1. Which of the following are the advantages of creating managed code
objects?
a.
Performance
and Scalability
b.
Enhanced
programing model
c.
Enhanced
safety and security
d.
Common
development environment
2. Can you identify the correct order of steps to create a thread?
a. Define a
class
b. Create one
or more thread objects in the new class
c. Define a
method inside the class
d. Create one
or more objects of the class in a new class
e. Start the
execution of the threads
i.
1 , 4 , 3 , 2 , 5
ii.
1 , 2 , 3 , 4 , 5
iii. 1 , 3 , 4 , 2 , 5
iv.
1 , 3 , 2 , 4 , 5
3. Which of the following statement about the method of file class
are correct?
a. The Get
Creation time method is used to verify whether a file with the specified name
exists in the specified path
b.
The
create method is used to create a file in the specified path.
c.
The
delete method is used to delete a file from a specified path.
d.
The
Get attributes method is used to get the file attributes of the file.
4. _____________ and ________________ are XML classes that provide
support for reading and writing XML.
a. Xml Read , Xml
write
b. Reader ,
Writer
c.
Xml
Reader , Xml Writer
d. Read Xml ,
Write Xml
5. You can use ________________ to perform sorting on XML data.
a. XML Schemas
b. XQuery
c. DTD
d.
Sort()
6. To invoke a COM component from, NET, you require a ______________
.
a.
COM
Callable Wrapper
b. DLL Wrapper
c. Assembly
Wrapper
d. Runtime
Callable Wrapper
7. The _______________ class provide static method for the creation, coping,
deletion, moving and opening of file.
a. Binary
reader
b. Binary
Writer
c.
File
d. File Info
8. C# programing language provide the user with an altogether
separate namespace called ____________ for file and stream handling.
a. System. UI
b. System. API
c.
System.
IO
d. System.
InputOutput
9. ______________can be implied simply as a collection of information
existing in binary form in a portable Executable file or a .NET assembly.
a.
Assembly
MetaData
b. Type
Metadata
c. MSIL Code
d. Resources
10.
An _______________ is a collection of
information required by the runtime to execute an application.
a. Assembly
b. Attribute
c. Expression
d.
Metadata
11.
The C# ________________ attribute allows you
to invoke unmanaged code in a C# programs.
a. Built-in
b. Custom
c. Conditional
d.
DIIImport
12.
The C#
________________ attribute allows you to control whether a method should be
called.
a. Built-in
b. Custom
c.
Conditional
d. DIIImport
13.
A channel is an object that enables
communication between a client and a remote object across application domains.
a.
True
b. False
14.
Advanced
technologies in windows forms using which of the following are the features of
Remoting?
a. Flexibility
b. Fidelity
c. Administration
d. Error Free
i. 1 , 2 , 3
ii.
2 , 3 , 4
iii.
1 , 3 , 4
iv.
1 , 2 , 3 , 4
15.
The System.
Security. Principle namespace provide classes and interfaces to implement
role-based security.
a.
True
b. False
16.
Which of the
following class of the system. Security. Principle namespace specifies the
generic user?
a.
GenericIdentity
b. GenericPrinciple
c. GenericUser
d. All of the
above.
17.
Which of the
following classes of the system. Net. Mail namespace is not used commonly?
a. Alternate
View
b. Smtp Failed
Recipient Exception
c. Smtp Permission
d.
None
of the above
18.
MARS enables
multiple active result sets to exist at the same time in a given connection.
a.
True
b. False
19.
____________________
Property of the Sql. Bulk copy column mapping Class retrieves the integer value
of the source column index.
a. Source
Column
b.
Source
Ordinal
c. Destination
Column
d. Destination
Ordinal
20.
The
Isolation level property of the transaction Option Structure is used to change
the default isolation level.
a.
True
b. False
21.
The Row
Updating event of the data Adapter occurs during the _________________ method,
before the command to update a row is executed against the data source.
a.
Update()
b. Create()
c. Destroy()
d. Row Update()
22.
Identify the
situation in which transaction can be used.
a. Record are
changed in data bases present in different servers.
b. Changes to a
single table need to reflect in multiple tables.
c. Multiple
rows are modified as a single unit.
d. Multiple
data bases are updated concurrently.
i.
1 , 2 , 3 , 4
ii. 2 , 3
iii.
1 , 3 , 4
iv.
1 , 2
23.
Given the following code to send an e-mail.
