Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Html code contains:(a) Tags(b) Attributes(c) Elements(d) All of the mentionedI have been asked this question in homework.Question is taken from Web Fundamentals in section Database Programming Techniques of Database Management

Answer» RIGHT ANSWER is (d) All of the mentioned

Easy EXPLANATION - <> are tags,SIZE is a attribute.
2.

Which of the following is not true about HTML ?(a) …(b) (c) …(d) This question was posed to me at a job interview.My doubt is from Web Fundamentals topic in division Database Programming Techniques of Database Management

Answer»

The correct ANSWER is (b) <META…./>

The EXPLANATION is: Meta DATA is the data about data which is INCLUDED in the meta data tag.

3.

A __________ is a program running on the server machine, which accepts requests from a Web browser and sends back results in the form of HTML documents.(a) HTML(b) HTTP(c) Web Server(d) Web browserI have been asked this question in an interview for internship.Origin of the question is Web Fundamentals in division Database Programming Techniques of Database Management

Answer»

Correct answer is (c) Web SERVER

The best EXPLANATION: The browser and Web server communicate VIA HTTP. Web servers provide powerful features, beyond the SIMPLE transfer of documents.

4.

A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.(a) OpenID(b) Sign-on system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)The question was asked by my school teacher while I was bunking the class.The origin of the question is Application Security in chapter Database Programming Techniques of Database Management

Answer» RIGHT choice is (b) Sign-on system

Easiest EXPLANATION - Once the user logged in at one SITE, he does not have to enter his user name and password at other SITES that use the same single sign-on SERVICE.
5.

Even with two-factor authentication, users may still be vulnerable to_____________attacks.(a) Radiant(b) Cross attack(c) scripting(d) Man-in-the-middleThis question was posed to me during an interview.I'd like to ask this question from Application Security topic in portion Database Programming Techniques of Database Management

Answer»

The correct answer is (d) Man-in-the-middle

Easiest explanation - In such ATTACKS, a user attempting to connect to the application is DIVERTED to a fake Web site, which accepts the password from the user, and USES it immediately to AUTHENTICATE to the original application.

6.

Which of the following data structure is not linear data structure?(a) Arrays(b) Linked lists(c) Arrays & Linked lists(d) None of the mentionedThis question was posed to me in an interview for internship.My question is based upon Application Performance in chapter Database Programming Techniques of Database Management

Answer»

Correct ANSWER is (d) NONE of the mentioned

To explain: Both array and LINKED lists are in DATA structure concepts.

7.

The doGet() method in the example extracts values of the parameter’s type and number by using __________(a) request.getParameter()(b) request.setParameter()(c) responce.getParameter()(d) responce.getAttribute()I have been asked this question in homework.The query is from Servlets and JSP in division Database Programming Techniques of Database Management

Answer»

The CORRECT OPTION is (a) request.getParameter()

The BEST explanation: These methods uses these values to run a QUERY against a database.

8.

The Java __________ specification defines an application programming interface for communication between the Web server and the application program.(a) Servlet(b) Server(c) Program(d) RandomizeI have been asked this question in a national level competition.I need to ask this question from Servlets and JSP topic in chapter Database Programming Techniques of Database Management

Answer»

Correct option is (a) Servlet

The explanation is: SERVLETS are COMMONLY used to generate DYNAMIC responses to HTTP REQUESTS.

9.

The application program typically communicates with a database server, through ___________ or other protocols, in order to get or store data.(a) JDBC(b) ODBC(c) All of the mentioned(d) None of the mentionedThis question was addressed to me in quiz.My question comes from Web Fundamentals topic in portion Database Programming Techniques of Database Management

Answer» RIGHT choice is (c) All of the mentioned

Explanation: The common GATEWAY interface (CGI) standard DEFINES how the Web SERVER COMMUNICATES with application programs.
10.

Which of the following criterion is NOT written using the proper syntax?(a) “Haris”(b)

Answer»

Right CHOICE is (c) NO VALUE

Easiest EXPLANATION - NO VALUE cannot be specified.

11.

What is the purpose of SMON background process?(a) Performs crash recovery when a failed instance starts up again(b) Performs recovery when a user process fails(c) Writes redo log entries to disk(d) None of the mentionedI had been asked this question in quiz.My question comes from Rapid Application Development in portion Database Programming Techniques of Database Management

Answer»

The correct choice is (a) PERFORMS CRASH RECOVERY when a failed instance starts up again

The EXPLANATION is: SMON (System MONITOR) is an Oracle background process created when you start a database instance.

