Which of the following filtering techniques prevents cross-site scripting (XSS) vulnerabilities?
Which of the following statements is NOT true?
a) Class constants are public
b) Class constants are being inherited
c) Class constants can omit initialization (default to NULL)
d) Class constants can be initialized by consts
What is the return value of the following code?
strpos("me myself and I", "m", 2)
What is the content of $c after the following code has executed?
$a = 2;
$b = 3;
$c = ($a++ * ++$b);
What super-global should be used to access information about uploaded files via a POST request?
Identify the security vulnerability in the following example:
1 <?php
2 echo "Welcome, {$_POST['name']}.";
3 ?>
You are creating an application that generates invoices in a variety of formats, including PDF, ODS and HTML. Each of these formats is represented as a PHP class in your application. While some of the operations can be performed on all of the different formats (such as saving and loading), other operations may be specific to one or two of the formats (such as setting as read only). Which design pattern should you use for this application?
Can calls to Web Services be queued natively in PHP?
Which 2.17of the following formats is used to describe web services?
How can precisely one byte be read from a file, pointed by $fp? (Choose 2)