Upload
lethuongquan
View
234
Download
0
Embed Size (px)
Citation preview
8/11/2019 Tong Hop Ly Thuyet DBSJ
1/29
Q.1) Driver types are used to categorize the technology used to connect to the database.
A. True *
B. False
Q.2) This is an Application Programming Interface provided by Microsoft for access thedatabase.It uses SQL as its database language.
A. JDBC
B. ODBC*
Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for javaprogrammiers.
A. True*
B. False
Q.4) In this Data processing Model,the client communicates directly to the database serverwithout the help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model
Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on theserver.
D. Directly calls RDBMS from client machine.
Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that returnthe result of the query as a result set.
A. executeUpdate();
B. executeQuery();*
C. execute();
Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such asCREATE, DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();
8/11/2019 Tong Hop Ly Thuyet DBSJ
2/29
Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into javaString object.
A. getVarchar();
B. getObject();
C. getString();*
Q.9) This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();
Q.10) A client application uses stored procedures increases the network traffic, but it reduces thenumber of times a database is accessed.
A. True
B. False*
Q.11) This parameter is used to pass values into a store procedure.The value pf this parametercannot changed or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT
Q.12) OUT Parameter.
- 3 choices.
A. pass out of procedure module. *
B. is a constant
C. is a variable*
D. back to the calling block*
Q.13) This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*
Q.14) This object does not contain the stored procedure itself but contains only a call to the storedprocedure.
8/11/2019 Tong Hop Ly Thuyet DBSJ
3/29
A. CallableStatment*
B. PreparedStatment
C. prepareCall();
Q.15) It reefers to the ability to move backward as well as forward through a result set.
A. Scrollable*
B. Updatable
C. Holdable
Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT.
A. Updatable
B. Holdable*
C. Scrollable
Q.17) The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
Q.18) The CallableStatment object contains the SQL statments.
A. True*
B. False
Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.Itis default type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*
Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
A. True*
B. False
Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A. True*
8/11/2019 Tong Hop Ly Thuyet DBSJ
4/29
B. False
Q.22) Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.
Q.23) This object connects to a data source only to read data from a ResultSet or write data back tothe data source.
A. A connected RowSet.
B. A Disconnected RowSet. *
Q.24) Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered eventlistener.
Q.25) The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE
Q.26) This is the mechanism of encoding information in a secret coded form, intented only for therecipient to access the information.
A. Cryptography*
B. Encryption
Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decryptedinto usable plaintext.
A. True*
B. False
Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is knownas Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
8/11/2019 Tong Hop Ly Thuyet DBSJ
5/29
C. Public Key cryptography
Q.29) This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography
Q.30) This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*
Q.31) Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is thesame data as sent by the sender. *
B. Spoofing or identity interception, which means impersonating the identity of a differentuser and use it in an unauthorized way. *
C. Authentication is the process that provides tamper-proofing, while it is on the network.
Q.32) The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.33) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory
Q.34) The class is used to sign and check the authenticity of digital signature
A. Message Digest
8/11/2019 Tong Hop Ly Thuyet DBSJ
6/29
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
Q.35) The class is used to transform opaque keys of type Key into key specifications and providetransparent representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory
Q.36) The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
Q.37) This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec
Q.38) Cryptography is essential for making a application safe and secure, including:
- 3 choices
A. Tampering*
B. Non-repudiation*
C. Integrity & confidentiality*
D. Spoofing
8/11/2019 Tong Hop Ly Thuyet DBSJ
7/29
E. Authentication*
Q.39) this ensures that a user or a business organization or a program entity has performed atransaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. confidentiality
Q.40) Data integrity is to protect data from getting tampered,while it is on the network.
A. True*
B. False
Q.41) This is a framework written in java to access and develop cryptographic functionality, andforms part of the java security API.
A. JCA*
B. JCE
Q.42) With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC
Q.43) Single-bit ciphers are called:
A. Block cipher*
B. Stream cipher
Q.44) Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();
Q.45) the cipher object is initialized by the init() method?
A. True*
B. False
Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
8/11/2019 Tong Hop Ly Thuyet DBSJ
8/29
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"
Q.47) "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"
Q.48) Most these implementations mix a random number, known as the "salt" with the password textto derive an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*
Q.49) Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False
Q.50) The product components of JDBC are:
A. JDBC-ODBC Bridge.
B. Net-Protocol/all-Java driver
C. JDBC Driver Manager*
D. JDBC Test Suite & JDBC API*
E. ODBC
Q.51) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
Q.52) The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
8/11/2019 Tong Hop Ly Thuyet DBSJ
9/29
D. IV
Q.53) The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*
Q.54) Statement and PreparedStatement is inherited from Statement Interface. TheCallableStatement is inherited from PreparedStatement interface.
