Professional Documents
Culture Documents
1. 1.
2. 2.
3. 3.
4. 4.
52. Which Oracle access method is the fastest way for Oracle to retrieve a single row?
1. Primary key access.
2. Access via unique index.
3. Table access by ROWID.
4. Full table scan.
53. Which of the following can be a valid column name?
1. Column.
2. 1966_Invoices.
3. Catch_#22.
4. #Invoices.
54. Which command will delete all data from a table and will not write to the rollback
segment?
1. DROP.
2. DELETE.
3. CASCADE.
4. TRUNCATE.
55. Which character function can be used to return a specified portion of a character
string?
1. INSTR.
2. SUBSTRING.
3. SUBSTR.
4. POS.
56. The primary key on table EMP is the EMPNO column. Which of the following
statements will not use the associated index on EMPNO?
1. select * from EMP where nvl(EMPNO, '00000') = '59384';
2. select * from EMP where EMPNO = '59384';
3. control file.
4. undolog file.
68. What is difference between a DIALOG WINDOW and a DOCUMENT WINDOW
regarding moving the window with respect to the application window?
1. Both windows behave the same way as far as moving the window is concerned.
2. A document window can be moved outside the application window while a
dialog window cannot be moved.
3. Both windows behave in a different way as far as moving the window.
4. A dialog window can be moved outside the application window while a
document window cannot be moved.
69. What is the difference between a MESSAGEBOX and an ALERT?
1. A messagebox can be used only by the system and cannot be used in user
application while an alert can be used in user application also.
2. A alert can be used only by the system and cannot be use din user application
while an messagebox can be used in user application also.
3. An alert requires an response from the userwhile a messagebox just flashes a
message and only requires an acknowledment from the user.
4. An message box requires an response from the userwhile a alert just flashes a
message an only requires an acknowledment from the user.
70. What is the difference between a LIST BOX and a COMBO BOX ?
1. In the list box, the user is restricted to selecting a value from a list but in a
combo box the user can type in value which is not in the list.
2. A list box is a data entry area while a combo box can be used only for control
purposes.
3. In a combo box, the user is restricted to selecting a value from a list but in a list
box the user can type in a value which is not in the list.
4. control box is data entry area and list box can be used only for control
purposes.
71. Why is it better to use an INTEGRITY CONSTRAINT to validate data in a table than
to use a STORED PROCEDURE ?
1. Because an integrity constraint is automatically checked while data is inserted
into or updated in a table while a stored procedure has to be specifically invoked.
2. Because the stored procedure occupies more space in the database than a
integrity constraint definition.
3. Because a stored procedure creates more network traffic than a integrity
constraint definition.
4. Because a stored procedure creates more redundancy than a integrity constraint
definition.
72. Which of the following is not an advantage of a client/server model?
1. A client/server model allows centralised control of data and centralised
implementation of business rules.
2. A client/server model increases developer;s productivity.
3. A client/server model is suitable for all applications.
4. A client/server model is suitable only for reference tables.
73. What does DLL stands for ?
1. Dynamic Language Library.
2. Dynamic Link Library.
3. Dynamic Load Library.
4. Dynamic Load Language.
74. POST-BLOCK trigger is a________
1. navigational trigger.
2. key trigger.
3. transactional trigger.
4. statement level triggers.
75. The system variable that records the select statement that SQL * FORMS most
recently used to populate a block is_________________
1. SYSTEM.LAST_RECORD.
2. SYSTEM.CURSOR_RECORD.
3. SYSTEM.CURSOR_FIELD.
4. SYSTEM.LAST_QUERY.
98. Which of the following is not correct about the “TABLE” datatype ?
1. Can contain any number of columns.
2. Simulates a One-dimensional array of unlimited size.
3. Column datatype of any Scalar type.
4. Composite datatype of any Scalar type.
99. Find the ODD one out of the following?
1. OPEN.
2. CLOSE.
3. INSERT.
4. FETCH.
100. Which of the following is not correct about Cursor ?
1. Cursor is a named Private SQL area.
2. Cursor holds temporary results.
3. Cursor is used for retrieving multiple rows.
4. SQL uses implicit Cursors to retrieve rows.
101. Which of the following is NOT VALID in PL/SQL ?
1. Select … into.
2. Update.
3. Create.
4. Delete.
102. What is the Result of the following ‘VIK’NULL’RAM’ ?
1. Error.
2. VIK RAM.
3. VIKRAM.
4. NULL.
103. Declare
a number := 5; b number := null; c number := 10;
Begin
if a > b AND a <> ( Select count(*) from Emp E2 where E1.SAL > E2.SAL ) will
retrieve
1. 3500,5000,2500.
