Computer Science Quiz - Freshman/Sophomore
  • 1. A Class is a?
A) Blueprint that defines a variable
B) Home Tool Markup Language
C) Hyperlinks and Text Markup Language
D) Raw text elements
  • 2. What is an Object?
A) Home Tool Markup Language
B) Instance of a class
C) An individual component of an HTML document
D) Raw text elements
  • 3. What is a SQL injection attack?
A) When a hacker tries to enter in a variable
B) When a hacker tries to enter harmful HTML code
C) When a hacker tries to enter in a hyperlink
D) Where a hacker tries to inject malicious SQL code into someone database
  • 4. True or False: Will an SQL injection ruin your database?
A) True
B) False
  • 5. What is Sanitizing data?
A) The act of stripping out any characters that aren’t needed from the data
B) The act of removing Raw text elements that aren’t wanted
C) The act of collecting and removing variables
D) The act of garbage collection
  • 6. What is the best way to prevent an SQL injection?
A) An array
B) Prepared Statement
C) Specimen of a class
D) Function by reference
  • 7. When do you use inheritance?
A) Specimen of a class
B) Home Tool Markup Language
C) When a relationship exist between two classes Function by reference
D) An array of an array
  • 8. What word is used by the sub class to inherit features of the super class?
A) Finalize
B) Object
C) Extend
D) Polymorphism
  • 9. What is a Prepared Statement?
A) A template for SQL statements
B) A method that have the same but different signatures
C) A super class that replaces sub-class
D) A method for overloading
  • 10. True or False: Only code used in web applications are vulnerable to SQL injection attack?
A) True
B) False
  • 11. Code that is most vulnerable to SQL injection attack contains?
A) Input parameters
B) Dynamic SQL with bind arguments
C) Dynamic SQL with concatenated input values
D) Call to external functions
  • 12. Not preventing SQL Injections attacks leaves your business at great risk of:
A) Method overriding
B) Super class
C) Steal customer information
D) Method overloading
  • 13. What is an example of vulnerabilities in web based vulnerabilities?
A) SQL Injection
B) Cross-Site Scripting
C) None of the above
D) All of the above
  • 14. What is MySQL?
A) A relational database management system
B) An object oriented database query language
C) None of the above
D) A tree based grammar for database definition
  • 15. What is FindBugs?
A) An Static Analysis Tool for Java
B) Relates to method overloading
C) Determined at run-time
D) Relates to method overriding
  • 16. What does FindBugs do?
A) Looks at an array of an array
B) Home Tool Markup Language
C) Finds a relationship that exist between two classes
D) Identifies hundreds of serious defects in large applications
  • 17. What is OOPs?
A) Object Oriented Programming
B) Overloading Object Programming
C) Oriented Object Programming
D) Object Ore Programming
  • 18. When do you declare a method class?
A) Oriented Object Programming
B) When a child class exstends
C) Abstract method from a Non abstract
D) When a child class implements the behavior method
  • 19. What is user-defined exception in Java?
A) Exceptions defined by the IDE
B) Exceptions defined by the developer
C) Exceptions defined by the compiler
D) Exceptions defined by the computer
  • 20. What type of Tool is FindBugs?
A) Static Analysis
B) GUI
C) Concept
D) Project Management
Created with That Quiz — where test making and test taking are made easy for math and other subject areas.