This document contains 33 multiple choice questions related to Java Database Connectivity (JDBC). Some of the key topics covered include:
- The differences between JDBC and ODBC
- The different types of JDBC drivers
- Using CallableStatement to execute stored procedures
- Retrieving and manipulating result sets
- Transaction control methods like commit and rollback
- Database metadata access through the Connection object
The questions test understanding of core JDBC concepts like executing queries, retrieving and updating result sets, using prepared statements, and working with stored procedures.
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
A list of Top 20 technical seminar topics for computer science engineering (CSE) you should choose for seminars and presentations in 2019. The list also contains related seminar topics on the emerging technologies in computer science, IT, Networking, software branch. To download PDF, PPT Seminar Reports check the links.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
A list of Top 20 technical seminar topics for computer science engineering (CSE) you should choose for seminars and presentations in 2019. The list also contains related seminar topics on the emerging technologies in computer science, IT, Networking, software branch. To download PDF, PPT Seminar Reports check the links.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks
Introduction To Machine Learning | EdurekaEdureka!
** Data Science Certification Training: https://www.edureka.co/data-science **
This Edureka's PPT on "Introduction To Machine Learning" will help you understand the basics of Machine Learning and how it can be used to solve real-world problems. The following topics are covered in this session:
Need For Machine Learning
What is Machine Learning?
Machine Learning Definitions
Machine Learning Process
Types Of Machine Learning
Type Of Problems Solved Using Machine Learning
Demo
YouTube Video: https://youtu.be/BuezNNeOGCI
Blog Series: http://bit.ly/data-science-blogs
Data Science Training Playlist: http://bit.ly/data-science-playlist
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Which of the following is not one of the rules cited in class for making e ma...josbuttlewr116
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Which of the following is not one of the rules cited in class for making e-mail more effective?
A. Include Context B. Ask about one topic at a time
C. Use all capital letters D. Answer a backlog of email in reverse order
2. Which of the following is not an area to protect our computer in?
A. Installing protective systems. B. Tuning the installed protection
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks
Introduction To Machine Learning | EdurekaEdureka!
** Data Science Certification Training: https://www.edureka.co/data-science **
This Edureka's PPT on "Introduction To Machine Learning" will help you understand the basics of Machine Learning and how it can be used to solve real-world problems. The following topics are covered in this session:
Need For Machine Learning
What is Machine Learning?
Machine Learning Definitions
Machine Learning Process
Types Of Machine Learning
Type Of Problems Solved Using Machine Learning
Demo
YouTube Video: https://youtu.be/BuezNNeOGCI
Blog Series: http://bit.ly/data-science-blogs
Data Science Training Playlist: http://bit.ly/data-science-playlist
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Which of the following is not one of the rules cited in class for making e ma...josbuttlewr116
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Which of the following is not one of the rules cited in class for making e-mail more effective?
A. Include Context B. Ask about one topic at a time
C. Use all capital letters D. Answer a backlog of email in reverse order
2. Which of the following is not an area to protect our computer in?
A. Installing protective systems. B. Tuning the installed protection
one of the rules cited in class for making e-mail more effective Experience T...pinck3125
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Which of the following is not one of the rules cited in class for making e-mail more effective?
A. Include Context B. Ask about one topic at a time
C. Use all capital letters D. Answer a backlog of email in reverse order
You can pass your 300-208 Exam with our training kits and practice questions answers prepared by industry experts and professionals. For more info please visit here: https://www.certifyguide.com/exam/300-208/
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxmaxinesmith73660
Consider this code using the ArrayBag of Section 5.2 and the Location class from Chapter 2. What is the output?
Location i = new Location(0, 3);
Location j = new Location(0, 3);
b.add(i);
b.add(j);
System.out.println(b.countOccurrences(i));
A. 0
B. 1
C. 2
D. 3
Suppose that b and c are Integer objects. A typical use of the clone method looks like this:
b = (Integer) c.clone( );
Write a short clear explanation of why the (Integer) type cast is required in this typical example.
A. obj = s;
B. s = obj;
C. s = (String) obj;
D. Two or more answers are correct.
Suppose that obj is an Object variable and s is a String variable. Which of the following statements
is a correctly-compiling widening conversion? Don't worry about possible run-time exceptions
A. obj = s;
B. s = obj;
C. s = (String) obj;
D. Two or more answers are correct.
Suppose that x and y are reference variables and a program activates x.equals(y). What occurs if x is the null reference?
