McqMate
Chapters
601. |
Html document must always be saved with: |
A. | .html |
B. | .htm |
C. | .doc |
D. | both .html & .htm |
Answer» D. both .html & .htm |
602. |
How many levels of headings are in html: |
A. | 2 |
B. | 7 |
C. | 6 |
D. | 4 |
Answer» C. 6 |
603. |
The Java specification defines an application programming interface for communication between the Web server and the application program. |
A. | servlet |
B. | server |
C. | program |
D. | randomize |
Answer» A. servlet |
604. |
How many JDBC driver types does Sun define? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» D. four |
605. |
Which JDBC driver Type(s) can be used in either applet or servlet code? |
A. | both type 1 and type 2 |
B. | both type 1 and type 3 |
C. | both type 3 and type 4 |
D. | type 4 only |
Answer» C. both type 3 and type 4 |
606. |
What MySQL property is used to create a surrogate key in MySQL? |
A. | unique |
B. | sequence |
C. | auto_increment |
D. | none of the mentioned |
Answer» C. auto_increment |
607. |
A JSP is transformed into a(n): |
A. | java applet |
B. | java servlet |
C. | either 1 or 2 above |
D. | neither 1 nor 2 above |
Answer» B. java servlet |
608. |
What is bytecode? |
A. | machine-specific code |
B. | java code |
C. | machine-independent code |
D. | none of the mentioned |
Answer» C. machine-independent code |
609. |
Where is metadata stored in MySQL? |
A. | in the mysql database metadata |
B. | in the mysql database metasql |
C. | in the mysql database mysql |
D. | none of the mentioned |
Answer» C. in the mysql database mysql |
610. |
Which of the following is true for Seeheim model? |
A. | presentation is abstracted from dialogue and application |
B. | presentation and dialogue is abstracted from application |
C. | presentation and application is abstracted from dialogue |
D. | none of the mentioned |
Answer» A. presentation is abstracted from dialogue and application |
611. |
Which of the unit operation is used in Model view controller? |
A. | is a decomposition |
B. | part whole decomposition |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» B. part whole decomposition |
612. |
Memory address refers to the successive memory words and the machine is called as |
A. | word addressable |
B. | byte addressable |
C. | bit addressable |
D. | terra byte addressable |
Answer» A. word addressable |
613. |
The layer, which provides a high-level view of data and actions on data. |
A. | business logic |
B. | presentation |
C. | user interaction |
D. | data access |
Answer» A. business logic |
614. |
The layer, which provides the interface between the business-logic layer and the underlying database. |
A. | business logic |
B. | presentation |
C. | user interaction |
D. | data access |
Answer» D. data access |
615. |
The system is widely used for mapping from Java objects to relations. |
A. | hibernate |
B. | object oriented |
C. | objective |
D. | none of the mentioned |
Answer» A. hibernate |
616. |
Which among the following are the functions that any system with a user interface must provide? |
A. | presentation |
B. | dialogue |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» A. presentation |
617. |
Which of the following is the main task accomplished by the user? |
A. | compose a document |
B. | create a spread sheet |
C. | send mail |
D. | all of the mentioned |
Answer» D. all of the mentioned |
618. |
What are the portability concerns founded in Seeheim model? |
A. | replacing the presentation toolkit |
B. | replacing the application toolkit |
C. | replacing the dialogue toolkit |
D. | replacing the presentation & application toolkit |
Answer» D. replacing the presentation & application toolkit |
619. |
Which schema object instructs Oracle to connect to a remotely access an object of a database? |
A. | sequence |
B. | remote link |
C. | database link |
D. | data link |
Answer» D. data link |
620. |
DML changes are |
A. | insert |
B. | update |
C. | create |
D. | both insert and update |
Answer» D. both insert and update |
621. |
Which of the following object types below cannot be replicated? |
A. | data |
B. | trigger |
C. | view |
D. | sequence |
Answer» D. sequence |
622. |
How to force a log switch? |
A. | by using alter system log |
B. | by using alter system switch logfile |
C. | by using alter system switch logs |
