
B) CHECK
C) PRIMARY
D) FOREIGN KEY

7.  The control-of-flow statement ..................... defines conditional, and optionally, alternate execution when a condition is FALSE.
A) WHILE
B) WAITFOR
C) IF........ELSE
D) BEGIN.......... END

8. In SQL Server, ..................... is based on relationships between foreign keys and primary keys or between foreign keys and unique keys.
A) Entity integrity
B) Domain integrity
C) Referential integrity

D) User-defined integrity

9. When a ................. clause is used, each item in the select list must produce a single value for each group.
A) ORDER BY
B) GROUP
C) GROUP BY
D) GROUP IN

10. MS SQL Server uses a variant of SQL called T-SQL, or Transact SQL, an implementation of .................. with some extensions.
A) MS SQL Server
B) Tabular Data Set
C) SQL-92
D) Tabular Data Stream

Answers:

1.  A) Global variables
2.  A) One @ symbol
3.  A) CHECK, FOREIGN KEY
4.  C) Continue, While
5.  B) CHECK
6.  D) FOREIGN KEY
7.  C) IF........ELSE
8.  C) Referential integrity
9.  C) GROUP BY
10.C) SQL-92

Part-3
1. ........................ is a procedural extension of Oracle - SQL that offers language constructs similar to those in imperative programming languages.
A) SQL
B) PL/SQL
C) Advanced SQL
D) PQL

2. .................... combines the data manipulating power of SQL with the data processing power of Procedural languages.
A) PL/SQL
B) SQL
C) Advanced SQL
D) PQL

3. ................... has made PL/SQL code run faster without requiring any additional work on the part of the programmer.
A) SQL Server
B) My SQL
C) Oracle
D) SQL Lite

4. A line of PL/SQL text contains groups of characters known as .......................
A) Lexical Units
B) Literals
C) Textual Units
D) Identifiers

5. We use ........................ name PL/SQL program objects and units.
A) Lexical Units
B) Literals
C) Delimiters
D) Identifiers

6. A .................... is an explicit numeric, character, string or Boolean value not represented by an identifier.
A) Comments
B) Literals
C) Delimiters
D) Identifiers

7. If no header is specified, the block is said to be an ...................... PL/SQL block.
A) Strong
B) Weak
C) Empty
D) Anonymous

8. ............. is a sequence of zero or more characters enclosed by single quotes.
A) Integers literal
B) String literal
C) String units
D) String label

9. In ........................, the management of the password for the account can be handled outside of oracle such as operating system.
A) Database Authentication

B) Operating System Authentication
C) Internal Authentication
D) External Authentication

10. In ............................ of Oracle, the database administrator creates a user account in the database for each user who needs access.
A) Database Authentication
B) Operating System Authentication
C) Internal Authentication
D) External Authentication

Answers:

1. B) PL/SQL
2. A) PL/SQL
3. C) Oracle
4. A) Lexical Units
5. D) Identifiers
6. B) Literals
7. D) Anonymous
8. B) String literal
9. B) Operating System Authentication
10.A) Database Authentication

Part-4
1. ....................... are used to recreate if trigger already exists.

A) Cursor

B) Trigger

C) Keywords

D) Replace


2. .............................. is used to define code that is executed / fired when certain actions or event occur.

A) Cursor

B) Trigger

C) Keywords

D) Replace


3. ................. provide a way for your program to select multiple rows of data from the database and then process each row individually.

A) PL/SQL Cursors

B) PL/SQL Trigger

C) PL/SQL Select

D) PL/SQL Process


4. ........................... cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands.

A) Implicit

B) Explicit

C) Internal

D) External


5. ......................... cursors are declared and used by the user to process multiple row, returned by SELECT statement.

A) Implicit

B) Explicit

C) Internal

D) External


6. ....................... contain a pointer that keeps track of current row being accessed, which enables your program to process the rows at a time.

A) Tracker

B) Cursor

C) Accesser

D) Trigger


7. ....................... a cursor enables you to define the cursor and assign a name to it.

