This action might not be possible to undo. Are you sure you want to continue?
Presence of statistics in the data dictionary for atleast one of the tables accessed by the SQL statements is necessary for the OPTIMIZER to use COST-based approach. Otherwise OPTIMIZER chooses RULE-based approach. 102. What is the effect of setting the value of OPTIMIZER_MODE to 'RULE' ? This value causes the optimizer to choose the rule_based approach for all SQL statements issued to the instance regardless of the presence of statistics. 103. What are the values that can be specified for OPTIMIZER_GOAL parameter of the ALTER SESSION Command ? CHOOSE,ALL_ROWS,FIRST_ROWS and RULE. 104. What is the effect of setting the value "CHOOSE" for OPTIMIZER_GOAL, parameter of the ALTER SESSION Command ? The Optimizer chooses Cost_based approach and optimizes with the goal of best throughput if statistics for atleast one of the tables accessed by the SQL statement exist in the data dictionary. Otherwise the OPTIMIZER chooses RULE_based approach. 105. What is the effect of setting the value "ALL_ROWS" for OPTIMIZER_GOAL parameter of the ALTER SESSION command ? This value causes the optimizer to the cost-based approach for all SQL statements in the session regardless of the presence of statistics and to optimize with a goal of best throughput. 106. What is the effect of setting the value 'FIRST_ROWS' for OPTIMIZER_GOAL parameter of the ALTER SESSION command ? This value causes the optimizer to use the cost-based approach for all SQL statements in the session regardless of the presence of statistics and to optimize with a goal of best response time. 107. What is the effect of setting the 'RULE' for OPTIMIER_GOAL parameter of the ALTER SESSION Command ? This value causes the optimizer to choose the rule-based approach for all SQL statements in a session regardless of the presence of statistics. 108. What is RULE-based approach to optimization ? Choosing an executing planbased on the access paths available and the ranks of these access paths. 109. What is COST-based approach to optimization ? Considering available access paths and determining the most efficient execution plan based on statistics in the data dictionary for the tables accessed by the statement and their associated clusters and indexes. PROGRAMMATIC CONSTRUCTS 110. What are the different types of PL/SQL program units that can be defined and stored in ORACLE database ? Procedures and Functions,Packages and Database Triggers. 111. What is a Procedure ? A Procedure consist of a set of SQL and PL/SQL statements that are grouped together as a unit to solve a specific problem or perform a set of related tasks. 112. What is difference between Procedures and Functions ? A Function returns a value to the caller where as a Procedure does not. 113. What is a Package ?
What are Roles ? Roles are named groups of related privileges that are granted to users or other roles. A constraint applies to existing data in the table and any statement that manipulates the table. therefore. DYNAMIC PRIVILEGE MANAGEMENT . The security domains of all users granted the group's role automatically reflect the changes made to the role. How to prevent unauthorized use of privileges granted to a Role ? By creating a Role with a password.global package variables can be declared and used by any proecdure in the package) and performance (for example all objects of the package are parsed compiled. APPLICATION AWARENESS . What are the differences between Database Trigger and Integrity constraints ? A declarative integrity constraint is a statement about the database that is always true. audit data modifications. and customize complex security authorizations. only the privileges of the role need to be modified. 114. What is Tablespace Quota ? The collective amount of disk space available to the objects in a schema on a particular . What are the use of Roles ? REDUCED GRANTING OF PRIVILEGES . A trigger does not apply to data loaded before the definition of the trigger. This allows specific control of a user's privileges in any given situation. 120. it does not guarantee all data in a table conforms to the rules established by an associated trigger. 117. 122.A database application can be designed to automatically enable and disable selective roles when a user attempts to use the application. What are the uses of Database Trigger ? Database triggers can be used to automatic data generation. What is Database Trigger ? A Database Trigger is procedure (set of SQL and PL/SQL statements) that is automatically executed as a result of an insert in. or delete from a table. 116. A trigger can be used to enforce transitional constraints where as a declarative integrity constraint cannot be used.The roles granted to a user can be selectively enable (available for use) or disabled (not available for use). What is default tablespace ? The Tablespace to contain schema objects created without specifying a tablespace name.When the privileges of a group must change. enforce complex Integrity constraints. functions. SELECTIVE AVAILABILITY OF PRIVILEGES . and loaded into memory once) 115. DATABASE SECURITY 118. 121. 119.update to. variables and other package constructs together as a unit in the database.Rather than explicitly granting the same set of privileges to many users a database administrator can grant the privileges for a group of related users granted to a role and then grant only the role to each member of the group. What are the advantages of having a Package ? Increased functionality (for example.A Package is a collection of related procedures.