2. 5000,2850.
3. 2850,5750.
4. 5000,5750.
104. Which of the following is not correct about a View ?
1. To protect some of the columns of a table from other users.
2. Ocuupies data storage space.
3. To hide complexity of a query.
4. To hide complexity of a calculations.
105. Which is not part of the Data Definition Language ?
1. CREATE.
2. ALTER.
3. ALTER SESSION.
4. CREATE SESSION.
106. EMPNO ENAME SAL
A822 RAMASWAMY 3500
A812 NARAYAN 5000
A973 UMESH
A500 BALAJI 5750
Using the above data
Select count(sal) from Emp will retrieve
1. 1.
2. 0.
3. 3.
4. 6.
107. What are the different events in Triggers ?
1. Define, Create.
2. Drop, Comment.
3. Insert, Update, Delete.
4. Select, Commit.
3. entity.
4. degree.
159. The data flow model of an application mainly shows___________
1. the underlying data and the relationships among them.
2. processing requirements and the flow of data.
3. decision and control information.
4. communication network structure.
160. In airline reservation system the entities are date, flight number, place of departure,
destination, type of plane and seats available. The primary key is____________
1. flight number.
2. flight number + place of departure.
3. flight number + date.
4. flight number + destination.
161. What does the /command do?
1. Does nothing.
2. Prints the character.
3. Re-executes the non SQL *Plus command that was most recently executed.
4. Re-executes the most recently executed command.
162. What command should you try if DBMS_OUTPUT.PUT_LINE is not doing what it
is supposed to do?
1. SET ECHO ON.
2. SET TERMOUT ON.
3. SET DISPLAY ON.
4. SET SERVEROUTPUT ON.
163. To change the format of the date returned by SYSDATE, use the command_______
1. ALTER SESSION RESET DATE.
2. ALTER SESSION CHANGE DATE.
3. ALTER SESSION SET SYSDATE.
4. ALTER SESSION SET NLS_DATE_FORMAT.
3. Strings.
4. Variables.
180. In SQL, 10/NULL will evaluate to___________
1. FALSE.
2. -1.
3. NULL.
4. 10.
181. Almost all the DATE functions return a value of data type DATE, except_________
1. MONTHS_BETWEEN.
2. ROUND.
3. NEXT_DAY.
4. TRUNC.
182. The SQL statement
SELECT TRUNC(45.926, -1) FROM DUAL;
1. is illegal.
2. 5.
3. prints 45.9.
4. prints 40.
183. The SELECT statement
SELECT ‘Hi’ FROM DUAL WHERE NULL = NULL;
Outputs
1. Hi.
2. FALSE.
3. TRUE.
4. nothing.
184. When a SELECT statement displays data_____________
1. dates and strings will be justified to the left by default.
2. numbers will not be justified to the right by default.
3. dates and strings will be justified to the right by default.
4. numbers will be justified to the left by default.
3. PRINTS NULL.
4. is illegal.
190. The SQL statement
SELECT ‘Hi’ FROM DUAL WHERE 1!= NULL;
Outputs
1. Hi.
2. FALSE.
3. TRUE.
4. nothing.
191. Which of the following SQL commands can be used to add data to a database table?
1. ADD.
2. UPDATE.
3. APPEND.
4. INSERT.
192. The SQL statement
SELECT DECODE(2,2, DECODE(3,3,2)) FROM DUAL;
1. is illegal.
2. prints garbage.
3. 3.
4. 2.
193. The SQL statement
SELECT SUBSTR(‘abcdefghij’, INSTR(‘123321234’, ‘2’,3,2),2) FROM DUAL;
Prints
1. gh.
2. 23.
3. bc.
4. ab.
194. The SQL statement
SELECT LPAD(‘abcd’,10,’went’) FROM DUAL;
Prints
1. wertweabed.
2. abcdwertwer.
3. wertwertab.
4. abwertwert.
195. The SQL statement
SELECT ROUND(45.926,-2) FROM DUAL;
1. is illigel.
2. prints garbage.
3. prints 45.92.
4. prints 0.
196. Table Employee has 10 records. It has a non-NULL SALARY column which is also
UNIQUE.
The SQL statement
SELECT COUNT(SALARY) FROM EMPLOYEE WHERE SALARY NOT IN
(NULL);
Prints,
1. 10.
2. 9.
3. 5.
4. 0.