A. A NullPointerException occurs
B. It always returns true.
C. It always returns false.
D. It returns true if y is also a null reference; otherwise it returns false.
Consider the implementation of the Stack using a partially-filled array.
What goes wrong if we try to store the top of the Stack at location [0] and the bottom of the Stack at the last used position of the array?
A. Both peek and pop would require linear time.
B. Both push and pop would require linear time.
C. The Stack could not be used to check balanced parentheses.
D. The Stack could not be used to evaluate postfix expressions.
Write some lines of code that declares an Integer object, using the Integer wrapper class.
Assign the value 42 to this object, then copy this value from the Integer object to an ordinary int variable.
Consider the usual algorithm for determining whether a sequence of parentheses is balanced.
What is the maximum number of parentheses that will appear on the stack AT ANY ONE TIME when the algorithm analyzes: (()(())(()))?
A. 1
B. 2
C. 3
D. 4
E. 5 or more
Consider the usual algorithm to convert an infix expression to a postfix expression.
Suppose that you have read 10 input characters during a conversion and that the
stack now contains the symbols as shown below. Suppose that you read and process
the 11th symbol of the input. What symbol is at the top of the stack in the case where
the 11th symbol is each of the choices shown?
Which of the following stack operations could result in stack underflow?
Answer
A. is_empty
B. pop
C. push
D. Two or more of the above answers
What is the value of the postfix expression 6 3 2 4 + - *:
Answer
A. Something between -15 and -100
B. Something between -5 and -15
C. Something between 5 and -5
D. Something between 5 and 15
E. Something between 15 and 100
1. An array o.
Spring Certification Questions and Spring Free test are tests created to demonstrate all the functions of our mock exams. You will be able to access ten full questions and will have ten minutes of time for finishing the test.
There are several components you can interact with when you take our mock exams:
Take a look at the progress bar at the top; it will tell how you are progressing through the exam.
Read the question and select only the answers you think are correct by checking the corresponding check box.
Navigate the spring questions using the "Previous" and "Next" buttons.
Mark the spring questions you wish to review later. All the questions you have marked will be listed on the right in the section "marked questions". You will be able to jump directly to the question from this list.
If you want to take a look at the correct answers for a question, just click the "Solution" button. In the solution section you will be able to check your answers as well as find a full explanation of the question.
Keep an eye on the countdown. This will tell you how much time is remaining. When the countdown expires, the test will be automatically submitted.
Once the test is submitted, the "result" section will expand. Here, you will be able to review all the questions of the test. From here, you can also navigate directly to each question.
Database access and JDBC
Topics:
- Introduction to JDBC
- Accessing a database: practical steps
- Prepared statements
- Design patterns (DAO)
- Connection pooling
Teaching material for the course of "Tecniche di Programmazione" at Politecnico di Torino in year 2013/2014. More information: http://bit.ly/tecn-progr
Partially connected 3D NoC - Access Noxim. Abhishek Madav
Project for building a partially connected 3D NoC using Access Noxim co-simulator as a part of the EECS 213 - Advanced Computer Architecture course at University of California, Irvine.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Quiz test JDBC
1. Q.1) Driver types are used to categorize the technology used to connect to the database.
A. True *
B. False
Q.2) This is an Application Programming Interface provided by Microsoft for access the database.It
uses SQL as its database language.
A. JDBC
B. ODBC*
Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers.
A. True*
B. False
Q.4) In this Data processing Model,the client communicates directly to the database server without the
help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model
Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server.
D. Directly calls RDBMS from client machine.
Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that return the result
of the query as a result set.
A. executeUpdate();
B. executeQuery();*
C. execute();
Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE,
DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();
2. Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String
object.
A. getVarchar();
B. getObject();
C. getString();*
Q.9) This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();
Q.10) A client application uses stored procedures increases the network traffic, but it reduces the number of
times a database is accessed.
A. True
B. False*
Q.11) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed
or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT
Q.12) OUT Parameter.
- 3 choices.
A. pass out of procedure module. *
B. is a constant
C. is a variable*
D. back to the calling block*
Q.13) This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*
Q.14) This object does not contain the stored procedure itself but contains only a call to the stored procedure.
3. A. CallableStatment*
B. PreparedStatment
C. prepareCall();
Q.15) It reefers to the ability to move backward as well as forward through a result set.
A. Scrollable*
B. Updatable
C. Holdable
Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT.
A. Updatable
B. Holdable*
C. Scrollable
Q.17) The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
Q.18) The CallableStatment object contains the SQL statments.
A. True*
B. False
Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default
type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*
Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
A. True*
B. False
Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file
or spreadsheet.
