logo

CuriousTab

CuriousTab

Discussion


Home Database The Internet Database Environment Comments

  • Question
  • Which of the following is true about Microsoft Active Server Pages (ASP)?


  • Options
  • A. It is stored in .cfm files.
  • B. It is executed on the client.
  • C. It does not use tags.
  • D. It allows for coding of custom tags in an HTML file.

  • Correct Answer
  • It allows for coding of custom tags in an HTML file. 


  • The Internet Database Environment problems


    Search Results


    • 1. XML is which of the following?

    • Options
    • A. A scripting language that states the rules for tagging elements.
    • B. A programming language that states the rules for tagging elements.
    • C. A programming language that allows the creation of customized tags.
    • D. A scripting language that allows the creation of customized tags.
    • Discuss
    • 2. Web servers should be configured in which of the following ways?

    • Options
    • A. unauthorized access is restricted.
    • B. unauthorized access is unrestricted.
    • C. unauthorized access is impossible.
    • D. unauthorized access is possible.
    • Discuss
    • 3. Client-side extensions:

    • Options
    • A. add functionality to the server.
    • B. add functionality to the browser.
    • C. add functionality to the firewall.
    • D. add functionality to the network.
    • Discuss
    • 4. Websites without a database attached to them have which of the following characteristics?

    • Options
    • A. The ability to generate data via SQL.
    • B. The inability to use a browser to display Web pages.
    • C. Static information using HTML or JavaScript.
    • D. The need to use TCP/IP as the network protocol.
    • Discuss
    • 5. An intrusion detection system does not perform which of the following?

    • Options
    • A. Tries to identify attempts to hack into a computer system.
    • B. May monitor packets passing over the network.
    • C. May transmit message packets to the correct destination.
    • D. Set up deception systems that attempt to trap hackers.
    • Discuss
    • 6. Which of the following is true about ColdFusion Markup Language (CFML)?

    • Options
    • A. It is stored in .asp files.
    • B. It is executed on the client.
    • C. It does not use tags.
    • D. It allows for coding of custom tags in an HTML file.
    • Discuss
    • 7. A proxy server is used for which of the following?

    • Options
    • A. To provide security against unauthorized users
    • B. To process client requests for Web pages
    • C. To process client requests for database access
    • D. To provide TCP/IP
    • Discuss
    • 8. What is Hypertext Transfer Protocol (HTTP)?

    • Options
    • A. The protocol to copy files between computers
    • B. The transfer protocol to transfer Web pages to a browser
    • C. The database access protocol for SQL statements
    • D. The hardware/software protocol that limits access to company data
    • Discuss
    • 9. Common Gateway Interface (CGI) is which of the following?

    • Options
    • A. An interface that accepts and returns data that may be written in SQL.
    • B. An interface that accepts and returns data that may be written in any language that produces an executable file.
    • C. A small program that executes within another application and is stored on the server.
    • D. A small program that executes within another application and is stored on the client.
    • Discuss
    • 10. Which of the following could cause data to be unavailable?

    • Options
    • A. Data becoming lost or inaccurate
    • B. The database server
    • C. Planned database maintenance activities
    • D. All of the above.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment