1. Which of the following attribute is used to define types or
members of types that should no longer be used?
a. Conditional
b. Optional
c.
Obsolete
d. Win32 apl
2. ______________ Assemblies are used for storing localized data.
a. Local
b.
Satellite
c. Reflection
3. Which of the following is the ability to discover the composition
of a type at runtime?
a. Local
b. Satellite
c.
Reflection
4. Which of the following method of the textwriter class release any system
resources that are consumed by the object?
a.
Dispose
b. Close
c. Flush
d. File
5. Which of the following method of the textwriter class closes the
textwriter and release the system resources?
a. Dispose
b.
Close
c. Flush
d. File
6. The timer class is available in which of the following namespace?
a. System
b.
System
threading
c. Thread
d. System
thread
7. Which of the following class allow the user to split a single
class into multiple source code .cs file?
a. Generics
b. Iterators
c.
Partial
d. Anonymous
8. The ______________________ is the server management console that
is used for opening data connections logging on to server and exploring
database and system services?
a. Toolbox window
b. Solution
explorer
c.
Server
explorer
d. Visual
studio 2005
9. Which of the following data
types range is _128 to127?
a.
Sbyte
b. Ushort
c. Unit
d. All of the
above
10.
The output
methods, console .read and console .readline are used to display the output on
the console?
a. True
b.
False
11.
Which of the
following are the types of boxing?
a.
Implicit
boxing
b.
Explicate
boxing
c. Custom
boxing
d. All of the
above
12.
The.net
framework platform is based on which of the following basic technologies?
a. Extensible
markup language
b. Msil code
c. The suite of
internet protocols
d.
All
of the above
13.
Which of the
following are the key feature of xml?
a.
It
separated actual data from presentation
b. It provide a
away for data to be distributed to a variety of devices
c. It lock
information to prevent editing
d. All of the
above
14.
Which of the
following is correct about assemblies?
a. It is a
logical collection of all files governed by a
manaifest
b. It a minimum
unit of deployment
c. It’s a
manimum unit of security
i.
1,2
ii.
2,3
iii.
1,3
iv. 1,2,3
15.
Which of the
following charateristics of a transction make sure that the entire sequence of
the action must be either completed or aborted?
a. atoimicity
b. consistency
c. isolation
d.
durability
16.
The row updating
events of the data adapter occur during ___________ method before the command
to update a row is executed against the data source?
a.
Updata
b. Create
c. Destroy
d. Row data
17.
The
isolution level property of the transactionoption structure is used to change the default
isolation level?
a. TRUE
b.
FALSE
18.
______________property
of the sqlbulk copy column mapping class retrieves the integer value of the
source column index.
a. Source
column
b.
Sourse
ordinal
c. Destination
column
d. Destination
ordinal
19.
Mars enable
multiple active result sets to exist at the same time in a given connection?
a.
True
b. False
20.
Which of the
following class of the system net. Mail. Name space is not used commonly?
a. Alternate
view
b. Smtpfailed
recipient exception
c. Smtppermission
d.
None
of the above
21.
Which of the
following method sends a message and a does not block the calling thread?
a.
Send
asyne()
b. Sendasyne cancel()
c. Send
thread()
d. None of the
above
22.
WHICH of the
following is not a property of the web header collection class?
a. Allkeys
b. Count
c. Item
d.
None
of the above
23.
Which of the
following class of the system.security .principle namespace specific the
generic user?
a.
Generic
identity
b. Generic principle
c. Generic user
d. All of the
above
24.
The system.security.principle. Namespace
provide classes and interfaces to implement role based security?
a.
True
b. False
25.
A channel is
an object that enables communication between a client and a remotes object
across application domains?
a.
True
b. False
26.
Which of the
following control acts as a container control in which child controls are added
are a dynamically repositioned to flow in a particular direction?
a.
Flowlayoutpanel
b. Tablelayoutpanel
c. Marslayoutpanel
d. Dynamiclayoutpanel
27.
Which of the
following methods of web header collection class retrieves the name of the
header at a particular position in the collection?
a.
Getkey()
b. Getheader()
c. Remove()
d. All of the
above
28.
System.net.sockets
namespace contain the necessary classed for effective communication between the
two points?
a. True
b.
False
29.
__________Methods
is used to send mails asynchronously?
a.
Sendasyne()
b. Sendsyne()
c. Asynesend()
d. Synesend()
30.
Which of the
following classes provide implementati0on for representing a window user
account?
a.
Window
identity
b. Windows
principle
c. Window user
d. All of the
above
31.
TCP and HTTP
channels are commonly used for creating communication channels in a remoting
system and NET provides relevant classes to create and work with 6these
channel?
a.
True
b. False
32.
Which of the following property
of the controls class return false it the current thread is the one that create
the control and so special invoke is required to use the control?
a. Invokerequired
b. Parent
control
c. Special
invoke
d.
None
of the above
33.
Which of the
following property of table layout panel specifies or retrieves the control
border that are docked to the table layout panel control and detetrmines how the control resized in the table layout
panel control?
a.
Controls
b. Dock
c. Border style
d. All of the
above
34.
Which of the
following technologies support distributed application development?
a. XML Web
services
b. Remoting
c. CLR
i. 1,2
ii.
2,3
iii.
1,3
iv.
1,2,3
35.
Which of the
following are the features of the remoting?
a. Flexibility
b. Fidelity
c. Administration
d. Error free
i. 1,2,3
ii.
2,3,4
iii.
1,3,4
iv.
1,2,3,4
36.
Which of the
following are the TCP channel classes?
a. Tcp server
channel
b. Tcp client
channel
c. Tcp channel
i.
1,2
ii. 2,3
iii.
1,3
iv.
1,2,3
37.
Which of the
following are the runtime security policy?
a. Increase
assembly trust
b. Adjust zone
security
c. Evaluate assembly
d. Create
deployment package
i.
1,2,3
ii.
2,3,4
iii.
1,2,4
iv. 1,2,3,4
38.
____________
Isolation level is used if an application does not absolute accuracy of data
and if the application needs to complete database operation as quickly as
possible?
a. Read
uncommitted
b. Read
committed with locking
c.
Read
committed with snapshots
d. Repeatable
read
39.
_____________
Isolation level is used if an application requires absolute accuracy for
long_running multiple –statement transaction but does not plan to modify the
data?
a. Snapshot
b. Read
committed with locking
c.
Serializable
d. Repeatable
read
40.
Which of the
following objects can be stored in a database it typically contain textual
information such as comma_seprated text or XML documents?
a. Binary large
object
b.
Character
large objects
c. Large value
data object
d. All of the
above
No comments:
Post a Comment