A. True*
4. B. False
Q.22) Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.
Q.23) This object connects to a data source only to read data from a ResultSet or write data back to the data
source.
A. A connected RowSet.
B. A Disconnected RowSet. *
Q.24) Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener.
Q.25) The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE
Q.26) This is the mechanism of encoding information in a secret coded form, intented only for the recipient to
access the information.
A. Cryptography*
B. Encryption
Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into
usable plaintext.
A. True*
B. False
Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as
Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography
5. Q.29) This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography
Q.30) This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*
Q.31) Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as
sent by the sender. *
B. Spoofing or identity interception, which means impersonating the identity of a different user and use
it in an unauthorized way. *
C. Authentication is the process that provides tamper-proofing, while it is on the network.
Q.32) The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.33) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory
Q.34) The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
6. C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
Q.35) The class is used to transform opaque keys of type Key into key specifications and provide transparent
representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory
Q.36) The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
Q.37) This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec
Q.38) Cryptography is essential for making a application safe and secure, including:
- 3 choices
A. Tampering*
B. Non-repudiation*
C. Integrity & confidentiality*
D. Spoofing
E. Authentication*
7. Q.39) this ensures that a user or a business organization or a program entity has performed a transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. confidentiality
Q.40) Data integrity is to protect data from getting tampered,while it is on the network.
A. True*
B. False
Q.41) This is a framework written in java to access and develop cryptographic functionality, and forms part of
the java security API.
A. JCA*
B. JCE
Q.42) With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC
Q.43) Single-bit ciphers are called:
A. Block cipher*
B. Stream cipher
Q.44) Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();
Q.45) the cipher object is initialized by the init() method?
A. True*
B. False
Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
8. C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"
Q.47) "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"
Q.48) Most these implementations mix a random number, known as the "salt" with the password text to derive
an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*
Q.49) Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False
Q.50) The product components of JDBC are:
A. JDBC-ODBC Bridge.
B. Net-Protocol/all-Java driver
C. JDBC Driver Manager*
D. JDBC Test Suite & JDBC API*
E. ODBC
Q.51) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
Q.52) The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV
9. Q.53) The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*
Q.54) Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is
inherited from PreparedStatement interface.
A. True*
B. False
Q.55) This Objects are used to receive and store the data in the same form as it is returned from the SQL
queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet*
D. ExecuteQuery()
Q.56) This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that
many row.
A. relative(int row) method*
B. absolute(int row) method.
Q.58) Calling absolute(1) is equivalent to calling last()
A. True
B. False*
Q.59) Which statements are true?
- 3 choices
A. In Scrollable ResultSet, the cursor is positioned on the first row.
10. B. A default ResultSet object is not updated and has a cursor that moves forward only. *
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. *
E. The createStatement method has two argurments namely resultSetType and *resultSetConcurrency
.61) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controler
======================================================================
1. JDBC and ODBC are identical?
A. True
B. False*
2. How many kinds of JDBC drivers?
A. 10
B. 3
C. 4*
D many
3. The JDBC API is a Java API for accessing virtually any kind of tabular data
A. False
B. True*
4. What is the correct statement about CallableStatement interface? (choose 1)
A. It defines a statement to create a stored-procedure
B. It contains a call to a stored-procedure*
C. It defines a store-procedure
5. Which is the default port number of RMI Registry Server?
A. 1023
11. B. 1099*
C. 1069
6. Which of the following statements is correct for retrieving all fields from Student table?
A.
String sql=”SELECT * FROM Student”;
Statement st=cn.createStatement(sql);
ResultSet rs=st.executeQuery();
B.
String sql=”SELECT * FROM Student”; *
Statement st=cn.createStatement();
ResultSet rs=st.executeQuery(sql);
7. If you need to use a stored procedure with output parameters, which of the following
statement type should be used to call the procedure?
A. PreparedStatement
B. CallableStatement*
C. Statement
8. From which object do you ask for DatabaseMetaData?
A. DriverManager
B. ResultSet
C. Connection*
D. Driver
9. Which character is used to represent an input parameter in a CallableStatement?
A. *
B. #
C. ? *
D. %
10. Which one of the following will not get the data from the first column of ResultSet rs,
returned from executing SQL statement: SELECT name, rank, serialNo FROM employee.
A. rs.getString(“name”);
12. B. rs.getString(1);
C. rs.getString(0); *
11. Which class contains the transaction control method setAutoCommit, commit, and rollback?
A. Statement
B. Connection*
C. ResultSet
12. You can use an applet in RMI program as ________
A. None of the other options
B. Server program
C. Client program*
13. Which of the following will not cause a JDBC driver to be loaded and registered with the
DriverManager?