A) Declearing

B) Stating

C) Extracting

D) Importing


8. In ................... the cursor advances to the next row in the active set each time the fetch command is executed.

A) recreating process

B) redefining process

C) iterative process

D) None of the above


9. A ......................... is a database object that groups logically related PL/SQL types, objects and subprograms.

A) Module

B) Package

C) Body

D) Name


10. In the PL/SQL, the package specification contains ....................... declarations.

A) Public

B) Private

C) Friend

D) Protected

Answers:

1. D) Replace
2. B) Trigger
3. A) PL/SQL Cursors
4. A) Implicit
5. B) Explicit
6. B) Cursor
7. A) Declearing
8. C) iterative process
9. B) Package
10.A) Public

Part-5
1. The …………………… consists of physical files and memory components.

A) Oracle Client

B) Oracle Server

C) Oracle Middleware

D) Oracle Instance


2. The ……………………… consists of the memory components of Oracle and various background processes.

A) Oracle Parameter

B) Oracle Profile

C) Oracle Process

D) Oracle Instance


3. The Oracle Instance is made up of the ………………………. and the background processes.

A) System Global Area (SGA)

B) Oracle Global Area (OGA)

C) Program Global Area (PGA)

D) Private SQL Area (PSA)


4. The background processes of the Oracle instance are responsible for performing …………………. I/O functions.

A) Synchronous

B) Asynchronous

C) Both of the above

D) None of the above


5. The PGA is used to process ………………………… and to hold logon and other session information.

A) SQL Statements

B) Server Processes

C) User Processes

D) Shared Statements


6. In SGA, the contents of the memory area are shared by multiple users is called as …………………..

A) Redo Log Buffer

B) Database Buffer Cache

C) Shared Pool

D) Large Pool


7. In Oracle Database ………………….. Contain the data dictionary and user created data.

A) Data Files

B) Control Files

C) Redo Log Files

D) Password Files


8. The ………………………….. keeps a record of the names, size locations different physical files of the Oracle Database.

A) Data File

B) Control File

C) Redo Log File

D) Password File


9. In Oracle Database, ……………………………… is used to hold the names of privileged users who have been granted the SYSDBA or SYSOPR roles.

A) Data File

B) Control File

C) Redo Log File

D) Password File


10. In Oracle, the end of the transaction is recorded in the ……………………….. files.

A) Data

B) Control

C) Redo Log

D) Password

Answers:

1. B) Oracle Server
2. D) Oracle Instance
3. A) System Global Area (SGA)
4. B) Asynchronous
5. A) SQL Statements
6. C) Shared Pool
7. A) Data Files
8. B) Control File
9. D) Password File
10. C) Redo Log

Part-6
1. ………………….. is the collection of memory structures and Oracle background processes that operates against an Oracle database.

A) Database

B) Instance

C) Tablespace

D) Segment


2. A ………………………… is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.

A) tablespace

B) segments

C) extents

D) blocks


3. A tablespace is further broken down into …………………

A) tablespace

B) segments

C) extents

D) blocks


4. ……………………….. is a contiguous group of blocks allocated for use as part of a table, index, and so forth.

A) tablespace

B) segment

C) extent

D) block


5. ……………… is the smallest unit of allocation in an Oracle database.

A) Database

B) Instance

C) Tablespace

D) Database Block


6. An Oracle ………………………..is a set of tables and views that are used as a read-only reference about the database.

A) Database dictionary

B) Dictionary table

C) Data dictionary

D) Dictionary


7. A data dictionary is created when a …………………. created.

A) Instance

B) Segment

C) Database

D) Dictionary


8. An Oracle object type has two parts the …………………. and …………………….

A) Instance and body

B) Segment and blocks

C) Specification and body

D) Body and segment


9. By, default, Oracle object types are ………………………

A) INSTANTIABLE

B) NOT INSTANTIABLE

C) FINAL

D) OVERRIDING


10. A method modifier tells Oracle that new subtypes may not override a method is called …………….

A) INSTANTIABLE

B) NOT INSTANTIABLE

C) FINAL

D) OVERRIDING

Answers:

1. B) Instance
2. A) tablespace
3. B) segments
4. C) extent
5.  D) Database Block
6.  C) Data dictionary
7.  C) Database
8.  C) Specification and body
9.  A) INSTANTIABLE
10. C) FINAL

Part-7
1) If the transaction is rolled back, all the database changes made inside the transaction are ......

A. made permanent

B. made temporary

C. copied to the log

D. undone


2) Which of the following is not a property of transactions?

