Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is a valid encryption technique?(a) Parallel key encryption(b) Public key encryption(c) Systematic key encryption(d) All of the mentionedThe question was asked in semester exam.The question is from Application Security in chapter Application Design and Development of RDBMS

Answer»

The correct option is (b) PUBLIC key ENCRYPTION

Explanation: Out of the given options, only public key encryption is a valid approach to an encryption technique. In this, there are two different KEYS to encrypt the data.

2.

A log of all changes to the application data is called as __________(a) Audit trail(b) Audit log(c) Audit lead(d) Data logI got this question by my college director while I was bunking the class.Origin of the question is Application Security topic in division Application Design and Development of RDBMS

Answer»

Correct CHOICE is (a) Audit trail

The explanation: A LOG of all CHANGES to the application data is called as audit trail. This helps us maintain SECURITY as it tracks all the BREACHES on the system.

3.

What is the standard for exchanging authentication and authorization information between two different security domains?(a) SABM(b) STML(c) SPTA(d) SAMLThe question was asked in an interview for job.The query is from Application Security topic in portion Application Design and Development of RDBMS

Answer»

Correct choice is (d) SAML

The EXPLANATION is: SAML (SECURITY assertion Markup Language) is the standard for exchanging authentication and AUTHORIZATION INFORMATION between two DIFFERENT security domains. This provides a cross-organization sign-on.

4.

What are phishing attacks?(a) Users are forced to use a second server which causes the attack(b) Users are forced to divert to a fake site where the attack takes place(c) Users are fooled by similar GUI and data is extracted from them.(d) None of the mentionedI had been asked this question in a national level competition.The origin of the question is Application Security in chapter Application Design and Development of RDBMS

Answer»

Correct option is (c) USERS are fooled by similar GUI and data is extracted from them.

For EXPLANATION: Phishing attacks are those attacks in which users are fooled by similar GUI and data is extracted from them. The FAKE site is then used to OBTAIN the data from the user.

5.

What are man in the middle attacks?(a) Users are forced to use a second server which causes the attack(b) Users are forced to divert to a fake site where the attack takes place(c) Users are fooled by similar GUI and data is extracted from them.(d) None of the mentionedThe question was asked by my school principal while I was bunking the class.The query is from Application Security in portion Application Design and Development of RDBMS

Answer»

The correct option is (b) Users are forced to DIVERT to a fake site where the ATTACK takes place

Best explanation: Man in the middle ATTACKS are those attacks in which the users are forced to divert to a fake site where the attack takes place. The fake site is then used to obtain the DATA from the USER.

6.

The system where two independent pieces of data are used to identify a user is called as ______(a) Two system authentication(b) ID password authentication(c) Two factor authentication(d) Multi data authenticationThe question was posed to me in an interview for job.This interesting question is from Application Security topic in division Application Design and Development of RDBMS

Answer»

Correct choice is (c) Two factor AUTHENTICATION

Best EXPLANATION: The system where two INDEPENDENT pieces of data are used to identify a USER is called as two-factor authentication. The two FACTORS should not share a common vulnerability.

7.

State true or false: Password leakage is a major security problem(a) True(b) FalseI have been asked this question in an online quiz.My doubt is from Application Security in chapter Application Design and Development of RDBMS

Answer» CORRECT option is (a) True

To explain: PASSWORD leakage is a MAJOR security PROBLEM because the leaked password grants access to malicious VISITORS.
8.

The URL of the page that had the link that the user clicked to access the page is called as _____(a) Source(b) Linker(c) Leaker(d) ReferrerI had been asked this question by my college director while I was bunking the class.This interesting question is from Application Security in portion Application Design and Development of RDBMS

Answer»

Correct OPTION is (d) Referrer

For explanation I would SAY: The URL of the page that had the link that the user clicked to access the page is called as referrer. The HTTP protocol ALLOWS the server to check the referrer.

9.

