S. No.
Question
1
Which of the following does NOT help with mobile data security?
2
What is the full form of WSDL? Continue reading at https://www.trenovision.com/web-services-quiz/
3
Which of the following is a major role within the web service architecture?
4
What is the root element of all WSDL documents?
5
Which of the following associates the web service binding with the URI where the running service can be accessed?
6
Which element describes the data being exchanged between the web service providers and the consumers?
7
Which java tool is used to generate java artifacts from wsdl?
8
What is the Java API specification for web services using SOAP?
9
Which of the following describes how to access a web service and what operations it will perform?
10
Which of the following is an XML-based protocol for exchanging information via web services? Continue reading at https://www.trenovision.com/web-services-quiz/
11
How do you pass the information about a member to an operation?
12
Which segment contains information about different segments in the database?
13
A segment maps to ___ of the database
14
A client to web services
15
Web services are built on which framework?
16
UDDI is used for listing what ______ are available.
17
Which of the following is correct about Service Description layer in Web Service Protocol Stack?
18
In contrast, the contract-first approach encourages you to think of the service contract first in terms of
19
This XML extension is a standard way to describe how to transform the structure of an XML document into an XML document with a different structure.
20
This term encompasses the plans, methods, and tools aimed at modernizing,consolidating, and coordinating the computer applications in an enterprise.
21
This application program interface (API) from Sun Microsystems supports messaging between computers in a network.
22
This is a data structure representing a service type in a Universal Description, Discovery, and Integration registry.
23
This method ensures that each XML element type and attribute name has a unique identity.
24
This platform simplifies application development and decreases the need for programming and programmer training by creating standardized,reusable modular components.
25
This XML-based registry is intended as on online Internet registry for businesses worldwide.
26
This XML-based language is used to describe the services a business offers and to provide a way for individuals and other businesses to access those services electronically.
27
This lightweight protocol provides a way for programs to interact with each other, even if using different operating systems and located behind a firewall.
28
This markup language is considered to be extensible because of its unlimited and self-defining markup symbols.
29
If incremental aggregation option is checked in session properties will the new cache is created during every run
30
The two types of loading available in DWH are
31
In which mode of pmcmd, the username, password and server information are required for each command
32
Which transformations can be used for proceesing the records holding deptno 10 in an employee table
33
What are the types of sources available in informatica
34
How many modes are available for using pmcmd
35
How many types of Workflow variables are available ?
36
Flat file lookup is one newly added feature in Informatica PowerCenter 7.1version
37
Using the repository manager, the entire repository can be backed up in the format of
38
When you create a workflow, the Workflow Designer creates which task by default
39
Which mode is used for handling the sessions and workflows
40
Is it possible to run the workflow from particular task
41
The database designed for queries on transactional data is known as
42
Select a transformation used to load the changed records in target table
43
If the data doesn't fit in the memory cache, the server stores the overflow values in
44
In the Informatica Repository, where is the meta data getting stored?
45
What is the pmcmd command for instructing the server to execute the subsequent commands in the wait mode.
46
Which option is need to be checked for creating shortcuts for folders
47
Which privilege do you need to execute all tasks across all folders in the repository, and can perform any tasks
48
Which Transformation is used to load the rejected records
49
When the Informatica Server executes a worklet, it expands the worklet.
50
What is the transformation used to convert the rows in to columns
51
Salary of all employees in an employee table need to be added with the commission.which transformation is used ?
52
What the option "Fail parent if this task fails' will do in session properties
53
When the Designer validates a mapping variable in a reusable transformation, it treats the variable as
54
Which component is used for New server registration in informatica
55
What is the default repository server connection timeout limit
56
Where is the actual business rules will be implemented
57
By executing the read query directly against the source database, what can be identified
58
Minimum number of transformations required for a simple valid mapping
59
Whenever you're checking in an object, the repository version number is
60
To help you determine which column caused the row to be rejected, the server adds this components to reject files
61
You can create and maintain folders in the
62
The process of pulling data from various hetrogeneous source systems is known as
63
If a task is invalid, the workflow becomes invalid
64
Which Component of informatica is used to configure connection details
65
By default, the PowerCenter Server sets the number of partitions to
66
Which mode allows writing scripts for scheduling the workflows
67
How many important client components available in Informatica
68
Is it possible to change the sequence generator properties
69
Which Transformation is used to handle cobol sources
70
Which is used to store data and perform data cleansing,merging before loading into Datawarehousing
71
How to over ride the default order by clause in lookup query
72
Using session properties, can we able to override parameters established in the mapping ?
73
Which option should be enabled in session properties to see the performance of each transformation
74
What are the transformation used to merge data from multiple sources without removing the duplicates
75
Is it possible to create source and target definition manually
76
A deployment group is a versioning object that allows you to group versioned objects for deploying
77
By default, the PowerCenter Server does not save multiple logs for a single workflow.
78
When you checks out an object in the workspace, the repository obtains a
79
Which component is responsible for reading the parameter file and expanding the flow variable values for the workflow
80
If we export a mapping, session or workflow will create
81
Which Transformation is used to join flat file and oracle source
82
When you connecting to the repository, you need to mention the
83
Can the session be recovered?
84
The latest informatica suite is compatible of
85
In a short description, the data warehouse is a collection of data that is primarily used for
86
For executing a workflow, the PowerCenter server uses the
87
Can sequence generator be used in Mapplet desginer
88
Is it possible to generate a table in relational database using informatica
89
Versioning is a concept where you can configure the repository to store multiple versions of objects
90
The process of converting and summarizing operational data into a consistent, business oriented format
91
With the error tracing level enabled, the Informatica Server logs each row that passes into the mapping
92
When we finetune session performance, we can use
93
The place where debugger pauses and allows you to view and edit transformation output data is known as
94
In general, how many different types of log files are created by PowerCenter Server
95
Is it necessary to run the Informatica server before accessing Repository
96
Can a command task can be re-used
97
How the repository server communicates with the repository database
98
While using pmcmd in command line mode, each command must include the connection information of the
99
Last 3 performer in a department need to loaded in a target table. Which transformation can be used?
100
Which informatica client tool is used to know the run time and status of a workflow
101
What is the meaning of Update as Update?
102
In joiner transformation we override the query?
103
Which process is used for online analytical processing?
104
OLAP stands for?
105
Which task is used anywhere in the workflow to run the shell commands?
106
Which transformation is used numerous times in mapping?
107
Which transformation is used to combine data from different sources?
108
Can you validate all mappings in the repository simultaneously?
109
Which type is NOT used in metadata stored in repository?
110
Can one use mapping parameter or variables created in one mapping into any other reusable transformation?
111
_________ server governs the implementation of various processes among the factors of server’s database repository.
112
Increase in size of a convolutional kernel would necessarily increase the performance of a convolutional network.
113
Consider the scenario. The problem you are trying to solve has a small amount of data. Fortunately, you have a pre-trained neural network that was trained on a similar problem. Which of the following methodologies would you choose to make use of this pre-trained network?
114
For an image recognition problem (recognizing a cat in a photo), which architecture of neural network would be better suited to solve the problem?
115
For a classification task, instead of random weight initializations in a neural network, we set all the weights to zero. Which of the following statements is true?
116
Which gradient technique is more advantageous when the data is too big to handle in RAM simultaneously?
117
When pooling layer is added in a convolutional neural network, translation in-variance is preserved. True or False?
118
Suppose a convolutional neural network is trained on ImageNet dataset (Object recognition dataset). This trained model is then given a completely white image as an input.The output probabilities for this input would be equal for all classes. True or False?
119
What if we use a learning rate that’s too large?
120
Which of the following statement is the best description of early stopping?
121
What is a dead unit in a neural network?
122
In a neural network, which of the following techniques is used to deal with overfitting?
123
The number of neurons in the output layer should match the number of classes (Where the number of classes is greater than 2) in a supervised learning task. True or False?
124
Instead of trying to achieve absolute zero error, we set a metric called bayes error which is the error we hope to achieve. What could be the reason for using bayes error?
125
Batch Normalization is helpful because
126
In which neural net architecture, does weight sharing occur?
127
Can a neural network model the function (y=1/x)?
128
Suppose that you have to minimize the cost function by changing the parameters. Which of the following technique could be used for this?
129
If you increase the number of hidden layers in a Multi Layer Perceptron, the classification error of test data always decreases. True or False?
130
Which of the following is true about model capacity (where model capacity means the ability of neural network to approximate complex functions) ?
131
Which of the following gives non-linearity to a neural network?
132
Which of the following techniques perform similar operations as dropout in a neural network?
133
“Convolutional Neural Networks can perform various types of transformation (rotations or scaling) in an input”. Is the statement correct True or False?
134
What are the steps for using a gradient descent algorithm?
135
In a neural network, knowing the weight and bias of each neuron is the most important step. If you can somehow get the correct value of weight and bias for each neuron, you can approximate any function. What would be the best way to approach this?
136
Considering the above notations, will a line equation (y = mx + c) fall into the category of a neuron?
137
A neural network model is said to be inspired from the human brain.
138
net.isIP(input) returns 6 for IP version 6 addresses.
139
A stream fires end event when there is no more data to read.
140
net.isIP(input) tests if input is an IP address or not.
141
Which of the following is true about Piping streams?
142
Which of the following module is required for DNS specific operations?
143
Which of the following is true about process global object?
144
Which of the following is true about external binding with respect to domain module?
145
Which of the following is true about internal binding with respect to domain module?
146
Which of the following is true about clearTimeout(t) global function?
147
Which of the following module is required for exception handling in Node?
148
Which of the following provides in-built events.
149
Which of the following module is required for operating system specific operations?
150
Which method of fs module is used to truncate a file?
151
How Node based web servers are different from traditional web servers?
152
Which of the following is true about global objects in Node applications?
153
Which method of fs module is used to open a file?
154
Which of the following is true about console global object?
155
Which of the following code prints current directory?
156
Which of the following code print the name of operating system?
157
What is Callback?
158
How can we check the current version of NPM?
159
If an EventEmitter does not have at least one listener registered for the 'error' event, and an 'error' event is emitted, the error is thrown, a stack trace is printed, and the Node.js process ____.
160
What should you do in your code to improve your application’s performance? (Multiple choices)
161
Route paths, in combination with a request method, define the endpoints at which requests can be made. Which of following are valid form of route path
162
Where is captured values are populated regarding route parameters?
163
How many number of callback functions can be attached to handle a request?
164
Is the below code valid? var cb0 = function (req, res, next) { console.log('CB0') next() } var cb1 = function (req, res, next) { console.log('CB1') next() } var cb2 = function (req, res) { res.send('Hello from C!') } app.get('/example/c', [cb0, cb1, cb2])
165
Is the code below valid? var cb0 = function (req, res, next) { console.log('CB0') next() } var cb1 = function (req, res, next) { console.log('CB1') next() } app.get('/example/d', [cb0, cb1], function (req, res, next) { console.log('the response will be sent by the next function ...') next() }, function (req, res) { res.send('Hello from D!') })
166
The methods on the response object (res) in the following table can send a response to the client, and terminate the request-response cycle. If none of these methods are called from a route handler, the client request__________
167
How can we create chainable route handlers for a route path in ExpressJS app?
168
. Fs module provides both synchronous as well as asynchronous methods.
169
What is default module concept for Node.js?
170
How to check whether process is master or slave in "cluster" module?
171
What default encoding is set in fs.writeFile function?
172
What is recommended way to include third-party libs to Node project?
173
Which of these functions could be used to write files?
174
How to run Node script/server in production mode?
175
How to increase heap limit in Node.js?
176
What is EventEmitterclass?
177
In what order program will print results? setTimeout(() => console.log("setTimeout"), 0); setImmediate(() => console.log("setImmediate")); process.nextTick(() => console.log("nextTick"));
178
Why it's recommended to avoid usage of long running sync functions ?
179
Which of this stream types exist in Node?
180
How to stop Node application?
181
Is Node.js platform multithreaded?
182
Which file functions Node.js File API provides ?
183
What should be the first parameter of a callback function?
184
A Node.js application consists of the following except _____
185
Which of the following is the correct way to get a normalized path?
186
Which of the following module is required to create a web server?
187
Which of the following is true about fs module of Node?
188
Which of the following is true about readable stream?
189
Which code converts a buffer buf to JSON object?
190
Node.js application can access which of the following databases?
191
Which method is used to compare the placement of two nodes in the DOM hierarchy (document)?
192
Which of the following code can create a web server ?
193
How can we check the cujrrent version of NPM
194
Select all valid rout parameter formats
195
Select all valid rout parameter formats
196
What code print the endianness of operating system?
197
How to test if two nodes are equal?
198
Which of the following Node object property returns the local part of the name of a node?
199
In Node.js from the following which is true about writable stream?
200
What is the default scope in Node.js application
201
How many Node object methods are available?
202
What npm stands for?
203
Node.js is ________ by default
204
Node.js uses an event-driven, non-blocking I/O model ?
205
REPL stands for.
206
Which method returns the current working directory of the process.
207
Which of the following are not Node.js web application frameworks for?
208
How Node.js modules are availble externally
209
In Node process is ______
210
Node.js is ___________ Language.
211
Which statement is valid in using a Node module fs in a Node based application?
212
How can we create instance of http module?
213
Is console a global object?
214
What are the key features of Node.js?
215
The Node.js modules can be exposed using
216
What actress starred as the wannabe opera singer (who couldn't carry a tune) Florence Foster Jenkins in the 2016 biopic of the same name?
217
Which of the following Commanders of the British Empire was born with the surname "Jenkins"?
218
Country singer Harold Lloyd Jenkins was better known by what name?
219
The War of Jenkins' Ear (1739-1748) was fought between Britain and what other nation?
220
Ferguson Jenkins, the first Canadian to be inducted into the Baseball Hall of Fame, played what position for the Chicago Cubs and Boston Red Sox?
221
Which is function is invoked just before render() during initial rendering?
222
ReactJS is developed by _____?
223
Which function is invoked just before render() during component update?
224
Which statement about ReactJs is incorrect?
225
Will and if yes, when and how immutable data will make big ReactJs application faster?
226
What will happen to the state if you click the <div>(constructor() { super(); this.state = { status: ‘no status’ }; } handleClick() { this.setState({status: ‘I am fine!’}); } render() { return ( <div onClick={this.handleClick}> click me </div> ); } })
227
Which of the following is true about React Library?
228
How set custom html inside ReactJs component?
229
Do you need to add key property on ReactJs elements?
230
How transform JSX code in browser?
231
What does ReactJs provide?
232
What is the first place to start optimizing speed of ReactJs application?
233
What will happen if parent component will fire render function?
234
Which is true for ReactJS components defined as pure JS functions?
235
Which statement about propTypes is incorrect?
236
What is needed to write ReactJs application with ES6 classes and have cross-browser support?
237
What is wrong with the following code?(MyComponent.propTypes = { name: React.PropTypes.string } MyComponent.defaultProps = { name: ‘My name’ })
238
Why do you need dispatcher in flux?
239
Which of the following is the primary mental data flow in Flux?
240
What should be the correct value of the children proptype?(propTypes: { children: React.PropTypes.string.isRequired })
241
Which statement about ReacJs is correct?
242
Can you use ReactJs without flux?
243
What kind of application architecture is widely used together with ReactJs?
244
PropTypes is used for ___ ?
245
Which of the following is true about Flux Dispatcher?
246
What can you develop on React?
247
Where was Walke working when he created React?
248
What does the library aim to provide out of the following
249
What was the side during production?
250
What's the production size of the library?
251
In which month was the last stable release in 2017?
252
On which month do you think it was released?
253
When was the JavaScript library first released?
254
Do you know which of the following can be considered its developer?
255
Who originally wrote the JSL?isma
256
How can we prevent default behavior in React?
257
In React state can be accessed using ________
258
React supports all the syntax of _________________
259
React keeps track of what items have changed, been added, or been removed from a list using ________
260
React considers everything as _______
261
An altered component may be uniquely identified with the help of ref
262
What is the smallest building block of ReactJS
263
If our elements are dynamic, react can keep track of the changes using keys
264
Components cannot refer to other components in their output
265
In JSX most of the errors can be caught during _________
266
ref is used to refer a element / component returned by _______________
267
State can be initialized when code is loaded or state can be set on event changes
268
Lifecycle methods are mainly used ___________
269
Which of the following needs to be updated to achieve dynamic UI updates
270
_________ can be done while more than one element needs to be returned from a component
271
Arbitrary inputs of components are called __________
272
React merges the object you provide into the current state using __________
273
JSX is typesafe
274
We can go for keys when there is possibility that our user could change the data.
275
Which of the following is a concern in Cloud Computing? Continue reading at https://www.trenovision.com/aws-quiz/
276
Which of the following is used to restrict network traffic between two networks?
277
Which one of the following is not a feature of Cloud Computing?
278
In IaaS, the user is not bothered about which of the following pieces in the complete stack?
279
In which of the following Cloud Computing Model, the storage and compute units are hosted inside the Enterprise Network?
280
Which one of the following is not a class of Cloud Computing? Continue reading at https://www.trenovision.com/aws-quiz/
281
DNS service is provided by AWS through Continue reading at https://www.trenovision.com/aws-quiz/
282
Components of auto scaling include Continue reading at https://www.trenovision.com/aws-quiz/
283
Copy of an EC2 instance is also known as
284
Software firewall in AWS is implemented using
285
Availability Zones in AWS correspond to
286
Persistent volume storage in EC2 is also known as
287
AWS EC2 Service provides which type of cloud hosting capability?
288
Paul wanted to isolate a section of the AWS cloud, and launch AWS resources in a defined virtual network. Which of these options should he choose?
289
Which of the following was the first service offered by Amazon to transfer data?
290
Anna wants to create users and groups in AWS service. Which of the following will perform the task?
291
Which of the following is a scalable and an economical amalgamation of your office IT and AWS storage infrastructure?
292
______ means that the storage is temporary, and its contents can be lost when the system is rebooted.
293
Direct Attached Storage is a type of _____.
294
What is used for applications and databases where there is significant amount of traffic?
295
ABC, a public record managing firm, wanted to transfer huge amount of data. Since, it was for public records, they needed some solution that would not charge them much. Which of the following is the most suitable for them?
296
With the decision to store data in Amazon Glacier,the Ahana group of companies came across one of the used cases. Identify the used case from the following.
297
Which of the following is NOT a certification of the AWS IT infrastructure?
298
What does Stack as single unit mean?
299
CloudFormation Components Templates has a format that conforms to the ____.
300
St. Philip University wanted to use AWS service that would create and provision AWS resources. Suggest the appropriate options from the following.
301
Which of the following will XYZ company use to transfer its website to one type of cloud while its brochure is on another?
302
How can you use Amazon CloudWatch?
303
ABC company wants to monitor cloud resources, such as Amazon EC2 and Amazon RDS instances, and applications. What services it should use?
304
If you can specify input parameters, and you can determine their values at the time of creating the stack, it means you are _____.
305
Which of the following can automatically scale resources?
306
Which of the followin can Merrin, a new user to the Amazon Web Service, use to access the provided service?
307
Which of the following are the current list of service groups in the All AWS Services section?
308
Virtual Tape Library provides users with an unlimited __________.
309
Magnetic storage is a persistent type of slower, older _____.
310
Amazon Web Services is Amazon's cloud computing environment that offers benefits of _____.
311
Which of the following clouds is a mix of public and private cloud services?
312
Amazon DynamoDB, as a part of Amazon Web Services, refers to a service that offers _____.
313
The security of global infrastructure services run in which of the following cloud?
314
Which is the vital feature on Navigation Bar?
315
Which of the following is granted according to the least privileged criteria?
316
Which of the following is a singular feature of AWS?
317
True or False is an attribute of _____.
318
Which of the following has a unique decimal number or a code point?
319
Which of the following Dynamo data types includes a string set, a binary set, and a number set?
320
Which of the following is a type Primary Key?
321
What is the other name for attributes?
322
Through which option does Amazon maintain a synchronous reserved replica of that DB instance?
323
What is applied to a DB instance if you do not specify the desired parameter group while creating the instance?
324
A(n)_____ aims to control access to a DB instance.
325
What offers profitable, resizable capacity for your databases?
326
Which of the following services creates and provisions AWS resources?
327
ABC company wants Web services that offer scalable computing capacity servers. What should the company choose?
328
To retain application availability, you should use.
329
ABC company wants to use network services that would implement its code from Amazon EC2 instances on the virtual servers. What should the company use?
330
you have placed an order by amazon fulfillment web service and want to cancel the order. the order can't be canceled if the fulfillmentorderstatus is:
331
you are going to create an amazon mechanical turk hit. which of the following parameters are required in the request?
332
with regard to amazon ec2, the amount of cpu that is allocated to a particular instance is expressed in terms of:
333
with regard to amazon ec2, do volumes need to be un-mounted in order to take a snapshot?
334
with reference to the amazon fulfillment web service, what are inbound apis used for?
335
with reference to the amazon flexible payment service, for how many days is a reserve authorization valid?
336
which type of aws requests do not require access key id authentication?
337
which of the following, defines the term ec2 amazon machine images?
338
which of the following use cases belong to inbound fws apis?
339
which of the following statements is not correct with regard to elastic block store?
340
which of the following statements is not correct with regard to amazon simple storage service (amazon s3)?
341
which of the following statements are true with regard to the amazon mechanical turk notifications?
342
which of the following parameters are mandatory for the installpaymentinstruction operation of the amazon flexible payment service?
343
which of the following is not related to the rebootinstances operation of ec2?
344
which of the following is correct if cname is empty in amazon cloudfront service? 1.<?xml version="1.0" encoding="utf-8"?> <distributionconfig xmlns="http://cloudfront.amazonaws.com/doc/2008-06-30...
345
which of the following are the types of grantee, that can access a bucket or an object of amazon s3?
346
which of the following amazon ec2 operations doesn't require the publicip as a request parameter?
347
what will the amazon s3 putobjectinline operation do if an object already exists in a bucket?
348
what will be the value of the action attribute of the form where the bucket name is johnsmith? example: <form action="???????" method="post" enctype="multipart/form-data">..</form>
349
what is the function of the retrytransaction operation of the amazon flexible payment service?
350
what is the function of the approvework command in amazon mechanical turk?
351
what does the following mechanical turk web service request do? http://mechanicalturk.amazonaws.com/?service=awsmechanicalturkrequester &awsaccesskeyid=[the requester's access key id] &version=200...
352
the following request is submitted to the amazon e-commerce service. what will be the outcome? http://webservices.amazon.com/onca/xml?service=awsecommerceservice &searchindex=books &sort=salesrank...
353
the following request is submitted to the amazon e-commerce service. what will be the outcome? http://webservices.amazon.com/onca/xml?service=awsecommerceservice &searchindex=all &sort=salesrank &...
354
suppose you are making a request to the amazon flexible payment service and you get an error called internalerror. what is the cause of the error?
355
one ec2 compute unit (ecu) provides the cpu capacity equivalentto:
356
once you create an amazon mechanical turk hit, you can't change its hittype.
357
is the following statement true or false? with reference to the amazon flexible payment service, once you subscribe to the caller notification using the subscribeforcallernotification operation, y...
358
is the following statement true or false? it is not possible to retrieve offers and discounts using amazon e-commerce service.
359
in which of the following cases can the status of a mechanical turk hit change from reviewing to reviewable?
360
in conjunction with which of the following other amazon web services does amazon simpledb service work?
361
in case of amazon e-commerce service, what will happen if you pass the associatetag parameter but omit the subscriptionid and awsaccesskeyid parameters?
362
in amazon mechanical turk concept, which of the following is correct?
363
how many cname aliases can you have per distribution?
364
how is amazon s3, tcp window scaling defined ?
365
how do you access amazon s3 buckets and objects that were created using <createbucketconfiguration>?
366
how can you find user selectable kernels in amazon ec2?
367
Which storage service provides encryption services for both data in flight and data at rest?
368
What is AWS Multi-Factor Authentication (MFA)?
369
What can happen if a hacker gets a hold of your account key?
370
True or False: A root account credential can be used to log into your AWS account or buy a book on Amazon.com.
371
Which of these Amazon's tools is for monitoring?
372
What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?
373
Why is it important to enforce a strict password policy for your AWS account?
374
Which is Amazon Web Services' newest encryption tool?
375
Which is a recommended way to protect Access Keys?
376
What are the three authentication options offered by AWS?
377
What is boot time for an Instance store backed instance?
378
EC2 stands for
379
Which of these services are used to distribute content to end users using a global network of edge locations?
380
Amazon S3 is a,
381
highly available and scalable domain name system web service
382
What’s the maximum size of the S3 bucket
383
What is the maximum length of a file name in S3?
384
How can you integrate IAM with data centers security?
385
Which is more secure?
386
have some private servers on my premises, also I have distributed some of my workload on the public cloud, what is this architecture called?
387
_____ mixes the simplicity of ________ with the power of _____, to
388
Does Stopping and Terminating instances have same effect?
389
Cloud-computing providers offer their services as ______________
390
The preferred way to load data into Redshift is through ______ using the COPY command.
391
What does MPP stand for when referring to the type of architecture Redshift has?
392
Amazon SQS was designed to enable a/an _________ number of messaging services to read and write a/an ________ number of messages.
393
What type of queuing system is Amazon SQS?
394
A _____ letter queue is a queue that other queues can target to send messages that could not be processed successfully.
395
Amazon SQS pricing is based on a number of _______ and the amount of ______ transferred in and out.
396
For an EC2 instance launched in a private subnet in VPC, which of the following are the options for it to be able to connect to the internet?
397
What happens to data when an EC2 instance terminates
398
This option is used to control transactions per hour.
399
This option superimposes the contents of two graphs that share a common x- axis.
400
This helps us to compare the results of multiple load test runs.
401
Which function allows you to register a search for a text string for the next Action function?
402
What is the purpose of the strcat function?
403
Which file type has an extension of .lrr?
404
Which LoadRunner tool captures the communication between the browser and web server?
405
Which LoadRunner component runs the Vuser that generates the load?
406
Which performance test determines whether the system handles anticipated real-world load?
407
What instructs LoadRunner to prepare the Vusers so they are in the ready state
408
What is the first stage of the load testing process?
409
When running a Dry run, what should you be looking for?
410
The unit of sampling rate in the monitor setting tab is _______ .
411
Global Sampling Rate, Error Handling, Debugging, and Frequency settings is related to __________.
412
Scenario Group, SLA Pane and Scenario Schedule Pane is related to ____________.
413
How can you validate that the LoadRunner Agent is running on the load generator?
414
During the run of a scenario, which LoadRunner component stores the performance monitoring data?
415
What does the image shown in the exhibit represent?
416
Which types of reports can be automatically generated in the Analysis tool?
417
What are the main types of service level agreements available in the Controller and Analysis
418
What is an example of a stress test?
419
Which statement is an example of a conceptual goal?
420
Can a transaction contain another transaction ?
421
LR records communication between Client & Server only but does not record screen actions performed by user
422
Which methods can be used to fix Corelation problem ?
423
Identify the corelation function
424
Vuser insert a ________________ function into the script indicating that a correlation was done
425
In manual correlation, we can include maximum of _____ parameters per scripts:
426
Granularity of the graph can be set in
427
___________ provides information about the size and download time of each Web page content
428
Which graph is not available when Viewing Summary Data?
429
By default all Vuser information is Stored in:
430
Controller Output window display:
431
The DON’T SHOW setting in the graph instruct LoadRunner
432
What is the default value at which monitor send update to the controller for data point graph?
433
Global sampling rate, error handing, debugging, and frequency settings is related to
434
Scenario Group, SLA pane and Scenario Schedule Pane is related to
435
Which tab is not present in the OUTPUT window of inserting Rendezvous Point?
436
Which is not true in case of inserting Rendezvous point?
437
Script Creation in C and Web Services Vusers is related to
438
What is the extension of analysis session file?
439
By default the online monitor samples the data at interval of ____________.
440
The unit of sampling rate in the monitor setting tab is
441
Percentage mode is used to generate
442
The Correlation Statement instructs VuGen to save the first occurrence of this data to a parameter called __________
443
For each step you performed during recording. Vugen generates ____________ and _________ in the test tree.
444
Vuser uses LRT Function in a _______________ Scripts.
445
There are separate load runner function for C and JAVA.
446
What is the function that an Autoscaling cannot perform?
447
Can EBS tolerate an Availability Zone Failure?
448
Which of the following is a pure infrastructure play?
449
________ Live Services can be used in applications that run in the Azure cloud.
450
Database marketplace based on SQL Azure Database is code-named ________ .
451
Point out the wrong statement: Microsoft’s approach is to Cloud applications as software plus service Microsoft’s cloud operating system is named as Windows Platform Azure is a combination of virtualized infrastructure to which the .NET Framework has been added as a set of .NET Services None of the mentioned Q.13 Which of the following is also known as Compute? Set of virtual machine instances Set of replicas Set of commodity servers Q.14 Database marketplace based on SQL Azure Database is code-named ________ . Akamai Dallas Denali Q.15 Point out the correct statement: The Windows Azure service is a hosted environment of virtual machines turned on by a fabric known asWindows Azure ApplicationFab Windows Live Services is a collection of applications and services that run on the Web All of the above Q.16 ________ Live Services can be used in applications that run in the Azure cloud. Microsoft Windows Yahoo Ruby Q.17 Which of the following is based on Microsoft Dynamics? Static CRM Social CRM Dynamics CRM Q.18 Which of the following is based on Microsoft Sharepoint? Sharepoint Services .NET Services Windows Services Q.19 Azure is Microsoft’s ___________ as a Service Web hosting service. Platform Software Infrastructure Q.20 Which of the following is a pure infrastructure play? Azure Google App Engine AWS Q.21 Can EBS tolerate an Availability Zone Failure? No, all EBS volume is stored in a single availability zone. Yes, it has multiple copies so that will work. Depends on how the set up is installed Depends on how EBS is initiated. Q.22 What is the function that an Autoscaling cannot perform? Increase the instance size when the usage is more than threshold. Add more RDS read copies when usage is more than threshold. Both None of the above Q.23 What will be the benefit of adding Multi-AZ deployment in RDS? Availability Zone failure can be tolerated by multi-AZ database Increase database availability during maintenance tasks Both None of these Q.24 What happens to data when an EC2 instance terminates Decrease latencies if the servers of the apps are accessing database are in multiple Availability zones. Make database access times quicker for all application servers. Make database more available during maintenance tasks. All of the above Q.25 For an EC2 instance launched in a private subnet in VPC, which of the following are the options for it to be able to connect to the internet? Simply attach an elastic IP If there is a public subnet in the same VPC with a NAT instance attached to internet gateway, then a route can be configured from the instance to the NAT. There is no way for an instance in private subnet to talk to the internet Hope you enjoy our last AWS Practice Test, but it’s not an end of learning, explore our AWS Interview Questions. Amazon Quiz Part – 1 Amazon Quiz Part – 2 Tags: Amazon MCQAmazon Mock TestAmazon QuizAmazon Web Service QuizAWS Mock TestAWS Practice TestAWS Quizaws quiz onlineFree AWS QuizOnline AWS Quiz LEAVE A REPLY Comment Name * Email * This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
452
Which of the following is relational database service provided by Amazon?
453
Which of the following is also referred to edge computing?
454
Point out the wrong statement:
455
In case of a disaster, which of the following activities will you perform?
456
How does an Elastic Load Balancer enable higher fault-tolerance level?
457
To retain application availability, you should use
458
If a company wants to use the DNS Web service, what is the appropriate option?
459
MultiPan, a small company with huge clientele, was facing a storage crunch, and it wants the resources to be connected to the Internet. What is the ideal solution?
460
A company wants to use network services that would implement its code from Amazon EC2 instances on the virtual servers. What should the company use?
461
A leading IT firm in Manhattan faces a lot of network traffic issues. What should it use to ease these issues?
462
Which of the following is true about NoSQL and SQL?
463
What does a comprehensive data policy include?
464
What type of API provides a management interface to manage data warehouse clusters programmatically?
465
Amazon Redshift has how many pricing components?
466
The preferred way to load data into Redshift is through ______ using the COPY command.
467
Adding nodes to a Redshift cluster provides _______ performance improvements.
468
Redshift was designed to alleviate the frustrating, time-consuming challenges database clusters have imposed on _____ administrators?
469
Amazon's Redshift data warehouse allows enterprise IT pros to execute ________ against ____ data sets.
470
Redshift can provide fast query performance by leveraging _______ storage approaches and technology.
471
What does MPP stand for when referring to the type of architecture Redshift has?
472
Amazon Redshift is what type of data warehouse service?
473
With Amazon _________, developers can monitor metrics for Amazon SQS and trigger an alarm when a threshold is met.
474
Amazon SQS is optimized for ______ scalability, not for single-threaded sending or receiving speeds.
475
Amazon SQS was designed to enable a/an _________ number of messaging services to read and write a/an ________ number of messages.
476
What type of queuing system is Amazon SQS?
477
A _____ letter queue is a queue that other queues can target to send messages that could not be processed successfully.
478
To prevent messages from being lost or becoming unavailable, all messages are stored __________ across multiple servers and data centres.
479
Amazon SQS pricing is based on a number of _______ and the amount of ______ transferred in and out.
480
Amazon Elastic MapReduce falls under the _______________ and Amazon EC2 falls under the ___________ cloud service model.
481
Route 53 offers Weighted Round Robin (DNS Load Balancing) that allows assigning weights to DNS records to specify routing of traffic
482
It is possible to change the size of a Virtual Private Cloud after it´s creation.
483
The default session timeout for an ELB is
484
As an alternative to prewarming the ELB, we can assign a smaller ELB to load balance between multiple ELBs.
485
In Amazon Route 53, while creating a CNAME record the ideal TTL values while mapping the CNAME (a) to an existing domain and (b) to an ELB or S3 are:
486
Which statement doesn´t suit to S3?
487
You have a front-end webserver that connects to an App layer, through port 80. What is the best practice for setting the firewall access?
488
The number of SSL certificates supported by an ELB at a given time is
489
Which of the following is NOT TRUE of AWS Elastic Load Balancing?
490
To create a mirror image of your environment in another region for disaster recovery, which of the following AWS resources do not need to be recreated in the second region?
491
Which of the following are true regarding AWS CloudTrail?
492
Your company provides several applications from its data center located in Colorado. Your company also uses AWS for several PaaS functions. What type of cloud does your organization use?
493
What is the very popular As A Service model that permits a cloud provider to make applications available that are accessible from anywhere?
494
What is the term commonly used for the cloud’s ability to scale outward and inward automatically based on demand?
495
Which of the following is not a common cloud characteristic as defined by the NIST?
496
Amazon Web Services supports which Type II Audits ?
497
Storage classes available with Amazon s3 are -
498
What are the advantages of auto-scaling?
499
How many buckets can you create in AWS by default?
500
_______________ is the central application in the AWS portfolio.
501
_________________ is a billing and account management service.
502
AWS Stands for Amazon Web Services.
503
What will happen when an EC2 instance fails to pass health checks?
504
If a single instance has failed to launch within 24 hours due to some issues during a set up of Auto-scaling. Then what will happen to the Auto-Scaling condition?
505
What are lifecycle hooks used for in AutoScaling?
506
Which service performs the function that when an instance is healthy it is terminated and replaced with a new one?
507
What can be the option to reduce the load on Amazon EC2 instance when the content management system running on Amazon EC2 instance which is reaching total CPU utilization.
508
If some of the instances are running in the application tier and are using AutoScaling. Then how can the instance type be changed?
509
Name the architecture in which a user can own some private servers as well as they can distribute some of the workloads on the public cloud.
510
Select the wrong statement:
511
Select all elements with a “href” attribute value, which ends with ".png".
512
Select all elements with a “title” attribute value beginning with "Study".
513
Select all elements with a “title” attribute value containing the word “Demo” specifically.
514
How to select all disabled input elements.
515
With jQuery, how to select all button and input elements of type="button".
516
Select all <p> elements with a "lang" attribute value starting with "test".
517
In jQuery, how to get all elements with "href" attribute.
518
With jQuery, how to select all elements with “href” attribute value "studyopedia.com"
519
How to select all input elements with type="text".
520
How to select all hidden <ul> elements in jQuery?
521
Select all <div> elements, which have a <ul> element.
522
The web page has headers like <h1>, <h2>, <h3>. How to get them in jQuery?
523
How to get all animated elements in jQuery?
524
With jQuery, how to get <p> elements, which are descendants of a <div>.
525
Get all <input> elements, which are not empty.
526
With jQuery, get all <p> elements that are siblings of a <div>:
527
How to get all <p> elements, which are direct child of <div>:
528
How to get all <p> elements, which are the only child of their parent?
529
How to select the nth child in jQuery. Select all <p> elements which are the 3rd child of their parent:
530
How to select multiple elements in jQuery. The total elements are <h1>, <h2>, <div>,<span>, <p>. Select only the following: <h1>,<h2>, <div>
531
How to select all elements with class “demo” or “test”
532
A dropdown is having the following values: Ronaldo, Messi, Neymar, Ronaldinho. From here, how to select the options Neymar, Messi, Ronaldinho?
533
How to get the HTML content of all matched <p> elements:
534
A dropdown is having the following values: Ronaldo, Messi, Neymar. From here, how to select the option Messi?
535
In a checked checkbox, how to get the first value?
536
How to get the text content of all matched <p> elements?
537
With jQuery, how to remove target attribute of all the links on the web page:
538
Which of the following methods is used to get the html content of the matched element?
539
Set the title of all <input> elements to "Enter Value"
540
How to set alt attribute of all the images. Add the value "Technology" to the "alt" tag:
541
Which of the following methods is used to get the text content of the matched element?
542
Which of the following jQuery methods are used to remove an attribute?
543
How to get the value of an attribute for the first element in the set of matched elements?
544
With jQuery Selectors how to select elements, which are parent of another element?
545
With jQuery Selectors, select all elements matched by <li>, which are last child of their parent.
546
Select elements matched by <p> element, which are children of an element matched by <div> element, using jQuery Selectors.
547
With jQuery Selectors, select all elements matched by <li>, which are first child of their parent.
548
With jQuery Selectors, how to select all elements matched by <li>, which contain the text demo.
549
From a list of <li> elements in <ul>, how to select the first five elements?
550
From a list of <li> elements in <ul>, how to select the fourth element?
551
In a web page, form elements like input, textarea, button, etc are added with other elements. How to select only the form elements using jQuery?
552
In a form, how to select all checked boxes using jQuery Selector.
553
With jQuery Selectors, how to select all elements matched by <li> which are hidden?
554
How to select all radio buttons using jQuery Selectors?
555
With jQuery Selectors, how to select all elements matched by <li> which are visible?
556
How to select all elements matched by <a> with "href" attribute value containing "studyopedia.com"?
557
Using jQuery Selectors, how to select all elements matched by <li>, which do not have class = "demo".
558
How to select all elements that are children of a <p> element with jQuery Selectors?
559
Using jQuery Selectors how to select all even <td> elements in an HTML table:
560
Using jQuery Selectors, how to select all elements with the attribute href:
561
Using jQuery Selectors how to select all even <tr> elements in an HTML table:
562
How to select the first <li> element of the first unordered list element i.e. <ol> using jQuery Selectors?
563
A lot of <p> elements are present in the HTML document. How to select the first <p> element using jQuery Selectors?
564
How can I select all <p> elements with class=”demo” using jQuery Selectors?
565
What is the correct way of selecting the current element with jQuery Selectors?
566
How to select all the elements i.e. the correct way of using Universal Selector?
567
Which is the correct form of using Id Selector in jQuery? Let’s say id = demo
568
Which is the correct form of using Class Selectors in jQuery? Let’ say class = demo
569
Which is the correct form of using Element Selector in jQuery? Let’s say the element is <div>:
570
Selectors in jQuery begins with?
571
Which is the correct jQuery syntax?
572
What is the role of a selector in jQuery syntax?
573
Which of the following method when used loads jQuery faster on the web page?
574
To host jQuery, which two jQuery CDNs are available for users?
575
Should I use <script> or <script type="text/javascript”>for referencing jQuery in a web document?
576
Which of the following is correct for production version or development version of jQuery?
577
Whatever you achieve with JavaScript can be achieved with jQuery?
578
jQuery is a?
579
What is every function used for?
580
What are the: odd and: even filters?
581
the jQuery library enclose the following features
582
You can check whether the browser supports exact features using..
583
Can you use CSS3 selectors to choose or get elements using jQuery?
584
Can jQuery be used on the similar page beside other libraries?
585
jQuery's main focus is
586
jQuery is a..
587
How do you use JavaScript inside Coffee Script code?
588
Which statement greatest explains what "unobtrusive JavaScript" is?
589
What scripting language is jQuery printed in?
590
Which jQuery method is used to place one or more style properties for selected elements?
591
What is proper coding practice in the flow logic of a Dynpro when a subscreen is defined on the screen
592
SAP Best Practices are the sound foundation for pre-packaged ready-to-use business solutions
593
What is the SAP GUI ?
594
Who are the primary users of ERP systems?
595
What are the primary business benefits of an ERP system?
596
Who are the primary users of SCM systems?
597
What represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors?
598
What are several different types of software, which sit in the middle of and provide connectivity between two or more software applications?
599
Which of the following occurs when everyone involved in sourcing, producing, and delivering the company's product works with the same information?
600
Which of the following is a reason for ERPs explosive growth?
601
What must a system do to qualify as a true ERP solution?
602
What is at the heart of any ERP system?
603
Which of the following describes an ERP system?
604
What is the TCode for ABAP dump analysis?
605
What is the transaction code for "Comparing tables"?
606
Which command is used to flash the database buffer?
607
Data element is an example of Semantic Domain.
608
When should you buffer a table?
609
You can not attach search help to:
610
What is the basic object of data Dictionary?
611
What are the two types of BoM processing?
612
To cancel a billing document, which of the following is correct?
613
How does the system carry out Static Credit limit check?
614
Which of the following are true for an Output Type?
615
In which processes of Consignment “Transfer Order for picking” is used?
616
Regarding standard Class Types, which of the following are correct?
617
When you enter a sales order you don’t need to specify the sales area immediately. If you don’t, where does the system automatically derive the sales area?
618
For Delivery Item Category, if “Relevant for Picking” is not activated then?
619
If a material is handled in batches, the following functions are supported when the expiration date is checked:
620
What are the effects of PGI?
621
If a material is created for Plant X, how is the same material defined for Plant Y? What is the process called?
622
In a Business requirement the price of a material is based on the ‘Region’, ‘Sales Org.’, ‘Distribution Channel’ . If you were to create a Condition Table for this scenario, the order in which the fields are arranged is?
623
Which of the following are correct for a third party order?
624
Backward scheduling is used?
625
Free Goods is supported for which of the following in SAP R/3?
626
Which of the following are true for Inter-Company Sales Processing?
627
If Invoice Correction Request is to be characterized as debit memo, what important changes do you suggest?
628
Which of the following statements are correct?
629
An account group determines?
630
Which of the following factors are generally used for account determination?
631
What is the relationship between company code and credit control Area?
632
Full Buffering would be appropriate for
633
The annual cost of a high utilization reserved usage depends on the number of hours used?
634
An application running on EC2 instances processes sensitive information stored on Amazon S3. The information is accessed over the Internet. The security team is concerned that the Internet connectivity to Amazon S3 is a security risk.
635
An application saves the logs to an S3 bucket. A user wants to keep the logs for one month for troubleshooting purposes, and then purge the logs.
636
) A web application allows customers to upload orders to an S3 bucket. The resulting Amazon S3 events trigger a Lambda function that inserts a message to an SQS queue. A single EC2 instance reads messages from the queue, processes them, and stores them in an DynamoDB table partitioned by unique order ID. Next month traffic is expected to increase by a factor of 10 and a Solutions Architect is reviewing the architecture for possible scaling problems.
637
A Solutions Architect is designing a critical business application with a relational database that runs on an EC2 instance. It requires a single EBS volume that can support up to 16,000 IOPS.
638
) An application requires a highly available relational database with an initial storage capacity of 8 TB. The database will grow by 8 GB every day. To support expected traffic, at least eight read replicas will be required to handle database reads
639
Which action will protect against unintended user actions?
640
A company is developing a highly available web application using stateless web servers. Which services are suitable for storing session state data? (Select TWO.)
641
Which solution will meet the security team’s mandate?
642
Jquery is faster than javascript at execution time.
643
1)jquery.size() 2) jquery.length Which is faster?
644
What does .size() method of jquery returns?
645
For the purposes of selecting specific class, class must contain prefix as ________.
646
In which version of the jquery, efficiency of the web page increased.
647
What is the file size of minified version of jQuery.x.x.x-min.js?
648
What is the file size of normal version of jQuery-x.x.x.js?
649
Is it compulsory to add jquery file both at master page and content page?
650
CDN stands for_______
651
live() function will not work in chaining
652
jQuery ______is used to set/return arbitrary data to/from an element.
653
.css(‘width’) and .width() are the two ways to change the width of _________.
654
How many ways are there to change the width of the element in jquery?
655
How many methods are available in jquery to give fade effect to the elements?
656
There are how many ways to check or unchecked the radio button.
657
$('#pcds').attr('disabled', true); this code is used for the ______ form element.
658
____ symbol is used for indication that this line used for jquery.
659
Jquery library is ____________ file.
660
Jquery is the programming language
661
To select all the elements in the page which symbol do we have to used?
662
How many types of selectors available in jquery
663
The ________ method acts on JQuery objects and translates the match DOM element into query string that can be passed along with AJAX request.
664
JQuery don’t have DOM traversing capability.
665
AHAH means ________
666
AJAX stand for____________
667
By default .clone() method copy any event.
668
For coping the element ________ method is used.
669
Which of the following is jquery primary method for wrapping element around other element?
670
jquery has _______ method for inserting element before other element.
671
The .each method is the more convenient form of _______ loop.
672
The ______ Method acts as explicit iterator.
673
The .animate() method comes in ______ forms.
674
Which method is provided by the jquery to create our own custom animation with fine-grained control?
675
Highlight page element under mouse cursor by using ________
676
________________ is use for alternately expand and collapse a page element
677
Use __________ event handlers to reach to a user click on page element with .bind() or .click().
678
Multiple javascript library coexist on single page using ___________________
679
Ansible is written in Powershell and
680
Who is the author of Ansible?
681
Who is the creator of Jenkins?
682
Jenkins won the geek choice award in
683
Concerning the software architecture, Ansible has how many servers?
684
Jenkins supports the following except
685
The company established to support and manage Ansible is
686
Jenkins is written in
687
When did the Red Hat acquired Ansible?
688
Concerning Jenkins' security which of these is odd?
689
In SoapUI following cannot be executed from command line
690
Command line runs in SoapUI can be used to run
691
What type of test data can be used in SoapUI
692
Where groovy script can be used in SoapUI
693
How to refer a property from test case
694
What are different type of assertions use in SoapUI
695
What is the hierarchy in SoapUI Projects
696
In SoapUI properties are available at level
697
SoapUI can be used to do
698
What platform is SoapUI built over
699
What are the properties available in SoapUI?
700
Service exporters that can export a bean as a remote service based on the
701
What are the levels used by SOAP UI to structure functional tests?
702
What are the major types of assertions available in SoapUI?
703
What type of data sources can be used in SoapUI?
704
Where Groovy Script can be used in Soap UI?
705
What we can do with the SoapUI?
706
What are the different types of assertions used in Soapui?
707
Exposing a stand-alone SOAP endpoint using the
708
What are the communication channels available for a web service?
709
In what year was SoapUI initially released to Source Forge?
710
SoapUI software won the Jolt Awards: The Best Testing Tools in _____
711
The SoapUI software won the ATI Automation Honors in _____
712
The commercial enterprise version of SoapUI is called _____
713
In which of the following languages is SoapUI available?
714
Which of the following is a core feature of SoapUI?
715
All of the following except one are not core features of SoapUI?
716
SoapUI was initially released to _____ in 2005
717
_____ are the developers of the SoapUI software
718
In what year was SoapUI software initially released?
719
A company needs to monitor the read and write IOPS for their AWS MySQL RDS instance and send real-time alerts to their operations team. Which AWS services can accomplish this?
720
I created a key in Oregon region to encrypt my data in North Virginia region for security purposes. I added two users to the key and an external AWS account. I wanted to encrypt an object in S3, so when I tried, the key that I just created was not listed. What could be the reason?
721
How does Elastic Beanstalk apply updates?
722
A customer wants to track access to their Amazon Simple Storage Service (S3) buckets and also use this information for their internal security and access audits. Which of the following will meet the Customer requirement?
723
A customer wants to capture all client connection information from his load balancer at an interval of 5 minutes, which of the following options should he choose for his application?
724
To create a mirror image of your environment in another region for disaster recovery, which of the following AWS resources do not need to be recreated in the second region? ( Choose 2 answers )
725
You have an EC2 Security Group with several running EC2 instances. You changed the Security Group rules to allow inbound traffic on a new port and protocol, and then launched several new instances in the same Security Group. The new rules apply:
726
A user has setup an Auto Scaling group. Due to some issue the group has failed to launch a single instance for more than 24 hours. What will happen to Auto Scaling in this condition?
727
When an instance is unhealthy, it is terminated and replaced with a new one, which of the following services does that?
728
What does Connection draining do?
729
You have a content management system running on an Amazon EC2 instance that is approaching 100% CPU utilization. Which option will reduce load on the Amazon EC2 instance?
730
How will you change the instance type for instances which are running in your application tier and are using Auto Scaling. Where will you change it from the following areas?
731
Suppose you have an application where you have to render images and also do some general computing. From the following services which service will best fit your need?
732
A startup is running a pilot deployment of around 100 sensors to measure street noise and air quality in urban areas for 3 months. It was noted that every month around 4GB of sensor data is generated. The company uses a load balanced auto scaled layer of EC2 instances and a RDS database with 500 GB standard storage. The pilot was a success and now they want to deploy at least 100K sensors which need to be supported by the backend. You need to store the data for at least 2 years to analyze it. Which setup of the following would you prefer?
733
You are running a website on EC2 instances deployed across multiple Availability Zones with a Multi-AZ RDS MySQL Extra Large DB Instance. The site performs a high number of small reads and writes per second and relies on an eventual consistency model. After comprehensive tests you discover that there is read contention on RDS MySQL. Which are the best approaches to meet these requirements? (Choose 2 answers)
734
Your application has to retrieve data from your user’s mobile every 5 minutes and the data is stored in DynamoDB, later every day at a particular time the data is extracted into S3 on a per user basis and then your application is later used to visualize the data to the user. You are asked to optimize the architecture of the backend system to lower cost, what would you recommend?
735
Which of the following use cases are suitable for Amazon DynamoDB? Choose 2 answers
736
A company is deploying a new two-tier web application in AWS. The company has limited staff and requires high availability, and the application requires complex queries and table joins. Which configuration provides the solution for the company’s requirements?
737
Which AWS services will you use to collect and process e-commerce data for near real-time analysis?
738
Your company’s branch offices are all over the world, they use a software with a multi-regional deployment on AWS, they use MySQL 5.6 for data persistence.
739
If I am running my DB Instance as a Multi-AZ deployment, can I use the standby DB Instance for read or write operations along with primary DB instance?
740
When would I prefer Provisioned IOPS over Standard RDS storage?
741
If I launch a standby RDS instance, will it be in the same Availability Zone as my primary?
742
In CloudFront what happens when content is NOT present at an Edge location and a request is made to it?
743
Why do you make subnets?
744
If you want to launch Amazon Elastic Compute Cloud (EC2) instances and assign each instance a predetermined private IP address you should:
745
When you need to move data over long distances using the internet, for instance across countries or continents to your Amazon S3 bucket, which method or service will you use?
746
A customer implemented AWS Storage Gateway with a gateway-cached volume at their main office. An event takes the link between the main and branch office offline. Which methods will enable the branch office to access their data?
747
A customer wants to leverage Amazon Simple Storage Service (S3) and Amazon Glacier as part of their backup and archive infrastructure. The customer plans to use third-party software to support this integration. Which approach will limit the access of the third party software to only the Amazon S3 bucket named “company-backup”?
748
Another scenario based interview question. You need to configure an Amazon S3 bucket to serve static assets for your public-facing web application. Which method will ensure that all objects uploaded to the bucket are set to public read?
749
Are the Reserved Instances available for Multi-AZ Deployments?
750
If I want my instance to run on a single-tenant hardware, which value do I have to set the instance’s tenancy attribute to?
751
You have a distributed application that periodically processes large volumes of data across multiple Amazon EC2 Instances. The application is designed to recover gracefully from Amazon EC2 instance failures. You are required to accomplish this task in the most cost effective way.
752
What does the following command do with respect to the Amazon EC2 security groups?
753
Try this AWS scenario based interview question. I have some private servers on my premises, also I have distributed some of my workload on the public cloud, what is this architecture called?
754
What are the Authentication in AWS?
755
Amazon Web Services supports which Type II Audits
756
Storage classes available with Amazon s3 are -
757
The types of AMI provided by AWS are:
758
What are the advantages of auto-scaling?
759
What are the different types of instances?
760
How many buckets can you create in AWS by default?
761
S3 stands for Simple Storage Service
762
AWS reaches customers in ______________countries.
763
Amazon Web Services falls into which of the following cloud-computing category?
764
________________ is the central application in the AWS portfolio.
765
_________________ is a billing and account management service.
766
AWS Stands for Amazon Web Services
767
Pick the odd one out:
768
Which of the following is not an UDDI datatype?
769
In WSDL a <portType> refers to
770
Which of the following statement(s) is/are true with respect to WSDL?
771
Which of the following statement(s) is/are incorrect?
772
Which of the following cannot be used as a Web Service Client?
773
Which of the following statement(s) is/are true?
774
Which of the following statement(s) is/are false ?
775
XML digital signatures provides
776
Which of the following statement(s) is/are true with respect to SOAP 1.2.?
777
The primary goal of this Web Service Design pattern is to move business logic out of the service implementation class and into distinct business objects that are more easily managed and evolved over time.
778
UDDI is a registry and a repository.
779
What does SOAP define?
780
Which component of Web Services acts as a directory?
781
Web Services are
782
Web services components are written in which Markup Language?
783
Service Discovery is responsible for describing the public interface to a specific web service.
784
The service provider implements the service and makes it available on the Internet.
785
A web service takes the help of SOAP to describe the availability of service.
786
A web service enables communication among various applications by using open standards such as HTML, XML, WSDL, and SOAP.
787
Which of the following is a security issue with web services?
788
Which of the following is correct about BEEP protocol?
789
Which of the following role of web service architecture utilizes an existing web service by opening a network connection and sending an XML request?
790
Which of the following is the benefits of having XML based WEB services?
791
Which of the following is true about Web service?
792
What is NOT a part of a SOAP Message ?
793
To implement web services in .NET, HTTP handlers are used that interrupt requests to _________ files.
794
Select the communication channels NOT use in a web service?
795
what DISCO is?
796
What is REST?
797
What do you mean by PKI?
798
What UDDI means?
799
What is SSL?
800
What is WSDL?
801
SOAP is a lightweight _____ based protocol .
802
Schema is an _____ based alternative
803
XSLT is:
804
What is SOAP :
805
A Web Services can be created regardless of the
806
The XKMS is:
807
Which of these test do use an HTTP POST and will send the XML response.
808
The WSDL is:
809
Which of these are not the elements WSDL ?
810
The UDDI is:
811
The XML provides the ________ in which you can write the specialized languages to express the complex interactions between the clients and the services or between the components of a composite service.
812
HTTP is the ubiquitous protocol, which is running practically everywhere on:
813
Using a ______ you can do exchange the data between the different applications and different platforms.
814
The Web services can not offer the application components like:
815
A ________ are the new breed of Web application.
816
UDDI is used for listing what ______ are available
817
WSDL is used for describing the services available.
818
SOAP is used to transfer the:
819
Web Services define a platform-independent standard based on XML to communicate within distributed systems.
820
________ can convert your applications into Web-applications.
821
Registry services such as managing information about service providers, service implementations and service metadata are provided by
822
Web Services attempts to describe architecture based on
823
Web services are the amalgamation of
824
What are the possible pivot-handlers in Java webservices?
825
Can two different programming languages be mixed in a single ASMX file?
826
What is new about web services?
827
Which of the following is an open source SOAP server and client?
828
The core components, registry and repository, business processes, trading partner agreements are defined in _____________ standards of web services
829
Which of the following three kinds of data that web services have?
830
Service Transport, XML Messaging, Service Description and Service Discovery are four layers of
831
Which of the following is used to perform remote procedure calls in web services?
832
In accessing a web service through ‘synchronous call’,
833
State True False. A windows application creation or a web application creation is mandatory in order to test a web service.
834
Which of the following is a directory service where enterprises register and search for web services?
835
Why SOAP is used as a protocol for accessing a web service?
836
Which of the following is used to locate and describe web services?
837
Web services enables
838
What is a web service?
839
Coding and decoding, and transporting the data is performed by
840
The simpler approach of implementing a web service is named as
841
What are the web service platform elements?
842
What is RPC?
843
__________ is used to convert your application into Web-Application.
844
Which of the following is an example of Web services in action?
845
It is necessary to have Web services to build a service-oriented architecture.
846
WSDL is derived from which of the following?
847
Which of the following companies was NOT involved in founding UDDI?
848
True or false: Web services is tied to a specific programming language.
849
Web services is based on which of the following?
850
Web service technology uses which of the following?
851
jQuery guarantees to pass _______ in all event handler.
852
Which of the following statement is TRUE?
853
Which method allows you to filter elements based on specified criteria?
854
$("div p").first(); what it selects?
855
Which method returns all sibling elements of the selected element.
856
Which of the following method is used to hide the element?
857
Which of the following method is used to request data from server?
858
$("div p.myCls"). What does it select?
859
Which jQuery method is used to deal with name conflicts?
860
Which of the following function automatically attaches new DOM elements to an event handler?
861
Which of the following jQuery method add/remove CSS classes from the selected elements?
862
$(this) selects_________.
863
$("div[class *=’myCls’]”) selects which element(s)?
864
______ selects DOM element by id.
865
Which of the following statement determines document is loaded?
866
jQuery library version 1.x is for ________ browser
867
Which of the following is shorthand for jQuery function?
868
jQuery library add which global function?
869
jQuery is a ________ library.
870
jQuery is a _______ side library.
871
Get the children of each element in the set of matched elements
872
The DOM node originally passed to jQuery
873
Store arbitrary data associated with the matched elements.
874
Attach a function to be executed whenever an Ajax request completes successfully.
875
Register a handler to be called when all Ajax requests have completed.
876
Register a handler to be called when the first Ajax request begins
877
Attach a function to be executed before an Ajax request is sent.
878
Register a handler to be called when Ajax requests complete with an error.
879
Get the children of each element in the set of matched elements.
880
Remove from the queue all items that have not yet been run.
881
Bind an event handler to the "click" JavaScript event.
882
Create a deep copy of the set of matched elements.
883
For each element in the set, get the first element that matches the selector by testing the element itself
884
Insert content, specified by the parameter, to the end of each element in the set of matched elements.
885
Select all elements that are in the progress of an animation at the time the selector is run.
886
Perform a custom animation of a set of CSS properties.
887
Add the previous set of elements on the stack to the current set.
888
Selects all elements in DOM scope.
889
Call all callbacks in a list with the given context and arguments.
890
Determine if the callbacks have already been called at least once.
891
Call all of the callbacks with the given arguments
892
Remove all of the callbacks from a list.
893
Lock a callback list in its current state.
894
Determine whether a supplied callback is in a list.
895
Determine if the callbacks list has been disabled.
896
Disable a callback list from doing anything more.
897
Add a callback or a collection of callbacks to a callback list.
898
Selects all button elements and elements of type button.
899
Determine if the callbacks list has been locked
900
Remove a callback or a collection of callbacks from a callback list.
901
Bind an event handler to the "change" JavaScript event on an element.
902
Selects all elements of type checkbox
903
Matches all elements that are checked or selected
904
Bind an event handler to the "blur" JavaScript event on an element.
905
Attach a handler to an event for the elements.
906
Insert content, specified by the parameter, before each element in the set of matched elements
907
Get the value of an attribute for the first element in the set of matched elements.
908
Insert every element in the set of matched elements to the end of the target.
909
$("div#id1 .cl1"). What does it select?
910
To get the property window in visual basic you have to press
911
Redim statement is used to :
912
In database application, any field does not contain any values can be recognized by:
913
Which of the following example is true about visual programming…
914
Visual Basic language launched early in…
915
An algorithm is…
916
Which option is true when the user clicks a button …….. is opened…
917
Which of the following appears at the top of the screen…
918
In an array will have the same properties as…
919
Which of the following arrays can be declared when the user may not know the exact size of the array at design time…
920
Which statement checks any undeclared variables and reports to the user about the error…
921
Which of the following is true about disabled menu item does not appear in the …
922
Which of the following property is common for many tools…
923
Which of the following box provides a set of choices to the user…
924
Val function translates a …………. value to a variable…
925
The size of 'Boolean' data type is :
926
Currency variable stores fixed point numbers with :
927
In visual basic the default unit is
928
To run an application you have to press
929
In visual basic you can draw something in
930
The full form of IIS is :
931
In case of visual basic, IDE means :
932
The arrange property of MDI form is available at design time.
933
It is possible to load a MDI form without any childform.
934
The other Single Document Interface forms are by default child of MDI form when MDI form is inserted.
935
Delete method of the recordset of Data Control or Data Access Object is delete the record which is pointed out by the record pointer.
936
The project extension name of a VB project is .vbj
937
It is possible to change the shortcut key assigned to any menu for accessing within the menu editor.
938
It is possible to access a menu without using mouse, to access the menu ;pressing the Ctrl key and the letter assigned to access the menu
939
The default startup object can not be changed in a project
940
In runtime it is not possible to change the form size.
941
Terminate is a valid event in form operation
942
Activate event is called before load event
943
CommonDialogs control is visible at runtime
944
If the Flag constant for the font common dialog box is cdlCFPrinterFonts then it causes the dialog box to show only the fonts supports by the printer specified by the hdc property
945
Flag property is used to adjust the function of each common dialog box
946
Dialog title property is used to change the title of any dialog box
947
The title of the dialog box can be changed.
948
CommonDialog control is the default control that anyone can find in the toolbar when a new project is started
949
Sort is a method by which elements can be sorted in flexgrid control
950
cell alignment property can be used to align the cells with different alignment style
951
It is not possible to change the back color property of option button control at run time.
952
It is possible to insert a picture in a option button control.
953
When someone uses the code like list1.list(1); then it will return the first item of the list box control.
954
List count property returns total number of items in list box control.
955
Sorted property of list box control is a design time property and cannot be changed in runtime.
956
It is possible to change the password character property of text box control at run time.
957
In a text box control the default caption for text box is text1.
958
Now() function will return the current drive and directory you are working on as return value.
959
Time() function is used to recover date & time.
960
ABS() function will generate a hole value when used with a number with fraction part (ex: 125.26598)
961
When using do loop-while statement then the statements within the loop body will be executed only once if the condition does not fulfilled
962
Function can return array as return value:
963
It is possible to build an application without using any form:
964
It is possible in visual basic to specifying array limit like from 1 to 10
965
Constants are processed faster than variables :
966
In visual basic 'Break' statement could be used along with "Select Case"
967
It is possible to declare 'Dynamic Array' in visual basic.
968
IsDate() function returns true if its argument is a valid date and time
969
Isnull(), IsEmpty() determines weather any variable has been initialize or not
970
Print' statement can be used to print any statement on the screen.
971
Time variable is used to store date and time in visual basic
972
Can you create Windows Services using VB.Net
973
How do you enable Strict Type Checking in VB.NET
974
How do you Create Constructors in VB.NET ?
975
How do you Dereference an Object in VB.NET ?
976
Select the keyword used to refer the name space in our code in VB.Net
977
To determine the folder in which your application is placed you can use:
978
My.Application.Log.WriteEntry , by default , writes to the file:
979
The metadata stored in the assembly is called :
980
Classes from which namespace will have to be used to read or write to a file ?
981
What’s the difference between a class field property ?
982
A ‘for’ loop will run faster in VB.NET or C# ?
983
which program will you use to assemble a program written in IL:
984
The vbc.exe compiler generates:
985
Can a toolbar display text instead of pictures in the buttons ?
986
What two controls are needed when creating a toolbar ?
987
This programming language model is used sparingly in VB 6 but is one of the cornerstones of VB.NET. Knowing the ins and outs of it will make an application migration project easier and also prepare you for additional work in VB.NET. What is the model ?
988
The Visual Basic Upgrade Wizard will convert all the code in your VB 6 application to VB.NET code for you
989
Some bits of a Visual Basic 6 application, like most APIs, can be easily migrated to VB.NET; other parts are not so straightforward. Which of the following will NOT have to be re-architected during a VB 6-to-VB.NET migration ?
990
If you know want to migrate your Visual Basic 6 application to VB.NET, what is the first thing you should do ?
991
Which class is used to run the EXE application file in VB.NET?
992
Smart Phone applications and other such devices can be written using:
993
Vb.Net classes can be derived in C#
994
Which of the following is not a method of Debug class
995
The serialization of an Object means that it is written out to a stream
996
How you refer the parent class in VB.Net
997
How do you refer the current class in VB.Net
998
How do you add Web Methods in VB.Net
999
Which of the method is used to display the form as modal
1000
The tool provided with .Net framework to register assemblies for use by COM is
1001
The DataAdapter uses which of the following object to retrieve the data from database
1002
Which is the best to retrieve Read-Only, Forward-only stream of data from database
1003
Which is the base class for TypedDataset
1004
Which method of the XMLdocument class takes xml as string while loading
1005
Where do you find COMException class
1006
How do we implement private interfaces
1007
How do you call non shared methods of a class
1008
Which interface allows to implement the Dispose method to do cleanup work
1009
The constructors in VB.Net is similar to which event in previous versions of VB
1010
How do you create a Read only Property in VB.NET
1011
How do you terminate code execute with in a VB.NET method
1012
The methods which return the values back to the calling code are called as
1013
Methods declared with the following modifier are not accessible outside the class
1014
Which of the following class does not belong to Collection namespace
1015
What is the significance of Option Explicit statement when it is set to On
1016
Which of the following Types will have data of fixed size
1017
Every type supported by CTS is derived from
1018
An Assemblyinfo file in a VB.NET project will have blank as file extesion.
1019
Most of the underlying integration of .NET is done through XML
1020
How many levels of compilation happens in .NET Framework
1021
How to dereference an object in VB.NET?
1022
_______ can be accessed from all types within the assembly, but not from outside the assembly.
1023
Using ___________ we can determine if a variable is initialized in VB.NET
1024
Which one of the following collections receives output from Trace and Debug classes?
1025
In VB.NET, the finalizer must use the Overrides keyword
1026
What is the purpose of Invoke Method?
1027
Which NameSpace is used to access the metadata in an Assembly?
1028
Which of the following is not correct about the value types and reference types in VB.NET?
1029
Lower bound value of array in VB.NET
1030
The smallest unit to which one can associate a version number in .NET is
1031
Which of the following namespace provides support for obtaining information and dynamic creation of types at runtime?
1032
If no access modifier is specified for a class, it is considered _________.
1033
Which of the following is not true for Shared members?
1034
Which of the following control doesn't receive the focus and doesn't have a TabIndex property?
1035
Which of the following control can contain other controls?
1036
Choose the correct statement about a delegate in VB.NET
1037
Default properties are always a parameterized property.
1038
The methods declared with the following modifiers are not accessible out side the current VB.NET project.
1039
COMException class is a part of ________
1040
________ is used to step through each line of code as it executes, including calls to other function.
1041
Which of the following is not a method of Debug class?
1042
________ protects system resources from unauthorized calls.
1043
Any project that compiles to an EXE or DLL files produces an assembly in .NET.
1044
Which of the following information is contained in the assembly manifest?
1045
The member “clear” of the Array class that sets a range of array elements to zero, false or null reference is a _____________ method.
1046
The corresponding .Net FCL type for Short is ___________
1047
____ allow custom items of information about a program element to be stored with an assembly’s metadata.
1048
What is the datatype of a variable in VBScript?
1049
What is the difference between the Sub procedure and Function procedure?
1050
In the Select Case statement, which case is used for unknown cases?
1051
What is the purpose of the Set keyword in VBScript?
1052
Which VBScript function returns the day of the week for any date?
1053
Which VBScript function can compare two strings?
1054
Which function is used to get the smallest subscript of an array in VBScript?
1055
Which function is used to get the largest subscript of an array in VBScript?
1056
Which function is used to get a subset of a array in VBScript?
1057
Which function is used to get a combined string from array of string in VBScript?
1058
A __________ variable is one that is declared inside a procedure.
1059
_______ loop repeats a group of statements for each item in a collection of objects or for each element of an array.
1060
_________ is the process of finding and removing errors
1061
The window in which the individual documents are displayed is called ____________window
1062
______ array size can be changed at run-time
1063
The ________ object is a stored query definition, which is a precompiled SQL statement
1064
14 The code in an application can be broken into logical components by _______ process.
1065
__________ is a collection of files
1066
The ______ is a tool used for both the Input and output purpose
1067
The default property for a text box control is _____
1068
____ is a method which moves the focus to the specified control or form
1069
_______ function is used to return a copy of a string without leading spaces.
1070
_______ cannot be declared in a form or class module
1071
_______ is used for finding out about objects, properties and methods
1072
_____ method removes a dialog box from view
1073
Form_Mouse Down ( ) procedure is executed when any mouse button is clicked in a free area of the ______.
1074
Visual Basic is a tool that allows you to develop application in __________
1075
Which of the given function is defined as None Function?
1076
What is the output of the given code snippet? def foo(fname, val): print(fname(val))foo(max, [1, 2, 3])foo(min, [1, 2, 3])
1077
List1 is [2, 33, 222, 14, 25], What is list1[-1]?
1078
What will be the return type of type(s)? Say s = "abcd"
1079
Text encoding in Python 3 is done in
1080
What is the output of the given code snippet? >>>max("what are you")
1081
How many arguments the help function, can take
1082
What is the output of the given code? x = 'abcd'for i in x: print(i.upper())
1083
What will be the output of the given code snippet? numbers = [1, 2, 3, 4]numbers.append([5,6,7,8])print(len(numbers))
1084
A function is defined in _______________.
1085
What is the output of the given code snippet? x = [12, 34] print(len(list(map(int, x))))
1086
Which of the following method are used to read from file
1087
What will be the output of the given code snippet? kvps = { '1' : 1, '2' : 2 }theCopy = kvps.copy()kvps['1'] = 5sum = kvps['1'] + theCopy['1']print(sum)
1088
The pass statement is used for
1089
On UNIX systems, the command to make Python source file, executable, is
1090
The return value of trunc() is _______________.
1091
When a module is imported for first time then,
1092
What is the value in 'x' from following expression x = 19 % 4 + 15 / 2 * 3
1093
What is the output of the given code snippet? i = 1while True: if i%3 == 0: break print(i) i + = 1
1094
What will be the output of the following? “hello”+1+2+3?
1095
What is the output of the given code snippet? x = "abcdef"i = "a"while i in x: print(i, end = " ")
1096
What is the extension of an Python program
1097
Which of the following is used to close a file object (fp)?
1098
Suppose list1 is [1, 5, 9], what is sum(list1) ?
1099
Syntactically lambda forms are restricted to how many expressions
1100
What is the value in 'x' from following expression x = 17 / 2 * 3 + 2
1101
What does the readlines() method returns?
1102
Which of the given arithmetic operators cannot be used with Strings?+, *, -, **
1103
A module imported (using an variant) by import statement, does not imports
1104
Which type of exception is raised when an operation or function is applied to an object of inappropriate type
1105
The variadic arguments beyond the formal parameter list are contained in
1106
What is the output of the given code snippet? i = 1while True:if i%2 == 0:breakprint(i)i += 2
1107
What is the output of the given code snippet? i = 0while i < 3: print(i) i += 1else: print(0)
1108
Which of the following function takes a string as argument and displays it to the user
1109
Which amongst the following is not a core datatype?
1110
What will be the output of the given code snippet? names1 = ['Amir', 'Barry', 'Chales', 'Dao']names2 = names1names3 = names1[:]names2[0] = 'Alice'names3[1] = 'Bob'sum = 0for ls in (names1, names2, names3): if ls[0] == 'Alice': sum += 1 if ls[1] == 'Bob': sum += 10print(sum)
1111
If x = 545; what is the output of the given code snippet?print(“%06d”%x)
1112
What will be the return type of following code snippet? print "ABCDEF".center()
1113
What will be the return type of type(s)? print ("abababbaababaaab".count("a", 2, 14))
1114
Which character indicates an append mode to open function
1115
The option given at command-line interface during interpreter invocation to discard docstrings for optimization, is
1116
What is the output of the given code snippet? x = 'abcd'for i in range(len(x)): print(i)
1117
What is the output of the given code snippet? x = [12, 34]print(len(''.join(list(map(int, x)))))
1118
What error shall occur when we execute the following?apple = mango
1119
What will be the output of the given code snippet? d1 = {"john":40, "peter":45}d2 = {"john":466, "peter":45}d1 == d2
1120
What is the output of the given code snippet? print("abc DEF".capitalize());
1121
What is the extension of an intermediate form that Python transforms the program into
1122
A imported module is stored as
1123
What is the output of the following codea = ['a','b', 'c']for i in range(len(a)): print(i, a[i],end=' ')
1124
What statement gives the following output?hello\exampleest.txt
1125
The function used to traverse a sequence in reverse direction, is
1126
Which statement is used to tell Python to skip the rest of the statements in the current loop block and to continue to the next iteration of the loop
1127
No value in python is assigned by
1128
Addition of function name in the current symbol table is done by
1129
What is the output of given code snippet?def sum(*args): '''Function returns the sum of all values''' r = 0 for i in args: r += i return rprint(sum.__doc__)print(sum(1, 2, 3))print(sum(1, 2, 3, 4, 5))
1130
What is the output of the given code snippet?x = "abcdef"i = "a"while i in x: x = x[:-1] print(i)
1131
Which of the following statement terminates the loop statement and transfers execution to the statement immediately following the loop?
1132
What will be the output of the given code snippet?boxes = {}jars = {}crates = {}boxes['cereal'] = 1boxes['candy'] = 2jars['honey'] = 4crates['boxes'] = boxescrates['jars'] = jarsprint(len(crates[boxes]))
1133
What will be the output of the given code snippet?kvps = { '1' : 1, '2' : 2 , '3' : 3, '4' : 4, '5' : 5}newData = { '1' : 10, '3' : 30 }kvps.update(newData)print(kvps)
1134
What is the output of the given code snippet?(str1 = 'hello'str2 = ','str3 = 'world'print str1[-1:])
1135
ListExample is [3, 4, 5, 20, 5, 25, 1, 3],What is list1 after listExample.extend([34, 5])?
1136
What is the output of the given code snippet?print("abcdef".center(0))
1137
_____________ refers to mathematical function.
1138
What is the output of the given code snippet?elements = [0, 1, 2]def incr(x): return x+1print(list(map(elements, incr)))
1139
What is the output of the given code snippet?age = 10;if(age<10): print (age)else: print(age+3)
1140
The version number of current python environment is checked by using which module
1141
What will be the output of the given code snippet?kvps = { '1' : 1, '2' : 2 }theCopy = dict(kvps)kvps['1'] = 5sum = kvps['1'] + theCopy['1']print(sum)
1142
The base class for all built-in exceptions, is
1143
What will be the return type of type(s)?str = "Vskills"print str.find("s")
1144
Which of the following are the advantages of functions in python?
1145
What will be the output of the given code snippet?numberGames = {}numberGames[(1,2,4)] = -8numberGames[(4,2,1)] = -10numberGames[(1,2)] = -12sum = 0for k in numberGames: sum += numberGames[k] print(len(numberGames) + sum)
1146
What is the value in 'x' from following expression x = 17 / 2 % 2 * 3**3
1147
What will be the return type of following code snippet?print "ABCDEF".center()
1148
What is the output of the given code snippet?i = 2while True: if i%3 == 0: break print(i) i += 2
1149
The return value of trunc() is _______________
1150
What will be the return type of type(s)?str = "Vskills"print str.rfind("s")
1151
Given the following code, will the program terminate?balance = 14while(True): if(balance<13): break balance = balance-13
1152
Extra parameters in the exception object can be stored by including them in
1153
Python commands can be executed directly by interpreter with using the switch
1154
Reloading a module when it has already been imported is done by using which function
1155
The module name is stored by which variable
1156
What is the output of the given code snippet?print type(type(int))
1157
What is the output of the given code snippet?def foo(fname, val): print(fname(val))foo(max, [1, 2, 3])foo(min, [1, 2, 3])
1158
The data structure which is immutable, is
1159
Arrange the following in the order of precedence in Python.i) Parenthesesii) Exponentialiii) Divisioniv) Multiplicationv) Additionvi) Subtraction
1160
What is the output of the given code snippet?print(0xA + 0xB + 0xC)
1161
What is the output of the given code snippet?(print('The sum of {0:b} and {1:x} is {2:o}'.format(2, 10, 12)))
1162
What will be the output of the given code snippet?aList = [1,2]bList = [3,4]kvps = { '1' : aList, '2' : bList }theCopy = kvps.copy()kvps['1'][0] = 5sum = kvps['1'][0] + theCopy['1'][0]print(sum)
1163
What will be the output of the given code snippet?(names1 = ['Amir', 'Bala', 'Charlie']names2 = [name.lower() for name in names1]print(names2[2][0]))
1164
What will be the return type of type(s)? print("abc DEF".capitalize())
1165
To insert 5 to the third position in list1, which command is used?
1166
Python supports the creation of anonymous functions at runtime, using a construct called ___________________
1167
The weakly internal variables have, which special character to recognize them
1168
What is the output of the given code snippet?(class Test: def __init__(self): self.str = "Functions" self.x = 15 def fun(): return Test()t = fun() print(t.x)print(str))
1169
How do you do a random shuffle in a list named list1?
1170
What is the output of the given code snippet?(i = 5while True: if i%0O9 == 0: break print(i) i += 1)
1171
The _______________ module in the python standard library parses options received from the command line.
1172
What is the output of the given code snippet?(x = "Hello World"print "%s" % x[4:8])
1173
What will be the output of the given code snippet?(kvps = { '1' : 1, '2' : 2 }theCopy = kvps.copy()kvps['1'] = 5sum = kvps['1'] + theCopy['1']print(sum))
1174
What will be the return type of type(s)? print ("abababbaababaaab".count("a",-12,-2))
1175
The character used to indicate end of a block, is
1176
What is the output of the given code snippet?(a = [0, 1, 2, 3]for a[0] in a: print(a[0]))
1177
What is the output of the following code(i=5def f(a=i): print(a)i= 6f())
1178
The format specifier which left aligns the value in Python 3, is
1179
What is the output of the given code snippet?(x = 2for i in range(x): x += 1 print (x))
1180
What will be the output of the given code snippet?(confusion = {}confusion[1] = 1confusion['1'] = 2confusion[1.0] = 4sum = 0for k in confusion: sum += confusion[k]print(sum))
1181
What is the output of the given code snippet?(i = 0while i < 3: print(i) i += 1else: print(0))
1182
What is the output of the given code snippet?(print('abcdefcdghcd'.split('cd', 2)))
1183
What is the output of the given code snippet?(n=9while n!=0: print(n) n=n-2)
1184
The local variable names beginning with an underscore that are discouraged are _____________________
1185
What will be the output of the given code snippet?(d = {"john":40, "peter":45}"john" in d)
1186
What will be the output of the given code snippet?(country_counter = {}def addone(country): if country in country_counter: country_counter[country] += 1 else: country_counter[country] = 1addone('China')addone('Japan')addone('china')print(len(country_counter)))
1187
What is the output of the following code snippet?(def sum(*args): r = 0 for i in args: r += i return rprint(sum.__doc__)print(sum(1, 2))print(sum(1, 2, 3, 4)))
1188
What is the shell prompt symbol usually in Linux
1189
listExample is [3, 4, 5, 20, 5, 25, 1, 3], What is list1 after listExample.pop()?
1190
Which of the given statements create a dictionary?
1191
What is the output of the given code snippet?(x = [[0], [1]]print(len(' '.join(list(map(str, x))))))
1192
The __________ function of dictionary gets all the keys from the dictionary.
1193
Where do the arguments to functions always appear?
1194
What is the output of the given code snippet?(x = ['ab', 'cd']print(list(map(list, x))))
1195
The numeric value that an python variable can be assigned other than float and integer, is
1196
What is the output of the given code snippet?(str = "Hello Python"str[3] = 'o'str[7] = 'i'print(str))
1197
What is the output of the given code snippet?(i = 0while i < 5: print(i) i += 1 if i == 3: breakelse: print(0))
1198
What will happen if no arguments are passed to the seek function?
1199
What is the output of the given code snippet? (i = 5while True: if i%0O10 == 0: break print(i) i += 1)
1200
Bitwise operator works on _______________ and performs _______________ operation, in Python.
1201
What is the output of the given code snippet? (for i in range(int(float('inf'))): print (i))
1202
Suppose list1 is [3, 5, 25, 1, 3], What is min(list1) ?
1203
What is the output of the given code snippet?()x = (i for i in range(3))for i in x: print(i)
1204
What is the output of the given code snippet? (for i in [1, 2, 3, 4, 5][::-2]: print (i))
1205
What is the output of the given code snippet? (x = ['ab', 'cd']print(len(list(map(list, x)))))
1206
To store values in terms of keys and value _______________ is used.
1207
Which type of exception is raised when an operation or function is applied to an object of inappropriate type.
1208
What is the output of the given code snippet? print('abcdefcdghcd'.split('cd',2))
1209
Which parameter displays python version
1210
What is the output of the given code snippet?
1211
MySQL supports user defined functions
1212
Wildcards are
1213
The GROUP BY command cannot be used with aggregate functions together
1214
The ASC and DESC keywords can be used in the same statement
1215
The clause ORDER is used to sort records in either ascending or descending order.
1216
What improvements can be made to the query UPDATE students SET `contact number` = 0999;
1217
What command is used to permanently remove a record from a database table?
1218
What will be the output of the following query INSERT INTO students (student name) VALUE ('James Lenon');
1219
The query SELECT * FROM `movies` INSERT INTO `movies_archive` executes without any errors.
1220
What will be the output of the following query. SELECT * FROM `sales` WHERE amount > 200.
1221
The WHERE clause is exactly HAVING clause
1222
Which of the following scripts will run successfully
1223
The WHERE clause is mandatory when using the SELECT command
1224
the command DROP SCHEMA `STUDENTS`; will delete the students database.
1225
Which of the following SQL statements will generate an error when executed.
1226
a one to many relationship can only contain multiple entries of both primary and foreign keys.
1227
Which of the following is not YES regarding ER modeling
1228
What is a composite key?
1229
Normalizations is...
1230
The database development lifecycle is very important to the successful implementation of a database system.
1231
The logic model of a database is?
1232
MySQL workbench decreases the productivity of a MySQL developer compared to other server access tools such as phpMyAdmin?
1233
MySQL supports multiple database storage engines.
1234
Which type of database management system represents relations using tables?
1235
A systematic collection of data stored in a central location is known as?
1236
During program runtime, you use the class to create discrete objects (instances) in the memory. This process is called instantiation
1237
The CLASS statement can be nested, that is, you can define a class within a class
1238
Which of the following can be used to store control data such as screen sequences or program parameters?
1239
Which of the following receive the request from client and assigns the request to one of the work process?
1240
Which of the following can be called from both the program in which it is defined and from other programs?
1241
ABAP contains a series of statements that allow you to leave an event block. Which of the below is specifically used to leave a GET event block?
1242
Which of the below transaction is used to call Context builder and to create a new context?
1243
To assign data type of another object to the declaring object, which of the following can be used?
1244
Which of the below programs are not executable and act as container for global classes?
1245
In a chained statement in ABAP program, which of the below syntax are used for writing the identical part, to separate variables and to end the statement?
1246
Which of the following statement is correct about Radio button groups in 1 screen?
1247
In SAP ABAP high level architecture, which of the following layer consists of input devices like web browser, mobile devices?
1248
What is the attribute which defines the storage type of a Standard Table or a Custom Table?
1249
Where does the BADI Definition reside at?
1250
Which statements from below are false about Logical Database?
1251
In Debugging, How can the user set a breakpoint?
1252
Which of the following below are true about IDOC?
1253
What is the Structure of LSMW?
1254
What is the Tcode for SQL Trace?
1255
What is the attribute which defines the size of a Standard Table or a Custom Table?
1256
Identify the Keyword that determines if a CMOD function exit has been provided?
1257
In regard to the field selection, which option of the SELECT statement is required?
1258
What does Business Add-in does not consists of?
1259
What are the components of Logical Database?
1260
How can we start an ABAP new Debugger?
1261
What are not the attributes with respect to Tabstrip?
1262
What are the default menu’s seen in the SAP Screen?
1263
What are the servers involved during QRA?
1264
What happens when two “ top-of-page “ statements were given in the Program?
1265
What is the Tcode for RFC Programming?
1266
What is the Tcode for IDoc Testing Tool?
1267
Placing value of screen fields to ABAP fields which one is used?
1268
What is the responsibility of a DBA?
1269
What is the activity done in the Production server of SAP?
1270
Which view uses only one table?
1271
What are the output formats of ALV?
1272
Shipping comes under which module of SAP?
1273
What happens when a Function Module has been called?
1274
Which component of class, preserves its own consistency?
1275
Dynamically generated function code is stored in
1276
Syntax for Static Method Specification?
1277
Customization is done in?
1278
What is the Tcode where we can develop the USER-EXITS?
1279
What is the Tcode for SAP Online Support System?
1280
What happens when a get_instance factory method is called
1281
In a search help, by using which parameter the specialization of a field is found?
1282
What is the Internal Table which has the same response time irrespective with the size o f the table?
1283
What is the Tcode to view the list of users associated with the same client?
1284
What is the Tcode for Lock entries?
1285
What is the Tcode used for calling transport organizer?
1286
How many radio buttons are associated when there are 4 radio buttons as a single radio button group?
1287
Which of the following functions does the ABAP Dispatcher perform?
1288
What are characteristics of a hashed internal table?
1289
You want to define data structures to hold two fields with data elements s_carr_id and s_carrname. Which of the following declarations can be used to define this data structure?
1290
You need to perform a downcast. What should you do?
1291
Which of the following controller types can exist only once in a Web Dynpro component?
1292
Which of the following data types are predefined ABAP data types?
1293
Which of the following conditions must be fulfilled when using a GROUP BY clause in a SELECT statement?
1294
Which of the following rules must you follow when creating subscreens?
1295
Which of the following will be method is executed after component content initialized, during component lifecycle
1296
Which type of forms places form handling logic within a component's class properties and provides interaction through observables
1297
Which type of forms places most of the form handling logic within that form's template
1298
What is not an feature of template driven forms in Angular
1299
Select the output of following, assuming dateObj is (year: 2015, month: 6, day: 15, hour: 21, minute: 43, second: 11) in the local time and locale is 'en-US' - {{ dateObj | date:'shortTime' }}
1300
What is the output, if the value for end is omitted, in SlicePipe
1301
What is the default value of symbolDisplay, while using the CurrencyPipe
1302
Identify the correct output of currencypipe expression - {{num1 | currency:'USD':true:'2.2-4'}} , given the value of num1 as 10.263782
1303
What is the output, of having a negative integer for start, in SlicePipe
1304
Which option value for directive class, enumerates the set of data-bound input properties for a directive
1305
What is the advantages of the component-based architecture
1306
What is the value being assigned to cake in typescript statement - let cake: str = 10;
1307
Which of the following method is executed at first during component lifecycle
1308
Select an invalid expression in Angular
1309
What does NgModules consolidates, in Angular
1310
What is not an feature of reactive forms in Angular
1311
What marks the start and end of an HTML element
1312
What is the output, of having a integer having value of positive and greater than the size of the expression, for start, in SlicePipe
1313
What is the output, of having a integer having value of negative and greater than the size of the expression, for start, in SlicePipe
1314
What is the default ECMAScript target version given by -t parameter of tsc compiler
1315
What does Angular an NgForm component represents in an HTML Web page
1316
Which subdirectory includes files for end-to-end testing, when you invoke the ng command to create an Angular application
1317
What does a component class is defined to
1318
Which of the following will be method is executed after every check of component views, during component lifecycle
1319
Select the correct output of currencypipe expression - {{num1 | currency}} , given the value of num1 as 0.25
1320
What will be the output of decimalpipe expression - {{num1 | number:'3.2-5'}} , given the value of num1 as 12.638467846
1321
What is the default value of minFractionDigits, while using the DecimalPipe
1322
Which schematics in Angular Material, will create a new component that includes a toolbar with the app name and the side nav responsive based on Material breakpoints
1323
Select the output, if trying to evaluate undefined properties, in Angular
1324
Which option value for directive class, maps class properties to host element bindings for properties, attributes, and events, using a set of key-value pairs
1325
How many instance of the Router service should a routed Angular application have
1326
What NgModule metadata does , in Angular
1327
Which of the following is used by Angular to process expression
1328
What is not an feature being offered by Angular
1329
Which type of web applications are more suitable for Angular
1330
What is the output, of having a positive integer for start, in SlicePipe
1331
What is the data type of first parameter of ngInclude directive of Angular
1332
Which of the following is the root element in HTML
1333
What is the benefit of Angular Animation
1334
Which types of directive in Angular, change the behavior of a component or element but don't affect the template
1335
Which of the following will be method is executed after every check of component check, during component lifecycle
1336
What is the default value of maxFractionDigits, while using the DecimalPipe
1337
Select the output of following, assuming dateObj is (year: 2015, month: 6, day: 15, hour: 21, minute: 43, second: 11) in the local time and locale is 'en-US' - {{ dateObj | date:'mmss' }}
1338
How to install TypeScript transpiler
1339
What is sent by server after approval of the client's request
1340
How many parameters are taken by animate function in Angular
1341
Which tsc command will concatenate all the generated JavaScript on a single file called final.js
1342
How you can link together different pages of your app in Angular 8
1343
Which operation does Builders API in Angular 8, provide builders for
1344
What has global CSS rulesets of an Angular 8 project
1345
Which folder in an Angular 8 project, is used for end to end testing
1346
What does differential loading in Angular 8, refers to
1347
Which Ivy feature in Angular 8, focuses on removing the unused code
1348
Which of the following contains the project's dependencies , in an Angular 8 project
1349
What has routing and components for an Angular 8 project
1350
What is an build tool in Angular 8
1351
Which is the minimum Typescript version supported by Angular 8
1352
DATA FROM DIFFERENT CLIENTS IS KEPT SEPARATELY
1353
BASIC FUNCTIONALITY 7.00 MATCHES WITH CORE COMPONENT
1354
COMMUNICATION BETWEEN ABAP STACK AND JAVA STACK IS DONE THROUGH ___.
1355
IN SAP NETWEAVER AS ABAP+JAVA TWO DIFFERENT DATABASES ARE REQUIRED, ONE FOR ABAP, ANOTHER FOR JAVA.
1356
WHICH OF THE FOLLOWING CONTAINS A MESSAGE SERVER?
1357
TRANSACTION SCC1 COPIES CHANGES FROM ONE CLIENT TO ANOTHER CLIENT BASED ON
1358
TRANSPORT REQUEST IS MADEUP OF
1359
WHICH SYSTEM IS RESPONSIBLE FOR MAINTENANCE OF INFRASTRUCTURE & CONFIGURATION OF STMS?
1360
WHICH OF THE FOLLOWING PROPERTY SHOULD ONE CONSIDER WHEN DECIDING THE DOMAIN CONTROLLER SYSTEM.
1361
IS IT POSSIBLE TO DEFINE MORE THAN ONE CONSOLIDATION AND DELIVERY ROUTES IN A TRANSPORT LANDSCAPE?
1362
IN A TRANSPORT DOMAIN CONTAINING 8 SYSTEMS, TWO SYSTEMS CAN SHARE The SAME SYSTEM ID?
1363
WHICH OF THE FOLLOWING STRATEGIES IS MOST RECOMMENDED AS A TRANSPORT STRATEGY IN SAP?
1364
WHICH OF THE FOLLOWING WILL BE DEFAULT NAME OF CONSOLIDATION ROUTE FOR A THREE SYSTEM LANDSCAPE CONTAINING, QMS, DMS AND PMS SYSTEMS?
1365
A PROJECT MANAGER CREATES ______ AND DISTRIBUTES INDIVIDUAL ______ TO THE CUSTOMIZING TEAM
1366
WHICH OF THE FOLLOWING IS CLIENT DEPENDENT REQUEST
1367
WHICH OF THE FOLLOWING WILL CHANGE AFTER APPLYING SUPPORT PACK TO A COMPONENT
1368
IN A THREE SYSTEM LANDSCAPE, HOW CAN YOU APPLY A SNOTE THROUGHOUT THE LANDSCAPE
1369
WHEN DOES THE BUFFER OF PRODUCTION GETS POPULATED IN STANDARD THREE SYSTEM LANDSCAPE?
1370
WHAT WILL YOU CHECK WHEN YOU SEE A TRUCK SYMBOL IN IMPORT QUEUE, AND THE TRANSPORT IS HANGING
1371
THE FOLLOWING TABLES ARE USED FOR COMMUNICATION BETWEEN RDD* JOBS AND TP WHILE IMPORT OF A TRANSPORT REQUEST
1372
THREE SYSTEMS IN A SINGLE LANDSCAPE CAN HAVE DIFFERENT TRANSPORT DIRECTORIES
1373
WHEN YOU WANT TO ADD A NEW PATCH TO YOUR EXISTING COMPONENT, FOR EXAMPLE, FIN_BASIS 700 - YOU WILL USE
1374
WHEN YOU WANT TO ADD A NEW COMPONENT TO YOUR EXISTING NW 700 SYSTEM, FOR EXAMPLE, FIN_BASIS 700 - YOU WILL USE
1375
IS IT POSSIBLE TO DEFINE MORE THAN ONE CONSOLIDATION AND DELIVERY ROUTES IN A TRANSPORT DOMAIN?
1376
THE SYSTEMS IN A SYSTEM LANDSCAPE SHARE CUSTOMIZING AND REPOSITORY OBJECTS VIA ________ ?
1377
Which configuration file is used for scenario test in Yeoman
1378
What is the default scope type in Angular JS
1379
What is used to read or write a cookie by Angular JS
1380
Which of the following is true about AngularJS expressions
1381
How many optional arguments are taken by $resource function
1382
What acts as glue between controller and view?
1383
AngularJS needs data in which format to populate its model?
1384
The legal restrict value "M" is used to invoke directive for which meathod?
1385
Can multiple angular applications be bootstrapped using same element?
1386
Filter is applied to an expression using which character? a
1387
With more than one ng-app in an HTML document (an HTML page), are all of them automatically initialized.
1388
Can an HTML page have multiple "ng-app" directive for bootstrapping multiple AngularJS application?
1389
AngularJS initializes based upon which of the following scenario?
1390
AngularJS expressions support?
1391
AngularJS Expressions is 2-way data binding?
1392
Where the Loading of AngularJS Library is recommended?
1393
Who is known as the Father of AngularJS?
1394
AngularJS is a ________
1395
Which AngularJS attribute will copy the DOM
1396
What is the second argument of $watch()
1397
Which directive is used to render contents of a variable as HTML, in safe manner
1398
Which feature of Angular JS does the law of demeter is applicable to
1399
Which of the following is true about currency filter
1400
What is the state of caching of all requests by default
1401
Which of the following is the character with which the name of the Angular's bundled services start with
1402
Which of the following Angular
1403
Which of the following refers to the view component in Angular JS
1404
What is the default value for priority property in directive definition
1405
What is the style of writing tests being supported by Angular JS, by default
1406
Which directive definition option, is used to replace the current element, if true
1407
Which of the following is true about $routeProvider
1408
Which of the following directive is used to display text
1409
What is the type of method call, is XHR
1410
The term JSON refers to ______________
1411
Which HTML tag is used to define the templates in Angular JS
1412
Which configuration file is used for unit test in Yeoman
1413
How angular.module works
1414
Which of the following character is used to implement data binding in Angular JS
1415
Which of the following creates a configurable service in Angular JS
1416
What is the default port number of the Karma server
1417
How many arguments does 'then' function takes
1418
Which configuration parameter of config object in Angular JS, specify the HTTP request type
1419
Which of the following is not an filter in Angular JS
1420
What does the term AJAX expands to ______________
1421
Which configuration object is used to customize headers for outgoing requests
1422
How many equivalent forms of displaying text are present in Angular JS
1423
What is the unit of time used in timeout configuration parameter of config object in Angular JS
1424
Which binding strategy symbol in isolated scope, means passing in a function from the parent scope to be called later
1425
How many components does localeIDs consists of
1426
What is usually the data type of first argument of $watch()
1427
Which part of the MVC model does the application logic resides in
1428
Which is the valid declaration in Angular JS if validated in an XML parser
1429
Which of the following is true about provider
1430
Which code is optional during specification for $locale in Angular JS
1431
Which binding strategy symbol in isolated scope, means passing this attribute as an string
1432
Which directive definition option, is used to require other directive to be present for proper functioning
1433
Which of the following Angular's service is used to interact with browser's location
1434
Which character is used to chain multiple filters
1435
How many required arguments are taken by $resource function
1436
What is the default value for restrict property in directive definition
1437
Which of the following is not a core AngularJS directive.
1438
What value is assigned to restrict property in directive definition, for being specific to comments
1439
Which type of scope, inherits no model property from it
1440
What value is assigned to restrict property in directive definition, for being specific to attributes
1441
In the _____________ stage of the project life cycle, a major portion of the physical project work performed
1442
When considering the following activities, which is the best example of a project?
1443
Which of the following is NOT considered to be a characteristic of a project
1444
Cause of change that cannot be managed by the PM is
1445
Despite of how carefully a project is planned, it is almost certain to be changed before
1446
Problem of changing the scope or performance, expected of a project is a major
1447
An increase in user or team knowledge or sophistication is the primary factor leading to
1448
Causes for change in projects are basically of
1449
What is the full form of AJAX?
1450
Which programming language driver is not provisioned in selenium core ?
1451
Which amongst the following is not a Component of Selenium?
1452
What type of test design technique, is applied if using unit testing ?
1453
What is the feature of Webdriver API
1454
What character is used to separate cookies, when accessed by selenium in Selenium 1.0
1455
Which of the following is not an locator type
1456
Which operating system supports Selenium installation and application on Chromium web browser
1457
DOM refers to ___________________.
1458
Which WebDriver log level has messages of an informative nature like information about received commands ?
1459
What is common between Selenium 1 and 2
1460
How many parameters does job pattern of Jenkins accept, for periodic execution
1461
When did Selenium was launched
1462
Which of the following is not an locator
1463
How many parameters does an accessor used to extend Selenium, can accept ?
1464
Which CSS selector will locate a element with ID starting with the text ctrl ?
1465
What is used to extend Selenium and refers to finding the element in UI ?
1466
Which of the following web element does, submit function is applicable, in Selenium Webdriver ?
1467
What is the default port used by Selenium Hub for communication ?
1468
Which tag in configuration file of Maven is used to tell the version of Selenium ?
1469
What should be used for dynamically generated identifier ?
1470
What is an cookie in Selenium ?
1471
Which log type collects logs for FirefoxDriver internals under Selenium ?
1472
What does Firefox profile, stores ?
1473
Which column values in the test table will be taken by second argument of custom action used for extending Selenium ?
1474
Which of the following finds the item ending with the value passed in and is equivalent to the Xpath ends-with
1475
Which of the following needs a time value in Selenium
1476
What is called that scale for large test suites or test suites that must be run in multiple environments
1477
Which of the following programming language is not supported by Selenium WebDriver ?
1478
Which amongst the following is considered as a disadvantage of Selenium WebDriver?
1479
Which method will close only the current window the WebDriver is currently controlling ?
1480
Which operating system is supported by Jenkins
1481
Which of the following is prefixed for all accessors registered in selenium object prototype ?
1482
What is not part of HTML5
1483
What is the file extension of Firefox plugins supported earlier by Firefox, on Windows ?
1484
How many listener can be registered with EventFiringWebDriver ?
1485
Which of the following commands is used to pause execution till the page is completely loaded?
1486
What is the default path to the directory used to extract supporting files used by the server in InternetExplorerDriver ?
1487
Which operating system is supported by AutoIT
1488
What is not an advantage of test automation
1489
Which of the following applications can interact with selenium
1490
Which Xpath selector will locate a element with ID ending with the text userName ?
1491
Which of the following can not be extended in Selenium
1492
Which wait type should be used for a method which takes a screenshot and compares with another picture with the condition that Selenium should wait until that method returns true ?
1493
DOM refers to ___________________
1494
Which exception is thrown when the selector is an xpath expression and it is syntactically invalid ?
1495
How many parameters does an custom accessor can take, if the custom accessor is used to extend Selenium ?
1496
Which protocol is used to communicate between Hub and nodes ?
1497
Which function will not throw an exception, if targeted element is not found on the page
1498
What are the number of arguments accepted by beforeClickOn function, event listener ?
1499
Which of the following programming language is not supported by Selenium WebDriver
1500
Which of the following Selenium tool, is a Firefox plugin
1501
Which amongst the following is not considered as a Functional Test Automation?
1502
Which AutoIT function is used to send keyboard keys like enter, to the AUT ?
1503
What prefix pattern specify a globbing pattern parameter for a selenese command as label ?
1504
What is the direction of movement of cursor, if the yOffSet parameter of moveByOffset, is a negative number ?
1505
Whose configuration can be specified in POM file of Maven for integration with Selenium ?
1506
What does a test suite contains?
1507
Which of the following commands is used to pause execution till the time specified element appears?
1508
The character which is equivalent to ends_with partial matching of XPath attribute , is
1509
What is the default value for, number of Chrome web browsers available for concurrent usage after starting the node in Selenium Grid ?
1510
Which of the following Selenium tool, is a JavaScript based automation engine or sandbox, as it needs to comply with the Same-Origin policy ?
1511
What is the default path and file name of the log file used by the InternetExplorerDriver ?
1512
Which amongst the following statement holds true about Data Driven Framework?
1513
What is used so that the test will stop at that point and not run any subsequent checks ?
1514
Select the data type of last parameter of moveToElement function .
1515
Which file type is generated by Junit for test reporting with Selenium RC
1516
Identify the maximum number of parameters, that can be passed to the clickAndHold function
1517
_______________ are being tested under Selenium
1518
Which amongst the following options holds true with reference to creation of excel automation object using POI excel API?
1519
_________________ is the command that is not a type of assertion in Selenium IDE
1520
What is the project configuration file if setting up a Selenium-WebDriver project in Maven
1521
Which of the term refers to wrapping Selenium methods is to check for presence of an element on page before carrying out some operation
1522
Which of the following is usually used to check critical things on a web page, whose failure should not lead to continuation of test ?
1523
What document type uses Xpath
1524
What is the data type of parameter of getCssValue method ?
1525
What is the port number assigned as default by hub
1526
Which of the following command pauses execution for adding an element in the page
1527
Which type of test should be used for static content with no updations ?
1528
Which of the following selects parent, grandparent, and so on of a specified element, related to which axis name in Selenium
1529
What is the return value of moveToElement function ?
1530
Select the output if modifier key is not provided to keyUp function .
1531
Which of the following testing framework, requires the development of data tables and is independent of the test automation tool ?
1532
Which prototype need to be extended to create our own function to locate an element
1533
What is the reason for popularity of web application development and testing ?
1534
What is the correct syntax to instantiate a Chrome/Chromium session
1535
Which operating system does not supports selenium IDE ?
1536
_____________ is the method used to counts the number of elements, in webdriver.
1537
Which of the following URL will point to the console and status of the hub, under Selenium Grid, if running on port 6666
1538
Which operating system supports Selenium installation and application on Internet Explorer web browser
1539
What type of test design technique, is applied if using inspection ?
1540
Which method is used to access cookies
1541
What does the assertTitle checks
1542
Which tool is appropriate to set up a Selenium 2.0 Java project
1543
What is needed for development and testing for Ruby project with Selenium
1544
Which of the following is used to locate an element by using JavaScript
1545
Which object prototype in Selenium, is used for extending Selenium
1546
The command that is used in WebDriver, to enter values onto text boxes is _________________.
1547
What is the data type of parameter of getAttribute method
1548
Which exception is thrown when frame or window target to be switched doesn’t exist ?
1549
Does selenium IDE supported Google chrome as an plug during its launch?
1550
Select the data type which is returned by beforeClickOn function, event listener
1551
What does the regex * character evaluates to
1552
What is the default value of time in seconds before the hub automatically releases a node that hasn't received any requests for more than the specified number of seconds ?
1553
Which exception is thrown when user is no longer on the same page, or the page may have refreshed since the element was located ?
1554
Which command is used for handling AJAX controls by selenium
1555
What are the advantages of test automation
1556
Whose occurance in Junit, is reported as error ?
1557
What is the use of Web driver?
1558
What is the benefit of Selenium Webdriver as compared to Selenium RC ?
1559
Which mechanism is used by Selenium to recognize which custom extensions, are actions, assertions or locators ?
1560
_______________ is not supported by Selenium WebDriver.
1561
Which operating system supports Selenium installation and application on Edge web browser ?
1562
What type of test design technique, is applied if using system testing ?
1563
Which parameter is not optional, when creating the browser instance in Selenium RC
1564
What is the default page load strategy followed by geckodriver
1565
Which WebDriver log level is considered as the lowest log level ?
1566
Which of the following does not support Test design for creating test Cases?
1567
Consider the given situation and identify the most suitable option. In this case, applications does not have the items required for the tests when the tests get to commands. So as to fix this we had a look at adding from waitFor commands to test.
1568
Which object oriented principle does Page object pattern, is based on ?
1569
Which of the following holds true about Jenkins?
1570
What is the default value for, number of Firefox web browsers, available for concurrent usage after starting the node in Selenium Grid ?
1571
What is the data type of value returned by load function if using LoadableComponent ?
1572
What is the full form of JSON?
1573
What is the term 'RC' refer to in Selenium RC ?
1574
What is stored at one place by a UI map for test automation
1575
What is the utility of the Selenium IDE
1576
What is the minimum Selenium version supported by geckodriver ?
1577
Which request type is created for each Selenium command by WebDriver
1578
Which code snippet is used to create array in Java for primitive data types?
1579
Which of the following can not be extended in Selenium ?
1580
Which log type collects logs from within the selenium server ?
1581
Which parallel attribute option, is suitable to group all classes that are not thread safe, while parallelizing test runs in Selenium with TestNG ?
1582
What is not an advantage of linear framework of software testing ?
1583
Which of the following is not an open source software testing tool
1584
What is used so that the test will stop at that point and not run any subsequent checks
1585
____________________ can only test web applications.
1586
Which of the following stores information about configuration items ?
1587
In order to specify a globbing pattern parameter for a Selenese command _________________ label is being used as prefix pattern.
1588
Which of the following command is not a wait command
1589
The regular expression sequence that can loosely translates to "anything or nothing is referred as _____________.
1590
Which amongst the following is not a Test Management Tool?
1591
What is the use of echo() command
1592
Which of the following is present for each accessor used to extend Selenium ?
1593
Whch of the following will search the item ending with the value passed in, similar to the XPath ends-with
1594
What is achieved by parameterization in Selenium ?
1595
What will be the name of wait function for a custom action named TextUpperCase, used to extend Selenium ?
1596
What is the data type of return value of enable function for logging under Java, in Selenium Webdriver ?
1597
The command that is being used to extend the time limit of WAITFOR command is _________________.
1598
Which format is used to test script in source view of the Selenium IDE
1599
Which of the following Jenkins trigger format, will schedule your build every day at 8h00 ?
1600
What does JSON expands to
1601
What is the major change in Selenium 3.0 ?
1602
Which of the following extends the time limit of WAITFOR command
1603
What is the first parameter of a custom locator function, which is used to extend Selenium ?
1604
What is the Java file format of Jenkins installer, usually used
1605
Which of the following is to be modified, to move from ChromeDriver to PhantomJS in Selenium and the present setting is as - System.setProperty("webdriver.chrome.driver", CHROMEDRIVER_PATH); ?
1606
What can be the main reason to use the Selenium-Server with Selenium-WebDriver ?
1607
What extends the time limit of Selenium WAITFOR command?
1608
Which of the following is prefixed for all accessors registered in selenium object prototype
1609
_________________ is referred as the scale for large test suites or the test suites that must be run in multiple environments.
1610
What is the Default time of WAITFOR command?
1611
Which WebDriver log level is used to show all messages for debugging like information about the state of the driver ?
1612
Which exception is thrown if an element being obscured by another when clicking ?
1613
Which of the following is not an assertion in Selenium IDE
1614
The WebDriver method that helps to change focus to an alert, a frame or a browser window is referred as ___________________.
1615
Which programming language driver is not provisioned in selenium core
1616
What aspects of an UI element are stored in a UI map ?
1617
What is the maximum number of parameters, that can be passed to the keyUp function ?
1618
Which Selenium tool, is appropriate for inexperienced users or novices ?
1619
What does the term IDE refers to in Selenium IDE
1620
________________ is the language that is not supported by the Selenium RC.
1621
What will be the output of the following snippet - driver.findElement(By.cssSelector(“#name”)); if there are two elements on page but in sequence as - Name1, Name2
1622
What is an disadvantage of Selenium IDE?
1623
Which of the following applications can interact with selenium ?
1624
How many arguments are accepted by isSelected function, in Selenium Webdriver ?
1625
What is the data type of logfile capability for logging, in Selenium Webdriver ?
1626
Which operating system supports Selenium installation and application on Internet Explorer web browser ?
1627
What is the important feature of Maven ?
1628
Which exception is thrown when trying to click or read text of an element that is hidden from view ?
1629
Whose occurance in Junit, is reported as failure ?
1630
Which of the following is added at beginning, to all methods on the Selenium prototype, to be added as actions ?
1631
Which exception is thrown, while trying to get attribute value but attribute is not available in DOM. ?
1632
What is the use of Selenium RC?
1633
Which command argument will run Selenese html files directly within the Selenium Server by passing the html file to the server’s command line
1634
What is the direction of movement of cursor, if the yOffSet parameter of moveByOffset, is a positive number ?
1635
Which method is useful to locating targeted single element in WebDriver
1636
Which amongst the following represents the basic approach of Data Driven Framework?
1637
What is the main advantages of page object model ?
1638
What is the default page load strategy followed by geckodriver ?
1639
Which of the following programming language is supported by Selenium WebDriver
1640
Which of the following web element does, click function is applicable, in Selenium Webdriver ?
1641
What is the main benefit of logging ?
1642
The method used to close the open browser window that the driver has focus of, in Seelenium webdriver is __________________.
1643
Which of the following is not an Java IDE
1644
Which of the following command prints a string value or a variable in selenium IDE.
1645
Which of the following is not used to read excel file in Selenium ?
1646
What is the utility of Selenium RC
1647
Which exception is thrown when an element is present in the DOM but interactions with that element will hit another element do to paint order ?
1648
Which exception is thrown when element could not be found ?
1649
Which entity is checked by assertTitle
1650
How to check if a check box is checked or not?
1651
Would the two statements given below retrieve the title of a web page?
1652
In Webdriver, which of the following methods navigates to a URL?
1653
Which of the following commands would help to check the presence of a certain element?
1654
Which of the following WebDriver methods counts the number of elements?
1655
In WebDriver, which of the following command would you find the best to enter values into a text box?
1656
Is the below statement correct?
1657
What does the getWindowHandle() method do?
1658
Which of the following code can be used to create excel automation object using POI excel API?
1659
Which of the following WebDriver methods is used to change focus to an alert, a frame or a browser window?
1660
Which of the following testng annotations would complete the below statement?
1661
Which of the following syntax would you use to locate an element using inner text?
1662
In Webdriver, which of the following commands returns the text of a html element?
1663
Which of the following correctly defines the behavior of the below expression?
1664
Is the statement given below true or false?
1665
Which of the following Selenium api calls you find best to complete the below statement?
1666
Which of the following is a valid select statement in Webdriver that selects a value from a drop down element?
1667
Which WebDriver command takes you forward by one page from the browser’s history?
1668
Implicit wait time is applied to all elements in your script and Explicit wait time is applied only for particular specified element.
1669
Selenium IDE is supported by which browser?
1670
In webdriver, deselectAll() is a valid command.
1671
In webdriver, selectAllOptions() is a valid command.
1672
In webdriver, which of the following is a valid select statement that selects a value from a drop down element?
1673
In webdriver, which command takes you forward by one page on the browser’s history?
