Tải bản đầy đủ (.doc) (9 trang)

Theory DBSJ

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (84.72 KB, 9 trang )

Question Excerpt From DBSJ - Test Java for Aptech
Q.1) Driver types are used to categorize the technology used to connect to the database.
A. True
B. False
Q.2)
This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A. JDBC
B. ODBC
Q.3)
JDBC is ODBC translated into an object-oriented interface that is natural for java
programmiers.
A. True
B. False
Q.4)
In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A. Two-tier Data processing Model
B. Three - tier Data processing Model
Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A.
Translates JDBC calls into ODBC
calls.
B.
Translates JDBC calls into database=specific calls or native
calls
C.
Maps JDBC calls to the underlying "network" protocol, which in turn calls native
methods on the server.
D. Directly calls RDBMS from client machine.
Q.6)


This method is use to execute any SQL statement with a "SELECT" clause, that return the
result of the query as a result set.
A. executeUpdate();
B. executeQuery();
C. execute();
Q.7)
This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such
as CREATE, DROP Table.
A. executeUpdate();
B. execute();
C. executeQuery();
Q.8)
This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A. getVarchar();
B. getObject();
C. getString();
Q.9) This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();
C. getString();
Q.10)
A client application uses stored procedures increases the network traffic, but it reduces the
number of times a database is accessed.
A. True
B. False
Q.11)
This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A. IN

B. OUT
C. IN/OUT
Q.12)
OUT Parameter.
- 3 choices.
A. pass out of procedure module.
B. is a constant
C. is a variable
D.
back to the calling
block
Q.13) This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT
Q.14)
This object does not contain the stored procedure itself but contains only a call to the
stored procedure.
A. CallableStatment
B. PreparedStatment
C. prepareCall();
Q.15) It reefers to the ability to move backward as well as forward through a result set.
A. Scrollable
B. Updatable
C.
Holdabl
e
Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT.
A. Updatable
B.

Holdabl
e
C. Scrollable
Q.17) The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object
B.
Callalbalestatment
Object
C. PrepareCall () method.
Q.18) The CallableStatment object contains the SQL statments.
A. True
B. False
Q.19)
A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY
Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
A. True
B. False
Q.21)
A ResultSet object contains a set of rows from a result set or some other source of
tabular data, like a file or spreadsheet.
A. True
B. False
Q.22) Which class is a disconnected rowset.
A. A CachedRowSet class.
B. A JDBCRowSet class.
C. A WebRowSet class.

Q.23)
This object connects to a data source only to read data from a ResultSet or write data back
to the data source.
A. A connected RowSet.
B. A Disconnected RowSet.
Q.24) Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver
C. A connect RowSet can read data from a non relational database source also.
D.
A RowSet is a JavaBeans component which has to programmatically notify all registered
event listener.
Q.25) The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY
B. CONCURENT_UPDATABLE
Q.26)
This is the mechanism of encoding information in a secret coded form, intented only for
the recipient to access the information.
A. Cryptography
B. Encryption
Q.27)
The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A. True
B. False
Q.28)
This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A. Hash Function
B. Secret key cryptography

C. Public Key cryptography
Q.29) This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography
B. Hash Function
C. Secret key cryptography
Q.30) This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function
Q.31) Which statements are true?
A.
The Tamper-proofing process verifies whether the data received by the receiver is the
same data as sent by the sender.
B.
Spoofing or identity interception, which means impersonating the identity of a different
user and use it in an unauthorized way.
C. Authentication is the process that provides tamper-proofing, while it is on the network.
Q.32) The class is use to hash value of the specified data.
A. Message Digest
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.33) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.34) The class is used to sign and check the authenticity of digital signature

A. Message Digest
B. Signature
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
Q.35)
The class is used to transform opaque keys of type Key into key specifications and provide
transparent representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory
E. Certificate Factory
Q.36) The class is used to generate public key certificates.
A. Certificate Factory
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
Q.37) This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore
C. Key
D. KeySpec
Q.38)
Cryptography is essential for making a application safe and secure, including:
- 4 choices
A. Tampering
B. Non-repudiation
C. Integrity & confidentiality

D. Spoofing
E. Authentication
Q.39)
this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation
B. Tampering
C. Integrity
D. confidentiality
Q.40) Data integrity is to protect data from getting tampered,while it is on the network.
A. True
B. False
Q.41)
This is a framework written in java to access and develop cryptographic functionality, and
forms part of the java security API.
A. JCA
B. JCE
Q.42) With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5
C. CBC
Q.43) Single-bit ciphers are called:
A.
Block
cipher
B. Stream cipher
Q.44) Cipher objects are created using this method of the cipher class.
A. getInstance();
B. init();
Q.45) the cipher object is initialized by the init() method?

A. True
B. False
Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of
A.
"mode/algorithm/padding
"
B.
"algorithm/mode/padding
"
C.
"algorithm/padding/mode
"
D. "DeCrypto/Cipher/padding"
Q.47) "(Only)algorithm" such as
A. "DES"
B. "PKCS5"
C.
"CBE
"
Q.48)
Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption
Q.49)
Single bits or a block of bits can be encrypted into cipher
blocks
A. True
B. False

Q.50) The product components of JDBC are:
A.
JDBC-ODBC
Bridge.
B.
Net-Protocol/all-Java
driver
C. JDBC Driver Manager
D. JDBC Test Suite & JDBC API
E. ODBC
Q.51) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC
Q.52) The 'Native API-Java/Party Java' is Driver Type
A. I
B. II
C. III
D. IV
Q.53) The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV
Q.54)
Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A. True
B. False
Q.55)
This Objects are used to receive and store the data in the same form as it is returned from

the SQL queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet
D. ExecuteQuery()
Q.56) This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();
Q.57)
If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A. relative(int row) method
B. absolute(int row) method.
Q.58)
Calling absolute(1) is equivalent to calling
last()
A. True
B. False
Q.59)
Which statements are true?
- 3 choices
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only.
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT.
E.
The createStatement method has two argurments namely resultSetType and
resultSetConcurrency
Q.60)

Which statements are true?
-3 choices
A.
The original message text has to be transmitted separately separately since the content of
a digitally signed message is altered irreversibly.
B.
A Certification authority creates a signed certificate by encrypting the digitally signature
with its private key.
C. The digital signature and sender's public key are appended to end of a message.
D. A recipient decrypts a signed signature using its own public key.
E. The integrity of a message cannot be ensure while using message digests.
Q.61) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File
C. Access Controler
Q.62) An abstract class can be sealed
A. True
B. False
Q.63)
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
namespace Abstract_class
{
abstract class Animal {
public void run() {
Console.WriteLine("Run by 4 feet");
}
public void Eat();

}
class bird:Animal
{
// implement method Eat of abstract class
Animal.
public override void Eat(){
Console.WriteLine("All of dove eat rice");
}
static void Main(string[] args)
{
bird dove = new bird();
dove.Eat();
}
}
}
A. Compiler Error.
B.
Print: "All of dove eat
rice"
C. print: "Run by 4 feet"
Q.64) Abstact method ,which contains at least one statement, is declared in abstract class.
A. True
B. False
Q.65)
Eat();
Run();
Sound();
A. An Abstract class
B. An Interface
Q.66)

Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A. True
B. False

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×