An attack on a website that stores and displays text to a user is known as ______ attack(a) SQL attack(b) XSS attack(c) XRP attack(d) None of the mentionedThe question was asked by my school principal while I was bunking the class.I need to ask this question from Application Security in chapter Application Design and Development of RDBMS

Answer»

Right CHOICE is (b) XSS attack

The EXPLANATION is: An attack on a website that STORES and displays TEXT to a user is known as XSS attack. It is called as CROSS site scripting attack.

10.

If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________(a) SQL attacks(b) SQL injection attacks(c) SQL usage attack(d) SQL destroyer attackThe question was posed to me during an interview.Origin of the question is Application Security topic in chapter Application Design and Development of RDBMS

Answer» CORRECT option is (B) SQL injection attacks

To explain: If an attacker manages to get an application to EXECUTE an SQL query created by the attacker, then such attacks are called as SQL injection attacks.
11.

Which of the following methods is used to reduce overhead?(a) Connection pooling(b) Parallel Processing(c) Caching Query Results at the server(d) All of the mentionedThe question was asked during a job interview.My question comes from Application Architectures in section Application Design and Development of RDBMS

Answer»

Right choice is (d) All of the mentioned

For explanation: To REDUCE OVERHEAD, any of the following METHODS can be USED. Connection pooling, Parallel processing or caching query results at the server. Caching query results at the server enables to reduce the number of database ACCESSES every time a similar request is sent.

12.

What are report generators?(a) They are the tools to generate human readable reports from a database(b) They are the tools that generate reports on the statistics of the database usage(c) They are the tools that prevent database querying and instead they generate pie charts and graphs(d) None of the mentionedThe question was asked in unit test.I'm obligated to ask this question of Application Architectures topic in chapter Application Design and Development of RDBMS

Answer»

The correct option is (a) They are the TOOLS to generate human readable REPORTS from a database

The explanation: REPORT generators are the tools to generate human readable reports from a database. They INTEGRATE QUERYING the database with the creation of formatted text and summary charts.

13.

Which of the following is not a web application development framework feature?(a) An object oriented model(b) A declarative way of specifying a form with validation constraints(c) Creating mass servers for effective handling of data(d) A template scripting systemThe question was asked during an interview.I'm obligated to ask this question of Application Architectures in division Application Design and Development of RDBMS

Answer»

Correct ANSWER is (C) Creating mass SERVERS for effective handling of data

For EXPLANATION I would say: Creating mass servers for effective handling of data is not a part of the web application development FRAMEWORK feature.

14.

Which of the following features does Rapid Application Development possess?(a) Provide a library of functions to generate UI elements(b) Provide drag and drop features in a n IDE(c) Auto generation of code for the user interface from a declarative specification(d) All of the mentionedThe question was posed to me in an interview for internship.This is a very interesting question from Application Architectures in section Application Design and Development of RDBMS

Answer»

Right answer is (d) All of the mentioned

For EXPLANATION I WOULD say: The main features of RAPID APPLICATION development are to provide a library of functions for GUI development, to provide drag and drop features in an IDE, Auto-generation of code for the user interface from a declarative specification.

15.

What is the full form of JSON?(a) JavaScript Object Native(b) JavaScript Object Notation(c) JavaScript Object Negation(d) Java Object NotationI had been asked this question in an internship interview.This is a very interesting question from Application Architectures topic in division Application Design and Development of RDBMS

Answer» CORRECT OPTION is (b) JAVASCRIPT Object Notation

The explanation: JSON – JavaScript Object Notation. This is an ENCODING for javascript objects.
16.

State true or false: The code implementing the actions in the business logic layer ensures that business rules are followed(a) True(b) FalseThis question was addressed to me in an online interview.I'd like to ask this question from Application Architectures topic in division Application Design and Development of RDBMS

Answer»

Right answer is (a) True

Explanation: The code implementing the actions in the BUSINESS logic LAYER ensures that business rules are followed. For EXAMPLE a STUDENT can only enroll in a course if the prerequisites are COMPLETED.

17.

What are workflows in a business logic layer?(a) They describe how a particular task that involves servers is handled(b) They describe how multiple tasks involving a single participant is handled(c) They describe how a particular task involving multiple participants is handled.(d) None of the mentionedThis question was addressed to me in semester exam.My query is from Application Architectures in division Application Design and Development of RDBMS

Answer»

Right choice is (c) They describe how a PARTICULAR task involving multiple participants is HANDLED.

Easiest explanation: BUSINESS logic includes WORKFLOWS. Workflows in a business logic layer describe how a particular task involving multiple participants is handled.

18.

The _________ layer provides the interface between the business logic layer and the underlying database(a) Business-logic layer(b) Data access layer(c) Data transfer layer(d) Business manager layerThis question was addressed to me in a national level competition.This key question is from Application Architectures topic in section Application Design and Development of RDBMS

Answer»

Right ANSWER is (b) Data access layer

The best explanation: The data-access layer PROVIDES the interface between the BUSINESS LOGIC layer and the underlying database. The data access layer provides the mapping from the object oriented data MODEL to the relational model.

19.

The ___________ provides a high level view of data and actions on data(a) Business-logic layer(b) Data access layer(c) Data transfer layer(d) Business manager layerThis question was posed to me at a job interview.I'm obligated to ask this question of Application Architectures topic in division Application Design and Development of RDBMS

Answer»

Correct ANSWER is (a) Business-logic layer

For explanation: The Business-logic layer provides a high level VIEW of DATA and ACTIONS on data. An object oriented approach is USED to code this layer.

20.

Which of the following is true regarding the model-view- controller architecture?(a) The model corresponds to the business logic layer(b) The view defines the presentation of data(c) The controller receives events, executes actions on the model and returns a view(d) All of the mentionedThis question was addressed to me in exam.This interesting question is from Application Architectures in division Application Design and Development of RDBMS

Answer»

The correct OPTION is (d) All of the mentioned

The explanation: In the model-view-controller architecture, the model corresponds to the business logic layer, the view DEFINES the way data is PRESENTED and the controller RECEIVES EVENTS, executes actions on the model and returns a view.

21.

State true or false: Executing programs at the client side is slower than executing programs on the server(a) True(b) FalseThis question was posed to me during an internship interview.This key question is from Servlets and JSP topic in portion Application Design and Development of RDBMS

Answer»

The correct ANSWER is (b) False

The explanation is: EXECUTING programs on the client SIDE is FASTER than executing programs on the server which includes sending every interaction to the server.

22.

What are client side scripting languages?(a) The languages designed to be executed on the client’s web browser(b) The languages designed to be executed on the server(c) The languages designed to reduce the amount of data costs incurred at the client end(d) The languages designed to be executed in multiple computers paralleled with each otherThe question was asked in quiz.I want to ask this question from Servlets and JSP in chapter Application Design and Development of RDBMS

Answer»

Correct choice is (a) The languages DESIGNED to be executed on the client’s web browser

For explanation: Client side SCRIPTING languages are those languages that are designed to be executed on the client’s web browser. These languages provide constructs that can be EMBEDDED with an HTML document.

23.

What are scripting languages?(a) The programming languages that pre decide the web page content(b) The programming languages that are simpler and offer same protection(c) The programming languages that trade off simplicity for protection.(d) None of the mentionedI got this question in an interview for job.I would like to ask this question from Servlets and JSP topic in division Application Design and Development of RDBMS

Answer»

Correct choice is (b) The PROGRAMMING LANGUAGES that are simpler and offer same protection

Best explanation: Scripting languages are those languages that are simpler with enriched user INTERFACE features but offer the same protection as that of JAVA.

24.

