InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Html code contains:(a) Tags(b) Attributes(c) Elements(d) All of the mentionedI have been asked this question in homework.Question is taken from Web Fundamentals in section Database Programming Techniques of Database Management |
|
Answer» RIGHT ANSWER is (d) All of the mentioned Easy EXPLANATION - <> are tags,SIZE is a attribute. |
|
| 2. |
Which of the following is not true about HTML ?(a) …(b) (c) …(d) This question was posed to me at a job interview.My doubt is from Web Fundamentals topic in division Database Programming Techniques of Database Management |
|
Answer» The correct ANSWER is (b) <META…./> |
|
| 3. |
A __________ is a program running on the server machine, which accepts requests from a Web browser and sends back results in the form of HTML documents.(a) HTML(b) HTTP(c) Web Server(d) Web browserI have been asked this question in an interview for internship.Origin of the question is Web Fundamentals in division Database Programming Techniques of Database Management |
|
Answer» Correct answer is (c) Web SERVER |
|
| 4. |
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.(a) OpenID(b) Sign-on system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)The question was asked by my school teacher while I was bunking the class.The origin of the question is Application Security in chapter Database Programming Techniques of Database Management |
|
Answer» RIGHT choice is (b) Sign-on system Easiest EXPLANATION - Once the user logged in at one SITE, he does not have to enter his user name and password at other SITES that use the same single sign-on SERVICE. |
|
| 5. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks.(a) Radiant(b) Cross attack(c) scripting(d) Man-in-the-middleThis question was posed to me during an interview.I'd like to ask this question from Application Security topic in portion Database Programming Techniques of Database Management |
|
Answer» The correct answer is (d) Man-in-the-middle |
|
| 6. |
Which of the following data structure is not linear data structure?(a) Arrays(b) Linked lists(c) Arrays & Linked lists(d) None of the mentionedThis question was posed to me in an interview for internship.My question is based upon Application Performance in chapter Database Programming Techniques of Database Management |
|
Answer» Correct ANSWER is (d) NONE of the mentioned |
|
| 7. |
The doGet() method in the example extracts values of the parameter’s type and number by using __________(a) request.getParameter()(b) request.setParameter()(c) responce.getParameter()(d) responce.getAttribute()I have been asked this question in homework.The query is from Servlets and JSP in division Database Programming Techniques of Database Management |
|
Answer» The CORRECT OPTION is (a) request.getParameter() |
|
| 8. |
The Java __________ specification defines an application programming interface for communication between the Web server and the application program.(a) Servlet(b) Server(c) Program(d) RandomizeI have been asked this question in a national level competition.I need to ask this question from Servlets and JSP topic in chapter Database Programming Techniques of Database Management |
|
Answer» Correct option is (a) Servlet |
|
| 9. |
The application program typically communicates with a database server, through ___________ or other protocols, in order to get or store data.(a) JDBC(b) ODBC(c) All of the mentioned(d) None of the mentionedThis question was addressed to me in quiz.My question comes from Web Fundamentals topic in portion Database Programming Techniques of Database Management |
|
Answer» RIGHT choice is (c) All of the mentioned Explanation: The common GATEWAY interface (CGI) standard DEFINES how the Web SERVER COMMUNICATES with application programs. |
|
| 10. |
Which of the following criterion is NOT written using the proper syntax?(a) “Haris”(b) |
|
Answer» Right CHOICE is (c) NO VALUE |
|
| 11. |
What is the purpose of SMON background process?(a) Performs crash recovery when a failed instance starts up again(b) Performs recovery when a user process fails(c) Writes redo log entries to disk(d) None of the mentionedI had been asked this question in quiz.My question comes from Rapid Application Development in portion Database Programming Techniques of Database Management |
|
Answer» The correct choice is (a) PERFORMS CRASH RECOVERY when a failed instance starts up again |
|
| 12. |
Which schema object instructs Oracle to connect to a remotely access an object of a database?(a) Sequence(b) Remote link(c) Database link(d) Data linkThe question was posed to me in quiz.The doubt is from Rapid Application Development topic in portion Database Programming Techniques of Database Management |
|
Answer» The correct option is (d) DATA link |
|
| 13. |
DML changes are(a) Insert(b) Update(c) Create(d) Both Insert and UpdateThe question was posed to me in semester exam.Question is from Rapid Application Development in portion Database Programming Techniques of Database Management |
|
Answer» CORRECT option is (d) Both INSERT and Update Best EXPLANATION: CREATE is a DDL operation. |
|
| 14. |