12.

Which schema object instructs Oracle to connect to a remotely access an object of a database?(a) Sequence(b) Remote link(c) Database link(d) Data linkThe question was posed to me in quiz.The doubt is from Rapid Application Development topic in portion Database Programming Techniques of Database Management

Answer»

The correct option is (d) DATA link

The best EXPLANATION: A database link (DBlink) is a DEFINITION of how to establish a connection from ONE Oracle database to another.

13.

DML changes are(a) Insert(b) Update(c) Create(d) Both Insert and UpdateThe question was posed to me in semester exam.Question is from Rapid Application Development in portion Database Programming Techniques of Database Management

Answer» CORRECT option is (d) Both INSERT and Update

Best EXPLANATION: CREATE is a DDL operation.
14.

The ______________ layer, which provides the interface between the business-logic layer and the underlying database.(a) Business logic(b) Presentation(c) User interaction(d) Data accessThis question was posed to me in homework.This interesting question is from Application Architectures topic in portion Database Programming Techniques of Database Management

Answer»

The correct ANSWER is (d) Data access

For explanation: MANY APPLICATIONS use an object-oriented language to code the business-logic LAYER, and use an object-oriented model of data, while the underlying database is a RELATIONAL database.

15.

Which of the following is true for Seeheim model?(a) Presentation is abstracted from dialogue and Application(b) Presentation and Dialogue is abstracted from Application(c) Presentation and Application is abstracted from Dialogue(d) None of the mentionedThis question was addressed to me in a job interview.My question is from Application Architectures topic in portion Database Programming Techniques of Database Management

Answer»

The CORRECT option is (a) PRESENTATION is ABSTRACTED from dialogue and APPLICATION

For explanation: Presentation is abstracted from dialogue and application.

16.

What MySQL property is used to create a surrogate key in MySQL?(a) UNIQUE(b) SEQUENCE(c) AUTO_INCREMENT(d) None of the mentionedThe question was posed to me in an internship interview.The doubt is from Servlets and JSP topic in section Database Programming Techniques of Database Management

Answer» RIGHT ANSWER is (c) AUTO_INCREMENT

Easiest EXPLANATION - A surrogate key in a database is a unique identifier for either an ENTITY in the modeled world or an object in the database.
17.

The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.(a) OpenID(b) Sign-on system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)The question was asked in semester exam.This key question is from Application Security topic in division Database Programming Techniques of Database Management

Answer»

Correct answer is (c) SECURITY ASSERTION Markup Language (SAML)

EASIEST explanation - The user’s PASSWORD and other authentication factors are never revealed to the application, and the user need not register explicitly with the application.

18.

How many JDBC driver types does Sun define?(a) One(b) Two(c) Three(d) FourThis question was posed to me in an interview.My enquiry is from Servlets and JSP topic in section Database Programming Techniques of Database Management

Answer»

Correct CHOICE is (d) Four

To EXPLAIN: JBDB.DriverManager.getConnection() is used to GET the connection to the DATABASE.

19.

Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?(a) Not true, the message can also be decrypted with the Public Key(b) A so called “one way function with back door” is applied for the encryption(c) The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key(d) The encrypted message contains the function for decryption which identifies the Private KeyI got this question in an internship interview.This key question is from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management

Answer»

Right ANSWER is (b) A so called “one way function with back DOOR” is applied for the encryption

Best explanation: An one-way function is a function which a computer can calculate QUICKLY, but whose reversal would last months or years. An one-way function with back door can be reversed with the HELP of a couple of additional information (the back door), but scarcely without this information. The information for the back door is contained in the private Key.

20.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingI have been asked this question in examination.My query is from Application Security in chapter Database Programming Techniques of Database Management

Answer»

The CORRECT option is (c) Cross-site scripting

The explanation is: In such an attack, a malicious user ENTERS code written in a client-side scripting LANGUAGE such as JAVASCRIPT or Flash instead of entering a VALID name or comment.

21.