A. True*
B. False
Q.55) This Objects are used to receive and store the data in the same form as it is returned from theSQL queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet*
D. ExecuteQuery()
Q.56) This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forwardthat many row.
A. relative(int row) method*
B. absolute(int row) method.
Q.58) Calling absolute(1) is equivalent to calling last()
A. True
B. False*
Q.59) Which statements are true?
- 3 choices
8/11/2019 Tong Hop Ly Thuyet DBSJ
10/29
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only.*
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT.*
E. The createStatement method has two argurments namely resultSetType and*resultSetConcurrency
.61) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controler
======================================================================
1. JDBC and ODBC are identical?
A. True
B. False*
2. How many kinds of JDBC drivers?
A. 10
B. 3
C. 4*
D many
3. The JDBC API is a Java API for accessing virtually any kind of tabular data
A. False
B. True*
4. What is the correct statement about CallableStatement interface? (choose 1)
A. It defines a statement to create a stored-procedure
B. It contains a call to a stored-procedure*
C. It defines a store-procedure
8/11/2019 Tong Hop Ly Thuyet DBSJ
11/29
5. Which is the default port number of RMI Registry Server?
A. 1023
B. 1099*
C. 1069
6. Which of the following statements is correct for retrieving all fields from Student
table?
A. String sql=SELECT * FROM Student;
Statement st=cn.createStatement(sql);
ResultSet rs=st.executeQuery();
B. String sql=SELECT * FROM Student;*
Statement st=cn.createStatement();
ResultSet rs=st.executeQuery(sql);
7. If you need to use a stored procedure with output parameters, which of the
following statement type should be used to call the procedure?
A. PreparedStatement
B. CallableStatement*
C. Statement
8. From which object do you ask for DatabaseMetaData?
A. DriverManager
B. ResultSet
C. Connection*
D. Driver
9. Which character is used to represent an input parameter in a CallableStatement?
A. *
8/11/2019 Tong Hop Ly Thuyet DBSJ
12/29
B. #
C. ?*
D. %
10. Which one of the following will not get the data from the first column of ResultSet
rs, returned from executing SQL statement: SELECT name, rank, serialNo FROM
employee.
A. rs.getString(name);
B. rs.getString(1);
C. rs.getString(0);*
11. Which class contains the transaction control method setAutoCommit, commit, and
rollback?
A. Statement
B. Connection*
C. ResultSet
12. You can use an applet in RMI program as ________
A. None of the other options
B. Server program
C. Client program*
13. Which of the following will not cause a JDBC driver to be loaded and registered
with the DriverManager?
A. Class.forName(driverString);
B. new DriverClass();
C. Include driver name in jdbc.drivers system property
D. None of the above*
8/11/2019 Tong Hop Ly Thuyet DBSJ
13/29
14. SQLWarnings from multiple Statementmethod calls (like executeUpdate) will build
up until you ask for them all with getWarningsand getNextWarning.
A. True
B. False*
15. If one intends to work with a ResultSet,which of these PreparedStatement
methods will not work?
A. execute()
B. executeQuery()
C. executeUpdate()*
16.Can a ResultSetbe reliably returned from a method that creates a Statementand
executes a query?
A. Yes
B. No*
17. How can I use JDBC to create a database?
A. Include create=trueat end of JDBC URL
B. Execute "CREATE DATABASE jGuru" SQL statement*
C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements
D. Database creation is DBMS specific
18. Which of the following can you do with a JDBC 2.0 database driver that youcannot with a JDBC 1.x driver?
A. Batch multiple statements, to be sent to the database together
B. Scroll through result sets bi-directionally
C. Work with SQL3 data types directly
D. All of the above*
8/11/2019 Tong Hop Ly Thuyet DBSJ
14/29
19. A __________ result set has a cursor that moves both forward and backward and
can be moved to a particular row
A. scrollable*
B. nonscrollable
C. Unscrollable
20. The method___________ is designed for statements that produce a single result
set, such as SELECT statement
A. executeUpdate
B. execute
C. Update
D. executeQuery*
21. Which three of the following are classes of Java.rmi package?
A. Naming*
B. MarshalledObject*
C. RMISecurityManager*
D. Remote
22. Which option of jar file indicates manifest file not created?
A. Jar M
B. Jar tc. Jar m
D. Jar c
23. _______ option of Jar command makes a Java archive file.
A. JAR -c
B. JAR -m
C. JAR -v
D. JARf
24. Which command adds the file file.class to Xyz.jar?
A. jaruf Xyz . jar file.class
B. jarxf Xyz . jar
C. jartf Xyz . jar
25. Driver types are used to categorize the technology used to connect to the
database.
A. True*
8/11/2019 Tong Hop Ly Thuyet DBSJ
15/29
B. False
26. This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A. JDBC
B. ODBC*
27. JDBC is ODBC translated into an object-oriented interface that is natural for java
programmers.
A. True*
B. False
28. In this Data processing Model,the client communicates directly to the database
server without the help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model
29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls.*
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods
on the server.
D. Directly calls RDBMS from client machine.
30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL
such as CREATE, DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();
8/11/2019 Tong Hop Ly Thuyet DBSJ
16/29
31. This method is used for retrieving a string value (SQL type VARCHAR) and
assigning into java String object.
A. getVarchar();
B. getObject();
C. getString();*
32. This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();
33. This object connects to a data source only to read data from a ResultSet or write
data back to the data source.
A. A Connected RowSet.
B. A Disconnected RowSet.*
34. A client application uses stored procedures increases the network traffic, but it
reduces the number of times a database is accessed.
A. True
B. False*
35. This parameter is used to pass values into a store procedure.The value of this
parameter cannot changed or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT
36. OUT Parameter. - 3 choices.
A. pass out of procedure module*
B. is a constant
8/11/2019 Tong Hop Ly Thuyet DBSJ
17/29
C. is a variable*
D. back to the calling block*
37. This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*
38. This object does not contain the stored procedure itself but contains only a call to
the stored procedure.
A. CallableStatment*
B. PreparedStatment
C. prepareCall();
39. This refers to the ability to check whether the cursor stays open after a COMMIT
A. Updatable
B. Holdable*
C. Scrollable
40. The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
41. The CallableStatment object contains the SQL statments.
A. True*
B. False
8/11/2019 Tong Hop Ly Thuyet DBSJ
18/29
42. A cursor that can only be used to process from the beginning of a ResultSet to
the end of it.It is default type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*
43. A Rowset Object provides scrollability and updatability for any kind of DBMS or
drivers.
A. True*
B. False
44. A ResultSetobject contains a set of rows from a result set or some other source
of tabular data, like a file or spreadsheet.
A. true
B. false*
45. Which class is a disconnected rowset.
A. A CachedRowSet class.*
B. A JDBCRowSet class.
C. A WebRowSet class.
46. Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered
event listener.
47. The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
8/11/2019 Tong Hop Ly Thuyet DBSJ
19/29
B. CONCURENT_UPDATABLE
48. This is the mechanism of encoding information in a secret coded form, intented
only for the recipient to access the information.
A. Cryptography*
B. Encryption
49. The term "encrypting " pertains to converting plaintext to ciphertext, which is
again decrypted into usable plaintext.
A. True*
B. False
50. This transforms the input, called the plaintext, to an output, known as ciphertext.
this is known as Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography
51. This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography
52. This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*
53. Which statements are true?
8/11/2019 Tong Hop Ly Thuyet DBSJ
20/29
A. The Tamper-proofing process verifies whether the data received by the receiver is the
same data as sent by the sender.*
B. Spoofing or identity interception, which means impersonating the identity of a different
user and use it in an unauthorized way*
C. Authentication is the process that provides tamper-proofing, while it is on the network.
54. The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
55. The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV
56. The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*
57. Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A. True*
B. False
8/11/2019 Tong Hop Ly Thuyet DBSJ
21/29
58. This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
59. If row value is 0, this method has no effect.If row value is positive, the cursor is
moved forward that many row.
A. relative(int row) method*
B. absolute(int row) method.
60. Calling absolute(1) is equivalent to calling last()
A. True
B. False*
61. Which statements are true? (3 choices)
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only.*
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT.*
E. The createStatement method has two argurments namely resultSetType and
resultSetConcurrency*
62. Which statements are true? (3 choices)
A. The original message text has to be transmitted separately since the content of a digitally
signed message is altered irreversibly.
B. A Certification authority creates a signed certificate by encrypting the digitally signature
with its private key.*
C. The digital signature and sender's public key are appended to end of a message. *
D. A recipient decrypts a signed signature using its own public key.
E. The integrity of a message cannot be ensure while using message digests*
8/11/2019 Tong Hop Ly Thuyet DBSJ
22/29
63. This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controller
64. The class is use to produce a pair of public and private keys appropriate for a
specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory
65. The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
66. The class is used to transform opaque keys of type Key into key specifications
and provide transparent representations of the underlying key material and vice
versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory
8/11/2019 Tong Hop Ly Thuyet DBSJ
23/29
67. The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
68. This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec
69. this ensures that a user or a business organization or a program entity has
performed a transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. Confidentiality
70. Data integrity is to protect data from getting tampered, while it is on the network.
A. True*
B. False
71. This is a framework written in java to access and develop cryptographic
functionality, and forms part of the java security API.
A. JCA*
B. JCE
8/11/2019 Tong Hop Ly Thuyet DBSJ
24/29
72. With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC
73. Single-bit ciphers are called:
A. Block cipher
B. Stream cipher*
74. Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();
75. the cipher object is initialized by the init() method?
