1Z0-805: Upgrade to Java SE Programmer Dumps: Real Exam Questions





QUESTION NO: 1
What design pattern does the Drivermanager.getconnection () method characterize?
A. DAO
B. Factory
C. Singleton
D. composition
Answer: B

QUESTION NO: 2
Given the code fragment:
dataFormat df;
Which statement defines a new DataFormat object that displays the default date format for the UK
Locale?
A. df = DateFormat.getDateInstance (DateFormat.DEFAULT, Locale(UK));
B. df = DateFormat.getDateInstance (DateFormat.DEFAULT, UK);
C. df = DateFormat.getDateInstance (DateFormat.DEFAULT, Locale.UK);
D. df = new DateFormat.getDataInstance (DataFormat.DEFAULT, Locale.UK);
E. df = new DateFormat.getDateInstance (DateFormat.DEFAULT, Locale(UK));
Answer: C

QUESTION NO: 3
Given the code fragment:
List<Person> pList = new CopyOnWriteArrayList<Person>();
Which statement is true?
A. Read access to the List should be synchronized.
B. Write access to the List should be synchronized.
C. Person objects retrieved from the List are thread-safe.
D. A Person object retrieved from the List is copied when written to.
E. Multiple threads can safely delete Person objects from the List.
Answer: C

QUESTION NO: 4
Given a resource bundle MessageBundle, what is the name of the default bundle file?
A. MessageBundle.profile
B. MessageBundle.xml
C. MessageBundle.java
D. MessageBundle.properties
Answer: D

QUESTION NO: 5
Which three must be used when using the Java.util.concurrent package to execute a task that
returns a result without blocking?
A. ExecutorService
B. Runnable
C. Future
D. Callable
E. Thread
F. Executor
Answer: A,D,F

QUESTION NO: 6
Which three enum constants are defined in FilevisitResult?
A. CONTINUE
B. SKIP_SIBLINGS
C. FOLLOW_LINKS
D. TERMINATE
E. NOFOLLOW_LINKS
F. DELETE_CHILD
Answer: A,B,D

QUESTION NO: 7
Which is true regarding the java.nio.file.Path Interface?
A. The interface extends WatchService interface
B. Implementations of this interface are immutable.
C. Implementations of this interface are not safe for use by multiple concurrent threads.
D. Paths associated with the default provider are not interoperable with the java.io.File class.
Answer: A

QUESTION NO: 8
The two methods of course rescue that aggregate the features located in multiple classes are
A. Inheritance
B. Copy and Paste
C. Composition
D. Refactoring
E. Virtual Method Invocation
Answer: C,E

QUESTION NO: 9
Which two statements are true?
A. Implementing a DAO often includes the use of factory.
B. To be implemented properly, factories rely on the private keyword.
C. Factories are an example of the OO principle "program to an interface."
D. Using factory prevents your replication from being tightly coupled with a specific Singleton
E. One step in implementing a factory is to add references from all the classes that the factory will
merge.
Answer: A,C

QUESTION NO: 10
The advantage of a CallableStatement over a PreparedStatement is that it:
A. Is easier to construct
B. Supports transactions
C. Runs on the database
D. Uses Java instead of native SQL
Answer: C

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.

1Z0-804: Java SE Programmer II Dumps: Real Exam Questions




QUESTION NO: 1
Which two forms of abstraction can a programmer use in Java?
A. enums
B. interfaces
C. primitives
D. abstract classes
E. concrete classes
F. primitive wrappers
Answer: B,D

QUESTION NO: 2
Which four are true about enums?
A. An enum is typesafe.
B. An enum cannot have public methods or fields.
C. An enum can declare a private constructor.
D. All enums implicitly implement Comparable.
E. An enum can subclass another enum.
F. An enum can implement an interface.
Answer: A,C,D,F

