Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Integrative Programming and Technology 2

Focuses on the process and different techniques used to encrypt and decrypt data to ensure its security on the suitability of using an application language.

technologies

information technology

computer science

ebook

ugrd-it6302

coding

learning objects

web

multimedia programs

virtual classroom

foster reflection

Unit which retains processed information until it can be placed on output devices by output unit is:

  • memory unit
  • output device
  • ALU
  • input device

_________ are the special type of programs used for recording and tracking user’s keystroke.

  • Trojans
  • Worms
  • Virus
  • Keylogger

There is a way of describing XML data, how?

  • Both A and C
  • XML uses a description node to describe data
  • XML uses a DTD to describe the data
  • XML uses XSL to describe data

A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.

  • System error
  • System virus
  • Bugged system
  • Security bug

The use of a DTD in XML development is:

  • no longer necessary after the XML editor has been customized
  • required when validating XML documents
  • a good guide to populating a templates to be filled in when generating an XML document automatically
  • used to direct conversion using an XSLT processor

Which of the following is not an appropriate measure for securing social networking accounts?

  • Strong passwords
  • Always maintain a soft copy of all your passwords in your PC
  • Link your account with a phone number
  • Never write your password anywhere

Mobile operating system is:

  • Windows 10
  • Linux
  • Black berry OS
  • Mac OS X

_______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI).

  • Web application
  • PC application
  • Cloud application
  • Android application

__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.

  • Corporate ethics
  • Ethics in black hat hacking
  • Social ethics
  • Ethics in cyber-security

Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.

  • False
  • True

Which of the following is not an example of web application hacking?

  • Reverse engineering PC apps
  • Exploiting server-side scripting
  • Defacing websites
  • Stealing credit card information

These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

  • Remote Access Trojans
  • Spyware
  • Keyloggers
  • Malware

Receiving section which obtains information from:

  • output devices
  • ALU
  • memory unit
  • input devices

___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.

  • Hacking
  • Exploiting
  • Cracking
  • Pivoting

No matter how well structured programming is implemented, large programs become excessively.

  • network
  • formal
  • complex
  • simpler

Which of the following is not done by cyber criminals?

  • Report vulnerability in any system
  • Email spoofing and spamming
  • Mass attack using Trojans as botnets
  • Unauthorized account access

In order to restrict a variable of a class from inheriting to subclass, how variable should be declared?

  • Public
  • Private
  • Static
  • Protected

In some cases, it’s also hard to map an object to XML (e.g., an object graph with cyclic references) because there’s actually an impedance mismatch between an object model and an XML model.

  • False
  • True

When data items are modified in a large program it may not be easy to tell which:

  • data initialize
  • function is not declared
  • functions access data
  • variable declares

Which of the following isn’t a characteristic of High level languages?

  • platform independent
  • user-friendly
  • interactive execution
  • machine code

DTD includes the specifications about the markup that can be used within the document, the specifications consists of all EXCEPT

  • entity declarations
  • the size of element name
  • element declarations
  • the browser name

_________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.

  • Attack arena
  • Attack surface
  • Attack point
  • Attack vector

Whats so great about XML?

  • Only B.is correct
  • Easy data exchange
  • High speed on network
  • Both A. & B.

Which of them is not a wireless attack?

  • MAC Spoofing
  • Phishing
  • Eavesdropping
  • Wireless Hijacking

Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.

  • a good
  • a bad
  • not so good
  • very good social engineering practice

Bit is a:

  • decimal digit
  • octal digit
  • binary digit
  • hexadecimal digit

A web service contract is described using :-

  • Web Services Description Language
  • Web Services Description
  • All of the mentioned
  • None of the mentioned

Translator which is used to convert codes of assembly language into machine language is termed as:

  • debugger
  • assembler
  • compiler
  • attempter

Set of programs which consist of full documentation.

  • Software Package
  • System Software
  • Utility Software
  • File package

All classes in Java are inherited from which class?