What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?(a) VBScript only(b) Jscript only(c) Java only(d) All of the mentionedI have been asked this question in an online interview.This key question is from Servlets and JSP topic in section Database Programming Techniques of Database Management

Answer»

The CORRECT answer is (c) Java only

The best EXPLANATION: JSP PRIMARILY uses Java for certain CODES.

22.

Html document must always be saved with:(a) .html(b) .htm(c) .doc(d) Both .html & .htmThis question was posed to me in unit test.Origin of the question is Web Fundamentals topic in division Database Programming Techniques of Database Management

Answer» CORRECT choice is (d) Both .HTML & .htm

The best EXPLANATION: .doc is used only for the word document format.
23.

Which is the largest disadvantage of symmetric Encryption?(a) More complex and therefore more time-consuming calculations(b) Problem of the secure transmission of the Secret Key(c) Less secure encryption function(d) Isn’t used any moreI have been asked this question in exam.I need to ask this question from Encryption and Its Applications in portion Database Programming Techniques of Database Management

Answer»

Right choice is (b) Problem of the secure transmission of the SECRET Key

The best I can explain: As there is only one key in the symmetrical encryption, this must be known by both sender and recipient and this key is sufficient to decrypt the secret message. Therefore it must be exchanged between sender and receiver in such a MANNER that an UNAUTHORIZED PERSON can in no case TAKE possession of it.

24.

Which of the following data structure is linear data structure?(a) Trees(b) Graphs(c) Arrays(d) None of the mentionedThe question was posed to me during an online exam.Origin of the question is Application Performance in section Database Programming Techniques of Database Management

Answer»

Correct OPTION is (C) Arrays

Easiest explanation - Tree and GRAPHS are not linear.

25.

The ORDER BY clause can only be used in(a) SELECT queries(b) INSERT queries(c) GROUP BY queries(d) HAVING queriesThis question was addressed to me in semester exam.Asked question is from Rapid Application Development topic in chapter Database Programming Techniques of Database Management

Answer»

The CORRECT OPTION is (a) SELECT queries

For EXPLANATION: SELECT column_name,column_name

FROM table_name

ORDER BY column_name,column_name ASC|DESC;.

26.

Memory address refers to the successive memory words and the machine is called as _______________(a) word addressable(b) byte addressable(c) bit addressable(d) Terra byte addressableI had been asked this question during an online interview.The doubt is from Application Architectures topic in portion Database Programming Techniques of Database Management

Answer» RIGHT ANSWER is (a) word addressable

For explanation: Part WHOLE decomposition is applied to MVC.
27.

The indirect change of the values of a variable in one module by another module is called(a) Internal change(b) Inter-module change(c) Side effect(d) Side-module updateThis question was addressed to me during an online exam.This intriguing question originated from Application Performance topic in chapter Database Programming Techniques of Database Management

Answer» CORRECT OPTION is (c) Side effect

Easy explanation - The module of the search TREE and the FLOW is DIRECTED by its values.
28.

What is bytecode?(a) Machine-specific code(b) Java code(c) Machine-independent code(d) None of the mentionedI got this question in a job interview.The origin of the question is Servlets and JSP topic in section Database Programming Techniques of Database Management

Answer»

The correct CHOICE is (c) Machine-independent code

Easy EXPLANATION - Java bytecode is the form of instructions that the Java virtual machine EXECUTES. Each bytecode opcode is one BYTE in length, although some require parameters, resulting in some multi-byte instructions.

29.

Arrays are best data structures(a) For relatively permanent collections of data(b) For the size of the structure and the data in the structure are constantly changing(c) All of the mentioned(d) None of the mentionedI got this question in examination.Question is taken from Application Performance topic in section Database Programming Techniques of Database Management

Answer»

The CORRECT choice is (a) For relatively permanent COLLECTIONS of data

Explanation: The OPERATOR TREE has a tree like format where the evaluation STARTS from root of the tree.

30.

How to force a log switch?(a) By using ALTER SYSTEM LOG(b) By using ALTER SYSTEM SWITCH LOGFILE(c) By using ALTER SYSTEM SWITCH LOGS(d) By using ALTER SYS LOGFILESThis question was posed to me in my homework.The query is from Rapid Application Development topic in portion Database Programming Techniques of Database Management

Answer»

Right ANSWER is (b) By using ALTER SYSTEM SWITCH LOGFILE

To explain: ALTER SYSTEM ARCHIVE LOG CURRENT is the best practice for production backup SCRIPTS with RMAN. .

