adplus-dvertising
frame-decoration

Question

Secure ( ) argument in setcookie function returns result

a.

In integer form

b.

In string form

c.

In boolean form

d.

None of them

Posted under PHP

Answer: (c).In boolean form

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Secure ( ) argument in setcookie function returns result

Similar Questions

Discover Related MCQs

Q. In PHP4.1 and later versions, cookies name/value pair are added to the

Q. Php.ini file can be viewable by calling

Q. Which two predefined variables are used to retrieve information from forms?

Q. The attack which involves the insertion of malicious code into a page frequented by other users is known as..

Q. When you use the $_GET variable to collect data, the data is visible to..

Q. When you use the $_POST variable to collect data, the data is visible to..

Q. Which variable is used to collect form data sent with both the GET and POST methods?

Q. Which one of the following should not be used while sending passwords or other sensitive information?

Q. Which function is used to remove all HTML tags from a string passed to a form?

Q. To validate an email address, which flag is to be passed to the function filter_var()?

Q. How many validation filters like FILTER_VALIDATE_EMAIL are currently available?

Q. How many predefined variables does PHP use to authenticate a user?

Q. Which of the following variables does PHP use to authenticate a user?

i) $_SERVER[‘PHP_AUTH_USER’].
ii) $_SERVER[‘PHP_AUTH_USERS’].
iii) $_SERVER[‘PHP_AUTH_PU’].
iv) $_SERVER[‘PHP_AUTH_PW’].

Q. Which of the following PHP function is commonly used when handling authentication via PHP?

i) header()
ii) footer()
iii) inset()
iv) isset()

Q. Which function is used to verify whether a variable contains a value?

Q. Which of the following are types of PHP authentication implementation methodologies?

i) Hard-coding a login pair directly into the script
ii) File-based authentication
iii) Data-based authentication
iv) PEAR’S HTTP authentication

Q. In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment.

Q. The authenticationFile.txt, the file which stores username and password should be stored ___ the server document root.

Q. Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator?

Q. In which of the following situations does file-based authentication become inconvenient.

i) small list
ii) large number of user
iii) users are being regularly added
iv) static authentication