  • java.class.inherited
  • java.lang.Object
  • java.lang.class
  • java.class.object

Which statement is true?

  • All XML elements must be lower case.
  • All the statements are true.
  • All XML documents must have a DTD.
  • All XML elements must have a closing tag.

The instructions that tell the assembler what to do.

  • Pseudo-ops
  • Macros
  • Executable instructions
  • Logical instructions

Procedural language contains systematic order of:

  • statements
  • operations
  • classes
  • objects

A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.

  • exploit
  • malware
  • worms
  • trojan

Which of them is a proper measure of securing social networking account?

  • Keep written records of your passwords
  • Never keep your password with any relevant names
  • Keep records of your password in audio format in your personal cell-phone
  • Passwords are kept smaller in size to remember

Microsoft's object-oriented primary programming languages includes:

  • Ada
  • Java
  • Basic
  • Visual Basic

What is Remote method invocation (RMI)?

  • RMI allows us to invoke a method of java object that executes on another machine
  • None of the mentioned
  • RMI allows us to invoke a method of java object that executes parallely
  • RMI allows us to invoke a method of java object that executes on another Thread in multithreaded programming

Is it easier to process XML than HTML?

  • No
  • Can't say
  • Sometimes
  • Yes

Diagram which shows how objects communicate with each other regarding a sequence of messages is called:

  • sequential diagram
  • communication diagram
  • use case diagram
  • object diagram

_____________ is a special type of vulnerability that doesn’t possess risk.

  • Vulnerabilities no one knows
  • Vulnerabilities without action
  • Vulnerabilities without risk
  • Vulnerabilities without attacker

For XML document to be valid

  • document need to be well formed also
  • document need to be well formed & valid
  • document validity has no relationship with well formedness
  • document need not to be well formed

Systems that make computers more convenient to use by users, application developers and system administrators etc. is termed as:

  • maintenance system
  • model system
  • control system
  • operating system

What is the ethics behind training how to hack a system?

  • To hack a network that is vulnerable
  • To think like hackers and know how to defend such attacks
  • To corrupt software or service using malware
  • To hack a system without the permission

Main memory of computer is termed as:

  • secondary memory
  • non volatile memory
  • primary memory
  • input memory

A person who designs the programs in a software package is called :

  • Software Manager
  • System Programmer
  • System Developer
  • User

A web service enables communication among various applications by using open standards such as HTML, XML, WSDL, and SOAP.

  • True
  • False

A “glue” between client and server parts of application.

  • System Software
  • Firmware
  • Middleware
  • Package

_____________ is the technique used in business organizations and firms to protect IT assets.

  • Ethical hacking
  • Unethical hacking
  • Internal data-breach
  • Fixing bugs

Programming language in which there is a very strong correspondence between language and architecture's machine code instructions is termed as:

  • high level language
  • medium language
  • assembly language
  • machine language

They normally interact with the system via user interface provided by the application software.

  • Developers
  • Programmers
  • Testers
  • Users

There are ________ types of exploit.

  • 5
  • 3
  • 4
  • 2

Today's fastest growing mobile phone operating system is:

  • Google's Android
  • Black berry OS
  • Apple's IOS
  • Mac OS X

COBOL stands for

  • Coupled Business Oriented Language
  • Common Base Oriented Language
  • Communication Business Oriented Language
  • Common Business Oriented Language

A classification of data which tells compiler or interpreter how programmer intends to use data is called:

  • data type
  • data declaration
  • data initialization
  • data determinant

Python, PHP and Ruby languages are type of

  • interpretation language
  • object oriented programming
  • assembly language
  • machine language

In XML

  • the internal DTD subset is read before the external DTD
  • there is no external type of DTD
  • the external DTD subset is read before the internal DTD
  • there is no internal type of DTD

________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.

  • System exploits
  • Local exploits
  • Remote exploits
  • Network exploits

The software designed to perform a specific task:

  • Package Software
  • Application Software
  • Synchronous Software
  • System Software

The full form of Malware is ________

  • Malfunctioned Software
  • Malfunctioning of Security
  • Malicious Software
  • Multipurpose Software

Higher-order functions are not built into the:

  • C++
  • structural language
  • object oriented programming
  • JAVA

Which of the following is the most viral section of the internet?

