SlideShare une entreprise Scribd logo
1  sur  48
Q.1) Driver types are used to categorize the technology used to connect to the database.
A. True *
B. False
Q.2) This is an Application Programming Interface provided by Microsoft for access the database.It
uses SQL as its database language.
A. JDBC
B. ODBC*
Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers.
A. True*
B. False
Q.4) In this Data processing Model,the client communicates directly to the database server without the
help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model
Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server.
D. Directly calls RDBMS from client machine.
Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that return the result
of the query as a result set.
A. executeUpdate();
B. executeQuery();*
C. execute();
Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE,
DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();
Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String
object.
A. getVarchar();
B. getObject();
C. getString();*
Q.9) This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();
Q.10) A client application uses stored procedures increases the network traffic, but it reduces the number of
times a database is accessed.
A. True
B. False*
Q.11) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed
or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT
Q.12) OUT Parameter.
- 3 choices.
A. pass out of procedure module. *
B. is a constant
C. is a variable*
D. back to the calling block*
Q.13) This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*
Q.14) This object does not contain the stored procedure itself but contains only a call to the stored procedure.
A. CallableStatment*
B. PreparedStatment
C. prepareCall();
Q.15) It reefers to the ability to move backward as well as forward through a result set.
A. Scrollable*
B. Updatable
C. Holdable
Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT.
A. Updatable
B. Holdable*
C. Scrollable
Q.17) The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
Q.18) The CallableStatment object contains the SQL statments.
A. True*
B. False
Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default
type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*
Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
A. True*
B. False
Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file
or spreadsheet.
A. True*
B. False
Q.22) Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.
Q.23) This object connects to a data source only to read data from a ResultSet or write data back to the data
source.
A. A connected RowSet.
B. A Disconnected RowSet. *
Q.24) Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener.
Q.25) The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE
Q.26) This is the mechanism of encoding information in a secret coded form, intented only for the recipient to
access the information.
A. Cryptography*
B. Encryption
Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into
usable plaintext.
A. True*
B. False
Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as
Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography
Q.29) This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography
Q.30) This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*
Q.31) Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as
sent by the sender. *
B. Spoofing or identity interception, which means impersonating the identity of a different user and use
it in an unauthorized way. *
C. Authentication is the process that provides tamper-proofing, while it is on the network.
Q.32) The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.33) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory
Q.34) The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
Q.35) The class is used to transform opaque keys of type Key into key specifications and provide transparent
representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory
Q.36) The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
Q.37) This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec
Q.38) Cryptography is essential for making a application safe and secure, including:
- 3 choices
A. Tampering*
B. Non-repudiation*
C. Integrity & confidentiality*
D. Spoofing
E. Authentication*
Q.39) this ensures that a user or a business organization or a program entity has performed a transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. confidentiality
Q.40) Data integrity is to protect data from getting tampered,while it is on the network.
A. True*
B. False
Q.41) This is a framework written in java to access and develop cryptographic functionality, and forms part of
the java security API.
A. JCA*
B. JCE
Q.42) With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC
Q.43) Single-bit ciphers are called:
A. Block cipher*
B. Stream cipher
Q.44) Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();
Q.45) the cipher object is initialized by the init() method?
A. True*
B. False
Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"
Q.47) "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"
Q.48) Most these implementations mix a random number, known as the "salt" with the password text to derive
an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*
Q.49) Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False
Q.50) The product components of JDBC are:
A. JDBC-ODBC Bridge.
B. Net-Protocol/all-Java driver
C. JDBC Driver Manager*
D. JDBC Test Suite & JDBC API*
E. ODBC
Q.51) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
Q.52) The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV
Q.53) The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*
Q.54) Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is
inherited from PreparedStatement interface.
A. True*
B. False
Q.55) This Objects are used to receive and store the data in the same form as it is returned from the SQL
queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet*
D. ExecuteQuery()
Q.56) This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that
many row.
A. relative(int row) method*
B. absolute(int row) method.
Q.58) Calling absolute(1) is equivalent to calling last()
A. True
B. False*
Q.59) Which statements are true?
- 3 choices
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only. *
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. *
E. The createStatement method has two argurments namely resultSetType and *resultSetConcurrency
.61) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controler

======================================================================
1. JDBC and ODBC are identical?
A. True
B. False*

2. How many kinds of JDBC drivers?
A. 10
B. 3
C. 4*
D many

3. The JDBC API is a Java API for accessing virtually any kind of tabular data
A. False
B. True*

4. What is the correct statement about CallableStatement interface? (choose 1)
A. It defines a statement to create a stored-procedure
B. It contains a call to a stored-procedure*
C. It defines a store-procedure

5. Which is the default port number of RMI Registry Server?
A. 1023
B. 1099*
C. 1069

6. Which of the following statements is correct for retrieving all fields from Student table?
A.

String sql=”SELECT * FROM Student”;
Statement st=cn.createStatement(sql);
ResultSet rs=st.executeQuery();

B.

String sql=”SELECT * FROM Student”; *
Statement st=cn.createStatement();
ResultSet rs=st.executeQuery(sql);

7. If you need to use a stored procedure with output parameters, which of the following
statement type should be used to call the procedure?
A. PreparedStatement
B. CallableStatement*
C. Statement

8. From which object do you ask for DatabaseMetaData?
A. DriverManager
B. ResultSet
C. Connection*
D. Driver

9. Which character is used to represent an input parameter in a CallableStatement?
A. *
B. #
C. ? *
D. %

10. Which one of the following will not get the data from the first column of ResultSet rs,
returned from executing SQL statement: SELECT name, rank, serialNo FROM employee.
A. rs.getString(“name”);
B. rs.getString(1);
C. rs.getString(0); *

11. Which class contains the transaction control method setAutoCommit, commit, and rollback?
A. Statement
B. Connection*
C. ResultSet

12. You can use an applet in RMI program as ________
A. None of the other options
B. Server program
C. Client program*

13. Which of the following will not cause a JDBC driver to be loaded and registered with the
DriverManager?

A. Class.forName(driverString);
B. new DriverClass();
C. Include driver name in jdbc.drivers system property
D. None of the above*

14. SQLWarnings from multiple Statement method calls (like executeUpdate) will build up until
you ask for them all with getWarnings and getNextWarning.
A. True
B. False*

15. If one intends to work with a ResultSet, which of these PreparedStatement methods will not
work?
A. execute()
B. executeQuery()
C. executeUpdate()*

16. Can a ResultSet be reliably returned from a method that creates a Statement and executes a

query?
A. Yes
B. No*

17. How can I use JDBC to create a database?
A. Include create=true at end of JDBC URL
B. Execute "CREATE DATABASE jGuru" SQL statement*
C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements
D. Database creation is DBMS specific

18. Which of the following can you do with a JDBC 2.0 database driver that you cannot with a
JDBC 1.x driver?
A. Batch multiple statements, to be sent to the database together
B. Scroll through result sets bi-directionally
C. Work with SQL3 data types directly
D. All of the above*

19. A __________ result set has a cursor that moves both forward and backward and can be
moved to a particular row
A. scrollable*
B. nonscrollable
C. Unscrollable

20. The method___________ is designed for statements that produce a single result set, such as
SELECT statement
A. executeUpdate
B. execute
C. Update
D. executeQuery*

21. Which three of the following are classes of Java.rmi package?
A. Naming*
B. MarshalledObject*
C. RMISecurityManager*
D. Remote

22. Which option of jar file indicates manifest file not created?
A. Jar M
B. Jar t
c. Jar m
D. Jar c

23. _______ option of Jar command makes a Java archive file.
A. JAR -c
B. JAR -m
C. JAR -v
D. JAR –f

24. Which command adds the file file.class to Xyz.jar?
A. jar – uf Xyz . jar file.class
B. jar – xf Xyz . jar
C. jar – tf Xyz . jar

25. Driver types are used to categorize the technology used to connect to the database.
A. True*
B. False

26. This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A. JDBC
B. ODBC*

27. JDBC is ODBC translated into an object-oriented interface that is natural for java
programmers.
A. True*
B. False

28. In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model

29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the
server.
D. Directly calls RDBMS from client machine.