A. Atomicity

B. Concurrency

C. Isolation

D. Durability


3) A ......... ensures that transactions are performed as expected.

A. transaction processing monitor

B. transaction procedure monitor

C. isolation monitor

D. transaction log


4) A transaction that completes its execution successfully is said to be .......

A. committed

B. rolled back

C. partially committed

D. Aborted


5) ........ means that a transaction must execute exactly once completely or not at all.

A. durability

B. consistency

C. atomicity

D. isolation


6) Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.

A. It will result in a deadlock situation

B. It will immediately be rejected

C. It will immediately be granted

D. It will be granted as soon as it is released by A


7) ........... means that when it ends, a transaction must leave the database in a consistent state.

A. Data isolation

B. Data duration

C. Data consistency

D. Data non-reputability


8) The number of transactions executed in a given amount of time is called .........

A. utilization

B. execution rate

c. throughput

D. atomicity


9) Isolation means ......

A. transaction must not interfere with each other

B. transaction must interfere with each other

C. transaction must be in consistent state

D. transaction must be executed immediately


10) Which of the following ensures the atomicity of the transaction?

A. Transaction management component of DBMS

B. Application Programmer

C. Concurrency control component of DBMS

D. Recovery management component of DBMS


11) ........ means that a transaction must make its changes permanent to the database ends.

A. isolation

B. locking

C. durability

D. consistency


12) Throughput means

A. number of transactions that are committed in one hour

B. number of operations in a transaction

C. number of transaction that can be aborted in a given amount of time

D. number of transaction that can be executed in a given amount of time


13) ........ deals with individual transactions.

A. isolate transactions

B. transaction recovery

C. system recovery

D. media recovery


14) The part of a database management system which ensures that the data remains in a consistent state is

A. authorization and integrity manager

B. buffer manager

C. transaction manager

D. file manager


15) ......... protocol is used to perform multiple transactions that execute on different database.

A. commit

B. two phase lock

C. two phase commit

D. locking


16) A transaction can do read and write operation on a data item when it acquires ......

A. read mode

B. exclusive mode

C. shared mode

D. write mode


17) In .......... one transaction overwrites the changes of another transaction.

A. uncommitted read problem

B. lost update problem

C. update lost problem

D. dirty read problem


18) Isolation of the transactions is ensured by

A. Transaction management

B. Application programmer

C. Concurrency control

D. Recovery management


19) In dirty read problem .......

A. one transaction reads an uncommitted value of another transaction

B. one transaction reads the committed value for another transaction

C. one transaction reads another transaction

D. one transaction commits another transaction.


20) A transaction can do only read operation and not write operation on a data item when it acquires ....... lock.

A. read mode

B. exclusive mode

C. shared mode

D. write mode

Answers:

1) D. undone
2) B. Concurrency
3) A. transaction processing monitor
4) A. committed
5) C. atomicity
6) C. It will immediately be granted
7) C. Data consistency
8) c. throughput
9) A. transaction must not interfere with each other
10) A. Transaction management component of DBMS
11) C. durability
12) D. number of transaction that can be executed in a given amount of time
13) B. transaction recovery
14) C. transaction manager
15) C. two phase commit
16) B. exclusive mode
17) B. lost update problem
18) C. Concurrency control
19) A. one transaction reads an uncommitted value of another transaction
20) C. shared mode

Part-8
1) In the ............, one transaction inserts a row in the table while the other transaction is half way through its browsing of table.

A. transaction read problem

B. one way read problem

C. serial read problem

D. phantom read problem


2) Transaction processing is associated with everything below except.

A. producing detail, summery, or exception reports

B. recording a business activity

C. confirming an action or triggering a response

D. maintaining data


3) .......... helps solve concurrency problem.

A. locking

B. transaction monitor

C. transaction serializability

D. two phase commit


4) If a transaction acquires a shared lock, then it can perform .......... operation.

A. read

B. write

C. read and write

D. update


5) If a transaction obtains a shared lock on a row, it means that the transaction wants to ..... that row.

A. write

B. insert

C. execute

D. read


6) The node where the distributed transaction originates is called the .......

A. local coordinator

B. starting coordinator

C. global coordinator

D. originating node


7) If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ....... that row.