QUESTION NO: 3
Which two compile?
A. interface Compilable {
void compile();
}
B. interface Compilable {
final void compile();
}
C. interface Compilable {
static void compile();
}
D. interface Compilable {
abstract void compile();
}
E. interface Compilable {
protected abstract void compile ();
}
Answer: A,D

QUESTION NO: 4
Which is a key aspect of composition?
A. Using inheritance
B. Method delegation
C. Creating abstract classes
D. Implementing the composite interface
Answer: B

QUESTION NO: 5
Which two properly implement a Singleton pattern?
A. class Singleton {
private static Singleton instance;
private Singleton () {}
public static synchronized Singleton getInstance() {
if (instance == null) {
instance = new Singleton ();
}
return instance;
}
}
B. class Singleton {
private static Singleton instance = new Singleton();
protected Singleton () {}
public static Singleton getInstance () {
return instance;
}
}
C. class Singleton {
Singleton () {}
private static class SingletonHolder {
private static final Singleton INSTANCE = new Singleton ();
}
public static Singleton getInstance () {
return SingletonHolder.INSTANCE;
}
}
D. enum Singleton {
INSTANCE;
}
Answer: A,D

QUESTION NO: 6
Which statement declares a generic class?
A. public class Example < T > { }
B. public class <Example> { }
C. public class Example <> { }
D. public class Example (Generic) { }
E. public class Example (G) { }
F. public class Example { }
Answer: A

QUESTION NO: 7
Which code fragment correctly appends "Java 7" to the end of the file /tmp/msg.txt?
A. FileWriter w = new FileWriter("/tmp/msg.txt");
append("Java 7");
close();
B. FileWriter w = new FileWriter("/tmp/msg.txt", true);
append("Java 7");
close();
C. FileWriter w = new FileWriter("/tmp/msg.txt", FileWriter.MODE_APPEND);
append("Java 7");
close();
D. FileWriter w = new FileWriter("/tmp/msg.txt", Writer.MODE_APPEND);
append("Java 7");
close();
Answer: B

QUESTION NO: 8
An application is waiting for notification of changes to a tmp directory using the following code
statements:
Path dir = Paths.get("tmp")
WatchKey key = dir.register (watcher, ENTRY_CREATE, ENTRY_DELETE, ENTRY_MODIFY) ;
In the tmp directory, the user renames the file testA to testB,
Which statement is true?
A. The events received and the order of events are consistent across all platforms.
B. The events received and the order of events are consistent across all Microsoft Windows
versions.
C. The events received and the order of events are consistent across all UNIX platforms.
D. The events received and the order of events are platform dependent.
Answer: A

QUESTION NO: 9
Which two statements are true about RowSet subinterfaces?
A. A JdbcRowSet object provides a JavaBean view of a result set.
B. A CachedRowSet provides a connected view of the database.
C. A FilteredRowSet object filter can be modified at any time.
D. A WebRowSet returns JSON-formatted data.
Answer: A,C

QUESTION NO: 10
Which two demonstrate the valid usage of the keyword synchronized?
A. interface ThreadSafe {
synchronized void doIt();
}
B. abstract class ThreadSafe {
synchronized abstract void doIt();
}
C. class ThreadSafe {
synchronized static void soIt () {}
}
D. enum ThreadSafe {
ONE, TWO, Three;
synchronized final void doIt () {}
}
Answer: C

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.

1Z0-554: Oracle Application Development Framework Essentials Dumps: Real Exam Questions




QUESTION NO: 1
What type of object is being described here?
“It provides a way to co-ordinate regions on a page. It can be raised or consumed only with a
method binding that must be only data control methods, not managed bean methods.”
A. An action event
B. A method call
C. A task flow call
D. A contextual event
E. A router
F. A data control
Answer: D

