Technocrat

  • Home

Sunday, February 22, 2015

MCQ on Oracle

 Sumit Kar     February 22, 2015     DBMS, MCQ, Oracle, Programming     No comments   







1. What does a
COMMIT statement do to a CURSOR


a]
Open the Cursor


b]
Fetch the Cursor


c]
Close the Cursor


d] None of the
above


 


2. Which of the
following is TRUE


1]
Host variables are declared anywhere in the program


2]
Host variables are declared in the DECLARE section


a]
Only 1 is TRUE


b] Only 2 is
TRUE


c]
Both 1 & 2are TRUE


d]
Both are FALSE


 


3. Which of the
following is NOT VALID is PL/SQL


a]
Bool boolean;


b] NUM1, NUM2
number;


c]
deptname dept.dname%type;


d]
date1 date := sysdate


 


4. Declare


fvar number :=
null; svar number := 5


Begin


goto <<
fproc>>


if fvar is null
then


<<
fproc>>


svar := svar + 5


end if;


End;


What will be the
value of svar after the execution ?


a] Error


b]
10


c]
5


d]
None of the above


 


5. Which of the
following is not correct about an Exception ?


a]
Raised automatically / Explicitly in response to an ORACLE_ERROR


b]
An exception will be raised when an error occurs in that block


c] Process
terminates after completion of error sequence.


d]
A Procedure or Sequence of statements may be processed.


 


6. Which of the
following is not correct about User_Defined Exceptions ?


a]
Must be declared


b]
Must be raised explicitly


c] Raised
automatically in response to an Oracle error


d]
None of the above


 


7. A Stored
Procedure is a


a]
Sequence of SQL or PL/SQL statements to perform specific function


b]
Stored in compiled form in the database


c]
Can be called from all client environments


d] All of the
above


    


8. Which of the
following statement is false


a]
Any procedure can raise an error and return an user message and error number


b]
Error number ranging from 20000 to 20999 are reserved for user defined messages


c] Oracle checks
Uniqueness of User defined errors


d]
Raise_Application_error is used for raising an user defined error.


 


9.  Is it possible to open a cursor which is in a
Package in another procedure ?


a] Yes


b]
No


 


10.  Is it possible to use Transactional control
statements in Database Triggers ?


a]
Yes


b] No





11.  Is it possible to Enable or Disable a Database
trigger ?


a] Yes


b]
No 


 


12. PL/SQL
supports datatype(s)


a]
Scalar datatype


b]
Composite datatype


c] All of the
above


d]
None of the above





13. Find the ODD
data type out


a]
VARCHAR2


b] RECORD


c]
BOOLEAN


d]
RAW





14. Which of the
following is not correct about the "TABLE" data type ?


a] Can contain
any no of columns


b]
Simulates a One-dimensional array of unlimited size


c]
Column datatype of any Scalar type


d]
None of the above


    


15. Find the ODD
one out of the following


a]
OPEN


b]
CLOSE


c] INSERT


d]
FETCH


    


16. Which of the
following is not correct about Cursor ?


a]
Cursor is a named Private SQL area


b] Cursor holds
temporary results


c]
Cursor is used for retrieving multiple rows


d]
SQL uses implicit Cursors to retrieve rows


 


 


17. Which of the
following is NOT VALID in PL/SQL ?


a]
Select ... into


b]
Update


c] Create


d]
Delete


    


18. What is the
Result of the following 'VIK'||NULL||'RAM' ?


a]
Error


b]
VIK RAM


c] VIKRAM


d]
NULL


 


19. Declare


a number := 5; b
number := null; c number := 10;


Begin


if a > b AND
a < c then


a := c * a;


end if;


End;


What will be the
value of 'a' after execution ?


a]
50


b]
NULL


c] 5


d]
None of the above


 


20. Does the
Database trigger will fire when the table is TRUNCATED ?


a]
Yes


b] No


 


21.
SUBSTR(SQUARE ANS ALWAYS WORK HARD,14,6) will return


a]
ALWAY


b}
S ALWA


c] ALWAYS


 


22.
REPLACE('JACK AND JUE','J','BL') will return


a]
JACK AND BLUE


b]
BLACK AND JACK


c] BLACK AND
BLUE


d]
None of the above


 


23. GET_BLOCK
property is a


a]
Restricted procedure


b]
Unrestricted procedure


c]
Library function


d]
None of the above





24.
TRANSLATE('333SQD234','0123456789ABCDPQRST','0123456789') will return


a] 333234


b]
333333


c]
234333


d]
None of the above


 