A. select

B. update

C. view

D. read


8) If a transaction acquires exclusive lock, then it can perform .......... operation.

A. read

B. write

C. read and write

D. update


9) ........ is a specific concurrency problem wherein two transactions depend on each other for something.

A. phantom read problem

B. transaction read problem

C. deadlock

D. locking


10) If a database server is referenced in a distributed transaction, the value of its commit point strength determines which role it plays in the .........

A. two phase commit

B. two phase locking

C. transaction locking

D. checkpoints


11) Transaction .......... ensures that the transaction are being executed successfully.

A. concurrency

B. consistency

C. serialisability

D. non serialiasability


12) The situation in which a transaction holds a data item and waits for the release of data item held by some other transaction, which in turn waits for another transaction, is called .......

A. serialiable schedule

B. process waiting

C. concurrency

D. deadlock


13) ............ protocol grantees that a set of transactions becomes serialisable.

A. two phase locking

B. two phase commit

C. transaction locking

D. checkpoints


14) The global coordinator forgets about the transaction phase is called .........

A. Prepare phase

B. Commit phase

C. Forget phase

D. Global phase


15) In two phase commit, .......... coordinates the synchronization of the commit or rollback operations.

A. database manager

B. central coordinator

C. participants

D. concurrency control manager


16) In two-phase locking protocol, a transaction obtains locks in ........phase.

A. shrinking phase

B. growing phase

C. running phase

D. initial phase


17) A transaction processing system is also called as ........

A. processing monitor

B. transaction monitor

C. TP monitor

D. monitor


18) After the nodes are prepared, the distributed transaction is said to be ......

A. in-doubt

B. in-prepared

C. prepared transaction

D. in-node


19) In .........., we have many mini transactions within a main transaction.

A. transaction control

B. chained transaction

C. nested transaction

D. calling transaction


20) In a two-phase locking protocol, a transaction release locks in ......... phase.

A. shrinking phase

B. growing phase

C. running phase

D. initial phase

Answers:

1) D. phantom read problem
2) C. confirming an action or triggering a response
3) A. locking
4) A. read
5) D. read
6) C. global coordinator
7) B. update
8) C. read and write
9) C. deadlock
10) A. two phase commit
11) C. serialisability
12) D. deadlock
13) A. two phase locking
14) C. Forget phase
15) B. central coordinator
16) B. growing phase
17) C. TP monitor
18) A. in-doubt
19) B. chained transaction
20) A. shrinking phase

Part-9
1) A mechanism which ensures that simultaneous execution of more than one transaction does not lead to any database inconsistencies is called .................. mechanism.

A. transaction control

B. transaction management

C. concurrency parallelism

D. concurrency control


2) The transaction wants only to read the data item of mode is called as .......

A. Exclusive Mode

B. Shared Mode

C. Inclusive Mode

D. Unshared Mode


3) Any execution of a set of transactions is called as its .........

A. non-serial schedule

B. serial schedule

C. schedule

D. interleaved schedule


4) ............ is program or set of program that interacts with the database at some point in its execution.

A. A database system

B. A database application

C. Both

D. none


5) .......... component of a database is responsible for ensuring atomicity and durability.

A. recovery management

B. concurrency control

C. storage management

D. query evaluation engine


6) The activity of ensuring atomicity in the presence of Transaction aborts is called ..........

A. transaction control

B. transaction management

C. transaction recovery

D. concurrency control


7) A .............is a set of rules that state when a transaction may lock or unlock each of the data items in the database

A. concurrency control

B. transaction control

C. validation control

D. locking protocol


8) ..................  is a collection of programs performing all necessary action associated with a database.

A. Database associated

B. Database administrator

C. Database application

D. Database management system


9) Which protocol permits release of exclusive locks only at the end of transaction?

A. Graph based protocol

B. Strict two phase locking protocol

C. Two phase locking protocol

D. Rigorous Two phase locking protocol


10) The activity of providing Durability of the transaction is called .....

A. database control

B. transaction management

C. transaction recovery

D. database recovery


11) Which protocol allows a transaction to lock a new data item only if that transaction has not yet unlocked data item?

A. Graph based protocol.

B. Strict two phase locking protocol

C. Two phase locking protocol

D. Time stamp ordering scheme


12) .......... is a collection of application programs that interacts with the database along with DBMS.

