Top 1000+ Solved DataBase Management System (DBMS) MCQ Questions Answer
Q. Arrays are best data structures
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly changing
c. all of the mentioned
d. none of the mentioned
Q. Linked lists are best suited
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly changing
c. all of the mentioned
d. none of the mentioned
Q. In attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
a. sql injection
b. sql
c. direct
d. application
Q. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a attack.
a. two-factor authentication
b. cross-site request forgery
c. cross-site scripting
d. cross-site scoring scripting
Q. is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
a. two-factor authentication
b. cross-site request forgery
c. cross-site scripting
d. cross-site scoring scripting
Q. A single further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
a. openid
b. sign-on system
c. security assertion markup language (saml)
d. virtual private database (vpd)
Q. allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
a. openid
b. single-site system
c. security assertion markup language (saml)
d. virtual private database (vpd)
Q. is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
a. encryption
b. data mining
c. internet security
d. architectural security
Q. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
a. encryption key
b. decryption key
c. primary key
d. authorised key
Q. In which of the following encryption key is used to encrypt and decrypt the data?
a. public key
b. private key
c. symmetric key
d. asymmetric key
Q. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?
a. round key algorithm
b. public key algorithm
c. advanced encryption standard
d. asymmetric key algorithm
Q. Which of the following requires no password travel across the internet?
a. readable system
b. manipulation system
c. challenge–response system
d. response system
Q. The is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.
a. cache
b. disk
c. main memory
d. flash memory
Q. Which of the following stores several gigabytes of data but usually lost when power failure?
a. flash memory
b. disk
c. main memory
d. secondary memory
Q. is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.
a. flash memory
b. disk
c. main memory
d. secondary memory