A. Class.forName(driverString);
B. new DriverClass();
C. Include driver name in jdbc.drivers system property
D. None of the above*
14. SQLWarnings from multiple Statement method calls (like executeUpdate) will build up until
you ask for them all with getWarnings and getNextWarning.
A. True
B. False*
15. If one intends to work with a ResultSet, which of these PreparedStatement methods will not
work?
A. execute()
B. executeQuery()
C. executeUpdate()*
16. Can a ResultSet be reliably returned from a method that creates a Statement and executes a
query?
13. A. Yes
B. No*
17. How can I use JDBC to create a database?
A. Include create=true at end of JDBC URL
B. Execute "CREATE DATABASE jGuru" SQL statement*
C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements
D. Database creation is DBMS specific
18. Which of the following can you do with a JDBC 2.0 database driver that you cannot with a
JDBC 1.x driver?
A. Batch multiple statements, to be sent to the database together
B. Scroll through result sets bi-directionally
C. Work with SQL3 data types directly
D. All of the above*
19. A __________ result set has a cursor that moves both forward and backward and can be
moved to a particular row
A. scrollable*
B. nonscrollable
C. Unscrollable
20. The method___________ is designed for statements that produce a single result set, such as
SELECT statement
A. executeUpdate
B. execute
C. Update
D. executeQuery*
21. Which three of the following are classes of Java.rmi package?
A. Naming*
B. MarshalledObject*
C. RMISecurityManager*
D. Remote
22. Which option of jar file indicates manifest file not created?
A. Jar M
B. Jar t
14. c. Jar m
D. Jar c
23. _______ option of Jar command makes a Java archive file.
A. JAR -c
B. JAR -m
C. JAR -v
D. JAR –f
24. Which command adds the file file.class to Xyz.jar?
A. jar – uf Xyz . jar file.class
B. jar – xf Xyz . jar
C. jar – tf Xyz . jar
25. Driver types are used to categorize the technology used to connect to the database.
A. True*
B. False
26. This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A. JDBC
B. ODBC*
27. JDBC is ODBC translated into an object-oriented interface that is natural for java
programmers.
A. True*
B. False
28. In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model
29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
15. C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the
server.
D. Directly calls RDBMS from client machine.
30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as
CREATE, DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();
31. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A. getVarchar();
B. getObject();
C. getString();*
32. This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();
33. This object connects to a data source only to read data from a ResultSet or write data back
to the data source.
A. A Connected RowSet.
B. A Disconnected RowSet. *
34. A client application uses stored procedures increases the network traffic, but it reduces the
number of times a database is accessed.
A. True
B. False*
35. This parameter is used to pass values into a store procedure.The value of this parameter
cannot changed or reassigned within the module and hence is constant.
16. A. IN*
B. OUT
C. IN/OUT
36. OUT Parameter. - 3 choices.
A. pass out of procedure module*
B. is a constant
C. is a variable*
D. back to the calling block*
37. This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*
38. This object does not contain the stored procedure itself but contains only a call to the stored
procedure.
A. CallableStatment*
B. PreparedStatment
C. prepareCall();
39. This refers to the ability to check whether the cursor stays open after a COMMIT
A. Updatable
B. Holdable*
C. Scrollable
40. The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
17. 41. The CallableStatment object contains the SQL statments.
A. True*
B. False
42. A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*
43. A Rowset Object provides scrollability and updatability for any kind of DBMS or drivers.
A. True*
B. False
44. A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A. true
B. false*
45. Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.
46. Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered event
listener.
47. The Result Set can not be modified and hence, It is not updatable in any way.
18. A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE
48. This is the mechanism of encoding information in a secret coded form, intented only for the
recipient to access the information.
A. Cryptography*
B. Encryption
49. The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A. True*
B. False
50. This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography
51. This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography
52. This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*
53. Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as
sent by the sender. *
19. B. Spoofing or identity interception, which means impersonating the identity of a different user and
use it in an unauthorized way*
C. Authentication is the process that provides tamper-proofing, while it is on the network.
54. The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
55. The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV
56. The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*
57. Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A. True*
B. False
58. This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
20. 59. If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A. relative(int row) method*
B. absolute(int row) method.
60. Calling absolute(1) is equivalent to calling last()
A. True
B. False*
61. Which statements are true? (3 choices)
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only. *
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. *
E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency*
62. Which statements are true? (3 choices)
A. The original message text has to be transmitted separately since the content of a digitally signed
message is altered irreversibly.