1674
In WebDriver, which command can be used to enter values onto text boxes? Select the best answer.
1675
In webdriver, what is the method that counts the number of elements?
1676
In webdriver, which methods navigates to a URL?
1677
Which WebDriver method is used to change focus to an alert, a frame or a browser window?
1678
In webdriver, which of the following commands retrieves the text of a html element?
1679
In webdriver, which method closes the open browser?
1680
What is the output of following code?
1681
What is the output of the below Python code?
1682
What does the below code intended to do?
1683
Which of the following functions print the output to the console?
1684
Is the following statement correct?
1685
What is the value of colors[2]?
1686
What is the output of the following code?
1687
Which of the following function checks that all characters of a string are in upper case?
1688
Which function does in-place reversal of objects in a list?
1689
What is the output of the following Python code?
1690
Which module in Python supports regular expressions?
1691
what should the below code print?
1692
Which of the following environment variable for Python is an alternative module search path?
1693
What would be the result of the following expression in Python?
1694
If the following statement is run in Python, what will be the result?
1695
If the following code is run in Python, what would be the result?
1696
What does the function re.match do?
1697
In react, this is used to pass data to component from outside?
1698
What are two ways data gets handled in react?
1699
Reactjs is a _________
1700
What is the default port for webpack dev server?
1701
Webpack command act as a _____________
1702
Babel is a __________
1703
How many elements does a react component returns?
1704
In which directory react components are saved?
1705
Everything in react is __________
1706
Ref in react component is used to assign reference to DOM elements. Ref can be created by
1707
To upload a file from react component, A developer will require to write
1708
For uncontrolled components in react
1709
For controlled components in react
1710
Keys are given to a list of elements in react. These keys should be
1711
componentDidMount lifecycle method is called when____
1712
React Lifecycle method static getDerivedSateFromProps(props , state) is called when ____
1713
As soon as the state of react component is changed, component will
1714
The state in react can be updated by call to setState method. These calls are
1715
In ReactJS, props can be used to pass
1716
props in react can________
1717
State in react is________
1718
Number of elements, a valid react component can return
1719
React is _______
1720
ReactJS uses _____ to increase performance
1721
ReactJS covers _________
1722
React is a ________
1723
In DynamoDB, what type of HTTP response codes indicate that a problem was found with the client request sent to the service?
1724
What is the format of structured notification messages sent by Amazon SNS?
1725
What AWS products and features can be deployed by Elastic Beanstalk?
1726
Which features can be used to restrict access to data in S3?
1727
Which DynamoDB limits can be raised by contacting AWS support?
1728
Which of the following are valid SNS delivery transports?
1729
What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?
1730
An Amazon S3 bucket, “myawsbucket” is configured with website hosting in Tokyo region, what is the region-specific website endpoint?
1731
What is the maximum number of S3 Buckets available per AWS account?
1732
In AWS, which security aspects are the customer’s responsibility?
1733
Which of the following are valid arguments for an SNS Publish request?
1734
Your application is trying to upload a 6 GB file to Simple Storage Service and receive a “Your proposed upload exceeds the maximum allowed object size.” error message. What is a possible solution for this?
1735
How is provisioned throughput affected by the chosen consistency model when reading data from a DynamoDB table?
1736
Which of the following services are key/value stores?
1737
When using a large Scan operation in DynamoDB, what technique can be used to minimize the impact of a scan on a table’s provisioned throughput?
1738
You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business. What is an effective method to mitigate this?
1739
Which statements about DynamoDB are true?
1740
A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in users can only access an S3 keyspace specific to the user. Which two approaches can satisfy the objectives?
1741
Which of the following is chosen as the default region when making an API call with an AWS SDK?
1742
When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to encrypt object data when saved on the server side?
1743
Which of the following programming languages have an officially supported AWS SDK?
1744
If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other users by default?
1745
An application stores payroll information nightly in DynamoDB for a large number of employees across hundreds of offices. Item attributes consist of individual name, office identifier, and cumulative daily hours. Managers run reports for ranges of names working in their office. One query is. “Return all Items in this office for names starting with A through E”. Which table configuration will result in the lowest impact on provisioned throughput for this query?
1746
How can software determine the public and private IP addresses of the Amazon EC2 instance that it is running on?
1747
You are inserting 1000 new items every second in a DynamoDB table. Once an hour these items are analyzed and then are no longer needed. You need to minimize provisioned throughput, storage, and API calls. Given these requirements, what is the most efficient way to manage these Items after the analysis?
1748
Which of the following statements about SQS is true?
1749
Which of the following are correct statements with policy evaluation logic in AWS Identity and Access Management?
1750
EC2 instances are launched from Amazon Machine images (AMIS). A given public AMI can:
1751
You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that it has been successfully stored. You then immediately make another API call and attempt to read this object. S3 tells you that the object does not exist What could explain this behavior?
1752
You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already togged in. This is not behavior you have designed. What is a possible solution to prevent this happening?
1753
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
1754
Company B provides an online image recognition service and utilizes SOS to decouple system components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is burning CPU cycles and increasing costs with empty responses. How can Company B reduce the number of empty responses?
1755
Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table? Assume that no security Keys are allowed to be stored on the EC2 instance. Choose 2 answers
1756
Which of the following is an example of a good DynamoDB hash key schema for provisioned throughput efficiency?
1757
Which code snippet below returns the URL of a load balanced web site created in CloudFormation with an AWS::ElasticLoadBalancing::LoadBalancer resource name “ElasticLoad Balancer”?
1758
Which of the following platforms are supported by Elastic Beanstalk? Choose 2 answers
1759
What happens, by default, when one of the resources in a CloudFormation stack cannot be created?
1760
If an application is storing hourly log files from thousands of instances from a high traffic web site, which naming scheme would give optimal performance on S3?
1761
What type of block cipher does Amazon S3 offer for server side encryption?
1762
Which of the following services are included at no additional cost with the use of the AWS
1763
Which of the following statements about SWF are true? Choose 3 answers
1764
Which approach below provides the least impact to provisioned throughput on the “Product” table?
1765
ou require the ability to analyze a customer\’s clickstream data on a website so they can do behavioral analysis. Your customer needs to know what sequence of pages and ads their customer clicked on. This data will be used in real time to modify the page layouts as customers click through the site to increase stickiness and advertising click-through. Which option meets the requirements for captioning and analyzing this data?
1766
What is the best approach to meet your customer’s requirements?
1767
You have an application running on an Amazon Elastic Compute Cloud instance, that uploads 5 GB video objects to Amazon Simple Storage Service (S3). Video uploads are taking longer than expected, resulting in poor application performance. Which method will help improve performance of your application?
1768
You have started a new role as a solutions architect for an architectural firm that designs large sky scrapers in the Middle East. Your company hosts large volumes of data and has about 250Tb of data on internal servers. They have decided to store this data on S3 due to the redundancy offered by it. The company currently has a telecoms line of 2Mbps connecting their head office to the internet. What method should they use to import this data on to S3 in the fastest manner possible.
1769
Which of the following are valid statements about Amazon S3? Choose 2 answers
1770
You are tasked with setting up a Linux bastion host for access to Amazon EC2 instances running in your VPC. Only clients connecting from the corporate external public IP address 72.34.51.100 should have SSH access to the host. Which option will meet the customer requirement?
1771
Natively what are the AWS services which are support encryption ?
1772
How can you secure data at rest on an EBS volume?
1773
Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table? Assume that no security keys are allowed to be stored on the EC2 instance. (Choose 2 answers)
1774
Which of the following are true regarding encrypted Amazon Elastic Block Store (EBS) volumes? Choose 2 answers
1775
How can software determine the public and private IP addresses of the EC2 instance that it is running on?
1776
When will you incur costs with an Elastic IP address (EIP)?
1777
What other information must you gather from this customer in order to determine whether S3 is the right option?
1778
What is one key difference between an Amazon EBS-backed and an instance-store backed instance?
1779
You have a business-critical two-tier web app currently deployed in two Availability Zones in a single region, using Elastic Load Balancing and Auto Scaling. The app depends on synchronous replication (very low latency connectivity) at the database layer. The application needs to remain fully available even if one application Availability Zone goes off-line, and Auto Scaling cannot launch new instances in the remaining Availability Zones. How can the current architecture be enhanced to ensure this?
1780
You run a website which hosts videos and you have two types of members, premium fee paying members and free members. All videos uploaded by both your premium members and free members are processed by a fleet of EC2 instances which will poll SQS as videos are uploaded. However you need to ensure that your premium fee paying members videos have a higher priority than your free members. How do you design SQS?
1781
Which route must be added to your routing table in order to allow connections to the Internet from your subnet?
1782
A customer’s nightly EMR job processes a single 2-TB data file stored on Amazon Simple Storage Service (S3). The EMR job runs on two On-Demand core nodes and three On-Demand task nodes. Which of the following may help reduce the EMR job completion time?
1783
A company is preparing to give AWS Management Console access to developers. Company policy mandates identity federation and role-based access control. Roles are currently assigned using groups in the corporate Active Directory. What combination of the following will give developers access to the AWS console? (Select 2) Choose 2 answers
1784
What does Amazon CloudFormation provide?
1785
A company is building a two-tier web application to serve dynamic transaction-based content. The data tier is leveraging an Online Transactional Processing (OLTP) database. What services should you leverage to enable an elastic and scalable web tier?
1786
What areas does AWS Trusted Advisor provide recommendations?
1787
You need to design a VPC for a web-application consisting of an Elastic Load Balancer (ELB). a fleet of web/application servers, and an RDS database The entire Infrastructure must be distributed over two availability zones. Which VPC configuration works while assuring the database is not available from the Internet?
1788
AWS doesn't have distinct operations in one of the following?
1789
When did AWS receive authorization from Department of Defense?
1790
One of the following isn't a customer
1791
When was it known that AWS had a deal with CIA?
1792
When were the retail sites of Amazon moved under AWS?
1793
Who was promoted to CEO of the AWS section in 2016?
1794
It provides individuals with customer support
1795
What does AWS really do?
1796
The AWS technology is implemented where?
1797
You have been using Amazon Relational Database Service (Amazon RDS) for the last year to run an important application with automated backups enabled. One of your team members is performing routine maintenance and accidentally drops an important table, causing an outage. How can you recover the missing data while minimizing the duration of the outage?
1798
Which AWS Cloud service is best suited for Online Analytics Processing (OLAP)?
1799
You are a solutions architect working for a media company that hosts its website on AWS. Currently, there is a single Amazon Elastic Compute Cloud (Amazon EC2) Instance on AWS with MySQL installed locally to that Amazon EC2 Instance. You have been asked to make the company’s production environment more resilient and to increase performance. You suggest that the company split out the MySQL database onto an Amazon RDS Instance with Multi-AZ enabled. This addresses the company’s increased resiliency requirements. Now you need to suggest how you can increase performance. Ninety-nine percent of the company’s end users are magazine subscribers who will be reading additional articles on the website, so only one percent of end users will need to write data to the site. What should you suggest to increase performance?
1800
Which AWS database service is best suited for non-relational databases?
1801
Which AWS database service is best suited for traditional Online Transaction Processing (OLTP)?
1802
Which of the following are based on temporary security tokens? (Choose 2 answers)
1803
Which of the following are benefits of using Amazon EC2 roles? (Choose 2 answers)
1804
Which of the following are IAM security features? (Choose 2 answers)
1805
Which of the following actions can be authorized by IAM? (Choose 2 answers)
1806
Your AWS account administrator left your company today. The administrator had access to the root user and a personal IAM administrator account. With these accounts, he generated other IAM accounts and keys. Which of the following should you do today to protect your AWS infrastructure? (Choose 4 answers)
1807
Which of the following are found in an IAM policy? (Choose 2 answers)
1808
Which of the following methods will allow an application using an AWS SDK to be authenticated as a principal to access AWS Cloud services? (Choose 2 answers)
1809
When an Amazon Elastic Compute Cloud (Amazon EC2) instance registered with an Elastic Load Balancing load balancer using connection draining is deregistered or unhealthy, which of the following will happen? (Choose 2 answers)
1810
Amazon CloudWatch supports which types of monitoring plans? (Choose 2 answers)
1811
An Auto Scaling group may use: (Choose 2 answers)
1812
Why is the launch configuration referenced by the Auto Scaling group instead of being part of the Auto Scaling group?
1813
Which of the following are characteristics of the Auto Scaling service on AWS? (Choose 3 answers)
1814
For an application running in the ap-northeast-1 region with three Availability Zones (apnortheast- 1a, ap-northeast-1b, and ap-northeast-1c), which instance deployment provides high availability for the application that normally requires nine running Amazon Elastic Compute Cloud (Amazon EC2) instances but can run on a minimum of 65 percent capacity while Auto Scaling launches replacement instances in the remaining Availability Zones?
1815
A cell phone company is running dynamic-content television commercials for a contest. They want their website to handle traffic spikes that come after a commercial airs. The website is interactive, offering personalized content to each visitor based on location, purchase history, and the current commercial airing. Which architecture will configure Auto Scaling to scale out to respond to spikes of demand, while minimizing costs during quiet periods?
1816
In the basic monitoring package for Amazon Elastic Compute Cloud (Amazon EC2), what Amazon CloudWatch metrics are available?
1817
Your web application front end consists of multiple Amazon Compute Cloud (Amazon EC2) instances behind an Elastic Load Balancing load balancer. You have configured the load balancer to perform health checks on these Amazon EC2 instances. If an instance fails to pass health checks, which statement will be true?
1818
You want to host multiple Hypertext Transfer Protocol Secure (HTTPS) websites on a fleet of Amazon EC2 instances behind an Elastic Load Balancing load balancer with a single X.509 certificate. How must you configure the Secure Sockets Layer (SSL) certificate so that clients connecting to the load balancer are not presented with a warning when they connect?
1819
You create an Auto Scaling group in a new region that is configured with a minimum size value of 10, a maximum size value of 100, and a desired capacity value of 50. However, you notice that 30 of the Amazon Elastic Compute Cloud (Amazon EC2) instances within the Auto Scaling group fail to launch. Which of the following is the cause of this behavior?
1820
Which of the following must be configured on an Elastic Load Balancing load balancer to accept incoming traffic?
1821
You are responsible for the application logging solution for your company’s existing applications running on multiple Amazon EC2 instances. Which of the following is the best approach for aggregating the application logs within AWS?
1822
Which of the following are the minimum required elements to create an Auto Scaling launch configuration?
1823
How long does Amazon CloudWatch keep metric data?
1824
You have created an Elastic Load Balancing load balancer listening on port 80, and you registered it with a single Amazon Elastic Compute Cloud (Amazon EC2) instance also listening on port 80. A client makes a request to the load balancer with the correct protocol and port for the load balancer. In this scenario, how many connections does the balancer maintain?
1825
Which of the following are required elements of an Auto Scaling group? (Choose 2 answers)
1826
Which Amazon VPC feature allows you to create a dual-homed instance?
1827
What properties of an Amazon VPC must be specified at the time of creation? (Choose 2 answers)
1828
Which of the following Amazon VPC resources would you use in order for EC2-VPC instances to send traffic directly to Amazon S3?
1829
Which of the following is the security protocol supported by Amazon VPC?
1830
You are responsible for your company’s AWS resources, and you notice a significant amount of traffic from an IP address in a foreign country in which your company does not have customers. Further investigation of the traffic indicates the source of the traffic is scanning for open ports on your EC2-VPC instances. Which one of the following resources can deny the traffic from reaching the instances?
1831
What is the default limit for the number of Amazon VPCs that a customer may have in a region?
1832
Which of the following is the Amazon side of an Amazon VPN connection?
1833
Which of the following AWS resources would you use in order for an EC2-VPC instance to resolve DNS names outside of AWS?
1834
How many VPC Peering connections are required for four VPCs located within the same AWS region to be able to send traffic to each of the others?
1835
Which of the following will occur when an Amazon Elastic Block Store (Amazon EBS)- backed Amazon EC2 instance in an Amazon VPC with an associated EIP is stopped and started? (Choose 2 answers)
1836
You have created a custom Amazon VPC with both private and public subnets. You have created a NAT instance and deployed this instance to a public subnet. You have attached an EIP address and added your NAT to the route table. Unfortunately, instances in your private subnet still cannot access the Internet. What may be the cause of this?
1837
What aspect of an Amazon VPC is stateful?
1838
How many IGWs can you attach to an Amazon VPC at any one time?
1839
You create a new VPC in US-East-1 and provision three subnets inside this Amazon VPC. Which of the following statements is true?
1840
What happens when you create a new Amazon VPC?
1841
You create a new subnet and then add a route to your route table that routes traffic out from that subnet to the Internet using an IGW. What type of subnet have you created?
1842
What is the maximum size IP address range that you can have in an Amazon VPC?
1843
Which of the following is an optional security control that can be applied at the subnet layer of a VPC?
1844
You are a solutions architect working for a large travel company that is migrating its existing server estate to AWS. You have recommended that they use a custom Amazon VPC, and they have agreed to proceed. They will need a public subnet for their web servers and a private subnet in which to place their databases. They also require that the web servers and database servers be highly available and that there be a minimum of two web servers and two database servers each. How many subnets should you have to maintain high availability?
1845
What is the minimum size subnet that you can have in an Amazon VPC?
1846
Is data stored in S3 is always encrypted?
1847
What is the maximum size of a single S3 object?
1848
What does RRS stand for when referring to the storage option in Amazon S3 that offers a lower level of durability at a lower storage cost?
1849
Amazon S3 is which type of storage service?
1850
Does S3 provide read-after-write consistency?
1851
EBS can always tolerate an Availability Zone failure?
1852
Amazon S3 offers developers which combination?
1853
Amazon S3 offers encryption services for which types of data?
1854
Which AWS storage service assists S3 with transferring data?
1855
Object storage systems require less _____ than file systems to store and access files.
1856
Object storage systems store files in a flat organization of containers called what?
1857
Amazon S3 has how many pricing components?
1858
Which three statements describe S3?
1859
What terminology is used by AWS to describes their highly available and scalable Domain Name System?
1860
Which statements are true about the benefits of cloud?
1861
AES Encrpts to what level?
1862
What SLA do AWS provide for their S3 service?
1863
What does S3 stand for?
1864
What does RDS stand for?
1865
Which one of the following is not an Amazon Buisness Unit?
1866
How many AWS clouds are the there in the world
1867
Which statements are true about ELB?
1868
Which of the following SECURITY certifications does AWS have?
1869
What SLA do AWS provide for their EC2 service?
1870
Which statements are true about AWS ElastiCache?
1871
What AWS service needs to be provided to support virtual instances running in multiple availability zones?
1872
What needs to be provided between multi availability zones to support Define EC2 on AWS?
1873
From the list below which are not AWS regions?
1874
Which of the following databases can be run on RDS?
1875
What does EBS stand for?
1876
What type of Database is DynamoDB on AWS?
1877
Which one is not an AWS pricing model
1878
Which three statements describe EBS?
1879
Is deployment and access controlled through IAM?
1880
What statements are true about auto-scaling within EC2?
1881
Which one of the following is not an application service on AWS
1882
Which of the following networking options is not available on AWS?
1883
Which statement is true about S3?
1884
Can you ship portable hard drives to AWS for them to import?
1885
ElastiCache is a web service that makes it easy to set up, operate, and scale a relational database in the cloud!
1886
Edge Locations form part of Cloud Front an AWS service, these help to deliver content across global locations?
1887
Which of the following statements are true in terms of allowing/denying traffic from/to VPC assuming the default rules are not in effect?
1888
You have successfully set up a VPC peering connection in your account between two VPCs – VPC A and VPC B, each in a different region. When you are trying to make a request from VPC A to VPC B, request getting failed. Which of the following could be a reason?
1889
Which of the following is an AWS component which consumes resources from your VPC?
1890
You have launched an RDS instance with MySQL database with default configuration for your file sharing application to store all the transactional information. Due to security compliance, your organization wants to encrypt all the databases and storage on the cloud. They approached you to perform this activity on your MySQL RDS database. How can you achieve this?
1891
Your organization has an existing VPC setup and has a requirement to route any traffic going from VPC to AWS S3 bucket through AWS internal network. So they have created VPC endpoint for S3 and configured to allow traffic for S3 buckets. The application you are developing involves sending traffic to AWS S3 bucket from VPC for which you planned to use a similar approach. You have created a new route table, added route to VPC endpoint and associated route table with your new subnet. However, when you are trying to send a request from EC2 to S3 bucket using AWS CLI, the request is getting failed with 403 access denied errors. What could be causing the failure?
1892
You had set up an internal HTTP(S) Elastic Load Balancer to route requests to two EC2 instances inside a private VPC. However, one of the target EC2 instance is showing Unhealthy status. Which of the following options could not be a reason for this?
1893
You have configured AWS S3 event notification to send a message to AWS Simple Queue Service whenever an object is deleted. You are performing ReceiveMessage API operation on the AWS SQS queue to receive the S3 delete object message onto AWS EC2 instance. For any successful message operations, you are deleting them from the queue. For failed operations, you are not deleting the messages. You have developed a retry mechanism which reruns the application every 5 minutes for failed RecieveMessage operations. However, you are not receiving the messages again during the rerun. What could have caused this?
1894
Organization ABC has a requirement to send emails to multiple users from their application deployed on EC2 instance in a private VPC. Email receivers will not be IAM users. You have decided to use AWS Simple Email Service and configured from email address. You are using AWS SES API to send emails from your EC2 instance to multiple users. However, email sending getting failed. Which of the following options could be the reason?
1895
Which of the following are not backup and restore solutions provided by AWS?
1896
Your organization was planning to develop a web application on AWS EC2. Application admin was tasked to perform AWS setup required to spin EC2 instance inside an existing private VPC. He/she has created a subnet and wants to ensure no other subnets in the VPC can communicate with your subnet except for the specific IP address. So he/she created a new route table and associated with the new subnet. When he/she was trying to delete the route with the target as local, there is no option to delete the route. What could have caused this behavior?
1897
How many VPCs can an Internet Gateway be attached to at any given time?
1898
Your organization has an AWS setup and planning to build Single Sign-On for users to authenticate with on-premise Microsoft Active Directory Federation Services (ADFS) and let users log in to AWS console using AWS STS Enterprise Identity Federation. Which of the following service do you need to call from AWS STS service after you authenticate with your on-premise?
1899
You will be launching and terminating EC2 instances on need basis for your workloads. You need to run some shell scripts and perform certain checks connecting to AWS S3 bucket when the instance is getting launched. Which of the following options will allow performing any tasks during launch? (choose multiple)
1900
Your organization is building a collaboration platform for which they chose AWS EC2 for web and application servers and MySQL RDS instance as the database. Due to the nature of the traffic to the application, they would like to increase the number of connections to RDS instance. How can this be achieved?
1901
Which of the following is not a category in AWS Trusted Advisor service checks?
1902
Organization ABC has a customer base in US and Australia that would be downloading 10s of GBs files from your application. For them to have a better download experience, they decided to use AWS S3 bucket with cross-region replication with the US as source and Australia as the destination. They are using existing unused S3 buckets and had setup cross-region replication successfully. However, when files uploaded to US bucket, they are not being replicated to Australia bucket. What could be the reason?
1903
Which of the following statements are true with respect to VPC? (choose multiple)
1904
When creating an AWS CloudFront distribution, which of the following is not an origin?
1905
Organization XYZ is planning to build an online chat application for their enterprise level collaboration for their employees across the world. They are looking for a single digit latency fully managed database to store and retrieve conversations. What would AWS Database service you recommend?
1906
You are planning to build a fleet of EBS-optimized EC2 instances for your new application. Due to security compliance, your organization wants you to encrypt root volume which is used to boot the instances. How can this be achieved?
1907
Baird also estimates that for every $1 spent on AWS, the traditional IT market loses how much?
1908
The investment firm Robert W. Baird & Co. predicts that AWS revenues will reach how much by 2016?
1909
AWS reaches customers in how many countries?
1910
In the same survey, researchers said the customers' average payback period on their AWS IaaS investments was how long?
1911
When analyst firm IDC interviewed 11 major AWS customers in 2012, researchers found an average five-year return on investment of how much?
1912
All AWS IaaS services are pay-as-you-go.
1913
Amazon Elastic Beanstalk automates the details of which of the following functions?
1914
Amazon Glacier is a storage service allowing customers to store data for as little as:
1915
Amazon Elastic Compute Cloud (Amazon EC2) does which of the following?
1916
Amazon Web Services falls into which cloud-computing category?
1917
Amazon ______ cloud-based storage system allows you to store data objects ranging in size from 1 byte up to 5GB
1918
Which of the following instance class is best used for applications that are processor- or compute-intensive?
1919
AMI’s are operating systems running on the _____ virtualization hypervisor
1920
What is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
1921
Q.12 Point out the correct statement:
1922
Which of the following is a Web service that can publish messages from an application and deliver them to other applications or to subscribers?
1923
Which of the following is a system for creating block-level storage devices that can be used for Amazon Machine Instances in EC2?
1924
Point out the correct statement:
1925
Select the wrong statement
1926
A user has launched one EC2 instance in the US East region and one in the US West region. The user has launched an RDS instance in the US East region. How can the user configure access from both the EC2 instances to RDS?
1927
When using the following AWS services, which should be implemented in multiple Availability Zones for high availability solutions? Choose 2 answers
1928
When you're launching an instance with EC2 in US East Region, AWS recommends which Availability zone for the instance?
1929
EC2 instances are launched from Amazon Machine images (AMIS). A given public AMI can
1930
In order to put multiple EC2 instances inside a placement group, the EC2 instances must be
1931
Can I book a reservation for an infant with a seat with an adult?
1932
Which are the two departments that assist passengers on AA.com?
1933
What is SPAM?
1934
What is AWTS
1935
What would you advise if a passenger need guidance on AA vacations?
1936
AA.com lets you store your credit card in your Aadvantage account for future purchases?
1937
What is AA - Kana?
1938
Select the right options for this term:Which are A.W.S functions?
1939
Which are browsers that have AA.com compatibility on Mac?
1940
AA.com allows you to search flights on the following options:
1941
Select the correct option:For AA.com - What does it means Country of Residence?
1942
Which address should be advised to the passenger when need to log on AA.com?
1943
What is true about protected constructor?
1944
Abstract class cannot have a constructor
1945
What is true about constructor?
1946
What is true about Class.getInstance()?
1947
What is false about constructor?
1948
What would be the behaviour if this() and super() used in a method?
1949
What is true about private constructor?
1950
Which of the following statements are incorrect?
1951
Which function is used to perform some action when the object is to be destroyed?
1952
Which operator is used by Java run time implementations to free the memory of an object when it is no longer needed?
1953
Which of the following is a method having same name as that of its class?
1954
Which keyword is used by the method to refer to the object that invoked it?
1955
What is the return type of Constructors?
1956
Which method can be defined only once in a program?
1957
Which of the following is a method having same name as that of it’s class?
1958
What is the process of defining more than one method in a class differentiated by method signature?
1959
What is the return type of a method that does not return any value?
1960
Which of these statement is incorrect?
1961
Which of these operators is used to allocate memory for an object?
1962
Which of the following is a valid declaration of an object of class Box?
1963
Which of these keywords is used to make a class?
1964
What is use of interpreter?
1965
How can we identify whether a compilation unit is class or interface from a .class file?
1966
What is the extension of compiled java classes?
1967
What is the extension of java code files?
1968
Which of the below is invalid identifier with the main method?
1969
Which statement is true about java?
1970
Which component is responsible to optimize bytecode to machine code?
1971
Which component is responsible to run java program?
1972
Which component is responsible for converting bytecode into machine specific code?
1973
Which component is used to compile, debug and execute java program?
1974
Method overriding is combination of inheritance and polymorphism?
1975
What is it called where object has its own lifecycle and child object cannot belong to another parent object?
1976
What is it called where child object gets killed if parent object is killed?
1977
What is it called if an object has its own lifecycle and there is no owner?
1978
Which concept of Java is achieved by combining methods and attribute into a class?
1979
Which concept of Java is a way of converting real world objects in terms of class?
1980
When Overloading does not occur?
1981
When does method overloading is determined?
1982
Which of the following is a type of polymorphism in Java?
1983
Which of the following is not OOPS concept in Java?
1984
Which of the following is not a valid flow control statement?
1985
From where break statement causes an exit?
1986
Which of the following is not a valid jump statement?
1987
Which of the following is not a decision making statement?
1988
Which of the following is used with the switch statement?
1989
What is true about do statement?
1990
What is true about a break?
1991
The while loop repeats a set of code while the condition is not met?
1992
Which of this statement is incorrect?
1993
Which of these jump statements can skip processing the remainder of the code in its body for a particular iteration?
1994
Which of the following loops will execute the body of loop even when condition controlling the loop is initially false?
1995
none of the mentioned
1996
Which of these selection statements test only for equality?
1997
Which of these have highest precedence?
1998
Which of these statements is correct?
1999
Which of these operators can skip evaluating right hand operand?
2000
Which of these is returned by “greater than”, “less than” and “equal to” operators?
2001
What is the output of relational operators?
2002
Which right shift operator preserves the sign of the value?
2003
On applying Left shift operator, <<, on integer bits are lost one they are shifted past which position bit?
2004
Which operator is used to invert all the digits in a binary representation of a number?
2005
Which of these is not a bitwise operator?
2006
Which of these statements are incorrect?
2007
Modulus operator, %, can be applied to which of these?
2008
Which of the following can be operands of arithmetic operators?
2009
An array elements are always stored in ________ memory locations
2010
Where is an array stored in memory?
2011
Can you make an array volatile?
2012
How to copy contents of array?
2013
How to sort an array?
2014
Generics does not work with?
2015
Which of these is necessary to specify at time of array initialization?
2016
Which of these is an incorrect Statement?
2017
Which of these operators is used to allocate memory to array variable in Java?
2018
What is Truncation is Java?
2019
Which of these is necessary condition for automatic type conversion in Java?
2020
Which of these can not be used for a variable name in Java?
2021
Literal can be of which of these data types?
2022
Literals in java must be appended by which of these?
2023
Which of these can be returned by the operator &?
2024
Which of these is long data type literal?
2025
How to get UTC time?
2026
How to get difference between two dates?
2027
What does LocalTime represent?
2028
How is Date stored in database?
2029
What is the replacement of joda time library in java 8?
2030
How to identify if a timezone is eligible for DayLight Saving?
2031
Is SimpleDateFormat thread safe?
2032
How to format date from one form to another?
2033
Which class is a library of functions to perform arithmetic operations of BigInteger and BigDecimal?
2034
What is BigDecimal.ONE?
2035
BigDecimal is a part of which package?
2036
Which of the following is not provided by BigDecimal?
2037
What is the limitation of toString() method of BigDecimal?
2038
What is the base of BigDecimal data type?
2039
Are enums are type-safe?
2040
Which class does all the Enums extend?
2041
Which method returns the elements of Enum class?
2042
If we try to add Enum constants to a TreeSet, what sorting order will it use?
2043
Can we create an instance of Enum outside of Enum itself?
2044
What is the order of variables in Enum?
2045
Which one is a valid declaration of a boolean?
2046
Which of these occupy first 0 to 127 in Unicode character set used for characters in Java?
2047
Which of these values can a boolean variable contain?
2048
Which of these coding types is used for data type characters in Java?
2049
What is the numerical range of a char data type in Java?
2050
Which data type value is returned by all transcendental math functions?
2051
Which of these literals can be contained in float data type variable?
2052
An expression involving byte, int, and literal numbers is promoted to which of these?
2053
What is the range of byte data type in Java?
2054
What is the range of short data type in Java?
2055
If you create the user administrator before enabling access control, MongoDB disables the ________ exception
2056
MongoDB supports the execution of JavaScript code for certain server-side operations like ____________
2057
Which of the following is used to display the replica set configuration object?
2058
_____________ is used to initiate relica member set
2059
To generate pseudo-random data to use for a keyfile, issue the following __________ command
2060
Use the __________ option to ensure that MongoDB listens for connections from applications on configured addresses
2061
___________ allows administrators to define and limit the resources and operations that a user can access
2062
With ___________ enabled, MongoDB forces all clients to identify themselves before granting access to the server
2063
Use __________ to encrypt communication between mongod and mongos components of a MongoDB client as well as between all applications and MongoDB
2064
The MongoDB _________ Console interface does not support Kerberos authentication
2065
On Linux, MongoDB clients can use Kerberos’s _______ program to initialize a credential cache for authenticating the user principal to servers
2066
Linux systems can store Kerberos authentication keys for a service principal in ______ files
2067
To specify a different value for <service>, use ________ during the start up of mongod
2068
To authenticate using Kerberos, you must add the Kerberos user principals to MongoDB to the _________ database
2069
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset
2070
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.
2071
The _________ message limit can result in the truncation of the audit messages
2072
The _____________ option accepts either full path name or relative path name
2073
To view the contents of the file, pass the file to the MongoDB utility ___________
2074
The audit file rotates at the same time as the ________ log file
2075
Use the ____________ option to enable auditing and specify where to output the audit events
2076
Enabling _____________ degrades performance more than logging only the authorization failures
2077
_________ contains the local ip address and the port number of the running instance
2078
The auditing facility can write audit events to the console, the _________ a JSON file, or a BSON file
2079
Config servers listen for connections on port __________
2080
Config servers, host the _______ database that stores metadata for sharded clusters
2081
________ instances provide query routing for sharded clusters
2082
The _______ API to MongoDB provides additional information and write access on top of the HTTP status interface
2083
The HTTP interface is always available on the port numbered _________ greater than the primary mongod port
2084
On _________ mongo.exe reads the .mongorc.js file from %HOME%.mongorc.js
2085
If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting
2086
The mongo program can evaluate JavaScript expressions using the command line ________ option.
2087
The __________ data structure value provides more granular information concerning the number of operations queued because of a lock.
2088
What is the output of this program? #include <iostream> using namespace std; enum cat { temp = 7 }; int main() { int age = 14; age /= temp; cout << "If you were cat, you would be " << age << endl; return 0; }
2089
Which variable does equals in size with enum variable?
2090
What will happen when defining the enumerated type?
2091
To which of these enumerators can be assigned?
2092
In which type does the enumerators are stored by the compiler?
2093
Identify the incorrect option.
2094
What is the output of this program? #include <iostream> using namespace std; int main() { void a = 10, b = 10; int c; c = a + b; cout << c; return 0; }
2095
Choose the incorrect option
2096
What does the following statement mean? void a;
2097
____ have the return type void?
2098
Which of the following will not return a value?
2099
What would be the output of the following program (in 32-bit systems)? #include <iostream> using namespace std; int main() { cout << sizeof(char); cout << sizeof(int); cout << sizeof(float); return 0; }
2100
What is the output of the following program? #include <iostream> using namespace std; int main() { int a = 5; float b; cout << sizeof(++a + b); cout << a; return 0; }
2101
What is the output of the following program? #include <iostream> using namespace std; int main() { int num1 = 10; float num2 = 20; cout << sizeof(num1 + num2); return 0; }
2102
What is the output of the following program? #include <iostream> using namespace std; int main ( ) { static double i; i = 20; cout << sizeof(i); return 0; }
2103
What is the output of the following program? #include <iostream> using namespace std; int main() { int num = 0x20 + 020 + 20; cout << sizeof(num)<<'\n'; return 0; }
2104
Identify the incorrect option.
2105
Size of C++ objects are expressed in terms of multiples of the size of a ____ and the size of a char is _______
2106
Implementation dependent aspects about an implementation can be found in ____
2107
It is guaranteed that a ____ has atleast 8bits and a ____ has atleast 16 bits.
2108
The size of an object or a type can be determined using which operator?
2109
What is the output of this program? #include <iostream> using namespace std; int main() { float f1 = 0.5; double f2 = 0.5; if (f1 == 0.5f) cout << "equal"; else cout << "not equal"; return 0; }
2110
Which is used to indicate single precision value?
2111
What is the output of this program? #include <iostream> using namespace std; int main() { float i = 123.0f; cout << i << endl; return 0; }
2112
What is the output of this program? #include <iomanip> #include <iostream> using namespace std; int main() { cout << setprecision(17); double d = 0.1; cout << d << endl; return 0; }
2113
What is the output of this program? #include <iostream> using namespace std; int main() { float num1 = 1.1; double num2 = 1.1; if (num1 == num2) cout << "stanford"; else cout << "harvard"; return 0; }
2114
Which of three sizes of floating point types should be used when extended precision is required?
2115
What is the range of the floating point numbers?
2116
Which of the following is a valid floating point literal?
2117
Which of the following is not one of the sizes of the floating point types?
2118
What will be output of this function? int main() { register int i = 1; int *ptr = &i; cout << *ptr; return 0; }
2119
What will be output of this program? #include <iostream> using namespace std; int main() { int i = 3; int l = i / -2; int k = i % -2; cout << l << k; return 0; }
2120
What will be the output of this program? #include <iostream> using namespace std; int main() { int a = 8; cout << "ANDing integer 'a' with 'true' :" << a && true; return 0; }
2121
0946, 786427373824, ‘x’ and 0X2f are _____ _____ ____ and _____ literals respectively.
2122
Which of these expressions will isolate the rightmost set bit?
2123
Which of these expressions will make the rightmost set bit zero in an input integer x?
2124
What is the value of the following 8-bit integer after all statements are executed? int x = 1; x = x &lt;&lt; 7; x = x &gt;&gt; 7;
2125
Which of these expressions will return true if the input integer v is a power of two?
2126
What is the output of the following program? #include <iostream> using namespace std; int main() { int x = -1; unsigned int y = 2; if(x > y) { cout << "x is greater"; } else { cout << "y is greater"; } }
2127
The size_t integer type in C++ is?
2128
What constant defined in <climits> header returns the number of bits in a char?
2129
Suppose in a hypothetical machine, the size of char is 32 bits. What would sizeof(char) return?
2130
Is the size of character literals different in C and C++?
2131
In C++, what is the sign of character data type by default?
2132
What is the output of this program? #include <stdio.h> int main() { char a = '\012'; printf("%d", a); return 0; }
2133
How do we represent a wide character of the form wchar_t?
2134
What will be the output of this program? #include <iostream> using namespace std; int main() { char c = 74; cout << c; return 0; }
2135
Which of the following belongs to the set of character types?
2136
Select the right option. Given the variables p, q are of char type and r, s, t are of int type 1. t = (r * s) / (r + s); 2. t = (p * q) / (r + s);
2137
How many characters are specified in the ASCII scheme?
2138
Evaluate the following (false && true) || false || true
2139
What is the value of p? #include <iostream> using namespace std; int main() { int p; bool a = true; bool b = false; int x = 10; int y = 5; p = ((x | y) + (a + b)); cout << p; return 0; }
2140
What is the output of the following program? #include <iostream> using namespace std; int f(int p, int q) { if (p > q) return p; else return q; } main() { int a = 5, b = 10; int k; bool x = true; bool y = f(a, b); k =((a * b) + (x + y)); cout << k; }
2141
Which of the two operators ++ and — work for the bool datatype in C++?
2142
For what values of the expression is an if-statement block not executed?
2143
Which of the following statements are false ?
2144
What happens when a null pointer is converted into bool?
2145
What is the value of the bool? bool is_int(789.54)
2146
Find the odd one out:
2147
Is bool a fundamental datatype in C++?
2148
Pick the odd one out.
2149
When a language has the capability to produce new data type mean, it can be called as
2150
The value 132.54 can represented using which data type?
2151
Which of the following statements are true ?
2152
Identify the user-defined types from the following?
2153
Which type is best suited to represent the logical values?
2154
What does a escape code represent?
2155
Which datatype is used to represent the absence of parameters?
2156
Pick the odd one out
2157
What is the size of wchar_t in C++?
2158
Value of a in a = (b = 5, b + 5); is
2159
The output of this program is int main () { cout << “Hello World!” return 0; }
2160
The return value of the following code is Class1& test(Class1 obj) { Class1 *ptr = new Class1(); ……… return ptr; }
2161
The output of { int a = 5; int b = 10; cout << (a>b?a:b); }
2162
The output of this program is int a = 10; void main() { int a = 20; cout << a << ::a; }
2163
Observe following program and answer class Example{ public: int a,b,c; Example(){a=b=c=1;} //Constructor 1 Example(int a){a = a; b = c = 1;} //Constructor 2 Example(int a,int b){a = a; b = b; c = 1;} //Constructor 3 Example(int a,int b,int c){ a = a; b = b; c = c;} //Constructor 4 } In the above example of constructor overloading, the following statement will call which constructor Example obj = new Example (1,2,3);
2164
. Which of the following correctly describes the meaning of‘namespace’ feature in C++?
2165
In mulit­list organization
2166
. A direct access file is:
2167
What’s wrong? (x = 4 && y = 5) ? (a = 5) ; (b = 6);
2168
. If the class name is X, what is the type of its “this” pointer (in a nonstatic, non­const member function)?
2169
What will be output if you will compile and execute the following c code? #include int main(){ int a=1,2; int b=(1,2); printf(“%d %d”,a,b); return 0; }
2170
What is output ? int main(){ int i=10; static int x=i; if(x==i) printf(“Equal”); else if(x>i) printf(“Greater than”); else printf(“Less than”); return 0; }
2171
To ensure that every object in the array receives a destructor call, always delete memory allocated as an array with operator __________
2172
Which of the following statements are correct?
2173
Which of the following never requires any arguments?
2174
Which of the following implicitly creates a default constructor when the programmer does not explicitly define at least one constructor for a class?
2175
If the programmer does not explicitly provide a destructor, then which of the following creates an empty destructor?
2176
Which of the following are NOT provided by the compiler by default?
2177
Which of the following gets called when an object goes out of scope?
2178
Copy constructor must receive its arguments by __________ .
2179
What happens when a class with parameterized constructors and having no default constructor is used in a program and we create an object that needs a zero-argument constructor?
2180
Which of the following function / types of function cannot have default parameters?
2181
Which of the following statement is correct?
2182
Which of the following function declaration is/are incorrect?
2183
Which of the following function prototype is perfectly acceptable?
2184
Which of the following can be overloaded?
2185
Which of the following means “The use of an object of one class in definition of another class”?
2186
What does the class definitions in following code represent? class Bike { Engine objEng; }; class Engine { float CC; };
2187
Which of the following also known as an instance of a class?
2188
What happens when we try to compile the class definition in following code snippet? class Birds {}; class Peacock : protected Birds {};
2189
How “Late binding” is implemented in C++?
2190
Which of the following correctly describes overloading of functions?
2191
How many types of polymorphisms are supported by C++?
2192
Which of the following concept of oops allows compiler to insert arguments in a function call if it is not specified?
2193
i) Exceptions can be traced and controlled using conditional statements. ii) For critical exceptions compiler provides the handler
2194
What is the output of the following program? #include<iostream> #include<string.h> using namespace std; main() { char s[] = "Hello\0Hi"; cout<<strlen(s)<<" "<<sizeof(s); }
2195
What is the output of the following program? #include<iostream> using namespace std; void main() { char s[] = "C++"; cout<<s<<" "; s++; cout<<s<<" "; }
2196
What is the output of the following program? #include<iostream> using namespace std; void main() { char *s = "C++"; cout<<s<<" "; s++; cout<<s<<" "; }
2197
What is the built in library function to compare two strings?
2198
What is the output of the following program? #include<iostream> using namespace std; main() { char s[] = "Fine"; *s = 'N'; cout<<s<<endl; }
2199
What is the output of the following program? #include<iostream> using namespace std; main() { int a[] = {10, 20, 30}; cout<<*a+1; }
2200
Does both the loops in the following programs prints the correct string length? #include<iostream> using namespace std; main() { int i; char s[] = "hello"; for(i=0; s[i]; ++i); cout<<i<<endl; i=0; while(s[i++]); cout<<i; }
2201
What is the output of the following program? main() { }
2202
What is the output of the following program? #include<iostream> using namespace std; void f() { static int i = 3; cout<<i; if(--i) f(); } main() { f(); }
2203
The default executable generation on UNIX for a C++ program is ___
2204
What is the output of the following program? #include<iostream> using namespace std; int x = 5; int &f() { return x; } main() { f() = 10; cout<<x; }
2205
Following is the invalid inclusion of a file to the current program. Identify it
2206
An inline function can execute faster than a normal function.
2207
Choose the invalid identifier from the below
2208
A single line comment in C++ language source code can begin with _____
2209
Special symbol permitted with in the identifier name.
2210
What is the output of the following program? #include<iostream> using namespace std; main() { union abc { int x; char ch; } var; var.ch = 'A'; cout<<var.x; }
2211
What is the output of the following program? #include<iostream> using namespace std; main() { int i = 13, j = 60; i^=j; j^=i; i^=j; cout<<i<<" "<<j; }
2212
What is the output of the following program? #include<iostream> using namespace std; main() { int a[] = {1, 2}, *p = a; cout<<p[1]; }
2213
What is the size of ‘int’?
2214
What is the output of the following program? #include<iostream> using namespace std; main() { int r, x = 2; float y = 5; r = y%x; cout<<r; }
2215
What will be the output of the following program? #include<iostream> #include<string.h> using namespace std; main() { cout<<strcmp("strcmp()","strcmp()"); }
2216
What is the output of the following program? #include<iostream> using namespace std; void swap(int m, int n) { int x = m; m = n; n = x; } main() { int x = 5, y = 3; swap(x,y); cout<<x<<" "<<y; }
2217
What is the output of the following program? #include <iostream> using namespace std; int main () { // local variable declaration: int x = 1; switch(x) { case 1 : cout << "Hi!" << endl; break; default : cout << "Hello!" << endl; } }
2218
What is the output of the following program? #include<iostream> using namespace std; void f() { cout<<"Hello"<<endl; } main() { }
2219
What is the output of the following program? #include<iostream> using namespace std; main() { short unsigned int i = 0; cout<<i--; }
2220
What is the outpout of the following program? #include<iostream> using namespace std; main() { enum { india, is = 7, GREAT }; cout<<india<<" "<<GREAT; }
2221
What is the output of the following program? #include<iostream> using namespace std; main() { const int a = 5; a++; cout<<a; }
2222
i) Exception handling technically provides multi branching. ii) Exception handling can be mimicked using ‘goto’ construct.
2223
An exception is __
2224
(i) ‘ios’ is the base class of ‘istream’ (ii) All the files are classified into only 2 types. (1) Text Files (2) Binary Files.
2225
With respective to streams >> (operator) is called as
2226
- i) single file can be opened by several streams simultaneously. ii) several files simultaneously can be opened by a single stream
2227
Which type of data file is analogous to an audio cassette tape?
2228
What is the full form of STL?
2229
An array can be passed to the function with call by value mechanism.
2230
What is a generic class.
2231
HAS-A relationship between the classes is shown through.
2232
A C++ program statements can be commented using
2233
Choose the option not applicable for the constructor.
2234
The copy constructor is executed on
2235
The programs machine instructions are store in __ memory segment.
2236
Objects created using new operator are stored in __ memory.
2237
Which feature of the OOPS gives the concept of reusability?
2238
What is the output of the following program? #include<iostream> using namespace std; main() { int const a = 5; a++; cout<<a; }
2239
What is the output of the following program? #include<iostream> using namespace std; main() { int *p = new int; delete p; delete p; cout<<"Done"; }
2240
What is the output of the following program? #include<iostream> using namespace std; class Base { public: void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; }; }; main() { Derived obj; obj.Base::f(); }
2241
What is the output of the following program? #include<iostream> using namespace std; class Base { public: void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; } }; main() { Derived obj; obj.Base::f(); }
2242
What is the output of the following program? #include<iostream> using namespace std; class Base { public: void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; } }; main() { Base *p = new Derived(); p->f(); }
2243
How many number of arguments can a destructor of a class receives?
2244
Designer of C++ programming language.
2245
We can use this pointer in static member function of the class.
2246
The pointer which stores always the current active object address is __
2247
How can we make an class act as an interface in C++?
2248
Escape sequence character '\0' occupies __ amount of memory.
2249
Class function which is called automatically as soon as the object is created is called as __
2250
Choose the Object oriented programming language from below.
2251
Runtime polymorphism is done using.
2252
A protected member of the class in accessible in
2253
In the following program f() is overloaded. void f(int x) { } int f(signed x) { return 1; } main() { }
2254
In the following program f() is overloaded. void f(int x) { } void f(signed x) { } main() { }v
2255
What is the output of the following program? #include<iostream> using namespace std; main() { int i = 1, j = 2, k = 3, r; r = (i, j, k); cout<<r<<endl; }
2256
We can have varying number of arguments for the overloaded form of () operator.
2257
Operators sizeof and ?:
2258
The following operator can be used to calculate the value of one number raised to another.
2259
Which is the storage specifier used to modify the member variable even though the class object is a constant object?
2260
Which data type can be used to hold a wide character in C++?
2261
A user defined header file is included by following statement in general.
2262
The operator used to access member function of a structure using its object.
2263
‘cin’ is an __
2264
Choose the respective delete operator usage for the expression ‘ptr=new int[100]’.
2265
From the below class choose the proper definition of the member function f(). template <class T> class abc { void f(); };
2266
By default the members of the structure are
2267
What is the output of the following program? #include<iostream> using namespace std; class abc { public: int i; abc(int i) { i = i; } }; main() { abc m(5); cout<<m.i; }
2268
Which of the following is not the keyword in C++?
2269
Which operator is required to be overloaded as member function only
2270
A constructor can be virtual.
2271
Choose the operator which cannot be overloaded.
2272
What is the output of the following program? #include<iostream> using namespace std; class abc { public: static int x; int i; abc() { i = ++x; } }; int abc::x; main() { abc m, n, p; cout<<m.x<<" "<<m.i<<endl; }
2273
What is the output of the following program? #include<iostream> using namespace std; class abc { void f(); void g(); int x; }; main() { cout<<sizeof(abc)<<endl; }
2274
Choose the pure virtual function definition from the following.
2275
One of the following is true for an inline function.
2276
A trigraph character begins with
2277
The default access specifer for the class members is
2278
(i) ‘ios’ is the base class of ‘istream’ (ii) All the files are classified into only 2 types. (1) Text Files (2) Binary Files.
2279
Runtime polymorphism is done using.
2280
Abstract class is __
2281
A C++ program statements can be commented using
2282
Which operator is used to resolve the scope of the global variable?
2283
What is the output of the following program? #include<iostream> using namespace std; main() { class student { int rno = 10; } v; cout<<v.rno; }
2284
Compiler generates ___ file
2285
C++ does not supports the following
2286
What is the output of the following program? #include<iostream> using namespace std; main() { char s[] = "Fine"; *s = 'N'; cout<<s<<endl; }
2287
Following is the invalid inclusion of a file to the current program. Identify it
2288
What is the output of the following program? #include<iostream> using namespace std; void main() { char *s = "C++"; cout<<s<<" "; s++; cout<<s<<" ";
2289
What is the output of the following program? #include<iostream> using namespace std; int x = 5; int &f() { return x; } main() { f() = 10; cout<<x; }
2290
What is the output of the following program? #include<iostream> using namespace std; main() { char s[] = "hello", t[] = "hello"; if(s==t) cout<<"eqaul strings"; }
2291
What is the output of the following program? #include<iostream> using namespace std; main() { float t = 2; switch(t) { case 2: cout<<”Hi”; default: cout<<"Hello"; } }
2292
What is the output of the following program? #include<iostream> using namespace std; main() { int x = 5; if(x==5) { if(x==5) break; cout<<"Hello"; } cout<<”Hi”; }
2293
What is the full form of RTTI.
2294
What is the output of the following program? #include<iostream> using namespace std; void f() { static int i = 3; cout<<i; if(--i) f(); } main() { f(); }
2295
What is the output of the following program? #include<iostream> using namespace std; void swap(int m, int n) { int x = m; m = n; n = x; } main() { int x = 5, y = 3; swap(x,y); cout<<x<<" "<<y; }
2296
What is the size of the following union definition? #include<iostream> using namespace std; main() { union abc { char a, b, c, d, e, f, g, h; int i; }; cout<<sizeof(abc); }
2297
What is the output of the following program? #include<iostream> using namespace std; main() { char *s = "Fine"; *s = 'N'; cout<<s<<endl; }
2298
Identify the C++ compiler of Linux
2299
What is the output of the following program? #include<iostream> using namespace std; main() { int a[] = {1, 2}, *p = a; cout<<p[1]; }
2300
What is the output of the following program? #include<iostream> using namespace std; void f() { static int i; ++i; cout<<i<<" "; } main() { f(); f(); f(); }
2301
i) single file can be opened by several streams simultaneously. ii) several files simultaneously can be opened by a single stream
2302
What is the output of the following program? #include<iostream> using namespace std; main() { int *p = new int; delete p; delete p; cout<<"Done"; }
2303
What is the output of the following program? #include<iostream> using namespace std; class Base { public: virtual void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; } }; main() { Base *p = new Derived(); p->f(); }
2304
Pick up the valid declaration for overloading ++ in postfix form where T is the class name.
2305
From the below class choose the proper definition of the member function f(). template <class T> class abc { void f(); };
2306
The default access specifer for the class members is
2307
The four major enterprise applications are
2308
What is the most important function of an enterprise application?
2309
Using the Internet to buy or sell goods is called
2310
Executive support systems are information systems that support the
2311
Which level of the organization are ESS specifically designed to serve?
2312
________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.
2313
To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems.
2314
The term "management information systems" designates a specific category of information systems serving
2315
Converting raw data into a more meaningful form is called:
2316
Investing in a new business model that is appropriate for a new product or service is an example of:
2317
A description of how a company produces, delivers and sells a product or service to create wealth is called :
2318
Using an Information System to enhance productivity is an example of which of the six strategic business objectives?
2319
Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective?
2320
The use of information systems because of necessity describes the business objective of:
2321
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and:
2322
Order data for baseball tickets and bar code data are examples of:
2323
In an information system, which of the following transfers information to the people or groups in an organization who use it:
2324
Using an Information System to help determine how many products to distribute to retail outlets is an example of which strategic business objectives?
2325
Internet advertising is growing at a rate of more than 25 percent a year:
2326
Ina an information system,which of the following accepts data from the environment?
2327
Sets of logically related tasks & behaviors that organizations develop to produce specific business results are called:
2328
Which of the following operators can be overloaded?
2329
The average number of tickets sold daily online is an example of:
2330
How do we define a constructor?
2331
Which of the following below can perform conversions between pointers to related classes?
2332
Investment in information technology accounts for approximately what % of all capital invested today in the U.S:
2333
Which of the following language feature is not an access specifier in C++
2334
The behavioral approach to information systems tends to focus on:
2335
Verizon's implementation of a Web-based digital dashboard to provide managers with real-time information such as customer complaints is an example of
2336
class derived: public base1, public base2 { } is an example of
2337
An Organization co-ordinates work through a structured hierarchy and formal:
2338
Each pass through a loop is called a/an
2339
Which of the STL containers store the elements contiguously (in adjacent memory locations)?
2340
A single sharded cluster must have exclusive use of its _______ servers
2341
The ______ instances are the routers for the cluster
2342
For most deployments, the default value of chunk is _____ megabytes is ideal
2343
The shards manage _______ migrations as a background operation between an origin shard and a destination shard
2344
Which of the following is not true about preprocessor directives
2345
_________ is a background process that keeps chunks from growing too large
2346
How many background process runs behind balanced cluster?
2347
Which of the following correctly describes C++ language?
2348
Which of the following is a valid destructor of the class name “Country”
2349
Tags are the primary mechanism to control the behavior of the _______ and the distribution of chunks in a cluster
2350
MongoDB allows administrators to direct the balancing policy using ______ aware sharding
2351
_______ based partitioning, by contrast, ensures an even distribution of data at the expense of efficient range queries
2352
With hash based partitioning, two documents with _____ shard key values are unlikely to be part of the same chunk
2353
To divide the shard key values into chunks, MongoDB uses _____ based partitioning
2354
A _________ key is either an indexed field or an indexed compound field that exists in every document in the collection.
2355
The two types of file structure existing in VSAM file are
2356
Production sharded clusters have exactly ______ config servers.
2357
Latency time is:
2358
The query router uses __________ to target operations to specific shards
2359
________ servers store the cluster’s metadata
2360
An inverted file
2361
Originally ‘C’ was developed as:
2362
A sharded cluster can contain __________ query router to divide the client request load
2363
_________ interface with client applications and direct operations to the appropriate shard or shards
2364
To provide high availability and data consistency, in a production sharded cluster, each shard is a ___________
2365
How many components are present in sharded cluster?
2366
MongoDB supports sharding through the configuration of a sharded ______
2367
_______ divides the data set and distributes the data over multiple servers, or shards
2368
_______ scaling adds more CPU and storage resources to increase capacity
2369
How many types of sharding exist in MongoDB?
2370
MongoDB uses _________ to support deployments with very large data sets and high throughput operations.
2371
__________ prints a report of the status of the replica set from the perspective of the secondaries
2372
______ returns basic help text for replica set functions
2373
Remove the secondary from the replica set by calling ___________ method
2374
_________ members allow you to add additional members for read distribution beyond the maximum seven voting members
2375
Which of the following is/are advantages of cellular partitioned structure:
2376
If the oplog is shorter than the slaveDelay window, the _______ member cannot successfully replicate operations
2377
In mulit-list organization
2378
The _________ shell method can force the current primary to step down, which causes an election
2379
To modify priorities, you update the members _________ in the replica configuration object
2380
The ________ settings of replica set members affect the outcomes of elections for primary
2381
A direct access file is:
2382
__________ explicitly override the default logic for selecting a member to replicate from
2383
If class A is friend of class B and if class B is friend of class C, which of the following is true?
2384
_______ is an internal command that applies oplog entries to the current data set
2385
Which of the command is for master-slave replication only?
2386
________ applies a new configuration to an existing replica set
2387
When enabled replSetMaintenance: true, the member enters the ________ state
2388
__________ enables or disables a maintenance mode, which puts a secondary node in a RECOVERING state
2389
________ returns a document that reports on the status of the replica set
2390
For most replica sets, the hostnames in the _________ field never change.
2391
You can use the ________ setting in Replica Set Configuration to disable chained replication for situations where chained replication is causing lag
2392
You cannot use a _________backup for the data files, only a snapshot backup
2393
During initial sync, mongod will remove the content of the _______
2394
A replica set member becomes _________ when its replication process falls so far behind that the primary overwrites oplog entries the member has not yet replicated.
2395
You also can force a member never to become primary by setting its priority value to ___________
2396
To finish the rolling maintenance operation, step down the primary with the _________ method
2397
_________ shut down the mongod instance for one of the non-primary members of your replica set
2398
A delayed member may show as 0 seconds behind the primary when the inactivity period on the primary is greater than the ________ value.
2399
Replication _______ is a delay between operation on the primary and the application of that operation from the oplog to the secondary
2400
When ______________ is true, the mongod instance saves all documents migrated from the shard to the moveChunk directory of the storage.dbPath
2401
Secondaries apply operations from the primary asynchronously to provide __________ consistency
2402
For a member to sync from another, both members must have the same value for the _________ setting
2403
Use _________ from a secondary member and the replication status output to assess the current state of replication
2404
The oplog must translate multi-updates into individual operations in order to maintain ____________
2405
Before mongod creates an oplog, you can specify its size with the __________ option.
2406
__________ sets the member that this replica set member will sync from, overriding the default sync target selection logic
2407
_______ re-configures a replica set by applying a new replica set configuration object.
2408
________ prints a report of the status of the replica set from the perspective of the primary
2409
_________ returns the replica set configuration document
2410
_________ prevents the current member from seeking election as primary for a period of time
2411
Which of the following ddds an arbiter to a replica set?
2412
______ is used to load all the scripts saved in the system.js collection for the current database
2413
Which of the following can store JavaScript functions for reuse?
2414
Which of the following The collection holds special JavaScript code for use in server side JavaScript?
2415
The <database>.system.indexes collection lists all the _________ in the database
2416
The ___________ collection stores the user’s authentication credentials as well as any roles assigned to the user
2417
In replica sets, each ________ maintains a connection to all other members of the set.
2418
MongoDB stores additional instance-local metadata in the _______ database
2419
If the query planner selects a _________ the explain result includes an IXSCAN stage
2420
In _____________ mode, MongoDB returns statistics describing the execution of the winning plan as well as statistics for the other candidate plans captured during plan selection
2421
Which of the following parameter specifies the verbosity mode for the explain output?
2422
If the query planner selects a collection scan, the explain result includes a _________ stage.
2423
For sharded collections, explain returns the __________ for each accessed shard
2424
_________ corresponds to the millis field returned by cursor.explain() in earlier versions of MongoDB
2425
Which of the following provides information on the MongoDB instance?
2426
____________ does not provide query execution information for the rejected plans
2427
By default, db.collection.explain() runs in ___________ verbosity mode
2428
____________ returns information on the query plan for aggregate function
2429
Which of the operator is used to access the query field of documents within system.profile?
2430
MongoDB reports its triggered page faults as the total number of page faults in ________ second
2431
You can inspect __________ to check the amount of mapped memory that mongod is using
2432
The memory usage statuses metrics of the _________ output can provide insight into MongoDB’s memory use.
2433
With the _______ storage engine, MongoDB uses memory-mapped files to store data
2434
MongoDB’s _______ is a database profiling system that can help identify inefficient queries and operations
2435
______ field contains total number of current clients that connect to the database instance
2436
serverStatus includes all fields by default, except _________
2437
The __________ data structure value provides more granular information concerning the number of operations queued because of a lock
2438
If __________ is high relative to uptime, the database has existed in a lock state for a significant amount of time
2439
________ provide the number of times the lock acquisitions encountered deadlocks
2440
Which of the following setting defines what constitutes a “slow” operation?
2441
You cannot create a TTL index on a ________ collection
2442
You cannot use _________ to change the value of expireAfterSeconds of an existing index
2443
Which field does not support TTL indexes?
2444
A collection with a TTL index has __________ enabled.
2445
Secondary members replicate _________ operations from the primary
2446
If the indexed field in a document is not a _____ or an array that holds a date value(s), the document will not expire
2447
Which of the following collection do not support the TTL property?
2448
Which of the following command obtains a global write lock and will block other operations until it has completed?
2449
_________ command creates the capped collection and imports the data
2450
___________ convert a non-capped collection to a capped collection
2451
Which of the following should is used to check whether collection is capped or not?
2452
If you perform a ________ on a capped collection with no ordering specified, MongoDB guarantees that the ordering of results is the same as the insertion order.
2453
________ is also used to pre-allocate space for an ordinary collection.
2454
_________ stores a log of the operations in a replica set
2455
Which of the following collections work in a way similar to circular buffers?
2456
Which of the following preference does not affect the visibility of data?
2457
All read preference modes except _______ may return stale data
2458
Read preference modes are also available to clients connecting to a sharded cluster through ______________
2459
Which of the following should not be used to provide extra capacity for reads?
2460
By default, an application directs its ______ operations to the primary member in a replica set
2461
MongoDB stores tag sets in the replica set configuration object, which is the document returned by ____________
2462
The _______ migrates chunks of documents in a sharded collection to the shards associated with a tag.
2463
MongoDB supports tagging a range of _______ key values to associate that range with a shard or group of shards.
2464
_____ is a command-line tool for monitoring network use
2465
The TCP keepalive on the Azure load balancer is ______ seconds by default
2466
Which of the following is especially important in Sharded Clusters?
2467
WiredTiger can compress collection data using either snappy or zlib compression library
2468
MongoDB Cloud Manager provides integration with Amazon Web Services (AWS) and lets you deploy new ______ instances directly from MongoDB Cloud Manager
2469
MongoDB requires a filesystem that supports ______ on directories
2470
With the WiredTiger storage engine, use of _______ is strongly recommended to avoid performance issues
2471
Which of the following should be avoided with MongoDB Deployments?
2472
________ do not typically provide sufficient performance to support a MongoDB deployment
2473
The ________ command returns information regarding the number of open connections
2474
______ concern describes the guarantee that MongoDB provides when reporting on the success of a write operation.
2475
MongoDB uses ________ logging to an on-disk journal
2476
_________ supports concurrent access by readers and writers to the documents in a collection
2477
All collections have a unique ________ lock that allows multiple clients to modify documents in different collections at the same time
2478
Which of the following storage engine is supported by default?
2479
On Linux, use the ______ command to check if disk I/O is a bottleneck for your database
2480
Which of the following represents Shared lock?
2481
MongoDB stores tag sets in the replica set configuration object, which is the document returned by _____
2482
When the TTL thread is active, you will see _______ operations in the output of db.currentOp()
2483
The _________ field provides the amount of resident memory in use
2484
The ___________ collection stores custom roles that administrators create and assign to users to provide access to specific resources.
2485
_______ contains a counter of the total number of clients with active operations in progress or queued.
2486
Which of the following document configures the threshold which determines whether a query is “slow” for the purpose of the logging system?
2487
Which of the following sets the database profiler level?
2488
What is the size of Chunk by default?
2489
Which of the following provide acceptable performance levels for multiple mongod instances?
2490
_____ bit builds of mongod enable journaling by default
2491
______ is /srv/mongodb, which specifies where MongoDB will store its data files.
2492
Setting _______ enables authentication and specifies a key file for the replica set member use to when authenticating to each other
2493
Replica set configuration requires that the _______ have a value that is consistent among all members of the set.
2494
_______ provides statistics that resemble dbStats on the collection level.
2495
The ________ reflect the amount of storage used, the quantity of data contained in the database, and object, collection, and index counters.
2496
___________ returns a general overview of the status of the database, detailing disk usage, memory use, connection, journaling, and index access
2497
______ method is useful tool for identifying the database instance’s in-progress operations.
2498
_______ tracks and reports the current read and write activity of a MongoDB instance, and reports these statistics on a per collection basis.
2499
_________ captures and returns the counts of database operations by type.
2500
Which of the following document details the state and configuration of the replica set and statistics about its members?
2501
Which of the following command returns quickly and does not impact MongoDB performance?
2502
Backup can also create snapshots of _________ that are run as single-member replica sets
2503
The agent ships initial sync and oplog data over HTTPS back to ___________
2504
Ops Manager maintains one _____ database for each backed-up replica set
2505
Ops Manager reads directly from the Backup Blockstore database and transfers files either through ___________
2506
Sharded clusters snapshots temporarily stop the balancer via ______________
2507
Ops Manager ______ provides scheduled snapshots and point-in-time recovery of your MongoDB replica sets and sharded clusters
2508
Ops Manager _________ provides an interface for configuring MongoDB nodes and clusters and for upgrading your MongoDB deployment
2509
Ops Manager provides Ops Manager ________ and Ops Manager Backup, which helps users optimize clusters and mitigate operational risk
2510
________ an on-premise solution, has similar functionality to the cloud version
2511
To mitigate the impact of mongodump on the performance of the replica set, use mongodump to capture backups from a _________ member of a replica set
2512
When connected to a MongoDB instance, mongodump can adversely affect ______ performance
2513
On Linux the ______ manager can create a snapshot
2514
The MongoDB ______ supports the backing up and restoring of MongoDB deployments
2515
If applications modify data while mongodump is creating a backup _________ will compete for resources with those applications
2516
For replica sets, mongodump also supports a point in time feature with the ________ option
2517
mongodump and mongorestore can operate against a running _______ process
2518
The _________ tool can populate a MongoDB database with the data from these BSON files
2519
If your storage system does not support snapshots, you can copy the files directly using ____________
2520
The _______ tool reads data from a MongoDB database and creates high fidelity BSON files
2521
To get a correct snapshot of a running mongod process, you must have _________ enabled.
2522
The $rename operator logically performs a _______ of both the old name and the new name
2523
Updates that include _________ of field names may result in the reordering of fields in the document
2524
If your driver has a version number of 2.9.1, What is the major version?
2525
User-defined indexes on multiple fields is called ___________
2526
An application communicates with MongoDB by way of a client library, called _____________
2527
Which of the following data structures are documents in MongoDB?
2528
MongoDB uses the ________ notation to access the elements of an array and to access the fields of an embedded document.
2529
Index keys that are of the _______ type are more efficiently stored in the index
2530
To store documents larger than the maximum size, MongoDB provides the _______ API
2531
MongoDB documents are composed of field-and-value pairs and have the following structure?
2532
BSON is a binary representation of ________ documents
2533
The __________ JavaScript shell and the MongoDB language drivers translate between BSON and the language-specific document representation.
2534
Which of the following query is used to generate a new ObjectId, use the ObjectId() constructor with no argument?
2535
__________ returns the JavaScript representation in the form of a string literal
2536
The ______ field is always the first field in the document
2537
To ensure functioning replication, do not store values that are of the _______ regular expression type in the _id field
2538
Which of the field is reserved for use as a primary key?
2539
Object_Id is similar to _________ key in Relational Databases.
2540
In the mongo shell, you can access the creation time of the ObjectId, using the ______ method
2541
There is _________ byte counter in BSON, starting with a random value
2542
Each data type has a corresponding number that can be used with the _______ operator to query documents by BSON type
2543
Which of the following data type is depreciated?
2544
_________ is a binary serialization format used to store documents and make remote procedure calls in MongoDB
2545
The GridFS index allows efficient retrieval of __________ using the files_id and n values
2546
The ___ field contains the sequence number of the chunk
2547
GridFS uses a _________ index on the chunks collection for the files_id and n fields.
2548
Each document in the __________ collection represents a distinct chunk of a file as represented in the GridFS store
2549
MongoDB represents queries as ___________ objects
2550
When you query a GridFS store for a file, the _______ will reassemble the chunks as needed.
2551
By default GridFS limits chunk size to ______ k
2552
__________ is a specification for storing and retrieving files that exceed the BSON-document size limit of 16MB.
2553
In one field, exact monetary value is encoded as a _________ data type.
2554
The ______ factor is a constant and known property of the currency
2555
Use of the approximation field for the query and sort operations requires that applications perform _______ side post-processing
2556
Which of the following is used to handle arbitrary or unforeseen number of precision?
2557
MongoDB stores times in _____ by default, and will convert any local time representations into this form
2558
Which of the following precision uses two values for the field?
2559
__________ precision multiplies the monetary value by a power of 10
2560
To add structures to your document to support keyword-based queries add the keywords as ______ in the array
2561
Which of the following is related to the parsing of document for root?
2562
Which of the following is related to document that provide support for synonym or related queries in the application layer?
2563
Which of the following is related to document that do not provide a way to weight results?
2564
____ indexes can include any field whose value is a string or an array of string elements.
2565
___________ bulk indexes may be more efficient for some kinds of content and workloads in real time
2566
Which of the following operations are atomic on document level?
2567
Which of the following pattern is best for static trees that do not change?
2568
____________ pattern requires additional steps of working with strings and regular expressions
2569
The ____________ pattern identifies each node in the tree as stops in a round-trip traversal of the tree.
2570
The Array of Ancestors pattern is slightly slower than the ________________ pattern
2571
Which of the following pattern is more straightforward to use?
2572
Which of the following pattern may provide a suitable solution for storing graphs?
2573
The _________ References pattern stores each tree node in array the id(s) of the node’s children
2574
The ________ Links pattern provides a simple solution to tree storage but requires multiple queries to retrieve subtrees.
2575
The ________ References pattern stores each tree node in a document; in addition to the tree node, the document stores the id of the node’s parent.
2576
Which of the following statement is incorrect about documents in MongoDB?
2577
The ___________ JavaScript shell and the MongoDB language drivers translate between BSON and the language-specific document representation.The ___________ JavaScript shell and the MongoDB language drivers translate between BSON and the language-specific document representation.
2578
__________ define what records to select for read, update, and delete operations
2579
Which of the following is used to avoid the repetition of data in MongoDB schema?
2580
Which of the following relationship uses references to describe documents between connected data?
2581
Which of the following field allows efficient retrieval of chunks?
2582
The files_id field contains the _id of the chunk’s __________ document
2583
___________ is the _id is of the data type chosen for the original document in files collections
2584
The default chunk size is changed from 256k to 255k in which version
2585
_______________ is a specification for storing and retrieving files that exceed the BSON-document size limit of 16MB
2586
Capped collections provide __________ management of inserted documents in MongoDB
2587
To get the current number of namespaces in the mongo shell, use ____________
2588
MongoDB using the mmapv1 storage engine has limits on the number of __________
2589
Normalized data models describe relationships using ___________ between documents
2590
Embedded data model is used when you have _________ relationships between entities
2591
___________ strategy is used to explicitly avoid document growth.
2592
______________ documents capture relationships between data by storing related data in a single document structure
2593
_______ store the relationships between data by including links or references from one document to another.
2594
A query _______ consists of a combination of query, sort, and projection specifications
2595
_________ is used to view statistics about the query plan for a given query
2596
The update() method uses the _______ command, which uses the default write concern
2597
_____ can modify specific fields of an existing document or documents or replace an existing document entirely, depending on the update parameter
2598
The ________ message is used to update a document in a collection
2599
___________ is used to determine whether a query is a covered query
2600
Indexes are typically available in ______ or located sequentially on disk
2601
With a receipt acknowledged write concern, the _________confirms that it received the write operation and applied the change to the in-memory view of data
2602
MongoDB does not ___________ modifications made before the wtimeout interval expired
2603
The mongo shell and the MongoDB drivers use __________ as the default write concern
2604
When inserts, updates and deletes have a _________ write concern, write operations return quickly
2605
Point out the correct statement
2606
__________ concern describes the guarantee that MongoDB provides when reporting on the success of a write operation.
2607
An index cannot cover a query on a _______ collection when run against a mongos if the index does not contain the shard key.
2608
Which of the following operator is not very selective?
2609
____________ is a client or database-generated identifier that uniquely identifies this message
2610
The __________ method returns a document that includes a metrics field.
2611
______________ specifies the number of documents to return in each batch of the response from the MongoDB instance
2612
To describe the message structure, a ________ like struct is used
2613
Which of the following will display complete list of available cursor flags?
2614
Which of the following flag can be set by mongo shell?
2615
Ongoing activity of system support is
2616
System development of cross life-cycle is?
2617
________ is NOT a phase of the systems development life cycle?
2618
In PIECES framework Which one is NOT a category of problems represented
2619
What is the deliverable phase of the problem analysis
2620
Project Management ensures that
2621
__________ is an Example of Open database connectivity (OBDC) tools
2622
keyless interfaces include_________
2623
A definition of the user moves from window to window, interacting with the application programs to perform useful work is called:
2624
A Language-based, machine that representations of how a software process is supposed to do, or how a software process is supposed to accomplish its tasks.
2625
The transactions flow in business processes to ensure that appropriate checks and approvals are implemented is called
2626
________ not a typical business function?
2627
How many people that actually use the system to perform or support the work to be completed?
2628
________ done in the Credit checking
2629
________ not a class information system applications?
2630
Information systems that support the business functions that reach out to suppliers are known as:
2631
Contemporary Information Systems that are interfacing with customers and suppliers:
2632
______ is a part of a static view of information?
2633
Password and accounts responsibilities to 29 Use-case analysis focuses upon
2634
_______ is not a part of an acceptable use policy?
2635
Frederic W. Taylor present the idea(s) of
2636
For a web site, _______ is not a type of navagation system
2637
_______ relates to enterprise interoperability?
2638
______ done in the Credit checking
2639
Which statement is incorrect about XML schemas?
2640
which statement satisfy taxonomy?
2641
______ is the collection of UML depicts information systems
2642
_____ is depicted by web blueprint.
2643
The DBA is
2644
_____ represented an information flow diagram?
2645
The legal constraints Monitoring by a company which operates under requires review of:
2646
Which attribute manager require for quality information
2647
_________ is the general transformation cycle for information
2648
What is the primary outcome of web self-services that is offered by the bank for customers?
2649
Using a business performance management software to monitor performance __________
2650
What are the advantage(s) of transistors
2651
A university creates a web-based information system that gives access to faculty who can record student grades and advise students, this is an example of a/an CRM.
2652
In which phase of the system development process specifications for a solution that fulfills the business requirements is undertaken and the technical blueprint is developed
2653
short form of AI
2654
In information system Which one is not a business driver?
2655
Which of the following is responsible for the systems development, budget, on-time development and with acceptable quality
2656
Which one is the organizations Back Bone?
2657
which of the following application of information is used to scan an organization’s environment?
2658
who have concerned with tactical (short-term) operational problems and decision making ?
2659
Which of the following information system supports planning and assessment needs of executive management?
2660
In a formal system development process which of the following
2661
In an information system which one is not a technology driver for an information system?
2662
How are data organized in a spreadsheet?
2663
Which types of charts can excel produce?
2664
You can open the consolidate dialog box byt choosing Consolidate from the ….. menu.
2665
Macros are “run” or executed from the ….. menu.
2666
Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result
2667
When you insert an Excel file into a Word document, the data are
2668
What function displays row data in a column or column data in a row?
2669
You can add an image to a template by clicking the Insert Picture From File button on the …. Toolbar.
2670
What do we call a computer program that organizes data in rows and columns of cells? You might use this type of program to keep a record of the money you earned moving lawns over the summer.
2671
What type of chart will you use to compare performance of sales of two products ?
2672
It is a collection of data that is stored electronically as a series of records in a table.
2673
An Excel file is generally called a / an :
2674
In Excel, which one denoted a range from B1 through E5
2675
How many sheets are there, by default, when we create a new Excel file ?
2676
The basic unit of a worksheet into which you enter data in Excel is called a
2677
What type of chart is good for single series of data ?
2678
How will you graphically represent expenditure in different departments ?
2679
What do you use to create a chart?
2680
In Excel, Rows are labelled as ______
2681
What type of chart is useful for comparing parts of a whole ?
2682
The ____ feature of MS Excel quickly completes a series of data
2683
The process of arrenging the items of a column in some sequence or order is known as :
2684
What type of chart is useful for showing trends or changes over time ?
2685
The Greater Than sign (>) is an example of _____ operator.
2686
In Excel, Columns are labelled as ___
2687
Which functionin Excel checks whether a condition is true or not ?
2688
Functions in MS Excel must begin with ___
2689
Which one is not a Function in MS Excel ?
2690
What type of chart will you use to compare performance of two employees in the year 2016 ?
2691
Statistical calculations and preparation of tables and graphs can be done using
2692
A features that displays only the data in column (s) according to specified criteria
2693
Which functionin Excel tells how many numeric entries are there ?
2694
What type of chart is useful for comparing values over categories ?
2695
What is the intersection of a column and a row on a worksheet called ?
2696
In Load Generator Information dialog, The Security tab is disabled if the load generator is Localhost
2697
In Load Generator Information dialog, If you select the Enable firewall option, the Temporary directory option for storing temporary files is enabled
2698
If you are monitoring or running Vusers over the firewall, the UNIX Environment settings are more relevant.
2699
In the scenario, LoadRunner replaces human users with virtual users or Vusers.
2700
When analyzing a technical aspect of a system under test, which group is a helpful source of information?
2701
Define -Think Time
2702
Which of the following is NOT a component of LR ?
2703
In Analyer , can graphs be corelated /overlayed?
2704
_______ address represents the physical location of the record in file system.
2705
Which one of the following is a function of the systems analysis stage?
2706
MICR magnetic ink character recognition used in ________.
2707
Decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition would be characterized as ________________.
2708
________ system has transformed office into an in house publisher of business documents.
2709
The majority of publically available internet information sources are____________.
2710
MODEM stands for _____.
2711
An information system that supports the planning and assessment needs of executive management is ______________________.
2712
In communication ______ controls the input and output activities
2713
A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process is _______________.
2714
The ______ is monitors the activities of the computer system
2715
The person who ensures that systems are developed on time, within budget, and with acceptable quality is a __________________.
2716
_____ software describes the programs that are written for users system.
2717
Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________.
2718
_____ is a device that makes pen and ink drawings of lines, curves and shapes.
2719
ESS and GDSS are mostly used by ____________.
2720
_______ is small figures that look like a file folder appears in the screen.
2721
User training and system conversion belong to _________ phase of SDLC
2722
In database, table is made of _______.
2723
Prototyping replaces unplanned work with _______________.
2724
Data encryption concept is used for ______ purposes.
2725
Developing Products, Services, or Process that give a Company a Superior Business Position is termed as _________________.
2726
involves capturing and assembling elements that enter the system to be processed
2727
_______is (are) the important component(s) of DSS.
2728
The system is an orderly grouping of various components linked together to reach ______.
2729
Where, when and how to apply knowledge is referred as __________________.
2730
In network while transferring the data, whole is divided in to _____.
2731
A supply strategy in which components arrive exactly at the moment they are needed is called _________________.
2732
_____ duplex transmission can flow data in two ways but one direction at a time.
2733
Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives?
2734
Medium bans channels use ____ type of cables used for transmissions.
2735
Which type of system tracks day-to-day activities of an organization?
2736
A ___ is a binary event representing a signal change from positive to negative
2737
In network the term protocols means ____.
2738
_____ configurations provide extremely a fast transmission between workstations contains only one
2739
A formal document would be classified as __________.
2740
In networks can be classified by their shape are called _____.
2741
E-commerce is ubiquitous it reduces __________.
2742
In network the different communication are interconnected by using a communication processors called a _____.
2743
A method of interacting with customers such as a Web site or a wireless device is called _____________.
2744
A ______ is a communication processor that connects two similar LANs
2745
A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________.
2746
______ type of cables need minimum numbers of repeaters
2747
This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________.
2748
_______ type of cables uses the copper wire for data transmission
2749
____________ is a plastic card with a built-in microprocessor, used typically to perform financial transactions.
2750
In very big network the ______device is used to find the effective part in time.
2751
Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.
2752
________ system uses the condition concept for processing.
2753
Common threats against information systems come from all of the following factors except ___________________.
2754
________ system can process data that are incomplete
2755
Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n) ______________.
2756
FIFO stands for ______.
2757
Google are using information technology to pursue this generic strategy of ____________.
2758
The ________ has no pre-established decision procedures.
2759
Structured decisions are ___________ in nature.
2760
_________ will produce the periodic financial statements and reports of the business.
2761
The main characteristics of Knowledge Process Outsourcing are___________.
2762
________ keeps tracks of data concerning purchase from and payments to suppliers.
2763
The MIS should be developed by____________.
2764
_________ is the period in days between the ordering and delivering of goods.
2765
A decision support system, which provides support for decision making by a group of persons is __________.
2766
________ language use for artificial intelligence and symbolic applications
2767
In the Financial Decision-Making System which of the following is not a transaction processing system input _____________.
2768
Assembly language use _______ technology for programming
2769
Which of the following is Electronic Conference Tool(s)?
2770
The system software are also called _______.
2771
Which one of the following is not one of the major dimensions for developing international information systems architecture?.
2772
GUI stands for _______
2773
Restructuring & transforming a business process by a rethinking and redesign done by ____________.
2774
Primary storage device such as semiconductor memory chips are called _______.
2775
______ type of printer function like a photocopying
2776
______ type of printer is good for text, but not for images
2777
The _____ most common form of visual output for user interface
2778
The growth of corporate intranets, extranets, as well as the web, has accelerated the development and use of executive class information delivery and decision support software tools by lower levels of management and by individuals and teams of business professionals. This dramatic expansion has opened the door to the use of which of the following tool?
2779
VDT stands for ______.
2780
The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.
2781
In punched card system, holes are punched by device are called ______.
2782
Which of the following level of managers develop short and medium range plans, schedules, and budgets and specify the policies, procedures, and business objectives for their sub units of the company?
2783
In OOPS the member functions also called _____.
2784
The internal memory in computer is also called ____.
2785
GB in memory stands for _____.
2786
In _____ organization, authority is delegated down the hierarchy.
2787
PDA means ______.
2788
____ is the oldest and most widely used from of grouping activities.
2789
_______ type of computers is manufactures through silicon chips
2790
Which one of the following is used for evaluating credit risks?
2791
_____ leader who commands both positional and personal influence.
2792
A _____ types of processor design uses a group of instruction processors to execute program at the same time.
2793
The _____ organization often constructs its own messages.
2794
Finger print system of security control comes under ______.
2795
In which of the following types of analysis, the goal is to find the optimum value for one or more target variables, given certain constraints?
2796
The evolution of Electronic data processing_______
2797
________ type of testing ensures the system is free of errors and is ready to be placed into operation.
2798
In which of the following types of analysis, the value of only one variable is changed repeatedly, and the resulting changes on other variables are observed.
2799
TPS stands for_____
2800
Program testing concept use ________ approaches
2801
Decision support system involves all of the following types of analytical modeling activities except?
2802
RFP stands for ______.
2803
A _______ evaluation process reduces the possibility of buying inadequate hardware.
2804
______________ is unauthorized copying of software.
2805
________________ is obsessive use of a computer or unauthorized access and use of computer systems.
2806
________ steps ensure the success of the new systems
2807
______ type of feasibility deals with the costs of both development and operations of the system.
2808
The project team is composed of the system professional are directly responsible for _____ the system
2809
__________ charts are used to represent the project tasks and durations.
2810
_____________ is a distinct program that can run unaided.
2811
_______ takes responsibility and keeps track of progress in MIS design. Development and implementation.
2812
________________ is a program code that cannot work without being inserted into another program.
2813
__________ type of budgeting is based on estimation of total project cost by the top management.
2814
_________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making.
2815
In overall business side the MIS planning initiates from business _____.
2816
An instruction in a computer program that triggers a malicious act is called as ____________.
2817
___ sub system covers granting of credit and cost management
2818
_________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents.
2819
____ sub system deals with activities as purchasing, receiving inventory control and distribution
2820
________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.
2821
In general the information system can also describe in terms of ____.
2822
_____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources
2823
A manufacturing company products may decide to diversify into ____ lines.
2824
______________________ decision support system that provides support for decision making by groups of people
2825
___ models to analysis a problem and provides possible solution for management evaluation
2826
The most advanced graphics software in any system used by management is normally found in __________________.
2827
The operating decisions resulting actions usually cover ____ periods.
2828
The major source of data for other systems is __________________.
2829
Decision varies as to the ____ structure within each level of management.
2830
An ________________ system has a stored knowledge base and an inference engine.
2831
The total process of a system is the net contribution of ____ individual process in the design.
2832
In any real time system ___ factors are termed as boundaries of the system.
2833
Expert System contains _____________.
2834
In database handling ____ reports used by software for data.
2835
ECS means ___________________.
2836
In a firm the reports are generated under condition are called _____ reports.
2837
TPS means ____________.
2838
Managers can receive information from _____ that supports their decision making systems.
2839
The analysis and design of application systems are the responsibility of a ___________.
2840
Critical information for top management is provided by ____ information system.
2841
Electronic Filing, Voice Mail are the reponsibilities of _______________.
2842
AIS stands for _______.
2843
The process of helping users see patterns and relationships in large amounts of data by presenting the data in graphical form is called __________________.
2844
Information System specialists also called as ______.
2845
The results of "what-if" questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________.
2846
ATG in network stands for ____.
2847
A type of decision in which there may be several "right" answers and no precise way to get a right answer is ____________________.
2848
Acquiring, training and retaining good network _____ should be a top priority.
2849
The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________.
2850
The overall recruit process will be control by _____ person
2851
Security systems based on physical or behavioral traits are called ________________.
2852
____ manager typically manage the operation of specific LAN and WAN.
2853
Which activity of an Information System converts raw input into a meaningful form__________.
2854
____ system that allocate costs to users based on the information services rendered
2855
Raw facts that have not been organized into a useful form are called_______________.
2856
HRM stand for ___.
2857
Data shaped into meaningful form are called ________.
2858
In a company ______ is the centre which consists of all processing activities.
2859
Decision trees could be represented in different ways such as ____________________.
2860
_____ system monitors the processing of jobs, development and schedule in the overall systems.
2861
Expand GDSS.
2862
In company side the outsourcing people also called______.
2863
The basic component(s) of DSS is (are) _________________.
2864
____ information system planning us the last stage of the planning process.
2865
__________ details are given by Management to Marketing Service System.
2866
____ of information systems that support key business functions as well as cross functional business processes.
2867
In companies can develop ____ information system to gain a competitive edge.
2868
The flow of information through MIS is ______________.
2869
____ system will monitor and control the industrial processing activities.
2870
The back bone of any organization is ____________.
2871
____ system provide information in easy to use displays to top and = middle management.
2872
The information of MIS comes from the_______.
2873
POS stands for ____.
2874
Sales and inventory processing and accounting systems are examples of __________ systems.
2875
____ type of processing, data is processed immediately after a transaction occurs.
2876
______________ is a support team, workgroup, and enterprise communications and collaborations.
2877
____ is media used in network which is used to connect between countries.
2878
Petroleum refining, power generation and steel production systems are example of ____________ systems.
2879
In network based systems ____ devices is used to connect all the system in to one for sharing information.
2880
________________ monitors and control industrial processes.
2881
In a big network the system are called as ______.
2882
____________process data resulting from business transactions, update operational databases, and produce business documents.
2883
The computer system uses _____ forms of data for usage.
2884
An individual is credited with the development of the five forces competitive model is ______________.
2885
MODEM means ___.
2886
Data about the performance of a system is ____________.
2887
___ communication media is more expensive one in network.
2888
___________ is the process of defining the current problem, determining why a new system is needed, identifying the objectives of the proposed system:
2889
In a big network the communication media refers to use _____.
2890
Cybernetic system is the one which is ______________
2891
The following statement which one is true to information systems.
2892
Which of the system uses Multidimensional data analysis?
2893
____ type of data uses pictures and graphics shapes for usage.
2894
Knowledge based system supports, _____________.
2895
Knowledge bases that hold knowledge in a variety of forms such as ____.
2896
Which computer based model is developed after human brain?
2897
CPU means ____.
2898
Which is not a domain of Artificial Intelligence?
2899
____ is the people who develop and operate the information systems.
2900
On-line transaction processing is used when ______________. I) it is required to answer random queries. II) it is required to ensure correct processing. III) all files are available on-line. IV) all files are stored using hard disk.
2901
In any of the system _____ resource is consider as people resources.
2902
A human order taker can be bypassed when using _________________.
2903
____ information system that express a fundamental concept and activities of information systems.
2904
Which of the following is not a characteristic of good information?
2905
____ information system uses the information technology to develop all features in the products.
2906
Customer numbers and their names would be an example of the ________________ component of an order management information system.
2907
BPR means ______.
2908
A computer security protocol for logging in would be an example of the component of an information system ____________.
2909
In Information system the operation managed by a _____ officer
2910
Enterprise systems support _______________.
2911
__________system is that two or more subsystems share the data over a network.
2912
Information systems can facilitate supply chain management by ______________.
2913
_____ is the mortar that holds all the functional systems together.
2914
Materials into intermediate and finished products, and distributing the finished products to customers?
2915
____ type of system is essential for applying boundaries of the problem.
2916
Assembling a product, identifying customers and hiring employees are _________________.
2917
In MIS ____ plays economically sound and logically in development process.
2918
Tracking employee training, skills, and performance appraisal is an example of a human resource information system operating at the ____________________.
2919
Plan must include the _____ systems concept for implementation of the new Information system.
2920
Deciding where to locate new production facilities is an example of a manufacturing and production information system operating at the _______.
2921
______ is a prominent attribute of management information procured through MIS of an organization.
2922
Identifying customers and markets using data on demographics, markets, consumer behaviour, and trends is an example of ____________.
2923
____ means that information must reach the recipients within the prescribe timerframe.
2924
Management information systems usually______________.
2925
In among the firms executives, managers, and supervisors are comes under _____ of workers.
2926
Which of these items is a major component of today's IT infrastructure?
2927
Reporting the status of an activity through a feedback mechanism is called _____ information.
2928
In which of the following functions of MIS reports are generated based on the enterprise's need ______________.
2929
The information generated at regular intervals is a _____ information.
2930
______________ Systems keep a track on the daily regular business transactions of the organisation.
2931
The word data is the plural form of _____.
2932
The first phase of IT planning is called _____________ planning.
2933
_____ is the fact that are properly arranged, classified and organized.
2934
A combination of a MIS and DSS called _____________ which helps top managers make decisions.
2935
The final element of feedback is essential fro system operation and for ____.
2936
The _________ provides a manager with the information needed to make decisions regarding, the firm's operational activities.
2937
The _____ system which is closest to the stress will change the most.
2938
The Management information System receives input from the _____________.
2939
____ system is concerned with the way information is used for purpose of control and applies technologies.
2940
MIS stands for ________________.
2941
____ system grouping of people and behavior has been subjected to research.
2942
The direct, computer to computer exchange of standardized, common business transaction documents between business partners, suppliers, and customers is ______________.
2943
A deterministic system operate in a predictable _____.
2944
EDI stands for _____________.
2945
____ refers to the holism of the system in real time.
2946
The popular term for the software component that supports the collaborative efforts of a team is ______________.
2947
To become an effective MIS department must state its _____.
2948
Which of the following is a computer based system that stores and, manipulates data that are viewed from a geographical point or reference?
2949
The starting point of MIS planning is general ______ planning.
2950
Accounting, finance, marketing, and human resources are known as ____________.
2951
EDP means ____.
2952
Expand TPS.
2953
The ____ component plays a decision rule for the computer.
2954
What is Software?
2955
____ planning systems deals with the projections of the future.
2956
CASE Tool is _______________.
2957
The ____ information system deals with the flow of information about people working in the organization
2958
The tools that support different stages of software development life cycle are called ________________.
2959
_____ is an overall performance summary to date and compared with the previous periods, budgets.
2960
Which phase is not available in software life cycle?
2961
The effectiveness of marketing information system depends to a larger extent of _____ from market place to the firm.
2962
Which of the following is not an attribute of software engineering?
2963
The most rapidly growing application for computer assisted decision making is called ____ .
2964
Top down approach is used for ___________.
2965
The major drawbacks in decision making by MIS is difficult due ____ for business problems.
2966
In the system concepts, the term integration is ________________.
2967
processing is considered as the classical method of processing data.
2968
The art of getting things done through people, with the people __________________.
2969
The _____ will make the automated inventory system understandable to everyone.
2970
________is the information about data.
2971
In compilation process the program is placed in the memory in the form ___.
2972
The first step in the systems development life cycle (SDLC) is _______________.
2973
A sequence of instructions that works together to perform a task is called a ______.
2974
System Development process is also called as ______________.
2975
The ___ language is used to solve the numeric problems.
2976
SDLC stands for ____________.
2977
In computer the number system of 0 and 1 is called as ____.
2978
_________is the real world object, such as a person, place etc.
2979
The advantages of creating a prototype are ____________________.
2980
The most creative and challenging phase of system life cycle is ___________.
2981
System development is a __________.
2982
______________System can be any organized combination of people, hardware, software, communications networks and data resources that collects, transforms and disseminates information in an organization.
2983
Prototype is a ______________.
2984
Which of the following individuals typically have less formal, advanced educational degrees and tend to process rather than create information?
2985
Summary transaction data, high-volume data, and simple models are information inputs characteristic of _________________.
2986
Projections and responses to queries are Information output characteristics associated with ______________________.
2987
Information systems that monitor the elementary activities and transactions of the organizations are _________________.
2988
Hyperlinks cannot be
2989
when you work with large worksheets, you may need to
2990
How do you change column width to fit the contents?
2991
The Name box
2992
Charts tips can
2993
When integrating Ms-Word and Excel, Word is usually the
2994
To center worksheet titles across a range of cell, you must
2995
To insert three columns between columns D and E you would
2996
What’s a quick way to extend these numbers to a longer sequence, for instance 1 through 20?
2997
Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
2998
when you use the fill effects in the format data series dialog box, you can not
2999
Which of the following describes how to select all the cells in a single column?
3000
Got functions? No? You need the insert function dialog box. How do you get it?
3001
Which of the following setup options can not be set in the page setup dialog box?
3002
A data map is helpful
3003
when working in the page break preview, you can
3004
You can open the Sort dialog box by choosing Sort from the ….. menu
3005
You can open the scenario Manager dialog box by choosing scenarios from the ….. menu.
3006
To edit data in an embedded Excel worksheet object in a Word document
3007
Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet?
3008
To hold row and column titles in places so that they do not scroll when you scroll a worksheet, click the
3009
When you see a cell with a red triangle in the top right corner, what does this signify?
3010
When you link data maintained in Excel workbook to a Word document
3011
Weight refers to
3012
You can group noncontiguous worksheets with
3013
when you print preview a worksheet
3014
In a worksheet you can select
3015
When the formula bar is activated, you can see
3016
to activate the previous cell in a pre-selected range, press
3017
When creating a vertical page break
3018
To drag a selected range of data to another worksheet in the same workbook, use the
3019
The default header for a worksheet is
3020
When you group worksheets
3021
Data marker on a chart are linked to data points in a worksheet, therefore,
3022
which function will calculate the number of workdays between 6/9/2004 and 8/12/2004?
3023
This type of software is similar to an accountant’s worksheet
3024
You can not link Excel worksheet data to a Word document
3025
You can zoom a worksheet
3026
Prototype of a function means ___
3027
A C variable name can start with a __
3028
Which one is not a reserve keyword in C Language?
3029
Language was developed in the year ___
3030
Who is known as the father of C Language ?
3031
In worst case, the number of comparison need to search a singly linked list of length n for a given element is
3032
Linked lists are not suitable to for the implementation of?
3033
Which of the following statements about linked list data structure is/are TRUE?
3034
In circular linked list, insertion of node requires modification of?
3035
A variant of the linked list in which none of the node contains NULL pointer is?
3036
A variation of linked list is circular linked list, in which the last node in the list points to first node of the list. One problem with this type of list is?
3037
What kind of linked list is best to answer question like “What is the item at position n?”
3038
In doubly linked lists, traversal can be performed?
3039
A variant of linked list in which last node of the list points to the first node of the list is?
3040
The concatenation of two list can performed in O(1) time. Which of the following variation of linked list can be used?
3041
What would be the asymptotic time complexity to insert an element at the second position in the linked list?
3042
What would be the asymptotic time complexity to find an element in the linked list?
3043
What would be the asymptotic time complexity to add an element in the linked list?
3044
What would be the asymptotic time complexity to add a node at the end of singly linked list, if the pointer is initially pointing to the head of the list?
3045
In linked list each node contain minimum of two fields. One field is data field to store the data second field is?
3046
Which of the following operations is performed more efficiently by doubly linked list than by singly linked list?
3047
A linear collection of data elements where the linear node is given by means of pointer is called?
3048
In a circular linked list
3049
Deletion of a node in linked list involves keeping track of address of node which comes immediately
3050
In a doubly linked list traversing comes to a halt at:
3051
A pointer in which a pointer variable contains the address of a variable that has already been allocated:
3052
In which data structure direct or random access not possible?
3053
To make a queue empty, elements can be deleted, till
3054
An array A[15][20] is stored in memory. Each element is of integer type. If ther base address is 600 determine the address of A[8][13] when the array is stored as row major wise
3055
To find out maximum element in a list of n numbers, one needs at least
3056
Which of the following is true in case of a null pointer?
3057
Underflow condition in linked list may occur when attempting to
3058
In linked list representation, a node contains at least
3059
Full Buffering would be appropriate for ?
3060
Full Buffering would be appropriate for ?
3061
package.json is is used to define the properties of a package?
3062
The $ npm ls -g statement is used to list down all the locally installed module?
3063
How can we create instance of http module ?
3064
The $ npm ls statement is used to list down all the locally installed module?
3065
To install Node.js express module
3066
How can we check the cujrrent version of NPM?
3067
Which statement execute the code of sample.js file?
3068
Which of the following is true about RESTful web services?
3069
APIs of Node.JS are
3070
Which of the following is true about Chaining streams ?
3071
In Nodejs what is use of underscore variable in REPL session
3072
Which is the following can use to avoid callbacks?(Multiple Selection)
3073
Which is used for install any package globally?
3074
For split a single Node process into multiple processes which inbuilt method is used?
3075
Who is the main Author of Nodejs?
3076
How to concatenate buffers module in NodeJS?
3077
REPL stand for?
3078
Which module is used for creating both clients and servers?
3079
An approach to connect the output of one stream to the input of another stream is known as?
3080
IS < fs > module provides both synchronous and asynchronous methods.
3081
For file based operations which module is used ?
3082
For terminating the current command which REPL command is used
3083
Does node run on windows?
3084
Which module is used for compress/decompress files?
3085
Which Stream can be used for both the read and write operations?
3086
Which command is used to check the version of NPM?(Multiple Selection)
3087
Can We access DOM in node?
3088
Which command is used to exit from the REPL?
3089
Is Node a single threaded application?
3090
Which inbuilt module is deprecated now in node.js?
3091
Which method is used to fired any event?
3092
Which module is working for file upload ?
3093
What is the The first argument of the res.writeHead() method is the status code that shows all is OK?
3094
Node.js is a JavaScript framework?
3095
Which function is used to include any modules?
3096
What command does CTRL+c do on the Node.js REPL terminal?
3097
What does CTRL+d do on the Node.js REPL terminal?
3098
What do the tab keys do on the Node.js REPL terminal?
3099
What does REPL stand for?
3100
A Node.js application consists of the following except _____
3101
It is not advisable to use Node.js in which of the following
3102
On what engine was Node.js built?
3103
The first Node.js build supporting Windows was released in _____
3104
Node.js was initially released in _____
3105
_____ is the original author of Node.js
3106
What are Nodejs characteristics?
3107
All objects that emit events are instances of the EventEmitter class
3108
When the EventEmitter object emits an event, all of the functions attached to that specific event are called _______. Any values returned by the called listeners are ignored and will be discarded.
3109
Which methods can be use to switch listener functions asynchronous mode:
3110
By default EventEmitters will print a warning if more than ______ listeners are added for a particular event
3111
How many listenners can be attached to an event in NodeJS?
3112
Which method can be used to handle an event just only one time?
3113
How to store local variables that can be access within the application?
3114
In ExpressJS, the method app.all(path, callback [, callback ...]) can accept all HTTP methods
3115
Route paths, in combination with a request method, define the endpoints at which requests can be made.
3116
Something that happened in our application that we can respond too.
3117
Node uses _________ engine in core.*
3118
How do you kill a process in Node.js?
3119
How do you install Nodemon using Node.js?
3120
Which of the following are Node.js streams types?
3121
Which of the following module is required for path specific operations ?
3122
Node.js uses an event-driven, non-blocking I/O model ?
3123
A stream fires finish event when all data has been flushed to underlying system.?
3124
What is Callback?
3125
Command to list all modules that are install globally?
3126
Command to show installed version of Node?
3127
For What npm stands?
3128
Command to start Node REPL
3129
REPL stands for
3130
In which of the following areas, Node.js is perfect to use?
3131
Which method returns the current working directory of the process.
3132
Which of the following are not Node.js web application frameworks for?
3133
What does the fs module stand for?
3134
How Node.js modules are availble externally
3135
Which of following is not builtin node module.
3136
Which function is used to include modules in Node Js.
3137
Node Js is _________
3138
In Node process is ______
3139
Which extension is used to save NodeJs files?
3140
Is node js multithreaded?
3141
Node.js is written in _____________ .
3142
Node.js is ___________ Language.
3143
Node.js application can access which of the following databases?
3144
Which of the followings are valid languages for Node.js?
3145
Which of the following types of application can be built using Node.js?
3146
Which of the followings are web application frameworks for Node.js?
3147
Which of the following is a GUI-based debugging tool for Node.js?
3148
How to import module in Node.js?
3149
Which of the following core module is used to create a web server in Node.js?
3150
Third-party packages can be install/update/delete using ________.
3151
The Node.js modules can be exposed using _________.
3152
Simple or complex functionality organized in a single or multiple JavaScript files which can be reused throughout your Node.js application is called ________.
3153
Node.js application runs on __________.
3154
What is the default scope in Node.js application.
3155
Node.js terminal (REPL) is used for _________.
3156
Node.js is ________ by default.
3157
Node.js runs on __________
3158
Child processes always have three streams child.stdin, child.stdout, and child.stderr which may be shared with the stdio streams of the parent process.
3159
Which statement is valid in using a Node module fs in a Node based application?
3160
In Nodejs what is use of underscore variable in REPL session?
3161
Which of the following statements holds good with respect to Node?
3162
Which of following are a valid form of route path?
3163
Node.js supports which of the following platform?
3164
How can we create instance of http module?
3165
Which of the following template engines can be used with Node.js?
3166
Which of the following class is used to create and consume custom events in Node.js?
3167
In Node.js APIs of Node.JS are which of the following?
3168
Which of the following tool automates various tasks of Node.js application?
3169
Which of the followings are valid languages for Node.js?
3170
To install Node.js express module
3171
Is console a global object?
3172
What should you do in your code to improve your application’s performance?
3173
Which module is used to serve static resources in Node.js?
3174
What is REPL in Node.js?
3175
Why a Node.JS code is pretty fast although being written in JavaScript?
3176
What is the advantage of using node.js?
3177
How can we check the current version of NPM?
3178
What are the key features of Node.js?
3179
Which statement executes the code of sample.js file?
3180
In Nodejs how node based web servers differ from traditional web servers?
3181
The Node.js modules can be exposed using
3182
ali bhai osma abhai mugha sari books asign kar raha hain
3183
Which of the following addressing modes can be used for writing formulas in a cell in a worksheet in Microsoft Excel
3184
Which of the following alignments will apply by default when some text is entered in a cell in a worksheet of Microsoft Excel
3185
Which function is use to display the current date and time in a cell
3186
Which chart displays values as percentages of the whole
3187
The function that counts the number of cells in a range that are not blank is known as ________ function
3188
In Excel all styles are ___________ styles
3189
The Chart title option is available in
3190
What is the syntax of Minimum function ()
3191
The process of keep the top row visible while scrolling through the rest of the worksheet is known as
3192
Maximum column width in Excel sheet is
3193
Where you can change the "number of Recent Documents" shown option in Excel Office button
3194
Which function returns the most common value in a data set
3195
A function inside another function is known as
3196
In Excel Options, the Auto Correct Option can be found in
3197
Zoom slider option is available in
3198
Strikethrough, Superscript and Subscript are the _______ in Excel
3199
Which one is not available in print area selection option when you print a Excel document
3200
In Excel 2007, Axes option can be found in
3201
Which one/are the Chart Tool tab/tabs that adds in the ribbon when you display a chart
3202
In excel, which one chart type is not available
3203
In excel, which chart is also known as X Y chart
3204
In which year, Microsoft released the first version of Excel for Windows version
3205
Which commanad need to excute from "run window" to open a new excel file
3206
If "A1" is displayed in Name Box, then is indicates which one
3207
All formulas in MS Excel is start with _______ sign
3208
Which function key generates a bar graph from the values enterd in excel
3209
Total number of characters that a cell can contain
3210
VBA in MS-Excel was used from which version
3211
What is the default extention of Microsoft Excel 2003 saved file
3212
What is the maximum number of columns supported in a Excel 2007 worksheet
3213
What is the maximum number of rows supported in a Excel 2007 worksheet
3214
The intesection of rows and columns are called
3215
The output of this program is int a = 10; void main() { int a = 20; cout << a << ::a; }
3216
Observe following program and answer class Example{ public: int a,b,c; Example(){a=b=c=1;} //Constructor 1 Example(int a){a = a; b = c = 1;} //Constructor 2 Example(int a,int b){a = a; b = b; c = 1;} //Constructor 3 Example(int a,int b,int c){ a = a; b = b; c = c;} //Constructor 4 } In the above example of constructor overloading, the following statement will call which constructor Example obj = new Example (1,2,3);
3217
The return value of the following code is Class1& test(Class1 obj) { Class1 *ptr = new Class1(); ……… return ptr; }
3218
The output of this program is int main () { cout << “Hello World!” return 0; }
3219
C++ provides facility to specify that the compiler should match function calls with the correct definition at the run time. This process is called as
3220
There is nothing like a virtual constructor of a class
3221
Minimum number of temporary variable needed to swap the contents of 2 variables is:
3222
Value of a in a = (b = 5, b + 5); is
3223
If a member needs to have unique value for all the objects of that same class, declare the member as
3224
Which of the following is not a valid conditional inclusions in preprocessor directives
3225
Which of the following operators below allow to define the member functions of a class outside the class?
3226
Which of the following operator cannot be overloaded? #NAME?
3227
What is the implicit pointer that is passed as the first argument for nonstatic member functions?
3228
hich of the following operators can be implemented as a nonmember operator? #NAME?
3229
Which header file should we include for using std::auto_ptr?
3230
Which of the following is the most common way of implementing C++?
3231
In a C language ‘3’ represents
3232
Which looping process is best used when the number of iterations is known?
3233
Which of the following members do get inherited but become private members in child class
3234
If there is more than one statement in the block of a for loop, which of the following must be placed at the beginning and the ending of the loop block?
3235
STL is based on which of the following programmingparadigms?
3236
STL is based on which of the following programmingparadigms?
3237
STL is based on which of the following programming paradigms?
3238
Statement scanf(“%d”,80);
3239
Which of the following functions below can be used Allocate space for array in memory?
3240
Under which of the following circumstances, synchronization takes place?
3241
What defines a general set of operations that will be applied to various types of data?
3242
Which of the following below is /are a valid iterator type?
3243
What is deep copy?
3244
What is shallow copy?
3245
Inline functions are invoked at the time of
3246
What is the Difference between struct and class in terms of Access Modifier?
3247
In a group of nested loops, which loop is executed the most number of times?
3248
Which of the following is the most general exception handler that catches exception of ‘any type’?
3249
Which of the following is the most general exception handler that catches exception of any type?
3250
When class B is inherited from class A, what is the order in which the constructers of those classes are called
3251
Vtables
3252
How do we define a constructor?
3253
Which of the following below can perform conversions between pointers to related classes?
3254
Value of ix+j, if i,j are integer type and ix long type would be
3255
If a member needs to have unique value for all the objects of that same class, declare the member as
3256
Which of the following library function below by default aborts the program?
3257
In C language, a hexadecimal number is represented by writing
3258
The statement i++; is equivalent to
3259
Expression C=i++ causes
3260
Which of the following language feature is not an access specifier in C++?
3261
What happens when a pointer is deleted twice?
3262
Which of the following is not an advantage of secondary memory
3263
How do we declare an abstract class?
3264
How do we declare an ‘interface’ class?
3265
Which of the following languages is a subset of C++ language?
3266
class derived: public base1, public base2 { } is an example of
3267
Which of the following language is not supported by C++?
3268
Which of the following correctly describes the meaning of ‘namespace’ feature in C++?
3269
Which of the following correctly describes the meaning of‘namespace’ feature in C++?
3270
The default access level assigned to members of a class is ___________
3271
Which looping process checks the test condition at the end of the loop?
3272
How many copies of a class static member are shared between objects of the class?
3273
The two types of file structure existing in VSAM file are
3274
Select the off-cycle payroll which DOESNOT run in a SAP.
3275
Transaction for checking your job.
3276
Transaction code for creating an organizational unit within existing structure.
3277
Transaction code for creating an organizational unit
3278
Transaction code for run time evaluation.
3279
Transaction for fast entry.
3280
What is overview of an Infotype?
3281
Out of the following which is NOT subtype of the Infotype 0006?
3282
Which object type is used for the position.
3283
What is OM and PA?
3284
Which standard report in SAP HCM can be used to list all existing objects according to their type and ID?
3285
Before executing a report it is possible to set up Structure Parameters. One of these parameters is Status vector. What does this parameter control?
3286
Please indicate which of the following structures is defined as follows. This structure represents assignments of positions to organizational units and the relationships between positions and persons.
3287
Please indicate which of the following statements regarding a payroll process are false.
3288
What is a prerequisite for using the Manager’s Desktop?
3289
Please indicate if the following statement is true or false. Positions are concrete and can be occupied by employees. One position may be filled by only one person or by several people at the same time.
3290
What is the correct order of SAP implementation steps according to The Implementation Guide?
3291
Please indicate if the following statement is true or false. Deduction rules for absence quotas depend on the personnel subarea grouping for time quotas and the employee subgroup grouping for time quotas.
3292
Which substitution type is recommended for recording changes to planned working time that cannot be represented in daily work schedules or work schedules?
3293
Please indicate if the following statement regarding the appraisal process in SAP HCM is true of false. Upon completion of the appraisal process, an SAP system stores the result of the appraisal in a historical record and the results cannot be changed anymore.
3294
Please indicate which of the following elements are not used for setting up the business events catalog.
3295
What is the primary function of profile matchups in SAP HCM?
3296
Where does an SAP system normally store working schedules of employees?
3297
When an applicant interacts with a company regarding one or several vacancies, the SAP system maintains the applicant status. This status helps to track the progress of the applicant. Please indicate which of the following statements regarding the applicant status are correct.
3298
Please indicate if the following statement is true or false. When you enter data about an employee’s children in the Family infotype (0021) an SAP system automatically checks whether the number of the children matches the data in the Personal Data infotype (0002). If the number specified in both infotypes is not the same, the SAP system will display a warning message.