25.. EMPNO ENAME
SAL


A822 RAMASWAMY
3500


A812 NARAYAN
5000


A973 UMESH 2850


A500 BALAJI 5750


Use
these data for the following Questions


Select
SAL from EMP E1 where 3 > ( Select count(*) from Emp E2


where
E1.SAL > E2.SAL ) will retrieve


a]
3500,5000,2500


b]
5000,2850


c]
2850,5750


d]
5000,5750


26. Is it
possible to modify a Data type of a column when column contains data ?


a]
Yes


b] No


 


27. Which of the
following is not correct about a View ?


a]
To protect some of the columns of a table from other users


b] Occupies data
storage space


c]
To hide complexity of a query


d]
To hide complexity of a calculations


 


28. Which is not
part of the Data Definition Language ?


a]
CREATE


b]
ALTER


c] ALTER SESSION


    


29. The Data
Manipulation Language statements are


a]
INSERT


b]
UPDATE


c]
SELECT


d] All of the
above


  


30. EMPNO ENAME
SAL


A822 RAMASWAMY
3500


A812 NARAYAN
5000


A973 UMESH


A500 BALAJI 5750


Using
the above data Select count(sal) from Emp will retrieve


a]
1


b]
0


c] 3


d]
None of the above





31. If an UNIQUE
KEY constraint on DATE column is created, will it accept the rows that are
inserted with SYSDATE ?


a]
Will


b] Won't


 


32. What are the
different events in Triggers ?


a]
Define, Create


b]
Drop, Comment


c] Insert,
Update, Delete


d]
All of the above


33. What
built-in subprogram is used to manipulate images in image items ?


a]
Zoom_out


b]
Zoom_in'


c] Image_zoom


d]
Zoom_image


 


34. Can we pass
RECORD GROUP between FORMS ?


a] Yes


b]
No


    


35. SHOW_ALERT
function returns


a]
Boolean


b] Number


c]
Character


d]
None of the above


 


36. What SYSTEM
VARIABLE is used to refer DATABASE TIME ?


a] $$dbtime$$


b]
$$time$$


c]
$$datetime$$


d]
None of the above


  


37.
:SYSTEM.EFFECTIVE.DATE varaible is


a]
Read only


b]
Read & Write


c] Write only


d]
None of the above


 


38.. How can you
CALL Reports from Forms4.0 ?


a]
Run_Report built_in


b]
Call_Report built_in


c] Run_Product
built_in


d]
Call_Product built_in


 


39. When do you
get a .PLL extension ?


a] Save Library
file


b]
Generate Library file


c]
Run Library file


d]
None of the above


    


40. What is
built_in Subprogram ?


a]
Stored procedure & Function


b]
Collection of Subprogram


c]
Collection of Packages


d] None of the
above
 


41. Out of the
below data types which can be used for Date & time type?


a)     Date


b)     Datetimeoffset


c)     Time


d)     All


42. What is the
ISO synonym for ntext data type?


a)     New text


b)     Next text


c)     National Text


d)     None of the above


43. Which data
type is used to store binary data up to the limit of 2,147,483,647?


a)     Image


b)     Text


c)     Ntext


d)     None of the above


44. Which data
type can be used to represent position in a hierarchy?


a.     Hierarchy


b.     Hierarchyid


c.     Nhierarchyid


d.     None of the above


45. What is the
storage size of smallmoney data type?


a)     3 bytes


b)     2 bytes


c)     4 bytes


d)     8 bytes


46.  What is the range of TinyInt data type in SQL
Server?


a)     0-10


b)     0-255


c)     -2^15 to 2^15-1


d)     None of the above


47. Which data
type in SQL server can be used to store time in the table?


a)     Timeonly


b)     OnlyTime


c)     Time


d)     DateTime


48. What is the
ISO synonym for real data type in SQL server?


a)     Float(24)


b)     Float(8)


c)     Float(16)


d)     None of the above


49. What is the
default size of n in a column which is defined as VARCHAR(n)?


a)     NULL


b)     0


c)     1


d)     None of the above


50. Which data
type is used for assigning GUID value?


a)     UNIQUE


b)     UNIQUEIDENTYFIER


c)     GUID


d)     None of the above





Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp

Saturday, February 21, 2015

WhatApp Official site removes the app with calling feature

 Sumit Kar     February 21, 2015     Technology, WhatsApp     No comments   



WhatsApp leaked the version WhatsApp 2.11.531 on its website. But now they have removed it. This is the version that will have the most awaited calling feature. But according to tech specialists currently WhatsApp might be working on this new feature for all other platforms. Many websites have leaked screenshots from iPhone and Android phones. They might be working for Windows Phone devices and once they are ready they might release the app on all the three major Mobile Platforms.