QUESTION NO: 2
An application module is named MyAppModule. No Java component is defined for the module
but the application does define a base class that extends oracle.jbo.serverAppiicationModuleimp1.
Which two statements are true in this scenario?
A. Code In the base class will only be implemented if MyAppModuleApp1. java extends the base
class.
B. Any code in the base class will be implemented by MyAppModule.
C. No code in the base class will be implemented because an application-specific Java component
named MyAppModuleImp1. java does not exist.
D. Any code in the base class will be implemented by MyAppModuleDefimp1.java.
E. The MyAppModule. xml definition will include a reference to the base class.
Answer: B

QUESTION NO: 3
In which two places do you configure managed beans?
A. In the page definition file
B. In the faces-config.xml file
C. In the adfc-config.xml file
D. In the Property Inspector
E. In the task flow definition files
Answer: B,D

QUESTION NO: 4
Identify two advantages that ADF Model offers the developer.
A. It insulates the developer from needing to know about the specifics of the underlying business
services implementation.
B. It enables the developer to abstract application navigation from the physical pages.
C. It saves time In that it allows the developer to quickly build business services from database
tables.
D. It enables the developer to bind UI components directly to tables and columns in the database.
E. It provides the developer with a generalized approach to binding services and UI components.
Answer: A,E

QUESTION NO: 5
What type of event listener can be triggered at different points In the JSF life cycle?
A. Action listener
B. Selection listener
C. Launch listener
D. Phase listener
E. Value change listener
Answer: D

QUESTION NO: 6
Identify the business component that is being described below.
“It is a smart data service containing a data model of master-detail queries that your client
interface needs to work with. It also provides a transaction and database connection used by the
components it contains.”
A. a service method
B. a transaction
C. an application module
D. a view object
E. a task flow
F. a data control
Answer: C

QUESTION NO: 7
Which type of object is being described here?
“They handle events or some manipulation of data that is best handled at the front end. They are
bash ally java classes with a no arg constructor that you register with the application in task flow
files.”
A. Task flows
B. Event listeners
C. Action methods
D. Managed beans
E. Contextual events
F. Backing beans
Answer: D

QUESTION NO: 8
Which component CANNOT be packaged into an ADF Library JAR file?
A. ADF Business Components
B. Task flows
C. Task flow templates
D. ADF Library JAR files
E. Declarative components
Answer: D

QUESTION NO: 9
In which file would you expect to find all the attribute accessor for a view object?
A. View. Java
B. Viewlmpl.java
C. ViewDefImp1.java
D. ViewRowlmp1.java
Answer: B

QUESTION NO: 10
When granting a user or role access to a group of pages, it is best practice to grant that user or
role access to what type of file or component?
A. Page definition file
B. Bounded task flow including the page(s)
C. Unbounded task flow including the page(s)
D. . jspx file
E. Entity objects included in the UI
Answer: A

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.

1Z0-146: Oracle Database 11g Advanced PL/SQL Dumps: Real Exam Questions




QUESTION NO: 1
Which three actions can be performed by using the DBMS_ASSERT package to prevent SQL
injection? (Choose three.)
A. Detect a wrong user.
B. Check input string length.
C. Verify qualified SQL names.
D. Validate TNS connect strings.
E. Verify an existing schema name.
F. Enclose string literals within double quotation marks.
Answer: C,E,F

QUESTION NO: 2
Examine the settings for a user session given below:
RESULT_CACHE_MODE= FORCE
What would be the implications of this setting on query execution? (Choose all that apply.)
A. All query results are stored in the result cache if possible.
B. Query results that are bigger than the available space in the result cache are not cached.
C. Query results are stored only when you explicitly use the /*+ result_cache */ hint in your query.
D. Query results are stored even when you explicitly use the /*+ no_result_cache */ hint in your
query.
Answer: A,B

QUESTION NO: 3
When do you use static SQL as a technique for avoiding SQL injection?
A. when the WHERE clause values are unknown
B. when the code contains data definition language (DDL) statements
C. when all Oracle identifiers are known at the time of code compilation
D. when the SET clause values are unknown at the time of code compilation
Answer: C

