CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Database
‣
The Internet Database Environment
Comments
Question
XML is which of the following?
Options
A. A scripting language that states the rules for tagging elements.
B. A programming language that states the rules for tagging elements.
C. A programming language that allows the creation of customized tags.
D. A scripting language that allows the creation of customized tags.
Correct Answer
A scripting language that allows the creation of customized tags.
The Internet Database Environment problems
Search Results
1. Web servers should be configured in which of the following ways?
Options
A. unauthorized access is restricted.
B. unauthorized access is unrestricted.
C. unauthorized access is impossible.
D. unauthorized access is possible.
Show Answer
Scratch Pad
Discuss
Correct Answer: unauthorized access is restricted.
2. Client-side extensions:
Options
A. add functionality to the server.
B. add functionality to the browser.
C. add functionality to the firewall.
D. add functionality to the network.
Show Answer
Scratch Pad
Discuss
Correct Answer: add functionality to the browser.
3. Websites without a database attached to them have which of the following characteristics?
Options
A. The ability to generate data via SQL.
B. The inability to use a browser to display Web pages.
C. Static information using HTML or JavaScript.
D. The need to use TCP/IP as the network protocol.
Show Answer
Scratch Pad
Discuss
Correct Answer: Static information using HTML or JavaScript.
4. An intrusion detection system does not perform which of the following?
Options
A. Tries to identify attempts to hack into a computer system.
B. May monitor packets passing over the network.
C. May transmit message packets to the correct destination.
D. Set up deception systems that attempt to trap hackers.
Show Answer
Scratch Pad
Discuss
Correct Answer: May transmit message packets to the correct destination.
5. Which of the following is true concerning Web services standards?
Options
A. Led by only one group.
B. Helped by cooperation between companies.
C. Not necessary at this time.
D. Important so that the web can flourish.
Show Answer
Scratch Pad
Discuss
Correct Answer: Important so that the web can flourish.
6. Which of the following is true about Microsoft Active Server Pages (ASP)?
Options
A. It is stored in .cfm files.
B. It is executed on the client.
C. It does not use tags.
D. It allows for coding of custom tags in an HTML file.
Show Answer
Scratch Pad
Discuss
Correct Answer: It allows for coding of custom tags in an HTML file.
7. Which of the following is true about ColdFusion Markup Language (CFML)?
Options
A. It is stored in .asp files.
B. It is executed on the client.
C. It does not use tags.
D. It allows for coding of custom tags in an HTML file.
Show Answer
Scratch Pad
Discuss
Correct Answer: It allows for coding of custom tags in an HTML file.
8. A proxy server is used for which of the following?
Options
A. To provide security against unauthorized users
B. To process client requests for Web pages
C. To process client requests for database access
D. To provide TCP/IP
Show Answer
Scratch Pad
Discuss
Correct Answer: To provide security against unauthorized users
9. What is Hypertext Transfer Protocol (HTTP)?
Options
A. The protocol to copy files between computers
B. The transfer protocol to transfer Web pages to a browser
C. The database access protocol for SQL statements
D. The hardware/software protocol that limits access to company data
Show Answer
Scratch Pad
Discuss
Correct Answer: The transfer protocol to transfer Web pages to a browser
10. Common Gateway Interface (CGI) is which of the following?
Options
A. An interface that accepts and returns data that may be written in SQL.
B. An interface that accepts and returns data that may be written in any language that produces an executable file.
C. A small program that executes within another application and is stored on the server.
D. A small program that executes within another application and is stored on the client.
Show Answer
Scratch Pad
Discuss
Correct Answer: An interface that accepts and returns data that may be written in any language that produces an executable file.
Comments
There are no comments.
Enter a new Comment
Save
More in Database:
Advanced SQL
Data and Database Administration
Data Modeling with ER Model
Data Models into Database Designs
Data Warehousing
Database Design Using Normalization
Database Processing for BIS
Database Redesign
Distributed Databases
ER Model and Business Rules
Introduction to Database
Introduction to SQL
JDBC, Java Server Pages, and MySQL
Logical Database Design
Managing Databases with Oracle
Managing Multiuser Databases
Modeling Data in the Organization
Object-Oriented Data Modeling
Object-Oriented Database
ODBC, OLE DB, ADO, and ASP
Physical Database Design
SQL for Database Construction
SQL Server 2000
The Client-Server Database
The Database Development Process
The Database Environment
The Internet Database Environment
The Relational Model and Normalization
XML and ADO.NET