Javascript is used to create dynamic webpages using technologies that are collectively called ________(a) Ajax(b) Thor(c) Dynamo(d) AchillesI had been asked this question at a job interview.My doubt stems from Servlets and JSP in chapter Application Design and Development of RDBMS

Answer»

The correct OPTION is (a) Ajax

The best I can explain: Javascript is used to create dynamic WEBPAGES using TECHNOLOGIES that are collectively called Ajax.

25.

While using Javascript, the browser parses the HTML code into a tree like structure defined by a standard called ________(a) DOS(b) DOD(c) DOM(d) DONThe question was posed to me in an interview.This interesting question is from Servlets and JSP topic in portion Application Design and Development of RDBMS

Answer»

Right choice is (c) DOM

The explanation is: While using Javascript, the BROWSER PARSES the HTML code into a TREE like structure defined by a standard called Document Object Model (DOM). Javascript code can modify the tree structure to carry out CERTAIN operations.

26.

What is the full form of JSP?(a) Java servlet program(b) Java server pages(c) Java server pages(d) Java server programI had been asked this question during an interview.The doubt is from Servlets and JSP in division Application Design and Development of RDBMS

Answer»

The CORRECT option is (B) Java server PAGES

Best explanation: The full form of JSP is Java Server Pages. It is a scripting language that allows HTML programmers to mix static HTML with dynamically generated HTML.

27.

Which of the following application servers do not provide built in support for servlets?(a) Tomcat server(b) Glassfish(c) JBoss(d) None of the mentionedThe question was asked during an internship interview.My question is from Servlets and JSP in chapter Application Design and Development of RDBMS

Answer»

The CORRECT option is (d) None of the MENTIONED

Explanation: All of the mentioned application servers provide built in support for servlets. Glassfish and TOMCAT are the most PROMINENTLY used application servers.

28.

Which of these functions is not a part of the servlet lifecycle(a) Checking if an instance of servlet exists or not(b) Invoking the service method of the servlet(c) Shutting down the servlet(d) Pausing the servlet for a given period of time.I had been asked this question in an online quiz.This key question is from Servlets and JSP topic in division Application Design and Development of RDBMS

Answer»

Right choice is (d) Pausing the servlet for a GIVEN PERIOD of time.

Explanation: Pausing the servlet for a given AMOUNT of time is not a part of the servlet lifecycle. A servlet can be checked, INVOKED and destroyed but it cannot be paused.

29.

State true or false: Servlets are used to generate dynamic responses to HTTP requests.(a) True(b) FalseI had been asked this question by my school teacher while I was bunking the class.Asked question is from Servlets and JSP topic in section Application Design and Development of RDBMS

Answer»

The correct OPTION is (a) True

To EXPLAIN I would SAY: Servlets are used to generate dynamic responses to HTTP requests. The task of a SERVLET is to process a request dynamically.

30.

The _______ specification defines an application programming interface for communication between the server and the application program(a) Java Servlet(b) JDBC(c) Java Applet(d) Java SwingThe question was posed to me in examination.This question is from Servlets and JSP topic in division Application Design and Development of RDBMS

Answer»

The CORRECT option is (a) JAVA Servlet

To elaborate: The java servlet specification defines an application programming interface for communication between the server and the application program. The HTTPSERVLET CLASS in Java implements the servlet API specification.

31.

What is the function of the cascading style sheet(a) Allows us to edit the HTML document(b) It is an IDE that allows us to write HTML codes more efficiently(c) It allows us to use the same style on multiple HTML documents(d) It acts as an intermediary to provide a variety of information servicesI have been asked this question in an international level competition.My enquiry is from Web Fundamentals topic in section Application Design and Development of RDBMS

Answer»

The correct choice is (c) It allows US to use the same style on multiple HTML documents

The EXPLANATION is: The cascading style SHEET allows us to use the same style sheet on multiple HTML documents allowing us to maintain a distinctive but uniform LOOK on all the pages of a Web site.

32.