QUESTION NO: 4
Identify three guidelines for the DBMS_ASSERT package. (Choose three.)
A. Prefix all calls to DBMS_ASSERT with the SYS schema name.
B. Embed DBMS_ASSERT verification routines inside the injectable string.
C. Escape single quotes when you use the ENQUOTE_LITERAL procedure.
D. Define and raise exceptions explicitly to handle DBMS_ASSERT exceptions.
E. Prefix all calls to DBMS_ASSERT with a schema name that owns the subprogram that uses the
DBMS_ASSERT package.
Answer: A,C,D

QUESTION NO: 5
Which two statements are true about associative arrays and varrays? (Choose two.)
A. Only varrays must use sequential numbers as subscripts.
B. Only varrays can be used as column types in database tables.
C. Both associative arrays and varrays must use sequential numbers as subscripts.
D. Both associative arrays and varrays can be used as column types in database tables.
Answer: A,B

QUESTION NO: 6
Which two statements are true about the query results stored in the query result cache? (Choose
two.)
A. If any of the tables used to build a query is modified by an ongoing transaction in the current
session, the query result is not cached.
B. A query result based on a read-consistent snapshot of data that is older than the latest
committed version of the data is not cached.
C. Adding the RESULT_CACHE hint to inline views enables optimizations between the outer
query and the inline view, and the query result is cached.
D. A query result for a query that has a bind variable is stored in the cache and is reused if the
query is equivalent even when the bind variable has a different value.
Answer: A,B

QUESTION NO: 7
Which statements are true about temporary LOBs? (Choose all that apply.)
A. They can be created only for CLOB and NCLOB data.
B. They can be accessed only by the user who creates them.
C. They generate more redo information than persistent LOBs.
D. They exist for the duration of the session in which they are created.
E. They are stored temporarily in the default tablespace of the user who creates them.
Answer: B,D

QUESTION NO: 8
Identify the method that is used by fine-grained access (FGA).
A. using policy functions to generate predicates dynamically
B. creating triggers on corresponding tables to generate dynamic predicates
C. modifying the existing application code to include a predicate for all SQL statements
D. creating views with necessary predicates, and then creating synonyms with the same name as
the tables
Answer: A

QUESTION NO: 9
Identify two strategies against SQL injection. (Choose two.)
A. Using parameterized queries with bind arguments.
B. Use subprograms that are run with the definer's right.
C. Use RESTRICT_REFERENCE clauses in functions that use dynamic SQLs.
D. Validate user inputs to functions that use dynamic SQLs built with concatenated values.
Answer: A,D

QUESTION NO: 10
Identify the component of the PL/SQL hierarchical profiler that uploads the result of profiling into
database tables.
A. the trace file component
B. the analyzer component
C. the shared library component
D. the data collection component
Answer: B

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.

1Z0-144: Oracle Database 11g Program with PL/SQL Dumps: Real Exam Questions




QUESTION NO: 1
What is the correct definition of the persistent state of a packaged variable?
A. It is a private variable defined in a procedure or function within a package body whose value is
consistent within a user session.
B. It is a public variable in a package specification whose value is consistent within a user session.
C. It is a private variable in a package body whose value is consistent across all current active
sessions.
D. It is a public variable in a package specification whose value is always consistent across all
current active sessions.
Answer: B

QUESTION NO: 2
Which statements are true about PL/SQL procedures? (Choose all that apply.)
A. Users with definer's rights who are granted access to a procedure that updates a table must be
granted access to the table itself.
B. Reuse of parsed PL/SQL code that becomes available in the shared SQL area of the server
avoids the parsing overhead of SQL statements at run time.
C. Depending on the number of calls, multiple copies of the procedure are loaded into memory for
execution by multiple users to speed up performance.
D. A PL/SQL procedure executing on the Oracle database can call an external procedure or
function that is written in a different programming language, such as C or Java.
Answer: B,D