3299
In an SAP system, it is possible to set permissibility of infotypes per countries. Is it possible to set permissibility of subtypes for an infotype per countries?
3300
Please determine if the following statement is correct. When an employee leaves the company his or her personnel number cannot be deleted.
3301
Please indicate if the following statement regarding time data IDs in the Time Manager’s Workplace is true or false. Time data IDs need to be uniformly defined in an enterprise and be the same for different areas of the enterprise.
3302
Please indicate which of the following statements about day dominants in the Time Manager’s Workplace are not correct?
3303
In a certain company, salaried employees are granted with 20 days of annual leave. On the other hand, hourly-wage earners are granted with 19 days of annual leave in the same company. How this distinction should be reflected in an SAP system?
3304
Please indicate which of the following answers are the groupings for absence quota types?
3305
Which of the following items are defined in a counting rule for attendances/absences? Please select one or more answers.
3306
What are the possible ways in which part-time working provisions can be set up in an SAP system? Please identify all correct answers.
3307
A period work schedule can cover one week or several weeks but not a part of a week. Please indicate if this statement is true or false.
3308
SAP supports management of the global employment. Global employees can have several personnel assignments in different countries. Which of the following phases are included in the global employment procedure in SAP?
3309
Please indicate which of the following statements regarding personnel actions are false.
3310
When an infotype menu is not defined as user group dependent the infotype sequence can only be maintained for the user group 00 and will be valid for all users who select this menu. Please indicate if this statement is true or false.
3311
In customizing the user interfaces for working with infotypes, what is the function of the header modifier?
3312
What are the elements of a screen for maintaining infotype records? Please select the correct answers.
3313
When an SAP system suggests default wage types for the Basic Pay infotype it uses a decision tree. Which of the following levels does this decision tree have?
3314
Please indicate which of the following customizing steps should be performed in the IMG for setting up a wage type belonging to the wage type group ‘Basic Pay’.
3315
What is the relationship between the Planned Working Time and the Basic Pay infotypes? Please select all correct answers.
3316
Which of the following statements are true regarding features?
3317
The organizational structure of a company includes a number of jobs and positions. Please indicate which of the following statements are true?
3318
Please indicate which of the following statements regarding an employee group are correct.
3319
A customer needs to ensure the correct pay scale type and area is entered on IT0008 (Basic Pay). What could you configure to achieve this?
3320
Within a client, what is the correct sequence of steps for configuring the Enterprise Structure?
3321
You want a report that shows the relationship between a legal entity and a person and includes their organizational unit and position. Which evaluation path would return the appropriate data using standard relationships?
3322
When terminating an employee, customers need to record and evaluate the various causes of termination. What do you need to do to enable this?
3323
During a payroll run, organizational data and planned working time are not being imported. Which payroll function should be enabled in the schema to fix this issue?
3324
A customer wants to implement the infotypes for minimal time management. In addition to IT0000 (Actions) and IT0001 (Organization Assignment), which infotypes are required?
3325
What is the purpose of using personnel subarea control indicators in SAP Time Management?
3326
Which of the following are functions of the logical database in Reporting?
3327
Where do you find all the fields that can be used for decisions in a feature such as PINCH or ABKRS?
3328
Which is the first task you need to perform to include an Ad Hoc Query report in the SAP Easy Access menu?
3329
The function...... checks whether all master data has been imported:
3330
Indirect Valuations Table is?
3331
nfo types 1000 to 1999 are for?
3332
nfo types 0000 to 9999 are for?
3333
A profile match-up means
3334
In which Infotype are an employee’s Enterprise and Personnel Structure assignment stored?
3335
The following is true about Payroll Accounting:
3336
New features in Advanced Adapter Engine are
3337
What is the order of the pipeline steps in SAP PI
3338
You can create and maintain alert categories on the Integration Server?
3339
SAP PI is a single component that works flexibly to implement integration scenarios
3340
SAP PI is open and flexible as it uses
3341
Types of Lookups in SAP PI are
3342
To maintain IDoc metadata and port, which transaction codes are used in PI
3343
Sender Agreement is not required for
3344
System Landscape Directory adheres to
3345
You can save and reuse the part of message mapping as
3346
What ensures a central point of access to information, applications and services in the company
3347
Define installed units
3348
What is the central component in the User Productivity Area?
3349
What SAP component can be used to provide a single integrated user interface for users to SAP products?
3350
Which are the backend systems from which the Web Dynpro Model Object can be supplied with information
3351
When you create new content objects in the PCD, there are two main procedures, out of which one is using Copies. How many methods are there to create copies and which are they?
3352
The Universal Work list (UWL) collects tasks and notifications from multiple provider systems and is integrated with Alert Management. The statement is:
3353
You would like to share content between SAP and non-SAP portal systems that are distributed across your landscape, thus providing a single portal access point per user to portal, with one portal as logon portal for all users. Which of the following can you use?
3354
With the collaboration capabilities, SAP NetWeaver allows communication and collaboration in the portal. This allows SAP NetWeaver to bring together members of project groups regardless of time and of their geographic location. Which of the following functionalities are supported by ‘Collaboration’?
3355
Which of the following statements about Knowledge Management (KM) are true?
3356
You can implement an SAP NetWeaver Portal in your landscape to achieve various business goals. Which of the following scenarios are supported by SAP Netweaver Portal?
3357
Which Info type used for storing Personnel ids like PAN,Passport. | SAP HR mcqs
3358
If today is day type 2 then, today is a __________
3359
What are the day to day activities in Training and Event Management?
3360
How do you set up integration between Personnel Administration and Organizational Management?
3361
A Work Schedule Rule comprises of the following elements:
3362
The following are the options available in SAP Time Management
3363
Secondary Incoming wage types is ?
3364
different views in TMW?
3365
Stocks that are counted on predefined date is known as?
3366
Which of the following is a valid stock transfer?
3367
To check the reason for goods movement in inventory management, which of the following field can be used?
3368
Which of the following field can be changed once you past the material document?
3369
In SAP MM, you can view the most up to date planning data on a material using which of the following?
3370
Withdrawing of material for sampling or returning the goods back to vendor is called?
3371
Stock need to be blocked in advance so that it can be available at a particular point of time. This is known as?
3372
What is the movement type for Goods issue for a cost center?
3373
Goods receipt will show increase in warehouse stock?
3374
A Contract can be made from a Purchase Order and vice a versa?
3375
(Quota Allocated Quantity + Quota Base Quantity)/Quota is called?
3376
Total requirement of a material is distributed to different vendor’s i.e. quota is assigned to each source of supply and is known as?
3377
Which of the following is known as an invitation that is sent to vendors to submit indicating pricing and their terms and conditions?
3378
Purchase requisition can be created for which of the following procurement types?
3379
Which of the following Transaction can be used to create a Purchase Order?
3380
Which of the following Info record has information on material that is kept at ordering party premises and contains vendor’s price that is to be paid for withdrawing material?
3381
Which of the following is correct about movement type in SAP system?
3382
After processing of purchase order by vendor, material is delivered to ordering party and this process is called as goods receipt?
3383
Purchase Order is a reply by a vendor in response to request for quotation?
3384
While performing invoice verification, system picks the rate at which tax is calculated from vendor master record?
3385
Data that is associated with processing of business transaction is called as?
3386
Which of the following is/are basic and must assignments in standard SAP system?
3387
Which of the following category represents an account assignment category?
3388
Which of the following document in SAP system involves release procedure?
3389
Which of the following document types can appear in the purchase order history for a purchase order line item?
3390
A plant in SAP MM module is assigned to which of the following entity?
3391
In SAP MM system, which of the following document type is used as reference document?
3392
Which of the following Transaction code is used to create a plant in SAP system?
3393
Storage location is an organizational unit which actually differentiates between different material stocks in a Plant?
3394
Which of the following element is a commercial organizational unit in R/3 system and is at highest level in SAP system?
3395
The vendor receives components from the ordering party with the help of which it produces a product is known as?
3396
Material that is available at your store premises, however it still belongs to the vendor (seller)/Owner of the material is known as?
3397
The stocks that did not belong to company and these are being kept at some particular location is known as?
3398
Which of the following material is kept under stock once received from vendor?
3399
Arrange the below steps of Procurement Lifecycle in correct order 1. Determination of requirement 2. Invoice verification/ Vendor Payment 3. Goods receipt/ Invoice Received 4. Creating Purchase Requisition 5. Creating Purchase Order
3400
The process of buying materials and obtaining services in SAP MM from vendors or dealers is procurement?
3401
Which of the following is not a feature of SAP MM module?
3402
Scheduling agreement is a long term outline agreement between vendor and ordering party over a predefined material or service which are procured on predetermined dates over a framework of time?
3403
You can make changes to Purchase Order once it is released?
3404
Which of the following module is a part of Logistics area and helps to manage the procurement activity of an organization from procurement?
3405
Which of the following stock type allows movement of stock?
3406
Withdrawing of material for sampling or returning the goods back to vendor is called?
3407
Which of the following purchasing type, a purchasing organization is not assigned to any company code and it procures for all company codes belonging to different client?
3408
To check the reason for goods movement in inventory management, which of the following field can be used?
3409
Which of the following is first step in Procurement life cycle?
3410
Which of the following element has its own profit, loss and balance statement?
3411
You can use a material in SAP MM even after it is flagged for deletion?
3412
Contract and Scheduling Agreement are same?
3413
Which of the following stock type allows movement of stock?
3414
(Quota Allocated Quantity + Quota Base Quantity)/Quota is called?
3415
In Source lists, which of the following can be sources of supply?
3416
Which of the following represents a master category?
3417
Which of the following movement type can’t be reversed in Warehouse?
3418
Which of the following purchasing type, a purchasing organization is not assigned to any company code and it procures for all company codes belonging to different client?
3419
The Organizational Structure in MM consists of which of the following elements?
3420
Which of the following is not a feature of SAP MM module?
3421
Employee groups are not used for:
3422
What is assigned to the payroll status info type 0003) to personnel numbers with errors?
3423
Communication between time recording systems and HR time management takes place via standard interface?
3424
Out of the following which is NOT subtype of the Infotype 0006?
3425
Select the component which is used as selection criteria for evaluations and used in authorization checks UK.
3426
Select the structure which is NOT used in SAP.
3427
Communication between time recording systems and HR time management takes place via standard interface?
3428
Which organizational units make up the Personnel structure?
3429
The Organizational Key is used for which of the following?
3430
In case of which time constraint, it is mandatory for a record to exist, and only 1 can exist at any point in time.
3431
Which object type is used for the position
3432
A Work Schedule Rule do not comprises of the following elements
3433
You are reviewing the Personnel structure in SAP ERP Human Capital Management. Which element of the Personnel structure defines different payroll procedures, such as hourly versus salaried?
3434
What is the T Code for "Run Payroll"?
3435
What is the T Code for creating work schedule?
3436
What elements comprise the Work Schedule?
3437
What is the T Code for Salary Administration?
3438
What is the T Code for Maintaining HR Master data?
3439
Which feature determines the administrator group?
3440
What are the methods for transferring employee time data to the SAP system?
3441
The different method for transferring employee time data to the SAP system are:
3442
What is the T Code for creating functions and operations in Payroll?
3443
Which Personal Actions have you performed on an employee?
3444
What is the T Code for salary administration?
3445
Out of following, which is NOT the SAP Transaction Code?
3446
Select invalid component of the enterprise structure.
3447
The following statements are true for compounded info objects.
3448
Which feature that determines the administrator group?
3449
Secondary Incoming wage types is?
3450
What is assigned in the payroll status infotype(0003) to personnel numbers with errors?
3451
Out of the following which NOT subtypes of the Infotype 0006?
3452
Select the object type which is used for the cost center.
3453
Personnel Area has which of the following functions?
3454
The Payroll Accounting area includes which functions
3455
What is the role of a administrator in PA?
3456
How many bytes are occupied by near, far and huge pointers (DOS)?
3457
It is necessary that a header files should have a .h extension?
3458
In a function two return statements should never occur.
3459
The modulus operator cannot be used with a long double
3460
it is necessary to call the macro va_end if va_start is called in the function.
3461
Can I increase the size of dynamically allocated array?
3462
Data written into a file using fwrite() can be read back using fscanf()
3463
Which standard library function will you use to find the last occurance of a character in a string in C?
3464
Even if integer/float arguments are supplied at command prompt they are treated as strings.
3465
A pointer union CANNOT be created
3466
A structure can contain similar or dissimilar elements
3467
malloc() allocates memory from the heap and not from the stack.
3468
In a file contains the line "I am a boy\r\n" then on reading this line into the array str using fgets(). What will str contain?
3469
How will you free the allocated memory ?
3470
A preprocessor directive is a message from programmer to the preprocessor.
3471
In the expression a=b=5 the order of Assignment is NOT decided by Associativity of operators
3472
va_list is an array that holds information needed by va_arg and va_end
3473
Which header file should you include, if you are going to develop a function, which can accept variable number of arguments?
3474
The first argument to be supplied at command-line must always be count of total arguments
3475
Bit fields CANNOT be used in union.
3476
The library function used to find the last occurrence of a character in a string is
3477
The keyword used to transfer control from a function back to the calling function is
3478
We should not read after a write to a file without an intervening call to fflush(), fseek() or rewind()
3479
canf() or atoi() function can be used to convert a string like "436" in to integer.
3480
he macro va_arg is used to extract an argument from the fixed micro argument list and advance the pointer to the next argument.
3481
Associativity of an operator is either Left to Right or Right to Left.
3482
The maximum combined length of the command-line arguments including the spaces between adjacent arguments is
3483
You want to set such that when you type Baishakh and drag the fill handle, Excel should produceJestha, Aashadh and so on. What will you set to effect that?
3484
Each excel file is a workbook that contains different sheets. Which of the following cannot be a sheet in workbook?
3485
who is not a Function in MS Excel ?
3486
_____________functionin Excel tells how many numeric entries are there.
3487
We Can Cancel Marquee By Pressing ?
3488
Merge Cells Option Can Be Applied From ?
3489
Hyperlinks Can Be In
3490
To Minimize Workbook In Ms Excel:
3491
Which Of These Keys Are Used In Ms Excel To Copy Value From Above Cell?
3492
3-D Reference In A Formula ?
3493
VLOOKUP Function Used To ?
3494
Which Types Of Charts Can Excel Produce ?
3495
Which Function Calculates Your Monthly Mortage Payment ?
3496
Which Of These Keys Are Used In Ms Excel To Insert Current Time In Workbook?
3497
How Can We Set Page Border In Excel ?
3498
Which Of The Following Is Not A Valid Zoom Percentage In Excel ?
3499
Which Key Is Used To "Goto" Tab In Ms Excel?
3500
To Create An Interactive Pivot Table For The Web, You Use A Microsoft Office Web Component Called ?
3501
You Can Convert Existing Excel Worksheet Data And Charts To HTML Document By Using The ?
3502
Which Key Is Used For Help In Ms Excel?
3503
Which Of The Following Keyboard Shortcut Can Be Used For Creating A Chart From The Selected Cells ?
3504
On An Excel Sheet The Active Cell In Indicated By ?
3505
Excel uniquely identifies cells within a worksheet with a cell name
3506
The auto calculate feature
3507
You can use drag-and-drop to embed excel worksheet data in a word document
3508
Data can be arranged in a worksheet in a easy to understand manner using
3509
Concatenation of text can be done using
3510
A numeric value can be treated as a label value if it precedes with
3511
Tab scrolling button
3512
Getting data from a cell located in a different sheet is called ......
3513
A worksheet range is a
3514
The Chart wizard term data categories refers to;
3515
The chart wizard term data series refers to
3516
Which of the following is not an example of a value?
3517
A worksheet can have a maximum of .... Number of rows
3518
How many characters can be typed in a single cell in Excel?
3519
A typical worksheet has ..... Number of columns
3520
Which of the following formulas will Excel Not be able to calculate?
3521
Which of the following formulas is not entered correctly? a. b. c. d.
3522
Which symbol must all formula begin with?
3523
What symbol is used before a number to make it a label?
3524
Which of the following is an absolute cell reference?
3525
Which menu option can be sued to split windows into two
3526
The autofill feature
3527
When you copy a formula
3528
Which of the following is the latest version of Excel
3529
To copy cell contents using drag and drop press the
3530
Which of the following is not a worksheet design criterion?
3531
Comments can be added to cells using
3532
To delete an embedded objects, first
3533
Files created with Lotus 1-2-3 have an extension
3534
Documentation should include
3535
Right clicking something in Excel:
3536
How can you delete a record?
3537
You can use the drag and drop method to
3538
Which elements of worksheet can be protected from accidental modification
3539
You can select a single range of cells by
3540
You can edit a cell by
3541
To save a workbook, you:
3542
When you want to insert a blank imbedded excel object in a word document you can
3543
To view a cell comment
3544
If you begin typing an entry into a cell and then realize that you don't want your entry placed into a cell, you:
3545
Which of the following methods can not be used to edit the contents of a cell?
3546
Without using the mouse or the arrow keys, what is the fastest way of getting to cell A1 in a spreadsheet?
3547
You want to track the progress of the stock market on a daily basis. Which type of chart should you use?
3548
Which of the following options is not located in the Page Setup dialog box?
3549
Excel worksheet cells work very similarly to what common element of the windows graphical user interface
3550
The numbers in our worksheet look like this: You want them to look like this: $1,000.How can you accomplish this?
3551
The Paste Special command lets you copy and paste:
3552
Which of the following is a correct order of precedence in formula calculation?
3553
All worksheet formula
3554
You can enter which types of data into worksheet cells?
3555
Excel probably considers the cell entry January 1, 2000 to be a
3556
Each excel file is called a workbook because
3557
Which of the following is not information you can specify using the solver?
3558
When you insert an excel file into a word document. The data are
3559
Which of following is Not one of Excel's what-if function?
3560
A circular reference is
3561
You can convert existing excel worksheet data an charts to an HTML document by using
3562
You can use the formula palette to
3563
You can use the format painter multiple times before you turn it off by
3564
Excel files have a default extension of in Excel-2003
3565
An excel workbook is a collection of
3566
Which of the following is a popular DOS based spreadsheet package?
3567
You cannot link excel worksheet data to a word document
3568
You can copy data or formulas
3569
Rounding errors can occur
3570
Which of the following is the oldest spreadsheet package?
3571
Status indicators are located on the
3572
To create a formula, you can use:
3573
To edit in an embedded excel worksheet object in a word document
3574
To hold row and column titles in place so that they do not scroll when you scroll a worksheet click the
3575
Which area in an excel window allows entering values and formulas
3576
When you link data maintained in an excel workbook to a word document
3577
In a worksheet you can select
3578
To copy formatting from one area in a worksheet and apply it to another area you would use:
3579
When the formula bar is active, you can see
3580
Which button do you click to add up a series of numbers?
3581
To activate the previous cell in a pre-selected range, press
3582
Hyperlinks can be
3583
Multiple calculations can be made in a single formula using
3584
You can use the horizontal and vertical scroll bars to
3585
Which is used to perform what if analysis?
3586
Comments put in cells are called
3587
The name box
3588
When a label is too long to fit within a worksheet cell, you typically must
3589
When integrating word and excel, word is usually the
3590
How can you find specific information in a list?
3591
How do you delete a column?
3592
To center worksheet titles across a range of cells, you must
3593
To create a formula, you first:
3594
How can you print three copies of a workbook?
3595
How do you select an entire column?
3596
Which of the following is not a basic step in creating a worksheet?
3597
How do you insert a row?
3598
Text formulas:
3599
You can activate a cell by
3600
Which of the following is not a way to complete a cell entry?
3601
Which of the following will not cut information?
3602
Which of the following methods cannot be used to enter data in a cell
3603
The Cancel and Enter buttons appear in the:
3604
B7:B9 indicates:
3605
Which function is used to calculate depreciation, rates of return, future values and loan payment amounts?
3606
The active cell
3607
A __________ is a grid with labeled columns and rows.
3608
In help menu of Excel, which of the following tabs are found?
3609
In Excel, the Fill Color button on the Formatting toolbar is used for what?
3610
In Excel, a Data Series is defined as what?
3611
What is represented by the small, black square in the lower-right corner of an active cell or range?
3612
What are the tabs that appear at the bottom of each workbook called?
3613
What happens when dollar signs ($) are entered in a cell address? (e$B$2:$B$10)
3614
The first cell in EXCEL worksheet is labeled as
3615
We can save and protect the workbook by
3616
To record a sequence of keystrokes and mouse actions to play back later we use:
3617
Which key do you press to check spelling?
3618
The spelling dialog box can be involved by choosing spelling from ________ menu.
3619
What do you call the chart that shows the proportions of how one or more data elements relate to another data element?
3620
Which setting you must modify to print a worksheet using letterhead?
3621
Which would you choose to create a bar diagram?
3622
How many worksheets can a workbook have?
3623
Which of the following is not a term of MS-Excel?
3624
Which language is used to create macros in Excel?
3625
What is the correct way to refer the cell A10 on sheet3 from sheet1?
3626
Excel displays the current cell address in the ........
3627
In the formula, which symbol specifies the fixed columns or rows?
3628
What is the short cut key to highlight the entire column?
3629
What does COUNTA () function do?
3630
How do you wrap the text in a cell?
3631
How do you display current date only in MS Excel?
3632
How do you display current date and time in MS Excel?
3633
What will be the output if you format the cell containing 5,436.8 as '#,##0.00' ?
3634
Which Chart can be created in Excel?
3635
How do you rearrange the data in ascending or descending order?
3636
Microsoft Excel is a powerful ...........
3637
Which is not the function of "Edit, Clear" command?
3638
Which function is not available in the Consolidate dialog box?
3639
To return the remainder after a number is divided by a divisor in EXCEL we use the function?
3640
To select an entire column in MS-EXCEL, press?
3641
In EXCEL, you can sum a large range of data by simply selecting a tool button called .....?
3642
An Excel Workbook is a collection of .......
3643
Multiple calculations can be made in a single formula using .......
3644
Which area in an Excel window allows entering values and formulas?
3645
Which menu option can be used to split windows into two?
3646
Comments can be added to cells using ......
3647
What is the short cut key to replace a data with another in sheet?
3648
You can move a sheet from one workbook into new book by
3649
Which of the following is not true about Find and Replace in Excel
3650
While Finding and Replacing some data in Excel, which of the following statement is valid?
3651
Which of the following action removes a sheet from workbook?
3652
By default Excel provides 3 worksheets. You need only two of them, how will you delete the third one?
3653
If you need to remove only the formatting done in a range (numbers and formula typed there should not be removed), you must
3654
To remove the content of selected cells you must issue ______ command
3655
Edit >> Delete command
3656
Paste Special allows some operation while you paste to new cell. Which of the following operation is valid?
3657
Which of the following you can paste selectively using Paste Special command?
3658
Which of the following series type is not valid for Fill Series dialog box?
3659
The command Edit >> Fill Across Worksheet is active only when
3660
The short cut key Ctrl + R is used in Excel to
3661
Ctrl + D shortcut key in Excel will
3662
When a row of data is to be converted into columns
3663
MS Excel provides the default value for step in Fill Series dialog box
3664
Long text can be broken down into many lines within a cell. You can do this through
3665
You can auto fit the width of column by
3666
Which of the cell pointer indicate that you can move the content to other cell?
3667
Which of the cell pointer indicates that you can fill series?
3668
Which of the cell pointer indicates you that you can make selection?
3669
Which command will you choose to convert a column of data into row?
3670
Which of the following option is not available in Paste Special dialog box?
3671
What happens when you press Ctrl + X after selecting some cells in Excel?
3672
Which of the following Excel screen components can NOT be turned on or off?
3673
How can you show or hide the gridlines in Excel Worksheet?
3674
Where can you change automatic or manual calculation mode in Excel?
3675
You want to set such that when you type Baishakh and drag the fill handle, Excel should produce Jestha, Aashadh and so on. What will you set to effect that?
3676
How can you update the values of formula cells if Auto Calculate mode of Excel is disabled?
3677
You can merge the main document with data source in Excel. In mail merge operation, Word is usually
3678
Which of the following is not the correct method of editing the cell content?
3679
Each excel file is a workbook that contains different sheets. Which of the following can not be a sheet in workbook?
3680
The Name box on to the left of formula bar
3681
Tab scroll buttons are place on Excel screen
3682
Which tool you will use to join some cells and place the content at the middle of joined cell?
3683
When a range is selected, how can you activate the previous cell?
3684
You can use the formula pallette to
3685
Which of the following is invalid statement?
3686
Which of the following is not true regarding Conditional Formatting?
3687
You can check the conditions against __________ when applying conditional formatting
3688
When all the numbers between 0 and 100 in a range should be displayed in Red Color, apply
3689
You can set Page Border in Excel from
3690
Where can you set the shading color for a range of cells in Excel?
3691
How can you remove borders applied in cells?
3692
Which of the following format you can decide to apply or not in AutoFormat dialog box?
3693
Which of the cell pointer indicate that you can move the content to other cell ?
3694
Which of the cell pointer indicates you that you can make selection ?
3695
It is acceptable to let long text flow into adjacent cells on a worksheet when
3696
Which command will you choose to convert a column of data into row ?
3697
A _____ object represents a connection to a remote database used as a data source for the associated commands
3698
____ of the query designer interface displays the input sources for querying
3699
The print command in Visual basic programming is used to ____
3700
The ________ method of the connection object is used to run the queries against the database
3701
Visual basic Programming is an _______ driven programming concept
3702
The Data control implements data access by using the _________
3703
The _______ method creates a connection between the application and the ODBC database and assigns it to a database type object
3704
_______ queries are SQL statements that perform specific actions on the database
3705
A __________ is a collection of object classes that model the structure of a relational database system
3706
_______ is a process involving a minimum of two independent entries one being the client and the other is the server
3707
……… type of recordset creates a dynamic set of records that represents a database table or the results of a query containing fields from one or more tables
3708
Through ………. controls we can access information in the databases
3709
……….. allows you to define exactly what the startmenu group contains and what icons are used
3710
….. is a compressed file that is well suited to distribution on either disks or the internet
3711
……….. automates much of work involved in creating and deploying the files needed for our program to run on another computer
3712
In event-driven programming an event is generated by
3713
which statement about objects is true?
3714
______ kinds of rows and columns are created in the Ms Flex Grid control
3715
_____ property is set to change the height of a cell
3716
A cell is an intersection of _______ and _______
3717
_______ method with _______ argument is used to cascade forms
3718
________ event occurs whenever the size of the form is changed
3719
_____ property of an image control sizes the picture loaded to it
3720
The point method returns the ________ of a particular pixel
3721
______ function specifies the file name and assigns the picture to the picture property
3722
The common Dialog is used as a _________ that lets the user select and saves files
3723
________ and ________ functions are used to add predefined dialog boxes
3724
________ argument gives the status of the SHIFT, CTRL and ALT keys
3725
…….. control returns Boolean value
3726
…….. property is used to return the index of a selected item in a listbox
3727
……. is the important event of a timer control
3728
……. is an important property of a file list box
3729
By using …….. keyword we can create a collection
3730
…….. is a group of objects gathered together as a single object
3731
....... keyword is used to create an object for the class
3732
……… event occurs when an object of a class is created
3733
________ event occurs when the user presses any mouse button A MouseDo
3734
________ argument is an integer called button
3735
Check mark can be placed on a menu item using __________ property
3736
_______ is displayed as a horizontal line between items on a menu bar
3737
________ statement removes a control from an array
3738
Control arrays are added at run time using __________ statement
3739
________ method removes list entries from a list box at run time
3740
A Combobox combines the feature of ________ and _________
3741
The value property of the scroll bar represents its current value which may be any integer between ________ and ________ value
3742
_______ function returns a Variant (Long) specifying the position of the first occurrence of one string within another
3743
The ________ function returns the length of string
3744
The __________ function returns the intervals between two dates in terms of years, months or days
3745
______ is the function used to compare two strings
3746
The _________ function with symbols representing the date and time is used to print the formatted dates and times
3747
…….. is an event of a class
3748
In a class, …………is used to pass object itself as a function argument
3749
In a class, …………is used to store data in a property and returns the property.
3750
In a class, …………is used to pass value to the property
3751
………… are called runtime entities
3752
………. control provides all standard dialog boxes into our VB form
3753
………… method used to load or import a text file or .rtf file into a rich text box A Load
3754
……. connectivity is independent of any DBMS or operating system
3755
UDA stands for ……
3756
The ________ statement first executes the statements and then tests the condition after each execution
3757
Writing code in _________ modules can create new object
3758
Writing code in _________ modules can create new objects
3759
A ________ procedure is used to create and manipulate custom properties
3760
The ________ box displays the name of the selected object associated with the form A checkbox
3761
Form files are saved with an extension ______
3762
Visual basic project files are saved with an extension _______
3763
A ________ is a window that contains application code and has other objects placed on it to create the user interfac
3764
The ________ method is used to display a form object
3765
……… object in DAO model represents objects like saved forms, modules, reports etc:
3766
…… object contains information about an error occurred during a DAO operation
3767
…… represents a user account with particular access permission in a particular workspace
3768
………… defines and manages the current user account
3769
…. is the top level object in DAO hierarchy
3770
The _______ event occurs when the form is closed by the user
3771
_______ is used to link or embed object, display and manipulate data from other windows based application
3772
A complete repaint of a form or control can be enforced by ________ method
3773
_ function is used to delete all the data items be completely removed
3774
In list box concept ____ function is used to insert item to the list
3775
The ____ statement is used to change the control to specified location without any condition
3776
In for loop concept in visual basic ____ keyword is used to come out the loop immediately
3777
The ____ is a keyword is used to combine two conditions for checking at same time
3778
The ___ type of operator is used for checking comparing values
3779
__ is the keyword represents the end of the for loop in Visual basic
3780
In for loop operation ____ keyword is used to increment the value of variable for execution
3781
In the following logic, the condition is check at the end of the loop
3782
The ____ concept is used to check for multiple conditions in VB
3783
Which of the following checks and repairs errors and inconsistencies in data storage?
3784
__________ is the _id is of the data type chosen for the original document in files collections.
3785
Which of the collection in GridFS stores the binary chunks?
3786
The default chunk size is changed from 256k to 255k in which version?
3787
How many does collections GridFS use to store files?
3788
_______________ is a specification for storing and retrieving files that exceed the BSON-document size limit of 16MB.
3789
Capped collections provide __________ management of inserted documents in MongoDB.
3790
The __________ feature of collections expires documents after a period of time.
3791
To get the current number of namespaces in the mongo shell, use ________
3792
MongoDB using the mmapv1 storage engine has limits on the number of __________
3793
To interact with embedded documents, use ___________ notation to “reach into” embedded documents.
3794
Normalized data models describe relationships using ___________ between documents.
3795
Embedded data model is used when you have _________ relationships between entities.
3796
__________ data models allow applications to store related pieces of information in the same database record.
3797
Each index in MongoDB requires at least _________ of data space.
3798
_________ strategy is used to explicitly avoid document growth.
3799
With MongoDB 3.0.0, the default use of the Power of _________ Allocations minimizes the occurrences of re-allocations as well as allows for the effective reuse of the freed record space.
3800
For the __________ storage engine, if the document size exceeds the allocated space for that document, MongoDB relocates the document on disk.
3801
A ____________ data model with embedded data combines all related data for a represented entity in a single document.
3802
___________ documents capture relationships between data by storing related data in a single document structure.
3803
In MongoDB, write operations are atomic at the __________ level.
3804
A query _______ consists of a combination of query, sort, and projection specifications.
3805
A ________ query plan has returned a threshold number of matching results.
3806
_______ is used to view statistics about the query plan for a given query.
3807
The update() method uses the _______ command, which uses the default write concern.
3808
____ can modify specific fields of an existing document or documents or replace an existing document entirely, depending on the update parameter.
3809
The ________ message is used to update a document in a collection.
3810
_______ is used to determine whether a query is a covered query.
3811
Indexes are typically available in ______ or located sequentially on disk.
3812
With a receipt acknowledged write concern, the _________confirms that it received the write operation and applied the change to the in-memory view of data.
3813
With an __________ write concern, MongoDB does not acknowledge the receipt of write operations.
3814
MongoDB does not ___________ modifications made before the wtimeout interval expired.
3815
Clients can set a __________ value as part of a replica acknowledged write concern
3816
_____________ is used to control mongod commits in the journal
3817
The mongo shell and the MongoDB drivers use __________ as the default write concern.
3818
When inserts, updates and deletes have a _________ write concern, write operations return quickly.
3819
_________ concern describes the guarantee that MongoDB provides when reporting on the success of a write operation.
3820
Which of the following is not true for Ant?
3821
Which command can be used to check maven version?
3822
Can we run Junits as a part of Jenkins job?
3823
Which of the below is a source code management tool?
3824
Which environment variable is used to specify the path to maven?
3825
Which file is used to specify the packaging cycle?
3826
Which of the following is not a maven goal?
3827
Which of below is not a dependency management tool?
3828
Which operator in C is used to return the size of a variable?
3829
The first character of an identifier in C langauge can contain?
3830
Which of the following is not a valid keyword in C language?
3831
Which of the following statement is true according to C syntax rule?
3832
Which of the following function reads a character (only one at a time) from the terminal and return it as an integer?
3833
_________ is a collection of built-in functions that can be used directly in C programs?
3834
What will be the output of the following arithmetic expression ? 5+3*2%10-8*6
3835
Which is the correct syntax to declare constant pointer?
3836
In which linked list last node address is null?
3837
What is Dequeue?
3838
The Default Parameter Passing Mechanism is called as
3839
C is ______ Language?
3840
In which tree, for every node the height of its left subtree and right subtree differ almost by one?
3841
The worst case time complexity of AVL tree is better in comparison to binary search tree for
3842
The "C" language is
3843
Number of binary trees formed with 5 nodes are
3844
The _______ memory allocation function modifies the previous allocated space.
3845
The statement printf("%c", 100); will print?
3846
Which of the following data structure is linear type?
3847
To represent hierarchical relationship between elements, which data structure is suitable?
3848
The statement print f ("%d", 10 ? 0 ? 5 : 1 : 12); will print?
3849
Queue is a _____________ list.
3850
Recursive functions are executed in a?
3851
Which one of the following is not a linear data structure?
3852
A binary tree with 27 nodes has _______ null branches.
3853
Which one of the following sentences is true ?
3854
What is function?
3855
What is the work of break keyword?
3856
In switch statement, each case instance value must be _______?
3857
Which operators are known as Ternary Operator?
3858
Which is the right way to declare constant in C?
3859
What is constant?
3860
What is Keywords?
3861
What is C Tokens?
3862
Bitwise operators can operate upon?
3863
perror( ) function used to ?
3864
What is the right way to access value of structure variable book{ price, page }?
3865
An array elements are always stored in _________ memory locations.
3866
What is right way to Initialization array?
3867
What is an array?
3868
Which of the following shows the correct hierarchy of arithmetic operations in C
3869
Which of the following is allowed in a C Arithmetic instruction
3870
A C variable cannot start with
3871
C programs are converted into machine language with the help of
3872
For 16-bit compiler allowable range for integer constants is ______ ?
3873
C Language developed at _____?
3874
Who is father of C Language?
3875
C++ name was suggested by
3876
C++ was originally developed by
3877
When a language has the capability to produce new data type, it is called
3878
What is a reference?
3879
The standard C++ comment
3880
State the object oriented languages
3881
The operator >> is called
3882
The operator << is called
3883
The C++ symbol <<
3884
What is the range of double data type for a 16-bit compiler?
3885
Which of the following statements about unions is incorrect?
3886
Which of the following statements about the null pointer is correct?
3887
Which function would you use to convert 1.98 to 1?
3888
What is the correct way of treating 9.81 as a long double?
3889
Which of the following statements about functions is false?
3890
Which of the following has a global scope in the program?
3891
Which of the following is the correct operator to compare two variables?
3892
Which of the following is not a correct variable type?
3893
Which of the following is a correct comment?
3894
What punctuation ends most lines of C code?
3895
What punctuation is used to signal the beginning and end of code blocks?
3896
What is the only function all C programs must contain?
3897
What is the correct value to return to the operating system upon the successful completion of a program?
3898
The expression 4 + 6 / 3 * 2 - 2 + 7 % 3 evaluates to
3899
The expression 5 -2 - 3 * 5 - 2 will evaluate to 18, if
3900
Which of the following comments about the ++ operator are correct ?
3901
Pick the operators whose meaning is context dependent
3902
Pick the operators that assosiate from left to right
3903
The operators . , || , < , = , if arranged in the ascending order of precedence reads
3904
Pick the operators that assosiate from the right
3905
Pick the operators that assosciate from the left
3906
In an operation involving || operator, evaluation
3907
Which of the following operators takes only integer operands ?
3908
Coercion
3909
The expression 5 - 2 - 3 * 5 - 2 will evaluate to 18, if - is left associative and
3910
The expression a << 6 shifts all bits of a six places to the left. If a Ox6db7, then what is the value of a << 6
3911
In C programming language, which of the following operators has the highest precedence?
3912
In C programming language, which of the following type of operators have the highest precedence
3913
In a 'C'expression involving || operator, evaluation
3914
Integer division in a 'C' program results in:
3915
A string that is a formal parameter can be declared
3916
Which of the following comments regarding the reading of a string using scanf( with %s option and gets, is true ?)
3917
Length of the string " correct " is
3918
If space occupied by two strings s1 and s2 in 'C' are respectively m and n, then space occupied by string obtained by concatenating s₁and s₂is always
3919
If space occupied by a null terminated string "S1" and "S2"in "C" are respectively "m" and "n",the space occupied by the string obtained by concentrating "S₁"and "S₂"is always
3920
In what kind of structure for strings, one can easily insert, delete, concatenate and rearrange sustrings?
3921
cb is a
3922
The number of possible values of m, such that m & 0x3f equals 0x23 is
3923
lint is
3924
Which of the following comments are correct when macro definition includes arguments?
3925
The scope of a macro definition
3926
The ascending order of precedence of the bit-wise operators &, ^, | is
3927
Choose the correct statements.
3928
Preprocessing is typically done
3929
If the word size is 16 bit, then ~0xc5 will be
3930
If the bit pattern corresponding to a signed integer is shifted to the right then
3931
The most significant hit will be lost in which of the following operations?
3932
Which of the following comments about the preprocessor directive # are correct?
3933
In a certain machine, the sum of an integer and its 1's complement is 226 - 1. Then sizeof intl. in bits, will be
3934
Assume an unsigned integer occupies 1 byte. Let myVar be an unsigned integer. Then myVar « 1 multiplies myVar by 2 if it is not greater than
3935
a << 1 is equivalent to
3936
How many bits are absolutely necessary to store an ASCII character ?
3937
If 7 bits are used to store a character, the percentage reduction of needed storage will be
3938
How many bits are absolutely necessary to store an ASCII character?
3939
The process of transforming one bit pattern into another by bit-wise operations is called
3940
The use of macro in the place of functions
3941
Choose the correct statement.
3942
A preprocessor command
3943
C preprocessor
3944
Bit-fields will he accommodated in a word
3945
The declaration int x : 4; means
3946
Choose the correct comments In a bit-field
3947
Bit field
3948
puts(argv[0]);
3949
Choose the best answer. Storage class defines
3950
Which of the following features of C is meant to provide reliable access to special memory locations?
3951
Choose the correct statement
3952
Which of the following are not the keywords in C?
3953
In standard C, trigraphs in the source program are translated
3954
Which of the following comments about EOF are true?
3955
Which of the following comments are true ?
3956
C is a
3957
A text is made up of the characters a, b, c, d, e each occurring with the probability 0.12, 0.4, 0.15,0.08 and .25 respectively. The optimal coding tech-nique will have the average length of
3958
The number of binary relations on a set with n elements is
3959
Which of the following types of programs would require the program data to be sorted in order for the programs to work correctly ?
3960
Let f : {a, b}* (a, b}* be given by f (n) = ax for every value of n ε {a, b} then f is
3961
The number of binary strings of n zeroes and K ones such that no two ones are adjacent, is
3962
The order of an algorithm that finds whether a given boolean function of 'n' variables, produces a 1 is
3963
In the statement template � class T�,
3964
An object oriented language is used because
3965
The for statement can precede a loop to be executed 50 times or till a boolean variable "found" become false is given by
3966
Find the output of following code segment for(putchar('c');putchar('a');putchar('r')) putchar('t');
3967
Find the output of the following : for (i=1,j=10;i
3968
Printf("%d"printf("tim"));
3969
In a 'C' program, constant is defined
3970
If following variables are set to the values as shown below, then what is the value of the expression following it? answer=2; marks=10; !((answer2))
3971
What is the output of the following 'C' program? main() { printf("%f",sqrt(36.0)); }
3972
The statement printf ( "%d" , sizeof (" "')); prints
3973
The statement printf ("%d", ( a++) ) ; prints
3974
The statement printf ("%d", ++5) ; prints
3975
The statement printf ("%d", 10 ? 0 ? 5 : 11 : 12 ) ;
3976
Replacing > by < in the previous question results in
3977
printf( "%c", 100);
3978
x - = y + 1; means
3979
If n has the value 3, then the output of the statement printf( " %d %d " , n++, ++n);
3980
Which of the following statements is incorrect ?
3981
Which of the following tools can be used to automate the process of wireless penetration testing?
3982
Wireless adapter, used to connect to Wifi, should be in which mode in order to monitor all traffic received on a wireless channel?
3983
OS Command Injection can be prevented by following which of the following mitigation?
3984
Which of the following character can be used to test if web-app is vulnerable to SQL injection?
3985
What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?
3986
WHich of the following softwares can be used for vulnerability scanning and network discovery?
3987
Consider the following ASM: mov eax, cr3 mov cr3, eax Which of the following is the result of the above execution?
3988
Consider the following code: int x_value = 99; int* x = &x_value; Which of the following lines of code would properly dereference "x" to get the value of "x_value?"
3989
Which of the following stack pivot gadgets would not preserve a pointer to the original stack frame in eax?
3990
Which of the following would properly result in C++ function overloading? (Choose Two)
3991
In a 64-bit Windows application, the RBP register is most commonly used for which of the following purpose?
3992
Control Flow Guard (CFG works by mandating that an endbr32/endbr64 be the first instruction executed during an indirect function call.
3993
Windows 10 is a ____ ring processor access mode operating system?
3994
Which of the following functions is most commonly used to disable Data Execution Prevention (DEP) inside of a Windows process?
3995
Which of the following groups must a penetration testing review?
3996
What is a risk involved in doing penetration testing?
3997
Which of the following Operating Systems are most effective in penetration testing in networks?
3998
What is social engineering?
3999
Penetration testing should focus in what scenarios?
4000
Which of the following are ways to conduct penetration testing?
4001
Is penetration testing used for helping or for damaging a system?
4002
Pen testers will use _____ to protect the possibility of data leakage and add another layer of security.
4003
Pick out the merits of manual testing.
4004
What are the disadvantages of manual testing?
4005
Identify the benefits of using automated tools.
4006
dentify the disadvantages of using automated tools.
4007
Manual testing requires:
4008
______ testing aims to exploit identified vulnerabilities to check what information is exposed to the outside world.
4009
__________ saves time and resources, but is not accurate or professional.
4010
but is not accurate or professional.
4011
Which attack can be much more devastating?
4012
What remains the same in both internal and external testing?
4013
Which step is essential for the organization to be compliant with certain ISOs or other certification bodies?
4014
A vulnerability scan tries to verify the vulnerabilities found with little or no user interaction.
4015
Nexpose and GFI are tools that try to match conditions found on the target system with known vulnerabilities, and can find new vulnerabilities.
4016
Penetration testing
4017
Which stage does not verify or try to exploit the vulnerability, just lists and ranks the identified weaknesses.
4018
Find the wrong statement about penetration testing.
4019
When a function is recursively called, all automatic variables
4020
Which of the following is not a primitive recursive but partially recursive?
4021
Running out of memory may occur due to
4022
Use of macro instead of function is recommended
4023
Which of the following is/are syntactically correct?
4024
It is not advisable to use macros instead of functions because
4025
Feature for accessing a variable through its address is desireable because
4026
Any C program
4027
void can be used
4028
Forward declaration is absolutely necessary
4029
max is a function that returns the larger of the two integers, given as arguments. Which of the following statements finds the largest of three given numbers?
4030
Pick the correct statements
4031
Use of functions
4032
The default parameter passing mechanism is
4033
Let a, b be two non-negative integers. Which of the following calls, finds the positive difference of a and b ?
4034
A function can make
4035
If max is a function that returns the larger of the two integers, given as arguments, then which of the following statements finds the largest of three given numbers
4036
The function is lower(char) checks whether a character is in lower case or not, therefore it should return
4037
The function fprintf is used in a program
4038
A function that is prototyped as double calculate (int, num); may
4039
A function that uses variable types is called
4040
The function that actually created from a call to a template function is called
4041
It is necessary to declare the type of a function in the calling program if the function
4042
The contents of a file will be lost if it is opened in
4043
The fseek function
4044
ftell
4045
If a file is opened in w+ mode then
4046
If a file is opened in r+ mode then
4047
The process of accessing data stored in a tape is similar to manipulating data on a
4048
The statement fseek(fp,0L,0)i - if syntactically correct,means
4049
Expression ((fpt=fopen("Samples","w"))==NULL)would be true if
4050
To instantiate an object with the statement ifstream items("C:inven.txt");,the file on the disk is identified by the name
4051
The function sprintf()works like printf(),but operatres on
4052
The function fopen("filename","r")returns
4053
Using goto inside for loop is equivalent to using
4054
Code in the previous question can never print
4055
Break statement can be simulated by using
4056
The switch feature
4057
If switch feature is used, then
4058
Choose the correct answers
4059
Which of the following comments about for loop are correct ?
4060
Which of the following comments about for loop are correct?
4061
In a for loop, if the condition is missing, then infinite looping can be avoided by a
4062
In a for loop, if the condition is missing, then,
4063
Choose the statements that are syntactically correct
4064
Which is true of conditional compilation ?
4065
Choose the correct statement
4066
A "switch" statement is used to
4067
Which of the following is a tabular listing of contents of certain registers and memory locations at different times during the execution of a program ?
4068
Which of the following statement about for loop is true ?
4069
For loop in a C program, if the condition is missing
4070
The library function sqrt operates on a double precision argument. If, i is an integer variable, then which of the following calls would correctly compute sqrt(i)?
4071
When a variable of data type double is converted into float, then
4072
By default, any real number in 'C' is treated as
4073
What is the correct way to round offx, a float, to an int value?
4074
The rule for implicit type conversion is
4075
In a C program constant is defined
4076
If a variable can take only integral values from 0 to n. where n is a constant integer, then the variable can be represented as a bit-field whose width is the integral part of (the log in the answers arc to the base 2)
4077
As soon as a pointer variable is freed, its value
4078
Which of the following is true of external variables?
4079
Which of the following comments about wide characters is/are true ?
4080
Which of the following are true regardless of the implementation ?
4081
Literal means
4082
printf ( "%d" , printf ( "tim" ) ):
4083
If integer needs two bytes of storage, then maximum value of a signed integer is
4084
If integer needs two bytes of storage, then maximum value of an unsigned integer is
4085
The minimum number of temporary variables needed to swap the contents of two variables is
4086
If integer needs two bytes of storage, then maximum value of a signed interger is
4087
Which of the following comments regarding the reading of a string, using scanf(with optional) and get is true?
4088
Choose the correct answer
4089
The value of an automatic variable that is declared but not initialized will be
4090
If a is an unsigned integer variable whose value is hx6db7, what is the value of -a?
4091
In case of ordinary int variables
4092
A static variable
4093
The rule for implicit type conversion in 'C' is
4094
The variables which can be accessed by all modules in a program, are called
4095
C programming language by itself provides
4096
C programming language provides operations which deal directly with objects such as
4097
In C programming language, if the first and the second operands of operator + are of types int and float, respectively, the result will be of type
4098
The value of ab if ab & 0 x 3f equals 0 x 27 is
4099
int i = 5; is a statement in a C program.
4100
Printing a character as an integer
4101
Which of the following 'C' type is not a primitive data structure?
4102
A declaration "short int" is used for variables
4103
The declaration "unsigned u" indicates u is a/an
4104
An external variable
4105
A file is preferable to an array of structures because
4106
if x is an one dimensional array, then
4107
While sorting a set of names, representing the names as an array of pointers is preferable to representing the names as a two dimensional array of characters because
4108
If arr is a two dimensional array of 10 rows and 12 columns, then arr (5) logically points to the
4109
A set of names can be represented as a
4110
Choose the correct statements
4111
Choose the statement that best defines an array
4112
C does no automatic array bound checking. This is
4113
If a two dimensional array is used as a formal parameter, then
4114
Under which of the following conditions, the size of an one-dimensional array need not be specified?
4115
The maximum number of dimension an array can have in C is
4116
The parameter passing mechanism for an array is
4117
While passing an array as an actual argument, the function call must have the array name
4118
If storage class is missing in the array definition, by default it will be taken to be
4119
Choose the correct statements
4120
The const feature can be applied to
4121
The minmum number of inter changes needed to convert the array 89,19,40,17,12,10,2,5,7,11,6,9,70 into a heap with maximum element at the root is
4122
In which of the following cases, linked list implementation of sparse matrices consumes the same memory space as the conventional way of storing the entire array?
4123
The information about an array used in a program will be sorted in
4124
Minimun number of comparison required to compute the largest and second largest element in array is
4125
Which of the following is an illegal array definition?
4126
Minimum number of interchange needed to convert the array 89,19,40,14,17,12,10,2,5,7,11,6,9,70, into a heap with the maximum element at the root is
4127
A one dimensional array A has indices 1....75.Each element is a string and takes up three memory words. The array is stored starting at location 1120 decimal. The starting address of A[49] is
4128
Size of the array need not be specified, when
4129
If S is an array of 80 characters, then the value assigned to S through the statement scanf("%s",S) with input 12345 would be
4130
If x is an array of interger, then the value of &x[i] is same as
4131
What is the maximun number of dimensions an array in C may have?
4132
For 'C' programming language
4133
O(N)(linear time) is better than O(1) constant time.
4134
Which of the following option is correct?
4135
A program attempts to generate as many permutations as possible of the string, 'abcd' by pushing the characters a, b, c, d in the same order onto a stack, but it may pop off the top character at any time. Which one of the following strings CANNOT be generated using this program?
4136
Let x be an integer which can take a value of 0 or 1. The statement if(x = =0) x = 1; else x = 0; is equivalent to which one of the following?
4137
Choose the correct statement w.r.t. above variables.
4138
Pick the best statement for the above C program snippet.
4139
Choose the correct statement w.r.t. above C program.
4140
What’s the size returned for each of sizeof() operator?
4141
Assuming size of pointer is 4 bytes and size of int is also 4 bytes, pick the most correct answer from the given options.
4142
The event that is processed after all data has been read but before the list is displayed is:
4143
A DO loop increments the system field ____.
4144
If calculation of update gate in GRU unit is close to 1, which of the following would occur?
4145
If calculation of reset gate in GRU unit is close to 0, which of the following would occur?
4146
It is generally recommended to replace pooling layers in generator part of convolutional generative adversarial nets with ________ ?
4147
When deriving a memory cell in memory networks, we choose to read values as vector values instead of scalars. Which type of addressing would this entail?
4148
Which architecture of neural network would be better suited to solve the problem?
4149
Dropout technique is not an advantageous technique for which of the following layers?
4150
Which of the following is a bottleneck for deep learning algorithm?
4151
A recurrent neural network can be unfolded into a full-connected neural network with infinite length.
4152
As the length of sentence increases, it becomes harder for a neural translation machine to perform as sentence meaning is represented by a fixed dimensional vector. To solve this, which of the following could we do?
4153
Xavier’s init is used to help the input signals reach deep into the network. Which of the following statements are true?
4154
Mini-Batch sizes when defining a neural network are preferred to be multiple of 2’s such as 256 or 512. What is the reason behind it?
4155
Backpropagation works by first calculating the gradient of ___ and then propagating it backwards.
4156
Image inpainting is one of those problems which requires human expertise for solving it. It is particularly useful to repair damaged photos or videos. Below is an example of input and output of an image inpainting example.
4157
What is the best place in the graph for early stopping?
4158
Which of the following would be the best for a non-continuous objective during optimization in deep neural net?
4159
Which of the following is not a direct prediction technique for NLP tasks?
4160
What is the technical difference between vanilla backpropagation algorithm and backpropagation through time (BPTT) algorithm?
4161
A ReLU unit in neural network never gets saturated.
4162
What is generally the sequence followed when building a neural network architecture for semantic segmentation for image?
4163
Deep learning can be applied to which of the following NLP tasks?
4164
Which of the following categories would be suitable for this type of problem?
4165
Increase in size of a convolutional kernel would necessarily increase the performance of a convolutional neural network.
4166
Which of the following is a representation learning algorithm?
4167
The difference between deep learning and machine learning algorithms is that there is no need of feature engineering in machine learning algorithms, whereas, it is recommended to do feature engineering first and then apply deep learning.
4168
In the correct order, sort the following lines of code to populate a ListBox from a DataControl RecordSet.
4169
How can we get a fresh RecordSet for a DataControl?
4170
A DataControl RecordSet is still valid after…
4171
Can we delete records on multiple database tables from the same DataControl instance?
4172
Can we affect several database tables using the Insert method?
4173
In order to use multiple tables…
4174
The Update method from the DataControl…
4175
The Insert method from the DataControl.
4176
The Delete method from a DataControl…
4177
The NewRecord method…
4178
Is it possible to set a Control DataSource and DataField from code?
4179
When we save the information for the Control on the associated DataField…
4180
The communication between the DataField for the selected control and the column is…
4181
How to set a data column to a user interface Control?
4182
We can set the data source from…
4183
What is the function of the Commit property?
4184
The DataControl SQLQuery property only admits the use of simple queries.
4185
The DataControl Table property allows choosing several tables from the selected database.
4186
The DataControl Inspector Panel allows selecting any database we want to work with.
4187
For a DataControl to be functional, it has to be always visible and placed inside the limits of the Window where it is used.
4188
We can only set the Database name and table used by the DataControl via the Inspector Panel.
4189
DataControl offers databinding for all the available Framework controls.
4190
DataControl offers SQL Injection attacks protection.
4191
Once we execute the SQL sentence assigned to a DataControl, we get the matching records in a…
4192
DataControl is the recommended control to access and navigate SQLite databases from Xojo.
4193
What project types support the DataControl?
4194
Index creation for a Table…
4195
We can limit the field length for SQLite tables using the Length property.
4196
Xojo automatically saves every change made using the integrated Database Editor, so we can rely on this.
4197
nce we have created a new SQLite database using the integrated Database Editor, the path to the database file will be resolved at execution time; so we can rely on this for our products' deployment.
4198
Xojo just supports adding already created SQLite databases to the project.
4199
SQLite admits creating columns that will be empty during the database use.
4200
Once a table has been created, we can…
4201
The SQLite data Types supported by SQLite are:
4202
A table definition consist fundamentally of…
4203
Does SQLite use strict Types checking for columns definition?
4204
Can we use RegEx (Regular Expressions) in the SQLite queries?
4205
What are the advantages of using the WAL feature on SQLite?
4206
Is it possible to place a SQLite database in a Server? Check all the right answers.
4207
What is the name of the Class (or Classes) in Xojo we can use to work with SQLite databases?
4208
Xojo supports saving an in-memory database to disk.
4209
SQLite supports in-memory databases.
4210
What Xojo Licenses offer support for SQLite?
4211
Xojo supports multiple SQLite databases use.
4212
Xojo always implements the latest available SQLite Library.
4213
Check all the right affirmations.
4214
If today is day type 2 then, today is a __________
4215
What is called into Absence type
4216
Which infotype can be maintained without validity dates
4217
Payday rule 2 stands for:
4218
You have to default time management staus and an employee is incorrectly assigned status "9". So what will that denote?
4219
Holiday class " " is
4220
In Payroll, ADDWT* is used to
4221
Position is
4222
What is the feature to default number ranges?
4223
What is the status to be maintained in a control record to post the payroll results?
4224
What are the day to day activities in Training and Event Management?
4225
How can we select an induvidual infotype? (two correct answers)
4226
How can we select an induvidual infotype? (two correct answers)
4227
What steps make up the payroll process?
4228
How can we default the values of pay scale data?
4229
What are the main areas of Organization and Staffing user Interface?
4230
Where do you maintain relationships between objects?
4231
Qualifications are assigned to _______?
4232
What is cross application time sheet (CATS)
4233
How do we process an infogroup?
4234
What is an info type?
4235
What are the info types you used in OM?
4236
How many structures are there in SAP HCM?
4237
Using which Tcode do you hire an Employee?
4238
How do you set up integration between Personnel Administration and Organizational Management?
4239
How can we generate absence quotas in negative time management for a group of employees?
4240
RFC and IDoc metadata cannot be modified within PI.
4241
You design and configure PI objects in Integration Builder
4242
You can create and maintain alert categories on the Integration Server? | SAP NetWeaver Mcqs
4243
SAP PI is a single component that works flexibly to implement integration scenarios.? | SAP NetWeaver Mcqs
4244
The Universal Work list (UWL) collects tasks and notifications from multiple provider systems and is integrated with Alert Management. The statement is: | SAP NetWeaver Mcqs
4245
You would like to share content between SAP and non-SAP portal systems that are distributed across your landscape, thus providing a single portal access point per user to portal, with one portal as logon portal for all users. Which of the following can you use? | SAP NetWeaver Mcqs
4246
You can implement an SAP NetWeaver Portal in your landscape to achieve various business goals. Which of the following scenarios are supported by SAP Netweaver Portal? | SAP NetWeaver Mcqs
4247
Which of the following statements about Knowledge Management (KM) are true? | SAP NetWeaver Mcqs
4248
With the collaboration capabilities, SAP NetWeaver allows communication and collaboration in the portal. This allows SAP NetWeaver to bring together members of project groups regardless of time and of their geographic location. Which of the following functionalities are supported by ‘Collaboration’? | SAP NetWeaver Mcqs
4249
When you create new content objects in the PCD, there are two main procedures, out of which one is using Copies. How many methods are there to create copies and which are they? | SAP NetWeaver Mcqs
4250
Which are the backend systems from which the Web Dynpro Model Object can be supplied with information? | SAP NetWeaver Mcqs
4251
What SAP component can be used to provide a single integrated user interface for users to SAP products? | SAP NetWeaver Mcqs
4252
What is the central component in the User Productivity Area? | SAP NetWeaver Mcqs
4253
Define installed units? | SAP NetWeaver Mcqs
4254
What ensures a central point of access to information, applications and services in the company? | SAP NetWeaver Mcqs
4255
You can save and reuse the part of message mapping as | SAP NetWeaver Mcqs
4256
System Landscape Directory adheres to ? | SAP NetWeaver Mcqs
4257
Sender Agreement is not required for | SAP NetWeaver Mcqs
4258
To maintain IDoc metadata and port, which transaction codes are used in PI ? | SAP NetWeaver Mcqs
4259
Types of Lookups in SAP PI are | SAP NetWeaver Mcqs
4260
SAP PI is open and flexible as it uses | SAP NetWeaver Mcqs
4261
What is the order of the pipeline steps in SAP PI | SAP NetWeaver Mcqs
4262
New features in Advanced Adapter Engine are
4263
File Content Conversion is used to read
4264
You configure an Adapter in
4265
Which one is import following objects in Enterprise Service Repository?
4266
Proxies for outbound interfaces are called?
4267
Components of Runtime Workbench are
4268
You define Technical system and Business system in
4269
For Business Processes, what kind of mode is used ?
4270
Which Personal Actions have you performed on an employee
4271
Which of the following apply to Personnel Subareas?
4272
The Personnel Control Record has which of the following functions?
4273
The Organizational Assignment Infotype (IT0001) is used for which of the following purposes?
4274
Communication between time recording systems and HR time management takes place via standard interface ?
4275
What is assigned in the payroll status infotype(0003) to personnel numbers with errors ?
4276
Statement A: “Business event groups serve to structure the catalog. They can contain multiple hierarchy levels.” Statement B: “Business event types carry almost all of the information relevant to the business event. They form the basic structure of the catalog.
4277
Pick the “True” statements regarding “Check List for the Global assignment Change
4278
How many number of subtypes are present in Compensation Package Offer Infotype?
4279
Where is an employee’s work schedule stored?
4280
SAP E-recruiting Can be used as
4281
The E-recruiting solution enables you to recruite english speaking employees? ( T/F )
4282
360 feedback appraisals: appraisals that draw on diverse sources(supervisors, peers and self-appraisals). True or False?
4283
You must start one report for the gross payroll and one for the net payroll for each payroll perioD.
4284
True or False? In order to read developer traces you have to go the operating system because SAP does not have a way to do this within the application.
4285
To prevent having to adjust output devices (e.g. print queue definitions) in every system each time they are transported from one system to another, an administrator can:
4286
How can the logon screen be modified to include informational text, such as the company name, address, the system role, etC.?
4287
After a new installation of R/3 Enterprise, the system has a temporary license. How long does this license last?
4288
The following statements are not true about navigational attributes.
4289
The following transactions are relevant to the data sources in an SAP BW source system.
4290
If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action?
4291
What does transaction SPAM do?
4292
True or False? It is possible to create a key figure without assigning currency or unit.
4293
True or False? A reference characteristic will use the SID table and master data table of the referred characteristiC.
4294
True or False? MS-SQL Server can be installed using all the delivered default settings. Everything is controlled within the application, so SAP requires only a database engine to work.
4295
You assign indirect valuation module TARIF to a wage type on table T511 (Wage Type Characteristics) to accomplish which outcome on IT0008 Basic Pay?
4296
Which of the following definitions are part of the counting rule configuration?
4297
In which area of the Organization and Staffing user interface (transaction PPOME) do you update account assignment features?
4298
How does the system respond when you attempt to create a time entry prior to the earliest retro accounting period on the payroll control record?
4299
Your employee receives a pay raise effective July 1st of the current year. What is the recommended way to update IT0008 (Basic Pay)_
4300
A customer pays a vacation bonus for each day of leave, depending on the employee's organizational assignment. What do you need to configure to enable this
4301
You need to outline the payroll process for the end users in a company. What is the correct sequence of steps?
4302
Valuation Bases - Division) provides the working hours per period as read from IT0008 and stored on the PARTT table?
4303
Which functions import HR master data into the payroll run?
4304
Your customer pays overtime to hourly employees. For the first three hours of overtime, an employee receives a 50% premium. For any hours beyond this, the premium increases to 100%.What do you include in the wage type selection configuration?
4305
Which functions are performed by the payroll control record?
4306
A customer wants to ensure that average working hours per period on IT0008 are updated when planned working hours on IT0007 change. How can you achieve this?
4307
Which feature should be used to default wage types on IT0008 (Basic Pay)?
4308
A customer has implemented SAP HCM Talent Management Suite and wants to have detailed view into the talent and organizational data using pie charts and bar graphs for strategic decisions. What do you recommend?
4309
A customer is implementing SAP ERP 6.0 EhP4 and wants to migrate all open requisitions from a legacy system. What steps are needed to do this?
4310
A customer wants to design the hierarchical representation of their global business organization. They use Portal, MSS and Workflow to manage process approvals. How do you set up the OM structure to alleviate concerns with crossing country and legal entity lines?
4311
The customer would like to have reports from Talent Management that enables them to analyze the talent distribution across the population by age, ethnicity and seniority What is the best solution?
4312
Your customer has implemented SAP Training and Event Management (TEM) and wants to know what additional functionality will be available by implementing SAP Learning Solution (LSO).Which features are unique to LSO?
4313
A company is implementing Performance Management. They want to migrate the Appraisal history to SAP.What solution do you recommend?
4314
Which component used to produce customer-specific output documents requires an additional license?
4315
Function MOD call personnel calculation rule... which queries employees work centre data and sets modifiers for table access during payroll?
4316
You want to repeat the process of finding additional objects along the subordinate organizational structure. What would you add to the following evaluation path?
4317
In which logical database are you able to restrict the info set using an object type ?
4318
Standard SAP ERP Organizational Management integrates with which of the following areas ?
4319
An employee was on vacation.In addition a vacation absence record , the employee also wants to create an overtime record on the same day. Which elements must be configured to prevent this scenario ?
4320
How can you update the employment status of an employee ?
4321
Time wage type selection occurs in subschema
4322
TC00 schema is called by function .....from function XT00.
4323
The function..... in schema XT00 creates only the time wage types?
4324
The main task of TC00 is wage type selection?
4325
Personnel calculation rule X010 is called from within sub schema XT00?
4326
There are two possible payroll runs in SAP HCM?
4327
You are not required to use which functions when simulating a payroll run
4328
Time data entry is of the following types?
4329
Which function imports the bonuses for dirty work entered as employee remuneration information?
4330
Personnel Calculation rule..... is called to perform the valuation set-up in Customizing if time wage types are present in Internal Table IT.
4331
This Calculation Rule queries processing class 01 for the basic pay wage types in internal table IT?
4332
The internal table ( IT ) contains the wage type /001 , which is for the employees who are not paid by the hour.This wage type calls the personnel calculation rule?
4333
Time Z writes the wage type to the internal time wage type table
4334
Each wage type is assigned to a?
4335
Each wage type contains , how many value fields?
4336
The main schema consists of a sequence of sub schemas that are included in the main schema using the function?
4337
o run the payroll program you need?
4338
Schema attributes can also be changed using the program?
4339
Which function provides the payroll driver with data on the type of program that the schema uses?
4340
The function...... checks whether all master data has been imported:
4341
Indirect Valuations Table is?
4342
A set of data grouped together into Ares with similar content is?
4343
nfo types 1000 to 1999 are for?
4344
nfo types 0000 to 9999 are for?
4345
Info types 2000 to 2999 are for?
4346
Infortypes 4000 to 4999 are for?
4347
Infortypes 9000 to 9999 are for?
4348
Identify the steps needed to build the organizational Plan?
4349
What are the three ways in which you can process info type records?
4350
What are the ways of recording employee working times in SAP HCM Time Management ?
4351
What is the prerequisites of Time Management?
4352
Which of the following master data info types are required for negative time management?
4353
Where can you set the earliest retroactive accounting date for an employee?
4354
Which of the following items are elements of the pay scale structure?
4355
What is the purpose of recording an info type 2002 record?
4356
Which variable is used to determine the screen modification for Master?
4357
-sv’ option of PMCMD command is used to specify______________ name
4358
How many levels are there in the Enterprise structure?
4359
A scheduling tool from BMC software
4360
A person, object type ‘P’ can be assigned to :
4361
which command is used to execute workflow tasks from the command line
4362
Which of the following is the Contract Element info type?
4363
Organization Management The following modules are available in SAP R/3 for a Professional User?
4364
You can view properties for which of the following items in the Workflow Monitor?
4365
A qualification Catalogue consists of the following objects:
4366
At which tracing level does the Integration Service not write error messages or row-level information for reject data.
4367
What is Default Recovery Strategy for Session
4368
he Time Evaluation driver is RPCALC00?
4369
Info type 0050 is created using a dynamic action when positive Time Management is used, and contains Time Events :
4370
You can also create an _________ file for workflow log events
4371
To determine the cause of workflow or session problems & resolve it?
4372
A Workflow log does not contain which of the following?
4373
A workflow fails and you need to consult the logs. Which PowerCener application will allow you consult the session and workflow logs?
4374
Which of the following is a type of workflow task?
4375
Are user-defined events supported in PowerCenter workflows?
4376
In a Workflow , you need to run an operating system script between two sessions. How can you best accomplish this?
4377
Which feature that determine the administrator group ?
4378
Elements of the enterprise structure?
4379
secondary Incoming wage types is ?
4380
A is the key for which object type?
4381
Chrological details of workflow tasks can be viewed in
4382
Public Holidays can have the following characteristics:
4383
A session task is a type of :
4384
What is the main switch for integration of OM with PA?
4385
The following are the options available in SAP Time Management:
4386
Which among the following is not a type of workflow task
4387
different views in TMW?
4388
The different methods for transferring employee time data to the SAP system are:
4389
A Work Schedule Rule comprises of the following elements:
4390
A session :
4391
The following is true about single sign-on using Kerberos 5 (Kerberos 5 SSO):
4392
. If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action?
4393
A set of instructions to execute tasks such as sessions, emails, shell commands etc is called :
4394
What SAP transaction can assist in detecting I/O bottlenecks?
4395
For triming leading & trailing spaces of a in Informatica the following function is used
4396
Which of the following are possible ways to display the R/3 Kernel patch of a system?
4397
What value would the function GET_DATE_PART (DATE_SHIPPED, ‘HH’) return when the value of DATE_SHIPPED is null?
4398
If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action?
4399
What types of transformation ports are valid ones?
4400
What does transaction SPAM do?
4401
What SAP transaction can assist in detecting I/O bottlenecks?
4402
True or False? MS-SQL Server can be installed using all the delivered default settings. Everything is controlled within the application, so SAP requires only a database engine to work.
4403
True or False? In order to read developer traces you have to go the operating system because SAP does not have a way to do this within the application.
4404
How can the logon screen be modified to include informational text, such as the company name, address, the system role, etc.?
4405
To prevent having to adjust output devices (e.g. print queue definitions) in every system each time they are transported from one system to another, an administrator can:
4406
After a new installation of R/3 Enterprise, the system has a temporary liscence. How long does this lisence last?
4407
What is CUA?
4408
To prevent the use of common password combinations, a system can be set up to include:
4409
What does report RSUSR003 do?
4410
True or False: Since the release of SQL Server 2000, database integrity checks — and DBCC CHECKDB in particular– are a thing of the past in SAP.
4411
The following is true about single sign-on using Kerberos 5 (Kerberos 5 SSO):
4412
What is SAP MMC good for?
4413
The Payroll Accounting area includes which functions?
4414
Which of the following are groupings for Employee Subgroups?
4415
Which of the following applies to a feature in SAP HR?
4416
Which of the following apply to Personnel Subareas?
4417
Which of the following is not True with respect to Sorter transformation ?
4418
Aggregator Transformation performs :
4419
To concatenate first name and last name of an employee, which transformation would be used ?
4420
Which of the following statements about integration between PA & PD are valid?
4421
The Personnel Control Record has which of the following functions?
4422
……………….. is used to control on a row by row basis, whether the row is to be inserted, updated, deleted or a rejected based on some logical condition
4423
…………….. is an example of Passive Transformation
4424
The Organizational Assignment Infotype (IT0001) is used for which of the following purposes?
4425
A transformation that does not change the number of rows that pass through it, is called :
4426
To test data for one or more conditions and route rows of data that do not meet any of the conditions to a default output group, which transformation would you use ?
4427
In which Infotype are an employee’s Enterprise and Personnel Structure assignment stored?
4428
In Joiner Transformation, if Master Outer Join type is used, it will :
4429
Personnel Area has which of the following functions?
4430
When you add a relational or a flat file source definition to a mapping, you need to connect it to a
4431
The Organizational Key is used for which of the following?
4432
An Active Transformation :
4433
The Payroll Accounting area includes which functions?
4434
The following is true about Payroll Accounting:
4435
Organizational Structure includes which of the following areas?
4436
The following consideration(s) should be taken into account when defining the Personnel Structure:
4437
What elements make up the Enterprise Structure?
4438
The following consideration(s) should be taken into account when defining the Enterprise Structure:
4439
……….. contains a set of transformations that can be reused in multiple mappings
4440
There are three structures in HR, which are Enterprise Structure, Personnel Structure and Organizational Structure.
4441
The output from an Aggregator transformation without a Group by will return?
4442
Which of the following transformations does not have variable port ?
4443
Which of the following is not a lookup cache property ?
4444
Which of the following Transformations does not use cache files ?
4445
Which of the following is not a Active Transformation ?
4446
Shortcuts can be created from which of the following?
4447
Which of these mobile devices should be protected with a password?
4448
Which of the following objects cannot be included in a mapplet?
4449
A flat file cannot be used as the following
4450
Which of the following cannot be used as Targets
4451
If your laptop has wireless networking, you should keep it enabled all the time so you can quickly connect to any available wireless networks.
4452
An "evil twin" is a wireless network set up by a hacker. It is disguised as a legitimate network, to trick you into logging in.
4453
Which of the following changes cause the session to be invalid ?
4454
It is not necessary to encrypt confidential files on a mobile computing device.
4455
Every mapping must contain which of the following components :
4456
If you use a public computer, before leaving you should:
4457
When the Integration Service runs a ……………, it uses the instructions configured in the mapping to read, transform, and write data
4458
When talking on the phone in a public place:
4459
Mappings represent :
4460
Which types of target definitions can be created in the Target Designer ?
4461
When traveling for business:
4462
In which of the following ways can the target definitions be created ?
4463
Target Designer is used to :
4464
What type of files can be imported for flat-file source/target definitions in the repository ?
4465
When a relational source definition is imported, which of the following source metadata is imported ?
4466
Relational source definitions can be imported from :
4467
To extract data from a source, first step in the Designer is :
4468
To create or import source definitions, ………….. is used in the Designer
4469
ETL Stands for -
4470
Which is the reusable component in Informatica?
4471
What Is Informatica.
4472
When you update the database where it will get updated?
4473
Which will not return values in the user defined data types
4474
How will user-defined variables be stored in a worklet?
4475
To Transformation from one session to another using debugger
4476
Enhanced Security option
4477
Components derived from Informatica (choose 3)
4478
Types of Caches in Lookup.-connected,unconnected,static,dynamic,recache,persistant,shared (Refer to the reasons in above pages...)
4479
.What is not an option in Informatica?
4480
Performance degradation occurs due to………
4481
worklet variables are not used for……….
4482
While importing relational source data from DB, What metadata u import?
4483
It takes some more time when I used Sorting.What is the reason
4484
Which of the following is Active
4485
Log initialisation, Error message and Notification of related data.
4486
Which of following is Passive Transformation………
4487
…………… is a repository object that generates, modifies, or passes data
4488
A set of source and target definitions linked by transformation objects that define the rules for data transformation is called a
4489
Which are the types of services which need not to be created by the Administrator?
4490
Which service is responsible for executing the mappings
4491
Which among the following is not an Application service
4492
The Integration Service connects to the repository through the …………… to fetch metadata from the repository
4493
………… allow users to create shortcuts to objects in the folder
4494
A ……….. is the logical representation of a machine in a domain
4495
…………….. is the primary unit for management and administration within PowerCenter
4496
You define a set of instructions to execute tasks, using :
4497
When you install Jenkins without any plug-ins configured, what is the only type of Jenkins build job you can create?
4498
What is the profession of the Jenkins mascot?
4499
What embedded runtime does the stand-alone Jenkins application use?
4500
During installation, the wizard recommends a set of Jenkins plug-ins. Which of the following Jenkins plug-ins is not recommended?
4501
Which environment variable do you optionally use to specify the folder in which Jenkins configuration and runtime data is contained?
4502
Which source code management plug-in does Jenkins install by default?
4503
Who is credited with the creation of Jenkins?
4504
Which version of the Java Development Kit (JDK) is required to run the latest version of Jenkins (since Jenkins 2.54)?
4505
Jenkins is a fork of what other CI tool?
4506
Which of the following commands runs Jenkins from the command line?
4507
How can we setup Jenkins jobs?
4508
Which maven plugin creates the project structure?
4509
How can we secure Jenkins?
4510
Which command can be used to check maven version?
4511
Which file is used to define dependency in maven?
4512
Which Scm Tools Does Jenkins Support?
4513
What are the useful plugins in Jenkin?
4514
How can we move or copy Jenkins from one server to another?
4515
What are the advantages of Jenkins?
4516
What is the requirement for using Jenkins?
4517
Reactjs data flow implementation?
4518
ReactJS renders Components start with?
4519
To achieve dynamic UI updates. Which of the following needs to be updated ?
4520
React.s focuses on which of the following part when considering MVC?
4521
JSX is necessary to work with React.js?
4522
Which of the following methods used for state of the component?(Multiple selction)
4523
Which functions allow to bind the context of the components?
4524
Which of the following called fat arrow function in react?
4525
Which is used to pass the data from parent to child?
4526
Which of the following API is necessary for React.js component?
4527
Which of the following mounting methods are invoked before the component is inserted into DOM?
4528
Once you create an element, React you can’t change its children or attributes?
4529
A parent component could access or read its children components properties?
4530
Who Develop React.js?
4531
Which of the following is the correct data flow sequence of flux concept?
4532
In component lifecycle which one is executed before rendering?
4533
Which is used to update the state?
4534
which of the following method define default values for properties using props?
4535
What is the name of React.js Developer ?
4536
Which of the following represented the Pre and post life cycle methods of components ?
4537
React.js Covers only the view layer of the app?
4538
Which helps react for keeping their data unidirectional?
4539
Which is used to keep the value of components unique?
4540
Life cycle methods of a components fall under following categories?
4541
Which of the following is not components of Redux?
4542
How many elements does a react component return?
4543
What create-react-app command do
4544
For what "webpack" command is used?
4545
What is state in React?
4546
Arbitrary inputs of components in React are called
4547
React.js was created by
4548
What function allows you to render React content in an HTML page?
4549
Which of following is used to pass data to a component from outside?
4550
What kind of component import React from 'react' is?
4551
Invoked once, only on the client, after rendering occurs.
4552
How can we prevent default behavior in React?
4553
In React state can be accessed using ___
4554
React supports all the syntax of __________
4555
React is mainly for building _____________
4556
React keeps track of what items have changed, been added, or been removed from a list using _____
4557
React considers everything as _______.
4558
An altered component may be uniquely identified with the help of ref.
4559
What is the smallest building block of ReactJS?
4560
Function that does not change its results for the same set of inputs are called __________
4561
If our elements are dynamic, react can keep track of the changes using keys.
4562
JSX is faster because it performs ____________ while compiling code to JavaScript
4563
Components cannot refer to other components in their output.
4564
In JSX most of the errors can be caught during _________.
4565
ref is used to refer a element / component returned by _________
4566
State can be initialized when code is loaded or state can be set on event changes.
4567
Lifecycle methods are mainly used ___________.
4568
Which of the following needs to be updated to achieve dynamic UI updates?
4569
________ can be done while more than one element needs to be returned from a component.
4570
Arbitrary inputs of components are called __________.
4571
React merges the object you provide into the current state using __________.
4572
JSX is typesafe.
4573
We can go for keys when there is possibility that our user could change the data.
4574
In React what is used to pass data to a component from outside?
4575
What are the two ways that data gets handled in React?
4576
What is ReactJS?
4577
What port is the default where the webpack-dev-server will run?
4578
What does the "webpack" command do?
4579
What is Babel?
4580
What is state in React?
4581
How many elements does a react component return?
4582
In which directory React Components are saved?
4583
Everything in React is a _____________
4584
What is a react.js in MVC?
4585
What does the “webpack” command do?
4586
How does React handle Web Accessibility Initiative - Accessible Rich Internet Applications (WAI-ARIA) standard?
4587
What are the advantages of React JS?
4588
At the highest level, React components have lifecycle events that fall into
4589
Which of the following API is a MUST for every ReactJS component?
4590
Props are __________ into other components
4591
How can you access the state of a component from inside of a member function?
4592
What are the limitations of ReactJS?
4593
What is ReactJS?
4594
Application written in AngularJS is cross browser compliant
4595
Data binding can be done in two ways in Angular js - data binding in classical template systems and data binding in angular templates?
4596
Explain what is angular.bootstrap is used for?
4597
Explain what Angular JS routes does?
4598
What is MVC (Mode View Controller) ?
4599
What is the correct syntax for a variable “a” in AngularJS?
4600
Which of the service modes can be easiest to test while using AngularJS?
4601
Which of the following statements are invalid AngularJS filters?
4602
What is the purpose of $destroy method in AngularJS?
4603
What is AngularJS?
4604
Check whether the code syntax is correct app.factory('TestFactory', function myTestFactory($rootScope, $http, $location) { return function myTestReusable() { // processing goes here }; });
4605
Does the aim of AngularJS “promise” is to interrupt and perform an activity when it taking a long time?
4606
For the code below <html ng-app="myApp"> <head> </head> <body> <div ng-view></div> </body> </html> Is the syntax current
4607
Is AngualarJS built on jQuery?
4608
How to use dependency injection in AngularJS ?
4609
Which of the following statements are true? Choose all that apply.
4610
Code written in AngularJS can be _____________.
4611
Check whether the code below is correct app.config(function ($routeProvider) { $routeProvider .when('/inbox', { templateUrl: 'views/inbox.html', controller: 'InboxCtrl', controllerAs: 'inbox' }) .when('/inbox/email/:id', { templateUrl: 'views/email.html', controller: 'EmailCtrl', controllerAs: 'email' }) .otherwise({ redirectTo: '/inbox' }); });
4612
Elements of AngularJS MVC views are rendered in which order?
4613
Is AngularJS extensible?
4614
In AngulsrJS HTML document is loaded and evaluated first in the browser. Mean while in AngularJS _________ ?
4615
There is a controller which takes a single parameter. We call it . . . . . parameter.
4616
AngularJS directives are used in ________
4617
AngularJS module can be created using ________
4618
Which of the following is true about AngularJS expressions
4619
What is a controller in MVC?
4620
We need to incorporate corresponding js according to locale of the country to support Internationalization in AngularJS based application.
4621
AngularJS bootstraps itself during config phase.
4622
Inbuilt services are always prefixed with $ symbol.
4623
In controllers, model data is accessed via $scope object.
4624
novalidate with a form declaration disables any browser specific validation.
4625
We can use $dirty and $invalid flags to do the form validations.
4626
orderby filter is applied to an expression using pipe character.
4627
currency filter is applied to an expression using pipe character.
4628
lowercase filter is applied to an expression using pipe character.
4629
uppercase filter is applied to an expression using pipe character
4630
AngularJS Expressions are written inside double braces like {{ expression}}.
4631
AngularJS Expressions are used to bind application data to html.
4632
Each controller accepts $scope as a parameter which refers to the application/module that controller is to control.
4633
AngularJS uses two way data binding.
4634
ng-bind binds the AngularJS Application data to HTML tags.
4635
ng-model binds the values of AngularJS application data to HTML input controls.
4636
Being JavaScript only framework, application written in AngularJS are not safe and secure.
4637
With AngularJS, developer writes less code and gets more functionality.
4638
- AngularJS provides capability to create Single Page Application in a very clean and maintainable way.
4639
Templates can be a single file (like index.html) or multiple views in one page.
4640
Templates are the rendered view with information from the controller and model.
4641
Filters select a subset of items from an array and return a new array.
4642
Services are singleton objects which are instantiated only once in app
4643
AngularJS supports inbuilt internationalization for three types of filters currency, date and numbers.
4644
Custom directives are used in AngularJS to extend the functionality of HTML.
4645
Is AngularJS extensible?
4646
constants are used to pass values at config phase.
4647
config phase is the phase during which AngularJS bootstraps itself
4648
Which of the following is true about provider?
4649
service method is used to create a service whose purpose is to do some defined task.
4650
factory method is used to define a factory which can later be used to create services as and when required.
4651
Using service method, we define a service and then assign method to it.
4652
Child controller inherits the scope of its parent controller.
4653
Which of the following is true about $routeProvider?
4654
Model available in $rootScope can be overridden by its all child scopes.
4655
Model available in $rootScope is available to its all child scopes.
4656
$rootScope is the parent of all of the scope variables.
4657
$http service is used to make an Ajax call to server.
4658
Use novalidate with a form declaration to disable any browser specific validation.
4659
Which of the following is true about $error?
4660
Which of the following is true about $invalid flag?
4661
Which of the following is true about ng-hide directive?
4662
Which of the following is true about ng-show directive?
4663
Which of the following is true about ng-disabled directive?
4664
Which of the following is true about filter filter?
4665
Which of the following is true about currency filter?
4666
Which of the following is true about lowercase filter?
4667
AngularJS application expressions are pure JavaScript expressions.
4668
AngularJS expressions behave in same way as ng-bind directives.
4669
AngularJS expressions are written using.
4670
What is MVC?
4671
Which of the following is true about ng-bind directive?
4672
Which of the following is not a core AngularJS directive
4673
Do AngularJS provide reusable components?
4674
Is AngularJS code unit testable?
4675
What is deep linking in AngularJS?
4676
- What are the filters in AngularJS?
4677
What are the controllers in AngularJS?
4678
What are scopes in AngularJS?
4679
What happens when page containing AngularJS based Application loads
4680
Which directive is used for data binding in AngularJS?
4681
What is data binding in AngularJS?
4682
Are application written using AngularJS cross browser compliant?
4683
Is AngularJS open source?
4684
Internationalization is a way to show locale specific information on a website.
4685
AngularJS uses one way data binding.
4686
Custom directives are defined using "directive" function.
4687
Using factory method, we first define a factory and then assign method to it.
4688
ng-click directive represents a AngularJS click event.
4689
Which of the following is true about ng-include directive?
4690
Which of the following is true about uppercase filter?
4691
Which of the following is true about ng-model directive?
4692
When integer value overflows, they become
4693
Chr ( ) function changes a string into a/an
4694
Is_unicode (arg) function returns true when
4695
Which function is used to convert a float type into integers?
4696
Conversion functions, Type casts and what is third way to manipulate a data type?
4697
Which data type in PHP offers special variables that hold references of resources that are external to PHP?
4698
Ord ( ) function is used convert a
4699
For checking a data type, PHP offers a function called
4700
Which data type is not valid in PHP for type casting?
4701
How many different ways are offered by PHP to manipulate a data type?
4702
Which one is not a data type in PHP?
4703
Which of following type conversion behavior is offered by PHP?
4704
Floatval ( ) function will convert your argument in
4705
How many basic data types are offered by PHP?
4706
How resources are created in PHP?
4707
Three ways to create an array is Direct assignment, array ( ) construct and
4708
Multidimensional arrays are simple arrays that have
4709
Other than index values an array can be retrieved by a function that is called as
4710
As compared to associative arrays vector arrays are much
4711
In vector arrays they elements must have
4712
$multi_array [1] [2] [3] [4] = "I am working on PHP"; will create
4713
Next ( ) function returns value after the
4714
A function that takes two integers as arguments and returns an array filled with all integers between them, is known as
4715
Foreach ( ), current ( ), next ( ), reset ( ), each ( ) and array_walk ( ) all these functions are example of
4716
Default numbering for an array indices starts from
4717
For getting rid of an assigned variable in an array which function is used?
4718
Unlike vector arrays of C and C++ PHP arrays can store
4719
User defined functions or may be built-in functions that's make an array via methods internal to PHP is called as
4720
For purpose of iteration Foreach is a
4721
There are how many ways to create an array in PHP script
4722
Which function take two arguments and returns true if element contained as a value of an array?
4723
An array is a collection of
4724
Is_array ( ) function that takes a single argument of any type and returns a true value if
4725
Count ( ) function is identical to
4726
PHP function calls are
4727
When we simply want iteration through looping an array values we can use
4728
PHP arrays are also called as
4729
Creating a new array from specification of its elements and associated keys, is known as
4730
Current ( ) function is a
4731
Prev ( ) function is used for
4732
Internal linked keys in an array can be retrievable by
4733
You cannot alter an array while you are iterating your array through
4734
Arrays that can store their values in association with unique keys or indices are called
4735
Which function takes two arguments, an array to be traversed and name of a function to apply to each key/value pair?
4736
To rewind pointer at beginning of list
4737
End ( ) function jumps pointer
4738
To retrieve a value from an array we can use its
4739
Indices of arrays can be either strings or numbers and they are denoted as
4740
Pointing before moving current pointer ahead is a behavior of
4741
Pos ( ) function is an alias for
4742
For finding nonempty elements in array we use
4743
In multidimensional arrays rather than a single key they values are stored in
4744
PHP does not support multiple inheritance but it supports
4745
Destruct ( ) function is used to call a
4746
Pear coding style recommends that class name begins with
4747
Parent class is a
4748
To ask objects about their classes, and ask classes about their parents without searching in code, is example of
4749
Namespaces defines a area in which an identifier
4750
PHP supports
4751
If everything is fine in object selftest ( ) function returns what?
4752
Constructor function must have a same name as name of a
4753
Derived class is also known as
4754
Encapsulation is
4755
Protected members of a class is accessible to class in which
4756
Which function returns TRUE if string argument is name of a class?
4757
Get_class ( ) function returns name of class from where
4758
A process that converts a string of bytes in such a way that you can produce original data again, is known as
4759
An abstract class is one that cannot be instantiated but
4760
PHP offers no support for
4761
How many functions are used by PHP that can encode and decode values into string?
4762
An individual instance in OOP is called as
4763
_sleep ( ) function is called when you
4764
For changing string again into original value which function is used
4765
Functionality of Destructors are offered in
4766
After unserialize ( ) function which function is called
4767
Ability to recover a class name, member function names, and member variable names from an instance, is called as
4768
For finding data in object is valid and consistent across instance which function is used?
4769
Serialize ( ) function takes a value of any type and then
4770
Defining a class in terms of another class and then specifying only things that you want to be different from that class, is called as
4771
Methods are also known as
4772
TextUtils and TextUtils_WordCounter classes are those which belongs to
4773
Which version of PHP support get_declared_classes ( ) function?
4774
When function have same prototype in base class as well as in derived class function is called
4775
Member variables of a class is also known as
4776
To define a function with default arguments, simply you need to turn formal parameter names into
4777
In PHP default behavior for user defined functions is
4778
What is included in phpinfo ( ) function with release of PHP5.2.1 version?
4779
How many ways that PHP offers to modify arguments of a function?
4780
PHP function arguments are modified in function definition and
4781
All these func_num_args ( ), func_get_arg ( ), func_get_args ( ), functions are introduced in
4782
In compile time installation PHP offers some
4783
Which of the following is not a superglobals in PHP?
4784
Which function is used to get ASCII value of character in PHP?
4785
__________ is used to unset a variable in PHP?
4786
How many error levels are available in PHP?
4787
In which version of PHP E_STRICT Error level is introduced?
4788
Which function in PHP is used to get the length of string variable?
4789
Which of the following function returns the number of characters in a string variable?
4790
Which of the following function returns a text in title case from a variable?
4791
Which of the following method sends input to a script via a URL?
4792
When you need to obtain the ASCII value of a character which of the following function you apply in PHP?
4793
Which of the following variables is not a predefined variable?
4794
PHP scripts are enclosed within _______
4795
PHP is an example of ___________ scripting language.
4796
What is the output of below PHP program? <?php $country = 'india'; $$country = 'banglore'; echo $country.' , '.$india
4797
How do you write "Hello World" in PHP?
4798
<?php $str1 = 'hellow'; $str2 = 'hEllow'; strcmp($str1, $str2); ?>
4799
Will session can pass the values from one page to another page.
4800
What output will give the following statement?
4801
PHP offers no support for
4802
Functionality of Constructors are offered in
4803
Extends clause is used for
4804
Defining a class in terms of another class and then specifying only things that you want to be different from that class, is called as
4805
Member variables of a class is also known as
4806
For accessing global variables anywhere from script, PHP uses
4807
$GLOBALS, $_SERVER, $_REQUEST, $_POST, $_GET, $_FILES, $_COOKIE, $_SESSION all are example of
4808
In PHP6 Register_ globals are
4809
PHP stores all global variables in an array called
4810
Superglobal array was introduced in
4811
All variables in PHP are assigned with the
4812
All variables in PHP are denoted by
4813
Error reporting is turned off and on in
4814
A function that writes directly into log of operating system, is
4815
Error logging is similar to error reporting but causes error events to be recorded at a
4816
Which from following error defining codes has highest severity?
4817
Get, Post, Cookies and Sessions all are examples of
4818
Which method is used for generating complex URL strings for dynamic web pages?
4819
Floor ( ), ceil ( ), round ( ), abs ( ), min ( ), max ( ) all functions are example of
4820
Which of the following is not a projection operator?
4821
Which function is used for determining location of syntax error?
4822
To suppress the _id field from the result set, specify _________ in the projection document.
4823
There are how many main methods for passing information between web pages and server
4824
Which of the following functionality is used for aggregation framework?
4825
Which of the following query selects documents in the records collection that match the condition { “user_id”: { $lt: 42 } }?
4826
Which of the following is the second argument to projection?
4827
Which is most important thing in configuration of PHP?
4828
Which one from followings is used for configuring PHP?
4829
Which of the following method returns one document?
4830
In aggregation pipeline, the _______ pipeline stage provides access to MongoDB queries.
4831
If we want to use XML functions we must set off
4832
The order of documents returned by a query is not defined unless you specify a _____
4833
There are how many ways to configure PHP
4834
An error reporting function, E_ALL &~E_NOTICE stands for
4835
Meaning of superglobal arrays is it can be
4836
$_SESSION array is one of superglobal variables introduced in
4837
Which of the following pipeline is used for aggregation in MongoDB?
4838
If you want PHP to transparently handle passing session variables for you when cookies are not available, you have to configure
4839
MongoDB process collection of documents using _________ operations.
4840
When a session ia active, PHP provides a special constant called
4841
Applications can also control the behavior of write operations using _______ concern.
4842
Which of the following preference determines how the client direct read operations to the set?
4843
Which of the following operation adds a new document to the users collection?
4844
Increment operator is denoted by
4845
=== operator is true if its two arguments are exactly
4846
Comparison operators have higher precedence than
4847
Decrement operator is denoted by
4848
Which operators have higher precedence?
4849
In MongoDB _________ operations modify the data of a single collection.
4850
PHP is sometimes
4851
PHP is a scripting language, whereas java is a
4852
MongoDB stores all documents in _____________
4853
There is some similarities between PHP and Java, that is
4854
JSP stands for
4855
A query may include a ___________ that specifies the fields from the matching documents to return
4856
We can integrate PHP into a java servlet environment using
4857
SAPI stands for
4858
Everything compatible with PHP on client side is also compatible with
4859
Although PHP is embedded with HTML but PHP syntax only applies in
4860
Can the output statement echo take multiple parameters?
4861
Can the output statement print take multiple parameters?
4862
Which of the following PHP loop is used to loop through each key/value pair in an array?
4863
Which of the following PHP function is used to break a string into an array?
4864
What will be the output for the following code snippet? if ('9' == '009') { echo 'Studyopedia Tutorial!'; } else { echo 'Studyopedia Quiz!'; } ?>
4865
The default execution time set in set_time_limit() in PHP?
4866
Which of the following is a PHP superglobal?
4867
Which of the following methods are used to send information to web server, which is secure?
4868
The usage of strpos() PHP function?
4869
The following PHP code snippet will result in True or False? $v = 'false'; if ($v) { echo 'true'; } else { echo 'false'; }
4870
What will be the output of the following code snippet, $v1 = 80; $v2 = 60; print $v1 . "+". $v2 ?>
4871
User defined functions are case in-sensitive or case sensitive?
4872
What is used to declare a constant in PHP?
4873
Which of the following is the correct way of creating comment in PHP?
4874
What is the file extension for PHP files?
4875
PHP introduced to the web world in which year?
4876
PHP was previously known as?
4877
Who developed PHP?
4878
PHP comments end with:
4879
PHP comments start with:
4880
Correct way of writing PHP comments:
4881
PHP constants are define using keyword:
4882
How do you write "Hello world " in PHP?
4883
All variables in PHP start with:
4884
PHP server scripts are surrounded by delimiters:
4885
Which of the following key is used to denote uniqueness in the collection?
4886
Every PHP statement end with:
4887
To iterate the cursor and return more documents, type _________ in the mongo shell.
4888
The mongo shell loads and parses the ___________ file on startup.
4889
PHP syntax is most similar to:
4890
Which of the following statement will insert 400 documents in to the testData collection?
4891
_id is a ________ bytes hexadecimal number which assures the uniqueness of every document.
4892
Which of the following method returns a cursor?
4893
What is the use of VLR in mobile forensic?
4894
What is the full form of a VLR?
4895
How the Home Location Registry (HLR) is useful in mobile forensic?
4896
Which of the following is NOT the variant of MSC?
4897
…… is a special tool available in VB to access databases directly
4898
Which of the following is NOT included for routing in Mobile Switching Center?
4899
…………. method of recordset object can be used to allocate memory for a new blank record
4900
………… can access data from relational and non relational databases
4901
Assertion (A): BSC works between BTS and Mobile switching center (MSC). Reason (R): BSC act as “manager” and responsible for performing radio channel setup, frequency hopping, and handoffs.
4902
………. allows access to the client server databases on a network
4903
hich of the following is NOT true for BSC?
4904
…………… is used to select a particular recor
4905
Extension of ActiveX controls …
4906
……..files contains bitmaps, strings, and other data that we can change without having to reedit and recompile the program code
4907
……. method adds a row to an MSHFlexGrid
4908
Assertion (A): If a user calls a number from its phone-book, it goes directly to BTS. Reason (R): It is the first step for transmission of the call.
4909
A………. is used to display information entered at design time, by a user at runtime ,or assigned within the code
4910
The ____ is the function is used to display the picture using picture box
4911
The _____ number of events related to form execution
4912
____ property is used to set the flow of control in between the multiple controls
4913
In command button, the ____ symbol is used to make the button with shortcut key access
4914
In VB form, the name property can be named with alphabets; ____ is the maximum number of character allowe
4915
From the following _____tool is used to display pictures in VB form
4916
In declaration a variables _____ length of characters is allotted for a variable A 32
4917
The ____ is a shortcut key used to replace the content by specific data in coding window A Ctrl + F
4918
In visual basic form, the caption property content will reflect in ____ area
4919
To open the property window for usage ____ shortcut key is used A F4
4920
____ option in project explorer window used display the coding of the program
4921
To run / to install the Visual basic 6.0 minimum of ____ ram capaciy
4922
In data type the ____ prefix used to represent the Boolean data
4923
The _____data type is the default and standard type used in programming side
4924
The Type Of statement is used to find out…….
4925
………. displays a list of the files in the current directory or sudirectory
4926
…………. displays the current drive and allows the user to select a different drive by using a drop down arrow
4927
………… present a list of choices to the user
4928
When the form is first referenced in any manner by program, the triggered event is ……
4929
The ……. allows direct exit from a For loop, Do loop, Sub procedure, or Function procedure
4930
…………. are used by VB to hold information needed by an application
4931
In visual basic the, Visible property consists _____ state
4932
The ____ shortcut is used to get the QuickInfo option in visual basic A Ctrl + Q
4933
The right hand drop down list box in the coding window is called _____ list box
4934
In coding window the _____ shortcut key is used to find the particular character or code A Ctrl + Q
4935
Which of the following is NOT true for BSC?
4936
At BTS level which of the following pieces of equipment are used?
4937
What is the major component of the BTS?
4938
Assertion (A): If a user calls a number from its phone-book, it goes directly to BTS. Reason (R): It is the first step for transmission of the call.
4939
The F5 is key pressed the ____ event of form is executed first
4940
In visual basic the _____ value is equivalent to the vb YES NO button in message box A 2
4941
In VB the order in which you create the controls is the order used by using ____ key
4942
___ boxes display information in a dialog box superimposed on the form
4943
The component option is used to insert new tool in to the toolbox, ____ menu is used
4944
__ is a command used to come out of the loop A continue
4945
SDI stands for ____
4946
If variables are not implicitly or explicitly type, they are assigned the type by default…
4947
……… statement is used to define a property procedure that assigns the value of a property
4948
…….. is a built in function to return the upper bound of an array
4949
…….. is a set of sequentially indexed elements having the same type of data
4950
…….. is a meaningful name that takes the place of a number or string that does not change
4951
……….. is the extension of a class module
4952
In …………….. there is no need to declare a variable before using it
4953
____ property is used to hide the tool in run time by setting value as false
4954
Among the various properties of the tools in VB, in general _____ property in not supposed to change the value at maximum time
4955
Like text box, _____ is another tool used for display / output the information A input box
4956
In multiple form based project the current form represented by ___ keyword
4957
Self Length Property is supported by ____ control in V
4958
In visual basic the _____ file consist of complete coding and form design
4959
In command button the _____ property is used to change the label value for any content
4960
The ____ key is used as control key on moving around the form without mouse
4961
____event will execute automatically at the activation of the tool
4962
In coding window, the programming statement has been written in the _____
4963
A Boolean datatype can store……….bytes
4964
Mouse down event takes place when you
4965
……… property is used to check whether the object is active or deactivate
4966
……… is an example for control
4967
……. allows you to position the forms in your application using a small graphical representation of the screen
4968
…….. is one of the main building blocks in a VB application
4969
…….. is an action recognized by a form or the control
4970
Which of the following keywords is used to keep track of active window
4971
___ window is used to align the form execution in desired position or location
4972
The Data Report designer is broken into ____ different sections
4973
Among the events in VB, the Load event is associated with _____
4974
The ____ is shortcut key used for execution of visual basic program
4975
In VB the main form consist of more than one sub form is called ____
4976
While designing the visual basic there are _____ methods used for adding a tools in to form window
4977
In visual basic _____ types of scroll bars available in visual basic
4978
The ____ menu is used for executing the program in Visual basic
4979
The _____ menu used for adding tools in to existing tools box
4980
The list of forms will display in tree like structure in _____window
4981
To load graphics on a control at runtime, we have to use the function……….
4982
Which of the following is an open-source extension of the part of the UML system dealing with profiles?
4983
Which of the following system models creates a graphical representation of software systems in the form of a set of diagram types?
4984
______ is a methodology for representing business processes as a set of connected visual objects.
4985
Which of the following statement is incorrect related to BPEL?
4986
Which of the following messaging protocol is used with XML in BPEL?
4987
Which of the following is the language standard for Web service interactions?
4988
Which of the following object is used to describe the data, usually as part of the XML schema?
4989
Which of the following essential object in WSDL is used to support message transfer?
4990
Which of the following version of WSDL is a W3C standard?
4991
Which of the following statement is incorrect related to catalog servers?
4992
Which of the following combination is possible in WebSphere ESB?
4993
How many different protocol types are required for message passing in SOA?
4994
Which of the following catalog service requires some sort of synchronization or update to maintain a unified data store across the servers involved?
4995
Which of the following is used to aid for locating services in SOA?
4996
Which of the following service monitors compliance of your operations with governmental regulation?
4997
Which of the following stores business logic and aid in governance of business processes?
4998
Which of the following statement is incorrect related to a repository and a registry in ESB?
4999
Which of the following manage message transactions?
5000
Which of the following is an ESB based on open standards such as Java EE?
5001
Which of the following function is performed by the service bus?
5002
How many types of methods are used to combine web services?
5003
In the ______ model, data and messages are exchanged in a Service Data Object (SDO).
5004
Which of the following is a collaborative effort where the logic of the business process is pushed out to the members?
5005
What does CVE in SOA design stand for?
5006
Which of the following application has the ability to query event data in the same way that a stock ticker or trading application can query trading data?
5007
SOA _____ an extension of the Service Oriented Architecture to respond to events that occur as a result of business processes.
5008
Which of the following element is used by orchestrated business process commonly referred to as?
5009
Which of the following provides commands for defining logic using conditional statements?
5010
Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint?
5011
Which of the following is used to define the service component that performs the service?
5012
Which of the following is a repeatable task within a business process?
5013
Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand?
5014
_________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
5015
Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards?
5016
Which of the following provides a token service that can be used to present validated access to resources?
5017
Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials?
5018
Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
5019
In mobile forensic, BTS stands for
5020
Which of the following standard is the key to creating Single Sign-On (SSO) systems?
5021
Which of the following is required by Cloud Computing?
5022
The handset along with SIM is called
5023
Assertion (A): The Mobile station is a device that is placing the call. Reason (R): MS is using a handset and SIM to connect to the network.
5024
Which of the following is done by Identity management?
5025
Amazon Web Services supports ________ Type II Audits.
5026
Assertion (A): MIN is the derivative of IMSI and used to identify the device on the network. Reason (R): MIN is used to identify a Mobile station (MS)
5027
Which of the following is one of the most actively developing and important areas of cloud computing technology?
5028
Which is NOT true for MIN?
5029
Which of the following was one of the weaker aspects of early cloud computing service offerings?
5030
Which of the following is the standard for interoperable cloud-based key management?
5031
Which of the following are a common means for losing encrypted data?
5032
What is the full form of MDN?
5033
Assertion (A): In the case of locked SIM, ICCID value has major advantage over IMSI value. Reason (R): ICCID value is readable while the IMSI value remains unreadable due to security lock.
5034
How many security accounts per client is provided by Microsoft?
5035
ICCID number comprised of
5036
Which of the following is a key mechanism for protecting data?
5037
What is the length of the ICCID number?
5038
Which number is commonly printed on the SIM cards?
5039
Which of the following is a compliance standard?
5040
How many digits are in the string of IMSI numbers?
5041
Assertion (A): All Type of Sim have IMSI number on SIM itself. Reason (R): IMSI can be used for the identification of the SIM module.
5042
The IMSI value is associated with
5043
What is IMSI stands for?
5044
Which of the following is NOT the part of the IMSI number of SIM?
5045
Which of the following has infrastructure security managed and owned by the vendor?
5046
Which of the following model type is not trusted in terms of security?
5047
Which of the following service model is owned in terms of infrastructure by both vendor and customer?
5048
Which of the following cloud does not require mapping?
5049
Which of the following model allows vendor to provide security as part of the Service Level Agreement?
5050
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
5051
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
5052
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
5053
What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?
5054
Which of the following facilitates the enforcement of mobile device policies and procedures?
5055
Which of the following enables installation of software that is not available through the official Apple App Store?
5056
Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?
5057
Which of the following service provider provides the highest level of service?
5058
Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.
5059
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:
5060
An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.
5061
Which of the following examples meets the requirement of multi-factor authentication on a mobile device?
5062
Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone's screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).
5063
Which of the following enable(s) biometric authentication on a mobile device? (Select all that apply)
5064
By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it.
5065
Which of the following is application and infrastructure management software for hybrid multi-clouds?
5066
Which of the following is used for Web performance management and load testing?
5067
Which of the following Apple services enables remote mobile device backups?
5068
Which of the following is considered an essential element in cloud computing by CSA?
5069
A mobile device's built-in functionality enabling the usage of locator applications is known as:
5070
Which of the following is the operational domain of CSA?
5071
Which of the following allows to erase data on a lost or stolen mobile device?
5072
Which of the following area of cloud computing is uniquely troublesome?
5073
Which of the following services that need to be negotiated in Service Level Agreements?
5074
Which of the following answers refers to (a) screen lock type(s) used for securing access to a mobile device?
5075
Which of the following service provider provides the least amount of built in security?
5076
A user interface element controlling access to a mobile device after the device is powered on is called:
5077
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
5078
Which of the following is a workflow control and policy based automation service by CA?
5079
Which of the following is open and both hypervisor and processor-architecture-agnostic?
5080
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
5081
Which of the following is used to extend CIM to virtual computer system management?
5082
Which of the following is an industry organization that develops industry system management standards for platform interoperability?
5083
Which of the following is a core management feature offered by most cloud management service products?
5084
Which of the following is used for performance management for virtualized Java Apps with VMware integration?
5085
Which of the following is used for Web site monitoring and analytics?
5086
Which of the following is a virtualization provisioning system that will be rolled into Dell’s AIM?
5087
______ is Microsoft’s cloud-based management service for Windows systems.
5088
Which of the following is the Virtual machine conversion cloud?
5089
Which of the following is not a phase of cloud lifecycle management?
5090
Which of the following provides tools for managing Windows servers and desktops?
5091
When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities?
5092
Which of the following is a standard protocol for network monitoring and discovery?
5093
How many categories need to be monitored for entire cloud computing?
5094
Which of the following “cloudly” characteristics that cloud management service must have?
5095
___________ is a framework tool for managing cloud infrastructure.
5096
Which of the following package provides all five elements of FCAPS?
5097
Which of the following is not the feature of Network management systems?
5098
Which of the following aims to deploy methods for measuring various aspects of cloud performance in a standard way?
5099
Which does C in FCAPS stand for?
5100
Which of the following are photo storage and sharing service?
5101
Which of the following service allows you to create beautiful, memorable movies?
5102
Which of the following is Web-based free email service with contacts and calendar?
5103
__________ is a personalization Web page and tool for Windows Live with status information and navigation features.
5104
Which of the following adds an RSS feed to digital photo frame devices?
5105
Which of the following has address book service with a synchronization feature?
5106
Which of the following is used for synchronization and remote access service for files stored on PCs and mobile devices?
5107
Which of the following generates alerts sent to email, mobile device, or Windows Messenger?
5108
Which of the following service allows applications to incorporate the features of the Windows Live Writer?
5109
Which of the following service use XML-RPC calls to get and send Weblog data?
5110
Which of the following synchronizes information obtained from RSS and ATOM sources?
5111
___________ is Management service for Windows Live ID and relationships.
5112
Which of the following way can be used to access Windows Live?
5113
Which of the following was formerly called Windows Live Dev?
5114
Which of the following is a management utility for a domain using SOAP and RPC?
5115
Which of the following has core services shown in the following figure?
5116
The connection between storage and Microsoft’s Content Delivery Network is stated to be at least _______ percent uptime.
5117
Microsoft offers a _______ calculator for the Windows Azure Platform.
5118
Which of the following Azure edition has storage up to 10GB database?
5119
SQL Azure Database looks like and behaves like a local database with a few exceptions like _____________
5120
Azure data is replicated ________ times for data protection and writes are checked for consistency.
5121
Which of the following was formerly called SQL Server Data Service?
5122
SQL Azure is a cloud-based relational database service that is based on _______
5123
Which of the following are a worldwide content caching and delivery system for Windows Azure blob content?
5124
Which of the following function of VBScript converts a given number of any variant subtype to Long?
5125
Which of the following function of VBScript converts a given number of any variant subtype to Integer?
5126
Which of the following function of VBScript converts a given number of any variant subtype to Double?
5127
Which of the following is the correct syntax to create a cookie using VBScript?
5128
Which of the following is true about cookie handling in VBScript?
5129
Can you access Cookie using VBScript?
5130
What is the output of A + B in VBScript if A = 5 and B = 10?
5131
Which of the following operator can be used to do an XOR operation in VBScript?
5132
Which of the following operator can be used to check if two numbers are equal or not in VBScript?
5133
Which of the following operator can be used to get the exponent of two numbers in VBScript?
5134
Which of the following operator can be used to get the modulus of two numbers in VBScript?
5135
Which of the following operator is supported in VBScript?
5136
What is the scope of a constant declared using Private in VBScript?
5137
What is the scope of a constant declared using Public in VBScript?
5138
Which of the following is used to create a constant in VBScript?
5139
Which of the following is correct about variable declared using 'Private' in VBScript?
5140
Which of the following is correct about variable declared using 'Public' in VBScript?
5141
Which of the following is correct about variable declared using 'Dim' in VBScript?
5142
In Which of the following scope, variables are available to all the procedures across all the associated scripts in VBScript?
5143
Which of the following is a valid scope in VBScript?
5144
Is it required to specify the type of variable during declaration in VBScript?
5145
Which of the following keyword is used to declare a variable in VBScript?
5146
Which of the following is true about variable naming conventions in VBScript?
5147
Which of the following is true about VBScript?
5148
Which one of the following describes why it is important to have a secure off-site backup copy of files?
5149
Which one of the following is MOST likely to be a hoax?
5150
Which one of the following is the reason that users should log on with a username and password?
5151
Which one of the following describes why it is important to update antivirus software regularly?
5152
Which one of the following would NOT happen if a computer suddenly malfunctions?
5153
Which one of the following is unsafe online activity?
5154
Which one of the following statements about a password is TRUE?
5155
Which one of the following describes how a breach in IT security should be reported?
5156
Which one of the following would prevent the theft of a laptop?
5157
Which one of the following describes a public network?
5158
VBScript is an
5159
Which one of the following could be the unexpected outcome of deleting a large group of files?
5160
VBScript was launched in
5161
VBScript stands for
5162
Which one of the following should you use to backup personal data?
5163
VBScript is provided by
5164
Which one of the following could lead to the spread of a malicious program?
5165
Which one of the following describes spam?
5166
Which of these are Time and Date Functions available in VBScript
5167
Which of these are math functions available in VBScript
5168
Which of these are conversion functions available in VBScript
5169
Which one of the following would be considered the BEST way to store a PIN number?
5170
Which of these are string functions available in VBScript.
5171
Two kinds of procedures in VBScript
5172
The command used in VBScript for writing some text on a page is
5173
Which one of the following describes why you should follow guidelines and procedures while using IT resources in an organisation?
5174
A scripting language is a
5175
Which one of the following describes how software can be stored safely?
5176
Which of these VBScript commands can be used to to iterate through loops ?
5177
Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organisation?
5178
VBScript is a
5179
How to take request using post method ?
5180
How to take request using get bmethod ?
5181
How to take request from the user ?
5182
How to disply values to the user ?
