The Internet Database Environment(Database ) Questions and Answers

Question 1. An intrusion detection system does not perform which of the following?
  1.    Tries to identify attempts to hack into a computer system.
  2.    May monitor packets passing over the network.
  3.    May transmit message packets to the correct destination.
  4.    Set up deception systems that attempt to trap hackers.
Explanation:-
Answer: Option C. -> May transmit message packets to the correct destination.

Question 2. Features of XML include which of the following?
  1.    The tags are used to describe the appearance of the content.
  2.    Addresses the structuring and manipulation of the data involved.
  3.    Governs the display of information in a Web browser.
  4.    All of the above.
Explanation:-
Answer: Option B. -> Addresses the structuring and manipulation of the data involved.

Question 3. Common Gateway Interface (CGI) is which of the following?
  1.    An interface that accepts and returns data that may be written in SQL.
  2.    An interface that accepts and returns data that may be written in any language that produces an executable file.
  3.    A small program that executes within another application and is stored on the server.
  4.    A small program that executes within another application and is stored on the client.
Explanation:-
Answer: Option B. -> An interface that accepts and returns data that may be written in any language that produces an executable file.

Question 4. What is Hypertext Transfer Protocol (HTTP)?
  1.    The protocol to copy files between computers
  2.    The transfer protocol to transfer Web pages to a browser
  3.    The database access protocol for SQL statements
  4.    The hardware/software protocol that limits access to company data
Explanation:-
Answer: Option B. -> The transfer protocol to transfer Web pages to a browser
HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.

Question 5. Which of the following is true concerning Web services standards?
  1.    Led by only one group.
  2.    Helped by cooperation between companies.
  3.    Not necessary at this time.
  4.    Important so that the web can flourish.
Explanation:-
Answer: Option D. -> Important so that the web can flourish.

Question 6. Which of the following is true about Microsoft Active Server Pages (ASP)?
  1.    It is stored in .cfm files.
  2.    It is executed on the client.
  3.    It does not use tags.
  4.    It allows for coding of custom tags in an HTML file.
Explanation:-
Answer: Option D. -> It allows for coding of custom tags in an HTML file.

Question 7. Websites without a database attached to them have which of the following characteristics?
  1.    The ability to generate data via SQL.
  2.    The inability to use a browser to display Web pages.
  3.    Static information using HTML or JavaScript.
  4.    The need to use TCP/IP as the network protocol.
Explanation:-
Answer: Option C. -> Static information using HTML or JavaScript.

Question 8. A proxy server is used for which of the following?
  1.    To provide security against unauthorized users
  2.    To process client requests for Web pages
  3.    To process client requests for database access
  4.    To provide TCP/IP
Explanation:-
Answer: Option A. -> To provide security against unauthorized users

Question 9. Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet?
  1.    Both TCP and IP are needed.
  2.    TCP is needed but IP is not needed.
  3.    TCP is not needed but IP is needed.
  4.    Neither TCP and IP are needed.
Explanation:-
Answer: Option A. -> Both TCP and IP are needed.

Question 10. Web servers should be configured in which of the following ways?
  1.    unauthorized access is restricted.
  2.    unauthorized access is unrestricted.
  3.    unauthorized access is impossible.
  4.    unauthorized access is possible.
Explanation:-
Answer: Option A. -> unauthorized access is restricted.