Dbsj - Test Java For Aptech

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vietha
V
Vietha
Community Contributor
Quizzes Created: 11 | Total Attempts: 9,911
| Attempts: 1,696 | Questions: 65
Please wait...
Question 1 / 65
0 %
0/100
Score 0/100
1. Driver types are used to categorize the technology used to connect to the database.

Explanation

Driver types are indeed used to categorize the technology used to connect to the database. Different driver types are designed to work with specific database management systems (DBMS) and provide the necessary functionality for applications to communicate with the database. The driver type determines the method and protocol used for communication, such as ODBC (Open Database Connectivity) for a wide range of databases, JDBC (Java Database Connectivity) for Java applications, or specific drivers for popular DBMS like MySQL or Oracle. Categorizing driver types helps developers choose the appropriate driver for their specific database technology.

Submit
Please wait...
About This Quiz
Java Quizzes & Trivia

This quiz evaluates knowledge in Java database connectivity, covering JDBC, ODBC, SQL, and data processing models.

2. This is algorithms that does not use any key, it is known as message digest.

Explanation

A hash function is a type of algorithm that does not require the use of a key. It takes an input (message) and produces a fixed-size output called a digest or hash value. This digest is unique to each input, and even a small change in the input will result in a completely different hash value. Hash functions are commonly used in various applications, such as data integrity checks, password storage, and digital signatures. They provide a fast and efficient way to verify the integrity of data without revealing the original input.

Submit
3. In this Data processing Model,the client communicates directly to the database server without the help  of any middle-ware technologies or another server.

Explanation

The given correct answer is "Two-tier Data processing Model". In this model, the client communicates directly with the database server without the need for any middle-ware technologies or another server. This means that the client application handles both the presentation layer and the data access layer, resulting in a simpler architecture. The client sends requests directly to the database server, which processes them and sends the response back to the client. This model is often used for smaller applications where the client and database server are located on the same machine or within a local network.

Submit
4. The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext.

Explanation

The given statement is true. Encrypting refers to the process of converting plain, readable text (plaintext) into an unreadable form (ciphertext) using encryption algorithms. This is done to protect sensitive information from unauthorized access. The ciphertext can be decrypted back into the original plaintext using the appropriate decryption key. So, the statement accurately describes the process of encryption and decryption.

Submit
5. This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set.

Explanation

The correct answer is executeQuery(). This method is used to execute any SQL statement with a "SELECT" clause that returns the result of the query as a result set. The executeQuery() method is specifically designed for retrieving data from a database and is commonly used when you want to retrieve and manipulate data from the database. It returns a ResultSet object that contains the data returned by the query, which can then be processed further in the application.

Submit
6. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table.

Explanation

The correct answer is "executeUpdate();". This method is used to execute SQL statements that modify the data in the database, such as INSERT, DELETE, and UPDATE statements, as well as other SQL DDL (Data Definition Language) statements like CREATE and DROP Table. It returns an integer value representing the number of rows affected by the execution of the SQL statement. It is commonly used when you want to update or modify data in the database.

Submit
7. The Result Set can not be modified and hence, It is not updatable in any way.

Explanation

The correct answer is CONCURENT_READ_ONLY because it states that the result set cannot be modified and is not updatable in any way. This means that any attempt to update or modify the result set will not be allowed, ensuring that the data remains unchanged during concurrent access.

Submit
8. JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers.

Explanation

JDBC stands for Java Database Connectivity, which is an API that provides a standard way for Java programmers to interact with databases. It allows Java applications to connect to and manipulate databases using SQL queries. ODBC, on the other hand, is a similar API that provides a standard way for applications to interact with databases, but it is not object-oriented and is primarily used in non-Java environments. Therefore, the statement that JDBC is ODBC translated into an object-oriented interface that is natural for Java programmers is true.

Submit
9. Data integrity is to protect data from getting tampered,while it is on the network.

Explanation

Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data remains intact and unaltered while it is being transmitted or stored on a network. By implementing various security measures such as encryption, checksums, and access controls, data integrity safeguards against unauthorized modifications, deletions, or corruption. Therefore, the statement "Data integrity is to protect data from getting tampered while it is on the network" is true.

