Web dev quiz answers Flashcards

1
Q
  1. A unique identifier is most likely to be found within…
    *
    a) API keys
    b) Logic gates
    c) Flat file databases
    d) Relational databases
A

D- Relational databases also have a Primary key. This is a UNIQUE IDENTIFIER, which separates out each row of data from each other. This then means that no data is duplicated or mixed up with another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What does the following piece of HTML do?<b> <i> Hello <i> </b>
    a) Puts the word ‘Hello’ in a header
    b) Puts the word ‘Hello’ in bold
    c) Puts the word ‘Hello’ in bold italics
    d) Puts the word ‘Hello’ in italics</i></i></b>
A

B - There is an opening tag for both bold and italics, but only a closing tag for bold. These tags must be opened and closed for them both to work, so the text will only be shown in bold here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A developer wants to create a dynamic site with live cricket scores updating. Which programming languages would he most likely use?
    a) HTML, CSS and Java
    b) HTML, CSS and JavaScript
    c) HTML and JavaScript
    d) Java only
A

B - HTML is the builder, CSS is the artist, and JavaScript is the wizard that allow dynamic content on web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. In the LAMP stack, which component refers to the server software?
    a) Linux
    b) Apache
    c) MySQL
    d) PHP
A

B - Linux is the operating system, Apache is the server software, MySQL is the database component and PHP is the programming language. Together they form the LAMP stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a type of cyber crime?
a) Code Injection
b) Cross Site Request Forgery
c) Arson
d) Denial of Service

A

C - Code injection is the insertion of malicious code into a vulnerable computer program, with the aim to steal, falsify or delete data from the computer concerned. Cross site request forgery consists of the hacker being able to manipulate the user into completing an action on a web page without their knowledge or consent, while a denial of service attack is where a network or web server is flooded with useless information which is intended to slow down and stop that network and server from working. Arson is not considered a cyber crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A string of code unique to itself is most likely to be the definition of what?
    a) HTML
    b) API Key
    c) JavaScript
    d) Programming
A

B - An API key is a string of code that is unique to itself. For this reason, lots of developers use it as a layer of security for encryption services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An iPad is an example of:
a) A server
b) A client
c) A logic gate
d) An application

A

B - A client is a computer or end piece of equipment, that communicates with the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A HTML coded email is sent out but looks very different when opening the email in Safari compared to Firefox. What is the most likely reason for this?
    a) Safari’s technology is not as good as Firefox’s
    b) Safari and Firefox use different rendering engine
    c) The user has made an error
    d) MailChimp doesn’t work with Safari
A

B - A rendering engine transforms HTML into what the user sees on a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly