Tong Hop Ly Thuyet DBSJ

Embed Size (px)

Citation preview

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    1/29

    Q.1) Driver types are used to categorize the technology used to connect to the database.

    A. True *

    B. False

    Q.2) This is an Application Programming Interface provided by Microsoft for access thedatabase.It uses SQL as its database language.

    A. JDBC

    B. ODBC*

    Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for javaprogrammiers.

    A. True*

    B. False

    Q.4) In this Data processing Model,the client communicates directly to the database serverwithout the help of any middle-ware technologies or another server.

    A. Two-tier Data processing Model*

    B. Three - tier Data processing Model

    Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.

    A. Translates JDBC calls into ODBC calls. *

    B. Translates JDBC calls into database=specific calls or native calls

    C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on theserver.

    D. Directly calls RDBMS from client machine.

    Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that returnthe result of the query as a result set.

    A. executeUpdate();

    B. executeQuery();*

    C. execute();

    Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such asCREATE, DROP Table.

    A. executeUpdate();*

    B. execute();

    C. executeQuery();

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    2/29

    Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into javaString object.

    A. getVarchar();

    B. getObject();

    C. getString();*

    Q.9) This method is used for retrieving the value from current row as object.

    A. getRow();

    B. getObject();*

    C. getString();

    Q.10) A client application uses stored procedures increases the network traffic, but it reduces thenumber of times a database is accessed.

    A. True

    B. False*

    Q.11) This parameter is used to pass values into a store procedure.The value pf this parametercannot changed or reassigned within the module and hence is constant.

    A. IN*

    B. OUT

    C. IN/OUT

    Q.12) OUT Parameter.

    - 3 choices.

    A. pass out of procedure module. *

    B. is a constant

    C. is a variable*

    D. back to the calling block*

    Q.13) This Parameter behaves like an initialized variable.

    A. OUT

    B. IN

    C. IN/OUT*

    Q.14) This object does not contain the stored procedure itself but contains only a call to the storedprocedure.

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    3/29

    A. CallableStatment*

    B. PreparedStatment

    C. prepareCall();

    Q.15) It reefers to the ability to move backward as well as forward through a result set.

    A. Scrollable*

    B. Updatable

    C. Holdable

    Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT.

    A. Updatable

    B. Holdable*

    C. Scrollable

    Q.17) The prepareStatment() method sends SQL query to the database. and this returns:

    A. PrepareStatment Object*

    B. Callalbalestatment Object

    C. PrepareCall () method.

    Q.18) The CallableStatment object contains the SQL statments.

    A. True*

    B. False

    Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.Itis default type.

    A. TYPE_SCROLL_SENSITIVE

    B. TYPE_SCROLL_INSENSITIVE

    C. TYPE_FORWARD_ONLY*

    Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.

    A. True*

    B. False

    Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular

    data, like a file or spreadsheet.

    A. True*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    4/29

    B. False

    Q.22) Which class is a disconnected rowset.

    A. A CachedRowSet class. *

    B. A JDBCRowSet class.

    C. A WebRowSet class.

    Q.23) This object connects to a data source only to read data from a ResultSet or write data back tothe data source.

    A. A connected RowSet.

    B. A Disconnected RowSet. *

    Q.24) Which statments are true?

    A. A RowSet has to be make scrollable and updatable at the time of creation.

    B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*

    C. A connect RowSet can read data from a non relational database source also.

    D. A RowSet is a JavaBeans component which has to programmatically notify all registered eventlistener.

    Q.25) The Result Set can not be modified and hence, It is not updatable in any way.

    A. CONCURENT_READ_ONLY*

    B. CONCURENT_UPDATABLE

    Q.26) This is the mechanism of encoding information in a secret coded form, intented only for therecipient to access the information.

    A. Cryptography*

    B. Encryption

    Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decryptedinto usable plaintext.

    A. True*

    B. False

    Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is knownas Symmetric cryptography.