5183
What does the Option Explicit directive do ?
5184
There are two methods for declaring variables in VBScript
5185
Why is a scripting language called a scripting language ?
5186
What language is VBScript based on ?
5187
Which one of the following describes why Bluetooth device settings should be adjusted?
5188
Which one of the following should be used to change your password?
5189
What is ENUM?
5190
Which one of the following describes why users should lock their computer when leaving their desk?
5191
What two VBScript commands can be used to make decisions ?
5192
Which one of the following should you do to ensure that your USB storage device is kept safe and secure?
5193
VBScript is an
5194
Which one of the following describes Bluetooth?
5195
Which one of the following protects a computer from the risk of malicious programs?
5196
Which one of the following can protect a computer from the risk of unwanted emails?
5197
Which one of the following describes what you should do if you receive a chain letter email?
5198
Which one of the following describes how confidential information should be sent using an unsecured network?
5199
Which one of the following describes a computer hacker?
5200
Which one of the following describes why firewalls are used?
5201
VB Script was launched in
5202
Which loop is used to iterate till a condition becomes true?
5203
Extension of ActiveX designers _______
5204
Which statement is true for VBScript names e.g. variable names or procedure names?
5205
Which of these are string functions available in VBScript.
5206
How will you get a random number between 0 and 1 in VBScript?
5207
……… method is used to delete items from a list box
5208
……. property designates the text appearing in the form’s title bar
5209
…………. allows us to control the flow of our program’s execution based on certain condition
5210
……….. returns numeric code of a character
5211
…….. returns numeric code of a character
5212
……. are objects that are placed on form objects
5213
………… contains shortcuts to frequently performed actions
5214
………. shows the property type as well as a short description of the property
5215
__ is a tool used in form window for grouping the option button
5216
_____ property is related with Command button specific for displaying picture
5217
The Visual basic programming is ______ based programming concept in general
5218
The width of any tool in visual basic can be changed at ___ time
5219
Scroll bar is of _____ types in Visual Basic for usage
5220
The _____ keyboard refers to current form in VB project
5221
Status bar appears at the _____ of the MDI form
5222
In Visual basic more than one child _____ is allowed to add in project
5223
There can be only ____ MDI form in an application
5224
The Line method can be used to draw ______ shape in VB
5225
Which of these is true?
5226
Which of these is a safe practice?
5227
……. shows the value of any variables within the scope of the current procedure
5228
……. property is used to return or sets a value that determines whether the control can respond to user-generated events
5229
Storage size of Byte datatype is………
5230
Which of these is true about smartphones?
5231
……. modules can be reused in many different applications
5232
The ______control used to insert image to the form
5233
While entering a new project ______ option to be select from the dialog box
5234
The ______property of a form automatically sizes the picture loaded to it
5235
In default ____ numbers of tools exist in toolbox
5236
_____ is a tool used in visual basic to draw rectangle in the form
5237
A menu can include a maximum of ___ levels of sub menus
5238
What is the default range of horizontal scroll bar?
5239
By default, the textbox control can hold text as …
5240
………. property is an integer value corresponding to the position of the scroll box in the scroll bar
5241
……….. combines the features of the text box and list box
5242
……….. returns or sets the number of characters selected A Sellength
5243
A disabled menu item does not appear in the ____ bar
5244
A _____ bar appears in the top of the screen
5245
Option button can be grouped in a ______control
5246
The _____ property in Visual basic is common for many a tools
5247
All the controls in an array will have the same ___
5248
…………. is a block of code that is executed in response to an event
5249
……. arrays can be resized at anytime
5250
We can preserve the value of a local variable by making the variable………
5251
………. control is used to display text, but user cannot change it directly
5252
___ box provides a set of choices to the user
5253
___ function translates a numeric value to a variable
5254
DVariables of different data types when combined as a single variable to hold several related information is called as ______ data types
5255
Dynamic arrays can be declared when the user may not know the _____of the array at design time
5256
The ____ statement checks in the module for usage of any undeclared variables and reports an error to the user
5257
Code window consists of a ______ box and procedure list box
5258
……. property is used to set the maximum length of a text, a textbox can hold
5259
…….. control is used to provide an identifiable grouping for other controls
5260
A text box can hold as many as …...…. characters for a single line text
5261
The form module has file extension
5262
____variables are not reinitialized each time Visual basic invokes a procedure and thus retains or preserves value even when a procedure ends
5263
A module-level is available to all the _______ in the module
5264
Debug window is the same as ____ window
5265
____ bar contains a set of tools to provide controls in the Form
5266
One or more option button controls can be selected from _____ choices
5267
Which of the following provides quick access to commonly used commands in the programming environment?
5268
Which of the following windows is the central to the development of Visual Basic applications?
5269
Which windows displays a list of all forms and modules making up your application?
5270
IDE stands for…………
5271
When the form is first referenced in any manner by program, the triggered event is.....
5272
_________ method is used to forcibly set the CPU focus to a particular control.
5273
__________ event occurs when a form loaded into the memory.
5274
________ control is used to represent the items in a hierarchical manner
5275
How do access Form Designer?
5276
What property do you update to change the title of your window?
5277
What main menu do you click to create a new project?
5278
What property of label do we update to change the colo of written text?
5279
What control you need to display a text on your form?
5280
What template do you select when you want to create a new windows application?
5281
From where do we get the "label" on our form?
5282
What main menu option do we click to start the application?
5283
Which button do you use to close your application?
5284
What property of label do we update to change the text on the form?
5285
What will be the output of the following PHP code? <?php for ($i == 2; ++$i == $i; ++$i) print "In for loop "; print "After loop\n"; ?>
5286
What will be the output of the following PHP code? <?php for (1; $i == 1; $i = 2) print "In for loop "; print "After loop\n"; ?>
5287
What will be the output of the following PHP code? <?php for ($i++; $i == 1; $i = 2) print "In for loop "; print "After loop\n"; ?>
5288
What will be the output of the following PHP code? <?php $x; for ($x = -3; $x < -5; ++$x) { print ++$x; } ?>
5289
What will be the output of the following PHP code? <?php for ($x = -1; $x < 10;--$x) { print $x; } ?>
5290
What will be the output of the following PHP code? <?php for ($x = 1; $x < 10;++$x) { print "*\t"; } ?>
5291
What will be the output of the following PHP code? <?php for ($x = 0; $x <= 10; print ++$x) { print ++$x; } ?>
5292
What will be the output of the following PHP code? <?php for ($x = 0; $x <= 10; $x++) { echo "The number is: $x <br>"; } ?>
5293
What will be the output of the following PHP code? <?php $colors = array("red","green","blue","yellow"); foreach ($colors as $value) { echo "$value <br>"; } ?>
5294
What will be the output of the following PHP code?hp $i = 0; for ($i) { print $i; } ?>
5295
What will be the output of the following PHP code? <?php $a = array("hi", "hello", "bye"); for (;count($a) < 5;) { if (count($a) == 3) print $a; } ?>
5296
What will be the output of the following PHP code? <?php $a = array("hi", "hello", "bye"); foreach ($a as $value) { if (count($a) == 2) print $value; } ?>
5297
What will be the output of the following PHP code? <?php for ($i = 0; $i < 5; $i++) { for(; $i < 5; $i++) print"i"; } ?>
5298
What will be the output of the following PHP code? <?php for ($i = 0; $i % ++$i; $i++) { print"i"; } ?>
5299
What will be the output of the following PHP code? <?php $user = array("Ashley", "Bale", "Shrek", "Blank"); for ($x = 0; $x < count($user); $x) { if ($user[$x++] == "Shrek") continue; printf ($user[$x]); } ?>
5300
What will be the output of the following PHP code? <?php $user = array("Ashley", "Bale", "Shrek", "Blank"); for ($x=0; $x < count($user) - 1; $x++) { if ($user[$x++] == "Shrek") continue; printf ($user[$x]); } ?>
5301
What will be the output of the following PHP code? <?php $user = array("Ashley", "Bale", "Shrek", "Blank"); for ($x = 0; $x < count($user); $x++) { if ($user[$x] == "Shrek") continue; printf ($user[$x]); } ?>
5302
What will be the output of the following PHP code? <?php for ($i = 0; $i < 5; $i++) { for ($j = $i;$j > $i; $i--) print $i; } ?>
5303
What will be the output of the following PHP code? <?php for ($i = 0; $i < 5; $i++) { for ($j = $i; $j > 0; $i--) print $i; } ?>
5304
What will be the output of the following PHP code? <?php for ($i = 0; 0; $i++) { print"i"; } ?>
5305
What will be the output of the following PHP code? < ?php $num = 10; echo 'What is her age? \n She is $num years old'; ?>
5306
What will be the output of the following PHP code? < ?php $team = "arsenal"; switch ($team) { case "manu": echo "I love man u"; case "arsenal": echo "I love arsenal"; case "manc": echo "I love manc"; } ?>
5307
What will be the output of the following PHP code? < ?php $a = "clue"; $a .= "get"; echo "$a"; ?>
5308
What will be the output of the following code? < ?php function track() { static $count = 0; $count++; echo $count ; } track(); track(); track(); ?>
5309
Which statement will output $x on the screen?
5310
Which of the below statements is equivalent to $add += $add ?
5311
What will be the output of the following PHP code? < ?php $total = "25 students"; $more = 10; $total = $total + $more; echo "$total" ; ?>
5312
What will be the output of the following PHP code? < ?php $score = 1234; $scoreboard = (array) $score; echo $scoreboard[0]; ?>
5313
What will be the output of the following PHP code? < ?php $color = "maroon"; $var = $color[2]; echo "$var" ; ?>
5314
Which of the following PHP statements will output Hello World on the screen? (i) echo (“Hello World”); (ii) print (“Hello World”); (iii) printf (“Hello World”); (iv) sprintf (“Hello World”);
5315
If $a = 12 what will be returned when ($a == 12) ? 5 : 1 is executed?
5316
What will be the output of the following code? < ?php $foo = 'Bob'; $bar = &$foo; $bar = "My name is $bar"; echo $bar; echo $foo; ?>
5317
Which of following variables can be assigned a value to it? (i) $3hello (ii) $_hello (iii) $this (iv) $This
5318
What will be the output of the following php code? < ?php $num = "1"; $num1 = "2"; print $num+$num1 ; ?>
5319
What will be the output of the following php code < ?php $num = 1; $num1 = 2; print $num . "+". $num1 ; ?>
5320
Which of the following php statement/statements will store 111 in variable num? i) int $num = 111; ii) int mum = 111; iii) $num = 111; iv) 111 = $num;
5321
Which of the below symbols is a newline character?
5322
We can use ___ to comment a single line? i) /? ii) // iii) # iv) /* */
5323
Which version of PHP introduced Try/catch Exception?
5324
Which of the following must be installed on your computer so as to run PHP script? i) Adobe Dreamweaver ii) PHP iii) Apache iv) IIS
5325
Which of the following is/are a PHP code editor? ditor? i) Notepad ii) Notepad++ iii) Adobe Dreamweaver iv) PDT
5326
Which of the looping statements is/are supported by PHP? i) for loop ii) while loop iii) do-while loop iv) foreach loop
5327
A PHP script should start with ___ and end with ___:
5328
PHP files have a default file extension of.
5329
What will be printed by the below code? $a = 1; { $a = 2; } echo $a, "\n";
5330
What gets printed? class MyException extends Exception {} try { throw new MyException('Oops!'); } catch (Exception $e) { echo "Caught Exception\n"; } catch (MyException $e) { echo "Caught MyException\n"; }
5331
What will be printed? $a = array(); if ($a[1]) null; echo count($a), "\n";
5332
What gets printed? $str = 'a\\b\n'; echo $str;
5333
Which statement about the code below is correct? class A {} class B {} class C extends A, B {}
5334
What will be printed? $a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), "\n";
5335
What will be printed? $var = 'a'; $VAR = 'b'; echo "$var$VAR";
5336
Which of the following is NOT a valid PHP comparison operator?
5337
What will be printed? if ('2' == '02') { echo 'true'; } else { echo 'false'; }
5338
What will be the value of $var below? $var = true ? '1' : false ? '2' : '3';
5339
What gets printed? <?php $RESULT = 11 + 011 + 0x11; echo "$RESULT"; ?>
5340
What will be printed if (null === false) { echo 'true'; } else { echo 'false'; }
5341
What will be printed? $a = array(); if ($a == null) { echo 'true'; } else { echo 'false'; }
5342
How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c', 'd' );
5343
What will be the value of $var? $var = 1 / 2;
5344
What will be printed? $var = '0'; if ($var) { echo 'true'; } else { echo 'false'; }
5345
What gets printed? $var = 'false'; if ($var) { echo 'true'; } else { echo 'false'; }
5346
A value that has no defined value is expressed in PHP with the following keyword:
5347
Which of the following is the way to create comments in PHP?
5348
What will be printed by the code below? <?php FUNCTION TEST() { ECHO "HELLO WORLD!\n"; } test(); ?>
5349
What value is printed for "a" below <?php $a = 1; function Test() { echo "a = $a"; } Test(); ?>
5350
Which of the following function checks if a specified value exists in an array ?
5351
Which of the following variable is used for the PHP script name ?
5352
Which of the following function is used to locate a string within a string ?
5353
Which of the following magic constant of PHP returns function name ?
5354
Which of the following type of variables are whole numbers, without a decimal point, like 4195 ?
5355
Which of the following method can be used to parse an XML document using PHP ?
5356
Which of the following is correct about eregi() function ?
5357
Which of the following is used to destroy the session ?
5358
Which of the following is used to check if session variable is already set or not in PHP ?
5359
Which of the following function can be used to get an array in the reverse order ?
5360
Which of the following array represents an array with a numeric index ?
5361
Which of the following magic constant of PHP returns function name ?
5362
Which of the following is correct about determine the "truth" of any value not already of the Boolean type ?
5363
Which of the following is true about php.ini file ?
5364
Which of the following method acts as a constructor function in a PHP class ?
5365
Which of the following method of Exception class returns array of the backtrace ?
5366
Which of the following is used to check that a cookie is set or not ?
5367
Which of the following function is used to redirect a page
5368
Which of the following is correct about NULL ?
5369
You add, delete, modify elements within your database thru PHP.
5370
Which of the following is correct about PHP ?
5371
If $a = 12 what will be returned when ($a == 12) ? 5 : 1 is executed ?
5372
Which of following variables can be assigned a value to it ?
5373
Which of the following php statement(s) will store 111 in variable num
5374
We can use _____ to comment a single line.
5375
Which of the following must be installed on your computer so as to run PHP script ?
5376
Which of the following is/are a PHP code editor ?
5377
Which of the looping statements is/are supported by PHP ?
5378
Which of the following magic constant of PHP returns class name ?
5379
An Object is a/an _____ of a class.
5380
Which method is invoked when an undefined property is accessed ?
5381
_____ clone() is run on the _____ object.
5382
Which keyword must be added before $first variable on the third line of the above question to make $second and $first as distinct objects in PHP 5 ?
5383
Which method introduced in PHP 5, is invoked just before an object is garbage collected ?
5384
Which one of the following method is invoked when an undefined method is called by client code ?
5385
Which one of the following method is invoked when a value is assigned to an undefined property ?
5386
PHP provides built-in interceptor methods, which can intercept messages sent to undefined methods and properties. This is also known as
5387
Which keyword is used to put a stop on inheritance ?
5388
Which one of the following keyword is used in conjunction with an Exception object ?
5389
A PHP script should start with _____ and end with _____.
5390
PHP files have a default file extension of
5391
What does PHP stand for ?
5392
What should be done in the kick off phase of a formal review
5393
non-functional test does not belong to which of the following categories?
5394
When would the testing have been stopped?
5395
Select from which of the following the regression testing should be performed.
5396
A deviation from the specified or expected behavior that is visible to end-users is called:
5397
Code Coverage is used as a measure of what?
5398
Evaluating testability of the requirements and system are a part of which phase
5399
Statement Coverage will not check for the following.
5400
The Kick Off phase of a formal review includes the following:
5401
Repeated Testing of an already tested program, after modification, to discover any defects introduced or uncovered as a result of the changes in the software being tested or in another related or unrelated software component:
5402
Which of the following techniques is NOT a black box technique?
5403
Which of the following is not phase of the Fundamental Test Process?
5404
Impact Analysis helps to decide:
5405
The later in the development life cycle a fault is discovered, the more expensive it is to fix. Why?
5406
Test ware(test cases, test dataset)
5407
Which of the following is NOT included in the Test Plan document of the Test Documentation Standard?
5408
Which statement about expected outcomes is FALSE?
5409
What is NOT included in typical costs for an inspection process?
5410
Which of the following is the main purpose of the integration strategy for integration testing in the small?
5411
. Which one of the following describes the major benefit of verification early in the life cycle?
5412
Which of the following is a form of functional testing?
5413
How would you estimate the amount of re-testing likely to be required?
5414
Which one of the following statements, about capture-replay tools, is NOT correct?
5415
Which of the following tools would you use to detect a memory leak?
5416
When should you stop testing?
5417
Which of the following statements is not true
5418
When should testing be stopped?
5419
IEEE 829 test plan documentation standard contains all of the following except
5420
Regression testing should be performed: v) Every week w) After the software has changed x) As often as possible y) When the environment has changed z) When the project manager says
5421
Which of the following is not a white box technique?
5422
Error guessing is a:
5423
In order to control cost, defects should ideally be detected in which phase:
5424
Which of the following is not a Software Development Life Cycle Phase?
5425
Unit testing is done by:
5426
A program with high cyclometic complexity is likely to be:
5427
Beta Testing is done at:
5428
Testing of software with actual data and in actual environment is known as?
5429
Which of the following is the component test standard?
5430
What is Fault Masking?
5431
White-box testing can be started:
5432
Which is not a type of incremental testing approach?
5433
Exhaustive testing is:
5434
Static analysis can be best described as:
5435
Which of the following is not a Test Type?
5436
The technique applied for usability testing is:
5437
Which is not the other name for structural testing?
5438
Test cases are designed during which of the following stages?
5439
What is “V” Model?
5440
The order in which test levels are performed is:
5441
During which test activity could faults be found most cost effectively?
5442
Verification is:
5443
A Plan to overcome the risk called as
5444
Which of the following is NOT a static testing technique?
5445
The name of the testing which is done to make sure the existing features are not affected by new changes
5446
Testing beyond normal operational capacity is __________
5447
The inputs for developing a test plan are taken from
5448
End result of Software Requirement Analysis is ________
5449
In white box testing what do you verify?
5450
When an expected result is not specified in test case template then ___________
5451
For testing …………….. may involve ensuring all items of testware are identified, version controlled, tracked for changes, related to each other and related to the development items, so that traceability can be maintained throughout the test process.
5452
In a risk-based approach, the risks identified may be used to i) Determine the test techniques to be employed. ii) Determine the extent of testing to be carried out. iii) Prioritize testing in an attempt to find the critical defects as early as possible. iv) Determine whether and testing activities could be employed to reduce risk.
5453
……………. provide developers and other parties with feedback about the problem to enable identification, isolation, and correction as necessary.
5454
Details of the incident report include which of the following. i) Date of issue, issuing organization and author ii) Expected and actual results iii) Priority to fix iv ) Conclusions, recommendations and approvals
5455
Select the risks that fall under project risks. i) Problems in defining the right requirements. ii) Test environment not ready on time iii) Poor software characteristics
5456
Which of the following risk does NOT include product risks in software testing?
5457
The purpose of …………………. is to establish and maintain the integrity of the products of the software or system through the project and product lifecycle.
5458
The purpose of ……………… is to provide feedback and visibility about test activities.
5459
. ……………. is concerned with summarizing information about the testing endeavor.
5460
……………. describes any guiding or corrective actions taken as a result of information and metrics gathered and reported.
5461
…….. are used on those in which test coverage is driven primarily by the advice and guidance of technology and/or business domain experts outside the test team.
5462
………… are used on stochastic testing using statistical information about failure rates or usage.
5463
………… are used for risk-based testing where testing is directed to areas of greatest risk.
5464
Which of the following are typical exit criteria for testing? i) costs ii) Schedules such as those based on time to market iii) Test environment availability and readiness iv) Estimates of defect density or reliability measures.
5465
Which of the following are typical entry criteria for testing? i) Test data availability ii) Testable code availability iii) Costs iv) Test tool readiness in the test environment.
5466
Which of the following are the tasks performed by the typical tester? i) Review tests developed by others ii) Decide on the implementation of the test environment iii) Prepare and acquire test data
5467
State whether the following statements about different test positions are True or False. i) The test manager plans testing activities and chooses the tools and controls to be used. ii) The test manager plans organize and control the testing activities while the tester specifies and executes tests.
5468
Which of the following are the typical tasks should be performed by test leader? i) Prepare and acquire test data ii) Write or review a test strategy iii) Write test summary reports based on the information gathered during testing. iv) Review and contribute to test plans
5469
Which of the following are the drawbacks of independent testing? i) Independent tester cannot verify assumptions people made during specification and implementation of the system. ii) Independent testers are isolated from the development team. iii) Independent testers may be seen as a bottleneck or blamed for delays in release.
5470
Which of the following is a possible benefit of independent testing?
5471
The oracle assumption:
5472
Given the following sets of test management terms (v-z), and activity descriptions (1-5), which one of the following best pairs the two sets? v – Test control w – Test monitoring x – Test estimation y – Incident management z – Configuration control 1 – Calculation of required test resources 2 – Maintenance of record of test results 3 – Re-allocation of resources when tests overrun 4 – Report on deviation from test plan 5 – Tracking of anomalous test results
5473
A program with high cyclometic complexity is almost likely to be:
5474
Increasing the quality of the software, by better development methods, will affect the time needed for testing (the test phases) by:
5475
Alpha testing is:
5476
Integration testing in the small:
5477
Which of the following characterizes the cost of faults?
5478
Which one of the following statements about system testing is NOT true?
5479
Which of the following is NOT true of test coverage criteria?
5480
What is the main difference between a walkthrough and an inspection?
5481
Which of the following is NOT a white box technique?
5482
A test harness is a
5483
Pick the best definition of quality
5484
The oracle assumption:
5485
To test a function, the programmer has to write a _________, which calls the function to be tested and passes it test data.
5486
Which is not the fundamental test process
5487
The cost of fixing a fault:
5488
Poor software characteristics are
5489
Which of the following is a requirement of an effective software environment? I. Ease of use II. Capacity for incremental implementation III. Capability of evolving with the needs of a project IV. Inclusion of advanced tools
5490
Enough testing has been performed when:
5491
Error guessing is best used:
5492
From the below given choices, which one is the Confidence testing
5493
Test cases are designed during:
5494
One Key reason why developers have difficulty testing their own work is :
5495
The difference between re-testing and regression testing is:
5496
Which of the following functions is typically supported by a software quality information system? I. Record keeping II. System design III. Evaluation scheduling IV. Error reporting
5497
How much testing is enough?
5498
Independent Verification & Validation is
5499
When should we stop testing?
5500
When should we run regression tests? Choose TWO Answers.
5501
Non-functional system testing includes:
5502
When what is visible to end-users is a deviation from the specific or expected behavior, this is called:
5503
What statement about expected outcomes is FALSE:
5504
In practice, which Life Cycle model may have more, fewer or different levels of development and testing, depending on the project and the software product. For example, there may be component integration testing after component testing, and system integration testing after system testing.
5505
The most important thing about early test design is that it:
5506
Which of the following requirements is testable?
5507
Which of the following should NOT normally be an objective for a test?
5508
Which one of the following are non-functional testing methods?
5509
Which is not a test Oracle
5510
A failure is:
5511
Which is not a testing principle
5512
Which of these activities provides the biggest potential cost saving from the use of CAST?
5513
Consider the following statements about early test design: i. early test design can prevent fault multiplication ii. faults found during early test design are more expensive to fix iii. early test design can find faults iv. early test design can cause changes to the requirements v. early test design takes more effort
5514
Which of the following is true of the V-model?
5515
Which one of the following describes the major benefit of verification early in the life cycle?
5516
Is JMeter a Web based Software Application?
5517
Does Cucumber Supports BDD Framework?
5518
….Tool is for Agile Testing and DevOps teams to deliver quality software faster?
5519
…..is not a Configuration Management Tool?
5520
…..is not a Commercial Tool?
5521
…..is not an Open Source Tool?
5522
…..is not a Test Tool?
5523
Does UFT Supports Desktop Application Testing?
5524
……doesn’t supports Database Testing?
5525
Cucumber supports to write…..?
5526
JMeter doesn’t Support…..?
5527
UFT Doesn’t Supports Database Testing?
5528
…….is not a Performance Test Tool?
5529
…….is a Defect Management Tool?
5530
……..is not a Test Management Solution?
5531
IBM – RPT Supports….?
5532
Selenium IDE Supports Java for writing Test Scripts?
5533
Selenium supports Python Programming for writing Test Scripts?
5534
…….Supports Web Services Testing?
5535
Appium doesn’t support……?
5536
Which of the following a static analysis doesn’t find?
5537
Which of the following statements relates more closely to the cost of fixing a fault?
5538
Which of the following activities doesn’t befall during system testing?
5539
Which of the following is a valid difference between re-testing and regression testing?
5540
Whether reviews or inspections are part of testing and why?
5541
Which of the following statements is not correct in the context of performance testing?
5542
Which of the following testing types is done in-house before the launch of a software?
5543
Which of the following is best suited to find the Unreachable code?
5544
Which of the following statements is the central point for the acceptance testing?
5545
What is the goal of test fulfillment criteria in a test plan?
5546
Which of the following items need not be included in the defect report?
5547
Who should first use a testing tool which your team has purchased recently?
5548
Which of the following tasks is critical for test planning?
5549
Which of the following standards defines the testing terms?
5550
Which of the following statements is related to Expected results?
5551
Which of the following statements is true for Beta testing to take place?
5552
Which of the following statements is related to Error guessing?
5553
Which of the following is a valid indicator of the test progress?
5554
Which of the following items isn’t a Standard part of the Test Plan document?
5555
Which of the following actions a Test manager shouldn’t allow?
5556
User Acceptance testing is
5557
The number of defects in a particular software is given by which metric?
5558
Which of the following is not a level in CMM?
5559
In which model functional expertise can be used to estimate cost?
5560
Quality Control is a validation technique whereas Quality Assurance is a verification technique
5561
Which of the following is not a white box testing technique
5562
Code inspection of a program is a dynamic testing technique
5563
Which of the following is not a black-box testing technique?
5564
Which of the following techniques does not require the understanding of internal data structures and algorithms?
5565
Histogram refers to
5566
Defects are less costly if detected in which of the following phases?
5567
Which of the following acceptance testing is done prior to a new build?
5568
Which of the following is not a cost of quality?
5569
Which of the following defect attribute denotes the order in which defects need to be fixed?
5570
Which of the following verifies the product rather than the process?
5571
Comparing processes or products against best practices with the goal of improvement is
5572
Exit criteria in test plan mentions
5573
Relation between two variables over time is given by
5574
Which of the following statements about reviews is true?
5575
Which of the following would NOT normally form part of a test plan?
5576
We split testing into distinct stages primarily because:
5577
Which of the following uses Impact Analysis most?
5578
Expected results are:
5579
A typical commercial test execution tool would be able to perform all of the following, EXCEPT:
5580
What can static analysis NOT find?
5581
Functional system testing is:
5582
Given the following code, which statement is true about the minimum number of test cases required for full statement and branch coverage? Read p Read q IF p+q > 100 THEN Print "Large" ENDIF IF p > 50 THEN Print "p Large" ENDIF
5583
What is the purpose of a test completion criterion?
5584
Which of the following tools would you use to detect a memory leak?
5585
Which of the following is NOT a type of non-functional test?
5586
Regression testing should be performed: v) every week w) after the software has changed x) as often as possible y) when the environment has changed z) when the project manager says
5587
If the pseudo code below were a programming language ,how many tests are required to achieve 100% statement coverage? 1.If x=3 then 2. Display_messageX; 3. If y=2 then 4. Display_messageY; 5.Else 6.Display_messageZ; 7.Else 8.Display_messageZ;
5588
What is the important criterion in deciding what testing technique to use?
5589
When should you stop testing?
5590
Coverage measurement
5591
Increasing the quality of the software, by better development methods, will affect the time needed for testing (the test phases) by:
5592
An incident logging system
5593
Testware(test cases, test dataset)
5594
A test design technique is
5595
Which is not true-The black box tester
5596
The later in the development life cycle a fault is discovered, the more expensive it is to fix. why?
5597
In which order should tests be run?
5598
When reporting faults found to developers, testers should be:
5599
which of the following statements is not true
5600
What is the main reason for testing software before releasing it?
5601
Faults found by users are due to:
5602
Software testing activities should start
5603
______________ is not a Test Management Tool?
5604
______________ is not a Bug Tracking Tool?
5605
______________ is not a Performance Test Tool?
5606
__________ is an Advantage of Selenium WebDriver?
5607
_________ is the use of Firebug in Selenium?
5608
Selenium IDE supports__________Browser only to create and execute Test Cases.
5609
_________ supports Parallel Test Execution
5610
Data classification is done by which type of Decision Tree?
5611
Assertion Testing is _________ .
5612
What is the order of Priority Testing?
5613
Cyclomatic Complexity cannot be applied in _______ .
5614
Which coupling should be avoided in software?
5615
Minimum of four test data are available in ______ .
5616
First component of the DFD is ______ .
5617
Difference between Retesting and Regression Testing is _________ .
5618
______ is an existing defect that has not yet caused a failure because the conditions that is required to invoke the defect is not meet.
5619
Top-down Design does not require ______ .
5620
Which testing cannot be performed by QA Team?
5621
STLC is related to which model?
5622
Defects can be found more easily in ________ .
5623
Focus Testing comes under ______.
5624
Which is not true in case of Unit Testing?
5625
Which of the following is / are not a Iterative Model?
5626
____________ is done by suddenly increasing the load for a small period of time and observing the behavior of the system.
5627
Test plans are based on _______.
5628
Which is not a part of Decision Table?
5629
Component Drivers are not needed for ______.
5630
Coupling and Cohesion is explained by _______ .
5631
Which is not true in case of Sanity Testing?
5632
Confidence Testing refers to ________.
5633
Which of the following is / are not part of Specification Based Testing?
5634
Which testing application security has the purpose to prevent problems which may affect the application integrity and stability?
5635
What is the ratio of effort needed to fixing a defect in Requirement Phase, Design Phase, Coding Phase and Implementing Phase?
5636
Which is not Data Driven Testing?
5637
Pesticide Paradox principle of testing says that ______________.
5638
Which is not true in case of Soak Testing?
5639
Which of the following is / are true regarding Catastrophic Defect?
5640
White Box Testing is not concern with _________.
5641
Which is not a part of Specification Testing?
5642
The Cyclomatic number theory in a graph is defined by ________.
5643
________ calls the function and passes it test data.
5644
Which debugging technique is most used for debugging in small software?
5645
__________ exercises the full functionality of a product but does not test features in detail.
5646
Which is not true regarding Spiral Model?
5647
Which is not true regarding Smoke and Sanity Testing?
5648
Which testing enables the tester to evaluate the software behaviour when exceptions occur?
5649
Which is not true in context of Decision Tree?
5650
Which testing is performed with Planning and Documentation?
5651
Which testing cannot be performed on first build of the software?
5652
Which testing focuses on heavily testing of one particular module?
5653
7n test cases are generated in which case of Boundary Value Analysis?
5654
A tester is executing a test to evaluate and it complies with the user requirement for a certain field be populated by using a dropdown box containing a list of values, at that time tester is performing __________ .
5655
Which of the following is / are not use for the Usability Improvement of the website?
5656
Test cases are created in which phase?
5657
Which is not true?
5658
The expected results of the software is _________________.
5659
Testing beyond normal operational capacity is __________.
5660
Verification and Validation uses __________.
5661
Which Testing is performed first?
5662
Bug status is set to postpone due to ________.
5663
End result of Software Requirement Analysis is ________.
5664
A test technique that involves testing with various ranges of valid and invalid inputs of a particular module or component functionality extensively is ___________.
5665
When an expected result is not specified in test case template then ___________.
5666
Requirement Engineering is not concern with ____________.
5667
Do you agree project management is an isolated discipline being used by only a few specific industry sectors?
5668
If you are only allowed one tool to manage a project, which of the following would you choose?
5669
What most distinguishes projects from day-to-day operation?
5670
Why is Habbitat for Humanity different from other international projects of it's kind?
5671
Why was Glasgow Caledonian Universitys New York Campus unsuccessful
5672
What was the main reason for the failure of the Daimler-Chrysler merger?
5673
"This revolves around the degree to which societies can exercise control over their impulses and desires." Is which Cultural Dimension from Hofstedes Theory?
5674
"This dimension expresses the degree at which less powerful members of society accept and expect the fact power is distributed unequally." Is which Cultural Dimension from Hofstedes Theory?
5675
Which one of these is NOT a cost of utilising technology?
5676
Projects in warmer climates may mean the project manager has to plan around the heat and humidity that could occur. What kind of project management challenge is this?
5677
What project management factor is “Ramadan and Eid and daily prayer times in certain counties need to be considered”
5678
A way of identifying cultural differences was created by which psychologist:
5679
International projects often face many sharp changes. The reasons are often due to the large competition on global markets, and that there are many parties involved within the project is an example of what project management challenge?
5680
Operating using different currencies along with taxation issues, local inflammation rates, profit repatriation problems are an example of which international project characteristic?
5681
____________ deal with dedicated areas they manage on behalf of the project manager.
5682
_________ is the group (or individual) using the capital of the owner in order to produce the product/service or results the owner would like to have
5683
"These organisations are involved in large and small scale operations around the world to help make a difference globally" is an example of which international project operation?
5684
Which of the following is true of Practice Tests
5685
The lessons learned register is which of the following?
5686
The Scope Baseline is described correctly by which of the following?
5687
What is CPI?
5688
What is Earned Value Management
5689
Which is true of the PMI Code of Ethics and Professional Conduct?
5690
Net Present Value is correctly described by which of the following?
5691
Which of the following is an Enterprise Environmental Factor
5692
In Maslow's hierarchy of needs, self-actualization means self-fulfillment, growth and:
5693
In which motivation theory do hygiene factors play a part?
5694
Out puts from the initiation process includes:
5695
As the project manager you will be required to report periodically to upper management on the progress of the project. What item below will you require to report your progress as the basis for the budget ,schedule ,resource allocation and scope definition.
5696
You have negotiated a major deliverable with a contractor several of your colleagues have utilized in the past without problems. Its is critical the contactor meet the December 4th deliverable.this is an example of :
5697
What is the Delphi technique?
5698
Which of the following Human Resource process generates Roles & Responsibilities :
5699
Which of the following is not correct:
5700
Crashing, and Fast tracking are techniques used in the following process:
5701
Group brainstorming encourages all of the following except:
5702
Which of the following models of conflict resolution allows a cooling off period, but seldom resolves the issue in the long term?
5703
A Project Manager is at the project kick-off meeting. He confidently states the vision and mission for the project. This PM is exhibiting the following leadership style:
5704
The terms of union contracts are considered ______________ in your project plan.
5705
When is the BEST time to have project kickoff meetings?
5706
Which of the following is NOT a characteristic of the Project Management Plan?
5707
You are managing a software project. During a walkthrough of newly implemented functionality, your team shows you a new feature that they have added to help make the workflow in the product easier for your client. The client didn’t ask for the feature, but it does look like it will make the product easier to use. The team developed it on their own time because they wanted to make the client happy. You know this change would never have made it through change control. What is this an example of?
5708
You are the project manager for a railroad construction project. Your sponsor has asked you for a forecast for the cost of project completion. The project has a total budget of $80,000 and CPI of .95. The project has spent $25,000 of its budget so far. How much more money do you plan to spend on the project?
5709
Which of the following is NOT an input to Perform Quality Control?
5710
Which is the BEST definition of quality?
5711
Which of the following is not a tool or technique of the Perform Quality Control process?
5712
Which enterprise environmental factor defines how work is assigned to people?
5713
In which plan do you define the processes that will be used to keep people informed throughout the project?
5714
When are the most expensive defects most likely to be introduced into a product?
5715
Which is the BEST definition of quality?
5716
When do you perform stakeholder analysis?
5717
Which of the following is NOT a source of information about specific project constraints and assumptions?
5718
Adam is a project manager on a software development project. About halfway through development, his team found that they had not estimated enough time for some of the technical work they needed to do. He requested that the new work be added to the scope statement and that the time to do the work be added to the schedule. The change control board approved his change. What’s his next step?
5719
Which of the following shows roles and responsibilities on your project?
5720
Which of the following is NOT true of obtaining project plan approval?
5721
Which of the following is not a feature of a project?
5722
Your IT Company is responsible for making software virus programs. You are responsible for managing both individual product releases and co-ordination of multiple released over time. Your role is that of a :
5723
What are the 4 stages of team development?
5724
Which type of leadership is best suited for optimizing team performance in projects?
5725
All of the following are contract types except:
5726
A narrative description of products or services to be supplied under contract is called ?
5727
A Project manager would find team development the most difficult in which form of organization ?
5728
Which of the following contracts should you use for projects that have a degree of uncertainty and require a large investment early in the project life cycle?
5729
What is one of the most important skills a project manager can have?
5730
Project managers have the highest level of authority and the most power in which type of organizational structure?
5731
Project managers have to assess the risks that may affect a project.
5732
An independent relationship must exist between the attribute that can be measured and the external quality attribute.
5733
Identify the sub-process of process improvement
5734
Which of the following is incorrect activity for the configuration management of a software system?
5735
Quality planning is the process of developing a quality plan for
5736
Which of the following is/are main parameters that you should use when computing the costs of a software development project?
5737
A 66.6% risk is considered as
5738
The process each manager follows during the life of a project is known as
5739
Which of the following is not considered as a risk in project management?
5740
Which of the following is not project management goal?
5741
Which of the following activities are involved during the administrative closure of a project?
5742
Adam is managing a new project, and he has spent several days meeting with key project resources to review his procurements. What project process is Adam involved with if he tells his project team to close all inventory and contract management records to update the final procurement results?
5743
In order to ensure that all project deliverables are complete during project closure, a project manager needs to measure prior information from the previous phase closures. From the following list, select the documents the project manager would use and review to measure project scope and ensure completion of deliverables before considering the project closed.
5744
Dora has just taken over an IT project. This project was terminated six months ago due to a shortage of funds and resources. Dora wants to determine the reasons for the fund shortage as well as the situation with the incomplete deliverables. Of the following documents, which should Dora examine in order to determine the facts about her project?
5745
In a crime prevention software development project for a municipal organization, a steering committee is responsible for approving all deliverables before they are transferred to operations. This steering committee is made up of directors from three different municipal agencies. If the steering committee approves the transfer of deliverables with a 2-1 vote, which of the following statements is correct?
5746
Wilma is examining the data on her control chart. It shows four consecutive points above +3 sigma and three subsequent points below -3 sigma. If the lower and upper control limits are set at +-3 sigma, what should Wilma report as the status of the process?
5747
Which of the following processes describes the collection, measurement and distribution of performance information, and measuring the health of the project to identify project areas that require corrective or preventive actions?
5748
John has just finished the requirements documentation including the deliverable acceptance criteria to determine the success of the project in terms of the deliverables produced. A series of tasks are included in the criteria. Both John and the customer must perform this series of tasks in order to complete the acceptance and sign-off the final deliverables. Which of the following project processes would use these criteria to provide formal acceptance of the deliverables?
5749
Ryan Systems is in the 3rd week of a 5-week project to consolidate all of its data servers to a central location in its new data center. The amount of money spent on this project to date is approximately $80,000. The planned value for the move as of the 3rd week is $50,000. What is the status of the project at this time? Over budget
5750
If one standard deviation is equal to 0.02, what is the upper control limit in a control chart if the upper control limit is set at +2 Sigma?
5751
During project execution, the planned value, earned value and the actual cost all have identical values. In this scenario, which of the following statements best describes the status of the project?
5752
Clifford is managing a project to build non-nuclear components for nuclear weapons. His project team consists of scientists, engineers, designers, and technical experts with extensive backgrounds in their fields. In an effort designed to create a degree of trust among team members, Clifford has initiated a kickoff meeting with all team members. During this meeting, Clifford wants to clarify the project objective and learn about each team member's interests and levels of influence. In addition, he needs to assign the roles and responsibilities for each team member. In this scenario, Clifford's team is in which of the following stages?
5753
Earned value analysis can be used for measuring the project performance. Project managers use this analysis to plan for risks based on the actual cost, schedule and progress of the work. During the executing phase, if a project has negative values for the cost variance and the schedule variance, which of the following would most accurately represent the project's status?
5754
Project communication involves dissemination of information by various methods. Communication may be formal, informal, verbal, and nonverbal. Which of the following would define direct communication with peers?
5755
Which of the following are inputs to the Manage Stakeholder Engagement process?
5756
On a project schedule network diagram, leads and lags are used to define the relationships between activities. These leads and lags indicate either acceleration or delay, respectively, of the successor activity. If a team member on your project indicates FF+3 on the network diagram, what does that notation indicate?
5757
Earned Value (EV) for a new optic radar design project is calculated at $100,000 and the Actual Cost (AC) is $80,000. The Budget at Completion (BAC) is estimated at $200,000. What is the current CPI on this project?
5758
Earned Value (EV) for a new operating system design project is calculated at $300,000 and the Actual Cost (AC) is $280,000. The Budget at Completion (BAC) is estimated at $500,000. The project is progressing well from a budgetary point of view, since the CPI value is greater than one. What is the Estimate at Completion (EAC) if the future work of the project is performed at the budgeted rate?
5759
Which of the following are inputs to the Develop Project Management Plan process?
5760
In situations involving a large number of ideas on requirements provided by various stakeholders, a project manager must sort, review and analyze those ideas. Which of the following tools can be utilized to accomplish this?
5761
Stakeholder management is a critical aspect of managing a project. In order to manage stakeholder expectations, the project manager must come up with a strategy. One technique that can be used to develop this strategy is the ______________________.
5762
An office furniture manufacturing company has initiated a project to computerize and automate some of their manufacturing process systems. The manufacturing personnel are not happy with this idea, and they are afraid they may lose their jobs because of the automation. As the project manager, what would your first step be?
5763
In a phased project, phase end meetings are used to sign-off on the deliverables associated with that phase. These phase end points typically provide a good opportunity to evaluate the progress and performance in that phase. Which of the following terms is synonymous for phase end?
5764
Since the levels of both cost and risk vary throughout the project life cycle, which of the following statements is true?
5765
Dave is managing a new project to create a radio-operated model plane. The project budget is set at $200,000 and the project must be completed within six months of the starting date. The initial document authorizing this project and giving Dave the authority to apply organizational resources to the project activities is called _______________.
5766
You are three months into a six month project. Assume the budget burn rate is constant. The budget at completion (BAC) is $120,000. AC = $65,000. The SPI = 1.2. What is the CPI of this project? (Round to 2 decimal places)
5767
Several stakeholders on the project have been questioning the effectiveness of some of the technical team. While the work is proceeding according to plan, some of the stakeholders are not satisfied with the work delivered to date, even though it meets requirements specifications. You have held several meetings with the stakeholders to try to get to the root cause of the problem. With some of the technical team present at these meetings, it becomes obvious that some of the stakeholders have had great difficulty in describing what they want. As a result, some of the delivered product doesn't meet stakeholder expectations. Currently your CPI is 1.3 and the SPI is .89. What is your largest concern right now?
5768
Management Contingency Reserve is identified in which process
5769
A particular project in the domain of civil construction requires that every on-site worker be insured. Which of the following inputs BEST conveys this requirement to the Cost Estimation process so that the insurance cost is estimated and subsequently budgeted?
5770
CPI is 1.2, SPI is 1.1. Four months later CPI is.91 and SPI is .86. The most likely reason for this change is:
5771
You are having a discussion with the key stakeholder about the best estimating method to use for the upcoming project. You argue for what provides the best team buy-in, while your stakeholder argues for a bottom-up estimate. What is the real issue?
5772
What is a basis of estimate and how does it apply to Earned Value calculations?
5773
Which of the following is not needed to generate a schedule performance index (SPI)?
5774
Cost variance is computed by
5775
Reserve Analysis involves:
5776
Your team is reviewing the project activities and has started to estimate the durations of the work packages identified in the WBS. Some of these work packages and activities have significant uncertainty associated with them for which the team has created contingency buffers. The tool and technique that is used for this process is called:
5777
The customer has demanded that you reduce the schedule by three weeks. What does this mean in terms of the Project schedule?
5778
The customer has asked that you reduce activity D by 2 weeks. What impact does this have on the schedule?
5779
What is the critical path of the network described above?
5780
Your project has produced an optimistic estimate of 25 weeks, a pessimistic estimate of 95 weeks, and a calculated PERT of 40 weeks. What is the range of completion of the project with a 95% confidence factor?
5781
Crashing a network schedule works only when________________________.
5782
The project optimistic estimate is 10 weeks and the pessimistic estimate is 40 weeks. What is the standard deviation of the estimate?
5783
Your project is experiencing resource constraints at certain times in the project timeline, requiring you to adjust start and finish dates on the schedule. What tool is best to use in this situation?
5784
The blueprints for the new construction projects have been completed and construction is ready to begin. While the organization was thinking about erecting a modular structure, they decided on a more traditional approach. The foundation will be poured and cured before the framing begins. This is an example of:
5785
When performing the scope control process, which of the following statements is correct?
5786
The validate scope process can occur at the end of the project or at the end of a project phase. What is used to validate the scope of the deliverables?
5787
Who creates the scope baseline?
5788
What is scope decomposition?
5789
Validate Scope defines a process that
5790
Work Performance Measurement is an output of which process:
5791
Which of the following can be BEST described as a characteristic of Work Package?
5792
Project Charter is an input to all of the following processes EXCEPT
5793
All of the below are inputs to Define Scope process EXCEPT
5794
Which of the following is not true about project charter?
5795
Your project team is well underway with the construction of the product of the project. Some of the work has progressed and some deliverables have been reviewed by key stakeholders. During a deliverables review, one of the stakeholders found a discrepancy in one of the deliverables that needed to be addressed immediately. The team reviewed the stakeholder’s issue and agreed that some action needed to be taken to bring the deliverable back into compliance. The best definition for this activity is called:
5796
The key output of Direct and Manage Project Work Process is which one of the following
5797
Which of the following is not included in a project charter?
5798
Which of the following is not a process in the Project Integration Management process group?
5799
The difference between a configuration management system and a change control system is?
5800
All of the following actions occur in the Direct and Manage Project Work process except which of the following?
5801
The project management plan is complete and is ready to be baselined. However, a key stakeholder just discovered a critical omission and requests an adjustment to the PM plan. What should you do next as the project manager?
5802
Which of the following is true about change requests that result in corrective or preventive actions?
5803
Which process formally authorizes the project?
5804
In the Monitoring and Controlling process group, one of the primary goals of that group is to monitor and control the project work. What is the second equally important, major goal of the monitoring and control process?
5805
The team has completed all design work and is ready to start creating a product of the project. There are construction and IT elements in this project, and the project manager has leaned heavily on the subject matter experts in the organization for their technical expertise and know-how. You have determined that some of the work needs to be contracted to an external vendor who has the necessary expertise to deliver what is needed for the project. You are in the process of selecting a vendor. What process group are you in?
5806
All the following happen in the Initiating process with the exception of:
5807
What is a synonym for 'progressive elaboration’?
5808
Processes that provide the project team with insight into the health of the project and identifies any area requiring additional attention are performed in _______________.
5809
Raw observations and measurements taking during the performance of project activities is defined by PMI as _____________________?
5810
You are a project manager in an organization with a strong PMO. One of the newly hired project managers told you that he has been a PMP® since 1998. While perusing the PMI website looking for some standards documentation, you happen to do a lookup on this person and find out that they are not in the PMI repository of PMP®s in good standing. What do you do?
5811
There are many reasons for creating a lessons learned document in a project. All of the following represent reasons why you would create a lessons learned document with the exception of:
5812
You are just initiating a project for your organization. Which of the following is a true statement regarding the Initiating process?
5813
The Planning process group touches all ten of the key knowledge areas in that planning has to occur in each of these areas. Which of the following is not part of the planning process?
5814
Validate Scope is part of what process group?
5815
Objectives of the DP process include ensuring the project has authority for which of these?
5816
Who approves the Project Initiation Documentation?
5817
The purpose of the Initiating a Project stage is which one of these?
5818
Who approves an End Project Report?
5819
What are the following objectives of? To obtain Project Board agreement on quality expectations To communicate agreed quality expectations to stakeholders To establish a baseline for the project's quality controls
5820
Which role has to be independent of the Project Manager?
5821
Which of these are in the four steps in product-based planning?
5822
Which of the following need not be included in a Product Description?
5823
Which of the following are event-driven controls?
5824
Define the operational environment into which the project must fit is part of what?
5825
Following is (are) the tool(s) for changing a process
5826
Controlling the changes in the project may affect
5827
“Devising and maintaining a workable scheme to accomplish the business need” is
5828
Following are the characteristics of Project Mindset.
5829
Following is (are) the component(s) of risk management
5830
Each component of the software product is separately estimated and the results aggregated to produce an estimate for the overall job.
5831
Tool used for comparison of the proposed project to complete projects of a similar nature whose costs are known.
5832
The entire process of a project may be considered to be made up on number of sub process placed in different stage called the
5833
In the initial stage of the project the probability of completing the project is ___ .
5834
The probability of completing the project can be estimated based upon the ____
5835
-Resorce requirement in project becomes constant while the project is in its _____ progress stage.
5836
Five dimensions that must be managed on a project
5837
Project performance consists of
5838
Design phase consist of
5839
Following are the phases of Project Management Life Cycle. Arrange them in correct order Design, 2. Marketing, 3. Analysis and evaluation, 4. Inspection, testing and delivery
5840
Following is(are) the responsibility(ies) of the project manager.
5841
The project life cycle consists of
5842
Developing a technology is an example of
5843
Resources refers to
5844
A ____ is a set of activities which are networked in an order and aimed towards achieving the goals of a project.
5845
Shenhar 's Second dimension of classification covers
5846
PM should build and maintain a solid
5847
A PM with reasonable technical competence seems to be associated with project
5848
PM learns by experience, but a wise PM learns from the
5849
At project completion phase, obstacles tend to be
5850
Breaking problems into smaller parts to understand parts better and solve problem is called
5851
PM must also make trade-offs between project progress and process, i.e.
5852
Environment of a system is defined as everything outside system that receives system outputs from it or delivers
5853
Shenhar (1998) classifies projects across dimensions of
5854
In process being managed, functional manager?s knowledge must be in the
5855
Incomplete information can blind PM to an incipient crisis, just as excessive information can desensitize PM to
5856
Functional manager uses analytic approach and PM uses the
5857
If a PM directs more than one project, he or she must make trade-offs between
5858
Running a project requires constant selling, reselling, and explaining project to
5859
Unique demand on a PM is acquiring adequate physical resources and
5860
PM must make trade-offs between project goals of ancillary goals and
5861
A person who helps people overcome problems regarding technical and functional issues is a
5862
During initialization, when project is being planned, most important goal of achievement is
5863
At design phase, project builds momentum, grows, and operates at
5864
Problematic cultural issues include group?s perception of time and manner of
5865
A single descriptor could be used to characterize project management, adjective would be
5866
PM must negotiate with functional department managers for desired
5867
In order to meet demands of job, project manager must be a highly skilled
5868
Functional managers have little or no direct responsibility for the
5869
If support of top-management is weak, future of project is clouded with
5870
A PM must be able to interpret technical needs and wants of client and senior management to the
5871
First credibility required by PM is known as
5872
Analytic approach is merely inadequate way for understanding
5873
Responsibility to parent organization is also a key role of
5874
Motivation among people problems are often less severe for
5875
A wide-ranging method for addressing problems that considers multiple and interacting relationships is called
5876
Project Manager is responsible for organizing, staffing, budgeting and
5877
From initiation of project to its termination, crises appear without
5878
Arranging finance, contracts, planning, procurement and quality is task done by
5879
Project manager should be more skilled at
5880
Maintaining a balanced, positive outlook among team members is a delicate job of
5881
Projects can rapidly get into deep trouble if team members hide their
5882
PMI updated and approved Code of Ethics for project managers in
5883
A system can be taken as a set of interrelated components that accepts inputs and generates outputs in a
5884
Every project on which PM has worked, whether as project manager or not, is a source of
5885
"corporate culture" within organization, or even project is known as
5886
At inception of project, "fires" tend to be associated with
5887
Adoption of systems approach is crucial for the
5888
Problem-oriented people tend to learn and adopt whatever problem-solving techniques appear
5889
Managers, who are administratively responsible for deciding how something will be done to accomplish task, are known as
5890
Projects are only as successful as degree to which project manager is an effective
5891
According to Shehnar, as system complexity increases from "assembly" to "system", style progresses from
5892
Precise nature of trade-offs varied depending on stage of project
5893
Demands of uniqueness in a PM concerned areas are
5894
A unique role of PM is to contrast it with that of a functional manager in charge of one of a firm?s functional departments such as
5895
Resources initially budgeted for a project are frequently
5896
Scope creep affect not only project but PM as well, to make trade-offs to keep project
5897
Discipline-oriented individuals tend to view problem through eyes of their
5898
A ratio to evaluate a proposed course of action is known as
5899
Great number of fairly small, short-term projects when managed by an experienced PM, serve a purpose
5900
Project success is dependent on support from parent organization's
5901
PM is responsible for project, but functional managers will probably make some of fundamental and critical
5902
It is assumed that in order to ensure creativity, professionals require
5903
Main obstacles clustered around Project completion phase includes
5904
Every decision PM makes limits scope of
5905
Project's success is result of a delicate balance of power between
5906
Functional manager should be more skilled at
5907
To be useful, PM's experience must be generalized and
5908
Nature of interrelationships between components in a system defines the
5909
Functional manager is a direct, technical supervisor, whereas project manager is
5910
A Code of Ethics for project managers was created by the
5911
Many firms have a wide variety of types and sizes of
5912
Most effective team members have high quality technical skills, Strong problem orientation and
5913
Projects require cooperation by individuals and groups of firm. However, geographical or organizations differences doesn't matter, but
5914
Analytic method focuses on breaking components of a system into
5915
A Code of Ethics for project managers was created by PMI in
5916
Second set of trade-offs concerns sacrificing smoothness of running project team for
5917
Compared to a functional manager, a PM is a
5918
Best person to select as PM is one who will get the
5919
PM needs credibility of kinds:
5920
An alternative plan for action if expected result fails to materialize is known as
5921
An ability to put many pieces of a task together to form a coherent whole, is job of
5922
At project completion phase, obstacles tend to be clustered mainly around
5923
Shenhar 's first dimension of classification covers
5924
Project environment includes economic, political, legal, and
5925
A project manager in public sector, may easily become embroiled in ethics concerning issues as
5926
Second credibility required by PM is known as
5927
Changes in required project performance is better known as
5928
Institutions of a culture make up society's
5929
PMP stands for
5930
Everything outside system that delivers inputs or receives outputs from system is known as
5931
In a highly structured social class society, it is difficult to practice
5932
PM should adopt a systems approach to
5933
Language is a particularly critical aspect of
5934
Microcultures are to differentiate corporate from broader national or
5935
Boundary of inputs and outputs differentiates system from its
5936
Most of people needed for a project must be "borrowed." by PM from
5937
Key to solving a problem is that PM should make open communications between PM and team members about
5938
On international projects, PM (or PM?s senior management) can expect to deal with bureaucracy at
5939
At project completion phase, high-priority goal is
5940
Common characteristics of effective project team members includes high-quality technical skills, political sensitivity and
5941
Technical plans to accomplish project have been translated into a
5942
Need to preserve some balance between project time, cost, and performance is in
5943
Technology of a culture includes such things as the
5944
PM must perceive sufficient technical knowledge to
5945
Projects provide an excellent growth environment for future executives and for developing
5946
Just like cultures, microcultures may vary from
5947
PM will also be involved in making choices that require balancing in
5948
Chances for successful completion of a multidisciplinary project are
5949
_________ control displays current directory with any sub directories and allows the user to change directly.
5950
__________ method is used to retrieve the stored text from the clipboard
5951
__________ is property is used to hide the content in textbox with some symbols.
5952
The __________ property is used in VB for maximum form at run time
5953
The _______ function returns a string stored in a variant data type.
5954
________ method is used to clear the contents of MSHFlexGrid control
5955
An object datatype can store _______ bytes.
5956
In visual basic the declaration of variables is done by _____ key word
5957
The ______ is a tool used for both the Input and output purpose.
5958
________ method removes a dialog box from view
5959
Form_Mouse Down( ) procedure is executed when any mouse button is clicked in a free area of the ______.
5960
Frame Control acts as a _________
5961
__________ statement enables us to trap runtime error.
5962
_______ indicates whether a particular condition is on or off.
5963
Extension of ActiveX designers ____________
5964
__________ displays current directory with any subdirectories and allows the user to change directory.
5965
The _________ allows direct exit from a For loop, Do loop, Sub procedure, or Function procedure.
5966
________ is a built in function to return lower bound of an array
5967
The default datatype for VB is ___________
5968
__________ do not return a value.
5969
__________ cannot be declared in a form or class module.
5970
A _______control in visual basic is used to create applications that present information in rows and columns.
5971
MDI stands for _________
5972
_______ control executes the timer events at specified intervals of time.
5973
A __________ variable is one that is declared inside a procedure.
5974
________ loop repeats a group of statements for each item in a collection of objects or for each element of an array.
5975
________ is the process of finding and removing errors
5976
The window in which the individual documents are displayed is called ____________window.
5977
_____ array size can be changed at run-time.
5978
________ function returns the intervals between two dates in terms of years, months or days.
5979
The ________ object is a stored query definition, which is a precompiled SQL statement.
5980
The code in an application can be broken into logical components by _______ process.
5981
__________ is a collection of files.
5982
The default property for a text box control is __________
5983
In visual basic ______ is the extension to represent project file.
5984
Variables are named storage locations in memory, the value of which does not change during program __________
5985
__________ is a data type that can be used to declare a text of maximum 10 million characters.
5986
The function procedures are ___________ by default.
5987
_________ is a method which moves the focus to the specified control or form.
5988
The variables that does not change the value during execution of program is ____
5989
__________ function is used to return a copy of a string without leading spaces
5990
In Visual Basic, a variable name cannot be more than __________ characters.
5991
________ is used for finding out about objects, properties and methods.
5992
Visual Basic is a tool that allows you to develop application in ______
5993
How to take request using get bmethod?
5994
In the Select Case statement, which case is used for unknown cases?
5995
Which browser has built-in support for executing VBScript?
5996
VBScript is developed by
5997
VBScript was launched in
5998
Extension of ActiveX designers
5999
Which VBScript function converts an input string to all lowercase?
6000
State whether the statement true or false. i) Function procedures are public by default. ii) Function procedure return values whereas sub procedures cannot return a value to the calling procedure.
6001
What does the Option Explicit directive do?
6002
Type casting in VB.Net is implemented by means of ____________ statement.
6003
Where to Put the VBScript code
6004
How will you trim the leading as well as trailing spaces of a string using VBScript?
6005
Every optional argument in the procedure definition must specify a _________ value which must be a constant expression.
6006
Windows Server AppFabric enables Web data caching for application data and provides managed services using ___________Foundation and Windows Communication.
6007
Which of the following can be used to create distributed systems based on SOA?
6008
Which of the following is used to negotiate the exchange of information between a client and the service?
6009
The _________ portion of Azure AppFabric is a claims access control system that provides a token-based trust mechanism for identity management.
6010
Which of the following was formerly called Microsoft .NET Services?
6011
A particular set of endpoints and its associated Access Control rules for an application is referred to as the _______________
6012
The ___________ method converts an OLE automation date value to a DateTime Instance.
6013
The member "clear" of the Array class that sets a range of array elements to zero, false or null reference is a _____________ method.
6014
The corresponding .Net FCL type for Short is ___________.
6015
Which of the following is a version of Hyper-V that runs on Windows Server 2008?
6016
Which of the following element in Azure stands for management service?
6017
Azure Storage plays the same role in Azure that ______ plays in Amazon Web Services.
6018
The _____ model does not offer a model for source code reuse.
6019
Which of the following element is a non-relational storage system for large-scale storage?
6020
Which of the following element allows you to create and manage virtual machines that serve either in a Web role and a Worker role?
6021
A _________ role is a virtual machine instance running the Microsoft IIS Web server that can accept and respond to HTTP or HTTPS requests.
6022
Which of the following web applications can be deployed with Azure?
6023
What does IPsec in the Azure platform refer to?
6024
Which of the following standard does Azure use?
6025
The ______________ method converts the value of this instance to a double representing the OLE automation date.
6026
Which of the following is a pure infrastructure play?
6027
The ___________is a systematic class framework used for the development of system tools and utilities.
6028
Azure is Microsoft’s ___________ as a Service Web hosting service.
6029
Which of the following is based on Microsoft Sharepoint?
6030
The _______________ class provides static methods to start, stop, or filter Windows messages in an application.
6031
Which of the following is based on Microsoft Dynamics?
6032
_________ are interactive objects that you place in dialog boxes or other windows to carry out user actions.
6033
_______ Live Services can be used in applications that run in the Azure cloud.
6034
Database marketplace based on SQL Azure Database is code-named ________
6035
The ______________________ group classes according to their common services.
6036
Which of the following is also known as Compute?
6037
The ___________________________________ does not describe inherited member functions, inherited operators, and overridden virtual member functions.
6038
Which of the following service creates an application hosting environment?
6039
A ___________ performs invisible tasks even if you write no code.
6040
Using a ________ variable does not enable us to create read-only properties that are often required by a class.
6041
Which of the following database should be used for a solution that has a very high availability?
6042
Amazon Relational Database Service is a variant of the _______ 5.1 database system.
6043
---------- is used to step through each line of code as it executes, including calls to other function?
6044
Which of the following can be considered as a distributed caching system?
6045
Which of the following is relational database service provided by Amazon? a) SimpleDB
6046
Data stored in __________ domains doesn’t require maintenance of a schema.
6047
Is the Class type in VB.NET a value type?
6048
CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.
6049
Which of the following is the best to retrieve Read-Only, Forward-only stream of data from database?
6050
Which of the following is also referred to edge computing?
6051
Which of the following is not the member of System.Collections?
6052
How do you limit implicit type conversion in VB.NET?
6053
Which of the following tool is used for measuring I/O of your systems to estimate these transaction costs?
6054
Which of the following statement is wrong about Amazon S3?
6055
Which of the following object is used by the DataAdapter to retrieve the data from database?
6056
Which of the following operation retrieves the newest version of the object?
6057
Which of the following can be done with S3 buckets through the SOAP and REST APIs?
6058
Which of the following namespaces is used to access "computer name" and its IP address in VB.NET?
6059
Amazon ______ cloud-based storage system allows you to store data objects ranging in size from
6060
Any project that compiles to an EXE or DLL files produces an assembly in .NET?
6061
How many EC2 service zones or regions exist?
6062
Which of the following is a batch processing application?
6063
Which of the following instance has an hourly rate with no long-term commitment?
6064
Which of the following is a method for bidding on unused EC2 capacity based on the current spot price?
6065
Which of the following instance class is best used for applications that are processor or compute-intensive?
6066
AMIs are operating systems running on the _____ virtualization hypervisor.
6067
________ is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
6068
Which of the following uses an authentication device?
6069
Which of the following provides access for developers to charge Amazon’s customers for their purchases?
6070
What is CTS?
6071
Which of the following allows merchants to fill orders through Amazon.com fulfillment service?
6072
Which of the following is Amazon’s technical support and consulting business?
6073
Which of the following provides a bridge between a company’s existing network and the AWS cloud?
6074
Which of the following Loop structure does not supported by VB.Net?
6075
Which language is not a true object-oriented programming language?
6076
he ______________ method converts the value of this instance to a double representing the OLE automation date.
6077
Which of the following is an entry point method of VB.NET program?
6078
The _________________ enable us to pass data between a program and a class.
6079
Microsoft Windows uses a GUI environment. GUI (pronounced "gooey") stands for _______
6080
Which of the following is an online backup and storage system?
6081
Which of the following metrics are used to support Elastic Load Balancing?
6082
Which of the following is not correct about the value types and reference types in VB.NET?
6083
Which of the following is a Web service that can publish messages from an application and deliver them to other applications or to subscribers?
6084
Which of the following feature is used for scaling of EC2 sites?
6085
_____ allow custom items of information about a program element to be stored with an assembly’s metadata.
6086
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2?
6087
Visual Studio .NET provides which feature:
6088
Which of the following is a message queue or transaction system for distributed Internet-based applications?
6089
Which of the following is the central application in the AWS portfolio?
6090
A ___________ performs invisible tasks even if you write no code
6091
Which of the following accesss modifier specifies that one or more declared programming elements are accessible from within the assembly that contains their declaration, not only by the component that declares them?
6092
Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud?
6093
The default property for a text box control is
6094
Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis?
6095
Which of the following is a billing and account management service?Which of the following is a billing and account management service?
6096
Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
6097
Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?
6098
Which method will return the number of elements in an array?
6099
What is the value of the index for the first element in a VB.NET array?
6100
Which variable name uses a standard naming convention for module variables?
6101
How many return statements are allowed in a Function Procedure?
6102
Which of the following allows you to create instances of the MySQL database to support your Web sites?
6103
Which part of a function procedure declaration statement is optional?
6104
Which of the following is an edge-storage or content-delivery system that caches data in different physical locations?
6105
Which statement will send the value generated by a function procedure, called CalculateTax, back to the calling code?
6106
Which is a valid way to write a sub procedure declaration?
6107
Which is not an optional element of a sub procedure declaration?
6108
A sub procedure is valuable because it:
6109
Which is a valid way to write the procedure stub for an object’s default event?
6110
What happens when a parameter in a procedure is declared ByVal?
6111
Which of the following is an open-source platform that has been used to create Google Wave and Google AdWords?
6112
Which of the following service that provides offline access to online data?
6113
Which parameter is found in an event procedure?
6114
Which of the following system was replaced with Google Translate?
6115
From how many places in the code can a procedure be called?
6116
When using a procedure the calling code sends data via the:
6117
Google __________ is the most widely used Web traffic analysis tool on the Internet.
6118
The methodology where code is broken into small, logical procedures is called:
6119
Which of the following is a targeted ad service based on matching advertisers and their keywords to users and their search profiles?
6120
Which is a type of procedure found in VB.Net?
6121
Which event is activated when a RadioButton is selected?
6122
Which of the following is the smaller version of the GSA that stores 300,000 indexed documents?
6123
Which of the following can be deployed within an organization to speed up both local (Intranet) and Internet searching?
6124
It is an artificial language that can be used to control the behavior of a computer machine.
6125
Which of the following is a search service for online retailers that markets their products in their site searches with a number of navigations?
6126
It translates high level language instructions into machine code, line by line, as the program is being run.
6127
Which of the following gives statistical information on different search terms?
6128
It is the process of giving step-by-step instruction to a computer.
6129
Which of the following product allows users to create 3D models and share them with others?
6130
The program that supports the creation of application for wireless, Internet-enabled hand-held devices.
6131
Which of the following is photo-editing and management software?
6132
The Java and Visual Basic .NET belong to this type of programming language.
6133
Google _______ is a collection of applications and utilities under development and testing.
6134
Which of the following indexes content on your local drive for fast searches?
6135
It translates all high level instructions into machine code first before running the program.
6136
The control that is used to display text in other parts of the application.
6137
Which of the following is an online atlas and mapping service with mashups?
6138
Which of the following product searches Web by topics?
6139
The control that is used to accept input from the user.
6140
Which of the following creates a custom search utility for a particular Web site?
6141
It is collection of services and classes designed to simplify the application development.
6142
A window that lists the solution name, the project name and all the forms used in the project.
6143
It is a programming language that uses 0's and 1's.
6144
Which of the following is a payment processing system by Google?
6145
Which of the following google product sends you periodic email alerts based on your search term?
6146
It contains several items or controls that you can use in your applications.
6147
Dynamic content presented in Google _______ crawling isn’t normally indexed.
6148
It displays the properties that are associated with an object.
6149
Which of the following is not provided by “Deep Web”?
6150
It allows the user to design the user interface for an application.
6151
Which of the following protocol lets a Web site list in an XML file information?
6152
The process of writing, testing and maintaining computer programs.
6153
The control which we can click and release to perform some action.
6154
Based on PageRank algorithm, Google returns __________ for a query that is parsed for its keywords.
6155
Which of the following algorithm is used by Google to determine the importance of a particular page?
6156
Which of the following architecture is shown in the following figure?
6157
__________ tool is used to create business logic for your application.
6158
Which of the following is a WYSIWYG web builder?
6159
Which of the following technologies are used in LongJump’s PaaS?
6160
Which of the following object database has the ability to create rich data objects and create relationships between them?
6161
Which of the following lets you sort, aggregate, display, and format report information based on the data in your application?
6162
Which of the following instrumentation tool displays the real-time parameters of your application in a visual form in AppBase?
6163
Which of the following AppBase tool allows you to assign access rights to different objects in the system?
6164
__________ PaaS application delivery platform creates SOA applications that work on several different IaaS vendors.
6165
Which of the following programming language solves problems by acting on constraints and inputs?
6166
Which of the following module feature is provided by Drupal CMS?
6167
Point out the wrong statement related to the common characteristics of SOA.
6168
Which of the following environment best describes WorkXpress?
6169
Which of the following is based on the notion of information management and organization?
6170
Application frameworks provide a means for creating ________ hosted applications using IDE.
6171
What is the maximum no of dimension that an array can have in VB.NET ?
6172
How to concatenate two TextBoxes
6173
Scaling _____ indefinitely leads you to an architecture with a large number of servers
6174
Which of the following is used to evaluate your own cloud application’s network performance?
6175
_________ scaling allows you to use a virtual system to run more virtual machines.
6176
Which of the following type of Integrity ensures that each row can be uniquely identified by an attribute called the primary ?
6177
Which of the following factor can be considered to determine WAN Capacity?
6178
Which of the following packet sniffer was formerly called Ethereal?
6179
Private Sub Display_Click() Dim DA As String DA="RAMANUJA RAO P#ASM-1#Asthana Mandapam#123" astrsplititems = Split(DA, "#") For intX = 0 To UBound(astrsplititems) List1.Items.Add "Item(" & intX & "): " & astrsplititems(intX) Next Close #1 End Sub Click the Display Button Output is
6180
Which of the following utility is used to monitor traffic in Windows?
6181
Which of the following is not the aspect considered for network capacity?
6182
Which class is used to run the EXE application file in VB.NET
6183
How does VB.NET instantiates the .NET object
6184
How many aspects need to be considered while assessing network capacity?
6185
Which command is used for saving the transaction ?
6186
Web.Config file is of the type
6187
Which of the following cloud computing infrastructures automatically manage your capacity?
6188
Which SQL statement is used to extract data from a database ?
6189
Which of the following instance has the lowest performance in AMI?
6190
EC2 Compute Unit is the equivalent of a _____ GHz 2007 Opteron or 2007 Xeon processor.
6191
Can I send keystrokes to a DOS application from VB.Net?
6192
Which of the following instance has an API name: m2.4xlarge?
6193
system databases stores server specific configuration information, including authorized users, databases, system configuration settings and remote servers ?
6194
Consider the emp table having columns empno, ename Which of eth following SQL query fetches empno that occur more than twice in the emp table
6195
Which of the following instance is used by default in AMI?
6196
Which SQL statement is used to update data in a database ?
6197
Which of the following instance has 68.4GB of memory and 26 EC2 Compute Units?
6198
Which of the following performance analysis tool lets you save its state for Windows?
6199
VbOk,VbCancel,VbAbort are all the enumerated members of
6200
Which is faster?
6201
A master/slave MySQL replication architectural scheme is used for ________ database applications.
6202
What does WnsP represent in the following formula? (WT = Σ(WSnP WSnV))
6203
Which of the following is often a bottleneck in Web servers?
6204
What is the significance of Shadowing a method in VB.Net ?
6205
Which of the following application can replay requests to Web servers?
6206
Which SQL statement is used to delete data from a database ?
6207
How to determine if a variable has not been initialized in VB.NET?
6208
Which of the following resource(s) represents the bottleneck in the current system that limits the system’s performance?
6209
Which of the following aggregate functions returns a row count as an integer?
6210
Which are the exceptions that VB.Net supports ,C# & other languages doesn’t support ?
6211
How are the parameters referenced by default in VB.NET?
6212
A server at 10% load is having 308 watts power and at 50% load is having 451 watts of power, saving is
6213
A query within a query where the inner query is evaluated for each row in the outer query is called
6214
In addition to power-supply, Barroso and H?lzle in 2007, stated that goal for entire server should be
6215
Networking infrastructure, which can be scaled to 100,000 ports or 1 petabit/sec of
6216
A _____ column cannot contain NULL values since it is used to uniquely identify rows in a table.
6217
What is the output : dim i,j as integer for i=1 to 10 for j=1 to 5 msgbox i next j next i
6218
The Visual Basic Compiler is
6219
What is the maximum size of a row ?
6220
Which types of joins let you retrieve nonmatching data?
6221
Which of the following testing seeks to answer maximum load that my current system can support?
6222
To find out the role of the logged in user, you’ll use
6223
Which of the following is available as both open source and commercial version?
6224
Which of the following is not a commercial third-party Web site performance monitor?
6225
Which of the following is used as an Open source distributed monitoring system?
6226
What will be the result of the following statement ? SELECT ROUND(689.89, -1, 1)
6227
Which of the following tool is used for Web site monitoring service in LAMP?
6228
An Employee Table Having Data in the sequence Employee No [numeric], Employee Name [varchar(100)], Emp Date of Birth [date&time], Designation [varchar(50)], Department [varchar(50)] to Insert data by using Query displayed in textbox1 = 123 textbox2 = MURTHY textbox3 = 12/12/1980 textbox4 = Engineer textbox5 = Data Center Which Query is Used
6229
Which of the following tool captures time-dependent performance data from resources such as a CPU load?
6230
Which of the following command is used to display the level of CPU activity in Linux?
6231
Which of the following is the hardest factor to determine?
6232
Which of the following is a critical step in capacity planning?
6233
Which of the following RDBMS is used by LAMP?
6234
Which of the following is used as a substitute for PHP as a scripting language in LAMP?
6235
Which of the following is one of the major categories of Amazon Machine Instances that you can create on the Amazon Web Service?
6236
What does L in LAMP stands for?
6237
What is the relation of the capacity attribute to performance?
6238
How to add the item to combo box if it names cmb
6239
Which of the following is a potent cloud-building technology?
6240
Which keyword refers the parent of the current object
6241
Which of the following is the most widely used technique for abstraction?
6242
Which part of the .NET Framework provides Context for managed code?
6243
Which of the following application delivery platform’s main focus is on desktop installations?
6244
How do you join strings in VB.NET
6245
Which of the following layer serves as the mediator for file I/O, the memory I/O, and application calls and response to DLLs?
6246
How do you achieve interface implementation in VB.NET?
6247
An Employee Table Having Data in the sequence Employee No [numeric], Employee Name [varchar(100)], Emp Date of Birth [date&time], Designation [varchar(50)], Department [varchar(50)] to Retrive data by using query select * from employee displayed in textbox1, textbox2, textbox3, textbox4, textbox5
6248
What does msgbox shows for s value: dim s as string s=mid(now,3,2) msgbox s
6249
_______ creates a container that encapsulates the application and all the application’s dependencies within a set of files.
6250
How To Get The Server Date & Time and Displayed in a Label
6251
The __________ solution creates a virtual application appliance as an architectural layer between the Windows or the UNIX operating system and applications.
6252
Simple Cloud API is useful for applications written in ____________
6253
Expansion of SQL?
6254
What is the symbol for creating temporary Table in SQL Server.
6255
Which of the following vendor is offering optimization appliances for VMware infrastructure?
6256
Classes from which namespace will have to be used to read or write to a file?
6257
Which of the following runs on Xen Hypervisor?
6258
Which statement shows Boxing?
6259
AMI imaging service is provided by Amazon for ______________
6260
_________ is used by Amazon Web Services to store copies of a virtual machine.
6261
Which of the following is an open standard for storing a system image?
6262
Which of the following is a comparison operator?
6263
A _______ image makes a copy or a clone of the entire computer system inside a single container such as a file.
6264
Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address?
6265
________ virtualization abstracts networking hardware and software into a virtual network that can be managed
6266
Which of the following product migrate files from one datastore to another datastore?
6267
Which of the following allows a virtual machine to run on two or more physical processors at the same time?
6268
_______ is a service that creates and manages virtual network interfaces.
6269
Which of the following is a service that aggregates servers into an assignable pool? a) VMware vStorage
6270
Which of the following operating system support operating system virtualization?
6271
In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
6272
In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware.
6273
Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V?
6274
Which of the following will be the host operating system for Windows Server?
6275
Which of the following is Type 2 VM?
6276
Which of the following is Type 1 Hypervisor?
6277
An operating system running on a Type ______ VM is full virtualization.
6278
Which of the following provide system resource access to virtual machines?
6279
Which of the following is another name for the system virtual machine?
6280
A ______ is a combination load balancer and application server that is a server placed between a firewall or router.
6281
Which of the following is a more sophisticated load balancer?
6282
Which of the following network resources can be load balanced?
6283
Which of the following software can be used to implement load balancing?
6284
The technology used to distribute service requests to resources is referred to as _____
6285
Which of the following type of virtualization is also characteristic of cloud computing?
6286
_______ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.
6287
________ is used for merchant transactions under the Payment Card Industry Data Security Standard.
6288
________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
6289
Which of the following can be used for the banking industry?
6290
_________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.
6291
The body of a For…Next loop in Visual Basic will always be executed once no matter what the initial and terminating values are. duplicate question?
6292
The value of the control variable should not be altered within the body of a For?Next loop.
6293
Which of the following is provided by Identity as a Service?
6294
_________ is one of the more expensive and complex areas of network computing.
6295
The input to a user-defined function can consist of:
6296
Function procedures can invoke other Function procedures.
6297
The input to a user-defined function can consist of one or more values
6298
Which of the following is a valid Visual Basic conditional statement? A. 2 < n < 5 B. 2 < n Or < 5 C. 2 < n Or 5 D. (2 < n) Or (n < 5) Ans: D 32. The three main logical operators are ________, _________, and ________. A. And, Or, Not B. And, Not, If C. Or, Not, If D. False, And, True Ans: A 33. Which value for x would make the following condition true: x >= 5
6299
Which of the following expressions has as its value the words “Hello World? surrounded by quotation marks?
6300
The following lines of code are correct. If age >= 13 And < 20 Then txtOutput.Text = "You are a teenager." End If A. True B. False Ans: B 26. Given that x = 7, y = 2, and z = 4, the following If block will display "TRUE". If (x > y) Or (y > z) Then txtBox.Text = “TRUE” End If
6301
What will be the output of the following statement? txtBox.Text = FormatCurrency(1234.567)
6302
_______ is the assignment of a network identity to a specific MAC address that allows systems to
6303
To continue a long statement on another line, use:
6304
Which of the following arithmetic operations has the highest level of precedence?
6305
A variable declared outside of an event procedure is said to have class-level scope.
6306
Pseudocode is
6307
__________ authentication requires the outside use of a network security or trust service.
6308
Which of the following attribute should be unique?
6309
SaaS supports multiple users and provides a shared data model through _________ model
6310
Which of the following is a SaaS characteristic?
6311
Which of the following aspect of the service is abstracted away?
6312
Which of the following software can be used to implement load balancing?
6313
The technology used to distribute service requests to resources is referred to as _______
6314
Which of the following type of virtualization is also characteristic of cloud computing?
6315
_______ is used for merchant transactions under the Payment Card Industry Data Security Standard.
6316
Which of the following is a PCI CaaS service?
6317
_______ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
6318
Which of the following can be used for the banking industry?
6319
Which of the following is a man-in-the-middle type of service?
6320
Which of the following is an example of a vertical cloud that advertise CaaS capabilities?
6321
Which of the following is authorization markup language?
6322
The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.
6323
_______ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.
6324
Which of the following standard is concerned with the exchange and control of identity information?
6325
________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.
6326
Which of the following allows a distributed ID system to write and enforce custom policy expressions?
6327
Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider.
6328
Which of the following is provided by Identity as a Service?
6329
______ is one of the more expensive and complex areas of network computing.
6330
________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks.
6331
__________ authentication requires the outside use of a network security or trust service
6332
Which of the following attribute should be unique?
6333
Which of the following group is dedicated to support technologies that implement enterprise mashups?
6334
Salesforce.com is the largest ______ provider of CRM software.
6335
The componentized nature of SaaS solutions enables many solutions to support a feature called _____________
6336
Open source software used in a SaaS is called _______ SaaS.
6337
SaaS supports multiple users and provides a shared data model through _________ model.
6338
________ applications have a much lower barrier to entry than their locally installed competitors.
6339
The library function strrchr() finds the first occurrence of a substring in another string.
6340
Choose the correct order from given below options for the calling function of the code “a = f1(23, 14) * f2(12/4) + f3();”?
6341
In DOS, What is the purpose of the function randomize() in Turbo C?
6342
Which of the following is a logical NOT operator?
6343
Following is the invalid inclusion of a file to the current program. Identify it.
6344
Which of the following is a SaaS characteristic?
6345
What is your comment on the below C statement? signed int *p=(int*)malloc(sizeof(unsigned int));
6346
Which of the following SaaS platform is with an exposed API?
6347
Which of the following aspect of the service is abstracted away?
6348
Which of the following is the most complete cloud computing service model?
6349
Rackspace Cloud Service is an example of _____________
6350
Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to ______________
6351
______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
6352
__________ is the most refined and restrictive service model.
6353
Which of the following can be considered PaaS offering?
6354
n event-driven programming an event is generated by?
6355
________ serves as a PaaS vendor within Google App Engine system.
6356
Which of the following is associated with considerable vendor lock-in?
6357
_____ offering provides the tools and development environment to deploy applications on another vendor’s application.
6358
Pods are aggregated into pools within an IaaS region or site called an _________ zone.
6359
Which is not true about forms and controls in Visual Basic?
6360
A group of users within a particular instance is called _____________
6361
Which of the following is the management console in AWS?
6362
_________ is designed specifically to run connected to the cloud as a dedicated cloud client.
6363
Which is not a main component of the Visual Studio IDE?
6364
Which of the following is a classic example of an IaaS service model?
6365
The method which is used to clear a form control is……..
6366
…………. method is used to store the selected text into clipboard.
6367
Which of the following is a third-party VPN based on Google’s GoogleTalk?
6368
………..method is used to retrieve the stored text from the clipboard.
6369
Which of the following is based on the IETF Session Initiation Protocol?
6370
………….is the temporary buffer area which is used to store data temporarily.
6371
One of the important method of a flexgrid control is ……..
6372
…………….is used to display the data in a tabular format on the form .
6373
………….. is the property of a flexgrid to access the index of current row.
6374
…………. event occurs while the scroll box is moved by dragging the mouse
6375
By using ……… property of Drive list box we can access the selected drive
6376
………. can act as a container for other controls
6377
……….. control displays current directory with any sub directories and allows the user to change directly.
6378
By using ……….. property of a progress bar, we can display the progress of an operation.
6379
……… control specifies current status of the form.
6380
……… represents the immediate parent node for the new node in a tree view control.
6381
How many types of virtual private server instances are partitioned in an IaaS stack?
6382
Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
6383
________ is a cloud computing service model in which hardware is virtualized in the cloud.
6384
_________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build.
6385
Inorder to add a new node into a tree view control we must use ……… method.
6386
Which of the following is a specification for multicast discovery on a LAN?
6387
………….. control is used to represent the items in a hierarchical manner.
6388
Which of the following lets a Web service advertise itself in terms of a collection of endpoints?
6389
Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems?
6390
__________ is a CPU emulator and virtual machine monitor.
6391
_______ offers various Linux distributions upon which you can build a virtual machine.
6392
The only object that is not a collection and is not contained within another container in the DAO is …………
6393
Which of the following offers virtual appliances, including ones based on Windows, all of which run on VMware Player?
6394
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.
6395
The important property of a timer control is …………
6396
________ allows different operating systems to run in their own memory space.
6397
Which is not a property of the Common control class?
6398
Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________
6399
Which statement about objects is true?
6400
Which of the following component is called hypervisor?
6401
Where is a collection of related data elements stored?
6402
Which of the following provider rely on the virtual machine technology to deliver servers?
6403
Which is not a standard dialog box?
6404
Communication between services is done widely using _______ protocol.
6405
Which symbol creates an access key in the text of a menu item?
6406
Which of the following benefit is provided by the PaaS service provider?
6407
Which menu object property places a check mark in the display of the menu text?
6408
Which of the architectural layer is used as a front end in cloud computing?
6409
In the statement, Dim Days(7) as String, what part of the array does the number 7 refer to?
6410
Which of the following is the highest degree of integration in cloud computing?
6411
The scope of a variable refers to:
6412
A service provider reselling a _______ may have the option to offer one module to customize the information.
6413
What is the most number of states a CheckBox can have?
6414
From the standpoint of a ________ it makes no sense to offer non-standard machine instances to customers.
6415
Which function should be used to validate that input is not a string before performing arithmetic operations?
6416
Which of the following is the property of the composable component?
6417
Which is not a valid Exit statement?
6418
A _______ service provider gets the same benefits from a composable system that a user does.
6419
A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts.
6420
…………. method is used to retrieve a particular record on the basis ofa criteria
6421
A ________ cloud requires virtualized storage to support the staging and storage of data.
6422
Which of the architectural layer is used as backend in cloud computing?
6423
VDM is available from ……….. menu
6424
Which of the following language is used to manage transactions?
6425
In VB, arguments are passed by default by ……..
6426
The most commonly used set of protocols uses ______ as the messaging forma
6427
……….. event occurs when the form is set to nothing.
6428
……….. event occurs when a form loaded into the memory
6429
Cloud computing doesn’t require that ________ and software be composable
6430
A _________ is a cloud computing service that is both hardware and software.
6431
……….. procedures have return values.
6432
…….. keyword is used to preserve the previously stored values of a dynamic array.
6433
Which of the following is one of the properties that differentiates cloud computing?
6434
The default event of a text box is ……..
6435
Which of the following service is used for backing up a licensed computer?
6436
……………event occurs when the content of a control changes.
6437
Cloud computing shifts capital expenditures into ________ expenditures.
6438
The button parameter used to identify the right mouse button is ………..
6439
When you purchase shrink-wrapped software, you are using that software based on a licensing agreement called ________
6440
Which of the following is specified parameter of SLA?
6441
The button parameter used to identify the left mouse button is ………..
6442
A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider.
6443
…….. event occurs when the user presses a key from the keyboard.
6444
………… method is used to forcibly set the CPU focus to a particular control.
6445
The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a cloud deployment on Windows Azure in an attractive report format.
6446
The important property of a scroll bar is …….
6447
____ is a financial estimate for the costs of the use of a product or service over its lifetime.
6448
The main objective of the COM philosophy is ……..
6449
COM stands for ………….
6450
______ sizing is possible when the system load is cyclical or in some cases when there are predictable bursts or spikes in the load.
6451
Cloud computing is also a good option when the cost of infrastructure and management is _____
6452
_______ is surely an impediment to established businesses starting new enterprises.
6453
………. is the capability to wrap all aspects of functionality and user interface into a single entity?
6454
……… is a pointer in to a set of records.
6455
……….. type of recordset creates a static copy of a set of records that we can use to find data or generate reports.
6456
Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider.
6457
The overhead associated with ____ staff is a major cost.
6458
………. type of recordset creates a set of records that represent a single database table that we can use to add change or delete records.
6459
For a server with a four-year lifetime, you would therefore need to include an overhead roughly equal to ___ percent of the system’s acquisition cost.
6460
……… type of recordset creates a dynamic set of records that represents a database table or the results of a query containing fields from one or more tables.
6461
Through ………. Controls we can access information in the databases.
6462
………….. allows you to define exactly what the startmenu group contains and what icons are used
6463
…….. is a compressed file that is well suited to distribution on either disks or the internet.
6464
The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER.
6465
………….. automates much of work involved in creating and deploying the files needed for our program to run on another computer
6466
he cost of a cloud computing deployment is roughly estimated to be ___________
6467
___________ is a function of the particular enterprise and application in an on-premises deployment.
6468
Cloud ________ are standardized in order to appeal to the majority of its audience.
6469
Which two controls combined to form the ComboBox control?
6470
The reputation for cloud computing services for the quality of those services is shared by _________
6471
Network bottlenecks occur when ______ data sets must be transferred.
6472
In event-driven programming an event is generated by:
6473
Which of the following captive area deals with monitoring?
6474
Which statement about objects is true?
6475
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area.
6476
Which is true about the name and text property of a control?
6477
_______ captive requires that the cloud accommodate multiple compliance regimes.
6478
……….. control returns Boolean value
6479
Which of the following subject area deals with pay-as-you-go usage model?
6480
………….. property is used to return the index of a selected item in a listbox
6481
…………is the important event of a timer control
6482
………. is an important property of a file list box
6483
To find out the total number of items in a collection we can use …….. property
6484
By using …….. keyword we can create a collection.
6485
………… event occurs when an object of a class is created A
6486
In a class, …………is used to store data in a property and returns the property.
6487
……….. is a group of objects gathered together as a single object.
6488
…….. keyword is used to create an object for the class.
6489
………. event occurs when last reference to the class goes out of scope.
6490
……….. is an event of a class
6491
In a class, …………is used to pass value to the property.
6492
………… are called runtime entities.
6493
………. are called design time entities
6494
…………… method used to load or import a text file or .rtf file into a rich text box.
6495
………. connectivity is independent of any DBMS or operating system
6496
UDA stands for ………..
6497
Which of these activities is not one of the activities recommended to be performed by an independent SQA group?
6498
Which of the following is not an issue to consider when reverse engineering?
6499
The ISO quality assurance standard that applies to software engineering is
6500
Advantages of outsourcing project work may likely include all of the following except
6501
Which of these is not an example of data restructuring?
6502
Which of these are not valid software configuration items?
6503
At the end of a formal technical review all attendees can decide to
6504
Software reengineering process model does not include restructuring activities for
6505
Six Sigma methodology defines three core steps.
6506
When software configuration management is a formal activity the software configuration audit is conducted by the
6507
Which of these is not a benefits achieved when software is restructured?
6508
The Hofstede framework for global engagements includes all of the following dimensions except
6509
Which of the following activities is not part of the software reengineering process model?
6510
Which of the following is not ISO 9126 software quality factors?
6511
Software reliability problems can almost always be traced to
6512
A review summary report answers which three questions?
6513
Software safety is a quality assurance activity that focuses on hazards that
6514
Which of the following tasks is not part of software configuration management?
6515
Which of the following is not considered one of the four important elements that should exist when a configuration management system is developed?
6516
The first reverse engineering activity involves seeking to understand
6517
Which of the following is not an example of a business process?
6518
Which of these are reasons for using technical product measures during software development?
6519
Learning curves are more likely to apply in situations where most of the costs are
6520
Project selection criteria are typically classified as
6521
The waterfall model of software development is
6522
The incremental model of software development is
6523
Which of the following is not necessary to apply agility to a software process?
6524
Which of the following is not a weak point of waterfall lifecycle?
6525
One reason to involve everyone on the software team in the planning activity is to
6526
The Process Models differ from one another based on following factors except
6527
FP-based estimation techniques require problem decomposition based on
6528
LOC-based estimation techniques require problem decomposition based on
6529
Which of these are the 5 generic software engineering framework activities?
6530
Which of the following is not one of the commonly heard comments of project managers?
6531
When can selected common process framework activities be omitted during process decomposition?
6532
Make/Buy decisions are usually not driven by
6533
Which of the following is NOT a main element of the project management activities?
6534
Requirements can be best refined using
6535
Which of the following is not a main project objective?
6536
The objective of software project planning is to
6537
Which of the following is not a measurable characteristic of an object-oriented design?
6538
One of the most important attributes for a software product metric is that it should be
6539
The most important feature of spiral model is
6540
Which of the following items are not measured by software project metrics?
6541
In agile software development estimation techniques focus on the time required to complete each
6542
Which measurement activity is missing from the list below?
6543
Which of following are advantages of using LOC(lines of code) as a size-oriented metric?
6544
To be an effective aid in process improvement the baseline data used must be
6545
From among the following activities, which is the best example of a project?
6546
The prototyping model of software development is
6547
Which of these is not a characteristic of Personal Software Process?
6548
Software feasibility is based on which of the following
6549
Changes made to an information system to add the desired but not necessarily the required features is called
6550
Why is it important to measure the process of software engineering and software it produces?
6551
"To construct a high-quality, custom home within five months at costs not to exceed Rs15,00,000" is best classified as
6552
The first step in project planning is to
6553
Software risk impact assessment should focus on consequences affecting
6554
The critical path in a project network is the
6555
Which of the following is not one of the attributes of software quality?
6556
A risk table will not contain following information about risk
6557
Which of the following is not one of the guiding principles of software project scheduling:
6558
Hazard analysis focuses on the identification and assessment of potential hazards that can cause
6559
As per Putnam's Software Equation, when development time is reduced by 5%, effort goes up by
6560
Empirical estimation models are typically based on
6561
The IEEE software maturity index (SMI) is used to provide a measure of the
6562
Software risk always involves two characteristics
6563
In earned value analysis, it is desirable that variance and index are
6564
The best indicator of progress on a software project is the completion of
6565
Three categories of risks in software projects are
6566
Risk tables are sorted by
6567
Which of the following provide useful measures of software quality?
6568
Which of the following are objectives for formal technical reviews?
6569
Which of the following is not an approach to sizing problem
6570
Process indicators enable management to
6571
The purpose of earned value analysis is to
6572
While scheduling a project, effort validation is required for
6573
The level of review formality is not determined by
6574
Resource leveling can not help with
6575
A task set is a collection of
6576
The 40-20-40 rule suggests that the least of amount of development effort be spent on: Select one:
6577
A project budget report shows spending of Rs. 350,000/- against a budgeted amount of Rs. 400,000/-. Which of the following is true?
6578
Risk projection attempts to rate each risk in two ways
6579
The software equation can be used to show that Select one:
6580
Resource Histogram is an effective tool for staff planning and coordination.
6581
Abbreviate the term PERT.
6582
Which chart is a tool that depicts project as network diagram. It is capable of graphically representing main events of project in both parallel and consecutive way.
6583
In project execution and monitoring, every project is divided into multiple phases in which all major tasks are performed based on which phase of SDLC.
6584
Size of software product can be calculated using which of these methods.
6585
Software scope is not a well-defined boundary, which encompasses all the activities that are done to develop and deliver the software product.
6586
The software scope identifies what the product will do and what it will not do, what the end product will contain and what it will not contain.
6587
Software project manager is engaged with software management activities. He is responsible for.
6588
A software project manager is a person who undertakes the responsibility of carrying out the software project.
6589
Software project management is the process of managing all activities that are involved in software development, they are.
6590
In Risk management process what make note of all possible risks, that may occur in the project.
6591
State if the following are true or false For scheduling a project, it is necessary to. 1) Break down the project tasks into smaller, manageable form 2) Find out various tasks and correlate them 3) Estimate time frame required for each task 4) Divide time into work-units
6592
In the Empirical Estimation Technique which model is developed by Barry W. Boehm?
6593
Which may be estimated either in terms of KLOC (Kilo Line of Code) or by calculating number of function points in the software.
6594
In which estimation software size should be known.
6595
COCOMO stands for
6596
State if the following are true for Project Management. During Project Scope management, it is necessary to - 1) Define the scope 2) Decide its verification and control 3) Divide the project into various smaller parts for ease of management. 4) Verify the scope
6597
Software project management comprises of a number of activities, which contains.
6598
A Project can be characterized as.
6599
Object inherits a class is known as.
6600
During the procurement phase, you are analyzing whether you should outsource a particular task or do it on your own with your team. Which process are you currently in?
6601
There is a risk which has a 7% chance of happening, and if it occurs it will cost you 2,500 USD. What is the EMV of this event?
6602
Who should be involved in identifying the project risks?
6603
Tom is a low-power stakeholder in your project, He is very interested and enthusiastic about your project. He wants you to complete the project successfully. How will you manage him?
6604
You have been given a task to accurately calculate the cost of a project. Which of the following techniques will you use to get the most accurate cost of the project?
6605
Which of the following risks remain even after applying the risk response of an identified risk?
6606
Your project is delayed by 45 days and the client has threatened that he will impose a heavy penalty if you do not complete the project on time. Therefore, to bring the project back on schedule you hire some equipment and bring more team members to work with you. This is an example of:
6607
Regarding the project expeditor and the project coordinator, which of the following statements is correct?
6608
Which of the following graphs shows the major of problems due to a minority of causes?
6609
The successor activity cannot be finished until the predecessor activity starts. This is an example of which kind of relationship:
6610
Which document authorizes the existence of the project?
6611
In a balanced matrix organization, who has authority over the budget?
6612
Your project is late and to bring it back on track you are adding extra resources to some activities and giving overtime to your team members. This is an example of:
6613
Which is not an example of organizational process assets?
6614
Your management has asked you to provide them with the rough order estimate for a project on an urgent basis. In this case, which of the following techniques will you use?
6615
For all your needs you have to go to the functional manager; moreover, you do not have control over the budget. In what kind of organization are you working?
6616
Which of the following diagram looks like a fish skeleton?
6617
What may happen if your project has more than one critical path?
6618
You are developing the project charter, with management, for a new project. You are going to be the project manager. Who will sign the project charter?
6619
For your project, you have identified your project stakeholders, developed strategy and now you are in the execution phase. In which project phases do you identify the project stakeholders?
6620
During which phase of the project will risks be the highest?
6621
In which procurement contract does the buyer have the minimum risk?
6622
What does the Variance at Completion show?
6623
Which estimate is given more weight in the PERT estimate formula?
6624
In Six Sigma what percentage of accuracy is desired?
6625
Which one is not a stakeholder of your project?
6626
In your project you identify a risk that, due to the possibility of the entrance of a new supplier, may provide some components at a cheaper price. What kind of risk is this?
6627
Which of the following is not an output of a project?
6628
What is a Project Scope?
6629
Fishbone diagram is also known as:
6630
Which of the following is the most accurate cost estimate method?
6631
What is a prototype?
6632
Which Conflict Resolution Technique leads to consensus and commitment?
6633
In which phase will the risks be at the lowest level?
6634
Which is an example of Triple Constraint?
6635
The client inspects the deliverables with you, and finds that it meets the acceptance criteria. He signed off and formally approves the deliverables. Which process is this?
6636
You are reviewing the control chart and observe that there are seven points in a row that are below the mean. What does it mean?
6637
You are managing a project with a budget of 500,000 USD, and 250,000 USD has been spent. Upon review, you observe that only 40% of the work has been completed; though, your schedule says that you should have completed 50% of the work. What is the Actual Cost?
6638
While inspecting, you find a defective component and you repaired it. This act is known as:
6639
What is a Workaround?
6640
Pareto Chart helps you find:
6641
Which of the following statements is true about the Point of Total Assumption?
6642
Rearranging resources to optimize their utilization is known as:
6643
Which document is created by breaking the project scope into smaller and manageable elements?
6644
In risk management, you have many strategies to manage risks. Which strategy will you not use with the negative risks?
6645
The role of the Develop Project Management Plan process is to:
6646
Which of the following represents the correct order of project management phases?
6647
You have identified a large number of risks during your risk identification process. What will be your next step?
6648
What is the goal of Quality Management?
6649
When should you update lessons learned?
6650
Due to a miscommunication with the client, some features are added to the product. This process is known as:
6651
Which one of the following is not true about the change request?
6652
TCPI = 1.5, what does it mean?
6653
Which one is an example of Crashing?
6654
You have added a few extra features to the product with the intention to make the client happy. This activity is known as:
6655
You are developing the project management plan for your project. What will be your main emphasis during this process?
6656
Who contributes, develops and updates the Lessons Learned document?
6657
If an un-identified risk occurs:
6658
A project has more than one critical path. What does this mean to you?
6659
A contract cannot be a legal document until:
6660
What does the Cost Performance Index (CPI) say about the project?
6661
If the optimistic estimate is 10 days, and the pessimistic estimate is 22 days, what is the standard deviation for this activity?
6662
Whenever you receive a change request, what will be your next step?
6663
In which process you close the contract?
6664
The most common cause of conflict within a project is:
6665
What does the Schedule Performance Index (SPI) say about the project?
6666
Which of the following statements is not true about the Project Charter?
6667
In which of the following phases of the project will most of the money be spent?
6668
A subcontractor is delaying the delivery of the deliverables. Which of the following should you do?
6669
You have been given 100,000 USD to complete the project. 60,000 USD has been spent, though as per the schedule, 55,000 USD should have been spent to complete the same work. What is the Planned Value (PV)?
6670
Which of the following is not an example of Organizational Process Assets?
6671
Which of the following risks will be managed with the Contingency Reserve?
6672
You have been given 100,000 USD to complete the project. 60,000 USD has been spent, though as per the schedule, 55,000 USD should have been spent to complete the same work. What is the Actual Cost (AC)?
6673
Which of the following is not a component of the Scope Baseline?
6674
Which of the following is not an example of Enterprise Environmental Factor?
6675
How will you deal with the stakeholders with High Interest but Low Power?
6676
What should be your goal while negotiating with the seller?
6677
A Risk that is caused by the response of another risk, is known as:
6678
You have six team members working under you. How many lines of communication will you have in your communication plan?
6679
You have been given 100,000 USD to complete the project. 60,000 USD has been spent, though as per the schedule, 55,000 USD should have been spent to complete the same work. What is the Budget at Completion (BAC)?
6680
Which of the following statement is true about the Project Charter?
6681
For your project you need to outsource some work, so you sign a fixed price contract with a contractor. In this contract, the price above which the seller bears all costs of cost overrun is known as:
6682
In which type of organization does the Functional Manager manage the project budget?
6683
During a bidder conference you see that one bidder is your close friend. What should your next step be?
6684
Which contract is considered most risky for the bidders?
6685
Which of the following strategies is not used for negative risks?
6686
Which of the following is part of the Maslow theory?
6687
Money spent during a specific time period is known as:
6688
What is the duration of the Milestone?
6689
Which of the following statement is true about a Program?
6690
Code of Ethics and Professional Conduct applies to:
6691
A person who is directly or indirectly involved with your project, or affected by your project or its outcome, is known as:
6692
You hired a programmer for $25/hour for two months. What kind of contract is this?
6693
Risks included in the Watch List are known as:
6694
What is meant by RACI?
6695
Which of the following is not a basic element of Earn Value Management (EVM)?
6696
In Rolling Wave Planning:
6697
What is a Product Scope?
6698
What is the purpose of the Project Proposal?
6699
Which one of these is not an example of a Project Stakeholder?
6700
Who are the stakeholders in a project?
6701
How often should a status meeting ideally be held to catch up on people's progress?
6702
What is contingency?
6703
Why would using a PERT (Program Evaluation Review Technique) diagram help you effectively manage projects?
6704
What is the purpose of identifying milestones?
6705
Actions and activities necessary to satisfy completion or exit criteria for the phase or project and to tranfer the project's products, services, or results to the next phase or to production and/or operations are addressed:
6706
Significant changes occuring throughout the project life cycle can trigger:
6707
Who determines the requirement of a new project
6708
Benefit Measurement and Constrained optimization mthod are used for
6709
A Project sceduling software application can be considered par of organization's
6710
The tool and technique known as "expert judgement" in the intiating process group is used to:
6711
Outputs of the Monitor and Control Project Work process include all of the following EXCEPT:
6712
Include change control meetings
6713
Which process is included in Project Integration Management.
6714
All of the following is true about Project Charter except;
6715
The peak of the sum is never ________ than the sum of the peaks.
6716
A __________ site is one that is environmentally friendly: locations that are on a network backbone.
6717
The reliability of a system with n redundant components and a reliability of r is ____________
6718
Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems do.
6719
Cutting latency in half requires ______ times the number of nodes in a system
6720
How many laws exist for Cloudonomics by Weinman?
6721
A _____ is a facility that is a self-contained semiconductor assembly line.
6722
_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand.
6723
______ enables batch processing, which greatly speeds up high-processing applications.
6724
______ feature allows you to optimize your system and capture all possible transactions.
6725
______ is a pay-as-you-go model matches resources to need on an ongoing basis.
6726
Which of the following is the most refined and restrictive service model?
6727
A service that concentrates on hardware follows the _________ as a Service model.
6728
Applications that work with cloud computing that have low margins and usually low risk are _____________
6729
Which of the following is one of the unique attributes of Cloud Computing?
6730
Which of the following architectural standards is working with cloud computing industry?
6731
You can’t count on a cloud provider maintaining your _____ in the face of government actions.
6732
Which of the following is the most important area of concern in cloud computing?
6733
Which of the following was one of the top 5 cloud applications in 2010?
6734
Which of the following is the IaaS service provider?
6735
CaaS stands for _____________ as service.
6736
The three different service models are together known as the _____ model of cloud computing.
6737
How many types of service model are mainly present in Cloud?
6738
_______ is a complete operating environment with applications, management, and user interface.
6739
Which of the following provides development frameworks and control structures?
6740
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
6741
Which of the following is owned by an organization selling cloud services?
6742
A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit.
6743
__________ cloud is one where the cloud has been organized to serve a common function or purpose.
6744
The ________ cloud infrastructure is operated for the exclusive use of an organization.
6745
_______ dimension corresponds to two different states in the eight possible cloud forms.
6746
Which of the following is related to the service provided by Cloud?
6747
_________ is a measure of whether the operation is inside or outside the security boundary or network firewall.
6748
Which of the following is provided by ownership dimension of Cloud Cube Model?
6749
How many types of security boundary values exist in Cloud Cube model?
6750
Which of the following dimension is related to organization’s boundaries?
6751
………… object in DAO model represents objects like saved forms, modules, reports etc:
6752
How many types of dimensions exists in Cloud Cube Model?
6753
_______ model attempts to categorize a cloud network based on four dimensional factors.
6754
Through the properties and methods of……….. object, we can set validation rules and return information about linked tables in DAO model.
6755
The __________ model originally did not require a cloud to use virtualization to pool resources.
6756
Which of the following is best known service model?
6757
……….. object contains information about an error occurred during a DAO operation
6758
Which of the following is the deployment model
6759
……….. represents a user account with particular access permission in a particular workspace.
6760
________ refers to the location and management of the cloud’s infrastructure.
6761
…………. defines and manages the current user account
6762
_________ model consists of the particular types of services that you can access on a cloud computing platform.
6763
Which of the following is Cloud Platform by Amazon?
6764
………. is the top level object in DAO hierarchy.
6765
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.
6766
……… is a special tool available in VB to access databases directly
6767
Which of the following can be identified as cloud?
6768
…………. method of recordset object can be used to allocate memory for a new blank record.
6769
________ has many of the characteristics of what is now being called cloud computing
6770
Which of the following cloud concept is related to pooling and sharing of resources?
6771
………… can access data from relational and non relational databases.
6772
………. allows access to the client server databases on a network
6773
Which of the following is essential concept related to Cloud?
6774
_______ as a utility is a dream that dates from the beginning of the computing industry itself.
6775
…….. is a Microsoft product for windows platform
6776
_________ computing refers to applications and services that run on a distributed network using virtualized resources.
6777
…………. is a collection of code which translates application request into physical operation on datastore.
6778
Extension of ActiveX designers………..
6779
Extension of ActiveX controls ……….
6780
……..files contains bitmaps,strings, and other data that we can change without having to reedit and recompile the program code.
6781
………. method is used to clear the contents of MSHFlexGrid control.
6782
………. method adds a row to an MSHFlexGrid.
6783
The event occurs when certain key of keyboard is pressed
6784
What August event was widely seen as an example of the risky nature of cloud computing?
6785
Link the cloud-based service on the left with the desktop or server application it is designed to displace on the right.
6786
To attach a scroll bar to the textbox , the property of textbox should be set to:
6787
The term "cloud computing" is a metaphor that originated in what?
6788
The TypeOf statement is used to find out……..
6789
IBM, EMC and Boeing Co. were among the companies signing what document whose title is reminiscent of a famous political statement?
6790
Cloud computing embraces many concepts that were previously touted as the next big thing in information technology. Which of these is not an antecedent of the cloud?
6791
Match the provider with the cloud-based service.
6792
An internal cloud is…
6793
………. displays a list of the files in the current directory or sudirectory.
6794
Which of these techniques is vital for creating cloud-computing centers?
6795
………… displays current directory with any subdirectories and allows the user to change directory.
6796
What widely used service is built on cloud-computing technology?
6797
What exactly is cloud computing?
6798
…………. displays the current drive and allows the user to select a different drive by using a drop down arrow.
6799
What feature does not belong in a private cloud?
6800
Which of these services is not Platform as a Service?
6801
Which company recently shut the doors on its cloud storage service?
6802
………… present a list of choices to the user.
6803
Which of the following isn't an advantage of cloud?
6804
What properties are required to be specified for a menu item
6805
When the form is first referenced in any manner by program,the triggered event is …….
6806
What is the name of the organization helping to foster security standards for cloud computing?
6807
Which Amazon cloud product recently experienced a massive outage?
6808
If you declare an array in a module and you want every procedures to access it, then declare it as………
6809
What is the name of the Rackspace cloud service?
6810
…………. are used by VB to hold information needed by an application.
6811
All the following statements are true about variable names except
6812
If variables are not implicitly or explicitly type, they are assigned the type by default...............
6813
"Cloud" in cloud computing represents what?
6814
………… statement is used to define a property procedure that assigns the value of a property
6815
……….. is a built in function to return the upper bound of an array
6816
I've a website containing all static pages. Now I want to provide a simple Feedback form for end users. I don't have software developers, and would like to spend minimum time and money. What should I do?
6817
Which of the following statements about Google App Engine (GAE) is INCORRECT.
6818
……….. is a built in function to return lower bound of an array
6819
This is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet.
6820
What is Cloud Foundry?
6821
……….. is a set of sequentially indexed elements having the same type of data.
6822
Google Docs is a type of cloud computing.
6823
……….. is a meaningful name that takes the place of a number or string that does not change
6824
What is private cloud?
6825
……… is the extension of the standard module
6826
Which of the following is true of cloud computing?
6827
……….. is the extension of a class module
6828
In order to participate in cloud-computing, you must be using the following OS _______ .
6829
The term 'Cloud' in cloud-computing refers to ______.
6830
………….. is the extension of a form module.
6831
The typical three-layer switching topology will not create latency within a cloud network
6832
In……….scope, variables are available only to the module in which they are declared
6833
A larger cloud network can be built as either a layer 3 or layer 4 network.
6834
A good cloud computing network can be adjusted to provide bandwidth on demand.
6835
Cloud computing networks are designed to support only private or hybrid clouds
6836
Amazon Web Services is which type of cloud computing distribution model?
6837
An object datatype can stroe…….. bytes
6838
Geographic distribution of data across a cloud provider's network is a problem for many enterprises because it:
6839
A Boolean datatype can store……….bytes.
6840
Which vendor recently launched a cloud-based test and development service for enterprises?
6841
Google Apps Engine is a type of
6842
Mouse down event takes place when you,
6843
Cloud Service consists of
6844
Virtual Machine Ware (VMware) is an example of
6845
………… property is used to check whether the object is active or deactive.
6846
What’s the most popular use case for public cloud computing today?
6847
Which of these companies specializes in cloud computing management tools and services?
6848
What is the name of the organization helping to foster security standards for cloud computing?
6849
………… is an example for control
6850
………. allows you to position the forms in your application using a small graphical representation of the screen.
6851
What is the name of Rackspace’s cloud service?
6852
Cloud Services have a________ relationship with their customers.
6853
Which of these is not a major type of cloud computing usage?
6854
What facet of cloud computing helps to guard against downtime and determines costs?
6855
What second programming language did Google add for App Engine development?
6856
MDI stands for…………
6857
……….. is one of the main building blocks in a VB application.
6858
Which of the following cloud concept is related to pooling and sharing of resources
6859
……….. is an action recognized by a form or the control.
6860
_______ is a complete operating environment with applications, management, and the user interface.
6861
………….loop repeats a group of statements for each item in a collection of objects or for each element of an array.
6862
________ dimension corresponds to two different states in the eight possible cloud forms.
6863
Which of the following is related to service provided by Cloud ?
6864
The default datatype for VB is …………………..
6865
The __________ model originally did not require a cloud to use virtualization to pool resources.
