Computer Science Quiz - Freshman/Sophomore
  • 1. A Class is a?
A) Raw text elements
B) Hyperlinks and Text Markup Language
C) Home Tool Markup Language
D) Blueprint that defines a variable
  • 2. What is an Object?
A) An individual component of an HTML document
B) Raw text elements
C) Instance of a class
D) Home Tool Markup Language
  • 3. What is a SQL injection attack?
A) When a hacker tries to enter in a variable
B) When a hacker tries to enter harmful HTML code
C) When a hacker tries to enter in a hyperlink
D) Where a hacker tries to inject malicious SQL code into someone database
  • 4. True or False: Will an SQL injection ruin your database?
A) False
B) True
  • 5. What is Sanitizing data?
A) The act of removing Raw text elements that aren’t wanted
B) The act of collecting and removing variables
C) The act of garbage collection
D) The act of stripping out any characters that aren’t needed from the data
  • 6. What is the best way to prevent an SQL injection?
A) Specimen of a class
B) Prepared Statement
C) Function by reference
D) An array
  • 7. When do you use inheritance?
A) Home Tool Markup Language
B) Specimen of a class
C) An array of an array
D) When a relationship exist between two classes Function by reference
  • 8. What word is used by the sub class to inherit features of the super class?
A) Extend
B) Polymorphism
C) Object
D) Finalize
  • 9. What is a Prepared Statement?
A) A method that have the same but different signatures
B) A template for SQL statements
C) A super class that replaces sub-class
D) A method for overloading
  • 10. True or False: Only code used in web applications are vulnerable to SQL injection attack?
A) True
B) False
  • 11. Code that is most vulnerable to SQL injection attack contains?
A) Dynamic SQL with concatenated input values
B) Input parameters
C) Call to external functions
D) Dynamic SQL with bind arguments
  • 12. Not preventing SQL Injections attacks leaves your business at great risk of:
A) Super class
B) Method overloading
C) Steal customer information
D) Method overriding
  • 13. What is an example of vulnerabilities in web based vulnerabilities?
A) Cross-Site Scripting
B) All of the above
C) None of the above
D) SQL Injection
  • 14. What is MySQL?
A) An object oriented database query language
B) A tree based grammar for database definition
C) A relational database management system
D) None of the above
  • 15. What is FindBugs?
A) An Static Analysis Tool for Java
B) Relates to method overloading
C) Relates to method overriding
D) Determined at run-time
  • 16. What does FindBugs do?
A) Looks at an array of an array
B) Home Tool Markup Language
C) Finds a relationship that exist between two classes
D) Identifies hundreds of serious defects in large applications
  • 17. What is OOPs?
A) Object Oriented Programming
B) Object Ore Programming
C) Oriented Object Programming
D) Overloading Object Programming
  • 18. When do you declare a method class?
A) When a child class implements the behavior method
B) When a child class exstends
C) Abstract method from a Non abstract
D) Oriented Object Programming
  • 19. What is user-defined exception in Java?
A) Exceptions defined by the IDE
B) Exceptions defined by the compiler
C) Exceptions defined by the computer
D) Exceptions defined by the developer
  • 20. What type of Tool is FindBugs?
A) Concept
B) GUI
C) Project Management
D) Static Analysis
Created with That Quiz — where test making and test taking are made easy for math and other subject areas.