SlideShare una empresa de Scribd logo
1 de 48
Descargar para leer sin conexión
Q.1) Driver types are used to categorize the technology used to connect to the database.
A. True *
B. False
Q.2) This is an Application Programming Interface provided by Microsoft for access the database.It
uses SQL as its database language.
A. JDBC
B. ODBC*
Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers.
A. True*
B. False
Q.4) In this Data processing Model,the client communicates directly to the database server without the
help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model
Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server.
D. Directly calls RDBMS from client machine.
Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that return the result
of the query as a result set.
A. executeUpdate();
B. executeQuery();*
C. execute();
Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE,
DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();
Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String
object.
A. getVarchar();
B. getObject();
C. getString();*
Q.9) This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();
Q.10) A client application uses stored procedures increases the network traffic, but it reduces the number of
times a database is accessed.
A. True
B. False*
Q.11) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed
or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT
Q.12) OUT Parameter.
- 3 choices.
A. pass out of procedure module. *
B. is a constant
C. is a variable*
D. back to the calling block*
Q.13) This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*
Q.14) This object does not contain the stored procedure itself but contains only a call to the stored procedure.
A. CallableStatment*
B. PreparedStatment
C. prepareCall();
Q.15) It reefers to the ability to move backward as well as forward through a result set.
A. Scrollable*
B. Updatable
C. Holdable
Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT.
A. Updatable
B. Holdable*
C. Scrollable
Q.17) The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
Q.18) The CallableStatment object contains the SQL statments.
A. True*
B. False
Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default
type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*
Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
A. True*
B. False
Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file
or spreadsheet.
A. True*
B. False
Q.22) Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.
Q.23) This object connects to a data source only to read data from a ResultSet or write data back to the data
source.
A. A connected RowSet.
B. A Disconnected RowSet. *
Q.24) Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener.
Q.25) The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE
Q.26) This is the mechanism of encoding information in a secret coded form, intented only for the recipient to
access the information.
A. Cryptography*
B. Encryption
Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into
usable plaintext.
A. True*
B. False
Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as
Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography
Q.29) This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography
Q.30) This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*
Q.31) Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as
sent by the sender. *
B. Spoofing or identity interception, which means impersonating the identity of a different user and use
it in an unauthorized way. *
C. Authentication is the process that provides tamper-proofing, while it is on the network.
Q.32) The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.33) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory
Q.34) The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator
Q.35) The class is used to transform opaque keys of type Key into key specifications and provide transparent
representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory
Q.36) The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory
Q.37) This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec
Q.38) Cryptography is essential for making a application safe and secure, including:
- 3 choices
A. Tampering*
B. Non-repudiation*
C. Integrity & confidentiality*
D. Spoofing
E. Authentication*
Q.39) this ensures that a user or a business organization or a program entity has performed a transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. confidentiality
Q.40) Data integrity is to protect data from getting tampered,while it is on the network.
A. True*
B. False
Q.41) This is a framework written in java to access and develop cryptographic functionality, and forms part of
the java security API.
A. JCA*
B. JCE
Q.42) With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC
Q.43) Single-bit ciphers are called:
A. Block cipher*
B. Stream cipher
Q.44) Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();
Q.45) the cipher object is initialized by the init() method?
A. True*
B. False
Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"
Q.47) "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"
Q.48) Most these implementations mix a random number, known as the "salt" with the password text to derive
an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*
Q.49) Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False
Q.50) The product components of JDBC are:
A. JDBC-ODBC Bridge.
B. Net-Protocol/all-Java driver
C. JDBC Driver Manager*
D. JDBC Test Suite & JDBC API*
E. ODBC
Q.51) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
Q.52) The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV
Q.53) The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*
Q.54) Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is
inherited from PreparedStatement interface.
A. True*
B. False
Q.55) This Objects are used to receive and store the data in the same form as it is returned from the SQL
queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet*
D. ExecuteQuery()
Q.56) This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that
many row.
A. relative(int row) method*
B. absolute(int row) method.
Q.58) Calling absolute(1) is equivalent to calling last()
A. True
B. False*
Q.59) Which statements are true?
- 3 choices
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only. *
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. *
E. The createStatement method has two argurments namely resultSetType and *resultSetConcurrency
.61) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controler

======================================================================
1. JDBC and ODBC are identical?
A. True
B. False*

2. How many kinds of JDBC drivers?
A. 10
B. 3
C. 4*
D many

3. The JDBC API is a Java API for accessing virtually any kind of tabular data
A. False
B. True*

4. What is the correct statement about CallableStatement interface? (choose 1)
A. It defines a statement to create a stored-procedure
B. It contains a call to a stored-procedure*
C. It defines a store-procedure

5. Which is the default port number of RMI Registry Server?
A. 1023
B. 1099*
C. 1069

6. Which of the following statements is correct for retrieving all fields from Student table?
A.

String sql=”SELECT * FROM Student”;
Statement st=cn.createStatement(sql);
ResultSet rs=st.executeQuery();

B.

String sql=”SELECT * FROM Student”; *
Statement st=cn.createStatement();
ResultSet rs=st.executeQuery(sql);

7. If you need to use a stored procedure with output parameters, which of the following
statement type should be used to call the procedure?
A. PreparedStatement
B. CallableStatement*
C. Statement

8. From which object do you ask for DatabaseMetaData?
A. DriverManager
B. ResultSet
C. Connection*
D. Driver

9. Which character is used to represent an input parameter in a CallableStatement?
A. *
B. #
C. ? *
D. %

10. Which one of the following will not get the data from the first column of ResultSet rs,
returned from executing SQL statement: SELECT name, rank, serialNo FROM employee.
A. rs.getString(“name”);
B. rs.getString(1);
C. rs.getString(0); *

11. Which class contains the transaction control method setAutoCommit, commit, and rollback?
A. Statement
B. Connection*
C. ResultSet

12. You can use an applet in RMI program as ________
A. None of the other options
B. Server program
C. Client program*

13. Which of the following will not cause a JDBC driver to be loaded and registered with the
DriverManager?

A. Class.forName(driverString);
B. new DriverClass();
C. Include driver name in jdbc.drivers system property
D. None of the above*

14. SQLWarnings from multiple Statement method calls (like executeUpdate) will build up until
you ask for them all with getWarnings and getNextWarning.
A. True
B. False*

15. If one intends to work with a ResultSet, which of these PreparedStatement methods will not
work?
A. execute()
B. executeQuery()
C. executeUpdate()*

16. Can a ResultSet be reliably returned from a method that creates a Statement and executes a

query?
A. Yes
B. No*

17. How can I use JDBC to create a database?
A. Include create=true at end of JDBC URL
B. Execute "CREATE DATABASE jGuru" SQL statement*
C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements
D. Database creation is DBMS specific

18. Which of the following can you do with a JDBC 2.0 database driver that you cannot with a
JDBC 1.x driver?
A. Batch multiple statements, to be sent to the database together
B. Scroll through result sets bi-directionally
C. Work with SQL3 data types directly
D. All of the above*

19. A __________ result set has a cursor that moves both forward and backward and can be
moved to a particular row
A. scrollable*
B. nonscrollable
C. Unscrollable

20. The method___________ is designed for statements that produce a single result set, such as
SELECT statement
A. executeUpdate
B. execute
C. Update
D. executeQuery*

21. Which three of the following are classes of Java.rmi package?
A. Naming*
B. MarshalledObject*
C. RMISecurityManager*
D. Remote

22. Which option of jar file indicates manifest file not created?
A. Jar M
B. Jar t
c. Jar m
D. Jar c

23. _______ option of Jar command makes a Java archive file.
A. JAR -c
B. JAR -m
C. JAR -v
D. JAR –f

24. Which command adds the file file.class to Xyz.jar?
A. jar – uf Xyz . jar file.class
B. jar – xf Xyz . jar
C. jar – tf Xyz . jar

25. Driver types are used to categorize the technology used to connect to the database.
A. True*
B. False

26. This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A. JDBC
B. ODBC*

27. JDBC is ODBC translated into an object-oriented interface that is natural for java
programmers.
A. True*
B. False

28. In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A. Two-tier Data processing Model*
B. Three - tier Data processing Model

29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls. *
B. Translates JDBC calls into database=specific calls or native calls
C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the
server.
D. Directly calls RDBMS from client machine.

30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as
CREATE, DROP Table.
A. executeUpdate();*
B. execute();
C. executeQuery();

31. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A. getVarchar();
B. getObject();
C. getString();*

32. This method is used for retrieving the value from current row as object.
A. getRow();
B. getObject();*
C. getString();

33. This object connects to a data source only to read data from a ResultSet or write data back
to the data source.
A. A Connected RowSet.
B. A Disconnected RowSet. *

34. A client application uses stored procedures increases the network traffic, but it reduces the
number of times a database is accessed.
A. True
B. False*

35. This parameter is used to pass values into a store procedure.The value of this parameter
cannot changed or reassigned within the module and hence is constant.
A. IN*
B. OUT
C. IN/OUT

36. OUT Parameter. - 3 choices.
A. pass out of procedure module*
B. is a constant
C. is a variable*
D. back to the calling block*

37. This Parameter behaves like an initialized variable.
A. OUT
B. IN
C. IN/OUT*

38. This object does not contain the stored procedure itself but contains only a call to the stored
procedure.
A. CallableStatment*
B. PreparedStatment
C. prepareCall();

39. This refers to the ability to check whether the cursor stays open after a COMMIT
A. Updatable
B. Holdable*
C. Scrollable

40. The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object*
B. Callalbalestatment Object
C. PrepareCall () method.
41. The CallableStatment object contains the SQL statments.
A. True*
B. False

42. A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A. TYPE_SCROLL_SENSITIVE
B. TYPE_SCROLL_INSENSITIVE
C. TYPE_FORWARD_ONLY*

43. A Rowset Object provides scrollability and updatability for any kind of DBMS or drivers.
A. True*
B. False

44. A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A. true
B. false*

45. Which class is a disconnected rowset.
A. A CachedRowSet class. *
B. A JDBCRowSet class.
C. A WebRowSet class.

46. Which statments are true?
A. A RowSet has to be make scrollable and updatable at the time of creation.
B. Scrollability and Updatability of a RowSet is independent of the JDBC driver*
C. A connect RowSet can read data from a non relational database source also.
D. A RowSet is a JavaBeans component which has to programmatically notify all registered event
listener.

47. The Result Set can not be modified and hence, It is not updatable in any way.
A. CONCURENT_READ_ONLY*
B. CONCURENT_UPDATABLE

48. This is the mechanism of encoding information in a secret coded form, intented only for the
recipient to access the information.
A. Cryptography*
B. Encryption

49. The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A. True*
B. False

50. This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A. Hash Function
B. Secret key cryptography*
C. Public Key cryptography

51. This is as asymmetric cryptography, It operates under two different keys.
A. Public Key cryptography*
B. Hash Function
C. Secret key cryptography

52. This is algorithms that does not use any key, it is known as message digest.
A. Secret key cryptography
B. Public Key cryptography
C. Hash Function*

53. Which statements are true?
A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as
sent by the sender. *
B. Spoofing or identity interception, which means impersonating the identity of a different user and
use it in an unauthorized way*
C. Authentication is the process that provides tamper-proofing, while it is on the network.

54. The class is use to hash value of the specified data.
A. Message Digest*
B. Signature
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory

55. The 'Native API-Java/Party Java' is Driver Type
A. I
B. II*
C. III
D. IV

56. The 'Native Protocol - All Java' is Driver Type
A. I
B. II
C. III
D. IV*

57. Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A. True*
B. False

58. This Method return an Integer value indicating the row count.
A. ExecuteQuery();
B. Execute();
C. ExecuteUpdate();*
59. If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A. relative(int row) method*
B. absolute(int row) method.

60. Calling absolute(1) is equivalent to calling last()
A. True
B. False*

61. Which statements are true? (3 choices)
A. In Scrollable ResultSet, the cursor is positioned on the first row.
B. A default ResultSet object is not updated and has a cursor that moves forward only. *
C. The ResultSet should be compulsorily closed after a COMMIT statement.
D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. *
E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency*

62. Which statements are true? (3 choices)
A. The original message text has to be transmitted separately since the content of a digitally signed
message is altered irreversibly.
B. A Certification authority creates a signed certificate by encrypting the digitally signature with its
private key. *
C. The digital signature and sender's public key are appended to end of a message. *
D. A recipient decrypts a signed signature using its own public key.
E. The integrity of a message cannot be ensure while using message digests*

63. This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File*
C. Access Controller

64. The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator*
D. KeyFactory
E. Certificate Factory

65. The class is used to sign and check the authenticity of digital signature
A. Message Digest
B. Signature*
C. Certificate Factory
D. KeyFactory
E. KeyPair Generator

66. The class is used to transform opaque keys of type Key into key specifications and provide
transparent representations of the underlying key material and vice versa.
A. Message Digest
B. KeyPair Generator
C. Signature
D. KeyFactory*
E. Certificate Factory

67. The class is used to generate public key certificates.
A. Certificate Factory*
B. KeyPair Generator
C. Message Digest
D. Signature
E. KeyFactory

68. This class is a database of keys and certificates
A. Algorithm Parameters
B. KeyStore*
C. Key
D. KeySpec

69. this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation*
B. Tampering
C. Integrity
D. Confidentiality

70. Data integrity is to protect data from getting tampered, while it is on the network.
A. True*
B. False

71. This is a framework written in java to access and develop cryptographic functionality, and
forms part of the java security API.
A. JCA*
B. JCE

72. With this padding technique a short block is padded with a repeating byte.
A. DES
B. PKCS5*
C. CBC

73. Single-bit ciphers are called:
A. Block cipher
B. Stream cipher*

74. Cipher objects are created using this method of the cipher class.
A. getInstance();*
B. init();

75. the cipher object is initialized by the init() method?
A. True*
B. False

76. The Code : "DES/CBC/PKCS5Padding" is the form of
A. "mode/algorithm/padding"
B. "algorithm/mode/padding"*
C. "algorithm/padding/mode"
D. "DeCrypto/Cipher/padding"

77. "(Only)algorithm" such as
A. "DES"*
B. "PKCS5"
C. "CBE"

78. Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
A. Encryption and Decryption
B. Key Agreement
C. Password Base Encryption*

79. Single bits or a block of bits can be encrypted into cipher blocks
A. True*
B. False

80. In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC*
======================================================================
1.which of the following are JDBC drivers?(chon 4)(1.5d)
A, JDBC –ODBC bridge*
B native API party – java driver*
C, Net –protoco all – java*
D, JDBC – network driver
E, Native protocol all – java driver*
2. The naming clss extend the -----class
A serializable
B Object*
C System
D Remote
3. -the------Class of java RMI provides stati methods for accep
A MarshalledObject
B Naming
C RMI Security Manager
D log Stream
E Remote Server
4 . the -----use local native libraries to commulicate with the database
A JDBC – ODBC Bridge*
B native – API – Party- java driver
C ODBC net all java driver
D Native Protoco – all – java driver
5 . which interface of the JDBC API contains method used to execute SQL stored procedures
(1d)
A statement
B resultset
C CallableStatement*
6 .. . which interface of the JDBC API execute pre – compied SQL statement(1d)
A preparedStatement*
B statement
C Resultset
7

which of the following three interfaces the JDBC API provides for sending SQL statements
to the database? (2d)
A Statement*
B PreparedStatement*
C callablestatement*
D Connection
E Getconnection
the ----- class is the traditional managerment layer of JDBC working between the …. The
driver

8

a Driver manager
b Connection
c Resultset

9 The java software provides three JDBC product components they are (2d)
A The JDBC DriverManager facility *
B

The JDBC driver test suite*

C

The JDBC – ODBC bridge*

D

The callable stament

10 . A ------obiect is used to send SQL statement to a database
A Connection *
B

Statement

C

Drive

11 . Which interface of the JDBC API provides mothod to setive data that an SQL statement
returns?
A ResultSet *
B Statement
C Driver
D Connection
12 Which two of the following are valid JDBC driver(choose 2)
a JDBC –ODBC bridge plus ODBC driver
b native – API partly –Java drivr
c
d

ODBC Driver
Native java driver

13 Which kind of driver converts ODBC calls drectly into the network protocol
A JDBC _ODBC bridge plus ODBC driver*
B Native API partly java driver
C Native protocol pure java driver
14.

Depending upon scrollabity how many types of result sets are av…..
A One
B Four
C three
D Two

15. Which of the following classes contain the Execute() method?
A ResultSet
B

RescordSet

C

Statement*

D

Connection

16. the -----method is used to retreve the name of
A getColumName()*
B GetColumCaption()
C GetColumLabel()
D None of the others
17

The statement interface provides three different methods for executing SQL
statement, they are (2d)
A ExecuteQuery *
B ExecuteUpdate *
C Execute*
D ExecuteDelete
E

ExecuteInsert

18

Once the Drver classes have been loaded and registered with the driver avaitable for
eatablahing a connection with a database is the statement correct?
A true
B False*
=================================================
1. A cipher disables encryption and decryption operations.
False
2. JDBC is an acronym of ?Java Database Connectivity.?
False
3. Wich of the following are the advantages of JDBC?
1.Continued usage of existing data
2.Vendor dependent
3.Platform independent
4.Ease of use
4. Native Protocol-All Java is ________ JDBC driver.
Type IV
4. The next() method allows to traverse forward by moving the cursor ___ forward.
One row
5. The executeUpdate() method is used to execute which of the following objects?
PreparedStatement and CallableStatement
6. Which of the following are the characteristics of the Stored procedures?
All of the above
7. Which of the following are the benefits of using stored procedure?
1,2,3,4
8. The drawback of using a stored procedure is lack of portability.
False
9. Which of the following is the characteristics of ResultSet?
Scrollable
10. Which of the following parameters are used in stored procedure?
1,2,3,4
11. Which of the following are the static constant values that can be specified for the result set
type?
TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE,
TYPE_SCROLL_INSENSITIVE
12. Once the updaterow() method is called, changes to the database are final and cannot be
undone.
True
13. The UpdateXXX() method of ResultSet is used to change the data in an existing row
False
14. ____ is the parent interface implemented by all connected RowSet objects.
CacheRowSet
15. Which of the following contains path of the class and permission details required to access a
resource?
Policy file
16. Which of the following classes is used to grant access to network resources?
SocketPermission
17. Encryption converts original data into an encrypted form by appluing ___ transformations.
a. Cipher

Q.1) This is an Application Programming Interface provided by Microsoft for access the database.It
uses SQL as its database language.
JDBC
A.
ODBC
B.
Q.2) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A. Translates JDBC calls into ODBC calls.
B. Translates JDBC calls into database=specific calls or native calls
Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods
C.
on the server.
D. Directly calls RDBMS from client machine.
Q.3) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A. getVarchar();
B. getObject();
C. getString();
Q.4)

This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A. IN
B. OUT
C. IN/OUT

Q.5)

This object does not contain the stored procedure itself but contains only a call to the stored
procedure.
CallableStatment
A.
PreparedStatment
B.
prepareCall();
C.

Q.6)

The prepareStatment() method sends SQL query to the database. and this returns:
A. PrepareStatment Object
B. Callalbalestatment Object
C. PrepareCall () method.

Q.7)

A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers.
True
A.
False
B.

Q.8)

This object connects to a data source only to read data from a ResultSet or write data back to
the data source.
A. A connected RowSet.
B. A Disconnected RowSet.

Q.9) In this Environment, the java application is the client and DBMS is the database server.
A. Three-Tier JDBC
B. Two-Tier JDBC
Q.10) The 'Native API-Java/Party Java' is Driver Type
I
A.
II
B.
III
C.
IV
D.
Q.11) This Objects are used to receive and store the data in the same form as it is returned from the
SQL queries.
A. PreparedStatement
B. CallableStatement
C. ResultSet
D. ExecuteQuery()
Q.12) Calling absolute(1) is equivalent to calling last()
True
A.
False
B.

CRYPTO
Q.13) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted
into usable plaintext.
A. True
B. False
Q.14) This is algorithms that does not use any key, it is known as message digest.
Secret key cryptography
A.
Public Key cryptography
B.
Hash Function
C.
Q.15) The class is use to produce a pair of public and private keys appropriate for a specified.
A. Signature
B. Message Digest
C. KeyPair Generator
D. KeyFactory
E. Certificate Factory
Q.16) The class is used to generate public key certificates.
Certificate Factory
A.
KeyPair Generator
B.
Message Digest
C.
Signature
D.
KeyFactory
E.
Q.17) this ensures that a user or a business organization or a program entity has performed a
transaction.
A. Non-repudiation
B. Tampering
C. Integrity
D. confidentiality
Q.18) With this padding technique a short block is padded with a repeating byte.
DES
A.
PKCS5
B.
CBC
C.
Q.19) the cipher object is initialized by the init() method?
A. True
B. False
Q.20) Most these implementations mix a random number, known as the "salt" with the password
text to derive an encrypted key.
Encryption and Decryption
A.
Key Agreement
B.
Password Base Encryption
C.
Q.21) This comprises the mapping of one or more permissions with a class.
A. Security Manager
B. Policy File
C. Access Controler
Q.22 Code
)
using
using
using
using

System;
System.Collections.Generic;
System.Linq;
System.Text;

namespace Abstract_Animal {
abstract class Animal {
public void run() {
Console.writeLine("Run by 4 feet");
}
public

void Eat();

}
class Bird:Animal{
public void Eat(){
Console.writeLine("All of dove eat rice");
}
static void Main(String[] args){
Bird dove = new Bird();
dove.Eat();
}
}
}

A. Compiler Error.
B. Print: "All of dove eat rice"
C. print: "Run by 4 feet"
Q.23) Abstact method ,which contains at least one statement, is declared in abstract class.
True
A.
False
B.
Q.24) Eat();
Run();
A. An Abstract class
B. An Interface
Q.25) Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A. True
B. False

1.

Driver types are used to categorize the technology used to connect to the database.

A.

True

B.

False

2.

This is an Application Programming Interface provided by Microsoft for access the
database.It uses SQL as its database language.
A.

JDBC

B.

ODBC

3.

JDBC is ODBC translated into an object-oriented interface that is natural for java
programmiers.
A.

True

B.

False

4.

In this Data processing Model,the client communicates directly to the database server
without the help of any middle-ware technologies or another server.
A.

Two-tier Data processing Model

B.

Three - tier Data processing Model

5. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
A.

Translates JDBC calls into ODBC calls.

B.

Translates JDBC calls into database=specific calls or native calls

C.
Maps JDBC calls to the underlying "network" protocol, which in turn calls native
methods on the server.
D.

Directly calls RDBMS from client machine.

6.

This method is use to execute any SQL statement with a "SELECT" clause, that return the
result of the query as a result set.
A.

executeUpdate();

B.

executeQuery();

C.

execute();

7.

This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as
CREATE, DROP Table.
A.

executeUpdate();

B.

execute();

C.

executeQuery();

8.

This method is used for retrieving a string value (SQL type VARCHAR) and assigning into
java String object.
A.

getVarchar();

B.

getObject();

C.

getString();

9.

This method is used for retrieving the value from current row as object.
A.

getRow();

B.

getObject();

C.

getString();

10.

A client application uses stored procedures increases the network traffic, but it reduces
the number of times a database is accessed.
A.

True

B.

False

11.

This parameter is used to pass values into a store procedure.The value pf this parameter
cannot changed or reassigned within the module and hence is constant.
A.

IN

B.

OUT

C.

IN/OUT

12.

OUT Parameter.
- 3 choices.
A.

pass out of procedure module.

B.

is a constant

C.

is a variable

D.

back to the calling block

13.

This Parameter behaves like an initialized variable.

A.

OUT

B.

IN
C.

IN/OUT

14.

This object does not contain the stored procedure itself but contains only a call to the
stored procedure.
A.

CallableStatment

B.

PreparedStatment

C.

prepareCall();

15.

It reefers to the ability to move backward as well as forward through a result set.

A.

Scrollable

B.

Updatable

C.

Holdable

16.

This refers to the ability to check whether the cursor stays open after a COMMIT.

A.

Updatable

B.

Holdable

C.

Scrollable

17.

The prepareStatment() method sends SQL query to the database. and this returns:

A.

PrepareStatment Object

B.

Callalbalestatment Object

C.

PrepareCall () method.
18.

The CallableStatment object contains the SQL statments.

A.

True

B.

False

19.

A cursor that can only be used to process from the beginning of a ResultSet to the end of
it.It is default type.
A.

TYPE_SCROLL_SENSITIVE

B.

TYPE_SCROLL_INSENSITIVE

C.

TYPE_FORWARD_ONLY

20.

A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or
drivers.
A.

True

B.

False

21.

A ResultSet object contains a set of rows from a result set or some other source of tabular
data, like a file or spreadsheet.
A.

True

B.

False

22.
Which class is a disconnected rowset.
A.

A CachedRowSet class.

B.

A JDBCRowSet class.

C.

A WebRowSet class.

23.

This object connects to a data source only to read data from a ResultSet or write data
back to the data source.
A.

A connected RowSet.

B.

A Disconnected RowSet.

24.

Which statments are true?

A.

A RowSet has to be make scrollable and updatable at the time of creation.

B.

Scrollability and Updatability of a RowSet is independent of the JDBC driver

C.

A connect RowSet can read data from a non relational database source also.

D.
A RowSet is a JavaBeans component which has to programmatically notify all registered
event listener.

25.

The Result Set can not be modified and hence, It is not updatable in any way.

A.

CONCURENT_READ_ONLY

B.

CONCURENT_UPDATABLE

26.

This is the mechanism of encoding information in a secret coded form, intented only for
the recipient to access the information.
A.

Cryptography

B.

Encryption

27.

The term "encrypting " pertains to converting plaintext to ciphertext, which is again
decrypted into usable plaintext.
A.

True

B.

False

28.

