Tuesday, 1 December 2015

Accp (pro) HDSE I Comprehensive Exam Part 3

1.   Which of the following are the advantages of creating managed code objects?
a.    Performance and Scalability
b.    Enhanced programing model
c.    Enhanced safety and security
d.    Common development environment
2.   Can you identify the correct order of steps to create a thread?
a.      Define a class
b.      Create one or more thread objects in the new class
c.       Define a method inside the class
d.      Create one or more objects of the class in a new class
e.      Start the execution of the threads
                                                              i.      1 , 4 , 3 , 2 , 5
                                                            ii.      1 , 2 , 3 , 4 , 5
                                      iii.    1 , 3 , 4 , 2 , 5
                                                           iv.      1 , 3 , 2 , 4 , 5
3.    Which of the following statement about the method of file class are correct?
a.      The Get Creation time method is used to verify whether a file with the specified name exists in the specified path
b.    The create method is used to create a file in the specified path.
c.    The delete method is used to delete a file from a specified path.
d.    The Get attributes method is used to get the file attributes of the file.
4.   _____________ and ________________ are XML classes that provide support for reading and writing XML.
a.      Xml Read , Xml write
b.      Reader , Writer
c.    Xml Reader , Xml Writer
d.      Read Xml , Write Xml
5.   You can use ________________ to perform sorting on XML data.
a.      XML Schemas
b.      XQuery
c.       DTD
d.    Sort()
6.   To invoke a COM component from, NET, you require a ______________ .
a.    COM Callable Wrapper
b.      DLL Wrapper
c.       Assembly Wrapper
d.      Runtime Callable Wrapper
7.   The _______________ class provide static method for the creation, coping, deletion, moving and opening of file.
a.      Binary reader
b.      Binary Writer
c.    File
d.      File Info
8.   C# programing language provide the user with an altogether separate namespace called ____________ for file and stream handling.
a.      System. UI
b.      System. API
c.    System. IO
d.      System. InputOutput
9.   ______________can be implied simply as a collection of information existing in binary form in a portable Executable file or a .NET assembly.
a.    Assembly MetaData
b.      Type Metadata
c.       MSIL Code
d.      Resources
10.                An _______________ is a collection of information required by the runtime to execute an application.
a.      Assembly
b.      Attribute
c.       Expression
d.    Metadata
11.                The C# ________________ attribute allows you to invoke unmanaged code in a C# programs.
a.      Built-in
b.      Custom
c.       Conditional
d.    DIIImport
12.               The C# ________________ attribute allows you to control whether a method should be called.
a.      Built-in
b.      Custom
c.    Conditional
d.      DIIImport
13.                A channel is an object that enables communication between a client and a remote object across application domains.
a.    True
b.      False
14.               Advanced technologies in windows forms using which of the following are the features of Remoting?
a.      Flexibility
b.      Fidelity
c.       Administration
d.      Error Free
                                         i.    1 , 2 , 3
                                                            ii.      2 , 3 , 4
                                                          iii.      1 , 3 , 4
                                                           iv.      1 , 2 , 3 , 4
15.               The System. Security. Principle namespace provide classes and interfaces to implement role-based security.
a.    True
b.      False
16.               Which of the following class of the system. Security. Principle namespace specifies the generic user?
a.    GenericIdentity
b.      GenericPrinciple
c.       GenericUser
d.      All of the above.
17.               Which of the following classes of the system. Net. Mail namespace is not used commonly?
a.      Alternate View
b.      Smtp Failed Recipient Exception
c.       Smtp Permission
d.    None of the above
18.               MARS enables multiple active result sets to exist at the same time in a given connection.
a.    True
b.      False
19.               ____________________ Property of the Sql. Bulk copy column mapping Class retrieves the integer value of the source column index.
a.      Source Column
b.    Source Ordinal
c.       Destination Column
d.      Destination Ordinal
20.               The Isolation level property of the transaction Option Structure is used to change the default isolation level.
a.    True
b.      False
21.               The Row Updating event of the data Adapter occurs during the _________________ method, before the command to update a row is executed against the data source.
a.    Update()
b.      Create()
c.       Destroy()
d.      Row Update()
22.               Identify the situation in which transaction can be used.
a.      Record are changed in data bases present in different servers.
b.      Changes to a single table need to reflect in multiple tables.
c.       Multiple rows are modified as a single unit.
d.      Multiple data bases are updated concurrently.
                                                              i.      1 , 2 , 3 , 4
                                       ii.    2 , 3
                                                          iii.      1 , 3 , 4
                                                           iv.      1 , 2
23.                Given the following code to send an e-mail. Which of the following option can be replaced at line 4?
