Tuesday, 1 December 2015

Accp (pro) HDSE I Comprehensive Exam Part 2

1.   Which of the following attribute is used to define types or members of types that should no longer be used?
a.      Conditional
b.      Optional
c.    Obsolete
d.      Win32 apl
2.   ______________ Assemblies are used for storing localized data.
a.      Local
b.    Satellite
c.       Reflection
3.   Which of the following is the ability to discover the composition of a type at runtime?
a.      Local
b.      Satellite
c.    Reflection
4.   Which of the following method of the textwriter class release any system resources that are consumed by the object?
a.    Dispose
b.      Close
c.       Flush
d.       File
5.   Which of the following method of the textwriter class closes the textwriter and release the system resources?
a.      Dispose
b.    Close
c.       Flush
d.      File
6.   The timer class is available in which of the following namespace?
a.      System
b.    System threading
c.       Thread
d.      System thread
7.   Which of the following class allow the user to split a single class into multiple source code .cs file?
a.      Generics
b.      Iterators
c.    Partial
d.      Anonymous
8.   The ______________________ is the server management console that is used for opening data connections logging on to server and exploring database and system services?
a.      Toolbox  window
b.      Solution explorer
c.    Server explorer
d.      Visual studio 2005
9.    Which of the following data types range is _128 to127?
a.    Sbyte
b.      Ushort
c.       Unit
d.      All of the above
10.               The output methods, console .read and console .readline are used to display the output on the console?
a.      True
b.    False
11.               Which of the following are the types of boxing?
a.    Implicit boxing
b.    Explicate boxing
c.       Custom boxing
d.      All of the above
12.               The.net framework platform is based on which of the following basic technologies?
a.      Extensible markup language
b.      Msil code
c.       The suite of internet protocols
d.    All of the above
13.               Which of the following are the key feature of xml?
a.    It separated actual data from presentation
b.      It provide a away for data to be distributed to a variety of devices
c.       It lock information to prevent editing
d.      All of the above
14.               Which of the following is correct about assemblies?
a.      It is a logical collection of all files governed by a  manaifest
b.      It a minimum unit of deployment
c.       It’s a manimum unit of security
                                                              i.      1,2
                                                            ii.      2,3
                                                          iii.      1,3
                                      iv.    1,2,3
15.               Which of the following charateristics of a transction make sure that the entire sequence of the action must be either completed or aborted?
a.      atoimicity
b.      consistency
c.       isolation
d.    durability
16.               The row updating events of the data adapter occur during ___________ method before the command to update a row is executed against the data source?
a.    Updata
b.      Create
c.       Destroy
d.      Row data
17.               The isolution level property of the transactionoption    structure is used to change the default isolation level?
a.      TRUE
b.    FALSE
18.               ______________property of the sqlbulk copy column mapping class retrieves the integer value of the source column index.
a.      Source column
b.    Sourse ordinal
c.       Destination column
d.      Destination ordinal
19.               Mars enable multiple active result sets to exist at the same time in a given connection?
a.    True
b.      False
20.               Which of the following class of the system net. Mail. Name space is not used commonly?
a.      Alternate view
b.      Smtpfailed recipient exception
c.       Smtppermission
d.    None of the above
21.               Which of the following method sends a message and a does not block the calling thread?
a.    Send asyne()
b.       Sendasyne cancel()
c.       Send thread()
d.      None of the above
22.               WHICH of the following is not a property of the web header collection class?
a.      Allkeys
b.      Count
c.       Item
d.    None of the above
23.               Which of the following class of the system.security .principle namespace specific the generic user?
a.    Generic identity
b.      Generic principle
c.       Generic user
d.      All of the above
24.                The system.security.principle. Namespace provide classes and interfaces to implement role based security?
a.    True
b.      False
25.               A channel is an object that enables communication between a client and a remotes object across application domains?
a.    True
b.      False
26.               Which of the following control acts as a container control in which child controls are added are a dynamically repositioned to flow in a particular direction?
a.    Flowlayoutpanel
b.      Tablelayoutpanel
c.       Marslayoutpanel
d.      Dynamiclayoutpanel
27.               Which of the following methods of web header collection class retrieves the name of the header at a particular position in the collection?
a.    Getkey()
b.      Getheader()
c.       Remove()
d.      All of the above
28.               System.net.sockets namespace contain the necessary classed for effective communication between the two points?
a.      True
b.    False
29.               __________Methods is used to send mails asynchronously?
a.    Sendasyne()
b.      Sendsyne()
c.       Asynesend()
d.      Synesend()
30.               Which of the following classes provide implementati0on for representing a window user account?
a.    Window identity
b.      Windows principle
c.       Window user
d.      All of the above
31.               TCP and HTTP channels are commonly used for creating communication channels in a remoting system and NET provides relevant classes to create and work with 6these channel?
a.    True
b.      False
32.                Which of the following property of the controls class return false it the current thread is the one that create the control and so special invoke is required to use the control?
a.      Invokerequired
b.      Parent control
c.       Special invoke
d.    None of the above
33.               Which of the following property of table layout panel specifies or retrieves the control border that are docked to the table layout panel control and detetrmines   how the control resized in the table layout panel control?
a.    Controls
b.      Dock
c.       Border style
d.      All of the above
34.               Which of the following technologies support distributed application development?
a.      XML Web services
b.      Remoting
c.       CLR
                                         i.    1,2
                                                            ii.      2,3
                                                          iii.      1,3
                                                           iv.      1,2,3
35.               Which of the following are the features of the remoting?
a.      Flexibility
b.       Fidelity
c.       Administration
d.      Error free
                                         i.    1,2,3
                                                            ii.      2,3,4
                                                          iii.      1,3,4
                                                           iv.      1,2,3,4
36.               Which of the following are the TCP channel classes?
a.      Tcp server channel
b.      Tcp client channel
c.       Tcp channel
                                                              i.      1,2
                                       ii.    2,3
                                                          iii.      1,3
                                                           iv.      1,2,3
37.               Which of the following are the runtime security policy?
a.      Increase assembly trust
b.      Adjust zone security
c.       Evaluate assembly
d.      Create deployment package
                                                              i.      1,2,3
                                                            ii.      2,3,4
                                                          iii.      1,2,4
                                      iv.    1,2,3,4
38.               ____________ Isolation level is used if an application does not absolute accuracy of data and if the application needs to complete database operation as quickly as possible?
a.      Read uncommitted
b.      Read committed with locking
c.    Read committed with snapshots
d.      Repeatable read
39.               _____________ Isolation level is used if an application requires absolute accuracy for long_running multiple –statement transaction but does not plan to modify the data?
a.      Snapshot
b.      Read committed with locking
c.    Serializable
d.      Repeatable read
40.               Which of the following objects can be stored in a database it typically contain textual information such as comma_seprated text or XML documents?
a.      Binary large object
b.    Character large objects
c.       Large value data object
d.      All of the above

No comments:

Post a Comment