Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

COMPREHENSIVE

ANSWERS OF 4th
SEMESTER EXAM

Q. Which of the following protocols runs above TCP/IP and below higher-level protocols?
A. SSL

Q. Which of the following files store the user and password information?
A. /etc/passwd

Q. __________ is used to establish a relation between two tables.


A. Foreign KEY

Q. Which of the following is used with DROP command to check the existence of the table
A. IF EXIST

Q. Which of the following functions will remove the leading spaces in employee name
from the employee table?
A. SELECT LTRIM (employeeName) FROM employee

Q. __________ exists between a computer and a network and provides protection to


networks against outside attackers.
A. Firewall

Q. Which of the following modules specify the proxy or the gateway to APACHE server?
A. mod_proxy

Q. Which of the following are the desktop environments provided by the RHEL?
A. GNOME, KDE
Q. which of the following clauses in a SELECT statement can be used to specify the
conditions in JOIN?
A. ON

Q. Each running process is assigned a unique __________ by the operation system.


A. PID (Process ID)

Q. Which of the following enables faster searches and efficient organization of data in
database table?
A. Indexes

Q. Which of the following wildcard characters can be used in a directory path with the
<Directory> directive?
A. ? , [] , *

Q. __________ of rsyslogd processes the messages into different formats.


A. Output Modules

Q. Which of the following is used to create a user account without any privileges?
A. ALL

Q. Which of the following functions returns the number of unique values in a column?
A. count (DISTINCT expression)

Q. Which of the following is not an aggregate function?


A. TRUNCATE

Q. The default runlevel is specified in the __________ file.


A. /etc/inittab

Q. Which of the following directives can be used to configure the contents of the
access_log file?
A. CustomLog, LogFormat

Q. Which of the following displays the lists of included directories instead of the actual
Web pages?
A. DirectoryIndex
Q. Which of the following code snippets set the authentication realm to security?
A. AuthName Security

Q. Which of the following directives instruct the Apache server to process requests from a
specific IP Addresses?
A. Listen

Q. A __________ is a program that loads the operating system into the system memory
while booting.
A. boot loader

Q. Which of the following method requires authentication and authorization with a


username and a password?
A. Basic

Q. Which of the following is a conditional Directive?


A. <IfDefine>

Q. A new __________ is created when a command is executed or a program is started on


the RHEL system
A. kernel

Q. Which of the following queries will copy all the records from tbl_1 table to the tbl_2
table?
A. SELECT * FROM tbl_1 INTO tbl_2

Q. Which of the following commands is used to add new records into a table?
A. Insert

Q. Which of the following modules display information related to the activities and
performance of Apache Web Server?
A. mod_status

Q. __________ is the process of converting Data into scrambled code while deciphering it
at the other end.
A. Cryptography

Q. Which of the following queries will display the employee names whose salary are more
than employee ?John? ?
A. SELECT * FROM EMPLOYEES WHERE SALARY > (SELECT SALARY FROM EMPLOYEES
WHERE EmployeeName = ?John?)

Q. Which of the following are dynamic modules in Apache?


A. mod_perl, mod_dav, mod_php

You might also like