This quiz evaluates knowledge in Java database connectivity, covering JDBC, ODBC, SQL, and data processing models.
JDBC
ODBC
Rate this question:
True
False
Rate this question:
Two-tier Data processing Model
Three - tier Data processing Model
Rate this question:
Translates JDBC calls into ODBC calls.
Translates JDBC calls into database=specific calls or native calls
Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server.
Directly calls RDBMS from client machine.
Rate this question:
ExecuteUpdate();
ExecuteQuery();
Execute();
Rate this question:
ExecuteUpdate();
Execute();
ExecuteQuery();
Rate this question:
GetVarchar();
GetObject();
GetString();
Rate this question:
GetRow();
GetObject();
GetString();
Rate this question:
True
False
Rate this question:
IN
OUT
IN/OUT
Rate this question:
Pass out of procedure module.
Is a constant
Is a variable
Back to the calling block
Rate this question:
OUT
IN
IN/OUT
Rate this question:
CallableStatment
PreparedStatment
PrepareCall();
Rate this question:
Scrollable
Updatable
Holdable
Rate this question:
Updatable
Holdable
Scrollable
Rate this question:
PrepareStatment Object
Callalbalestatment Object
PrepareCall () method.
Rate this question:
True
False
Rate this question:
TYPE_SCROLL_SENSITIVE
TYPE_SCROLL_INSENSITIVE
TYPE_FORWARD_ONLY
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
A CachedRowSet class.
A JDBCRowSet class.
A WebRowSet class.
Rate this question:
A connected RowSet.
A Disconnected RowSet.
Rate this question:
A RowSet has to be make scrollable and updatable at the time of creation.
Scrollability and Updatability of a RowSet is independent of the JDBC driver
A connect RowSet can read data from a non relational database source also.
A RowSet is a JavaBeans component which has to programmatically notify all registered event listener.
Rate this question:
CONCURENT_READ_ONLY
CONCURENT_UPDATABLE
Rate this question:
Cryptography
Encryption
Rate this question:
True
False
Rate this question:
Hash Function
Secret key cryptography
Public Key cryptography
Rate this question:
Public Key cryptography
Hash Function
Secret key cryptography
Rate this question:
Secret key cryptography
Public Key cryptography
Hash Function
Rate this question:
The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender.
Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way.
Authentication is the process that provides tamper-proofing, while it is on the network.
Rate this question:
Message Digest
Signature
KeyPair Generator
KeyFactory
Certificate Factory
Rate this question:
Message Digest
Signature
Certificate Factory
KeyFactory
KeyPair Generator
Rate this question:
Message Digest
KeyPair Generator
Signature
KeyFactory
Certificate Factory
Rate this question:
Certificate Factory
KeyPair Generator
Message Digest
Signature
KeyFactory
Rate this question:
Algorithm Parameters
KeyStore
Key
KeySpec
Rate this question:
Tampering
Non-repudiation
Integrity & confidentiality
Spoofing
Authentication
Rate this question:
Non-repudiation
Tampering
Integrity
Confidentiality
Rate this question:
True
False
Rate this question:
JCA
JCE
Rate this question:
DES
PKCS5
CBC
Rate this question:
Block cipher
Stream cipher
Rate this question:
GetInstance();
Init();
Rate this question:
True
False
Rate this question:
"mode/algorithm/padding"
"algorithm/mode/padding"
"algorithm/padding/mode"
"DeCrypto/Cipher/padding"
Rate this question:
"DES"
"PKCS5"
"CBE"
Rate this question:
Encryption and Decryption
Key Agreement
Password Base Encryption
Rate this question:
True
False
Rate this question:
JDBC-ODBC Bridge.
Net-Protocol/all-Java driver
JDBC Driver Manager
JDBC Test Suite & JDBC API
ODBC
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.