30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as
CREATE, DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();

31. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A. getVarchar();
B. getObject();
C. getString();*

32. This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();

33. This object connects to a data source only to read data from a ResultSet or write data back
to the data source.
A. A Connected RowSet.
B. A Disconnected RowSet. *

34. A client application uses stored procedures increases the network traffic, but it reduces the
number of times a database is accessed.
A. True
B. False*

35. This parameter is used to pass values into a store procedure.The value of this parameter
cannot changed or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT

36. OUT Parameter. - 3 choices.
A. pass out of procedure module*
B. is a constant
C. is a variable*
D. back to the calling block*

37. This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*

38. This object does not contain the stored procedure itself but contains only a call to the stored
procedure.
A. CallableStatment*
B. PreparedStatment
C. prepareCall();

39. This refers to the ability to check whether the cursor stays open after a COMMIT
A. Updatable
B. Holdable*
C. Scrollable

40. The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
41. The CallableStatment object contains the SQL statments.
A. True*
B. False

42. A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*

43. A Rowset Object provides scrollability and updatability for any kind of DBMS or drivers.
A. True*
B. False

44. A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A. true
B. false*

45. Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.

46. Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered event
listener.

47. The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE

48. This is the mechanism of encoding information in a secret coded form, intented only for the
recipient to access the information.
A. Cryptography*
B. Encryption

49. The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A. True*
B. False

50. This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography

51. This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography

52. This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*

53. Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as
sent by the sender. *
B. Spoofing or identity interception, which means impersonating the identity of a different user and
use it in an unauthorized way*
C. Authentication is the process that provides tamper-proofing, while it is on the network.

54. The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory

55. The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV

56. The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*

57. Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A. True*
B. False

58. This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
59. If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A. relative(int row) method*
B. absolute(int row) method.

60. Calling absolute(1) is equivalent to calling last()
A. True
B. False*

61. Which statements are true? (3 choices)
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only. *
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. *
E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency*

62. Which statements are true? (3 choices)
A. The original message text has to be transmitted separately since the content of a digitally signed
message is altered irreversibly.
B. A Certification authority creates a signed certificate by encrypting the digitally signature with its
private key. *
C. The digital signature and sender's public key are appended to end of a message. *
D. A recipient decrypts a signed signature using its own public key.
E. The integrity of a message cannot be ensure while using message digests*

63. This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controller

64. The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory

65. The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator

66. The class is used to transform opaque keys of type Key into key specifications and provide
transparent representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory

67. The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory

68. This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec

69. this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. Confidentiality

70. Data integrity is to protect data from getting tampered, while it is on the network.
A. True*
B. False

71. This is a framework written in java to access and develop cryptographic functionality, and
forms part of the java security API.
A. JCA*
B. JCE

72. With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC

73. Single-bit ciphers are called:
A. Block cipher
B. Stream cipher*

74. Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();

75. the cipher object is initialized by the init() method?
A. True*
B. False

76. The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"

77. "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"

78. Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*

79. Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False

80. In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
======================================================================
1.which of the following are JDBC drivers?(chon 4)(1.5d)
A, JDBC –ODBC bridge*
B native API party – java driver*
C, Net –protoco all – java*
D, JDBC – network driver
E, Native protocol all – java driver*
2. The naming clss extend the -----class
A serializable
B Object*
C System
D Remote
3. -the------Class of java RMI provides stati methods for accep
A MarshalledObject
B Naming
C RMI Security Manager
D log Stream
E Remote Server
4 . the -----use local native libraries to commulicate with the database
A JDBC – ODBC Bridge*
B native – API – Party- java driver
C ODBC net all java driver
D Native Protoco – all – java driver
5 . which interface of the JDBC API contains method used to execute SQL stored procedures
(1d)
A statement
B resultset
C CallableStatement*
6 .. . which interface of the JDBC API execute pre – compied SQL statement(1d)
A preparedStatement*
B statement
C Resultset
7

which of the following three interfaces the JDBC API provides for sending SQL statements
to the database? (2d)
A Statement*
B PreparedStatement*
C callablestatement*
D Connection
E Getconnection
the ----- class is the traditional managerment layer of JDBC working between the …. The
driver

8

a Driver manager
b Connection
c Resultset

9 The java software provides three JDBC product components they are (2d)
A The JDBC DriverManager facility *
B

The JDBC driver test suite*

C

The JDBC – ODBC bridge*

D

The callable stament

10 . A ------obiect is used to send SQL statement to a database
A Connection *
B

Statement

C

Drive

11 . Which interface of the JDBC API provides mothod to setive data that an SQL statement
returns?
A ResultSet *
B Statement
C Driver
D Connection
12 Which two of the following are valid JDBC driver(choose 2)
a JDBC –ODBC bridge plus ODBC driver
b native – API partly –Java drivr
c
d

ODBC Driver
Native java driver

13 Which kind of driver converts ODBC calls drectly into the network protocol
A JDBC _ODBC bridge plus ODBC driver*
B Native API partly java driver
C Native protocol pure java driver
14.