This transforms the input, called the plaintext, to an output, known as ciphertext. this is
known as Symmetric cryptography.
A.

Hash Function

B.

Secret key cryptography

C.

Public Key cryptography

29.

This is as asymmetric cryptography, It operates under two different keys.

A.

Public Key cryptography

B.

Hash Function

C.

Secret key cryptography

30.

This is algorithms that does not use any key, it is known as message digest.

A.

Secret key cryptography

B.

Public Key cryptography
C.

31.

Hash Function

Which statements are true?

A.
The Tamper-proofing process verifies whether the data received by the receiver is the same
data as sent by the sender.
B.
Spoofing or identity interception, which means impersonating the identity of a different user
and use it in an unauthorized way.
C.

32.

Authentication is the process that provides tamper-proofing, while it is on the network.

The class is use to hash value of the specified data.

A.

Message Digest

B.

Signature

C.

KeyPair Generator

D.

KeyFactory

E.

Certificate Factory

33.

The class is use to produce a pair of public and private keys appropriate for a specified.

A.

Signature

B.

Message Digest

C.

KeyPair Generator

D.

KeyFactory

E.

Certificate Factory
34.

The class is used to sign and check the authenticity of digital signature

A.

Message Digest

B.

Signature

C.

Certificate Factory

D.

KeyFactory

E.

KeyPair Generator

35.

The class is used to transform opaque keys of type Key into key specifications and
provide transparent representations of the underlying key material and vice versa.
A.

Message Digest

B.

KeyPair Generator

C.

Signature

D.

KeyFactory

E.

Certificate Factory

36.

The class is used to generate public key certificates.

A.

Certificate Factory

B.

KeyPair Generator

C.

Message Digest

D.

Signature

E.

KeyFactory
37.

This class is a database of keys and certificates

A.

Algorithm Parameters

B.

KeyStore

C.

Key

D.

KeySpec

38.

Cryptography is essential for making a application safe and secure, including:
- 4 choices
A.

Tampering

B.

Non-repudiation

C.

Integrity & confidentiality

D.

Spoofing

E.

Authentication

39.

this ensures that a user or a business organization or a program entity has performed a
transaction.
A.

Non-repudiation

B.

Tampering

C.

Integrity

D.

confidentiality

40.

Data integrity is to protect data from getting tampered,while it is on the network.
A.

True

B.

False

41.

This is a framework written in java to access and develop cryptographic functionality,
and forms part of the java security API.
A.

JCA

B.

JCE

42.

With this padding technique a short block is padded with a repeating byte.

A.

DES

B.

PKCS5

C.

CBC

43.

Single-bit ciphers are called:

A.

Block cipher

B.

Stream cipher

44.

Cipher objects are created using this method of the cipher class.

A.

getInstance();

B.

init();
45.

the cipher object is initialized by the init() method?

A.

True

B.

False

46.

The Code : "DES/CBC/PKCS5Padding" is the form of

A.

"mode/algorithm/padding"

B.

"algorithm/mode/padding"

C.

"algorithm/padding/mode"

D.

"DeCrypto/Cipher/padding"

47.

"(Only)algorithm" such as

A.

"DES"

B.

"PKCS5"

C.

"CBE"

48.

Most these implementations mix a random number, known as the "salt" with the
password text to derive an encrypted key.
A.

Encryption and Decryption

B.

Key Agreement

C.

Password Base Encryption
49.

Single bits or a block of bits can be encrypted into cipher blocks
A. True(correct answer)
B. False(your answer)

50.

The product components of JDBC are:

A.

JDBC-ODBC Bridge.

B.

Net-Protocol/all-Java driver

C.

JDBC Driver Manager

D.

JDBC Test Suite & JDBC API

E.

ODBC

51.

In this Environment, the java application is the client and DBMS is the database server.

A.

Three-Tier JDBC

B.

Two-Tier JDBC

52.

The 'Native API-Java/Party Java' is Driver Type

A.

I

B.

II

C.

III

D.

IV
53.

The 'Native Protocol - All Java' is Driver Type

A.

I

B.

II

C.

III

D.

IV

54.

Statement and PreparedStatement is inherited from Statement Interface. The
CallableStatement is inherited from PreparedStatement interface.
A.

True

B.

False

55.

This Objects are used to receive and store the data in the same form as it is returned from
the SQL queries.
A.

PreparedStatement

B.

CallableStatement

C.

ResultSet

D.

ExecuteQuery()

56.

This Method return an Integer value indicating the row count.

A.

ExecuteQuery();

B.

Execute();

C.

ExecuteUpdate();
57.

If row value is 0, this method has no effect.If row value is positive, the cursor is moved
forward that many row.
A.

relative(int row) method

B.

absolute(int row) method.

58 Calling absolute(1) is equivalent to calling last()
A.

True

B.

False

59.

Which statements are true?
- 3 choices
A.

In Scrollable ResultSet, the cursor is positioned on the first row.

B.

A default ResultSet object is not updated and has a cursor that moves forward only.

C.

The ResultSet should be compulsorily closed after a COMMIT statement.

D.

Holdable refers to ability to check whether the cursor stays open after a COMMIT.

E.
The createStatement method has two argurments namely resultSetType and
resultSetConcurrency

60.

Which statements are true?
-3 choices
A.
The original message text has to be transmitted separately separately since the content of a
digitally signed message is altered irreversibly.
B.
A Certification authority creates a signed certificate by encrypting the digitally signature with
its private key.
C.

The digital signature and sender's public key are appended to end of a message.

D.

A recipient decrypts a signed signature using its own public key.

E.

The integrity of a message cannot be ensure while using message digests.

61.

This comprises the mapping of one or more permissions with a class.

A.

Security Manager

B.

Policy File

C.

Access Controler

62.

An abstract class can be sealed

A.

True

B.

False

63.
using System;

using System.Collections.Generic;

using System.Linq;
using System.Text;

namespace Abstract_class

{

abstract class Animal {

publicvoid run() {
Console.WriteLine("Run by 4 feet");

}

public void Eat();

}

classbird:Animal

{
// implement method Eat of abstract class Animal.

publicoverride void Eat(){

Console.WriteLine("All of dove eat rice");

}

static voidMain(string[] args)

{

bird dove = new bird();

dove.Eat();

}

}

}

A.

Compiler Error.

B.

Print: "All of dove eat rice"

C.

print: "Run by 4 feet"
64.

Abstact method ,which contains at least one statement, is declared in abstract class.

A.

True

B.

False

65.

Eat();
Run();
Sound();
A.

An Abstract class

B.

An Interface

66.

Interface can not contain constants, data fields, contructors, Deconstructors and static
members
A.

True

B.

False

Más contenido relacionado

La actualidad más candente

Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket bookingmrinnovater007
 
Online Vegetable Selling project Presentation
Online Vegetable Selling project PresentationOnline Vegetable Selling project Presentation
Online Vegetable Selling project Presentationmayur patel
 
Smart traffic managment system real time (stmsrt)
Smart traffic managment system real time (stmsrt)Smart traffic managment system real time (stmsrt)
Smart traffic managment system real time (stmsrt)Ayoub Rouzi
 
Vehicle license registration system
Vehicle license registration systemVehicle license registration system
Vehicle license registration systemAgbona Azeez
 
Online Quiz System Project Report ppt
Online Quiz System Project Report pptOnline Quiz System Project Report ppt
Online Quiz System Project Report pptKishan Maurya
 
Studentmanagementsystem
StudentmanagementsystemStudentmanagementsystem
Studentmanagementsystem1amitgupta
 
Online old books sales by hemraj gahlot
Online old books sales by hemraj gahlotOnline old books sales by hemraj gahlot
Online old books sales by hemraj gahlotHemraj Gahlot
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoopAnoop Kumar
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationRapid Purple
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 ReplicationAli Usman
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injectionashish20012
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for PentestingMike Felch
 
Event managementsystem
Event managementsystemEvent managementsystem
Event managementsystemPraveen Jha
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWARutvik patel
 

La actualidad más candente (20)

Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket booking
 
E-Auction
E-AuctionE-Auction
E-Auction
 
Online Exam
Online ExamOnline Exam
Online Exam
 
Online Vegetable Selling project Presentation
Online Vegetable Selling project PresentationOnline Vegetable Selling project Presentation
Online Vegetable Selling project Presentation
 
Smart traffic managment system real time (stmsrt)
Smart traffic managment system real time (stmsrt)Smart traffic managment system real time (stmsrt)
Smart traffic managment system real time (stmsrt)
 
Vehicle license registration system
Vehicle license registration systemVehicle license registration system
Vehicle license registration system
 
Online Voting System ppt
Online Voting System pptOnline Voting System ppt
Online Voting System ppt
 