B. A Certification authority creates a signed certificate by encrypting the digitally signature with its
private key. *
C. The digital signature and sender's public key are appended to end of a message. *
D. A recipient decrypts a signed signature using its own public key.
E. The integrity of a message cannot be ensure while using message digests*
63. This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controller
64. The class is use to produce a pair of public and private keys appropriate for a specified.
21. A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory
65. The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
66. The class is used to transform opaque keys of type Key into key specifications and provide
transparent representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory
67. The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
68. This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
22. D. KeySpec
69. this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. Confidentiality
70. Data integrity is to protect data from getting tampered, while it is on the network.
A. True*
B. False
71. This is a framework written in java to access and develop cryptographic functionality, and
forms part of the java security API.
A. JCA*
B. JCE
72. With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC
73. Single-bit ciphers are called:
A. Block cipher
B. Stream cipher*
74. Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();
75. the cipher object is initialized by the init() method?
23. A. True*
B. False
76. The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"
77. "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"
78. Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*
79. Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False
80. In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
======================================================================
1.which of the following are JDBC drivers?(chon 4)(1.5d)
A, JDBC –ODBC bridge*
B native API party – java driver*
C, Net –protoco all – java*
24. D, JDBC – network driver
E, Native protocol all – java driver*
2. The naming clss extend the -----class
A serializable
B Object*
C System
D Remote
3. -the------Class of java RMI provides stati methods for accep
A MarshalledObject
B Naming
C RMI Security Manager
D log Stream
E Remote Server
4 . the -----use local native libraries to commulicate with the database
A JDBC – ODBC Bridge*
B native – API – Party- java driver
C ODBC net all java driver
D Native Protoco – all – java driver
5 . which interface of the JDBC API contains method used to execute SQL stored procedures
(1d)
A statement
B resultset
C CallableStatement*
6 .. . which interface of the JDBC API execute pre – compied SQL statement(1d)
A preparedStatement*
B statement
C Resultset
7
which of the following three interfaces the JDBC API provides for sending SQL statements
to the database? (2d)
A Statement*
B PreparedStatement*
C callablestatement*
D Connection
25. E Getconnection
the ----- class is the traditional managerment layer of JDBC working between the …. The
driver
8
a Driver manager
b Connection
c Resultset
9 The java software provides three JDBC product components they are (2d)
A The JDBC DriverManager facility *
B
The JDBC driver test suite*
C
The JDBC – ODBC bridge*
D
The callable stament
10 . A ------obiect is used to send SQL statement to a database
A Connection *
B
Statement
C
Drive
11 . Which interface of the JDBC API provides mothod to setive data that an SQL statement
returns?
A ResultSet *
B Statement
C Driver
D Connection
12 Which two of the following are valid JDBC driver(choose 2)
a JDBC –ODBC bridge plus ODBC driver
b native – API partly –Java drivr
c
d
ODBC Driver
Native java driver
13 Which kind of driver converts ODBC calls drectly into the network protocol
A JDBC _ODBC bridge plus ODBC driver*
B Native API partly java driver
C Native protocol pure java driver
14.
Depending upon scrollabity how many types of result sets are av…..
26. A One
B Four
C three
D Two
15. Which of the following classes contain the Execute() method?
A ResultSet
B
RescordSet
C
Statement*
D
Connection
16. the -----method is used to retreve the name of
A getColumName()*
B GetColumCaption()
C GetColumLabel()
D None of the others
17
The statement interface provides three different methods for executing SQL
statement, they are (2d)
A ExecuteQuery *
B ExecuteUpdate *
C Execute*
D ExecuteDelete
E
ExecuteInsert
18
Once the Drver classes have been loaded and registered with the driver avaitable for
eatablahing a connection with a database is the statement correct?
A true
B False*
=================================================
1. A cipher disables encryption and decryption operations.
False
2. JDBC is an acronym of ?Java Database Connectivity.?
False
3. Wich of the following are the advantages of JDBC?
1.Continued usage of existing data
2.Vendor dependent
3.Platform independent
4.Ease of use
27. 4. Native Protocol-All Java is ________ JDBC driver.
Type IV
4. The next() method allows to traverse forward by moving the cursor ___ forward.
One row
5. The executeUpdate() method is used to execute which of the following objects?
PreparedStatement and CallableStatement
6. Which of the following are the characteristics of the Stored procedures?
All of the above
7. Which of the following are the benefits of using stored procedure?
1,2,3,4
8. The drawback of using a stored procedure is lack of portability.
False
9. Which of the following is the characteristics of ResultSet?
Scrollable
10. Which of the following parameters are used in stored procedure?
1,2,3,4
11. Which of the following are the static constant values that can be specified for the result set
type?
TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE,
TYPE_SCROLL_INSENSITIVE
12. Once the updaterow() method is called, changes to the database are final and cannot be
undone.
True
13. The UpdateXXX() method of ResultSet is used to change the data in an existing row
False
14. ____ is the parent interface implemented by all connected RowSet objects.
CacheRowSet
15. Which of the following contains path of the class and permission details required to access a
resource?
Policy file
16. Which of the following classes is used to grant access to network resources?
SocketPermission
17. Encryption converts original data into an encrypted form by appluing ___ transformations.
a. Cipher
Q.1) This is an Application Programming Interface provided by Microsoft for access the database.It
uses SQL as its database language.
JDBC
A.
ODBC
B.
Q.2) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls.
B. Translates JDBC calls into database=specific calls or native calls
Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods
C.
on the server.
D. Directly calls RDBMS from client machine.
Q.3) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
28. A. getVarchar();
B. getObject();
C. getString();
Q.4)
This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A. IN
B. OUT
C. IN/OUT
Q.5)
This object does not contain the stored procedure itself but contains only a call to the stored
procedure.
CallableStatment
A.
PreparedStatment
B.
prepareCall();
C.
Q.6)
The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object
B. Callalbalestatment Object
C. PrepareCall () method.
Q.7)
A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
True
A.
False
B.
Q.8)
This object connects to a data source only to read data from a ResultSet or write data back to
the data source.
A. A connected RowSet.
B. A Disconnected RowSet.
Q.9) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC
Q.10) The 'Native API-Java/Party Java' is Driver Type
I
A.
II
B.
III
C.
IV
D.
Q.11) This Objects are used to receive and store the data in the same form as it is returned from the
SQL queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet
D. ExecuteQuery()
29. Q.12) Calling absolute(1) is equivalent to calling last()
True
A.
False
B.
CRYPTO
Q.13) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted
into usable plaintext.
A. True
B. False
Q.14) This is algorithms that does not use any key, it is known as message digest.
Secret key cryptography
A.
Public Key cryptography
B.
Hash Function
C.
Q.15) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.16) The class is used to generate public key certificates.
Certificate Factory
A.
KeyPair Generator
B.
Message Digest
C.
Signature
D.
KeyFactory
E.
Q.17) this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation
B. Tampering
C. Integrity
D. confidentiality
Q.18) With this padding technique a short block is padded with a repeating byte.
DES
A.
PKCS5
B.
CBC
C.
30. Q.19) the cipher object is initialized by the init() method?
A. True
B. False
Q.20) Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
Encryption and Decryption
A.
Key Agreement
B.
Password Base Encryption
C.
Q.21) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File
C. Access Controler
Q.22 Code
)
using
using
using
using
System;
System.Collections.Generic;
System.Linq;
System.Text;
namespace Abstract_Animal {
abstract class Animal {
public void run() {
Console.writeLine("Run by 4 feet");
}
public
void Eat();
}
class Bird:Animal{
public void Eat(){
Console.writeLine("All of dove eat rice");
}
static void Main(String[] args){
Bird dove = new Bird();
dove.Eat();
}
}
}
A. Compiler Error.
B. Print: "All of dove eat rice"
C. print: "Run by 4 feet"
Q.23) Abstact method ,which contains at least one statement, is declared in abstract class.
True
A.
False
B.
31. Q.24) Eat();
Run();
A. An Abstract class
B. An Interface
Q.25) Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A. True
B. False
1.
Driver types are used to categorize the technology used to connect to the database.
A.
True
B.
False
2.
This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A.
JDBC
B.
ODBC
3.
JDBC is ODBC translated into an object-oriented interface that is natural for java
programmiers.
A.
True
B.
False
4.
In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A.
Two-tier Data processing Model
B.
Three - tier Data processing Model
5. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
32. A.
Translates JDBC calls into ODBC calls.
B.
Translates JDBC calls into database=specific calls or native calls
C.
Maps JDBC calls to the underlying "network" protocol, which in turn calls native
methods on the server.
D.
Directly calls RDBMS from client machine.
6.
This method is use to execute any SQL statement with a "SELECT" clause, that return the
result of the query as a result set.
A.
executeUpdate();
B.
executeQuery();
C.
execute();
7.
