You are on page 1of 5

Q1: How can you restore the WordPress core files??

a The core files can be fetched via your dashboard

b None

c The core files can be downloaded back from your local machine as long as you
have a backup

d The core files can be downloaded back from Database.

e None

f The core files can be downloaded back from wordpress.org site.

Q2: Which of the following elements marks The Ruby Text Component Of A Ruby
annotation??

a None

bR

c Rt

d Rubytxt

e None

f Ruby

Q3: What improvements can be made to the query UPDATE students SET `contact number`
= 0999;?

a None

b None

c None

d enclose the contact number in single quotes

e The query does not need any improvements

f None
Q4: What does PHP stand for??

a None

b Personal Hypertext Processor

c None

d Private Home Page

e Personal Home Page

f PHP: Hypertext Preprocessor

Q5: Who is known as the father of world wide web (WWW)??

a Tim Berners-Lee

b Charles Darwin

c None

d None

e Tim Thompson

f Robert Cailliau

Q6: The command to create Kubernetes service is?

The correct Answer is: None

b kubectl deploy

The correct Answer is: None

d kubectl run

e kubectl expose

f kubectl set service

Q7: How do you get information from a form that is submitted using the "get" method??
a Request.Form;

b $_GET[];

c None

d $_GET.QueryString

e Request.QueryString;

f None

Q8: How to get all resources with simple output (just the resource name) in Kubernetes??

a kubectl api-resources name

b kubectl api-resources -o name

c kubectl api -r name

d None

e None

f kubectl api -o name

Q9: Which of the following statements are true about SQL injection attacks??

a Wrapping all variables containing user input by a call to


mysql_real_escape_string() makes the code immune to SQL injections.

b None of the above

c Usage of later versions of MySQL, validation, and explicit setting of the charset of
user input are valid measures to decrease vulnerability to SQL injections.

d Parametrized queries do not make code less vulnearable to SQL injections.

e None

f SQL injections are not possible, if only emulated prepared statements are used.

Q10: Which of the answers listed below refers to a package management system most often
used on Debian and Debian-based Linux distributions??
a kde

b None

c apt

d rpm

e yum

f None

Q11: The Kubernetes Network proxy runs on which node??

a None of the mentioned

b Master Node

The correct Answer is: None

d Worker Node

The correct Answer is: None

f All the nodes

Q12: Which data type is used to store a sequence of characters in Python??

a None

b Integer

c String

d None

e Float

f Boolean

Q13: Which CMS powers around 35% of all websites on the internet??

a Laravel

b Dropal
c None

d Joomla

e WordPress

f None

You might also like