adplus-dvertising
frame-decoration

Question

Session_unset ( ) takes

a.

1 argument

b.

2 arguments

c.

3 arguments

d.

No argument

Answer: (d).No argument

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Session_unset ( ) takes

Similar Questions

Discover Related MCQs

Q. HTTP protocols by which browsers talk to a web server is

Q. Meaning of superglobal arrays is it can be

Q. Secure ( ) argument in setcookie function returns result

Q. In PHP4.1 and later versions, cookies name/value pair are added to the

Q. Php.ini file can be viewable by calling

Q. Which two predefined variables are used to retrieve information from forms?

Q. The attack which involves the insertion of malicious code into a page frequented by other users is known as..

Q. When you use the $_GET variable to collect data, the data is visible to..

Q. When you use the $_POST variable to collect data, the data is visible to..

Q. Which variable is used to collect form data sent with both the GET and POST methods?

Q. Which one of the following should not be used while sending passwords or other sensitive information?

Q. Which function is used to remove all HTML tags from a string passed to a form?

Q. To validate an email address, which flag is to be passed to the function filter_var()?

Q. How many validation filters like FILTER_VALIDATE_EMAIL are currently available?

Q. How many predefined variables does PHP use to authenticate a user?

Q. Which of the following variables does PHP use to authenticate a user?

i) $_SERVER[‘PHP_AUTH_USER’].
ii) $_SERVER[‘PHP_AUTH_USERS’].
iii) $_SERVER[‘PHP_AUTH_PU’].
iv) $_SERVER[‘PHP_AUTH_PW’].

Q. Which of the following PHP function is commonly used when handling authentication via PHP?

i) header()
ii) footer()
iii) inset()
iv) isset()

Q. Which function is used to verify whether a variable contains a value?

Q. Which of the following are types of PHP authentication implementation methodologies?

i) Hard-coding a login pair directly into the script
ii) File-based authentication
iii) Data-based authentication
iv) PEAR’S HTTP authentication

Q. In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment.