0% found this document useful (0 votes)
625 views8 pages

Oracle Placement Paper Questions

The document contains a 30 question Oracle placement paper test with questions ranging from programming concepts like loops and functions to SQL and database related topics. It provides the questions, possible multiple choice answers, and in some cases an explanation of the correct answer. This test could be used to assess a candidate's knowledge of programming, SQL, databases, and related IT concepts for an Oracle job placement.

Uploaded by

nirikshith p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
625 views8 pages

Oracle Placement Paper Questions

The document contains a 30 question Oracle placement paper test with questions ranging from programming concepts like loops and functions to SQL and database related topics. It provides the questions, possible multiple choice answers, and in some cases an explanation of the correct answer. This test could be used to assess a candidate's knowledge of programming, SQL, databases, and related IT concepts for an Oracle job placement.

Uploaded by

nirikshith p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Oracle Placement Paper

1. How many times the program will print "India


include
int main()
{
printf("India");
main();
return 0;
}

[Link] times B.32767 times C.65535 times [Link] stack doesn't overflow

Answer: D

Explanation:
A call stack or function stack is used for several related purposes, but the main reason for having
one is to keep track of the point to which each active subroutine should return control when it
finishes executing. A stack overflow occurs when too much memory is used on the call stack. Here
function main() is called repeatedly and its return address is stored in the stack. After stack memory
is full. It shows stack overflow error.

2. Specify the 2 library functions to dynamically allocate memory?

[Link]() and memalloc() [Link]() and memalloc() [Link]() and calloc() [Link]()
and faralloc()

Answer: C

3. You need to store elements in a collection that guarantees that no duplicates are stored. Which
two interfaces provide that capability?

[Link] [Link] [Link] of the above

Answer: A

Explanation:
Option A is correct. A Map cannot contain duplicate keys. Option B is wrong. Lists typically allow
duplicate elements. Option C is wrong. Collection allows duplicate elements.

4. Which three are methods of the Object class? 1. notify(); 2. notifyAll(); 3. isInterrupted(); 4.
synchronized(); 5. interrupt(); 6. wait(long msecs); 7. sleep(long msecs); 8. yield();

A.1, 2, 4 B.2, 4, 5 C.1, 2, 6 D.2, 3, 4

[Link]
Answer: C

Explanation:
(1), (2), and (6) are correct. They are all related to the list of threads waiting on the specified object.
(3), (5), (7), and (8) are incorrect answers. The methods isInterrupted() andinterrupt() are instance
methods of Thread. The methods sleep () and yield() are static methods of Thread. D is
incorrect because synchronized is a keyword and the synchronized()construct is part of the Java
language.

5. Which class or interface defines the wait(), notify(),and notifyAll() methods?

[Link] [Link] [Link] [Link]

Answer: A

Explanation:
The Object class defines these thread-specific methods. Option B, C, and D are incorrect because
they do not define these methods. And yes, the Java API does define a class called Class, though
you do not need to know it for the exam

6. The SQL WHERE clause:

[Link] the column data that are returned. [Link] the row data are returned. [Link] A and
B are correct. [Link] A nor B are correct.

Answer: B

7. To define what columns should be displayed in an SQL SELECT statement:

[Link] FROM to name the source table(s) and list the columns to be shown after SELECT.
[Link] USING to name the source table(s) and list the columns to be shown after SELECT.
[Link] SELECT to name the source table(s) and list the columns to be shown after USING.
[Link] USING to name the source table(s) and list the columns to be shown after WHERE.

Answer: A

8. The ODBC core API consists of which of the following functions

[Link] or rollback transactions [Link] to data sources with driver-specific information


only [Link] to data sources only [Link] 1 and 3 above are in the OBDC core API.

Answer: D

9. The memory address of fifth element of an array can be calculated by the formula

[Link]
[Link](Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for
the array
[Link](Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell
for the array
[Link](Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell
for the array
[Link] of above

Answer: A

10. Which of the following is not a limitation of binary search algorithm?

[Link] use a sorted array


[Link] of sorted array is expensive when a lot of insertion and deletions are needed
[Link] must be a mechanism to access middle element directly
[Link] search algorithm is not efficient when the data elements are more than 1000.

Answer: D

11. SNAPSHOT is used for [DBA]

[Link] [Link] space [Link] server [Link] data replication

Answer: D

12. What is difference between a DIALOG WINDOW and a DOCUMENT WINDOW regarding
moving the window with respect to the application window?

[Link] windows behave the same way as far as moving the window is concerned.
B.A document window can be moved outside the application window while a dialog window cannot
be moved
C.A dialog window can be moved outside the application window while a document window cannot
be moved
[Link]

Answer: C

13. What does DLL stands for?

[Link] Language Library [Link] Link [Link] Load Library [Link] of the
above

Answer: B

[Link]
14. Which Oracle access method is the fastest way for Oracle to retrieve a single row?