A. A database system

B. A database application

C. Database administration

D. Data system


13) ........ ensures that once transaction completes successfully, the results of the operations become permanent.

A. serializability

B. synchronizability

C. atomicity

D. durability


14) A ....... contains information for undoing or redoing all the actions performed by the transactions.

A. save point

B. log

C. node

D. commit_point


15) A ............. is a unit of program execution that accesses and possibly updates various data items.

A. DBMS

B. monitor

C. transaction

D. transistor


16) Transaction is an action used to perform some manipulation on data stored in the ........

A. Memory

B. Record

C. Database

D. All of these


17) A transaction is terminated if it has ........

A. aborted

B. committed

C. running state

D. aborted or committed


18) The two possible communication errors are, Lost messages and .......

A. Network Partitions

B. Lost acknowledgement

C. Timeout

D. log error


19) The only way to undo the effects of a committed transaction is to execute a .......

A. committed transaction

B. compensating transaction

C. supplementary transaction

D. update query


20) In .........., one or more users/programs attempt to access the same data at the same time.

A. concurrency

B. transaction control

C. locking

D. two phase locking

Answers:

1) D. concurrency control
2) B. Shared Mode
3) C. schedule
4) B. A database application
5) A. recovery management
6) C. transaction recovery
7) D. locking protocol
8) D. Database management system
9) B. Strict two phase locking protocol
10) D. database recovery
11) C. Two phase locking protocol
12) A. A database system
13) D. durability
14) B. log
15) C. transaction
16) C. Database
17) C. running state
18) A. Network Partitions
19) B. compensating transaction
20) A. concurrency


Part-10

1) Commit and rollback are related to ..........

A. data integrity

B. data consistency

C. data sharing

D. data security


2) The transaction wants to edit the data item is called as .......

A. Exclusive Mode

B. Shared Mode

C. Inclusive Mode

D. Unshared Mode


3) For committing a transaction, the DBMS might discard all the records.

A. after image

B. before image

C. log

D. redo log


4) A sophisticated locking mechanism known as 2-phase locking which includes Growing phase and .......

A. Shrinking Phase

B. Release phase

C. Commit phase

D. Acquire Phase


5) A Transaction ends

A. only when it is Committed.

B. only when it is Rolled-back

C. when it is Committed or Rolled-back

D. only when it is initialized


6) In .........., each transactions there is a first phase during which new lock are acquired.

A. Shrinking Phase

B. Release phase

C. Commit phase

D. Growing Phase


7) A transaction processing system is also called as .......

A. processing monitor

B. transaction monitor

C. TP monitor

D. monitor


8) The transactions are always ......... if it always locks a data item in shared mode before reading it.

A. well formed

B. well distributed

C. well locked

D. well shared


9) .......... servers which is widely used in relational database systems.

A. Data servers

B. Transaction servers

C. Query servers

D. Client servers


10) If a distributed transactions are well-formed and 2-phasedlocked, then ................ is the correct locking mechanism in distributed transaction as well as in centralized databases.

A. two phase locking

B. three phase locking

C. transaction locking

D. well-formed locking


11) ......... property will check whether all the operation of a transaction completed or none.

A. Atomicity

B. Consistency

C. Isolation

D. Durability


12) The total ordering of operations across groups ensures ...........of transactions.

A. serializability

B. synchronizability

C. atomicity

D. durability


13) In which state, the transaction will wait for the final statement has been executed?

A. Active

B. Failed

C. Aborted

D. partially committed


14) The ORDER concurrency control technique is based on the property.

A. ordering mechanism

B. inherent ordering

C. total ordering

D. partial ordering


15) Transactions per rollback segment is derived from .....

A. Db_Block_Buffers

B. Processes

C. shared_Pool_size

D. buffers


16) The ............is responsible for ensuring correct execution in the presence of failures.

A. Database Manager

B. Transaction Manager

C. Recovery Manager

D. Executive Manager


17) A distributed transaction can be ............. if queries are issued at one or more nodes.

A. fully read-only

B. partially read-only

C. fully read-write

D. partially read-write


18) The distributed transaction can be completely read-only and the transaction is started with a .......... READ ONLY statement.