This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as
CREATE, DROP Table.
A.
executeUpdate();
B.
execute();
C.
executeQuery();
8.
This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A.
getVarchar();
B.
getObject();
C.
getString();
9.
This method is used for retrieving the value from current row as object.
33. A.
getRow();
B.
getObject();
C.
getString();
10.
A client application uses stored procedures increases the network traffic, but it reduces
the number of times a database is accessed.
A.
True
B.
False
11.
This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A.
IN
B.
OUT
C.
IN/OUT
12.
OUT Parameter.
- 3 choices.
A.
pass out of procedure module.
B.
is a constant
C.
is a variable
D.
back to the calling block
13.
This Parameter behaves like an initialized variable.
A.
OUT
B.
IN
34. C.
IN/OUT
14.
This object does not contain the stored procedure itself but contains only a call to the
stored procedure.
A.
CallableStatment
B.
PreparedStatment
C.
prepareCall();
15.
It reefers to the ability to move backward as well as forward through a result set.
A.
Scrollable
B.
Updatable
C.
Holdable
16.
This refers to the ability to check whether the cursor stays open after a COMMIT.
A.
Updatable
B.
Holdable
C.
Scrollable
17.
The prepareStatment() method sends SQL query to the database. and this returns:
A.
PrepareStatment Object
B.
Callalbalestatment Object
C.
PrepareCall () method.
35. 18.
The CallableStatment object contains the SQL statments.
A.
True
B.
False
19.
A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A.
TYPE_SCROLL_SENSITIVE
B.
TYPE_SCROLL_INSENSITIVE
C.
TYPE_FORWARD_ONLY
20.
A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or
drivers.
A.
True
B.
False
21.
A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A.
True
B.
False
22.
Which class is a disconnected rowset.
36. A.
A CachedRowSet class.
B.
A JDBCRowSet class.
C.
A WebRowSet class.
23.
This object connects to a data source only to read data from a ResultSet or write data
back to the data source.
A.
A connected RowSet.
B.
A Disconnected RowSet.
24.
Which statments are true?
A.
A RowSet has to be make scrollable and updatable at the time of creation.
B.
Scrollability and Updatability of a RowSet is independent of the JDBC driver
C.
A connect RowSet can read data from a non relational database source also.
D.
A RowSet is a JavaBeans component which has to programmatically notify all registered
event listener.
25.
The Result Set can not be modified and hence, It is not updatable in any way.
A.
CONCURENT_READ_ONLY
B.
CONCURENT_UPDATABLE
26.
This is the mechanism of encoding information in a secret coded form, intented only for
the recipient to access the information.
37. A.
Cryptography
B.
Encryption
27.
The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A.
True
B.
False
28.
This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A.
Hash Function
B.
Secret key cryptography
C.
Public Key cryptography
29.
This is as asymmetric cryptography, It operates under two different keys.
A.
Public Key cryptography
B.
Hash Function
C.
Secret key cryptography
30.
This is algorithms that does not use any key, it is known as message digest.
A.
Secret key cryptography
B.
Public Key cryptography
38. C.
31.
Hash Function
Which statements are true?
A.
The Tamper-proofing process verifies whether the data received by the receiver is the same
data as sent by the sender.
B.
Spoofing or identity interception, which means impersonating the identity of a different user
and use it in an unauthorized way.
C.
32.
Authentication is the process that provides tamper-proofing, while it is on the network.
The class is use to hash value of the specified data.
A.
Message Digest
B.
Signature
C.
KeyPair Generator
D.
KeyFactory
E.
Certificate Factory
33.
The class is use to produce a pair of public and private keys appropriate for a specified.
A.
Signature
B.
Message Digest
C.
KeyPair Generator
D.
KeyFactory
E.
Certificate Factory
39. 34.
The class is used to sign and check the authenticity of digital signature
A.
Message Digest
B.
Signature
C.
Certificate Factory
D.
KeyFactory
E.
KeyPair Generator
35.
The class is used to transform opaque keys of type Key into key specifications and
provide transparent representations of the underlying key material and vice versa.
A.
Message Digest
B.
KeyPair Generator
C.
Signature
D.
KeyFactory
E.
Certificate Factory
36.
The class is used to generate public key certificates.
A.
Certificate Factory
B.
KeyPair Generator
C.
Message Digest
D.
Signature
E.
KeyFactory
40. 37.
This class is a database of keys and certificates
A.
Algorithm Parameters
B.
KeyStore
C.
Key
D.
KeySpec
38.