Submit
10. "(Only)algorithm" such as

Explanation

The correct answer is "DES" because it is an example of an algorithm. DES stands for Data Encryption Standard and it is a symmetric key algorithm used for encryption and decryption of data. It was developed in the 1970s and became a widely used encryption standard.

Submit
11. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object.

Explanation

The getString() method is used to retrieve a string value (SQL type VARCHAR) and assign it to a Java String object. This method is commonly used when working with databases and retrieving string values from the result set. It ensures that the retrieved value is stored as a string in the Java program, allowing for further manipulation or processing.

Submit
12. It reefers to the ability to move backward as well as forward through a result set.

Explanation

Scrollable refers to the ability to move backward as well as forward through a result set. This means that the user can navigate through the data in both directions, allowing them to easily access and view different records within the result set. This feature is particularly useful when working with large datasets or when the user needs to quickly locate specific information within the result set.

Submit
13. The prepareStatment() method sends SQL query to the database. and this returns:

Explanation

The prepareStatement() method is used to send an SQL query to the database. This method returns a PreparedStatement object, which represents a precompiled SQL statement. This object can be used to execute the SQL statement multiple times with different values, providing better performance compared to regular Statement objects. The PreparedStatement object allows for parameterized queries, which can help prevent SQL injection attacks. Therefore, the correct answer is "PrepareStatement Object."

Submit
14. Single bits or a block of bits can be encrypted into cipher blocks

Explanation

Single bits or a block of bits can be encrypted into cipher blocks. Encryption is the process of converting plaintext into ciphertext to protect the information from unauthorized access. In many encryption algorithms, such as symmetric key encryption or block ciphers, the plaintext is divided into blocks of fixed size (usually in bits) and each block is encrypted separately. Therefore, it is true that single bits or a block of bits can be encrypted into cipher blocks.

Submit
15. A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.

Explanation

A Rowset Object is capable of providing both scrollability and updatability for any type of DBMS or drivers. This means that it allows for navigating through the rows of a result set in a non-sequential manner (scrollability) and also enables making changes to the data in the result set (updatability). Therefore, the statement is true.

Submit
16. Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface.

Explanation

The statement and prepared statement are both inherited from the statement interface, which means they share similar methods and functionality. The callable statement, on the other hand, is inherited from the prepared statement interface, indicating that it has additional methods and functionality specific to executing callable SQL statements. Therefore, the statement and prepared statement interfaces are both inherited by the callable statement, making the statement true.

Submit
17. The CallableStatment object contains the SQL statments.

Explanation

The explanation for the given correct answer is that a CallableStatement object in Java represents a precompiled SQL statement that can be executed multiple times. It is used to call stored procedures or functions in a database. Therefore, it contains SQL statements that can be executed by the database.

Submit
18. Which class is a disconnected rowset.

Explanation

A CachedRowSet class is a disconnected rowset because it can operate independently from the database connection. It can retrieve data from a database, store it locally, and then disconnect from the database. This allows for offline manipulation and processing of the data without the need for a continuous connection to the database. The CachedRowSet class provides a convenient way to work with data in a disconnected manner, making it a suitable choice for scenarios where offline data manipulation is required.

Submit
19. The class is used to sign and check the authenticity of digital signature

Explanation

The Signature class is used to sign and check the authenticity of digital signatures. It provides methods to create and verify digital signatures using cryptographic algorithms. With the Signature class, a user can generate a digital signature for a message and then verify the signature to ensure the integrity and authenticity of the message. The Signature class is an essential tool for ensuring secure communication and data integrity in various applications.

Submit
20. The class is used to generate public key certificates.

Explanation

Certificate Factory is the correct answer because it is a class in Java that is used to generate public key certificates. It provides methods to create X.509 certificates and Certificate Revocation Lists (CRLs) from certificate encoding formats such as DER and PEM. The Certificate Factory class is part of the Java Security API and is commonly used in applications that require certificate management and authentication.

Submit
21. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.