  • Tutorial sites
  • Social networking sites
  • Chat-rooms
  • Chat Messenger

Data which are not actively being used by particular units are placed on:

  • CPU
  • primary storage unit
  • quad storage unit
  • secondary storage unit

What are the predefined attributes

  • both
  • none
  • xml:lang
  • xml:space

What is an advantage of XML compared to HTML?

  • XML was designed for portable phones.
  • XML is simpler to learn than HTML.
  • XML works on more platforms.
  • XML is suited to using Web pages as front ends to databases.

Who deploy Malwares to a system or network?

  • Criminal organizations, Black hat hackers, software developers, cyber-terrorists
  • Criminal organizations, Black hat hackers, malware developers, cyber-terrorists
  • Criminal organizations, gray hat hackers, Malware developers, Penetration testers
  • Criminal organizations, White hat hackers, malware developers, cyber-terrorists

A computer is a device that can perform computations and make:

  • logical statements
  • algebraic statements
  • Arithmetic statements
  • sequential statements

Risk and vulnerabilities are the same things.

  • False
  • True

Does Java support multiple level inheritance?

  • False
  • True

A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.

  • PC application
  • Android application
  • Web application
  • Cloud application

Open source operating system includes:

  • Linux
  • Apple
  • Windows
  • Android

XSS is abbreviated as __________

  • X Site Scripting
  • Cross Site Security
  • Extreme Secure Scripting
  • Cross Site Scripting

Each byte of character is stored as its ASCII value in _______

  • Decimal
  • Octal
  • Hexadecimal
  • Binary

Leaking your company data to the outside network without prior permission of senior authority is a crime.

  • True
  • False

Microsoft XML Schema Data types for Hexadecimal digits representating octates.

  • UUID
  • UID
  • XXID
  • UXID

___________ has now evolved to be one of the most popular automated tools for unethical hacking.

  • Worms
  • Malware
  • Database software
  • Automated apps

A software that lies between the OS and the applications running on it.

  • Application Software
  • Utility Software
  • Firmware
  • Middleware

Well formed XML document means

  • it contains a root element
  • must contain one or more elements and root element must contain all other elements
  • it contains one or more elements
  • it contain an element

___________ is a weakness that can be exploited by attackers.

  • System with strong password
  • System with Virus
  • System with vulnerabilities
  • System without firewall

Spring comes with a service exporter that can export a bean as a SOAP web service.

  • False
  • True

A programming paradigm based on concept of "objects", which may contain attributes and code in form of procedures is called:

  • object oriented programming
  • interpretation language
  • assembly language
  • machine language

The variables, methods and inner classes that are declared ………………… are accessible to the sub-classes of the class in which they are declared.

  • private
  • public
  • friend
  • protected

____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.

  • Bug bounty
  • Vulnerability management
  • Bug protection
  • Vulnerability measurement

___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.

  • Cyber-terrorism
  • Cyber attack
  • Cyber campaign
  • Cyber-warfare

An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

  • Cyber-crime
  • Cyber Attack
  • System hijacking
  • Digital crime

Which of the following is used for implementing inheritance through class?

  • implements
  • extends
  • inherited
  • using

If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

  • True
  • False

What do you call a specific instruction designed to do a task?

  • Instruction
  • Task
  • Process
  • Command

In programming language, large number of potential connections between function and data leads to structure.

  • easy to load
  • difficult to conceptualize
  • easy to conceptualize
  • difficult to write

Language in which single statements can be written to accomplish substantial tasks is termed as:

  • machine language
  • high level language
  • assembly language
  • medium language

……………….. helps to extend the functionality of an existing by adding more methods to the subclass.