6866
Which of the following is best known service model ?
6867
A……… is a place in the code where the program temporarily stops
6868
Cloud computing is a _______ system and it is necessarily unidirectional in nature.
6869
………… is the process of finding and removing errors
6870
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
6871
Which of the following is most refined and restrictive service model ?
6872
Which window shows information that results from debugging statements in our code
6873
When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.
6874
………… statement enables us to trap runtime error.
6875
Which of the following keywords is used to keep track of active window.
6876
The window in which the individual documents are displayed is called….. window.
6877
To load graphics on a control at runtime, we have to use the function………..
6878
RTF stands for…….
6879
………… method is used to delete items from a list box.
6880
The method, which loads the form into memory and displays it on screen
6881
……….. returns numeric code of a character.
6882
…………. is a group of controls that share the same name and type.
6883
………… indicates whether a particular condition is on or off.
6884
In GUI , ……….. is a means of selecting one of several options.
6885
……. are objects that are placed on form objects.
6886
Visual Basic maintains a project file with the extension…..
6887
……….shows the property type as well as a short description of the property
6888
………. shows the value of any variables within the scope of the current procedure.
6889
………. is a collection of files
6890
………. property is used to return or sets a value that determines whether the control can respond to user-generated events.
6891
The default property for a text box control is…….
6892
Storage size of Byte datatype is………..
6893
……. modules can be reused in many different applications.
6894
……… is a method which moves the focus to the specified control or form
6895
A………. displays a list of items from which user can select one or more items
6896
What is the default range of horizontal scroll bar
6897
By default, the textbox control can hold text as ……..
6898
………property is an integer value corresponding to the position of the scroll box in the scroll bar.
6899
………….. combines the features of the text box and list box
6900
………….. returns or sets the number of characters selected.
6901
Which of them is not an example of physical data leakage?
6902
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
6903
Unintentional data leakage can still result in the same penalties and reputational damage.
6904
Unauthorized” data leakage doesn’t essentially mean intended or malicious.
6905
There are __________ major types of data leakage.
6906
Data leakage is popularly known as ___________
6907
Data leakage threats do not usually occur from which of the following?
6908
_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
6909
____________ protocol attack is done in the data-link layer.
6910
Which of the protocol is not used in the network layer of the TCP/IP model?
6911
Which 2 protocols are used in the Transport layer of the TCP/IP model?
6912
Which of them is not an appropriate method of router security?
6913
Which of them is not an attack done in the network layer of the TCP/IP model?
6914
When the form is first referenced in any manner by program,the triggered event is….
6915
…….. is a control related event
6916
What is the output of the following code: MyString=”Hello World” LeftString=left(MyString,3)
6917
The variables that does not change the value during execution of program is……
6918
All the following statements are true about variable scope except
6919
__________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.
6920
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.
6921
………….is a block of code that is executed in response to an event.
6922
There are __________ different versions of IP popularly used.
6923
.………. arrays can be resized at anytime
6924
RoBOT is abbreviated as ___________
6925
We can preserve the value of a local variable by making the variable……….
6926
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat
6927
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).
6928
In Visual Basic, a variable name cannot be more than ……… characters
6929
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________
6930
The default datatype for Visual Basic is ………………
6931
…………. control is used to display text, but user cannot change it directly.
6932
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?
6933
TCP/IP is composed of _______ number of layers.
6934
……….property is used to set the maximum length of a text, a textbox can hold
6935
……….. control is used to provide an identifiable grouping for other controls
6936
A text box can hold as many as ……… characters for a multi-line text
6937
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
6938
Which of the following is an example of application layer vulnerability?
6939
A text box can hold as many as ……. characters for a single line text.
6940
Which of the following is an example of presentation layer vulnerability?
6941
The form module has file extension...................
6942
………… is used for finding out about objects, properties and methods.
6943
In ……………… window we can write code
6944
Which of the following is an example of session layer vulnerability?
6945
Which of the following provides quick access to commonly used commands in the programming environment
6946
Which of the following is an example of Transport layer vulnerability?
6947
Which of the following is not a vulnerability of the application layer?
6948
Which of the following is not an example of presentation layer issues?
6949
Which of the following windows is the central to the development of Visual Basic applications
6950
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
6951
Properties can be viewed in two ways
6952
Which windows displays a list of all forms and modules making up your application
6953
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
6954
Which of the following is not session layer vulnerability?
6955
IDE stands for…………..
6956
Which of the following is not a transport layer vulnerability?
6957
Visual Basic is a tool that allows you to develop application in…………
6958
The body of a For…Next loop in Visual Basic will always be executed once no matter what the initial and terminating values are. duplicate question?
6959
The body of a For…Next loop in Visual Basic will always be executed once no matter what the initial and terminating values are.
6960
The value of the control variable should not be altered within the body of a For?Next loop.
6961
A counter variable is normally incremented or decremented by 1.
6962
A Do?Loop Until block is always executed at least once
6963
A Do While loop checks the While condition before executing the statements in the loop.
6964
The arguments appearing in a Call statement must match the parameters in the appropriate Sub or Function header in all but one of the following ways. Which one?
6965
Variables appearing in the header of a Function procedure are called ____________.
6966
The input to a user-defined function can consist of:
6967
A Function may return up to two values.
6968
Function procedures can invoke other Function procedures.
6969
Although a function can return a value, it cannot directly display information in a text box.
6970
Which of the following is an example of network layer vulnerability?
6971
Which of the following is an example of data-link layer vulnerability?
6972
Suppose you want to write a procedure that takes three numbers, num1, num2, and num3; and returns their sum, product, and average. It is best to use a Function procedure for this task.
6973
Which of the following is an example of physical layer vulnerability?
6974
Which of the following is not a vulnerability of the network layer?
6975
_______________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
6976
Both the input and output of a Function procedure can consist of several values.
6977
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
6978
The input to a user-defined function can consist of one or more values.
6979
Which of the following is not a vulnerability of the data-link layer?
6980
Function names should be suggestive of the role performed. The names also must conform to the rules for naming variables.
6981
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
6982
The statement Const TAX_RATE As Doubleface=Calibri size=2> is not valid.
6983
Each individual variable in the list student(0), student(1), student(2) is known as a(n)
6984
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.
6985
Which one of the following is true about arguments and parameters?
6986
Which of the following is not physical layer vulnerability?
6987
Which of the following is NOT a reason for using procedures?
6988
The full form of OSI is OSI model is ______________
6989
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.
6990
The ______________ of a Sub procedure are vehicles for passing numbers and strings to the Sub procedure.
6991
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.
6992
One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________
6993
It is important to limit ____________ to all data and information as well as limit the authority for installing software.
6994
Which of the following do not comes under security measures for cloud in firms?
6995
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.
6996
Suppose the variable myName is declared in a Dim statement in two different Sub procedures. Which statement is true?
6997
_______________ important and precious file is a solution to prevent your files from ransomware
6998
What will be the output of the following program when the button is clicked? Private Sub btnDisplay_Click(…) Handles btnDisplay.Click Dim number As Double = 3 DoubleAndSquare(number) txtBox.Text = CStr(number) End Sub Sub DoubleAndSquare(ByRef myVar As Double) myVar = myVar + myVar myVar = myVar * myVar
6999
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.
7000
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.
7001
Use of _______________ can bring external files and worms and virus along with it to the internal systems.
7002
Variables declared inside a procedure are said to have ________________.
7003
The declaration statement for a class-level variable should be placed __________.
7004
Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.
7005
Suppose a variable is passed by value to a parameter of a Sub procedure, and the parameter has its value changed inside the Sub procedure. What will the value of the variable be after the Sub procedure has executed?
7006
It is very important to block unknown, strange and ______________ within the corporate network.
7007
Which of the following is not a proper aspect of user integration?
7008
Suppose a variable is passed by reference to a parameter of a Sub procedure, and the parameter has its value changed inside the Sub procedure. What will the value of the variable be after the Sub procedure has executed?
7009
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.
7010
_____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.
7011
What happens to a variable declared locally inside a Sub procedure after the procedure terminates?
7012
What type of items are valid for use in the value list of a Case clause?
7013
Which Case clause will be true whenever the value of the selector in a Select Case block is greater than or equal to 7?
7014
Different items appearing in the same value list of a Select Case block must be separated by a ____________.
7015
Suppose that the selector in a Select Case block is the string variable myVar. Which of the following is NOT a valid Case clause?
7016
You can specify a range of values in a Case clause by using the To keyword.
7017
A single Case statement can contain multiple values.
7018
Items in the value list must evaluate to a literal of the same type as the selector
7019
Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.
7020
Select Case choices are determined by the value of an expression called a selector.
7021
One may use an If block within a Select Case block.
7022
Constructs in which an If block is contained inside another If block are called:
7023
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________
7024
Which value for x would make the following condition true: (x >= 5) And (x <= 6)
7025
An attacker may use automatic brute forcing tool to compromise your ____________
7026
Which value for x would make the following condition true: Not (x >= 5)
7027
Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.
7028
Which value for x would make the following condition true: x >= 5
7029
The antivirus or PC defender software in a system helps in detecting virus and Trojans.
7030
_____________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.
7031
The three main logical operators are ________, _________, and ________.
7032
_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.
7033
ATM Skimmers are used to take your confidential data from your ATM cards.
7034
Which of the following is a valid Visual Basic conditional statement?
7035
You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________
7036
An attacker, who is an employee of your firm may ___________ to know your system password.
7037
___________ will give you an USB which will contain ___________ that will take control of your system in the background.
7038
Which of the companies and organizations do not become the major targets of attackers for data stealing?
7039
What types of data are stolen by cyber-criminals in most of the cases?
7040
Which of the following expressions has as its value the words “Hello World? surrounded by quotation marks?
7041
Which of these is not a step followed by cyber-criminals in data breaching?
7042
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
7043
Asc(“A”) is 65. What is displayed by txtBox.Text = Chr(65) & “BC”?
7044
Asc(“A”) is 65. What is Asc(“C”)?
7045
A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures.
7046
_______ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.
7047
Given that x = 7, y = 2, and z = 4, the following If block will display “TRUE”. If (x > y) Or (y > z) Then txtBox.Text = “TRUE” End If
7048
__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.
7049
After performing ____________ the ethical hacker should never disclose client information to other parties.
7050
What will be the output of the following statement? txtBox.Text = FormatCurrency(1234.567)
7051
An ethical hacker must ensure that proprietary information of the firm does not get leaked.
7052
Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?
7053
What is the proper syntax when using a message dialog box?
7054
The legal risks of ethical hacking include lawsuits due to __________ of personal data.
7055
___________ is the technique used in business organizations and firms to protect IT assets.
7056
o continue a long statement on another line, use:
7057
Leaking your company data to the outside network without prior permission of senior authority is a crime.
7058
___________ has now evolved to be one of the most popular automated tools for unethical hacking.
7059
Keywords in Visual Basic are words that
7060
Performing a shoulder surfing in order to check other’s password is ____________ ethical practice
7061
Which of the following is a valid name for a variable?
7062
What is the ethics behind training how to hack a system?
7063
What value will be assigned to the numeric variable x when the following statement is executed? x = 2 + 3 * 4
7064
hich of the following arithmetic operations has the highest level of precedence?
7065
What is the correct statement when declaring and assigning the value of 100 to an Integer variable called numPeople
7066
Option Explicit requires you to declare every variable before its use.
7067
A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software.
7068
A variable declared inside an event procedure is said to have local scope
7069
ISMS is abbreviated as __________
7070
An algorithm is defined as:
7071
__________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed.
7072
Security bugs are also known as _______
7073
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.
7074
Pseudocode is
7075
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
7076
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.
7077
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.
7078
There are ________ types of exploit.
7079
A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.
7080
____________ is a special type of vulnerability that doesn’t possess risk.
7081
Risk and vulnerabilities are the same things.
7082
When creating a new application in Visual Basic, you are asked to supply a name for the program. If you do not specify a name, a default name is XXXXX XXXXX is this default name?
7083
___________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.
7084
________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.
7085
The Properties window plays an important role in the development of Visual Basic applications. It is mainly used
7086
___________ is a weakness that can be exploited by attackers.
7087
Sizing Handles make it very easy to resize virtually any control when developing applications with Visual Basic. When working in the Form Designer, how are these sizing handles displayed?
7088
L0phtCrack is formerly known as LC3.
7089
_______ is a password recovery and auditing tool
7090
What property of controls tells the order they receive the focus when the tab key is pressed during run time?
7091
Which of the following attack-based checks WebInspect cannot do?
7092
__________ is a web application assessment security tool.
7093
____________ scans TCP ports and resolves different hostnames.
7094
Visual Basic responds to events using which of the following?
7095
______________ is a popular tool used for network analysis in multiprotocol diverse network.
7096
____________ is a popular IP address and port scanner.
7097
The divide-and-conquer-method of problem solving breaks a problem into large, general pieces first, then refines each piece until the problem is manageable.
7098
Aircrack-ng is used for ____________
7099
Keywords are also referred to as reserved words.
7100
The Visual Basic Code Editor will automatically detect certain types of errors as you are entering code.
7101
Which of the below-mentioned tool is used for Wi-Fi hacking?
7102
Wireshark is a ____________ tool.
7103
Which of the following deals with network intrusion detection and real-time traffic analysis?
7104
Which of this Nmap do not check?
7105
__________ is a popular tool used for discovering networks as well as in security auditing.
7106
Nmap is abbreviated as Network Mapper.
7107
________ framework made cracking of vulnerabilities easy like point and click.
7108
____________ helps in protecting corporate data, communications and other assets.
7109
what is the use of performselector in ios?
7110
__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.
7111
____________ helps in protecting businesses against data breaches that may make threats
7112
what is the maximum size of an ios application?
7113
______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes
7114
________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.
7115
_________ is a popular command-line packet analyser.
7116
__________ is a debugger and exploration tool.
7117
what gets returned if xib is not properly connected to a parent controller?
7118
ToneLoc is abbreviated as __________
7119
what does the "strong" property attribute do?
7120
Network Stumbler is a Windows Wi-Fi monitoring tool.
7121
_____________ is a tool which can detect registry issues in an operating system.
7122
what does exc_bad_access signal received mean in xcode?
7123
____________is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.
7124
Which of the following attach is not used by LC4 to recover Windows password?
7125
what does a "__block" type specifier mean?
7126
what could be the probable result if selector is unknown or undefined?
7127
select all incorrect bundle id(s):
7128
is it possible to set multiple architecture from build settings tab in xcode for a project?
7129
is it possible to deploy beta build on any device?
7130
how can the application name of an ios project be changed?
7131
how can an sms be sent programmatically from the iphone (ios 4.0 or later)?
7132
consider the following code: (bool)application:(uiapplication *)application didfinishlaunchingwithoptions:(nsdictionary *)launchoptions { // set background color/pattern self.window.backg...
7133
which of the following statements could be used to determine if a given variable is of string type?
7134
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
7135
Stealing of digital files comes under __________ of the Indian IT Act.
7136
Sending offensive message to someone comes under _____________ of the Indian IT Act ______
7137
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
7138
which keyword is used in swift when we want a property of a class to initialize when it is accessed for the first time?
7139
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
7140
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
7141
which is correct regarding swift enumeration members when they are defined?
7142
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
7143
which is the wrong definition of a protocol in swift?
7144
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
7145
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
7146
what keyword is used to indicate a custom operator that will appear in between two targets, similar to the addition operator in this example? var sum = 10 + 10
7147
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act
7148
what is used to import objective-c files into swift?
7149
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
7150
what is the type of swift enumerations?
7151
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________
7152
what is the output of this segment of code ? var x = 0 for index in 1...5 { ++x } println("(x)")
7153
what is the name of the xcode generated header file used to import swift classes into an objective-c class given a product module named example?
7154
what is the name of the swift language feature that objective-c blocks are translated into?
7155
what is the name of the deinitializer in a class declaration?
7156
what does a retaincount represent in arc?
7157
in context of a swift subscript, which of the following is correct?
7158
if we have a class named myclass with a nested enum called status, declared like so: class myclass { enum status { case on, off } } how would one indicate that a variable is an enum...
7159
given that we have defined mychar like so : let mychar: character = "b" which code segment can be considered a complete switch statement and will run without any error?
7160
all swift classes must inherit from which root class?
7161
Download copy, extract data from an open system done fraudulently is treated as ________
7162
Accessing Wi-Fi dishonestly is a cyber-crime.
7163
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
7164
Accessing computer without prior authorization is a cyber-crimes that come under _______
7165
. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
7166
In which year the Indian IT Act, 2000 got updated?
7167
What is the updated version of the IT Act, 2000?
7168
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
7169
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
7170
The Information Technology Act -2000 bill was passed by K. R. Narayanan.
7171
What is the full form of ITA-2000?
7172
In which year India’s IT Act came into existence?
7173
What is the name of the IT law that India is having in the Indian legislature?
7174
Which of the following is not done by cyber criminals?
7175
Which of the following is not an example of a computer as weapon cyber-crime?
7176
Which of the following is not a type of peer-to-peer cyber-crime?
7177
Cyber-crime can be categorized into ________ types.
7178
Cyber-laws are incorporated for punishing all criminals only.
7179
Which of the following is not a type of cyber crime?
7180
CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures.
7181
National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards.
7182
__________________ are some very frequent updates that come for every anti-virus.
7183
Known bugs can be solved or removed by __________________ develop by the vendors of the application.
7184
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.
7185
How can we access the value of a KVC?
7186
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it.
7187
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies.
7188
Known exploits have a confirmation of and measures can be taken against it to resolve them.
7189
How many types of exploits are there based on their nature from hacking’s perspective?
7190
There are __________ types of exploits based on their working.
7191
Which of the following are not a vulnerability-listed site/database?
7192
__________ is the specific search engine for exploits where anyone can find all the exploits associated to vulnerability.
7193
Which value is not equivalent to the others?
7194
Which of them is not a powerful vulnerability detecting tool?
7195
The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________
7196
What should you do If you want to return an object back to the caller of your method and you want to mark the object for a later release?
7197
________________ are piece of programs or scripts that allow hackers to take control over any system.
7198
Which is an example of an invalid variable name?
7199
The configuration of DNS needs to be done in a secure way.
7200
Which of the following operations DNSenum cannot perform?
7201
Given int a = 10, b = 20, c; b *= a + 5; What is the resulting value of b?
7202
___________________ is the method used to locate all the DNS-servers and their associated records for an organization.
7203
What is wrong with this sequence of code? sum = 100; int sum;
7204
The _____________ command is used on Linux for getting the DNS and host-related information.
7205
Ping sweep is also known as ________________
7206
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.
7207
What is a local variable that has no default initial value and does not retain its value through method calls?
7208
To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server.
7209
What is the value of z after executing this sequence (check indentation)? int x = 100, y = 50, z = -1; if ( x + y > 50) if ( x + y < 100) z = 0; else z = 1;
7210
What is the value of s after executing this loop: int i = 0, s = 0; while (i < 5) s += ++i;
7211
____________ is a common tool used for doing OS fingerprinting.
7212
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely
7213
What does the leading + sign at the start of a method indicate?
7214
What is the file extension name used for Objective-C code?
7215
Which of the following do not comes under the important element of OS fingerprinting?
7216
How many basic elements are there for OS fingerprinting?
7217
______________________ is based on sniffer traces from the remote system.
7218
_____________________ is gained if you send especially skilled packets to a target machine.
7219
How many types of fingerprinting are there in ethical hacking?
7220
________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.
7221
Information Gathering about the system or the person or about organization or network is not important.
7222
For hacking a database or accessing and manipulating data which of the following language the hacker must know?
7223
Understanding of ___________ is also important for gaining access to a system through networks.
7224
Why programming language is important for ethical hackers and security professionals?
7225
Which of the following do not comes under the intangible skills of hackers?
7226
________________ enables a hacker to open a piece of program or application and re-build it with further features & capabilities
7227
_________ persistence and up-to-date with the latest technological updates and their flaws are some of the major qualities; an ethical hacker must need to have.
7228
An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the technology works.
7229
Network enumerator is also known as ________________
7230
A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.
7231
Network enumeration is the finding of __________ or devices on a network.
7232
__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.
7233
Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email
7234
To stop your system from getting enumerated, you have to disable all services.
7235
__________ is used that tries for guessing the usernames by using SMTP service.
7236
enum4linux is used to enumerate _______________
7237
________ suite is used for NTP enumeration.
7238
Enumeration does not depend on which of the following services?
7239
Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?
7240
______________ is the first phase of ethical hacking.
7241
What common web scripting languages are used by attackers to fetch various details from its surfing users?
7242
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.
7243
Attackers commonly target ____________ for fetching IP address of a target or victim user.
7244
Testing for buffer-overflow in a system can be done manually and has two possible ways.
7245
How many primary ways are there for detecting buffer-overflow?
7246
Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure.
7247
Malicious code can be pushed into the _________ during ______________ attack.
7248
In an application that uses stack, the memory for data is allocated ____________
7249
In an application that uses heap, the memory for data is allocated ____________
7250
With the lack of boundary check, the program ends abnormally and leads to ___________ error
7251
_____________ buffer overflows, which are more common among attackers.
7252
Among the two types ____________buffer-overflow is complex to execute and the least common attack that may take place.
7253
Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment.
7254
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.
7255
Why apps developed in languages like C, C++ is prone to Buffer-overflow?
7256
Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.
7257
Buffer-overflow may remain as a bug in apps if __________ are not done fully.
7258
Buffer-overflow is also known as ______________
7259
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.
7260
Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________
7261
How many types of buffer-overflow attack are there?
7262
In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
7263
A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers.
7264
RBAC is abbreviated as ______________
7265
DTE is abbreviated as ___________________
7266
_______________ in a system is given so that users can use dedicated parts of the system for which they’ve been given access to.
7267
MAC is abbreviated as _______________
7268
In a Linux-based system, the accounts may be members of 1 or more than one group.
7269
In your Linux-based system, you have to log-in with your root account for managing any feature of your system.
7270
Using the ______ account of a UNIX system, one can carry out administrative functions.
7271
Which of the following comes under secured Linux based OS?
7272
Subgraph OS is a Debian based Linux distro which provides hardcore anonymity and is approved by Edward Snowden.
7273
____________ is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help in preserving users’ data private.
7274
Which of the following OS does not comes under a secured Linux OS list?
7275
_________ is one of the most secured Linux OS that provides anonymity and incognito option for securing its user data.
7276
Using VPN, we can access _______________
7277
_________ are also used for hides user’s physical location
7278
__________ masks your IP address.
7279
A ______ can hide a user’s browsing activity.
7280
For secure connection, Remote access VPNs rely on ___________ and ____________
7281
There are ________ types of VPN protocols.
7282
Site-to-Site VPN architecture is also known as _________
7283
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
7284
_________ type of VPNs are used for home private and secure connectivity.
7285
Site-to-site VPNs are also known as ________
7286
There are _________ types of VPNs.
7287
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
7288
What types of protocols are used in VPNs?
7289
Which of the statements are not true to classify VPN systems?
7290
__________ provides an isolated tunnel across a public network for sending and receiving data privately, as if the computing devices were directly connected to the private network.
7291
VPN is abbreviated as __________
7292
Application layer firewalls are also called ____________
7293
Stateful Multilayer firewalls are also called _________
7294
acket filtering firewalls are also called ____________
7295
One advantage of Stateful Multilayer Inspection firewall is __________
7296
We can also implement ____________ in Stateful Multilayer Inspection firewall.
7297
Stateful Multilayer Inspection firewall cannot perform which of the following?
7298
___________ firewalls are a combination of other three types of firewalls.
7299
Application level gateway firewalls are also used for configuring cache-servers.
7300
Application level gateway firewalls protect the network for specific __________
7301
____________ gateway firewalls are deployed in application-layer of OSI model.
7302
Which of the following is a disadvantage of Circuit-level gateway firewalls?
7303
Which of these comes under the advantage of Circuit-level gateway firewalls?
7304
Circuit-level gateway firewalls are installed in _______ layer of OSI model.
7305
Packet filtering firewalls are vulnerable to _________
7306
Packet filtering firewalls work effectively in _________ networks.
7307
One advantage of Packet Filtering firewall is __________
7308
Network administrators can create their own ACL rules based on _______ ________ and _______
7309
When a packet does not fulfil the ACL criteria, the packet is _________
7310
ACL stands for _____________
7311
The __________ defines the packet filtering firewall rules.
7312
In the ______________ layer of OSI model, packet filtering firewalls are implemented.
7313
Packet filtering firewalls are deployed on ________
7314
There are ______ types of firewall.
7315
A firewall protects which of the following attacks?
7316
Firewall examines each ____________ that are entering or leaving the internal network.
7317
Which of the following is not a software firewall?
7318
_________ is software that is installed using internet connection or they come by-default with operating systems.
7319
_________________ is the kind of firewall is connected between the device and the network connecting to internet.
7320
Firewalls can be of _______ kinds.
7321
Which of the following is the port number for SNMP – Trap?
7322
Which of the following is the port number for SNMP?
7323
Which of the following is the port number for POP3?
7324
Which of the following is the port number for Kerberos?
7325
TACACS+ uses TCP port 49.
7326
Which of the following is the port number for HTTP?
7327
Which of the following is the port number for SFTP service?
7328
Why it is important to know which service is using which port number?
7329
Port 80 handles unencrypted web traffic.
7330
Which of the following is the port number for TFTP service?
7331
Which of the following are the port numbers for DHCP?
7332
Which of the following are the port numbers for IPSec service?
7333
Which of the following is the port number for SMTP service?
7334
Which of the following is the port number for Telnet?
7335
Which of the following is the port number for SSH (Secure Shell)?
7336
Which of the following is the port number for FTP control?
7337
Which of the following is the port number for FTP data?
7338
The logical port is associated with the type of protocol used along with the IP address of the host
7339
_______ needs some control for data flow on each and every logical port.
7340
Virtual ports help software in sharing without interference all hardware resources
7341
Logical ports are also known as ________________
7342
Number of logical ports ranges from _____ to _____
7343
____________ are logical numbers assigned for logical connections
7344
Physical ports are usually referred to as ___________
7345
There are ______ major types of ports in computers.
7346
_____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.ClickjackingClickjacking
7347
_________ is a device which secretly collects data from credit / debit cards.
7348
___________ is a device which secretly collects data from credit / debit cards.
7349
____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
7350
What is the shortcut key to show Spelling and Grammar ?
7351
____________ is a scenario when information is accessed without authorization.
7352
Which object is created by the UIApplicationMain function at app launch time?
7353
Automatic Reference Counting (ARC) is a ?
7354
Interactive experience of a scripting language can be enabled by ______________
7355
A Cocoa is a ?
7356
How many types of Protocols are there?
7357
A special C data type that encapsulates other pieces of data into a single cohesive unit is called?
7358
Which is true about the XCode command line tools?
7359
_________ are a specific section of any virus or malware that performs illicit activities in a system.
7360
Which shortcut keys can be used to add files in XCode?
7361
What is the shortcut to Edit variables in scope?
7362
When we use NSArray?
7363
Whaling is the technique used to take deep and _________ information about any individual.
7364
XCode is the integrated development environment (IDE) that developer use to write software for IOS or __________ applications ?
7365
In IP address, IP is abbreviated as ________
7366
What is the shortcut key in XCode to Find Previous?
7367
Is the delegate for a CAAnimation retained?
7368
Let's assume that an app is not in foreground but is still executing code. In which state will it be in?
7369
What is the shortcut to open the Code Snippet Library in XCode?
7370
Which of the following is used to design GUI of Apps (Inbuilt feature of the iPhone SDK) ?
7371
Name the application thread from where UIKit classes should be used?
7372
_______ is an attack technique occurs when excess data gets written to a memory block.
7373
How many operators are supported by C++?
7374
Each element of an array is searched against searching key, is specialty of
7375
In object oriented programming there are two distinct views, one is consumer and second is manufacturer view, that consumer action are called
7376
Adware are pre-chosen _______ developed to display ads.
7377
First object oriented language 'Smalltalk' were first appeared in
7378
Backdoors are also known as ____________
7379
os: : skipws, ios: : left, ios: : dec, ios: : fixed, is an example of
7380
________ automates an action or attack so that repetitive tasks are done at a faster rate.
7381
anguage that has become key programming language for Mac OSX operating system is
7382
IPods, iPhones and iPads programming is based on
7383
Data masking is also known as _________
7384
Object-oriented language based on C is
7385
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
7386
________ is an act of hacking by the means of which a political or social message is conveyed.
7387
_______ is a way to breach the security by using the vulnerability of that system.
7388
An/A ________ is an act that violates cyber-security.
7389
When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
7390
Existence of weakness in a system or network is called _______
7391
_______ is any action that might compromise cyber-security.
7392
IKE is abbreviated as Internet Key Exchange.
7393
_______ is the entity for issuing digital certificates.
7394
ESP is abbreviated as ___________
7395
SRTP is abbreviated as ________
7396
In which of the following cases Session Initiation Protocol is not used?
7397
SIP is abbreviated as __________
7398
The latest version of TLS is _____
7399
Authentication in PCT requires _____ keys.
7400
PCT is abbreviated as ________
7401
SFTP is abbreviated as _______
7402
Why did SSL certificate require in HTTP?
7403
Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection.
7404
S/MIME is abbreviated as __________________
7405
_________ is used for encrypting data at network level.
7406
In SSL, what is used for authenticating a message?
7407
SSL primarily focuses on _______
7408
HTTPS is abbreviated as _________
7409
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
7410
__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?
7411
Given that we have defined myChar like so : let myChar: Character = “b” Which code segment can be considered a complete Switch statement and will run without any error?
7412
Which of the following is not a secured mail transferring methodology?
7413
Which of the following is not a strong security protocol?
7414
Which keyword in the context of a Switch statement is required to force the execution of a subsequent case?
7415
___________ ensures the integrity and security of data that are passing over a network.
7416
What is the output of this segment of code ? var x = 0 for index in 1…5 { ++x } println(“(x)”)
7417
In context of a Swift subscript, which of the following is correct?
7418
Physical _________ is important to check & test for possible physical breaches.
7419
Which of them is not an example of physical hacking?
7420
IT security department must periodically check for security logs and entries made during office hours.
7421
Which of the following is not a physical security measure to protect against physical hacking?
7422
Which of the following is not considering the adequate measure for physical security?
7423
________ is the ability of an individual to gain physical access to an authorized area
7424
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
7425
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.
7426
Tailgating is also termed as ___________
7427
In a phishing, attackers target the ________ technology to so social engineering.
7428
Which of the following is not an example of social engineering?
7429
Which of the following is the technique used to look for information in trash or around dustbin container?
7430
_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.
7431
Which of the following do not comes under Social Engineering?
7432
___________ is a special form of attack using which hackers’ exploit – human psychology.
7433
Which of the following is not a footprint-scanning tool?
7434
_________ is the last phase of ethical hacking process.
7435
Which of them is not a track clearing technique?
7436
In _______ phase, the hackers try to hide their footprints.
7437
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
7438
_______ is the tool used for this purpose.
7439
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
7440
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
7441
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?
7442
Which of the following is not done in gaining access phase?
7443
In __________ phase the hacker exploits the network or system vulnerabilities
7444
Which of the following comes after scanning phase in ethical hacking?
7445
Which of them is not a scanning tool?
7446
Which of them do not comes under scanning methodologies?
7447
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
7448
_______ phase in ethical hacking is known as the pre-attack phase.
7449
Which of the following is an example of passive reconnaissance?
7450
Which of the following is an example of active reconnaissance?
7451
There are ______ subtypes of reconnaissance.
7452
Which of the following is not a reconnaissance tool or technique for information gathering?
7453
__________ is the information gathering phase in ethical hacking from the target user.
7454
How many basic processes or steps are there in ethical hacking?
7455
Possible threat to any information cannot be ________________
7456
Lack of access control policy is a __________
7457
Compromising confidential information comes under _________
7458
_______ technology is used for analyzing and monitoring traffic in network and information flow.
7459
The full form of EDR is _______
7460
Which of the following information security technology is used for avoiding browser-based hacking?
7461
_____ platforms are used for safety and protection of information in the cloud.
7462
From the options below, which of them is not a vulnerability to information security?
7463
From the options below, which of them is not a threat to information security?
7464
_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
7465
One common way to maintain data availability is __________
7466
______ is the latest technology that faces an extra challenge because of CIA paradigm
7467
Data integrity gets compromised when _____ and _____ are taken control off.
7468
Which of these is not a proper method of maintaining confidentiality?
7469
Data ___________ is used to ensure confidentiality.
7470
This helps in identifying the origin of information and authentic user. This referred to here as __________
7471
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
7472
_______ of information means, only authorised users are capable of accessing the information
7473
When integrity is lacking in a security system, _________ occurs.
7474
______ means the protection of data from modification by unknown users
7475
When you use the word _____ it means you are protecting your data from getting disclosed
7476
CIA triad is also known as ________
7477
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?
7478
According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
7479
In general how many key elements constitute the entire security structure?
7480
When declaring an enumeration, multiple member values can appear on a single line, separated by which punctuation mark?
7481
___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain
7482
Which of the following types can be used use as raw value types for an enumeration?
7483
Stuxnet is a _________
7484
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium
7485
_________ are the special type of programs used for recording and tracking user’s keystroke
7486
What attribute can be used to allow a protocol to contain optional functions and to be used in ObjC?
7487
Which method of hacking will record all your keystrokes?
7488
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
7489
Which of them is not a wireless attack?
7490
Which of this is an example of physical hacking?
7491
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________
7492
When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place
7493
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?
7494
XSS is abbreviated as __________
7495
_____________ is a code injecting method used for attacking the database of a system / website.
7496
Which is used for down casting?
7497
Who deploy Malwares to a system or network?
7498
The full form of Malware is ________
7499
What is the type of Swift Enumerations?
7500
Which keyword in the context of a Switch statement is required to force the execution of a subsequent case? Answers:
7501
Someone (from outside) who tests security issues for bugs before launching a system or application, and who is not a part of that organization or company are ______
7502
What type of object are Swift Structures?
7503
Governments hired some highly skilled hackers. These types of hackers are termed as _______
7504
Which is correct regarding Swift enumeration members when they are defined?
7505
__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.
7506
What keyword is used to indicate a custom operator that will appear in between two targets, similar to the addition operator in this example? var sum = 10 + 10
7507
________ are senior level corporate employees who have the role and responsibilities of creating and designing secured network or security structures
7508
Role of security auditor is to _______
7509
Which of the following statements could be used to determine if a given variable is of String type?
7510
_________ are those individuals who maintain and handles IT security in any firm or organization
7511
These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to?
7512
One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________
7513
Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________
7514
Which is the wrong definition of a protocol in Swift?
7515
Which of these is not a valid property declaration in Swift?
7516
Which of these is an appropriate syntax for declaring a function that takes an argument of a generic type?
7517
Suicide Hackers are those _________
7518
Which of these is an appropriate syntax for dispatching a heavy operation to a background thread?
7519
The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________
7520
________ are the combination of both white as well as black hat hackers.
7521
Which of these is a valid syntax for iterating through the keys and values of a dictionary? let dictionary = [keyOne : valueOne, keyTwo : valueTwo]
7522
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
7523
Which one of the below functions definitions is wrong considering Swift language?
7524
Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
7525
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________
7526
What is the name of the Xcode generated header file used to import Swift classes into an Objective-C Class given a product module named Example?
7527
What is used to import Objective-C files into Swift?
7528
Which of the following could be used to indicate the Function Type of the following function: func joinStrings(stringOne: String, stringTwo: String) -> String { return stringOne + stringTwo }
7529
How would one indicate that a variable is an enum of type Status outside the context of MyClass?
7530
Which one is the correct keyword for defining a constant in Swift? ( or To declare a constant in Swift you would use: )
7531
Which of these is an appropriate syntax for dispatching a heavy operation to a background thread?
7532
Which of these is a valid definition of a generic function that incorporates inout parameters in Swift?
7533
Which is correct for Enumerations?
7534
Which keyword is used on a function in an enumeration to indicate that the function will modify ‘self’?
7535
What is the name of the Swift language feature that Objective-C Blocks are translated into?
7536
Which of these statements is a valid way to extend the capabilities of our theoretical class, MyClass to conform to protocol MyProtocol?
7537
What does a retainCount represent in ARC?
7538
All Swift classes must inherit from which root class?
7539
Considering var index = UInt8.max, which of the following operation results to the value of zero for var index?
7540
Which of the following structures has both computed and stored properties?
7541
C# (C-Sharp) belong to which framework ?
7542
What is C# (C-Sharp) ?
7543
C# (C-Sharp) was developed by
7544
What Will Be The Output Of The Following Code Snippet: using System; using System.Text; public class Program { public static void Main(string[] args) { String str = ""; StringBuilder sb1 = new StringBuilder("TechBeamers"); StringBuilder sb2 = new StringBuilder("TechBeamers"); StringBuilder sb3 = new StringBuilder("Welcome"); StringBuilder sb4 = sb3; if (sb1.Equals(sb2)) str += "1"; if (sb2.Equals(sb3)) str += "2"; if (sb3.Equals(sb4)) str += "3"; String str1 = "TechBeamers"; String str2 = "Welcome"; String str3 = str2; if (str1.Equals(str2)) str += "4"; if (str2.Equals(str3)) str += "5"; Console.WriteLine(str); } }
7545
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Console.WriteLine("H" + 'I'); Console.WriteLine('h' + 'i'); } }
7546
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public Program(Object o) { Console.WriteLine("Object argument"); } public Program(double[] arr) { Console.WriteLine("double array argument"); } public static void Main(string[] args) { new Program(null); } }
7547
What Will Be The Output Of The Following Code Snippet: using System; class Program { static void Main(string[] args) { double num1 = 1.000001; double num2 = 0.000001; Console.WriteLine((num1 - num2) == 1.0); } }
7548
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { for (int x = 0; x < 10; x++) { Console.Write(x + ' '); } } }
7549
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { float num = 56, div = 0; try { Console.WriteLine(num / div); } catch (DivideByZeroException) { Console.WriteLine("Division By Zero"); } } }
7550
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { int[] singleDimArray = { 1, 2, 3, 4 }; int[,] multiDimArray = { { 1, 2 }, { 3, 4 } }; int[][] jaggedArray = { new int[] { 1, 2 }, new int[] { 3, 4 } }; Console.WriteLine(singleDimArray.Length); Console.WriteLine(multiDimArray.Length); Console.WriteLine(jaggedArray.Length); } }
7551
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { string str1 = "\U0010FADE"; string str2 = "\U0000FADE"; Console.WriteLine(str1.Length); Console.WriteLine(str2.Length); } }
7552
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Boolean b1 = true, b2 = false; if ((b2 = true) | (b1 ^ b2)) { Console.WriteLine("execution success"); } else { Console.WriteLine("execution failure"); } } }
7553
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int val = (byte)+(char)-(int)+(long)-2; Console.WriteLine(val); } }
7554
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { int num = 0; (num++); Console.WriteLine(num); } }
7555
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { Sample s = new Sample(); s.Print(); ISample i = s; i.Print(); } public interface ISample { void Print(string val = "Interface Executed"); } public class Sample : ISample { public void Print(string val = "Class Executed") { Console.WriteLine(val); } } }
7556
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { string str1 = "TechBeamers"; string str2 = "Techbeamers"; if (str1 == str2) Console.WriteLine("Both Strings are Equal"); else Console.WriteLine("Both Strings are Unequal"); if (str1.Equals(str2)) Console.WriteLine("Both Strings are Equal"); else Console.WriteLine("Both Strings are Unequal"); Console.ReadLine(); } }
7557
What Will Be The Output Of The Following Code Snippet: using System; public class Program { static void Main(string[] args) { Derived d = new Derived(); int i = 10; d.Func(i); Console.ReadKey(); } } public class Base { public virtual void Func(int x) { Console.WriteLine("Base.Func(int)"); } } public class Derived : Base { public override void Func(int x) { Console.WriteLine("Derived.Func(int)"); } public void Func(object o) { Console.WriteLine("Derived.Func(object)"); } }
7558
What Will Be The Output Of The Following Code Snippet: using System; public class Calculation { int sum = 0; int count = 0; float average; public void CalAverage() { if ( count == 0) throw ( new CountIsZeroException ("Zero count in DoAverage")); { average = sum / count; Console.WriteLine( "Program executed successfully" ); } } } public class CountIsZeroException : ApplicationException { public CountIsZeroException ( string message ) : base ( message ) { } } class Program { static void Main ( string[ ] args ) { Calculation c = new Calculation(); try { c.CalAverage(); } catch ( CountIsZeroException e ) { Console.WriteLine( "CountIsZeroException : {0}",e ); } Console.ReadLine(); } }
7559
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { try { Console.WriteLine("TechBeamers Welcomes Its Readers"); Environment.Exit(0); } finally { Console.WriteLine("To the World of C# !!"); } } }
7560
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { var test = SingletonB.Test; } } class SingletonB { static readonly SingletonB _instance = new SingletonB(); public static SingletonB Test { get { return _instance; } } private SingletonB() { Console.WriteLine("Default Constructor"); } static SingletonB() { Console.WriteLine("Static Constructor"); } }
7561
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int i = 3; int j = 2; func1(ref i); func2(out j); Console.WriteLine(i + " " + j); } static void func1(ref int num) { num = num + num; } static void func2(out int num) { num = num * num; } }
7562
What Will Be The Output Of The Following Code Snippet: using System; class Program { enum Color: int { red, green, blue = 5, cyan, magenta = 10, yellow } public static void Main() { Console.WriteLine( (int) Color.green + ", " ); Console.WriteLine( (int) Color.yellow ); } }
7563
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static int i = 0; public static void Main() { (i++).Assign(); } } static class Extensions { public static void Assign(this int i) { Console.WriteLine(Program.i); Console.WriteLine(i); } }
7564
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main() { int[] arr = { 1, 2, 3 }; int i = 1; arr[i++] = arr[i] + 10; Console.WriteLine(String.Join(",", arr)); } }
7565
What Will Be The Output Of The Following Code Snippet: using System; public class Program { static void Main(string[] args) { string str = "100p"; int i = 0; if(int.TryParse(str,out i)) {Console.WriteLine("Yes string contains Integer and it is " + i); } else { Console.WriteLine("string does not contain Integer"); } } }
7566
What Will Be The Output Of The Following Code Snippet: using System; class Program { static void Main(string[] args) { String s1 = "TechBeamers"; String s2 = "Welcomes its readers"; String s3 = s2; Console.WriteLine((s3 == s2) + " " + s2.Equals(s3)); Console.ReadLine(); } }
7567
What Will Be The Output Of The Following Code Snippet: using System; namespace TechBeamers { class Sample { public int num; public int[] arr = new int[10]; public void assign(int i, int val) { arr[i] = val; } } class Program { static void Main(string[] args) { Sample s = new Sample(); s.num = 100; Sample.assign(0, 10); s.assign(0, 9); Console.WriteLine(s.arr[0]); } } }
7568
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int i, j = 1, k; for (i = 0; i < 5; i++) { k = j++ + ++j; Console.Write(k + " "); } } }
7569
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int n = 5; int x = 4; int z, c, k; z = 3 * x * x + 2 * x + 4 / x + 8; for (c = 1; c <= n; c++) { for (k = 1; k <= c; k++) { Console.Write(Convert.ToString(Convert.ToChar(z))); z++; } Console.WriteLine("\n"); } Console.ReadLine(); } }
7570
What Will Be The Output Of The Following Code Snippet: using System; namespace TechBeamers { class sample { public int x; private int y; public void assign(int a, int b) { x = a + 1; y = b; } } public class Program { public static void Main(string[] args) { sample s = new sample(); s.assign(1, 1); Console.WriteLine(s.x + " " + s.y); } } }
7571
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main() { classA a = new classC(); Console.WriteLine(a.Print()); } public class classA { public virtual string Print() { return "classA"; } } public class classB : classA { public override string Print() { return "classB"; } } public class classC : classB { public new string Print() { return "ClassC"; } } }
7572
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { bool a = true; bool b = false; a |= b; Console.WriteLine(a); Console.ReadLine(); } }
7573
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { bool a = true; bool b = false; a ^= b; Console.WriteLine(a); Console.ReadLine(); } }
7574
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.ObjectModel; using System.Collections.Generic; namespace TechBeamers { delegate void A(ref string str); public class sample { public static void StringMarker(ref string a) { a = a.Substring(0, a.Length - 6); } } public class Program { public static void Main(string[] args) { A str1; string str = "Let's Learn CSharp"; str1 = sample.StringMarker; str1(ref str); Console.WriteLine(str); } } }
7575
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main() { Nullable number = 0; int num = 1; Console.WriteLine(number.GetType() == num.GetType()); } }
7576
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.ObjectModel; using System.Collections.Generic; public class Program { public static void Main() { var arr = new List { 20, 40, 35, 85, 70 }; var collection = new Collection(arr); arr.Add(60); arr.Sort(); Console.WriteLine(String.Join(",", collection)); } }
7577
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; namespace TechBeamers { public delegate void sampleDelegate(int num); public class testDelegate { public void checkEven(int num) { if(num%2 ==0) Console.WriteLine("This number is an even number"); else Console.WriteLine("This number is an odd number"); } public void squareNumber(int num) { Console.WriteLine("Square of this number is: {0}", num*num); } } class sample { public static void Main( ) { testDelegate obj = new testDelegate(); sampleDelegate delegateObj = new sampleDelegate(obj.checkEven); delegateObj += new sampleDelegate(obj.squareNumber); delegateObj(25); } } }
7578
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; namespace TechBeamers { delegate string del(string str); class sample { public static string DelegateSample(string a) { return a.Replace(',', '*'); } } public class InterviewProgram { public static void Main(string[] args) { del str1 = new del(sample.DelegateSample); string str = str1("Welcome,,friends,,to,,TechBeamers"); Console.WriteLine(str); } } }
7579
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; public class Program { public static void Main(string[] args) { var actions = new List(); for (int i = 0; i < 4; i++) actions.Add(() => Console.WriteLine(i)); foreach (var action in actions) action(); } }
7580
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; public class Program { public static void Main(string[] args) { string[] strings = { "abc", "def", "ghi" }; var actions = new List(); foreach (string str in strings) actions.Add(() => { Console.WriteLine(str); }); foreach (var action in actions) action(); } }
7581
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Program obj = null; Console.WriteLine(Program.print()); } private static String print() { return "Hi, I am a Tech-savvy!!"; } }
7582
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { char[] num = { '1', '2', '3' }; Console.WriteLine(" char array: " + num); } }
7583
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int num1 = 20; int num2 = 30; num1 ^= num2 ^= num1 ^= num2; Console.WriteLine(num1 + ","+ num2); } }
7584
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { char x = 'A'; int i = 0; Console.WriteLine (true ? x : 0); Console.WriteLine(false ? i : x); } }
7585
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Program p = new Program(); p.print(2, 3, 8); int[] arr = { 2, 11, 15, 20 }; p.print(arr); Console.ReadLine(); } public void print(params int[] b) { foreach (int i in b) { Console.WriteLine(i); } } }
7586
What Will Be The Output Of The Following Code Snippet: using System; public class Program { static void arrayMethod(int[] a) { int[] b = new int[5]; a = b; } public static void Main(string[] args) { int[] arr = new int[10]; arrayMethod(arr); Console.WriteLine(arr.Length); }
7587
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { String a = "TechBeamers"; String b = "TECHBEAMERS"; int c; c = a.CompareTo(b); Console.WriteLine(c); } }
7588
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int[] arr = new int[2]; arr[1] = 10; Object o = arr; int[] arr1 = (int[])o; arr1[1] = 100; Console.WriteLine(arr[1]); ((int[])o)[1] = 1000; Console.WriteLine(arr[1]); } }
7589
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { #if (!pi) Console.WriteLine("i"); #else Console.WriteLine("PI undefined"); #endif Console.WriteLine("ok"); Console.ReadLine(); } }
7590
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { byte num = 100; dynamic val = num; Console.WriteLine(val.GetType()); val += 100; Console.WriteLine(val.GetType()); } }
7591
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int[] i = new int[0]; Console.WriteLine(i[0]); } }
7592
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Console.WriteLine(Math.Round(6.5)); Console.WriteLine(Math.Round(11.5)); } }
7593
What Will Be The Output Of The Following Code Snippet? using System; class Program { static void Main(string[] args) { int num = 5; int square = 0, cube = 0; Mul (num, ref square, ref cube); Console.WriteLine(square + " & " +cube); Console.ReadLine(); } static void Mul (int num, ref int square, ref int cube) { square = num * num; cube = num * num * num; } }
7594
What Will Be The Output Of The Following Code Snippet? using System; class sum { public int value; int num1; int num2; int num3; public sum ( int a, int b, int c) { this.num1 = a; this.num2 = b; this.num3 = c; } ~ sum() { value = this.num1 * this.num2 * this.num3; Console.WriteLine(value); } } class Program { public static void Main(string[] args) { sum s = new sum(4, 5, 9); } }
7595
What Will Be The Output Of The Following Code Snippet? using System; class sample { int i; double k; public sample (int ii, double kk) { i = ii; k = kk; double j = (i) + (k); Console.WriteLine(j); } ~sample() { double j = i - k; Console.WriteLine(j); } } class Program { static void Main(string[] args) { sample s = new sample(9, 2.5); } }
7596
What Is The Correct Name Of A Method Which Has The Same Name As That Of Class And Used To Destroy Objects?
7597
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int x = 8; int b = 16; int c = 64; x /= c /= b; Console.WriteLine(x + " " + b+ " " +c); Console.ReadLine(); } }
7598
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int x = 4 ,b = 2; x -= b/= x * b; Console.WriteLine(x + " " + b); Console.ReadLine(); } }
7599
Which Of The Following Statements Correctly Tell The Differences Between ‘=’ And ‘==’ In C#?
7600
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int[] arr = new int[] {1 ,2 ,3 ,4 ,5 }; fun1(ref arr); Console.ReadLine(); } static void fun1(ref int[] array) { for (int i = 0; i < array.Length; i=i+2) { array[i] = array[i] + 10; } Console.WriteLine(string.Join(",", array)); } }
7601
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int num = 2; fun1 (ref num); Console.WriteLine(num); Console.ReadLine(); } static void fun1(ref int num) { num = num * num * num; } }
7602
What Will Be The Output Of The Following Code Snippet? using System; class sample { public static void first() { Console.WriteLine("first method"); } public void second() { first(); Console.WriteLine("second method"); } public void second(int i) { Console.WriteLine(i); second(); } } class program { public static void Main() { sample obj = new sample(); sample.first(); obj.second(10); }
7603
Which Of The Following Gives The Correct Count Of The Constructors That A Class Can Define?
7604
Which Of The Following Statements Are Correct For The Given Code Snippet: shape obj; obj = new shape();
7605
What Will Be The Output Of The Following Code Snippet? using System; class emp { public string name; public string address; public void display() { Console.WriteLine("{0} is in city {1}", name, address); } } class Program { static void Main(string[] args) { emp obj = new emp(); obj.name = "Akshay"; obj.address = "new delhi"; obj.display(); Console.ReadLine(); } }
7606
Which Of The Following Operator Can Be Used To Access The Member Function Of A Class?
7607
Which Of The Following Can Be Used To Define The Member Of A Class Externally?
7608
Which of the following data types is implicitly passed by reference in PHP 5 while it is passed by value in PHP 4?
7609
Correct way to assign values to variable c when int a=12, float b=3.5,int c;
7610
Which of the following types of cursors is available with ADO.NET DataReader object?
7611
What is the output of the following code? <?php $a = 'a'; $b = 'b'; echo isset($c) ? $a.$b.$c : ($c = 'c').'d'; ?>
7612
Which datatype should be more preferred for storing a simple number like 35 to improve execution speed of a program?
7613
What is the maximum size of the VARCHAR column type?
7614
You created a stored procedure to retrieve the following details for the given customer: CustomerName, Address, PhoneNumber Which of the following is an ideal choice to get the best performance?
7615
Which of the following is capable of returning multiple rows and multiple columns from the database?
7616
An assembly must have an permission to connect with web server is?
7617
Which of the following are value types
7618
Which of the following converts a type to a signed byte type in C#?
7619
Arrange the following datatype in order of increasing magnitude sbyte, short, long, int.
7620
Correct Declaration of Values to variables a and b?
7621
For locking the data with synchronization which class will be used?
7622
Which of the following preprocessor directive defines a sequence of characters as symbol in C#?
7623
How many Bytes are stored by Long Datatype in C# .net?
7624
Which access specifier will you use to make base class members accessible in the derived class and not accessible for the rest of the program?
7625
The original name of Common Intermediate Language is
7626
The global assembly cache
7627
In order to lock/unlock an object use the
7628
Which of the following did not result in an output error in PHP 4 but does in PHP 5?
7629
Which of the following keyword is used for including the namespaces in the program in C#?
7630
Which of the following did not result in an output error in PHP 4 but does in PHP 5?:
7631
Which sentence describes the following regular expression match? preg_match('/^\d*(?:\.[0-9]+)?$/', $test);
7632
_____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
7633
Who was the first individual to distribute computer worms through internet?
7634
In which year the Computer Fraud & Abuse Act was adopted in the United States?
7635
What is the ideal method of copying data between two opened files?
7636
In which year computer scientists try to integrate encryption technique in TCP/IP protocol?
7637
Who coined the term “cyberspace”?
7638
Name the hacker who breaks the ARPANET systems?
7639
Who was the first individual who performed a major hacking in the year 1971?
7640
In which year, hacking became a practical crime and a matter of concern in the field of technology?
7641
In which year, first practical technology hacking came into origin?
7642
______ is the oldest phone hacking techniques used by hackers to make free calls
7643
What is the name of the first hacker’s conference?
7644
In which year the first popular hacker conference took place?
7645
What is the one thing that old hackers were fond of or find interests in?
7646
From where the term ‘hacker’ first came to existence?
7647
From where the term ‘hacker’ first came to existence?
7648
In which year the term hacking was coined?
7649
Which of the following features is activated in iPhone when you rotate the device from portrait to landscape?
7650
What is resolution of iPad Min in portrait mode?
7651
What Does SAX stands for?
7652
Which iOS version supports multitasking?
7653
What is meant by Nil?
7654
Where does an activity exists when it doesn't exist in memory?
7655
What does DOM stands for?
7656
Which are the app specific objects that stores the app's content?
7657
Is it true that the iPhone browser supports flash applications?
7658
Which of the following is NOT a state in the life cycle of an iOS app?
7659
What is meaning of "synthesize" keyword ?
7660
Which wireless mode connects machines directly to one another, without the use of an access point?
7661
What is the major difference between an 'Ethical Hacker' and a 'Cracker'?
7662
How can we find the memory leaks in an app that uses MRC (Manual Reference Counting)?
7663
What does KVC stands for?
7664
What are the two basic types of attacks ?
7665
In a UITableViewCell constructor, What is the use of reuseIdentifier ?
7666
What does the term "Ethical Hacking" mean?
7667
What is the best reason to implement a security policy?
7668
Which tool can be used to perform a DNS zone transfer on Windows?
7669
How can we use a reusable cell in UITableview?
7670
Why would an attacker want to perform a scan on port 137?
7671
A packet with all flags set is which type of scan?
7672
What does the TCP RST command do?
7673
Banner grabbing is an example of what?
7674
What port number does HTTPS use?
7675
Which are the four regional Internet registries?
7676
When a hacker attempts to attack a host via the Internet it is known as what type of attack?
7677
Hacking for a cause is called .................
7678
Which type of hacker represents the highest risk to your network?
7679
What is the first phase of hacking?
7680
what is the primary goal of an Ethical Hacker ?
7681
A good security policy can help to protect a network
7682
This attack involves eavesdropping on a network and capturing sensitive information
7683
Active cracking is more effective than passive cracking
7684
Rainbow table attack uses the algorithms that try to guess all possible logical combination to crack the password
7685
Brute force attack uses wordlist to crack a passwords
7686
The Encrypted information is known as a ____
7687
Can we change the default services port number like for FTP?
7688
Name the tool that can be used to install, delete & replicate programs
7689
Patch management is use of software code to fix bugs and secure the software
7690
The ____ attack used to compromise the DNS servers to redirect all the traffic to a malicious site
7691
Which attack is used to crash Web Server
7692
Telnet service runs on which Port number
7693
____ is used to intercept packages as they are transmitted over the network
7694
Which service runs on port 21
7695
Which of the following was NOT one of the pseudonyms under which Swift published?
7696
How many number of bits are used by IPv6
7697
SHA-512 encryption uses ____ bit words
7698
Swift had a rich literary ancestry. He had some family relation to all of the following people EXCEPT whom?
7699
____is the art of exploiting the human elements to gain access to un-authorized resources
7700
A worm is not a malicious computer program
7701
Swift was perhaps best known for what historically popular work?
7702
A ____ is a program that allows the attack to control the user's computer from a remote location
7703
NetStumbler is cross platform and open source tool
7704
True or False: Though he used many pen names, Swift never published completely anonymously
7705
The password cracking utility John The Ripper is cross platform
7706
A ______ who gains access to systems with a view to fix the identified weaknesses
7707
Although he was a poet and an essayist, Swift was best known as a ___________.
7708
Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc
7709
The _____ defines a threat is the potential cause of an incident that may result in harm of systems and organization
7710
Name the hacker who uses hacking to send social, religious, and political, etc messages. This is, usually, done by hijacking websites and leaving a message on the hijacked website
7711
Which of the following is true regarding WEP cracking?
7712
Which of the following is a passive wireless discovery tool?
7713
What is the maximum length of an SSID?
7714
CDMA stands for
7715
Which wireless mode connects machines directly to one another, without the use of an access point?
7716
What is the attack called “evil twin”?
7717
What are the forms of password cracking techniques?
7718
At which layer of the OSI communication model dose bridge operate?
7719
What Is A LLVM ?
7720
Which wireless standard can operate at speeds of 100+ Mbps and uses the 2.4GHz to 5GHz range?
7721
What is the preferred communications method used with systems on a bot-net?
7722
Double Has A Precision Of At Least _ Decimal Digits In Swift.
7723
To Create Contants In Swift We Use Keyword ...
7724
Which Of The Following IOS Frameworks Is A Commonly Used Third Party Library?
7725
To Create Mutable Object __ Is Used
7726
Which of the following class implements the behavior of scrollable, multiline text region.
7727
to switch from one viewController to another , the method use is presentViewController() is used
7728
What is the full form of XIB?
7729
what is the extension of compiled version of main.storyboard file??
7730
All view in iOs derived from
7731
Where you can use protocol as a type?
7732
Which framework delivers event to custom object when app is in foreground?
7733
Who calls the main function of app during the app launch cycle?
7734
Which of these could be an appropriate protocol declaration in Swift?
7735
Which is the wrong definition of a protocol in Swift?
7736
Which is the content of UITableViewCell ?
7737
Types of Lookup cache…….
7738
which one of these non-reusable transformation
7739
The application has not been launched or was running but terminated by the device.Determine the current state of App.
7740
What is true about UIViewTable Section?
7741
What are tasks can do in designer …..
7742
Which of following are security tasks of repository manager
7743
Which of the following is a property of TableView?
7744
Which of following Joins in Informatica………
7745
You need to escape special characters to use user input inside a regular expressionWhich functions would you use?
7746
we want to compare objects in Filter and aggregate transformation which data type you use……..
7747
ios method for onStart() is???
7748
How do you know that session has heterogeneous target?
7749
Which of the following may be used in conjunction with CASE inside a SWITCH statement?
7750
For Updating Record on database table,
7751
___ helps us to navigate among many ViewController.
7752
which of the following method is called only once in iOS viewController life cycle?
7753
For Unconnected Lookup how many ports can be given as input values
7754
How many port values can be retrieved by an unconnected lookup and connected lookup respectively
7755
onDestroy() method in Android activity life cycle is similar to___ method in iOS viewController life cycle.
7756
Which Component gets metadata from Repository?
7757
Which of the following function returns an index path representing the row and section of a given table-view cell.
7758
In which Order does the execution of ports take place
7759
Which of the following function returns the table cell at the specified index path?
7760
Joiner Can
7761
Which of the following is/are true?
7762
Which of the following is not a part of life cycle of iOS
7763
Which of the following is/are true?
7764
When you call Save on an XElement or XDocument to write its content to a file, an XML declaration is included in the output:
7765
IBOutlet is used to create functions of UIfield?
7766
In the following example, what’s the namespace of the inner element name? XNamespace ns = "http://albahari.com/linqquiz"; var x = new XElement (ns + "customer", new XElement ("name", "Bloggs") );
7767
Which of the following is/are better option if all below satisfies the requirement
7768
What does the following example print? var city = new XElement ("city", "Seattle"); var customer1 = new XElement ("customer", city); var customer2 = new XElement ("customer", city); city.SetValue ("London"); Console.WriteLine (customer2.Element ("city").Value);
7769
In Swift there are two kinds of types: named and __.
7770
If Sorted Input of Aggregator is unchecked,
7771
Can an Output Port be used in the editable area of widgets
7772
In LINQ to SQL, to request that an entity’s association properties be populated along with the entity (in a single round trip), you would:
7773
Which of the among class is super class of view controller objects?
7774
In Sequence Generator, If Current Value = 10, Increment By value=1, what is the NextVal value?
7775
A LINQ to SQL query can include calls to your own local methods:
7776
Which Client component can be used for creating Repository?
7777
IBActikn and IBOutlet are macros defined to denote variables and method that can be referred in interface Builder.
7778
A LINQ to SQL query that uses join clauses can perform the equivalent of which of the following kind(s) of SQL JOIN
7779
What manages the scheduling and execution of workflows?
7780
Storyboard is used as UI designing file inside Ios?
7781
Which Function(s) cannot be used in Expression Widget(doubt)
7782
A LINQ to SQL query that uses multiple from clauses (or SelectMany) can perform the equivalent of which of the following kind(s) of SQL JOIN:
7783
Uninitialized array can be declared implicitly true or false
7784
Which of the following are active Transformations?
7785
ARC in swift is functionally similar to destructor
7786
some question like………….. what are the groups in router transformation
7787
The compiler translates queries containing multiple generators (i.e., multiple from clauses) into:
7788
How does the compiler resolve the let clause, in the following query? from c in colors let middle = c.Substring (1, c.Length - 2) where middle.Contains ("e") select middle
7789
Which choice is the output value of the following code Var a = 0 let b = ++a let c = a++ "Print "(\(a)\(b)\(c))
7790
What's the output from the following? string s = "e"; var query = colors.Where (c => c.Contains (s)); s = "n"; query = query.Where (c => c.Contains (s)); Console.WriteLine (query.Count());
7791
An informatica variable contains
7792
What's the output from the following? string[ ] colors = { "green", "brown", "blue", "red" }; var query = colors.Where (c => c.Contains ("e")); query = query.Where (c => c.Contains ("n")); Console.WriteLine (query.Count());
7793
Application is in background. Not executing any code. What is the current application state?
7794
What does the following example output? var list = new List<string> (colors); IEnumerable<string> query = list.Where (c => c.Length == 3); list.Remove ("red"); Console.WriteLine (query.Count());
7795
What are the things that should be configured when a source is directly imported from database?
7796
Assuming we make it syntactically correct, how many times does the Max subquery execute in the preceding example, when query is enumerated?
7797
Info.plist is application configuration file inside ios??
7798
Config tab contains -------- and ------- properties (check box one)
7799
What's the output from the following? var query = from c in colors where c.Length == colors.Max (c => c.Length) select c; foreach (var element in query) Console.WriteLine (element);
7800
Given the following statement: var query = from c in colors where c.Length > 3 orderby c.Length select c; what type is query?
7801
What are the dependencies of repository manager (check box question?)
7802
What does the following expression evaluate to? colors.Max (c => c.Length)
7803
which of the following is a default UI property?
7804
What does this expression evaluate to?
7805
Which type of class object is returned by method "storyBoard.instantiateViewControllerWithIdentifier()" ?
7806
IF max no of sessions are 20 then what is the minimum shared memory size
7807
What is the data format u prefer for informatica server
7808
What does the following expression evaluate to?
7809
To access documentation, hold down ___ while clicking a class you want to view.
7810
HOW MANY TYPES OF DATA EXTRACTION ARE THERE
7811
Multitasking for iOS was first released in which year?
7812
___________________ allow to encapsulate discrete units of functionality and provide a graphical representation of that functionality to the user
7813
The iPhone has a feature that activates when you rotate the device from portrait to landscape.
7814
ios apps are based on ____.
7815
version of Ios for first iPad is ...........
7816
UIAlertController is inherited from UIViewController ?
7817
which of the following are main responsibilities of view controller?
7818
Trace the output namespace A { class MyClass { public void fun() { Console.WriteLine( " C # is fun " ); } } namespace B { class MyClass { public void fun() { Console.WriteLine( " C # is interesting " ); } } } } Consider the above code what will be the output of following program class Program { static void Main(string[] args) { A.B.MyClass obj = new A.B.MyClass(); obj.fun(); } }
7819
Trace the output namespace A { class MyClass { public void fun() { Console.WriteLine("C # is fun"); } } namespace B { class MyClass { public void fun() { Console.WriteLine("C # is interesting"); } } } } Consider the above code what will be the output of following program class Program { static void Main(string[] args) { A.MyClass obj = new A.MyClass(); obj.fun(); } }
7820
InstantaiteViewControllerWithIdentifier() this method return object of...
7821
Trace the output class Myclass { public int count = 0; public Myclass() { count++; } } class Program { static void Main(string[] args) { Myclass obj1 = new Myclass(); Console.WriteLine(obj1.count); Myclass obj2 = new Myclass(); Console.WriteLine(obj2.count); Myclass obj3 = new Myclass(); Console.WriteLine(obj3.count); } }
7822
Which of the following are correct? 1. An interface can be instantiated directly. 2. Interfaces can contain constructor. 3. Interfaces contain no implementation of methods. 4. Classes and structs can implement more than one interface. 5. An interface itself can inherit from multiple interfaces.
7823
What are the animations in UI MODEL TRANSITION STYLE ?
7824
Which of the following are correct? 1. Delegates are like C++ function pointers. 2. Delegates allow methods to be passed as parameters. 3. Delegates can be used to define callback methods. 4. Delegates are not type safe.
7825
Every UIView Class in ios Subclass of
7826
The jQuery animate() method can be used to animate ANY CSS property?
7827
Properties in .NET can be declare as 1. Static, Protected internal, Virtual 2. Public, internal, Protected internal 3. Only public 4. None
7828
Which of the following statements are correct? 1. Indexers enable objects to be indexed in a similar manner to arrays. 2. The this keyword is used to define the indexers. 3. Indexers can be overloaded. 4. Indexer cannot be used in interface
7829
Which jQuery method returns the direct parent element of the selected element?
7830
Look at the following selector: $(":disabled"). What does it select?
7831
Which jQuery method is used to remove selected elements?
7832
Look at the following selector: $("p#intro"). What does it select?
7833
Look at the following selector: $("div p"). What does it select?
7834
What is default animation for view controller?
7835
n which year Apple introduced multitasking supported iphones ?
7836
How to add UI elements.
7837
What is the iOS version launched by apple with iPhone 5S ?
7838
All Swift classes must inherit from which root class?
7839
ios apps are based on ____.
7840
the protocol that defines a text fields delegate is called _____.
7841
)Which of the following is a default UI property?
7842
What is role of init( )?
7843
Which of the following statement is true for iOS Storyboards?
7844
In view controller which is by default model transition style?
7845
By defult instantiateViewControllerWithIdentifire return object of...
7846
Which one of the below functions definitions is wrong considering Swift language?
7847
In which year multitasking was introduced?
7848
What is "Ib" in IBOutlet?
7849
___ is used to mask the password?
7850
Look at the following selector: $("div"). What does it select?
7851
which property is used in iOS to set hint?
7852
jQuery uses CSS selectors to select elements?
7853
used to connect button with function.
7854
Question: which key is use to emulate gesture in ios?
7855
To switch from one viewController to another , the method use is presentViewController() is used.
7856
To switch from one view controller to another , the concept of segueway is used.
7857
To make connection with interface builder which keyword is used?
7858
Which built-in method returns the string representation of the number's value?
7859
Flash Applications is supported in iPhone browsers.Is it true?
7860
Which built-in method returns the calling string value converted to upper case?
7861
Which built-in method returns the calling string value converted to lower case?
7862
Type casting in Swift is implemented with the__ operator.
7863
Which built-in method returns the characters in a string beginning at the specified location?
7864
Which built-in method sorts the elements of an array?
7865
which version of iOS work only on iPad??
7866
The best way for handling exception when dealing with a database connection?
7867
Which built-in method reverses the order of the elements of an array?
7868
In which year Apple introduced multitasking supported iphones ?
7869
For building new types at runtime which class can be used?
7870
Which built-in method adds one or more elements to the end of an array and returns the new length of the array?
7871
Which of the following statement(s) is/are incorrect? 1. Properties associate values with a particular class, structure, or enumeration. 2. Methods are functions that are associated with a particular type.
7872
Reflection can be used when?
7873
Which built-in method removes the last element from an array and returns that element?
7874
Which of the following statement(s) is/are correct? 1. Every instance of a type has an implicit property called self. 2. It is exactly equivalent to the instance itself. 3. self property is used to refer to the current instance within its own instance methods.
7875
Which built-in method returns the length of the string?
7876
Which built-in method returns the index within the calling String object of the first occurrence of the specified value?
7877
Which built-in method calls a function for each element in the array?
7878
Which built-in method combines the text of two strings and returns a new string?
7879
What is the correct way to find intersection between two Set s1 and s2 ?
7880
Choose the correct one 1) XML serialization serializes the public fields and properties of an object. 2) XML serialization serializes the private fields and properties of an object. 3) XML serialization serializes only the public methods.
7881
Choose the correct one 1) Sealed class can be declared as abstract 2) Abstract class cannot be declared as abstract 3) Abstract class can be declared as abstract
7882
A write - only property can be specified if the following is present
7883
An indexer is
7884
You need to select a class that is optimized for key - based item retrieval from both small and large collections. Which class should you choose?
7885
You need to identify a type that meets the following criteria: • Is always a number. • Is not greater than 65,535. Which type should you choose?
7886
Which of the following is dictionary object?
7887
You want to configure the application to use the following authorization rules in web.config file. • Anonymous users must not be allowed to access the application. • All employees except ABC must be allowed to access the application.
7888
An assembly must have an permission to connect with web server is?
7889
Thread class has the following property. A. ManagedThreadID B. IsBackground C. IsBackgroundColor D. Abort
7890
Which delegate is required to start a thread with one parameter?
7891
For locking the data with synchronization which class will be used?
7892
How many readers can simultaneously read data with ReaderWriterLock if there is no writer locks apply?
7893
Which of the following are value types?
7894
Which of the following are reference types?
7895
Why should you write the cleanup code in Finally block?
7896
When the garbage collector runs.
7897
Method parameters are enclosed in parentheses and are separated by
7898
In C#, exception handling should be used
7899
Property that Array class in C# checks whether Array is read only is <br/> <code> int[] a = {11, 3, 5, 9, 4}; </code>
7900
A function capable of returning
7901
When you begin a new C# Windows project, a new form is automatically added to project and given name
7902
A subroutine capable of returning values
7903
Find correctly initialized constructor
7904
Basis of boolean logic were formed by
7905
A master page
7906
Term metadata refers to
7907
Signature of a function is defined by
7908
To fully abstract a class from its implementation we use
7909
An inheritance mechanism facilitates
7910
Process of defining a method in terms of itself, that is a method that calls itself is
7911
Output for following code will be <br/> <code> static void Main(string[] args) { int a = 3, b = 5, c = 1; int z = ++b; int y = ++c; b = Convert.ToInt32((Convert.ToBoolean(z)) && (Convert.ToBoolean(y)) || Convert.ToBoolean(Convert.ToInt32(!(++a == b)))); a = Convert.ToInt32(Convert.ToBoolean(c) || Convert.ToBoolean(a--)); Console.WriteLine(++a); Console.WriteLine(++b); Console.WriteLine(c); } </code>
7912
Original name of Common Intermediate Language is
7913
Choose from given options one that can be overloaded
7914
In order to lock/unlock an object use the
7915
Function types can be used as ................... types for nesting functions.
7916
Which of the following is correct about callbacks?
7917
Which of the following declares a mutable array in swift ?
7918
Disadvantages of Explicit type conversion are that it
7919
Which of the following type of variable takes precedence over other if names are same?
7920
Which of the following type of variable is visible only within a function where it is defined?
7921
Which one creates a dictionary with a key type of Integer and value of String?
7922
Which of the following type of variable is visible everywhere in your JavaScript code?
7923
How can you get the total number of arguments passed to a function?
7924
Which keyword do you use to declare enumeration?
7925
How can you get the type of arguments passed to a function?
7926
Swift’s closure expressions have a clean, clear style, with optimizations that encourage brief, clutter-free syntax in common scenarios. For These purpose which optimizations must be included ?
7927
Can you assign a anonymous function to a variable?
7928
Which of the following is a valid type of function javascript supports?
7929
Can we overload destructor in swift?
7930
Which of the following is correct about jQuery?
7931
uninitialized array can be declared implicitly true or false
7932
Which of the following statement are ture for the set ? Statement I. sequence doesn't matter II. does not allow duplicate value III. Can be created only explicitly
7933
which xcode tool runs swift code ?
7934
which of the following is the correct way to move an element into another element?
7935
What is the name of the initializer in a Class declaration?
7936
which option is correct to use the below function to set cursor position for textarea? function: $.fn.selectrange = function(start, end) { return this.each(function() { if (this.setselectionrange) { this.focus(); this.setselectionrange(start, end); } else if (this.createtextrange) { var range = this.createtextrange(); range.collapse(true); range.moveend('character', end); range.movestart('character', start); range.select(); } }); };
7937
var name : String? = "CodingBull" name = name + 10
7938
the css() function allows you to ___.
7939
which of the following is the correct way to check the existence of an element in jquery other than the following code? if ($(selector).length>0) { // do something }
7940
which of the following functions moves p tags that have para class to div with content id?
7941
which of the following is the correct way to refresh a page with jquery?
7942
which of the following is the best method for adding options to a select from a json object using jquery?
7943
What is the name of the deinitializer in a Class declaration?
7944
how can an additional row be added to a table as the last row using jquery?
7945
which of the following is the correct way to use jquery with node.js?
7946
All swift classes must inherit from which root class?
7947
which of the following will make the background of a page change, upon being refreshed?
7948
Class by default initializes the variable using public initializer method.
7949
which of the following statements returns the number of matched elements of $('.class1')?
7950
how can jquery be used or optimized in such a way that the web applications can become richer and more functional?
7951
What will be the output of following program? var array1 = [1,2,3,4,5] var array2 = array1 array2.append(6) var len1 = array1.count var len2 = array2.count print("len1 = \(len1)") print("len2 = \(len2)")
7952
Difference between Set and Array is :-
7953
Which is not a type of collections in Swift.
7954
Which type of collection uses key-value pair in iOS?
7955
which of the following is the correct way to get "option b" with the value '2' from following html code in jquery? <select id='list'> <option value='1'>option a</option> <option value='2'>option b</option> <option value='3'>option c</option> </select>
7956
Which statement is correct in case of set?
7957
$.grep(array1, function1); the above statement ___ the elements of array1 array which satisfy function1 function.
7958
which of the following is the correct way to check which key was pressed?
7959
which of the following is the correct way to do the following javascript code with jquery? var d = document; var odv = d.createelement("div"); odv.style.display = "none"; this.outerdiv = odv; var t = d.createelement("table"); t.cellspacing = 0; t.classname = "text"; odv.appendchild(t);
7960
Closure optimizations are :
7961
which of the following is the correct way to select <a> on the basis of href using jquery?
7962
which of the following is the best way to open a jquery ui dialog box without a title bar?
7963
which of the following is the correct way to distinguish left and right mouse click event in jquery?
7964
Which of the following is incorrect about Array collection?
7965
which of the following is the correct way to assign a selected value of a drop-down list using jquery?
7966
using an element of some kind that is being hidden using .hide() and shown via .show(). which of the following is the best way to determine if that element is currently hidden or visible on the screen?
7967
Which is not a function of IOS
7968
$.merge(array1, array2); the above function merges ___.
7969
which of the following values is/are valid argument(s) of the eq() function?
7970
By default Set is treated as__
7971
which of the following methods can be used to load data?
7972
consider having multiple $(document).ready() functions in one or many linked javascript files. given this information, which of the following will be executed?
7973
general syntax for closure is_____.
7974
which of the following is correct with regards to how to upload a file asynchronously with jquery?
7975
which of the following makes use of jquery to select multiple elements?
7976
how or where can a plugin be declared, so that the plugin methods are available for the script?
7977
which of the following functions will return an empty set when end() function is chained right after that function?
7978
which of the following will select a particular option in a <select> element using its index?
7979
var name : String?= "CodingBull" name=name+10
7980
whats the right way to access the contents of an iframe using jquery?
7981
which is not function of iOS?
7982
which option is correct to perform a synchronous ajax request?
7983
which option can be used to have jquery wait for all images to load before executing something on a page?
7984
which of the following will show an alert containing the content(s) of a database selection?
7985
which of the following will get the first column of all tables using jquery?
7986
which of the following values is/are valid value(s) of secondargument in addclass('turnred', secondargument); function, if the jquery ui library is being used?
7987
which of the following returns the children tags of "id1"?
7988
which of the following represents the best way to make a custom right-click menu using jquery?
7989
which of the following methods can be used to utilize the animate function with the backgroundcolor style property?
7990
which of the following methods can be used to copy element?
7991
A____block enclose the code that could throw an exception.
7992
which of the following is the correct way to select an option based on its text in jquery?
7993
which of the following is the correct way to manage a redirect request after a jquery ajax call?
7994
An abstract class
7995
which of the following is the correct way to get the value of a textbox using id in jquery?
7996
Exception objects are derived from the class.
7997
which of the following is the correct way to get "option b" with the value '2' from following html code in jquery? <select id='list'> <option value='1'>option a</option> <option value='2'>o...
7998
A method_____an exception when that method detects that a problem has occured.
7999
which of the following is the correct way to disable an input field with jquery?
8000
Which of these are not Value type in Swift
8001
which of the following is the correct way to debug javascript/jquery event bindings with firebug or a similar tool?
8002
Assuming that public class B : A { public B(int i) :base(i) { } } compiles and runs correctly, what can we conclude about the constructors in the class A?
8003
which of the following is the correct way to change the image source during click event of a button in jquery?
8004
The code public class B : A { }
8005
which of the following is the correct way to add an additional option and select it with jquery?
8006
Classes declared with the sealed keyword cannot be base class.
8007
which of the following is the correct use of ajaxstart() function?
8008
Methods that are declared abstract in the base class must show implementation at the time of declaration.
8009
All methods in an abstract base class must be declared abstract.
8010
which of the following gets the href attribute of "id1"?
8011
o output the value of multidimensional array, Console.WriteLines(___)
8012
Which of the following framework is not used in iOS ?
8013
Polymorphism occurs when the methods of the child class.
8014
The concept of composition specifies that you can.
8015
Every class directly or indirectly extends the______class.
8016
In order for a class to use an interface, it must
8017
What is the proper header for a class that intends to use an interface.
8018
All interfaces must contain IDrivable
8019
Is it possible to pass methods as arguments for other methods without modification.
8020
A delegate defines
8021
An Event is
8022
String mystring; Creates a(n)
8023
In the body of a method, C# uses the variable named_____to refer to the current object whose method is being invoked
8024
Find any errors in the following BankAccount constructor: Public int BankAccount() { balance = 0; }
8025
Defining two methods with the same name but with different parameters is called.
8026
A variable declared inside a method is called a________variable
8027
class Test: Form { }
8028
A Constructor
8029
An instance method
8030
Private Button print = new button();
8031
An instance variable
8032
A local variable
8033
Which of the following .NET components can be used to remove unused references from the managed heap?
8034
Identify which is true
8035
Managed methods will be marked as ———— in MSIL code
8036
Which of the following statements is correct about the C#.NET program given below? namespace PskillsConsoleApplication { class Baseclass { int i; public Baseclass(int ii) { i = ii; Console.Write(“Base “); } } class Derived : Baseclass { public Derived(int ii) : base(ii) { Console.Write(“Derived “); } } class MyProgram { static void Main(string[ ] args) { Derived d = new Derived(10); } } }
8037
Which of the following constitutes the .NET Framework? ASP.NET Applications 2. CLR 3. Framework Class Library 4. WinForm Applications 5. Windows Services
8038
Is it possible to change the value of a variable while debugging a C# application?
8039
Different ways a method can be overloaded in C#.NET
8040
Features of Read only variables
8041
Which file contains configuration data for each unique URl resource used in project?
8042
Two methods with the same name but with different parameters.
8043
A variable which is declared inside a method is called a________variable
8044
How does assembly versioning in .NET prevent DLL Hell?
8045
Which of the following statements is correct about Managed Code?
8046
Which of the following jobs are NOT performed by Garbage Collector? 1.Freeing memory on the stack. 2.Avoiding memory leaks. 3.Freeing memory occupied by unreferenced objects. 4.Closing unclosed database collections. 5.Closing unclosed files.
8047
Your company uses Visual Studio.NET 2005 as its application development platform. You are developing an application using the .NET Framework 2.0. You are required to use a datatype that will store only numbers ranging from -32,768 to 32,767. Which of the following datatypes will you use to accomplish the task?
8048
C# doesnot support:
8049
Which of the following is the root of the .NET type hierarchy?
8050
What is the wild card character in the SQL “like” statement?
8051
Is it possible to store multiple data types in System.Array?
8052
The ______ parentheses that follow _____ indicate that no information is passed to Main ().
8053
Web Forms consists of a _______ and a _________ .
8054
Duck typing is implemented by using_________ keyword.
8055
_________parameters allows you to give a method parameter a default value so that you do not have to specify it every time you call the method.
8056
Covariance and Contravariance are new features introduced in C# 4.0.True/False?
8057
COM Interop is simplified in C#4.0 e.g.var doc = Application.GetDocument(“MyFile.txt”); In above statement_______ keyword was essential in parameters of GetDocument() in previous versions of C#.
8058
myMobile.Accept(55, inReject: false); Above statement is an example of which new concept of C# 4.0?
8059
_______ methods are not supported for dynamic types.
8060
.The___________keyword is new to C# 4.0, and is used to tell the compiler that a variable’s type can change or that it is not known until runtime.
8061
.The infrastructure that supports these dynamic operations at run time is called the__________.
8062
The controls available in the tool box of the ______ are used to create the user interface of a web based application.
8063
In Microsoft Visual Studio, ______ technology and a programming language such as C# is used to create a Web based application.
8064
The ______ are the Graphical User Interface (GUI) components created for web based interactions..
8065
Exponential formatting character (‘E’ or ‘e’) converts a given value to string in the form of _______.
8066
_______ is a set of devices through which a user communicates with a system using interactive set of commands.
8067
The reason that C# does not support multiple inheritances is because of ______.
8068
C# supports a technique known as________, which allows a method to specify explicitly the name of the interface it is implementing.
8069
C# treats the multiple catch statements like cases in a _____________ statement.
8070
In C#, having unreachable code is always an _____.
8071
The point at which an exception is thrown is called the _______.
8072
Inheritance is ______ in nature.
8073
The theory of _____ implies that user can control the access to a class, method, or variable.
8074
When an instance method declaration includes the abstract modifier, the method is said to be an ______.
8075
The C# provides special methods known as _____ methods to provide access to data members.
8076
The methods that have the same name, but different parameter lists and different definitions is called______.
8077
A _______ creates an object by copying variables from another object.
8078
Struct’s data members are ____________ by default.
8079
A structure in C# provides a unique way of packing together data of ______ types.
8080
C# does not support _____ constructors.
8081
_______ variables are visible only in the block they are declared.
8082
The formal-parameter-list is always enclosed in _______.
8083
______ parameters are used to pass results back to the calling method.
8084
Multidimensional arrays are sometimes called _______ Arrays.
8085
Arrays in C# are ______ objects
8086
An ____ is a group of contiguous or related data items that share a common name.
8087
which of the following functions is/are built-in jquery regular expression function(s)?
8088
which of the following functions can be used to stop event propagation?
8089
which of the following events can be used to disable right click contextual menu?
8090
which of the following code snippets insert(s) the code snippet <font size=2><div class="footer">footer</div></font> at the end of div tags?
8091
________causes the loop to continue with the next iteration after skipping any statements in between.
8092
which of the following code snippets insert(s) the code snippet <div class="footer">footer</div> at the end of div tags?
8093
what is the result of this function: jquery.makearray ( true )?
8094
what is the result of nan == nan?
8095
C# has _______ operator, useful for making two way decisions.
8096
what is the purpose of $(document).ready() function in jquery?
8097
what does $('tr.rowclass:eq(1)'); return?
8098
using an element of some kind that is being hidden using .hide() and shown via .show(). which of the following is the best way to determine if that element is currently hidden or visible on the sc...
8099
the position function gets the ___ positions of an element that are relative to its offset parent.
8100
the hide() function hides an element by ___.
8101
the height function returns the height of an element in ___.
8102
one advantage of $.ajax function over $.get or $.post is that ___.
8103
jQuery does not have this feature. 2.0% jquery allows you to use ___ function to switch between showing and hiding an element.
8104
A _____ is any valid C# variable ending with a colon.
8105
jquery allows simulating an event to execute an event handler as if that event has just occurred by using ___.
8106
An _______ is a symbol that tells the computer to perform certain mathematical or logical manipulations.
8107
In C#, all binary operators are ______.
8108
if jquery is included before another library, how can conflict between jquery and that library be avoided?
8109
The character pair ?: is a________________available in C#.
8110
Boxing converts a value type on the stack to an ______ on the heap.
8111
_________ are reserved, and cannot be used as identifiers.
8112
A _______ is an identifier that denotes a storage location
8113
how can the href for a hyperlink be changed using jquery?
8114
All C# applications begin execution by calling the _____ method.
8115
how can the child img be selected inside the div with a selector?
8116
In C#, a subroutine is called a ________.
8117
The ____ language allows more than one method in a single class
8118
SOAP stands for __________.
8119
The CLR is physically represented by an assembly named _______
8120
CLR is the .NET equivalent of _________.
8121
how can an ajax request that has not yet received a response be canceled or aborted?
8122
consider the following code snippet: $(document).ready(function1); $(document).ready(function2); $(document).ready(function3); which of the following functions are executed when dom is ready?
8123
consider the following code snippet: $('span.item').each(function (index) { $(this).wrap('<li>item</li>'); }); what does this code snippet do?
8124
consider the following code snippet: $('a.arrow-1').click(function () { $('.second-row').slideup(); $(this).parent('.first-row').siblings('.second-row').slidedown(); }); the order of the a...
8125
Debugging is the technique for?
8126
consider the following code snippet: <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> which of the following code snippets returns the same re...
8127
An array is the collection of?
8128
A Program must never be?
8129
consider the following code snippet: <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> which of the following code snippets return(s) a set of ...
8130
consider the following code snippet: <font size=2> <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> </font> which of the following code snippe...
8131
What can be used to create the objects?
8132
consider the following code snippet: $(document).ready(function() { $('div').each(function(index) { alert(this); }); }); which of the following objects does the 'this' variable refer to?
8133
Divided by zero is?
8134
consider the following code snippet: $('#table1').find('tr').filter(function(index) { return index % 3 == 0}).addclass('firstrowclass'); the result of the above code snippet is ___.
8135
consider the following code snippet: $('#id1').animate({width:"240px"}, { queue:false, duration:1000 }).animate({height:"320px"}, "fast"); the order of the animations of this code snippet is ___.
8136
consider the following code snippet: $('#ul1 li').live('click', function1); $('#ul1').after('&#60;li id="lastli"&#62;last item&#60;/li&#62;'); is function1 executed if "lastli" is clicked?
8137
consider the following code snippet: $('#button1').bind('click', function(data) {...}); what is the data argument?
8138
consider the following code snippet: <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> which of the following code snippets returns the...
8139
consider the following code snippet: <font size=2> <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> </font> which of the following c...
8140
assuming that the jquery ui library is used to make a list sortable, which of the following code snippets makes "list1" sortable?
8141
assume that you want that first the tag with "id1" fades out and then the tag with "id2" fades in. which of the following code snippets allow(s) you to do so?
8142
$("div").find("p").andself().addclass("border"); the statement adds class border to ___.
8143
$('#id1').animate({width:"80%"}, "slow") the above code snippet will ___.
8144
$('#a1').one('click', {times: 3}, function1); which of the following is true for the above?
8145
which option is correct to use the below function to set cursor position for textarea? function: $.fn.selectrange = function(start, end) { return this.each(function() { if (this.sets...
8146
$(“div#id1 .cl1?). What does it select?
8147
jQuery method to set one or more style properties for selected elements?
8148
Which layer is exemplified by the use of ADO.NET?
8149
Is it possible to use jQuery together with AJAX?
8150
Which set of symbols are used to signify the presence of ASP.NET code?
8151
Which is the file extension used for an ASP.NET file?
8152
What is the extension for a Visual Basic web form code file?
8153
What is the extension for a Visual Basic web form interface file?
8154
When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML page contains?
8155
Which user action will not generate a server-side event?
8156
Which property is used to name a web control?
8157
It is best to use a web instead of a windows application when the application?
8158
Which language is used to create an ASP.NET code file?
8159
$("span.intro"). What does it select?
8160
Which jQuery function is used to prevent code from running, before the document is finished loading?
8161
With jQuery, look at the following selector: $(“div”). What does it select?
8162
Do you wonder why we do not have type=”text/javascript” inside the <script> tag?
8163
$(“div#id1 .cl1?). What does it select?
8164
jQuery method is used to perform an asynchronous HTTP request?
8165
jQuery method to set one or more style properties for selected elements?
8166
jQuery method to hide selected elements?
8167
$(“span.intro”). What does it select?
8168
jQuery code to set the background color of all span elements to blue?
8169
$(“span”). What does it select?
8170
Is jQuery a W3C standard?
8171
jQuery uses CSS selectors and XPath expressions to select elements?
8172
Which of the following is correct?
8173
Which of the following is correct?
8174
What does the $('#myDiv').hover() method do?
8175
How do you fetch the first span on the page, which has the class ‘green’?
8176
What is the difference between .width() and .outerWidth()?
8177
Why do we usually add the stop() method before calling animate()?
8178
What does the function $(“.selector”) return?
8179
When do you use the $(this) code?
8180
Which function do you reference in HTML form data?
8181
If you want to stop your jQuery for a few milliseconds, which function do you use?
8182
The speed options can be applied to which jQuery functions?
8183
What are the various speed options?
8184
What is the difference between Hover and Mouseover
8185
What is the each function used for?
8186
When referencing an HTML element preceded by a . (dot), what javascript function is this equivalent to?
8187
When referencing an HTML element preceded by a # (pound or hash), what javascript function is this equivalent to?
8188
What are the :odd and :even filters?
8189
Polymorphism?
8190
Which of the following is/are true about the class?
8191
Which of the following is/are true about the structure?
8192
Triggers, or binds a function to the error event of selected elements.
8193
Load remote data using HTTP GET
8194
AJAX and jQuery
8195
The jQuery library contains the following features
8196
What is jQuery?
8197
You can attach a handler to an event using which method?
8198
The CSS selector engine that jQuery uses is called?
8199
The method that provides AJAX functionality within jQuery is named..
8200
Query.noConflict(true) is used to..
8201
Multiple document.ready blocks can be placed in a page without detriments. This statement is..
8202
You can test whether the browser supports specific features using...
8203
Can you can use CSS3 selectors to select or find elements using jQuery?
8204
var ps = $("p");ps will be..
8205
Can jQuery be used on the same page alongside other libraries?
8206
$.foo() is equivalent to..
8207
jQuery's main focus is..
8208
jQuery is a...
8209
which keyword in swift used to initialize the variable?
8210
In swift Variables are always initialized before use.
8211
In JavaScript, we can keep a reference to the context outside a function by assigning it to a variable: var self = this. In CoffeeScript, we use:
8212
How do you use JavaScript within CoffeeScript code?
8213
Which of these is NOT a valid comment in JavaScript?
8214
Which statement best explains what "unobtrusive JavaScript" is?
8215
Objective-C itself has evolved to support ____enabling framework adoption of modern language technologies without disruption.
8216
Is jQuery a W3C standard?
8217
Look at the following jQuery selector: $("div#intro .head"). What does it select?
8218
To get value inside optional use ....?
8219
Which jQuery method is used to switch between adding/removing one or more classes (for CSS) from selected elements?
8220
What is the return type of following function? Func myfunc( ) -->String{ return "hello" }
8221
Which jQuery method should be used to deal with name conflicts?
8222
Which jQuery function is used to prevent code from running, before the document is finished loading?
8223
What scripting language is jQuery written in?
8224
Which of the following is true. 1.we can wrap unwrapped values 2. we can unwrap wrapped values 3.we cannot wrap unwrapped values 4.we cannot unwrap wrapped values
8225
Which statement is true?
8226
Which jQuery method is used to perform an asynchronous HTTP request?
8227
Which jQuery method is used to set one or more style properties for selected elements?
8228
Which of the following is immutable?
8229
With jQuery, look at the following selector: $("div.intro"). What does it select?
8230
Question: Which of the following statements is/are false? 1. var is used to declare variable whose value we can change. 2. let is used to make variable as constant.
8231
What is the correct jQuery code to set the background color of all p elements to red?
8232
The jQuery html() method works for both HTML and XML documents
8233
Is it possible to use jQuery together with AJAX?
8234
With jQuery, look at the following selector: $("div"). What does it select?
8235
jQuery uses CSS selectors to select elements?
8236
jQuery is a
8237
Tuples as well as structs both allow us to combine different types into one type.
8238
Which of the following jQuery method loads and executes a JavaScript file using an HTTP GET request?
8239
Which of the following jQuery method can be used to attach a function to be executed whenever an AJAX request fails?
8240
Which of the following jQuery method returns the top and left position of an element relative to its offset parent?
8241
Multitasking in iOS was introduced in which version?
8242
Which of the following jQuery method gets the inner height (excluding the border) of an element?
8243
iOS is a __software.
8244
Which of the following jQuery method finds all sibling elements after the current element?
8245
Which of the following is TRUE
8246
Which of the following jQuery method checks the current selection against an expression?
8247
Which of the following jQuery method removes an attribute from each of the matched elements?
8248
what are the features of swift programming?
8249
Which of the following is correct about jQuery selector?
8250
Which built-in method reverses the order of the elements of an array?
8251
Can you pass a anonymous function as an argument to another function?
8252
Which jQuery method is used to switch between adding/removing one or more classes (for CSS) from selected elements?
8253
--------------- takes a selector as its argument and returns true if at least one of the selected elements also matches the specified selector.
8254
Get the value of a style property for the first element in the set of matched elements.
8255
The most recent version of macOS is based on ... ?
8256
What are the methods used to provide effects?
8257
Which of the following is/are the sources of Content Distribution Network(CDN) for jQuery.
8258
In which year jQuery developed?
8259
With jQuery, look at the following selector: $(“div.intro”). What does it select?
8260
jQuery method is used to perform an asynchronous HTTP request?
8261
Which of the following is incorrect data type in SWIFT ?
8262
Which sign does jQuery use as a shortcut for jQuery?
8263
.We can return multiple values in swift from function by using?
8264
The______ method is used to represent an array or an object in serialize manner.
8265
Is jQuery a library for client scripting or server scripting?
8266
Select all elements that contain the specified text.
8267
To deal with cookies in jQuery we have to use ______ cookie plugin
8268
Which of the following jQuery method checks the current selection against an expression
8269
What is the correct jQuery code for making all div elements 100 pixels high?
8270
Which of the following is used for parsing JSON text?
8271
What does the min mean?
8272
jQuery code to set the background color of all span elements to blue?
8273
The ………. method is like offset(), except that it is a getter only and it returns element positions relative to their offset parent, rather to the document as a whole.
8274
Using ________ function, we can hold or release the execution of jQuery’s ready event.
8275
Which built-in method returns the character at the specified index?
8276
$.foo() is equivalent to
8277
In iOS, a folder with .app extension is known as Bundle.
8278
Look at the following jQuery selector: $(“div#intro .head”). What does it select?
8279
The IDE used in swift is____
8280
Which jQuery method is used to hide selected elements?
8281
Which of the following is a single global function defined in the jQuery library?
8282
Arrange the TCP/IP model layers in the order from farthest to closest to the end user.
8283
What are the various possessions in the three-way handshake by the TCP?
8284
Which layer handles top-level communication?
8285
The layer in which the TCP (or UDP) communication takes place is _____________
8286
Which layer is used to handle the network addressing and routing?
8287
Which layer is used to control the communication between the hardware in the network?
8288
What is the return type of the remote server?
8289
How will the HTTP GET request be sent from the browser?
8290
Why is the total size of the page important?
8291
What are the features of an interpreter?
8292
Which is the alternate name for JavaScriptCore that is used by Safari?
8293
Carakan is used by which of the following browsers?
8294
SpiderMonkey was developed by _______
8295
Which of the following render HTML?
8296
Iphone OS is based on which language?
8297
Which of the following first developed Gecko?
8298
Which company owns Iphone?
8299
Which of the following browsers use Webkit?
8300
The User Interface is taken care of which layer?
8301
What is Iphone?
8302
Which layer is used to handle the HTTP requests?
8303
What is the purpose of the JavaScript Engine?
8304
Which version of Iphone OS supports video calling and multitasking?
8305
What is the purpose of a Rendering Engine?
8306
Who is responsible for development of Iphone OS?
8307
Which Iphone version supports flash? O
8308
How do you restore a saved coordinate system?
8309
How many generations are there for Iphone OS?
8310
Which of the following is a property used to check how crisp or fuzzy shadows are?
8311
Which of the following are not the properties of a canvas object?
8312
Which is the method invoked to connect the last vertex back to the first?
8313
Which is the method invoked to begin a path?
8314
What is the latest version of Iphone OS?
8315
How does SVG describe complex shapes?
8316
What is the returning value of the getContext() method?
8317
Iphone has its OS under which licence?
8318
Which method is used to obtain the “drawing context” object?
8319
From which version of IE is canvas supported?
8320
What is the purpose of the canvas element?
8321
Which of the following is the parameter used to invoke the Audio() constructor?
8322
Which of the following is not the property of the video tag?
8323
If you delete contents of NVRAM and reboot router, in which mode you will enter
8324
Which of the following attributes are common to both audio and video?
8325
Which layer of OSI model will have problem if you get message "Serial1 is down, line protocol is down" after typing "show interface serial 1"
8326
Which of the following elements are used to include audio?
8327
Which is a possible way of finding all the img elements in the document?
8328
When is JavaScript called obtrusive?
8329
What is the purpose of image replacement?
8330
Which HTML element is used to include images?
8331
Which of the following uses a lot of CPU cycles?
8332
Command to delete NVRAM on a router
8333
What is the advantage of the code produced graphics being smaller than the images themselves?
8334
How many simultaneous sessions a Cisco router support by default
8335
Command to show if DTE or DCE cable is plugged int o serial 0
8336
Command to find the broadcast address from router
8337
Which is the method to look up the objects for a range of keys?
8338
Which command will end configuration mode and returns to EXEC
8339
Which is the function used to look up an object?
8340
Which command will take cursor to one word back
8341
What is the alternate way to search in an IndexedDB API?
8342
Which command will take cursor to the end of line
8343
Which of the following is a feature of the IndexedDB API?
8344
Which command will take cursor to beginning of line
8345
How does IndexedDB provide atomicity?
8346
Which command will show all commands available from that particular mode
8347
A key path is defined as ____________
8348
In the IndexedDB database, database is defined as _____________
8349
Which mode commands affects interfaces/processes only
8350
Which of the following are objective database and not a relational database?
8351
Which of the following use the Web SQL Database?
8352
The Client-Side Databases are stored in the ____________
8353
Which mode provide access to all router commands
8354
Which is the function used to store a value?
8355
Which user mode has limited monitoring commands in IOS
8356
Which is the function used to retrieve a value?
8357
What is the lifetime of the data stored through localStorage?
8358
Which mode provides interactive configuration dialog
8359
What is the main difference between localStorage and sessionStorage?
8360
The localStorage and sessionStorage belongs to ________
8361
Subinterfaces allows to you to
8362
CLI in IOS terminology is short form of
8363
What happens first after starting a router
8364
Which is not a function of IOS
8365
Which command cane be used at User mode to enter Privileged EXEC mode
8366
How to display configurable parameters and statistics of all interfaces on router
8367
Which of the following data types is used to represent a 32-bit floating-point number and numbers with smaller decimal points?
8368
The following are the keywords used in declarations except:
8369
Can we override private virtual methods?
8370
Which of the following in not service model (three-tier application) in c sharp?
8371
How can we sort the elements of the array in descending order?
8372
Which of the following is/are not types of arrays in C#?
8373
Is it possible to store multiple data types in System.Array?
8374
Which of the following are not types of access modifiers in C#?
8375
Which of the following namespaces used in C#.NET?
8376
Which of the following is/are not types of comment in C#?
8377
Are private class-level variables can inherited?
8378
Is it possible to change the value of a variable while debugging a C# application?
8379
What does Dispose method do with connection object?
8380
What is ENUM?
8381
When a form loaded into the memory, the event occurs…
8382
Which of the following method is used to forcibly set to CPU…
8383
Which symbol create an access key …
8384
Getset method used to retrieve the stored text from…
8385
Which of the following is true that access specifier allows a class to expose its member variables and member functions to other functions and objects?
8386
Which statements are true, IDE is…
8387
Select the true option, prefix and postfix have other forms is…
8388
Which option is true that defines with the sign [ ]…
8389
—— is casing to Passing arguments to a destructor, or specifying return type to destructor…
8390
Which is true in the option that Destructors do not receive values and do not…
8391
Which of the following include in primary programming languages…
8392
Which of the following box given a set of choices to the user
8393
Which of the following option is correct for an example of “instanceof”…
8394
Which of the following is not a characteristic of exception handling…
8395
Which of the following is not true about destructor…
8396
Which of the following statements is not correct about constructors…
8397
Which of the following property represents the current position of the stream…
8398
Which of the following String method used to compare two strings…
8399
Preprocessor allows testing a symbol to see if they evaluate to true…
8400
Choose which one is converts a type to a string…
8401
Which of the following is true about C#…
8402
Which of the following function translates a numeric value to a variable…
8403
Which of the following is the same as the code window…
8404
Menu bar contains a set of ……. to provide controls in the form...
8405
Which of the following is the correct way to find out the index of the second 's' in the string "She sells sea shells on the sea-shore"?
8406
Which of the following statements are correct? String is a value type. String literals can contain any character literal including escape sequences. The equality operators are defined to compare the values of string objects as well as references. Attempting to access a character that is outside the bounds of the string results in an IndexOutOfRangeException. The contents of a string object can be changed after
8407
Which of the following statements are correct about the String Class in C#.NET? Two strings can be concatenated by using an expression of the form s3 = s1 + s2; String is a primitive in C#.NET. A string built using StringBuilder Class is Mutable. A string built using String Class is Immutable. Two strings can be concatenated by using an expression of t
8408
Which of the following will be the correct output for the C#.NET code snippet given below? String s1 = "Five Star"; String s2 = "FIVE STAR"; int c; c = s1.CompareTo(s2); Console.WriteLine(c);
8409
Which of the following statement is correct about a String in C#.NET?
8410
Which of the following statements about a String is correct?
8411
Which of the following will be the correct output for the C#.NET code snippet given below? String s1="Kicit"; Console.Write(s1.IndexOf('c') + " "); Console.Write(s1.Length);
8412
Which of the following snippets are the correct way to convert a Single into a String? Single f = 9.8f; String s; s = (String) (f); Single f = 9.8f; String s; s = Convert.ToString(f); Single f = 9.8f; String s; s = f.ToString(); Single f = 9.8f; String s; s = Clnt(f); Single f = 9.8f; String s; s = CString(f);
8413
What will be the output of the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class SampleProgram { static void Main(string[ ] args) { string str= "Hello World!"; Console.WriteLine( String.Compare(str, "Hello World?" ).GetType() ); } } }
8414
If s1 and s2 are references to two strings, then which of the following is the correct way to compare the two references?
8415
Which of the following will be the correct output for the C#.NET code snippet given below? String s1 = "Nagpur"; String s2; s2 = s1.Insert(6, "Mumbai"); Console.WriteLine(s2);
8416
The string built using the String class are immutable (unchangeable), whereas, the ones built- using the StringBuilder class are mutable.
8417
Which of the following statements will correctly copy the contents of one string into another ?
8418
Which of the following statements are true about the C#.NET code snippet given below? String s1, s2; s1 = "Hi"; s2 = "Hi"; String objects cannot be created without using new. Only one object will get created. s1 and s2 both will refer to the same object. Two objects will get created, one pointed to by s1 and another pointed to by s2. s1 and s2 are references to the same object.
8419
What will be the output of the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class Sample { public static void fun1() { Console.WriteLine("Bix1 method"); } public void fun2() { fun1(); Console.WriteLine("Bix2 method"); } public void fun2(int i) { Console.WriteLine(i); fun2(); } } class MyProgram { static void Main(string[ ] args) { Sample s = new Sample(); Sample.fun1(); s.fun2(123); } } }
8420
Which of the following statements is correct about constructors in C#.NET?
8421
What will be the output of the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class Sample { static Sample() { Console.Write("Sample class "); } public static void Bix1() { Console.Write("Bix1 method "); } } class MyProgram { static void Main(string[ ] args) { Sample.Bix1(); } } }
8422
Which of the following statements are correct about static functions?
8423
Is it possible for you to prevent an object from being created by using zero argument constructor?
8424
Which of the following statements are correct about the C#.NET code snippet given below? class Sample { static int i; int j; public void proc1() { i = 11; j = 22; } public static void proc2() { i = 1; j = 2; } static Sample() { i = 0; j = 0; } }
8425
Is it possible to invoke Garbage Collector explicitly?
8426
Which of the following statements are correct about constructors in C#.NET? Constructors cannot be overloaded. Constructors always have the name same as the name of the class. Constructors are never called explicitly. Constructors never return any value. Constructors allocate space for the object in memory.
8427
Can static procedures access instance data?
8428
In which of the following should the methods of a class differ if they are to be treated as overloaded methods? Type of arguments Return type of methods Number of arguments Names of methods Order of arguments
8429
Which of the following is the correct way to define the constructor(s) of the Sample class if we are to create objects as per the C#.NET code snippet given below? Sample s1 = new Sample(); Sample s2 = new Sample(9, 5.6f);
8430
Which of the following statements is correct about constructors?
8431
Which of the following statements are correct about static functions? Static functions can access only static data. Static functions cannot call instance functions. It is necessary to initialize static data. Instance functions can call static functions and access static data. this reference is passed to static functions.
8432
Which of the following ways to create an object of the Sample class given below will work correctly? class Sample { int i; Single j; double k; public Sample (int ii, Single jj, double kk) { i = ii; j = jj; k = kk; } }
8433
Which of the following statements is correct about the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class Sample { public int func() { return 1; } public Single func() { return 2.4f ; } } class Program { static void Main(string[ ] args) { Sample s1 = new Sample(); int i; i = s1.func(); Single j; j = s1.func(); } } }
8434
0. Suppose n is a variable of the type Byte and we wish, to check whether its fourth bit (from right) is ON or OFF. Which of the following statements will do this correctly?
8435
Which of the following are Logical operators in C#.NET? && || ! Xor %
8436
Which of the following statements are correct about the Bitwise & operator used in C#.NET? The & operator can be used to Invert a bit. The & operator can be used to put ON a bit. The & operator can be used to put OFF a bit. The & operator can be used to check whether a bit is ON. The & operator can be used to check whether a bit is OFF.
8437
Which of the following is the correct output for the C#.NET code snippet given below? Console.WriteLine(13 / 2 + " " + 13 % 2);
8438
Which of the following statements is correct about the C#.NET code snippet given below? int d; d = Convert.ToInt32( !(30 < 20) );
8439
Which of the following is NOT a Bitwise operator in C#.NET?
8440
Which of the following are NOT Relational operators in C#.NET? >= != Not <= <>=
8441
Which of the following is NOT an Arithmetic operator in C#.NET?
8442
What will be the output of the C#.NET code snippet given below? byte b1 = 0xF7; byte b2 = 0xAB; byte temp; temp = (byte)(b1 & b2); Console.Write (temp + " "); temp = (byte)(b1^b2); Console.WriteLine(temp);
8443
Which of the following are the correct ways to increment the value of variable a by 1? ++a++; a += 1; a ++ 1; a = a +1; a = +1;
8444
If a class has unmanaged resources and no managed resources, it should do which of the following?
8445
If a class has managed resources and no unmanaged resources, it should do which of the following?
8446
If a class implements IDisposable , its Dispose method should do which of the following?
8447
Which of the following statements about destructors is false?
8448
Which of the following statements about garbage collection is false?
8449
A program can use the IEnumerable and IEnumerator interfaces to do which of the following?
8450
Suppose you want to make a Recipe class to store cooking recipes and you want to sort the Recipes by the MainIngredient property. In that case, which of the following interfaces would probably be most useful?
8451
Which of the following is not a good use of interfaces?
8452
Suppose the HouseBoat class implements the IHouse interface implicitly and the IBoat inter- face explicitly. Which of the following statements is false?
8453
Suppose you have defined the House and Boat classes and you want to make a HouseBoat class that inherits from both House and Boat. Which of the following approaches would not work?
8454
Which the following statements about the this keyword is false?
8455
Which the following statements about the base keyword is false?
8456
Which of the following techniques should you use to watch for floating point operations that cause overflow or underflow?
8457
Which of the following statements can you use to catch integer overflow and underflow errors?
8458
Which of the following techniques does not create a String containing 10 spaces?
8459
Which of the following is not a String method?
8460
If Employee inherits from Person and Manager inherits from Employee, which of the following statements is valid?
8461
The statement object obj = 72 is an example of which of the following?
8462
Which of the following methods is the best way to store an integer value typed by the user in a variable?
8463
Which of the following statements generates a string containing the text "Veni, vidi,vici"?
8464
Assuming total is a decimal variable holding the value 1234.56, which of the following statements displays total with the currency format $1,234.56?
8465
Which of the following statements is true for narrowing conversions?
8466
Which of the following statements is true for widening conversions?
8467
If i is an int and l is a long, which of the following statements is true?
8468
To parse a string that might contain a currency value such as $1,234.56, you should pass the Parse or TryParse method which of the following values?
8469
How are the values passed in generic methods?
8470
What does the designator indicate in a generic class?
8471
What is an advantage of using generics in .NET?
8472
What is one advantage of using named parameters?
8473
Boxing refers to:
8474
How do you enforce encapsulation on the data members of your class?
8475
When you create an abstract method, how do you use that method in a derived class?
8476
What is the parameter in this method known as? public void displayAbsoluteValue(int value = 1)
8477
What are two methods with the same name but with different parameters?
8478
In the following enumeration, what will be the underlying value of Wed? enum Days {Mon = 1, Tue, Wed, Thur, Fri, Sat, Sun};
8479
What is the correct way to access the firstName property of a struct named Student?
8480
True or false: structs can contain methods.
8481
Which declaration can assign the default value to an int type?
8482
double and float data types can store values with decimals.
8483
What is the maximum value you can store in an int data type?
8484
How many times will this loop execute? int value = 0; do { Console.WriteLine (value); } while value > 10;
8485
What are the four basic repetition structures in C#?
8486
What is the purpose of break; in a switch statement?
8487
If you want to iterate over the values in an array of integers called arrNumbers to perform an action on them, which loop statement enables you to do this?
8488
In the following code sample, will the second if structure be evaluated? bool condition = true; if(condition) if(5 < 10) Console.WriteLine("5 is less than 10);
8489
What are the keywords supported in an if statement?
8490
You need to make a logical comparison where two values must return true in order for your code to execute the correct statement. Which logical operator enables you to achieve this?
8491
You want to declare an integer variable called myVar and assign it the value 0. How can you accomplish this?
8492
When using the standard files that come with the C++ compiler, you should surround the header file name with _____
8493
The last statement in a function is often a(n) _____
8494
Which DOS command is used to remove and scan memory and disk from viruses?
8495
The insect type robot Attila is a more competent version of the robot Genghis an weights 1.7 kg. What is the number of microprocessors carried by its body?
8496
Which of the following hardware components is the most important to the operation of a database management system?
8497
What kind of battery is most likely included in a cordless electric knife?
8498
Terminals are used to
8499
A programming structure that contains data and a pointer to the next object is a
8500
A customer calls and says her computer won't boot, she can hear noises and can see lights on the box, but nothing comes up on the screen, what should you take to the site to fix the problem?