125. Privilege Auditing and Object Auditing. What are the different Levels of Auditing ? Statement Auditing. What is Auditing ? Monitoring of user access to aid in the investigation of database use. 126. the coordinator asks all nodes to roll back the transaction. It has two phase. What is the mechanism provided by ORACLE for table replication ? Snapshots and SNAPSHOT LOGs 134.Phase . What is a SNAPSHOT ? Snapshots are read-only copies of a master table located on a remote node which is periodically refreshed to reflect changes made to the master table. 129. 127. 132. 135. 131. DISTRIBUTED PROCESSING AND DISTRIBUTED DATABASES 130. What is a profile ? Each database user is assigned a Profile that specifies limitations on various system resources available to the user. Describe two phases of Two-phase commit ? Prepare phase . What is Statement Auditing ? Statement auditing is the auditing of the powerful system privileges without regard to specifically named objects. What are the system resources that can be controlled through Profile ? The number of concurrent sessions the user can establish the CPU processing time available to the user's session the CPU processing time available to a single call to ORACLE made by a SQL statement the amount of logical I/O available to the user's session the amout of logical I/O available to a single call to ORACLE made by a SQL statement the allowed amount of idle time for the user's session the allowed amount of connect time for the user's session. What is Two-Phase Commit ? Two-phase commit is mechanism that guarantees a distributed transaction either commits on all involved nodes or rolls back on all involved nodes to maintain data consistency across the global distributed database. if all participants cannot prepare. What is Object Auditing ? Object auditing is the auditing of accesses to specific schema objects without regard to user. even if there is a failure) Commit .If all participants respond to the coordinator that they are prepared. What is Privilege Auditing ? Privilege auditing is the auditing of the use of powerful system privileges without regard to specifically named objects. The data of all databases in the distributed database can be simultaneously accessed and modified. 133. a Prepare Phase and a Commit Phase.tablespace.The global coordinator (initiating node) ask a participants to prepare (to promise to commit or rollback the transaction. the coordinator asks all nodes to commit the transaction. What is a SNAPSHOT LOG ? . 123. 124. 128. What is Distributed database ? A distributed database is a network of databases managed by multiple database servers that appears to a user as single logical database.
140.WhatisOn-lineRedoLog? The On-line Redo Log is a set of tow or more on-line redo files that record all committed changes made to the database. 148. 145. changes made to one member of the group are made to all members. 138. What are the steps involved in Database Startup ? Start an instance. the corresponding redo entries temporarily stores in redo log buffers of the SGA are written to an on-line redo log file by the background process LGWR. 141. Whenever a transaction is committed. What are the different modes of mounting a Database with the Parallel Server ? Exclusive Mode If the first instance that mounts a database does so in exclusive mode. Online database backup is possible only in ARCHIVELOG mode. Dismount the Database and Shutdown the Instance. The on-line redo log files are used in cyclical fashion. Can Full Backup be performed when the database is open ? No. on-line redo log files and control file that constitute ORACLE database and the parameter. 143. 144.A snapshot log is a table in the master database that is associated with the master table. What are the steps involved in Database Shutdown ? Close the Database. BACKUP AND RECOVERY 137. What is Archived Redo Log ? Archived Redo Log consists of Redo Log files that have archived before being reused. What are the advantages of operating a database in ARCHIVELOG mode over operating it in NO ARCHIVELOG mode ? Complete database recovery from disk failure is possible only in ARCHIVELOG mode. DATABASE OPERATION. Parallel Mode If the first instance that mounts a database is started in parallel mode. Snapshot logs are used in updating the snapshots based on the master table. 146. ORACLE uses a snapshot log to track the rows that have been updated in the master table. It is used in Clint-Server and Server-Server communications. What is Partial Backup ? A Partial Backup is any operating system backup short of a full backup. What is Mirrored on-line Redo Log ? A mirrored on-line redo log consists of copies of on-line redo log files physically located on separate disks. What is Restricted Mode of Instance Startup ? An instance can be started in (or later altered to be in) restricted mode so that when the database is open connections are limited only to those whose user accounts have been granted the RESTRICTED SESSION system privilege. only that Instance can mount the database. What is a SQL * NET? SQL *NET is ORACLE's mechanism for interfacing with the communication protocols used by the networks that facilitate distributed processing and distributed databases. 147. taken while the database is open or shut down. What is Log Switch ? The point at which ORACLE ends writing to one online redo log file and begins writing . 142. other instances that are started in parallel mode can also mount the database. What is Full Backup ? A full backup is an operating system backup of all data files. 139. Mount the Database and Open the Database. 136.
What are the steps involved in Instance Recovery ? R_olling forward to recover data that has not been recorded in data files. 149. yet has been recorded in the on-line redo log. including the contents of rollback segments. Releasing any resources (locks) . Rolling back transactions that have been explicitly rolled back or have not been committed as indicated by the rollback segments regenerated in step a.to another is called a log switch.
This action might not be possible to undo. Are you sure you want to continue?