Dns presentation
Dns presentationDns presentation
Dns presentation
 
Online Quiz System Project Report ppt
Online Quiz System Project Report pptOnline Quiz System Project Report ppt
Online Quiz System Project Report ppt
 
Process state in OS
Process state in OSProcess state in OS
Process state in OS
 
Studentmanagementsystem
StudentmanagementsystemStudentmanagementsystem
Studentmanagementsystem
 
Online old books sales by hemraj gahlot
Online old books sales by hemraj gahlotOnline old books sales by hemraj gahlot
Online old books sales by hemraj gahlot
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 Replication
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injection
 
Collections in Java Notes
Collections in Java NotesCollections in Java Notes
Collections in Java Notes
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for Pentesting
 
Event managementsystem
Event managementsystemEvent managementsystem
Event managementsystem
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWA
 

Similar a Quiz test JDBC

Prueba de conociemientos Fullsctack NET v2.docx
Prueba de conociemientos  Fullsctack NET v2.docxPrueba de conociemientos  Fullsctack NET v2.docx
Prueba de conociemientos Fullsctack NET v2.docxjairatuesta
 
Which of the following is not one of the rules cited in class for making e ma...
Which of the following is not one of the rules cited in class for making e ma...Which of the following is not one of the rules cited in class for making e ma...
Which of the following is not one of the rules cited in class for making e ma...josbuttlewr116
 
one of the rules cited in class for making e-mail more effective Experience T...
one of the rules cited in class for making e-mail more effective Experience T...one of the rules cited in class for making e-mail more effective Experience T...
one of the rules cited in class for making e-mail more effective Experience T...pinck3125
 
Comp 328 final guide
Comp 328 final guideComp 328 final guide
Comp 328 final guidekrtioplal
 
Q1. In a communication diagram, a(n) sequence number indicates the.docx
Q1. In a communication diagram, a(n) sequence number indicates the.docxQ1. In a communication diagram, a(n) sequence number indicates the.docx
Q1. In a communication diagram, a(n) sequence number indicates the.docxmakdul
 
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxConsider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxmaxinesmith73660
 
Advanced programming topics asma
Advanced programming topics asmaAdvanced programming topics asma
Advanced programming topics asmaAbdullahJana
 
Spring Certification Questions
Spring Certification QuestionsSpring Certification Questions
Spring Certification QuestionsSpringMockExams
 
Database access and JDBC
Database access and JDBCDatabase access and JDBC
Database access and JDBCFulvio Corno
 
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2Knowledge Center Computer
 
Partially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final ReportPartially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final ReportSaurebh Raut
 
Partially connected 3D NoC - Access Noxim.
Partially connected 3D NoC - Access Noxim. Partially connected 3D NoC - Access Noxim.
Partially connected 3D NoC - Access Noxim. Abhishek Madav
 

Similar a Quiz test JDBC (20)

Prueba de conociemientos Fullsctack NET v2.docx
Prueba de conociemientos  Fullsctack NET v2.docxPrueba de conociemientos  Fullsctack NET v2.docx
Prueba de conociemientos Fullsctack NET v2.docx
 
Which of the following is not one of the rules cited in class for making e ma...
Which of the following is not one of the rules cited in class for making e ma...Which of the following is not one of the rules cited in class for making e ma...
Which of the following is not one of the rules cited in class for making e ma...
 
one of the rules cited in class for making e-mail more effective Experience T...
one of the rules cited in class for making e-mail more effective Experience T...one of the rules cited in class for making e-mail more effective Experience T...
one of the rules cited in class for making e-mail more effective Experience T...
 
CORE JAVA
CORE JAVACORE JAVA
CORE JAVA
 
Obj_CMS-III.pdf
Obj_CMS-III.pdfObj_CMS-III.pdf
Obj_CMS-III.pdf
 
Comp 328 final guide
Comp 328 final guideComp 328 final guide
Comp 328 final guide
 
Vb.net
Vb.netVb.net
Vb.net
 
Q1. In a communication diagram, a(n) sequence number indicates the.docx
Q1. In a communication diagram, a(n) sequence number indicates the.docxQ1. In a communication diagram, a(n) sequence number indicates the.docx
Q1. In a communication diagram, a(n) sequence number indicates the.docx
 
CORE JAVA
CORE JAVACORE JAVA
CORE JAVA
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
 
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docxConsider this code using the ArrayBag of Section 5.2 and the Locat.docx
Consider this code using the ArrayBag of Section 5.2 and the Locat.docx
 
Javascript MCQ
Javascript MCQJavascript MCQ
Javascript MCQ
 
Istqb Sample Questions
Istqb Sample QuestionsIstqb Sample Questions
Istqb Sample Questions
 
Advanced programming topics asma
Advanced programming topics asmaAdvanced programming topics asma
Advanced programming topics asma
 
Spring Certification Questions
Spring Certification QuestionsSpring Certification Questions
Spring Certification Questions
 
Database access and JDBC
Database access and JDBCDatabase access and JDBC
Database access and JDBC
 
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
UGC-NET, GATE and all IT Companies Interview C++ Solved Questions PART - 2
 
Javascript Question
Javascript QuestionJavascript Question
Javascript Question
 
Partially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final ReportPartially Connected 3D NoC - Final Report
Partially Connected 3D NoC - Final Report
 
Partially connected 3D NoC - Access Noxim.
Partially connected 3D NoC - Access Noxim. Partially connected 3D NoC - Access Noxim.
Partially connected 3D NoC - Access Noxim.
 

Más de vacbalolenvadi90 (7)

Java day9n
Java day9nJava day9n
Java day9n
 
Ass2 1 (2)
Ass2 1 (2)Ass2 1 (2)
Ass2 1 (2)
 
Bai day1
Bai day1Bai day1
Bai day1
 
Final
FinalFinal
Final
 
sqlKey
sqlKeysqlKey
sqlKey
 
Abcxyz
AbcxyzAbcxyz
Abcxyz
 
SQL DdaHKH Huế
SQL DdaHKH HuếSQL DdaHKH Huế
SQL DdaHKH Huế
 

Último

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimizationarrow10202532yuvraj
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"DianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 

Último (20)