If you are using v2.11.527 you can receive the call but you can't call any number. At least till WhatsApp updates the system internally.


I do have the latest APK installed on my tablet device but I think WhatsApp wants not to share the APK before they are ready with all devices. I respect their thought and so do not request me to share the APK.











Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp

Thursday, February 19, 2015

 Sumit Kar     February 19, 2015     No comments   


Multiple Choice Questions on SQL Data Types









1. Out of the below data types which can be used for Date & time type?







a)     Date



b)     Datetimeoffset



c)     Time



d)     All







2. What is the ISO synonym for ntext data type?







a)     New text



b)     Next text



c)     National Text



d)     None of the above







3. Which data type is used to store binary data up to the limit of 2,147,483,647?







a)     Image



b)     Text



c)     Ntext



d)     None of the above







4. Which data type can be used to represent position in a hierarchy?







a.     Hierarchy



b.     Hierarchyid



c.     Nhierarchyid



d.     None of the above







5. What is the storage size of smallmoney data type?







a)     3 bytes



b)     2 bytes



c)     4 bytes



d)     8 bytes







6.  What is the range of TinyInt data type in SQL Server?







a)     0-10



b)     0-255



c)     -2^15 to 2^15-1



d)     None of the above







7. Which data type in SQL server can be used to store time in the table?







a)     Timeonly



b)     OnlyTime



c)     Time



d)     DateTime







8. What is the ISO synonym for real data type in SQL server?







a)     Float(24)



b)     Float(8)



c)     Float(16)



d)     None of the above







9. What is the default size of n in a column which is defined as VARCHAR(n)?







a)     NULL



b)     0



c)     1



d)     None of the above







10. Which data type is used for assigning GUID value?







a)     UNIQUE



b)     UNIQUEIDENTYFIER



c)     GUID



d)     None of the above












Answers



1) d, 2) c, 3) a, 4) b, 5) c, 6) b, 7) c, 8) a, 9) c, 10) b






































Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp

Wednesday, February 18, 2015

Pen Drive Full of Shortcut [Virus] ? - Clean Them

 Sumit Kar     February 18, 2015     Technology, Virus, Windows     No comments   



Shortcut Virus!!! Is Your USB Pendrive, Computer or Hard disk creating unwanted shortcut files which appears again and again even after removing them?










The Shortcut Virus or bug may look to many as a small problem and usually they do not take any action to remove it, while others take it seriously and look on the internet to find a shortcut virus removal tool or a way to Remove the shortcut virus from there device. 





Before i begin the tutorial on how to remove the shortcut virus, let me first explain what the shortcut virus is capable of doing.





What is Shortcut Virus and How it infects your device?


Shortcut Virus also known as  Houdini is a worm which have infected several computers/devices around the world.


The Shortcut Virus usually spread through USB peripheral devices including pendrives, Memory cards, Mobile phones, Digital Cameras or Hard disks. once you have completed copying a file to your device you may see files on your device with a shortcut arrow in the preview. this is where the infection begins once clicked the file runs a ".vbs" file/script which runs a series of task including making two copies of its code or registery key one for temporary use and other for start/restart.





You may think by removing the Shortcut created the problem is solved, but infact it will appear again every time the computer or device is started/restarted.





After infecting your computer/device the Shortcut virus looks for peripheral devices connected to the system and infects them too.





What is the Shortcut virus capable of doing? 


Once your device is infected by the shortcut virus it then connects to its C&C server, to obtain the commands and send the stolen information.





Once infected by the Shortcut Virus, the Attacker can take advantage of the situation and is capable of stealing victim's data install other malwares or update the codes of the present shortcut virus.





How to Remove shortcut Virus? 


I will explain four methods step by step which can help you remove shortcut virus from your computer.








Shortcut Virus Removal Method 1:


Step1: Connect the device which is infected by the shortcut virus, check for every folder/file on the drive/device is visible and not hidden. for this open folder and search options--> view-->select show hidden files and folders--> apply changes.









Step2: Download Autorun Exterminator from the link provided here extract the folder and run the file which is named as "Autorun Exterminator" this will automatically remove the shortcut virus from your device.








