MCQOPTIONS
Saved Bookmarks
This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing. |
| A. | 1 |
| B. | |
| Answer» C. | |
| 2. |
Servlets are stored on the server rather than with an application on a client. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 3. |
Both ASP and ColdFusion allow for the coding of custom tags within an HTML document. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 4. |
A proxy server controls the passage of messages or files through to the organization's network. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 5. |
Routers are used to transmit message packets and forward them to the correct destination over the most efficient pathway available. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 6. |
Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 7. |
VBScript is similar to JavaScript. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 8. |
An intranet provides which of the following? |
| A. | Connectivity to all customers |
| B. | Connectivity to selected customers |
| C. | Connectivity to no customers |
| D. | Connectivity to all of the above |
| Answer» D. Connectivity to all of the above | |
| 9. |
Hypertext Transfer Protocol (HTTP) is secure. |
| A. | 1 |
| B. | |
| Answer» C. | |
| 10. |
XML is a rapidly developing scripting language that may, in conjunction with XHTML, replace HTML. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 11. |
Client-side extensions: |
| A. | add functionality to the server. |
| B. | add functionality to the browser. |
| C. | add functionality to the firewall. |
| D. | add functionality to the network. |
| Answer» C. add functionality to the firewall. | |
| 12. |
Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet? |
| A. | Both TCP and IP are needed. |
| B. | TCP is needed but IP is not needed. |
| C. | TCP is not needed but IP is needed. |
| D. | Neither TCP and IP are needed. |
| Answer» B. TCP is needed but IP is not needed. | |
| 13. |
XML is which of the following? |
| A. | A scripting language that states the rules for tagging elements. |
| B. | A programming language that states the rules for tagging elements. |
| C. | A programming language that allows the creation of customized tags. |
| D. | A scripting language that allows the creation of customized tags. |
| Answer» E. | |
| 14. |
The World Wide Web Consortium (W3C) is the chief standards body for HTTP and HTML. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 15. |
XSL is a language used to develop style sheets from XML documents. |
| A. | 1 |
| B. | |
| Answer» B. | |
| 16. |
Which of the following is true about ColdFusion Markup Language (CFML)? |
| A. | It is stored in .asp files. |
| B. | It is executed on the client. |
| C. | It does not use tags. |
| D. | It allows for coding of custom tags in an HTML file. |
| Answer» E. | |
| 17. |
Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching. |
| A. | 1 |
| B. | |
| C. | 1 |
| D. | |
| Answer» B. | |
| 18. |
Websites without a database attached to them have which of the following characteristics? |
| A. | The ability to generate data via SQL. |
| B. | The inability to use a browser to display Web pages. |
| C. | Static information using HTML or JavaScript. |
| D. | The need to use TCP/IP as the network protocol. |
| Answer» D. The need to use TCP/IP as the network protocol. | |
| 19. |
C++ is an object-oriented language and is simpler than Java. |
| A. | 1 |
| B. | |
| C. | 1 |
| D. | |
| Answer» C. 1 | |
| 20. |
Web servers should be configured in which of the following ways? |
| A. | unauthorized access is restricted. |
| B. | unauthorized access is unrestricted. |
| C. | unauthorized access is impossible. |
| D. | unauthorized access is possible. |
| Answer» B. unauthorized access is unrestricted. | |
| 21. |
A proxy server is used for which of the following? |
| A. | To provide security against unauthorized users |
| B. | To process client requests for Web pages |
| C. | To process client requests for database access |
| D. | To provide TCP/IP |
| Answer» B. To process client requests for Web pages | |
| 22. |
Common Gateway Interface (CGI) is which of the following? |
| A. | An interface that accepts and returns data that may be written in SQL. |
| B. | An interface that accepts and returns data that may be written in any language that produces an executable file. |
| C. | A small program that executes within another application and is stored on the server. |
| D. | A small program that executes within another application and is stored on the client. |
| Answer» C. A small program that executes within another application and is stored on the server. | |
| 23. |
Which of the following is true concerning Web services standards? |
| A. | Led by only one group. |
| B. | Helped by cooperation between companies. |
| C. | Not necessary at this time. |
| D. | Important so that the web can flourish. |
| Answer» E. | |
| 24. |
Most plug-ins download slowly because they are rather large files. |
| A. | 1 |
| B. | |
| C. | 1 |
| D. | |
| Answer» C. 1 | |
| 25. |
Features of XML include which of the following? |
| A. | The tags are used to describe the appearance of the content. |
| B. | Addresses the structuring and manipulation of the data involved. |
| C. | Governs the display of information in a Web browser. |
| D. | All of the above. |
| Answer» C. Governs the display of information in a Web browser. | |
| 26. |
Which of the following is true about Microsoft Active Server Pages (ASP)? |
| A. | It is stored in .cfm files. |
| B. | It is executed on the client. |
| C. | It does not use tags. |
| D. | It allows for coding of custom tags in an HTML file. |
| Answer» E. | |
| 27. |
What is Hypertext Transfer Protocol (HTTP)? |
| A. | The protocol to copy files between computers |
| B. | The transfer protocol to transfer Web pages to a browser |
| C. | The database access protocol for SQL statements |
| D. | The hardware/software protocol that limits access to company data |
| Answer» C. The database access protocol for SQL statements | |
| 28. |
A server-side extension is needed to do what? |
| A. | Allow a request from a client to access the database. |
| B. | Allow a request from a client to access a HTML-formatted page. |
| C. | Allow a request from a client to access Web pages. |
| D. | All of the above. |
| Answer» B. Allow a request from a client to access a HTML-formatted page. | |
| 29. |
An intrusion detection system does not perform which of the following? |
| A. | Tries to identify attempts to hack into a computer system. |
| B. | May monitor packets passing over the network. |
| C. | May transmit message packets to the correct destination. |
| D. | Set up deception systems that attempt to trap hackers. |
| Answer» D. Set up deception systems that attempt to trap hackers. | |