D. | by using alter sys logfiles |
Answer» B. by using alter system switch logfile |
623. |
The ORDER BY clause can only be used in |
A. | select queries |
B. | insert queries |
C. | group by queries |
D. | having queries |
Answer» A. select queries |
624. |
Which of the following rule below are categories of an index? |
A. | column and functional |
B. | multiple column and functional |
C. | column, multiple column and functional |
D. | none of the mentioned |
Answer» A. column and functional |
625. |
Which of the following queries are legal? |
A. | select deptno, count(deptno) from emp group by ename; |
B. | select deptno, count(deptno), job from emp group by deptno; |
C. | select deptno, avg(sal) from emp; |
D. | select deptno, avg(sal) from emp group by deptno; |
Answer» D. select deptno, avg(sal) from emp group by deptno; |
626. |
Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500? |
A. | select job, sum(sal) from emp where sum(sal) > 2500 and comm is null; |
B. | select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500; |
C. | select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job; |
D. | select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null; |
Answer» B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500; |
627. |
Which of the following data structure is not linear data structure? |
A. | arrays |
B. | linked lists |
C. | arrays & linked lists |
D. | none of the mentioned |
Answer» D. none of the mentioned |
628. |
Which of the following data structure is linear data structure? |
A. | trees |
B. | graphs |
C. | arrays |
D. | none of the mentioned |
Answer» C. arrays |
629. |
The operation of processing each element in the list is known as |
A. | sorting |
B. | merging |
C. | inserting |
D. | traversal |
Answer» D. traversal |
630. |
Finding the location of the element with a given value is: |
A. | traversal |
B. | search |
C. | sort |
D. | none of the mentioned |
Answer» B. search |
631. |
Arrays are best data structures |
A. | for relatively permanent collections of data |
B. | for the size of the structure and the data in the structure are constantly changing |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» A. for relatively permanent collections of data |
632. |
Linked lists are best suited |
A. | for relatively permanent collections of data |
B. | for the size of the structure and the data in the structure are constantly changing |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» B. for the size of the structure and the data in the structure are constantly changing |
633. |
Each array declaration need not give, implicitly or explicitly, the information about |
A. | the name of array |
B. | the data type of array |
C. | the first data from the set to be stored |
D. | the index set of the array |
Answer» C. the first data from the set to be stored |
634. |
In attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
A. | sql injection |
B. | sql |
C. | direct |
D. | application |
Answer» A. sql injection |
635. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a attack. |
A. | two-factor authentication |
B. | cross-site request forgery |
C. | cross-site scripting |
D. | cross-site scoring scripting |
Answer» C. cross-site scripting |
636. |
is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
A. | two-factor authentication |
B. | cross-site request forgery |
C. | cross-site scripting |
D. | cross-site scoring scripting |
Answer» B. cross-site request forgery |
637. |
A single further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. |
A. | openid |
B. | sign-on system |
C. | security assertion markup language (saml) |
D. | virtual private database (vpd) |
Answer» B. sign-on system |
638. |
The is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on. |
A. | openid |
B. | sign-on system |
C. | security assertion markup language (saml) |
D. | virtual private database (vpd) |
Answer» C. security assertion markup language (saml) |
639. |
allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. |
A. | openid |
B. | single-site system |
C. | security assertion markup language (saml) |
D. | virtual private database (vpd) |
Answer» D. virtual private database (vpd) |
640. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism. |
A. | row-level authorization |
B. | column-level authentication |