8501
What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?
8502
A function can make_________
8503
Which of the following conditions is used to transmit two packets over a medium at the same time?
8504
Which option will be used with ps command to show the entire command line of the process being run?
8505
The command used to compare the files is known as
8506
One method of programming a computer to exhibit human intelligence is called modeling or:
8507
The Data flow diagram (DFD) shows;
8508
Before sending data, a modem sends a request to send signal, or RTS.
8509
What would you ask to determine if the display is working?
8510
What is the size of a sector?
8511
In the IBM PC-AT, what do the words AT stand for?
8512
which of the following commands adds the data model info to the model file?
8513
which of the following code samples will get the index of |page| inside of a loop?
8514
which of the following choices will write routes for the api versioning scenario described below? /api/users returns a 301 to /api/v2/users /api/v1/users returns a 200 of users index at version 1 ...
8515
which of the following actions is fired by default when a new controller is created?
8516
which is the best way to add a page-specific javascript code in a rails 3 app? <%= f.radio_button :rating, 'positive', :onclick => "$('some_div').show();" %>
8517
which gem is used to install a debugger in rails 3?
8518
when using full-page caching, what happens when an incoming request matches a page in the cache?
8519
when a new controller named "admin2" is created, the js and the css files are created in:
8520
what is the singleton design pattern?
8521
what is the recommended rails way to iterate over records for display in a view?
8522
what is the output of the following ruby code? puts "the multiplication output of 10,10,2 is #{10*10*2}"
8523
what is the output of the following code? puts "aeiou".sub(/[aeiou]/, '*')
8524
what is the output of the following code? &quot;test&quot;*5
8525
what is the output of the following code in ruby? x= "a" + "b" puts x y= "c" << "d" puts y
8526
what is the difference between :dependent => :destroy and :dependent => :delete_all in rails?
8527
what is the difference between _url and _path while being used in routes?
8528
what is the convention for methods which end with a question mark? e.g. #all?, #kind_of?, directory?
8529
what is the best way to get the current request url in rails?
8530
what is the behavior of class variables with subclasses?
8531
what is green-threading?
8532
what is output of following statements? 1) "".nil? == "".empty? && "".blank? == "".empty? 2) !"".nil? == "".empty? && "".blank? == "".empty? 3) nil.nil? == nil.empty? && nil.blank? == nil.empty? 4)...
8533
what is difference between "has_one" and "belong_to"?
8534
The HTML5 specification does not includes __________
8535
The service(s) that enables networking through scripted HTTP requests is _______
8536
The behaviour of the document elements can be defined by __________
8537
A JavaScript program can traverse and manipulate document content through __________
8538
The main purpose of JavaScript in web browser is to ___________
8539
Ios: : floatfield mask has how many format flags?
8540
What is mask of ios: :dec, ios: :oct, ios: : hex in format flags?
8541
Which from following format flag is not included in ios: : adjustfield mask?
8542
Ios state variables holds
8543
Ios: : skipws, ios: : left, ios: : dec, ios: : fixed, is an example of
8544
Which is the method used for registering handlers?
8545
Why does Node not block while waiting for operations to complete?
8546
The necessary globals of a node are defined under which namespace?
8547
Among the below given functions, Node supports which of the following client-side timer functions?
8548
What is the code to print hello one second from now?
8549
Which of the following commands displays the syntax for the clock command?
8550
What is the command used for debugging output in Node?
8551
You need to assign an IP address to your Catalyst 1912 switch. You are at the HQ_SW1>prompt. What is the correct series of commands? (cr = carriage return)
8552
What is the alternative command used in Node for load()?
8553
What is the command to run the node programs?
8554
Why does the Node rely on event handlers?
8555
You would like to assign a meaningful name to your Catalyst 1900 series switch—what command should you use?
8556
Which is a fast C++ based JavaScript interpreter?
8557
You have made a console connection to your Cisco Catalyst 1900 series switch and you see the > symbol in HyperTerminal. What does it mean?
8558
The new Java arrays can be created into JavaScript programs using which of the following classes?
8559
Which of the following prompts indicates your router is in Privileged EXEC mode?
8560
The JavaScript classes can be instantiated using _____ operator.
8561
You have just received 14 Catalyst 3550 switches for your network. What is required to get them functioning correctly in your network?
8562
What does Rhino do when the getter and setter methods exist?
8563
Which command would you use in the CLI at User mode to enter Privileged EXEC mode?
8564
Which is a more formal way of importing packages and classes as JavaScript objects?
8565
You need to troubleshoot your network IP connectivity. Which of the following commands would you use to find the IP address on your Ethernet 0 interface?
8566
You are the network administrator for a large corporation. You want to be able to store all your configurations in a centralized location. Which of these servers will allow you to do so? (Choose all that apply.)
8567
Which is a useful way to try out small and simple Rhino programs and one-liners?
8568
In which of the following modes in Cisco's IOS can you issue showcommands?
8569
Which Rhino command quits Rhino environment?
8570
You are configuring your router and type in an Enable password and an Enable Secretpassword. Your fellow network technician asks you why you have two passwords set when you only need one. What do you tell him?
8571
Which of the following reads the textual contents of a URL and returns as a string?
8572
Which of the following are global functions that are not part of core JavaScript?
8573
You can execute show commands at which prompt? (Choose all that apply.)
8574
Rhino is originated by _______
8575
You need to set up passwords on all your default Telnet lines. What command would you start with?
8576
What will be the return value of the write() method when the Node cannot write the data immediately and has to buffer it internally?
8577
When the “end” event fires on EOF when no more data will arrive, which function is called?
8578
When setting up your serial interfaces, what does the clockrate command do for your connection?
8579
What is the method used to pause “data” events?
8580
Which among the following POSIX signals generate events?
8581
You need to set up a password that will prevent unauthorized users from telnetting into your router. What series of commands would you use?
8582
When do uncaught exceptions generate events?
8583
Which of the following is an event emitter?
8584
Which function is a synonym for on()?
8585
What is the function used to remove all handlers for name events?
8586
Your boss is concerned about security on your network. She wants to make sure that no one can identify passwords if they happen to view a configuration on your router. What command will encrypt all passwords on your router?
8587
What is the function used to deregister event handler ‘f’?
8588
What are the events generated by the Node objects called?
8589
You are consulting a small business that is establishing its first WAN link. The client wants to know what encapsulation you will be using on the link. Which of the following are valid encapsulations for WAN links? (Choose all that apply.)
8590
What is the code required to delete all “weight” tags?
8591
Which of the following is an example to perform the most common XML manipulations using the XML objects invocation?
8592
You need to back up the configurations you just made but there are no TFTP servers available. Which of the following commands are options to backup your currently running configuration? (Choose all that apply.)
8593
Which of the following is the descendant operator?
8594
Which method to use while working with XML fragments, instead of XML()?
8595
Your routers at ACME are having some connectivity issues. You issueshow commands for each connecting router's interface. Why are they unable to communicate?
8596
What is the return type of typeof for standard JavaScript objects
8597
The android OS comes with many useful system services, which include processes you can easily ask for things such as your..
8598
When will the finally block be called?
8599
What will be the reaction when a catch clause has no conditionals?
8600
An Android application is a loose collection of content providers, activities, broadcast receivers, and services.
8601
The iPhone is a line of Internet and multimedia-enabled smartphones designed and marketed by Intel Corporation.
8602
What is the code to be used to trim whitespaces?
8603
The timeline receiver will receive messages from the Android system.
8604
Which method of the iterable object returns an iterator object for the collection?
8605
Which looping statement allows XML tags to appear in JavaScript programs and adds API for operating on XML data?
8606
When the activity is not in focus, but still visible on the screen it is in?
8607
The main difference between the variables declared with var and with let is __________
8608
The Iphone has a feature that activates when you rotate the device from portrait to landscape.
8609
Which method of the iterable object returns an iterator object for the collection? a) iterator()
8610
The ___________ file specifies the layout of your screen.
8611
WHAT IS FACE TIME IN APPLE ?
8612
Which exception does the Iterators throw from their next() method when there are no more values to iterate, that work on finite collections?
8613
Which looping statement allows XML tags to appear in JavaScript programs and adds API for operating on XML data?
8614
App Widgets are can be place on the home screen by the user to check for updates are available?
8615
The main difference between the variables declared with var and with let is ______
8616
To create an emulator, you need an AVD. What does it stand for?
8617
The let keyword cannot be used ___________
8618
What built-in database is Android shipped with?
8619
Which is the subset that transforms web content into secure modules that can be safely hosted on a web page?
8620
Which was one of the first security subsets proposed?
8621
Which is the object that defines methods that allow complete control over page content?
8622
Which are the two functions that are not allowed in any secure subset?
8623
Why is this keyword not preferred in JavaScript?
8624
Which is the subset that is a secure container designed for the purpose of safely running untrusted JavaScript?
8625
The Iphone camera can:
8626
Why was “The Good Parts” designed as a language subset in JavaScript?
8627
Creating a UI (User Interface) in Android requires careful use of...
8628
What is being imposed on each subset to ensure that it conforms to the subset?
8629
What does javascript use instead of == and !=?
8630
What built-in database is Android shipped with?
8631
The Crockford’s subset does not include which function in JavaScript?
8632
When an activity doesn't exist in memory it is in. | IOS Mcqs
8633
What would be the result of the following statement in JavaScript using regular expression methods?
8634
Which of the following is NOT a state in the lifecycle of a service?
8635
Does the Iphone browser support flash applications?
8636
The method that performs the search-and-replace operation to strings for pattern matching is _______
8637
What is the most essential purpose of parentheses in regular expressions?
8638
When an activity doesn't exist in memory it is in.
8639
What does the subexpression /java(script)?/ result in?
8640
What will be the result when non greedy repetition is used on the pattern /a+?b/?
8641
What does /[^(]* regular expression indicate?
8642
The regular expression to match any one character not between the brackets is ______
8643
The ‘$’ present in the RegExp object is called a __________
8644
Application is running in foreground and receiving events.What is the current App State?
8645
What can be done in order to avoid the creation of global variables in JavaScript?
8646
The provides() function and the exportsobject are used to _________
8647
Modules that have more than one item in their API can _____
8648
The scope of a function is also called as ________
8649
iOS remote push notification is introduced by apple in which version?
8650
Application in background & executing background tasks.Determine current state of Application.
8651
To define each of the set classes as a property of the sets object (namespace) for the module, the statement is
8652
Which of the following statement is wrong?
8653
The maximum number of global symbols a module can define is ___________
8654
Application is in background. Not executing any code.What is the current application state?
8655
The functions provide() and require() of Dojo toolkit and Google’s Closure library are used for _________
8656
Which of the following statement is wrong ?
8657
You can refresh the webpage in JavaScript by using ________
8658
What is the procedure to add methods to HTMLElement so that they will be inherited by the objects that represent the HTML tags in the current document?
8659
How can we make methods available on all objects?
8660
Which is the correct code that returns a complex number that is the complex conjugate of this one?
8661
Which of the following hierarchy is correct?
8662
The class that represents the regular expressions is ________
8663
Which variables are used internally in object methods and are also globally visible?
8664
The object whose properties are inherited by all instances of the class, and properties whose values are functions behaving like instance methods of the class, is ________
8665
Different kinds of the object involved in a class definition are _____
8666
The four kinds of class members are ________
8667
Multi-tasking in iOS was introduced in which version ?
8668
iOS is a __________ software.
8669
The method that can be used to create new properties and also to modify the attributes of existing properties is _________
8670
We can return multiple values in swift from function by using __________.
8671
The snippet that filters the filtered set is __________
8672
To create constants in swift we used __________
8673
If A is the superclass and B is the subclass, then subclass inheriting the superclass can be represented as _______
8674
When a class B can extend another class A, we say that?
8675
The IDE i.e. Integrated Development Environment used in swift programming is __________
8676
The property of JSON() method is __________
8677
iOS Stands for iPhone Operating System
8678
The meaning for Augmenting classes is that _________
8679
The basic difference between JavaScript and Java is _________
8680
The keyword or the property that you use to refer to an object through which they were invoked is _________
8681
The behaviour of the instances present of a class inside a method is defined by _________
8682
What should you use to provide a default value for a variable in Swift?
8683
What does the question mark (?) indicate? A particular property is...
8684
Which of these is not a control transfer statement in Swift?
8685
How do you write comments in Swift?
8686
What are numbers with fractional components called in Swift?
8687
Swift integers are presented in all of these bit forms except which of the following?
8688
How many types of integers are in Swift?
8689
Which keyword do you use to announce constants in Swift?
8690
Swift is primarily used to develop content for ____ devices.
8691
What is the element that is used to specify the type of a variable or expression?
8692
The expression that creates a closure in Swift is called ____; in other languages it is also called a Lambda or Anonymous Function.
8693
What is the name for the Swift element that describes what sequence of characters are used to form valid tokens of the language?
8694
In Swift there are two kinds of types: named and ____.
8695
Java Virtual Machine is platform independent.
8696
Which method returns a reference to the currently executing thread object?
8697
hich keyword is used to make the classes and interface of another package accessible to the current package?
8698
The Object class is not a parent class of all the classes in java by default.
8699
What Swift element can be used to introduce a new name or code construct into your program?
8700
What element can be used to learn more information about a declaration or type?
8701
In Swift, there are three kinds of statements: simple, compiler control,and ____.
8702
The most basic of expressions in Swift are called ____ expressions.
8703
what is best way to create primary key as a string field instead of integer in rails.
8704
what exception cannot be handled with the rescue_from method in the application controller? e.g class applicationcontrollers < actioncontroller::base rescue_from exception, with: error_handler ...
8705
what does the 4xx series of http errors represent?
8706
what does rest stand for?
8707
what declaration would you use to set the layout for a controller?
8708
what component of rails are tested with unit tests?
8709
using erb for views, what filename should be given to a partial called 'login'?
8710
users who are new to mvc design often ask how to query data from views. is this possible? and if so, is this a good idea?
8711
unit tests are used to test which of the following components of ruby on rails?
8712
there is a table named product in a rails application. the program is required to fetch any 5 rows where the productid is 2. which of the following is the correct option to perform this action?
8713
the =~ operator is used to do inline regular expression matching, for instance: "function" =~ /fun/ "function" =~ /dinosaurs/ what are possible return values for the =~ matcher?
8714
suppose a model is created as follows: rails generate model sales rake db:migrate what would be the best way to completely undo these changes, assuming nothing else has changed in the mean...
8715
select all incorrect statements regarding the ruby version manager (rvm):
8716
rails automatically requires certain files in an application. which of the following files are automatically included without an explicit 'require' being necessary?
8717
is an ajax call synchronous or asynchronous?
8718
in order to enable locking on a table, which of the following columns is added?
8719
in a rails migration, which of the following will make a column unique, and then have it indexed?
8720
in a rails application, the developmental and production configuration are stored in the:
8721
in a rails application, a gemfile needs to be modified to make use of sqlite3-ruby gems. which of the following options will use these gems, as per the new gemfile?
8722
in a has_many association, what is the difference between build and new? // user.rb has_many :posts // post.rb belongs_to :user
8723
Which method in thread class causes the currently executing thread object to temporarily pause and allow other threads to execute?
8724
Which package is used for GUI?
8725
Which method causes the current thread to wait for the specified milliseconds, until the another thread notifies? (invokes notify() or notifyAll() method)?
8726
if a model called blogcomment is defined, what would its db table be called?
8727
if a method #decoupage(n) is described as o(n^2), what does that mean?
8728
What are the main subclasses of the Exception class?
8729
If there is no constructor in a class, compiler automatically creates a default constructor.
8730
Which method is used to invoke the garbage collector to perform the cleanup processing?
8731
If a subclass has the same method as declared in the parent class it is known as ______.
8732
Which type of inheritance one super-class have more than one sub-class?
8733
Which stream does Java application uses to read data from a source, it may be a file, an array, peripheral device or socket?
8734
if a float is added to an integer, what is the class of the resulting number? i.e. 1.0 + 2
8735
Which method is used in thread class to starts the execution of the thread?
8736
if a controller is named "users", what would its helpers module be called?
8737
how can a value be stored so that it's shared across an entire request (i.e. make it accessible in controllers, views and models)?
8738
how can a partial called "cart" be rendered from a controller called "productscontroller", assuming the partial is in a directory called "shared"?
8739
given the following code, where is the "party!" method available? module partyanimal def self.party! puts "hard! better! faster! stronger!" end end class person include partya...
8740
Which packages are also termed as Java API Packages?
8741
given below are two statements regarding the ruby programming language: statement x: "redo" restarts an iteration of the most internal loop, without checking loop condition. statement y: "retry" r...
8742
for the string class, what's the difference between "#slice" and "#slice!"?
8743
consider the following information for a user view: user_path named route with value "/users/" @user = 1 now, consider the following code in the html erb template: <%= link_to user_path(@user)...
8744
Which symbol is used to contain the values of automatically initialized arrays. Also used to define a block of code, for classes, methods, and local scopes?
8745
PatternSyntaxException Class Methods is an unchecked exception that indicates a syntax error in a regular expression pattern.
8746
What is the advantage of Method Overloading?
8747
Garbage Collection is the process of reclaiming the runtime unused memory automatically.
8748
An abstract class has no use when it is extended by some other class.
8749
Which provides a new way for your programs to interface with code libraries written in other languages?
8750
Which classes has Sun Microsystem suggested not to use for read and write the textual information?
8751
Can we start a thread twice?
8752
Who is also called father of Java Programming Language?
8753
Which string function returns the number of characters in a string?
8754
What is the disadvantage of Garbage Collection?
8755
Relative path make your hypertext links______.
8756
Colors in plain HTML can be specified using ?
8757
A class is declared inside a class but outside a method it is known as ________.
8758
Which method of 'Class' class is used to register the driver class and the method is used to dynamically load the driver class?
8759
Which program do you need to write HTML?
8760
Which keyword is used by classes to implement an interface?
8761
The <br>tag adds what to your webpage ?
8762
When making bulleted lists you have what options ?
8763
JVM stands for?
8764
Which package includes StringTokenizer that tokenizes a string into independent words?
8765
colspan can be added to only what tag?
8766
Which method waits for a thread to die?
8767
How many characters can be written with 1 Kilobyte ?
8768
What will happen if we call the run() method directly instead of calling the start() method?
8769
If you do not include a DESCRIPTION meta tag, most search engine will simply list what ?
8770
Which package includes all the standard classes of java?
8771
Which is NOT a predefined target for links ?
8772
How many types of constructor are defined in the StringTokenizer class?
8773
Hexadecimal numbers are numbers based on the value of what ?
8774
Which class is used when a program does not want to handle an exception?
8775
What type of constructor is used to provide different values to the distinct objects?
8776
All XHTML tags and attributes must be in lower case
8777
By interface, we cannot support the functionality of multiple inheritances.
8778
The Java Virtual Machine is the cornerstone of the Java platform.
8779
Which method of DataInputStream class reads a line from the file and returns it as a string?
8780
Which state is the thread still alive, but is currently not eligible to run?
8781
Both threads are waiting for each other to release the lock, the condition is called deadlock.
8782
WYSIWYG stands for ?
8783
How many ways are there to access package from another package?
8784
Under which package is the string class encapsulated?
8785
Which keyword is used for the block to handle the exceptions generated by try block?
8786
Nested interface must be public if it is declared outside the interface but it cannot have any access modifier if declared within the class.
8787
Multiple inheritances is not supported in case of class but it is supported in case of interface.
8788
Which class automatically flushes the data so that there is no need to call the flush() method. Moreover, its methods don't throw IOException?
8789
Is attribute minimization allowed in XHTML?
8790
Gif and jpg are the two main types of what ?
8791
How many methods does a thread class provides for sleeping a thread?
8792
Which class members can be accessed from the classes in the same package as well as classes in other Packages that are subclasses of the declaring class?
8793
When is the content of a table shown ?
8794
XHTML documents must be "well-formed"
8795
Which method of object class can clone an object?
8796
To make the appearance of the colors more powerful on your site do which of the following ?
8797
Which is a technique in Java in which a class can have any number of constructors that differ in parameter lists?
8798
The DOCTYPE declaration has no closing tag
8799
Is this correct XHTML? ( <ul> <li>Shope</li> <li>Cloths <ul> <li>Cloths Shope</li> <li>T Shirt</li> </ul> <li>Jeans</li> </ul>)
8800
All elements in XHTML must be closed
8801
If you don't want the frame windows to be resizeable, simply add what to the <frame> lines ?
8802
The <title> tag belongs where in your HTML ?
8803
What is correct XHTML for a horizontal line?
8804
XML and HTML will be replaced by XHTML
8805
consider the following code snippet: def index render end the corresponding index.html.erb view is as following: <html> <head> <title>ruby on rails sample application | <%=@title%></title> ...
8806
choose the best way to implement sessions in rails 3: a) using cookiestore b) by creating a session table and setting config/initializers/session_store.rb with rails.application.config.session_sto...
8807
Which of the following statements about Java Threads is correct?
8808
where we use attr_accessor and attr_accessible in rails ?
8809
bgcolor is an attribute of body tag
8810
XHTML is a Web standard
8811
For Frames in HTML, how do you specify the rest of the screen?
8812
Is it a common myth that meta tags seriously improve search engine rankings ?
8813
To define the space between the element's border and content, you use the padding property, but are you allowed to use negative values?
8814
Consider the following statements:
8815
Increasing the cellpadding value will what ?
8816
What attribute is used to specify number of rows?
8817
How do you display a border like this: The top border = 10 pixels The bottom border = 5 pixels The left border = 20 pixels The right border = 1pixel?
8818
In a class definition, the special method provided to be called to create an instance of that class is known as a/an
8819
Can I play audios in HTML? Answer :
8820
Re-implementing an inherited method in a sub class to perform a different task from the parent class is called
8821
What is cell padding?
8822
An abstract data type typically comprises a …………… and a set of ……………… respectively.
8823
In Java, a try block should immediately be followed by one or more ……………….. blocks.
8824
In Java, a character constant’s value is its integer value in the ………………………character set.
8825
…………….. are used to document a program and improve its readability.
8826
Java compiler javac translates Java source code into ………………
8827
What would the argument passing method be which is used by the above Program – III?
8828
What would the output be of the above Program – III before and after it is called?
8829
Identify, from among the following, the incorrect variable name(s).
8830
Which of the following is not a component of Java Integrated Development Environment (IDE)?
8831
Screen colors are defined by which colors ?
8832
How do you make each word in a text start with a capital letter?
8833
Is width="100" and width="100%" the same?
8834
Which of the following attributes below are used for a font name?
8835
Use<td> and </td>to add what to your tables?
8836
< meta > tags always goes inside the < head > element.
8837
What does the GENERATOR meta tag tell ?
8838
Which of the following tags below are used for a multi-line text input control?
8839
<a> and </a> are the tags used for ?
8840
In java, objects are passed as
8841
Mark the incorrect statement from the following:
8842
When an overridden method is called from within a subclass, it will always refer to the version of that method defined by the
8843
Which format usually works best for photos ?
8844
All exception types are subclasses of the built-in class
8845
How do you add a background color for all <h1> elements? (
8846
A protected member can be accessed in,
8847
What is the REFRESH meta tag used for ?
8848
Each list item in an ordered or unordered list has which tag? (
8849
An overloaded method consists of,
8850
If you wanted to create text that was a different color or font than other text in your Web page, what type of tag would you use?
8851
The correct order of the declarations in a Java program is,
8852
The java run time system automatically calls this method while garbage collection.
8853
You read the following statement in a Java program that compiles and executes.(submarine.dive(depth); What can you say for sure?)
8854
When you use a heading tag in a document, what does the Web browser assumes? (
8855
When you count to 15 using hexadecimal numbers, the highest number is what ?
8856
What is garbage collection in the context of Java?
8857
What is byte code in the context of Java?
8858
Which of the following is TRUE?
8859
Which of the following variable declaration would NOT compile in a java program?
8860
What is the type and value of the following expression? (Notice the integer division).(-4 + 1/2 + 2*-3 + 5.0)
8861
Among these expressions, which is(are) of type String?
8862
Which of the following is true?
8863
Which of the following is not true?
8864
The fields in an interface are implicitly specified as,
8865
Which one of the following is not true?
8866
To prevent any method from overriding, we declare the method as,
8867
Which statement is not true in java language?
8868
Multiple inheritance means,
8869
The default value of a static integer variable of a class in Java is,
8870
Ritchie and Brian Kernighan jointly carried out the development of C and that version is ________ .
8871
Which Committee standardize C Programming Language ?
8872
Who was Creator of B Language , which inspired Dennis Ritchie to create Strong Procedural Language called C ?
8873
C Programming was created at ______ by Dennis Ritchie.
8874
Many features of C were derived from an earlier language called _____.
8875
Dennis Was Author of Famous Programming Book _________ .
8876
Dennis Ritchie received following awards - [Select 2]
8877
C Programming was created in Year _______ .
8878
Why do designers often use slight variations of black and white as background colors ?
8879
Which tag is used to insert images into your web page ?
8880
There are how many "browser safe colors" ? (
8881
Which two meta tags have special relevance for search engines ?
8882
What is the most important tool for adding colors to certain areas of the page rather than the entire background ?
8883
What tag adds a paragraph break after the text ?
8884
Which of these sentences most accurately describes the GET VBAK LATE. event?
8885
To create a list of the top 25 customers, you should use
8886
To summarize the contents of several matching lines into a single line, use this SELECT statement clause.
8887
To both add or change lines of a database table, use ___
8888
Which of these is NOT a valid type of function module?
8889
After a DESCRIBE TABLE statement SY-TFILL will contain
8890
The following code indicates:(CALL SCREEN 9000 STARTING AT 10 5 ENDING AT 60 20)
8891
To prevent duplicate accesses to a master data field:
8892
This data type has a default length of one and a default value = '0'
8893
In regard to the START-OF-SELECTION event, which of the following is a true statement?
8894
Defining clickable sub-areas on an image is called?
8895
Imagelinks can show a text label if you add which property?
8896
Which of the following is NOT a valid pair for browser safe colors ?
8897
If a table contains many duplicate values for a field, minimize the number of records returned by using this SELECT statement addition.
8898
Adding a border to your image helps the visitor to recognize it as what ?
8899
One should never combine the "start" and "type" option ?
8900
What tag tells the browser where the page starts and stops ?
8901
Why should you specify a background color if you are using an image for the actual background of your page ?
8902
What is used to store information usually relevant to browsers and searchengines?
8903
Why should you add alternative text to your images ?
8904
To select one record for a matching primary key, use ____
8905
Is it possible to link within the current page ?
8906
To allow the user to enter a single value on a selection screen, use the ABAP keyword ____.
8907
In the code <frameset cols="120,*"> the following would be true.
8908
Which section is used for text and tags that are shown directly on your web page ?
8909
Hex-colors are the only way to define colors on the web?
8910
A Web document is broken into sections. What are the tags called that create these sections?
8911
When you use a heading tag in a document, what does the Web browser assumes?
8912
Kind of Parsers are
8913
What does vlink mean ?
8914
If the background image is smaller than the screen, what will happen ?
8915
A 6 digit Hex color (#FF9966) defines values of Red, Blue and Green in which order ?
8916
All normal webpages consist of what two parts ?
8917
Use what to prevent confusion on numbers higher than 9 with hexadecimal colors ?
8918
To specify a font for your whole page add which tag ?
8919
Why do designers often use slight variations of black and white as background colors ? (
8920
Do all XHTML documents require a doctype?
8921
colspan=n can be added to only what tag?
8922
All of these allow you to step through the flow of a program line-by-line except:
8923
What would be the value of lv_char_len?
8924
What would be the value of lv_byte_len?
8925
Which of the following lines of code will not show a match?
8926
Which of the following functions does not accept any argument?
8927
Which of the following statements regarding the output of the function re.match is incorrect?
8928
Which of the following functions returns a dictionary mapping group names to group numbers?
8929
In the functions re.search.start(group) and re.search.end(group), if the argument groups not specified, it defaults to ________
8930
Which of the codes shown below results in a match?
8931
Which of the following special characters matches a pattern only at the end of the string?
8932
The special character \B matches the empty string, but only when it is ____________
8933
The function of re.match is ____________
8934
Which of the following pattern matching modifiers permits whitespace and comments inside the regular expression?
8935
Which of the following functions creates a Python object?
8936
The function of re.search is __________
8937
The difference between the functions re.sub and re.subn is that re.sub returns a _______________ whereas re.subn returns a __________________
8938
The function re.error raises an exception if a particular string contains no match for the given pattern.
8939
Which of the following functions results in case insensitive matching?
8940
Which of the following functions clears the regular expression cache?
8941
Choose the function whose output can be: <_sre.SRE_Match object; span=(4, 8), match=’aaaa’>.
8942
_______ matches the start of the string._______ matches the end of the string.
8943
The expression a{5} will match _____________ characters with the previous regular expression.
8944
The character Dot (that is, ‘.’) in the default mode, matches any character other than _____________
8945
What happens if no arguments are passed to the seek function?
8946
How do you change the file position to an offset value from the start?
8947
How do you delete a file?
8948
How do you rename a file?
8949
How do you get the current position within the file?
8950
How do you close a file object (fp)?
8951
Which of the following is not a valid attribute of a file object (fp)?
8952
How do you get the name of a file from a file object (fp)?
8953
What is the difference between r+ and w+ modes?
8954
Which of the following is not a valid mode to open a file?
8955
Which of the following are the modes of both writing and reading in binary format in file?
8956
Is it possible to create a text file in python?
8957
Which function is used to close a file in python?
8958
Which function is used to write a list of string in a file?
8959
Which function is used to write all the characters?
8960
Which function is used to read single line from file?
8961
What is a FTP program used for?
8962
Which function is used to read all the characters?
8963
Which of the following is used to explore the Internet?
8964
What is the use of “a” in file handling?
8965
A keyword is the —
8966
What is the use of “w” in file handling?
8967
In file handling, what does this terms means “r, a”?
8968
Which domain must be present in the website address (URL) of a university library?
8969
Correct syntax of file.readlines() is?
8970
Correct syntax of file.writelines() is?
8971
What is the correct syntax of open() function?
8972
Pick the odd one tag out?
8973
What is unpickling?
8974
What is the pickling?
8975
Which of the following mode will refer to binary data?
8976
Which is/are the basic I/O connections in file?
8977
What is the use of truncate() method in file?
8978
What is the use of seek() method in files?
8979
The first page of website is called?
8980
What is the current syntax of remove() a file?
8981
What is the current syntax of rename() a file?
8982
What is the use of tell() method in python?
8983
Which one of the following is not attributes of file?
8984
How do I add scrolling text to my page?
8985
Can a data cell contain images?
8986
Which is a valid Internet address?
8987
Tags and test that are not directly displayed on the page are written in _____ section.
8988
Which are the two built-in functions to read a line of text from standard input, which by default comes from the keyboard?
8989
HTML tags are surrounded by which type of brackets.
8990
The readlines() method returns ____________
8991
HTML uses
8992
To read the remaining lines of the file from a file object infile, we use _________
8993
To read the next line of the file from a file object infile, we use ____________
8994
Apart from <b> tag, what other tag makes text bold ?
8995
To read the entire remaining contents of the file as a string from a file object infile, we use ____________
8996
To read two characters from a file object infile, we use ________
8997
Fundamental HTML Block is known as ___________.
8998
The year in which HTML was first proposed _______.
8999
To open a file c:\scores.txt for appending data, we use _________
9000
To open a file c:\scores.txt for writing, we use ____________
9001
To open a file c:\scores.txt for reading, we use _____________
9002
Which function overloads the // operator?
9003
By default Hyperlinks are displayed with an underline. How do you remove the underline from all hyperlinks by using CSS code ?
9004
Which operator is overloaded by the __or__() function?
9005
Let A and B be objects of class Foo. Which functions are called when print(A + B) is executed?
9006
How will you make all paragraph elements 'RED' in color ?
9007
Which function overloads the >> operator?
9008
The default value of "position" attribute is _________.
9009
Which CSS property is used to control the text size of an element ?
9010
Which operator is overloaded by __lg__()?
9011
Which function overloads the == operator?
9012
Which operator is overloaded by __invert__()?
9013
Which css property you will use if you want to add some margin between a DIV's border and its inner text ?
9014
Which function overloads the + operator?
9015
When we write <img src="img.png">, what "img.png" inside double quote implies?
9016
Which attribute can be added to many HTML / XHTML elements to identify them as a member of a specific group ?
9017
Method issubclass() checks if a class is a subclass of another class.
9018
Which element is used in the <HEAD> section on an HTML / XHTMLpage, if we want to use an external style sheet file to decorate the page ?
9019
Which of the following statements isn’t true?
9020
What should be the table width, so that the width of a table adjust to the current width of the browser window?
9021
What does single-level inheritance mean?
9022
Which of the following properties will we use to display border around a cell without any content ?
9023
What does built-in function help do in context of classes?
9024
If we want to use a nice looking green dotted border around an image, which css property will we use?
9025
Which of the following is not a type of inheritance?
9026
What does built-in function type do in context of classes?
9027
If we want to show an Arrow as cursor, then which value we will use ?
9028
Suppose B is a subclass of A, to invoke the __init__ method in A from B, what is the line of code you should write?
9029
Is it possible to declare font-weight, font-face & font-size by using ONLY ONE css propery ?
9030
When defining a subclass in Python that is meant to serve as a subtype, the subtype Python keyword is used.
9031
All subclasses are a subtype in object-oriented programming.
9032
Can we define the text direction via css property ?
9033
Which of the following statements is wrong about inheritance?
9034
If we want to wrap a block of text around an image, which css property will we use ?
9035
Can we align a Block element by setting the left and right margins ?
9036
Which of the following best describes inheritance?
9037
Suppose we want to arragnge five nos. of DIVs so that DIV4 is placed above DIV1. Now, which css property will we use to control the order of stack?
9038
What does print(Test.__name__) display (assuming Test is the name of the class)?
9039
__del__ method is used to destroy instances of a class.
9040
What is delattr(obj,name) used for?
9041
What is hasattr(obj,name) used for?
9042
Special methods need to be explicitly called during object creation.
9043
What are the methods which begin and end with two underscore characters called?
9044
Which of the following is not a class method?
9045
The assignment of more than one function to a particular operator is _______
9046
What is Instantiation in terms of OOP terminology?
9047
What is getattr() used for?
9048
What is setattr() used for?
9049
____ is used to create an object.
9050
_____ represents an entity in the real world with its identity and behaviour.
9051
Which of the following is false about protected class members?
9052
The purpose of name mangling is to avoid unintentional access of private class members.
9053
Private members of a class cannot be accessed.
9054
Methods of a class that provide access to private members of the class are called as ______ and ______
9055
Which of the following is the most suitable definition for encapsulation?
9056
Which of these is not a fundamental features of OOP?
9057
Overriding means changing behaviour of methods of derived class methods in the base class.
9058
A class in which one or more methods are only implemented to raise an exception is called an abstract class.
9059
What is the use of duck typing?
9060
What is the biggest reason for the use of polymorphism?
9061
Which of the following best describes polymorphism?
9062
Which of the following blocks will be executed whether an exception is thrown or not?
9063
______________________ exceptions are raised as a result of an error in opening a particular file.
9064
If we don't want to allow a floating div to the left side of an element, which css property will we use ?
9065
An exception is ____________
9066
Syntax errors are also known as parsing errors.
9067
If we want define style for an unique element, then which css selector will we use ?
9068
Which of the following is not a standard exception in Python?
9069
Which of the following is not an exception handling keyword in Python?
9070
What happens when ‘1’ == 1 is executed?
9071
When is the finally block executed?
9072
Can one block of except statements handle multiple exception?
9073
When will the else part of try-except-else be executed?
9074
How many except statements can a try-except block have?
9075
<p> tag defines a
9076
To which of the following the “in” operator can be used to check if an item is in it?
9077
For controlling page's dimensions and scaling which element is used in <meta> tag?
9078
Which of following is a new input type in HTML5?
9079
Suppose listExample is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after listExample.pop()?
9080
Suppose listExample is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after listExample.pop(1)?
9081
HTML block-level elements always starts on a
9082
Suppose listExample is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after listExample.extend([34, 5])?
9083
What is first version of HTML?
9084
Suppose list1 is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after list1.reverse()?
9085
Non breaking space is denoted by
9086
Suppose list1 is [3, 4, 5, 20, 5, 25, 1, 3], what is list1.count(5)?
9087
Cols attribute in forms text area specifies what?
9088
Suppose list1 is [3, 4, 5, 20, 5], what is list1.index(5)?
9089
Default method while submitting a form is
9090
To remove string “hello” from list1, we use which command?
9091
For using an external style sheet in your web document which tag is used?
9092
To insert 5 to the third position in list1, we use which command?
9093
HTML <br> element defines
9094
o add a new element to a list we use which command?
9095
<h1 style="text-align: center;"> My Web Page </h1> displays?
9096
Suppose list1 = [0.5 * x for x in range(0, 4)], list1 is:
9097
Non-semantic elements in HTML5 is?
9098
Suppose list1 is [1, 3, 2], What is list1 * 2?
9099
Which method uploads a representation of a specified URI in HTML?
9100
CSS stands for?
9101
Suppose list1 is [2, 33, 222, 14, 25], What is list1[:-1]?
9102
For opening linked document in same window which target attribute is more suitable?
9103
Suppose list1 is [2, 33, 222, 14, 25], What is list1[-1]?
9104
Suppose list1 is [4, 2, 2, 4, 5, 2, 1, 0], Which of the following is correct syntax for slicing operation?
9105
To shuffle the list(say list1) what function do we use?
9106
Suppose list1 is [1, 5, 9], what is sum(list1)?
9107
Suppose list1 is [3, 5, 25, 1, 3], what is min(list1)?
9108
Hypertext transfer protocol (HTTP) is designed to enable communications between?
9109
While submitting a form method attribute specifies what?
9110
Suppose list1 is [2445,133,12454,123], what is max(list1)?
9111
Suppose listExample is [‘h’,’e’,’l’,’l’,’o’], what is len(listExample)?
9112
Attributes usually come in name/value pairs forms like:
9113
What is the output when we execute list(“hello”)?
9114
MPEG stands for?
9115
Which of the following commands will create a list?
9116
In HTML tables space between cell content and cell border is called
9117
.midi extension file format is a\an
9118
In HTML links an unvisited link is underlined and
9119
Suppose x is 345.3546, what is format(x, “10.3f”) (_ indicates space).
9120
HTML <dl> tag defines the
9121
Which tag is used to define links in HTML document?
9122
What function do you use to read a string?
9123
In HTML you can display a color by using only
9124
Suppose i is 5 and j is 4, i + j is same as _______
9125
HTML <canvas> element is used to draw graphics, on fly via
9126
To check whether string s1 contains another string s2, use ________
9127
This <!-- Your text --> tag is used for?
9128
If a class defines the __str__(self) method, for an object obj for the class, you can use which command to invoke the __str__ method.
9129
For applying styles on many web pages which style sheet is more preferable?
9130
Semantic element <nav> defines
9131
To return the length of string s what command do we execute?
9132
For creating a drop-down list in HTML forms which element is suitable?
9133
For specifying character set, page description, keywords, authors and other metadata which tag is used?
9134
To retrieve the character at index 3 from string s=”Hello” what command do we execute (multiple answers allowed)?
9135
Visible part of HTML document lies in
9136
What is “Hello”.replace(“l”, “e”)?
9137
A small program that can be embedded within web pages to perform a specific functionality is called as
9138
Say s=”hello” what will be the return value of type(s)?
9139
What will be displayed by print(ord(‘b’) – ord(‘a’))?
9140
Starting and ending tag of HTML document is
9141
What will be the output of the “hello” +1+2+3?
9142
RGB stands for
9143
The format function, when applied on a string returns __________
9144
Plug-ins can be added to web pages with <object> tag and?
9145
For adding styles in HTML tables we can use properties of?
9146
A tag which is used for overriding current text direction e.g. Right to left side
9147
Suppose s is “\t\tWorld\n”, what is s.strip()?
9148
Which of the following statement prints hello\example\test.txt?
9149
To concatenate two strings to a third what statements are applicable?
9150
Given a string example=”hello” what is the output of example.count(‘l’)?
9151
Scrolling piece of text displayed either horizontally or vertically is created by
9152
print(0xA + 0xB + 0xC):
9153
What arithmetic operators cannot be used with strings?
9154
The output of executing string.ascii_letters can also be achieved by:
9155
What will be the output of the following Python statement?(>>>"abcd"[2:])
9156
What will be the output of the following Python statement?(>>>"a"+"bc")
9157
Which of the following statement is used for changing Recovery Model with T-SQL?
9158
Type of tag used for inserting an image in web document is
9159
The _______ recovery model is a special-purpose model that works in a similar manner to the full recovery model.
9160
Which of following is not an inline element?
9161
How many types of backups you can run when the data is in the “Full” recovery model?
9162
Web design that makes your web page look good on all devices is called as?
9163
Which of the following recovery models requires log backups?
9164
Which of the following feature cannot be used in simple recovery mode?
9165
XHTML stands for?
9166
HTML classes that is already defined and allow us to apply styles on it are called as
9167
No log backups is a feature of __________ recovery model.
9168
In HTML form <input type="text"> is used for
9169
How many types of recovery model is provided by SQL Server?
9170
HTML local storage object that stores data for one session is?
9171
SQL Server backup and restore operations occur within the context of the _______ model of the database
9172
To define a style for a special type of elements, we can add a
9173
_blank target attribute opens a linked document in
9174
Purpose of syspolicy_system_health_state in policy based management is _________
9175
Parameters remain in browser history is an example of
9176
___________ displays the condition expressions that were executed.
9177
Which of following element is used for creating a separate table footer?
9178
How many types of execution mode are present in syspolicy_policies?
9179
Anchor tag in HTML is denoted as
9180
Which of the following column is a part of syspolicy_policies result?
9181
An image-map is an image with clickable areas, so which tag we can use for defining an image-map?
9182
"href " attribute in HTML document is used to define
9183
Policy based management view is owned by _______ schema.
9184
Which method is same as GET but returns only HTTP headers and no document body?
9185
XML is application of Extensible Markup Language (XML) whereas HTML is an application of
9186
Which of the following is Policy-based management view?
9187
Which of the following is policy based management tip related to administration?
9188
Point out the correct statement related to database configuration
9189
Next version of XHTML 1.0 is
9190
Policy based management views are present in _________ database
9191
Users need _________ permission to create collection model object in MDS.
9192
Creation of a Derived Hierarchy requires permission to ___________
9193
Which of the following action cannot be performed with MDS?
9194
Which of the following data tools comes installed with SQL Server 2012?
9195
Key component that help you build an EIM solution is ___________
9196
Which is the more preferred way tool of effective data management strategy and decision making?
9197
Which of the following SQL Server tools is used to enhance data management and governance?
9198
Which of the following tools is used for enterprise information management?
9199
Which of the following network protocol should be selected to enable IP address?
9200
Which is the most serious issue after migration of access database to SQL Server?
9201
Point out the wrong statement
9202
Title element defines title of document at
9203
Action attribute in HTMl forms specifies that
9204
Which of following is not semantic element?
9205
Tags used to tell browser that how to display text enclosed (e.g. <b>, <big>) are called as
9206
When form data contains sensitive or personal information than which method is more preferable?
9207
Which language is used to create web documents?
9208
For defining a submit button which tag is used?
9209
Which tag is used for defining an alternate content for users that do not support client-side scripts?
9210
What does DRY mean?
9211
Does Ruby on Rails make app development easier?
9212
Who wrote Ruby on Rails?
9213
What is Ruby on Rails?
9214
what is a layout?
9215
what is called a set of test data?
9216
A form bound to a model object is called -------.
9217
what test that tests the whole system?
9218
.In Rails, a test of an individual controller is called ------------------.
9219
.In Rails, a test of a model class is called ---------------
9220
how is authenticity token works?
9221
which web application that integrates data and services from other places on the web
9222
how you start a form that doesn't match a model object
9223
how you start a form that matches a model object?
9224
.------sets the location and type of your databbase as well as a few other settings (like how long messages will be recorded)
9225
.What is scriptlet?
9226
what is partial page templates (or partials)?
9227
what does "erb" stand for in file_name.erb?
9228
what file corresponds to the "show" method
9229
show errors in object "t"
9230
what do you write to indicate that a tweet from table "tweets" only belongs to one zombie? (from table "zombies")?
9231
how do you change show method in the controller to render in "status.html.erb"
9232
what code generates the url "/tweets"?
9233
how do you make a link?
9234
.How to create multiple hashes inside "params" (like "status" within "tweet")?
9235
what code generates the url "/tweets/new"? (action = new tweet form)
9236
how do you do validate to ensure ":status" exists and that it's length is at least 3 long?
9237
.how do you make a link to a zombie's profile with the text of a zombies name?
9238
how do you make sure your forms don't get hacked?
9239
.how includes all stylesheet files?
9240
what do you use to send messages to the user?
9241
.How to includes all javascript?
9242
let's say you have a method... def get_tweet @tweet = Tweet.find(params[:id]) end how do you tie an action to that that only kicks in for the edit, update, and destroy methods?
9243
how do you check the logged in user's id?
9244
how do you define a "status" parameter (within a "tweet" parameter)?
9245
What is a controller?
9246
.What's the difference between a hash and an array?
9247
What is the /spec directory in rails?
9248
What is the most special aspect of nil?
9249
What is an integration test?
9250
.Name two ways to indicate a "block" in Rails
9251
What is the main benefit that a Class gets by inheritance from ApplicationController?
9252
What is the command to print to the screen?
9253
What is the status code for "success" when throwing a GET?
9254
Describe a "symbol" in Rails?
9255
What does the routes.rb file do with "get pages/home"?
9256
What kind of object is "@title" and what is special about it in Rails?
9257
What is a Class?
9258
What's the best way to describe an object in Ruby?
9259
.What is a .erb file?
9260
How does a local variable differ from an instance variable when empty?
9261
Describe the TDD cycle.
9262
When is it best to use an array rather than a hash?
9263
what are the main principles of REST?
9264
when data is retrieved from the database, what does Rails turn it into?
9265
how do you ask for all records of the Ads table?
9266
.what method name indicates to rails that it should validate before saving/updating?
9267
what precedes the "check_logged_in" method in a class?
9268
what is the second uri indicate?
9269
how would you insert "1 + 1" into a string?
9270
if the table Seats is associated with the table Flights, how should you name the table column in Seats to indicate its flight?
9271
what expression do all layouts have?
9272
what's special about a search form?
9273
how do you run the latest migrations?
9274
how do you call a partial?
9275
how do you add an error (called "there was an error") in the validate method?
9276
what parameters are in <% form_for() %>?
9277
what does REST stand for?
9278
.what is "format" in "repond_to do |format|"?
9279
.what kind of test do you create yourself?
9280
what does Embedded Ruby (ERb) process as inputs?
9281
what scripts does the model-generator command create?
9282
.how do you start a loop that reads through the array object "@ads"?
9283
what does "rake" mean?
9284
what does a model object do before it saves or updates data?
9285
if looping through “f” object, how do you make a text field “name”?
9286
where do you edit routs?
9287
what generates web pages from page templates?
9288
a RESTful application uses ... to define an interaction with the data.
9289
why do you only need to call "render" in the controller sometimes and not always?
9290
what is naming convention for file names ?
9291
.what variable changes the environment?
9292
to create scafolding for "thing" data, run...
9293
what is naming convention for classes?
9294
what comes after "def check_logged_in" line for site "ads"?
9295
what is params[...]?
9296
what tag starts a form?
9297
.what are the three "magic columns"
9298
how do you express error messages in a form (do |f|)?
9299
how does Rails choose to correct format to generate?
9300
how does rake tell which migrations have been run and which have not?
9301
do models have singular or plural names?
9302
why should partials generally use local variables?
9303
.how does "rake" differ from "ruby"?
9304
how do partials look compared to regular erb files?
9305
.to add login security, which two pieces of code do you need?
9306
what should you write in routes.rb to give meaning to http://mebay.com/ads/3?
9307
how should you order routes?
9308
how do you generate regular model code (not scaffolding)?
9309
.what environments does Rails have by default?
9310
.which two steps to include test.xml data to the partial "map" (via the variable "data")...?
9311
why is it good to redirect after inserting info into the database?
9312
where do you add the filter code?
9313
what is Rails' object-relational mapping library?
9314
Which of the following network protocol should be selected to enable IP address?
9315
________ shows information about Access databases that have been added to the project.
9316
Which of the following change took place in JULY 2014 release of SSMA?
9317
Which of the following option is used to find database objects by using filter criteria?
9318
what checks if an input is numeric?
9319
converts database records to objects is called -------------.
9320
Which is the most serious issue after migration of access database to SQL Server?
9321
representation of a resource is called -------------.
9322
_________ is a tool for migrating databases from Microsoft Access versions 97 through 2010 to Microsoft SQL Server 2005.
9323
what is the filter code that calls on the "check_logged_in" method for only the "edit" and "update" methods?
9324
When you _______ an Access table from a SQL Server, SSMA restores the original Access table and its data.
9325
The __________ is an Access add-in program that provides data analysis tools for financial analysis.
9326
Which of the following evaluation operation is provided in SSIS?
9327
what steps get you from fild.erb to file.html?
9328
A basic package in SSIS includes the following elements?
9329
Purpose of SQLISPackage_12546 event in SQLIS package is to _____________
9330
Which of the following is the event logged by the Integration Services?
9331
Which of the following error message indicates that the package cannot run in SSIS?
9332
Which of the following steps should be carried out using data types in SSIS for efficient results?
9333
.what is "migration"?
9334
When you execute SQL statements within Integration Services, the following optimization can be made?
9335
what's the difference between model names and controller names?
9336
.what does the "h" in <%=h ... %> mean?
9337
what is scriptlet versus expression
9338
Which of the following will increase the Rows/sec calculation in SSIS?
9339
when you put something into an array, does the array keep a separate copy?
9340
how do you specify a format like html or xml in routes.rb?
9341
what kind of tests are there?
9342
what comes after <% form_for()... ?
9343
how do you update?
9344
what does "show" refer to as the :action value?
9345
how do you run a migration?
9346
how do you create a migration that adds a "phone" field to the "tickets" table?
9347
Rails' application framework is called ----------?
9348
What is rvm?
9349
What is rake?
9350
what is scaffold command?
9351
What is gem?
9352
What is gemset?
9353
What is bundler?
9354
What is the output of the given code? a=[1,2,3,4,5] b=[1,2,3,4,5] if a==b print "Equal" else print "Not equal" end
9355
___________ represents how many network transfers per second are occurring.
9356
What do you understand by design limitation in SSIS package?
9357
What is the output of the given code? string_array = ["a","e","i","o","u"] boolean_array = ["True","False"] puts string_array[3] puts boolean_array
9358
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array[3]
9359
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array
9360
What is the output of the given code? a=[["a","b"]] b=[["e","a"]] print a + b
9361
What is the output of the given code? array1 = [[1,2,3,4,5],[0,0,0,0]] array2 = [[1,2,3],[0,0,0]] print !array1
9362
What is the output of the given code? array1 = [[1,2,3,4,5],[0,0,0,0]] array2 = [[1,2,3],[0,0,0]] print array1 || array2
9363
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3],[0,0,0]] print array1 && array2
9364
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] print array1*array2
9365
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] print array1-array2
9366
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] print array1+array2
9367
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] if array1==array2 print "Equal" else print "Not equal" end
9368
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3],[0,0,0,0]] if array1==array2 print "Equal" else print "Not equal" end
9369
The following Network perfom counters can help you tune your topology?
9370
What is the output of the given code? multi_d_array = [[1,2,3,4],[0,0,0,0]] multi_d_array.each { |x| puts "#{x}\n" }
9371
________ represents to total memory pressure on the system in SSIS.
9372
The key counters for Integration Services and SQL Server are _______________
9373
What is the output of the given code? multi_d_array = [[0,0,0,0],[0,0,0,0],[0,0,0,0],[0,0,0,0]] print multi_d_array
9374
Array of arrays are called multidimensional arrays.
9375
If SSIS is not able to drive close to 100% CPU load, this may be indicative of ________
9376
Which of the following is the best practice related to SSIS?
9377
What is the output of the given code? a=["hey", "ruby", "language"] b=[1, 2, 3] puts b[1] puts a[2]
9378
SSMS provides different options to develop your SSIS package starting with ___________ wizard.
9379
What is the output of the given code? a=["hey", "ruby", "language"] b=["hey", "language", "ruby"] if a==b print "Equal" else print "Not equal" end
9380
Two types of subscriptions present for replication is __________
9381
What is the output of the given code? a=["hey", "ruby", "language"] b=["hey", "ruby", "language"] if a==b print "Equal" else print "Not equal" end
9382
Which of the following makes data available for replication?
9383
What is the output of the given code? a=[1,2,3,4,5] b=[1,2,3,4,5] if a==b print "Equal" else print "Not equal" end
9384
How many types of replication components are present in SQL Server?
9385
What is the output of the given code? a=[1,2,3,4,5] b=[1,2,4,6,8] if a[3]==b[2] print "Equal" end
9386
Which of the following stored procedure provide replication support for AlwaysOn?
9387
Which of the following is a disadvantage of replication?
9388
Replication in SQL Server is used to overcome _______________
9389
How many types of replication is provided by SQL Server?
9390
What is the output of the given code? string_array = ["a","e","i","o","u"] boolean_array = ["True","False"] puts string_array[3] puts boolean_array[1]
9391
What is the output of the given code? string_array = ["a","e","i","o","u"] boolean_array = ["True","False"] puts string_array[3] puts boolean_array
9392
__________ is a set of technologies for copying and distributing data and database objects from one database to another.
9393
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array[3]
9394
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array
9395
Which of the utility is used for reporting the issue in Service Broker?
9396
Which of the following is a Service Broker Related Dynamic Management View?
9397
Which of the following change was introduced in SQL Server 2012 related to Service Broker?
9398
It is possible to make array of booleans.
9399
(SSBS) is a new architecture which allows you to write ____________ message based application.
9400
Service Broker also provides security by preventing __________ access from networks and by message encryption.
9401
What will be the output of the following? array1 = [1,2,3] array2 = [0,0,0] if array1 == array2 print "Equal" else print "Not equal" end
9402
What will be the output of the following? array1 = [1,2,3] array2 = [0,0,0] if array1 >= array2 print "Greater or equal" else print "Not equal" end
9403
Which of the following service broker component defines the infrastructure used for exchanging messages between instances?
9404
What will be the output of the following? array1 = [0,0,0] array2 = [0,0,0] if array1 == array2 print "They are equal" else print "Not equal" end
9405
There are _________ components of the Service broker in SQL Server.
9406
What will be the output of the following? array1 = [100, 200, 300, 400, 500] array2 = [1,2,3,4,5] if array1 == array2 print "They are equal" else print "Not equal" end
9407
What will be the output of the following? array = [100, 200, 300, 400, 500] print "array[5]"
9408
What will be the output of the following? array = [100, 200, 300, 400, 500] print array[5]
9409
Service broker was added to SQL Server ___________
9410
What will be the output of the following? array = [100, 200, 300, 400, 500] print array[4]
9411
What will be output of the given code? my_array = [1, 2, 3, 4] print my_array
9412
Each element in an array has an index and the starting index is index 1.
9413
Arrays can be used to store multiple values in one single variable.
9414
Which of the following method is used to delete records in LINQ?
9415
What is the output of the given code? i=5 j=10 for i in 5..10 && j in 5..10 puts i**j end
9416
DataContext object is constructed in LINQ to SQL using ________
9417
What does the 1..10 indicate?
9418
What is the output of the given code? i=1 for i in 5..10 puts i^2 end
9419
The ______ pre-compiler translates embedded SQL into calls to the Oracle runtime library
9420
LINQ to Entities applications requires __________ mapping provider.
9421
LINQ to SQL in SQL Server fully supports _________
9422
LINQ to SQL is considered to be one of Microsoft’s _______ products.
9423
_________object is used to fill a DataSet/DataTable with query results in ADO.net.
9424
The main features of dotConnect for SQL Server includes ___________
9425
Syntax for closing and opening the connection in ADO.net is _____________
9426
Which of the following is enumeration for ADO.net with SQL Server?
9427
Code snippet for having a named instance of SQL Server would be ___________
9428
To use the .NET Framework Data Provider for SQL Server, an application must reference the _____________ namespace.
9429
The easiest way to start is to create a linked server ‘localhost’ by using _________
9430
What is the output of the given code? loop do m += 1 puts m break if m == 3 end
9431
Which of the following SQL syntax elements is dictated by the SQL dialect levels?
9432
What is the output of the given code? for num in 1..3 puts num*num m= 0 loop do m += 1 puts m break if m == 3 end end
9433
What is the output of the given code? for num in 1..5 puts num*num end
9434
What is the output of the given code? m= 0 loop do m += 1 print m break if m == 10 end
9435
What is the output of the given code? for num in 1..3 puts num for i in 1..2 puts num*i end end
9436
What does the 1…10 indicate?
9437
What is the output of the given code? for num in 1...5 puts num end
9438
Which is the default field terminator for bulk insert in SQL Server?
9439
________ parameter specifies the number of rows in a batch in bulk insert script.
9440
Which of the following performance considerations are regarding bulk operations?
9441
__________ does not allow bulk export operation in SQL Server.
9442
Which of the following utility supports bulk exports and bulk imports data and generates format files?
9443
Which of the following is a bulk import operation?
9444
Under the _______ recovery model, all bulk operations are fully logged.
9445
Which of the following operation cannot be performed in bulk?
9446
What is short form of Secure HyperText Transfer Protocol?
9447
Text inside a <pre> element tag is displayed
9448
_______________ is time based SQL injection attack.
9449
For uniquely identifying an elements name which attribute is used?
9450
Which of the following script is an example of Quick detection in the SQL injection attack?
9451
If you want to merge two or more rows in a table which attribute you can use?
9452
If xp_cmdshell has been disabled with sp_dropextendedproc, we can simply inject the following code?
9453
Which one from following is a block level element in HTML?
9454
Which of the stored procedure is used to test the SQL injection attack?
9455
For playing soundtrack in background which tag is used?
9456
Any user-controlled parameter that gets processed by the application includes vulnerabilities like ___________
9457
XHTML is dynamic web page whereas HTML is
9458
When we want to add many spaces in content than what element we can use
9459
SQL injection is an attack in which _________ code is inserted into strings that are later passed to an instance of SQL Server.
9460
(document.getElementById("demo").innerHTML = "Hello!"; ) Function is an example of?
9461
Which of the stored procedure used for dynamic SQL is prone to attacks?
9462
Dir, lang and xml:lang attributes are example of
9463
Which of the following is a disadvantage of dynamic SQL?
9464
The basic syntax for using EXECUTE command is ___________
9465
The Dynamic SQL Queries in a variable are __________ until they are executed.
9466
HTML tags are?
9467
In HTML Geolocation getCurrentPosition() method is used to
9468
Which of the following is a calling syntax for sp_executesql?
9469
SGML stands for
9470
Dynamic SQL Statements in SQL Server can be easily built using ________________
9471
What is the output of the given code? m=5 loop do m-=1 break if m==0 end
9472
In HTML tables table header is defined by
9473
Which of the following is a way to build dynamic sql statements?
9474
What is the output of the given code? m=0 loop do puts 101 m+=1 break if m==5 end
9475
What is the output of the given code? m=0 loop do puts m*10 m+=1 break if m==5 end
9476
To specify number intervals for numeric type input which attribute is used?
9477
What is the output of the given code? m=0 loop do print "ruby" m+=1 break if m==5 end
9478
What is the output of the given code? m= 8 loop do m += 2 puts m break if m == 16 end
9479
What is the output of the given code? a="hungry" until !a puts "hungry" a=!a end
9480
What is the output of the given code? i = 3 while i > 0 do puts i i -= 1 end j = 3 until j == 0 do puts j j -= 1 end
9481
What is the output of the given code? counter = 0 until counter >= 10 puts counter counter+=1 end
9482
What is the output of the given code? counter = 1 until counter > 10 puts counter counter+=1 end
9483
The complement of while loop is until loop.
9484
What is the output of the given code? i = 50 j=55 while i > 25 && i*j<100 do puts (50*j)/i i -= 1 j-=2 end
9485
What is the output of the given code? i = 50 j=55 while i > 25 && j>35 do puts 50*j/i i -= 1 j-=2 end
9486
hat is the output of the given code? a = 5 b=10 while a<b do puts a*b a+=2 b-=2 end
9487
What is the output of the given code? i = 50 while i > 25 do print 50/i i -= 1 end
9488
What is the output of the given code? i = 3 while i > 0 do print i i -= 1 end
9489
What is the output of the given code? a=5 b=15 while b>a puts a*(b-a) while a>b a+=1 b-=1 end end
9490
What is the output of the given code? a=5 b=15 while a&&b puts a+b end
9491
What is the output of the given code? i = 0 while i < 5 puts i i=(i+1)**2 end
9492
What is the output of the given code? counter = true while counter !=false puts counter end
9493
What is the output of the given code? counter = 1 while counter < 11 puts counter counter = counter + 1 end
9494
While loop checks the condition and the loop keeps on running till the condition is true, it stops when the condition becomes false.
9495
What is the output of the given code? a = 5 b=10 while (a <10 || b<20)&&true puts a*b a+=2 b+=2 end
9496
What is the output of the given code? a = 5 b=10 while a <10 || b<20 puts a*b a+=2 b+=2 end
9497
What is the output of the given code? a= 5 b=10 while a <10 && b<20 puts a-b a+=2 b+=2 end
9498
What is the output of the given code? a = 5 b=10 while a <10 && b<20 puts a*b a+=2 b+=2 end
9499
What is the output of the given code? a = 5 b=10 while a <10 && b<20 puts a+b a+=2 b+=2 end
9500
The given two expression means the same. counter=counter+1 and counter++
9501
What is the output of the given code? a = 22.5 while a >11.5 puts a a-=3.5 end
9502
What is the output of the given code? counter = -50 while counter <0 puts counter counter+=10 end
9503
What is the output of the given code? counter = 100 while counter > 0 puts counter counter-=25 end
9504
What is the output of the given code? counter = 100 while counter > 0 puts counter counter/=5 end
9505
Ruby does not support ++ operator, it only supports += operator.
9506
What is the output of the given code? counter = 1 while counter < 11 puts counter counter+=1 end
9507
What is the output of the given code? counter = 2 while counter < 68 puts counter counter**=2 end
9508
What does the **= assignment operator do?
9509
Which of the following is a valid assignment operator?
9510
What will be the output of the given code? boolean_1 = !true puts boolean_1 boolean_2 = !true && !true puts boolean_2
9511
What will be the output of the given code? boolean_2 = !true && (!true || 100 != 5**2) puts boolean_2
9512
What will be the output of the given code? boolean_1 = !(700 / 10 == 70) puts boolean_1
9513
What will be the output of the given code? boolean_1 = false || -10 > -9 puts boolean_1
9514
What will be the output of the given code? boolean_1 = 2**3 != 3**2 || true puts boolean_1
9515
What will be the output of the given code? boolean_1 = !(3 < 4 || false) && (false || true) puts boolean_1
9516
What will be the output of the given code? boolean_1 = (3 < 4 || false) && (false || true) puts boolean_1
9517
What will the following expression evaluate to? !true && !false
9518
What will the following expression evaluate to? (true && false) || (!true)
9519
What will the following expression evaluate to? true || false
9520
What will be the output of the given code? boolean_1 = 77 < 78 && 77 < 77 puts boolean_1
9521
Which of the following is a valid boolean operator?
9522
What will the following expression evaluate to? true && false
9523
The boolean operator && only result in true when both the values are true?
9524
Boolean opeartors are also known as logical operators.
9525
What is the output of the given code? counter=1 if counter<=5 puts (counter) counter=counter+1
9526
What is the output of the given code? if(a==10 && b=9) print "true" else print "false" end
9527
Which of the following are used for comparison?
9528
What is the output of the given code? a=10 b=9 if(a>b) print ("a greater than b") else print "Not greater" end
9529
What is the output of the given code? a="string" b="strings" if(a==b) print ("a and b are same") else print "Not same" end
9530
What is the output of the given code? test_1 = 17 > 16 puts(test_1) test_2 = 21 <= 30 puts(test_2) test_3 = 9 >= 9 puts(test_3) test_4 = -11 > 4 puts(test_4)
9531
What will the following code evaluate to? a=9!=10
9532
The ‘=’ is used for assigning value to variable?
9533
The == ‘is equal to’ is known as relational operator.
9534
A case statement compares the expression specified by case and that specified by when using the === operator and executes the code of the when clause that matches.
9535
What is the output of the given code? l=9 case l print "ruby" when l==9 print "language" when l==10 end
9536
Scope of DDL triggers in SQL Server can be _____________
9537
___________ triggers do not create the special inserted and deleted tables.
9538
How many types of DDL Trigger is present in SQL Server?
9539
DDL triggers can only fire after the ______ statement has occurred.
9540
Purpose of DDL Trigger is to _____________
9541
What is the output of the given code? length=gets.chomp case length.reverse.length when length=4 print "length is 4" when length=5 print "length is 5" end
9542
What is the output of the given code? length=gets.chomp case length.length when length=4 print "length is 4" when length=5 print "length is 5" end
9543
INSTEAD of clause cannot be used for ____________ trigger.
9544
DDL triggers can be applied to __________ statement.
9545
The expression specified by the when clause is evaluated as the left operand. If no when clauses match, case executes the code of the else clause.
9546
What is the output of the given code? string = gets.chomp case string when string = "a" print "alphabet a" when string = "b" print "alphabet b" when string = "c" print "alphabet c" else print "some other alphabet" end
9547
_____________ is special type of trigger based on CLR environment.
9548
What is the output of the given code? for counter in 1..5 case counter when 0 .. 2 puts counter puts "baby" when 3 .. 6 puts counter puts "little child" when 7 .. 12 puts counter puts "child" else puts counter puts "adult" end end
9549
What is the output of the given code? age = 4 case age puts "baby" when 0 .. 2 puts "little child" when 3 .. 6 puts "child" when 7 .. 12 puts "youth" when 13 .. 18 puts "adult" else end
9550
Which HTML element is used to define a multi-line input field?
9551
The following syntax is used for the ruby case statement. case expression when expression , expression ... then code ... else code end
9552
What is the output of the given code? age = 5 case age when 0 .. 2 puts "baby" when 3 .. 6 puts "little child" when 7 .. 12 puts "child" when 13 .. 18 puts "youth" else puts "adult" end
9553
Triggers can be enabled or disabled with the ________ statement.
9554
How can we insert Javascript in HTML?
9555
Which of the following is not a typical trigger action?
9556
Which tag is used to define a block of text that have quotation marks?
9557
Triggers created with FOR or AFTER keywords is ____________
9558
For defining default font size, color, and typeface for any part of document which element attribute you will use
9559
DML triggers in SQL Server is applicable to _____________
9560
<applet> element in HTML5 is replaced with?
9561
AFTER trigger in SQL Server can be applied to ______
9562
SVG stands for?
9563
An absolute file path is referred as?
9564
How many types of DML triggers are present in SQL Server?
9565
HTML grouping tags are
9566
How many types of triggers are present in SQL Server?
9567
For adding quotation marks in web page paragraph or in line which tag we can use?
9568
What is the output of the given code? x=8 y=10 unless x<y puts "x is less than y" end unless x>y+1 puts "x is less than y+1" end
9569
In HTML, each parameter in RGB(red, green, blue) defines intensity of color between?
9570
What is the output of the given code? x="ruby".length y="language".length puts x,y unless x>y print "length of x is less than that of y" end
9571
Trigger is special type of __________ procedure.
9572
Which tag is used for marked and highlighted text in web document?
9573
What is the output of the given code? x=8 y=10 unless x>y puts "x is less than y" end unless x>y+1 puts "x is less than y+1" end
9574
The ability to create a user-defined function (UDF) is a new feature added to ________________
9575
<input type="datetime-local"> specifies date and time with
9576
Which of the user defined function will be preferred for adding two numbers?
9577
When to choose scalar function over inline table valued function?
9578
CSS hover class is used for
9579
What is the output of the given code? unless true && false print "false" else print "ruby" end
9580
UDFs in SQL Server is composed of _______ parts.
9581
What is the output of the given code? counter=12 unless counter print counter+1 else print counter+2 end
9582
Which of the following is the most visible benefit of user-defined function?
9583
The following syntax is also used for unless conditional statement. code unless conditional
9584
CREATE FUNCTION requires __________ permission in the database.
9585
What is the output of the given code? hungry=false unless hungry print "Not hungry" else print "Hungry" end
9586
Which of the following statements cannot be included in the definition of a Transact-SQL user-defined function?
9587
Which inline function embeds an independent HTML document into current document?
9588
What is the output of the given code? var = 1 print "1 -- Value is set\n" if var print "2 -- Value is set\n" unless var var = false print "3 -- Value is set\n" unless var
9589
Which of the following is not a limitation of user defined function?
9590
What is the output of the given code? x=3 unless x>2 puts "x is less than 2" else puts "x is greater than 2" end
9591
Server-Sent Events allows a web page to get updates from
9592
In HTML tables gap between two cells of same tables are known as
9593
Which character tells browser that it?s end of tag in HTML statement?
9594
A simply defined functions which can be called against any mouse or keyboard is known as
9595
<article> element defines a complete, self-contained block of related elements but <div> element defines?
9596
For arranging your list items in same way as they were arranged in dictionary which tag you will use?
9597
Syntax for unless conditional statement is unless conditional [then] code else code end
9598
User defined scalar function can return only __________ data type values
9599
A well-known helper plug-in for HTML is?
9600
Which of the following does not return a table variable?
9601
What is the output of the given code? a=10 b=2 if a>b a=a*b puts (a) elsif a<b a=a*a+b puts (a) else a=a-b puts (a) end
9602
An unordered list in HTML document starts with a
9603
Which of the following is not a User defined function?
9604
In HTML, hexadecimal values each color defines intensity between?
9605
How many types of user defined function is provided by SQL Server?
9606
What is the output of the given code? a=true b=false if a && b puts "False" elsif a || b puts "True" else puts "neither true nor false" end
9607
Syntax for creation of user defined function is ____________
9608
What is the output of the given code? x=7 y=9 if x==y print "equal" elsif x>y print "greater" else print "less" end
9609
In HTML5 how many new semantic elements were introduced?
9610
In 1989 Tim Berners-Lee invented WWW and in 1991 he invented?
9611
What is the output of the given code? variable = false if variable print "false" elsif !variable print "true" end
9612
What is the output of the given code? if !true print "False" elsif !true || true print "True" end
9613
What is output of the given code? counter=-3 if counter<=5 puts (counter) counter=counter+1 puts (counter) elsif counter>5 puts (counter) counter=2*counter puts(counter) end
9614
The benefit of using user-defined functions in SQL Server are ____________
9615
<b> and <i> tags in HTML document are used for?
9616
What is the output of the given code? counter=6 if counter<=5 puts (counter) counter=counter+1 puts (counter) elsif counter>5 puts (counter) counter=2*counter puts(counter) else puts(counter) counter=counter-1 puts(counter) end
9617
Which tag we can use for adding an emphasized text in web document?
9618
The elsif statement can add many alternatives to if/else statements.
9619
The elsif conditional statement is written with an expression.
9620
Why <hr> tag is used in HTML page?
9621
Which of the following is valid conditional statement in Ruby?
9622
To specify a hint that describes expected value of an input field which attribute is used?
9623
In image tag " alt " attribute specifies what?
9624
It is necessary that always if should come with else block?
9625
Function cannot be used for __________ statement
9626
What is the output of given code? #counter=1 if counter<=5 puts (counter) counter=counter+1 else puts(counter) counter=counter-1 end
9627
What is the output of given code? counter=1 if counter<=5 puts (counter) counter=counter+1 else puts(counter) counter=counter-1 end
9628
Which tag is used for creating a horizontal line to break up section in web document?
9629
Which of the following is valid conditional statement?
9630
What is the output of the code? variable="true".length if variable puts "true" else puts "false" end
9631
What is the output of the code? variable=true if !variable puts "true" else puts "false" end
9632
What is the output of the code? variable="true".reverse if variable puts "true" else puts "false" end
9633
What is the output of the code? variable=true if variable puts "true" else puts "false" end
9634
What is the output of the code? if 1>2 puts "false" end else puts "True" end
9635
For smallest size headings which tag you most prefer to use
9636
What is the output of the given code? if 1>2 puts "false" else puts "True"
9637
Is the following syntax correct? if conditional code... elsif conditional code.. else code end
9638
What is the use of else statement?
9639
User defined function in SQL Server can return ____________
9640
Nesting limit OF stored procedure is up to ________level.
9641
This <a href="url"> Your text </a> tag is used to define a
9642
Type of procedure that are based on the CLR (Common Language Runtime) is __________
9643
Extended procedures starts with the __________ prefix.
9644
System defined Procedure logically appear in ____________
9645
It’s a good habit to give two spaces between if statement and condition
9646
What is the output of the given code? x=1 if x > 2 puts "x is greater than 2" elsif x <= 2 and x!=0 puts "x is 1" else puts "I can't guess the number" end
9647
Which of the following stored procedure is already defined in Sql Server?
9648
If statement inside if statement is called Nested if statements.
9649
Which of the following procedures are created by user for own actions?
9650
What is the output of the given code? if 79>78 puts "True".upcase if 9>8 puts "True".Upcase if 7==7 puts "equal".downcase end end end
9651
How many types of stored procedures are present in SQL Server?
9652
What is the output of the given code? if 79>78 puts "True".upcase if 9>8 puts "True".reverse if 7==7 puts "equal".downcase end end end
9653
Stored procedure is a __________ set of one or more SQL stateme
9654
What is the output of the given code? if 11>2 puts "Eleven is greater than two" end print "You'r right"
9655
What is the output of the code? if 11<2 print "Eleven is less than two" end print "11 is greater"
9656
What is the output of the following? if 1<2 print "one is less than two" end
9657
What error does the if condition gives if not terminated with end statement?
9658
If expression. The expression can be of which type?
9659
The following syntax is correct for if conditional statement. if condition code end
9660
If you want to create your web layout faster, than which framework you would preferably use
9661
Space between 2+5 or 2 + 5 is valid but =begin and = begin is not valid.
9662
Which are commonly used methods for request and response between a client and server?
9663
Stored procedure used to remember the exact number of bytes is _____________
9664
What is the output of the given code? "Ruby Language".length = begin calculate length = end
9665
Using style sheets in head section of a web document is called
9666
What is the output of the given code? "Ruby Language".length =begin calculate length =end
9667
Why do we use =begin and =end?
9668
__________ is used to build the code dynamically and execute it.
9669
For converting Non-ASCII characters into format that can be transmitted over Internet is called?
9670
The following is the correct way to use multiline comment. = begin # comment = end
9671
____________ sets procedure options in SQL Server.
9672
The following syntax is used for multiline comment. =begin iam in a multi line comment =end
9673
Which of the following stored procedure is used for error messages?
9674
Which one is resolution independent?
9675
Server-Sent Events usually denoted as?
9676
his the right way to comment a single line. “Ruby”.length # I’m a single line comment!
9677
How to comment a single line?
9678
How to comment multiple lines in ruby?
9679
Which of the following type of comments are valid in ruby?
9680
Why do we use comments?
9681
What does %x!ls! represents?
9682
What does %Q{ Learn ruby language } represents?
9683
What does %{Learn ruby language} represents?
9684
What is the output of the given code? x, y, z = 12, 36, 72 puts "The value of x is #{ x }." puts "The sum of x and y is #{ x + y }." puts "The average was #{ (x + y + z)/3 }."
9685
In HTML tables table data or cell is defined by
9686
__________create the removable database.
9687
Mailto tag is used for
9688
What do we mean by expression substitution?
9689
What is the output of the given code? print "What's your first name?" first_name=gets.chomp a=first_name.capitalize a=a.reverse puts"My name is #{a}"
9690
Which tag provides data about page expiry, page author, list of keywords, page description etc.
9691
What is the output of the given code? print "what's your first name?" first_name=gets.chomp a=first_name.capitalize "a".reverse puts"My name is #{a}"
9692
What is the output of the given code? print "what's your first name?" first_name=gets.chomp a=first_name.capitalize "first_name.capitalize!".reverse puts"My name is #{first_name}"
9693
Which of the following has support for transaction?
9694
What is the output of the code? print "What's your first name?" first_name=gets.chomp a=first_name.capitalize first_name.capitalize! print "What's your last name?" last_name=gets.chomp b=last_name.capitalize last_name.capitalize puts "My name is #{first_name} #{last_name}"
9695
What is the output of the code? print "What's your first name?" first_name=gets.chomp a=first_name.capitalize first_name.capitalize! print "What's your last name?" last_name=gets.chomp b=last_name.capitalize last_name.capitalize! puts "My name is #{first_name} #{last_name}"
9696
HTML5.1 was released in
9697
_________ takes no parameters and returns all kinds of interesting information.
9698
Which tag is used for bigger headings in HTML document?
9699
HTML only uses
9700
Reasons for consideration of the stored procedure can be?
9701
<fieldset> element in HTML forms is used for
9702
"src" attribute for an image specifies what?
9703
HTML documents transmitted from web servers to web browsers using
9704
Nesting level of a stored procedure’s execution is stored in the _________ function.
9705
<input type="reset"> defines a
9706
Nesting level of stored procedure is applicable for ____________
9707
<head> element is a container for?
9708
_____________ procedure cannot be created in Resource database.
9709
Which of the following is an extended procedure?
9710
To display many types of map e.g. ROADMAP, SATELLITE, HYBRID, and TERRAIN which property of googlemap is used?
9711
_________ provides details on any database object.
9712
For specifying height and width of an image which attribute is used in image tag?
9713
All HTML documents must start with a
9714
Which of the following is a system procedure?
9715
There are how many ways to add CSS sheets in HTML elements?
9716
Data return using output parameter is ____________
9717
Ismap attribute makes a special image when user click somewhere on image
9718
Window.localStorage HTML object stores data with
9719
For using subscript in web document which tag is used?
9720
How many ways of returning data is present in SQL Server 2000?
9721
HTML is a set of
9722
Which style of CSS sheets are more preferable for applying a unique style in single web element?
9723
Which attribute is used to declare language in HTML document?
9724
Autofocus attribute is an example of
9725
For displaying contact information in web document or in article, we can use?
9726
In HTML, a color can be specified using a hexadecimal value in form of
9727
Default character set in HTML 5 is
9728
There are how many types of tag for HTML headings
9729
Which of the following is a global variable for error handling?
9730
ERROR_SEVERITY() returns the ________level of the error.
9731
There are how many ways to create multicolumn layouts in a web document?
9732
Which of the following is an Error function used within CATCH block?
9733
For defining a client-side script e.g. JavaScript which tag is used in HTML documents?
9734
Which attribute is used to add video controls like play, pause, and volume in Video
9735
When connection of a web page is opened to a server which event is invoked?
9736
In HTML web sockets are not available whereas in HTML5
9737
Exception handling is possible in SQL Server using _________
9738
Which from following is not a type of screen frames in HTML
9739
Which of the following benefit does Exception handling with the TRY and CATCH blocks provide?
9740
External style sheets are referred in web document through a
9741
Tags that are used to tell meaning of enclosed text (e.g. <strong> </strong> ) these type of tags are called
9742
Purpose of TRY…CATCH block in SQL Server is ___________
9743
For checking a regular expression in input fields of HTML forms which attribute is used?
9744
Which of the following statements can be checked for Errors?
9745
Web application that can store data within user's browser is called as?
9746
Which of the following blocks are used for error handling in SQL Server?
9747
A small piece of program that can add interactivity to your website is called as
9748
SQL Server static cursors are always ___________
9749
___________ cursor is sensitive to any changes to the data source.
9750
CSS padding property is used for?
9751
Which of the following FORWARD ONLY Cursor is populated at the time of creation?
9752
Which of the cursors further have their subtypes?
9753
What is the use of .capitalize method?
9754
A dynamic cursor in SQL Server allows you to see __________ data.
9755
The .upcase and .capitalize method are used for capitalizing the whole string.
9756
Methods should not be written inside double quotes.
9757
What will we the output of the given code? I'am Learning RUBY Language.downcase
9758
What will be the output of the given code? "Come let's learn.reverse Ruby.length language".upcase
9759
What is the output of given code? string="I'am Learning RUBY Language".downcase string.upcase
9760
What will we the output of the given code? "I'am Learning RUBY Language".downcase
9761
The downcase method changes the whole string to smallcase letters.
9762
What will be the output of the given code? "I'am learning Ruby Language".reverse.upcase.length
9763
What will be the output of the given code? "I'am learning Ruby Language".length.reverse.upcase
9764
What will be the output of the following? "Ruby".reverse.upcase
9765
What does the .upcase method do?
9766
What will be the output of the following? "Eric".irreverse
9767
Life cycle of typical cursor involves ______ steps in SQL Server.
9768
What is the output of the following?
9769
What is the output of the following? "Iam learning ruby language".length
9770
The .length method is used to check number of characters.
9771
What is the output of the given code? Ruby puts "#[Ans] is an oop language"
9772
@@LANGUAGE variable whose return type nvarchar is specified in _____________
9773
_________ gives amount of time, in ticks, that SQL Server has been idle since it was last started
9774
What is the output of the given code? Ans=Ruby puts "#{Ans} is an oop language" puts "It is very efficient langauge" puts "#{expr} is used on rails platform"
9775
If you want to use a background color for your entire webpage, which tag should you select in your CSS?
9776
What is the output of the the given code? puts "My name is #{Name}"
9777
Which of the following global has return type ‘numeric’?
9778
What is the output of the given code? print "What's your address" city,state,pin=gets.chomp,gets.chomp,gets.chomp puts "Iam from #{city} city, #{state} state, pincode: #{pin} "
9779
Where in an HTML document is the correct place to include CSS in your HTML?
9780
Point out the right statement.
9781
Which of the following is a global variable?
9782
Which HTML element defines the title of a document?
9783
Which of the following keyword is not associated with initialization of variable?
9784
first_name,Last_name=gets.chomp,gets.chomp is the correct way to get the input from the user.
9785
Why is gets not preferred instead of gets.chomp?
9786
Which sequence can be used to substitute the value of any ruby expression in a string?
9787
Variables was added newly to SQL Server version ____________
9788
Which of the following components constitutes use CASE expression?
9789
The BEGIN and END statements are used when ____________
9790
Which of the following scenario makes use of BEGIN..END keyword redundant?
9791
Which of the following is the valid string method?
9792
Which of the following two Transact-SQL statements are commonly used with WHILE?
9793
Which tag would you generally use to make a list of items that have no particular order (by default, will show up as a bullet list)?
9794
Which of the following is a control flow keyword?
9795
Which tag is used when creating a list with a specific order (by default, will show up as a numbered list)?
9796
Inline elements are normally displayed without starting a new line.
9797
Which of the following language is used for procedural flow in SQL Server?
9798
Which character is used to indicate an end tag?
9799
Which of the following statement decrypts a symmetric key?
9800
Purpose of CLOSE MASTER KEY is _______________
9801
Which of the following is- a security statement?
9802
Purpose of GET_TRANSMISSION_STATUS is _____________
9803
Which of the following Statement ends one side of an existing conversation?
9804
RECEIVE service broker statement applies to which of the versions?
9805
Which of the following is not a SERVICE BROKER statement?
9806
Applications that can generate Transact-SQL can be _________
9807
Which of the following is a proprietary extension of SQL for Microsoft SQL Server?
9808
Which of the following statement drops the synonym?
9809
DDL statements not used for Synonym is __________
9810
Purpose of ALTER CERTIFICATE is ______
9811
Creation of new database role in the current database is made by __________
9812
Command used to modify the schema is _______
9813
Statement used to remove a user from the current database is ____________
9814
Which of the following creates a new Microsoft Windows or SQL Server login account?
9815
Which is a new DDL statement?
9816
Which of the following adds MOVE TO clause?
9817
Point out the wrong statement with respect to ALTER INDEX statement.
9818
Which of the following index options are added by the CREATE INDEX statement?
9819
Which of the following statement modifies view index?
9820
If You Want To Change The Text Colour To Red Which Of The Following Tags Will You Use?
9821
When does most ALTER DATABASE statements fail?
9822
Which Of The Following Is A Declaration For An HTML Document?
9823
Maximum number of filegroups specified for each database is __________
9824
Command used to shrink the size of the database is _____________
9825
Which HTML Element Is Used To Define The Description Data?
9826
Features provided by ALTER DATABASE statement do not include ___________
9827
The DROP DATABASE statement must run in ________ mode.
9828
HTML Links Are Defined With <a> Tag And Address Is Specified By Attribute
9829
Which of the following database should be backed up regularly?
9830
. Intensity Of A Color Can Be Described Through
9831
Which Of The Following Attribute Triggers Event When An Element Gets User Input?
9832
HTML Tags Are Surrounded By Which Type Of Brackets.
9833
View used used for displaying current status of database is _______
9834
HTML Web Pages Can Be Read And Rendered By
9835
Syntax for dropping a database snapshot named “Sushant” would be ____________
9836
Which of the following statement is used to create database snapshot?
9837
What Tag Is Used To Display A Picture In A HTML Page?
9838
Which of the following statement removes sales and suppliers database?
9839
What Should Be The First Tag In Any HTML Document?
9840
Which is the minimal permission that a user must have to drop the database?
9841
How Can You Make A Bulleted List With Numbers?
9842
Who Is Known As The Father Of World Wide Web (WWW)?
9843
Apart From <b> Tag, What Other Tag Makes Text Bold ?
9844
Which of the following database cannot be dropped?
9845
Which Element Represents A Control For Generating A Public-private Key Pair?
9846
Which of the following statement removes database including its related components?
9847
Which Of The Following Element Marks The Ruby Text Component Of A Ruby Annotation?
9848
Which of the following item is provided by CREATE DATABASE statement?
9849
The __________ Element Represents A Span Of Text That Is Isolated From Its Surroundings For The Purposes Of Bidirectional Text Formatting
9850
What options did ALTER DATABASE statement add?
9851
All Elements Are Identified By Their __________ And Are Marked Up Using Either Start Tags And End Tags Or Self-closing Tags
9852
CONTAINS and CONTAINSTABLE look for a _______ match for the phrase.
9853
The CONTAINS and FREETEXT predicates return a _________ value.
9854
HTML Uses
9855
FREETEXTTABLE is a full text _____________
9856
Which of the following predicates is used for full text search?
9857
HTML Is What Type Of Language ?
9858
Full text indexing is a great feature that solves a database problem, the searching of _________ columns for specific words and phrases in SQL Server databases.
9859
Which Of The Following Encoding An XML Parser Assumes ?
9860
We can create a full-text index on _____________
9861
__________ Is The XML Equivalent To Strict HTML 4.01.
9862
Full-text search is an ________ component of the SQL Server Database Engine.
9863
Which Tag Is Used If You Want To Indicate The Importance Of The Phrase?
9864
Full-Text Search in SQL Server lets users and applications run _________ queries.
9865
Which Of The Following Adds Checkmark Icon Inside Input?
9866
Why do we use exist methods in Xquery?
9867
With XML DML, which of the operations can be performed on nodes?
9868
Which Of The Following Will Create Hamburger Menu?
9869
Atomization is process of extracting ________ value of an item.
9870
Functions on numerical values in Xquery are ___________
9871
. Which Of The Following Will Provide Additional Information About Something?
9872
Different types of errors raised during Xquery operation are _____________
9873
Every database you create has which collection by default?
9874
Which Of The Following Aligns Media Objects?
9875
What is every identifier in an XQuery called?
9876
Which html attribute is used to provide an advisory text about an element or Its contents.
9877
SQL Server provides how many Xquery methods?
9878
Which of the following function returns an instance of the XML data type?
9879
Which of the following function is contained by both full text search and Xquery?
9880
Following content of XML elements are indexed in full text?
9881
Sample applications to illustrate XML functionality in SQL Server are _____________
9882
Different xml modes available for xml clauses are __________
9883
Statement for dropping XML index is __________
9884
What is the purpose of the primary XML index?
9885
SQL Server lets you define how many types of secondary XML indexes?
9886
Which of the following indexes can be created on XML columns?
9887
Which of the following is not a xml data type method?
9888
Which Is Not A Property Of Attribute Behaviour Of <Marquee> Tag?
9889
SQL Server 2008 has made several extensions to the XML Schema support which includes?
9890
Can we use untyped XML data type in the following situations?
9891
Which operation cannot be performed on XML schema collection?
9892
Which of the following statement would import additional schema or schema components into an existing collection object?
9893
Contents of sys.xml_schema_collections are ________
9894
The space use of XML indexes can be found in the table-valued function named?
9895
What is index type for XML index entries?
9896
Which of the following following is used for retrieving XML Schema Collections?
9897
The BODY Tag Is Usually Used After
9898
What are Catalog Views for XML?
9899
Which of the following feature of SQL Server was used before XML technology for semi structured data?
9900
HTML Is A Subset Of
9901
XML datatype was introduced in which of the following versions of SQL Server?
9902
Which of the following part of the XML data stored in an XML column is very important for locking?
9903
Reasons to use native XML features in SQL Server instead of managing your XML data in the file system would be:
9904
What is the hybrid model in SQL Server?
9905
XML View Technology is useful in the following situations?
9906
In which of the following scenario, using XML native storage would be inappropriate?
9907
The choice of XML technology, native XML versus XML view, generally depends upon the following factors?
9908
Which of the following is not a XML storage option?
9909
Which of the reasons will force you to use XML data model in SQL Server?
9910
Which of the code deletes node H using hierarchical data type?
9911
Which of the constraint can be enforced one per table?
9912
How many types of constraints are present in SQL Server?
9913
Which of the following foreign key constraint specifies that the deletion fails with an error?
9914
Which of the following is not a foreign key constraint?
9915
Purpose of foreign key constraint in SQL Server is __________
9916
Constraints can be applied on ___________
9917
Which of the following constraint does not enforce uniqueness?
9918
Which of the following is not a class of constraint in SQL Server?
9919
Which of the following statement is true?
9920
The UNION SQL clause can be used with ____________
9921
Which is the duplication of computer operations and routine backups to combat any unforeseen problems?
9922
Aggregate functions can be used in the select list or the_______clause of a select statement or subquery. They cannot be used in a ______ clause.
9923
The command ________________ such tables are available only within the transaction executing the query, and are dropped when the transaction finishes.
9924
Which of the following is an aggregate function?
9925
The EXISTS keyword will be true if _________
9926
To alter a database ___________ command is used.
9927
_____________ joins are SQL server default.
9928
Which is a duplicate copy of a file program that is stored on a different storage media than the original location?
9929
The ________________ is essentially used to search for patterns in target string.
9930
To delete a database ___________ command is used.
9931
Insert into employee _________ (1002,Joey,2000); In the given query which of the keyword has to be inserted?
9932
Select * from employee where salary>10000 and dept_id=101; Which of the following fields are displayed as output?
9933
Select * from student join takes using (ID); The above query is equivalent to ____________
9934
Select ID, name, dept name, salary * 1.1 where instructor; The query given below will not give an error. Which one of the following has to be replaced to get the desired output?
9935
Select ________ dept_name from instructor; Here which of the following displays the unique values of the column?
9936
Which server can join the indexes when only multiple indexes combined can cover the query?
9937
Which of the following is not the function of client?
9938
Select ID, GPA from student grades order by GPA ____________ Inorder to give only 10 rank on the whole we should use.
9939
The ________ connective tests for set membership, where the set is a collection of values produced by a select clause. The _________ connective tests for the absence of set membership.
9940
Select __________ from instructor where dept name= ’Comp. Sci.’; Which of the following should be used to find the mean of the salary?
9941
Which of the following function is used when you want all tied rows to have the same ranking?
9942
Which of the following functions are similar?
9943
Which of the following error message will be displayed if ORDER CLAUSE is not mentioned in ROW NUMBER function?
9944
Which of the following will not raise error if not used?
9945
Which of the function provides consecutive numbering except in the case of a tie?
9946
Which of the clause is not mandatory?
9947
Which of the following is the simplest ranking function?
9948
Which of the following is not a ranking function?
9949
LAST_VALUE comes in the category of _____________
9950
Which of the following function is an analytic window function?
9951
How many types of window functions are present in SQL Server?
9952
Which of the following is not a type of window function?
9953
Which of the function is not a ranking window function?
9954
Point out the wrong statement related to window function.
9955
Which is the most important benefit of window function?
9956
Windowing function was added in which of the following versions of SQL Server?
9957
Which of the following is a set function?
9958
You can create an ABAP program that only contain subroutines?
9959
Which of the following T-code is used search the fields ABAP table?
9960
Which of the following can be used to format the ABAP code written in editor?
9961
ABAP contains a series of statements that allow you to leave an event block. Which of the below is specifically used to leave a GET event block?
9962
Dialog programs are of which of program type?
9963
Which of the below Object type contain the data with which programs work at run time?
9964
Which of the below programs are directly executable and also known as Report?
9965
What is the transaction code to open ABAP editor to create or change ABAP program?
9966
In ABAP editor, which of the following object shows current name of application/business?
9967
Code for creating an HTML report that lists the name of each service along with its status is __________
9968
Unrestricted execution policy can be set up in SQL Server can be done using _______
9969
Syntax for viewing the methods and properties we can pipe our output to Get-Member by ______________
9970
___________ convert object properties into CSV objects.
9971
Which of the following command is used to get child items in powershell?
9972
Which Of The Following Is For Title Of The Modal?
9973
Which Of The Following Will Create Hamburger Menu?
9974
Which Of The Following Will Provide Additional Information About Something?
9975
Which Of The Following Aligns Media Objects?
9976
Which Of the following class centers tabs/pills?
9977
We can test for the nonexistence of tuples in a subquery by using the __________ construct.
9978
Which html attribute is used to provide an advisory text about an element or Its contents.
9979
The phrase “greater than at least one” is represented in SQL by ___________
9980
Which attribute sets the text direction as related to lang attribute.
9981
Which tag is used to create a checkbox in HTML?
9982
A Boolean data type that can take values true, false, and ____________
9983
Which HTML Tag Is ssed to define A Client - Side Script Such as The Javascript?
9984
A Simple Text File Which Tells The Browser What To Cache Is Known As A ________.
9985
Which Is Not A Property Of Attribute Behaviour Of <Marquee> Tag?
9986
A Much Better Approach To Establish The Base URL Is To Use The ______ Element.
9987
All aggregate functions except __________ ignore null values in their input collection.
9988
To Start A List Using Circles, Use
9989
If we do want to eliminate duplicates, we use the keyword __________in the aggregate expression.
9990
Gif And Jpg Are The Two Main Types Of What ?
9991
Choose The Correct HTML Tag To Make A Text Italic
9992
The BODY Tag Is Usually Used After
9993
Aggregate functions are functions that take a ___________ as input and return a single value.
9994
ALL HTML Tags Are Must Be Enclosed In?
9995
HTML Is A Subset Of
9996
___________ is stored only in the Master database.
9997
Which of following is not an attribute of <form> tag
9998
Which of the following is not a SQL Server INFORMATION_SCHEMA view?
9999
What is SCHEMABINDING a VIEW?
10000
Which Of The Following Selector Selects An Element If It's The Only Child Of Its Parent?
10001
You can delete a view with ___________ command.
10002
Which Of The Following Selector Selects An Element That Has No Children?
10003
Syntax for creating views is __________
10004
Dynamic Management View is a type of _________
10005
Which Of The Following Selector Selects The Elements That Are Checked?
10006
SQL Server has mainly how many types of views?
10007
Which Of The Following Selector Selects All Elements Of E That Have The Attribute Attr That End With The Given Value?
10008
Which CSS Property Is Used To Control The Text Size Of An Element ?
10009
Which of the following is not a limitation of view?
10010
What is a view?
10011
Which is not a type of join in T-SQL?
10012
When We Write <img Src="img.png">, What "img.png" Inside Double Quote Implies?
10013
What Should Be The Table Width, So That The Width Of A Table Adjust To The Current Width Of The Browser Window?
10014
How many tables may be included with a join?
10015
Which Of The Following Properties Will We Use To Display Border Around A Cell Without Any Content ?
10016
Which of the following is a correlated subquery?
10017
If We Want Define Style For An Unique Element, Then Which Css Selector Will We Use ?
10018
Which of the following statements is true concerning subqueries?
10019
A UNION query is which of the following?
10020
Which CSS Property Sets A Background Image For An Element?
10021
Which of the following is one of the basic approaches for joining tables?
10022
Which CSS Property Is Used For Controlling The Layout?
10023
What type of join is needed when you wish to return rows that do have matching values?
10024
What type of join is needed when you wish to include rows that do not have matching values?
10025
Which Is The Correct CSS Syntax?
10026
The command to remove rows from a table ‘CUSTOMER’ is ________________
10027
Pseudo-classes In CSS
10028
Find all the cities with temperature, condition and humidity whose humidity is in the range of 63 to 79.
10029
Find all the tuples having a temperature greater than ‘Paris’.
10030
Find the name of those cities with temperature and condition whose condition is either sunny or cloudy but temperature must be greater than 70.
10031
The Default Value Of "position" Attribute Is
10032
Find the names of these cities with temperature and condition whose condition is neither sunny nor cloudy.
10033
What is the meaning of LIKE ‘%0%0%’?
10034
SQL query to find the temperature in increasing order of all cities.
10035
SQL query to find all the cities whose humidity is 95
10036
Which TCL command undo all the updates performed by the SQL in the transaction?
10037
Which of the following command makes the updates performed by the transaction permanent in the database?
10038
How can you change “Hansen” into “Nilsen” in the “LastName” column in the Persons table?
10039
Which SQL keyword is used to sort the result-set?
10040
Which SQL statement is used to return only different values?
10041
The UNION SQL clause can be used with _____________
10042
The UPDATE SQL clause can _____________
10043
Where in an HTML document is the correct place to refer to an external style sheet?
10044
What does the ALTER TABLE clause do?
10045
How do you make a list that lists its items with squares?
10046
With SQL, how can you return the number of not null records in the “Persons” table?
10047
With SQL, how can you return all the records from a table named “Persons” sorted descending by “FirstName”?
10048
To define the space between the element's border and content, you use the padding property, you are allowed to use negative values?
10049
How do you change the left margin of an element?
10050
With SQL, how do you select all the records from a table named “Persons” where the value of the column “FirstName” ends with an “a”?
10051
How do you change the font of an element?
10052
What does DML stand for?
10053
Which CSS property controls the text size?
10054
What is the purpose of the SQL AS clause?
10055
How do you change the text color of an element?
10056
Which of the following statement is true?
10057
If you don’t specify ASC or DESC after a SQL ORDER BY clause, the following is used by default ______________
10058
How do you add a background color for all elements?
10059
________________ is not a category of SQL command.
10060
Which of the following are TCL commands?
10061
Which of the following is not a DDL command?
10062
___________removes all rows from a table without logging the individual row deletions.
10063
Which of the following SQL clauses is used to DELETE tuples from a database table?
10064
Which SQL keyword is used to retrieve a maximum value?
10065
Which SQL function is used to count the number of rows in a SQL query?
10066
Built in Functions in SQL Server is categorized into how many categories?
10067
______________ returns the rank of rows within the partition of a result set, without any gaps in the ranking
10068
Which of the following is not a conversion function?
10069
Text and Image Functions are ______
10070
DecryptByKeyAutoCert is ________________ type function.
10071
_________ are used for supporting encryption, decryption, digital signing and their validation.
10072
@@NESTLEVEL function falls under which of the following category?
10073
Which of the following is not a mathematical function?
10074
Which of the following function checks whether the expression is a valid date or not?
10075
______________ function returns current date and time.
10076
Which of the data type has a storage size of 8 bytes?
10077
______________ is monetary data type in SQL Server.
10078
Which of the following data type is not present in SQL Server?
10079
________ is a spatial data type.
10080
You want to track date and time of the last write access per row?
10081
A column of type __________ may contain rows of different data types.
10082
ntext data type falls under which category?
10083
Exact Numeric data type is ___________
10084
Data types in SQL Server are organized into how many categories?
10085
Which of the following is a large object data type?
10086
___________ is schematic drawing used for representing relationships in database.
10087
Which of the following is used to build sql statements without writing code?
10088
Which menu is used to restore windows to their original locations?
10089
Ctrl+K+K shortcut refers to _________
10090
Which of the following pane option is not provided by Query Designer?
10091
Which of the following tool is used for designing schema of the database in SSMS?
10092
___________ is not available on standard toolbar.
10093
Template Explorer is used to manage __________
10094
_________ is free database software running free SQL Server technology.
10095
Which of the following companies originally worked together to create and market the first version of SQL Server?
10096
Which property is used to change the background color?
10097
How do you insert a comment in a CSS file?
10098
Which is the correct CSS syntax?
10099
What is the correct HTML for referring to an external style sheet?
10100
Activating a lock object automatically creates function modules for setting the lock and releasing lock?
10101
What does CSS stand for?
10102
Maximum of How many key fields per table is allowed?
10103
What table is used to store the control records for IDOC?
10104
Which type pool is used for ALV Type-pools?
10105
What is the Purpose of REUSE_ALV_COMMENTARY_WRITE Function Module?
10106
Which is the mandatory to input field for Dialogue Programming / Module Pool design?
10107
The is doctype mandatory.
10108
Types of Windows in SAP SCRIPTS?
10109
What is the correct CSS syntax for making all the elements bold?
10110
T-Code for BDC's Session process?
10111
What is the name of every homepage on the WWW?
10112
How can you make a list that lists the items without bullets or numbers?
10113
What is the correct HTML for inserting an image?
10114
Which of the following functional Modules are optional For SAPScript?
10115
How can you make a list that lists the items with bullets?
10116
How to Declare the Static Variables in OOABAP?
10117
How can you make a list that lists the items with numbers?
10118
To insert the data for ONE transaction (BDC_INSERT) into a session. To transfer the data, you require an internal table (BDC table). You must specify the following parameters:
10119
How can you open a link in a new browser window?
10120
T-Code for uploading the ALV LOGO?
10121
How can you create an e-mail link?
10122
Which one of the. following statements creates a GUI-status in a dialog program?
10123
The screen flow logic must contain at least the two statements in the correct order
10124
What is the correct HTML for creating a hyperlink?
10125
T-Code for Remote Function Call (RFC) is the standard SAP interface for communication between SAP systems?
10126
Choose the correct HTML tag to make a text italic
10127
Choose the correct HTML tag to make a text bold
10128
Which Function Modules is Used In Hierarchical ALV Report Display?
10129
Syntax for BDCDATA Structure to declare in the Program?
10130
What is the correct HTML tag for inserting a line break?
10131
Choose the correct HTML tag for the largest heading
10132
Who is making the Web standards?
10133
What does HTML stand for?
10134
Call Transaction syntax?
10135
Select the correct HTML for creating a hyperlink?
10136
Which of the Following Fields are NOT for BDCDATA Structure?
10137
In CSS, what is the correct option to select only the paragraphs with class name “warning”? <p class=”warning”>Don’t do it.</p> <p>Do it.</p> <p class=”warning”>Nooo, don’t do it.</p>
10138
What is the system field for the current date for scripts
10139
In CSS,select the property used to set the background color of an image?
10140
In CSS, Select the property to set an image in a list instead of a standard bullet?
10141
For users that use the tab key to navigate websites, what property represents this way of moving from one element to another?
10142
Select the property that is used to change the list style to show roman numerals instead of normal numbers?
10143
In CSS,Select the property used to set the spacing in between lines of text?
10144
Select the option to make a list that lists the items with bullets?
10145
Select the correct option to create an e-mail link?
10146
In CSS, choose the correct option to select this image by its id? <img id=”mainpic” src=”cat.png”>
10147
Select the correct option to open a link in a new browser window?
10148
Select the option to make a list that lists the items with numbers?
10149
Select the correct HTML tag to make a text italic?
10150
Select the appropriate HTML tag used for the largest heading?
10151
Select the property used to create space between the element’s border and inner content?
10152
In CSS, Select the appropriate option to style an element so that the next element would appear right next to it not underneath it if both elements widths were collectively smaller than the container element?
10153
Select the correct HTML tag to make a text bold.
10154
Select the property that is used to create spacing between HTML elements?
10155
In CSS, what is the correct option to select all the tags on a page?
10156
What is the output of given code? puts "what is your first name?" name=gets.chomp puts "what is your surname?" surname=gets.chomp
10157
We use semicolon or parentheses after every print or puts statement.
10158
For getting an input from the user which method is used?
10159
What is the output of the given code? print "Hey" puts "Everyone!" print "We are learning Ruby"
10160
Why is the library function ‘puts’used for?
10161
Which of the following is not a valid library function?
10162
What is the range of octal notation (\nnn)?
10163
Which of the following is not a valid datatype?
10164
What is the output of the given code? my_string=Ruby puts(my_string)
10165
What is the sequence of ruby strings?
10166
What does the notataion \b stands for?
10167
Objects of which class does the integer from the range -2^30 to 2^(30-1) belong to?
10168
What is the output of the given code?
10169
Ruby can deal with both numbers and floating point values.
10170
Ruby is a case-sensitive language.
10171
What is the size of an integer data type in ruby?
10172
What will any variable evaluate to if it is of Boolean data type?
10173
Which of the following datatypes are valid in Ruby?
10174
Ruby can be used for developing internet and intranet applications.
10175
It is must for Ruby to use a compiler.
10176
Next Page » Ruby Questions and Answers – Basics This set of Ruby Programming Multiple Choice Questions & Answers (MCQs) focuses on “Basics”. 1. Ruby is an object oriented general purpose programming language. a) True b) False View Answer Answer: a Explanation: Ruby allow users to manipulate data structures called objects to build and execute programs. advertisement 2. Which of the following is supported by Ruby? a) Multiple Programming Paradigms b) Dynamic Type System c) Automatic Memory Management d) All of the Mentioned View Answer Answer: d Explanation: Ruby supports all the features because it is a object oriented programming language. 3. Which of the following features does the 2.0 version of ruby supports? a) Method keyword arguments b) New literals c) Security fixes d) All of the mentioned View Answer Answer: d Explanation: Ruby2.0 has several new added features and it is much stable than its older versions. 4. Which of the following languages syntax matches with the Ruby’s syntax? a) Perl b) PHP c) Java d) Jquery View Answer Answer: a Explanation: Most of the syntax of perl language matches with that of Ruby’s. advertisement 5. What is the extension used for saving the ruby file? a) .ruby extension b) .rb extension c) .rrb extension d) None of the mentioned View Answer Answer: b Explanation: Ruby files must be saved with the extension .rb. 6. Which of the following are valid floating point literal? a) .5 b) 2 c) 0.5 d) None of the mentioned View Answer Answer: c Explanation: floating point literals are valid only when they have digits on both the sides of decimal point. 7.
10177
What is the extension used for saving the ruby file?
10178
Which of the following languages syntax matches with the Ruby’s syntax?
10179
Which of the following features does the 2.0 version of ruby supports?
10180
Ruby is an object oriented general purpose programming language.
10181
What will be the output of the following? "Eric".irreverse
10182
Which sequence can be used to substitute the value of any ruby expression in a string
10183
What is the output of the given code? print "Hey" puts "Everyone!" print "We are learning Ruby"
10184
What is the role of ! at the end of the capitalize method?
10185
What is the output of the given code? boolean_1 = 77 less than 78 puts(boolean_1)
10186
Why can not we use quotation marks (‘ or “) with boolean?
10187
Why do we use =begin and =end?
10188
What is the output of the given code? “Ruby”.length #to find the length of given string
10189
Which of the following are valid floating point literal?
10190
Which of the following is supported by Ruby?
10191
Ruby on Rails was used to build user's interface of
10192
A web application development framework written in Ruby language is
10193
Programming language which is an open-source, object oriented programming language with simple syntax similar to Perl and Python is
10194
Ruby was developed in mid
10195
Selenium script can only be written in Java programming Language. True or false?
10196
Which Interface is used to execute JavaScript in Selenium WebDriver Script?
10197
What is return type getWindowHandles method?
10198
What is return type getWindowHandle method?
10199
What is return type findElements method?
10200
What is return type findElement method?
10201
switchTo command is used to switch to?
10202
List and Set Interface is present in which package?
10203
Which method is used to select an item from dropdown in Select class?
10204
In Alert Interface which method is not available?
10205
Which method is used to work with multiple browser windows?
10206
Which method is used to retrieve any attribute value inside any HTML tags?
10207
Which method is used to retrieve the contents inside any HTML tags?
10208
Which method is present in Action Interface?
10209
What arguments accept by until method of WebDriverWait and FluentWait classes?
10210
Which methods is not present in Navigation Interface?
10211
Which method is Overloaded method Selenium WebDriver?
10212
Which method is used to find an Object uniquely on any web Page?
10213
Which is a Class?
10214
Which is used for writing Selenium 3.0 Script?
10215
Which of the following WebDriver methods is used to clear all selected entries?
10216
Which of the following statements won’t hold true for Selenium 3.0?
10217
What are the different navigation methods of WebDriver?
10218
What type of Wait objects keep alive until the WebDriver object dies?
10219
What are the types of exceptions thrown in web driver?
10220
What is the similarity between WebDriver’s close() and quit() methods?
10221
Which one is not the WebDriver’s expected condition?
10222
Which one is not the correct type of locater?
10223
WebDriver’s Actions commands are <… complete the sentence … >?
10224
Which of the following commands is used to print a string value or a variable in Selenium IDE?
10225
Which of the following WebDriver methods is used to select the option at a given index?
10226
Which of the following are the major changes that Selenium 3.0 brought in?
10227
Which of the following exceptions is not an ideal candidate to ignore via FluentWait?
10228
Which of the following languages is supported by The Selenium Web Driver?
10229
Which of the following parameters is not required to initialize Fluent wait?
10230
Which of the following WebDriver commands is used to check the presence of a web element?
10231
The Selenium RC is used <… complete the sentence …>?
10232
Which type of exception is handled during compile time?
10233
What can be used to test Flex/Flash applications using Selenium?
10234
Which of the following components is not the part of Selenium suite?
10235
What are the WebDriver methods to manage web-based alerts?
10236
Which of the following commands is not a type of assertion in Selenium IDE?
10237
Which of the following OS is not supported by Selenium IDE?
10238
Which of the following features does Selenium IDE support?
10239
Which of the following steps is not mandatory to launch Firefox in Selenium 3?
10240
Selenium supports ____________Testing Level
10241
______________ is not a Test Management Tool?
10242
______________ is not a Mobile Test Tool?
10243
______________ is not a Bug Tracking Tool?
10244
______________ is not a Performance Test Tool?
10245
______________ is not for Functional Test Automation?
10246
___________ is the built-in feature of Mozilla Firefox Browser to inspect elements?
10247
Selenium WebDriver doesn’t support_______
10248
Selenium IDE doesn’t support_______
10249
Selenium supports Computer Web Applications and _____________
10250
__________ is a Disadvantage of Selenium WebDriver?
10251
__________ is an Advantage of Selenium WebDriver?
10252
_________ is the use of Firebug in Selenium?
10253
What is Jenkins?
10254
Selenium IDE supports__________Browser only to create and execute Test Cases.
10255
_________ supports Parallel Test Execution
10256
What is Maven?
10257
________ doesn’t support programming.
10258
__________ doesn’t support Test design (Creating test Cases)
10259
_______ is not a Selenium Component.
10260
Selenium doesn’t support __________ to write programs (Test Scripts)
10261
What does the assertTitle checks ?
10262
What is a test suite made of ?
10263
Which label is used as prefix pattern to specify a globbing pattern parameter for a Selenese command ?
10264
What does the term regex expands to ?
10265
What does the term DOM refers to ?
10266
Where is XPath used in ?
10267
What is called that scale for large test suites or test suites that must be run in multiple environments?
10268
What is Selenium IDE ?
10269
What does the term CSS refers to ?
10270
Which selenium command check whether specific text exists somewhere on the page ?
10271
Selenium variables are stored in _____________.
10272
Method which selects the option which displays the text matching the parameter passed to it
10273
Select the method which clears all selected entries in Web driver Selenium
10274
Which method is used when you want to verify whether a certain check box, radio button, or option in a drop-down box is selected in Web driver Selenium
10275
Which is a faster component between the SeleniumWeb driver and Selenium RC?
10276
Select the variation which finds elements based on the driver’s underlying CSS selector engine in Web driver Selenium.
10277
Select the syntax to locate an element using inner text.
10278
Select the command which is used to pause execution until the page is loaded completely.
10279
Select the command that will NOT wait for a new page to load before moving onto the next command.
