Dbsj - Test Java For Aptech

65 Questions

Settings
Please wait...
Questions and Answers
  • 1. 
    Driver types are used to categorize the technology used to connect to the database.
    • A. 

      True

    • B. 

      False

  • 2. 
    This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language.
    • A. 

      JDBC

    • B. 

      ODBC

  • 3. 
    JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers.
    • A. 

      True

    • B. 

      False

  • 4. 
    In this Data processing Model,the client communicates directly to the database server without the help  of any middle-ware technologies or another server.
    • A. 

      Two-tier Data processing Model

    • B. 

      Three - tier Data processing Model

  • 5. 
    The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
    • A. 

      Translates JDBC calls into ODBC calls.

    • B. 

      Translates JDBC calls into database=specific calls or native calls

    • C. 

      Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server.

    • D. 

      Directly calls RDBMS from client machine.

  • 6. 
    This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set.
    • A. 

      ExecuteUpdate();

    • B. 

      ExecuteQuery();

    • C. 

      Execute();

  • 7. 
    This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table.
    • A. 

      ExecuteUpdate();

    • B. 

      Execute();

    • C. 

      ExecuteQuery();

  • 8. 
    This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object.
    • A. 

      GetVarchar();

    • B. 

      GetObject();

    • C. 

      GetString();

  • 9. 
    This method is used for retrieving the value from current row as object.
    • A. 

      GetRow();

    • B. 

      GetObject();

    • C. 

      GetString();

  • 10. 
    A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed.
    • A. 

      True

    • B. 

      False

  • 11. 
    This parameter is used to pass values into a  store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant.
    • A. 

      IN

    • B. 

      OUT

    • C. 

      IN/OUT

  • 12. 
    OUT Parameter.- 3 choices.
    • A. 

      Pass out of procedure module.

    • B. 

      Is a constant

    • C. 

      Is a variable

    • D. 

      Back to the calling block

  • 13. 
    This Parameter behaves like an initialized variable.
    • A. 

      OUT

    • B. 

      IN

    • C. 

      IN/OUT

  • 14. 
    This object does not contain the stored procedure itself but contains only a call to the stored procedure.
    • A. 

      CallableStatment

    • B. 

      PreparedStatment

    • C. 

      PrepareCall();

  • 15. 
    It reefers to the ability to move backward as well as forward through a result set.
    • A. 

      Scrollable

    • B. 

      Updatable

    • C. 

      Holdable

  • 16. 
    This refers to the ability to check whether the cursor stays open after a COMMIT.
    • A. 

      Updatable

    • B. 

      Holdable

    • C. 

      Scrollable

  • 17. 
    The prepareStatment() method sends SQL query to the database. and this returns:
    • A. 

      PrepareStatment Object

    • B. 

      Callalbalestatment Object

    • C. 

      PrepareCall () method.

  • 18. 
    The CallableStatment object contains the SQL statments.
    • A. 

      True

    • B. 

      False

  • 19. 
    A cursor that can only be used to process from the beginning of a  ResultSet to the end of it.It is default type.
    • A. 

      TYPE_SCROLL_SENSITIVE

    • B. 

      TYPE_SCROLL_INSENSITIVE

    • C. 

      TYPE_FORWARD_ONLY

  • 20. 
    A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
    • A. 

      True

    • B. 

      False

  • 21. 
    A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet.
    • A. 

      True

    • B. 

      False

  • 22. 
    Which class is a disconnected rowset.
    • A. 

      A CachedRowSet class.

    • B. 

      A JDBCRowSet class.

    • C. 

      A WebRowSet class.

  • 23. 
    This object connects to a data source only to read data from a ResultSet or write data back to the data source.
    • A. 

      A connected RowSet.

    • B. 

      A Disconnected RowSet.

  • 24. 
    Which statments are true?
    • A. 

      A RowSet has to be make scrollable and updatable at the time of creation.

    • B. 

      Scrollability and Updatability of a RowSet is independent of the JDBC driver

    • C. 