Depending upon scrollabity how many types of result sets are av…..
A One
B Four
C three
D Two

15. Which of the following classes contain the Execute() method?
A ResultSet
B

RescordSet

C

Statement*

D

Connection

16. the -----method is used to retreve the name of
A getColumName()*
B GetColumCaption()
C GetColumLabel()
D None of the others
17

The statement interface provides three different methods for executing SQL
statement, they are (2d)
A ExecuteQuery *
B ExecuteUpdate *
C Execute*
D ExecuteDelete
E

ExecuteInsert

18

Once the Drver classes have been loaded and registered with the driver avaitable for
eatablahing a connection with a database is the statement correct?
A true
B False*
=================================================
1. A cipher disables encryption and decryption operations.
False
2. JDBC is an acronym of ?Java Database Connectivity.?
False
3. Wich of the following are the advantages of JDBC?
1.Continued usage of existing data
2.Vendor dependent
3.Platform independent
4.Ease of use
4. Native Protocol-All Java is ________ JDBC driver.
Type IV
4. The next() method allows to traverse forward by moving the cursor ___ forward.
One row
5. The executeUpdate() method is used to execute which of the following objects?
PreparedStatement and CallableStatement
6. Which of the following are the characteristics of the Stored procedures?
All of the above
7. Which of the following are the benefits of using stored procedure?
1,2,3,4
8. The drawback of using a stored procedure is lack of portability.
False
9. Which of the following is the characteristics of ResultSet?
Scrollable
10. Which of the following parameters are used in stored procedure?
1,2,3,4
11. Which of the following are the static constant values that can be specified for the result set
type?
TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE,
TYPE_SCROLL_INSENSITIVE
12. Once the updaterow() method is called, changes to the database are final and cannot be
undone.
True
13. The UpdateXXX() method of ResultSet is used to change the data in an existing row
False
14. ____ is the parent interface implemented by all connected RowSet objects.
CacheRowSet
15. Which of the following contains path of the class and permission details required to access a
resource?
Policy file
16. Which of the following classes is used to grant access to network resources?
SocketPermission
17. Encryption converts original data into an encrypted form by appluing ___ transformations.
a. Cipher

Q.1) This is an Application Programming Interface provided by Microsoft for access the database.It
uses SQL as its database language.
JDBC
A.
ODBC
B.
Q.2) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls.
B. Translates JDBC calls into database=specific calls or native calls
Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods
C.
on the server.
D. Directly calls RDBMS from client machine.
Q.3) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A. getVarchar();
B. getObject();
C. getString();
Q.4)

This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A. IN
B. OUT
C. IN/OUT

Q.5)

This object does not contain the stored procedure itself but contains only a call to the stored
procedure.
CallableStatment
A.
PreparedStatment
B.
prepareCall();
C.

Q.6)

The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object
B. Callalbalestatment Object
C. PrepareCall () method.

Q.7)

A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
True
A.
False
B.

Q.8)

This object connects to a data source only to read data from a ResultSet or write data back to
the data source.
A. A connected RowSet.
B. A Disconnected RowSet.

Q.9) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC
Q.10) The 'Native API-Java/Party Java' is Driver Type
I
A.
II
B.
III
C.
IV
D.
Q.11) This Objects are used to receive and store the data in the same form as it is returned from the
SQL queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet
D. ExecuteQuery()
Q.12) Calling absolute(1) is equivalent to calling last()
True
A.
False
B.

CRYPTO
Q.13) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted
into usable plaintext.
A. True
B. False
Q.14) This is algorithms that does not use any key, it is known as message digest.
Secret key cryptography
A.
Public Key cryptography
B.
Hash Function
C.
Q.15) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.16) The class is used to generate public key certificates.
Certificate Factory
A.
KeyPair Generator
B.
Message Digest
C.
Signature
D.
KeyFactory
E.
Q.17) this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation
B. Tampering
C. Integrity
D. confidentiality
Q.18) With this padding technique a short block is padded with a repeating byte.
DES
A.
PKCS5
B.
CBC
C.
Q.19) the cipher object is initialized by the init() method?
A. True
B. False
Q.20) Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
Encryption and Decryption
A.
Key Agreement
B.
Password Base Encryption
C.
Q.21) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File
C. Access Controler
Q.22 Code
)
using
using
using
using

System;
System.Collections.Generic;
System.Linq;
System.Text;

namespace Abstract_Animal {
abstract class Animal {
public void run() {
Console.writeLine("Run by 4 feet");
}
public

void Eat();

}
class Bird:Animal{
public void Eat(){
Console.writeLine("All of dove eat rice");
}
static void Main(String[] args){
Bird dove = new Bird();
dove.Eat();
}
}
}

A. Compiler Error.
B. Print: "All of dove eat rice"
C. print: "Run by 4 feet"
Q.23) Abstact method ,which contains at least one statement, is declared in abstract class.
True
A.
False
B.
Q.24) Eat();
Run();
A. An Abstract class
B. An Interface
Q.25) Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A. True
B. False

1.

Driver types are used to categorize the technology used to connect to the database.

A.

True

B.

False

2.

This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A.

JDBC

B.

ODBC

3.

JDBC is ODBC translated into an object-oriented interface that is natural for java
programmiers.
A.

True

B.

False

4.

In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A.

Two-tier Data processing Model

B.

Three - tier Data processing Model

5. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A.

Translates JDBC calls into ODBC calls.

B.

Translates JDBC calls into database=specific calls or native calls

C.
Maps JDBC calls to the underlying "network" protocol, which in turn calls native
methods on the server.
D.

Directly calls RDBMS from client machine.

6.

This method is use to execute any SQL statement with a "SELECT" clause, that return the
result of the query as a result set.
A.

executeUpdate();

B.

executeQuery();

C.

execute();

7.

This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as
CREATE, DROP Table.
A.

executeUpdate();

B.

execute();

C.

executeQuery();

8.

This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A.

getVarchar();

B.

getObject();

C.

getString();

9.

This method is used for retrieving the value from current row as object.
A.

getRow();

B.

getObject();

C.

getString();

10.

A client application uses stored procedures increases the network traffic, but it reduces
the number of times a database is accessed.
A.

True

B.

False

11.

This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A.

IN

B.

OUT

C.

IN/OUT

12.

OUT Parameter.
- 3 choices.
A.

pass out of procedure module.

B.

is a constant

C.

is a variable

D.

back to the calling block

13.

This Parameter behaves like an initialized variable.

A.

OUT

B.

IN
C.

IN/OUT

14.

This object does not contain the stored procedure itself but contains only a call to the
stored procedure.
A.

CallableStatment

B.

PreparedStatment

C.

prepareCall();

15.

It reefers to the ability to move backward as well as forward through a result set.

A.

Scrollable

B.

Updatable

C.

Holdable

16.

This refers to the ability to check whether the cursor stays open after a COMMIT.

A.

Updatable

B.

Holdable

C.

Scrollable

17.

The prepareStatment() method sends SQL query to the database. and this returns:

A.

PrepareStatment Object

B.

Callalbalestatment Object

C.

PrepareCall () method.
18.

The CallableStatment object contains the SQL statments.

A.

True

B.

False

19.

A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A.

TYPE_SCROLL_SENSITIVE

B.

TYPE_SCROLL_INSENSITIVE

C.

TYPE_FORWARD_ONLY

20.

A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or
drivers.
A.

True

B.

False

21.

A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A.

True

B.

False

22.
Which class is a disconnected rowset.
A.

A CachedRowSet class.

B.

A JDBCRowSet class.

C.

A WebRowSet class.

23.

This object connects to a data source only to read data from a ResultSet or write data
back to the data source.
A.

A connected RowSet.

B.

A Disconnected RowSet.

24.

Which statments are true?

A.

A RowSet has to be make scrollable and updatable at the time of creation.

B.

Scrollability and Updatability of a RowSet is independent of the JDBC driver

C.

A connect RowSet can read data from a non relational database source also.

D.
A RowSet is a JavaBeans component which has to programmatically notify all registered
event listener.

25.

The Result Set can not be modified and hence, It is not updatable in any way.

A.

CONCURENT_READ_ONLY

B.