31.

Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________(a) Dictionary attacks(b) Database attacks(c) Minor attacks(d) Random attacksI had been asked this question in homework.This interesting question is from Encryption and Its Applications topic in division Database Programming Techniques of Database Management

Answer»

Correct choice is (a) Dictionary attacks

The BEST I can EXPLAIN: This happens when particularly if the encryption KEY is publicly available.

32.

Which of the following object types below cannot be replicated?(a) Data(b) Trigger(c) View(d) SequenceThis question was posed to me by my school teacher while I was bunking the class.My doubt is from Rapid Application Development in division Database Programming Techniques of Database Management

Answer»

The correct answer is (d) SEQUENCE

To explain: Sequence is a SERIES of items which is like a UNIQUE INDEX.

33.

Linked lists are best suited(a) For relatively permanent collections of data(b) For the size of the structure and the data in the structure are constantly changing(c) All of the mentioned(d) None of the mentionedThe question was asked in a job interview.I'd like to ask this question from Application Performance in portion Database Programming Techniques of Database Management

Answer»

Right option is (b) For the SIZE of the structure and the data in the structure are constantly changing

The BEST EXPLANATION: A linked list is a data structure CONSISTING of a group of NODES which together represent a sequence.

34.

_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingI have been asked this question in an online quiz.The query is from Application Security in division Database Programming Techniques of Database Management

Answer» RIGHT option is (b) Cross-site request forgery

Best explanation: Cross-site request forgery, also KNOWN as a one-click ATTACK or session RIDING and abbreviated as CSRF or XSRF.
35.

Many applications use _________________ where two independent factors are used to identify a user.(a) Two-factor authentication(b) Cross-site request forgery(c) Cross-site scripting(d) Cross-site scoring scriptingThis question was posed to me during an interview for a job.My question is taken from Application Security in section Database Programming Techniques of Database Management

Answer» RIGHT OPTION is (a) TWO-factor authentication

Easiest explanation - The two factors should not share a common VULNERABILITY.
36.

The _____________ system is widely used for mapping from Java objects to relations.(a) Hibernate(b) Object oriented(c) Objective(d) None of the mentionedI had been asked this question in exam.The origin of the question is Application Architectures topic in portion Database Programming Techniques of Database Management

Answer»

The correct ANSWER is (a) HIBERNATE

The best I can explain: In Hibernate, the mapping from each Java class to one or more relations is specified in a mapping file.

37.

HTTP defines two ways in which values entered by a user at the browser can be sent to the Web server. The _____ method encodes the values as part of the URL.(a) Post(b) Get(c) Read(d) ArgumentThis question was posed to me in an international level competition.This intriguing question originated from Web Fundamentals in division Database Programming Techniques of Database Management

Answer» CORRECT option is (b) Get

To explain: For example, if the Google search page used a form with an input parameter

named Q with the get METHOD, and the user typed in the string “silberschatz” and submitted the form, the browser would request the following URL from the Web server: http://www.google.com/search?q=silberschatz.
38.

http://www.google.com/search?q=talkjarvis  In the above URL which one is the argument which is used for processing of the URL?(a) google(b) google.com(c) search(d) q=talkjarvisThis question was addressed to me in an online interview.The above asked question is from Web Fundamentals in chapter Database Programming Techniques of Database Management

Answer» CORRECT option is (d) q=talkjarvis

Best explanation: Argument is ALWAYS PLACED after ? SYMBOL.
39.

Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge?(a) Type 1(b) Type 2(c) Type 3(d) Type 4I had been asked this question by my college director while I was bunking the class.I need to ask this question from Servlets and JSP topic in section Database Programming Techniques of Database Management

Answer»

The correct OPTION is (a) Type 1

Best explanation: In a Type 1 driver, a JDBC bridge is USED to access ODBC DRIVERS INSTALLED on each client machine.

40.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?(a) Round key algorithm(b) Public key algorithm(c) Advanced Encryption Standard(d) Asymmetric key algorithmThe question was posed to me in an interview for job.I want to ask this question from Encryption and Its Applications in portion Database Programming Techniques of Database Management

Answer» CORRECT choice is (c) Advanced Encryption STANDARD

To explain: The standard is based on the RIJNDAEL algorithm.
41.

