

MCQOPTIONS
Saved Bookmarks
This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
1. |
A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing. |
A. | 1 |
B. | |
Answer» C. | |
2. |
Servlets are stored on the server rather than with an application on a client. |
A. | 1 |
B. | |
Answer» B. | |
3. |
Both ASP and ColdFusion allow for the coding of custom tags within an HTML document. |
A. | 1 |
B. | |
Answer» B. | |
4. |
A proxy server controls the passage of messages or files through to the organization's network. |
A. | 1 |
B. | |
Answer» B. | |
5. |
Routers are used to transmit message packets and forward them to the correct destination over the most efficient pathway available. |
A. | 1 |
B. | |
Answer» B. | |
6. |
Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted. |
A. | 1 |
B. | |
Answer» B. | |
7. |
VBScript is similar to JavaScript. |
A. | 1 |
B. | |
Answer» B. | |
8. |
An intranet provides which of the following? |
A. | Connectivity to all customers |
B. | Connectivity to selected customers |
C. | Connectivity to no customers |
D. | Connectivity to all of the above |
Answer» D. Connectivity to all of the above | |
9. |
Hypertext Transfer Protocol (HTTP) is secure. |
A. | 1 |
B. | |
Answer» C. | |
10. |
XML is a rapidly developing scripting language that may, in conjunction with XHTML, replace HTML. |
A. | 1 |
B. | |
Answer» B. | |
11. |
Client-side extensions: |
A. | add functionality to the server. |
B. | add functionality to the browser. |
C. | add functionality to the firewall. |
D. | add functionality to the network. |
Answer» C. add functionality to the firewall. | |
12. |
Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet? |
A. | Both TCP and IP are needed. |
B. | TCP is needed but IP is not needed. |
C. | TCP is not needed but IP is needed. |
D. | Neither TCP and IP are needed. |
Answer» B. TCP is needed but IP is not needed. | |
13. |
XML is which of the following? |
A. | A scripting language that states the rules for tagging elements. |
B. | A programming language that states the rules for tagging elements. |
C. | A programming language that allows the creation of customized tags. |
D. | A scripting language that allows the creation of customized tags. |
Answer» E. | |
14. |
The World Wide Web Consortium (W3C) is the chief standards body for HTTP and HTML. |
A. | 1 |
B. | |
Answer» B. | |
15. |
XSL is a language used to develop style sheets from XML documents. |
A. | 1 |
B. | |
Answer» B. | |
16. |
Which of the following is true about ColdFusion Markup Language (CFML)? |
A. | It is stored in .asp files. |
B. | It is executed on the client. |
C. | It does not use tags. |
D. | It allows for coding of custom tags in an HTML file. |
Answer» E. | |
17. |
Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching. |
A. | 1 |
B. | |
C. | 1 |
D. | |
Answer» B. | |
18. |
Websites without a database attached to them have which of the following characteristics? |
A. | The ability to generate data via SQL. |
B. | The inability to use a browser to display Web pages. |
C. | Static information using HTML or JavaScript. |
D. | The need to use TCP/IP as the network protocol. |
Answer» D. The need to use TCP/IP as the network protocol. | |
19. |
C++ is an object-oriented language and is simpler than Java. |
A. | 1 |
B. | |
C. | 1 |
D. | |
Answer» C. 1 | |
20. |
Web servers should be configured in which of the following ways? |
A. | unauthorized access is restricted. |
B. | unauthorized access is unrestricted. |
C. | unauthorized access is impossible. |
D. | unauthorized access is possible. |
Answer» B. unauthorized access is unrestricted. | |
21. |
A proxy server is used for which of the following? |
A. | To provide security against unauthorized users |
B. | To process client requests for Web pages |
C. | To process client requests for database access |
D. | To provide TCP/IP |
Answer» B. To process client requests for Web pages | |
22. |
Common Gateway Interface (CGI) is which of the following? |
A. | An interface that accepts and returns data that may be written in SQL. |
B. | An interface that accepts and returns data that may be written in any language that produces an executable file. |
C. | A small program that executes within another application and is stored on the server. |
D. | A small program that executes within another application and is stored on the client. |
Answer» C. A small program that executes within another application and is stored on the server. | |
23. |
Which of the following is true concerning Web services standards? |
A. | Led by only one group. |
B. | Helped by cooperation between companies. |
C. | Not necessary at this time. |
D. | Important so that the web can flourish. |
Answer» E. | |
24. |
Most plug-ins download slowly because they are rather large files. |
A. | 1 |
B. | |
C. | 1 |
D. | |
Answer» C. 1 | |
25. |
Features of XML include which of the following? |
A. | The tags are used to describe the appearance of the content. |
B. | Addresses the structuring and manipulation of the data involved. |
C. | Governs the display of information in a Web browser. |
D. | All of the above. |
Answer» C. Governs the display of information in a Web browser. | |
26. |
Which of the following is true about Microsoft Active Server Pages (ASP)? |
A. | It is stored in .cfm files. |
B. | It is executed on the client. |
C. | It does not use tags. |
D. | It allows for coding of custom tags in an HTML file. |
Answer» E. | |
27. |
What is Hypertext Transfer Protocol (HTTP)? |
A. | The protocol to copy files between computers |
B. | The transfer protocol to transfer Web pages to a browser |
C. | The database access protocol for SQL statements |
D. | The hardware/software protocol that limits access to company data |
Answer» C. The database access protocol for SQL statements | |
28. |
A server-side extension is needed to do what? |
A. | Allow a request from a client to access the database. |
B. | Allow a request from a client to access a HTML-formatted page. |
C. | Allow a request from a client to access Web pages. |
D. | All of the above. |
Answer» B. Allow a request from a client to access a HTML-formatted page. | |
29. |
An intrusion detection system does not perform which of the following? |
A. | Tries to identify attempts to hack into a computer system. |
B. | May monitor packets passing over the network. |
C. | May transmit message packets to the correct destination. |
D. | Set up deception systems that attempt to trap hackers. |
Answer» D. Set up deception systems that attempt to trap hackers. | |