1. is a sequence of zero or more characters enclosed by single quotes.
Correct : B. string literal
2. In the management of the password for the account can be handled outside of oracle such as operating system.
Correct : B. operating system authentication
3. In of Oracle, the database administrator creates a user account in the database for each user who needs access.
Correct : A. database authentication
4. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which of the following form a transaction?
Correct : C. both 1 and 2 individually
5. A transaction is delimited by statements (or function calls) of the form
Correct : A. begin transaction and end transaction
6. Identify the characteristics of transactions
Correct : D. all of the mentioned
7. Which of the following has “all-or-none” property?
Correct : A. atomicity
8. The property of a transaction that persists all the crashes is
Correct : B. durability
9. states that only valid data will be written to the database.
Correct : A. consistency
10. Transaction processing is associated with everything below except
Correct : C. confirming an action or triggering a response
11. The Oracle RDBMS uses the statement to declare a new transaction start and its properties.
Correct : B. set transaction
12. means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
Correct : D. isolation
13. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?
Correct : B. create schema
14. In SQL, the CREATE TABLESPACE is used
Correct : A. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace
15. Which character function can be used to return a specified portion of a character string?
Correct : C. substr
16. Which of the following is TRUE for the System Variable $date$?
Correct : B. can be assigned to any field only during design time
17. What are the different events in Triggers?
Correct : C. insert, update, delete
18. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?
Correct : A. data definition language
19. The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’),
Correct : B. 2345
20. Which of the following SQL command can be used to modify existing data in a database table?
Correct : B. update
21. provides option for entering SQL queries as execution time, rather than at the development stage.
Correct : D. dynamic sql
22. The storage structure which do not survive system crashes are
Correct : A. volatile storage
23. For a transaction to be durable, its changes need to be written to storage.
Correct : C. stable storage
24. The unit of storage that can store one are more records in a hash file organization are
Correct : A. buckets
25. A file system is software that enables multiple computers to share file storage while maintaining consistent space allocation and file content.
Correct : D. cluster
26. A file produced by a spreadsheet
Correct : A. is generally stored on disk in an ascii text format
27. SDL means
Correct : B. storage definition language
28. The process of saving information onto secondary storage devices is referred to as
Correct : C. writing
29. If an transaction is performed in a database and committed, the changes are taken to the previous state of transaction by
Correct : D. cannot be done
30. Each modification done in database transaction are first recorded into the
Correct : B. log
31. When the transaction finishes the final statement the transaction enters into
Correct : C. partially committed state
32. The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready for execution shall be called
Correct : C. opt. exe
33. Which of the following is an atomic sequence of database actions?
Correct : A. transaction
34. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called
Correct : D. inconsistent state
35. means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
Correct : C. isolation
36. Which of the following is not a state in transaction?
Correct : B. terminated
37. joins are SQL server default
Correct : B. inner
38. The is essentially used to search for patterns in target string.
Correct : A. like predicate
39. is a combination of two of more attributes used as a primary key
Correct : A. composite key
40. Which of the following is not the function of client?
Correct : B. query optimization
41. is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.
Correct : B. trigger
42. requires that data should be made available to only authorized users.
Correct : C. security
43. allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.
Correct : C. curser
44. Which s essential a business problem not a data problem:
Correct : C. database design
45. McFadden has defined normalization in his which book
Correct : C. modern database management
46. The database design prevents some data from being represented due to
Correct : B. insertion anomalies
47. How many types of insertion anomalies:
Correct : B. 2
48. Who developed the normalization process:
Correct : A. e.f. codd
49. E.F.Codd developed the normalization process in the which early:
Correct : B. 1970
50. Which is the process of breaking a relation into multiple relations:
Correct : D. decomposition
51. Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:
Correct : B. deadlock
52. Which is a duplicate copy of a file program that is stored on a different storage media than the original location:
Correct : C. backup
53. Which is the duplication of computer operations and routine backups to combat any unforeseen problems:
Correct : D. recovery
54. Optimization basically related to the Rewrite module is termed as
Correct : A. semantic query optimization
55. Database security helps organizations to protect data from
Correct : B. external users
56. Copying files to secondary or specific devices is known as
Correct : B. backup
57. Which are types of recovery control techniques:
Correct : C. all of the mentioned
58. Which server can join the indexes when only multiple indexes combined can cover the query:
Correct : A. sql
59. In concurrency control policy the lock is obtained on
Correct : A. entire database
60. A concurrency-control policy such as this one leads to performance since it forces transactions to wait for preceding transactions to finish before they can start.