A. DISTRIBUTED_TRANSACTIONS

B. TRANSACTION

C. SET TRANSACTION

D. READ TRANSACTION


19) The initialization parameter ................. controls the number of possible distributed transactions in which a given instance can concurrently participate, both as a client and a server.

A. DISTRIBUTED_TRANSACTIONS

B. TRANSACTION

C. SET TRANSACTION

D. CONTROL TRANSACTION


20) A database administrator can manually force the COMMIT or ROLLBACK of a local ............ distributed transaction.

A. in-force

B. in-doubt

C. in-local

D. in-manual

Answers:

1) B. data consistency
2) A. Exclusive Mode
3) B. before image
4) A. Shrinking Phase
5) C. when it is Committed or Rolled-back
6) D. Growing Phase
7) C. TP monitor
8) A. well formed
9) B. Transaction servers
10) A. two phase locking
11) A. Atomicity
12) A. serializability
13) D. partially committed
14) C. total ordering
15) B. Processes
16) A. Database Manager
17) B. partially read-only
18) C. SET TRANSACTION
19) A. DISTRIBUTED_TRANSACTIONS
20) B. in-doubt

Part-11
1) Which of the following is not a recovery technique?

A. Deferred update

B. Immediate update

C. Two-phase commit

D. Recovery management


2)Checkpoints are a part of

A. Recovery measures

B. Security measures

C. Concurrency measures

D. Authorization measures


3) ....... deals with soft errors, such as power failures.

A. system recovery

B. media recovery

C. database recovery

D. failure recovery


4) ........... is an essential part of any backup system.

A. Filter

B. Recovery

C. Security

D. Scalability


5) Media recovery deals with ...........

A. disk errors

B. hard errors

C. system errors

D. power failures


6) For a backup/restore system, ............. is a prerequisite for service in a enterprise.

A. Filter

B. Recovery

C. Security

D. Scalability


7) Failure recovery and media recovery fall under ........

A. transaction recovery

B. database recovery

C. system recovery

D. value recovery


8) The .......... consists of the various applications and database that play a role in a backup and recovery strategy.

A. Recovery Manager environment

B. Recovery Manager suit

C. Recovery Manager file

D. Recovery Manager database


9) In which the database can be restored up to the last consistent state after the system failure?

A. Backup

B. Recovery

C. Both

D. None



10) A ........... is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalogue.

A. recovery procedure

B. recovery block

C. stored block

D. stored script


11) In log based recovery, the log is sequence of .........

A. filter

B. records

C. blocks

D. numbers


12) The enrolling of a database in a recovery catalogue is called .........

A. set up

B. registration

C. start up

D. enrolment



13) .......... is an alternative of log based recovery.

A. Disk recovery

B. Shadow paging

C. Dish shadowing

D. Crash recovery



14) Most backup and recovery commands in ........... are executed by server sessions.

A. Backup Manager

B. Recovery Manager

C. Backup and Recovery Manager

D. Database Manager


15) ........ systems typically allows to replace failed disks without stopping access to the system.

A. RAM

B. RMAN

C. RAD

D. RAID



16) An ......... is an exact copy of a single datafile, archived redo log file, or control file.

A. image copy

B. datafile copy

C. copy log

D. control copy



17) .......... known as memory-style error correcting-code(ECC) organization, employs parity bits.

A. RAID level 1

B. RAID level 2

C. RAID level 3

D. RAID level 4



18) The remote backup site is sometimes called the .......... site.

A. primary

B. secondary

C. ternary

D. None of the above



19) EXP command is used ...........

A. to take Backup of the Oracle Database

B. to import data from the exported dump file

C. to create Rollback segments

D. to create Schedule.



20) The simplest approach to introducing redundancy is to duplicate every disk is called .....

A. mirroring

B. imaging

C. copying

D. All of the above

Answers:

1) C. Two-phase commit
2) A. Recovery measures
3) D. failure recovery
4) C. Security
5) A. disk errors
6) D. Scalability
7) C. system recovery
8) A. Recovery Manager environment
9) B. Recovery
10) D. stored script
11) B. records
12) B. registration
13) B. Shadow paging
14) B. Recovery Manager
15) D. RAID
16) A. image copy
17) B. RAID level 2
18)  B. secondary
19) A. to take Backup of the Oracle Database
20) A. mirroring

No comments:

Post a Comment

Advertisement