-
Describe the different type of Integrity Constraints supported by ORACLE ?
NOT NULL Constraint - Disallows Nulls in a table's column.UNIQUE Constraint - Disallows duplicate values in a column or set of columns.PRIMARY KEY Constraint - Disallows duplicate values and Nulls in a column or set of columns.FOREIGN KEY Constrain - Require each value in a column or set of columns match a value in a related table's UNIQUE or PRIMARY KEY.CHECK Constraint - Disallows values that do...
-
What are Schema Objects ?
Schema objects are the logical structures that directly refer to the database's data. Schema objects include tables, views, sequences, synonyms, indexes, clusters, database triggers, procedures, functions packages and database links.
-
-
What are the advantages of Views ?
Provide an additional level of table security, by restricting access to a predetermined set of rows and columns of a table.Hide data complexity.Simplify commands for the user.Present the data in a different perspective from that of the base table.Store complex queries.
-
What are the type of Synonyms?
There are two types of Synonyms Private and Public.
-
What is a Private Synonyms ?
A Private Synonyms can be accessed only by the owner.
-
What is a Public Synonyms ?
Public synonyms can be accessed by any user on the database.
-
What is an Index ?
An Index is an optional structure associated with a table to have direct access to rows, which can be created to increase the performance of data retrieval. Index can be created on one or more columns of a table.
-
What is Index Cluster ?
A Cluster with an index on the Cluster Key.
-
When can Hash Cluster used ?
Hash clusters are better choice when a table is often queried with equality queries. For such queries the specified cluster key value is hashed. The resulting hash key value points directly to the area on disk that stores the specified rows.
-
What are the types of Database Links ?
Private Database Link, Public Database Link & Network Database Link.
-
What is Network Database link ?
Network database link is created and managed by a network domain service. A network database link can be used when any user of any database in the network specifies a global object name in a SQL statement or object definition.
-
-
What is self-referential integrity constraint ?
If a foreign key reference a parent key of the same table is called self-referential integrity constraint.
-
What are the Limitations of a CHECK Constraint ?
The condition must be a Boolean expression evaluated using the values in the row being inserted or updated and can't contain sub queries, sequence, the SYSDATE,UID,USER or USERENV SQL functions, or the pseudo columns LEVEL or ROWNUM.
-
What is a Synonym ?
A synonym is an alias for a table, view, sequence or program unit.
-
What are Clusters ?
Clusters are groups of one or more tables physically stores together to share common columns and are often used together.
-
What is Hash Cluster ?
A row is stored in a hash cluster based on the result of applying a hash function to the row's cluster key value. All rows with the same hash key value are stores together on disk.
-
What is Row Chaining ?
In Circumstances, all of the data for a row in a table may not be able to fit in the same data block. When this occurs , the data for the row is stored in a chain of data block (one or more) reserved for that segment.
-
What is an Integrity Constrains ?
An integrity constraint is a declarative way to define a business rule for a column of a table.
Oracle Architecture Interview Questions
Ans