Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

Which of the following is the main task accomplished by the user?(a) Compose a document(b) Create a spread sheet(c) Send mail(d) All of the mentionedThe question was asked by my college professor while I was bunking the class.I'd like to ask this question from Application Architectures topic in chapter Database Programming Techniques of Database Management

Answer»

Correct choice is (d) All of the mentioned

The BEST explanation: All of the mentioned are the MAIN TASK accomplished by the USER.

52.

The _____________ layer, which provides a high-level view of data and actions on data.(a) Business logic(b) Presentation(c) User interaction(d) Data accessI have been asked this question in semester exam.My question is from Application Architectures topic in division Database Programming Techniques of Database Management

Answer»

The correct ANSWER is (a) Business logic

Easiest EXPLANATION - The single application may have several different versions of this layer, corresponding to distinct kinds of INTERFACES such as Web browsers, and user interfaces of MOBILE phones, which have much smaller screens.

53.

Which of the following requires no password travel across the internet?(a) Readable system(b) Manipulation system(c) Challenge–response system(d) Response systemThis question was posed to me in an international level competition.This is a very interesting question from Encryption and Its Applications topic in chapter Database Programming Techniques of Database Management

Answer» CORRECT choice is (c) Challenge–response system

The best explanation: The database system sends a challenge string to the USER. The user encrypts the challenge string using a secret password as encryption KEY and then returns the result. The database system can VERIFY the AUTHENTICITY of the user by decrypting the string with the same secret password and checking the result with the original challenge string.
54.

Which of the following is not a property of good encryption technique?(a) Relatively simple for authorized users to encrypt and decrypt data(b) Decryption key is extremely difficult for an intruder to determine(c) Encryption depends on a parameter of the algorithm called the encryption key(d) None of the mentionedThe question was asked by my school teacher while I was bunking the class.This interesting question is from Encryption and Its Applications in section Database Programming Techniques of Database Management

Answer»

Correct option is (d) None of the mentioned

Explanation: Here a, B and c are the PROPERTIES have to be PRESENT in a GOOD DESIGN of an encryption technique.

55.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without(a) Encryption key(b) Decryption key(c) Primary key(d) Authorised keyI had been asked this question during an interview.This is a very interesting question from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management

Answer»

Right answer is (b) Decryption KEY

Best explanation: EVEN if the MESSAGE is intercepted by an enemy, the enemy, not knowing the key, will not be able to decrypt and understand the message.

56.

The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.(a) OpenID(b) Single-site system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)I got this question in exam.Asked question is from Application Security topic in section Database Programming Techniques of Database Management

Answer» RIGHT choice is (a) OpenID

The best I can explain: The user’s password and other authentication FACTORS are NEVER REVEALED to the application, and the user need not register EXPLICITLY with the application.
57.

Which of the following rule below are categories of an index?(a) Column and Functional(b) Multiple Column and functional(c) Column, Multiple Column and functional(d) None of the mentionedThe question was posed to me during an interview.The question is from Rapid Application Development in division Database Programming Techniques of Database Management

Answer» CORRECT answer is (a) COLUMN and Functional

Easiest explanation - The CREATE INDEX STATEMENT is used to create indexes in TABLES.
58.

Which among the following are the functions that any system with a user interface must provide?(a) Presentation(b) Dialogue(c) All of the mentioned(d) None of the mentionedThis question was posed to me in a national level competition.The origin of the question is Application Architectures in division Database Programming Techniques of Database Management

Answer»

The CORRECT choice is (a) Presentation

Best explanation: Presentation and APPLICATION are the FUNCTIONS that any system with a USER interface must provide.

59.

Which layer deals which deals with user interaction is called _____________ layer.(a) Business logic(b) Presentation(c) User interaction(d) Data accessI got this question during an online interview.The question is from Application Architectures in chapter Database Programming Techniques of Database Management

Answer»

Right option is (b) Presentation

Easy explanation - The single application may have several different versions of this layer, CORRESPONDING to distinct kinds of interfaces such as WEB BROWSERS, and user interfaces of MOBILE phones, which have much smaller SCREENS.

60.

Which JDBC driver Type(s) can be used in either applet or servlet code?(a) Both Type 1 and Type 2(b) Both Type 1 and Type 3(c) Both Type 3 and Type 4(d) Type 4 onlyThis question was addressed to me in examination.My question is based upon Servlets and JSP in division Database Programming Techniques of Database Management

Answer»

Right answer is (c) Both Type 3 and Type 4

Best EXPLANATION: In a Type 3 driver, a three-tier approach is USED to accessing databases. The JDBC clients use standard NETWORK SOCKETS to communicate with an middleware application server. In a Type 4 driver, a pure Java-based driver that communicates directly with vendor’s database through socket CONNECTION.

61.

In which of the following encryption key is used to encrypt and decrypt the data?(a) Public key(b) Private key(c) Symmetric key(d) Asymmetric keyI had been asked this question in a job interview.Origin of the question is Encryption and Its Applications in portion Database Programming Techniques of Database Management

Answer»

Correct answer is (c) Symmetric KEY

The best I can explain: In PUBLIC-key (ALSO known as asymmetric-key) encryption techniques, there are two different keys, the public key and the private key, used to encrypt and decrypt the DATA.

62.

Finding the location of the element with a given value is:(a) Traversal(b) Search(c) Sort(d) None of the mentionedThe question was posed to me in an interview for internship.This is a very interesting question from Application Performance topic in section Database Programming Techniques of Database Management

Answer» RIGHT OPTION is (b) Search

To explain: Search is performed by TRAVERSING through the tree.