    A. Hash Function

    B. Secret key cryptography*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    5/29

    C. Public Key cryptography

    Q.29) This is as asymmetric cryptography, It operates under two different keys.

    A. Public Key cryptography*

    B. Hash Function

    C. Secret key cryptography

    Q.30) This is algorithms that does not use any key, it is known as message digest.

    A. Secret key cryptography

    B. Public Key cryptography

    C. Hash Function*

    Q.31) Which statements are true?

    A. The Tamper-proofing process verifies whether the data received by the receiver is thesame data as sent by the sender. *

    B. Spoofing or identity interception, which means impersonating the identity of a differentuser and use it in an unauthorized way. *

    C. Authentication is the process that provides tamper-proofing, while it is on the network.

    Q.32) The class is use to hash value of the specified data.

    A. Message Digest*

    B. Signature

    C. KeyPair Generator

    D. KeyFactory

    E. Certificate Factory

    Q.33) The class is use to produce a pair of public and private keys appropriate for a specified.

    A. Signature

    B. Message Digest

    C. KeyPair Generator*

    D. KeyFactory

    E. Certificate Factory

    Q.34) The class is used to sign and check the authenticity of digital signature

    A. Message Digest

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    6/29

    B. Signature*

    C. Certificate Factory

    D. KeyFactory

    E. KeyPair Generator

    Q.35) The class is used to transform opaque keys of type Key into key specifications and providetransparent representations of the underlying key material and vice versa.

    A. Message Digest

    B. KeyPair Generator

    C. Signature

    D. KeyFactory*

    E. Certificate Factory

    Q.36) The class is used to generate public key certificates.

    A. Certificate Factory*

    B. KeyPair Generator

    C. Message Digest

    D. Signature

    E. KeyFactory

    Q.37) This class is a database of keys and certificates

    A. Algorithm Parameters

    B. KeyStore*

    C. Key

    D. KeySpec

    Q.38) Cryptography is essential for making a application safe and secure, including:

    - 3 choices

    A. Tampering*

    B. Non-repudiation*

    C. Integrity & confidentiality*

    D. Spoofing

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    7/29

    E. Authentication*

    Q.39) this ensures that a user or a business organization or a program entity has performed atransaction.

    A. Non-repudiation*

    B. Tampering

    C. Integrity

    D. confidentiality

    Q.40) Data integrity is to protect data from getting tampered,while it is on the network.

    A. True*

    B. False

    Q.41) This is a framework written in java to access and develop cryptographic functionality, andforms part of the java security API.

    A. JCA*

    B. JCE

    Q.42) With this padding technique a short block is padded with a repeating byte.

    A. DES

    B. PKCS5*

    C. CBC

    Q.43) Single-bit ciphers are called:

    A. Block cipher*

    B. Stream cipher

    Q.44) Cipher objects are created using this method of the cipher class.

    A. getInstance();*

    B. init();

    Q.45) the cipher object is initialized by the init() method?

    A. True*

    B. False

    Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of

    A. "mode/algorithm/padding"

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    8/29

    B. "algorithm/mode/padding"*

    C. "algorithm/padding/mode"

    D. "DeCrypto/Cipher/padding"

    Q.47) "(Only)algorithm" such as

    A. "DES"*

    B. "PKCS5"

    C. "CBE"

    Q.48) Most these implementations mix a random number, known as the "salt" with the password textto derive an encrypted key.

    A. Encryption and Decryption

    B. Key Agreement

    C. Password Base Encryption*

    Q.49) Single bits or a block of bits can be encrypted into cipher blocks

    A. True*

    B. False

    Q.50) The product components of JDBC are:

    A. JDBC-ODBC Bridge.

    B. Net-Protocol/all-Java driver

    C. JDBC Driver Manager*

    D. JDBC Test Suite & JDBC API*

    E. ODBC

    Q.51) In this Environment, the java application is the client and DBMS is the database server.

