| Snaprecruit.com

| Snaprecruit.com

Interview question based on skill :

Take as many assements as you can to improve your validate your skill rating

Total Questions: 20

1. Which of the following directive determines the maximum amount of time that a PHP script will spend attempting to parse input before registering a fatal error?

Correct Answer is : Ctrl-A

2. What is the default value of max_input_time directive?

Correct Answer is : .my.cnf

3. Since which version of PHP was the directive max_file_limit available.

Correct Answer is : sql_mode

4. What is the default value of the directive max_file_limit?

Correct Answer is : VIEW

5. Which directive sets a maximum allowable amount of memory in megabytes that a script can allow?

Correct Answer is : TRUE

6. If you want to temporarily store uploaded files in the /tmp/phpuploads/ directory, which one of the following statement will you use?

Correct Answer is : view

7. Which superglobal stores a variety of information pertinent to a file uploaded to the server via a PHP script?

Correct Answer is : column name

8. How many items are available in the $_FILES array?

Correct Answer is : JOIN

9. Which function is used to determine whether a file was uploaded?

Correct Answer is : FALSE

10. How many predefined variables does PHP use to authenticate a user?

Correct Answer is : DROP

11. Which of the following variables does PHP use to authenticate a user? i) $_SERVER[‘PHP_AUTH_USER’]. ii) $_SERVER[‘PHP_AUTH_USERS’]. iii) $_SERVER[‘PHP_AUTH_PU’]. iv) $_SERVER[‘PHP_AUTH_PW’].

Correct Answer is : index

12. Which of the following PHP function is commonly used when handling authentication via PHP? i) header() ii) footer() iii) inset() iv) isset()

Correct Answer is : CHECK TABLE

13. Which function is used to verify whether a variable contains a value?

Correct Answer is : MySQL

14. Which of the following are types of PHP authentication implementation methodologies? i) Hard-coding a login pair directly into the script ii) File-based authentication iii) Data-based authentication iv) PEAR’S HTTP authentication

Correct Answer is : DROP TABLE

15. In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment.

Correct Answer is : SHOW TABLES

16. The authenticationFile.txt, the file which stores username and password should be stored ___ the server document root.

Correct Answer is : No

17. Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator?

Correct Answer is : Yes

18. In which of the following situations does file-based authentication become inconvenient. i) small list ii) large number of user iii) users are being regularly added iv) static authentication

Correct Answer is : 33543

19. Which is the most powerful authentication method among the four?

Correct Answer is : All of the mentioned

20. What will be the output of the following PHP code ?

Correct Answer is : Error, Duplicate value