Explore topic-wise MCQs in Database.

This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.

1.

A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing.

A. 1
B.
Answer» C.
2.

Servlets are stored on the server rather than with an application on a client.

A. 1
B.
Answer» B.
3.

Both ASP and ColdFusion allow for the coding of custom tags within an HTML document.

A. 1
B.
Answer» B.
4.

A proxy server controls the passage of messages or files through to the organization's network.

A. 1
B.
Answer» B.
5.

Routers are used to transmit message packets and forward them to the correct destination over the most efficient pathway available.

A. 1
B.
Answer» B.
6.

Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted.

A. 1
B.
Answer» B.
7.

VBScript is similar to JavaScript.

A. 1
B.
Answer» B.
8.

An intranet provides which of the following?

A. Connectivity to all customers
B. Connectivity to selected customers
C. Connectivity to no customers
D. Connectivity to all of the above
Answer» D. Connectivity to all of the above
9.

Hypertext Transfer Protocol (HTTP) is secure.

A. 1
B.
Answer» C.
10.

XML is a rapidly developing scripting language that may, in conjunction with XHTML, replace HTML.

A. 1
B.
Answer» B.
11.

Client-side extensions:

A. add functionality to the server.
B. add functionality to the browser.
C. add functionality to the firewall.
D. add functionality to the network.
Answer» C. add functionality to the firewall.
12.

Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet?

A. Both TCP and IP are needed.
B. TCP is needed but IP is not needed.
C. TCP is not needed but IP is needed.
D. Neither TCP and IP are needed.
Answer» B. TCP is needed but IP is not needed.
13.

XML is which of the following?

A. A scripting language that states the rules for tagging elements.
B. A programming language that states the rules for tagging elements.
C. A programming language that allows the creation of customized tags.
D. A scripting language that allows the creation of customized tags.
Answer» E.
14.

The World Wide Web Consortium (W3C) is the chief standards body for HTTP and HTML.

A. 1
B.
Answer» B.
15.

XSL is a language used to develop style sheets from XML documents.

A. 1
B.
Answer» B.
16.

Which of the following is true about ColdFusion Markup Language (CFML)?

A. It is stored in .asp files.
B. It is executed on the client.
C. It does not use tags.
D. It allows for coding of custom tags in an HTML file.
Answer» E.
17.

Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching.

A. 1
B.
C. 1
D.
Answer» B.
18.

Websites without a database attached to them have which of the following characteristics?

A. The ability to generate data via SQL.
B. The inability to use a browser to display Web pages.
C. Static information using HTML or JavaScript.
D. The need to use TCP/IP as the network protocol.
Answer» D. The need to use TCP/IP as the network protocol.
19.

C++ is an object-oriented language and is simpler than Java.

A. 1
B.
C. 1
D.
Answer» C. 1
20.

Web servers should be configured in which of the following ways?

A. unauthorized access is restricted.
B. unauthorized access is unrestricted.
C. unauthorized access is impossible.
D. unauthorized access is possible.
Answer» B. unauthorized access is unrestricted.
21.

A proxy server is used for which of the following?

A. To provide security against unauthorized users
B. To process client requests for Web pages
C. To process client requests for database access
D. To provide TCP/IP
Answer» B. To process client requests for Web pages
22.

Common Gateway Interface (CGI) is which of the following?

A. An interface that accepts and returns data that may be written in SQL.
B. An interface that accepts and returns data that may be written in any language that produces an executable file.
C. A small program that executes within another application and is stored on the server.
D. A small program that executes within another application and is stored on the client.
Answer» C. A small program that executes within another application and is stored on the server.
23.

Which of the following is true concerning Web services standards?

A. Led by only one group.
B. Helped by cooperation between companies.
C. Not necessary at this time.
D. Important so that the web can flourish.
Answer» E.
24.

Most plug-ins download slowly because they are rather large files.

A. 1
B.
C. 1
D.
Answer» C. 1
25.

Features of XML include which of the following?

A. The tags are used to describe the appearance of the content.
B. Addresses the structuring and manipulation of the data involved.
C. Governs the display of information in a Web browser.
D. All of the above.
Answer» C. Governs the display of information in a Web browser.
26.

Which of the following is true about Microsoft Active Server Pages (ASP)?

A. It is stored in .cfm files.
B. It is executed on the client.
C. It does not use tags.
D. It allows for coding of custom tags in an HTML file.
Answer» E.
27.

What is Hypertext Transfer Protocol (HTTP)?

A. The protocol to copy files between computers
B. The transfer protocol to transfer Web pages to a browser
C. The database access protocol for SQL statements
D. The hardware/software protocol that limits access to company data
Answer» C. The database access protocol for SQL statements
28.

A server-side extension is needed to do what?

A. Allow a request from a client to access the database.
B. Allow a request from a client to access a HTML-formatted page.
C. Allow a request from a client to access Web pages.
D. All of the above.
Answer» B. Allow a request from a client to access a HTML-formatted page.
29.

An intrusion detection system does not perform which of the following?

A. Tries to identify attempts to hack into a computer system.
B. May monitor packets passing over the network.
C. May transmit message packets to the correct destination.
D. Set up deception systems that attempt to trap hackers.
Answer» D. Set up deception systems that attempt to trap hackers.