[Link] key access [Link] via unique index [Link] access by ROWID [Link] table
scan

Answer: A

15. void start()


{

A a = new A();
B b = new B();
a.s(b);
b = null; /* Line 5 */
a = null; /* Line 6 */
[Link]("start completed"); /* Line 7 */
}
When is the B object, created in line 3, eligible for garbage collection

[Link] line 5 [Link] line 6 [Link] line 7 [Link] is no way to be absolutely certain.

Answer: D

Explanation:
Option D is correct. I think there are too many unknowns about the method s and the classes A and
B to be able to answer this question with any certainty.

16. int i,j;


for(i=0;i<=10;i++)
{
j+=5;
assert(i<5);
}

[Link] error B.5 C.6 D.10

Answer: A

Explanation:
Runtime error: Abnormal program termination. assert failed (i<5), NOTE asserts are used during
debugging to make sure that certain conditions are satisfied. If assertion fails, the program will
terminate reporting the same. After debugging use, #undef NDEBUG and this will disable all the
assertions from the source code. Assertion is a good debugging tool to make use of.

17. main()

[Link]
{
int c[ ]={2.8,3.4,4,6.7,5};
int j,*p=c,*q=c;
for(j=0;j<5;j++)
{
printf(" %d ",*c);
++q;
}
for(j=0;j<5;j++)
{
printf(" %d ",*p);
++p;
}
}

A.2 2 2 2 2 2 3 4 6 5 B.2.8,3.4,4,6.7,5 [Link] error [Link]

Answer: A

Explanation:
Initially pointer c is assigned to both p and q. In the first loop, since only q is incremented and not c ,
the value 2 will be printed 5 times. In second loop p itself is incremented. So the values 2 3 4 6 5 will
be printed

18. main(int argc, char **argv)


{
printf("enter the character");
getchar();
sum(argv[1],argv[2]);
}
sum(num1,num2) int num1,num2;
{
return num1+num2;
}

A.2 B.3 [Link] error [Link]

Answer: C

Explanation:
argv[1] & argv[2] are strings. They are passed to the function sum without converting it to integer
values.

19. #include
main()

[Link]
{
char s[]={'a','b','c','\n','c','\0'};
char *p,*str,*str1;
p=&s[3];
str=p;
str1=s;
printf("%d",++*p + ++*str1-32);
}

A.77 [Link] error C.32 [Link]

Answer: A

Explanation:
p is pointing to character '\n'. str1 is pointing to character 'a' ++*p. "p is pointing to '\n' and that is
incremented by one." the ASCII value of '\n' is 10, which is then incremented to 11. The value of
++*p is 11. ++*str1, str1 is pointing to 'a' that is incremented by 1 and it becomes 'b'. ASCII value of
'b' is 98. Now performing (11 + 98 - 32), we get 77("M"); So we get the output 77 :: "M" (Ascii is 77).

20. #include
int main()
{
int j=1;
while(j <= 255)
{
printf("%c %d\n", j, j);
j++;
}
return 0;
}

[Link] times B.255 times C.256 times D.254 times

Answer: B

Explanation:
The while(j <= 255) loop will get executed 255 times. The size short int(2 byte wide) does not affect
the while() loop.

21. Which of the following data structure store the homogeneous data elements?

[Link] [Link] [Link] [Link]

Answer: B

[Link]
22. If you need to duplicate the entire disk, which command will you use?

[Link] [Link] [Link] [Link]

Answer: B

Explanation:
Diskcopy is used to perform track-by-track copy of a disk into another. Copy command copies
selected files; chkdsk and format commands are not for copying purpose

23. The SQL command to create a table is:

[Link] TABLE. [Link] TABLE [Link] TABLE. [Link] TABLE.

Answer: D

24. Which SQL trigger does SQL Server NOT support?

[Link] [Link] OF [Link] [Link] Server supports all three

Answer: A

25. Pre-processors does not do which one of the following

[Link] [Link] complication [Link] type checking [Link] load file

Answer: C

26. How many buses are connected as part of the 8085 microprocessor?

A.2 B.3 C.5 D.8

Answer: B

27. In a CLIENT/SERVER environment , which of the following would not be done at the client ?

[Link] interface part [Link] validation at entry line [Link] to user events [Link] of the
above

Answer: D

28. Which command will delete all data from a table and will not write to the rollback segment?

[Link] [Link] [Link] [Link]

[Link]
Answer: B

29. The system variable that records the select statement that SQL * FORMS most recently used to
populate a block is

[Link].LAST_RECORD [Link].CURSOR_RECORD [Link].CURSOR_FIELD


[Link].LAST_QUERY

Answer: D

30. Which of the following is part of an administrative policy to secure a database?

[Link] policies [Link] particular areas within a building to only authorized people
[Link] appropriate responses rates are in external maintenance agreements [Link] of the
above.

Answer: D

[Link]

You might also like