MySQL Access Control and Security


  1. To check if the data directory contains insecure files or directories, the command executed is _____________











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: B

    It can be determined whether the data directory contains insecure files or directories by executing ‘ls -la’. Then the lookup for files or directories that have the “group” or “other” permissions turned on.


  1. The language in which image processing is least simple is ______________.











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: B

    It is not as easy to perform text processing and memory management in C than it is in languages like Perl and PHP. These capabilities tend to be heavily used in the web applications.



  1. The option necessary to compile a C program havin math functions is ______________.











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: C

    To compile a program written in the C language, it is compiled by issuing the option ‘-lm’. The examples of some math functions found in ‘math.h’ are floor(), sqrt(), pow(), log().


  1. What is the option for specifying the executable name while compiling with gcc?











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: C

    When a C program is compiled with gcc, the option -o is issued in order to specify the name of the executable that is created after compilation. The default name given is ‘a.out’.



  1. The server uses a Unix domain socket file for connections by clients to localhost.











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: A

    The server uses a Unix domain socket file for connections by clients to localhost. The socket file normally is publicly accessible so that client programs can use it again properly.