Which of the following option can be replaced at line 4?
c. // insert
code here
d. Client
credentials =CredentialCache.DefulateNetworkCredentials;
e. Client
send(message);
i.
Smtpclient client =new
smtpclient(http;//10.1.1.10);
ii. Smtpclient client =new smtpclient();
iii.
Smtpclient emailclient =new
smtpclient(server);
iv.
Smtpclient client =new
smtpclient(server);
24.
Which one of
the following isolation levels causes the tables used in transaction to be
locked?
a.
Read
committed
b. Read
uncommitted
c. Repeatable
read
d. Serializable
25.
You want to
associate IsMouseOverProperty property to a trigger named my trigger in the
control named usercontrol1. Which one of the following codes will help you to
achieves this?
a. Trigger my
trigger; My trigger .value =usercontrol1. IsMouseOverProperty;
b. Trigger my
trigger; My trigger=usercontrol1. IsMouseOverProperty;
c. Trigger my
trigger; My trigger. Property value= usercontrol1.IsMouseOverProperty;
d. Trigger my
trigger; My trigger property =usercontrol1.IsMouseOverProperty;
26.
Which of the
following statements regarding internationalization are correct?
a. A globalized
application supports localized user interface and data of the region for all
users.
b. Globalization
means formatting existing data with respect to the current culture settings.
c. Localization
refers to retrieving appropriate data based on the culture.
d. Culture
indicate the cultural information about the country or region in which the
application is deployed.
i.
1 , 3 , 4
ii.
1 , 2 , 3
iii.
2 , 3
iv. 1 , 2 , 3 , 4
27.
______________
Parameters are used when the data is sent to database through a parameterized
query.
a. Output
b. InputOutput
c.
Input
d. Submit
28.
___________ And
________________ methods allow changes made to a data table to be accepted or
rejected respectively.
a. Commit, Drop
b.
AcceptChanges,
RejectChanges.
c. Accept,
Remove
d. Accept,
Reject
29.
Identify the
object that consists of column and rows that are accessible through the
DataColumn and DataRow classes respectively.
a. DataRelation
b.
DataTable
c. DataView
d. DataClass
30.
Which of a
dataAdapter class determines the action to be taken by an application when it
tries to fill data into Dataset or dataTable and there is no matching table or
column?
a.
MissingMappingAction
b. MissingDataAdapter
c. MissingAction
d. MissingNewRows
31.
The .NET
framework supports extension object by using the_____________ class.
a. XslCompiledTransform
b. XmlSecureResolver
c. System.Xml.Xslt
d.
XsltArgumentList
32.
If an
application does not require absolute accuracy of data and if the application
needs to complete database operation as quickly as possible_______________
isolation level can be used.
a. Repeatable
Read
b.
Read
Uncommitted
c. Read
Rollback
d. Read
committed with Snapshots
33.
______________
is a language for transforming the structure and content of an XML document.
a. HTML
b.
XSLT
c. XML
d. XSL
34.
A
____________ node in the Xpath data model can have only element, processing
instruction, comments, and text nodes as child nodes.
a. Attribute
b. Text
c. Comments
d.
Documents
35.
Which of the
following statement are true about multiple active result sets (MARS)?
a. It enables
you to use a database connection to generate multiple result sets
simultaneously
b. It allow you
to initiate a data access operation, continue with other application tasks, and
invoke the end method later to complete the operation.
c. It enables
you to perform bulk copy operation in a .NET Framework application.
d. It does not
support concurrent command execution; it merely enables commands to execute in
an interleaved manner.
i.
Statement 1 & Statement 2
ii.
Statement 2 & statement 4
iii. Statement 1 & statement 4
iv.
All are true
36.
Large object
(LOB) and character Large object (CLOB) values that exceed _____________ in
size require special handling when writing them to the database.
a. 4000 bytes
b. 6000 bytes
c.
8000
bytes
d. 10000 bytes
37.
____________
Isolation level is used if an application require absolute accuracy for a long
running transaction that performs a qualified query to retrieve multiple rows.
a. Snapshots
b. Repeatable
read
c.
Serializable
d. Read
Uncommitted
38.
Which
property of the relevant data adapter object enables you to configure the
number of rows that are include in each Bach?
a. Multiple
active result Sets (MARS)
b.
Batch
Dataset updates
c. Asynchronous
Operation using SqlCommand class
d. Bulk data
copies