Shortcut Virus Removal Method 2:










Download Malwarebyte's Anti-Malware from the link provided here, Install and update it and then run a full scan of your computer/device it will automatically remove any shortcut virus present in your computer.








Shortcut Virus Removal Method 3, Using Command prompt:










Open the Command prompt, click on start--> Search-->cmd-->Enter it will open the Command prompt, type in the following command


    


   attrib -h -r -s /s /d e:\*.*     or    





     attrib E:\*.* /d /s -h -r -s




- See more at: http://www.bloggingworm.com/2014/10/remove-shortcut-virus.html#sthash.IN5lNWEz.dpuf






Replace the drive "E" with the desired drive you want to scan, for eg; if you want to scan and remove the shortcut virus from drive G, Replace "E" with "G"





Copy one of the command from above  and paste it into command prompt window and press Enter.








Shortcut Virus Removal Method 4:





Download usbfix from the link provided here and run it. 





Now before running usbfix insert the peripheral device which you want to scan or remove shortcut virus from.










After running the usbfix click on Clean option.





A popup message will appear asking to Connect all your external data sources to your PC (Usb keys, external drives, etc…), connect the device which you want to scan or remove the shortcut virus from and then click ok.





The Software will scan for all infected elements and will remove the shortcut virus from your device.







Hopefully Your device is now free from Shortcut Virus, do let me know if you have any problem following the above mentioned method :)











Source: BloggingWorm


Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp

Monday, February 16, 2015

Sumit Kar: A survey on how people use Internet

 Sumit Kar     February 16, 2015     No comments   

Sumit Kar: A survey on how people use Internet
Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp

A survey on how people use Internet

 Sumit Kar     February 16, 2015     Internet, Survey, Technology     No comments   

A survey on how people uses Internet


A survey on how people use Internet





Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp

Tuesday, February 3, 2015

WhatsApp rolls out a new update with voice call functionality

 Sumit Kar     February 03, 2015     News, Technology, WhatsApp     No comments   



Hike, WhatsApp, Calling ,WhatsApp rolls out a new update with voice call functionality



There had been rumors about WhatsApp having a calling feature, well it looks like they've finally implimented it but it might be still in it's beta version, so it's not out for the public yet.



After announcing its acquisition of US-based voice-calling firm Zip Phone in early January, India’s very own instant messenger, Hike, had a unique gift for all its Android users on the occasion of 66th Republic Day, 2015. Hike Messenger has now enabled free voice calling in the latest update! iOS and Windows Phone users will get the 'Hike Calls' feature by the end of Q1 2015.



Now it's turn for WhatsApp. Instant messaging service WhatsApp has seemingly begun a slow rollout of its anticipated voice-calling feature to its users in India, as reported by GSM Arena. The current rollout, which has not yet been officially announced by WhatsApp, appears to be operating via an invite-only scenario. The feature gets switched on when a user who already has it enabled calls another user.


Hike, WhatsApp, Calling ,WhatsApp rolls out a new update with voice call functionality










As mentioned in the XDA, one can activate it manually on a rooted device.




Requirements:


1)Root access

2) WhatsApp (version 2.11.508 or Above)

3) Terminal Emulator




Instructions:


1) Make sure you have the right version of WhatsApp

2) Open Terminal Emulator in your Android phone

3) Type in the following:

su
am start
-n com.whatsapp/com.whatsapp.HomeActivity

4) WhatsApp should now open with the calling feature enabled.






Hike, WhatsApp, Calling ,WhatsApp rolls out a new update with voice call functionality



Voice-calling will put WhatsApp in direct competition with the likes of VoIP services Skype and Viber.




Download






Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
  •  WhatsApp
Newer Posts Older Posts Home

Pages

  • Home

Trending Now

  • Write a Program to Add two 3x3 Matrix using C
    #include<stdio.h> void main () { int a [ 3 ][ 3 ], b [ 3 ][ 3 ], s [ 3 ][ 3 ], i , j ; printf ( "Enter the values of ...
  • C program for Unit Conversion
    /* Convert Celsius to Fahrenheit */ #include<stdio.h> void main() {     float c,f;     printf("Enter the temperature in Celcius: ...
  • Addition of two numbers on Server sent from Client [TCP] using C
    /* tcpClient.c */ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #inc...
  • Write a Program to Print the Truth Table of Basic Gates using C
  • Write a Program to Add two 5x5 Matrix using C
    #include<stdio.h> void main() {   int a[5][5],b[5][5],c[5][5];   int i,j;   for(i=0;i<5;i++)   {     printf("\nEnter elements ...
  • Using the concept of Inheritance write a C++ Program to calculate the area and perimeter of rectangle
    /* C++ Program to calculate the area and perimeter of rectangles using concept of inheritance. */ #include using namespace std; class Re...
  • Concatenation of two strings sent from Client on the Server - [ TCP ] using C
    /* tcpClient.c */ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #inc...
  • 8085 Programming: Exchange the contents of memory locations
    Exchange the contents of memory locations 2000H and 4000H. Program 1: LDA 2000H : Get the contents of memory location 2000H into accumulator...
  • Calculate Depreciation using C
    #include<conio.h> #include<stdio.h> void main () { float sv , pv , dep ; int yos ; clrscr (); printf ( "Enter the pu...
  • 8085 Programming: 1's COMPLEMENT OF A 16-BIT NUMBER
    The 16bit number is stored in C050,C051 The answer is stored in C052,C053   LXI H,C050   MOV A,M   CMA   STA C052   INX H   MOV ...

Blog Archive

  • ►  2020 (1)
    • ►  May (1)
  • ▼  2015 (92)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (9)
    • ►  June (9)
    • ►  May (20)
    • ►  April (7)
    • ►  March (22)
    • ▼  February (7)
      • MCQ on Oracle
      • WhatApp Official site removes the app with calling...
      • Multiple Choice Questions on SQL Data Types1. Out ...
      • Pen Drive Full of Shortcut [Virus] ? - Clean Them
      • Sumit Kar: A survey on how people use Internet
      • A survey on how people use Internet
      • WhatsApp rolls out a new update with voice call fu...
    • ►  January (8)
  • ►  2014 (158)
    • ►  November (70)
    • ►  October (6)
    • ►  September (82)
Powered by Blogger.

Categories

C - Programming Java Programming Basic Technology 8085 Assembly Programming For Loop Numerical Methods WhatsApp Algorithm Shell Programming Programming Networking Windows Android C++ Programming CPP If Else Tricky Internet Microsoft Pattern Photography Socket Program News While Loop Array DBMS DS Macro Recursion User Defined Function Conditional Operator Data Structure Durga Puja Earthquake Google Mela Nokia SQL Share Yahoo Airtel Bio Command Prompt Confused Facebook Finance Firefox Ganges Graph HokKolorob Input Kolkata MCQ Math Matrix NetNeutrality Oracle Religion Search Sumit Kar Survey Switch Case Viral Virus Visual Studio do-while featured featured_slider

Popular Programs

  • Write a Program to Add two 3x3 Matrix using C
    #include<stdio.h> void main () { int a [ 3 ][ 3 ], b [ 3 ][ 3 ], s [ 3 ][ 3 ], i , j ; printf ( "Enter the values of ...
  • C program for Unit Conversion
    /* Convert Celsius to Fahrenheit */ #include<stdio.h> void main() {     float c,f;     printf("Enter the temperature in Celcius: ...
  • Addition of two numbers on Server sent from Client [TCP] using C
    /* tcpClient.c */ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #inc...
  • Write a Program to Print the Truth Table of Basic Gates using C
  • Write a Program to Add two 5x5 Matrix using C
    #include<stdio.h> void main() {   int a[5][5],b[5][5],c[5][5];   int i,j;   for(i=0;i<5;i++)   {     printf("\nEnter elements ...
  • Using the concept of Inheritance write a C++ Program to calculate the area and perimeter of rectangle
    /* C++ Program to calculate the area and perimeter of rectangles using concept of inheritance. */ #include using namespace std; class Re...
  • Concatenation of two strings sent from Client on the Server - [ TCP ] using C
    /* tcpClient.c */ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #inc...
  • 8085 Programming: Exchange the contents of memory locations
    Exchange the contents of memory locations 2000H and 4000H. Program 1: LDA 2000H : Get the contents of memory location 2000H into accumulator...
  • Calculate Depreciation using C
    #include<conio.h> #include<stdio.h> void main () { float sv , pv , dep ; int yos ; clrscr (); printf ( "Enter the pu...
  • 8085 Programming: 1's COMPLEMENT OF A 16-BIT NUMBER
    The 16bit number is stored in C050,C051 The answer is stored in C052,C053   LXI H,C050   MOV A,M   CMA   STA C052   INX H   MOV ...

Daily Hits

Copyright © Sumit Kar