      A connect RowSet can read data from a non relational database source also.

    • D. 

      A RowSet is a JavaBeans component which has to programmatically notify all registered event listener.

  • 25. 
    The Result Set can not be modified and hence, It is not updatable in any way.
    • A. 

      CONCURENT_READ_ONLY

    • B. 

      CONCURENT_UPDATABLE

  • 26. 
    This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information.
    • A. 

      Cryptography

    • B. 

      Encryption

  • 27. 
    The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext.
    • A. 

      True

    • B. 

      False

  • 28. 
    This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography.
    • A. 

      Hash Function

    • B. 

      Secret key cryptography

    • C. 

      Public Key cryptography

  • 29. 
    This is as asymmetric cryptography, It operates under two different keys.
    • A. 

      Public Key cryptography

    • B. 

      Hash Function

    • C. 

      Secret key cryptography

  • 30. 
    This is algorithms that does not use any key, it is known as message digest.
    • A. 

      Secret key cryptography

    • B. 

      Public Key cryptography

    • C. 

      Hash Function

  • 31. 
    Which statements are true?
    • A. 

      The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender.

    • B. 

      Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way.

    • C. 

      Authentication is the process that provides tamper-proofing, while it is on the network.

  • 32. 
    The class is use to hash value of the specified data.
    • A. 

      Message Digest

    • B. 

      Signature

    • C. 

      KeyPair Generator

    • D. 

      KeyFactory

    • E. 

      Certificate Factory

  • 33. 
    The class is used to sign and check the authenticity of digital signature
    • A. 

      Message Digest

    • B. 

      Signature

    • C. 

      Certificate Factory

    • D. 

      KeyFactory

    • E. 

      KeyPair Generator

  • 34. 
    The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa.
    • A. 

      Message Digest

    • B. 

      KeyPair Generator

    • C. 

      Signature

    • D. 

      KeyFactory

    • E. 

      Certificate Factory

  • 35. 
    The class is used to generate public key certificates.
    • A. 

      Certificate Factory

    • B. 

      KeyPair Generator

    • C. 

      Message Digest

    • D. 

      Signature

    • E. 

      KeyFactory

  • 36. 
    This class is a database of keys and certificates
    • A. 

      Algorithm Parameters

    • B. 

      KeyStore

    • C. 

      Key

    • D. 

      KeySpec

  • 37. 
    Cryptography is essential for making a application safe and secure, including:- 4 choices
    • A. 

      Tampering

    • B. 

      Non-repudiation

    • C. 

      Integrity & confidentiality

    • D. 

      Spoofing

    • E. 

      Authentication

  • 38. 
    This ensures that a user or a business organization or a program entity has performed a transaction.
    • A. 

      Non-repudiation

    • B. 

      Tampering

    • C. 

      Integrity

    • D. 

      Confidentiality

  • 39. 
    Data integrity is to protect data from getting tampered,while it is on the network.
    • A. 

      True

    • B. 

      False

  • 40. 
    This  is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API.
    • A. 

      JCA

    • B. 

      JCE

  • 41. 
    With this padding technique a short block is padded with a repeating byte.
    • A. 

      DES

    • B. 

      PKCS5

    • C. 

      CBC

  • 42. 
    Single-bit ciphers are called:
    • A. 

      Block cipher

    • B. 

      Stream cipher

  • 43. 
    Cipher objects are created using this method of the cipher class.
    • A. 

      GetInstance();

    • B. 

      Init();

  • 44. 
    The cipher object is initialized by the init() method?
    • A. 

      True

    • B. 

      False

  • 45. 
    The Code : "DES/CBC/PKCS5Padding" is the form of
    • A. 

      "mode/algorithm/padding"

    • B. 

      "algorithm/mode/padding"

    • C. 

      "algorithm/padding/mode"

    • D. 

      "DeCrypto/Cipher/padding"

  • 46. 
    "(Only)algorithm" such as
    • A. 