QUESTION NO: 3
Identify two situations where the DBMS_SQL package should be used. (Choose two.)
A. The select list is not known until run time.
B. The dynamic SQL statement retrieves rows into records.
C. You do not know how many columns a select statement will return, or what their data types will
D. You must use the %found SQL cursor attribute after issuing a dynamic SQL statement that is
an insert or update statement.
Answer: A,C

QUESTION NO: 4
Which two statements art true about the instead of triggers' (choose two.)
A. Delete operations cannot be performed using the instead of triggers.
B. The instead or triggers must be created to add or modify data through any view.
C. The instead of triggers can be written only for views, and the before and after timing options are
not valid.
D. The check option for views Is not enforced when Insertions or updates to the view are
performed by using the instead of trigger.
Answer: B,C

QUESTION NO: 5
Which two statements are true about the continue statement? (Choose two.)
A. The PL/SQL block execution terminates immediately.
B. The CONTINUE statement cannot appear outside a loop.
C. The loop completes immediately and control passes to the statement after end loop.
D. The statements after the continue statement in the iteration are executed before terminating the
LOOP.
E. The current iteration of the loop completes immediately and control passes to the next iteration
of the loop
Answer: B,E

QUESTION NO: 6
Identify two features of obfuscation. (Choose two.)
A. The Import and Export utilities accept wrapped files.
B. SQL' Plus cannot process the obfuscated source files.
C. Only the wrap utility can obfuscate multiple programs at a time.
D. Both the DBMS_DDL package and the Wrap utility can obfuscate multiple programs at a time.
E. The source code is visible only through the DBA_SOURCE view and not through the
USER_SOURCE or ALL_SOURCE View
Answer: A,C

QUESTION NO: 7
In which of the following scenarios would you recommend using PL/SQL records?
A. when you want to retrieve an entire row from a table and perform calculations
B. when you know the number of elements in advance and the elements are usually accessed
sequentially
C. when you want to create a separate lookup table with multiple entries for each row of the main
table, and access it through join queries
D. when you want to create a relatively small lookup table, where the collection can be constructed
in memory each time a subprogram is invoked
Answer: C,D

QUESTION NO: 8
Which two statements are true about the usage of the cursor for loops? (Choose two.)
A. The cursor needs to be closed after the iteration is complete.
B. The implicit open, fetch, exit, and close of the cursor happen.
C. The record type must be explicitly declared to control the loop.
D. The PL/SQL creates a record variable with the fields corresponding to the columns of the
cursor result set.
Answer: B,D

QUESTION NO: 9
Which tasks must be performed during the installation of the UTL_MAIL package?
(Choose all that apply.)
A. setting the UTL_FILE_DIR initialization parameter
B. running the UTLMAIL.SQL and prvtmail.plb scripts
C. setting the SMTP_OUT_SERVER initialization parameter
D. using the CREATE DIRECTORY statement to associate an alias with an operating system
directory
E. granting read and WRITE privileges to control the type of access to files in the operating system
Answer: B,C

QUESTION NO: 10
Which two statements are true about triggers? (Choose two.)
A. All the triggers that are created on a table cannot be disabled simultaneously.
B. Any user who has the alter privilege on a table can create a trigger using that table.
C. Oracle provides a two-phase commit process whether a trigger updates tables in the local
database or remote tables in a distributed database.
D. Triggers become invalid if a dependent object, such as 3 stored subprogram that is invoked
from the trigger body is modified, and have to be manually recompiled before the next invocation.
Answer: C,D

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.