Explanation

The Type 1 driver, also known as JDBC-ODBC bridge plus ODBC driver, translates JDBC calls into ODBC calls. This means that when a Java application makes a JDBC call, the Type 1 driver converts that call into an equivalent ODBC call, which is then executed by the ODBC driver. This allows the Java application to interact with a database using the ODBC interface, which is a common interface for accessing databases in many programming languages.

Submit
22. Cipher objects are created using this method of the cipher class.

Explanation

The getInstance() method is used to create Cipher objects in the cipher class. It is a static method that returns a new instance of the Cipher class. This method is commonly used for creating cipher objects for encryption and decryption operations in various cryptographic algorithms. The init() method, on the other hand, is used to initialize a cipher object with a specific mode, padding scheme, and key. However, in this context, the getInstance() method is the correct answer as it directly refers to the creation of Cipher objects.

Submit
23. The cipher object is initialized by the init() method?

Explanation

The statement is true because in order to use a cipher object for encryption or decryption, it needs to be initialized with the init() method. This method sets up the cipher object with the necessary parameters and key to perform the cryptographic operation. Without initialization, the cipher object would not be able to function properly and perform encryption or decryption operations.

Submit
24. This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language.

Explanation

ODBC stands for Open Database Connectivity, which is an Application Programming Interface (API) provided by Microsoft. It allows developers to access different types of databases using a common set of functions. ODBC uses SQL (Structured Query Language) as its database language, which is a standard language for managing and manipulating databases. Therefore, ODBC is the correct answer as it aligns with the provided description.

Submit
25. This refers to the ability to check whether the cursor stays open after a COMMIT.

Explanation

Holdable refers to the ability of a cursor to remain open after a COMMIT statement is executed. When a cursor is holdable, it allows the user to continue accessing the result set even after committing changes to the database. This is useful in situations where the user needs to perform multiple operations on the result set without having to re-execute the query. By keeping the cursor open, the user can easily navigate through the result set and perform additional operations as needed.

Submit
26. This is as asymmetric cryptography, It operates under two different keys.

Explanation

Public Key cryptography is the correct answer because it is a type of asymmetric cryptography that operates under two different keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. This allows for secure communication and data transfer, as the public key can be freely shared with others while the private key remains secret. Public Key cryptography is widely used in various applications, such as secure email communication, digital signatures, and secure online transactions.

Submit
27. This parameter is used to pass values into a  store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant.

Explanation

The IN parameter is used to pass values into a store procedure. The value of this parameter cannot be changed or reassigned within the module and hence is constant.

Submit
28. This class is a database of keys and certificates

Explanation

The given answer, "KeyStore," is the correct choice because a KeyStore is a class that serves as a database for storing keys and certificates. It provides methods for generating, storing, and retrieving cryptographic keys and certificates. In the context of the given information, where the class is described as a database of keys and certificates, KeyStore aligns perfectly with this description. The other options, Algorithm Parameters, Key, and KeySpec, are related to cryptographic operations but do not specifically serve as a database for storing keys and certificates.

Submit
29. A cursor that can only be used to process from the beginning of a  ResultSet to the end of it.It is default type.

Explanation

The correct answer is TYPE_FORWARD_ONLY. This type of cursor can only be used to process from the beginning of a ResultSet to the end of it. It is the default type, meaning that if no specific type is specified, the ResultSet will be of type TYPE_FORWARD_ONLY.

Submit
30. This  is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API.

Explanation

JCA stands for Java Cryptography Architecture. It is a framework written in Java that provides a set of APIs for accessing and developing cryptographic functionality. JCA forms part of the Java security API, which allows developers to implement secure communication, data integrity, and confidentiality in their Java applications. JCE, on the other hand, stands for Java Cryptography Extension, which is an additional set of cryptographic APIs that extends the functionality provided by JCA. Therefore, the correct answer is JCA.