      "DES"

    • B. 

      "PKCS5"

    • C. 

      "CBE"

  • 47. 
    Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key.
    • A. 

      Encryption and Decryption

    • B. 

      Key Agreement

    • C. 

      Password Base Encryption

  • 48. 
    Single bits or a block of bits can be encrypted into cipher blocks
    • A. 

      True

    • B. 

      False

  • 49. 
    The product components of JDBC are:
    • A. 

      JDBC-ODBC Bridge.

    • B. 

      Net-Protocol/all-Java driver

    • C. 

      JDBC Driver Manager

    • D. 

      JDBC Test Suite & JDBC API

    • E. 

      ODBC

  • 50. 
    In this Environment, the java application is the client and DBMS is the database server.
    • A. 

      Three-Tier JDBC

    • B. 

      Two-Tier JDBC

  • 51. 
    The 'Native API-Java/Party Java' is Driver Type
    • A. 

      I

    • B. 

      II

    • C. 

      III

    • D. 

      IV

  • 52. 
    The 'Native Protocol - All Java' is Driver Type
    • A. 

      I

    • B. 

      II

    • C. 

      III

    • D. 

      IV

  • 53. 
    Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface.
    • A. 

      True

    • B. 

      False

  • 54. 
    This Objects are used to receive and store the data in the same form as it is returned from the SQL queries.
    • A. 

      PreparedStatement

    • B. 

      CallableStatement

    • C. 

      ResultSet

    • D. 

      ExecuteQuery()

  • 55. 
    This Method return an Integer value indicating the row count.
    • A. 

      ExecuteQuery();

    • B. 

      Execute();

    • C. 

      ExecuteUpdate();

  • 56. 
    If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row.
    • A. 

      Relative(int row) method

    • B. 

      Absolute(int row) method.

  • 57. 
    Calling absolute(1) is equivalent to calling last()
    • A. 

      True

    • B. 

      False

  • 58. 
    • A. 

      In Scrollable ResultSet, the cursor is positioned on the first row.

    • B. 

      A default ResultSet object is not updated and has a cursor that moves forward only.

    • C. 

      The ResultSet should be compulsorily closed after a COMMIT statement.

    • D. 

      Holdable refers to ability to check whether the cursor stays open after a COMMIT.

    • E. 

      The createStatement method has two argurments namely resultSetType and resultSetConcurrency

  • 59. 
    Which statements are true?-3 choices
    • A. 

      The original message text has to be transmitted separately separately since the content of a digitally signed message is altered irreversibly.

    • B. 

      A Certification authority creates a signed certificate by encrypting the digitally signature with its private key.

    • C. 

      The digital signature and sender's public key are appended to end of a message.

    • D. 

      A recipient decrypts a signed signature using its own public key.

    • E. 

      The integrity of a message cannot be ensure while using message digests.

  • 60. 
    This comprises the mapping of one or more permissions with a class.
    • A. 

      Security Manager

    • B. 

      Policy File

    • C. 

      Access Controler

  • 61. 
    An abstract class can be sealed
    • A. 

      True

    • B. 

      False

  • 62. 
    using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Abstract_class { abstract class Animal { public void run() { Console.WriteLine("Run by 4 feet"); } public  void Eat(); } class bird:Animal { // implement method Eat of abstract class Animal. public override void Eat(){ Console.WriteLine("All of dove eat rice"); } static void Main(string[] args) { bird dove = new bird(); dove.Eat(); } } }
    • A. 

      Compiler Error.

    • B. 

      Print: "All of dove eat rice"

    • C. 

      Print: "Run by 4 feet"

  • 63. 
    Abstact method ,which contains at least one statement, is declared in abstract class.
    • A. 

      True

    • B. 

      False

  • 64. 
    Eat();Run();Sound();
    • A. 

      An Abstract class

    • B. 

      An Interface

  • 65. 
    Interface can not contain constants, data fields, contructors, Deconstructors and static members
    • A. 

      True

    • B. 

      False