Which of the following steps will you take to apply Zend_View? Each correct answer represents a part of the solution. Choose all that apply.
You want to record the raw log data received in an array exposed as a public property. Which of the following will you use to accomplish the task?
You have created a table based on the following data:
EmpID NUMBER (5) PRIMARY KEYEmpName VARCHAR2 (35) NOT NULL Salary NUMBER (9, 2) NOT NULL CommissionNUMBER (4, 2) ManagerName VARCHAR2 (25) ManagerID NUMBER (5) Now, you wantto display the names of employees and their managers, using a self join.
Which of the following SQL statements can you use to accomplish this? Each correct answer represents a complete solution. Choose two.
You want to retrieve all the data from any given table. You also want to ensure that no duplicate values are displayed. Which of the following SQL statements will you use to accomplish the task?
Fill in the blank with the appropriate term. __________is used to implement a classic Two-Step View pattern that allows a user to wrap the application content within another view.
Fill in the blank with the appropriate method name. The__________ method is used to send an email in the HTML format.
Write the appropriate word to complete the sentence below. ___________is used for logging of multiple backends, formatting messages which are sent to the log, and filtering those messages, which should not be logged.
You run the following PHP script:
< ?php include("xml.inc");
if (!$dom = domxml_open_mem($xmlstr)) {
echo "Error while parsing the XML document \n";
exit;
}
$a = **********
print_r($a);
? >
Which of the following functions will you use instead of * if you want to print the root element of the XML file?
Consider the PHP program (which includes a file specified by request):
< ?php
$color = 'blue';
if (isset( $_GET['COLOR'] ) )
$color = $_GET['COLOR'];
require( $color . '.php' );
? >
< form method="get" >
< select name="COLOR" >
< option value="red" > red < /option >
< option value="blue" > blue < /option >
< /select >
< input type="submit" >
< /form >
A malicious user injects the following command:
/vulnerable.php?COLOR=C:\\notes.txt%00
Where vulnerable.php is a remotely hosted file containing an exploit. What does the malicious user want to do?
Which of the following code snippets will you use if you want to connect to a Pop3 server using TLS?
Which of the following will NOT display the value of $debug_variable? Each correct answer represents a complete solution. Choose all that apply.
Fill in the blank with the appropriate method name. ________is a method to create REST server.
Which of the following joins retrieves all rows from one table and only the matching rows from the joined table?
Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy call?
You run the following PHP script:
< ?php
$name = mysql_real_escape_string($_POST["name"]);
$password = mysql_real_escape_string($_POST["password"]);
? >
What is the use of the mysql_real_ escape_string() function in the above script. Each correct answer represents a complete solution. Choose all that apply.
You want a formatted date for an RSS feed. Which of the following code syntaxes will you use to accomplish the task?
Which of the following is the temp late layer, where all the HTML rendering takes place, and where everything to be displayed to a user is assembled?
Which of the following code snippets will you use to create an index in Zend_Search_Lucene?
1. < ?php
2. ?????????????
3. ?????????????
4. $Search_Doc - > addField(Zend_Search_Lucene_Field::Text('url', $docUrl));
5. $Search_Doc - > addField(
6. Zend_Search_Lucene_Field::UnStored(
7. 'contents',
8. $docContent
9. )
10. );
11. $index- > addDocument($Search_Doc);
Martin works as a Database Administrator for MTech Inc. He designs a database that has a table named Products. He wants to create a report listing different product categories. He does not want to display any duplicate row in the report. Which o f the following SELECT statements will Martin use to create the report?
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.
Which of the following types of content is expected by Zend_Rest_Client when using a RESTservice?
Consider the following script:
< html >
< head >
< title >
This is a test script.
< /title >
< /head >
< body >
< ?php
echo 'This is some sample text';
? >
< /body >
< /html >
Which of the following tags is used in the php script?
Fill in the blank with the appropriate PHP function. The___________ function is used to return the sum of the values of every entry within an array.
Which of the following are the valid methods of the Zend_Date class? Each correct answer represents a complete solution. Choose all that apply.
Which of the following is an abstract class that is used to provide the basic interface and functionality required by the helper broker?
Which of the following error constants gives all errors and warnings, except the E_STRICTerror level?
You are using a database named HumanResource. You have to delete some tables from the database using SQL statements. Which of the following statements will you use to accomplish the task?
Which of the following methods of Zend_Auth returns TRUE if and only if the result represents a successful authentication attempt?
Which of the following functions is the best choice to retrieve the fingerprint of a string?
Which of the following retrieves the request URI, path, $_GET & $_POST parameters, etc. and tracks whether an action has been dispatched via Zend_Controller_Dispatcher?
Which of the following is the method that is used to check whether the version required for running the application exists or not?