ORACLE 9iUNIT-1The syntax used to create a user with the name "John" with a password "john123@" is: a. CREATE USER John b. CREATE USER JOHN BY john123@ c. CREATE USER John IDENTIFIED BY john123@ d. CREATE USER John, john123@Q-2
1. a 2. b 3. c 4. dQ-3 SQL does not provide the programming techniques of conditional checking a. TRUE b. FALSEQ-4 The ______ attribute is used to declare variables based on definitions of columns in a table. a. %TYPE b. %ATTRIBUTE c. %ROWSET d. %NOTFOUNDUNIT-3The ______ offers a comprehensive set of middle-tier services. a. Client Applications b. Server Applications c. Business logic d. Application ServerQ-3 The ________ provides programmatic accesses, centralized management, and multi-channel delivery of internetservices. a. Business Intelligence Capabilities b. Recovery c. Open Framework d. Integrated Manageability
UNIT-4A ________ stores information about the physical structure of a database, name of the database, and locations of thedatabase. a. Record b. Table c. Column d. SchemaIncorrectQ-3 A ________reliably manages a large amount of data in a multiuser environment so that many users can concurrentlyaccess the same data. a. Server b. Database c. Client d. UserQ-4 The _________ structures are those that can be seen and operated on from the operating system, such as the physicalfiles that store data on a disk. The ______ structures are created and recognized by Oracle Database and are not known tothe operating system. a. Logical, Physical b. Physical, Logical c. Database, Schema d. Logical, DatabaseQ-5 The ___________ objects are the logical structures that directly refer to the databases data which include structureslike tables, views, and indexes. a. Database b. Server c. Schema d. Software
UNIT-5A _______ is a network of databases managed by multiple database servers used together. a. Centralized Databases b. Distributed Databases c. Local Databases d. Physical DatabasesUNIT-61. Decomposes the distributed calculus query into an algebraic query on global relations. 2. The information needed for thistransformation is found in the global conceptual schema describing the global relations. 3. The information about datadistribution is not used here but in the next layer. 4. The techniques used by this layer are those of a centralized DBMS. Theabove statements are the properties of ______________ a. Data Localization b. Global Query Optimization c. Query Decomposition d. Local Query OptimizationQ-2 Designing the _______ database maps the conceptual schema to the storage areas and determines the appropriateaccess methods. a. Physical b. Logical c. Symmetric d. DistributedUNIT-7A ______ transaction is a transaction that includes one or more statement that, individually or as a group, _____ data ontwo or more distinct nodes of a distributed database. a. update, delete b. distributed, delete c. distributed, update
d. update, delete Incorrect Q-3 If there is no provision for the local site to function as a ______DBMS, then the system has no local autonomy. a. stand-alone b. Functional c. relational d. Non - relational Q-4 The statements in a _____ transaction can reference any number of local or remote tables. The _____ RDBMS guarantees that all nodes involved in a distributed transaction take the same action: they either all commit or all roll back the transaction. a. single, MS- Access b. single, Oracle c. multiple, SQL Server d. Concurrent, MySQL Q-5 The _________ automates the process of updating Heterogeneous Services configuration data on remote hosts, ensuring correct operation over heterogeneous database links. a. Multi-Threaded Agents b. Pass-through SQL c. Agent Self-Registration d. Data Dictionary translations UNIT-8 Match the following:Client A node that references information in a database belonging to a different node.Database A node that receives a request for information from another node.ServerLocal A node that is forced to reference data on other nodes to complete its part of the transaction.CoordinatorGlobal The node that originates the distributed transaction.Coordinator
Q-2 A _____ is a part of the application. One application issues a begin_transaction primitive; from this point onwards, allactions which are performed by the application, until a commit or _____ primitive is issued are to be considered as onecompete transaction. a. transaction; abort b. function; lock c. query; abort d. function; abortQ-3 In the ____ phase, the initiating node in the transaction asks the other participating nodes to promise to commit or rollback the transaction. During the ____ phase, the initiating node asks all participating nodes to commit the transaction. Ifthis outcome is not possible, then all nodes are asked to roll back. a. commit; abort b. initiate; abort c. prepare; commit d. commit; abortQ-4 With respect to site failures, an algorithm is said to be ____ if it works properly even if K sites are down. a. resilient b. non- resilient c. 1- resilient d. K - resilientQ-5 ________ requires that if a transaction is interrupted by a failure its partial results are not at all taken into considerationand the whole operation has to be repeated. a. Atomicity b. Durability c. Consistency d. IsolationUNIT-9Q-2 In "Write-locks-all, read-locks-one" locking scheme, ____ locks are acquired on all copies, while ________ locks areacquired only an arbitrary copy.
a. exclusive, shared b. shared, exclusive c. shared, shared d. exclusive, exclusiveQ-3 In Distributed transaction concurrency control, the ______________can lock and unlock local data items. a. External Agents b. Legal Agents c. Local Agents d. Non-local agentsQ-4 In ________ mode of Transaction locking, mode________ the transaction wants only to read the data item a. Shared b. Exclusive c. Shared and Exclusive d. IsolatedQ-5 The existence of the deadlock situation corresponds to the existence of a ______ in the wait-for graph. Therefore asystem can discover deadlocks by _______ wait-for graph and analyzing whether there are cycles in it. a. flow, cycle b. cycle, constructing c. constructing, cycle d. constructing, constructing
UNIT-101Marks: 1/1Match the following RAID Levels with their concepts.RAID level 2 Know n as memory-style error correcting-code (ECC) organization, employs parity bitsRAID level 3 Has bit-interleaved parity organizationRAID level 4 Has block-interleaved parity organizationRAID level 5 Has block-interleaved distributed parityQ-2A fundamental requirement for any type of system is its ____. a. Scalability b. Portability c. Flexibility d. AdaptabilityQ-3 RMAN can create data files automatically when the user executes _____ or ______ commands. a. RESET, RESTORE b. RECEIVE, ROLLBACK c. RESTORE; RECOVER d. ROLLBACK, RESTOREQ-4 The ______ has finite space for records of backup activities, while a ____ can store a much longer history.
a. control file, recovery catalog b. log file, control file c. control file, log file d. recovery catalog, log fileQ-5 With the ______ database command, you can quickly revert a database to a previous time--without restoring data filesand performing media recovery. a. backup b. run c. Flashback d. rollback