Submit
31. Using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Abstract_class { abstract class Animal { public void run() { Console.WriteLine("Run by 4 feet"); } public  void Eat(); } class bird:Animal { // implement method Eat of abstract class Animal. public override void Eat(){ Console.WriteLine("All of dove eat rice"); } static void Main(string[] args) { bird dove = new bird(); dove.Eat(); } } }

Explanation

The code provided will result in a compiler error. This is because the abstract class Animal has a method called Eat(), but it does not have an implementation. In order for a class to inherit from an abstract class, it must provide an implementation for all the abstract methods in the base class. Therefore, the code will not compile and will result in a compiler error.

Submit
32. Interface can not contain constants, data fields, contructors, Deconstructors and static members

Explanation

Interfaces in programming languages are used to define a contract or a set of rules that a class must adhere to. They can only contain method declarations and cannot have constants, data fields, constructors, destructors, or static members. The purpose of an interface is to provide a blueprint for classes to implement, and it does not allow for the inclusion of these additional elements. Therefore, the statement that interfaces cannot contain constants, data fields, constructors, destructors, and static members is true.

Submit
33. This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information.

Explanation

Cryptography is the process of encoding information in a secret coded form, ensuring that only the intended recipient can access the information. It involves various techniques such as encryption, which transforms the original data into an unreadable format using algorithms and keys. Cryptography plays a crucial role in ensuring the security and confidentiality of sensitive information, especially during transmission over insecure networks.

Submit
34. This object does not contain the stored procedure itself but contains only a call to the stored procedure.

Explanation

The correct answer is CallableStatment. A CallableStatement is used to call a stored procedure in a database. It does not contain the actual stored procedure itself, but rather a call to the stored procedure. This allows the application to execute the stored procedure and retrieve any output or result sets returned by the procedure.

Submit
35. If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row.

Explanation

The relative(int row) method is used to move the cursor forward by a specified number of rows. If the row value is 0, the method has no effect. If the row value is positive, the cursor is moved forward that many rows. This method is used to navigate through a result set or cursor in a database.

Submit
36. This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography.

Explanation

The given explanation suggests that the process described, where the input (plaintext) is transformed into an output (ciphertext), is known as secret key cryptography. This implies that a secret key is used to encrypt and decrypt the data. Secret key cryptography, also known as symmetric cryptography, uses the same key for both encryption and decryption, ensuring that only those with the key can access the original plaintext.

Submit
37. The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa.

Explanation

KeyFactory is the correct answer because it is a class that is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. This means that KeyFactory allows for the conversion and manipulation of keys in a way that is compatible with different cryptographic algorithms and systems.

Submit
38. Single-bit ciphers are called:

Explanation

Single-bit ciphers are called stream ciphers. Stream ciphers encrypt data one bit or one byte at a time, in a continuous stream. They are typically used for real-time communication applications, as they can encrypt and decrypt data as it is being transmitted. Stream ciphers are known for their speed and efficiency, making them suitable for applications where high-speed encryption is required. In contrast, block ciphers encrypt data in fixed-size blocks, such as 64 or 128 bits, and are commonly used for data storage and transmission where the entire block needs to be processed at once.

Submit
39. Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key.

Explanation

Password-based encryption is a method that uses a password to encrypt and decrypt data. In this method, a random number called a "salt" is mixed with the password text to derive an encrypted key. This salt adds an extra layer of security by making it harder for attackers to guess the password. By combining the salt and the password, a unique key is generated for each encryption operation, making it more difficult for unauthorized users to gain access to the encrypted data.

Submit
40. In this Environment, the java application is the client and DBMS is the database server.

Explanation

The given answer, "Two-Tier JDBC," suggests that the architecture being described is a two-tier model. In this model, the Java application acts as the client, directly interacting with the database server (DBMS). This means that the application is responsible for both the presentation layer and the business logic layer, while the DBMS handles the data storage and retrieval. This architecture is commonly used for smaller applications where the client and server are located on the same machine or within a local network.

Submit
41. This Objects are used to receive and store the data in the same form as it is returned from the SQL queries.

Explanation

A ResultSet is used to receive and store the data in the same form as it is returned from the SQL queries. It allows for easy manipulation and retrieval of the data retrieved from the database. This object is commonly used when executing SELECT queries to retrieve data from a database table.

Submit
42. This method is used for retrieving the value from current row as object.