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 

Quiz test JDBC

  • 1. Q.1) Driver types are used to categorize the technology used to connect to the database. A. True * B. False Q.2) This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC* Q.3) JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers. A. True* B. False Q.4) In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model* B. Three - tier Data processing Model Q.5) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. * B. Translates JDBC calls into database=specific calls or native calls C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. Q.6) This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set. A. executeUpdate(); B. executeQuery();* C. execute(); Q.7) This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate();* B. execute(); C. executeQuery();
  • 2. Q.8) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString();* Q.9) This method is used for retrieving the value from current row as object. A. getRow(); B. getObject();* C. getString(); Q.10) A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False* Q.11) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN* B. OUT C. IN/OUT Q.12) OUT Parameter. - 3 choices. A. pass out of procedure module. * B. is a constant C. is a variable* D. back to the calling block* Q.13) This Parameter behaves like an initialized variable. A. OUT B. IN C. IN/OUT* Q.14) This object does not contain the stored procedure itself but contains only a call to the stored procedure.
  • 3. A. CallableStatment* B. PreparedStatment C. prepareCall(); Q.15) It reefers to the ability to move backward as well as forward through a result set. A. Scrollable* B. Updatable C. Holdable Q.16) This refers to the ability to check whether the cursor stays open after a COMMIT. A. Updatable B. Holdable* C. Scrollable Q.17) The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object* B. Callalbalestatment Object C. PrepareCall () method. Q.18) The CallableStatment object contains the SQL statments. A. True* B. False Q.19) A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY* Q.20) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. A. True* B. False Q.21) A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. True*
  • 4. B. False Q.22) Which class is a disconnected rowset. A. A CachedRowSet class. * B. A JDBCRowSet class. C. A WebRowSet class. Q.23) This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. * Q.24) Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver* C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. Q.25) The Result Set can not be modified and hence, It is not updatable in any way. A. CONCURENT_READ_ONLY* B. CONCURENT_UPDATABLE Q.26) This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information. A. Cryptography* B. Encryption Q.27) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True* B. False Q.28) This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography* C. Public Key cryptography
  • 5. Q.29) This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography* B. Hash Function C. Secret key cryptography Q.30) This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography C. Hash Function* Q.31) Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. * B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way. * C. Authentication is the process that provides tamper-proofing, while it is on the network. Q.32) The class is use to hash value of the specified data. A. Message Digest* B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory Q.33) The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator* D. KeyFactory E. Certificate Factory Q.34) The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature*
  • 6. C. Certificate Factory D. KeyFactory E. KeyPair Generator Q.35) The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory* E. Certificate Factory Q.36) The class is used to generate public key certificates. A. Certificate Factory* B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory Q.37) This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore* C. Key D. KeySpec Q.38) Cryptography is essential for making a application safe and secure, including: - 3 choices A. Tampering* B. Non-repudiation* C. Integrity & confidentiality* D. Spoofing E. Authentication*
  • 7. Q.39) this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation* B. Tampering C. Integrity D. confidentiality Q.40) Data integrity is to protect data from getting tampered,while it is on the network. A. True* B. False Q.41) This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA* B. JCE Q.42) With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5* C. CBC Q.43) Single-bit ciphers are called: A. Block cipher* B. Stream cipher Q.44) Cipher objects are created using this method of the cipher class. A. getInstance();* B. init(); Q.45) the cipher object is initialized by the init() method? A. True* B. False Q.46) The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding" B. "algorithm/mode/padding"*
  • 8. C. "algorithm/padding/mode" D. "DeCrypto/Cipher/padding" Q.47) "(Only)algorithm" such as A. "DES"* B. "PKCS5" C. "CBE" Q.48) Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption* Q.49) Single bits or a block of bits can be encrypted into cipher blocks A. True* B. False Q.50) The product components of JDBC are: A. JDBC-ODBC Bridge. B. Net-Protocol/all-Java driver C. JDBC Driver Manager* D. JDBC Test Suite & JDBC API* E. ODBC Q.51) In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC* Q.52) The 'Native API-Java/Party Java' is Driver Type A. I B. II* C. III D. IV
  • 9. Q.53) The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV* Q.54) Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True* B. False Q.55) This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet* D. ExecuteQuery() Q.56) This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate();* Q.57) If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method* B. absolute(int row) method. Q.58) Calling absolute(1) is equivalent to calling last() A. True B. False* Q.59) Which statements are true? - 3 choices A. In Scrollable ResultSet, the cursor is positioned on the first row.
  • 10. B. A default ResultSet object is not updated and has a cursor that moves forward only. * C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. * E. The createStatement method has two argurments namely resultSetType and *resultSetConcurrency .61) This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File* C. Access Controler ====================================================================== 1. JDBC and ODBC are identical? A. True B. False* 2. How many kinds of JDBC drivers? A. 10 B. 3 C. 4* D many 3. The JDBC API is a Java API for accessing virtually any kind of tabular data A. False B. True* 4. What is the correct statement about CallableStatement interface? (choose 1) A. It defines a statement to create a stored-procedure B. It contains a call to a stored-procedure* C. It defines a store-procedure 5. Which is the default port number of RMI Registry Server? A. 1023
  • 11. B. 1099* C. 1069 6. Which of the following statements is correct for retrieving all fields from Student table? A. String sql=”SELECT * FROM Student”; Statement st=cn.createStatement(sql); ResultSet rs=st.executeQuery(); B. String sql=”SELECT * FROM Student”; * Statement st=cn.createStatement(); ResultSet rs=st.executeQuery(sql); 7. If you need to use a stored procedure with output parameters, which of the following statement type should be used to call the procedure? A. PreparedStatement B. CallableStatement* C. Statement 8. From which object do you ask for DatabaseMetaData? A. DriverManager B. ResultSet C. Connection* D. Driver 9. Which character is used to represent an input parameter in a CallableStatement? A. * B. # C. ? * D. % 10. Which one of the following will not get the data from the first column of ResultSet rs, returned from executing SQL statement: SELECT name, rank, serialNo FROM employee. A. rs.getString(“name”);
  • 12. B. rs.getString(1); C. rs.getString(0); * 11. Which class contains the transaction control method setAutoCommit, commit, and rollback? A. Statement B. Connection* C. ResultSet 12. You can use an applet in RMI program as ________ A. None of the other options B. Server program C. Client program* 13. Which of the following will not cause a JDBC driver to be loaded and registered with the DriverManager? A. Class.forName(driverString); B. new DriverClass(); C. Include driver name in jdbc.drivers system property D. None of the above* 14. SQLWarnings from multiple Statement method calls (like executeUpdate) will build up until you ask for them all with getWarnings and getNextWarning. A. True B. False* 15. If one intends to work with a ResultSet, which of these PreparedStatement methods will not work? A. execute() B. executeQuery() C. executeUpdate()* 16. Can a ResultSet be reliably returned from a method that creates a Statement and executes a query?
  • 13. A. Yes B. No* 17. How can I use JDBC to create a database? A. Include create=true at end of JDBC URL B. Execute "CREATE DATABASE jGuru" SQL statement* C. Execute "STRSQL" and "CREATE COLLECTION jGuru" SQL statements D. Database creation is DBMS specific 18. Which of the following can you do with a JDBC 2.0 database driver that you cannot with a JDBC 1.x driver? A. Batch multiple statements, to be sent to the database together B. Scroll through result sets bi-directionally C. Work with SQL3 data types directly D. All of the above* 19. A __________ result set has a cursor that moves both forward and backward and can be moved to a particular row A. scrollable* B. nonscrollable C. Unscrollable 20. The method___________ is designed for statements that produce a single result set, such as SELECT statement A. executeUpdate B. execute C. Update D. executeQuery* 21. Which three of the following are classes of Java.rmi package? A. Naming* B. MarshalledObject* C. RMISecurityManager* D. Remote 22. Which option of jar file indicates manifest file not created? A. Jar M B. Jar t
  • 14. c. Jar m D. Jar c 23. _______ option of Jar command makes a Java archive file. A. JAR -c B. JAR -m C. JAR -v D. JAR –f 24. Which command adds the file file.class to Xyz.jar? A. jar – uf Xyz . jar file.class B. jar – xf Xyz . jar C. jar – tf Xyz . jar 25. Driver types are used to categorize the technology used to connect to the database. A. True* B. False 26. This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC* 27. JDBC is ODBC translated into an object-oriented interface that is natural for java programmers. A. True* B. False 28. In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model* B. Three - tier Data processing Model 29. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. * B. Translates JDBC calls into database=specific calls or native calls
  • 15. C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. 30. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate();* B. execute(); C. executeQuery(); 31. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString();* 32. This method is used for retrieving the value from current row as object. A. getRow(); B. getObject();* C. getString(); 33. This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A Connected RowSet. B. A Disconnected RowSet. * 34. A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False* 35. This parameter is used to pass values into a store procedure.The value of this parameter cannot changed or reassigned within the module and hence is constant.