  • Interface
  • Inheritance
  • Mutual Exclusion
  • Package

This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?

  • SQL injection
  • HTML Injection
  • Cross Site Scripting (XSS)
  • Cross Site Request Forgery (XSRF)

Which of the following is correct about WSDL?

  • WSDL was developed jointly by Microsoft and IBM.
  • WSDL is an XML-based language for describing web services and how to access them.
  • All of the above.
  • WSDL is an XML based protocol for information exchange in decentralized and distributed environments.

A web services takes the help of SOAP to tag the data, format the data.

  • True
  • False

Security bugs are also known as _______

  • security problems
  • system defect
  • security defect
  • software error

A program that can execute high-level language programs.

  • Compiler
  • Circuitry
  • Sensor
  • Interpreter

Variable declared outside of a function or a block is called:

  • string
  • local variable
  • global variable
  • variable

Processor which implements multiple processors on a single integrated circuit chip is termed as:

  • multi core processor
  • quad core processor
  • single core processor
  • dual core processor

Which of the following is used for implementing inheritance through an interface?

  • implements
  • extends
  • inherited
  • using

Shipping section takes information that computer has processed and places it on various

  • input devices
  • output devices
  • memory unit
  • ALU

JVM stands for?

  • Java visual machine
  • Java virtual machine
  • JRE visual machine
  • JRE virtual machine

Word processing software is a type of application software.

  • True
  • False

To speed up the processor operations, the processor includes some internal memory storage locations, called ___________

  • Memory
  • Drives
  • Registers
  • Units

Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________

  • Session Spying
  • Session Fixation
  • Session Hijacking
  • Cookie stuffing

What does XML stand for?

  • eXtensible Markup Language
  • X-Markup Language
  • eXtra Modern Link
  • Example Markup Language

In contrast, the contract-first approach encourages you to think of the service contract first in terms of :-

  • XML Schema
  • XML
  • WSDL
  • All of the mentioned

Public domain software is usually:

  • Programmer supported
  • Source supported
  • Community supported
  • System supported

Disadvantages of DTD are:

  • (i),(ii) are correct
  • (i),(ii),(iii) are correct
  • (ii),(iii) are correct
  • (i) is correct

There are two approaches to developing a web service, depending on whether you define the contract first or last.

  • False
  • True

Animations and interactivity with user on web pages can be done by:

  • PHP
  • Visual C#
  • Java script
  • Visual Basic

Microsoft XML Schema Data Type “ boolean” has values

  • any number other then zero and zero
  • 1,0
  • True ,False
  • True ,False or 1,0

_____________ is a code injecting method used for attacking the database of a system / website.

  • Malicious code injection
  • HTML injection
  • SQL Injection
  • XML Injection
  • //line breaks here

Programming language which sometimes called 'write once, run any where is:

  • Ada
  • Pascal
  • Java
  • Basic

What does DTD stand for?

  • Direct Type Definition
  • Dynamic Type Definition
  • Do The Dance
  • Document Type Definition

___________________ is designed to solve a specific problem or to do a specific task.

  • Utility Software
  • User
  • System Software
  • Application Software

Which of the following is not a way of acquiring software?

  • Ordering customized software
  • Downloading public-domain Software
  • Buying pre-written software
  • Duplicating the software

If super class and subclass have same variable name, which keyword should be used to use super class?

  • classname
  • super
  • upper
  • this

In procedural language, programmer creates list of:

  • instructions
  • data
  • paradigm
  • operations

The default model for complex type, in XML schemas for element is:

  • textOnly
  • no default type
  • elementOnly
  • both 1 & 2

Programming language which is based on C++ and Java is developed for integrating Internet and web into computer applications is termed as:

  • Java
  • Visual Basic
  • Basic
  • Visual C#

Using which of the following, multiple inheritance in Java can be implemented?

