Immigration Financial Information Bangladesh Gateway General World Cup Entertainment Programing University and College Scholarship Job Interview Health Job

Wednesday, March 25, 2009

What is WiMAX?


WiMAX is a wireless digital communications system, also known as IEEE 802.16, that is intended for wireless "metropolitan area networks".   WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3 - 10 miles (5 - 15 km) for mobile stations.  In contrast, the WiFi/802.11 wireless local area network standard is limited in most cases to only 100 - 300 feet (30 - 100m).
 
With WiMAX, WiFi-like data rates are easily supported, but the issue of interference is lessened.   WiMAX operates on both licensed and non-licensed frequencies, providing a regulated environment and viable economic model for wireless carriers.

WiMAX can be used for wireless networking in much the same way as the more common WiFi protocol.  WiMAX is a second-generation protocol that allows for more efficient bandwidth use, interference avoidance, and is intended to allow higher data rates over longer distances.
 
The IEEE 802.16 standard defines the technical features of the communications protocol.  The WiMAX Forum offers a means of testing manufacturer's equipment for compatibility, as well as an industry group dedicated to fostering the development and commercialization of the technology.

WiMax.com provides a focal point for consumers, service providers, manufacturers, analysts, and researchers who are interested in WiMAX technology, services, and products.  Soon, WiMAX will be a very well recognized term to describe wireless Internet access throughout the world.

IIS connection limitation

1. IIS can only operate one website per XP installation.

2 .Connection limititation for Windows XP - It allows 10 simultanous connection.

3. NT 4.0 Workstation, Windows 2000 Professional and XP Professional all come with a limit of ten simultaneous connections. When there are more than ten active connections, you might see one of the following: 
 

The page cannot be displayed  
There are too many people accessing the Web site at this time.

 
or 
 

HTTP 403.9 - Access Forbidden: Too many users are connected

 If you use IIS 5.0 on Windows 2000 Professional or IIS 5.1 on Microsoft Windows XP Professional, disable HTTP keep-alives in the properties of the Web site. When you do this, a limit of 10 concurrent connections still exists, but IIS does not maintain connections for inactive users.

What is the global assembly cache?

Q: What is the global assembly cache?

Definition

Each computer on which the common language runtime is installed has a machine-wide code cache called the 'Global Assembly Cache'. The global assembly cache (or GAC as it is commonly known) stores assemblies specifically designated to be shared by several applications on the computer. The global assembly cache is located in 'Windows/WinNT' directory and inherits the directory's access control list that administrators have used to protect the folder.

Assemblies installed in GAC should adhere to a specific versioning scheme that will allow them for side-by-side execution (multiple versions of the same assembly can be maintained in the GAC) of different code versions.

Shared Assemblies including all the important .NET System assemblies implementing the Framework Class Library reside within GAC. The GAC was originally called Fusion Cache and is implemented using Fusion.dll in .NET Framework.

Assemblies placed in the GAC must have the same assembly name and file name (not including the file name extension). For example, an assembly with the assembly name of 'myAssembly' must have a file name of either 'myAssembly.exe' or 'myAssembly.dll'.


Scenarios for installing Assemblies in GAC

There are multiple reasons why an assembly should be installed in GAC:
o File Security:

Administrators usually protect the 'Windows/WinNT' directory using an access control list (ACL) to control access. Because the GAC is located in 'Windows/WinNT' folder, this means that the GAC folder inherits the access rights from the 'Windows/WinNT' folder, and only administrators can modify the contents of the GAC. This will ensure that assemblies that are installed in GAC are not being accidentally removed/modified by in-experienced users.

o Shared Location:

GAC acts as a common place for installing assemblies that are shared by multiple applications on the same machine. A common misconception is that in order to make the .NET assemblies available to COM InterOp or to the unmanaged code, the assemblies should be installed in GAC. However, this does not mandate installing assemblies in the GAC. Only those assemblies that are shared with other applications on the same machine should be installed in GAC.

o Side-by-Side versioning:

Side-by-side execution means having the ability to install and use multiple versions of the same assembly. In simple words side-by-side versioning means having the same assembly present with multiple versions but with the same name. GAC can contain multiple copies of the same assembly with different versions, which allows a robust support for versioning in the Common Language Runtime.

o As an additional search location:

When an assembly needs to be loaded by the Common Language Runtime, the CLR first checks the GAC for the assembly.


3. Pre-Requisites for installing an assembly in GAC

To install an assembly in GAC, the assembly must be signed with a strong name.
Quote:
Originally Posted by .NET Framework Documentation

A strong name consists of the assembly's identity — its simple text name, version number, and culture information (if provided) — plus a public key and a digital signature. It is generated from an assembly file (the file that contains the assembly manifest, which in turn contains the names and hashes of all the files that make up the assembly), using the corresponding private key.

In order to help assemblies to sign with a string name, one can use the Strong Name Tool. Further information can also be found in the following article.


4. Installing/uninstalling an assembly in GAC

There are multiple ways of installing an assembly in GAC:
o Using Windows Installer:

This is a preferred way for installing shared assemblies and should be the only way to install the shared assemblies on production systems (or non-development machines).

o Global Assembly Cache Tool:

The Global Assembly Cache Utility Tool can be used to install or uninstall assemblies in GAC. It also allows us to view or manipulate the contents of the GAC. The common syntax of 'GACUTIL.exe' is:

Code:

gacutil [options] [assemblyName | assemblyPath | assemblyListFile]

To install a strong named assembly from the command prompt in the GAC use:

Code:
gacutil /i myAssembly.dll

To uninstall a strong named assembly from the command prompt in the GAC use:

Code:
gacutil /u myAssembly.dll

To view the contents of the GAC we can use:

Code:
gacutil /l

To check if an assembly ('myAssembly.dll') is already present in the GAC:

Code:
gacutil /l myAssembly.dll

Tuesday, March 24, 2009

Web 1.0, Web 2.0, Web 3.0, Web 4.0


What is Web 2.0?

 

Web 2.0 is a revolutionary view of the Internet and the social and business uses of advanced technologies rather than the technical aspects of those technologies. The core concept of Web 2.0 is: Use Internet as a platform and leverage network effect to harness the collective intelligence in a cost-effective manner

 

What is Web 3.0?

 

The Next Generation Web: Search Context for Online Information

A web of meanings and connected knowledge.

Web 3.0 = Web 2.0 + semantic web + AI.

Knowledge-centric patterns of computing.

 

What is Web 4.0?

 

A web of connected intelligence.

Everything communicating, everywhere, all the time, sleepless.

 

 

Difference Between Web 2.0 and Web 1.0?

 

  Web 1.0 was about reading, Web 2.0 is about writing.

  Web 1.0 we had sermons. Web 2.0 We have conversations. Web 3.0? We know what      you’re   thinking before you even do it.

 Web 1.0 was about companies, Web 2.0 is about communities

 Web 1.0 was about client-server, Web 2.0 is about peer to peer

  Web 1.0 was about HTML, Web 2.0 is about XML

  Web 1.0 was about home pages, Web 2.0 is about blogs

  Web 1.0 was about lectures, Web 2.0 is about conversation

  Web 1.0 was about advertising, Web 2.0 is about word of mouth

  Web 1.0 was about services sold over the web, Web 2.0 is about web services

Web 1.0 was top-down. Web 2.0 is bottom-up.

Web 1.0 was edited and produced. Web 2.0 is raw.

Web 1.0 was banner ads. Web 2.0 is Adsense.

Web 1.0 was text. Web 2.0 is video.

Web 1.0 was professional. Web 2.0 is amature.

Web 1.0 was dial up. Web 2.0 is broadband.

Web 1.0 was IE. Web 2.0 is FireFox.

Web 1.0 was information. Web 2.0 is opinion.