  • 16. A. IN* B. OUT C. IN/OUT 36. OUT Parameter. - 3 choices. A. pass out of procedure module* B. is a constant C. is a variable* D. back to the calling block* 37. This Parameter behaves like an initialized variable. A. OUT B. IN C. IN/OUT* 38. This object does not contain the stored procedure itself but contains only a call to the stored procedure. A. CallableStatment* B. PreparedStatment C. prepareCall(); 39. This refers to the ability to check whether the cursor stays open after a COMMIT A. Updatable B. Holdable* C. Scrollable 40. The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object* B. Callalbalestatment Object C. PrepareCall () method.
  • 17. 41. The CallableStatment object contains the SQL statments. A. True* B. False 42. A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY* 43. A Rowset Object provides scrollability and updatability for any kind of DBMS or drivers. A. True* B. False 44. A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. true B. false* 45. Which class is a disconnected rowset. A. A CachedRowSet class. * B. A JDBCRowSet class. C. A WebRowSet class. 46. Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver* C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. 47. The Result Set can not be modified and hence, It is not updatable in any way.
  • 18. A. CONCURENT_READ_ONLY* B. CONCURENT_UPDATABLE 48. This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information. A. Cryptography* B. Encryption 49. The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True* B. False 50. This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography* C. Public Key cryptography 51. This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography* B. Hash Function C. Secret key cryptography 52. This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography C. Hash Function* 53. Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. *
  • 19. B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way* C. Authentication is the process that provides tamper-proofing, while it is on the network. 54. The class is use to hash value of the specified data. A. Message Digest* B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory 55. The 'Native API-Java/Party Java' is Driver Type A. I B. II* C. III D. IV 56. The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV* 57. Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True* B. False 58. This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate();*
  • 20. 59. If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method* B. absolute(int row) method. 60. Calling absolute(1) is equivalent to calling last() A. True B. False* 61. Which statements are true? (3 choices) A. In Scrollable ResultSet, the cursor is positioned on the first row. B. A default ResultSet object is not updated and has a cursor that moves forward only. * C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. * E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency* 62. Which statements are true? (3 choices) A. The original message text has to be transmitted separately since the content of a digitally signed message is altered irreversibly. B. A Certification authority creates a signed certificate by encrypting the digitally signature with its private key. * C. The digital signature and sender's public key are appended to end of a message. * D. A recipient decrypts a signed signature using its own public key. E. The integrity of a message cannot be ensure while using message digests* 63. This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File* C. Access Controller 64. The class is use to produce a pair of public and private keys appropriate for a specified.
  • 21. A. Signature B. Message Digest C. KeyPair Generator* D. KeyFactory E. Certificate Factory 65. The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature* C. Certificate Factory D. KeyFactory E. KeyPair Generator 66. The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory* E. Certificate Factory 67. The class is used to generate public key certificates. A. Certificate Factory* B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory 68. This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore* C. Key
  • 22. D. KeySpec 69. this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation* B. Tampering C. Integrity D. Confidentiality 70. Data integrity is to protect data from getting tampered, while it is on the network. A. True* B. False 71. This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA* B. JCE 72. With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5* C. CBC 73. Single-bit ciphers are called: A. Block cipher B. Stream cipher* 74. Cipher objects are created using this method of the cipher class. A. getInstance();* B. init(); 75. the cipher object is initialized by the init() method?
  • 23. A. True* B. False 76. The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding" B. "algorithm/mode/padding"* C. "algorithm/padding/mode" D. "DeCrypto/Cipher/padding" 77. "(Only)algorithm" such as A. "DES"* B. "PKCS5" C. "CBE" 78. Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption* 79. Single bits or a block of bits can be encrypted into cipher blocks A. True* B. False 80. In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC* ====================================================================== 1.which of the following are JDBC drivers?(chon 4)(1.5d) A, JDBC –ODBC bridge* B native API party – java driver* C, Net –protoco all – java*
  • 24. D, JDBC – network driver E, Native protocol all – java driver* 2. The naming clss extend the -----class A serializable B Object* C System D Remote 3. -the------Class of java RMI provides stati methods for accep A MarshalledObject B Naming C RMI Security Manager D log Stream E Remote Server 4 . the -----use local native libraries to commulicate with the database A JDBC – ODBC Bridge* B native – API – Party- java driver C ODBC net all java driver D Native Protoco – all – java driver 5 . which interface of the JDBC API contains method used to execute SQL stored procedures (1d) A statement B resultset C CallableStatement* 6 .. . which interface of the JDBC API execute pre – compied SQL statement(1d) A preparedStatement* B statement C Resultset 7 which of the following three interfaces the JDBC API provides for sending SQL statements to the database? (2d) A Statement* B PreparedStatement* C callablestatement* D Connection
  • 25. E Getconnection the ----- class is the traditional managerment layer of JDBC working between the …. The driver 8 a Driver manager b Connection c Resultset 9 The java software provides three JDBC product components they are (2d) A The JDBC DriverManager facility * B The JDBC driver test suite* C The JDBC – ODBC bridge* D The callable stament 10 . A ------obiect is used to send SQL statement to a database A Connection * B Statement C Drive 11 . Which interface of the JDBC API provides mothod to setive data that an SQL statement returns? A ResultSet * B Statement C Driver D Connection 12 Which two of the following are valid JDBC driver(choose 2) a JDBC –ODBC bridge plus ODBC driver b native – API partly –Java drivr c d ODBC Driver Native java driver 13 Which kind of driver converts ODBC calls drectly into the network protocol A JDBC _ODBC bridge plus ODBC driver* B Native API partly java driver C Native protocol pure java driver 14. Depending upon scrollabity how many types of result sets are av…..
  • 26. A One B Four C three D Two 15. Which of the following classes contain the Execute() method? A ResultSet B RescordSet C Statement* D Connection 16. the -----method is used to retreve the name of A getColumName()* B GetColumCaption() C GetColumLabel() D None of the others 17 The statement interface provides three different methods for executing SQL statement, they are (2d) A ExecuteQuery * B ExecuteUpdate * C Execute* D ExecuteDelete E ExecuteInsert 18 Once the Drver classes have been loaded and registered with the driver avaitable for eatablahing a connection with a database is the statement correct? A true B False* ================================================= 1. A cipher disables encryption and decryption operations. False 2. JDBC is an acronym of ?Java Database Connectivity.? False 3. Wich of the following are the advantages of JDBC? 1.Continued usage of existing data 2.Vendor dependent 3.Platform independent 4.Ease of use
  • 27. 4. Native Protocol-All Java is ________ JDBC driver. Type IV 4. The next() method allows to traverse forward by moving the cursor ___ forward. One row 5. The executeUpdate() method is used to execute which of the following objects? PreparedStatement and CallableStatement 6. Which of the following are the characteristics of the Stored procedures? All of the above 7. Which of the following are the benefits of using stored procedure? 1,2,3,4 8. The drawback of using a stored procedure is lack of portability. False 9. Which of the following is the characteristics of ResultSet? Scrollable 10. Which of the following parameters are used in stored procedure? 1,2,3,4 11. Which of the following are the static constant values that can be specified for the result set type? TYPE_FORWARD_ONLY, TYPE_SCROLL_SENSITIVE, TYPE_SCROLL_INSENSITIVE 12. Once the updaterow() method is called, changes to the database are final and cannot be undone. True 13. The UpdateXXX() method of ResultSet is used to change the data in an existing row False 14. ____ is the parent interface implemented by all connected RowSet objects. CacheRowSet 15. Which of the following contains path of the class and permission details required to access a resource? Policy file 16. Which of the following classes is used to grant access to network resources? SocketPermission 17. Encryption converts original data into an encrypted form by appluing ___ transformations. a. Cipher Q.1) This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. JDBC A. ODBC B. Q.2) The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver. A. Translates JDBC calls into ODBC calls. B. Translates JDBC calls into database=specific calls or native calls Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods C. on the server. D. Directly calls RDBMS from client machine. Q.3) This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object.
  • 28. A. getVarchar(); B. getObject(); C. getString(); Q.4) This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN B. OUT C. IN/OUT Q.5) This object does not contain the stored procedure itself but contains only a call to the stored procedure. CallableStatment A. PreparedStatment B. prepareCall(); C. Q.6) The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object B. Callalbalestatment Object C. PrepareCall () method. Q.7) A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. True A. False B. Q.8) This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. Q.9) In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC Q.10) The 'Native API-Java/Party Java' is Driver Type I A. II B. III C. IV D. Q.11) This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet D. ExecuteQuery()
  • 29. Q.12) Calling absolute(1) is equivalent to calling last() True A. False B. CRYPTO Q.13) The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True B. False Q.14) This is algorithms that does not use any key, it is known as message digest. Secret key cryptography A. Public Key cryptography B. Hash Function C. Q.15) The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator D. KeyFactory E. Certificate Factory Q.16) The class is used to generate public key certificates. Certificate Factory A. KeyPair Generator B. Message Digest C. Signature D. KeyFactory E. Q.17) this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation B. Tampering C. Integrity D. confidentiality Q.18) With this padding technique a short block is padded with a repeating byte. DES A. PKCS5 B. CBC C.