  • Multithreading
  • Protected methods
  • Interfaces
  • Private methods

Assembly Language requires less memory and execution time.

  • True
  • False

Computer which can perform quadrillion instruction per second is termed as:

  • Supercomputer
  • PLC
  • Personal Computer
  • Automobile

Which of the following programs support XML or XML applications?

  • Netscape D.7
  • RealPlayer
  • both A and B
  • Internet Explorer 5.5

Service exporters that can export a bean as a remote service based on the :-

  • Hessian
  • RMI
  • All of the mentioned
  • Burlap

Stuxnet is a _________

  • Worm
  • Virus
  • Antivirus
  • Trojan

In simple type built into XML schema type flat has single precision of ________ floating point

  • 8 bit
  • 32 bit
  • 4 bit
  • 16 bit

FORTRAN stands for:

  • FanOut ReTRAnslator
  • FORTh Translator
  • FORmula TRAnslator
  • FORTeen language

Each personal computer has a _________ that manages the computer’s arithmetical, logical and control activities.

  • Interpreter
  • Assembler
  • Microcontroller
  • Microprocessor

OSS stands for:

  • Open System Service
  • Open Source Software
  • Open System Software
  • Open Synchronized Software

Information in memory unit is:

  • CPU
  • volatile
  • bus
  • non volatile

Which method of hacking will record all your keystrokes?

  • Keyjacking
  • Keyhijacking
  • Keylogging
  • Keyboard monitoring

_________ is the time frame from when the loophole in security was introduced till the time when the bug was fixed.

  • Time-frame of vulnerability
  • Time-lap of vulnerability
  • Window of vulnerability
  • Entry-door of vulnerability

What is not type of inheritance?

  • Multiple inheritance
  • Double inheritance
  • Single inheritance
  • Hierarchical inheritance

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

  • Buffer Overflow attack
  • Data overflow Attack
  • Database crash attack
  • DoS (Denial of Service) attack

Which of this is an example of physical hacking?

  • DDoS (Distributed Denial of Service) attack
  • Inserting malware loaded USB to a system
  • SQL Injection on SQL vulnerable site
  • Remote Unauthorised access
Comments
Paypal Donation

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Web Systems Technologies

Introduction to Information Systems

International Issues for Human Resources Management

Object Oriented Programming Laboratory

Mobile Programming

Network Security

Management Information Systems

Managing Information and Technology

Mobile Application Design and Development

Mobile Application Design and Development 2

Living in the Information Technology Era

Mail and Web Services

Information Technology Practicum

Information Technology Capstone Project

Introduction to Computing

Intro to Hardware Description Language

Introduction to Human Computer

Introduction to Multimedia

Internet Marketing and Entrepreneurship

Internet Technology in Real Estate

Information Assurance and Security 2

Information Assurance and Security 3

Information Security and Management

Information Systems Operations and Maintenance

Fundamentals of Investigation and Intelligence

Fundamentals of Database System

Digital Imaging

Data Communications and Networking

Cyber Security: Theories and Practice

Data Communications and Networking 2

Data Structures and Algorithms

Database Management System

Chemistry for Engineers

Computer Fundamentals

Animation Project

Load Testing

3D Game Art Development

Auditing and Assurance Concepts and Applications

Integrative Programming and Technology

Linux Administration

Software Engineering

Computer Programming

Applied Business Tools and Technologies

System Administration and Maintenance

Current Trends and Issues

Data Communications and Networking 4

Principles of Operating System and its Application

Systems Integration and Architecture

Application Lifecycle Management

Data Communications and Networking 3

Information Assurance and Security

Software Development

Medical Assistant

Medical Office Administration

Web Application Development

Computer Information Systems

Web Enhanced Animation Graphics


Show All Subject
Affiliate Links

Shopee Helmet

Shopee 3D Floor

Lazada Smart TV Box