3. The Java specification defines an application programming interface for communication between the Web server and the application program.
Correct : A. servlet
4. How many JDBC driver types does Sun define?
Correct : D. four
5. Which JDBC driver Type(s) can be used in either applet or servlet code?
Correct : C. both type 3 and type 4
6. What MySQL property is used to create a surrogate key in MySQL?
Correct : C. auto_increment
7. A JSP is transformed into a(n):
Correct : B. java servlet
8. What is bytecode?
Correct : C. machine-independent code
9. Where is metadata stored in MySQL?
Correct : C. in the mysql database mysql
10. Which of the following is true for Seeheim model?
Correct : A. presentation is abstracted from dialogue and application
11. Which of the unit operation is used in Model view controller?
Correct : B. part whole decomposition
12. Memory address refers to the successive memory words and the machine is called as
Correct : A. word addressable
13. The layer, which provides a high-level view of data and actions on data.
Correct : A. business logic
14. The layer, which provides the interface between the business-logic layer and the underlying database.
Correct : D. data access
15. The system is widely used for mapping from Java objects to relations.
Correct : A. hibernate
16. Which among the following are the functions that any system with a user interface must provide?
Correct : A. presentation
17. Which of the following is the main task accomplished by the user?
Correct : D. all of the mentioned
18. What are the portability concerns founded in Seeheim model?
Correct : D. replacing the presentation & application toolkit
19. Which schema object instructs Oracle to connect to a remotely access an object of a database?
Correct : D. data link
20. DML changes are
Correct : D. both insert and update
21. Which of the following object types below cannot be replicated?
Correct : D. sequence
22. How to force a log switch?
Correct : B. by using alter system switch logfile
23. The ORDER BY clause can only be used in
Correct : A. select queries
24. Which of the following rule below are categories of an index?
Correct : A. column and functional
25. Which of the following queries are legal?
Correct : D. select deptno, avg(sal) from emp group by deptno;
26. Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500?
Correct : B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;
27. Which of the following data structure is not linear data structure?
Correct : D. none of the mentioned
28. Which of the following data structure is linear data structure?
Correct : C. arrays
29. The operation of processing each element in the list is known as
Correct : D. traversal
30. Finding the location of the element with a given value is:
Correct : B. search
31. Arrays are best data structures
Correct : A. for relatively permanent collections of data
32. Linked lists are best suited
Correct : B. for the size of the structure and the data in the structure are constantly changing
33. Each array declaration need not give, implicitly or explicitly, the information about
Correct : C. the first data from the set to be stored
34. In attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
Correct : A. sql injection
35. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a attack.
Correct : C. cross-site scripting
36. is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
Correct : B. cross-site request forgery
37. A single further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
Correct : B. sign-on system
38. The is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.
Correct : C. security assertion markup language (saml)
39. allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
Correct : D. virtual private database (vpd)
40. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism.
Correct : A. row-level authorization
41. is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
Correct : A. encryption
42. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
Correct : B. decryption key
43. Which of the following is not a property of good encryption technique?
Correct : D. none of the mentioned
44. In which of the following encryption key is used to encrypt and decrypt the data?
Correct : C. symmetric key
45. Encryption of small values, such as identifiers or names, is made complicated by the possibility of
Correct : A. dictionary attacks
46. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?
Correct : C. advanced encryption standard
47. Which of the following requires no password travel across the internet?
Correct : C. challenge–response system
48. The is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.
Correct : A. cache
49. Which of the following stores several gigabytes of data but usually lost when power failure?
Correct : C. main memory
50. The flash memory storage used are
Correct : A. nor flash
51. is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.
Correct : A. flash memory
52. The primary medium for the long-term online storage of data is the where the entire database is stored on magnetic disk.
Correct : B. magnetic disks
53. Optical disk systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.
Correct : B. jukebox
54. There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called disks.
Correct : A. write-once, read-many (worm)
55. In magnetic disk stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.
Correct : D. disk arm
56. A is the smallest unit of information that can be read from or written to the disk.
Correct : C. sector
57. The disk controller uses at each sector to ensure that the data is not corrupted on data retrieval.
Correct : A. checksum
58. is the time from when a read or write request is issued to when data transfer begins.
Correct : A. access time
59. The time for repositioning the arm is called the and it increases with the distance that the arm must move.
Correct : C. seek time
60. is around one-half of the maximum seek time.
Correct : B. average seek time
61. Hybrid disk drives are hard-disk systems that combine magnetic storage with a smaller amount of flash memory, which is used as a cache for frequently accessed data.
Correct : B. disk drivers
62. Optical disk technology uses
Correct : D. raid
63. With multiple disks, we can improve the transfer rate as well by data across multiple disks.
Correct : A. striping
64. partitions data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk.
Correct : B. block interleaved distributed parity
65. The RAID level which mirroring is done along with stripping is
Correct : D. both raid 1+0 and raid 0
66. Where performance and reliability are both important, RAID level is used.
Correct : D. 0+1
67. is popular for applications such as storage of log files in a database system since it offers the best write performance.
Correct : A. raid level 1
68. which increases the number of I/O operations needed to write a single logical block, pays a significant time penalty in terms of write performance.
Correct : A. raid level 1
69. Tertiary storage is built with :
Correct : C. removable media
70. Operating system is responsible for
Correct : D. all of the mentioned
71. A typical tape drive is a typical disk drive.
Correct : A. more expensive than
72. During recovery from a failure
Correct : A. each pair of physical block is examined
73. A magneto-optic disk is :
Correct : C. tertiary storage
74. Which of the following are the process of selecting the data storage and data access characteristics of the database?
Correct : B. physical database design
75. The replacement of a bad block generally is not totally automatic because
Correct : B. data in bad block is usually lost
76. Which of the following is the oldest database model?
Correct : D. network
77. The surface area of a tape is the surface area of a disk.
Correct : B. much larger than
78. Which one of the following is not a secondary storage?
Correct : C. ram
79. Which level of RAID refers to disk mirroring with block striping?
Correct : A. raid level 1
80. A unit of storage that can store one or more records in a hash file organization is denoted as
Correct : A. buckets
81. The file organization which allows us to read records that would satisfy the join condition by using one block read is
Correct : C. clustering file organization
82. What are the correct features of a distributed database?
Correct : C. users see the data in one global schema.
83. Each tablespace in an Oracle database consists of one or more files called
Correct : C. datafiles
84. The management information system (MIS) structure with one main computer system is called a
Correct : C. centralized mis structure
85. Choose the RDBMS which supports full fledged client server application development
Correct : B. oracle 7.1
86. One approach to standardization storing of data?
Correct : C. codasyl specification
87. The highest level in the hierarchy of data organization is called
Correct : B. data base
88. An audit trail
Correct : B. is the recorded history of operations performed on a file
89. Large collection of files are called
Correct : C. database
90. Which of the following is not true of the traditional approach to information processing
Correct : A. there is common sharing of data among the various applications
91. Which of these is not a feature of Hierarchical model?
Correct : D. child node can have any number of parent nodes
92. Which of these data models is an extension of the relational data model?
Correct : B. object-relational data model
93. The information about data in a database is called
Correct : A. metadata
94. A data dictionary is a special file that contains?
Correct : D. all of the mentioned
95. The DBMS acts as an interface between what two components of an enterprise-class database system?
Correct : A. database application and the database
96. A relational database system needs to maintain data about the relations, such as the schema of the relations. This is called
Correct : A. metadata
97. Relational schemas and other metadata about relations are stored in a structure called the
Correct : D. data dictionary
98. is the collection of memory structures and Oracle background processes that operates against an Oracle database.
Correct : B. instance
99. A is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.