    A. Three-Tier JDBC

    B. Two-Tier JDBC*

    Q.52) The 'Native API-Java/Party Java' is Driver Type

    A. I

    B. II*

    C. III

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    9/29

    D. IV

    Q.53) The 'Native Protocol - All Java' is Driver Type

    A. I

    B. II

    C. III

    D. IV*

    Q.54) Statement and PreparedStatement is inherited from Statement Interface. TheCallableStatement is inherited from PreparedStatement interface.

    A. True*

    B. False

    Q.55) This Objects are used to receive and store the data in the same form as it is returned from theSQL queries.

    A. PreparedStatement

    B. CallableStatement

    C. ResultSet*

    D. ExecuteQuery()

    Q.56) This Method return an Integer value indicating the row count.

    A. ExecuteQuery();

    B. Execute();

    C. ExecuteUpdate();*

    Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forwardthat many row.

    A. relative(int row) method*

    B. absolute(int row) method.

    Q.58) Calling absolute(1) is equivalent to calling last()

    A. True

    B. False*

    Q.59) Which statements are true?

    - 3 choices

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    10/29

    A. In Scrollable ResultSet, the cursor is positioned on the first row.

    B. A default ResultSet object is not updated and has a cursor that moves forward only.*

    C. The ResultSet should be compulsorily closed after a COMMIT statement.

    D. Holdable refers to ability to check whether the cursor stays open after a COMMIT.*

    E. The createStatement method has two argurments namely resultSetType and*resultSetConcurrency

    .61) This comprises the mapping of one or more permissions with a class.

    A. Security Manager

    B. Policy File*

    C. Access Controler

    ======================================================================

    1. JDBC and ODBC are identical?

    A. True

    B. False*

    2. How many kinds of JDBC drivers?

    A. 10

    B. 3

    C. 4*

    D many

    3. The JDBC API is a Java API for accessing virtually any kind of tabular data

    A. False

    B. True*

    4. What is the correct statement about CallableStatement interface? (choose 1)

    A. It defines a statement to create a stored-procedure

    B. It contains a call to a stored-procedure*

    C. It defines a store-procedure

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    11/29

    5. Which is the default port number of RMI Registry Server?

    A. 1023

    B. 1099*

    C. 1069

    6. Which of the following statements is correct for retrieving all fields from Student

    table?

    A. String sql=SELECT * FROM Student;

    Statement st=cn.createStatement(sql);

    ResultSet rs=st.executeQuery();

    B. String sql=SELECT * FROM Student;*

    Statement st=cn.createStatement();

    ResultSet rs=st.executeQuery(sql);

    7. If you need to use a stored procedure with output parameters, which of the

    following statement type should be used to call the procedure?

    A. PreparedStatement

    B. CallableStatement*

    C. Statement

    8. From which object do you ask for DatabaseMetaData?

    A. DriverManager

    B. ResultSet

    C. Connection*

    D. Driver

    9. Which character is used to represent an input parameter in a CallableStatement?

    A. *

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    12/29

    B. #

    C. ?*

    D. %

    10. Which one of the following will not get the data from the first column of ResultSet

    rs, returned from executing SQL statement: SELECT name, rank, serialNo FROM

    employee.

    A. rs.getString(name);

    B. rs.getString(1);

    C. rs.getString(0);*

    11. Which class contains the transaction control method setAutoCommit, commit, and

    rollback?

    A. Statement

    B. Connection*

    C. ResultSet

    12. You can use an applet in RMI program as ________

    A. None of the other options

    B. Server program

    C. Client program*

    13. Which of the following will not cause a JDBC driver to be loaded and registered

    with the DriverManager?

    A. Class.forName(driverString);

    B. new DriverClass();

    C. Include driver name in jdbc.drivers system property

    D. None of the above*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    13/29

    14. SQLWarnings from multiple Statementmethod calls (like executeUpdate) will build

    up until you ask for them all with getWarningsand getNextWarning.