1Z0-102: Oracle Weblogic Server 11g System Administration I Dumps: Real Exam Questions




QUESTION NO: 1
An EJB application is targeted to a cluster. Remote EJB clients can therefore take advantage of
WebLogic Server’s load balancing and failover capabilities.
However, a proxy server exists between the clients and the cluster, which performs IP address
translation. Which cluster attribute should you modify to ensure that load balancing and failover
work correctly?
A. Multicast Address
B. Persistent Store
C. Cluster Address
D. Migration Basis
E. Replication Channel
Answer: C

QUESTION NO: 2
Identify three options for Keystores in a server's configuration.
A. Demo Identity and Demo Trust
B. Demo Identity and Java Standard Trust
C. Java Standard Identity and Custom Trust
D. Custom Identity and Demo Trust
E. Custom Identity and Custom Trust
F. Custom Identity and Command Line Trust
Answer: A,E,F

QUESTION NO: 3
Identify three properties required by the domain Configuration Wizard when creating a new
domain.
A. machine name
B. Managed Server name
C. domain startup mode
D. domain name
E. administrator username and password
Answer: C,D,E

QUESTION NO: 4
Which can be associated with multiple domains?
A. Cluster
B. Server Log
C. Node Manager
D. Administration Server
Answer: C

QUESTION NO: 5
Which statement is true about the java Node Manager?
A. It runs on Windows not on Linux
B. In its secure form, it uses one-way SSL.
C. It does not use the nodemanager.domains file, whereas the script-based Node Manager.
D. Unlike the script based Node Manager, it should not be run as an operating system service
Answer: B

QUESTION NO: 6
When a typical application utilizes a JDBC data source, the process involves several steps.
Identify three of these steps.
A. The application returns the connection to the data source.
B. The application looks up the data source using the JNDI name.
C. The application tests the connection to verify the database's availability.
D. The application adds a new connection to the data source if none are available.
E. The application requests a connection from the data source.
Answer: A,B,E

QUESTION NO: 7
Which three statements are true about the Change Center in administration console?
A. The Change Center has a link to view the changes made so far.
B. The Change Center is available only in a Production Mode domain.
C. The Change Center has a link to view any servers that need to be restarted.
D. After activating the changes to a server's configuration, you must always restart that server.
E. In a Development Mode domain, the configuration lock can be acquired automatically.
F. Changes must always be activated before they can be undone.
Answer: A,C,E

QUESTION NO: 8
Which three tasks are required to use JDBC session persistence for a web application?
A. Enable automatic migration on each server.
B. Create the session database table.
C. Configure SSL on each server.
D. Edit the weblogic.xml descriptor.
E. Create a multi data source.
F. Create a JDBC data source.
Answer: B,D,F

QUESTION NO: 9
An application fails. The exception indicates that the JDBC data source, jdbc-hr.HRDS, cannot be
found. Identify two possible steps that you can perform to verify the data source’s availability.
A. Launch the JDBCDiagnostics utility.
B. Verify the Targets attribute of the application.
C. Verify the Dependencies attribute of the data source.
D. Verify the target server’s JNDI tree in the console.
E. Verify the Target attribute of the data source.
Answer: D,E

QUESTION NO: 10
Which answer best describes how you can start the Java-based version of the Node Manager?
A. W1scontrol.sh (.cmd in Windows)
B. Wisifconfig.sh (.cmd in Windows)
C. startNodeManager.sh (.cmd in Windows)
D. startNM.sh (.cmd in Windows)
Answer: C

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.

1Z0-054: Oracle Database 11g: Performance Tuning Dumps: Real Exam Questions




QUESTION NO: 1
After running SQL Performance Analyzer (SPA), you observe a few regressed SQL statements in
the SPA output. Identify the two actions that you would suggest for these regressed SQL
statements. (Choose two.)
A. Running SQL Access Advisor
B. Adding them to SQL Plan Baseline
C. Submitting them to SQL Tuning Advisor
D. Running Automatic Database Diagnostic Monitor (ADDM)
Answer: B,C

QUESTION NO: 2
Which three factors influence the optimizer's behavior while choosing an optimization approach
and goal for a SQL statement? (Choose three.)
A. parsing of a SQL statement
B. operating system (OS) statistics
C. object statistics in the data dictionary
D. the OPTIMIZER_MODE initialization parameter
E. optimizer SQL hints for changing the query optimizer goal
Answer: C,D,E