C. | row-type authentication |
D. | authorization security |
Answer» A. row-level authorization |
641. |
is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
A. | encryption |
B. | data mining |
C. | internet security |
D. | architectural security |
Answer» A. encryption |
642. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without |
A. | encryption key |
B. | decryption key |
C. | primary key |
D. | authorised key |
Answer» B. decryption key |
643. |
Which of the following is not a property of good encryption technique? |
A. | relatively simple for authorized users to encrypt and decrypt data |
B. | decryption key is extremely difficult for an intruder to determine |
C. | encryption depends on a parameter of the algorithm called the encryption key |
D. | none of the mentioned |
Answer» D. none of the mentioned |
644. |
In which of the following encryption key is used to encrypt and decrypt the data? |
A. | public key |
B. | private key |
C. | symmetric key |
D. | asymmetric key |
Answer» C. symmetric key |
645. |
Encryption of small values, such as identifiers or names, is made complicated by the possibility of |
A. | dictionary attacks |
B. | database attacks |
C. | minor attacks |
D. | random attacks |
Answer» A. dictionary attacks |
646. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it? |
A. | round key algorithm |
B. | public key algorithm |
C. | advanced encryption standard |
D. | asymmetric key algorithm |
Answer» C. advanced encryption standard |
647. |
Which of the following requires no password travel across the internet? |
A. | readable system |
B. | manipulation system |
C. | challenge–response system |
D. | response system |
Answer» C. challenge–response system |
648. |
The is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware. |
A. | cache |
B. | disk |
C. | main memory |
D. | flash memory |
Answer» A. cache |
649. |
Which of the following stores several gigabytes of data but usually lost when power failure? |
A. | flash memory |
B. | disk |
C. | main memory |
D. | secondary memory |
Answer» C. main memory |
650. |
The flash memory storage used are |
A. | nor flash |
B. | or flash |
C. | and flash |
D. | all of the mentioned |
Answer» A. nor flash |
651. |
is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory. |
A. | flash memory |
B. | disk |
C. | main memory |
D. | secondary memory |
Answer» A. flash memory |
652. |
The primary medium for the long-term online storage of data is the where the entire database is stored on magnetic disk. |
A. | semiconductor memory |
B. | magnetic disks |
C. | compact disks |
D. | magnetic tapes |
Answer» B. magnetic disks |
653. |
Optical disk systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand. |
A. | tape storage |
B. | jukebox |
C. | flash memory |
D. | all of the mentioned |
Answer» B. jukebox |
654. |
There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called disks. |
A. | write-once, read-many (worm) |
B. | cd-r |
C. | dvd-w |
D. | cd-rom |
Answer» A. write-once, read-many (worm) |
655. |
In magnetic disk stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material. |
A. | read–write head |
B. | read-assemble head |
C. | head–disk assemblies |
D. | disk arm |
Answer» D. disk arm |
656. |
A is the smallest unit of information that can be read from or written to the disk. |
A. | track |
B. | spindle |
C. | sector |
D. | platter |
Answer» C. sector |
657. |
The disk controller uses at each sector to ensure that the data is not corrupted on data retrieval. |
A. | checksum |
B. | unit drive |
C. | read disk |
D. | readsum |
Answer» A. checksum |
658. |
is the time from when a read or write request is issued to when data transfer begins. |
A. | access time |
B. | average seek time |
C. | seek time |
D. | rotational latency time |
Answer» A. access time |
659. |
The time for repositioning the arm is called the and it increases with the distance that the arm must move. |
A. | access time |
B. | average seek time |
C. | seek time |
D. | rotational latency time |
Answer» C. seek time |
660. |
is around one-half of the maximum seek time. |
A. | access time |
B. | average seek time |
C. | seek time |
D. | rotational latency time |
Answer» B. average seek time |
661. |
Hybrid disk drives are hard-disk systems that combine magnetic storage with a smaller amount of flash memory, which is used as a cache for frequently accessed data. |
A. | hybrid drivers |
B. | disk drivers |
C. | hybrid disk drivers |
D. | all of the mentioned |
Answer» B. disk drivers |
662. |
Optical disk technology uses |
A. | helical scanning |
B. | dat |
C. | a laser beam |
D. | raid |
Answer» D. raid |
663. |
With multiple disks, we can improve the transfer rate as well by data across multiple disks. |
A. | striping |
B. | dividing |
C. | mirroring |
D. | dividing |
Answer» A. striping |
664. |
partitions data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk. |
A. | block interleaved parity |
B. | block interleaved distributed parity |
C. | bit parity |
D. | bit interleaved parity |
Answer» B. block interleaved distributed parity |
665. |
The RAID level which mirroring is done along with stripping is |
A. | raid 1+0 |
B. | raid 0 |
C. | raid 2 |
D. | both raid 1+0 and raid 0 |
Answer» D. both raid 1+0 and raid 0 |
666. |
Where performance and reliability are both important, RAID level is used. |
A. | 0 |
B. | 1 |
C. | 2 |
D. | 0+1 |
Answer» D. 0+1 |
667. |
is popular for applications such as storage of log files in a database system since it offers the best write performance. |
A. | raid level 1 |
B. | raid level 2 |
C. | raid level 0 |
D. | raid level 3 |
Answer» A. raid level 1 |
668. |
which increases the number of I/O operations needed to write a single logical block, pays a significant time penalty in terms of write performance. |
A. | raid level 1 |
B. | raid level 2 |
C. | raid level 5 |
D. | raid level 3 |
Answer» A. raid level 1 |
669. |
Tertiary storage is built with : |
A. | a lot of money |
B. | unremovable media |
C. | removable media |
D. | secondary storage |
Answer» C. removable media |
670. |
Operating system is responsible for |
A. | disk initialization |
B. | booting from disk |
C. | bad-bock recovery |
D. | all of the mentioned |
Answer» D. all of the mentioned |
671. |
A typical tape drive is a typical disk drive. |
A. | more expensive than |
B. | cheaper than |
C. | of the same cost as |
D. | none of the mentioned |
Answer» A. more expensive than |
672. |
During recovery from a failure |
A. | each pair of physical block is examined |
B. | specified pair of physical block is examined |
C. | first pair of physical block is examined |
D. | none of the mentioned |
Answer» A. each pair of physical block is examined |
673. |
A magneto-optic disk is : |
A. | primary storage |
B. | secondary storage |
C. | tertiary storage |
D. | none of the mentioned |
Answer» C. tertiary storage |
674. |
Which of the following are the process of selecting the data storage and data access characteristics of the database? |
A. | logical database design |
B. | physical database design |
C. | testing and performance tuning |
D. | evaluation and selecting |
Answer» B. physical database design |
675. |
The replacement of a bad block generally is not totally automatic because |
A. | data in bad block cannot be replaced |
B. | data in bad block is usually lost |
C. | bad block does not contain any data |
D. | none of the mentioned |
Answer» B. data in bad block is usually lost |
676. |
Which of the following is the oldest database model? |
A. | relational |
B. | hierarchical |
C. | physical |
D. | network |
Answer» D. network |
677. |
The surface area of a tape is the surface area of a disk. |
A. | much lesser than |
B. | much larger than |
C. | equal to |
D. | none of the mentioned |
Answer» B. much larger than |
678. |
Which one of the following is not a secondary storage? |
A. | magnetic disks |
B. | magnetic tapes |
C. | ram |
D. | none of the mentioned |
Answer» C. ram |
679. |
Which level of RAID refers to disk mirroring with block striping? |
A. | raid level 1 |
B. | raid level 2 |
C. | raid level 0 |
D. | raid level 3 |
Answer» A. raid level 1 |
680. |
A unit of storage that can store one or more records in a hash file organization is denoted as |
A. | buckets |
B. | disk pages |
C. | blocks |
D. | nodes |
Answer» A. buckets |
681. |
The file organization which allows us to read records that would satisfy the join condition by using one block read is |
A. | heap file organization |
B. | sequential file organization |
C. | clustering file organization |
D. | hash file organization |
Answer» C. clustering file organization |
