Question
a.
In integer form
b.
In string form
c.
In boolean form
d.
None of them
Posted under PHP
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Secure ( ) argument in setcookie function returns result
Similar Questions
Discover Related MCQs
Q. In PHP4.1 and later versions, cookies name/value pair are added to the
View solution
Q. Php.ini file can be viewable by calling
View solution
Q. Which two predefined variables are used to retrieve information from forms?
View solution
Q. The attack which involves the insertion of malicious code into a page frequented by other users is known as..
View solution
Q. When you use the $_GET variable to collect data, the data is visible to..
View solution
Q. When you use the $_POST variable to collect data, the data is visible to..
View solution
Q. Which variable is used to collect form data sent with both the GET and POST methods?
View solution
Q. Which one of the following should not be used while sending passwords or other sensitive information?
View solution
Q. Which function is used to remove all HTML tags from a string passed to a form?
View solution
Q. To validate an email address, which flag is to be passed to the function filter_var()?
View solution
Q. How many validation filters like FILTER_VALIDATE_EMAIL are currently available?
View solution
Q. How many predefined variables does PHP use to authenticate a user?
View solution
Q. Which of the following variables does PHP use to authenticate a user?
i) $_SERVER[‘PHP_AUTH_USER’].
ii) $_SERVER[‘PHP_AUTH_USERS’].
iii) $_SERVER[‘PHP_AUTH_PU’].
iv) $_SERVER[‘PHP_AUTH_PW’].
View solution
Q. Which of the following PHP function is commonly used when handling authentication via PHP?
i) header()
ii) footer()
iii) inset()
iv) isset()
View solution
Q. Which function is used to verify whether a variable contains a value?
View solution
Q. Which of the following are types of PHP authentication implementation methodologies?
i) Hard-coding a login pair directly into the script
ii) File-based authentication
iii) Data-based authentication
iv) PEAR’S HTTP authentication
View solution
Q. In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment.
View solution
Q. The authenticationFile.txt, the file which stores username and password should be stored ___ the server document root.
View solution
Q. Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator?
View solution
Q. In which of the following situations does file-based authentication become inconvenient.
i) small list
ii) large number of user
iii) users are being regularly added
iv) static authentication
View solution
Suggested Topics
Are you eager to expand your knowledge beyond PHP? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!