Computer Science Quiz - Freshman/Sophomore
  • 1. A Class is a?
A) Hyperlinks and Text Markup Language
B) Home Tool Markup Language
C) Blueprint that defines a variable
D) Raw text elements
  • 2. What is an Object?
A) Home Tool Markup Language
B) Instance of a class
C) Raw text elements
D) An individual component of an HTML document
  • 3. What is a SQL injection attack?
A) When a hacker tries to enter in a hyperlink
B) When a hacker tries to enter in a variable
C) When a hacker tries to enter harmful HTML code
D) Where a hacker tries to inject malicious SQL code into someone database
  • 4. True or False: Will an SQL injection ruin your database?
A) True
B) False
  • 5. What is Sanitizing data?
A) The act of collecting and removing variables
B) The act of garbage collection
C) The act of removing Raw text elements that aren’t wanted
D) The act of stripping out any characters that aren’t needed from the data
  • 6. What is the best way to prevent an SQL injection?
A) Specimen of a class
B) Prepared Statement
C) Function by reference
D) An array
  • 7. When do you use inheritance?
A) When a relationship exist between two classes Function by reference
B) Home Tool Markup Language
C) Specimen of a class
D) An array of an array
  • 8. What word is used by the sub class to inherit features of the super class?
A) Extend
B) Object
C) Finalize
D) Polymorphism
  • 9. What is a Prepared Statement?
A) A template for SQL statements
B) A method for overloading
C) A method that have the same but different signatures
D) A super class that replaces sub-class
  • 10. True or False: Only code used in web applications are vulnerable to SQL injection attack?
A) False
B) True
  • 11. Code that is most vulnerable to SQL injection attack contains?
A) Input parameters
B) Dynamic SQL with concatenated input values
C) Dynamic SQL with bind arguments
D) Call to external functions
  • 12. Not preventing SQL Injections attacks leaves your business at great risk of:
A) Method overloading
B) Super class
C) Steal customer information
D) Method overriding
  • 13. What is an example of vulnerabilities in web based vulnerabilities?
A) None of the above
B) All of the above
C) Cross-Site Scripting
D) SQL Injection
  • 14. What is MySQL?
A) An object oriented database query language
B) A relational database management system
C) A tree based grammar for database definition
D) None of the above
  • 15. What is FindBugs?
A) An Static Analysis Tool for Java
B) Determined at run-time
C) Relates to method overriding
D) Relates to method overloading
  • 16. What does FindBugs do?
A) Finds a relationship that exist between two classes
B) Identifies hundreds of serious defects in large applications
C) Home Tool Markup Language
D) Looks at an array of an array
  • 17. What is OOPs?
A) Overloading Object Programming
B) Object Oriented Programming
C) Oriented Object Programming
D) Object Ore Programming
  • 18. When do you declare a method class?
A) Oriented Object Programming
B) When a child class implements the behavior method
C) Abstract method from a Non abstract
D) When a child class exstends
  • 19. What is user-defined exception in Java?
A) Exceptions defined by the developer
B) Exceptions defined by the IDE
C) Exceptions defined by the computer
D) Exceptions defined by the compiler
  • 20. What type of Tool is FindBugs?
A) Project Management
B) Concept
C) GUI
D) Static Analysis
Created with That Quiz — where test making and test taking are made easy for math and other subject areas.