    A. True

    B. False*

    15. If one intends to work with a ResultSet,which of these PreparedStatement

    methods will not work?

    A. execute()

    B. executeQuery()

    C. executeUpdate()*

    16.Can a ResultSetbe reliably returned from a method that creates a Statementand

    executes a query?

    A. Yes

    B. No*

    17. How can I use JDBC to create a database?

    A. Include create=trueat end of JDBC URL

    B. Execute "CREATE DATABASE jGuru" SQL statement*

    C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements

    D. Database creation is DBMS specific

    18. Which of the following can you do with a JDBC 2.0 database driver that youcannot with a JDBC 1.x driver?

    A. Batch multiple statements, to be sent to the database together

    B. Scroll through result sets bi-directionally

    C. Work with SQL3 data types directly

    D. All of the above*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    14/29

    19. A __________ result set has a cursor that moves both forward and backward and

    can be moved to a particular row

    A. scrollable*

    B. nonscrollable

    C. Unscrollable

    20. The method___________ is designed for statements that produce a single result

    set, such as SELECT statement

    A. executeUpdate

    B. execute

    C. Update

    D. executeQuery*

    21. Which three of the following are classes of Java.rmi package?

    A. Naming*

    B. MarshalledObject*

    C. RMISecurityManager*

    D. Remote

    22. Which option of jar file indicates manifest file not created?

    A. Jar M

    B. Jar tc. Jar m

    D. Jar c

    23. _______ option of Jar command makes a Java archive file.

    A. JAR -c

    B. JAR -m

    C. JAR -v

    D. JARf

    24. Which command adds the file file.class to Xyz.jar?

    A. jaruf Xyz . jar file.class

    B. jarxf Xyz . jar

    C. jartf Xyz . jar

    25. Driver types are used to categorize the technology used to connect to the

    database.

    A. True*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    15/29

    B. False

    26. This is an Application Programming Interface provided by Microsoft for access the

    database.It uses SQL as its database language.

    A. JDBC

    B. ODBC*

    27. JDBC is ODBC translated into an object-oriented interface that is natural for java

    programmers.

    A. True*

    B. False

    28. In this Data processing Model,the client communicates directly to the database

    server without the help of any middle-ware technologies or another server.

    A. Two-tier Data processing Model*

    B. Three - tier Data processing Model

    29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.

    A. Translates JDBC calls into ODBC calls.*

    B. Translates JDBC calls into database=specific calls or native calls

    C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods

    on the server.

    D. Directly calls RDBMS from client machine.

    30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL

    such as CREATE, DROP Table.

    A. executeUpdate();*

    B. execute();

    C. executeQuery();

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    16/29

    31. This method is used for retrieving a string value (SQL type VARCHAR) and

    assigning into java String object.

    A. getVarchar();

    B. getObject();

    C. getString();*

    32. This method is used for retrieving the value from current row as object.

    A. getRow();

    B. getObject();*

    C. getString();

    33. This object connects to a data source only to read data from a ResultSet or write

    data back to the data source.

    A. A Connected RowSet.

    B. A Disconnected RowSet.*

    34. A client application uses stored procedures increases the network traffic, but it

    reduces the number of times a database is accessed.

    A. True

    B. False*

    35. This parameter is used to pass values into a store procedure.The value of this

    parameter cannot changed or reassigned within the module and hence is constant.

    A. IN*

    B. OUT

    C. IN/OUT

    36. OUT Parameter. - 3 choices.

    A. pass out of procedure module*

    B. is a constant

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    17/29

    C. is a variable*

    D. back to the calling block*

    37. This Parameter behaves like an initialized variable.

    A. OUT

    B. IN

    C. IN/OUT*

    38. This object does not contain the stored procedure itself but contains only a call to

    the stored procedure.

