MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1001. |
                     is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory. |
| A. | flash memory |
| B. | disk |
| C. | main memory |
| D. | secondary memory |
| Answer» B. disk | |
| 1002. |
The flash memory storage used are |
| A. | nor flash |
| B. | or flash |
| C. | and flash |
| D. | all of the mentioned |
| Answer» B. or flash | |
| 1003. |
Which of the following requires no password travel across the internet? |
| A. | readable system |
| B. | manipulation system |
| C. | challenge–response system |
| D. | response system |
| Answer» D. response system | |
| 1004. |
The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware. |
| A. | cache |
| B. | disk |
| C. | main memory |
| D. | flash memory |
| Answer» B. disk | |
| 1005. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it? |
| A. | round key algorithm |
| B. | public key algorithm |
| C. | advanced encryption standard |
| D. | asymmetric key algorithm |
| Answer» D. asymmetric key algorithm | |
| 1006. |
Which of the following stores several gigabytes of data but usually lost when power failure? |
| A. | flash memory |
| B. | disk |
| C. | main memory |
| D. | secondary memory |
| Answer» D. secondary memory | |
| 1007. |
Encryption of small values, such as identiï¬ers or names, is made complicated by the possibility of |
| A. | dictionary attacks |
| B. | database attacks |
| C. | minor attacks |
| D. | random attacks |
| Answer» B. database attacks | |
| 1008. |
In which of the following encryption key is used to encrypt and decrypt the data? |
| A. | public key |
| B. | private key |
| C. | symmetric key |
| D. | asymmetric key |
| Answer» D. asymmetric key | |
| 1009. |
Which of the following is not a property of good encryption technique? |
| A. | relatively simple for authorized users to encrypt and decrypt data |
| B. | decryption key is extremely difficult for an intruder to determine |
| C. | encryption depends on a parameter of the algorithm called the encryption key |
| D. | none of the mentioned |
| Answer» E. | |
| 1010. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without |
| A. | encryption key |
| B. | decryption key |
| C. | primary key |
| D. | authorised key |
| Answer» C. primary key | |
| 1011. |
                       is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
| A. | encryption |
| B. | data mining |
| C. | internet security |
| D. | architectural security |
| Answer» B. data mining | |
| 1012. |
VPD provides authorization at the level of speciï¬c tuples, or rows, of a relation, and is therefore said to be a                            mechanism. |
| A. | row-level authorization |
| B. | column-level authentication |
| C. | row-type authentication |
| D. | authorization security |
| Answer» B. column-level authentication | |
| 1013. |
                               allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. |
| A. | openid |
| B. | single-site system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» E. | |
| 1014. |
The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on. |
| A. | openid |
| B. | sign-on system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» D. virtual private database (vpd) | |
| 1015. |
A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. |
| A. | openid |
| B. | sign-on system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» C. security assertion markup language (saml) | |
| 1016. |
                   is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
| A. | two-factor authentication |
| B. | cross-site request forgery |
| C. | cross-site scripting |
| D. | cross-site scoring scripting |
| Answer» C. cross-site scripting | |
| 1017. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack. |
| A. | two-factor authentication |
| B. | cross-site request forgery |
| C. | cross-site scripting |
| D. | cross-site scoring scripting |
| Answer» D. cross-site scoring scripting | |
| 1018. |
In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
| A. | sql injection |
| B. | sql |
| C. | direct |
| D. | application |
| Answer» B. sql | |
| 1019. |
Each array declaration need not give, implicitly or explicitly, the information about |
| A. | the name of array |
| B. | the data type of array |
| C. | the ï¬rst data from the set to be stored |
| D. | the index set of the array |
| Answer» D. the index set of the array | |
| 1020. |
Linked lists are best suited |
| A. | for relatively permanent collections of data |
| B. | for the size of the structure and the data in the structure are constantly changing |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» C. all of the mentioned | |
| 1021. |
Arrays are best data structures |
| A. | for relatively permanent collections of data |
| B. | for the size of the structure and the data in the structure are constantly changing |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. for the size of the structure and the data in the structure are constantly changing | |
| 1022. |
Finding the location of the element with a given value is: |
| A. | traversal |
| B. | search |
| C. | sort |
| D. | none of the mentioned |
| Answer» C. sort | |
| 1023. |
The operation of processing each element in the list is known as |
| A. | sorting |
| B. | merging |
| C. | inserting |
| D. | traversal |
| Answer» E. | |
| 1024. |
Which of the following data structure is linear data structure? |
| A. | trees |
| B. | graphs |
| C. | arrays |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 1025. |
Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500? |
| A. | select job, sum(sal) from emp where sum(sal) > 2500 and comm is null; |