  • 30. Q.19) the cipher object is initialized by the init() method? A. True B. False Q.20) Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. Encryption and Decryption A. Key Agreement B. Password Base Encryption C. Q.21) This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File C. Access Controler Q.22 Code ) using using using using System; System.Collections.Generic; System.Linq; System.Text; namespace Abstract_Animal { abstract class Animal { public void run() { Console.writeLine("Run by 4 feet"); } public void Eat(); } class Bird:Animal{ public void Eat(){ Console.writeLine("All of dove eat rice"); } static void Main(String[] args){ Bird dove = new Bird(); dove.Eat(); } } } A. Compiler Error. B. Print: "All of dove eat rice" C. print: "Run by 4 feet" Q.23) Abstact method ,which contains at least one statement, is declared in abstract class. True A. False B.
  • 31. Q.24) Eat(); Run(); A. An Abstract class B. An Interface Q.25) Interface can not contain constants, data fields, contructors, Deconstructors and static members A. True B. False 1. Driver types are used to categorize the technology used to connect to the database. A. True B. False 2. This is an Application Programming Interface provided by Microsoft for access the database.It uses SQL as its database language. A. JDBC B. ODBC 3. JDBC is ODBC translated into an object-oriented interface that is natural for java programmiers. A. True B. False 4. In this Data processing Model,the client communicates directly to the database server without the help of any middle-ware technologies or another server. A. Two-tier Data processing Model B. Three - tier Data processing Model 5. The Type 1 driver is also known as JDBC-ODBC bridge plus ODBC driver.
  • 32. A. Translates JDBC calls into ODBC calls. B. Translates JDBC calls into database=specific calls or native calls C. Maps JDBC calls to the underlying "network" protocol, which in turn calls native methods on the server. D. Directly calls RDBMS from client machine. 6. This method is use to execute any SQL statement with a "SELECT" clause, that return the result of the query as a result set. A. executeUpdate(); B. executeQuery(); C. execute(); 7. This method is used to execute INSERT, DELETE, UPDATE , and other SQL DDL such as CREATE, DROP Table. A. executeUpdate(); B. execute(); C. executeQuery(); 8. This method is used for retrieving a string value (SQL type VARCHAR) and assigning into java String object. A. getVarchar(); B. getObject(); C. getString(); 9. This method is used for retrieving the value from current row as object.
  • 33. A. getRow(); B. getObject(); C. getString(); 10. A client application uses stored procedures increases the network traffic, but it reduces the number of times a database is accessed. A. True B. False 11. This parameter is used to pass values into a store procedure.The value pf this parameter cannot changed or reassigned within the module and hence is constant. A. IN B. OUT C. IN/OUT 12. OUT Parameter. - 3 choices. A. pass out of procedure module. B. is a constant C. is a variable D. back to the calling block 13. This Parameter behaves like an initialized variable. A. OUT B. IN
  • 34. C. IN/OUT 14. This object does not contain the stored procedure itself but contains only a call to the stored procedure. A. CallableStatment B. PreparedStatment C. prepareCall(); 15. It reefers to the ability to move backward as well as forward through a result set. A. Scrollable B. Updatable C. Holdable 16. This refers to the ability to check whether the cursor stays open after a COMMIT. A. Updatable B. Holdable C. Scrollable 17. The prepareStatment() method sends SQL query to the database. and this returns: A. PrepareStatment Object B. Callalbalestatment Object C. PrepareCall () method.
  • 35. 18. The CallableStatment object contains the SQL statments. A. True B. False 19. A cursor that can only be used to process from the beginning of a ResultSet to the end of it.It is default type. A. TYPE_SCROLL_SENSITIVE B. TYPE_SCROLL_INSENSITIVE C. TYPE_FORWARD_ONLY 20. A Rowset Object provides scrollability and updatabilitu for any kind of DBMS or drivers. A. True B. False 21. A ResultSet object contains a set of rows from a result set or some other source of tabular data, like a file or spreadsheet. A. True B. False 22. Which class is a disconnected rowset.
  • 36. A. A CachedRowSet class. B. A JDBCRowSet class. C. A WebRowSet class. 23. This object connects to a data source only to read data from a ResultSet or write data back to the data source. A. A connected RowSet. B. A Disconnected RowSet. 24. Which statments are true? A. A RowSet has to be make scrollable and updatable at the time of creation. B. Scrollability and Updatability of a RowSet is independent of the JDBC driver C. A connect RowSet can read data from a non relational database source also. D. A RowSet is a JavaBeans component which has to programmatically notify all registered event listener. 25. The Result Set can not be modified and hence, It is not updatable in any way. A. CONCURENT_READ_ONLY B. CONCURENT_UPDATABLE 26. This is the mechanism of encoding information in a secret coded form, intented only for the recipient to access the information.
  • 37. A. Cryptography B. Encryption 27. The term "encrypting " pertains to converting plaintext to ciphertext, which is again decrypted into usable plaintext. A. True B. False 28. This transforms the input, called the plaintext, to an output, known as ciphertext. this is known as Symmetric cryptography. A. Hash Function B. Secret key cryptography C. Public Key cryptography 29. This is as asymmetric cryptography, It operates under two different keys. A. Public Key cryptography B. Hash Function C. Secret key cryptography 30. This is algorithms that does not use any key, it is known as message digest. A. Secret key cryptography B. Public Key cryptography
  • 38. C. 31. Hash Function Which statements are true? A. The Tamper-proofing process verifies whether the data received by the receiver is the same data as sent by the sender. B. Spoofing or identity interception, which means impersonating the identity of a different user and use it in an unauthorized way. C. 32. Authentication is the process that provides tamper-proofing, while it is on the network. The class is use to hash value of the specified data. A. Message Digest B. Signature C. KeyPair Generator D. KeyFactory E. Certificate Factory 33. The class is use to produce a pair of public and private keys appropriate for a specified. A. Signature B. Message Digest C. KeyPair Generator D. KeyFactory E. Certificate Factory
  • 39. 34. The class is used to sign and check the authenticity of digital signature A. Message Digest B. Signature C. Certificate Factory D. KeyFactory E. KeyPair Generator 35. The class is used to transform opaque keys of type Key into key specifications and provide transparent representations of the underlying key material and vice versa. A. Message Digest B. KeyPair Generator C. Signature D. KeyFactory E. Certificate Factory 36. The class is used to generate public key certificates. A. Certificate Factory B. KeyPair Generator C. Message Digest D. Signature E. KeyFactory
  • 40. 37. This class is a database of keys and certificates A. Algorithm Parameters B. KeyStore C. Key D. KeySpec 38. Cryptography is essential for making a application safe and secure, including: - 4 choices A. Tampering B. Non-repudiation C. Integrity & confidentiality D. Spoofing E. Authentication 39. this ensures that a user or a business organization or a program entity has performed a transaction. A. Non-repudiation B. Tampering C. Integrity D. confidentiality 40. Data integrity is to protect data from getting tampered,while it is on the network.
  • 41. A. True B. False 41. This is a framework written in java to access and develop cryptographic functionality, and forms part of the java security API. A. JCA B. JCE 42. With this padding technique a short block is padded with a repeating byte. A. DES B. PKCS5 C. CBC 43. Single-bit ciphers are called: A. Block cipher B. Stream cipher 44. Cipher objects are created using this method of the cipher class. A. getInstance(); B. init();
  • 42. 45. the cipher object is initialized by the init() method? A. True B. False 46. The Code : "DES/CBC/PKCS5Padding" is the form of A. "mode/algorithm/padding" B. "algorithm/mode/padding" C. "algorithm/padding/mode" D. "DeCrypto/Cipher/padding" 47. "(Only)algorithm" such as A. "DES" B. "PKCS5" C. "CBE" 48. Most these implementations mix a random number, known as the "salt" with the password text to derive an encrypted key. A. Encryption and Decryption B. Key Agreement C. Password Base Encryption
  • 43. 49. Single bits or a block of bits can be encrypted into cipher blocks A. True(correct answer) B. False(your answer) 50. The product components of JDBC are: A. JDBC-ODBC Bridge. B. Net-Protocol/all-Java driver C. JDBC Driver Manager D. JDBC Test Suite & JDBC API E. ODBC 51. In this Environment, the java application is the client and DBMS is the database server. A. Three-Tier JDBC B. Two-Tier JDBC 52. The 'Native API-Java/Party Java' is Driver Type A. I B. II C. III D. IV
  • 44. 53. The 'Native Protocol - All Java' is Driver Type A. I B. II C. III D. IV 54. Statement and PreparedStatement is inherited from Statement Interface. The CallableStatement is inherited from PreparedStatement interface. A. True B. False 55. This Objects are used to receive and store the data in the same form as it is returned from the SQL queries. A. PreparedStatement B. CallableStatement C. ResultSet D. ExecuteQuery() 56. This Method return an Integer value indicating the row count. A. ExecuteQuery(); B. Execute(); C. ExecuteUpdate();
  • 45. 57. If row value is 0, this method has no effect.If row value is positive, the cursor is moved forward that many row. A. relative(int row) method B. absolute(int row) method. 58 Calling absolute(1) is equivalent to calling last() A. True B. False 59. Which statements are true? - 3 choices A. In Scrollable ResultSet, the cursor is positioned on the first row. B. A default ResultSet object is not updated and has a cursor that moves forward only. C. The ResultSet should be compulsorily closed after a COMMIT statement. D. Holdable refers to ability to check whether the cursor stays open after a COMMIT. E. The createStatement method has two argurments namely resultSetType and resultSetConcurrency 60. Which statements are true? -3 choices A. The original message text has to be transmitted separately separately since the content of a digitally signed message is altered irreversibly. B. A Certification authority creates a signed certificate by encrypting the digitally signature with its private key.
  • 46. C. The digital signature and sender's public key are appended to end of a message. D. A recipient decrypts a signed signature using its own public key. E. The integrity of a message cannot be ensure while using message digests. 61. This comprises the mapping of one or more permissions with a class. A. Security Manager B. Policy File C. Access Controler 62. An abstract class can be sealed A. True B. False 63. using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Abstract_class { abstract class Animal { publicvoid run() {
  • 47. Console.WriteLine("Run by 4 feet"); } public void Eat(); } classbird:Animal { // implement method Eat of abstract class Animal. publicoverride void Eat(){ Console.WriteLine("All of dove eat rice"); } static voidMain(string[] args) { bird dove = new bird(); dove.Eat(); } } } A. Compiler Error. B. Print: "All of dove eat rice" C. print: "Run by 4 feet"
  • 48. 64. Abstact method ,which contains at least one statement, is declared in abstract class. A. True B. False 65. Eat(); Run(); Sound(); A. An Abstract class B. An Interface 66. Interface can not contain constants, data fields, contructors, Deconstructors and static members A. True B. False