Cryptography is essential for making a application safe and secure, including:
- 4 choices
A.
Tampering
B.
Non-repudiation
C.
Integrity & confidentiality
D.
Spoofing
E.
Authentication
39.
this ensures that a user or a business organization or a program entity has performed a
transaction.
A.
Non-repudiation
B.
Tampering
C.
Integrity
D.
confidentiality
40.
Data integrity is to protect data from getting tampered,while it is on the network.
41. A.
True
B.
False
41.
This is a framework written in java to access and develop cryptographic functionality,
and forms part of the java security API.
A.
JCA
B.
JCE
42.
With this padding technique a short block is padded with a repeating byte.
A.
DES
B.
PKCS5
C.
CBC
43.
Single-bit ciphers are called:
A.
Block cipher
B.
Stream cipher
44.
Cipher objects are created using this method of the cipher class.
A.
getInstance();
B.
init();
42. 45.
the cipher object is initialized by the init() method?
A.
True
B.
False
46.
The Code : "DES/CBC/PKCS5Padding" is the form of
A.
"mode/algorithm/padding"
B.
"algorithm/mode/padding"
C.
"algorithm/padding/mode"
D.
"DeCrypto/Cipher/padding"
47.
"(Only)algorithm" such as
A.
"DES"
B.
"PKCS5"
C.
"CBE"
48.
Most these implementations mix a random number, known as the "salt" with the
password text to derive an encrypted key.
A.
Encryption and Decryption
B.
Key Agreement
C.
Password Base Encryption
43. 49.
Single bits or a block of bits can be encrypted into cipher blocks
A. True(correct answer)
B. False(your answer)
50.
The product components of JDBC are:
A.
JDBC-ODBC Bridge.
B.
Net-Protocol/all-Java driver
C.
JDBC Driver Manager
D.
JDBC Test Suite & JDBC API
E.
ODBC
51.
In this Environment, the java application is the client and DBMS is the database server.
A.
Three-Tier JDBC
B.
Two-Tier JDBC
52.
The 'Native API-Java/Party Java' is Driver Type
A.
I
B.
II
C.
III
D.
IV
44. 53.
The 'Native Protocol - All Java' is Driver Type
A.
I
B.
II
C.
III
D.
IV
54.
Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A.
True
B.
False
55.
This Objects are used to receive and store the data in the same form as it is returned from
the SQL queries.
A.
PreparedStatement
B.
CallableStatement
C.
ResultSet
D.
ExecuteQuery()
56.
This Method return an Integer value indicating the row count.
A.
ExecuteQuery();
B.
Execute();
C.
ExecuteUpdate();
45. 57.
If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A.
relative(int row) method
B.
absolute(int row) method.
58 Calling absolute(1) is equivalent to calling last()
A.
True
B.
False
59.
Which statements are true?
- 3 choices
A.
In Scrollable ResultSet, the cursor is positioned on the first row.
B.
A default ResultSet object is not updated and has a cursor that moves forward only.
C.
The ResultSet should be compulsorily closed after a COMMIT statement.
D.
Holdable refers to ability to check whether the cursor stays open after a COMMIT.
E.
The createStatement method has two argurments namely resultSetType and
resultSetConcurrency
60.
Which statements are true?
-3 choices
A.
The original message text has to be transmitted separately separately since the content of a
digitally signed message is altered irreversibly.
B.
A Certification authority creates a signed certificate by encrypting the digitally signature with
its private key.
46. C.
The digital signature and sender's public key are appended to end of a message.
D.
A recipient decrypts a signed signature using its own public key.
E.
The integrity of a message cannot be ensure while using message digests.
61.
This comprises the mapping of one or more permissions with a class.
A.
Security Manager
B.
Policy File
C.
Access Controler
62.
An abstract class can be sealed
A.
True
B.
False
63.
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
namespace Abstract_class
{
abstract class Animal {
publicvoid run() {
47. Console.WriteLine("Run by 4 feet");
}
public void Eat();
}
classbird:Animal
{
// implement method Eat of abstract class Animal.
publicoverride void Eat(){
Console.WriteLine("All of dove eat rice");
}
static voidMain(string[] args)
{
bird dove = new bird();
dove.Eat();
}
}
}
A.
Compiler Error.
B.
Print: "All of dove eat rice"
C.
print: "Run by 4 feet"
48. 64.
Abstact method ,which contains at least one statement, is declared in abstract class.
A.
True
B.
False
65.
Eat();
Run();
Sound();
A.
An Abstract class
B.
An Interface
66.
Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A.
True
B.
False