a.      MailMessage message =new MailMessage (“Vicky@hotmail.com
b.      Jstmith@hotmail.com”, “meeting schedule”, “the meeting will be held on 3. 15th march”);
c.       // insert code here
d.      Client credentials =CredentialCache.DefulateNetworkCredentials;
e.      Client send(message);
                                                              i.      Smtpclient client =new smtpclient(http;//10.1.1.10);
                                       ii.    Smtpclient client =new smtpclient();
                                                          iii.      Smtpclient emailclient =new smtpclient(server);
                                                           iv.      Smtpclient client =new smtpclient(server);
24.               Which one of the following isolation levels causes the tables used in transaction to be locked?
a.    Read committed
b.      Read uncommitted
c.       Repeatable read
d.      Serializable
25.               You want to associate IsMouseOverProperty property to a trigger named my trigger in the control named usercontrol1. Which one of the following codes will help you to achieves this?
a.      Trigger my trigger; My trigger .value =usercontrol1. IsMouseOverProperty;
b.      Trigger my trigger; My trigger=usercontrol1. IsMouseOverProperty;
c.       Trigger my trigger; My trigger. Property value= usercontrol1.IsMouseOverProperty;
d.      Trigger my trigger; My trigger property =usercontrol1.IsMouseOverProperty;
26.               Which of the following statements regarding internationalization are correct?
a.      A globalized application supports localized user interface and data of the region for all users.
b.      Globalization means formatting existing data with respect to the current culture settings.
c.       Localization refers to retrieving appropriate data based on the culture.
d.      Culture indicate the cultural information about the country or region in which the application is deployed.
                                                              i.      1 , 3 , 4
                                                            ii.      1 , 2 , 3
                                                          iii.      2 ,  3
                                      iv.    1 , 2 , 3 , 4
27.               ______________ Parameters are used when the data is sent to database through a parameterized query.
a.      Output
b.      InputOutput
c.    Input
d.      Submit
28.               ___________ And ________________ methods allow changes made to a data table to be accepted or rejected respectively.
a.      Commit, Drop
b.    AcceptChanges, RejectChanges.
c.       Accept, Remove
d.      Accept, Reject
29.               Identify the object that consists of column and rows that are accessible through the DataColumn and DataRow classes respectively.
a.      DataRelation
b.    DataTable
c.       DataView
d.      DataClass
30.               Which of a dataAdapter class determines the action to be taken by an application when it tries to fill data into Dataset or dataTable and there is no matching table or column?
a.    MissingMappingAction
b.      MissingDataAdapter
c.       MissingAction
d.      MissingNewRows
31.               The .NET framework supports extension object by using the_____________ class.
a.      XslCompiledTransform
b.      XmlSecureResolver
c.       System.Xml.Xslt
d.    XsltArgumentList
32.               If an application does not require absolute accuracy of data and if the application needs to complete database operation as quickly as possible_______________ isolation level can be used.
a.      Repeatable Read
b.    Read Uncommitted
c.       Read Rollback
d.      Read committed with Snapshots
33.               ______________ is a language for transforming the structure and content of an XML document.
a.      HTML
b.    XSLT
c.       XML
d.      XSL
34.               A ____________ node in the Xpath data model can have only element, processing instruction, comments, and text nodes as child nodes.
a.      Attribute
b.      Text
c.       Comments
d.    Documents
35.               Which of the following statement are true about multiple active result sets (MARS)?
a.      It enables you to use a database connection to generate multiple result sets simultaneously
b.      It allow you to initiate a data access operation, continue with other application tasks, and invoke the end method later to complete the operation.
c.       It enables you to perform bulk copy operation in a .NET Framework application.
d.      It does not support concurrent command execution; it merely enables commands to execute in an interleaved manner.
                                                              i.      Statement 1 & Statement 2
                                                            ii.      Statement 2 & statement 4
                                      iii.    Statement 1 & statement 4
                                                           iv.      All are true
36.               Large object (LOB) and character Large object (CLOB) values that exceed _____________ in size require special handling when writing them to the database.
a.      4000 bytes
b.      6000 bytes
c.    8000 bytes
d.      10000 bytes
37.               ____________ Isolation level is used if an application require absolute accuracy for a long running transaction that performs a qualified query to retrieve multiple rows.
a.      Snapshots
b.      Repeatable read
c.    Serializable
d.      Read Uncommitted
38.               Which property of the relevant data adapter object enables you to configure the number of rows that are include in each Bach?
a.      Multiple active result Sets (MARS)
b.    Batch Dataset updates
c.       Asynchronous Operation using SqlCommand class

d.      Bulk data copies