Examen Dumps 1Z0-146 It-Pruefungen
Examen Dumps 1Z0-146 it-pruefungen.de Zertifizierungsprfung Simulator Prfung ist in einer Weise, die Ihnen helfen, die Prfung ohne weitere Bcher oder hilfreiche Materialien zu bestehen. Unsere IT Zertifizierungsprfung Studienfhrer k¶nnte die Bibel fr Ihre Karriere sein, da sie alles umfasst, um Zertifizierungsprfung zu betehen. IT Fragenpool ist ein globaler Ebene anerkannte 1Z0-146 1Z0-146, Zertifizierung durch IT weltweit angeboten.
Prfungsnummer: 1Z0-146
Prfungsname:Oracle database 11g:advanced pl/sql
QUESTION NO: 1
Which two statements are true about the OPEN and FILEOPEN routines in the DBMS_LOB package? (Choose two.)
A. OPEN can be used to open only internal LOBs in the indicated mode.
B. FILEOPEN can be used to open only external LOBs in the indicated mode.
C. OPEN can be used to open internal and external LOBs in the indicated mode.
D. FILEOPEN can be used to open internal and external LOBs in the indicated mode.
Answer: B,C
QUESTION NO: 2
When do you use static SQL as a technique for avoiding SQL injection?
A. when the WHERE clause values are unknown
B. when the code contains data definition language (DDL) statements
C. when all Oracle identifiers are known at the time of code compilation
D. when the SET clause values are unknown at the time of code compilation
Answer: C
QUESTION NO: 3
Which three statements are true about hierarchical profiling? (Choose three.)
A. It provides function-level summaries.
B. It produces an aggregated report of the SQL and PL/SQL execution times.
C. It is useful for understanding the structure and control flow of complex programs.
D. It can be used to identify hotspots and tuning opportunities in PL/SQL applications.
E. It generates trace information for PL/SQL programs in the PLSQL_TRACE_EVENTS table.
Answer: A,C,D
QUESTION NO: 4
Which two statements are true about cursor variables? (Choose two.)
A. Cursor variables can be parameterized like cursors.
B. The query associated with a cursor variable cannot reference host variables and PL/SQL variables.
C. The FETCH statement executes the query associated with a cursor variable and identifies the result set.
D. Cursor attributes (%FOUND, %NOTFOUND, %ISOPEN, and %ROWCOUNT) can be applied to a cursor variable.
E. The OPEN FOR statement executes the query associated with a cursor variable and identifies the result set.
Answer: D,E
QUESTION NO: 5
View the Exhibit and examine the code in the PL/SQL block.
The PL/SQL block generates an error on execution. What is the reason?
A. The DELETE(n) method cannot be used with varrays.
B. The DELETE(n) method cannot be used with nested tables.
C. The NEXT method cannot be used with an associative array with VARCHAR2 key values.
D. The NEXT method cannot be used with a nested table from which an element has been
deleted.
Answer: A
QUESTION NO: 6
Which two statements are true about the migration of BasicFile to the SecureFile format by using the DBMS_REDEFINITION package? (Choose two.)
A. It can be performed only on tables with a single LOB column.
B. It automatically creates an interim table during the migration process.
C. It allows the table that is migrated to be accessed throughout the migration process.
D. It requires free space that is at least equal to the space used by the table that is migrated.
E. It requires all constraints defined on the original table to be re-created manually after the migration.
Answer: C,D
Examen Dumps 1Z0-146 it-pruefungen.de
Prfungsnummer: 1Z0-146
Prfungsname:Oracle database 11g:advanced pl/sql
QUESTION NO: 1
Which two statements are true about the OPEN and FILEOPEN routines in the DBMS_LOB package? (Choose two.)
A. OPEN can be used to open only internal LOBs in the indicated mode.
B. FILEOPEN can be used to open only external LOBs in the indicated mode.
C. OPEN can be used to open internal and external LOBs in the indicated mode.
D. FILEOPEN can be used to open internal and external LOBs in the indicated mode.
Answer: B,C
QUESTION NO: 2
When do you use static SQL as a technique for avoiding SQL injection?
A. when the WHERE clause values are unknown
B. when the code contains data definition language (DDL) statements
C. when all Oracle identifiers are known at the time of code compilation
D. when the SET clause values are unknown at the time of code compilation
Answer: C
QUESTION NO: 3
Which three statements are true about hierarchical profiling? (Choose three.)
A. It provides function-level summaries.
B. It produces an aggregated report of the SQL and PL/SQL execution times.
C. It is useful for understanding the structure and control flow of complex programs.
D. It can be used to identify hotspots and tuning opportunities in PL/SQL applications.
E. It generates trace information for PL/SQL programs in the PLSQL_TRACE_EVENTS table.
Answer: A,C,D
QUESTION NO: 4
Which two statements are true about cursor variables? (Choose two.)
A. Cursor variables can be parameterized like cursors.
B. The query associated with a cursor variable cannot reference host variables and PL/SQL variables.
C. The FETCH statement executes the query associated with a cursor variable and identifies the result set.
D. Cursor attributes (%FOUND, %NOTFOUND, %ISOPEN, and %ROWCOUNT) can be applied to a cursor variable.
E. The OPEN FOR statement executes the query associated with a cursor variable and identifies the result set.
Answer: D,E
QUESTION NO: 5
View the Exhibit and examine the code in the PL/SQL block.
The PL/SQL block generates an error on execution. What is the reason?
A. The DELETE(n) method cannot be used with varrays.
B. The DELETE(n) method cannot be used with nested tables.
C. The NEXT method cannot be used with an associative array with VARCHAR2 key values.
D. The NEXT method cannot be used with a nested table from which an element has been
deleted.
Answer: A
QUESTION NO: 6
Which two statements are true about the migration of BasicFile to the SecureFile format by using the DBMS_REDEFINITION package? (Choose two.)
A. It can be performed only on tables with a single LOB column.
B. It automatically creates an interim table during the migration process.
C. It allows the table that is migrated to be accessed throughout the migration process.
D. It requires free space that is at least equal to the space used by the table that is migrated.
E. It requires all constraints defined on the original table to be re-created manually after the migration.
Answer: C,D
Examen Dumps 1Z0-146 it-pruefungen.de