Đề thi aptech
Question Excerpt From DBSJ - Test Java for Aptech Q.1) Driver types are used to categorize the technology used to connect to the database. A. True B. False Q.2) This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers. A. True B. False Q.4) In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model B. Three - tier Data processing Model Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. B. Translates JDBC calls into database=specific calls or native calls C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set. A. executeUpdate(); B. executeQuery(); C. execute(); Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate(); B. execute(); C. executeQuery(); Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString(); Q.9) This method is used for retrieving the value from current row as object. A. getRow(); B. getObject(); C. getString(); Q.10) A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False Q.11) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN B. OUT C. IN/OUT Q.12) OUT Parameter. - 3 choices. A. pass out of procedure module. B. is a constant C. is a variable D. back to the calling block Q.13) This Parameter behaves like an initialized variable. A. OUT B. IN C. IN/OUT Q.14) This object does not contain the stored procedure itself but contains only a call to the stored procedure. A. CallableStatment B. PreparedStatment C. prepareCall(); Q.15) It reefers to the ability to move backward as well as forward through a result set. A. Scrollable B. Updatable C. Holdabl e Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT. A. Updatable B. Holdabl e C. Scrollable Q.17) The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object B. Callalbalestatment Object C. PrepareCall () method. Q.18) The CallableStatment object contains the SQL statments. A. True B. False Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. A. True B. False Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. True B. False Q.22) Which class is a disconnected rowset. A. A CachedRowSet class. B. A JDBCRowSet class. C. A WebRowSet class. Q.23) This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. Q.24) Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. Q.25) The Result Set can not be modified and hence, It is not updatable in any way. A. CONCURENT_READ_ONLY B. CONCURENT_UPDATABLE Q.26) This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information. A. Cryptography B. Encryption Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True B. False Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography C. Public Key cryptography Q.29) This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography B. Hash Function C. Secret key cryptography Q.30) This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography C. Hash Function Q.31) Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way. C. Authentication is the process that provides tamper-proofing, while it is on the network. Q.32) The class is use to hash value of the specified data. A. Message Digest B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory Q.33) The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator D. KeyFactory E. Certificate Factory Q.34) The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature C. Certificate Factory D. KeyFactory E. KeyPair Generator Q.35) The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory E. Certificate Factory Q.36) The class is used to generate public key certificates. A. Certificate Factory B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory Q.37) This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore C. Key D. KeySpec Q.38) Cryptography is essential for making a application safe and secure, including: - 4 choices A. Tampering B. Non-repudiation C. Integrity & confidentiality D. Spoofing E. Authentication Q.39) this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation B. Tampering C. Integrity D. confidentiality Q.40) Data integrity is to protect data from getting tampered,while it is on the network. A. True B. False Q.41) This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA B. JCE Q.42) With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5 C. CBC Q.43) Single-bit ciphers are called: A. Block cipher B. Stream cipher Q.44) Cipher objects are created using this method of the cipher class. A. getInstance(); B. init(); Q.45) the cipher object is initialized by the init() method? A. True B. False Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding " B. "algorithm/mode/padding " C. "algorithm/padding/mode " D. "DeCrypto/Cipher/padding" Q.47) "(Only)algorithm" such as A. "DES" B. "PKCS5" C. "CBE " Q.48) Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption Q.49) Single bits or a block of bits can be encrypted into cipher blocks A. True B. False Q.50) The product components of JDBC are: A. JDBC-ODBC Bridge. B. Net-Protocol/all-Java driver C. JDBC Driver Manager D. JDBC Test Suite & JDBC API E. ODBC Q.51) In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC Q.52) The 'Native API-Java/Party Java' is Driver Type A. I B. II C. III D. IV Q.53) The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV Q.54) Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True B. False Q.55) This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet D. ExecuteQuery() Q.56) This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate(); Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method B. absolute(int row) method. Q.58) Calling absolute(1) is equivalent to calling last() A. True B. False Q.59) Which statements are true? - 3 choices A. In Scrollable ResultSet, the cursor is positioned on the first row. B. A default ResultSet object is not updated and has a cursor that moves forward only. C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency Q.60) Which statements are true? -3 choices A. The original message text has to be transmitted separately separately since the content of a digitally signed message is altered irreversibly. B. A Certification authority creates a signed certificate by encrypting the digitally signature with its private key. C. The digital signature and sender's public key are appended to end of a message. D. A recipient decrypts a signed signature using its own public key. E. The integrity of a message cannot be ensure while using message digests. Q.61) This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File C. Access Controler Q.62) An abstract class can be sealed A. True B. False Q.63) using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Abstract_class { abstract class Animal { public void run() { Console.WriteLine("Run by 4 feet"); } public void Eat(); } class bird:Animal { // implement method Eat of abstract class Animal. public override void Eat(){ Console.WriteLine("All of dove eat rice"); } static void Main(string[] args) { bird dove = new bird(); dove.Eat(); } } } A. Compiler Error. B. Print: "All of dove eat rice" C. print: "Run by 4 feet" Q.64) Abstact method ,which contains at least one statement, is declared in abstract class. A. True B. False Q.65) Eat(); Run(); Sound(); A. An Abstract class B. An Interface Q.66) Interface can not contain constants, data fields, contructors, Deconstructors and static members A. True B. False . Question Excerpt From DBSJ - Test Java for Aptech Q.1) Driver types are used to categorize the technology used to connect