Wait a minute, enough fun and games. Let’s get real and take off the rosy-colored glasses.

Web 1.0 was information. Web 2.0 is propaganda.

Web 1.0 was Microsoft. Web 2.0 is Google. Web 3.0 is ATT and NSA, working to protect us.

Web 1.0 was American. Web 2.0 is international. Web 3.0 is Chinese.

Web 1.0 was a tool. Web 2.0 is a lifestyle. Web 3.0 is an addiction.

Web 1.0 was a tool for the few. Web 2.0 is entertainment for the many. Web 3.0 is an opiate for the many.

Web 1.0 was the newspaper. Web 2.0 is the TV. Web 3.0 is the Matrix.

 

Difference Between Web 3.0 and Web 2.0?

 

In the Web 2.0 universe, searching Google for “Gary Price” will yield a plethora of unrelated hits. Web 3.0 solves this problem by providing context to searching for online information.

Openness

Web 3.0 is about openness. By “opening” application programming interfaces (APIs), protocols, data formats, open-source software platforms and open data, you open up possibilities for creating new tools. Although Unlike openness can result in identity theft, Web 3.0 attempts to remedy this through:

  • Open identity
  • OpenID
  • Open reputation
  • The ability for roaming portable identity and personal data.

Interoperability

By opening up access to information, Web 3.0 applications can run on any device, computer, or mobile phone. Applications can be very fast and customizable. Unlike Web 2.0, where programs such as Facebook and MySpace exist in separate silos, Web 3.0 allows users to roam freely from database to database, program to program.

A Global Database

Conceptually, Web 3.0 should be viewed as one large database. Dubbed "The Data Web", web 3.0 uses structured data records published to the Web in reusable and remote-queriable formats. XML technologies such as RDF Schema, OWL, SPARQL will make this possible by allowing information to be read across different programs across the web.

3D Web & Beyond

Web 3.0 will use a three dimensional model and transform it into a series of 3D spaces. Services such as Second Life and the use of personalized avatars will be a common feature of the 3D web. Web 3.0 will extend beyond into the physical; imagine a Web connected to everything not only your cellphone but your car, microwave and clothes, thus truly making for an integrated experience.

Control of Information

Where Web 3.0 is about control of information web 2.0 is about information overload. The most obvious example is in the sheer explosion of programs and passwords on the Web which claim to encourage networking and socialization. Web 3.0 attempts to bring order and allow users to be more accurate in searching and finding precisely what they want.

 

Semantic Web versus Web 3.0?

What is most confusing is the difference between the Semantic Web and Web 3.0 – both are conceptual entities. However, rather than competing spaces they should be viewed as successive layers that are developing. By adding the semantic web to Web 2.0, we move conceptually closer to web 3.0. The underlying technologies of the Semantic Web, which enrich content and the intelligence of the social web, pulls in user profiles and identities, and must be combined for Web 3.0 to work.

 

Social Media Sharing Resources

 

Communication

 

* Blogs: Blogger, Livejournal, TypePad, Wordpress, Tripod

* Mobile blogging and alerting: Twitter

* Social networking: MySpace, Bebo, Facebook, LinkedIn, Orkut, Skyrock

 

Collaboration

 

* Wikis: Wikispaces (personal)

* Social bookmarking: del.icio.us, StumbleUpon

* Social News Sites: Digg, Mixx, Reddit

* Opinion sites: epinions, Yelp, CitySearch, CultureMob

 

Multimedia

 

* Photo sharing: Flickr, Photobucket, SmugMug

* Video sharing: YouTube, Google video

* Livecasting: Ustream, Justin.tv, Stickam

* Audio and Music Sharing: imeem, The Hype Machine, Last.fm, ccMixter

 

Entertainment

 

* Virtual worlds: Second Life, There.com

* Online gaming: World of Warcraft

* Game sharing: Miniclip.com

 

 



More on web 4.0

 

Web 2.0 may have been about web applications and combining data, and Web 3.0 may have been about the great availability of the super-information cloud through aggregated applications leveraging articulated APIs.

Web 4.0 is the impending state at which all information converges into a great ball of benevolent self-aware light, and solves every problem from world peace to why lost stinks this season. All humans will begin working 24x7 to feed our new data overlord on a steady diet of email, PowerPoint foils, and cute pictures of our grandkids and/or dogs. The final transition to this state of computational bliss will be achieved by the soon to be announced Super Core Infinity Grande processor line, which puts an infinite number of cores in a single processor. 

winmail.dat in attachments , outlook express

To resolve the problem of winmail.dat , use the plain text format. To do this:

-> On the Tools menu, click Options, and then click Mail Format.
-> In Compose in this message format, click to select Plain Text, and then click OK.

NOTE: To send to certain recipients that use RTF format and others recipients that use plain text format, you must set the option for the recipient in either the Personal Address Book or the recipient's contact record.

Use the following steps to remove the RTF format from the recipient attribute in the Personal Address Book:

-> On the Tools menu, click Address Book.
-> In Show Names From, click the Personal Address Book.
-> Select the addressee that you want to set as plain text, and then click Properties on theFile menu.
-> In the SMTP-General tab, click to clear the Always send to this recipient in Microsoft Exchange rich text format check box, and then click OK.

Use the following steps to set plain text in the recipient's contact record:
-> Open the recipient's record in the Contacts folder.
-> Double-click the recipient's e-mail address.
-> In the E-Mail Properties dialog box, click Send Plain Text only under Internet Format.

For viewing the Crystal Report in Firefox

For viewing the Crystal Report in Firefox:

First goto www.google.com and search for "ie tab"

Click :IE Tab :: Firefox Add-ons

After that a page will appear and click: Add to Firefox(windows)

------------------------------

After that there should be a menu item narrated,IE Tab options in the Tools menu.

Click Tools-->IE Tab Options

In the URL box write: http://leavemanagementsystem.com/cse and click add.

after that u should get the report in next login.

Basic Ajax, What is Ajax?

AJAX stands for Asynchronous JavaScript And XML.

AJAX is a type of programming made popular in 2005 by Google (with Google Suggest).

AJAX is not a new programming language, but a new way to use existing standards.

With AJAX you can create better, faster, and more user-friendly web applications.

AJAX is based on JavaScript and HTTP requests.

With AJAX, your JavaScript can communicate directly with the server, using the JavaScript XMLHttpRequest object. With this object, your JavaScript can trade data with a web server, without reloading the page.

AJAX uses asynchronous data transfer (HTTP requests) between the browser and the web server, allowing web pages to request small bits of information from the server instead of whole pages.

AJAX applications are browser and platform independent.

By using the XMLHttpRequest object, a web developer can update a page with data from the server after the page has loaded!


 
Simple Ajax Script:
 
function ajaxFunction()
{

var xmlHttp;
try
  {

// Firefox, Opera 8.0+, Safari
xmlHttp=new XMLHttpRequest();
}
catch (e)
  {

// Internet Explorer
try
    {

xmlHttp=new ActiveXObject("Msxml2.XMLHTTP");
}
  catch (e)
    {

try
      {

xmlHttp=new ActiveXObject("Microsoft.XMLHTTP");
}
    catch (e)
      {

alert("Your browser does not support AJAX!");
return false;
}
}
}
}

Sunday, March 22, 2009

IP Explorer,Reverse IP

IP Explorer

Domain Tools has turned Reverse IP into a visual representation of the internet. Now you can see which IP blocks have the most domains on them. Click through the IP blocks to discover how hosting companies hand out their IP addresses. This tool is offered for free to all Domain Tools users.
 

What is Reverse IP?

Reverse IP is easiest way to find all the .com, .net, .org, .biz, .us, and .info websites hosted on a given IP address. Enter an IP address or domain name and receive a list of up to 2,000 domains hosted on that IP. Lookups with over 2,000 results can be ordered as a report containing the full list.

What can I do with Reverse IP?

Phishing/Scam sites often come in groups. If you find one do a Reverse IP look up to find the other scam sites hosted on the same server as the one you found.

Shared Hosting accounts are usually hosted under the same IP address. See who is using that web host before signing up or see who else is on your server.

Parking Sites can be identified by the large number domains parked on their IP address. See who else is parked on that server. 

For watching Bangla font

Copy all the bangla font files and paste them in
c:\windows\fonts folder.

It may require to restart your PC or may be not.

Hope this will solve your problem :-D


Saturday, March 21, 2009

What is x86 and x64? What is 32-bit and 64-bit Computing?

X86 is 32 bit and x86_64 (or just x64) is 64 bit.

If you're doing normal browsing/playback/typing stuff, you won't see any difference between 32- and 64-bit. This only comes into play when you're moving huge amounts of data, like video editing or audio mastering.

32-bit vs 64-bit Computing
64-bit is still relatively new on the desktop/laptop scene, and the drivers for Windows 64-bit Edition are less than mature. You will run into problems. I would stick with Windows 32-bit for stability, even if you have a 64-bit processor. I would suggest you hold off on 64-bit Windows until Windows 7 is released; hopefully hardware vendors will write stable drivers by then.

The 'data buss' is used to move the data around inside your computer. In a 32-bit computer, the width (or size) of the data buss is 32-bits wide. A 64-bit buss is twice as wide so the system can move twice as much data around. Being able to process more data means a faster system -- but only for specific things. Normal office productivity and web surfing will show no advantages at all, whereas graphics processing and scientific calculations will go much faster.

Windows 64-bit system
It has been reported that Vista 64-bit, Microsoft's next Windows release, already has severe problems. It already has had critical updates applied, prior to release. Nothing like getting a head start, is there. Other problems with 64-bit is the general lack of stable software to run on these Ferrari of the computer world. The entire system has to be designed and built for the wider data buss, too, so the system will cost more. On the contrary, most 32-bit software will run on a 64-bit system, but that causes one to wonder why one spent the money in the first place.

Who needs 64-bit system?
Mostly businesses, universities, scientific groups, and government. If you produce videos, computer art, or develop programs, 64-bit systems will be helpful. But for the home user, 64-bit is currently a bit overkill. You won't see faster activities like writing, spreadsheet processing, or web browsing so (in my opinion), save your cash for something else (like a bigger hard drive or more RAM).

Thursday, March 19, 2009

PC health check

Common Checking Area To Keep PC in Good Health

DEFRAGGING YOUR HARD-DRIVE
CACHE CLEAN-UP
MEMORY MANAGEMENT
SPYWARE
DRIVER UPDATES
POWER DOWN

Monday, March 16, 2009

TIPS FOR MANAGING IT COST

  • Standardize your hardware, software and policies.
  • Keep business computers for business use only.
  • Get spam,virus, and spyware protection from day one.
  • Buy slightly ahead of the curve when purchasing hardware.
  • Buy slightly behind of the curve when purchasing software.
  • Use industry leading products.
  • Get warranties for hardware.
  • Have a good backup plan.
  • Perform regular maintenance on your network and computers.
  • Choose the right technology support for your business.

DATA PROTECTION,DISASTER RECOVERY,BUSINESS CONTINUITY

Organizations need a continuum of protection schemes that include storage array-based data protection, remote replication for recovery after a failure or disaster,and business continuity during outages and common IT maintenance procedures.
DATA PROTECTION
The first line of defense is to protect data where it is stored, and that means keeping storage units running as well as providing safety features. Backup is a basic part of data protection – simply backing up to tape can protect you from complete data loss, although restoring from tape is time consuming, difficult, and unreliable.Many organizations take snapshots and then run tape backups from them; this keeps data more available by virtually eliminating backup windows, and speeding restore, and minimizing errors.
DISASTER RECOVERY
Increasing virus and hacker attacks, hurricanes, and electrical brown-outs also remind us of how vulnerable our data is.The keywords for disaster recovery are copies and distance. For DR, you must have more than one data copy, and copies must be stored some distance away from the primary data center on different physical machines – remote replication is the standard for DR.
BUSINESS CONTINUITY
Business continuity (BC) differs from data protection and disaster recovery because it describes not only a level of protection that speeds recovery, but also a strategy that makes recovery speed less important. With business continuity, it’s not about how long it takes to get back in operation – it’s about staying in operation regardless of the failure, outage, attack, or corruption. For example, if you have a duplicate data center at another location with data copies, you can quickly bring operations online at the new location.

Sunday, March 15, 2009

LAPTOP SECURITY

The loss of a single laptop poses a serious risk to a corporation: proprietary information, personal data and trade secrets can fall into the wrong hands. Moreover, for licensing and compliance purposes, IT managers need to know where their assets are, who is using them, and what software and information is residing on them.

 

An effective way to think about a layered approach to mobile security and data protection is CPR: Compliance, Protection and Recovery.

 

Protecting data on a lost or stolen computer is a good first step, but recovering the asset, and stopping the internal theft, is equally important in effectively mitigating a company’s total exposure.

A layered approach consists of:

1. Compliance The ability to comply with applicable mobile data protection regulations and to provide an easily accessible audit trail.

2. Protection The ability to prevent mobile data losses from occurring.

3. Recovery The ability to recover lost or stolen mobile data, to retrieve lost or stolen devices and return them to the control of the organization, and to facilitate prosecution.

 

A multi-faceted mobile data protection system should consist of the following:

REAL-TIME ASSET TRACKING

REMOTE DATA DELETE

DATA ENCRYPTION

AUDIT LOGS

 

COMPLIANCE CHECKLIST

1. Knowledge of the relevant statutes for your industry and jurisdiction

2. The ability to track mobile computers, their usage and the types of information on them, including the ability to locate assets on demand

3. Recovery software for retrieving lost or stolen assets.

 

PROTECTION CHECKLIST

1. The ability to locate and recover lost or stolen mobile computing assets

2. The ability to protect sensitive data through strong user authentication and encryption

3. The ability to delete data remotely from mobile computers that have been lost or stolen

 

COMPUTER SECURITY CHECKLIST

1. The ability to locate lost or stolen assets for recovery

2. Effective human resources policies that enable strong disciplinary action for misuse of corporate assets

3. The ability to delete data remotely from mobile computers that have been lost or stolen

 

Starting today, what steps can an organization take to put in place a better, more compliant environment for protecting data, especially in mobile devices? Here are some quick tips on protecting data:

1. Educate employees on the need to avoid leaving laptops unattended. If they must be left in a vehicle, they should be locked in the trunk.

2. Explain the importance of data security for corporate compliance purposes and the benefits of a best practices approach to data protection.

3. Ensure that all laptop computers are locked in cupboards or other secure facilities at work or at home when not in use.

4. Provide cable locks for laptops that must be left unattended.

5. Implement a sign-in system for visitors and do not let unaccompanied visitors into work areas.

6. Install an asset tracking and recovery tool such as ComputraceComplete to track and recover computers that are lost or stolen, and monitor any changes or disappearances in computer memory, hard drives or peripherals.

7. Deploy a data encryption tool to protect sensitive data.

8. Use a data delete tool to remove remote sensitive information from a lost, stolen or end-of-life or lease device.

Virtualization

Virtualization benefits:

Increased flexibility

Simplified management

Reduced risk

Increased cost savings

 

Paravirtualization is one of several virtualization solutions in which underlying computer hardware is  emulated in virtualization software mediated by a hypervisor. The hypervisor runs on the host operating system and enables guest operating systems of various types to run on virtual machines, all of which are running on the same physical machine.

 

Five Key Components of a Linux-based Virtualization Solution

 

1. Stable, reliable Linux operation system.

 

2. High performance virtualization technology.

A solution to consider is the Xen hypervisor technology integrated into SUSE Linux Enterprise Server   10 (SP1) with the optional SUSE Linux Enterprise Virtual Machine Driver Pack from Novell.

3. Servers optimized for virtualization.

Servers with built-in virtualization capabilities can provide an “assist” to the other components of the solution. Also, Multi-Core Intel processor-based servers can improve consolidation ratios while reducing operating costs.

4. Sophisticated management capabilities.

5. Enterprise-based support.

When you choose a Xen-based virtualization solution based on SUSE Linux Enterprise Server 10 (SP1) running on IBM System x and BladeCenter servers, you will have access to two of the industry’s leading support organizations. Novell and IBM will be there to help you walk through your virtualization deployment and continue to offer their world-class expertise as long as you need it.

 

Advantage:

  1. Decrease Costs
  2. Increase Utilization
  3. Simplify Operations
  4. Optimize scalability
  5. Built-in Reliability and security

 

Solutions

SUSE Linux Enterprise Server 10 (SP1)

IBM® System x™ and BladeCenter® Servers

Intel® Xeon® Multi-Core Processors with Intel® Virtualization Technology

IBM® Systems Director Platform Management Family

UNIX Interview Question

UNIX Question

# How can you determine the space left in a file system?

Level: Low Expected answer: There are several commands to do this: du, df, or bdf

# How can you determine the number of SQLNET users logged in to the UNIX system? Level: Intermediate Expected answer: SQLNET users will show up with a process unique name that begins with oracle, if you do a ps -ef|grep oracle|wc -l you can get a count of the number of users.

# What command is used to type files to the screen? Level: Low Expected answer: cat, more, pg

# What command is used to remove a file? Level: Low Expected answer: rm

# Can you remove an open file under UNIX? Level: Low Expected answer: yes

# How do you create a decision tree in a shell script? Level: intermediate Expected answer: depending on shell, usually a case-esac or an if-endif or fi structure

# What is the purpose of the grep command? Level: Low Expected answer: grep is a string search command that parses the specified string from the specified file or files

# The system has a program that always includes the word nocomp in its name, how can you determine the number of processes that are using this program? Level: intermediate Expected answer: ps -ef|grep *nocomp*|wc -l

# What is an inode? Level: Intermediate Expected answer: an inode is a file status indicator. It is stored in both disk and memory and tracts file status. There is one inode for each file on the system.

# The system administrator tells you that the system hasn?t been rebooted in 6 months, should he be proud of this? Level: High Expected answer: Maybe. Some UNIX systems don?t clean up well after themselves. Inode problems and dead user processes can accumulate causing possible performance and corruption problems. Most UNIX systems should have a scheduled periodic reboot so file systems can be checked and cleaned and dead or zombie processes cleared out.

# What is redirection and how is it used? Level: Intermediate Expected answer: redirection is the process by which input or output to or from a process is redirected to another process. This can be done using the pipe symbol "|", the greater than symbol ">" or the "tee" command. This is one of the strengths of UNIX allowing the output from one command to be redirected directly into the input of another command.

# How can you find dead processes? Level: Intermediate Expected answer: ps -ef|grep zombie -- or -- who -d depending on the system.

# How can you find all the processes on your system? Level: Low Expected answer: Use the ps command

# How can you find your id on a system? Level: Low Expected answer: Use the "who am i" command.

# What is the finger command? Level: Low Expected answer: The finger command uses data in the passwd file to give information on system users.

# What is the easiest method to create a file on UNIX? Level: Low Expected answer: Use the touch command

# What does >> do? Level: Intermediate Expected answer: The ">>" redirection symbol appends the output from the command specified into the file specified. The file must already have been created.

# If you aren?t sure what command does a particular UNIX function what is the best way to determine the command? Expected answer: The UNIX man -k command will search the man pages for the value specified. Review the results from the command to find the command of interest.

 

Database Interview Question

PL/SQL Questions

# Describe the difference between a procedure, function and anonymous pl/sql block. Level: Low

Expected answer : Candidate should mention use of DECLARE statement, a function must return a value while a procedure doesn't have to.

# What is a mutating table error and how can you get around it?

Level: Intermediate

Expected answer: This happens with triggers. It occurs because the trigger is trying to update a row it is currently using. The usual fix involves either use of views or temporary tables so the database is selecting from one while updating the other.

# Describe the use of %ROWTYPE and %TYPE in PL/SQL

Level: Low

Expected answer: %ROWTYPE allows you to associate a variable with an entire table row. The %TYPE associates a variable with a single column type.

# What packages (if any) has Oracle provided for use by developers?

Level: Intermediate to high

Expected answer: Oracle provides the DBMS_ series of packages. There are many which developers should be aware of such as DBMS_SQL, DBMS_PIPE, DBMS_TRANSACTION, DBMS_LOCK, DBMS_ALERT, DBMS_OUTPUT, DBMS_JOB, DBMS_UTILITY, DBMS_DDL, UTL_FILE. If they can mention a few of these and describe how they used them, even better. If they include the SQL routines provided by Oracle, great, but not really what was asked.

# Describe the use of PL/SQL tables

Level: Intermediate

Expected answer: PL/SQL tables are scalar arrays that can be referenced by a binary integer. They can be used to hold values for use in later queries or calculations. In Oracle they will be able to be of the %ROWTYPE designation, or RECORD.

# When is a declare statement needed ?

Level: Low

The DECLARE statement is used in PL/SQL anonymous blocks such as with stand alone, non-stored PL/SQL procedures. It must come first in a PL/SQL stand alone file if it is used.

# In what order should a open/fetch/loop set of commands in a PL/SQL block be implemented if you use the %NOTFOUND cursor variable in the exit when statement? Why?

Level: Intermediate

Expected answer: OPEN then FETCH then LOOP followed by the exit when. If not specified in this order will result in the final return being done twice because of the way the %NOTFOUND is handled by PL/SQL.

# What are SQLCODE and SQLERRM and why are they important for PL/SQL developers?

Level: Intermediate

Expected answer: SQLCODE returns the value of the error number for the last error encountered. The SQLERRM returns the actual error message for the last error encountered. They can be used in exception handling to report, or, store in an error log table, the error that occurred in the code. These are especially useful for the WHEN OTHERS exception.

# How can you find within a PL/SQL block, if a cursor is open?

Level: Low

Expected answer: Use the %ISOPEN cursor status variable.

# How can you generate debugging output from PL/SQL?

Level:Intermediate to high

Expected answer: Use the DBMS_OUTPUT package. The DBMS_OUTPUT package can be used to show intermediate results from loops and the status of variables as the procedure is executed, however output only occurs after processing is finished, which might not be useful if processing takes a long time. The package UTL_FILE can be used to write to a file, but one must have write access to the output directory. A third possibility is to create a log table and have the procedure write to the table. This will give you debugging information in real time.

# What are the types of triggers?

Level:Intermediate to high

Expected Answer: There are 12 types of triggers in PL/SQL that consist of combinations of the BEFORE, AFTER, ROW, TABLE, INSERT, UPDATE, DELETE and ALL key words: BEFORE ALL ROW INSERT AFTER ALL ROW INSERT BEFORE INSERT AFTER INSERT etc.

DBA

# Give one method for transferring a table from one schema to another:

Level:Intermediate

Expected Answer: There are several possible methods, export-import, CREATE TABLE... AS SELECT, or COPY.

# What is the purpose of the IMPORT option IGNORE? What is it's default setting?

Level: Low

Expected Answer: The IMPORT IGNORE option tells import to ignore "already exists" errors. If it is not specified the tables that already exist will be skipped. If it is specified, the error is ignored and the tables data will be inserted. The default value is N.

# You have a rollback segment in a version #2 database that has expanded beyond optimal, how can it be restored to optimal?

Level: Low

Expected answer: Use the ALTER TABLESPACE ..... SHRINK command.

# If the DEFAULT and TEMPORARY tablespace clauses are left out of a CREATE USER command what happens? Is this bad or good? Why?

Level: Low

Expected answer: The user is assigned the SYSTEM tablespace as a default and temporary tablespace. This is bad because it causes user objects and temporary segments to be placed into the SYSTEM tablespace resulting in fragmentation and improper table placement (only data dictionary objects and the system rollback segment should be in SYSTEM).

# What are some of the Oracle provided packages that DBAs should be aware of? Level: Intermediate to High

Expected answer: Oracle provides a number of packages in the form of the DBMS_ packages owned by the SYS user. The packages used by DBAs may include: DBMS_SHARED_POOL, DBMS_UTILITY, DBMS_SQL, DBMS_DDL, DBMS_SESSION, DBMS_OUTPUT and DBMS_SNAPSHOT. They may also try to answer with the UTL*.SQL or CAT*.SQL series of SQL procedures. These can be viewed as extra credit but aren?t part of the answer.

# What happens if the constraint name is left out of a constraint clause?

Level: Low

Expected answer: The Oracle system will use the default name of SYS_Cxxxx where xxxx is a system generated number. This is bad since it makes tracking which table the constraint belongs to or what the constraint does harder.

# What happens if a tablespace clause is left off of a primary key constraint clause?

Level: Low

Expected answer: This results in the index that is automatically generated being placed in then users default tablespace. Since this will usually be the same tablespace as the table is being created in, this can cause serious performance problems.

# What is the proper method for disabling and re-enabling a primary key constraint?

Level: Intermediate

Expected answer: You use the ALTER TABLE command for both. However, for the enable clause you must specify the USING INDEX and TABLESPACE clause for primary keys.

# What happens if a primary key constraint is disabled and then enabled without fully specifying the index clause?

Level: Intermediate

Expected answer: The index is created in the user?s default tablespace and all sizing information is lost. Oracle doesn?t store this information as a part of the constraint definition, but only as part of the index definition, when the constraint was disabled the index was dropped and the information is gone.

# (On UNIX) When should more than one DB writer process be used? How many should be used?

Level: High

Expected answer: If the UNIX system being used is capable of asynchronous IO then only one is required, if the system is not capable of asynchronous IO then up to twice the number of disks used by Oracle number of DB writers should be specified by use of the db_writers initialization parameter.

# You are using hot backup without being in archivelog mode, can you recover in the event of a failure? Why or why not?

Level: High

Expected answer: You can't use hot backup without being in archivelog mode. So no, you couldn't recover.

# What causes the "snapshot too old" error? How can this be prevented or mitigated?

Level: Intermediate

Expected answer: This is caused by large or long running transactions that have either wrapped onto their own rollback space or have had another transaction write on part of their rollback space. This can be prevented or mitigated by breaking the transaction into a set of smaller transactions or increasing the size of the rollback segments and their extents.

# How can you tell if a database object is invalid?

Level: Low

Expected answer: By checking the STATUS column of the DBA_, ALL_ or USER_OBJECTS views, depending upon whether you own or only have permission on the view or are using a DBA account.

# A user is getting an ORA-00942 error yet you know you have granted them permission on the table, what else should you check?

Level: Low

Expected answer: You need to check that the user has specified the full name of the object (SELECT empid FROM scott.emp; instead of SELECT empid FROM emp;) or has a synonym that points to the object (CREATE SYNONYM emp FOR scott.emp;)

# A developer is trying to create a view and the database won?t let him. He has the "DEVELOPER" role which has the "CREATE VIEW" system privilege and SELECT grants on the tables he is using, what is the problem? Level: Intermediate Expected answer: You need to verify the developer has direct grants on all tables used in the view. You can't create a stored object with grants given through a role.

# If you have an example table, what is the best way to get sizing data for the production table implementation?

Level: Intermediate

Expected answer: The best way is to analyze the table and then use the data provided in the DBA_TABLES view to get the average row length and other pertinent data for the calculation. The quick and dirty way is to look at the number of blocks the table is actually using and ratio the number of rows in the table to its number of blocks against the number of expected rows.

# How can you find out how many users are currently logged into the database? How can you find their operating system id?

Level: high Expected answer: There are several ways. One is to look at the v$session or v$process views. Another way is to check the current_logins parameter in the v$sysstat view. Another if you are on UNIX is to do a "ps -ef|grep oracle|wc -l? command, but this only works against a single instance installation.

# A user selects from a sequence and gets back two values, his select is:

SELECT pk_seq.nextval FROM dual; What is the problem?

Level: Intermediate

Expected answer: Somehow two values have been inserted into the dual table. This table is a single row, single column table that should only have one value in it.

# How can you determine if an index needs to be dropped and rebuilt?

Level: Intermediate

Expected answer: Run the ANALYZE INDEX command on the index to validate its structure and then calculate the ratio of LF_BLK_LEN/LF_BLK_LEN+BR_BLK_LEN and if it isn?t near #0 (i.e. greater than #7 or so) then the index should be rebuilt. Or if the ratio BR_BLK_LEN/ LF_BLK_LEN+BR_BLK_LEN is nearing ##

SQL/ SQLPlus

# How can variables be passed to a SQL routine? Level: Low

Expected answer: By use of the & symbol. For passing in variables the numbers 1-8 can be used (&1, &2,...,&8) to pass the values after the command into the SQLPLUS session. To be prompted for a specific variable, place the ampersanded variable in the code itself: "select * from dba_tables where owner=&owner_name;" . Use of double ampersands tells SQLPLUS to resubstitute the value for each subsequent use of the variable, a single ampersand will cause a reprompt for the value unless an ACCEPT statement is used to get the value from the user.

# You want to include a carriage return/linefeed in your output from a SQL script, how can you do this?

Level: Intermediate to high

Expected answer: The best method is to use the CHR() function (CHR(10) is a return/linefeed) and the concatenation function "||". Another method, although it is hard to document and isn?t always portable is to use the return/linefeed as a part of a quoted string.

# How can you call a PL/SQL procedure from SQL?

Level: Intermediate

Expected answer: By use of the EXECUTE (short form EXEC) command.

# How do you execute a host operating system command from within SQL?

Level: Low

Expected answer: By use of the exclamation point "!" (in UNIX and some other OS) or the HOST (HO) command.

# You want to use SQL to build SQL, what is this called and give an example

Level: Intermediate to high

Expected answer: This is called dynamic SQL. An example would be: set lines 90 pages 0 termout off feedback off verify off spool drop_all.sql select ?drop user ?||username||? cascade;? from dba_users where username not in ('SYS','SYSTEM'); spool off Essentially you are looking to see that they know to include a command (in this case DROP USER...CASCADE;) and that you need to concatenate using the ?||? the values selected from the database.

Alternately, if you are using PL/SQL, you can do ls_sql_string := 'CREATE TABLE FRED AS SELECT SYSDATE A_DATE FROM DUAL'; EXECUTE IMMEDIATE ls_sql_string;


# What SQLPlus command is used to format output from a select?

Level: low

Expected answer: This is best done with the COLUMN command.

# You want to group the following set of select returns, what can you group on? Max(sum_of_cost), min(sum_of_cost), count(item_no), item_no Level: Intermediate Expected answer: The only column that can be grouped on is the "item_no" column, the rest have aggregate functions associated with them.

# What special Oracle feature allows you to specify how the cost based system treats a SQL statement?

Level: Intermediate to high Expected answer: The COST based system allows the use of HINTs to control the optimizer path selection. If they can give some example hints such as FIRST ROWS, ALL ROWS, USING INDEX, STAR, even better.

# You want to determine the location of identical rows in a table before attempting to place a unique index on the table, how can this be done?

Level: High

Expected answer: Oracle tables always have one guaranteed unique column, the rowid column. If you use a min/max function against your rowid and then select against the proposed primary key you can squeeze out the rowids of the duplicate rows pretty quick. For example: select rowid from emp e where e.rowid > (select min(x.rowid) from emp x where x.emp_no = e.emp_no); In the situation where multiple columns make up the proposed key, they must all be used in the where clause.

# What is a Cartesian product?

Level: Low

Expected answer: A Cartesian product is the result of an unrestricted join of two or more tables. The result set of a three table Cartesian product will have x * y * z number of rows where x, y, z correspond to the number of rows in each table involved in the join.

# You are joining a local and a remote table, the network manager complains about the traffic involved, how can you reduce the network traffic?

Level: High

Expected answer: Push the processing of the remote data to the remote instance by using a view to pre-select the information for the join. This will result in only the data required for the join being sent across.

# What is the default ordering of an ORDER BY clause in a SELECT statement?

Level: Low

Expected answer: Ascending

# What is tkprof and how is it used?

Level: Intermediate to high Expected answer: The tkprof tool is a tuning tool used to determine cpu and execution times for SQL statements. You use it by first setting timed_statistics to true in the initialization file and then turning on tracing for either the entire database via the sql_trace parameter or for the session using the ALTER SESSION command. Once the trace file is generated you run the tkprof tool against the trace file and then look at the output from the tkprof tool. This can also be used to generate explain plan output.

# What is explain plan and how is it used?

Level: Intermediate to high

Expected answer: The EXPLAIN PLAN command is a tool to tune SQL statements. To use it you must have an explain_table generated in the user you are running the explain plan for. This is created using the utlxplan.sql script. Once the explain plan table exists you run the explain plan command giving as its argument the SQL statement to be explained. The explain_plan table is then queried to see the execution plan of the statement. Explain plans can also be run using tkprof.

# How do you set the number of lines on a page of output? The width?

Level: Low

Expected answer: The SET command in SQLPLUS is used to control the number of lines generated per page and the width of those lines, for example SET PAGESIZE 60 LINESIZE 80 will generate reports that are 60 lines long with a line width of 80 characters. The PAGESIZE and LINESIZE options can be shortened to PAGES and LINES.

# How do you prevent output from coming to the screen?

Level: Low

Expected answer: The SET option TERMOUT controls output to the screen. Setting TERMOUT OFF turns off screen output. This option can be shortened to TERM.

# How do you prevent Oracle from giving you informational messages during and after a SQL statement execution?

Level: Low

Expected answer: The SET options FEEDBACK and VERIFY can be set to OFF.

# How do you generate file output from SQL?

Level: Low

Expected answer: By use of the SPOOL command

Tuning Questions

# A tablespace has a table with 30 extents in it. Is this bad? Why or why not.

Level: Intermediate

Expected answer: Multiple extents in and of themselves aren?t bad. However if you also have chained rows this can hurt performance.

# How do you set up tablespaces during an Oracle installation?

Level: Low

Expected answer: You should always attempt to use the Oracle Flexible Architecture standard or another partitioning scheme to ensure proper separation of SYSTEM, ROLLBACK, REDO LOG, DATA, TEMPORARY and INDEX segments.

# You see multiple fragments in the SYSTEM tablespace, what should you check first?

Level: Low

Expected answer: Ensure that users don?t have the SYSTEM tablespace as their TEMPORARY or DEFAULT tablespace assignment by checking the DBA_USERS view.

# What are some indications that you need to increase the SHARED_POOL_SIZE parameter?

Level: Intermediate

Expected answer: Poor data dictionary or library cache hit ratios, getting error ORA-040# Another indication is steadily decreasing performance with all other tuning parameters the same.

# What is the general guideline for sizing db_block_size and db_multi_block_read for an application that does many full table scans?

Level: High

Expected answer: Oracle almost always reads in 64k chunks. The two should have a product equal to 64 or a multiple of #

# What is the fastest query method for a table?

Level: Intermediate Expected answer: Fetch by rowid

# Explain the use of TKPROF? What initialization parameter should be turned on to get full TKPROF output?

Level: High

Expected answer: The tkprof tool is a tuning tool used to determine cpu and execution times for SQL statements. You use it by first setting timed_statistics to true in the initialization file and then turning on tracing for either the entire database via the sql_trace parameter or for the session using the ALTER SESSION command. Once the trace file is generated you run the tkprof tool against the trace file and then look at the output from the tkprof tool. This can also be used to generate explain plan output.

# When looking at v$sysstat you see that sorts (disk) is high. Is this bad or good? If bad -How do you correct it?

Level: Intermediate

Expected answer: If you get excessive disk sorts this is bad. This indicates you need to tune the sort area parameters in the initialization files. The major sort are parameter is the SORT_AREA_SIZe parameter.

# When should you increase copy latches? What parameters control copy latches? Level: high Expected answer: When you get excessive contention for the copy latches as shown by the "redo copy" latch hit ratio. You can increase copy latches via the initialization parameter LOG_SIMULTANEOUS_COPIES to twice the number of CPUs on your system.

# Where can you get a list of all initialization parameters for your instance? How about an indication if they are default settings or have been changed?

Level: Low

Expected answer: You can look in the init.ora file for an indication of manually set parameters. For all parameters, their value and whether or not the current value is the default value, look in the v$parameter view.

# Describe hit ratio as it pertains to the database buffers. What is the difference between instantaneous and cumulative hit ratio and which should be used for tuning?

Level: Intermediate

Expected answer: The hit ratio is a measure of how many times the database was able to read a value from the buffers verses how many times it had to re-read a data value from the disks. A value greater than 80-90% is good, less could indicate problems. If you simply take the ratio of existing parameters this will be a cumulative value since the database started. If you do a comparison between pairs of readings based on some arbitrary time span, this is the instantaneous ratio for that time span. Generally speaking an instantaneous reading gives more valuable data since it will tell you what your instance is doing for the time it was generated over.

# Discuss row chaining, how does it happen? How can you reduce it? How do you correct it?

Level: high

Expected answer: Row chaining occurs when a VARCHAR2 value is updated and the length of the new value is longer than the old value and won?t fit in the remaining block space. This results in the row chaining to another block. It can be reduced by setting the storage parameters on the table to appropriate values. It can be corrected by export and import of the effected table.

# When looking at the estat events report you see that you are getting busy buffer waits. Is this bad? How can you find what is causing it?

Level: high

Expected answer: Buffer busy waits could indicate contention in redo, rollback or data blocks. You need to check the v$waitstat view to see what areas are causing the problem. The value of the "count" column tells where the problem is, the "class" column tells you with what. UNDO is rollback segments, DATA is data base buffers.

# If you see contention for library caches how can you fix it?

Level: Intermediate

Expected answer: Increase the size of the shared pool.

# If you see statistics that deal with "undo" what are they really talking about?

Level: Intermediate

Expected answer: Rollback segments and associated structures.

# If a tablespace has a default pctincrease of zero what will this cause (in relationship to the smon process)?

Level: High

Expected answer: The SMON process won?t automatically coalesce its free space fragments.

# If a tablespace shows excessive fragmentation what are some methods to defragment the tablespace? (#1,#2 and #3 only)

Level: High

Expected answer: In Oracle #0 to #2 The use of the 'alter session set events 'immediate trace name coalesce level ts#';? command is the easiest way to defragment contiguous free space fragmentation. The ts# parameter corresponds to the ts# value found in the ts$ SYS table. In version #3 the ?alter tablespace coalesce;? is best. If the free space isn?t contiguous then export, drop and import of the tablespace contents may be the only way to reclaim non-contiguous free space.

# How can you tell if a tablespace has excessive fragmentation?

Level: Intermediate

If a select against the dba_free_space table shows that the count of a tablespaces extents is greater than the count of its data files, then it is fragmented.

# You see the following on a status report: redo log space requests 23 redo log space wait time 0 Is this something to worry about? What if redo log space wait time is high? How can you fix this?

Level: Intermediate

Expected answer: Since the wait time is zero, no. If the wait time was high it might indicate a need for more or larger redo logs.

# What can cause a high value for recursive calls? How can this be fixed?

Level: High

Expected answer: A high value for recursive calls is cause by improper cursor usage, excessive dynamic space management actions, and or excessive statement re-parses. You need to determine the cause and correct it By either relinking applications to hold cursors, use proper space management techniques (proper storage and sizing) or ensure repeat queries are placed in packages for proper reuse.

# If you see a pin hit ratio of less than #8 in the estat library cache report is this a problem? If so, how do you fix it?

Level: Intermediate

Expected answer: This indicate that the shared pool may be too small. Increase the shared pool size.

# If you see the value for reloads is high in the estat library cache report is this a matter for concern?

Level: Intermediate

Expected answer: Yes, you should strive for zero reloads if possible. If you see excessive reloads then increase the size of the shared pool.

# You look at the dba_rollback_segs view and see that there is a large number of shrinks and they are of relatively small size, is this a problem? How can it be fixed if it is a problem?

Level: High

Expected answer: A large number of small shrinks indicates a need to increase the size of the rollback segment extents. Ideally you should have no shrinks or a small number of large shrinks. To fix this just increase the size of the extents and adjust optimal accordingly.

# You look at the dba_rollback_segs view and see that you have a large number of wraps is this a problem?

Level: High

Expected answer: A large number of wraps indicates that your extent size for your rollback segments are probably too small. Increase the size of your extents to reduce the number of wraps. You can look at the average transaction size in the same view to get the information on transaction size.

# In a system with an average of 40 concurrent users you get the following from a query on rollback extents: ROLLBACK CUR EXTENTS


--------------------------

R01 11 R02 8 R03 12 R04 9 SYSTEM 4 You have room for each to grow by 20 more extents each. Is there a problem? Should you take any action?

Level: Intermediate

Expected answer: No there is not a problem. You have 40 extents showing and an average of 40 concurrent users. Since there is plenty of room to grow no action is needed.

# You see multiple extents in the temporary tablespace. Is this a problem?

Level: Intermediate

Expected answer: As long as they are all the same size this isn?t a problem. In fact, it can even improve performance since Oracle won?t have to create a new extent when a user needs one.

Installation/Configuration

# Define OFA.

Level: Low

Expected answer: OFA stands for Optimal Flexible Architecture. It is a method of placing directories and files in an Oracle system so that you get the maximum flexibility for future tuning and file placement.

# How do you set up your tablespace on installation? Level: Low

Expected answer: The answer here should show an understanding of separation of redo and rollback, data and indexes and isolation os SYSTEM tables from other tables. An example would be to specify that at least 7 disks should be used for an Oracle installation so that you can place SYSTEM tablespace on one, redo logs on two (mirrored redo logs) the TEMPORARY tablespace on another, ROLLBACK tablespace on another and still have two for DATA and INDEXES. They should indicate how they will handle archive logs and exports as well. As long as they have a logical plan for combining or further separation more or less disks can be specified.

# What should be done prior to installing Oracle (for the OS and the disks)?

Level: Low

Expected Answer: adjust kernel parameters or OS tuning parameters in accordance with installation guide. Be sure enough contiguous disk space is available.

# You have installed Oracle and you are now setting up the actual instance. You have been waiting an hour for the initialization script to finish, what should you check first to determine if there is a problem?

Level: Intermediate to high

Expected Answer: Check to make sure that the archiver isn?t stuck. If archive logging is turned on during install a large number of logs will be created. This can fill up your archive log destination causing Oracle to stop to wait for more space.

# When configuring SQLNET on the server what files must be set up?

Level: Intermediate

Expected answer: INITIALIZATION file, TNSNAMES.ORA file, SQLNET.ORA file

# When configuring SQLNET on the client what files need to be set up?

Level: Intermediate

Expected answer: SQLNET.ORA, TNSNAMES.ORA

# What must be installed with ODBC on the client in order for it to work with Oracle?

Level: Intermediate

Expected answer: SQLNET and PROTOCOL (for example: TCPIP adapter) layers of the transport programs.

# You have just started a new instance with a large SGA on a busy existing server. Performance is terrible, what should you check for?

Level: Intermediate

Expected answer: The first thing to check with a large SGA is that it isn?t being swapped out.

# What OS user should be used for the first part of an Oracle installation (on UNIX)?

Level: low

Expected answer: You must use root first.

# When should the default values for Oracle initialization parameters be used as is?

Level: Low

Expected answer: Never

# How many control files should you have? Where should they be located?

Level: Low

Expected answer: At least 2 on separate disk spindles. Be sure they say on separate disks, not just file systems.

# How many redo logs should you have and how should they be configured for maximum recoverability?

Level: Intermediate

Expected answer: You should have at least three groups of two redo logs with the two logs each on a separate disk spindle (mirrored by Oracle). The redo logs should not be on raw devices on UNIX if it can be avoided.

# You have a simple application with no "hot" tables (i.e. uniform IO and access requirements). How many disks should you have assuming standard layout for SYSTEM, USER, TEMP and ROLLBACK tablespaces?

Expected answer: At least 7, see disk configuration answer above.

Data Modeler

# Describe third normal form?

Level: Low

Expected answer: Something like: In third normal form all attributes in an entity are related to the primary key and only to the primary key

# Is the following statement true or false: "All relational databases must be in third normal form" Why or why not? Level: Intermediate Expected answer: False. While 3NF is good for logical design most databases, if they have more than just a few tables, will not perform well using full 3NF. Usually some entities will be denormalized in the logical to physical transfer process.

# What is an ERD? Level: Low Expected answer: An ERD is an Entity-Relationship-Diagram. It is used to show the entities and relationships for a database logical model.

# Why are recursive relationships bad? How do you resolve them? Level: Intermediate A recursive relationship (one where a table relates to itself) is bad when it is a hard relationship (i.e. neither side is a "may" both are "must") as this can result in it not being possible to put in a top or perhaps a bottom of the table (for example in the EMPLOYEE table you couldn?t put in the PRESIDENT of the company because he has no boss, or the junior janitor because he has no subordinates). These type of relationships are usually resolved by adding a small intersection entity.

# What does a hard one-to-one relationship mean (one where the relationship on both ends is "must")? Level: Low to intermediate Expected answer: This means the two entities should probably be made into one entity.

# How should a many-to-many relationship be handled? Level: Intermediate Expected answer: By adding an intersection entity table

# What is an artificial (derived) primary key? When should an artificial (or derived) primary key be used? Level: Intermediate Expected answer: A derived key comes from a sequence. Usually it is used when a concatenated key becomes too cumbersome to use as a foreign key.

# When should you consider denormalization? Level: Intermediate Expected answer: Whenever performance analysis indicates it would be beneficial to do so without compromising data integrity.

Oracle Troubleshooting

# How can you determine if an Oracle instance is up from the operating system level? Level: Low Expected answer: There are several base Oracle processes that will be running on multi-user operating systems, these will be smon, pmon, dbwr and lgwr. Any answer that has them using their operating system process showing feature to check for these is acceptable. For example, on UNIX a ps -ef|grep pmon will show what instances are up.

# Users from the PC clients are getting messages indicating : Level: Low ORA-06114: (Cnct err, can't get err txt. See Servr Msgs & Codes Manual) What could the problem be? Expected answer: The instance name is probably incorrect in their connection string.

# Users from the PC clients are getting the following error stack: Level: Low ERROR: ORA-01034: ORACLE not available ORA-07318: smsget: open error when opening sgadef.dbf file. HP-UX Error: 2: No such file or directory What is the probable cause? Expected answer: The Oracle instance is shutdown that they are trying to access, restart the instance.

# How can you determine if the SQLNET process is running for SQLNET V1? How about V2? Level: Low Expected answer: For SQLNET V1 check for the existence of the orasrv process. You can use the command "tcpctl status" to get a full status of the V1 TCPIP server, other protocols have similar command formats. For SQLNET V2 check for the presence of the LISTENER process(s) or you can issue the command "lsnrctl status".

# What file will give you Oracle instance status information? Where is it located? Level: Low Expected answer: The alert.ora log. It is located in the directory specified by the background_dump_dest parameter in the v$parameter table.

# Users aren?t being allowed on the system. The following message is received: Level: Intermediate ORA-00257 archiver is stuck. Connect internal only, until freed What is the problem? Expected answer: The archive destination is probably full, backup the archive logs and remove them and the archiver will re-start.

# Where would you look to find out if a redo log was corrupted assuming you are using Oracle mirrored redo logs? Level: Intermediate Expected answer: There is no message that comes to the SQLDBA or SRVMGR programs during startup in this situation, you must check the alert.log file for this information.

# You attempt to add a datafile and get: Level: Intermediate ORA-01118: cannot add anymore datafiles: limit of 40 exceeded What is the problem and how can you fix it? Expected answer: When the database was created the db_files parameter in the initialization file was set to # You can shutdown and reset this to a higher value, up to the value of MAX_DATAFILES as specified at database creation. If the MAX_DATAFILES is set to low, you will have to rebuild the control file to increase it before proceeding.

# You look at your fragmentation report and see that smon hasn?t coalesced any of you tablespaces, even though you know several have large chunks of contiguous free extents. What is the problem? Level: High Expected answer: Check the dba_tablespaces view for the value of pct_increase for the tablespaces. If pct_increase is zero, smon will not coalesce their free space.

# Your users get the following error: Level: Intermediate ORA-00055 maximum number of DML locks exceeded What is the problem and how do you fix it? Expected answer: The number of DML Locks is set by the initialization parameter DML_LOCKS. If this value is set to low (which it is by default) you will get this error. Increase the value of DML_LOCKS. If you are sure that this is just a temporary problem, you can have them wait and then try again later and the error should clear.

# You get a call from you backup DBA while you are on vacation. He has corrupted all of the control files while playing with the ALTER DATABASE BACKUP CONTROLFILE command. What do you do?

Level: High Expected answer: As long as all datafiles are safe and he was successful with the BACKUP controlfile command you can do the following: CONNECT INTERNAL STARTUP MOUNT (Take any read-only tablespaces offline before next step ALTER DATABASE DATAFILE .... OFFLINE;) RECOVER DATABASE USING BACKUP CONTROLFILE ALTER DATABASE OPEN RESETLOGS; (bring read-only tablespaces back online) Shutdown and backup the system, then restart If they have a recent output file from the ALTER DATABASE BACKUP CONTROL FILE TO TRACE; command, they can use that to recover as well. If no backup of the control file is available then the following will be required: CONNECT INTERNAL STARTUP NOMOUNT CREATE CONTROL FILE .....; However, they will need to know all of the datafiles, logfiles, and settings for MAXLOGFILES, MAXLOGMEMBERS, MAXLOGHISTORY, MAXDATAFILES for the database to use the command.

 

# Explain the difference between a hot backup and a cold backup and the benefits associated with each.

A hot backup is basically taking a backup of the database while it is still up and running and it must be in archive log mode. A cold backup is taking a backup of the database while it is shut down and does not require being in archive log mode. The benefit of taking a hot backup is that the database is still available for use while the backup is occurring and you can recover the database to any point in time. The benefit of taking a cold backup is that it is typically easier to administer the backup and recovery process. In addition, since you are taking cold backups the database does not require being in archive log mode and thus there will be a slight performance gain as the database is not cutting archive logs to disk.

# You have just had to restore from backup and do not have any control files. How would you go about bringing up this database?

I would create a text based backup control file, stipulating where on disk all the data files where and then issue the recover command with the using backup control file clause.

# How do you switch from an init.ora file to a spfile?

Issue the create spfile from pfile command.

# Explain the difference between a data block, an extent and a segment.

A data block is the smallest unit of logical storage for a database object. As objects grow they take chunks of additional storage that are composed of contiguous data blocks. These groupings of contiguous data blocks are called extents. All the extents that an object takes when grouped together are considered the segment of the database object.

# Give two examples of how you might determine the structure of the table DEPT.

Use the describe command or use the dbms_metadata.get_ddl package.

# Where would you look for errors from the database engine?

In the alert log.

# Compare and contrast TRUNCATE and DELETE for a table.

Both the truncate and delete command have the desired outcome of getting rid of all the rows in a table. The difference between the two is that the truncate command is a DDL operation and just moves the high water mark and produces a now rollback. The delete command, on the other hand, is a DML operation, which will produce a rollback and thus take longer to complete.

# Give the reasoning behind using an index.

Faster access to data blocks in a table.

# Give the two types of tables involved in producing a star schema and the type of data they hold.

Fact tables and dimension tables. A fact table contains measurements while dimension tables will contain data that will help describe the fact tables.

# . What type of index should you use on a fact table?

A Bitmap index.

# Give two examples of referential integrity constraints.

A primary key and a foreign key.

# A table is classified as a parent table and you want to drop and re-create it. How would you do this without affecting the children tables?

Disable the foreign key constraint to the parent, drop the table, re-create the table, enable the foreign key constraint.

# Explain the difference between ARCHIVELOG mode and NOARCHIVELOG mode and the benefits and disadvantages to each.

ARCHIVELOG mode is a mode that you can put the database in for creating a backup of all transactions that have occurred in the database so that you can recover to any point in time. NOARCHIVELOG mode is basically the absence of ARCHIVELOG mode and has the disadvantage of not being able to recover to any point in time. NOARCHIVELOG mode does have the advantage of not having to write transactions to an archive log and thus increases the performance of the database slightly.

# What command would you use to create a backup control file?

Alter database backup control file to trace.

# Give the stages of instance startup to a usable state where normal users may access it.

STARTUP NOMOUNT - Instance startup

STARTUP MOUNT - The database is mounted

STARTUP OPEN - The database is opened

# What column differentiates the V$ views to the GV$ views and how?

The INST_ID column which indicates the instance in a RAC environment the information came from.

# How would you go about generating an EXPLAIN plan?

Create a plan table with utlxplan.sql.

Use the explain plan set statement_id = 'tst1' into plan_table for a SQL statement

Look at the explain plan with utlxplp.sql or utlxpls.sql

# How would you go about increasing the buffer cache hit ratio?

Use the buffer cache advisory over a given workload and then query the v$db_cache_advice table. If a change was necessary then I would use the alter system set db_cache_size command.

# Explain an ORA-01555

You get this error when you get a snapshot too old within rollback. It can usually be solved by increasing the undo retention or increasing the size of rollbacks. You should also look at the logic involved in the application getting the error message.

# Explain the difference between $ORACLE_HOME and $ORACLE_BASE.

ORACLE_BASE is the root directory for oracle. ORACLE_HOME located beneath ORACLE_BASE is where the oracle products reside.

Well, we have gone through the first 25 questions as I would answer them during an interview. Please feel free to add your personal experiences to the answers as it will always improve the process and add your particular touch. As always remember these are "core" DBA questions and not necessarily related to the Oracle options that you may encounter in some interviews. Take a close look at the requirements for any job and try to come up with questions that the interviewer may ask. Next time we will tackle the rest of the questions. Until then, good luck with the process.