CONCURENT_UPDATABLE

26.

This is the mechanism of encoding information in a secret coded form, intented only for
the recipient to access the information.
A.

Cryptography

B.

Encryption

27.

The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A.

True

B.

False

28.

This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A.

Hash Function

B.

Secret key cryptography

C.

Public Key cryptography

29.

This is as asymmetric cryptography, It operates under two different keys.

A.

Public Key cryptography

B.

Hash Function

C.

Secret key cryptography

30.

This is algorithms that does not use any key, it is known as message digest.

A.

Secret key cryptography

B.

Public Key cryptography
C.

31.

Hash Function

Which statements are true?

A.
The Tamper-proofing process verifies whether the data received by the receiver is the same
data as sent by the sender.
B.
Spoofing or identity interception, which means impersonating the identity of a different user
and use it in an unauthorized way.
C.

32.

Authentication is the process that provides tamper-proofing, while it is on the network.

The class is use to hash value of the specified data.

A.

Message Digest

B.

Signature

C.

KeyPair Generator

D.

KeyFactory

E.

Certificate Factory

33.

The class is use to produce a pair of public and private keys appropriate for a specified.

A.

Signature

B.

Message Digest

C.

KeyPair Generator

D.

KeyFactory

E.

Certificate Factory
34.

The class is used to sign and check the authenticity of digital signature

A.

Message Digest

B.

Signature

C.

Certificate Factory

D.

KeyFactory

E.

KeyPair Generator

35.

The class is used to transform opaque keys of type Key into key specifications and
provide transparent representations of the underlying key material and vice versa.
A.

Message Digest

B.

KeyPair Generator

C.

Signature

D.

KeyFactory

E.

Certificate Factory

36.

The class is used to generate public key certificates.

A.

Certificate Factory

B.

KeyPair Generator

C.

Message Digest

D.

Signature

E.

KeyFactory
37.

This class is a database of keys and certificates

A.

Algorithm Parameters

B.

KeyStore

C.

Key

D.

KeySpec

38.

Cryptography is essential for making a application safe and secure, including:
- 4 choices
A.

Tampering

B.

Non-repudiation

C.

Integrity & confidentiality

D.

Spoofing

E.

Authentication

39.

this ensures that a user or a business organization or a program entity has performed a
transaction.
A.

Non-repudiation

B.

Tampering

C.

Integrity

D.

confidentiality

40.

Data integrity is to protect data from getting tampered,while it is on the network.
A.

True

B.

False

41.

This is a framework written in java to access and develop cryptographic functionality,
and forms part of the java security API.
A.

JCA

B.

JCE

42.

With this padding technique a short block is padded with a repeating byte.

A.

DES

B.

PKCS5

C.

CBC

43.

Single-bit ciphers are called:

A.

Block cipher

B.

Stream cipher

44.

Cipher objects are created using this method of the cipher class.

A.

getInstance();

B.

init();
45.

the cipher object is initialized by the init() method?

A.

True

B.

False

46.

The Code : "DES/CBC/PKCS5Padding" is the form of

A.

"mode/algorithm/padding"

B.

"algorithm/mode/padding"

C.

"algorithm/padding/mode"

D.

"DeCrypto/Cipher/padding"

47.

"(Only)algorithm" such as

A.

"DES"

B.

"PKCS5"

C.

"CBE"

48.

Most these implementations mix a random number, known as the "salt" with the
password text to derive an encrypted key.
A.

Encryption and Decryption

B.

Key Agreement

C.

Password Base Encryption
49.

Single bits or a block of bits can be encrypted into cipher blocks
A. True(correct answer)
B. False(your answer)

50.

The product components of JDBC are:

A.

JDBC-ODBC Bridge.

B.

Net-Protocol/all-Java driver

C.

JDBC Driver Manager

D.

JDBC Test Suite & JDBC API

E.

ODBC

51.

In this Environment, the java application is the client and DBMS is the database server.

A.

Three-Tier JDBC

B.

Two-Tier JDBC

52.

The 'Native API-Java/Party Java' is Driver Type

A.

I

B.

II

C.

III

D.

IV
53.

The 'Native Protocol - All Java' is Driver Type

A.

I

B.

II

C.

III

D.

IV

54.

Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A.

True

B.

False

55.

This Objects are used to receive and store the data in the same form as it is returned from
the SQL queries.
A.

PreparedStatement

B.

CallableStatement

C.

ResultSet

D.

ExecuteQuery()

56.

This Method return an Integer value indicating the row count.

A.

ExecuteQuery();

B.

Execute();

C.

ExecuteUpdate();
57.

If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A.

relative(int row) method

B.

absolute(int row) method.

58 Calling absolute(1) is equivalent to calling last()
A.

True

B.

False

59.

Which statements are true?
- 3 choices
A.

In Scrollable ResultSet, the cursor is positioned on the first row.

B.

A default ResultSet object is not updated and has a cursor that moves forward only.

C.

The ResultSet should be compulsorily closed after a COMMIT statement.

D.

Holdable refers to ability to check whether the cursor stays open after a COMMIT.

E.
The createStatement method has two argurments namely resultSetType and
resultSetConcurrency

60.

Which statements are true?
-3 choices
A.
The original message text has to be transmitted separately separately since the content of a
digitally signed message is altered irreversibly.
B.
A Certification authority creates a signed certificate by encrypting the digitally signature with
its private key.
C.

The digital signature and sender's public key are appended to end of a message.

D.

A recipient decrypts a signed signature using its own public key.

E.

The integrity of a message cannot be ensure while using message digests.

61.

This comprises the mapping of one or more permissions with a class.

A.

Security Manager

B.

Policy File

C.

Access Controler

62.

An abstract class can be sealed

A.

True

B.

False

63.
using System;

using System.Collections.Generic;

using System.Linq;
using System.Text;

namespace Abstract_class

{

abstract class Animal {

publicvoid run() {
Console.WriteLine("Run by 4 feet");

}

public void Eat();

}

classbird:Animal

{
// implement method Eat of abstract class Animal.

publicoverride void Eat(){

Console.WriteLine("All of dove eat rice");

}

static voidMain(string[] args)

{

bird dove = new bird();

dove.Eat();

}

}

}

A.

Compiler Error.

B.

Print: "All of dove eat rice"

C.

print: "Run by 4 feet"
64.

Abstact method ,which contains at least one statement, is declared in abstract class.

A.

True

B.

False

65.

Eat();
Run();
Sound();
A.

An Abstract class

B.

An Interface

66.

Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A.

True

B.

