• +91 9723535972
  • info@interviewmaterial.com

Computer Interview Questions and Answers

Computer Interview Questions and Answers

Question - 41 : - What is Blind SQL Injection?

Answer - 41 : - When an attacker executes SQL Injection attacks sometimes the server responds with error messages from the database server complaining that the SQL Query's syntax is incorrect. Blind SQL injection is identical to normal SQL Injection except that when an attacker attempts to exploit an application rather then getting a useful error message they get a generic page specified by the developer instead. This makes exploiting a potential SQL Injection attack more difficult but not impossible. An attacker can still steal data by asking a series of True and False questions through sql statements.

Question - 42 : - How does one create a new database? (for DBA)

Answer - 42 : - One can create and modify Oracle databases using the Oracle "dbca" (Database Configuration Assistant) utility. The dbca utility is located in the $ORACLE_HOME/bin directory. The Oracle Universal Installer (oui) normally starts it after installing the database server software. One can also create databases manually using scripts. This option, however, is falling out of fashion, as it is quite involved and error prone. Look at this example for creating and Oracle 9i database: CONNECT SYS AS SYSDBA ALTER SYSTEM SET DB_CREATE_FILE_DEST='/u01/oradata/'; ALTER SYSTEM SET DB_CREATE_ONLINE_LOG_DEST_1='/u02/oradata/'; ALTER SYSTEM SET DB_CREATE_ONLINE_LOG_DEST_2='/u03/oradata/'; CREATE DATABASE;

Question - 43 : - What is Remote Procedure Call (RPC)?

Answer - 43 : - RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results. Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor.

Question - 44 : - What is meant by Middleware?

Answer - 44 : - Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response. It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain.

Question - 45 : - What is meant by Asymmetric Multiprocessing (AMP)?

Answer - 45 : - It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.

Question - 46 : - What is meant by 2-Tier architecture?

Answer - 46 : - In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server. Example: File servers and Database servers with stored procedures.

Question - 47 : - What are the two broad classes of middleware?

Answer - 47 : - General middleware Service-specific middleware.

Question - 48 : - What are the types of Servers?

Answer - 48 : - File servers Database servers Transaction servers Groupware servers Object servers Web servers.

Question - 49 : - List out the benefits obtained by using the Client/Server oriented TP Monitors?

Answer - 49 : - Client/Server applications development framework. Firewalls of protection. High availability. Load balancing. MOM integration. Scalability of functions. Reduced system cost.

Question - 50 : - What is wide-mouth frog?

Answer - 50 : - Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.


NCERT Solutions

 

Share your email for latest updates

Name:
Email:

Our partners