The ______________ layer, which provides the interface between the business-logic layer and the underlying database.(a) Business logic(b) Presentation(c) User interaction(d) Data accessThis question was posed to me in homework.This interesting question is from Application Architectures topic in portion Database Programming Techniques of Database Management |
|
Answer» The correct ANSWER is (d) Data access |
|
| 15. |
Which of the following is true for Seeheim model?(a) Presentation is abstracted from dialogue and Application(b) Presentation and Dialogue is abstracted from Application(c) Presentation and Application is abstracted from Dialogue(d) None of the mentionedThis question was addressed to me in a job interview.My question is from Application Architectures topic in portion Database Programming Techniques of Database Management |
|
Answer» The CORRECT option is (a) PRESENTATION is ABSTRACTED from dialogue and APPLICATION |
|
| 16. |
What MySQL property is used to create a surrogate key in MySQL?(a) UNIQUE(b) SEQUENCE(c) AUTO_INCREMENT(d) None of the mentionedThe question was posed to me in an internship interview.The doubt is from Servlets and JSP topic in section Database Programming Techniques of Database Management |
|
Answer» RIGHT ANSWER is (c) AUTO_INCREMENT Easiest EXPLANATION - A surrogate key in a database is a unique identifier for either an ENTITY in the modeled world or an object in the database. |
|
| 17. |
The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.(a) OpenID(b) Sign-on system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)The question was asked in semester exam.This key question is from Application Security topic in division Database Programming Techniques of Database Management |
|
Answer» Correct answer is (c) SECURITY ASSERTION Markup Language (SAML) |
|
| 18. |
How many JDBC driver types does Sun define?(a) One(b) Two(c) Three(d) FourThis question was posed to me in an interview.My enquiry is from Servlets and JSP topic in section Database Programming Techniques of Database Management |
|
Answer» Correct CHOICE is (d) Four |
|
| 19. |
Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?(a) Not true, the message can also be decrypted with the Public Key(b) A so called “one way function with back door” is applied for the encryption(c) The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key(d) The encrypted message contains the function for decryption which identifies the Private KeyI got this question in an internship interview.This key question is from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management |
|
Answer» Right ANSWER is (b) A so called “one way function with back DOOR” is applied for the encryption |
|
| 20. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingI have been asked this question in examination.My query is from Application Security in chapter Database Programming Techniques of Database Management |
|
Answer» The CORRECT option is (c) Cross-site scripting |
|
| 21. |
What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?(a) VBScript only(b) Jscript only(c) Java only(d) All of the mentionedI have been asked this question in an online interview.This key question is from Servlets and JSP topic in section Database Programming Techniques of Database Management |
|
Answer» The CORRECT answer is (c) Java only |
|
| 22. |
Html document must always be saved with:(a) .html(b) .htm(c) .doc(d) Both .html & .htmThis question was posed to me in unit test.Origin of the question is Web Fundamentals topic in division Database Programming Techniques of Database Management |
|
Answer» CORRECT choice is (d) Both .HTML & .htm The best EXPLANATION: .doc is used only for the word document format. |
|
| 23. |
Which is the largest disadvantage of symmetric Encryption?(a) More complex and therefore more time-consuming calculations(b) Problem of the secure transmission of the Secret Key(c) Less secure encryption function(d) Isn’t used any moreI have been asked this question in exam.I need to ask this question from Encryption and Its Applications in portion Database Programming Techniques of Database Management |
|
Answer» Right choice is (b) Problem of the secure transmission of the SECRET Key |
|
| 24. |
Which of the following data structure is linear data structure?(a) Trees(b) Graphs(c) Arrays(d) None of the mentionedThe question was posed to me during an online exam.Origin of the question is Application Performance in section Database Programming Techniques of Database Management |
|
Answer» Correct OPTION is (C) Arrays |
|
| 25. |
The ORDER BY clause can only be used in(a) SELECT queries(b) INSERT queries(c) GROUP BY queries(d) HAVING queriesThis question was addressed to me in semester exam.Asked question is from Rapid Application Development topic in chapter Database Programming Techniques of Database Management |
|
Answer» The CORRECT OPTION is (a) SELECT queries |
|
| 26. |
Memory address refers to the successive memory words and the machine is called as _______________(a) word addressable(b) byte addressable(c) bit addressable(d) Terra byte addressableI had been asked this question during an online interview.The doubt is from Application Architectures topic in portion Database Programming Techniques of Database Management |