10280
Select the command which is used to compare the contents of a table with expected values.
10281
. Which component of Selenium can create customized test results.
10282
Select the command which is used to check the presence of a certain element.
10283
In case of Selenium IDE, the Source view shows your script in
10284
Select the language which is supported by The Selenium Web Driver
10285
Which command can be used to enter values onto text boxes?
10286
Can Unix operating system be supported by Selenium IDE?
10287
The Selenium
10288
Out of the following which can only test web applications
10289
The Selenium IDE is used
10290
Select the operating system which is NOT supported by Selenium IDE.
10291
Select the name which is NOT the type of the locaters.
10292
Select the language which is NOT supported by the Selenium RC.
10293
Select the component which is NOT part of Selenium suite.
10294
echo(): is used
10295
Selects all the parent, grandparent, and so on of the element is related to which axis name in Selenium:
10296
In selenium, parent and child nodes are in the same query because HTML has a tree structure.
10297
Which two commands you use to validate a button?
10298
What is the default port number used by a hub in selenium?
10299
To delete a cookie we need to call the deleteCookie method, passing in two parameters.
10300
If you wanted to access the element that has the text “This element has an ID that changes every time the page is loaded” in it, then which of the following is used:
10301
Which of the following is not verify and asserts method in Selenium?
10302
Which process uses the JavaScript to find an element?
10303
Which is not true in case of Globs, in Selenium?
10304
Applications do not have the items needed for the tests when the tests get to commands. To get around this, we had a look at adding for waitFor commands to test. This is related to
10305
We use the dot (.) operator followed by either a * or a +. The + tells the regular expression that there will be instances between “0” and “n”, while the * tells the regular expression that there will be instances between “1” and “n”.
10306
Variable can be saved in which format?
10307
Which is a procedure?
10308
Which regular expression sequence that loosely translates to “anything or nothing?”
10309
In regular Expression * quantifier refers to:
10310
The // tells the query that
10311
In Selenium, Following Axis is related to:
10312
___________ finds the item ending with the value passed in. This is the equivalent to the XPath ends-with. Is concern with?
10313
Which command is used to extend the time limit of WAITFOR command?
10314
Which is the odd one out?
10315
How to execute a specific command?
10316
Which is the following is true in case of waitFor command?
10317
Which command should be used to confirm that test will pass in the future when a new element is added after page loaded?
10318
In Selenium variables are stored in _________ .
10319
Selenium is compatible with
10320
By Default time of WAITFOR command is :
10321
Select the method which performs a context-click at the current mouse location.
10322
Select the command which retrieves the alert message and stores it in a variable that you will specify.
10323
Out of the following which is NOT a wait command.
10324
Method which selects the option which displays the text matching the parameter passed to it
10325
Select the method which clears all selected entries in Web driver Selenium.
10326
Select the View which shows your script in HTML format.
10327
Which Component is used to run multiple tests simultaneously in different browsers and platforms?
10328
Which method is used when you want to verify whether a certain checkbox, radio button, or option in a drop-down box is selected in Web driver Selenium
10329
Which Navigate command takes you forward by one page on the browser’s history in Web driver Selenium.
10330
Select the Get command which fetches the inner text of the element that you specify in Web driver Selenium.
10331
Select the variation which locates elements by the value of their “id” attribute in Web Driver Selenium
10332
Which is a faster component between the selenium web driver and Selenium RC?
10333
Select the tab that shows which command Selenium IDE is currently executing.
10334
Select the variation which locates elements by the value of the “name” attribute in Web driver Selenium
10335
Select the variation which finds elements based on the driver’s underlying CSS selector engine in Web driver Selenium.
10336
What is TestNG?
10337
Select the tab which gives feedback and other useful information when executing tests.
10338
Select the command which is NOT used in verifying page elements.
10339
Select the command which is used to compare the actual page title with an expected value.
10340
Select the syntax to locate an element using inner text.
10341
Select the command which is used to pause execution until the page is loaded completely.
10342
Select the command that will NOT wait for a new page to load before moving onto the next command.
10343
Select the command which is used to pause execution until the specified element becomes present.
10344
Select the command which is used to compare the contents of a table with expected values.
10345
Which component of Selenium can create customized test results?
10346
Select the command which is used to print a string value or a variable in Selenium IDE.
10347
Select the command which is used to check the presence of a certain element
10348
In the case of Selenium IDE, the Source view shows your script in
10349
Select the command in Selenium IDE used to open a page using the URL.
10350
The Actions commands
10351
Which Selenium component supports All Operating System?
10352
Can the Unix operating system be supported by Selenium IDE?
10353
Can Google chrome be supported by Selenium IDE?
10354
Select the language which is supported by The Selenium Web Driver
10355
Which command can be used to enter values into text boxes?
10356
The Selenium
10357
Select the method which selects the option at the given index.
10358
Select the command which is NOT a type of assertion in Selenium IDE.
10359
The Selenium can
10360
Out of the following which can only test web application
10361
The Selenium RC is used
10362
The Selenium IDE is used
10363
The Web driver is used
10364
Select the operating system which is NOT supported by Selenium IDE.
10365
Select the Browser which is supported by Selenium IDE
10366
Selenium IDE stands for
10367
Is Web Driver a component of the Selenium?
10368
Select the name which is NOT the type of the locators.
10369
Select the language which is NOT supported by the Selenium RC.
10370
Select the component which is NOT part of the Selenium suite.
10371
What does the assertTitle checks?
10372
What is a test suite made of?
10373
Which label is used as a prefix pattern to specify a globbing pattern parameter for a Selenese command?
10374
What does the term regex expand to?
10375
What does the term DOM refer to?
10376
Where is XPath used in?
10377
What is called that scale for large test suites or test suites that must be run in multiple environments?
10378
What is Selenium IDE?
10379
What does the term CSS refer to?
10380
Which selenium command check whether specific text exists somewhere on the page?
10381
Selenium variables are stored in _____________.
10382
Selenium tests _____________.
10383
The term JSON refers to ______________.
10384
The term AJAX expands to ________.
10385
The test language usually used in Selenium is ________________.
10386
What is the command to load a page?
10387
Which command is used for typing in a textbox?
10388
Which command is used for verifying if a web element exists?
10389
Which command is used to get the alert box?
10390
Which Selenium command do you use to run commands in slow motion in Selenium RC?
10391
How do you start selenium rc server with user extensions?
10392
How many parameters does the Selenium object take when using DefaultSelenium?
10393
Do you need to have Selenium .jar files as a dependency of your tests?
10394
How do you start the browser?
10395
What are the different modes that Selenium uses?
10396
Which of the following statements is correct for a Test Suite?
10397
What is data parameterization?
10398
What happens when the application creates a JavaScript alert during test case play?
10399
What is the best way to handle asynchronous data retrieval from the server as in AJAX applications?
10400
Which of the following is an incorrect target for pattern matching as in verifyTextPresent command?
10401
Why are relative XPaths preferred over absolute XPaths as locators?
10402
Which add-on is commonly used with Selenium IDE to identify individual elements on a web page?
10403
Which one of the following statements is incorrect?
10404
What is the purpose of the Find button?
10405
What URLs does the Selenium open command allow?
10406
Where can you create your own Selenium commands?
10407
In which associative array does Selenium store all of a test case's variables and their respective values?
10408
What is the difference between assert and verify commands?
10409
What is the correct syntax to access the value of a Selenium variable called name?
10410
What is the difference between a command and the same command with "AndWait" (e.g. click and clickAndWait commands)?
10411
5. What is the Selenium print command?
10412
What features are available in Selenium IDE to debug an automated test case?
10413
By default, in which format does the Selenium IDE save a test case?
10414
A Selenium IDE test case has three columns, Command, Target and Value. What data is stored in the Target column?
10415
What kind of application is the Selenium IDE?
10416
Which is not true in case of Globs, in Selenium?
10417
Which is not the advantage of Selenium IDE?
10418
Which of the following is false in case of waitFor command?
10419
Which regular expression sequence loosely translates to "anything or nothing?"
10420
In Selenium variables are stored in _____________ .
10421
In selenium, parent and child nodes are in same query because HTML has a tree structure.````````
10422
Which is the odd one out?
10423
Which Command is used to extend the time limit of WAITFOR Command?
10424
Variable can be saved in which format?
10425
Selenium is compatible with _______ .
10426
Which two commands you can use to validate a button?
10427
What is the default port number used by hub in Selenium?
10428
If you wanted to access the element that has the text "This element has an ID that changes every time the page is loaded" in it, then which of the following is used?
10429
Which process will be used in JavaScript to find an element?
10430
We use the dot (.) operator followed by either a * or a +. The + tells the regular expression that there will be instances between "0" and "n", while the * tells the regular expression that there will be instances between "1" and "n".
10431
Which of the following is not a verify and asserts method in Selenium?
10432
Which axis name in Selenium is related to the selection of all the parent, grandparent and so on?
10433
During which phase is the Entry Criteria determined?
10434
Which command should be used to confirm that the test will pass in the future when the new element is added after the page is loaded?
10435
What is the most common way to find an element on a page?
10436
Applications do not have the items needed for the tests when the tests get to commands. To get around this, we had a look at adding for 'waitFor' commands to test. This is related to while ___________.
10437
Which is a Procedure?
10438
To delete a cookie we need to call the deleteCookie method and we are passing in two parameters, what are those parameters?
10439
By Default time of WAITFOR command is ______.
10440
The ' // ' tells the query that ___________.
10441
How to execute specific command?
10442
What is the best element locator in selenium webdriver?
10443
Selenium method to get content which is inside any HTML tags?
10444
Which one is a class in Selenium ?
10445
Which of the following method is used to work with multiple browser windows?
10446
Which of the following language is not supported by Selenium
10447
Selenium command for entering text into text boxes?
10448
Which of the following is not a wait command in Selenium?
10449
Select the odd one using in Selenium
10450
Which of the following expression is used for "anything"?
10451
What versions of Internet Explorer does WebDriver support?
10452
Will a findElements type call throw a NoSuchElementException when it can't find the element?
10453
What is the best call for finding multiple elements using XPath?
10454
Which of the following attribute triggers event when the window gets focus?
10455
Pick two from the following if you wanted do a partial match on an attribute on an element from the beginning of the value:
10456
What is the most common way to find an element on a page?
10457
If an element got added after the page has loaded what command would you use to make sure the test passed in the future?
10458
If you want to validate that a button has appeared on a page, which two commands would be the best two to use?
10459
Which of the following attribute triggers events when a form gets user input?
10460
Which of the following attribute triggers events when the document has change?
10461
Which of the following attribute triggers event when an element gets user input?
10462
Which of the following attribute triggers event when an element is invalid?
10463
Which of the following attribute triggers event when media data is loaded?
10464
Which of the following attribute triggers event when the duration and other media data of a media element is loaded?
10465
Which of the following attribute triggers event when the browser starts to load the media data?
10466
Which of the following attribute triggers event when the message is triggered?
10467
Which of the following attribute triggers event when the document comes online? A
10468
R objects can have attributes, which are like ________ for the object.
10469
Which of the following can be considered as object attribute ?
10470
The ___ function can be used to create vectors of objects by concatenating things together.
10471
Which of the following method make vector of repeated values ?
10472
Which of the following finds the position of a quantile in a dataset ?
10473
Which of the following function cross-tabulate tables using formulas ?
10474
which of the following statement make a mosaic plot ?
10475
Which of the following compute proportions from a contingency table ?
10476
Which of the following is lattice command for producing a scatterplot ?
10477
Which of the following builds empirical cumulative distribution function ?
10478
Which of the following is used to view dataset in a spreadsheet-type format ?
10479
________ function carries out a chi-square test.
10480
Which of the following statement is invalid ?
10481
What would be the result of following code ? > x <- 6 > class(x)
10482
What will the following code print ? > x <- 0:6 > as.logical(x)
10483
What would be the output of the following code ? > sqrt(-17)
10484
Which of the following code constructs vector of length 11 ?
10485
_______ function returns a vector of the same size as x with the elements arranged in increasing order
10486
Which of the following statement would print “0” “1” “2” “3” “4” “5” “6” for the following code ? > x <- 0:6
10487
What would the following code print ? > x <- c("a", "b", "c") > as.logical(x)
10488
What would be the output of the following code ? > m <- matrix(nrow = 2, ncol = 3) > dim(m)
10489
What would be the output of the following code ? > m <- matrix(1:6, nrow = 2, ncol = 3) > m
10490
What would the following code print ? > m <- 1:10 > m
10491
What would the following code print ? > x <- 1:3 > y <- 10:12 > cbind(x, y)
10492
The ________ function takes an arbitrary number of arguments and concatenates them one by one into character strings.
10493
What would be the result of following code ? > x <- 1:3 > y <- 10:12 > rbind(x, y)
10494
What would be the output of the following code ? > x <- vector("list", length = 5) > x
10495
What would be the output of the following code ? > x <- factor(c("yes", "yes", "no", "yes", "no")) > table(x)
10496
What would the following code print ? > x <- c(1, 2, NaN, NA, 4) > is.na(x)
10497
Which of the following would print the following output ? foo bar 1 1 TRUE 2 2 TRUE 3 3 FALSE 4 4 FALSE
10498
What would the following code print ? > x <- data.frame(foo = 1:4, bar = c(T, T, F, F)) > ncol(x)
10499
Which of the following is invalid assignment ?
10500
What would be the output of the following code ? > x <- 1:3 > names(x)
10501
What would be the output of the following code ? > m <- matrix(1:4, nrow = 2, ncol = 2) > dimnames(m) <- list(c("a", "b"), c("c", "d")) > m
10502
Which of the following is used for reading in saved workspaces ?
10503
________ is used for outputting a textual representation of an R object
10504
Which of the following statement would read file “foo.txt” ?
10505
Which of the followin code would read 100 rows ?
10506
What is the result of the following code ? > y <- data.frame(a = 1, b = "a") > dput(y)
10507
Which of the following is used for reading tabular data ? > y <- data.frame(a = 1, b = "a") > dput(y, file = "y.R") > new.y <- dget("y.R") > new.y
10508
Which of the following convert a matrix of phi coefficients to polychoric correlations ?
10509
Which of the following is used to plot multiple histograms ?
10510
Which of the following count the number of good cases when doing pairwise analysis ?
10511
Which of the following gives the summary of values likes mean etc ?
10512
The purpose of correct.cor is to correct _________ in values.
10513
The IBM _________ analytics appliances combine high-capacity storage for Big Data with a massively-parallel processing platform for high-performance computing.
10514
______ is an integrated hosted analytics platform for marketing insights, predictive models, and marketing optimization”
10515
________ is rapidly being adopted for computing descriptive and query types of analytics on Big data.
10516
Which of the following contains pre-built predictive tools ?
10517
Which of the following is preferred for text analytics ?
10518
When you create Function Group By default which includes will Create?
10519
T-Code for unlock the Objects?
10520
Assuming a pushbutton with function code 'FUNC' is available in the toolbar of a list report, what event is processed when the button is clicked?
10521
T100 Table has the following Structure?
10522
T-Code for Message Class Creation ?
10523
What is the default mode for passing actual parameters in a Perform?
10524
File ABC contains 10 records. How many records will be read in the following code? PERFORM READ_RECORDS_FROM_FILE. ….. ….. FORM READ_RECORDS_FROM_FILE. READ DATASET ABC INTO REC. IF SY-SUBRC = 0. EXIT. ENDIF. DO. READ DATASET ABC INTO REC. IF SY-SUBRC = 0. EXIT. ENDIF. ENDDO. ENDFORM.
10525
______ is simplest class of analytics.
10526
_________ is a JavaScript charting library and feature-rich API set that lets you build interactive Flash or HTML5 charts.
10527
Which of the following statement will save the output to the file for following code ? > a <- data.frame(x = rnorm(100), y = runif(100)) > b <- c(3, 4.4, 1 / 3)
10528
Which of the following statement will load the objects to the file named “mydata.RData” ?
10529
________ opens a connection to a file compressed with gzip.
10530
Which of the following extracts first element from the following vector ? > x <- c("a", "b", "c", "c", "d", "a")
10531
Which of the following extracts first four element from the following vector ? > x <- c("a", "b", "c", "c", "d", "a")
10532
An internal table icode contains the following entries: Field1 Field2 -------------- John 12345 Alice 23478 Sam 54321 john 50000 DATA: BEGIN OF ICODE OCCURS 0, FIELD1(5), FIELD2(5), END OF ICODE. READ TABLE ICODE WITH KEY FIELD1 = 'John' BINARY SEARCH. Why does executing the above code return a sy-subrc of 4?
10533
What would be the output of the following code ? > x <- c("a", "b", "c", "c", "d", "a") > x[c(1, 3, 4)]
10534
What are the 2 boxes in your system for coding for Abap and their logins?
10535
What would be the output of the following code ? > x <- matrix(1:6, 2, 3) > x[1, 2]
10536
What would be the output of the following code ? > x <- matrix(1:6, 2, 3) > x[1, ]
10537
T-Code for release the Transport request Number?
10538
Which of the following is not a Message type?
10539
What is the result of the following code? Report abc. Data : a(3) , b(3). A = '123'. B = '456'. Perform modify using a b. Write a. Write b. Form abc using x value(y). X = 'abc'. Y = 'xyz'. Endform.
10540
Which of the followin code extracts the second column for the following matrix ? > x <- matrix(1:6, 2, 3)
10541
What would be the output of the following code ? > x <- matrix(1:6, 2, 3) > x[1, , drop = FALSE]
10542
What would be the output of the following code ? > x <- list(foo = 1:4, bar = 0.6) > x
10543
Which line in the following code contains a syntax error? Report abc message-id ZP. Message Id 'ZP' type 'E' number 012. Message e013(ZP). Message e013 with '123'.
10544
Which of the following extracts first element from the following list ? > x <- list(foo = 1:4, bar = 0.6)
10545
What is the use of interactive reporting?
10546
What would be the output of the following code ? > x <- list(foo = 1:4, bar = 0.6, baz = "hello") > name <- "foo" > x$name
10547
What would be the output of the following code ? > x <- list(foo = 1:4, bar = 0.6, baz = "hello") > name <- "foo" > x[[name]]
10548
What is the right order in which the events are trigerred? START-OF SELECTION , INITIALIZATION ,AT SELECTION-SCREEN
10549
What would be the output of the following code ? > x <- list(a = list(10, 12, 14), b = c(3.14, 2.81)) > x[[c(1, 3)]]
10550
What would be the output of the following code ? > x <- list(aardvark = 1:5) > x$a
10551
How can you suppress the default title of a list?
10552
GUI status contains the following Structure? More than one answer is correct.
10553
Which of the followin code extracts 1st element of the 2nd element ? > x <- list(a = list(10, 12, 14), b = c(3.14, 2.81))
10554
Colors can be associated with the report fields using one of the following commands
10555
What would be the output of the following code ? > x <- list(aardvark = 1:5) > x[["a", exact = FALSE]]
10556
TOP-OF-PAGE does one of the following
10557
What would be the output of the following code ? > x <- c(1, 2, NA, 4, NA, 5) > bad <- is.na(x) > print(bad)
10558
Which of the following is example of vectorized operation as far as subtraction is concerned ? > x <- 1:4 > y <- 6:9
10559
What would be the output of the following code ? > x <- 1:4 > y <- 6:9 > z <- x + y > z
10560
What would be the output of the following code ? > x <- 1:4 > x > 2
10561
What would be the output of the following code ? > x <- 1:4 > y <- 6:9 > x/y
10562
What would be the output of the following code ? > x <- matrix(1:4, 2, 2) > y <- matrix(rep(10, 4), 2, 2) > x * y
10563
Which of the following function gives the day of the week ?
10564
What is the system field for the current Page Number?
10565
What would be the output of the following code ? > p <- as.POSIXlt(x) > names(unclass(p)) > p$wday
10566
What would be the output of the following code ? > datestring <- c(
10567
What would be the output of the following code ? > x <- as.Date("2012-01-01") > y <- strptime("9 Jan 2011 11:34:21", "%d %b %Y %H:%M:%S") > x-y
10568
What would be the output of the following code ? > x <- as.Date("2012-03-01") > y <- as.Date("2012-02-28") > x-y
10569
What would be the output of the following code ? > x <- as.POSIXct("2012-10-25 01:00:00") > y <- as.POSIXct("2012-10-25 06:00:00", tz = "GMT") > y-x
10570
Which of the following return a subset of the columns of a data frame ?
10571
Which statements are true about the issue of goods?
10572
_________ generate summary statistics of different variables in the data frame, possibly within strata
10573
What is the T Code for "Billing due list"?
10574
What is the T Code for "Cancel goods issue"?
10575
How is the schedule line determined?
10576
The _______ operator is used to connect multiple verb actions together into a pipeline
10577
What is the T Code for "Sales order change"?
10578
The dplyr package can be installed from GitHub using the _______ package
10579
How does the SAP system enable you to check the reason for documents not being combined in a billing document?
10580
The dplyr package can be installed from CRAN using :
10581
When processing a billing due list, you have the following options:
10582
Which of the following object is masked from ‘package:stats’ ?
10583
The _________ function can be used to select columns of a data frame that you want to focus on.
10584
________ function is similar to the existing subset() function in R but is quite a bit faster.
10585
What is the T Code for "List of deliveries"?
10586
The _________ function is used to generate summary statistics from the data frame within strata defined by a variable.
10587
There is an SQL interface for relational databases via the _______ package.
10588
Identify a Cardinality type that is not part of webdynpro.
10589
Full Buffering would be appropriate for __________
10590
What is the transaction code for "Comparing tables"?
10591
During conversion process of databases, the data is copied from temporary table to the database table using the statement
10592
Selection screen entries referring to data dictionary objects have certain checks in-built in them. Additional checks can be written using event
10593
It is better to buffer a table when
10594
What is the system field for the current Page Number
10595
Sub query usually more efficient because:
10596
Types of Debugging in SAP?
10597
earch help can not be attach to
10598
The code of BAdl implementation is stored in a __________ of an automatically generated customer class.
10599
To implement a Business Add-In (BAdl), the BADI definition name must be investigated.
10600
An object of the BAdl adapter class is instantiated by the call of the static method GET_INSTANCE of the class CL_EXITHANDLER.
10601
With a Business Add-In (BAdl), an SAP application program provides the enhancement option through an interface method.
10602
A handler method can be either a class method (static method) or an instance method of an object.
10603
To create a handler object for an event, we must first define a _________.
10604
Container controls do not provide the technical connection between the screen and application control.
10605
The ABAP List viewer (ALV) Grid Control is a tool that you can use to display non-hierarchical lists in a standardized form.
10606
You cannot use the Refactoring Assistant to move the components of a class within the inheritance hierarchy.
10607
Local type of the global class are encapsulated and cannot be acceded from outside.
10608
Which of the following pushbutton is used to override an inherited method?
10609
Which of the following is used to generate UML diagrams for existing coding?
10610
"The naming convention for SAP interfaces is “ZIF_ or YIF_”.
10611
The naming convention for SAP interfaces is “ZIF_ or YIF_”.
10612
You cannot convert to functional modern writing style when generating method calls as of SAP NW AS 7.0.
10613
Which of the following are used to test the triggering of events in a class?
10614
You can only use local classes or interfaces within the same program in which they are defined and implemented.
10615
Which visibility of the event ensures that it can only be handled in the class itself and its subclasses?
10616
Events are registered using the SET HANDLER statement. Registration is only active at program runtime.
10617
Which of the following are not defined as interface components?
10618
Which of the following statements is used to trigger events?
10619
Which of the following statements is used to define events within a class?
10620
Interfaces like regular superclasses can include other interfaces.
10621
Which of the following strongly resembles inheritance?
10622
Interface reference variables can contain references to instances of the class that is not implemented at runtime.
10623
?= is the down-cast assignment operator.
10624
You can access interface components only by using an object reference.
10625
Which of the following statements is used to implement an interface in a class?
10626
What are the advantages of correctly using class hierarchies?
10627
Which of the following is the down-cast assignment operator?
10628
Which of the following is used to assign a superclass reference to a subclass reference?
10629
A typical use for __________ assignments is to prepare for generic access.
10630
When objects from different classes react differently to the same method calls, this is known as _________.
10631
Which of the following is determined by the assignment?
10632
Which of the following section is used to change superclasses without the need to know the subclasses?
10633
A superclass is a generalization of its subclasses.
10634
Which of the following can be called automatically in the superclass?
10635
Which of the following are the characteristics of generalization and specialization?
10636
Which of the following is a relationship in which the subclass inherits all the main characteristics of the superclass?
10637
The constructor’s signature can have importing parameters or exceptions.
10638
Which of the following points do you consider when defining static constructors?
10639
The constructor is automatically called at runtime with the CREATE OBJECT statement.
10640
The __________ is a special instance method in a class.
10641
You have to pass the RETURNING parameter using the VALUE addition, that is they must be pass by value.
10642
You can describe methods that have a _______ parameter as functional methods.
10643
In which of the following expressions can functional methods be called directly?
10644
When calling a static method from within the class, you can omit the class name.
10645
Which of the following options is used to administer objects in the internal tables?
10646
Independent references are references that have been defined within a class.
10647
The Garbage Collector is a system routine that starts automatically if the runtime system does not have important tasks to carry out.
10648
During program runtime, you use the class to create discrete objects (instances) in the memory. This process is called instantiation.
10649
You cannot create and address objects using reference variables.
10650
Which of the following options is used to create an object?
10651
Which one of the following syntax elements is used to define static attributes?
10652
The CLASS statement can be nested, that is, you can define a class within a class.
10653
You can group all characteristics and behaviors of similar objects into one central class.
10654
The __________ diagram pays particular attention to the sequence in which the objects relate to each other.
10655
Which of the following describes how instances of different classes respond differently to the same messages?
10656
Which of the following is(are) the step(s) in the output design process?
10657
Which of the following is NOT a general principle for output design?
10658
Which kind of chart is useful for comparing series or categories of data, each in its own bar?
10659
dplyr can be integrated with the ________ package for large fast tables.
10660
Which of the following function is similar to summarize ?
10661
Which of the following syntax is correct for while loop ?
10662
A count of the number of students who earned A, B, C, D, and F grades in a given course would be an example of a(n):
10663
A turnaround output is an example of
10664
Which of the following reports categorizes information for managers who are not interested to wade through the details?
10665
The most common medium for computer outputs is:
10666
A listing of the names and addresses of all the employees for an organization would be an example of a(n):
10667
A list of the names of all customers who purchased only one product within a six-month period would be an example of a(n):
10668
Which of the following reports presents information with little or no filtering or restrictions?
10669
In cases where the data item has a large number of predefine values and screen space is tight, the following GUI control should be used for an input
10670
Which of the following advanced input controls provides a nonnumeric means of selecting a value?
10671
Optical character recognition:
10672
Remote batch processing has the following characteristic(s):
10673
If you need to collect employee status information (e.g., full-time vs. part-time) on a computer screen, your best choice for a GUI control would be:
10674
If you need a student to select from a list of eighty courses of the university’s on-line catalogue, your best choice for a GUI control would be:
10675
Which of the following is NOT an advanced input control?
10676
A form used to record data about a transaction is a(n)
10677
Which of the following is(are) an input process method(s)?
10678
Which of the following is(are) the inputs to the Systems Construction phase?
10679
Which of the following is(are) the deliverables of the Systems Implementation phase?
10680
Which of the following is the first phase of the Systems Implementation phase?
10681
Which of the following is(are) the primary inputs into the task of writing and testing new programs?
10682
Which of the tests is a final system test performed by end users using real data over an extended period of time?
10683
_______ is used to break the execution of a loop.
10684
Which of the following statement can be used to explicitly control looping ?
10685
Which of the following code can be used to avoid numeric problems such as taking the logarithm of a negative number ?
10686
What will be the output of the following code ? > x <- 3 > switch(2, 2+2, mean(1:10), rnorm(5))
10687
Which will be the output of following code ? > x <- 3 > switch(6, 2+2, mean(1:10), rnorm(5))
10688
What will be the output of the following code ? > y <- "fruit" > switch(y, fruit = "banana", vegetable = "broccoli", "Neither")
10689
What will be the output of the following code ? > centre <- function(x, type) { + switch(type, +mean = mean(x), + median = median(x), + trimmed = mean(x, trim = .1)) + } > x <- rcauchy(10) > centre(x, "mean")
10690
Which of the following code will print “Neither” ?
10691
R has ________ basic indexing operators.
10692
Which of the following is apply function in R ?
10693
Functions are defined using the _________ directive and are stored as R objects
10694
What will be the output of the following code ? > f <- function() { +## This is an empty function + } > f()
10695
What will be the output of the following code ? > f <- function() { + ## This is an empty function + } > class(f)
10696
What will be the output of following code ? > f <- function(num) { + for(i in seq_len(num)) { +cat("Hello, world!\n") + } + } > f(3)
10697
The syntax of the for loop is :
10698
What will be the output of following code ? > f <- function(num) { + hello <- "Hello, world!\n" + for(i in seq_len(num)) { + cat(hello) + } + chars <- nchar(hello) * num + chars + } > meaningoflife <- f(3) > print(meaningoflife)
10699
What will be the output of following code snippet ? > paste("a", "b", se = ":")
10700
What will be the output of the following code ? > f <- function(num = 1) { +hello <- "Hello, world!\n" +for(i in seq_len(num)) { + cat(hello) + } +chars <- nchar(hello) * num + chars + } > f()
10701
You can check to see whether an R object is NULL with the _________ function.
10702
Which of the following code will print NULL ?
10703
What will be the output of following code ? > f <- function(a, b) { + a^2 + } > f(2)
10704
What will be the output of following code snippet ? > paste("a", "b", sep = ":")
10705
What will be the output of following code ? > f <- function(a, b) { +print(a) +print(b) + } > f(45)
10706
What would be the value of following expression ? log(-1)
10707
To get the current date, the _______ function will return a Date object which can be converted to a different class if necessary.
10708
Which of the followin code represents internal representation of a Date object ?
10709
What would be the output of the following code ? > x <- as.Date("1970-01-01") > x
10710
What would be the output of the following code ? > printmessage <- function(x) { + if(x > 0) + print("x is greater than zero") + else +print("x is less than or equal to zero") + invisible(x) + } > printmessage(NA)
10711
What will be the output of following code snippet ? > lm <- function(x) { x * x } > lm
10712
Which of the variable in the following code is variable ? > f <- function(x, y) { + x^2 + y / z + }
10713
R uses _________ scoping⁶⁰ or static scoping.
10714
The only environment without a parent is the ________ environment.
10715
The ________ for R are the main feature that make it different from the original S language
10716
The _________ function is a kind of “constructor function” that can be used to construct other functions.
10717
What is the range of the floating point numbers?
10718
Which of three sizes of floating point types should be used when extended precision is required?
10719
Which is used to indicate single precision value?
10720
Which is correct with respect to size of the datatypes?
10721
The size of an object or a type can be determined using which operator?
10722
Latency time is:
10723
Which of the following is not a file operation:
10724
An inverted file
10725
Originally ‘C’ was developed as
10726
The conditional compilation
10727
*ptr++ is equivalenet to:
10728
Which of the following is/are advantages of cellular partitioned structure
10729
In mulit-list organization
10730
‘Prime area’ in context of file system is defined as
10731
Seek time is
10732
Which of the following is not a component of file system
10733
A direct access file is:
10734
If class A is friend of class B and if class B is friend of class C, which of the following is true?
10735
Which of the following relationship is known as inheritancerelationship?
10736
Which of the following is true about const member functions?
10737
Each pass through a loop is called a/an
10738
Which one of the following is not a valid reserved keyword in C++
10739
What is the difference between overloaded functions and overridden functions?
10740
What does STL stand for?
10741
Which of the following is not a standard exception built in C++.
10742
Which of the STL containers store the elements contiguously (in adjecent memory locations)?
10743
Which of the following is not recommended in a header file?
10744
What’s wrong? for (int k = 2, k <=12, k++)
10745
What’s wrong? (x = 4 && y = 5) ? (a = 5) ; (b = 6);
10746
A continue statement causes execution to skip to
10747
What’s wrong? while( (i < 10) && (i > 24))
10748
Which of the following is not true about preprocessor directives
10749
Which of the following is the most preferred way of throwing and handling exceptions?
10750
Which of the following keyword supports dynamic method resolution?
10751
Which of the following correctly describes C++ language?
10752
Which of the following is a valid destructor of the class name “Country”
10753
Which one of the following is not a fundamental data type in C++
10754
When is std::bad_alloc exception thrown?
10755
Which classes allow primitive types to be accessed as objects?
10756
If the class name is X, what is the type of its “this” pointer (in a nonstatic, non-const member function)?
10757
Which of the following is the default authentication mode for IIS?
10758
Which of these data source controls do not implement Caching?
10759
An ASP.NET page uses a Datagrid displays employee information.The Web application supports a large number of concurrent users, who will be saving data from the grid back to the database. It is important that the Web application doesn't overwhelm the Web Server.
10760
For your ASP.NET web application your graphics designer created elaborate images that show the product lines of your company. Some of graphics of the product line are rectangular, circular, and others are having complex shapes. You need to use these images as a menu on your Web site. What is the best way of incorporating these images into your Web site?
10761
Explain the significance of Server .MapPath
10762
You need to store state data that is accessible to any user who connects to your Web application. Which object should you use?
10763
How to implement authentication via web.config?
10764
In your ASP.NET web application you want to display a list of clients on a Web page. The client list displays 10 clients at a time, and you require the ability to edit the clients. Which Web control is the best choice for this scenario?
10765
Which one of the following namespaces contains the definition for IdbConnection?
10766
Select the control which does not have any visible interface.
10767
How do you explicitly kill a user session?
10768
Does the EnableViewState allows the page to save the users input on a form?
10769
What is the maximum number of cookies that can be allowed to a web site?
10770
Select the type Processing model that asp.net simulate
10771
Where is the default Session data is stored in ASP.Net?
10772
Select the caching type supported by ASP.Net
10773
Which property of the session object is used to set the local identifier?
10774
The number of forms that can be added to aspx page is
10775
How do you manage states in asp.net application
10776
What is the extension of a web user control file?
10777
Why is Global.asax is used?
10778
There can be more than 1 machine.config file in a system
10779
What's the difference between Response.Write() and Response.Output.Write()?
10780
How ASP.Net Different from classic ASP?
10781
Custom Controls are derived from which of the classes
10782
To add a custom control to a web form we have to register with
10783
Which of the following is true?
10784
How do you register a user control?
10785
Which method do you invoke on the Data Adapter control to load your generated dataset?
10786
What namespace does the Web page belong in the .NET Framework class hierarchy?
10787
Postback occurs in which of the following forms.
10788
The first event to be triggered in an aspx page is.
10789
The Asp.net server control, which provides an alternative way of displaying text on web page, is
10790
When an .aspx page is requested from the web server, the out put will be rendered to browser in following format.
10791
Which of the following languages can be used to write server side scripting in ASP.NET?
10792
In ASP.NET the sessions can be dumped by using
10793
Which method do you invoke on the DataAdapter control to load your generated dataset with data?
10794
What tags one need to add within the asp:datagrid tags to bind columns manually?
10795
Which of the following is TRUE about Windows Authentication in ASP.NET?
10796
Which of the following method is used to obtain details about information types of assembly?
10797
The namespace within the Microsoft .NET framework which provides the functionality to implement transaction processing is ....................
10798
The technique that allow code to make function calls to .NET applications on other processes and on other machines is
10799
Suppose a .NET programmer wants to convert an object into a stream of bytes then the process is called ______________ ?
10800
Which of the following can be used to add alternating color scheme in a Repeater control?
10801
Suppose one wants to modify a SOAP message in a SOAP extension then how this can be achieved. Choose the correct option from below:
10802
How many classes can a single .NET DLL contain?
10803
Which of the following denote the property in every validation control?
10804
Which of the following allow writing formatted output?
10805
The actual work process of ASP.NET is taken care by _____________?
10806
Common type system is built into which of the following:
10807
The type of code found in Code-Behind class is ________ ?
10808
In ASP.NET the < authorization > section contain which of the following elements?
10809
In .NET the operation of reading metadata and using its contents is known as ______?
10810
In my .NET Framework I have threads. Which of the following denote the possible priority level for the threads?
10811
If one has two different web form controls in a application and if one wanted to know whether the values in the above two different web form control match what control must be used?
10812
Which of the following transfer execution directly to another page?
10813
Which of the following is FALSE?
10814
Which of the following must be done in order to connect data from some data resource to Repeater control?
10815
WSDL stands for _________________ ?
10816
What is the base class from which all Web forms inherit?
10817
Which of the following denote ways to manage state in an ASP.Net Application?
10818
Find the term: The .NET framework which provides automatic memory management using a technique called ______________ ?
10819
In ASP.NET in form page the object which contains the user name is ______ ?
10820
The .NET Framework provides a runtime environment called..... ?
10821
___________________ tests make sure that new code does not break existing code.
10822
What attributes do you use to hide a public .Net class from COM?
10823
Which of the following authentication is best suited for a corporate network?
10824
By default, code written with the Debug class is stripped out of release builds.
10825
The ________________ property affects how the .Net Framework handles dates, currencies, sorting and formatting issues.
10826
Where do we include the user lists for Form authentication?
10827
Where do we include the user lists for windows authentication?
10828
Which of the following is the way to monitor the web application?
10829
Which of the following is the performance attributes of processModel?
10830
______________ element in the web.config file to run code using the permissions of a specific user
10831
__________________ is a special subfolder within the windows folder that stores the shared .NET component.
10832
Which of the following is faster and consume lesser memory?
10833
You can have only one Global.asax file per project.
10834
Which of the following is not the way to maintain state?
10835
Mode of storing ASP.NET session
10836
Which of the following control is used to validate that two fields are equal?
10837
Which of the following object is used along with application object in order to ensure that only one process accesses a variable at a time?
10838
Which of the following ASP.NET object encapsulates the state of the client?
10839
Which object can help you maintain data across users?
10840
How do you get information from a form that is submitted using the "post" method?
10841
Default scripting language in ASP.
10842
Default Session data is stored in ASP.Net.
10843
Which DLL translate XML to SQL in IIS?
10844
Which of the following is not a member of ADODBCommand object?
10845
Why is Global.asax is used?
10846
An alternative way of displaying text on web page using
10847
File extension used for ASP.NET files.
10848
What is used to validate complex string patterns like an e-mail address?
10849
Caching type supported by ASP.Net
10850
Attribute must be set on a validator control for the validation to work.
10851
We can manage states in asp.net application using
10852
What class does the ASP.NET Web Form class inherit from by default?
10853
Which of the following tool is used to manage the GAC?
10854
How do we create a FileSystemObject?
10855
Which of the following method must be overridden in a custom control?
10856
Difference between Response.Write() andResponse.Output.Write().
10857
The first event triggers in an aspx page is.
10858
Which of the following object is not an ASP component?
10859
Web.config file is used...
10860
Choose the form in which Postback occur
10861
An ASP.NET page uses a Datagrid displays employee information.The Web application supports a large number of concurrent users, who will be saving data from the grid back to the database. It is important that the Web application doesn't overwhelm the Web Server.
10862
What is the name of default Viewstart Page in ASP.Net MVC?
10863
Does MVC 6 introduced new JSON project based structure?
10864
How to set Default Value to Hidden Input Box using ASP.Net MVC?
10865
Which Namespace is used for ASPX View Engine?
10866
You can use . . . . . class to send the result back in JSON format in MVC.
10867
In the model-view-controller (MVC) architecture, the view corresponds to the
10868
MVC is composed of three components:
10869
In which format data can be return from XML into table?
10870
Viewstart comes under which folder name ?
10871
. . . . . helps you to maintain data when you move from controller to view.
10872
Does TempData used to pass data from one page to another page in MVC?
10873
In the model-view-controller (MVC) architecture, the model defines the
10874
Which Namespaces are required to Data Annotation using MVC?
10875
You are designing an ASP.NET MVC 4 application that uses an Oracle database for persistence. What session configuration choices enable you to deploy your application on a web farm? (Choose all that apply.)
10876
What is the transaction code for "viewing background jobs"?
10877
Which of the below program type can only be started using a transaction code?
10878
What will be the output of following code ? > g <- function(x) { + a <- 3 + x+a+y + ## 'y' is a free variable + } > g(2)
10879
Types of Debugging in SAP
10880
Search help can not be attach to:
10881
________ functions can be “built which contain all of the necessary data for evaluating the function
10882
Which of the following language supports lexical scoping ?
10883
In an ABAP program, which of the following Processing blocks are not allowed?
10884
For controller action method . . . . . returns nothing as the result.
10885
_________ require you to pass a function whose argument is a vector of parameters
10886
Can we create change document history (CDHDR/CDPOS entries) for custom tables?
10887
What will be the output of the following code ? > nLL <- make.NegLogLik(normals, c(FALSE, 2)) > optimize(nLL, c(-1, 3))$minimum
10888
We have an option for events in the table maintenance generator.
10889
What will be the output of the following code ? > nLL <- make.NegLogLik(normals, c(1, FALSE)) > optimize(nLL, c(1e-6, 10))$minimum
10890
Transaction code for the maintaining table is __________.
10891
Among the below which is not the valid delivery class
10892
We can create the table maintenance with below types of screens.
10893
What will be the output of following code ? > g <- function(x) { + a <- 3 + x+a+y +## 'y' is a free variable + } > y <- 3 > g(2)
10894
________ loop over a list and evaluate a function on each element
10895
__________ function is same as lapply in R
10896
________ applies a function over the margins of an array.
10897
_______ is used to apply a function over subsets of a vector.
10898
lappy functions takes _________ arguments in R language.
10899
What will be the output of following code ? > x <- list(a = 1:5, b = rnorm(10)) > lapply(x, mean)
10900
Which of the following code will print the following result ? [[1]] [1] 2.263808 [[2]] [1] 1.314165 9.815635 [[3]] [1] 3.270137 5.069395 6.814425 [[4]] [1] 0.9916910 1.1890256 0.5043966 9.2925392
10901
What will be the output of the following code ? > x <- list(a = matrix(1:4, 2, 2), b = matrix(1:6, 3, 2)) > lapply(x, function(elt) { elt[,1] })
10902
Which of the following is valid body of split function ?
10903
What will be the output of the following code ? > f <- function(elt) { + elt[, 1] + } > lapply(x, f)
10904
What will be the output of following code ? > x <- list(a = 1:4, b = rnorm(10), c = rnorm(20, 1), d = rnorm(100, 5)) > sapply(x, mean)
10905
_________ is an indication that a fatal problem has occurred and execution of the function stops
10906
What would be the value of following expression ? > log(-2.3)
10907
Warnings are generated by the _________ function
10908
What will be the output of the following code ? > printmessage <- function(x) { +if(x > 0) + print("x is greater than zero") + else + print("x is less than or equal to zero") +invisible(x) + } > printmessage(1)
10909
What will be the value of following expression ?
10910
Which of the following code represents internal representation of a Date object ?
10911
When we create the table, text table will automatically gets created.
10912
Whenever we create and activate the table below index will get automatically created.
10913
What would be the output of the following code ? > printmessage2 <- function(x) { +if(is.na(x)) +print("x is a missing value!") + else if(x > 0) +print("x is greater than zero") +else + print("x is less than or equal to zero") + invisible(x) + } > printmessage2(NA)
10914
We cannot create data element without creating the domain
10915
Prerequisite for creating foreign key relationship are_____.
10916
What would be the output of the following code ? > printmessage <- function(x) { + if(x > 0) + print("x is greater than zero") + else + print("x is less than or equal to zero") + invisible(x) + } > printmessage(NA)
10917
Difference between the projection view and the database view.
10918
Single record buffering should be used when _________
10919
__________ prints out the function call stack after an error occurs.
10920
We need to create primary index explicitly:
10921
We can assign search help to the select option or parameter using below statement:
10922
________ allows you to insert debugging code into a function a specific places
10923
_______ allows you to modify the error behavior so that you can browse the function call stack
10924
Can we include customizing include or an append structure with Pooled or Cluster tables?
10925
What is the maximum number of structures that can be included in a table or structure?
10926
What would be the output of the following code ? > mean(x) Error in mean(x) : object 'x' not found > traceback()
10927
Text table should consist of?
10928
Without maintaining the following, the table cannot be activated:
10929
Can we create transaction code for the table maintenance?
10930
The recover() function will first print out the function call stack when an _______ occurs.
10931
We provide reference table and reference field to which type of fields?
10932
Conversion routine is assigned to ____?
10933
Value table can be assigned to ____?
10934
Lock object is created with the initial letter ________?
10935
Why ‘+’ sign is displayed instead of the field description while maintaining the table entries using tcode SM30?
10936
Search help is assigned to which level of the table?
10937
________ generate random Normal variates with a given mean and standard deviation
10938
EXTRACT statement
10939
What are field symbols?
10940
______ evaluate the cumulative distribution function for a Normal distribution
10941
The following are true about ‘EXEC SQL’.
10942
Open SQL vs. Native SQL
10943
_______ generate random Poisson variates with a given rate
10944
A database commit is triggered by
10945
A logical unit of work (LUW or transaction) begins
10946
Which of the following are true?
10947
Which of the following evaluate the Normal probability density (with a given mean/SD) at a point ?
10948
HIDE statement support deep structures?
10949
_________ is the most common probability distribution to work with.
10950
What is the difference between the TYPE and LIKE statements in data declaration?
10951
What will be the output of the following code ? > x <- rnorm(10) > x
10952
When using Open SQL statements in an ABAP/4 program, you must ensure the following.
10953
Can a view container have more than one view active at a time.
10954
What will be the output of the following code ? > x <- rnorm(10) > summary(x)
10955
Which of the Below is not a Valid Webdynpro UI element
10956
What is the right sequence of event trigger in Webdynpro
10957
which standard WD component is used to build ALV in Webdynpro
10958
Identify a Window Outbound Plug type to exit the View completely
10959
What will be the output of the following code ? > pnorm(2)
10960
_________ ensures reproducibility of the sequence of random numbers.
10961
A View in Webdynpro is associated with _______ in SAP GUI.
10962
Passing Parameters to webydnpro Application using the Applicatino URL are called_________Parameters
10963
which data type do you use to declare a visibility attribute in webdynpro
10964
5 Normal random numbers can be generated with rnorm() by setting seed value to :
10965
Identify a Cardinality type that is not part of webdynpro.
10966
Which method do you use to read the contents of a attribute attached to the context node.
10967
_______ function is used to simulate binary random variables.
10968
which method do you use to read the contents of a internal table displayed in the webdynpro window
10969
How do you access the attributes declared in component controller in the method of a view Ex: emp_id type numc10
10970
Where does the Business Logic exists in the Webdynpro Component
10971
What will be the output of the following code > > set.seed(10) > x <- rbinom(100, 1, 0.5) > str(x)
10972
A webdynpro Component consists of the below items except
10973
The UI Element and the Context Attributes of Webdynpro are linked. The process of doing this is called
10974
__________ distribution is commonly used to model data that come in the form of counts.
10975
The Webdynpro Programming model is based on
10976
What will be the output of the following code ? > rpois(10, 1) An
10977
What is the equivalent for Transaction in Webdynpro
10978
Which of the following code represents count with mean of 2 ?
10979
What is the Cardinality for the Node created for storing the Table
10980
Eliminate the Event that is not part of Webdynpro
10981
When starting the Debugger, what circumstance causes the runtime error DEBUGGINGNOTPOSSIBLE?
10982
It is possible to make multiple changes to data objects at the same time in the Debugger.
10983
All breakpoints are valid for the entire Debugger session, and all can be changed by the Debugger.
10984
Setting breakpoints for a method or function module within the Debugger allows the use of [F4] (value help) to find the correct name
10985
What is the maximum number of watchpoints that can exist at one time?
10986
A non-exclusive debugging mode means? (Select all that apply.)
10987
Under which circumstances will the classical Debugger start as the Debugger? (Select all that apply.)
10988
Both the classical Debugger and the new Debugger can be used on all ABAP code without restriction.
10989
A watchpoint stops program execution every time the condition specified is met
10990
The Debugger displays a maximum of eight data objects at one time.
10991
What are the differences between SAP memory and ABAP memory? (Multiple Answer)
10992
Is Session Method, Asynchronous or Synchronous?
10993
What is the difference between UPLOAD and WSUPLOAD? (Multiple Answer)
10994
How many types of tables exist in data dictionary? (Multiple Answer)
10995
What are the main events interactive reports have? (Multiple Answer)
10996
What is the difference between Synchronous and Asynchronous updates? (Multiple Answer)
10997
What are presentation and application servers in SAP? (Multiple Answer)
10998
What are the check tables and value tables? (Multiple Answer)
10999
How many lists can exist in parallel in an interactive reporting?
11000
Command flushes the database buffers
11001
What is true
11002
What is invalid attribute of a domain
11003
It is better to buffer a table when
11004
Sub query usually more efficient because:
11005
Search help can not be attach to:
11006
Full Buffering would be appropriate for ?
11007
What is the basic object of data Dictionary
11008
What kind of component of a business object are BAPIs ?
11009
What are the ways to link LDB to executable program?
11010
Which layer is NOT used in R/3 system?
11011
Which attribute is invalid for a domain?
11012
The message types are one of the following:
11013
What table is used to store all the Message Class Texts?
11014
Identify a layout that is not part of the Webdynpro Layout types
11015
Method used to sort an array alphabetically is known to be
11016
Numeric array values can be sorted through an array method named as
11017
In JavaScript, there are objects of
11018
An array can be sorted in a reverse manner through method
11019
To find highest number in an array, method to be used is
11020
A function with parameters cannot be decorated.
11021
The ______ symbol along with the name of the decorator function can be placed above the definition of the function to be decorated works as an alternate way for decorating a function.
11022
Is Tuple mutable?
11023
Which of the following has more precedance?
11024
. class test: def __init__(self): print "Hello World" def __init__(self): print "Bye World" obj=test()
11025
Python allows string slicing. What is the output of below code: s='cppbuzz chicago' print(s[3:5])
11026
Select the reserved keyword in python-
11027
Which Of The Following Keywords Mark The Beginning Of The Class Definition?
11028
What is the output of the following? print("Hello {0!r} and {0!s}".format('foo', 'bin'))
11029
Which of the following is not a developer’s privilege?
11030
Which of the following is not true about a sequence?
11031
Which of the following is true about the CREATE TABLE statement?
11032
Which of the following comparison operators could be used in a multiple row query?
11033
A subquery can be placed in which of the SQL clauses?
11034
What is returned by SUBSTR(‘TUTORIALS POINT’, -1, 1)?
11035
Which of the following is not true about SQL statements?
11036
Which is the operator, takes the results of two queries and returns only rows that appear in both result sets ?
11037
Which is the operator, takes the results of two queries and returns only rows that appear in both result sets ?
11038
The _______operation performs a set union of two “similarly structured” tables :
11039
Which one of the following is a procedural language ?
11040
A domain is atomic if elements of the domain are considered to be ____________ units.
11041
Logical design of database, is known to be
11042
Query languages used in practice includes
11043
Contents of a relation instance may change with time as relation :
11044
A table is a collection of relationships, there is a close correspondence between concept of :
11045
Minimal superkeys are called ?
11046
Query language is a language in which a user ?
11047
Primary key should be chosen such that its attribute values are
11048
In a relational Database a referential integrity constraint cab be specified with the help of ;
11049
What is the full form of RDBMS ?
11050
The union of primary keys of the related entity sets becomes a -------------------------- of the relation ?
11051
Which is the false statement from the following ?
11052
The relational model is concerned with ?
11053
Address field of a person should not be part of primary key, since it is likely to ?
11054
In relational model, the row of table is known to be ?
11055
The term attribute refers to a ___________ of a table.
11056
A RDBMS consists a collection of ?
11057
Which function is offered by PHP for connecting to a postgreSQL?
11058
True or False? To enable continuous archiving, all you have to do is set archive_mode to ‘on’ in postgresql.conf
11059
True or false: With table inheritance child tables inherit primary and foreign key definitions from their parents
11060
When identifying rows uniquely, we use__________keys.
11061
The __________ database model has the advantage of being able to quickly discover all of the records of one type that are related to a specific record of another type by following the pointers from the starting record.
11062
WAL segment size is determined:
11063
True or False: PostgreSQL allows you to implement table inheritance. This should be defined with the special keyword INHERITIS in the table design.
11064
What is a TOAST file?
11065
What will be the output of the following code ? > set.seed(20) > x <- rnorm(100) > e <- rnorm(100, 0, 2) > y <- 0.5 + 2 * x + e > summary(y)
11066
________ is a systematic way to examine how much time is spent in different parts of a program.
11067
The _______ function computes the time (in seconds) needed to execute an expression.
11068
To create a database that supports UTF-8, the following command can be used:
11069
Which of the following is NOT a feature of user defined functions?
11070
The extension used for data encryption/decryption within PostgreSQL is:
11071
Which statement is not true about a PostgreSQL domain?
11072
The elapsed time may be ________ than the user time if your machine has multiple cores/processors
11073
True or false: When a table is created which uses a table name as a column type, not null constraints on the column type’s table definition are honored by the including table.
11074
True or False? When restoring a database backed up with pg_dump, it’s generally a good idea to enable WAL.
11075
True or false? Hash indexes are not crash-safe
11076
Parallel processing is done via __________ package can make the elapsed time smaller than the user time.
11077
Locks are recorded in:
11078
The syntax to view the indexes of an existing postgreSQL table is:
11079
You can time ________ expressions by wrapping them in curly braces within the call to system.time().
11080
True or False? To increase server performance, automated CHECKPOINT operations should be setup in cron or Task Scheduler.
11081
What is the difference between DO ‘some code…’ and EXECUTE ‘some code…’ statements?
11082
The profiler can be turned off by passing _________ to Rprof().
11083
Which of the following is not a valid integer array?
11084
To copy a database from server1 to server2, you might use which of the following:
11085
What are the join strategies available to the postgreSQL planner when a SELECT query contains two or more relations?
11086
What is “index bloat”?
11087
True or False? PostgreSQL supports Index Only Scans.
11088
_______ divides the time spend in each function by the total run time
11089
Which is NOT true of array indexes?
11090
By default, in what subdirectory of the database data directory are WAL logs contained?
11091
What does MCV stand for?
11092
Which of the following function actually fits the linear model ?
11093
Bob works for StegaCorp. His workstation’s IP address is 10.5.34.8. He needs access to a database called “partners” directly from his workstation. Which of the following is the correct entry in pg_hba.conf?
11094
_________ time is time charged to the CPU(s) for the R expression.
11095
True or False? Dynamic Tracing is enabled by default at compile time.
11096
In order to echo all input from script, you use the ________ psql command.
11097
The final bit of output that summaryRprof() provides is the ______ interval and the total runtime.
11098
To restore a PostgreSQL backup created with pg_dump, the following may be used:
11099
Which of the following statement gives sampling interval ?
11100
Advisory locks are allocated out of a shared memory pool whose size is defined by the configuration variables….
11101
What command turns on timing?
11102
Which of the following code is not profiled ?
11103
Which statement is true about PostgreSQL data types?
11104
_______ grammar makes a clear distinction between your data and what gets displayed on the screen or page.
11105
This is used to determine how text is stored and sorted within PostgreSQL?
11106
True or False? Only the administrator can make use of tablespaces.
11107
When looking at ‘ps’ output on a unix system, you see the following: postgres 1016 0.1 2.4 6532 3080 pts/1 SN 13:19 0:00 postgres: tgl regression [local] idle in transaction What does “idle in transaction” mean?
11108
Asynchronous Commits:
11109
The rule system:
11110
To prevent transaction wraparound, a VACUUM operation should be run on every table no less than once every:
11111
Which of the following cuts numeric vector into intervals of equal length ?
11112
What command allows you to edit PostgreSQL queries in your favorite editor ?
11113
Which of the following is a plot to investigate the order in which observations were recorded ?
11114
________ is used for translating between qplot and base graphics.
11115
Which of the following creates fluctuation plot ?
11116
What does the following statement do? CREATE INDEX lower_title_idx ON books ((lower(title)));
11117
________ is used to create a plot to illustrate patterns of missing values.
11118
To create a database in PostgreSQL, you must have the special CREATEDB privilege or
11119
_________ generate aesthetic mappings that describe how variables in the data are.
11120
The value NULL, in database terminology, means?
11121
To describe a table in PostgreSQL which of the following is correct:
11122
______ generate aesthetic mappings from a string
11123
Query trees can be viewed in the server logs as long as which of the following configuration parameters are enabled?
11124
Unless you specify NOT NULL, PostgreSQL will assume that a column is:
11125
The core PostgreSQL source code includes what interfaces?
11126
True or False? Within a table, a single column may be encrypted.
11127
__________ create a complete ggplot appropriate to a particular data type
11128
________ is used for relative sizing of theme elements.
11129
_________ display contours of a 3d surface in 2d.
11130
______ display a smooth density estimate.
11131
____________ allow us to define formally in the database how different tables relate to each other.
11132
PostgreSQL can be installed?
11133
What command tells PostgreSQL that all of the changes you made to a database should become permanent?
11134
Which of the following draws nothing.?
11135
PostgreSQL runs on:
11136
What is the wrapper around the SQL command CREATE DATABASE?
11137
The SQL condition for pattern matching is?
11138
PostgreSQL has many modern features including:
11139
_________ describe the type of plot you will produce.
11140
With PostgreSQL, you can access data by
11141
PostgreSQL used what model of communication?
11142
We add data to PostgreSQL by using which statement?
11143
When retrieving data in a particular table, we use the_____________ statement.
11144
PostgreSQL is:
11145
PostgreSQL is
11146
The heart of SQL is the __________ statement.
11147
In PostgreSQL, a named collection of tables is called what?
11148
The basic psql command to list tables is?
11149
The most common method to get data into a table is to use what command?
11150
Which of the following best describes a role:
11151
What do you call the application that makes requests of the PostgreSQL server?
11152
True or False? When using a SELECT statement on a table, or group of tables, those resources are locked exclusively.
11153
True or False? VACUUM FULL shrinks indexes, optimizing database performance.
11154
When you want to use a join between columns that are in the same table, you use what type of join?
11155
A meta-command always begins with what?
11156
PostgreSQL can be used from just about any major programming language, including C, C++, Perl, Python, Java, Tcl, and PHP
11157
Which of the algorithmic languages is not lexical scoping standardized in?
11158
What is the purpose of the dynamic scoping?
11159
What is the opposite approach to the lexical scoping?
11160
What is the fundamental rule of lexical scoping?
11161
Which of the following uses a lot of CPU cycles?
11162
Which of the following is not an example of closures?
11163
What is closure?
11164
What must be done in order to implement Lexical Scoping?
11165
What kind of scoping does JavaScript use?
11166
If you have a function f and an object o, you can define a method named m of o with ________
11167
Do functions in JavaScript necessarily return a value?
11168
Which is an equivalent code to invoke a function m of class o that expects two arguments x and y?
11169
Which keyword is used to define the function in javascript?
11170
The function stops its execution when it encounters?
11171
A function with no return value is called ___________
11172
What will happen if a return statement does not have an associated expression?
11173
What is the purpose of a return statement in a function?
11174
When does the function name become optional in JavaScript?
11175
The function definitions in JavaScript begins with ____________
11176
The reduce and reduceRight methods follow a common operation called __________
11177
The primary purpose of the array map() function is that it __________
11178
What will happen if reverse() and join() methods are used simultaneously?
11179
The pop() method of the array does which of the following task?
11180
The basic purpose of the toLocaleString() is to _________
11181
The purpose of extensible attribute is to __________
11182
To determine whether one object is the prototype of (or is part of the prototype chain of) another object, one should use the ____________
11183
A linkage of series of prototype objects is called as ________
11184
The object has three object attributes namely ________
11185
The unordered collection of properties, each of which has a name and a value is called _________
11186
Among the keywords below, which one is not a statement?
11187
What will be the step of the interpreter in a jump statement when an exception is thrown?
11188
What will happen if the body of a for/in loop deletes a property that has not yet been enumerated?
11189
One of the special features of an interpreter in reference with the for loop is that ___________
11190
What are the three important manipulations done in a for loop on a loop variable?
11191
The enumeration order becomes implementation dependent and non-interoperable if ___________
11192
The “var” and “function” are __________
11193
When an empty statement is encountered, a JavaScript interpreter __________
11194
What is a block statement in JavaScript?
11195
A conditional expression is also called a _______________
11196
JavaScript is a _______________ language.
11197
“An expression that can legally appear on the left side of an assignment expression.” is a well known explanation for variables, properties of objects, and elements of arrays. They are called ___________
11198
Among the following, which one is a ternary operator?
11199
Which of the operator is used to test if a particular property exists or not?
11200
What kind of expression is “new Point(2,3)”?
11201
The expression of calling (or executing) a function or method in JavaScript is called ________
11202
The property of a primary expression is __________
11203
A function definition expression can be called as __________
11204
Assume that we have to convert “false” that is a non-string to string. The command that we use is (without invoking the “new” operator).
11205
The statement a===b refers to _________
11206
The snippet that has to be used to check if “a” is not equal to “null” is _________
11207
The escape sequence ‘\f’ stands for _________
11208
Which of the following is not considered as an error in JavaScript?
11209
JavaScript _________ when there is an indefinite or an infinite value during an arithmetic computation.
11210
__________ is interval represented by a vertical line, with a point in the middle.
11211
The generalised syntax for a real number representation is __________
11212
A hexadecimal literal begins with __________
11213
The type of a variable that is volatile is _______________
11214
Which of the following creates a new ggplot plot from a data frame ?
11215
Which of the following draws plot on current graphics device ?
11216
Which of the following create a set of identity mappings ?
11217
_________ is new package that makes it easy to “tidy” your data.
11218
A proper scripting language is a __________
11219
Which of the following Attribute is used to include External JS code inside your HTML Document?
11220
Which of the following is complementary to tidyr ?
11221
JavaScript can be written __________
11222
How many functions exist for tidying the data ?
11223
Which of the following function takes multiple columns ?
11224
JavaScript Code can be called by using ___________
11225
__________ uses regexp groups instead of a splitting pattern or position.
11226
Which attribute is used to specify that the script is executed when the page has finished parsing? (only for external scripts)
11227
JavaScript is ideal to ________
11228
A JavaScript program developed on a Unix Machine ________
11229
Which of the following d takes two columns and spreads them in to multiple columns ?
11230
The script tag must be placed in __________
11231
Spread function is known as ___________ in spreadsheets.
11232
The main purpose of a “Live Wire” in NetScape is to ________
11233
__________ is used when you have variables that form rows instead of columns.
11234
The web development environment (JavaScript) offers which standard construct for data validation of the input entered by the user.
11235
Which of the following merges two variables into one ?
11236
How many functions exist for wrangling the data with dplyr package ?
11237
________ function is similar to the existing subset() function in R
11238
The ______ operator allows you to string operations in a left-to-right fashion
11239
________ add new variables/columns or transform existing variables
11240
_________ extract a subset of rows from a data frame based on logical conditions.
11241
dplyr can be integrated with the ________ package for large fast tables
11242
The syntax of close method for document object is ________
11243
What is the role of exploratory graphs in data analysis ?
11244
The syntax of capture events method for document object is _______.
11245
The syntax of a blur method in a button object is _______.
11246
Which of the following is true about the base plotting system ?
11247
Which of the following is an example of a valid graphics device in R?
11248
The JavaScript exception is available to the Java code as an instance of _______.
11249
_________ is a wrapped Java array, accessed from within JavaScript code.
11250
______ class provides an interface for invoking JavaScript methods and examining JavaScript properties.
11251
When a JavaScript object is sent to Java, the runtime engine creates a Java wrapper of type ________.
11252
______ is the tainted property of a window object.
11253
To set up the window to capture all Click events, we use which of the following statement?
11254
JavaScript is interpreted by ______.
11255
The syntax of Eval is _______.
11256
____method evaluates a string of JavaScript code in the context of the specified object.
11257
Which of the following navigator object properties is the same in both Netscape and IE?
11258
What is the correct JavaScript syntax to write "Hello World"?
11259
How does JavaScript store dates in a date object?
11260
Which of the following communicates with server-side CGI scripts through HTML form submissions and can be written without the use of JavaScript?
11261
What is the programming philosophy that argues that content and behaviour should as much as possible be kept separate?
11262
Client-side JavaScript code is embedded within HTML documents in
11263
JavaScript code between a pair of “script” tags are called
11264
Which of the following are not advanced services?
11265
The HTML5 specification includes
11266
The service(s) that enables networking through scripted HTTP requests is
11267
The behaviour of the document elements can be defined by
11268
JavaScript is ______ Side scripting language.
11269
JavaScript is ______ language.
11270
Is JavaScript case-sensitive?
11271
What will the following code return: Boolean(10 > 9)
11272
Which operator is used to assign a value to a variable?
11273
How do you declare a JavaScript variable?
11274
Which event occurs when the user clicks on an HTML element?
11275
How can you detect the client's browser name?
11276
JavaScript is the same as Java.
11277
What is the correct JavaScript syntax for opening a new window called "w2" ?
11278
How do you find the number with the highest value of x and y?
11279
How do you round the number 7.25, to the nearest integer?
11280
What is the correct way to write a JavaScript array?
11281
How to insert a comment that has more than one line?
11282
How can you add a comment in a JavaScript?
11283
How does a FOR loop start?
11284
How does a WHILE loop start?
11285
How to write an IF statement for executing some code if "i" is NOT equal to 5?
11286
How to write an IF statement in JavaScript?
11287
How do you call a function named "myFunction"?
11288
How do you create a function in JavaScript?
11289
How do you write "Hello World" in an alert box?
11290
The external JavaScript file must contain the <script> tag.
11291
What is the correct syntax for referring to an external script called "xxx.js"?
11292
Where is the correct place to insert a JavaScript?
11293
What is the correct JavaScript syntax to change the content of the HTML element below? (<p id="demo">This is a demonstration.</p>)
11294
Which was the first browser to support JavaScript ?
11295
We use _______ style comment to prevent showing Java Script as Content in the old browsers.
11296
All modern browsers supports JS.
11297
The async attribute can be set in the following ways -
11298
______ attribute is used to specify the character encoding used in an external script file.
11299
Which attribute is used to specifies that the script is executed when the page has finished parsing (only for external scripts)
11300
Which of the following Attribute is used to include External JS code inside your HTML Document -
11301
It is good programming procedure to include JS in a external sheet and make it available than writing inside HTML.
11302
It is good to include JS code inside footer section in order to speed up the Page loading time of Webpage.
11303
JS code included inside head section is loaded before loading page.
11304
We cannot Place JS Code in the body tag . Say true/false.
11305
Select all the correct option(s). State the correct place of JS Code inside HTML -
11306
JavaScript Code can be called by using _________.
11307
We can embed JS code inside HTML directly ?
11308
Local Browser used for validations on the Web Pages uses __________.
11309
Choose appropriate Option(s) : JavaScript is also called as _____________.
11310
Why JavaScript is called as Lightweight Programming Language ?
11311
JavaScript Code is written inside file having extension __________.
11312
Cost for Using JavaScript in your HTML is _________ .
11313
JavaScript is an ________ language.
11314
Select Appropriate Option(s) : JavaScript is can be written -
11315
JavaScript is designed for following purpose -
11316
JavaScript is ______ Side Scripting Language.
11317
Javascript is _________ language.
11318
Which was the first browser to support JavaScript?
11319
Predict the output of the following JavaScript Code.(<script type="text/javascript"> <!-- document.write("Hello"); //--> </script> )
11320
JavaScript is ________ language.
11321
Predict the output on the console for the following JavaScript code.(<script>function geek() { if(true) { var a = 5;} document.write(a); } geek(); </script> )
11322
JavaScript is a ________ Side Scripting Language.
11323
Which function of an Array object calls a function for each element in the array?
11324
Which of the following is an advantage of using JavaScript?
11325
Predict the output on the console for the following JavaScript code.(<script> let geek = 'GeeksforGeeks'; console.log(typeof geek); geek=1; console.log(typeof geek); </script> )
11326
Predict the output on the console for the following JavaScript code.(<script> let myName = "Geek"; let myCity = "Geekistan"; console.log(`My name is ${myName}. My favorite city is ${myCity}.`) </script> )
11327
In JavaScript, we do not have datatypes like integer and float. What is the function that can be used to check if the number is an integer or not?
11328
What is the method in JavaScript used to remove the whitespace at the beginning and end of any string ?
11329
What will be the command to print the number of characters in the string (“GeeksforGeeks”?)
11330
What will be the output of the following code?(<script> document.write(typeof(24.49)); </script> )
11331
How to initialize an array in JavaScript?
11332
What is the JavaScript syntax for printing values in Console?
11333
How to insert a multi-line comment in JavaScript?
11334
What is the correct syntax for adding comments in JavaScript?
11335
How to write an ‘if’ statement for executing some code.(If “i” is NOT equal to 8?)
11336
How is the function called in JavaScript?
11337
What is the syntax for creating a function in JavaScript named as Geekfunc?
11338
Predict the output of the following JavaScript code.(<script type="text/javascript" language="javascript"> var x=5; var y=6; var res=eval("x*y"); document.write(res); </script>)
11339
Predict the output of the following JavaScript code.(<script type="text/javascript" language="javascript"> var a = "GeeksforGeeks"; var result = a.substring(4, 5); document.write(result); </script>)
11340
Which of the following is not a reserved word in JavaScript?
11341
Predict the output of the following JavaScript code.(<script type="text/javascript"> var a="GeeksforGeeks"; var x=a.lastIndexOf("G"); document.write(x); </script> )
11342
Predict the output of the following JavaScript code.(<script type="text/javascript"> a = 8 + "8"; document.write(a); </script> )
11343
The external JavaScript file must contain <script> tag. True or False?
11344
What is the correct syntax for referring to an external script called “geek.js”?
11345
Which of the following is the correct syntax to display “GeeksforGeeks” in an alert box using JavaScript?
11346
Choose the correct JavaScript syntax to change the content of the following HTML code.(<p id="geek">GeeksforGeeks</p>)
11347
What is the HTML tag under which one can write the JavaScript code?
11348
Bitmapped file formats can be most useful for
11349
Which of the following functions is typically used to add elements to a plot in the base graphics system?
11350
Which function opens the screen graphics device for the Mac ?
11351
What does the ‘pch’ option to par() control ?
11352
If I want to save a plot to a PDF file, which of the following is a correct way of doing that?
11353
__________ produces box-and-whisker plots.
11354
What command is used to count the total number of lines, words, and characters contained in a file?
11355
__________ produces bivariate scatterplots or time-series plots.
11356
Annotation of plots in any plotting system involves adding points, lines, or text to the plot, in addition to customizing axis labels or adding titles. Different plotting systems have different sets of functions for annotating plots in this way. Which of the following functions can be used to annotate the panels in a multi-panel lattice plot?
11357
____________ produces one-dimensional scatterplots.
11358
What are the main features of UNIX?
11359
The advantage of binary files over text files is that
11360
which of the following functions can be used to finely control the appearance of all lattice plots ?
11361
How will you assign the value of variable var2 to var1?
11362
The directory structure used in Unix file system is called
11363
Which of the following flags are set when ‘JMP’ instruction is executed?
11364
Unix is a
11365
For barchart and _________, non-trivial methods exist for tables and arrays, documented at barchart.table.
11366
Which command can be used to query for terminal type being in use?
11367
Which command is used to display the top of the file?
11368
What is a geom in the ggplot2 system ?
11369
What are positional parameters?
11370
To run the script, we should make it executable first by using _____
11371
Logical flag is applicable to which of the following plots ?
11372
___________ is used to determine what is plotted for each group.
11373
Which of the following code create n samples of size “size” with probability prob from the binomial ?
11374
Which of the following code create a n item vector of random normal deviates ?
11375
Which of the following statement can read csv files ?
11376
To block/allow regular users to send write messages to your session, you use:
11377
Which of the following statement read a tab or space delimited file ?
11378
newgrp will:
11379
In chgrp command, the letter you use to add a sticky bit (e.g., to prevent removal of files by non-owner from a directory) is:
11380
Will tar extract information about file permissions?
11381
which of the following statement chose those objects meeting a logical criterion ?
11382
The last privileged port (any port that can’t be opened by anyone else but the root user) is:
11383
Can `ip` in iproute2 take multiple commands in a row?
11384
Which of the following statement is another way to get a subset ?
11385
What file will show you how the kernel was started?
11386
Apart from SIGKILL, which other signal cannot be caught nor ignored?
11387
A user has a file called OriginalFile, and then creates a hard link to it by executing the following command (brackets not part of command): [ cp -l OriginalFile CopyOfFile ] Which of the following are true?
11388
Which of the following sort a dataframe by the order of the elements in B
11389
modprobe -d:
11390
Which of the following is Mac menu command ?
11391
What is the result of echo ‘$MyVar’ ?
11392
What does the command “set $(date)” do?
11393
In a file delimited by commas, what command will print the 3rd column of data:
11394
The cksum command will read from standard input if:
11395
_____ list the variables in the workspace
11396
Which command will tell you how long a system has been up and running since it was last booted?
11397
___________ remove all the variables from the workspace
11398
What is the maximum size of an ext3 file system?
11399
Which one of these lines will check if the directory “foo” exists and create it if it doesn’t?
11400
In POSIX-compatible shell, what will you see if you enter “echo foo*” when there are no files beginning with “foo” in the current directory?
11401
Which of the following code will drop the nth column ?
11402
To create hard-links instead of copies with the cp command, you use:
11403
Which command is used for initializing physical volume(hard disk, or partition) for LVM usage?
11404
What is the file /etc/nsswitch.conf?
11405
What is cgroups ?
11406
/bin/true is a command whose exit status is always:
11407
Which of the following code drop the ith and jth column ?
11408
Which of the following statement find cases with no missing values ?
11409
How are typical native code debuggers implemented?
11410
Man pages are written using what markup language?
11411
Which of the following commands shows routing table information?
11412
Which of the following statement is normal distribution ?
11413
If no filesystems are specified on the command line, and the _____ option is not specified, then the command “fsck” will default to checking filesystems in “/etc/fstab” serial order.
11414
As a non-privileged user, if you use ‘nice’, it will:
11415
which of the following statement gives cumulative sum ?
11416
Which of the following is uniform distribution ?
11417
What is the expected output of the following command: unset x; test -z $x && echo 1
11418
What is the purpose of the “tset” command?
11419
Which of the following tests each element of x for membership in y ?
11420
nfsstat will…
11421
The ________ command can be used to “kill” the ‘X server’.
11422
What does the Linux “yes” command do?
11423
Which of the following produces the variance covariance matrix ?
11424
You need which of the following access modes in order to cd to a system directory?
11425
To do unlimited precision arithmetic calculations from the shell, you use:
11426
Which of the following will reverse the order of values in x ?
11427
To format a device as an ext3 (journaled) Linux extended filesystem, you use the commands:
11428
How find the current system runlevel?
11429
‘mv -u’ will:
11430
newaliases will:
11431
mktemp -d’ will:
11432
Which of the following commands will correctly display the version of the Linux kernel running?
11433
Running “man –locale=LLL” instructs man to override the value of which of these functions?
11434
Which of the following statement applies the function (FUN) to either rows (1) or columns (2) on object X ?
11435
Which of the following statement finds the maximum for each column ?
11436
In the command ‘mv source target’, if source is a directory and target is an existing directory, the result will be to:
11437
Which of the following is a way to update mlocate’s index?
11438
which of the following statement tells the row with the minimum value for every column ?
11439
What happens if you try to write to /dev/null and /dev/zero?
11440
In bash you can use these quote marks for command substitution.
11441
In a BASH script this command line parameter contains the scripts own name:
11442
Which of the following finds row sums for each level of a grouping variable ?
11443
The acronym WINE stands for:
11444
What does permission 641 (octal) mean?
11445
The backslash on the command line indicates
11446
Given that the ip command is installed, what is the effect of the command ip a ls
11447
What does the following line mean when it is run in a script ‘#!/bin/bash’?
11448
What will “cat /proc/mdstat” tell you?
11449
To format a device as a Linux second extended filesystem (ext2), you use the command:
11450
Reset will…
11451
If the system is not in runlevel 0 or 6, before performing a power-off operation, the poweroff command will execute:
11452
Which of the following files ‘probably’ contains the default “windows manager settings”?
11453
options (switches) to the ps command may start with:
11454
“Run Level Zero (0)” stands for _____.
11455
Which of the following sets the size of the outer margins for the graph ?
11456
Which of the following function is used for plotting histogram ?
11457
Which of the following will add the title “R language” to the graph ?
11458
______ let’s you perform SQL queries on your R data frames.
11459
______ splits a data frame and results an array (hence the da). Hopefully you’re getting the idea here.
11460
________ makes it incredibly easy to fit time series models like ARIMA, ARMA, AR, Exponential Smoothing, etc.
11461
________ provides needed string operators in R.
11462
Which of the following commands can be used to change the run level?
11463
To send a file to the printer spool queue, you use the command:
11464
What is not part of the Linux Kernel?
11465
Which of the following is similar to Moment.js ?
11466
The user smith issued the egrep “^[[:upper:]]” words.txt command. What does this command do?
11467
__________ modifies geom/stat aesthetic defaults for future plots
11468
Information about modules, like module dependency, and where certain types of modules reside in the filesystem, is found in:
11469
What source control system does the Linux kernel use?
11470
Which of the following is a library for statistical quality control. ?
11471
______ specializes in converting data from wide to long format.
11472
_________ is used to convert wide data to long data.
11473
For what purposes can socat be used?
11474
______ is used to view all packages installed.
11475
What does it mean when a variable is unbound?
11476
Executing the command “init 6” will _____.
11477
______ is used to get library location in R.
11478
How do you find all files in /etc which end in .conf?
11479
How to display current iptables rules?
11480
What will you get if you try to read from the pseudo-device /dev/null?
11481
________ is used to view packages currently loaded.
11482
To write a message to all users (on their terminals) over a network, you use:
11483
Can I have swap partition and swap file activated at the same time?
11484
rev will:
11485
________ contains tools for Approximate Bayesian Computation (ABC).
11486
How do you make a list of all filenames in the /tmp directory that the contain the text “user”, regardless of case?
11487
What program is launched by the kernel at system start up first?
11488
Which of the following package combine multi-dimensional arrays ?
11489
‘mkdir -m 444 any’ will:
11490
By default what file contains encrypted user passwords?
11491
SSH uses _____ to authenticate remote computers.
11492
pwconv will…
11493
What is the uid of root?
11494
What is “vmlinuz”?
11495
To see the kernel routing tables, you do:
11496
What binary format do Linux Executables use?
11497
Single User Mode equivalent to _____.
11498
The mkraid command will:
11499
Write a command to list all files with 5 characters in the name.
11500
What does the $ represent within the context of a shell command?
11501
Which of the following contains functions for processing uniaxial minute-to-minute accelerometer data ?
11502
To search one or more files for matching lines, which command may be used?
11503
Which of the following file ‘probably’ contains the ‘user specific’ settings for the “windows manager”?
11504
modprobe
11505
modinfo [options] ofile’ will:
11506
Typing the “cd” command at the shell prompt will take you to the _____.
11507
What, according to bc, is 2^2?
11508
How do you redirect stderr to stdout?
11509
_____ is not a ‘Terminal Emulator’.
11510
In a ps command output, the PPID displays the:
11511
The at command allows you to execute a command at:
11512
To display contents of files on standard output, you could use the command:
11513
To create one or more directories with the mkdir command, which permissions in the directory’s parent directory do you need?
11514
Which Run Level provides “Full multiuser mode with network and X display manager”?
11515
True or false: The Linux OS is not affected by malware.
11516
What flag makes “ls -l” print file sizes in human readable format (e.g. 1K, 231M, 2G, etc)?
11517
To print the first 10 lines of one or more files to the standard output, you use the command:
11518
Is it possible to increase SWAP space without rebooting?
11519
printenv will:
11520
command1 | command2 will?
11521
The behavior of the system for each “runlevel” is available in the _____ file.
11522
If you use the rm command to accidentally delete a file, how can you get the file back?
11523
What does the “uname” command do?
11524
In a date +format, you add the hour in 24 hours format using:
11525
To report the amount of free disk space available on all mounted file systems you use the command:
11526
When does /tmp normally get cleaned out?
11527
The run level in a system can be configured in the file _____.
11528
What is the maximum length of a file name on Linux?
11529
Which of the following accurately describes a “ping?”
11530
lsof command means:
11531
If DDD is a non empty directory, and you execute ‘rmdir DDD’, it will:
11532
You want to load the main kernel module for USB support. Which command would help you achieve this task?
11533
_____ command starts the default desktop environment.
11534
How to reveal detailed information about CPU?
11535
To access the value of an environment variable, we _____.
11536
How would you create an alias for the cat command?
11537
To use chown recursively, instead of using _recursive you can use:
11538
Which of the following is not an editor?
11539
If a host is called HHH, ‘rstat HHH’ will:
11540
Which is an example of a shell comment?
11541
What is a zombie process?
11542
LILO is _____.
11543
What does “chmod 755 file” accomplish?
11544
Why hasn’t ZFS been added to the Linux kernel?
11545
The command du -h ~
11546
What does the Linux “no” command do?
11547
The jobs command
11548
The command “free” reports on:
11549
Which return value from an ioctl request indicates success?
11550
the ‘-r’ switch to the mount command will:
11551
To read one or more files and type them on standard output, you use:
11552
Which tool is similar to find except that it uses an index to search?
11553
Consider using the command “cd /a/b/c”, then executing “cd ..”. What does this last command do?
11554
uname -a will output…
11555
LVM is…
11556
LILO…
11557
/etc/resolv.conf is …
11558
Which firewall is most commonly used on Linux?
11559
To transfer files in an insecure way to and from a remote network site host, you use the command:
11560
On Red Hat Linux and its derivatives, which of the following commands will be appropriate to check whether a particular “package” is installed or not?
11561
What command can be used to delete a directory, recursively searching for files and other directories and deleting them?
11562
As a privileged user, you may set the hostname with the command:
11563
With which userspace is Linux typically paired?
11564
Fedora Linux uses _____ packages.
11565
What is the right command to save file and exit in Vim?
11566
Add this symbol to a command to run it in the background
11567
To query DNS (Internet domain name) servers, you use the command:
11568
To start another shell under the current shell you use the command:
11569
Which answer assists you in finding help on the whois command?
11570
What is swap?
11571
How do you view the documentation for the command ‘kill’ in the Linux terminal?
11572
To repeat the last command in the bash shell history, type…
11573
The netstat command give information on:
11574
What does it means when the ps commands shows a ‘Z’ in the status column for a process?
11575
_____ is a Linux “desktop environment”.
11576
Executing “pwd” in shell will return:
11577
The loaded modules in the kernel are listed in /proc/modules. You can get this list using the command:
11578
If you wanted to execute a shell command in the background, which character would you put at the end of the command line?
11579
mknod can create special file (used for sending or receiving data) of type:
11580
SSH stands for _____.
11581
What is the ssh command?
11582
What makes up a Linux kernel?
11583
The ”rm” command is used to:
11584
‘mkfs’ is used to:
11585
Which directory contains all the files needed to boot the Linux system?
11586
What will show you all the subdirectories of the current directory?
11587
The Linux Kernel was written by?
11588
How do you activate the noclobber shell option?
11589
Ubuntu is based on…
11590
What is GNOME ?
11591
mount -a’ will load all filesystems listed in:
11592
GRUB stands for _____.
11593
What does GRUB stand for?
11594
How do you show all processes being run by a particular user?
11595
What is the linux mascot?
11596
In Kernel Signals are used to notify a certain
11597
File name that handle interrupts in Linux is
11598
Linux is an
11599
In Linux a user can load or upload
11600
System structure of Linux is
11601
There can be only ----- job in foreground.
11602
To see the process status which command you will use?
11603
chmod 632 stuff means
11604
Read & Write permission means
11605
The command for changing the permission relating to files is
11606
What is the meaning of chmod 444 stuf?
11607
Output of 'sort > shoppinglist' is
11608
The symbol of wildcard(s) is
11609
ls j?e - output will be
11610
/dev is used for
11611
Output of the command 'wc <filename>' is
11612
Which command is used for character translation?
11613
What is the relation between grep & egrep
11614
The main function of grep is
11615
The --------- command sorts lines of all the named files.
11616
Which command is used to compare files?
11617
What will be the output of the command 'tail sample'?
11618
Which command is used to see the system date?
11619
who -h is used to
11620
Which command is used to see the content of a file
11621
mkdir - p is used for
11622
ls - t is used for
11623
ls -o is used for
11624
Protocols used by Linux are
11625
Linux is a ---------------Operating System
11626
To delete user the command is
11627
The encrypted password is stored in which field of /etc/password file ?
11628
To give all permission to a file to all users the command is all of the above
11629
During Linux booting the init program is called by
11630
The X-Window system in Linux is a
11631
Name of the kernel file in Linux is
11632
The type of shell mostly used for Linux is
11633
Linux is a dedicated server
11634
To access a directory the minimum permission required is
11635
Home directory of root is
11636
An user can login without password
11637
______ gives information about an user
11638
_____ is used to change the file/folder permission
11639
_______ is used to rename files
11640
To remove a directory which is not empty ____ is used
11641
To unmount a filesystem ________ command is ised
11642
______ will add contents to an existing file
11643
The command to view the partition information is
11644
Samba password and user password are same
11645
For a user _______ is an autoexec.bat equivalent file in Linux
11646
A user is logged in on a terminal; root tries to delete the user. Will the user be deleted?
11647
init 6 is
11648
To get information about the Ethernet card, ___________ command is used
11649
In practical, at the most _____ terminals can be opened at a time
11650
To setup a Firewall, the command is
11651
All device files are stored in
11652
The mounted partition information is stored in
11653
Linux mount partition must be a primary partition
11654
When an user is deleted it home directory contents are also deleted
11655
If there is any problem with the command, the error is given by
11656
The core of Linux OS is also called
11657
To change the ownership of a file use
11658
__________ is used for selecting regression transformations
11659
In comm the 2nd column displays
11660
Linux is a
11661
Which of the following is an R package for the exploratory analysis of genetic and genomic data ?
11662
wc -l will give the
11663
______ specializes in functions for analytical Customer Relationship Management.
11664
sort file, will sort the contents of the file and the effect will be reflected in the file
11665
-wxrwx-x is equivalent to
11666
_________ searches for significant clusters in genetic data.
11667
Hidden file can be viewed using
11668
To create multiple directories in one shot ________ is used
11669
______ Uses Grieg-Smith method on 2 dimensional spatial data
11670
To search a pattern in a file _________ can be used
11671
The command to check a partition is
11672
______ finds K best paths in a given graph.
11673
While installing Linux, users can be created
11674
________ is a package for parsing, applying, and manipulating data cleaning rules
11675
Samba is actually a
11676
User can be assigned to a group while creating the user. The command for this is
11677
________ performs class prediction based on microarray data and clinical parameters
11678
To start graphics mode use
11679
To view all the installed RPM packages use
11680
Password is applied using
11681
Which of the following package provide namespace management functions not yet present in base R ?
11682
To check if a service is running, the command is
11683
Which of the following is used to analyze paleontological time-series ?
11684
A swap partition is actually
11685
__________ is used for the analysis of air pollution data.
11686
Default file system type of Linux is
11687
All run levels are stored in
11688
User passwords are stored in
11689
To delete an user along with its home directory, the command is
11690
cat > abc, if the requested file does not exist, error will be given by
11691
Linux kernel file name is
11692
_________ uniforms and customizes plots of packages ggplot2, graphics and lattice.
11693
Shell is a
11694
______ is used for Visualisation, verification and calibration of ternary probabilistic forecasts.
11695
The application, that communicates with application MongoDB by way of a client library, is called
11696
which field is always the first field in the document.?
11697
In which format MongoDB represents document structure?
11698
Which of the following is correct option ?
11699
Which is not a supported index type in MongoDB?
11700
A collection in MongoDB is a group of ......................
11701
what is MongoDB?
11702
in how much time the MongDB writes are written to the journal?
11703
A collection and a document in MongoDB is equivalent to............. concepts respectively.
11704
In which year the MongoDB was Initial release?
11705
Which of the foliowing is wrong statement -
11706
The MongoDB is written in .................... language.
11707
Which among the following syntax is used to create a reference for "Test" collection in Java?
11708
Which one of the following is correct?
11709
Which of the following is lattice command for producing boxplots ?
11710
Which sets also allow the routing of read operations to specific machines?
11711
Which of the following groups find the correlation matrix ?
11712
Which of the following is the recommended step to optimize query performance?
11713
Which of the following involves predicting a categorical response ?
11714
What should be the priority of member to prevent them from becoming primary?
11715
Which of the following package contains functions for reading and displaying satellite data for oceanographic applications with R ?
11716
What is the name of default storage engine in MongoDB?
11717
Which of the following dynamic schema phenomenon is made easier for the application by MongoDB?
11718
________ contains tools for Approximate Bayesian Computation (ABC).
11719
Which of the following syntax is used to install forecast package ?
11720
________ provides needed string operators in R.
11721
Which of the following may be used for linear regression ?
11722
Which of the following truncates real x to integers ?
11723
Which of the following is Mac menu command ?
11724
Which of the following function works similar to separate() ?
11725
Which of the following is an example of a vector graphics device in R?
11726
What is ggplot2 an implementation of ?
11727
Which of the following is discrete state calculator ?
11728
Which of the following is a differentiation related aesthetic ?
11729
Which among following is not a supported index type in MongoDB?
11730
You want to return maximum 5 matching documents that will return with only the _id, name, and address fields. Which of the following queries will you use?
11731
A collection in MongoDB is a group of:
11732
_______ member is used to support dedicated functions, such as backup or reporting.
11733
We search for fields, queries etc. in MongoDB using _________.
11734
Which of the following command queries the amount of storage used, the quantity of data contained in the database, object, collection, and index counters?
11735
Which of the following creates a new ggplot plot from a data frame ?
11736
system.time function returns an object of class _______ which contains two useful bits of information.
11737
What should be the priority of member to prevent them from becoming primary?
11738
How many methods exist for normalizing the data ?
11739
Which among the following is the way to access the different documents in the result set?
11740
What does the following query do when performed on the posts collection? db.posts.update({_id:1},{$set:{Author:Tom"}})
11741
ObjectId is a 12-byte BSON type, in which the last 3 bytes represent:
11742
What will be the output of the following code set.seed(10) x - rbinom(100, 1, 0.5) str(x)
11743
Which of the following statement is incorrect?
11744
Select the correct query to isplay user age in the descending order.
11745
A collection and a document in MongoDB is equivalent to which of the SQL concepts respectively?
11746
Which of the following statement will save the output to the file for following code ? a - data.frame(x = rnorm(100), y = runif(100)) b - c(3, 4.4, 1 / 3)
11747
Connections to text files can be created with the ________ function.
11748
Columns can be arranged in descending order too by using the special ____ operator.
11749
In a replica set, all write operations go to the set's primary that applies the write operation and then records the operations in a file called:
11750
What would be the output of the following code ? x - c("a", "b", "c", "c", "d", "a") x[c(1, 3, 4)]
11751
Which of the following statements is correct about mongoose in MongoDB?
11752
What would be the output of the following code ? x - 1:4 y - 6:9 x/y
11753
What would be the output of the following code ? x - 1:4 y - 6:9 z - x + y z
11754
What would be the output of the following code ? p - as.POSIXlt(x) names(unclass(p)) p$wday
11755
The _________ function is used to plot negative likelihood.
11756
A function, together with an environment, makes up what is called a ______ closure.
11757
Which of the following is multivariate version of lapply ?
11758
The __________ function returns a list of all the formal arguments of a function
11759
Which of the following is primary tool for debugging ?
11760
_______ is used to skip an iteration of a loop.
11761
Which will be the output of following code ? x - 3 switch(6, 2+2, mean(1:10), rnorm(5))
11762
What would be the output of the following code ? sqrt(-17)
11763
What would be the output of the following code ? m - matrix(nrow = 2, ncol = 3) dim(m)
11764
What would the following code print ? x - c("a", "b", "c") as.logical(x)
11765
Which of the following sorting is not supported by MongoDB ?
11766
Which of the following language is MongoDB written in ?
11767
What would be the output of the following code ? x - vector("list", length = 5) x
11768
Which of the following is a wide-column store ?
11769
Which of the following is a NoSQL Database Type ?
11770
ata frames can be converted to a matrix by calling data._______
11771
Point out the wrong statement :
11772
_____________ can be used for batch processing of data and aggregation operations.
11773
Point out the correct statement :
11774
MongoDB can be used as a ____________, taking advantage of load balancing and data replication features over multiple machines for storing files.
11775
Point out the correct statement :
11776
R Language functionality is divided into a number of ________
11777
Which of the following command will find the maximum value in the vector x, exclude the missing values
11778
Many quantitative analysts use R as their ____ tool?
11779
Vectors come in two parts _____ and _____.
11780
_________ and _________ are types of matrices functions?
11781
Which function is used to create the vector with more than one element?
11782
R is an interpreted language. It can be access through _____________ ?
11783
In R Language every operation has a ______ call?
11784
_______ command is used to skip an iteration of a loop.
11785
R was named partly after the first names of ____ R authors?
11786
_________ initiates an infinite loop right from the start.
11787
In 1991, R was created by Ross Ihaka and Robert Gentleman in the Department of Statistics at the University of
11788
Packages are useful in collecting sets into a _____ unit
11789
If I have two vectors x <- c(1,3, 5) and y <- c(3, 2, 10), what is produced by the expression rbind(x, y)?
11790
A key property of vectors in R language is that
11791
What function is used to test the missing observation in data frame
11792
In R language the following are all atomic data types EXCEPT
11793
Suppose I have a vector x <- 1:4 and y <- 2:3. What is produced by the expression x + y?
11794
The definition of free software consists of four freedoms (freedoms 0 through 3). Which of the following is NOT one of the freedoms that are part of the definition?
11795
Suppose I have a list defined as x <- list(2, “a”, “b”, TRUE). What does x[[2]] give me?
11796
_________ is function in R to get number of observation in a data frame
11797
Suppose I have a vector x <- c(3, 5, 1, 10, 12, 6) and I want to set all elements of this vector that are less than 6 to be equal to zero. What R code achieves this?
11798
If I execute the expression x <- 4 in R language, what is the class of the object “x” as determined by the “class()” function?
11799
What is the class of the object defined by the expression x <- c(4, “a”, TRUE)?
11800
How to obtain the transpose of a matrix in R?
11801
What is the output for the below expression all(NA==NA)?
11802
what is the syntax for creating scatterplot matrices.
11803
_______ command to create a histogram.
11804
What is the output of the command – paste(1:3,c(“x”,”y”,”z”),sep=””) ?
11805
30) If I have two vectors x<- c(1,3, 5) and y<-c(3, 2), what is produced by the expression cbind(x, y)?
11806
The R language is a dialect of which of the following programming languages?
11807
Suppose we have two vectors p <- c(1,3, 5) and q <- c(3, 2, 10), what is produced by the expression rbind(x, y)?
11808
In R Language the following are all atomic data types EXCEPT
11809
The role of vector in R Programming is that
11810
What is the class of the object by the expression m <- p(7, "g", TRUE)?
11811
_______is function in R to get number of observation in a data.
11812
What function is used to test the missing observation in data?
11813
What will this code print to screen? f <- function() { x<-3 y<-x+3 return(c(x, y))} y
11814
What will this code return? x <- 1 f <- function() { y <- 2 return(c(x, y)) } f()
11815
The ______ operator allows you to string operations in a left-to-right fashion.
11816
Columns can be arranged in descending order too by ______operator.
11817
What is the syntax of the for loop ?
11818
R language support to______ indexing operators.
11819
What will be the output of the following code ? > x <- 3 > switch(2, 2+2, mean(1:10), rnorm(5))
11820
You need to connect one system with RFC to another System having three clients. Which of the following is true if all clients of the called system are to be connected to all clients of the calling ...
11821
You can change the UME properties using which of the following SAP Standard Tools?
11822
While configuring the SSO between ECC and EP, which program is used to maintain or check the setting for the Integration into Portal?
11823
While applying the Support Patch, it throws the error &amp;quot;CANNOT_CREATE_COFILE&amp;quot;. What is the solution to this problem?
11824
Which users CANNOT make adjustments to the repository during an upgrade?
11825
Which user is used for communication between the SAPCCMSR agent and the central monitoring system? Note that this user is a communication user with very specific authorizations.
11826
Which two RFC connections are tested when you run SLDCHECK Transaction Code?
11827
Which transaction code is used to stop/re-start a Java Instance via SAP GUI?
11828
Which tools are available for user administration under Java?
11829
Which steps are required (among others) to establish periodic data exchanges between the System Landscape Directory and the SAP Solution Manager system?
11830
Which statements concerning the transport of non-ABAP objects with the help of the ABAP Change and Transport System (CTS) are correct?
11831
Which services can you use to change the severity of log files?
11832
Which SAP Standard User is used to communicate between UME and ABAP User Management?
11833
Which RFC connections are used to establish a connection between Integration Server and System Landscape directory?
11834
Which parameter specifies the maximum size of a security audit file?
11835
Which parameter sets the storage location for TemSe (TEMporary SEquential Database) objects in the spool system?
11836
Which of the following statements concerning the Change and Transport System are true?
11837
Which of the following statements about connecting SAP systems to the System Landscape Directory (SLD) are correct?
11838
Which of the following should be monitored for Database performance?
11839
Which of the following requirements must be met to perform a modification in a SAP system?
11840
Which of the following reports is used to display a list of all Instance-specific parameters and system-wide parameters?
11841
Which of the following is the correct sequence of starting the SAP Web AS ABAP +Java?
11842
Which of the following is a Component of SAP NetWeaver Development Infrastructure (NWDI).
11843
Which of the following are characteristics of Upgrade Strategy Downtime-Minimized?
11844
Which of the following activities can be performed by using user management administration console in SAP User Management Engine (UME)?
11845
Which files are required to update JDI Software component?
11846
Which file of SAP gateway is used to control start-startup and registration of external RFC to secure the RFC connection?
11847
Which CCMS agent is used to configure in SAP NetWeaver Web AS ABAP+JAVA?
11848
Which blocked qRFC queues should be monitored in an XI/PI system?
11849
Which are the different Solution Manager Scenarios?
11850
Where is CSMCONF file stored at OS level (UNIX)?
11851
What UME Installation Options can you select during the installation of SAP Web Application Server AS Java?
11852
What tool is provided by SAP for monitoring the SAP Web AS Java and Java applications?
11853
What prerequisite must be met before applying the Support Package on the System?
11854
What kind of data can be retrieved from SLD?
11855
What is the sequence in which a SAP system reads a profile during startup?
11856
What is the default value of the parameter &amp;quot;rstr/max_filesize_MB&amp;quot; SAP Enterprise Core Component 5.0 (SAP ECC)?
11857
What is an RFC used for?
11858
What functions are available in SAP NetWeaver Administrator (NWA)?
11859
What could be the possible causes of a transport request taking a long time to import in QAS system?
11860
What components can be installed on the SAP Web as ABAP + Java?
11861
What are the sources of User Persistence Store in UME in Enterprise Portal?
11862
What are the functions of the Visual administrator in SAP web?
11863
What are the different tools that are provided by the SAP to monitor and administer Java Instance processes from the OS level (UNIX Platform)?
11864
What are the different levels of protection for communication connection secured with SNC?
11865
What are the Contents of the System Landscape Directory?
11866
What are the benefits of configuring trusted relationship between SAP Systems?
11867
What are different status a profile can have in SAP System.
11868
Through which functional module can we switch the operation mode?
11869
The SAP software component designed for registering the software components of your whole system landscape is known as _____________.
11870
The logging and tracing infrastructure for SAP Web AS Java consists of ________
11871
SAP Web AS JAVA system is restarting after 30 minutes again and again. What could the problem be?
11872
SAP system is not coming up and it is showing an error &amp;quot;MsSClientHandle: no server provides service ENQ (4), requested from DEVSAPECC _DEV_01&amp;quot; in dev_ms file. Choose the correct reason of error?
11873
SAP Logon Ticket used for authentication should contain:
11874
Local work process memory is used for:
11875
It is now peak production hours, the production system is hanging due to archive directory/filesystem being 100% full. There is a DDS4 autoloader connected directly to the database server dedicated...
11876
Instance SAP Management Console has 3 Dialog iInstances (Application Server) - D01, D02 and D03. One of the Instances - D01 shows Yellow color status while others are green. What does the Yellow co...
11877
In which sequence are the system parameters read from the specified locations by the system?
11878
In which scenario can SAP Web Dispatcher be used?
11879
In Web Dynpro, Navigation Modeler allows to change which of the following entities.
11880
In case of an error or issue while starting a Java Instance, which of the following log files or trace files can be used to find out the exact cause of the problem?
11881
If a user is already logged on to a logon group using logon load balancing, how are dialog work processes assigned to this user. Which of the following is correct?
11882
HTTP service is not running on Integration Server. This can cause connection problems, which in turn can cause the notification of the cache on the Integration Server to fail or messages which not ...
11883
How can you activate all ICF services for the PI systems?
11884
Given that modification adjustments for the ABAP Dictionary are being performed using transaction SPDD during a SAP system upgrade, which of the following statements are correct?
11885
For Integrated Planning, which of the following JCO destinations must be defined in the Web Dynpro Content Administrator of the J2EE Engine?
11886
By which Transaction code can you execute RTCCTOOL &amp;amp; RSECNOTE in the SAP system?
11887
Before which phase of the Support Package Implementation can you reset the queue if import aborts or fails?
11888
Which standard function is used to clear memory allocated by the malloc() function?
11889
Which of the following standard functions is used to close a file?
11890
Which of the following sets of conversion statements may result in the loss of data?
11891
Which of the following is not a valid mode for opening a file?
11892
Which of the following is not a string function?
11893
Which of the following is not a file related function?
11894
Which of the following is a function for formatting data in memory?
11895
Which of the following declarations of structures is/are valid? 1) struct node { int count; char *word; struct node next; ...
11896
Which function will you use to write a formatted output to the file?
11897
Which function will convert a string into an integer?
11898
Which function will convert a string into a double precision quantity?
11899
Which function returns the current pointer position within a file?
11900
Which function allocates memory and initializes elements to 0?
11901
Which file header is to be included for file handling in a C program?
11902
What would be printed on the standard output as a result of the following code snippet? char i = &amp;#39;A&amp;#39;; char *j; j = &amp;amp; i; *j = *j + 32; printf(&amp;quot;%c&amp;quot;,i);
11903
What would be printed on the standard output as a result of the following code snippet? #include&amp;lt;stdio.h&amp;gt; main() { unsigned char a=255; a = a+1; printf(&amp;quot;%d&amp;quot;,a); ret...
11904
What would be printed on the standard output as a result of the following code snippet? #define max(a, b) ((a) &amp;gt; (b)?(a):(b)) main() { int a=4; float b=4.5; printf(&amp;quot;%.2f &amp;quot;...
11905
What would be printed on the standard output as a result of the following code snippet? #define func(t, a, b) { t temp; temp=a; a=b; b=temp; } main() { int a=3, b=4; float c=4.5, d...
11906
What would be printed on the standard output as a result of the following code snippet? main() { int arr[10]; int a = sizeof(arr); printf(&amp;quot;%d &amp;quot;,a); return 0; }
11907
What would be printed on the standard output as a result of the following code snippet? main() { enum {red, green, blue = 6, white}; printf(&amp;quot;%d %d %d %d&amp;quot;, red, green, blue, white); return 0; }
11908
What would be printed on the standard output as a result of the following code snippet? main() { char *pmessage = &amp;quot;asdfgh&amp;quot;; *pmessage++; printf(&amp;quot;%s&amp;quot;, pmessage); return 0; }
11909
What would be printed on the standard output as a result of the following code snippet? main() { int u = 1, v = 3; printf(&amp;quot;%d %d&amp;quot;,u,v); funct1(&amp;amp;u,&amp;amp;v); printf(&amp;quot;%d %d &amp;quot;,u,v); } void func...
11910
What will be the output of the following program? #include &amp;lt;assert.h&amp;gt; main() { int n = 5; assert(n &amp;gt; 3); //statement 1 n = n+2; assert(n &amp;gt; 7);//statement 2 return 0; }
11911
What will be the output of following code? int main() { int i; i = 0; for (i = 1; i &amp;lt;2; i++) { i++; printf( &amp;quot;%d&amp;quot;, i ); continue; ...
11912
What will be printed on the standard output as a result of the following code snippet? void main() { int i,j,k; i=4; j=30; k=0; k=j++/i++; ++k; printf(&amp;quot;%d %d %d&amp;quot;,i,j,k); }
11913
What will be printed on the standard output as a result of the following code snippet? void main() { int num1 = 30, num2 = 4; float result; result = (float)(num1/num2); ...
11914
What will be printed on the standard output as a result of the following code snippet? void main() { char arr[] = {&amp;#39;R&amp;#39;,&amp;#39;A&amp;#39;,&amp;#39;M&amp;#39;}; printf(&amp;quot;%d&amp;quot;,strlen(arr)); }
11915
What will be printed on the standard output as a result of the following code snippet? void func() { static int i = 1; int j = 1; i++; j++; printf(&amp;quot;%d %d &amp;quot;,i,j); } vo...
11916
What is wrong with the following statement? int func();
11917
What is the output of the following program ? main() { int u = 1, v = 3; printf(&amp;quot;%d %d&amp;quot;,u,v); funct1(&amp;amp;u,&amp;amp;v); printf(&amp;quot; %d %d &amp;quot;,u,v); } void funct1(int *pu, int *pv) { *pu=0; *pv=0; re...
11918
What is the function to concatenate two strings?
11919
What does the argv[0] represent?
11920
Suppose there is a file a.dat which has to be opened in the read mode using the FILE pointer ptr1, what will be the correct syntax?
11921
Study the following code: int n = 2; int a[n]; What is the error in the above code?
11922
Study the following code where num is an integer array and n is the length of the array: for(i=0;i&amp;lt;n-1;i++) { for(j=i+1;j&amp;lt;n;j++) { ...
11923
Read the following two declaration statements. 1. #include &amp;lt;stdio.h&amp;gt; 2. #include &amp;quot;stdio.h&amp;quot; Which of the following statements pertaining to the above two statements are correct?
11924
Is the following statement correct? If not, why not? If yes, what is the size of the array? int array[][3] = { {1,2}, {2,3}, {3,4,2} };
11925
Identify the incorrect statement.
11926
Given the operators: 1) * 2) / 3) % What would be the order of precedence?
11927
Given the following array: int a[8] = {1,2,3,4,5,6,7,0}; what would be the output of printf(&amp;quot;%d&amp;quot;,a[4]); ?
11928
Given the following array: char books[][40]={ &amp;quot;The Little World of Don Camillo&amp;quot;, &amp;quot;To Kill a Mockingbird&amp;quot;, &amp;quot;My ...
11929
Given the following array declaration: int a[2][3][4] what would be the number of elements in array a?
11930
Which property would be used to get the UDID of UIDevice on iOS?
11931
Which one is true regarding integrating and using custom fonts in an iOS application?
11932
Which one is the best resolution for the following error? &amp;quot;A valid signing identity matching this profile could not be found in your keychain&amp;quot;
11933
Which of the following will set the font of UISegmentedControl?
11934
Which of the following will set an image on UIButton?
11935
Which of the following will return the device&amp;#39;s current location?
11936
Which of the following will change the placeholder text color in UITextField?
11937
Which of the following UILabel properties help adjust text within a UILabel?
11938
Which of the following properties would be used to draw a shadow under UIView?
11939
Which of the following is the correct way to transfer data from one view controller to another?
11940
Which of the following is the correct way to set UIButton&amp;#39;s Highlight Tint color programmatically?
11941
Which of the following is the correct way to set the Navigation Bar Color of the Tab Bar Configure Menu?
11942
Which of the following is the correct way to set the font size of UIButton title label?
11943
Which of the following is the correct way to print out stack/trace to the console/log in Cocoa application?
11944
Which of the following is the correct way to get the value of the first object of a NsMutableArray stored in another NsMutableArray?
11945
Which of the following is the correct way to check whether the view controller view is loaded or visible?
11946
Which of the following is the best way to add a UIToolbar above keyboard?
11947
Which of the following is the best practice to find an active internet connection?
11948
Which of the following is the best practice to find active internet connection?
11949
Which of the following is not an Open Source Framework/Library?
11950
Which of the following is not a valid UIGestureRecognizer?
11951
Which of the following is not a valid Touch method with respect to Cocoa Touch programming?
11952
Which of the following is not a valid MPVolumeView method?
11953
Which of the following is not a valid MKAnnotationView property?
11954
Which of the following is not a valid icon size for any iOS device (iPhone, iPod, iPad)?
11955
Which of the following is best JSON library to be used in iOS applications?
11956
Which of the following frameworks is needed to apply a border to an object?
11957
Which of the following framework is needed to round corners of UILabel?
11958
Which of the following font packages are supported by Cocoa-Touch?
11959
Which of the following correctly sets an image on UIButton?
11960
Which of the following correctly describes when the - (void)viewDidUnload method is called?
11961
Which of the following code samples will declare a variable inside a block in Objective-C?
11962
Which of the following allows it to determine if an application is running on iPhone, or if it&amp;#39;s running on an iPod Touch?
11963
Which method of Objective-C handles detecting the shake gesture on an iOS device?
11964
Which framework can be used to call SOAP web services in iOS applications?
11965
When does this behavior usually happen? &amp;quot;Xcode Message: finished running &amp;lt;my app&amp;gt;&amp;quot; on targeted device shows, but nothing happens
11966
What will be output of following code? NSLog(@&amp;quot;%.2f&amp;quot;,[[UIDevice currentDevice].systemVersion floatValue]);
11967
What property in info.plist handles the association of file types in an iPhone application?
11968
What is true about ARC and manual memory management?
11969
What is the use of performSelector in iOS?
11970
What is the maximum size of an iOS application?
11971
What is the difference between new and [[alloc]init] in iOS?
11972
What is the difference between assign and retain in Objective-C?
11973
What is the correct method to define a delegate object in an ARC Environment?
11974
What is the best way to show multiple lines text in the UILabel?
11975
What gets returned if XIB is not properly connected to a parent controller?
11976
What does the &amp;quot;strong&amp;quot; property attribute do?
11977
What does EXC_BAD_ACCESS signal received mean in Xcode?
11978
What does a &amp;quot;__block&amp;quot; type specifier mean?
11979
What could be the probable result if selector is unknown or undefined?
11980
Select which of the following is not UITableViewCellSelectionStyle values?
11981
Select all incorrect bundle ID(s):
11982
Is it possible to set multiple architecture from Build Settings tab in Xcode for a project?
11983
Is it possible to deploy beta build on any device?
11984
How can the application name of an iOS project be changed?
11985
How can it be detected if the app is running on an iPhone 5?
11986
How can an SMS be sent programmatically from the iPhone (iOS 4.0 or later)?
11987
With the two models Hive and Bee; when creating a belongs_to association from the Bee model to Hive, what is the foreign key generated on Bee?
11988
Which part of the MVC stack does ERB or HAML typically participate in?
11989
Which of the following will return a User object when used with a model which deals with a table named User?
11990
Which of the following will disable browser page caching in Rails?
11991
Which of the following validations in Rails checks for null fields?
11992
Which of the following statements is incorrect?
11993
Which of the following serves as a structural skeleton for all HTML pages created?
11994
Which of the following replaced the Prototype JavaScript library in Ruby on Rails as the default JavaScript library?
11995
Which of the following options, when passed as arguments, skips a particular validation?
11996
Which of the following options will disable the rendering of the view associated with a controller action?
11997
Which of the following options is used to create a form HTML in the erb files?
11998
Which of the following methods is used to check whether an object is valid or invalid?
11999
Which of the following items are stored in the models subdirectory?
12000
Which of the following is true about writing tests for a Ruby on Rails application?
12001
Which of the following is the default way that Rails seeds data for tests?
12002
Which of the following is the correct way to skip ActiveRecords in Rails 3?
12003
Which of the following is the correct way to rollback a migration?
12004
Which of the following is the correct way to know the Rails root directory path?
12005
Which of the following is the correct syntax for an input field of radio buttons in form_for?
12006
Which of the following is not true about log levels in Ruby on Rails?
12007
Which of the following is not a built-in Rails caching strategy used to reduce database calls?
12008
Which of the following HTML template languages are supported by Ruby?
12009
Which of the following correctly handles the currency field? A) add_column :items, :price, :decimal, :precision =&amp;gt; 8, :scale =&amp;gt; 2 B) add_money :items, :price, currency: { present: false }
12010
Which of the following controller actions (by default) are best suited to handle the GET HTTP request?