___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.(a) Encryption(b) Data mining(c) Internet Security(d) Architectural securityI have been asked this question during a job interview.This interesting question is from Encryption and Its Applications in chapter Database Programming Techniques of Database Management

Answer»

The correct option is (a) ENCRYPTION

To EXPLAIN: Encryption is ALSO used to carry out other tasks, such as AUTHENTICATION.

42.

_______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.(a) OpenID(b) Single-site system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)I had been asked this question during an interview.Asked question is from Application Security in portion Database Programming Techniques of Database Management

Answer» RIGHT OPTION is (d) Virtual PRIVATE Database (VPD)

Explanation: Some database systems provide mechanisms for fine-grained AUTHORIZATION.
43.

Each array declaration need not give, implicitly or explicitly, the information about(a) The name of array(b) The data type of array(c) The first data from the set to be stored(d) The index set of the arrayI got this question during an interview.The query is from Application Performance topic in section Database Programming Techniques of Database Management

Answer»

The CORRECT answer is (c) The FIRST data from the set to be stored

For explanation: The OPERATOR tree has a tree like format where the evaluation starts from ROOT of the tree.

44.

Which of the unit operation is used in Model view controller?(a) Is a Decomposition(b) Part Whole Decomposition(c) All of the mentioned(d) None of the mentionedThe question was posed to me in semester exam.The doubt is from Application Architectures topic in section Database Programming Techniques of Database Management

Answer»

The CORRECT choice is (b) Part WHOLE DECOMPOSITION

To explain: Part whole decomposition is applied to MVC.

45.

A JSP is transformed into a(n):(a) Java applet(b) Java servlet(c) Either 1 or 2 above(d) Neither 1 nor 2 aboveI had been asked this question in unit test.The query is from Servlets and JSP in chapter Database Programming Techniques of Database Management

Answer»

The correct option is (b) JAVA servlet

The best I can EXPLAIN: Servlets are commonly USED to generate dynamic RESPONSES to HTTP requests.

46.

This extra information is usually maintained in the form of a _________ at the client.(a) Cookie(b) History(c) Remainder(d) None of the mentionedThe question was posed to me during an internship interview.Enquiry is from Web Fundamentals in chapter Database Programming Techniques of Database Management

Answer» CORRECT option is (a) Cookie

The BEST I can explain: A cookie is simply a small piece of text containing identifying INFORMATION and with an ASSOCIATED NAME.
47.

Which of the following is a valid uniform resource locator?(a) http://www.acm.org/sigmod(b) www.google.com(c) www.ann.in(d) http:/www.acm.org/sigmod/The question was posed to me in a job interview.The doubt is from Web Fundamentals topic in division Database Programming Techniques of Database Management

Answer»

Correct option is (a) http://www.acm.org/sigmod

The BEST I can EXPLAIN: A uniform RESOURCE locator (URL) is a globally unique name for each DOCUMENT that can be accessed on the Web.

48.

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.(a) SQL injection(b) SQL(c) Direct(d) ApplicationI have been asked this question in final exam.The doubt is from Application Security in chapter Database Programming Techniques of Database Management

Answer»

Correct OPTION is (a) SQL injection

Best EXPLANATION: Application security has to deal with several security THREATS and issues BEYOND those handled by SQL authorization.

49.

The operation of processing each element in the list is known as(a) Sorting(b) Merging(c) Inserting(d) TraversalThis question was posed to me in unit test.Enquiry is from Application Performance in division Database Programming Techniques of Database Management

Answer»

Correct CHOICE is (d) Traversal

Easiest explanation - There are SEVERAL types of TRAVERSALS.

50.

Which of the following queries are legal?(a) SELECT deptno, count(deptno) FROM emp GROUP BY ename;(b) SELECT deptno, count(deptno), job FROM emp GROUP BY deptno;(c) SELECT deptno, avg(sal) FROM emp;(d) SELECT deptno, avg(sal) FROM emp GROUP BY deptno;The question was posed to me in final exam.I need to ask this question from Rapid Application Development topic in division Database Programming Techniques of Database Management

Answer»

The correct CHOICE is (d) SELECT deptno, avg(sal) FROM EMP GROUP BY deptno;

To explain: For aggregate functions group by CLAUSE is NECESSARY.