Correct : C. poor
61. are used to ensure that transactions access each data item in order of the transactions’ if their accesses conflict.
Correct : D. timestamps
62. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?
Correct : C. to create a grouping for expressions or columns specified within a group by clause in one direction, from right to left for calculating the subtotals
63. Which statement is true regarding external tables?
Correct : D. the create table as select statement can be used to unload data into regular table in the database from an external table
64. SNAPSHOT is used for (DBA)
Correct : D. dynamic data replication
65. Isolation of the transactions is ensured by
Correct : C. concurrency control
66. Which of the following statements is/are not true for SQL profiler?
Correct : C. check the performance of a stored procedure
67. Which of the following is the original purpose of SQL?
Correct : D. all of the mentioned
68. SQL can be used to:
Correct : D. all of the mentioned
69. A lock that allows concurrent transactions to access different rows of the same table is known as a
Correct : D. row-level lock
70. Which of the following are introduced to reduce the overheads caused by the log- based recovery?
Correct : A. checkpoints
71. Which of the following protocols ensures conflict serializability and safety from deadlocks?
Correct : B. time-stamp ordering protocol
72. Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other
Correct : A. concurrency
73. The lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.
Correct : D. field-level
74. Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?
Correct : D. two phase lock
75. A system is in a state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.
Correct : C. deadlock
76. The deadlock state can be changed back to stable state by using statement.
Correct : B. rollback
77. What are the ways of dealing with deadlock?
Correct : D. all of the mentioned
78. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This is
Correct : A. wait-die
79. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti). This is
Correct : C. wound-wait
80. The situation where the lock waits only for a specified amount of time for another lock to be released is
Correct : A. lock timeout
81. The deadlock in a set of a transaction can be determined by
Correct : A. read-only graph
82. A deadlock exists in the system if and only if the wait-for graph contains a
Correct : A. cycle
83. rollback requires the system to maintain additional information about the state of all the running transactions.
Correct : B. partial
84. If a node is locked in an intention mode, explicit locking is done at a lower level of the tree. This is called
Correct : A. intention lock modes
85. If a node is locked in explicit locking is being done at a lower level of the tree, but with only shared-mode locks.
Correct : A. intention lock modes
86. If a node is locked in then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks.
Correct : C. intention-exclusive (ix) mode
87. If a node is locked in the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with exclusive-mode locks.
Correct : B. shared and intention-exclusive (six) mode
88. The requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.
Correct : A. validation protocol
89. denotes the largest timestamp of any transaction that executed write(Q) successfully.
Correct : A. w-timestamp(q)
90. The most recent version of standard SQL prescribed by the American National Standards Institute is
Correct : A. sql 2016
91. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is
Correct : B. is null
92. A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a
Correct : A. database-level lock
93. A condition that occurs when two transactions wait for each other to unlock data is known as a(n)
Correct : D. deadlock
94. The file organization which allows us to read records that would satisfy the join condition by using one block read is
Correct : C. clustering file organization
95. The extent of the database resource that is included with each lock is called the level of
Correct : B. granularity
96. DBMS periodically suspends all processing and synchronizes its files and journals through the use of
Correct : A. checkpoint facility
97. Snapshot isolation is used to give
Correct : D. transaction a snapshot of the database and database a snapshot of committed values in the transaction
98. Lost update problem is
Correct : A. second update overwrites the first
99. Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as
Correct : D. none of the mentioned
100. Which statements are correct regarding indexes?