Explanation

The getObject() method is used to retrieve the value from the current row as an object. This means that whatever value is stored in the current row of the dataset will be returned as an object. This method is useful when you want to retrieve the value without any specific data type conversion or manipulation.

Submit
43. The 'Native API-Java/Party Java' is Driver Type

Explanation

The given statement states that the 'Native API-Java/Party Java' is a driver type. The options I, III, and IV do not provide any information about the driver type. However, option II directly states that it is the correct answer. Therefore, option II is the correct answer as it confirms that 'Native API-Java/Party Java' is indeed a driver type.

Submit
44. Eat();
Run();
Sound();

Explanation

The given options "Eat();Run();Sound();" suggest a list of actions or behaviors. An interface in programming defines a contract for classes to implement these behaviors. An interface allows multiple classes to have the same set of behaviors, ensuring consistency and enabling polymorphism. Therefore, the correct answer is "An Interface."

Submit
45. With this padding technique a short block is padded with a repeating byte.

Explanation

PKCS5 is a padding technique used in DES (Data Encryption Standard) and other cryptographic algorithms. It involves padding a short block of data with a repeating byte. This ensures that the block is extended to the required length before encryption. The use of a repeating byte simplifies the padding process and allows for easy removal of the padding during decryption. PKCS5 padding is widely used and provides a secure and efficient method for encrypting data with DES in a CBC (Cipher Block Chaining) mode.

Submit
46. The 'Native Protocol - All Java' is Driver Type

Explanation

The given statement suggests that the 'Native Protocol - All Java' is a driver type. The statement does not provide any additional information or context to further explain or support this claim. Therefore, it is not possible to provide a detailed explanation based on the given information.

Submit
47. This Parameter behaves like an initialized variable.

Explanation

IN/OUT is the correct answer because this parameter behaves like an initialized variable. In other words, it can be both input and output. It can be passed into a function with an initial value and then modified within the function, and the modified value can be returned or used outside the function. This allows for a more flexible and versatile use of the parameter in different contexts.

Submit
48. OUT Parameter.
- 3 choices.

Explanation

The correct answer is "pass out of procedure module, is a variable, back to the calling block." This answer suggests that an out parameter is a variable that is passed out of a procedure module and returned back to the calling block. This implies that the value of the out parameter can be modified within the procedure and the modified value will be accessible outside of the procedure.

Submit
49. The class is use to hash value of the specified data.

Explanation

The Message Digest class is used to hash the value of the specified data. Hashing is a process of converting data into a fixed-size string of characters, which is unique to the input data. This class provides various algorithms for hashing data, such as MD5, SHA-1, SHA-256, etc. The hashed value can be used for data integrity checks, password storage, digital signatures, and other security-related purposes.

Submit
50. The Code : "DES/CBC/PKCS5Padding" is the form of

Explanation

The given code "DES/CBC/PKCS5Padding" follows the format "algorithm/mode/padding". In this case, "DES" refers to the Data Encryption Standard algorithm, "CBC" stands for Cipher Block Chaining mode, and "PKCS5Padding" represents the padding scheme used. Therefore, the correct answer is "algorithm/mode/padding".

Submit
51. Calling absolute(1) is equivalent to calling last()

Explanation

Calling absolute(1) is not equivalent to calling last(). The absolute(1) function returns the absolute value of the number 1, which is 1. On the other hand, the last() function returns the last element of a sequence or list. These two functions have different functionalities and cannot be considered equivalent. Therefore, the correct answer is False.

Submit
52. This object connects to a data source only to read data from a ResultSet or write data back to the data source.

Explanation

A Disconnected RowSet is the correct answer because it is an object that connects to a data source only to read data from a ResultSet or write data back to the data source. Unlike a connected RowSet, a Disconnected RowSet does not maintain a continuous connection to the data source and can be used offline, making it more efficient and flexible for data manipulation and processing.

Submit
53. This comprises the mapping of one or more permissions with a class.