| B. | select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500; |
| C. | select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job; |
| D. | select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null; |
| Answer» C. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job; | |
| 1026. |
Which of the following data structure is not linear data structure? |
| A. | arrays |
| B. | linked lists |
| C. | arrays & linked lists |
| D. | none of the mentioned |
| Answer» E. | |
| 1027. |
Which of the following queries are legal? |
| A. | select deptno, count(deptno) from emp group by ename; |
| B. | select deptno, count(deptno), job from emp group by deptno; |
| C. | select deptno, avg(sal) from emp; |
| D. | select deptno, avg(sal) from emp group by deptno; |
| Answer» E. | |
| 1028. |
Which of the following rule below are categories of an index? |
| A. | column and functional |
| B. | multiple column and functional |
| C. | column, multiple column and functional |
| D. | none of the mentioned |
| Answer» B. multiple column and functional | |
| 1029. |
The ORDER BY clause can only be used in |
| A. | select queries |
| B. | insert queries |
| C. | group by queries |
| D. | having queries |
| Answer» B. insert queries | |
| 1030. |
How to force a log switch? |
| A. | by using alter system log |
| B. | by using alter system switch logfile |
| C. | by using alter system switch logs |
| D. | by using alter sys logfiles |
| Answer» C. by using alter system switch logs | |
| 1031. |
DML changes are |
| A. | insert |
| B. | update |
| C. | create |
| D. | both insert and update |
| Answer» E. | |
| 1032. |
Which schema object instructs Oracle to connect to a remotely access an object of a database? |
| A. | sequence |
| B. | remote link |
| C. | database link |
| D. | data link |
| Answer» E. | |
| 1033. |
Which of the following object types below cannot be replicated? |
| A. | data |
| B. | trigger |
| C. | view |
| D. | sequence |
| Answer» E. | |
| 1034. |
The                            layer, which provides a high-level view of data and actions on data. |
| A. | business logic |
| B. | presentation |
| C. | user interaction |
| D. | data access |
| Answer» B. presentation | |
| 1035. |
What are the portability concerns founded in Seeheim model? |
| A. | replacing the presentation toolkit |
| B. | replacing the application toolkit |
| C. | replacing the dialogue toolkit |
| D. | replacing the presentation & application toolkit |
| Answer» E. | |
| 1036. |
Which of the following is the main task accomplished by the user? |
| A. | compose a document |
| B. | create a spread sheet |
| C. | send mail |
| D. | all of the mentioned |
| Answer» E. | |
| 1037. |
Which among the following are the functions that any system with a user interface must provide? |
| A. | presentation |
| B. | dialogue |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. dialogue | |
| 1038. |
The                            system is widely used for mapping from Java objects to relations. |
| A. | hibernate |
| B. | object oriented |
| C. | objective |
| D. | none of the mentioned |
| Answer» B. object oriented | |
| 1039. |
The                              layer, which provides the interface between the business-logic layer and the underlying database. |
| A. | business logic |
| B. | presentation |
| C. | user interaction |
| D. | data access |
| Answer» E. | |
| 1040. |
Which of the unit operation is used in Model view controller? |
| A. | is a decomposition |
| B. | part whole decomposition |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» C. all of the mentioned | |
| 1041. |
Memory address refers to the successive memory words and the machine is called as |
| A. | word addressable |
| B. | byte addressable |
| C. | bit addressable |
| D. | terra byte addressable |
| Answer» B. byte addressable | |
| 1042. |
Which of the following is true for Seeheim model? |
| A. | presentation is abstracted from dialogue and application |
| B. | presentation and dialogue is abstracted from application |
| C. | presentation and application is abstracted from dialogue |
| D. | none of the mentioned |
| Answer» B. presentation and dialogue is abstracted from application | |
| 1043. |
Where is metadata stored in MySQL? |
| A. | in the mysql database metadata |
| B. | in the mysql database metasql |
| C. | in the mysql database mysql |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 1044. |
What is bytecode? |
| A. | machine-speciï¬c code |
| B. | java code |
| C. | machine-independent code |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 1045. |
A JSP is transformed into a(n): |
| A. | java applet |
| B. | java servlet |
| C. | either 1 or 2 above |
| D. | neither 1 nor 2 above |
| Answer» C. either 1 or 2 above | |
| 1046. |
What MySQL property is used to create a surrogate key in MySQL? |
| A. | unique |
| B. | sequence |
| C. | auto_increment |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 1047. |
Which JDBC driver Type(s) can be used in either applet or servlet code? |
| A. | both type 1 and type 2 |
| B. | both type 1 and type 3 |
| C. | both type 3 and type 4 |
| D. | type 4 only |
| Answer» D. type 4 only | |
| 1048. |
How many JDBC driver types does Sun deï¬ne? |
| A. | one |
| B. | two |
| C. | three |
| D. | four |
| Answer» E. | |
| 1049. |
The Java                      speciï¬cation deï¬nes an application programming interface for communication between the Web server and the application program. |
| A. | servlet |
| B. | server |
| C. | program |
| D. | randomize |
| Answer» B. server | |
| 1050. |
How many levels of headings are in html: |
| A. | 2 |
| B. | 7 |
| C. | 6 |
| D. | 4 |
| Answer» D. 4 | |