A. True*
B. False
76. The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"
77. "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"
8/11/2019 Tong Hop Ly Thuyet DBSJ
25/29
78. Most these implementations mix a random number, known as the "salt" with the
password text to derive an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*
79. Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False
80. In this Environment, the java application is the client and DBMS is the database
server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
======================================================================
1.which of the following are JDBC drivers?(chon 4)(1.5d)
A, JDBCODBC bridge*
B native API partyjava driver*
C, Netprotoco alljava*
D, JDBCnetwork driver
E, Native protocol alljava driver*
2. The naming clss extend the -----class
A serializable
B Object*
C System
D Remote
3. -the------Class of java RMI provides stati methods for accepA MarshalledObject
B Naming
C RMI Security Manager
8/11/2019 Tong Hop Ly Thuyet DBSJ
26/29
D log Stream
E Remote Server
4 . the -----use local native libraries to commulicate with the database
A JDBCODBC Bridge*
B nativeAPIParty- java driver
C ODBC net all java driver
D Native Protocoalljava driver
5 . which interface of the JDBC API contains method used to execute SQL stored
procedures (1d)
A statement
B resultset
C CallableStatement*
6 .. . which interface of the JDBC API execute precompied SQL statement(1d)
A preparedStatement*
B statement
C Resultset
7 which of the following three interfaces the JDBC API provides for sending SQLstatements to the database? (2d)
A Statement*
B PreparedStatement*
C callablestatement*
D Connection
E Getconnection
8 the ----- class is the traditional managerment layer of JDBC working between the. The driver
a Driver manager
b Connection
c Resultset
8/11/2019 Tong Hop Ly Thuyet DBSJ
27/29
9 The java software provides three JDBC product components they are (2d)A The JDBC DriverManager facility *
B The JDBC driver test suite*
C The JDBCODBC bridge*
D The callable stament
10 . A ------obiect is used to send SQL statement to a databaseA Connection *
B Statement
C Drive
11 . Which interface of the JDBC API provides mothod to setive data that an SQL
statement returns?
A ResultSet *
B Statement
C Driver
D Connection
12 Which two of the following are valid JDBC driver(choose 2)a JDBCODBC bridge plus ODBC driver
b nativeAPI partlyJava drivr
c ODBC Driver
d Native java driver
13 Which kind of driver converts ODBC calls drectly into the network protocolA JDBC _ODBC bridge plus ODBC driver*
B Native API partly java driver
C Native protocol pure java driver
14. Depending upon scrollabity how many types of result sets are av..A One
B Four
C three
D Two
8/11/2019 Tong Hop Ly Thuyet DBSJ
28/29
15. Which of the following classes contain the Execute() method?A ResultSet
B RescordSet
C Statement*
D Connection
16. the -----method is used to retreve the name ofA getColumName()*
B GetColumCaption()
C GetColumLabel()
D None of the others
17 The statement interface provides three different methods for executing SQLstatement, they are (2d)
A ExecuteQuery *
B ExecuteUpdate *
C Execute*
D ExecuteDelete
E ExecuteInsert
18 Once the Drver classes have been loaded and registered with the driver avaitablefor eatablahing a connection with a database is the statement correct?
A true
B False*
=================================================
1. A cipher disables encryption and decryption operations.
False
2. JDBC is an acronym of ?Java Database Connectivity.?
False3. Wich of the following are the advantages of JDBC?
1.Continued usage of existing data
2.Vendor dependent
3.Platform independent
4.Ease of use
4. Native Protocol-All Java is ________ JDBC driver.
Type IV
4. The next() method allows to traverse forward by moving the cursor ___ forward.One row
8/11/2019 Tong Hop Ly Thuyet DBSJ
29/29
5. The executeUpdate() method is used to execute which of the following objects?
PreparedStatement and CallableStatement
6. Which of the following are the characteristics of the Stored procedures?
All of the above
7. Which of the following are the benefits of using stored procedure?
1,2,3,48. The drawback of using a stored procedure is lack of portability.
False
9. Which of the following is the characteristics of ResultSet?
Scrollable
10. Which of the following parameters are used in stored procedure?
1,2,3,4
11. Which of the following are the static constant values that can be specified for the
result set type?
TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE,
TYPE_SCROLL_INSENSITIVE12. Once the updaterow() method is called, changes to the database are final and cannot
be undone.
True
13. The UpdateXXX() method of ResultSet is used to change the data in an existing row
False
14. ____ is the parent interface implemented by all connected RowSet objects.
CacheRowSet
15. Which of the following contains path of the class and permission details required to
access a resource?
Policy file16. Which of the following classes is used to grant access to network resources?
SocketPermission
17. Encryption converts original data into an encrypted form by appluing ___
transformations.
a. Cipher