Identify two methods for immunizing PL/SQL code against SQL injection attacks. (Choose two.)
View the Exhibit and examine the output.Which statement is an inference from the output?
You created a procedure as follows:CREATE OR REPLACE PROCEDURE query_prod(twhr VARCHAR2) IS stmt VARCHAR2(100); pname VARCHAR2(20);BEGIN stmt:='SELECT product_name FROM products WHERE product_id=:2';EXECUTE IMMEDIATE stmt INTO pname USING twhr;DBMS_OUTPUT.PUT_LINE(pname); END; /View the Exhibit to examine the structure of PRODUCTS table. Which statement is true about the procedure?
Match the following external C procedure components with their descriptions:1 External procedure a. a process that starts the extproc process2 Shared library b. a session-specific process that executes the external procedure3 Alias library c. schema object that represents the operating system (OS) shared library4 The extproc process d. operating system file that stores the external procedure5 Listener process e. a unit of code written in C
The database instance was started up with the following initializationparameter values:MEMORY_TARGET = 500M RESULT_CACHE_MODE = FORCE RESULT_CACHE_MAX_SIZE = 0After the database startup, to enable the result cache, you issued the following command:SQL> ALTER SYSTEM SET result_cache_max_size = 2M SCOPE = MEMORY;Which is the effect of this command?
Examine the structure of the PRODUCTS table. Name Null? TypePRODUCT_ID NOT NULL NUMBER(6) PRODUCT_NAME VARCHAR2(50) CATEGORY_ID NUMBER(2) SUPPLIER_ID NUMBER(6) LIST_PRICE NUMBER(8,2)View the Exhibit and examine the PL/SQL block. On execution, the PL/SQL block generates the following error: ORA-01001: invalid cursor What could be the reason?