Explanation

A policy file is responsible for mapping one or more permissions with a class. It defines the permissions that are granted to classes and specifies the actions that those classes are allowed to perform. The policy file acts as a set of rules or guidelines for the security manager to enforce access control and determine the permissions granted to different classes. The security manager refers to the policy file to make decisions about granting or denying access based on the permissions specified in the file.

Submit
54. A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed.

Explanation

Using stored procedures in a client application does not increase network traffic. In fact, it can reduce the network traffic because the client application can send a single request to the database server, which then executes the necessary stored procedures. This eliminates the need for multiple round-trips between the client and the database server. However, using stored procedures does not necessarily reduce the number of times a database is accessed, as it depends on the specific implementation and usage of the stored procedures.

Submit
55. This Method return an Integer value indicating the row count.

Explanation

The method "ExecuteUpdate()" is the correct answer because it is commonly used in database programming to execute SQL statements that modify data in the database. It returns an integer value indicating the number of rows affected by the update operation. The other two methods mentioned, "ExecuteQuery()" and "Execute()", are used to execute SQL statements that retrieve data from the database and do not modify it.

Submit
56. This ensures that a user or a business organization or a program entity has performed a transaction.

Explanation

Non-repudiation refers to the ability to prove that a transaction has taken place and that the parties involved cannot deny their involvement. It ensures that once a transaction is performed, it cannot be refuted or disowned by any party. This is important for legal and auditing purposes, as it provides evidence and accountability.

Submit
57. An abstract class can be sealed

Explanation

An abstract class cannot be sealed. Sealing a class means that it cannot be inherited or overridden. However, an abstract class is designed to be inherited and extended by its subclasses. Therefore, it would be contradictory to seal an abstract class.

Submit
58. Which statments are true?

Explanation

The scrollability and updatability of a RowSet is independent of the JDBC driver. This means that regardless of the specific JDBC driver being used, the ability to scroll through and update the RowSet remains consistent. The JDBC driver is responsible for establishing the connection to the database and handling the communication between the application and the database, but it does not determine the scrollability or updatability of the RowSet. These features are inherent to the RowSet itself and are not affected by the JDBC driver.

Submit
59. A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet.

Explanation

A ResultSet object does not contain rows from a result set or any other source of tabular data. Instead, it represents a pointer to a specific row within a result set. It allows the programmer to navigate through the result set and retrieve the data from each row. Therefore, the correct answer is False.

Submit
60. Abstact method ,which contains at least one statement, is declared in abstract class.

Explanation

An abstract method is a method that is declared in an abstract class but does not contain any implementation. It only provides a method signature without any code. Therefore, an abstract method does not contain any statements. So, the given statement that "an abstract method, which contains at least one statement, is declared in an abstract class" is false.

Submit
61. Which statements are true?
- 3 choices

Explanation

The first statement is true because a default ResultSet object is not updated and can only move forward through the rows.

The second statement is true because "holdable" refers to the ability to check whether the cursor stays open after a COMMIT statement.

The third statement is also true because the createStatement method does have two arguments, namely resultSetType and resultSetConcurrency.

Submit
62. Which statements are true?

Explanation

The tamper-proofing process verifies the integrity of data by ensuring that the data received by the receiver is the same as the data sent by the sender. This helps to prevent any unauthorized modifications or tampering with the data during transmission. Spoofing, on the other hand, refers to the act of impersonating the identity of a different user and using it in an unauthorized way. This can lead to security breaches and unauthorized access to sensitive information. Therefore, both statements are true and highlight the importance of tamper-proofing and the risks associated with spoofing.

Submit
63. The product components of JDBC are:

Explanation

The correct answer is JDBC-ODBC Bridge, JDBC Driver Manager, JDBC Test Suite & JDBC API. These are the product components of JDBC. The JDBC-ODBC Bridge allows Java programs to access databases through ODBC drivers. The JDBC Driver Manager is responsible for loading the appropriate driver for a specific database. The JDBC Test Suite & JDBC API provide a set of tools and interfaces for developers to interact with databases using Java. ODBC is not a product component of JDBC, but rather a separate technology for accessing databases.

Submit
64. Which statements are true?
-3 choices

Explanation

A Certification authority creates a signed certificate by encrypting the digitally signature with its private key: This statement is true because a certification authority uses its private key to encrypt the digital signature, ensuring the authenticity and integrity of the certificate.

