InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which of the following is the main task accomplished by the user?(a) Compose a document(b) Create a spread sheet(c) Send mail(d) All of the mentionedThe question was asked by my college professor while I was bunking the class.I'd like to ask this question from Application Architectures topic in chapter Database Programming Techniques of Database Management |
|
Answer» Correct choice is (d) All of the mentioned |
|
| 52. |
The _____________ layer, which provides a high-level view of data and actions on data.(a) Business logic(b) Presentation(c) User interaction(d) Data accessI have been asked this question in semester exam.My question is from Application Architectures topic in division Database Programming Techniques of Database Management |
|
Answer» The correct ANSWER is (a) Business logic |
|
| 53. |
Which of the following requires no password travel across the internet?(a) Readable system(b) Manipulation system(c) Challenge–response system(d) Response systemThis question was posed to me in an international level competition.This is a very interesting question from Encryption and Its Applications topic in chapter Database Programming Techniques of Database Management |
|
Answer» CORRECT choice is (c) Challenge–response system The best explanation: The database system sends a challenge string to the USER. The user encrypts the challenge string using a secret password as encryption KEY and then returns the result. The database system can VERIFY the AUTHENTICITY of the user by decrypting the string with the same secret password and checking the result with the original challenge string. |
|
| 54. |
Which of the following is not a property of good encryption technique?(a) Relatively simple for authorized users to encrypt and decrypt data(b) Decryption key is extremely difficult for an intruder to determine(c) Encryption depends on a parameter of the algorithm called the encryption key(d) None of the mentionedThe question was asked by my school teacher while I was bunking the class.This interesting question is from Encryption and Its Applications in section Database Programming Techniques of Database Management |
|
Answer» Correct option is (d) None of the mentioned |
|
| 55. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without(a) Encryption key(b) Decryption key(c) Primary key(d) Authorised keyI had been asked this question during an interview.This is a very interesting question from Encryption and Its Applications topic in portion Database Programming Techniques of Database Management |
|
Answer» Right answer is (b) Decryption KEY |
|
| 56. |
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.(a) OpenID(b) Single-site system(c) Security Assertion Markup Language (SAML)(d) Virtual Private Database (VPD)I got this question in exam.Asked question is from Application Security topic in section Database Programming Techniques of Database Management |
|
Answer» RIGHT choice is (a) OpenID The best I can explain: The user’s password and other authentication FACTORS are NEVER REVEALED to the application, and the user need not register EXPLICITLY with the application. |
|
| 57. |
Which of the following rule below are categories of an index?(a) Column and Functional(b) Multiple Column and functional(c) Column, Multiple Column and functional(d) None of the mentionedThe question was posed to me during an interview.The question is from Rapid Application Development in division Database Programming Techniques of Database Management |
|
Answer» CORRECT answer is (a) COLUMN and Functional Easiest explanation - The CREATE INDEX STATEMENT is used to create indexes in TABLES. |
|
| 58. |
Which among the following are the functions that any system with a user interface must provide?(a) Presentation(b) Dialogue(c) All of the mentioned(d) None of the mentionedThis question was posed to me in a national level competition.The origin of the question is Application Architectures in division Database Programming Techniques of Database Management |
|
Answer» The CORRECT choice is (a) Presentation |
|
| 59. |
Which layer deals which deals with user interaction is called _____________ layer.(a) Business logic(b) Presentation(c) User interaction(d) Data accessI got this question during an online interview.The question is from Application Architectures in chapter Database Programming Techniques of Database Management |
|
Answer» Right option is (b) Presentation |
|
| 60. |
Which JDBC driver Type(s) can be used in either applet or servlet code?(a) Both Type 1 and Type 2(b) Both Type 1 and Type 3(c) Both Type 3 and Type 4(d) Type 4 onlyThis question was addressed to me in examination.My question is based upon Servlets and JSP in division Database Programming Techniques of Database Management |
|
Answer» Right answer is (c) Both Type 3 and Type 4 |
|
| 61. |
In which of the following encryption key is used to encrypt and decrypt the data?(a) Public key(b) Private key(c) Symmetric key(d) Asymmetric keyI had been asked this question in a job interview.Origin of the question is Encryption and Its Applications in portion Database Programming Techniques of Database Management |
|
Answer» Correct answer is (c) Symmetric KEY |
|
| 62. |
Finding the location of the element with a given value is:(a) Traversal(b) Search(c) Sort(d) None of the mentionedThe question was posed to me in an interview for internship.This is a very interesting question from Application Performance topic in section Database Programming Techniques of Database Management |
|
Answer» RIGHT OPTION is (b) Search To explain: Search is performed by TRAVERSING through the tree. |
|