|
Answer» RIGHT ANSWER is (a) word addressable For explanation: Part WHOLE decomposition is applied to MVC. |
|
| 27. |
The indirect change of the values of a variable in one module by another module is called(a) Internal change(b) Inter-module change(c) Side effect(d) Side-module updateThis question was addressed to me during an online exam.This intriguing question originated from Application Performance topic in chapter Database Programming Techniques of Database Management |
|
Answer» CORRECT OPTION is (c) Side effect Easy explanation - The module of the search TREE and the FLOW is DIRECTED by its values. |
|
| 28. |
What is bytecode?(a) Machine-specific code(b) Java code(c) Machine-independent code(d) None of the mentionedI got this question in a job interview.The origin of the question is Servlets and JSP topic in section Database Programming Techniques of Database Management |
|
Answer» The correct CHOICE is (c) Machine-independent code |
|
| 29. |
Arrays are best data structures(a) For relatively permanent collections of data(b) For the size of the structure and the data in the structure are constantly changing(c) All of the mentioned(d) None of the mentionedI got this question in examination.Question is taken from Application Performance topic in section Database Programming Techniques of Database Management |
|
Answer» The CORRECT choice is (a) For relatively permanent COLLECTIONS of data |
|
| 30. |
How to force a log switch?(a) By using ALTER SYSTEM LOG(b) By using ALTER SYSTEM SWITCH LOGFILE(c) By using ALTER SYSTEM SWITCH LOGS(d) By using ALTER SYS LOGFILESThis question was posed to me in my homework.The query is from Rapid Application Development topic in portion Database Programming Techniques of Database Management |
|
Answer» Right ANSWER is (b) By using ALTER SYSTEM SWITCH LOGFILE |
|
| 31. |
Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________(a) Dictionary attacks(b) Database attacks(c) Minor attacks(d) Random attacksI had been asked this question in homework.This interesting question is from Encryption and Its Applications topic in division Database Programming Techniques of Database Management |
|
Answer» Correct choice is (a) Dictionary attacks |
|
| 32. |
Which of the following object types below cannot be replicated?(a) Data(b) Trigger(c) View(d) SequenceThis question was posed to me by my school teacher while I was bunking the class.My doubt is from Rapid Application Development in division Database Programming Techniques of Database Management |
|
Answer» The correct answer is (d) SEQUENCE |
|
| 33. |
Linked lists are best suited(a) For relatively permanent collections of data(b) For the size of the structure and the data in the structure are constantly changing(c) All of the mentioned(d) None of the mentionedThe question was asked in a job interview.I'd like to ask this question from Application Performance in portion Database Programming Techniques of Database Management |
|
Answer» Right option is (b) For the SIZE of the structure and the data in the structure are constantly changing |
|
| 34. |
_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingI have been asked this question in an online quiz.The query is from Application Security in division Database Programming Techniques of Database Management |
|
Answer» RIGHT option is (b) Cross-site request forgery Best explanation: Cross-site request forgery, also KNOWN as a one-click ATTACK or session RIDING and abbreviated as CSRF or XSRF. |
|
| 35. |
Many applications use _________________ where two independent factors are used to identify a user.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingThis question was posed to me during an interview for a job.My question is taken from Application Security in section Database Programming Techniques of Database Management |
|
Answer» RIGHT OPTION is (a) TWO-factor authentication Easiest explanation - The two factors should not share a common VULNERABILITY. |
|
| 36. |
The _____________ system is widely used for mapping from Java objects to relations.(a) Hibernate(b) Object oriented(c) Objective(d) None of the mentionedI had been asked this question in exam.The origin of the question is Application Architectures topic in portion Database Programming Techniques of Database Management |
|
Answer» The correct ANSWER is (a) HIBERNATE |
|
| 37. |
HTTP defines two ways in which values entered by a user at the browser can be sent to the Web server. The _____ method encodes the values as part of the URL.(a) Post(b) Get(c) Read(d) ArgumentThis question was posed to me in an international level competition.This intriguing question originated from Web Fundamentals in division Database Programming Techniques of Database Management |
|
Answer» CORRECT option is (b) Get To explain: For example, if the Google search page used a form with an input parameter named Q with the get METHOD, and the user typed in the string “silberschatz” and submitted the form, the browser would request the following URL from the Web server: http://www.google.com/search?q=silberschatz. |
|
| 38. |