197. Which of the following SQL command can be used to modify existing data in a
database table?
1. MODIFY.
2. UPDATE.
3. CHANGE.
4. NEW.
198. The SQL statement
SELECT ‘Hi’ FROM DUAL WHERE NULL IN (NULL);
Outputs,
1. TRUE.
2. FALSE.
3. ‘Hi’.
4. nothing.
199. The design of PL/SQL language has a lot of similarities with the design of
1. COBOL.
2. ORACLE.
3. ADA.
4. LISP.
200. Which of the following can be used to print the description about an error in a
PL/SQL program?
1. SQLERRM.
2. ERR_MESG.
3. CURR_ERROR.
4. DISP_ERR.
201. Which of the following types of triggers can be fired on DDL operations?
1. Instead-Of Trigger.
2. DML Trigger.
3. system Trigger.
4. DDL trigger.
202. To have a variable in global scope, declare it inside a __________
1. function.
2. procedure.
3. package.
4. methods.
203. Which of the following keywords is used in the declaration of a PL/SQL function
but not a procedure?
1. RETURN.
2. BEGIN.
3. END.
4. EXCEPTION.
204. Which of the following list items is a good choice to implement lists that are long?
1. Combo Box.
2. Poplist.
3. Tlist.
4. Llist.
205. A compiled form module has the extension_______
1. fmb.
2. fmx.
3. exe.
4. obj.
206. The attributes of a Form object can be found in the___________
1. layout editor.
2. program editor.
3. property navigator.
4. property palette.
207. A canvas is displayed in ___________
1. an enclosing canvas.
2. a tabbed page.
3. a dialog box.
4. a window.
208. Trigger code is written in_____
1. SQL.
2. PL/SQL.
3. JAVA.
4. Machine language.
209. The items of a data block can be grouped within a___________
1. record group.
2. program unit.
3. frame.
4. data store.
1. record.
2. field.
3. file.
4. Data.
1. data item.
2. Data type.
3. value.
4. variable.
1. File.
2. Database.
3. Transaction.
4. Fields.
1. transaction data.
2. computer data.
3. master data.
4. electronic data.
1. concurrency.
2. transaction control.
3. locking.
4. two phase locking.
234. _______________ employs parent-child relationships as well as child parent
relationships.
1. hierarchical databases.
2. network databases.
3. relation databases.
4. databases.
235. Relational databases relate data items purely based on their _________.
1. key.
2. values.
3. constraints.
4. concurrency.
236. The file in DBMS is called as _________ in RDBMS.
1. console.
2. schema.
3. table.
4. objects.
237. ______________ is used for creating and destroying tables, indexes and other forms
of structures.
1. data manipulation language.
2. data control language.
3. transaction control language.
4. data definition language.
238. _______________ controls the access to various tables, indexes and other structures.
1. data control language.
2. locking.
3. two phase locking.
4. transaction control language.
239. ___________ can be used to retrieve data from multiple tables.
1. embedded SQL.
2. dynamic SQL.
3. joins.
4. views.
240. _____________ programming facilitates the use of SQL with 3GLs such as C and
COBOL.
1. dynamic SQL.
2. joins.
3. embedded SQL.
4. PL/SQL.
241. ___________ provides option for entering SQL queries at execution time, rather
than at the development stage.
1. Pl/SQL
2. SQL * Plus.
3. SQL.
4. dynamic SQL.
242. _____________ of a database presents the view that the end users have.
1. conceptual view.
2. external view.
3. internal view.
4. non conceptual view.
243. Internal view provides information regarding the _______________.
1. database.
2. organization of the database.
3. data without technology.
4. data with integrity.
244. ______________ describes the data without stress on any technology or
programming language.
1. external view.
2. internal view.
3. conceptual view.
4. view.
245. A__________ is a three dimensional view of data.
1. form.
2. database.
3. table.
4. query.
246. A __________ is a set of operations that must be performed completely or not at all.
1. query.
2. command.
3. data sharing.
4. transaction.
247. Commit and rollback are related to ______________.
1. data integrity.
2. data consistency.
3. data sharing.
4. data security.
248. Data is processed using _____________.
1. data definition language.
2. data manipulation language.
3. data control language.
4. transaction control language.
249. When SQL statements are embedded inside 3GL, we call such a program as
________________.
1. nested query.
2. nested programming.
3. distinct query.
4. embedded SQL.
250. ___________ translates the SQL statements inside a 3GL programs into appropriate
3GL statements.
1. compiler.
2. linker.
3. loader.
4. pre-compiler.