False

Contenu connexe

Tendances

Tendances (20)

Ethernet
EthernetEthernet
Ethernet
 
Static typing vs dynamic typing languages
Static typing vs dynamic typing languagesStatic typing vs dynamic typing languages
Static typing vs dynamic typing languages
 
Packages in java
Packages in javaPackages in java
Packages in java
 
The process states
The process statesThe process states
The process states
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Difference between cts and cls
Difference between cts and clsDifference between cts and cls
Difference between cts and cls
 
4. algorithm modes (1)
4. algorithm modes (1)4. algorithm modes (1)
4. algorithm modes (1)
 
Autoboxing And Unboxing In Java
Autoboxing And Unboxing In JavaAutoboxing And Unboxing In Java
Autoboxing And Unboxing In Java
 
Java-java virtual machine
Java-java virtual machineJava-java virtual machine
Java-java virtual machine
 
Bfs and Dfs
Bfs and DfsBfs and Dfs
Bfs and Dfs
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
Moore and mealy machine
Moore and mealy machineMoore and mealy machine
Moore and mealy machine
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
Decision Making and Looping
Decision Making and LoopingDecision Making and Looping
Decision Making and Looping
 
Lecture 6- Deadlocks.pptx
Lecture 6- Deadlocks.pptxLecture 6- Deadlocks.pptx
Lecture 6- Deadlocks.pptx
 
PROLOG: Cuts And Negation In Prolog
PROLOG: Cuts And Negation In PrologPROLOG: Cuts And Negation In Prolog
PROLOG: Cuts And Negation In Prolog
 
Java layoutmanager
Java layoutmanagerJava layoutmanager
Java layoutmanager
 
Turing machines
Turing machinesTuring machines
Turing machines
 
0/1 knapsack
0/1 knapsack0/1 knapsack
0/1 knapsack
 

Similaire à Quiz test JDBC

Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxConsider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
maxinesmith73660
 
Advanced programming topics asma
Advanced programming topics asmaAdvanced programming topics asma
Advanced programming topics asma
AbdullahJana
 
Partially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final ReportPartially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final Report
Saurebh Raut
 

Similaire à Quiz test JDBC (20)

Prueba de conociemientos Fullsctack NET v2.docx
Prueba de conociemientos  Fullsctack NET v2.docxPrueba de conociemientos  Fullsctack NET v2.docx
Prueba de conociemientos Fullsctack NET v2.docx
 
Which of the following is not one of the rules cited in class for making e ma...
Which of the following is not one of the rules cited in class for making e ma...Which of the following is not one of the rules cited in class for making e ma...
Which of the following is not one of the rules cited in class for making e ma...
 
one of the rules cited in class for making e-mail more effective Experience T...
one of the rules cited in class for making e-mail more effective Experience T...one of the rules cited in class for making e-mail more effective Experience T...
one of the rules cited in class for making e-mail more effective Experience T...
 
CORE JAVA
CORE JAVACORE JAVA
CORE JAVA
 
Comp 328 final guide
Comp 328 final guideComp 328 final guide
Comp 328 final guide
 
Vb.net
Vb.netVb.net
Vb.net
 
CORE JAVA
CORE JAVACORE JAVA
CORE JAVA
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
 
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxConsider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
 
Javascript MCQ
Javascript MCQJavascript MCQ
Javascript MCQ
 
Istqb Sample Questions
Istqb Sample QuestionsIstqb Sample Questions
Istqb Sample Questions
 
Advanced programming topics asma
Advanced programming topics asmaAdvanced programming topics asma
Advanced programming topics asma
 
Spring Certification Questions
Spring Certification QuestionsSpring Certification Questions
Spring Certification Questions
 
Database access and JDBC
Database access and JDBCDatabase access and JDBC
Database access and JDBC
 
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
 
Javascript Question
Javascript QuestionJavascript Question
Javascript Question
 
Partially connected 3D NoC - Access Noxim.
Partially connected 3D NoC - Access Noxim. Partially connected 3D NoC - Access Noxim.
Partially connected 3D NoC - Access Noxim.
 
Partially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final ReportPartially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final Report
 
Pega Mock questions
Pega Mock questionsPega Mock questions
Pega Mock questions
 
GWT training session 3
GWT training session 3GWT training session 3
GWT training session 3
 

Plus de vacbalolenvadi90 (7)

Java day9n
Java day9nJava day9n
Java day9n
 
Ass2 1 (2)
Ass2 1 (2)Ass2 1 (2)
Ass2 1 (2)
 