The digital signature and sender's public key are appended to the end of a message: This statement is true because the digital signature and sender's public key are typically included at the end of a message to provide verification and authentication.

The integrity of a message cannot be ensured while using message digests: This statement is true because message digests, such as hash functions, are one-way functions that cannot guarantee the integrity of a message. They can detect accidental changes in the message, but they cannot prevent malicious tampering.

Submit
65. Cryptography is essential for making a application safe and secure, including:
- 4 choices

Explanation

Cryptography is crucial in ensuring the safety and security of an application. Non-repudiation ensures that a user cannot deny their actions or transactions, providing accountability. Integrity and confidentiality ensure that data remains unaltered and protected from unauthorized access. Authentication verifies the identity of users, preventing spoofing or impersonation. All of these aspects contribute to making an application safe and secure.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 13, 2009
    Quiz Created by
    Vietha
Cancel
  • All
    All (65)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Driver types are used to categorize the technology used to connect to...
This is algorithms that does not use any key, it is known as message...
In this Data processing Model,the client communicates directly to the...
The term "encrypting " pertains to converting plaintext to ciphertext,...
This method is use to execute any SQL statement with a "SELECT"...
This method is used to execute INSERT, DELETE, UPDATE , and other SQL...
The Result Set can not be modified and hence, It is not updatable in...
JDBC is ODBC translated into an object-oriented interface that is...
Data integrity is to protect data from getting tampered,while it is on...
"(Only)algorithm" such as
This method is used for retrieving a string value (SQL type VARCHAR)...
It reefers to the ability to move backward as well as forward through...
The prepareStatment() method sends SQL query to the database. and this...
Single bits or a block of bits can be encrypted into cipher blocks
A Rowset Object provides scrollability and updatabilitu for any kind...
Statement and PreparedStatement is inherited from Statement Interface....
The CallableStatment object contains the SQL statments.
Which class is a disconnected rowset.
The class is used to sign and check the authenticity of digital...
The class is used to generate public key certificates.
The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
Cipher objects are created using this method of the cipher class.
The cipher object is initialized by the init() method?
This is an Application Programming Interface provided by Microsoft for...
This refers to the ability to check whether the cursor stays open...
This is as asymmetric cryptography, It operates under two different...
This parameter is used to pass values into a  store procedure.The...
This class is a database of keys and certificates
A cursor that can only be used to process from the beginning of...
This  is a framework written in java to access and develop...
Using System; ...
Interface can not contain constants, data fields, contructors,...
This is the mechanism of encoding information in a secret coded form,...
This object does not contain the stored procedure itself but contains...
If row value is 0, this method has no effect.If row value is positive,...
This transforms the input, called the plaintext, to an output, known...
The class is used to transform opaque keys of type Key into key...
Single-bit ciphers are called:
Most these implementations mix a random number, known as the "salt"...
In this Environment, the java application is the client and DBMS is...
This Objects are used to receive and store the data in the same form...
This method is used for retrieving the value from current row as...
The 'Native API-Java/Party Java' is Driver Type
Eat();Run();Sound();
With this padding technique a short block is padded with a repeating...
The 'Native Protocol - All Java' is Driver Type
This Parameter behaves like an initialized variable.
OUT Parameter.- 3 choices.
The class is use to hash value of the specified data.
The Code : "DES/CBC/PKCS5Padding" is the form of
Calling absolute(1) is equivalent to calling last()
This object connects to a data source only to read data from a...
This comprises the mapping of one or more permissions with a class.
A client application uses stored procedures increases the network...
This Method return an Integer value indicating the row count.
This ensures that a user or a business organization or a program...
An abstract class can be sealed
Which statments are true?
A ResultSet object contains a set of rows from a result set or some...
Abstact method ,which contains at least one statement, is declared in...
Which statements are true?- 3 choices
Which statements are true?
The product components of JDBC are:
Which statements are true?-3 choices
Cryptography is essential for making a application safe and secure,...
Alert!

Advertisement