Which of the following functions are done by a web server?(a) Accept requests from a web browser(b) Sends back results in HTML(c) Executes programs with arguments supplied by the user(d) All of the mentionedI had been asked this question in homework.Question is from Web Fundamentals in division Application Design and Development of RDBMS

Answer»

Correct answer is (d) All of the mentioned

Best explanation: A WEB server accepts requests from a web BROWSER and sends back results in HTML. The most IMPORTANT FEATURE of a web server is to execute programs with arguments SUPPLIED by the user.

33.

What is the full form of CGI?(a) Common graphics interface(b) Common gateway interface(c) Common gateway internet(d) Common gateway informationI had been asked this question during an online interview.This question is from Web Fundamentals topic in division Application Design and Development of RDBMS

Answer»

Correct option is (b) Common gateway INTERFACE

Explanation: The full form of CGI is Common Gateway Interface. This defines how a web SERVER communicates with an application PROGRAM.

34.

State true or false: HTTP is connectionless(a) True(b) FalseI had been asked this question in homework.This interesting question is from Web Fundamentals in portion Application Design and Development of RDBMS

Answer»

The correct OPTION is (a) True

Explanation: HTTP is connectionless because most COMPUTER have a limit on the simultaneous connections they can ACCOMMODATE. If this limit is exceeded then access is denied to further USERS.

35.

The extra information of a site maintained at the client end is called as _______(a) Cookie(b) Password(c) History(d) SessionsI had been asked this question in examination.My doubt stems from Web Fundamentals topic in section Application Design and Development of RDBMS

Answer»

Correct choice is (a) COOKIE

To explain: The extra INFORMATION of a site maintained at the client end is CALLED as cookie. It is a small piece of text containing identifying information with an ASSOCIATED name.

36.

What is the use of CGI?(a) It specifies the path of data transfer(b) It specifies how the server communicates with the application programs(c) It charts out error handling procedures in case an error arises(d) None of the mentionedI have been asked this question in a job interview.This interesting question is from Web Fundamentals in chapter Application Design and Development of RDBMS

Answer»

Correct choice is (b) It SPECIFIES how the SERVER COMMUNICATES with the application PROGRAMS

The BEST explanation: CGI specifies how the server communicates with application programs. The application program communicates with a database server in order to get data.

37.

A ______ is a program running on the server which accepts requests from a browser and sends HTML documents(a) Web server(b) Web transmitter(c) Web intermediate(d) Web multitaskerI got this question in an international level competition.My question is from Web Fundamentals in division Application Design and Development of RDBMS

Answer» RIGHT choice is (a) WEB server

The explanation: A Web Server is a program running on the server which accepts requests from a browser and sends HTML DOCUMENTS. The browser and the web server communicate via HTTP.
38.

What is the full form of HTTP?(a) Hyper Text Trial Program(b) Hyper Text Transfer Protocol(c) Hyper Text Technology Protocol(d) Hyper Text Trial ProtocolThis question was posed to me during an interview for a job.This key question is from Web Fundamentals in section Application Design and Development of RDBMS

Answer»

Right option is (b) HYPER Text Transfer Protocol

To ELABORATE: HTTP – Hyper Text Transfer Protocol. This is aprotocol for transferring HTML DOCUMENTS.

39.

A ______ is a globally unique name for every document that can be accessed on the Web(a) ID(b) UCL(c) URL(d) UMLThis question was addressed to me in a national level competition.Asked question is from Web Fundamentals in division Application Design and Development of RDBMS

Answer»

The correct option is (c) URL

Best explanation: A URL (Uniform RESOURCE locator) is a globally unique NAME for every DOCUMENT that can be accessed on the Web.

40.

Browsers use a standardized syntax called?(a) TCP/IP(b) HTML(c) XML(d) JavaThe question was asked in my homework.My enquiry is from Web Fundamentals topic in division Application Design and Development of RDBMS

Answer»

Right ANSWER is (B) HTML

The EXPLANATION is: The Hypertext Markup LANGUAGE [HTML] is the standardized SYNTAX used by the browsers which supports formatted information as well as forms based interfaces.