Bai day1
Bai day1Bai day1
Bai day1
 
Final
FinalFinal
Final
 
sqlKey
sqlKeysqlKey
sqlKey
 
Abcxyz
AbcxyzAbcxyz
Abcxyz
 
SQL DdaHKH Huế
SQL DdaHKH HuếSQL DdaHKH Huế
SQL DdaHKH Huế
 

Dernier

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Quiz test JDBC

  • 1. Q.1) Driver types are used to categorize the technology used to connect to the database. A. True * B. False Q.2) This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC* Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers. A. True* B. False Q.4) In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model* B. Three - tier Data processing Model Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. * B. Translates JDBC calls into database=specific calls or native calls C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set. A. executeUpdate(); B. executeQuery();* C. execute(); Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate();* B. execute(); C. executeQuery();
  • 2. Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString();* Q.9) This method is used for retrieving the value from current row as object. A. getRow(); B. getObject();* C. getString(); Q.10) A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False* Q.11) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN* B. OUT C. IN/OUT Q.12) OUT Parameter. - 3 choices. A. pass out of procedure module. * B. is a constant C. is a variable* D. back to the calling block* Q.13) This Parameter behaves like an initialized variable. A. OUT B. IN C. IN/OUT* Q.14) This object does not contain the stored procedure itself but contains only a call to the stored procedure.
  • 3. A. CallableStatment* B. PreparedStatment C. prepareCall(); Q.15) It reefers to the ability to move backward as well as forward through a result set. A. Scrollable* B. Updatable C. Holdable Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT. A. Updatable B. Holdable* C. Scrollable Q.17) The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object* B. Callalbalestatment Object C. PrepareCall () method. Q.18) The CallableStatment object contains the SQL statments. A. True* B. False Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY* Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. A. True* B. False Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. True*
  • 4. B. False Q.22) Which class is a disconnected rowset. A. A CachedRowSet class. * B. A JDBCRowSet class. C. A WebRowSet class. Q.23) This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. * Q.24) Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver* C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. Q.25) The Result Set can not be modified and hence, It is not updatable in any way. A. CONCURENT_READ_ONLY* B. CONCURENT_UPDATABLE Q.26) This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information. A. Cryptography* B. Encryption Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True* B. False Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography* C. Public Key cryptography
  • 5. Q.29) This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography* B. Hash Function C. Secret key cryptography Q.30) This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography C. Hash Function* Q.31) Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. * B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way. * C. Authentication is the process that provides tamper-proofing, while it is on the network. Q.32) The class is use to hash value of the specified data. A. Message Digest* B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory Q.33) The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator* D. KeyFactory E. Certificate Factory Q.34) The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature*
  • 6. C. Certificate Factory D. KeyFactory E. KeyPair Generator Q.35) The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory* E. Certificate Factory Q.36) The class is used to generate public key certificates. A. Certificate Factory* B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory Q.37) This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore* C. Key D. KeySpec Q.38) Cryptography is essential for making a application safe and secure, including: - 3 choices A. Tampering* B. Non-repudiation* C. Integrity & confidentiality* D. Spoofing E. Authentication*
  • 7. Q.39) this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation* B. Tampering C. Integrity D. confidentiality Q.40) Data integrity is to protect data from getting tampered,while it is on the network. A. True* B. False Q.41) This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA* B. JCE Q.42) With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5* C. CBC Q.43) Single-bit ciphers are called: A. Block cipher* B. Stream cipher Q.44) Cipher objects are created using this method of the cipher class. A. getInstance();* B. init(); Q.45) the cipher object is initialized by the init() method? A. True* B. False Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding" B. "algorithm/mode/padding"*
  • 8. C. "algorithm/padding/mode" D. "DeCrypto/Cipher/padding" Q.47) "(Only)algorithm" such as A. "DES"* B. "PKCS5" C. "CBE" Q.48) Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption* Q.49) Single bits or a block of bits can be encrypted into cipher blocks A. True* B. False Q.50) The product components of JDBC are: A. JDBC-ODBC Bridge. B. Net-Protocol/all-Java driver C. JDBC Driver Manager* D. JDBC Test Suite & JDBC API* E. ODBC Q.51) In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC* Q.52) The 'Native API-Java/Party Java' is Driver Type A. I B. II* C. III D. IV
  • 9. Q.53) The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV* Q.54) Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True* B. False Q.55) This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet* D. ExecuteQuery() Q.56) This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate();* Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method* B. absolute(int row) method. Q.58) Calling absolute(1) is equivalent to calling last() A. True B. False* Q.59) Which statements are true? - 3 choices A. In Scrollable ResultSet, the cursor is positioned on the first row.
  • 10. B. A default ResultSet object is not updated and has a cursor that moves forward only. * C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. * E. The createStatement method has two argurments namely resultSetType and *resultSetConcurrency .61) This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File* C. Access Controler ====================================================================== 1. JDBC and ODBC are identical? A. True B. False* 2. How many kinds of JDBC drivers? A. 10 B. 3 C. 4* D many 3. The JDBC API is a Java API for accessing virtually any kind of tabular data A. False B. True* 4. What is the correct statement about CallableStatement interface? (choose 1) A. It defines a statement to create a stored-procedure B. It contains a call to a stored-procedure* C. It defines a store-procedure 5. Which is the default port number of RMI Registry Server? A. 1023
  • 11. B. 1099* C. 1069 6. Which of the following statements is correct for retrieving all fields from Student table? A. String sql=”SELECT * FROM Student”; Statement st=cn.createStatement(sql); ResultSet rs=st.executeQuery(); B. String sql=”SELECT * FROM Student”; * Statement st=cn.createStatement(); ResultSet rs=st.executeQuery(sql); 7. If you need to use a stored procedure with output parameters, which of the following statement type should be used to call the procedure? A. PreparedStatement B. CallableStatement* C. Statement 8. From which object do you ask for DatabaseMetaData? A. DriverManager B. ResultSet C. Connection* D. Driver 9. Which character is used to represent an input parameter in a CallableStatement? A. * B. # C. ? * D. % 10. Which one of the following will not get the data from the first column of ResultSet rs, returned from executing SQL statement: SELECT name, rank, serialNo FROM employee. A. rs.getString(“name”);
  • 12. B. rs.getString(1); C. rs.getString(0); * 11. Which class contains the transaction control method setAutoCommit, commit, and rollback? A. Statement B. Connection* C. ResultSet 12. You can use an applet in RMI program as ________ A. None of the other options B. Server program C. Client program* 13. Which of the following will not cause a JDBC driver to be loaded and registered with the DriverManager? A. Class.forName(driverString); B. new DriverClass(); C. Include driver name in jdbc.drivers system property D. None of the above* 14. SQLWarnings from multiple Statement method calls (like executeUpdate) will build up until you ask for them all with getWarnings and getNextWarning. A. True B. False* 15. If one intends to work with a ResultSet, which of these PreparedStatement methods will not work? A. execute() B. executeQuery() C. executeUpdate()* 16. Can a ResultSet be reliably returned from a method that creates a Statement and executes a query?
  • 13. A. Yes B. No* 17. How can I use JDBC to create a database? A. Include create=true at end of JDBC URL B. Execute "CREATE DATABASE jGuru" SQL statement* C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements D. Database creation is DBMS specific 18. Which of the following can you do with a JDBC 2.0 database driver that you cannot with a JDBC 1.x driver? A. Batch multiple statements, to be sent to the database together B. Scroll through result sets bi-directionally C. Work with SQL3 data types directly D. All of the above* 19. A __________ result set has a cursor that moves both forward and backward and can be moved to a particular row A. scrollable* B. nonscrollable C. Unscrollable 20. The method___________ is designed for statements that produce a single result set, such as SELECT statement A. executeUpdate B. execute C. Update D. executeQuery* 21. Which three of the following are classes of Java.rmi package? A. Naming* B. MarshalledObject* C. RMISecurityManager* D. Remote 22. Which option of jar file indicates manifest file not created? A. Jar M B. Jar t
  • 14. c. Jar m D. Jar c 23. _______ option of Jar command makes a Java archive file. A. JAR -c B. JAR -m C. JAR -v D. JAR –f 24. Which command adds the file file.class to Xyz.jar? A. jar – uf Xyz . jar file.class B. jar – xf Xyz . jar C. jar – tf Xyz . jar 25. Driver types are used to categorize the technology used to connect to the database. A. True* B. False 26. This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC* 27. JDBC is ODBC translated into an object-oriented interface that is natural for java programmers. A. True* B. False 28. In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model* B. Three - tier Data processing Model 29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. * B. Translates JDBC calls into database=specific calls or native calls