    A. CallableStatment*

    B. PreparedStatment

    C. prepareCall();

    39. This refers to the ability to check whether the cursor stays open after a COMMIT

    A. Updatable

    B. Holdable*

    C. Scrollable

    40. The prepareStatment() method sends SQL query to the database. and this returns:

    A. PrepareStatment Object*

    B. Callalbalestatment Object

    C. PrepareCall () method.

    41. The CallableStatment object contains the SQL statments.

    A. True*

    B. False

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    18/29

    42. A cursor that can only be used to process from the beginning of a ResultSet to

    the end of it.It is default type.

    A. TYPE_SCROLL_SENSITIVE

    B. TYPE_SCROLL_INSENSITIVE

    C. TYPE_FORWARD_ONLY*

    43. A Rowset Object provides scrollability and updatability for any kind of DBMS or

    drivers.

    A. True*

    B. False

    44. A ResultSetobject contains a set of rows from a result set or some other source

    of tabular data, like a file or spreadsheet.

    A. true

    B. false*

    45. Which class is a disconnected rowset.

    A. A CachedRowSet class.*

    B. A JDBCRowSet class.

    C. A WebRowSet class.

    46. Which statments are true?

    A. A RowSet has to be make scrollable and updatable at the time of creation.

    B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*

    C. A connect RowSet can read data from a non relational database source also.

    D. A RowSet is a JavaBeans component which has to programmatically notify all registered

    event listener.

    47. The Result Set can not be modified and hence, It is not updatable in any way.

    A. CONCURENT_READ_ONLY*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    19/29

    B. CONCURENT_UPDATABLE

    48. This is the mechanism of encoding information in a secret coded form, intented

    only for the recipient to access the information.

    A. Cryptography*

    B. Encryption

    49. The term "encrypting " pertains to converting plaintext to ciphertext, which is

    again decrypted into usable plaintext.

    A. True*

    B. False

    50. This transforms the input, called the plaintext, to an output, known as ciphertext.

    this is known as Symmetric cryptography.

    A. Hash Function

    B. Secret key cryptography*

    C. Public Key cryptography

    51. This is as asymmetric cryptography, It operates under two different keys.

    A. Public Key cryptography*

    B. Hash Function

    C. Secret key cryptography

    52. This is algorithms that does not use any key, it is known as message digest.

    A. Secret key cryptography

    B. Public Key cryptography

    C. Hash Function*

    53. Which statements are true?

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    20/29

    A. The Tamper-proofing process verifies whether the data received by the receiver is the

    same data as sent by the sender.*

    B. Spoofing or identity interception, which means impersonating the identity of a different

    user and use it in an unauthorized way*

    C. Authentication is the process that provides tamper-proofing, while it is on the network.

    54. The class is use to hash value of the specified data.

    A. Message Digest*

    B. Signature

    C. KeyPair Generator

    D. KeyFactory

    E. Certificate Factory

    55. The 'Native API-Java/Party Java' is Driver Type

    A. I

    B. II*

    C. III

    D. IV

    56. The 'Native Protocol - All Java' is Driver Type

    A. I

    B. II

    C. III

    D. IV*

    57. Statement and PreparedStatement is inherited from Statement Interface. The

    CallableStatement is inherited from PreparedStatement interface.

    A. True*

    B. False

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    21/29

    58. This Method return an Integer value indicating the row count.

    A. ExecuteQuery();

    B. Execute();

    C. ExecuteUpdate();*

    59. If row value is 0, this method has no effect.If row value is positive, the cursor is

    moved forward that many row.

    A. relative(int row) method*

    B. absolute(int row) method.

    60. Calling absolute(1) is equivalent to calling last()

    A. True

    B. False*

    61. Which statements are true? (3 choices)

    A. In Scrollable ResultSet, the cursor is positioned on the first row.

    B. A default ResultSet object is not updated and has a cursor that moves forward only.*

    C. The ResultSet should be compulsorily closed after a COMMIT statement.

    D. Holdable refers to ability to check whether the cursor stays open after a COMMIT.*

    E. The createStatement method has two argurments namely resultSetType and

    resultSetConcurrency*

    62. Which statements are true? (3 choices)

    A. The original message text has to be transmitted separately since the content of a digitally

    signed message is altered irreversibly.

    B. A Certification authority creates a signed certificate by encrypting the digitally signature

    with its private key.*

    C. The digital signature and sender's public key are appended to end of a message. *

    D. A recipient decrypts a signed signature using its own public key.

    E. The integrity of a message cannot be ensure while using message digests*

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    22/29

    63. This comprises the mapping of one or more permissions with a class.

    A. Security Manager

    B. Policy File*

    C. Access Controller

    64. The class is use to produce a pair of public and private keys appropriate for a

    specified.

    A. Signature

    B. Message Digest

    C. KeyPair Generator*

    D. KeyFactory

    E. Certificate Factory

    65. The class is used to sign and check the authenticity of digital signature

    A. Message Digest

    B. Signature*

    C. Certificate Factory

    D. KeyFactory

    E. KeyPair Generator

    66. The class is used to transform opaque keys of type Key into key specifications

    and provide transparent representations of the underlying key material and vice

    versa.

    A. Message Digest

    B. KeyPair Generator

    C. Signature

    D. KeyFactory*

    E. Certificate Factory

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    23/29

    67. The class is used to generate public key certificates.

    A. Certificate Factory*

    B. KeyPair Generator

    C. Message Digest

    D. Signature

    E. KeyFactory

    68. This class is a database of keys and certificates

    A. Algorithm Parameters

    B. KeyStore*

    C. Key

    D. KeySpec

    69. this ensures that a user or a business organization or a program entity has

    performed a transaction.

    A. Non-repudiation*

    B. Tampering

    C. Integrity

    D. Confidentiality

    70. Data integrity is to protect data from getting tampered, while it is on the network.

    A. True*

    B. False

    71. This is a framework written in java to access and develop cryptographic

    functionality, and forms part of the java security API.

    A. JCA*

    B. JCE

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    24/29

    72. With this padding technique a short block is padded with a repeating byte.

    A. DES

    B. PKCS5*

    C. CBC

    73. Single-bit ciphers are called:

    A. Block cipher

    B. Stream cipher*

    74. Cipher objects are created using this method of the cipher class.

    A. getInstance();*

    B. init();

    75. the cipher object is initialized by the init() method?

    A. True*

    B. False

    76. The Code : "DES/CBC/PKCS5Padding" is the form of

    A. "mode/algorithm/padding"

    B. "algorithm/mode/padding"*

    C. "algorithm/padding/mode"

    D. "DeCrypto/Cipher/padding"

    77. "(Only)algorithm" such as

    A. "DES"*

    B. "PKCS5"

    C. "CBE"

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    25/29

    78. Most these implementations mix a random number, known as the "salt" with the

    password text to derive an encrypted key.

    A. Encryption and Decryption

    B. Key Agreement

    C. Password Base Encryption*

    79. Single bits or a block of bits can be encrypted into cipher blocks

    A. True*

    B. False

    80. In this Environment, the java application is the client and DBMS is the database

    server.

    A. Three-Tier JDBC

    B. Two-Tier JDBC*

    ======================================================================

    1.which of the following are JDBC drivers?(chon 4)(1.5d)

    A, JDBCODBC bridge*

    B native API partyjava driver*

    C, Netprotoco alljava*

    D, JDBCnetwork driver

    E, Native protocol alljava driver*

    2. The naming clss extend the -----class

    A serializable

    B Object*

    C System

    D Remote

    3. -the------Class of java RMI provides stati methods for accepA MarshalledObject

    B Naming

    C RMI Security Manager

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    26/29

    D log Stream

    E Remote Server

    4 . the -----use local native libraries to commulicate with the database

    A JDBCODBC Bridge*

    B nativeAPIParty- java driver

    C ODBC net all java driver

    D Native Protocoalljava driver

    5 . which interface of the JDBC API contains method used to execute SQL stored

    procedures (1d)

    A statement

    B resultset

    C CallableStatement*

    6 .. . which interface of the JDBC API execute precompied SQL statement(1d)

    A preparedStatement*

    B statement

    C Resultset

    7 which of the following three interfaces the JDBC API provides for sending SQLstatements to the database? (2d)

    A Statement*

    B PreparedStatement*

    C callablestatement*

    D Connection

    E Getconnection

    8 the ----- class is the traditional managerment layer of JDBC working between the. The driver

    a Driver manager

    b Connection

    c Resultset

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    27/29

    9 The java software provides three JDBC product components they are (2d)A The JDBC DriverManager facility *

    B The JDBC driver test suite*

    C The JDBCODBC bridge*

    D The callable stament

    10 . A ------obiect is used to send SQL statement to a databaseA Connection *

    B Statement

    C Drive

    11 . Which interface of the JDBC API provides mothod to setive data that an SQL

    statement returns?

    A ResultSet *

    B Statement

    C Driver

    D Connection

    12 Which two of the following are valid JDBC driver(choose 2)a JDBCODBC bridge plus ODBC driver

    b nativeAPI partlyJava drivr

    c ODBC Driver

    d Native java driver

    13 Which kind of driver converts ODBC calls drectly into the network protocolA JDBC _ODBC bridge plus ODBC driver*

    B Native API partly java driver

    C Native protocol pure java driver

    14. Depending upon scrollabity how many types of result sets are av..A One

    B Four

    C three

    D Two

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    28/29

    15. Which of the following classes contain the Execute() method?A ResultSet

    B RescordSet

    C Statement*

    D Connection

    16. the -----method is used to retreve the name ofA getColumName()*

    B GetColumCaption()

    C GetColumLabel()

    D None of the others

    17 The statement interface provides three different methods for executing SQLstatement, they are (2d)

    A ExecuteQuery *

    B ExecuteUpdate *

    C Execute*

    D ExecuteDelete

    E ExecuteInsert

    18 Once the Drver classes have been loaded and registered with the driver avaitablefor eatablahing a connection with a database is the statement correct?

    A true

    B False*

    =================================================

    1. A cipher disables encryption and decryption operations.

    False

    2. JDBC is an acronym of ?Java Database Connectivity.?

    False3. Wich of the following are the advantages of JDBC?

    1.Continued usage of existing data

    2.Vendor dependent

    3.Platform independent

    4.Ease of use

    4. Native Protocol-All Java is ________ JDBC driver.

    Type IV

    4. The next() method allows to traverse forward by moving the cursor ___ forward.One row

  • 8/11/2019 Tong Hop Ly Thuyet DBSJ

    29/29

    5. The executeUpdate() method is used to execute which of the following objects?

    PreparedStatement and CallableStatement

    6. Which of the following are the characteristics of the Stored procedures?

    All of the above

    7. Which of the following are the benefits of using stored procedure?

    1,2,3,48. The drawback of using a stored procedure is lack of portability.

    False

    9. Which of the following is the characteristics of ResultSet?

    Scrollable

    10. Which of the following parameters are used in stored procedure?

    1,2,3,4

    11. Which of the following are the static constant values that can be specified for the

    result set type?

    TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE,

    TYPE_SCROLL_INSENSITIVE12. Once the updaterow() method is called, changes to the database are final and cannot

    be undone.

    True

    13. The UpdateXXX() method of ResultSet is used to change the data in an existing row

    False

    14. ____ is the parent interface implemented by all connected RowSet objects.

    CacheRowSet

    15. Which of the following contains path of the class and permission details required to

    access a resource?

    Policy file16. Which of the following classes is used to grant access to network resources?

    SocketPermission

    17. Encryption converts original data into an encrypted form by appluing ___

    transformations.

    a. Cipher