Computer Science Quiz - Freshman/Sophomore
  • 1. A Class is a?
A) Raw text elements
B) Blueprint that defines a variable
C) Home Tool Markup Language
D) Hyperlinks and Text Markup Language
  • 2. What is an Object?
A) Raw text elements
B) Instance of a class
C) Home Tool Markup Language
D) An individual component of an HTML document
  • 3. What is a SQL injection attack?
A) When a hacker tries to enter harmful HTML code
B) When a hacker tries to enter in a variable
C) Where a hacker tries to inject malicious SQL code into someone database
D) When a hacker tries to enter in a hyperlink
  • 4. True or False: Will an SQL injection ruin your database?
A) True
B) False
  • 5. What is Sanitizing data?
A) The act of garbage collection
B) The act of collecting and removing variables
C) The act of stripping out any characters that aren’t needed from the data
D) The act of removing Raw text elements that aren’t wanted
  • 6. What is the best way to prevent an SQL injection?
A) Prepared Statement
B) An array
C) Function by reference
D) Specimen of a class
  • 7. When do you use inheritance?
A) Specimen of a class
B) An array of an array
C) When a relationship exist between two classes Function by reference
D) Home Tool Markup Language
  • 8. What word is used by the sub class to inherit features of the super class?
A) Extend
B) Object
C) Polymorphism
D) Finalize
  • 9. What is a Prepared Statement?
A) A method that have the same but different signatures
B) A template for SQL statements
C) A super class that replaces sub-class
D) A method for overloading
  • 10. True or False: Only code used in web applications are vulnerable to SQL injection attack?
A) True
B) False
  • 11. Code that is most vulnerable to SQL injection attack contains?
A) Dynamic SQL with concatenated input values
B) Input parameters
C) Call to external functions
D) Dynamic SQL with bind arguments
  • 12. Not preventing SQL Injections attacks leaves your business at great risk of:
A) Super class
B) Method overriding
C) Steal customer information
D) Method overloading
  • 13. What is an example of vulnerabilities in web based vulnerabilities?
A) All of the above
B) SQL Injection
C) None of the above
D) Cross-Site Scripting
  • 14. What is MySQL?
A) An object oriented database query language
B) A relational database management system
C) A tree based grammar for database definition
D) None of the above
  • 15. What is FindBugs?
A) Relates to method overriding
B) Determined at run-time
C) An Static Analysis Tool for Java
D) Relates to method overloading
  • 16. What does FindBugs do?
A) Identifies hundreds of serious defects in large applications
B) Home Tool Markup Language
C) Looks at an array of an array
D) Finds a relationship that exist between two classes
  • 17. What is OOPs?
A) Overloading Object Programming
B) Object Ore Programming
C) Object Oriented Programming
D) Oriented Object Programming
  • 18. When do you declare a method class?
A) Abstract method from a Non abstract
B) When a child class implements the behavior method
C) When a child class exstends
D) Oriented Object Programming
  • 19. What is user-defined exception in Java?
A) Exceptions defined by the compiler
B) Exceptions defined by the developer
C) Exceptions defined by the computer
D) Exceptions defined by the IDE
  • 20. What type of Tool is FindBugs?
A) GUI
B) Project Management
C) Static Analysis
D) Concept
Created with That Quiz — where test making and test taking are made easy for math and other subject areas.