QUESTION NO: 3
Your system has been upgraded from Oracle Database 10g to Oracle Database 11g. You
imported SQL Tuning Sets (STS) from the previous version that contains important SQL
statements. You are not sure about the elapsed time that the SQL statements will have in the new
system due to the version change of the optimizer. Which tool provides a comparative report with
respect to the elapsed time in both versions of the optimizer?
A. SQL Access Advisor
B. SQL Tuning Advisor (STA)
C. SQL Performance Analyzer (SPA)
D. Automatic Workload Repository (AWR) compare period report
Answer: C

QUESTION NO: 4
The database application developers are planning to make some major schema changes such as
creating new indexes and materialized views. They want to check the net impact of these changes
on the workload performance. This activity has to be performed in the production database, so
they want only the query part of the data manipulation language (DML) statements to be executed
so that the side effects to the database or user data can be prevented. What should they use to
achieve this?
A. Database Replay
B. SQL Tuning Advisor
C. SQL Access Advisor
D. SQL Performance Analyzer
Answer: D

QUESTION NO: 5
You upgraded database from the Oracle Database 10g to Oracle Database 11g. To test the
performance SQL on the upgraded database. You want to build the before-change performance
data by using SQL Performance Analyzer .Which method would allow the task to execute quickly?
A. the EXPLAIN PLAN method
B. the TEST EXECUTE method
C. the COMPARE PERFORMANCE method
D. the OPTIMIZER_USE_SQL_PLAN_BASELINE parameter set to TRUE
Answer: A

QUESTION NO: 6
Identify the type of recommendation that can automatically be implemented by the Automatic
Tuning Advisor as part of automatic SQL tuning task?
A. recommendation for SQL profiles
B. recommendation about effective indexing
C. recommendation about stale or no statistics
D. recommendation about the structure of SQL statements
Answer: A

QUESTION NO: 7
Identify the two direct sources from where SQL plans can be loaded into the SQL plan baselines.
(Choose two.)
A. Cursor cache
B. Stored outline
C. SQL Tuning Set
D. Automatic Workload Repository (AWR) snapshots
Answer: A,C

QUESTION NO: 8
In which case is the database buffer cache NOT used?
A. when physical I/Os are performed to read from data files
B. when the database writer process writes to the SYSTEM tablespace
C. when the server process writes sort data to the temporary tablespace
D. when the database writer process writes undo data to the undo tablespace
Answer: C

QUESTION NO: 9
Which two statements are true about the database buffer cache? (Choose two.)
A. A buffer can be written to by many processes at the same time.
B. A buffer containing a block that is identical to the block on disk is called free buffer.
C. A buffer containing a block that is being accessed by a process is called dirty buffer.
D. A buffer available to be overwritten with a different database block at any time is called a dirty
buffer.
E. A buffer can contain a different version of a block that is available in a different buffer of the
same cache.
Answer: B,E

QUESTION NO: 10
You are working in an online transaction processing (OLTP) environment. You received many
complaints from users about degraded performance. Your senior DBA asked you to execute the
following command to improve the performance:
SQL> ALTER TABLE subscribe_log STORAGE(BUFFER_POOL recycle);
You checked the data in the SUBSCRIBE_LOG table and found that it is a large table having one
million rows. Which factor could be a reason for this recommendation?
A. The keep pool is not configured.
B. The automatic Program Global Area (PGA) is not configured.
C. The CURSOR_SPACE_FOR_TIME initialization parameter is set to FALSE.
D. The most of the rows in SUBSCRIBE_LOG table are accessed once a week.
E. All the queries on the SUBSCRIBE_LOG table are rewritten using a materialized view.
Answer: D

I hope you must have find these questions very helpful. If you want to get complete set of real exam questions and their answer please visit our FAQ's section to know more.