SQL questions Question 5 1. A user view in which the WHERE line of the SELECT st
ID: 3731066 • Letter: S
Question
SQL questions
Question 5
1. A user view in which the WHERE line of the SELECT statement used to create the view contains some predicate is called
A.
value-dependent
B.
static
C.
value-independent
D.
dynamic
0.5 points
Question 6
1. Which of the following records are normally kept in a security log?
A.
all access to the database
B.
only successful security violations
C.
all attempted security violations
D.
all updates to the database
Question 8
1. A database driver is software that lets the
a.
data access model communicate with the application program
b.
application program communicate with the data access model
c.
application program communicate with the database
d.
data access model communicate with the database
Question 20
1. The statement SELECT * FROM T1, T2 produces a(n) ____ join.
a.
full
b.
cross
c.
natural
d.
equi-
Question 23
1. The Oracle isolation level that guarantees transaction-level consistency for all transactions is
A.
write only
B.
read committed
C.
serializable
D.
read only
0.5 points
Question 27
1.
You have created the update_emp package in your database and want to access the procedures and functions
present inside the package.
Which statement correctly describes the characteristics of a package?
a.
A package specification cannot exist without a package body.
b.
A package body cannot exist without a package specification.
c.
A package body and package specification are stored together.
d.
A package body and package specification must be declared together.
Question 35
1. All of the following signal an end of an Oracle transaction EXCEPT
A.
a DDL command
B.
a ROLLBACK statement
C.
a SAVEPOINT
D.
a COMMIT statement
A.
value-dependent
B.
static
C.
value-independent
D.
dynamic
Explanation / Answer
Ans:
5) (A)
Records depends Value of where clause
6) (C)
Events Recorded by the Security Log
The Security log records the following information or events:
8) (C)
A JDBC driver is a software component enabling a Java application to interact with a database.
20)(B)
23)(D)
In addition to the four defined SQL isolation levels, Oracle Database provides another level: READ ONLY . A READ ONLY transaction is equivalent to a REPEATABLE READ or SERIALIZABLE transaction that cannot perform any modifications in SQL. A transaction using a READ ONLY isolation level sees only those changes that were committed at the time the transaction began . Inserts, updates, and deletes aren't permitted in this mode (other sessions may update data, but not the READ ONLY transaction). Using this mode, you can achieve REPEATABLE READ and SERIALIZABLE levels of isolation
27)(C)
It records invalid user authentication attempts and the alarms/alerts generated due to the invalid authentication attempts - EIUA
It records any unauthorized attempt to initiate any process and to access resources, data, and transactions. - EURA
It records the details of the changes made in a user's security profiles and attributes. - EUSP
It records the details of changes made in security profiles and attributes associated with a channel or port. - ECSP
It records the details of changes made in access rights associated with resources (i.e., privileges required of a user and a channel/port to access a resource) - ERSP
It records the details of changes made in the NE/NS security configuration - ESCC
It records creation and modification of NE/NS resources performed via standard operations and maintenance procedures. (This does not address creations and modifications carried offline.) - ECM
A package will have two mandatory parts
35)(D) Commit
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.