System.effective_date system variable is read only True/False?

1 Answer

Answer :

False

Related questions

Description : The value recorded in system.last_record variable is of type

Last Answer : a. Number b. Boolean c. Character. ? b. Boolean.

Description : Is it possible to center an object horizontally in a repeating frame that has a variable horizontal size?

Last Answer : Yes

Description : What is use of a cursor variable? How it is defined?

Last Answer : A cursor variable is associated with different statements at run time, which can hold different values at run time. Static cursors can only be associated with one run time query. A cursor ... indicating the types of the select list that will eventually be returned by the cursor variable.

Description : How you open and close a cursor variable.Why it is required?

Last Answer : OPEN cursor variable FOR SELECT...Statement CLOSE cursor variable In order to associate a cursor variable with a particular SELECT statement OPEN syntax is used. In order to free the resources used for the query CLOSE statement is used.

Description : What should be the return type for a cursor variable.Can we use a scalar data type as return type?

Last Answer : The return type for a cursor must be a record type.It can be declared explicitly as a user-defined or %ROWTYPE can be used. eg TYPE t_studentsref IS REF CURSOR RETURN students%ROWTYPE

Description : Use the ADD_GROUP_ROW procedure to add a row to a static record group? I) TRUE II)FALSE

Last Answer : I) FALSE

Description : Use the ADD_GROUP_COLUMN function to add a column to a record group that was created at design time? I) TRUE II)FALSE

Last Answer : II) FALSE

Description : Two popup pages can appear on the screen at a time ? Two popup pages can appear on the screen at a time ? a. True. b. False?

Last Answer : a. True.

Description : Deleting a page removes information about all the fields in that page ? a. True. b. False?

Last Answer : a. True.

Description : EXIT_FORM is a restricted package procedure ?a. True b. False

Last Answer : True

Description : While specifying master/detail relationship between two blocks specifying the join condition is a must ? True or False. ?

Last Answer : True

Description : Use the Add_group_row procedure to add a row to a static record group 1. true or false?

Last Answer : False

Description : What is Read-Only Transaction ?

Last Answer : A Read-Only transaction ensures that the results of each query executed in the transaction are consistant with respect to the same point in time.

Description : Will RMAN takes backups of read-only tablespaces?

Last Answer : No

Description : Which parameter can be used to set read level consistency across multiple queries?

Last Answer : Read only

Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : C) i-false, ii-true, iii-false, iv-false

Description : Which of the following is true about the static member variable in C++. i) It is initialized to zero when the first object of its class is created. Other initialization is also permitted. ii) It is visible only within ... , ii-True B) ii-False, ii-True C) i-True, ii-False D) i-False, iii-False

Last Answer : B) ii-False, ii-True

Description : The corresponding Existential Instantiation rule: for the existential quantifier is slightly more complicated. For any sentence a, variable v, and constant symbol k that does not appear elsewhere in the knowledge base. a) True b) False

Last Answer : a) True

Description : The rule of Universal Instantiation (UI for short) says that we can infer any sentence obtained by substituting a ground term (a term without variables) for the variable. a) True b) False

Last Answer : a) True

Description : A Term is either an individual constant (a 0-ary function), or a variable, or an n-ary function applied to n terms: F(t1 t2 ..tn). a) True b) False

Last Answer : a) True

Description : The BACKTRACKING-SEARCH algorithm in Figure 5.3 has a very simple policy for what to do when a branch of the search fails: back up to the preceding variable and try a different value for it. This is ... also possible to go all the way to set of variable that caused failure. a) True b) False

Last Answer : a) True

Description : The water of crystallization is the variable number of water molecules present in a salt – (a) True (b) False

Last Answer : (b) False

Description : Explain the use of setting GLOBAL_NAMES equal to TRUE.

Last Answer : Setting GLOBAL_NAMES dictates how you might connect to a database. This variable is either TRUE or FALSE and if it is set to TRUE it enforces database links to have the same name as the remote database to which they are linking.

Description : Which of the following is false for the programming language PROLOG? (A) A PROLOG variable can only be assigned to a value once (B) PROLOG is a Strongly Typed Language. (C) The scope of a variable in PROLOG is a single clause or rule. (D) the scope of a variable in PROLOG is a Single Query

Last Answer : (B) PROLOG is a Strongly Typed Language.