682. |
What are the correct features of a distributed database? |
A. | is always connected to the internet |
B. | always requires more than three machines |
C. | users see the data in one global schema. |
D. | have to specify the physical location of the data when an update is done |
Answer» C. users see the data in one global schema. |
683. |
Each tablespace in an Oracle database consists of one or more files called |
A. | files |
B. | name space |
C. | datafiles |
D. | pfile |
Answer» C. datafiles |
684. |
The management information system (MIS) structure with one main computer system is called a |
A. | hierarchical mis structure |
B. | distributed mis structure |
C. | centralized mis structure |
D. | decentralized mis structure |
Answer» C. centralized mis structure |
685. |
Choose the RDBMS which supports full fledged client server application development |
A. | dbase v |
B. | oracle 7.1 |
C. | foxpro 2.1 |
D. | ingress |
Answer» B. oracle 7.1 |
686. |
One approach to standardization storing of data? |
A. | mis |
B. | structured programming |
C. | codasyl specification |
D. | none of the mentioned |
Answer» C. codasyl specification |
687. |
The highest level in the hierarchy of data organization is called |
A. | data bank |
B. | data base |
C. | data file |
D. | data record |
Answer» B. data base |
688. |
An audit trail |
A. | is used to make backup copies |
B. | is the recorded history of operations performed on a file |
C. | can be used to restore lost information |
D. | none of the mentioned |
Answer» B. is the recorded history of operations performed on a file |
689. |
Large collection of files are called |
A. | fields |
B. | records |
C. | database |
D. | sectors |
Answer» C. database |
690. |
Which of the following is not true of the traditional approach to information processing |
A. | there is common sharing of data among the various applications |
B. | it is file oriented |
C. | programs are dependent on the file |
D. | it is inflexible |
Answer» A. there is common sharing of data among the various applications |
691. |
Which of these is not a feature of Hierarchical model? |
A. | organizes the data in tree-like structure |
B. | parent node can have any number of child nodes |
C. | root node does not have any parent |
D. | child node can have any number of parent nodes |
Answer» D. child node can have any number of parent nodes |
692. |
Which of these data models is an extension of the relational data model? |
A. | object-oriented data model |
B. | object-relational data model |
C. | semi structured data model |
D. | none of the mentioned |
Answer» B. object-relational data model |
693. |
The information about data in a database is called |
A. | metadata |
B. | hyper data |
C. | tera data |
D. | none of the mentioned |
Answer» A. metadata |
694. |
A data dictionary is a special file that contains? |
A. | the names of all fields in all files |
B. | the data types of all fields in all files |
C. | the widths of all fields in all files |
D. | all of the mentioned |
Answer» D. all of the mentioned |
695. |
The DBMS acts as an interface between what two components of an enterprise-class database system? |
A. | database application and the database |
B. | data and the database |
C. | the user and the database application |
D. | database application and sql |
Answer» A. database application and the database |
696. |
A relational database system needs to maintain data about the relations, such as the schema of the relations. This is called |
A. | metadata |
B. | catalog |
C. | log |
D. | dictionary |
Answer» A. metadata |
697. |
Relational schemas and other metadata about relations are stored in a structure called the |
A. | metadata |
B. | catalog |
C. | log |
D. | data dictionary |
Answer» D. data dictionary |
698. |
is the collection of memory structures and Oracle background processes that operates against an Oracle database. |
A. | database |
B. | instance |
C. | tablespace |
D. | segment |
Answer» B. instance |
699. |
A is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes. |
A. | tablespace |
B. | segments |
C. | extents |
D. | blocks |
Answer» A. tablespace |
700. |
A tablespace is further broken down into |
A. | tablespace |
B. | segments |
C. | extents |
D. | blocks |
Answer» B. segments |
Done Reading?