  • 15. C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. 30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate();* B. execute(); C. executeQuery(); 31. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString();* 32. This method is used for retrieving the value from current row as object. A. getRow(); B. getObject();* C. getString(); 33. This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A Connected RowSet. B. A Disconnected RowSet. * 34. A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False* 35. This parameter is used to pass values into a store procedure.The value of this parameter cannot changed or reassigned within the module and hence is constant.
  • 16. A. IN* B. OUT C. IN/OUT 36. OUT Parameter. - 3 choices. A. pass out of procedure module* B. is a constant C. is a variable* D. back to the calling block* 37. This Parameter behaves like an initialized variable. A. OUT B. IN C. IN/OUT* 38. This object does not contain the stored procedure itself but contains only a call to the stored procedure. A. CallableStatment* B. PreparedStatment C. prepareCall(); 39. This refers to the ability to check whether the cursor stays open after a COMMIT A. Updatable B. Holdable* C. Scrollable 40. The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object* B. Callalbalestatment Object C. PrepareCall () method.
  • 17. 41. The CallableStatment object contains the SQL statments. A. True* B. False 42. A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY* 43. A Rowset Object provides scrollability and updatability for any kind of DBMS or drivers. A. True* B. False 44. A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. true B. false* 45. Which class is a disconnected rowset. A. A CachedRowSet class. * B. A JDBCRowSet class. C. A WebRowSet class. 46. Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver* C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. 47. The Result Set can not be modified and hence, It is not updatable in any way.
  • 18. A. CONCURENT_READ_ONLY* B. CONCURENT_UPDATABLE 48. This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information. A. Cryptography* B. Encryption 49. The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True* B. False 50. This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography* C. Public Key cryptography 51. This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography* B. Hash Function C. Secret key cryptography 52. This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography C. Hash Function* 53. Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. *
  • 19. B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way* C. Authentication is the process that provides tamper-proofing, while it is on the network. 54. The class is use to hash value of the specified data. A. Message Digest* B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory 55. The 'Native API-Java/Party Java' is Driver Type A. I B. II* C. III D. IV 56. The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV* 57. Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True* B. False 58. This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate();*
  • 20. 59. If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method* B. absolute(int row) method. 60. Calling absolute(1) is equivalent to calling last() A. True B. False* 61. Which statements are true? (3 choices) A. In Scrollable ResultSet, the cursor is positioned on the first row. B. A default ResultSet object is not updated and has a cursor that moves forward only. * C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. * E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency* 62. Which statements are true? (3 choices) A. The original message text has to be transmitted separately since the content of a digitally signed message is altered irreversibly. B. A Certification authority creates a signed certificate by encrypting the digitally signature with its private key. * C. The digital signature and sender's public key are appended to end of a message. * D. A recipient decrypts a signed signature using its own public key. E. The integrity of a message cannot be ensure while using message digests* 63. This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File* C. Access Controller 64. The class is use to produce a pair of public and private keys appropriate for a specified.
  • 21. A. Signature B. Message Digest C. KeyPair Generator* D. KeyFactory E. Certificate Factory 65. The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature* C. Certificate Factory D. KeyFactory E. KeyPair Generator 66. The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory* E. Certificate Factory 67. The class is used to generate public key certificates. A. Certificate Factory* B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory 68. This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore* C. Key
  • 22. D. KeySpec 69. this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation* B. Tampering C. Integrity D. Confidentiality 70. Data integrity is to protect data from getting tampered, while it is on the network. A. True* B. False 71. This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA* B. JCE 72. With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5* C. CBC 73. Single-bit ciphers are called: A. Block cipher B. Stream cipher* 74. Cipher objects are created using this method of the cipher class. A. getInstance();* B. init(); 75. the cipher object is initialized by the init() method?
  • 23. A. True* B. False 76. The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding" B. "algorithm/mode/padding"* C. "algorithm/padding/mode" D. "DeCrypto/Cipher/padding" 77. "(Only)algorithm" such as A. "DES"* B. "PKCS5" C. "CBE" 78. Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption* 79. Single bits or a block of bits can be encrypted into cipher blocks A. True* B. False 80. In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC* ====================================================================== 1.which of the following are JDBC drivers?(chon 4)(1.5d) A, JDBC –ODBC bridge* B native API party – java driver* C, Net –protoco all – java*
  • 24. D, JDBC – network driver E, Native protocol all – java driver* 2. The naming clss extend the -----class A serializable B Object* C System D Remote 3. -the------Class of java RMI provides stati methods for accep A MarshalledObject B Naming C RMI Security Manager D log Stream E Remote Server 4 . the -----use local native libraries to commulicate with the database A JDBC – ODBC Bridge* B native – API – Party- java driver C ODBC net all java driver D Native Protoco – all – java driver 5 . which interface of the JDBC API contains method used to execute SQL stored procedures (1d) A statement B resultset C CallableStatement* 6 .. . which interface of the JDBC API execute pre – compied SQL statement(1d) A preparedStatement* B statement C Resultset 7 which of the following three interfaces the JDBC API provides for sending SQL statements to the database? (2d) A Statement* B PreparedStatement* C callablestatement* D Connection
  • 25. E Getconnection the ----- class is the traditional managerment layer of JDBC working between the …. The driver 8 a Driver manager b Connection c Resultset 9 The java software provides three JDBC product components they are (2d) A The JDBC DriverManager facility * B The JDBC driver test suite* C The JDBC – ODBC bridge* D The callable stament 10 . A ------obiect is used to send SQL statement to a database A Connection * B Statement C Drive 11 . Which interface of the JDBC API provides mothod to setive data that an SQL statement returns? A ResultSet * B Statement C Driver D Connection 12 Which two of the following are valid JDBC driver(choose 2) a JDBC –ODBC bridge plus ODBC driver b native – API partly –Java drivr c d ODBC Driver Native java driver 13 Which kind of driver converts ODBC calls drectly into the network protocol A JDBC _ODBC bridge plus ODBC driver* B Native API partly java driver C Native protocol pure java driver 14. Depending upon scrollabity how many types of result sets are av…..
  • 26. A One B Four C three D Two 15. Which of the following classes contain the Execute() method? A ResultSet B RescordSet C Statement* D Connection 16. the -----method is used to retreve the name of A getColumName()* B GetColumCaption() C GetColumLabel() D None of the others 17 The statement interface provides three different methods for executing SQL statement, they are (2d) A ExecuteQuery * B ExecuteUpdate * C Execute* D ExecuteDelete E ExecuteInsert 18 Once the Drver classes have been loaded and registered with the driver avaitable for eatablahing a connection with a database is the statement correct? A true B False* ================================================= 1. A cipher disables encryption and decryption operations. False 2. JDBC is an acronym of ?Java Database Connectivity.? False 3. Wich of the following are the advantages of JDBC? 1.Continued usage of existing data 2.Vendor dependent 3.Platform independent 4.Ease of use
  • 27. 4. Native Protocol-All Java is ________ JDBC driver. Type IV 4. The next() method allows to traverse forward by moving the cursor ___ forward. One row 5. The executeUpdate() method is used to execute which of the following objects? PreparedStatement and CallableStatement 6. Which of the following are the characteristics of the Stored procedures? All of the above 7. Which of the following are the benefits of using stored procedure? 1,2,3,4 8. The drawback of using a stored procedure is lack of portability. False 9. Which of the following is the characteristics of ResultSet? Scrollable 10. Which of the following parameters are used in stored procedure? 1,2,3,4 11. Which of the following are the static constant values that can be specified for the result set type? TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE, TYPE_SCROLL_INSENSITIVE 12. Once the updaterow() method is called, changes to the database are final and cannot be undone. True 13. The UpdateXXX() method of ResultSet is used to change the data in an existing row False 14. ____ is the parent interface implemented by all connected RowSet objects. CacheRowSet 15. Which of the following contains path of the class and permission details required to access a resource? Policy file 16. Which of the following classes is used to grant access to network resources? SocketPermission 17. Encryption converts original data into an encrypted form by appluing ___ transformations. a. Cipher Q.1) This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. JDBC A. ODBC B. Q.2) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. B. Translates JDBC calls into database=specific calls or native calls Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods C. on the server. D. Directly calls RDBMS from client machine. Q.3) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object.