Description : Read the following statements and select the correct option. Statement-I : Nostoc and Bacteria are prokaryotes. Statement-II: Penicillium and Spirogyra are fungi. (1) Only statement I is true (2) Only statement II is true (3) Both statements I and II are true (4) Both statements I and II are false

Last Answer : (1) Only statement I is true

Description : Will a user be able to modify a table with SELECT only privilege?

Last Answer : He won’t be able to UPDATE/INSERT into that table, but for some reason, he will still be able to lock a certain table.

Description : which system variables can be set by users?

Last Answer : SYSTEM.MESSAGE_LEVEL SYSTEM.DATE_THRESHOLD SYSTEM.EFFECTIVE_DATE SYSTEM.SUPPRESS_WORKING

Description : List system variables available in forms 4.0, and not available in forms 3.0?

Last Answer : System.cordination_operation System Date_threshold System.effective_Date System.event_window System.suppress_working

Description : List the system variables related in Block and Field?

Last Answer : 1. System.block_status 2. System.current_block 3. System.current_field 4. System.current_value 5. System.cursor_block 6. System.cursor_field 7. System.field_status.

Description : What is the difference between System.current_field and system.cursor_field ?

Last Answer : 1. System.current_field gives name of the field. 2. System.cursor_field gives name of the field with block name.

Description : It is possible to use raw devices as data files and what is the advantages over file. system files ?

Last Answer : Yes. The advantages over file system files. I/O will be improved because Oracle is bye-passing the kernnel which writing into disk. Disk Corruption will be very less.

Description : What is system.coordination_operation?

Last Answer : It represents the coordination causing event that occur on the master block in master-detail relation.

Description : State any three mouse events system variables?

Last Answer : System.mouse_button_pressedSystem.mouse_button_shift

Description : What are the system resources that can be controlled through Profile ?

Last Answer : The number of concurrent sessions the user can establish the CPU processing time available to the user's session the CPU processing time available to a single call to ORACLE made by a SQL statement the ... idle time for the user's session the allowed amount of connect time for the user's session.

Description : What is SYSTEM tablespace and when is it created?

Last Answer : Every Oracle database contains a tablespace named SYSTEM, which is automatically created when the database is created. The SYSTEM tablespace always contains the data dictionary tables for the entire database.

Description : What is system catalog or catalog relation? How is better known as?

Last Answer : A RDBMS maintains a description of all the data that it contains, information about every relation and index that it contains. This information is stored in a collection of relations maintained by the system called metadata. It is also called data dictionary.

Description : How is the data structure of System R different from the relational structure? Unlike Relational systems in System R

Last Answer : ∙ Domains are not supported ∙ Enforcement of candidate key uniqueness is optional ∙ Enforcement of entity integrity is optional ∙ Referential integrity is not enforced

Description : What is System R?

Last Answer : System R was designed and developed over a period of 1974-79 at IBM San Jose Research Center. It is a prototype and its purpose was to demonstrate that it is possible to build a ... life environment to solve real life problems, with performance at least comparable to that of existing system.

Description : Disadvantage in File Processing System?

Last Answer : ∙ Data redundancy & inconsistency. ∙ Difficult in accessing data. ∙ Data isolation. ∙ Data integrity. ∙ Concurrent access is not possible. ∙ Security Problems.

Description : What is a Database system?

Last Answer : The database and DBMS software together is called as Database

Description : Some Basics command of ORACLE 10g on Windows Operating System:

Last Answer : SQL> show parameter db_name SQL> show parameter instance_name SQL> show parameterdb_block_size (it will show the default block size which is 8KB)

Description : What command would you use to check the availability of the RAC system?

Last Answer : crs_stat -t -v (-t -v are optional)

Description : Which are the default passwords of SYSTEM/SYS?

Last Answer : MANAGER / CHANGE_ON_INSTALL

Description : Which of the following is FALSE in C? A) Keywords can be used as variable names B) Variable names can contain a digit C) Variable names do not contain a blank space D) Capital letters can be used in variables

Last Answer : A) Keywords can be used as variable names

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : What does "jumps off the screen" mean?

Last Answer : answer:AMD is a relatively small manufacturer but well established in the industry. In this context, AMD jumps off the screen at the guy doing the research into acquiring companies for ... chip manufacturing division, but AMD is the one that really stands out from an acquisition perspective.

Description : How to add conditions in select statement in oracle?

Last Answer : Just add the decode

Description : How can I dump an oracle schema to a LOCAL file over a network connection from sqlplus?

Last Answer : By connecting and spooling are you excluding the exp/imp commands (or expdb/impdb in 10g)?