Up-to-date IBM 1Z0-146 Study Guide With New IBM 1Z0-146 Practice Test Valid Tips For 100% Pass Exam 1Z0-146: valid4sure now is providing the best 1Z0-146 practice test for your 1Z0-146 certification exam. We offer the latest 1Z0-146 exam questions to ensure that you can 100 percent pass 1Z0-146 exam, and what’s more, we will offer you the new updated 1Z0-146 exam dumps for one year free and free new version VCE Player. Welcome to visit our site — valid4sure.com and get the valid 1Z0-146 exam dumps to pass exam as soon as possible. keywords: 1Z0-146,1Z0-146 exam,1Z0-146 exam dumps,1Z0-146 exam questions,1Z0-146 pdf dumps,1Z0-146 vce dumps,1Z0-146 braindump, Advanced PL/SQL certification exam. QUESTION NO: 12 Which two statements are true about associative arrays and varrays? (Choose two.) A. Only varrays must start with the subscript 1. B. Only varrays can be used as column types in database tables. C. Both associative arrays and varrays must start with the subscript 1. D. Both associative arrays and varrays can be used as column types in database tables. Answer: A, B QUESTION NO: 13 Examine the commands: CREATE TYPE typ_course_tab IS VARRAY(5) OF VARCHAR2(20) / CREATE TYPE typ_course_nst AS TABLE OF typ_course_tab / CREATE TABLE faculty (faculty_id NUMBER(5), faculty_name VARCHAR2(30), courses typ_course_nst) NESTED TABLE courses STORE AS course_stor_tab / INSERT INTO faculty VALUES (101, 'Jones', NULL); UPDATE (SELECT courses FROM faculty WHERE faculty_id=101) SET courses = typ_course_nst(11,'Oracle'); Which statement is true about the execution of these commands? A. All the commands execute successfully. B. Only the first two commands execute successfully. C. Only the first four commands execute successfully. D. Only the first three commands execute successfully. Answer: C QUESTION NO: 14 Examine the structure of the EMPLOYEES table in the SCOTT schema. Name Null? Type ----------------------- --------------- --------------- EMPLOYEE_ID NOT NULL NUMBER(6) FIRST_NAME VARCHAR2(20) LAST_NAME NOT NULL VARCHAR2(25) SALARY NOT NULL NUMBER(8,2) COMMISSION_PCT NUMBER(2,2) DEPARTMENT_ID NUMBER(4) View the Exhibit and examine the code for the EMP_TOTSAL procedure created by user SCOTT. Which statement is true regarding the EMP_TOTSAL procedure? A. It is created successfully, but displays the correct output message only for existent employee IDs. B. It is created successfully and displays the correct output message for both existent and nonexistent employee IDs. C. It generates an error because the %NOTFOUND attribute cannot be used in combination with a SELECT INTO statement. D. It generates an error because a user-defined exception has to be included whenever the %NOTFOUND attribute is used in combination with a SELECT INTO statement. Answer: A QUESTION NO: 15 Examine the code in the following PL/SQL block: DECLARE TYPE NumList IS TABLE OF INTEGER; List1 NumList := NumList(11,22,33,44); BEGIN List1.DELETE(2); DBMS_OUTPUT.PUT_LINE ( 'The last element# in List1 is ' || List1.LAST || ' and total of elements is '||List1.COUNT); List1.EXTEND(4,3); END; / Which two statements are true about the above code? (Choose two.) A. LAST and COUNT give different values. B. LAST and COUNT give the same values. C. The four new elements that are added contain the value 33. D. The four new elements that are added contain the value 44. Answer: A, C QUESTION NO: 16 Which two types of query results cannot be stored in the query result cache? (Choose two.) A. subquery results B. results of a query having the SYSDATE function C. results of a query having the GROUP BY clause D. results of a query having the DATE data type in the WHERE clause Answer: A, B QUESTION NO: 17 Which two statements are true about the working of fine-grained access? (Choose two.) A. Security policies can be associated only with tables, but not with views. B. Different policies can be used for SELECT, INSERT, UPDATE, and DELETE statements. C. User statements are dynamically modified by the Oracle server through a security policy function. D. Fine-grained access control policies always remain in effect until they are dropped from a table or view. Answer: B, C QUESTION NO: 18 View the Exhibit. How do you reduce the chances of SQL injection for the procedure? A. Execute the SQL statement in V_STMT as dynamic SQL. B. Remove the default value for the arguments in the procedure. C. Convert the condition in the WHERE clause to be accepted from the user and concatenated. D. Convert the SELECT statement to static SQL, placing the value of P_EMAIL into a local variable. Answer: D QUESTION NO: 19 The database instance was started up using the automatic memory management feature. No value was set for the RESULT_CACHE_MAX_SIZE parameter. Examine the following initialization parameter settings for your database: MEMORY_TARGET = 500M RESULT_CACHE_MODE = MANUAL You execute a query by using the result_cache hint. Which statement is true in this scenario? A. The query results are not stored because no memory is allocated for the result cache. B. The query results are stored and 0.5% of the memory target is allocated to the result cache. C. The query results are stored and 0.25% of the memory target is allocated to the result cache. D. The query results are not stored because the RESULT_CACHE_MODE parameter is not set to FORCE. Answer: C QUESTION NO: 20 Examine the structure of the LOB_STORE table. Name Null? Type ---------------- -------- ------------ LOB_ID NUMBER VIDEO_CLIP BLOB You create a 'DATA_FILES' directory object that contains the 'IMAGE1.GIF'operating system (OS) file. View the Exhibit and examine the LOAD_LOB procedure code that you execute for reading data from the OS file into the BLOB column. It is created with compilation errors. What is the reason? A. V_BLOB should be initialized to EMPTY_BLOB(). B. The WRITE routine of DBMS_LOB should be used instead of LOADFROMFILE. C. The return type of DBMS_LOB.FILEEXISTS is not compatible with the IF statement. D. OPEN, CLOSE, and READONLY routines of DBMS_LOB should be used instead of FILEOPEN, FILECLOSE, and FILE_READONLY. Answer: C QUESTION NO: 21 Identify two strategies against SQL injection. (Choose two.) A. Using parameterized queries with bind arguments. B. Use subprograms that are run with the definer's right. C. Use RESTRICT_REFERENCE clauses in functions that use dynamic SQLs. D. Validate user inputs to functions that use dynamic SQLs built with concatenated values. Answer: A, D QUESTION NO: 22 There is a Java class file in your system and you publish it using the following command: CREATE OR REPLACE PROCEDURE ccformat (x IN OUT VARCHAR2) AS LANGUAGE JAVA NAME 'FormatCreditCardNo.formatCard(java.lang.String[])'; However, you receive the following error when executing the CCFORMAT procedure: ERROR at line 1: ORA-29540: class FormatCreditCardNo does not exist ORA-06512: at "SH.CCFORMAT", line 1 ORA-06512: at line 1 What would you do to execute the procedure successfully? A. Change the listener configuration. B. Create a directory object and link it to the Java class file. C. Rebuild the Java class file when the database instance is running. D. Use the loadjava utility to load the Java class file into the database. Answer: D QUESTION NO: 23 Which two reports can be retrieved by using the various procedures in the DBMS_METADATA PL/SQL package? (Choose two.) A. DDL report for all objects dependent on a table B. DDL report for all the objects stored in a tablespace C. DDL report for all the invalidated objects in a schema D. data definition language (DDL) report for all the tables in a schema Answer: A, D
0 Comments
Leave a Reply. |