http://www.google.com/search?q=talkjarvis In the above URL which one is the argument which is used for processing of the URL?(a) google(b) google.com(c) search(d) q=talkjarvisThis question was addressed to me in an online interview.The above asked question is from Web Fundamentals in chapter Database Programming Techniques of Database Management |
|
Answer» CORRECT option is (d) q=talkjarvis Best explanation: Argument is ALWAYS PLACED after ? SYMBOL. |
|
| 39. |
Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge?(a) Type 1(b) Type 2(c) Type 3(d) Type 4I had been asked this question by my college director while I was bunking the class.I need to ask this question from Servlets and JSP topic in section Database Programming Techniques of Database Management |
|
Answer» The correct OPTION is (a) Type 1 |
|
| 40. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?(a) Round key algorithm(b) Public key algorithm(c) Advanced Encryption Standard(d) Asymmetric key algorithmThe question was posed to me in an interview for job.I want to ask this question from Encryption and Its Applications in portion Database Programming Techniques of Database Management |
|
Answer» CORRECT choice is (c) Advanced Encryption STANDARD To explain: The standard is based on the RIJNDAEL algorithm. |
|
| 41. |
___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.(a) Encryption(b) Data mining(c) Internet Security(d) Architectural securityI have been asked this question during a job interview.This interesting question is from Encryption and Its Applications in chapter Database Programming Techniques of Database Management |
|
Answer» The correct option is (a) ENCRYPTION |
|
| 42. |
_______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.(a) OpenID(b) Single-site system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)I had been asked this question during an interview.Asked question is from Application Security in portion Database Programming Techniques of Database Management |
|
Answer» RIGHT OPTION is (d) Virtual PRIVATE Database (VPD) Explanation: Some database systems provide mechanisms for fine-grained AUTHORIZATION. |
|
| 43. |
Each array declaration need not give, implicitly or explicitly, the information about(a) The name of array(b) The data type of array(c) The first data from the set to be stored(d) The index set of the arrayI got this question during an interview.The query is from Application Performance topic in section Database Programming Techniques of Database Management |
|
Answer» The CORRECT answer is (c) The FIRST data from the set to be stored |
|
| 44. |
Which of the unit operation is used in Model view controller?(a) Is a Decomposition(b) Part Whole Decomposition(c) All of the mentioned(d) None of the mentionedThe question was posed to me in semester exam.The doubt is from Application Architectures topic in section Database Programming Techniques of Database Management |
|
Answer» The CORRECT choice is (b) Part WHOLE DECOMPOSITION |
|
| 45. |
A JSP is transformed into a(n):(a) Java applet(b) Java servlet(c) Either 1 or 2 above(d) Neither 1 nor 2 aboveI had been asked this question in unit test.The query is from Servlets and JSP in chapter Database Programming Techniques of Database Management |
|
Answer» The correct option is (b) JAVA servlet |
|
| 46. |
This extra information is usually maintained in the form of a _________ at the client.(a) Cookie(b) History(c) Remainder(d) None of the mentionedThe question was posed to me during an internship interview.Enquiry is from Web Fundamentals in chapter Database Programming Techniques of Database Management |
|
Answer» CORRECT option is (a) Cookie The BEST I can explain: A cookie is simply a small piece of text containing identifying INFORMATION and with an ASSOCIATED NAME. |
|
| 47. |
Which of the following is a valid uniform resource locator?(a) http://www.acm.org/sigmod(b) www.google.com(c) www.ann.in(d) http:/www.acm.org/sigmod/The question was posed to me in a job interview.The doubt is from Web Fundamentals topic in division Database Programming Techniques of Database Management |
|
Answer» Correct option is (a) http://www.acm.org/sigmod |
|
| 48. |
In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.(a) SQL injection(b) SQL(c) Direct(d) ApplicationI have been asked this question in final exam.The doubt is from Application Security in chapter Database Programming Techniques of Database Management |
|
Answer» Correct OPTION is (a) SQL injection |
|
| 49. |
The operation of processing each element in the list is known as(a) Sorting(b) Merging(c) Inserting(d) TraversalThis question was posed to me in unit test.Enquiry is from Application Performance in division Database Programming Techniques of Database Management |
|
Answer» Correct CHOICE is (d) Traversal |
|
| 50. |
Which of the following queries are legal?(a) SELECT deptno, count(deptno) FROM emp GROUP BY ename;(b) SELECT deptno, count(deptno), job FROM emp GROUP BY deptno;(c) SELECT deptno, avg(sal) FROM emp;(d) SELECT deptno, avg(sal) FROM emp GROUP BY deptno;The question was posed to me in final exam.I need to ask this question from Rapid Application Development topic in division Database Programming Techniques of Database Management |
|
Answer» The correct CHOICE is (d) SELECT deptno, avg(sal) FROM EMP GROUP BY deptno; |
|