31-60

4) When using the SELECT statement in PL/SQL, the INTO clause is required and queries can return one or more row.
True
False
There are three types of loops: Basic, FOR, and WHILE
True
False
7) Implicit cursors are declared by PL/SQL implicitly for all DML and PL/SQL SELECT statements. The Oracle server implicitly opens a cursor to process each SQL statement that is not associated with an explicitly declared cursor.
True
False
What kind of attribute needs to be written in the statement below instead of XXXXXXXX? OPEN c_emp_cursor; LOOP FETCH c_emp_cursor INTO v_empno, v_lname; EXIT WHEN c_emp_cursor%XXXXXXXX; DBMS_OUTPUT.PUT_LINE( v_empno ||' '||v_lname); END LOOP;
%ROWCOUNT
%ROWTYPE
%FOUND
%NOTFOUND
64) What command prints out value of variable?
Dbms_output.put_line()
Set serveroutput on
Dbms_out.put_line()
Dbms_output_line()
65) Which type of an exception below does not exist?
NO_DATA_FOUND
TOO_MANY_ROWS
INVALID_CURSOR
D)NO_CURSOR_FOUND
73) What keyword shows the section of program which traps use-defined exceptions?
EXCEPTION
PRAGMA EXCEPTION_INIT
SQLERRM
RAISE
74) What type of function is used to associate the declared exception with the standard Oracle server error number?
EXCEPTION
PRAGMA EXCEPTION_INIT
SQLERRM
RAISE
76) Which of the following is NOT an iteration statement supported by PL/SQL:
The FOR LOOP statement.
The LOOP UNTIL statement.
The WHILE LOOP statement.
None of the above.
77) The common SQL*Plus command which enables the results of PL/SQL statements to be displayed is:
SHOW ERRORS.
DESCRIBE.
SPOOL.
SET SERVEROUTPUT ON.
78) In a stored procedure, when specifying a string parameter you should use which of these data types:
CHAR
VARCHAR2
TEXT
REAL
79) The INTO clause of the SELECT statement:
Can be used only when the SELECT statement returns at most one row.
Does not generate an exception if no rows are returned.
Is not a valid clause in PL/SQL.
None of the above.
80) For more complex procedures and functions involving iteration through multiple rows,
PL/SQL supports:
Explicit cursors.
Implicit cursors.
Dynamic cursors.
All of the above
81) Which of the following is not a common cursor attribute?
%IsOpen.
%IsNotOpen.
%Found.
%NotFound
82) The effect of the ROLLBACK command in a transaction is the following:
Undo all changes to the database resulting from the execution of the transaction
Undo the effects of the last UPDATE command
Restore the content of the database to its state at the end of the previous day
Make sure that all changes to the database are in effect
83) Which of the following is a transaction?
A group of SQL statements consisting of one read and one write operation
A group of SQL statements consisting only of read operations
A group of SQL statements defining a user-oriented task
A group of SQL statements consisting only of write operations
84) What are the characteristics of an anonymous block?
Has an unique name
Stored in the database
Compiled each time the application is executed
Can be declared as procedures or as functions
85. Which sections of a PL/SQL block are optional?
Declaration and Exception
Exception only
Executable only
Which statements is mandatory in a PL/SQL block?
DECLARE
BEGIN
EXCEPTION
Which lines of code will correctly display the message "Hello World"?
DBMS_OUTPUT('Hello World')
DBMS_OUT.PUT_LINE('Hello World');
DBMS_OUTPUT.PUT_LINE('Hello ' || 'World');
DBMS_OUTPUT.PUT_LINE('Hello' || ' ' || 'World');
 
2) If you must use dynamic SQL, avoid using input concatenation to build the dynamic SQL.
True
False
3) By default, a stored procedure executes with the privileges of its owner (definer’s rights).
True
False
4) Code that is most vulnerable to SQL Injection attack contains:
Input parameters
Dynamic SQL with bind arguments
Dynamic SQL with concatenated input values
Calls to external functions
5) Application context for a user is fixed and does not change with change of session.
True
False
7) Which of the following statements is not true about fine-grained access control?
Fine-grained access control enables you to enforce security through a low level of granularity.
Fine-grained access control restricts users to viewing only “their” information.
Fine-grained access control is implemented through a security policy attached to tables.
To implement fine-grained access control, hard code the security policy into the user code.
 
Call specifications does not:
Link the server to the external file and execute the external procedure
Dispatch the appropriate C or Java target procedure
Perform data type conversions
Perform parameter mode mappings
Perform automatic memory allocation and cleanup
Call Java methods or C procedures from database triggers
Use static SQL to avoid SQL injection when all Oracle identifiers are known at the time of code execution.
True
False
Statistical Code analysis provides an efficient technique to trace application vulnerability by using ideal and expected parameter values.
True
False
Fuzz tool technique is a harsh and rigorous format of testing which uses raw inputs and checks a program's sanctity.
True
False
Identify the nature of a table name in the following SELECT statement SELECT TOTAL FROM "ORDERS" WHERE ORD_ID = P_ORDID
Unquoted identifier
Quoted identifier
Literal
Placeholder
{"name":"31-60", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"4) When using the SELECT statement in PL\/SQL, the INTO clause is required and queries can return one or more row., There are three types of loops: Basic, FOR, and WHILE, 7) Implicit cursors are declared by PL\/SQL implicitly for all DML and PL\/SQL SELECT statements. The Oracle server implicitly opens a cursor to process each SQL statement that is not associated with an explicitly declared cursor.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker