McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Bachelor of Science in Computer Science FY (BSc CS) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Science in Information Technology SY (BSc IT) , Bachelor of Computer Applications (BCA) .
Chapters
| 601. |
Html document must always be saved with: |
| A. | .html |
| B. | .htm |
| C. | .doc |
| D. | both .html & .htm |
| Answer» D. both .html & .htm | |
| 602. |
How many levels of headings are in html: |
| A. | 2 |
| B. | 7 |
| C. | 6 |
| D. | 4 |
| Answer» C. 6 | |
| 603. |
The Java specification defines an application programming interface for communication between the Web server and the application program. |
| A. | servlet |
| B. | server |
| C. | program |
| D. | randomize |
| Answer» A. servlet | |
| 604. |
How many JDBC driver types does Sun define? |
| A. | one |
| B. | two |
| C. | three |
| D. | four |
| Answer» D. four | |
| 605. |
Which JDBC driver Type(s) can be used in either applet or servlet code? |
| A. | both type 1 and type 2 |
| B. | both type 1 and type 3 |
| C. | both type 3 and type 4 |
| D. | type 4 only |
| Answer» C. both type 3 and type 4 | |
| 606. |
What MySQL property is used to create a surrogate key in MySQL? |
| A. | unique |
| B. | sequence |
| C. | auto_increment |
| D. | none of the mentioned |
| Answer» C. auto_increment | |
| 607. |
A JSP is transformed into a(n): |
| A. | java applet |
| B. | java servlet |
| C. | either 1 or 2 above |
| D. | neither 1 nor 2 above |
| Answer» B. java servlet | |
| 608. |
What is bytecode? |
| A. | machine-specific code |
| B. | java code |
| C. | machine-independent code |
| D. | none of the mentioned |
| Answer» C. machine-independent code | |
| 609. |
Where is metadata stored in MySQL? |
| A. | in the mysql database metadata |
| B. | in the mysql database metasql |
| C. | in the mysql database mysql |
| D. | none of the mentioned |
| Answer» C. in the mysql database mysql | |
| 610. |
Which of the following is true for Seeheim model? |
| A. | presentation is abstracted from dialogue and application |
| B. | presentation and dialogue is abstracted from application |
| C. | presentation and application is abstracted from dialogue |
| D. | none of the mentioned |
| Answer» A. presentation is abstracted from dialogue and application | |
| 611. |
Which of the unit operation is used in Model view controller? |
| A. | is a decomposition |
| B. | part whole decomposition |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. part whole decomposition | |
| 612. |
Memory address refers to the successive memory words and the machine is called as |
| A. | word addressable |
| B. | byte addressable |
| C. | bit addressable |
| D. | terra byte addressable |
| Answer» A. word addressable | |
| 613. |
The layer, which provides a high-level view of data and actions on data. |
| A. | business logic |
| B. | presentation |
| C. | user interaction |
| D. | data access |
| Answer» A. business logic | |
| 614. |
The layer, which provides the interface between the business-logic layer and the underlying database. |
| A. | business logic |
| B. | presentation |
| C. | user interaction |
| D. | data access |
| Answer» D. data access | |
| 615. |
The system is widely used for mapping from Java objects to relations. |
| A. | hibernate |
| B. | object oriented |
| C. | objective |
| D. | none of the mentioned |
| Answer» A. hibernate | |
| 616. |
Which among the following are the functions that any system with a user interface must provide? |
| A. | presentation |
| B. | dialogue |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» A. presentation | |
| 617. |
Which of the following is the main task accomplished by the user? |
| A. | compose a document |
| B. | create a spread sheet |
| C. | send mail |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 618. |
What are the portability concerns founded in Seeheim model? |
| A. | replacing the presentation toolkit |
| B. | replacing the application toolkit |
| C. | replacing the dialogue toolkit |
| D. | replacing the presentation & application toolkit |
| Answer» D. replacing the presentation & application toolkit | |
| 619. |
Which schema object instructs Oracle to connect to a remotely access an object of a database? |
| A. | sequence |
| B. | remote link |
| C. | database link |
| D. | data link |
| Answer» D. data link | |
| 620. |
DML changes are |
| A. | insert |
| B. | update |
| C. | create |
| D. | both insert and update |
| Answer» D. both insert and update | |
| 621. |
Which of the following object types below cannot be replicated? |
| A. | data |
| B. | trigger |
| C. | view |
| D. | sequence |
| Answer» D. sequence | |
| 622. |
How to force a log switch? |
| A. | by using alter system log |
| B. | by using alter system switch logfile |
| C. | by using alter system switch logs |
| D. | by using alter sys logfiles |
| Answer» B. by using alter system switch logfile | |
| 623. |
The ORDER BY clause can only be used in |
| A. | select queries |
| B. | insert queries |
| C. | group by queries |
| D. | having queries |
| Answer» A. select queries | |
| 624. |
Which of the following rule below are categories of an index? |
| A. | column and functional |
| B. | multiple column and functional |
| C. | column, multiple column and functional |
| D. | none of the mentioned |
| Answer» A. column and functional | |
| 625. |
Which of the following queries are legal? |
| A. | select deptno, count(deptno) from emp group by ename; |
| B. | select deptno, count(deptno), job from emp group by deptno; |
| C. | select deptno, avg(sal) from emp; |
| D. | select deptno, avg(sal) from emp group by deptno; |
| Answer» D. select deptno, avg(sal) from emp group by deptno; | |
| 626. |
Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500? |
| A. | select job, sum(sal) from emp where sum(sal) > 2500 and comm is null; |
| B. | select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500; |
| C. | select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job; |
| D. | select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null; |
| Answer» B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500; | |
| 627. |
Which of the following data structure is not linear data structure? |
| A. | arrays |
| B. | linked lists |
| C. | arrays & linked lists |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 628. |
Which of the following data structure is linear data structure? |
| A. | trees |
| B. | graphs |
| C. | arrays |
| D. | none of the mentioned |
| Answer» C. arrays | |
| 629. |
The operation of processing each element in the list is known as |
| A. | sorting |
| B. | merging |
| C. | inserting |
| D. | traversal |
| Answer» D. traversal | |
| 630. |
Finding the location of the element with a given value is: |
| A. | traversal |
| B. | search |
| C. | sort |
| D. | none of the mentioned |
| Answer» B. search | |
| 631. |
Arrays are best data structures |
| A. | for relatively permanent collections of data |
| B. | for the size of the structure and the data in the structure are constantly changing |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» A. for relatively permanent collections of data | |
| 632. |
Linked lists are best suited |
| A. | for relatively permanent collections of data |
| B. | for the size of the structure and the data in the structure are constantly changing |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. for the size of the structure and the data in the structure are constantly changing | |
| 633. |
Each array declaration need not give, implicitly or explicitly, the information about |
| A. | the name of array |
| B. | the data type of array |
| C. | the first data from the set to be stored |
| D. | the index set of the array |
| Answer» C. the first data from the set to be stored | |
| 634. |
In attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
| A. | sql injection |
| B. | sql |
| C. | direct |
| D. | application |
| Answer» A. sql injection | |
| 635. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a attack. |
| A. | two-factor authentication |
| B. | cross-site request forgery |
| C. | cross-site scripting |
| D. | cross-site scoring scripting |
| Answer» C. cross-site scripting | |
| 636. |
is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
| A. | two-factor authentication |
| B. | cross-site request forgery |
| C. | cross-site scripting |
| D. | cross-site scoring scripting |
| Answer» B. cross-site request forgery | |
| 637. |
A single further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. |
| A. | openid |
| B. | sign-on system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» B. sign-on system | |
| 638. |
The is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on. |
| A. | openid |
| B. | sign-on system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» C. security assertion markup language (saml) | |
| 639. |
allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. |
| A. | openid |
| B. | single-site system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» D. virtual private database (vpd) | |
| 640. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism. |
| A. | row-level authorization |
| B. | column-level authentication |
| C. | row-type authentication |
| D. | authorization security |
| Answer» A. row-level authorization | |
| 641. |
is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
| A. | encryption |
| B. | data mining |
| C. | internet security |
| D. | architectural security |
| Answer» A. encryption | |
| 642. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without |
| A. | encryption key |
| B. | decryption key |
| C. | primary key |
| D. | authorised key |
| Answer» B. decryption key | |
| 643. |
Which of the following is not a property of good encryption technique? |
| A. | relatively simple for authorized users to encrypt and decrypt data |
| B. | decryption key is extremely difficult for an intruder to determine |
| C. | encryption depends on a parameter of the algorithm called the encryption key |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 644. |
In which of the following encryption key is used to encrypt and decrypt the data? |
| A. | public key |
| B. | private key |
| C. | symmetric key |
| D. | asymmetric key |
| Answer» C. symmetric key | |
| 645. |
Encryption of small values, such as identifiers or names, is made complicated by the possibility of |
| A. | dictionary attacks |
| B. | database attacks |
| C. | minor attacks |
| D. | random attacks |
| Answer» A. dictionary attacks | |
| 646. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it? |
| A. | round key algorithm |
| B. | public key algorithm |
| C. | advanced encryption standard |
| D. | asymmetric key algorithm |
| Answer» C. advanced encryption standard | |
| 647. |
Which of the following requires no password travel across the internet? |
| A. | readable system |
| B. | manipulation system |
| C. | challenge–response system |
| D. | response system |
| Answer» C. challenge–response system | |
| 648. |
The is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware. |
| A. | cache |
| B. | disk |
| C. | main memory |
| D. | flash memory |
| Answer» A. cache | |
| 649. |
Which of the following stores several gigabytes of data but usually lost when power failure? |
| A. | flash memory |
| B. | disk |
| C. | main memory |
| D. | secondary memory |
| Answer» C. main memory | |
| 650. |
The flash memory storage used are |
| A. | nor flash |
| B. | or flash |
| C. | and flash |
| D. | all of the mentioned |
| Answer» A. nor flash | |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.