1. ORACLE 9i
UNIT-1
The syntax used to create a user with the name "John" with a password "john123@" is:
a. CREATE USER John
b. CREATE USER JOHN BY john123@
c. CREATE USER John IDENTIFIED BY john123@
d. CREATE USER John, john123@
Q-2
2. 1. a
2. b
3. c
4. d
Q-3 SQL does not provide the programming techniques of conditional checking
a. TRUE
b. FALSE
Q-4 The ______ attribute is used to declare variables based on definitions of columns in a table.
a. %TYPE
b. %ATTRIBUTE
c. %ROWSET
d. %NOTFOUND
UNIT-3
The ______ offers a comprehensive set of middle-tier services.
a. Client Applications
b. Server Applications
c. Business logic
d. Application Server
Q-3 The ________ provides programmatic accesses, centralized management, and multi-channel delivery of internet
services.
a. Business Intelligence Capabilities
b. Recovery
c. Open Framework
d. Integrated Manageability
3. UNIT-4
A ________ stores information about the physical structure of a database, name of the database, and locations of the
database.
a. Record
b. Table
c. Column
d. Schema
Incorrect
Q-3 A ________reliably manages a large amount of data in a multiuser environment so that many users can concurrently
access the same data.
a. Server
b. Database
c. Client
d. User
Q-4 The _________ structures are those that can be seen and operated on from the operating system, such as the physical
files that store data on a disk. The ______ structures are created and recognized by Oracle Database and are not known to
the operating system.
a. Logical, Physical
b. Physical, Logical
c. Database, Schema
d. Logical, Database
Q-5 The ___________ objects are the logical structures that directly refer to the database's data which include structures
like tables, views, and indexes.
a. Database
b. Server
c. Schema
d. Software
4. UNIT-5
A _______ is a network of databases managed by multiple database servers used together.
a. Centralized Databases
b. Distributed Databases
c. Local Databases
d. Physical Databases
UNIT-6
1. Decomposes the distributed calculus query into an algebraic query on global relations. 2. The information needed for this
transformation is found in the global conceptual schema describing the global relations. 3. The information about data
distribution is not used here but in the next layer. 4. The techniques used by this layer are those of a centralized DBMS. The
above statements are the properties of ______________
a. Data Localization
b. Global Query Optimization
c. Query Decomposition
d. Local Query Optimization
Q-2 Designing the _______ database maps the conceptual schema to the storage areas and determines the appropriate
access methods.
a. Physical
b. Logical
c. Symmetric
d. Distributed
UNIT-7
A ______ transaction is a transaction that includes one or more statement that, individually or as a group, _____ data on
two or more distinct nodes of a distributed database.
a. update, delete
b. distributed, delete
c. distributed, update
5. d. update, delete
Incorrect
Q-3 If there is no provision for the local site to function as a ______DBMS, then the system has no local autonomy.
a. stand-alone
b. Functional
c. relational
d. Non - relational
Q-4 The statements in a _____ transaction can reference any number of local or remote tables. The _____ RDBMS
guarantees that all nodes involved in a distributed transaction take the same action: they either all commit or all roll back
the transaction.
a. single, MS- Access
b. single, Oracle
c. multiple, SQL Server
d. Concurrent, MySQL
Q-5 The _________ automates the process of updating Heterogeneous Services configuration data on remote hosts,
ensuring correct operation over heterogeneous database links.
a. Multi-Threaded Agents
b. Pass-through SQL
c. Agent Self-Registration
d. Data Dictionary translations
UNIT-8
Match the following:
Client A node that references information in a database belonging to a different node.
Database A node that receives a request for information from another node.
Server
Local A node that is forced to reference data on other nodes to complete its part of the transaction.
Coordinator
Global The node that originates the distributed transaction.
Coordinator
6. Q-2 A _____ is a part of the application. One application issues a begin_transaction primitive; from this point onwards, all
actions which are performed by the application, until a commit or _____ primitive is issued are to be considered as one
compete transaction.
a. transaction; abort
b. function; lock
c. query; abort
d. function; abort
Q-3 In the ____ phase, the initiating node in the transaction asks the other participating nodes to promise to commit or roll
back the transaction. During the ____ phase, the initiating node asks all participating nodes to commit the transaction. If
this outcome is not possible, then all nodes are asked to roll back.
a. commit; abort
b. initiate; abort
c. prepare; commit
d. commit; abort
Q-4 With respect to site failures, an algorithm is said to be ____ if it works properly even if K sites are down.
a. resilient
b. non- resilient
c. 1- resilient
d. K - resilient
Q-5 ________ requires that if a transaction is interrupted by a failure its partial results are not at all taken into consideration
and the whole operation has to be repeated.
a. Atomicity
b. Durability
c. Consistency
d. Isolation
UNIT-9
Q-2 In "Write-locks-all, read-locks-one" locking scheme, ____ locks are acquired on all copies, while ________ locks are
acquired only an arbitrary copy.
7. a. exclusive, shared
b. shared, exclusive
c. shared, shared
d. exclusive, exclusive
Q-3 In Distributed transaction concurrency control, the ______________can lock and unlock local data items.
a. External Agents
b. Legal Agents
c. Local Agents
d. Non-local agents
Q-4 In ________ mode of Transaction locking, mode________ the transaction wants only to read the data item
a. Shared
b. Exclusive
c. Shared and Exclusive
d. Isolated
Q-5 The existence of the deadlock situation corresponds to the existence of a ______ in the wait-for graph. Therefore a
system can discover deadlocks by _______ wait-for graph and analyzing whether there are cycles in it.
a. flow, cycle
b. cycle, constructing
c. constructing, cycle
d. constructing, constructing
8. UNIT-10
1
Marks: 1/1
Match the following RAID Levels with their concepts.
RAID level 2
Know n as memory-style error correcting-code (ECC) organization, employs parity bits
RAID level 3
Has bit-interleaved parity organization
RAID level 4
Has block-interleaved parity organization
RAID level 5
Has block-interleaved distributed parity
Q-2
A fundamental requirement for any type of system is its ____.
a. Scalability
b. Portability
c. Flexibility
d. Adaptability
Q-3 RMAN can create data files automatically when the user executes _____ or ______ commands.
a. RESET, RESTORE
b. RECEIVE, ROLLBACK
c. RESTORE; RECOVER
d. ROLLBACK, RESTORE
Q-4 The ______ has finite space for records of backup activities, while a ____ can store a much longer history.
9. a. control file, recovery catalog
b. log file, control file
c. control file, log file
d. recovery catalog, log file
Q-5 With the ______ database command, you can quickly revert a database to a previous time--without restoring data files
and performing media recovery.
a. backup
b. run
c. Flashback
d. rollback