  • 28. A. getVarchar(); B. getObject(); C. getString(); Q.4) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN B. OUT C. IN/OUT Q.5) This object does not contain the stored procedure itself but contains only a call to the stored procedure. CallableStatment A. PreparedStatment B. prepareCall(); C. Q.6) The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object B. Callalbalestatment Object C. PrepareCall () method. Q.7) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. True A. False B. Q.8) This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. Q.9) In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC Q.10) The 'Native API-Java/Party Java' is Driver Type I A. II B. III C. IV D. Q.11) This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet D. ExecuteQuery()
  • 29. Q.12) Calling absolute(1) is equivalent to calling last() True A. False B. CRYPTO Q.13) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True B. False Q.14) This is algorithms that does not use any key, it is known as message digest. Secret key cryptography A. Public Key cryptography B. Hash Function C. Q.15) The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator D. KeyFactory E. Certificate Factory Q.16) The class is used to generate public key certificates. Certificate Factory A. KeyPair Generator B. Message Digest C. Signature D. KeyFactory E. Q.17) this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation B. Tampering C. Integrity D. confidentiality Q.18) With this padding technique a short block is padded with a repeating byte. DES A. PKCS5 B. CBC C.
  • 30. Q.19) the cipher object is initialized by the init() method? A. True B. False Q.20) Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. Encryption and Decryption A. Key Agreement B. Password Base Encryption C. Q.21) This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File C. Access Controler Q.22 Code ) using using using using System; System.Collections.Generic; System.Linq; System.Text; namespace Abstract_Animal { abstract class Animal { public void run() { Console.writeLine("Run by 4 feet"); } public void Eat(); } class Bird:Animal{ public void Eat(){ Console.writeLine("All of dove eat rice"); } static void Main(String[] args){ Bird dove = new Bird(); dove.Eat(); } } } A. Compiler Error. B. Print: "All of dove eat rice" C. print: "Run by 4 feet" Q.23) Abstact method ,which contains at least one statement, is declared in abstract class. True A. False B.
  • 31. Q.24) Eat(); Run(); A. An Abstract class B. An Interface Q.25) Interface can not contain constants, data fields, contructors, Deconstructors and static members A. True B. False 1. Driver types are used to categorize the technology used to connect to the database. A. True B. False 2. This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC 3. JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers. A. True B. False 4. In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model B. Three - tier Data processing Model 5. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
  • 32. A. Translates JDBC calls into ODBC calls. B. Translates JDBC calls into database=specific calls or native calls C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. 6. This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set. A. executeUpdate(); B. executeQuery(); C. execute(); 7. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate(); B. execute(); C. executeQuery(); 8. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString(); 9. This method is used for retrieving the value from current row as object.
  • 33. A. getRow(); B. getObject(); C. getString(); 10. A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False 11. This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN B. OUT C. IN/OUT 12. OUT Parameter. - 3 choices. A. pass out of procedure module. B. is a constant C. is a variable D. back to the calling block 13. This Parameter behaves like an initialized variable. A. OUT B. IN
  • 34. C. IN/OUT 14. This object does not contain the stored procedure itself but contains only a call to the stored procedure. A. CallableStatment B. PreparedStatment C. prepareCall(); 15. It reefers to the ability to move backward as well as forward through a result set. A. Scrollable B. Updatable C. Holdable 16. This refers to the ability to check whether the cursor stays open after a COMMIT. A. Updatable B. Holdable C. Scrollable 17. The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object B. Callalbalestatment Object C. PrepareCall () method.
  • 35. 18. The CallableStatment object contains the SQL statments. A. True B. False 19. A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY 20. A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. A. True B. False 21. A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. True B. False 22. Which class is a disconnected rowset.
  • 36. A. A CachedRowSet class. B. A JDBCRowSet class. C. A WebRowSet class. 23. This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. 24. Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. 25. The Result Set can not be modified and hence, It is not updatable in any way. A. CONCURENT_READ_ONLY B. CONCURENT_UPDATABLE 26. This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information.
  • 37. A. Cryptography B. Encryption 27. The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True B. False 28. This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography C. Public Key cryptography 29. This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography B. Hash Function C. Secret key cryptography 30. This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography
  • 38. C. 31. Hash Function Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way. C. 32. Authentication is the process that provides tamper-proofing, while it is on the network. The class is use to hash value of the specified data. A. Message Digest B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory 33. The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator D. KeyFactory E. Certificate Factory
  • 39. 34. The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature C. Certificate Factory D. KeyFactory E. KeyPair Generator 35. The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory E. Certificate Factory 36. The class is used to generate public key certificates. A. Certificate Factory B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory
  • 40. 37. This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore C. Key D. KeySpec 38. Cryptography is essential for making a application safe and secure, including: - 4 choices A. Tampering B. Non-repudiation C. Integrity & confidentiality D. Spoofing E. Authentication 39. this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation B. Tampering C. Integrity D. confidentiality 40. Data integrity is to protect data from getting tampered,while it is on the network.
  • 41. A. True B. False 41. This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA B. JCE 42. With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5 C. CBC 43. Single-bit ciphers are called: A. Block cipher B. Stream cipher 44. Cipher objects are created using this method of the cipher class. A. getInstance(); B. init();
  • 42. 45. the cipher object is initialized by the init() method? A. True B. False 46. The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding" B. "algorithm/mode/padding" C. "algorithm/padding/mode" D. "DeCrypto/Cipher/padding" 47. "(Only)algorithm" such as A. "DES" B. "PKCS5" C. "CBE" 48. Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption
  • 43. 49. Single bits or a block of bits can be encrypted into cipher blocks A. True(correct answer) B. False(your answer) 50. The product components of JDBC are: A. JDBC-ODBC Bridge. B. Net-Protocol/all-Java driver C. JDBC Driver Manager D. JDBC Test Suite & JDBC API E. ODBC 51. In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC 52. The 'Native API-Java/Party Java' is Driver Type A. I B. II C. III D. IV
  • 44. 53. The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV 54. Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True B. False 55. This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet D. ExecuteQuery() 56. This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate();
  • 45. 57. If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method B. absolute(int row) method. 58 Calling absolute(1) is equivalent to calling last() A. True B. False 59. Which statements are true? - 3 choices A. In Scrollable ResultSet, the cursor is positioned on the first row. B. A default ResultSet object is not updated and has a cursor that moves forward only. C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency 60. Which statements are true? -3 choices A. The original message text has to be transmitted separately separately since the content of a digitally signed message is altered irreversibly. B. A Certification authority creates a signed certificate by encrypting the digitally signature with its private key.
  • 46. C. The digital signature and sender's public key are appended to end of a message. D. A recipient decrypts a signed signature using its own public key. E. The integrity of a message cannot be ensure while using message digests. 61. This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File C. Access Controler 62. An abstract class can be sealed A. True B. False 63. using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Abstract_class { abstract class Animal { publicvoid run() {
  • 47. Console.WriteLine("Run by 4 feet"); } public void Eat(); } classbird:Animal { // implement method Eat of abstract class Animal. publicoverride void Eat(){ Console.WriteLine("All of dove eat rice"); } static voidMain(string[] args) { bird dove = new bird(); dove.Eat(); } } } A. Compiler Error. B. Print: "All of dove eat rice" C. print: "Run by 4 feet"
  • 48. 64. Abstact method ,which contains at least one statement, is declared in abstract class. A. True B. False 65. Eat(); Run(); Sound(); A. An Abstract class B. An Interface 66. Interface can not contain constants, data fields, contructors, Deconstructors and static members A. True B. False