12011
Which of the following commands will test a particular test case, given that the tests are contained in the file test/unit/demo_test.rb, and the particular test case is test_one?
12012
Which of the following commands will clear out sample users from the development database?
12013
Which of the following commands adds the data model info to the model file?
12014
Which of the following code samples will get the index of |page| inside of a loop?
12015
Which of the following choices will write routes for the API versioning scenario described below? /api/users returns a 301 to /api/v2/users /api/v1/users returns a 200 of users index at version 1 ...
12016
Which of the following assertions are used in testing views?
12017
Which of the following actions is fired by default when a new controller is created?
12018
Which is the best way to add a page-specific JavaScript code in a Rails 3 app? &amp;lt;%= f.radio_button :rating, &amp;#39;positive&amp;#39;, :onclick =&amp;gt; &amp;quot;$(&amp;#39;some_div&amp;#39;).show();&amp;quot; %&amp;gt;
12019
Which gem is used to install a debugger in Rails 3?
12020
When using full-page caching, what happens when an incoming request matches a page in the cache?
12021
When a new controller named &amp;quot;admin2&amp;quot; is created, the JS and the CSS files are created in:
12022
What is the Singleton design pattern?
12023
What is the recommended Rails way to iterate over records for display in a view?
12024
What is the output of the following Ruby code? puts &amp;quot;The multiplication output of 10,10,2 is #{10*10*2}&amp;quot;
12025
What is the output of the following code? $val = 20 print &amp;quot;Sample Text &amp;quot; if $val
12026
What is the output of the following code? puts &amp;quot;aeiou&amp;quot;.sub(/[aeiou]/, &amp;#39;*&amp;#39;)
12027
What is the output of the following code? &amp;amp;quot;test&amp;amp;quot;*5
12028
What is the output of the following code in Ruby? x= &amp;quot;A&amp;quot; + &amp;quot;B&amp;quot; puts x y= &amp;quot;C&amp;quot; &amp;lt;&amp;lt; &amp;quot;D&amp;quot; puts y
12029
What is the difference between :dependent =&amp;gt; :destroy and :dependent =&amp;gt; :delete_all in Rails?
12030
What is the difference between _url and _path while being used in routes?
12031
What is the convention for methods which end with a question mark? e.g. #all?, #kind_of?, directory?
12032
What is the best way to get the current request URL in Rails?
12033
What is the behavior of class variables with subclasses?
12034
What is output of following statements? 1) &amp;quot;&amp;quot;.nil? == &amp;quot;&amp;quot;.empty? &amp;amp;&amp;amp; &amp;quot;&amp;quot;.blank? == &amp;quot;&amp;quot;.empty? 2) !&amp;quot;&amp;quot;.nil? == &amp;quot;&amp;quot;.empty? &amp;amp;&amp;amp; &amp;quot;&amp;quot;.blank? == &amp;quot;&amp;quot;.empty? 3) nil.nil? == nil.empty? &amp;amp;&amp;amp; nil.blank? == nil.empty? 4)...
12035
What is green-threading?
12036
What is difference between &amp;quot;has_one&amp;quot; and &amp;quot;belong_to&amp;quot;?
12037
What is best way to create primary key as a string field instead of integer in rails.
12038
What exception cannot be handled with the rescue_from method in the application controller? e.g class ApplicationControllers &amp;lt; ActionController::Base rescue_from Exception, with: error_handler ...
12039
What does the 4xx series of HTTP errors represent?
12040
What does REST stand for?
12041
What declaration would you use to set the layout for a controller?
12042
What component of Rails are tested with unit tests?
12043
Using ERB for views, what filename should be given to a partial called &amp;#39;login&amp;#39;?
12044
Users who are new to MVC design often ask how to query data from Views. Is this possible? And if so, is this a good idea?
12045
Unit tests are used to test which of the following components of Ruby on Rails?
12046
There is a table named Product in a Rails application. The program is required to fetch any 5 rows where the productid is 2. Which of the following is the correct option to perform this action?
12047
The =~ operator is used to do inline Regular Expression matching, for instance: &amp;quot;function&amp;quot; =~ /fun/ &amp;quot;function&amp;quot; =~ /dinosaurs/ What are possible return values for the =~ matcher?
12048
Suppose a model is created as follows: rails generate model Sales rake db:migrate What would be the best way to completely undo these changes, assuming nothing else has changed in the mean...
12049
Select all incorrect statements regarding the Ruby Version Manager (RVM):
12050
Rails automatically requires certain files in an application. Which of the following files are automatically included without an explicit &amp;#39;require&amp;#39; being necessary?
12051
Is an AJAX call synchronous or asynchronous?
12052
In the case of Rails application performance optimization, select all valid ways to do assets compilation:
12053
In order to enable locking on a table, which of the following columns is added?
12054
In a Rails Migration, which of the following will make a column unique, and then have it indexed?
12055
In a Rails application, the developmental and production configuration are stored in the:
12056
In a Rails application, a Gemfile needs to be modified to make use of sqlite3-ruby gems. Which of the following options will use these gems, as per the new Gemfile?
12057
In a has_many association, what is the difference between build and new? // user.rb has_many :posts // post.rb belongs_to :user
12058
If a model called BlogComment is defined, what would its DB table be called?
12059
If a method #decoupage(n) is described as O(n^2), what does that mean?
12060
If a float is added to an integer, what is the class of the resulting number? i.e. 1.0 + 2
12061
If a controller is named &amp;quot;Users&amp;quot;, what would its helpers module be called?
12062
How can a value be stored so that it&amp;#39;s shared across an entire request (i.e. make it accessible in controllers, views and models)?
12063
How can a partial called &amp;quot;cart&amp;quot; be rendered from a controller called &amp;quot;ProductsController&amp;quot;, assuming the partial is in a directory called &amp;quot;shared&amp;quot;?
12064
Given the following code, where is the &amp;quot;party!&amp;quot; method available? module PartyAnimal def self.party! puts &amp;quot;Hard! Better! Faster! Stronger!&amp;quot; end end class Person include PartyA...
12065
Given below are two statements regarding the Ruby programming language: Statement X: &amp;quot;redo&amp;quot; restarts an iteration of the most internal loop, without checking loop condition. Statement Y: &amp;quot;retry&amp;quot; r...
12066
For the String class, what&amp;#39;s the difference between &amp;quot;#slice&amp;quot; and &amp;quot;#slice!&amp;quot;?
12067
Consider the following information for a User view: user_path named route with value &amp;quot;/users/&amp;quot; @user = 1 Now, consider the following code in the HTML erb template: &amp;lt;%= link_to user_path(@user)...
12068
Consider the following code snippet: def index render end The corresponding index.html.erb view is as following: &amp;lt;html&amp;gt; &amp;lt;head&amp;gt; &amp;lt;title&amp;gt;Ruby on Rails sample application | &amp;lt;%=@title%&amp;gt;&amp;lt;/title&amp;gt; ...
12069
Choose the best way to implement sessions in Rails 3: A) Using CookieStore B) By creating a session table and setting config/initializers/session_store.rb with Rails.application.config.session_sto...
12070
Which of the following is the correct way to move an element into another element?
12071
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;form id=&quot;form1&quot;&amp;gt; &amp;lt;input type=&quot;text&quot; id=&quot;text1&quot; value=&quot;default&quot; /&amp;gt; &amp;lt;input type=&quot;text&quot; name=&quot;email&quot; /&amp;gt; &amp;lt;/form&amp;gt; &amp;lt;script type=&quot;text/javascript&quot;&amp;gt; function submitForm1() { alert($(&#039;#form1&#039;).serialize()); } &amp;lt;/script&amp;gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;What does the alert box display when the function submitForm1 is called?&lt;/p&gt;
12072
Which option is correct to use the below function to set cursor position for textarea? Function: $.fn.selectRange = function(start, end) { return this.each(function() { if (this.setSelectionRange) { this.focus(); this.setSelectionRange(start, end); } else if (this.createTextRange) { var range = this.createTextRange(); range.collapse(true); range.moveEnd(&#039;character&#039;, end); range.moveStart(&#039;character&#039;, start); range.select(); } }); };
12073
The css() function allows you to ___.
12074
Which of the following is the correct way to check the existence of an element in jQuery other than the following code? if ($(selector).length&amp;gt;0) { // Do something }
12075
Which of the following functions moves p tags that have para class to div with content id?
12076
Which of the following is the correct way to refresh a page with jQuery?
12077
Which of the following is the best method for adding options to a select from a JSON object using jQuery?
12078
How can an additional row be added to a table as the last row using jQuery?
12079
Which of the following is the correct way to use jQuery with node.js?
12080
Which of the following will make the background of a page change, upon being refreshed?
12081
Which of the following statements returns the number of matched elements of $(&#039;.class1&#039;)?
12082
How can jQuery be used or optimized in such a way that the web applications can become richer and more functional?
12083
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;$.map(array1, function1);&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;Which of the following arguments is/are valid arguments of function1?&lt;/p&gt;
12084
Which of the following is the correct way to get &quot;Option B&quot; with the value &#039;2&#039; from following HTML code in jQuery? &amp;lt;select id=&#039;list&#039;&amp;gt; &amp;lt;option value=&#039;1&#039;&amp;gt;Option A&amp;lt;/option&amp;gt; &amp;lt;option value=&#039;2&#039;&amp;gt;Option B&amp;lt;/option&amp;gt; &amp;lt;option value=&#039;3&#039;&amp;gt;Option C&amp;lt;/option&amp;gt; &amp;lt;/select&amp;gt;
12085
$.grep(array1, function1); The above statement ___ the elements of array1 array which satisfy function1 function.
12086
Which of the following is the correct way to check which key was pressed?
12087
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;div id=&#039;id1&#039;&amp;gt; &amp;lt;div id=&#039;id2&#039;&amp;gt;Div 2&amp;lt;/div&amp;gt; &amp;lt;/div&amp;gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;Which of the following tags is/are in the result of $(&#039;#id2&#039;).parents();?&lt;/p&gt;
12088
Which of the following is the correct way to do the following JavaScript Code with jQuery? var d = document; var odv = d.createElement(&quot;div&quot;); odv.style.display = &quot;none&quot;; this.OuterDiv = odv; var t = d.createElement(&quot;table&quot;); t.cellSpacing = 0; t.className = &quot;text&quot;; odv.appendChild(t);
12089
Which of the following is the correct way to select &amp;lt;a&amp;gt; on the basis of href using jQuery?
12090
Which of the following is the best way to open a jQuery UI dialog box without a title bar?
12091
Which of the following is the correct way to distinguish left and right mouse click event in jQuery?
12092
Which of the following is the correct way to assign a selected value of a drop-down list using jQuery?
12093
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;$(&#039;#id1&#039;).animate({width:&quot;240px&quot;}, &quot;slow&quot;).animate({height:&quot;320px&quot;}, &quot;fast&quot;);&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;The order of the animations of this code snippet is:&lt;/p&gt;
12094
Using an element of some kind that is being hidden using .hide() and shown via .show(). Which of the following is the best way to determine if that element is currently hidden or visible on the screen?
12095
$.merge(array1, array2); The above function merges ___.
12096
Which of the following values is/are valid argument(s) of the eq() function?
12097
Which of the following methods can be used to load data?
12098
Consider having multiple $(document).ready() functions in one or many linked JavaScript files. Given this information, which of the following will be executed?
12099
Which of the following is correct with regards to how to upload a file asynchronously with jQuery?
12100
Which of the following makes use of jQuery to select multiple elements?
12101
How or where can a plugin be declared, so that the plugin methods are available for the script?
12102
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;var message = &#039;Message&#039;; $(&#039;#id1&#039;).bind(&#039;click&#039;, function() { alert(message); }); message = &#039;New message&#039;; $(&#039;#id2&#039;).bind(&#039;click&#039;, function() { alert(message); });&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;What does the alert box display if &quot;id1&quot; is clicked?&lt;/p&gt;
12103
Which of the following functions will return an empty set when end() function is chained right after that function?
12104
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;$(&#039;#ul1 li&#039;).live(&#039;click&#039;, function1); $(&#039;#ul1&#039;).after(&#039;&amp;lt;li id=&quot;lastLi&quot;&amp;gt;Last item&amp;lt;/li&amp;gt;&#039;);&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;Is &lt;code&gt;function1&lt;/code&gt; executed if &lt;code&gt;lastLi&lt;/code&gt; is clicked?&lt;/p&gt;
12105
&lt;p&gt;Which of the following will select a particular option in a &lt;code&gt;&amp;lt;select&amp;gt;&lt;/code&gt; element using its index?&lt;/p&gt;
12106
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;ul id=&#039;id1&#039;&amp;gt; &amp;lt;li id=&#039;li1&#039;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&#039;li2&#039;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&#039;li3&#039;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;Which of the following code snippets returns the same result as &lt;code&gt;$(&#039;#id1 li&#039;).not($(&#039;#li2&#039;));&lt;/code&gt;?&lt;/p&gt;
12107
Whats the right way to access the contents of an iframe using jQuery?
12108
&lt;p&gt;Consider the following code snippet:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;ul id=&#039;id1&#039;&amp;gt; &amp;lt;li id=&#039;li1&#039;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&#039;li2&#039;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&#039;li3&#039;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;Which of the following code snippets return(s) a set of all &lt;code&gt;li&lt;/code&gt; tags within &lt;code&gt;id1&lt;/code&gt; except for the &lt;code&gt;li&lt;/code&gt; tag with id &lt;code&gt;li2&lt;/code&gt;?&lt;/p&gt;
12109
Which option is correct to perform a synchronous AJAX request?
12110
Which option can be used to have jQuery wait for all images to load before executing something on a page?
12111
Which of the following will show an alert containing the content(s) of a database selection?
12112
Which of the following will get the first column of all tables using jQuery?
12113
Which of the following values is/are valid value(s) of secondArgument in addClass(&amp;#39;turnRed&amp;#39;, secondArgument); function, if the jQuery UI library is being used?
12114
Which of the following returns the children tags of &amp;quot;id1&amp;quot;?
12115
Which of the following represents the best way to make a custom right-click menu using jQuery?
12116
Which of the following methods can be used to utilize the animate function with the backgroundColor style property?
12117
Which of the following methods can be used to copy element?
12118
Which of the following is the correct way to select an option based on its text in jQuery?
12119
Which of the following is the correct way to manage a redirect request after a jQuery Ajax call?
12120
Which of the following is the correct way to get the value of a textbox using id in jQuery?
12121
Which of the following is the correct way to get &amp;quot;Option B&amp;quot; with the value &amp;#39;2&amp;#39; from following HTML code in jQuery? &amp;lt;select id=&amp;#39;list&amp;#39;&amp;gt; &amp;lt;option value=&amp;#39;1&amp;#39;&amp;gt;Option A&amp;lt;/option&amp;gt; &amp;lt;option value=&amp;#39;2&amp;#39;&amp;gt;O...
12122
Which of the following is the correct way to disable an input field with jQuery?
12123
Which of the following is the correct way to debug JavaScript/jQuery event bindings with Firebug or a similar tool?
12124
Which of the following is the correct way to change the image source during click event of a button in jQuery?
12125
Which of the following is the correct way to add an additional option and select it with jQuery?
12126
Which of the following is the correct use of ajaxStart() function?
12127
Which of the following gets the href attribute of &amp;quot;id1&amp;quot;?
12128
Which of the following functions is/are built-in jQuery regular expression function(s)?
12129
Which of the following functions can be used to stop event propagation?
12130
Which of the following events can be used to disable right click contextual menu?
12131
Which of the following code snippets insert(s) the code snippet &amp;lt;font size=2&amp;gt;&amp;lt;div class=&amp;quot;footer&amp;quot;&amp;gt;footer&amp;lt;/div&amp;gt;&amp;lt;/font&amp;gt; at the end of div tags?
12132
Which of the following code snippets insert(s) the code snippet &amp;lt;div class=&amp;quot;footer&amp;quot;&amp;gt;footer&amp;lt;/div&amp;gt; at the end of div tags?
12133
What is the result of this function: jQuery.makeArray ( true )?
12134
What is the result of NaN == NaN?
12135
What is the purpose of $(document).ready() function in Jquery?
12136
What does $(&amp;#39;tr.rowClass:eq(1)&amp;#39;); return?
12137
Using an element of some kind that is being hidden using .hide() and shown via .show(). Which of the following is the best way to determine if that element is currently hidden or visible on the sc...
12138
The position function gets the ___ positions of an element that are relative to its offset parent.
12139
The hide() function hides an element by ___.
12140
The height function returns the height of an element in ___.
12141
One advantage of $.ajax function over $.get or $.post is that ___.
12142
offset function gets the current offset of the first matched element in pixels relative to the ___.
12143
jQuery allows you to use ___ function to switch between showing and hiding an element.
12144
jQuery allows simulating an event to execute an event handler as if that event has just occurred by using ___.
12145
If jQuery is included before another library, how can conflict between jQuery and that library be avoided?
12146
How can the href for a hyperlink be changed using jQuery?
12147
How can the child img be selected inside the div with a selector?
12148
How can an Ajax request that has not yet received a response be canceled or aborted?
12149
each() is a generic ___ function.
12150
Consider the following code snippet: $(document).ready(function1); $(document).ready(function2); $(document).ready(function3); Which of the following functions are executed when DOM is ready?
12151
Consider the following code snippet: $(&amp;#39;span.item&amp;#39;).each(function (index) { $(this).wrap(&amp;#39;&amp;lt;li&amp;gt;Item&amp;lt;/li&amp;gt;&amp;#39;); }); What does this code snippet do?
12152
Consider the following code snippet: $(&amp;#39;a.arrow-1&amp;#39;).click(function () { $(&amp;#39;.second-row&amp;#39;).slideUp(); $(this).parent(&amp;#39;.first-row&amp;#39;).siblings(&amp;#39;.second-row&amp;#39;).slideDown(); }); The order of the a...
12153
Consider the following code snippet: $(&amp;#39;#id1&amp;#39;).animate({width:&amp;quot;240px&amp;quot;}, { queue:false, duration:1000 }).animate({height:&amp;quot;320px&amp;quot;}, &amp;quot;fast&amp;quot;); The order of the animations of this code snippet is ___.
12154
Consider the following code snippet: $(&amp;#39;#button1&amp;#39;).bind(&amp;#39;click&amp;#39;, function(data) {...}); What is the data argument?
12155
Consider the following code snippet: &amp;lt;ul id=&amp;#39;id1&amp;#39;&amp;gt; &amp;lt;li id=&amp;#39;li1&amp;#39;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li2&amp;#39;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li3&amp;#39;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt; Which of the following code snippets returns the same re...
12156
Consider the following code snippet: &amp;lt;ul id=&amp;#39;id1&amp;#39;&amp;gt; &amp;lt;li id=&amp;#39;li1&amp;#39;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li2&amp;#39;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li3&amp;#39;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt; Which of the following code snippets return(s) a set of ...
12157
Consider the following code snippet: &amp;lt;font size=2&amp;gt; &amp;lt;ul id=&amp;#39;id1&amp;#39;&amp;gt; &amp;lt;li id=&amp;#39;li1&amp;#39;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li2&amp;#39;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li3&amp;#39;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt; &amp;lt;/font&amp;gt; Which of the following code snippe...
12158
Consider the following code snippet: $(document).ready(function() { $(&amp;#39;div&amp;#39;).each(function(index) { alert(this); }); }); Which of the following objects does the &amp;#39;this&amp;#39; variable refer to?
12159
Consider the following code snippet: $(&amp;#39;#table1&amp;#39;).find(&amp;#39;tr&amp;#39;).filter(function(index) { return index % 3 == 0}).addClass(&amp;#39;firstRowClass&amp;#39;); The result of the above code snippet is ___.
12160
Consider the following code snippet: $(&amp;#39;#id1&amp;#39;).animate({width:&amp;quot;240px&amp;quot;}, { queue:false, duration:1000 }).animate({height:&amp;quot;320px&amp;quot;}, &amp;quot;fast&amp;quot;); The order of the animations of this code snippet is ___.
12161
Consider the following code snippet: $(&amp;#39;#ul1 li&amp;#39;).live(&amp;#39;click&amp;#39;, function1); $(&amp;#39;#ul1&amp;#39;).after(&amp;#39;&amp;amp;#60;li id=&amp;quot;lastLi&amp;quot;&amp;amp;#62;Last item&amp;amp;#60;/li&amp;amp;#62;&amp;#39;); Is function1 executed if &amp;quot;lastLi&amp;quot; is clicked?
12162
Consider the following code snippet: $(&amp;#39;#button1&amp;#39;).bind(&amp;#39;click&amp;#39;, function(data) {...}); What is the data argument?
12163
Consider the following code snippet: &amp;lt;ul id=&amp;#39;id1&amp;#39;&amp;gt; &amp;lt;li id=&amp;#39;li1&amp;#39;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li2&amp;#39;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li3&amp;#39;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt; Which of the following code snippets returns the...
12164
Consider the following code snippet: &amp;lt;font size=2&amp;gt; &amp;lt;ul id=&amp;#39;id1&amp;#39;&amp;gt; &amp;lt;li id=&amp;#39;li1&amp;#39;&amp;gt;Items 1&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li2&amp;#39;&amp;gt;Items 2&amp;lt;/li&amp;gt; &amp;lt;li id=&amp;#39;li3&amp;#39;&amp;gt;Items 3&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt; &amp;lt;/font&amp;gt; Which of the following c...
12165
Assuming that the jQuery UI library is used to make a list sortable, which of the following code snippets makes &amp;quot;list1&amp;quot; sortable?
12166
Assume that you want that first the tag with &amp;quot;id1&amp;quot; fades out and then the tag with &amp;quot;id2&amp;quot; fades in. Which of the following code snippets allow(s) you to do so?
12167
$(&amp;quot;div&amp;quot;).find(&amp;quot;p&amp;quot;).andSelf().addClass(&amp;quot;border&amp;quot;); The statement adds class border to ___.
12168
$(&amp;quot;div&amp;quot;).find(&amp;quot;p&amp;quot;).andSelf().addClass(&amp;quot;border&amp;quot;); The statement adds class border to ___.
12169
$(&amp;#39;#id1&amp;#39;).animate({width:&amp;quot;80%&amp;quot;}, &amp;quot;slow&amp;quot;) The above code snippet will ___.
12170
$(&amp;#39;#a1&amp;#39;).one(&amp;#39;click&amp;#39;, {times: 3}, function1); Which of the following is true for the above?
12171
You don&amp;#39;t have any database recovery/backup system in place. Which of the following statements is true with regard to committed and uncommitted data of your entity bean?
12172
You define an enterprise bean as follows: Public class CalcSessionBean implements javax.ejb.SessionBean Which of the following method definitions is not mandatory?
12173
You are working with EJB2.0. You have to retrieve a previously saved handle to an EJBObject named &amp;#39;bookEJBObject.&amp;#39; In order to restart the processing for that particular request, you need to get th...
12174
Which of the following transaction modes are supported by Enterprise Java Beans?
12175
Which of the following statements is not correct with regard to relationships in EJB?
12176
Which of the following statements is not correct with regard to Passivation of beans?
12177
Which of the following statements is not correct for an Enterprise Java Bean?
12178
Which of the following statements is incorrect with regard to the process of Instance Pooling in EJB?
12179
Which of the following statements is correct with regard to the method ejbSelect()?
12180
Which of the following statements is correct with regard to JavaBeans and Enterprise JavaBeans?
12181
Which of the following statements is correct with regard to entity, session, and message-driven beans?
12182
Which of the following statements is correct with regard to &amp;#39;poison&amp;#39; message?
12183
Which of the following statements are correct with regard to EJB QL?
12184
Which of the following services does EJB container provide to a bean?
12185
Which of the following services does an EJB Server/Container provides to EJB?
12186
Which of the following must be implemented by a JMS message-driven bean?
12187
Which of the following methods should be invoked by the container to get a bean back to its working state?
12188
Which of the following is not implemented by a stateless session bean?
12189
Which of the following is a name of the design pattern not associated with EJB?
12190
Which of the following is a language in which IDL compiler of CORBA generates proxies and skeletons?
12191
Which of the following constitute the enhancements made to EJB 2.0?
12192
What will happen to the running session beans if the EJB container crashes or restarts?
12193
What is the restriction that EJB specification imposes on CMP fields?
12194
What are the three classes that a Session EJB class must provide?
12195
We are saving a handle to an EJBObject named &amp;#39;bookEJBObject&amp;#39; for an online book shop: 1. javax.ejb.Handle bookHandle = _____________; 2. 3. ObjectOutputStream stream = 4. new Objec...
12196
To disable the Passivaton process, set the EJBPassivationTimeout() variable to zero.
12197
The transaction attribute of a bean is set to &amp;#39;TX_REQUIRES_NEW.&amp;#39; What do you infer about its behavior?
12198
The principal finder method that must be implemented by every entity bean class is:
12199
The PrimaryKey class is used to provide each entity bean with a ____________:
12200
The methods declared in Session Bean interface are known as Callback (methods).
12201
The method ejbCreate() allows session beans to perform initializations. Which of the following methods should be called by the container before ejbCreate()?
12202
The interface that must be implemented by a stateless session bean is javax.ejb.SessionBean.
12203
The following method signature is found in an implemented entity bean named &amp;#39;CustomerBean.&amp;#39; &amp;#39;CustomerPK&amp;#39; is a class representing the primary key. public CustomerPK ejbFindByPrimaryKey(CustomerPK k...
12204
The EJB specification defines six distinct roles in the application development and deployment life cycle. Which of the following roles is not mentioned in it?
12205
SessionSynchronization Interface must be implemented to reset the instance variables.
12206
One of the methods of your entity bean retrieves the names of all the patients admitted in a particular ward of a hospital. Using a connection named &amp;#39;con&amp;#39;, you want to execute the following query: ...
12207
How do Enterprise Java Beans access the database?
12208
Database connection pooling is beneficial because:
12209
By interoperating via IIOP, an EJB can directly access:
12210
Both RMI and CORBA define messaging protocols called:
12211
An online shop employs a stateless session bean (named &amp;#39;Eshop&amp;#39;) to process the requests. &amp;#39;Eshop&amp;#39; uses a declarative transaction management system. The following code is from the xml deployment desc...
12212
An online medical shop uses Container Managed persistent beans for its operations. An OrderBean uses a query to list all the orders where payable amount is more than $800. The XML query tag in the ...
12213
A pre-cached instance is used to load state information on creation of an EJB.
12214
A heavy tool manufacturing company manages its business and production by using enterprise beans. A session bean named &amp;#39;Status&amp;#39; is used to get the production status for the day. The following code ...
12215
X.509 version 3 specifies which of the following?
12216
With regard to the destroy lifecycle method, identify the correct statements about its purpose or about how and when it is invoked.
12217
Why can&amp;#39;t a Graphics object be created using the following statement? Graphics g = new Graphics();
12218
Which statements are true? Select all true statements.
12219
Which statements are true regarding ServletContext Init Parameters in the deployment descriptor?
12220
Which statement is true regarding ServletContext Initialization Parameters in the deployment descriptor?
12221
Which statement is true about the given code? public class Test78 { public static void main(String[] args) throws Exception { new JBean().setHeight(1).setWidth(2).setDepth(...
12222
Which sequence will be printed when the following program is run? import java.util.*; public class Test { public static void main(String str[]) { List l = new ArrayList(); l.add(&amp;#39;&amp;#39;1&amp;#39;&amp;#39;); ...
12223
Which option lists Java access modifiers in the right order from the most permissive to the most restrictive?
12224
Which option could be used to see additional warnings about code that mixes legacy code with code that uses generics?
12225
Which of these is not an event listener adapter defined in the java.awt.event package?
12226
Which of these interfaces is the most applicable when creating a class that associates a set of keys with a set of values?
12227
Which of these interfaces are used by implementations of models for JTable?
12228
Which of the following transaction modes are supported by Enterprise Java Beans?
12229
Which of the following symbols are metacharacters supported by the java.util.regex API?
12230
Which of the following statements regarding abstract classes are true?
12231
Which of the following statements is true?
12232
Which of the following statements is true of the HashMap class?
12233
Which of the following require explicit try/catch exception handling by the programmer?
12234
Which of the following methods should be invoked by the container to get a bean back to its working state?
12235
Which of the following methods can be used for reporting a warning on a Connection object, Statement object &amp;amp; ResultSet object?
12236
Which of the following methods are members of the Vector class and allow you to input a new element?
12237
Which of the following JDBC methods is used to retrieve large binary objects?
12238
Which of the following is the name of the cookie used by Servlet Containers to maintain session information?
12239
Which of the following is the correct syntax for suggesting that the JVM perform garbage collection?
12240
Which of the following is the correct syntax for creating a Session object?
12241
Which of the following is false?
12242
Which of the following is a well-known HTTP port?
12243
Which of the following interfaces makes it possible for Java to save an object to a file and turn it into a data stream?
12244
Which of the following illustrates correct synchronization syntax?
12245
Which of the following code snippets will take transform input string &amp;quot;2012/06/05&amp;quot; to output string &amp;quot;05 - 06 - 2012&amp;quot;?
12246
Which of the following code snippets will generate five random numbers between 0 and 200?
12247
Which of the following cannot apply to constructors?
12248
Which of the following are valid ways to define a thread in Java?
12249
Which of the following are the methods of the Thread class?
12250
Which method is called by the servlet container just after the servlet is removed from service?
12251
Which method in the HttpServlet class corresponds to the HTTPPUT method?
12252
Which is a proper way to declare and throw exception of class XYException?
12253
Which exception must a setter of a constrained JavaBean property throw to prevent the property value from changing?
12254
Which distributed object technology is most appropriate for systems that consist of objects written in different languages and that execute on different operating system platforms?
12255
Which distributed object technology is most appropriate for systems that consist entirely of Java objects?
12256
Which design pattern reduces network traffic by acting as a caching proxy of a remote object?
12257
Which class contains a method to create a directory?
12258
What would happen on trying to compile and run the following code? class House { public final void MaintainMethod() { System.out.println(&amp;quot;MaintainMethod&amp;quot;); } } public class Building extends...
12259
What would be the result of compiling and running the following code class? public class Test { public static void main(String args[]) { Test t = new Test(); t.start(); } public void sta...
12260
What will be the output, if the following program is run? public class Test8 { public static void main(String[] args) { System.out.println(Math.sqrt(-4)); } }
12261
What will be the output when this code is compiled and run? public class Test { public Test() { Bar b = new Bar(); Bar b1 = new Bar(); update(b); update(b1); ...
12262
What will be the output when this code is compiled and run? public class Test { public Test() { Bar b = new Bar(); Bar b1 = new Bar(); update(b); update(b1); b1 = b; update(b); up...
12263
What will be the output of this program? public class Test { public static void main(String args[]) { int a, b; a = 2; b = 0; System.out.println(g(a, new int[] { b })); } public stat...
12264
What will be the output of the following code? public class MyTest { public static void main(String[] args) { for (int i=0; i &amp;gt; 10; i+=2) { System.out.println(i); }...
12265
What should be the replacement of &amp;quot;//ABC&amp;quot; in the following code? class Krit { String str= new String(&amp;quot;OOPS !!! JAVA&amp;quot;); public void KritMethod(final int iArgs) { int iOne; c...
12266
What protocol is used by the DatagramSocket class?
12267
What is the term to describe a situation where two or more threads are blocked forever, waiting for each other?
12268
What is the result of an attempt to compile and run the given program? public class Test107 { public static void main(String[] args) { System.out.println(test()); }...
12269
What is the output of the given program? public class Test97 { public static void main(String[] args) { int[][] a = new int[2][2]; System.out.println(a.leng...
12270
What is the output of the given program? public class Test93 { private int x = 0; public static void main(String[] args) { new Test93().test(); } ...
12271
What is the output of the given program? public class Test89 { public static void main(String[] args) { T x = new T(&amp;quot;X&amp;quot;, null); x.start(); T y = new T(&amp;quot;Y&amp;quot;, ...
12272
What is the output of the given program? public class Test89 { public static void main(String[] args) { T x = new T(&amp;quot;&amp;quot;X&amp;quot;&amp;quot;, null); x.start(); T y = new T(&amp;quot;&amp;quot;Y...
12273
What is the output of the given program? public class Test130 { public static void main(String[] args) { A a = new A2(); B b = new B2(); Sys...
12274
What is the output of the given program? public class Test129 { public static void main(String[] args) { A a = new A2(); B b = new B2(); Sys...
12275
What is the output of the given program? public class Test120 extends _Test120 { { System.out.print(&amp;quot;_INIT&amp;quot;); } static { System.out.print(&amp;quot;_...
12276
What is the output of the given program? public class Test118 extends _Test118 { { System.out.print(&amp;quot;_INIT&amp;quot;); } static { System.out.print(&amp;quot;_...
12277
What is the output of the given program? public class Test106 { public static void main(String[] args) { Integer x = 0; Integer y = 0; Integ...
12278
What is the output of the given console application? public class Test31 { public static void main(String[] args) { test(); } public static void test() { ...
12279
What is the output of the given console application? public class Test19 { public static void main(String[] args) { final int X = 9; int[][] a = {{5, 4, 3},...
12280
What is the output of the given code? public class Test15 { public static void main(String[] args) { VO a = new VO(2); VO b = new VO(3); swa...
12281
What exception is thrown by this code, if arr[j]&amp;gt;arr[j+1]: public static void main(String[] args) { int []arr={12,23,43,34,3,6,7,1,9,6}; { int temp; for ...
12282
There are three classes named A, B, and C. The class B is derived from class A and class C is derived from B. Which of the following relations are correct for the given classes?
12283
The transaction attribute of a bean is set to &amp;#39;TX_REQUIRES_NEW.&amp;#39; What can be inferred about its behavior?
12284
The principal finder method that must be implemented by every entity bean class is:
12285
The JDK comes with a special program that generates skeleton and stub objects that is known as:
12286
The following code was written to save a handle to an EJBObject named &amp;#39;bookEJBObject&amp;#39; for an online book shop: javax.ejb.Handle bookHandle = _____________; ObjectOutputStream stream = new ObjectO...
12287
SQLException has a feature of chaining - identify the right code to execute the same from the following options:
12288
Select all true statements:
12289
Select all correct statements:
12290
RMI allows remote communication between:
12291
JDBC is based on:
12292
In which class is the notify method defined?
12293
How many objects are created in the given code? Object x, y, z; x = new Object(); y = new Object();
12294
How many objects are created in the given code? Object x, y, z; x = new Object(); y = new Object()
12295
How many objects are created by the following code? Object a, b, c, d, e; e = new Object (); b = a = e; e = new Object ();
12296
How does the set collection deal with duplicate elements?
12297
Conventionally, which directory do servlet class files get placed on?
12298
Consider the following code: public static void main(String bicycle[]) { System.out.println(bicycle[0]); } What would be the result if &amp;quot;java TwoTyre one two&amp;quot; is entered in the command line?
12299
Consider the following code: public class Jam { public void apple(int i, String s) { } //ABC } Choose possible valid code replacements of &amp;quot;//ABC&amp;quot; among the choices:
12300
Choose all valid forms of the argument list for the FileOutputStream constructor shown below:
12301
Assuming the servlet method for handling HTTPGET requests is doGet(HttpServletRequest req, HTTPServletResponse res), how can the request parameter in that servlet be retrieved?
12302
Assuming that val has been defined as an int for the code below, which values of val will result in &amp;quot;Test C&amp;quot; being printed? if( val &amp;gt; 4 ) { System.out.println(&amp;quot;Test A&amp;quot;); } else if( val &amp;gt; 9 ) { ...
12303
As part of the type erasure process, when compiling a class or interface that extends a parameterized class or implements a parameterized interface, the compiler may need to create a synthetic meth...
12304
You have placed an order by Amazon Fulfillment Web Service and want to cancel the order. The order can&amp;#39;t be canceled if the FulfillmentOrderStatus is:
12305
You are going to create an Amazon Mechanical Turk HIT. Which of the following parameters are required in the request?
12306
With regard to Amazon EC2, the amount of CPU that is allocated to a particular instance is expressed in terms of:
12307
With regard to Amazon EC2, do volumes need to be un-mounted in order to take a snapshot?
12308
With reference to the Amazon Fulfillment Web Service, what are inbound APIs used for?
12309
With reference to the Amazon Flexible Payment Service, for how many days is a Reserve authorization valid?
12310
Which type of AWS requests do not require Access Key ID authentication?
12311
Which of the following, defines the term EC2 Amazon Machine Images?
12312
Which of the following Use Cases belong to Inbound FWS APIs?
12313
Which of the following statements is not correct with regard to Elastic Block Store?
12314
Which of the following statements is not correct with regard to Amazon Simple Storage Service (Amazon S3)?
12315
Which of the following statements are true with regard to the Amazon Mechanical Turk Notifications?
12316
Which of the following parameters are mandatory for the InstallPaymentInstruction operation of the Amazon Flexible Payment Service?
12317
Which of the following is not related to the RebootInstances Operation of EC2?
12318
Which of the following is correct if CNAME is empty in Amazon CloudFront service? 1.&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt; &amp;lt;DistributionConfig xmlns=&amp;quot;http://cloudfront.amazonaws.com/doc/2008-06-30...
12319
Which of the following are the types of Grantee, that can access a bucket or an object of Amazon S3?
12320
Which of the following Amazon EC2 Operations doesn&amp;#39;t require the PublicIP as a request parameter?
12321
What will the Amazon S3 PutObjectInline operation do if an object already exists in a bucket?
12322
What will be the value of the Action attribute of the form where the bucket name is johnsmith? Example: &amp;lt;form action=&amp;quot;???????&amp;quot; method=&amp;quot;post&amp;quot; enctype=&amp;quot;multipart/form-data&amp;quot;&amp;gt;..&amp;lt;/form&amp;gt;
12323
What is the function of the RetryTransaction operation of the Amazon Flexible Payment Service?
12324
What is the function of the approveWork command in Amazon Mechanical Turk?
12325
What does the following Mechanical Turk web service request do? http://mechanicalturk.amazonaws.com/?Service=AWSMechanicalTurkRequester &amp;amp;AWSAccessKeyId=[tHe Requester&amp;#39;s Access Key ID] &amp;amp;Version=200...
12326
The following request is submitted to the Amazon E-Commerce Service. What will be the outcome? http://webservices.amazon.com/onca/xml?Service=AWSECommerceService &amp;amp;SearchIndex=Books &amp;amp;Sort=salesrank...
12327
The following request is submitted to the Amazon E-Commerce Service. What will be the outcome? http://webservices.amazon.com/onca/xml?Service=AWSECommerceService &amp;amp;SearcHIndex=All &amp;amp;Sort=salesrank &amp;amp;...
12328
Suppose you are making a request to the Amazon Flexible Payment Service and you get an error called InternalError. What is the cause of the error?
12329
One EC2 Compute Unit (ECU) provides the CPU capacity eQuivalentto:
12330
Once you create an Amazon Mechanical Turk HIT, you can&amp;#39;t change its HITType.
12331
Is the following statement true or false? With reference to the Amazon Flexible Payment Service, once you subscribe to the caller notification using the SubscribeForCallerNotification operation, y...
12332
Is the following statement true or false? It is not possible to retrieve offers and discounts using Amazon E-Commerce Service.
12333
In which of the following cases can the status of a Mechanical Turk HIT change from Reviewing to Reviewable?
12334
In conjunction with which of the following other Amazon web services does Amazon SimpleDB service work?
12335
In case of Amazon E-Commerce Service, what will happen if you pass the AssociateTag parameter but omit the SubscriptionId and AWSAccessKeyId parameters?
12336
In Amazon Mechanical Turk concept, which of the following is correct?
12337
How many CNAME aliases can you have per distribution?
12338
How is Amazon S3, TCP Window Scaling defined ?
12339
How do you access Amazon S3 buckets and objects that were created using &amp;lt;CreateBucketConfiguration&amp;gt;?
12340
Why has the IRS allowed employers to combine federal taxes when computing withholding amounts?
12341
Who issues an EIN to a company?
12342
Who decides if a person is an employee or an independent contractor?
12343
Who controls the regulations for the timing of payment of wages?
12344
Which of the following statements about independent contractors is true?
12345
Which of the following should happen in the payroll system after an employee is terminated?
12346
Which of the following payroll items is worth auditing?
12347
Which of the following journal entries would be made to void a payroll check printed in error?
12348
Which of the following is an example of an internal control for payroll?
12349
Which of the following is a major payroll processor?
12350
Which of the following is a disadvantage of an automated payroll system?
12351
Which of the following is a benefit of an automated payroll system?
12352
Which of the following illustrates the basic Balance Sheet formula?
12353
Which of the following factors might prompt a company to switch to an automated payroll system?
12354
Which of the following age groups is covered by the Age Discrimination in Employment Act of 1967?
12355
Which of the following accounts is debited when FUTA taxes are paid to the government?
12356
What is the purpose of Form W2?
12357
What is the purpose of Form 941?
12358
What is the purpose of Form 940?
12359
What is the purpose of auditing payroll ?
12360
What is the purpose of an EIN?
12361
What is the purpose of accruing vacation expense?
12362
What is the purpose of a time card?
12363
What is Form W3?
12364
What is an EIN?
12365
What does the acronym SUTA stand for?
12366
The term &amp;quot;workers compensation insurance&amp;quot; refers to ______________.
12367
The term &amp;quot;withholding allowance&amp;quot; refers to ______________.
12368
The term &amp;quot;wage bracket method for withholding taxes&amp;quot; refers to ______________.
12369
The term &amp;quot;unemployment compensation benefits&amp;quot; refers to ______________.
12370
The term &amp;quot;the accounting process&amp;quot; refers to ______________.
12371
The term &amp;quot;taxable wages&amp;quot; refers to ______________.
12372
The term &amp;quot;statutory employee&amp;quot; refers to ______________.
12373
The term &amp;quot;self-employment income&amp;quot; refers to ______________.
12374
The term &amp;quot;profit sharing&amp;quot; refers to ______________.
12375
The term &amp;quot;piece rate plan&amp;quot; refers to ______________.
12376
The term &amp;quot;percentage method of withholding&amp;quot; refers to ______________.
12377
The term &amp;quot;payroll register&amp;quot; refers to ______________.
12378
The term &amp;quot;payroll period&amp;quot; refers to ____________.
12379
The term &amp;quot;overtime&amp;quot; refers to ______________.
12380
The term &amp;quot;oppressive child labor&amp;quot; refers to ____________.
12381
The term &amp;quot;internal control&amp;quot; refers to ______________.
12382
The term &amp;quot;incentive payment plan&amp;quot; refers to _______________.
12383
The term &amp;quot;guaranteed wage&amp;quot; refers to ______________.
12384
The term &amp;quot;escheat law&amp;quot; refers to ____________.
12385
The term &amp;quot;employee earnings record&amp;quot; refers to ______________.
12386
The term &amp;quot;earned income credit&amp;quot; refers to ______________.
12387
The term &amp;quot;disability insurance&amp;quot; refers to ______________.
12388
The term &amp;quot;direct deposit&amp;quot; refers to ______________.
12389
The term &amp;quot;cumulative method of withholding&amp;quot; refers to ______________.
12390
The term &amp;quot;contribution report&amp;quot; refers to ______________.
12391
The term &amp;quot;commission plan&amp;quot; refers to ______________.
12392
The term &amp;quot;bonus&amp;quot; refers to ______________.
12393
The term &amp;quot;bona fide occupational qualification&amp;quot; refers to _______________.
12394
The term &amp;quot;audit trail&amp;quot; refers to ______________.
12395
The Fair Labor Standards Act of 1938 __________________.
12396
The Equal Pay Act ____________________.
12397
The Circular E: Employer&amp;#39;s Tax Guide is ______________.
12398
Payroll system software can be hosted _____________.
12399
On which of the following financial statements is Revenue reported?
12400
On which of the following financial statements is Payroll Expense reported?
12401
Of the following, which is the best safeguard against employees accessing the payroll system?
12402
How often should payroll be reconciled?
12403
How are FUTA taxes recorded at the time of payroll?
12404
For an employer, which of the following is a disadvantage of using direct deposit?
12405
For an employer, which of the following is a benefit of using direct deposit?
12406
For an employee, which of the following is a benefit of using direct deposit?
12407
Employee C wants to contribute $8,000 a year to his tax shelter annuity. The district allows payroll deductions for tax shelter annuities to be spread over 18 pay periods. How much will have to be ...
12408
Employee B has an annual salary of $50,000 that is paid to him over 26 pay periods. He works 260 days per year. He retires after working 65 days, during which time he received 6 paychecks. Given t...
12409
At ABC School, the current salary schedule for custodians is as follows: Step 1: $12.47 Step 2: $13.09 Step 3: $13.75 Step 4: $14.44 Step 5: $15.16 Employees are moved to the next s...
12410
Are meals provided on the company&amp;#39;s premises subject to employment taxes as a benefit?
12411
According to the Self-Employment Contributions Act, any enterprise ___________________ is considered a business.
12412
A W4 is ____________.
12413
A company that employs ______________ is subject to the Civil Rights Act of 1964.
12414
A company must send W2 forms every year to its employees by _____________.
12415
A company must file Form W3 every year by _____________.
12416
You have users from two different countries- England and Norway. You would like the ability to let the user choose whether he or she would like to use the Norwegian element names or the English ele...
12417
You have an element named &amp;#39;comments&amp;#39;. You want to prohibit all line feeds, carriage returns, and tab characters. Which of the following will do it?
12418
you have a single-dimensional array of five elements, and you want to transmit only the last two. Which of the following achieves this?
12419
You can specify time zones in an XML Schema. Which of the following are specifying a time zone along with date?
12420
You are designing an XML Schema and you want to prohibit line feeds, carriage returns, tabs, leading and trailing spaces, and multiple spaces from an element. Which of the following datatypes will ...
12421
You are designing an XML Schema and you have a numeric element &amp;#39;NegativeBalance&amp;#39;. You want to store negative values in this element along with zero. Which of the following numeric datatypes will yo...
12422
Which type of array in SOAP messages represents a grid of values with specified dimensions that may or may not contain any data?
12423
Which two among the following represent the correct syntax for a two dimensional array in a SOAP message?
12424
Which of the following XML attributes defines exactly how native application and platform data types are to be encoded into a common XML syntax?
12425
Which of the following string types is recommended by SOAP specifications Section 5 for SOAP messages?
12426
Which of the following shows the correct implementation of a single dimension array?
12427
Which of the following represents an array in SOAP messages?
12428
Which of the following represents a structure in SOAP messages?
12429
Which of the following protocols cannot be used to exchange SOAP messages?
12430
Which of the following namespaces is used for messages in SOAP version 1.2?
12431
Which of the following namespaces is used for messages in SOAP version 1.1?
12432
Which of the following is the correct format of the date datatype in an XML Schema?
12433
Which of the following is the base namespace for a SOAP message?
12434
Which of the following is correct regarding SOAP Faults?
12435
Which of the following is an optional part in a message of SOAP version 1.1?
12436
Which of the following is an invalid child of a Fault element of a SOAP message?
12437
Which of the following is an example of referring an external document through a SOAP envelope?
12438
Which of the following is an example of a sparse array in SOAP messages?
12439
Which of the following is a single-referenced accessor?
12440
Which of the following is a multi-referenced accessor?
12441
Which of the following header blocks has been introduced in SOAP version 1.2 to specify which headers were not understood?
12442
Which of the following header blocks authenticates the SOAP message?
12443
Which of the following Fault types is used when an error, that cannot be directly linked to the processing of the message, occurs?
12444
Which of the following contains valid syntax for typing values?
12445
Which of the following child elements of a Fault element is used to express application-specific details about the error that occurred?
12446
Which of the following can the header of a SOAP message contain?
12447
Which of the following attributes manages an array in a SOAP message?
12448
Which of the following attributes indicates whether an accessor contains a null value?
12449
Which of the following are used for data representation in multiple-referenced accessors?
12450
Which of the following are true for packaging an RPC request in a SOAP envelope?
12451
Which of the following are mandatory in a message of SOAP version 1.1?
12452
Which of the following are basic parts of the SOAP message architecture?
12453
Which of following is the correct position of the header in a SOAP message?
12454
When applications report a version mismatch error back to the sender of the message, it may optionally include a header block that tells the sender which version of SOAP it supports. Which of the f...
12455
When a SOAP message is sent from one application to another, there is an implicit requirement that the recipient must know how to process that message. If the recipient does not understand the mess...
12456
Version 1.2 of the SOAP specifications introduced some new implementations. Which of the following implementations are new to the version 1.2 specifications?
12457
There is an improper application in the Section 5 encoding style rules. Which of the following type of SOAP Faults occurs in this scenario?
12458
The fundamental idea behind SOAP is that two applications, regardless of the operating system, programming language, or any other technical implementation detail, may openly share information using...
12459
The duration datatype is used to specify a time interval in an XML Schema. Which of the following indicates the number of years in an element of type duration?
12460
SOAP uses messages for client-server communication. Which of the following is correct for SOAP messages?
12461
SOAP has become a new medium of method invocation. Business transactions are widely using SOAP to provide business information. Which of the following are correct about data types in SOAP?
12462
SOAP defines four standard types of faults that belong to the http://www.w3.org/2001/06/soap-envelope namespace. Which of the following is correct regarding extensibility of those standard types?
12463
SOAP defines four standard types of faults that belong to the http://www.w3.org/2001/06/soap-envelope namespace. Which of the following is an incorrect Fault code?
12464
Read the following statements: Statement 1: Encoding styles define how applications on different platforms share information, even though they may not have common data types or representations. S...
12465
Read the following statements: Address address = new Address( ); Person person = new Person( ); person.setAddress(address); The above code is creating two objects, one for the Address class and t...
12466
Read the following statements: &amp;lt;s:Envelope xmlns:s=&amp;quot;http://www.w3.org/2001/06/soap-envelope&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;n:getQuote xmlns:n=&amp;quot;urn:QuoteService&amp;quot; s:encodingStyle=&amp;quot;http://www.w3.org/2001/06/soap/encodi...
12467
Read the following statements: &amp;lt;s:Envelope xmlns:s=&amp;quot;http://schemas.xmlsoap.org/soap/envelope/&amp;quot;&amp;gt; &amp;lt;s:Header&amp;gt; &amp;lt;V:Upgrade xmlns:V=&amp;quot;http://www.w3.org/2001/06/soap-upgrade&amp;quot;&amp;gt; &amp;lt;envelope qname=&amp;quot;ns1:Envelop...
12468
Read the following statements: &amp;lt;s:Envelope xmlns:s=&amp;quot;...&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;s:Faults&amp;gt; &amp;lt;faultcode&amp;gt;Client.Authentication&amp;lt;/faultcode&amp;gt; &amp;lt;faultstring&amp;gt; Invalid credentials &amp;lt;/faultstring&amp;gt; &amp;lt;faultactor&amp;gt;http://acme....
12469
Read the following statements about SOAP Faults: Statement 1: The SOAP fault structure is not allowed to express any information about which headers were not understood. Statement 2: The faultstri...
12470
Read the following statements about SOAP datatypes: Statement 1: The datatypes supported by the SOAP encoding style are the datatypes defined by the &amp;quot;XML Schema data types&amp;quot; specification. Statemen...
12471
In state chart diagrams, element which is shown with help of solid circle with outgoing arrow is classified as
12472
Read the following statement regarding arrays in SOAP: Statement 1: A single-referenced accessor doesn&amp;#39;t have an identity except as a child of its parent element. Statement 2: A multi-referenced a...
12473
Read the following SOAP message: &amp;lt;s:Envelope xmlns:s=&amp;quot;...&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;s:Faults&amp;gt; &amp;lt;faultcode&amp;gt;Client.Authentication&amp;lt;/faultcode&amp;gt; &amp;lt;faultstring&amp;gt; Invalid credentials &amp;lt;/faultstring&amp;gt; &amp;lt;faultactor&amp;gt;http://acm...
12474
Read the following SOAP message: &amp;lt;s:Envelope xmlns:s=&amp;quot;...&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;s:Fault&amp;gt; &amp;lt;faultcode&amp;gt;Client.Authentication&amp;lt;/faultcode&amp;gt; &amp;lt;faultstring&amp;gt; Invalid credentials &amp;lt;/faultstring&amp;gt; &amp;lt;faultactor&amp;gt;http://acme...
12475
Read the following snippet: &amp;lt;!-- Version 1.2 SOAP Envelope --&amp;gt; &amp;lt;s:Envelope xmlns:s=&amp;quot;http://schemas.xmlsoap.org/soap/envelope/&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;n:getQuote xmlns:n=&amp;quot;urn:QuoteService&amp;quot;&amp;gt; &amp;lt;symbol xsi:type=&amp;quot;x...
12476
Read the following snippet: ... &amp;lt;xs:element name=&amp;quot;person&amp;quot;&amp;gt; &amp;lt;xs:complexType&amp;gt; &amp;lt;xs:sequence&amp;gt; &amp;lt;xs:element name=&amp;quot;firstname&amp;quot; type=&amp;quot;xs:string&amp;quot;/&amp;gt; &amp;lt;xs:element name=&amp;quot;lastname&amp;quot; type=&amp;quot;xs:str...
12477
Read the following snippet of a SOAP message: &amp;lt;s:Envelope xmlns:s=&amp;quot;http://www.w3.org/2001/06/soap/soapEnvelope&amp;quot;&amp;gt; &amp;lt;s:Header&amp;gt; &amp;lt;m:transaction xmlns:m=&amp;quot;soap-transaction&amp;quot; s:mustUnderstand=&amp;quot;true&amp;quot;&amp;gt; &amp;lt;tran...
12478
Read the following code snippet of a SOAP message: &amp;lt;s:Envelope xmlns:s=&amp;quot;http://www.w3.org/2001/06/soap/soap-envelope&amp;quot;&amp;gt; &amp;lt;s:Header&amp;gt; &amp;lt;m:transaction xmlns:m=&amp;quot;soap-transaction&amp;quot; s:mustMatch=&amp;quot;true&amp;quot;&amp;gt; &amp;lt;tra...
12479
Read the following code snippet of a SOAP message: &amp;lt;s:Envelope xmlns:s=&amp;quot;http://www.w3.org/2001/06/soap-envelope&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;n:getQuote xmlns:n=&amp;quot;urn:QuoteService&amp;quot;&amp;gt; &amp;lt;symbol xsi:type=&amp;quot;xsd:string&amp;quot;&amp;gt; Mi...
12480
PremiumSoft Web Service provides financial quotes. Function getQuote () returns a financial quote for a QuoteID. The message returned in getQuote contains invalid authentication credentials. Which...
12481
One of the greatest strengths of XML Schemas is the support for datatypes. Which of the following namespaces is used while creating elements and datatypes that are used to construct schemas?
12482
Fill in the blank: A ________________ Array is a type of array in which only a part of the array is serialized into the SOAP envelope.
12483
Encoding styles define how applications on different platforms share information. Which of the following is correct about data types of both applications while implementing encoding styles?
12484
Because of its pervasiveness on the Internet, HTTP is by far the most common transport used to exchange SOAP messages. Which of the following HTTP headers indicates the intent of the SOAP HTTP requ...
12485
As part of the overall specification, Section 5 of the SOAP standard introduces a concept known as encoding styles. An encoding style is a set of rules that define exactly how native application an...
12486
An XML schema describes the structure of an XML document. The purpose of an XML Schema is to define the legal building blocks of an XML document. Which of the following are true about an XML Schema?
12487
An error message from a SOAP message is carried inside a Fault element. How many times can a Fault element be used in a single SOAP message?
12488
ABC Corp., a client of PremiumSoft, uses SOAP 1.2 specifications whereas PremiumSoft uses SOAP 1.1 specifications. What will be the result when PremiumSoft sends a message to ABC Corp.?
12489
ABC Corp., a client of PremiumSoft, uses SOAP 1.1 specifications whereas PremiumSoft uses SOAP 1.2 specifications. What will be the result when PremiumSoft sends a message to ABC Corp.?
12490
A subroutine call is going to be XML encoded for SOAP by passing two parameters using the same memory location. How will this be implemented?
12491
A SOAP message may travel from a sender to a receiver by passing different endpoints along the message path. Not all parts of the SOAP message may be intended for the ultimate endpoint of the SOAP ...
12492
A SOAP message is based on XML. Infact, SOAP follows all validation rules from XML specifications. On which of the following are SOAP messages based?
12493
You are developing a Mobile Web Application for the Chinese market. Which of the following is true?
12494
You are designing a fighting game with six levels. Suppose a user clears the fourth level and then loses all his lives. To ensure the best gaming experience, which of the following features should ...
12495
With respect to sound guidelines, which of the following should be avoided when designing a mobile game?
12496
With respect to game user experience guidelines, which of the following should a game designer avoid to keep players motivated and interested?
12497
With regard to Mobile Web Applications, which of the following types of files does not benefit from transfer compression, and have a negative net impact instead?
12498
Which of the following widget interaction models is the best choice for creating a widget that contains thousands of links?
12499
Which of the following usability methods in Mobile Application development projects consists of observing and interviewing representative users in their own environment?
12500
Which of the following technologies can be used to create innovation in mobile-based games?
12501
Which of the following style elements has the highest priority in the cascading rules?
12502
Which of the following statements regarding CSS in mobile widgets is/are correct?
12503
Which of the following is/are the most important factor(s) affecting mobile video production, distribution, and playback?
12504
Which of the following is/are the hardware limitation(s) that must be considered when creating a Mobile Application?
12505
Which of the following guidelines must be applied for the presentation of text in a mobile device?
12506
Which of the following Gestalt principles is used to visually set apart certain elements as belonging to a group even if they are far apart?
12507
Which of the following components can be used to achieve unity in the design of Mobile Applications?
12508
Which of the following audio codecs for 3GPP content supports AAC-LC (Low Complexity Mode)?
12509
When using Flash Lite for mobile web applications, why should alpha transparencies and gradients be avoided?
12510
When designing Mobile Applications, what must the designer keep in mind with regard to the end users of the mobile phone?
12511
When designing a game, the designer can detect multiple key presses in which of the following platform(s)?
12512
When designing a game for mobile devices, which of the following pre-game usability guidelines should be followed?
12513
What will happen if the name of a widget exceeds the maximum visible characters in the Application menu?
12514
What will happen if a widget is running on a device and that same device receives an incoming call?
12515
What is wrong with the theme in the given image?
12516
What is the recommended size of the icon that is to be displayed on the mobile device&amp;#39;s Applications menu?
12517
What is the maximum bit rate suggested by RealNetworks guidelines for Local playback in Video encoding?
12518
What is the function of the left softkey in a mobile user interface?
12519
What is the advantage of aggregating static images (sprites) into a single composite resource?
12520
What does a Wireframe model of an Interaction design describe?
12521
The term Card in Mobile Applications refers to ________________.
12522
The given images show various types of themes. Which type should a theme designer generally avoid?
12523
The given images show various types of themes. Considering the consistency and contrast of each, which theme would be most preferable?
12524
The given images show a theme and two active backgrounds. Which active background would be used with the theme as shown?
12525
The color depth of the majority of Mobile devices is _______________.
12526
SVGT is a language for describing 2D graphics using ___________.
12527
Is the following statement true or false? The Best Practices Working Group for Mobile Web Application recommends that percentages and relative measures be avoided in favour of pixel and absolute m...
12528
Is the following statement true or false? S60 devices from Nokia use font S60 Sans.
12529
Is the following statement true or false? In widgets, the control panel that shows the softkey labels is hidden by default.
12530
If the screen width measures between 160 and 176 pixels, in which group will the mobile device be categorized in terms of screen width?
12531
If a video conversion is completed using Nokia Video Manager, what will the output of an .AVI file be?
12532
How do streaming, local playback, and progressive download differ from one another?
12533
How can the Figure-to-ground Gestalt principle be achieved?
12534
From the point of view of user experience design, who is the primary user and who is the secondary user if a hospital manager purchases software and the hospital staff uses it?
12535
During Mobile Application Development, which option below represents the best order to follow for the usability implementation process?
12536
As defined by S60 UI style for index finger usage, the minimum size of an element on the touch screen should be ________________.
12537
Which one of the following is a major benefit of verification early in the software development life cycle?
12538
Which of the following types of testing is likely to benefit the most from the use of test tools that provide the test capture and replay facilities?
12539
Which of the following types of testing emulates the real world use of a system and verifies that the product fulfills the intended requirements?
12540
Which of the following types of errors are uncovered in White-box testing?
12541
Which of the following tools supports traceability, recording of incidents, and scheduling of tests?
12542
Which of the following testing occurs outside the development environment?
12543
Which of the following test activities provides the maximum potential cost savings from the use of Computer-Aided Software Testing (CAST)?
12544
Which of the following strategies are used for Integration testing?
12545
Which of the following statements is not true regarding capture/replay tools?
12546
Which of the following statements is incorrect in relation to Test Automation?
12547
Which of the following statements is incorrect in relation to Smoke testing and Sanity testing?
12548
Which of the following statements is incorrect in relation to Code coverage?
12549
Which of the following statements holds true for Verification and Validation?
12550
Which of the following statements about Equivalence partitioning is correct?
12551
Which of the following Security testing concepts deals with the process of determining whether a requester is allowed to receive a service or perform an operation?
12552
Which of the following resources are tested by most of the Stress testing tools?
12553
Which of the following options correctly defines the term &amp;quot;test harness&amp;quot;?
12554
Which of the following models of software development incorporates testing into the whole software development life cycle?
12555
Which of the following is written by a programmer and is meant to call the function to be tested by passing test data to it?
12556
Which of the following is true regarding Static Analysis tools?
12557
Which of the following is true about Sanity Testing?
12558
Which of the following is not included in Non-functional testing?
12559
Which of the following is not a type of Incremental testing approach?
12560
Which of the following is not a Static testing methodology?
12561
Which of the following is not a part of System testing?
12562
Which of the following is incorrect for Black-box testing?
12563
Which of the following is false about software testing?
12564
Which of the following are the objectives of using a &amp;quot;test harness&amp;quot;?
12565
Which of the following are benefits of automated testing?
12566
When a defect is detected and fixed, the software should be retested to confirm that the original defect has been successfully removed. This is called:
12567
What would be the appropriate result of a Stress test at its peak?
12568
What is the normal order of activities in which software testing is carried out?
12569
What is the name of the testing method in which (for each pair of input parameters) all the possible discrete combinations of parameters are passed on?
12570
What is the main reason for testing a software immediately before releasing it?
12571
What is the difference between Regression testing and Retesting?
12572
What is Boundary value testing?
12573
What do you understand by the term &amp;quot;Monkey test&amp;quot;?
12574
Usability testing indicates that the design and system should be modified if:
12575
The testing phase in which individual software modules are combined and tested as a group is called:
12576
The testing performed by external organizations or standards bodies to give greater guarantees of compliance is called:
12577
The review of a technical document such as requirements specs or a test plan, with the purpose of looking for problems and seeing what is missing, without fixing anything is called:
12578
The process of using a test case to test a specific unit of code, function, or capability is called:
12579
The main focus of Black-box testing is:
12580
The determination of adherence or non adherence to a compliance is carried out during:
12581
The cursory examination of all the basic components of a software system to ensure that they work is called:
12582
Selecting the test inputs that are likely to reveal a failure associated with a particular defect is an example of the use of:
12583
Performance testing is used for real-time systems only.
12584
In which type of testing is random data generated for input into the software?
12585
In which of the following testing methodologies does the automatic generation of efficient test procedures/vectors use models of system requirements and specified functionality?
12586
In Bottom-up integration testing,
12587
Identify the defect which can be detected by Equivalence Partitioning Technique:
12588
Identification of set-use pairs is accomplished during which of the following static analysis activities?
12589
From the options given below which of the dynamic program analysis technique is aimed at improving application performance?
12590
From the following options, choose the best example which represents a reliability failure for an application:
12591
Choose the correct description of a Stub in software testing:
12592
Beta testing is performed by:
12593
You would like to restrict the values that can be entered into a cell so that only whole numbers between 1 and 100 can be entered. Which option in the menu allows you to accomplish this?
12594
You have a worksheet that contains the first names of customers in column A and last names in column B. You want to enter a formula in column F that combines the first name and the last name and at...
12595
You define a print area in your worksheet, but later you select a smaller range of cells to print and then click Selection under the menu File-&amp;gt;Print-&amp;gt;Print What-&amp;gt;Selection. What will happen?
12596
You are making a sales performance report in Excel which you would like to present to the top management. Some of the column headings are too large and look out of place in their cells. You decide ...
12597
Which toolbar is shown in the figure?
12598
Which of the following statements is true if the cell B1 contains the formula =$A$1?
12599
Which of the following statements about the AutoFormat feature in Excel are correct?
12600
Which of the following statements about the AutoCorrect feature in Excel are correct?
12601
Which of the following formats will you use to enter the time, 3 P.M., in a cell?
12602
Which of the following are appropriate date format when you want to enter data into a cell in Microsoft Excel?
12603
What value is displayed if the formula =2+&amp;quot;$9.00&amp;quot; is entered into a cell?
12604
What should you add before a fraction to avoid entering it as a date, e.g. 1/3, in Excel?
12605
What is the quickest way to select all the columns of a worksheet in Microsoft Excel?
12606
What is conditional formatting used for? (It is available under the menu Format-&amp;gt;Conditional Formatting)
12607
The figure shows the Text to Column menu option. What function does it perform?
12608
The figure shows the Calculation tab under the Tools-&amp;gt;Options menu. The option under Calculation has been checked as Automatic. What does this mean?
12609
The figure shows the AutoFit Selection menu option. What function does it perform?
12610
The figure shows an Excel worksheet. You are about to create a new column called Avg Sales in column G which will display the average sales for Jan to April. Which of the following are correct form...
12611
The figure shows an Excel worksheet. What does the red triangle in cell C2 signify?
12612
The figure shows an Excel worksheet. If you want to freeze the row showing the months (row 1) and the column showing the products (column A), what should you do?
12613
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &amp;#39;Z&amp;#39;?
12614
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &amp;#39;Y&amp;#39;?
12615
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &amp;#39;J&amp;#39;?
12616
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &amp;#39;A&amp;#39;?
12617
State whether True or False. When you clear the contents from a cell, the formatting of the cell is also lost.
12618
State whether True or False. We can change the color of the worksheet tabs in our workbook?
12619
In Microsoft Excel, you select the row headings 10, 11 and 12 and then choose the menu option Insert -&amp;gt; Rows. What will happen?
12620
If you enter a Part Number for a product in Excel e.g. 6776736, and want Excel to treat it as text and not a number, what should you do?
12621
How does the AutoComplete feature in Excel help you save time?
12622
You are creating a new formatting rule which will be used to format a PivotTable report. Which of the following formatting styles is NOT available while formatting all cells of PivotTable report ba...
12623
You are a financial consultant to multiple clients and you made an investment model for them. Now you want to find out how investment rates change under different market conditions. Which of the fo...
12624
With reference to the screenshot given, which of the following formulae CANNOT be used to calculate the average of the column &amp;#39;Marks&amp;#39; in the cell &amp;#39;E17&amp;#39;?
12625
Which of the following tools is used to format Excel worksheet data, as shown in the figure above?
12626
Which of the following statements is true regarding PowerPivot in Microsoft Excel 2010?
12627
Which of the following statements is true regarding MS Excel Web Access on a SharePoint Foundation 2010 Server?
12628
Which of the following statements is not true regarding offline cube files in Microsoft Excel 2010?
12629
Which of the following statements is NOT true regarding import of data into PowerPivot?
12630
Which of the following statements are true regarding PowerPivot in Microsoft Excel 2010?
12631
Which of the following sorting options is NOT available under the Sort On option while sorting the data of a table in an Microsoft Excel 2010 worksheet?
12632
Which of the following is available as fill options while formatting cells of an Excel worksheet using the format style as Data Bar?
12633
Which of the following components of Excel Services enables the user to edit a published workbook inside a web browser?
12634
Which of the following axis settings are available for the appearance of data bars for negative values in Microsoft Excel 2010?
12635
Which of the following areas in the Microsoft Excel 2010 PivotTable Field List, calculates the aggregates of columns?
12636
Which among the following settings is the default macro security setting?
12637
When you double-click on a pivot report value of a PivotTable in Microsoft Excel 2010, Excel creates new ________ with data corresponding to the pivot report value.
12638
What is the purpose of time stamping a digital signature in Microsoft Excel 2010?
12639
What is the filename extension of Excel workbooks which are saved as &amp;#39;Excel Templates&amp;#39;?
12640
What does the icon marked with a red square in the figure above signify?
12641
What are the benefits of digitally signing an e-mail in Microsoft Excel 2010?
12642
Suppose you have created a report in Excel named &amp;#39;report.xlsx&amp;#39;. Now you want your team members to be able to see the report remotely on a web browser, and edit the report, as desired. Also it is re...
12643
Suppose you create a workbook in Microsoft Excel 2010 and run the &amp;#39;Check Accessibility&amp;#39; option. This option is used to check the workbook for ____________.
12644
Suppose you clone the slicer shown in the image above into another worksheet in Microsoft Excel 2010. Considering that you make changes to the tile selected, in one of the slicers, which of the fol...
12645
State whether the following statement regarding cell references in Microsoft Excel 2010 is true or false: An Absolute cell reference consists of the column letter and row number.
12646
State whether the following statement regarding cell references in Microsoft Excel 2010 is true or false: A Relative cell reference consists of the column letter and row number surrounded by dolla...
12647
State whether the following is true or false: Excel Web App supports Undo/Redo but it is disabled when multiple users are collaborating on the same workbook
12648
State whether following statement regarding images in Microsoft Excel 2010 is true or false: Microsoft Excel 2010 supports 3D rotation of images.
12649
State whether following statement regarding cell references in Microsoft Excel 2010 is true or false: A Relative cell reference consists of the column letter and row number surrounded by dollar si...
12650
Slicers are filtering components which are used to filter the data in a PivotTable report or CUBE functions. Which of the following data sources is/are supported by Slicers in Microsoft Excel 2010?
12651
Microsoft Excel Services is a component of:
12652
In the given screenshot, there are red triangles in the upper-right corner of each cell under the column titled &amp;#39;Registrations&amp;#39;. What do these signify?
12653
In the given screenshot, the letter X is pointing to an area between the first Row header, and the first Column header. What will happen when this particular area is selected?
12654
In the given screenshot, the contents of the &amp;#39;Name of User&amp;#39; column have been oriented at an angle. How is this done?
12655
In the above given screenshot of a Microsoft Excel 2010 Worksheet, there are two columns B and D containing some integer data. Considering that cell D9 is assigned the formula: =SUM(D3:D7), which o...
12656
How would you assign a macro to a graphic?
12657
Excel keeps the changed history of a workbook for ________ days by default.
12658
Deleting a PivotChart report automatically deletes the associated PivotTable report.
12659
Analyze the syntax of LOOKUP function when used in vector form? LOOKUP(lookup_value, lookup_vector, result_vector) Which of the following arguments of the LOOKUP function is optional?
12660
Analyze the syntax of LOOKUP function when used in vector form? LOOKUP(lookup_value, lookup_vector, result_vector) The values in the lookup_vector must be placed in ________ order.
12661
Which type of additional information is stored within the digital signature?
12662
Which tab should be used to display or hide axes?
12663
Which scoping method should be used to conditionally format a set of fields in the values area for all levels in the hierarchy of data?
12664
Which part of the formula displays references in the given picture?
12665
Which option would you choose to display a list of formula used in the current PivotTable report?
12666
Which of the given methods would you follow to add an alternative text to a picture?
12667
Which of the given Document properties includes both file system properties and statistics that are maintained by Office programs for the user?
12668
Which of the following wildcard characters can be used as comparison criteria for Text Filters?
12669
Which of the following options would you choose to clear a PivotChart report?
12670
Which of the following options should be used to create a connection to a shared network folder, as shown in the picture?
12671
Which of the following options is not available on the Status bar?
12672
Which of the following methods would you follow to remove subtotals?
12673
Which of the following is not true regarding naming a cell?
12674
Which of the following is not true regarding column width?
12675
Which of the following is not true about the Watch Window?
12676
Which of the following is not true about an offline cube file?
12677
Which of the following is not a valid file extension in which an Excel file can be saved?
12678
Which of the following is a default method of a PivotTable report for scoping the conditional format of fields in the values area?
12679
Which of the following charts have no axes?
12680
Which method will you use to update table data from a Sharepoint list?
12681
Which Lookup function should be used when the comparison values are located in a column to the left of the data that is to be found?
12682
Which keyboard shortcut should be used to minimize or restore the ribbon?
12683
Which keyboard shortcut should be used to enter the current time?
12684
Which keyboard shortcut should be used to enter the current time in a cell in an excel sheet using a QWERTY computer keyboard?
12685
Which keyboard shortcut re-calculates all formulas in all open workbooks, regardless of whether or not they have changed since the last time?
12686
Which file format is typically used to remove printer corruption?
12687
Which database function estimates variance based on a sample from selected database entries?
12688
Which Consolidate option would you choose when you want to arrange the data in all the worksheets in identical order and location?
12689
Which Chart type is displayed in the given picture?
12690
Which chart displays axes but cannot display axis titles?
12691
Which among the following settings is the default macro setting?
12692
Which among the following options displays Legend entries in the given picture?
12693
Which among the following is not true regarding a calculated column?
12694
Where can the &amp;#39;Show All Comments&amp;#39; command be found?
12695
When would the data validation command be unavailable on the data tab?
12696
When does the triangle appear in the top-left corner of the cell, as shown in the picture?
12697
When does the error, as shown in the picture, occur?
12698
When &amp;#39;a&amp;#39; or &amp;#39;p&amp;#39; is not typed after the time in Worksheet cells, what does Excel enter the default time as?
12699
What would be the result, when =T(A4) is applied on the given table?
12700
What is the significance of the red symbol at the top right corner of the cell, as shown in the picture?
12701
What is the purpose of using the Keep text flat option, as shown in the picture?
12702
What is the option on the Document Inspector that finds the content type information?
12703
What does the screen tip displaying &amp;quot;Showing All&amp;quot; mean?
12704
What does the red icon indicate, as shown in the given picture?
12705
State whether true or false: When you sign the stamp signature line in an Office document, you add both a visible stamp and a digital signature.
12706
State whether true or false: When you freeze panes, you select specific rows or columns that remain visible when scrolling in the worksheet.
12707
State whether true or false: When the table headers are turned off, the table header Autofilters and all other applied filters are removed from the table.
12708
State whether true or false: When a part of a formula is replaced with its calculated value, it cannot be restored.
12709
State whether true or false: No data is deleted when an outline is hidden or removed.
12710
State whether true or false: If a SmartArt graphic was converted to individual shapes, it is not possible to convert them back to the SmartArt graphic.
12711
State whether true or false: For XY (Scatter) and bubble charts; error bars for the x values, the y values, or both, can be displayed.
12712
State whether true or false: Deleting the PivotChart report automatically deletes the associated PivotTable report.
12713
State whether true or false: A Macro project can be digitally signed.
12714
Referring to the given image, point out which option should be selected to automatically save a backup copy of a workbook.
12715
Refer to the given picture. Which option causes the last row in the table to appear and displays the word Total in the leftmost cell?
12716
Refer to the given image. Which of the following Fill options should be used to add color and transparency to a shape?
12717
Refer to the given image. Which line style option should be used to specify the style used for the end of the line?
12718
Refer to the given image. Which formula should be written on the given table to display &amp;quot;Nancy Davolio&amp;quot;?
12719
Refer to the given image. What will be the result if the formula =B3&amp;amp;&amp;quot;, &amp;quot;&amp;amp;A3 is applied on the given table?
12720
Refer to the given image. What is the purpose of the cell denoted as &amp;#39;A&amp;#39; in the worksheet?
12721
How would you select an entire PivotTable report?
12722
How would you locate the last filled cell on a worksheet?
12723
How would you assign a Macro to a graphic?
12724
How will you reverse the direction of a SmartArt graphic?
12725
How will you find cells with data validation?
12726
How will you display the Go To dialog box?
12727
How should blank cells be inserted on a Worksheet?
12728
How can a chart be modified?
12729
You would like to restrict the values that can be entered into a cell so that only whole numbers between 1 and 100 can be entered. Which option in the menu allows you to accomplish this?
12730
You start Microsoft Excel and you do not want it to automatically run a macro upon starting. What will you do?
12731
You select the row headings 10, 11 and 12 and then choose the menu option Insert-&amp;gt;Rows. What will happen?
12732
You have recorded a macro. By mistake you recorded an action in it which you do not want. How will you remove the unwanted action without having to record the whole macro again?
12733
You have entered text in a cell which is too big for the cell. You want the text to appear in multiple lines inside the same cell. What will you do?
12734
You have entered 4/6 as data in a cell without applying any formats to it. By default, Excel will treat this data entry as a:
12735
You have created a worksheet which consists of confidential data. You want that these values, although present in the worksheet, should remain hidden and as a result the cells containing this data ...
12736
You define a print area in your worksheet, but later you select a smaller range of cells to print and then click Selection under the menu File-&amp;gt;Print-&amp;gt;Selection. What will happen?
12737
You are making a sales performance report in Excel which you would like to present to the top management. Some of the column headings are too large and look out of place in their cells. You decide ...
12738
Which toolbar is shown in the figure?
12739
Which of the following statements regarding the QUARTILE function is not true?
12740
Which of the following statements is true if the cell B1 contains the formula =$A$1
12741
Which of the following statement is true if the author has created the content with restricted permission using IRM?
12742
Which of the following shortcuts can be used to insert a new line in the same cell?
12743
Which of the following options would be used if you need to insert a number 77889867810070809 in a cell?
12744
Which of the following functions would return a value of 8?
12745
Which of the following function you will use to find the highest number in a series of numbers?
12746
Which of the following errors appears when an invalid argument is passed while converting a number from one number system to another system?
12747
Which of the following Date and Time function will you use to return the serial number of the last day of the month before or after a specified number of months?
12748
When using the VLOOKUP function, the error #REF! will appear in a cell if ________________.
12749
What will be the value in the cell C2 as shown in the figure when we use formula =A2+B2?
12750
What will be the output of the function IF(ISNA(MODE(B1:B4)),0,MODE(B1:B4)) when it is applied to the data series given below? B1:27 B2:22 B3:28 B4:21
12751
What should you add before a fraction to avoid entering it as a date, e.g. 1/3, in Excel?
12752
What is the quickest way to select all the columns on a worksheet?
12753
What function does the &amp;#39;Compare Side by Side With&amp;#39; command on the Window menu perform?
12754
What does the purple triangle at the bottom right corner of the cell signify?
12755
What does the NOW() function return?
12756
There is a workbook named Sales.xls which has a worksheet named Quarterly. This worksheet contains the quarterly sales figures for the company in cells A3 to A6. Now you want to create a formula in...
12757
The given figure shows the &amp;#39;Compare Side by Side&amp;#39; toolbar. What function is performed by the button marked with letter &amp;#39;A&amp;#39;?
12758
The figure shows the Text to Column menu option. What function does it perform?
12759
The figure shows the Calculation tab under the Tools-&amp;gt;Options menu. The option under Calculation has been checked as Automatic. What does this mean?
12760
The figure shows the AutoFit Selection menu option. What function does it perform?
12761
The figure shows an Excel worksheet. What does the red triangle in cell C2 signify?
12762
The figure shows an Excel worksheet. If you want to freeze the row showing the months (row 1) and the column showing the products (column A), what should you do?
12763
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &amp;#39;Z&amp;#39;?
12764
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &amp;#39;A&amp;#39;?
12765
The figure shows a view of the Drawing Toolbar. What function is performed by the button marked by the letter &amp;#39;X&amp;#39; ?
12766
Suppose the value in cell A1 is John and B1 is Smith then which of the following function you will use to get the John_Smith in C1 cell?
12767
State whether True or False. With the help of the Research task pane you can conduct research on Topics using an encyclopedia, Web search and also by accessing third-party content.
12768
State whether True or False. When using Document Workspaces, you cannot work directly on the Document Workspace copy, but you can work on your own copy which you can update periodically with chang...
12769
State whether True or False. AutoFilter drop-downs are automatically added in the header row of a list when the list is created.
12770
State whether True or False: When you clear the contents from a cell, the formatting of the cell is also lost.
12771
Is the following statement true or false? If a workbook is placed in the XLSTART folder, then the same workbook will open each time Excel is launched.
12772
How does the AutoComplete feature in Excel help you save time?
12773
How can you select all the blank cells in your worksheet?
12774
As shown in the figure what information will be enlisted by the tab marked as &amp;quot;B&amp;quot; about the current document?
12775
Your transport request is released in system X and imported in system Y. Which method is used to transport the data from X to Y?
12776
Your customer wants to use SAP NetWeaver Master Data Management ( MDM ) to cleanse and distribute business partners created in SAP CRM within the existing heterogeneous system environment. Which s...
12777
Your customer wants to migrate from an old legacy system to SAP ERP. The databases in both systems are modified. What is an advantage using the Legacy System Migration Workbench (LSMW) for the mig...
12778
You need to read an ABAP report from a database that is not declared in the ABAP Dictionary. How do you do this?
12779
You found an error for a field in Process-after-Input (PAI) of a dynpro. You change the value of this field and start PAI again. Where is the flow control starting in PAI in that case?
12780
You cannot book the business data during processing of an incoming IDoc. How must the function module react to this problem?
12781
You analyze the complexity of a customer-specific program to determine the expected maintenance efforts. Which measure do you use?
12782
Which task do you need to do after printing an Adobe form to avoid a program error?
12783
Which of the following is a use case for SAP Solution Manager?
12784
Which functionality has been introduced with the SAP Enterprise Edition of SAP Solution Manager?
12785
Which ABAP language element can you use in Enterprise Services?
12786
Where do you place the language key field in a customer-specific text table to enable generic buffering of this table?
12787
Where can you check which secondary index of a database table is used in a program?
12788
What should you emphasize when presenting the results of a code review to the customer?
12789
What provides guidelines for the development of Web services?
12790
What is the main advantage of enhancement packages in SAP Business Suite 7.0?
12791
What do you need to consider when using dynamic breakpoints?
12792
What are the effects of a COMMIT WORK during program execution?
12793
There are basically three types of SELECT statements: SELECT SINGLE, SELECT ... ENDSELECT, and SELECT ... INTO TABLE. The SELECT ... ENDSELECT statement is also known as the SELECT loop. Below, yo...
12794
The SAP List Viewer, commonly known as the ALV, is a powerful tool for displaying data. Among the various ALV types, the ALV Grid Control is used for displaying non-hierarchical table data.
12795
The event concept is vital for selection-screens. Which of the following usages of events make sense for selection-screens?
12796
The concept of visibility of components is well-known in object oriented languages. Which of the following statements are correct with regard to ABAP Objects?
12797
Some ABAP statements require an explicit end, like SELECT loops, FORM definitions, or IF clauses. Which of the following ABAP statements can be nested?
12798
Internal tables are used in ABAP to store mass data. Which of the following statements about the relationships between internal tables and database tables are correct?
12799
In which case do you decide to create a new ABAP OO class?
12800
In a report, you want to define a SELECT-OPTION so_xyz. What are possible ways of defining its type?
12801
In a program, you need an elementary data object for some calculations. What are possible ways to specify its type?
12802
In a new customer SAP GUI dynpro program, particular fields should be visible for authorized users only. How do you implement this requirement?
12803
In a customer program, a LOOP statement is processing time consuming database operations on transaction data. The execution of this program takes too long. How can you optimize the performance of ...
12804
In a customer application, it is necessary to save texts with undefined size. Which table type do you use to minimize programming efforts?
12805
How do you characterize customer and user exits?
12806
How do you avoid semantic mistakes for interface parameters in a customer specific routine?
12807
How can you realize a modification free instantiation of objects in a customer-specific ABAP OO development?
12808
During an upgrade project to SAP NetWeaver 7.0, you are asked for a strategy to convert the implemented classic BAdIs to the new BAdI type. What do you recommend?
12809
An international retail company needs a customer-specific list in SAP ERP that shows accumulated order values in a selectable currency. What do you need to know to create this program?
12810
Among the most frequently used enhancement concepts in ABAP, you find customer exits. Which of the following statements about customer exits are correct?
12811
ABAP has built-in types like C, I, N, STRING, or X. If you use these types for defining data objects, which of the following statements are correct?
12812
A customer wants to develop a Web application with Web Dynpro for Java as the front-end technology and a SAP ERP 6.0 system as the backend. Which type of external interface do you use to generate ...
12813
You want to update the last modified timestamp in the orders table. The correct way to do this in a PL/pgSQL function, when the parameter integer order_id is passed, would be:
12814
You want to manipulate some value in the database upon updation in a trigger function. Which line of the code would be appropriate?
12815
You have defined a function &amp;quot;Calculate()&amp;quot; in the template1 database. What will happen when you create a new database &amp;quot;ManagementDB&amp;quot; there?
12816
Will the following function compile and execute? DECLARE intValue int4; BEGIN intValue := 20 * 20; return intValue; END;
12817
Which statements hold true for Partition Tables?
12818
Which of the following variable declarations is not correct?
12819
Which of the following values is not defined to indicate the level of the raise event?
12820
Which of the following trigger function variables is not defined?
12821
Which of the following techniques can be used to obtain a result which is based on comparing one row of a table with another row of the same table?
12822
Which of the following statements regarding views are incorrect?
12823
Which of the following statements is not correct about creating a new operator?
12824
Which of the following statements is correct?
12825
Which of the following statements is correct with regard to PostgreSQL?
12826
Which of the following statements are true for views?
12827
Which of the following statements are incorrect regarding referential integrity?
12828
Which of the following security features is inbuilt in PostgreSQL?
12829
Which of the following programming structures is not available in PL/pgSQL?
12830
Which of the following is true about PostgreSQL clients?
12831
Which of the following is not defined in the PL/pgSQL?
12832
Which of the following is not an SQL operator?
12833
Which of the following is not a single value function?
12834
Which of the following is correct with regard to Password Authentication?
12835
Which of the following is correct regarding VACUUM?
12836
Which of the following is correct for the postmaster -n debugging option?
12837
Which of the following holds true when you have defined a function with &amp;quot;isstrict&amp;quot; attribute?
12838
Which of the following holds true if you have installed PL/pgSQL in the PgDatabase?
12839
Which of the following holds true for functions in PostgreSQL?
12840
Which of the following help PostgreSQL avoid unnecessary locking of records?
12841
Which of the following geometric types is not defined in PostgreSQL?
12842
Which of the following functions is not available in PostgreSQL?
12843
Which of the following functionalities is supported by the pg_ctl script?
12844
Which of the following files controls the host based authentication in PostgreSQL?
12845
Which of the following date function(s) are invalid?
12846
Which of the following date and time constants are not defined in PostgreSQL?
12847
Which of the following copy commands will work in PostgreSQL?
12848
Which of the following clauses are not allowed in a single row sub-query?
12849
Which of the following can be used to uniquely identify a row?
12850
Which of the following are valid in a declare block?
12851
Which of the following are supported by PostgreSQL?
12852
Which of the following are not DCL operations?
12853
Which method should be used to drop the master table if its primary key is being referenced by a foreign key in some other table?
12854
Which component of a DBMS verifies the syntax of the users query?
12855
Which clause should be used to display the rows of a table in ascending order of a particular column?
12856
Which character function should be used to return a specified portion of a character string?
12857
When should sub queries be used?
12858
What is wrong in this query: Select * from Orders where OrderID=(select OrderID from OrderItems where ItemQty&amp;gt;50)
12859
What is the first step in installing PL/pgSQL in PostgreSQL?
12860
What is the error in the following query if the students table contains several records? select name from students where name = (select name from students order by name);
12861
What is the default variable for the PROMPT3?
12862
What is the default location of the standard elog?
12863
What is a cluster?
12864
What does the RAISE statement do in PL/pgSQL?
12865
What does the pg_dump command do? pg_dump CustomerDatabase
12866
What does the following update statement do? Update OrderTable set OrderDiscount=OrderDiscount*1.10
12867
What do you understand by the following PL/pgSQL declaration? c_phone customer.contact_no%TYPE;
12868
What do you infer from the following two lines? 1. host all 192.168.1.10 255.255.255.255 reject 2. host all 127.0.0.1 255.255.255.255 t...
12869
There is a table t upon which a primary key constraint by the name pk is applied. What will be the correct syntax to drop the constraint?
12870
There is a column c1 in the table t to which a primary key pk is to be added. What will be the correct syntax?
12871
There are two tables A and B. You are retrieving data from both tables where all rows from table B and only matching rows from table A should be displayed. Which type of join will you apply between...
12872
The primary key indexing technique does not allow:
12873
The names of those departments where there are more than 100 employees have to be displayed. Given two relations, employees and departments, which query should be used? Employee --------- Empno Emp...
12874
Select the appropriate query for the Products table when data should be primarily ordered by ProductGroup. ProductGroup should be displayed in ascending order and CurrentStock should be in descendi...
12875
Point out the incorrect statement regarding group functions:
12876
Perfect Services provides financial services. You need to display data from the pers table for joining_date from #1/1/2005# to #31/12/2005# and the job should be for Analyst or Clerk or Salesman. W...
12877
Normalization divides tables in a more useful and meaningful manner. Which statement is correct for the FIRST NORMAL FORM?
12878
Is function overloading available in PL/pgSQL?
12879
In which order are primary queries and their sub-queries interpreted:
12880
In which of the following ways can a value in an array column be modified?
12881
If entity x is existence-dependent on entity y, then what is x called?
12882
How can data be accessed by users who do not have direct access to the tables?
12883
For which of the following languages does PostgreSQL provide an API interface?
12884
Food Cart Accounting System (FOCAS) is maintaining products in the products table, and wants to see the products which are 50 or more numbers far from the minimum stock limit. The structure of the ...
12885
Examine the following query: Create table Person (EmpNo Number(4) not null, EName Char not null, Join_dt Date not null, Pay Number) Which of the following field(s) are created correctly?
12886
Every Boyce-Codd Normal Form(BCNF) is in:
12887
Data validation can be implemented at the definition stage through:
12888
Consider the following structure of the students table: rollno number(4) name varchar(20) course varchar(20) What will be the query to display the c...
12889
Choose the correct statements for a trigger function:
12890
Choose the correct statement:
12891
Choose the correct statement regarding WAL in PostgreSQL:
12892
Can you define variables in PostgreSQL pl/pgSQL whose value cannot be null?
12893
A wholesale merchant shop needs a report about the sale where total sale of the day is more than $50,000. Which of the following will fulfill this requirement?
12894
A steel production company has two sales outlets. Both outlets are maintaining their data separately in servers SVA and SVD. Both outlets use the same structure for the Sales table. Which method wi...
12895
A PL/pgSQL code block is defined with DECLARE, BEGIN and END. How many such sub blocks can be nested within a block?
12896
You use UDDI operations to find something when you do not know specifically what you are looking for. Which of the following UDDI operations fall in this category?
12897
You need to serialize an array named &amp;#39;Street&amp;#39;. You want to set the array name as &amp;#39;StreetName&amp;#39; after serialization. Which of the following codes will serialize the array correctly?
12898
You need to send an image from a Web server to an image server in order to customize the image for the Web surfer. Which of the following options will you use to send binary data with a SOAP message?
12899
You have written a method in your Web service which returns a void value. In order to make a one-way communication, which of the following do you need to do?
12900
You have created a Web service named &amp;#39;Service1&amp;#39;. The client application of &amp;#39;Service1&amp;#39; has a textbox called &amp;#39;textbox1&amp;#39; and you want to set the value of textbox1.text as UserAgent of &amp;#39;Service1&amp;#39;. Whic...
12901
You create a webservice which will send a SOAP fault for any request that does not include the right user-agent in the HTTP headers. In this case, the user-agent must be &amp;quot;BasicInfo UserAgent&amp;quot;. Whic...
12902
You are writing a document-encoded client for your Web service &amp;#39;ShareQuotes&amp;#39;. Which of the following indicates that this encoded client is not literal XML?
12903
You are developing a Web service in ASP.NET. Which of the following .net classes will be extended by your service?
12904
XML Serialization uses stream-based parsers in System.Xml. Which of the following types of streams can be used for serialization and deserialization?
12905
WSDL is an XML-based language for describing Web services. Which of the following are correct regarding the functioning of WSDL?
12906
WS-Routing specifies a series of elements that can send a SOAP Fault message in response to an error. Which of the following elements are relevant to the SOAP Fault message specified by WS-Routing?
12907
While creating a client application for a Web service called &amp;#39;QuestionBank&amp;#39;, which of the following should be extended by the client class &amp;#39;Service1&amp;#39;?
12908
Which of the following xml tags does not come with a DISCO document automatically generated by .NET?
12909
Which of the following XML related technologies are part of the .NET Framework&amp;#39;s XML technology?
12910
Which of the following transport protocols can be used for communication of Web service?
12911
Which of the following should you know to send a message correctly while using Web service?
12912
Which of the following rules must be kept in mind while using SOAP with DIME?
12913
Which of the following represents an array in a SOAP message?
12914
Which of the following represents a structure in a SOAP message?
12915
Which of the following protocols form the basis of the Web Service Architecture?
12916
Which of the following namespaces is used for encoding style in SOAP?
12917
Which of the following is true with regard to .NET Web services? Statement 1:.NET Web services use the XmlSerializer as the engine for sending and receiving SOAP messages. Statement 2:.NET Web ser...
12918
Which of the following is the correct position of the header in a SOAP message?
12919
Which of the following is not a correct statement regarding schema?
12920
Which of the following is correct with regard to the statements given below? Statement 1: RPC-encoded clients are very similar to document-encoded ones. Statement 2: RPC-encoded clients need to se...
12921
Which of the following is correct with regard to the statements given below? Statement 1: A Web service is not a web site that a user reads. Statement 2: A Web service is something another process...
12922
Which of the following is correct with regard to the statements given below? Statement 1: A logical name is a URI that necessarily represents the exact location to which a message is sent. Stateme...
12923
Which of the following is correct with regard to SOAP Faults?
12924
Which of the following is an invalid child of a Fault element of a SOAP message?
12925
Which of the following is an example of referring an external document through a SOAP envelope?
12926
Which of the following is a process of making resources and services available on a new system, when the previous system fails while using a federated Web service design?
12927
Which of the following information does a server need to publish in order to meet a client&amp;#39;s needs?
12928
Which of the following does the acronym UDDI stand for?
12929
Which of the following does the acronym DIME stand for?
12930
Which of the following code snippets are serializable?
12931
Which of the following classes provides the symmetric encryption functionality, a major form of encryption?
12932
Which of the following classes is the base class for Soap Extensions?
12933
Which of the following child elements of a Fault element is used to express application-specific details about the error that occurred?
12934
Which of the following can be encrypted with an XML encryption?
12935
Which of the following are the limitations of XML serialization?
12936
Which of the following are correct with regard to XML serialization?
12937
Which of the following are correct with regard to WSDL?
12938
Which of the following are correct with regard to WS-Routing?
12939
Which of the following are correct with regard to WS-Referral protocol?
12940
Which of the following are correct with regard to WS-Inspection?
12941
Which of the following are correct with regard to data types in SOAP?
12942
Which of the following are correct with regard to asynchronous pattern?
12943
Which of the following are correct with regard to operations of WS-Routing?
12944
Which of the following allows you, as a developer, to intercept every request that comes into an ASP.NET Web Service at various events, such as when the request begins, or when an error occurs?
12945
Which Fault type is used when an error occurs that cannot be directly linked to the processing of the message?
12946
Which entity type holds information about specific businesses or corporate entities?
12947
Which design methodology spreads out processes, components, and machines in a way that removes single points of failure?
12948
When reading a stream of XML in .Net, it can be verified that it is valid according to its schema. Which class is capable of performing the schema validation?
12949
When building a Web service, the Web Services Description Language (WSDL) is the most popular option for describing Web services. Which of the following sections are abstract parts of a WSDL in .ne...
12950
What does WSDL stand for?
12951
The Web service infrastructure comes with a special SOAP-based extension feature that enables you to extend the functionality of your Web service or Web service client. Which of the following will ...
12952
The use of attributes in a class and its members can affect the XML into which it serializes. Which of the following rules apply when a class is serialized?
12953
The two major features in .NET are the ability to create XML Web Services Servers and XML Web Services Clients. Which of the following is the engine that drives most of these features?
12954
The System.Xml.Serialization namespace contains classes that are used to serialize objects into XML format documents or streams. Which serialization class provides the serialization and deserializa...
12955
The namespace, System.Security.Cryptography has an abstract class, from which specific implementations of various symmetric, or private keys, and encryption algorithms are derived. Which of the fol...
12956
The fundamental idea behind SOAP is that two applications; regardless of the operating system, the programming language, or any other technical implementation detail, may openly share information u...
12957
The following code has stored the data using the multiple-referenced accessor: &amp;lt;Person&amp;gt; &amp;lt;Address href=&amp;quot;address1&amp;quot; /&amp;gt; &amp;lt;/Person&amp;gt; &amp;lt;Address id=&amp;quot;address1&amp;quot; /&amp;gt; Which of the following is the correct way t...
12958
The extensibility of Web services through the .NET Framework and ASP.NET Web Services contributes to the power and dynamic nature of Web services. Which of the following are correct with regard to ...
12959
State whether True or False: When you serialize an array that is a member of a class, the result is a piece of structured XML that contains (a) a top element which is, by default, the name of the ...
12960
Sometimes, you will want the WSDL file created for your service to indicate that it will be modified by the SOAP extension running on it. Conversely, you will want the proxy generated for you from ...
12961
SOAP defines four standard types of Faults that belong to the http://www.w3.org/2001/06/soap-envelope namespace. Which of the following is the incorrect Fault code?
12962
Security is a hard-to-use feature in .Net. On the contrary, it is rather easy to implement in Web services. Which of the following namespaces is used for encryption?
12963
Referring to the statements given below, which of the following is correct? Statement 1: One of the most powerful design decisions with SOAP was to make it transport independent, which means that ...
12964
Refer to the statements given below and identify the incorrect element: &amp;lt;s:Envelope xmlns:s=&amp;quot;...&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;s:Faults&amp;gt; &amp;lt;faultcode&amp;gt;Client.Authentication&amp;lt;/faultcode&amp;gt; &amp;lt;faultstring&amp;gt; Invalid credential...
12965
Refer to the following statements and identify the lines that are invalid: 1. &amp;lt;%@ Service Class=&amp;quot;TestClass&amp;quot; Language=&amp;quot;C#&amp;quot; %&amp;gt; 2. using System; 3. using System.Web.Service; 4. public class TestCla...
12966
Refer to the following SOAP message and identify the incorrect child element of the Fault element: &amp;lt;s:Envelope xmlns:s=&amp;quot;...&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;s:Fault&amp;gt; &amp;lt;faultcode&amp;gt;Client.Authentication&amp;lt;/faultcode&amp;gt; &amp;lt;fault...
12967
Refer to the following code, which is a part of an xml validation: ... filename = &amp;quot;OrderDetails.xml&amp;quot;; FileStream stream = new FileStream( filename , FileMode.Open); XmlValidatingReader reader = new...
12968
Refer to the following code snippet: ... 1. XmlSerializer ser = new XmlSerializer( typeof(ServiceDescription) ); 2. FileStream objFile = new FileStream( txtWSDL.Text, FileMode.Open ); 3. ServiceDes...
12969
Refer to the following code of a SOAP message and identify the error: &amp;lt;s:Envelope xmlns:s=&amp;quot;http://www.w3.org/2001/06/soap-envelope&amp;quot;&amp;gt; &amp;lt;s:Body&amp;gt; &amp;lt;n:getQuote xmlns:n=&amp;quot;urn:QuoteService&amp;quot;&amp;gt; &amp;lt;symbol xsi:ty...
12970
Refer to the code given below and identify the line numbers that contain errors: .. 1. Inquire.Url = &amp;quot;http://uddi.rte.microsoft.com/inquire&amp;quot;; 2. FindBusiness findBusiness = new FindBusiness(); 3. f...
12971
Often you will want child elements of XML to be in the same namespace as their parent XML elements, and this makes sense for a lot of XML documents. However, sometimes child elements will be in oth...
12972
Mike is writing a RPC-encoded client for his Web service. Which attribute will he use for RPC implementation?
12973
Mike has built the following document literal web service client class by hand. This code contains an invalid syntax in one line. Identify this line. 1. [WebServiceBinding(&amp;quot;MyBinding&amp;quot;, &amp;quot;http://MyN...
12974
Mark is developing a Web service that handles RPC-encoded operations. He wants to make all the methods of the service RPC-encoded, but does not want to put any attribute for each method. Which clas...
12975
Mark intends to use Web services of &amp;#39;Royal Airways&amp;#39; in his application. He is searching for UDDI APIs, available in the .net library. Which of the following codes should he apply in this scenario?
12976
In the .NET UDDI SDK, which of the following contains the businessEntity structure?
12977
Gavin wants to read the WSDL of his Web service as &amp;#39;QBankWS&amp;#39;. Which of the following classes is capable of keeping the WSDL?
12978
Creating a hash with a public key encryption is the ability to verify the integrity of data without necessarily encrypting it. Which of the following are correct with regard to HASH?
12979
Client access is accomplished via custom proxy classes that use the WebRequest and HttpWebRequest classes. Which kinds of .NET applications use these proxy classes?
12980
While troubleshooting Xserver, which of the following steps is not required?
12981
Which statement correctly creates a Volume Group, named vg0, when there are two partitions /dev/hda6 and /dev/hda7 of 150 MB each, totalling 300MB?
12982
Which of the following repquota command option is used to Report all quotas, even if there is no usage?
12983
Which of the following files contains the IP address of the gateway?
12984
Which of the following denotes Raid level 0?
12985
Which of the following commands will format the /test partition?
12986
Which of the following commands enables ip forwarding permanently?
12987
Which is the correct command to start the daemon of the printserver?
12988
Which file contains the configuration of the network card?
12989
Which entry is specified in /etc/resolv.conf ?
12990
Which entry is not required in /etc/sysconfig/network ?
12991
Which entry does not belong to ifcfg-eth0 ?
12992
Which command is used to set a quota for user Debbie. The path is /test, the size of quota is 5MB and soft limit is 4MB. The user is not allowed to use more than 5MB.
12993
When VGs (Volume Groups) are created, where are the VG information files stored?
12994
When the system is started, it shows Redhat Enterprise Linux. When the enter key is pressed, it shows the grub prompt. The present working directory is either / or /boot. How can you find the /boot...
12995
What will be the behavior of the following command: # echo &amp;quot;1&amp;quot; &amp;gt; /proc/sys/net/ipv4/ip_forward
12996
What types of files does /proc filesystem consist of?
12997
What should be the command to view the details of raid device /dev/md0 ?
12998
What should be done to extend a 200MB LVM named lv0 by 50MB. A volume group named vg0 of 100MB is available free, lv0 is mounted on /test ?
12999
What problems will be faced during reboot, when the permissions of /tmp are 655, and the default permissions are 1777?
13000
What is the path of rc.sysinit?
13001
What is the full form of MBR?
13002
What is the correct format for kickstart installation through NFS, when the NFS IP is 192.168.0.254, and the file path on the server is /kickstart/ks.cfg ?
13003
What is proc file system?
13004
What does the entry id:3:initdefault: define in the /etc/inittab file?
13005
Through which of the following commands can a corrupted initrd be recreated?
13006
There are 3 disks of 1 GB each, with mean total 3 GB. If a raid level 5 is implemented, what will be the size of the raid device?
13007
The command which configures devices is:
13008
Sticky bit and suid are to be set on /home/test. Which command should be used to give rwx permissions to each user, group and others?
13009
In which of the following locations are boot messages stored?
13010
In which mode can LVM be created during installation?
13011
If the permissions of rc.sysinit are changed from 655 to 444, what will happen during the next reboot?
13012
If /root partition is installed on /dev/hda2, what defines hda2 ?
13013
How should a raid device /dev/md0, with level 0, and devices /dev/hda6, /dev/hda7 be created?
13014
How should a cron job that prints &amp;quot;hello&amp;quot; every morning at 4:02am, be set up?
13015
How much space does the IPL (Initial Program Loader) take on the disk?
13016
How many disks are required in Raid level 5?
13017
How is an LVM of 200MB named lv0 created within the volume group vg0?
13018
How can you tell which RPM the /etc/inittab file belongs to?
13019
How can kernel-2.6.9-5 rpm be installed?
13020
How can ext3 filesystem be converted to ext2 filesystem if the partition is /dev/hda7 ?
13021
How can ext2 filesystem be converted to ext3 filesystem if the partition is /dev/hda7 ?
13022
During Linux installation, in which mode can RAID be created?
13023
Can the size of LVM be decreased?
13024
Can / partition on lvm device be installed during installation?
13025
A new swap partition is created and entered correctly in /etc/fstab. How will it be mounted?
13026
A new partition /dev/hda6 has been created. How will it be formatted with ext3 file system (one block=1024 bytes, inode size=one inode every 2 blocks)?
13027
Why is the wc command used?
13028
Who developed Linux?
13029
Which of the following vi commands will save the file and exit forcefully from the vi editor?
13030
Which of the following vi commands will exit forcefully from the vi editor without saving changes to the file?
13031
Which of the following vi commands will discard the changes to the file and exit the vi editor?
13032
Which of the following vi commands will delete the current line?
13033
Which of the following vi commands is used to enter in to insert mode?
13034
Which of the following is the path that contains documentation about installed packages?
13035
Which of the following is the parent process in Linux, which further has no parent?
13036
Which of the following is the intermediate between the hardware and the shell in the Linux operating system?
13037
Which of the following is the correct path of the passwd file?
13038
Which of the following is not a valid shell?
13039
Which of the following is an incorrect command?
13040
Which of the following commands will show you a page-wise listing?
13041
Which of the following commands will create a softlink?
13042
Which of the following commands lets you search for text in a file without opening the file first?
13043
Which of the following commands can be used to display a long listing of files, with a human-readable file size (like 6.8M instead of 6819467)?
13044
Which of the following are valid grep syntax?
13045
Which is the correct syntax to give permission 755 to the dir /etc/test ?
13046
Which is the correct syntax to display the calendar of September 2005?
13047
Which command is used to modify the user?
13048
Which command is used to add a new group?
13049
Which command changes permissions of files or directories?
13050
Which command adds a new user?
13051
What output should the ls command show after executing the following command? $ touch {report,graph}_{jan,feb,mar}
13052
What kind of software is the Linux operating system?
13053
What is the purpose of the touch command?
13054
What is the purpose of the makewhatis command?
13055
What is the output of the following command? $ man cal &amp;gt; cal.man
13056
What is the name of the file where groups are added?
13057
What is the meaning of GPL?
13058
What is the correct format to open the file /etc/test into the vi editor?
13059
What does the pwd command do?
13060
What does the history command do?
13061
What does the head command do?
13062
What does the following command do? # whatis cal
13063
What does the du command do?
13064
What does the aspell command do?
13065
What does permission 777 denote?
13066
What does permission 644 denote?
13067
The user&amp;#39;s current path is /root/Desktop/abc. If he runs $ cd ../../../ what will be the user&amp;#39;s current working directory?
13068
Linux operating system is:
13069
If the umask is 0022, what is the default file permission?
13070
How will you display the fifth man page for the inittab command?
13071
How many terminals are provided by default in the Linux operating system?
13072
How can you obtain a short description of the ls command?
13073
How can you locate the file named passwd?
13074
How can the version of the Linux kernel be checked?
13075
Does Linux support wildcard characters, regular expressions and modifiers?
13076
With which of the following are Declarative Databinding expressions delimited?
13077
While using the declaration below, what is the result of clicking on the control? &amp;lt;input id=&amp;quot;Button1&amp;quot; type=&amp;quot;button&amp;quot; onclick=&amp;quot;return Button1_onclick()&amp;quot;/&amp;gt;
13078
Which of the following types guarantee atomic reads and writes?
13079
Which of the following tasks are appropriate for accessing a Web Service from the client code?
13080
Which of the following statements are true about Passport Authentication?
13081
Which of the following statement is not true related to Data Provider in ADO.NET?
13082
Which of the following operators can be overloaded?
13083
Which of the following operations can NOT be performed inside a catch block?
13084
Which of the following mechanisms are not suitable for returning a single row from a DataTable containing a large number of records?
13085
Which of the following is/are true regarding the use of Authentication to control access to the HTML file (.htm .html)?
13086
Which of the following is/are true of the System.Text.StringBuilder class?
13087
Which of the following is/are true about enums?
13088
Which of the following is used to remove a cookie from a client machine?
13089
Which of the following is true about exceptions?
13090
Which of the following is not an unboxing conversion?
13091
Which of the following is not a valid attribute for impacting serialization?
13092
Which of the following is correct for Application Center Test (ACT) to perform load testing?
13093
Which of the following is a primary characteristic of the System.Xml.XmlDataDocument?
13094
Which of the following is true about VB generics?
13095
Which of the following events should be used for assigning a Theme dynamically to a page?
13096
Which of the following event you will use if you want any updates before the server control is rendered to the page?
13097
Which of the following elements can be adjusted when using the ProcessModel element of the Machine.Config file?
13098
Which of the following does Event Bubbling allow composite controls to perform?
13099
Which of the following differentiates a UserControl from a Custom Server control?
13100
Which of the following controls allows the use of XSL to transform XML content into formatted content?
13101
Which of the following conditions can trigger the automatic recycling of an ASP.NET application hosted in IIS?
13102
Which of the following code samples will cause a compilation error?
13103
Which of the following class is used to divide the time into units such as weeks, months, and years?
13104
Which of the following characteristics do overloaded methods have?
13105
Which of the following can you do when deleting a DataRow from the DataRowCollection of a DataTable?
13106
Which of the following can one use to detect the user&amp;#39;s current language?
13107
Which of the following can Interfaces contain?
13108
Which of the following can be used to preserve state information?
13109
Which of the following are valid assignments?
13110
Which of the following are true when comparing built in types for equality?
13111
Which of the following are true regarding validation in an ASP.NET application?
13112
Which of the following are true of using ADO.NET DataSets and DataTables?
13113
Which of the following are true for parameters?
13114
Which of the following are true about Nullable types?
13115
Which of the following are true about event handling?
13116
Which of the following are true about declarative attributes?
13117
Which of the following are required to be true by objects which are going to be used as keys in a System.Collections.HashTable?
13118
Which of the following are performed to fully debug an ASP.NET Application running on the same machine as the debugger?
13119
Which of the following are not valid namespaces in the .NET framework?
13120
Which of the following are common methods of supplying &amp;quot;Help&amp;quot; information to an ASP.NET application?
13121
Which of the following accurately describes the class structure when implementing an ASP.Net page which uses the CodeFile attribute?
13122
Which method calls will compile the following code? Private Sub Sample(ByVal number As Integer, Optional ByVal bool As Boolean = True) End Sub
13123
Which directive allows the utilization of a custom web control in an ASP.NET page?
13124
Which access limitation does a class member declared &amp;quot;Protected Friend&amp;quot; have?
13125
Where should information about a control created at design time be stored?
13126
Where should an instance of an object which provides services to all users be stored?
13127
When using the Demand method of System.Security.IPermission, which of the following will occur?
13128
When using Cascading Style Sheets (CSS) to format output, which of the following is/are true?
13129
What is the result of Console.WriteLine(&amp;quot;{0}:{1}:{2}&amp;quot;, CInt(2.5), CInt(1.5), Fix(1.5))?
13130
What does the OrElse operator do?
13131
What does the AndAlso operator do?
13132
Via which of the following is ViewState maintained by default?
13133
Transactions initiated in which of the following are supported by the System.Transactions infrastructure?
13134
The earliest event in which all viewstate information has been restored is:
13135
Of which elements does Generics allow parameterization by type?
13136
In which of the following ways do structures differ from classes?
13137
In which file are Predefined Client Side Validation Scripts defined?
13138
In the following example, by which technique can the method Test in the derived class Cat access the implementation of MakeNoise in the base class? Public Class Animal Public Overridable Sub MakeN...
13139
Determining the availability of sufficient memory for an operation can be accomplished by:
13140
DateTime Structures is suitable for which of the following applications?
13141
Custom non-fatal exceptions should be derived from:
13142
By which of the following can the .NET class methods be included in .aspx files?
13143
Your company, StoreIt Inc has stored the text of several journals in a Microsoft SQL Server 7.0 database. Each sentence is stored in a separate record so that the text can be retrieved with the fi...
13144
You want to display the titles of books that meet the following criteria: 1. Purchased before November 11, 2002 2. Price is less than $500 or greater than $900 You want to sort the result by the ...
13145
You want to access data from the &amp;quot;Customer&amp;quot; table in the database. You generate a DataSet named &amp;quot;MyDataSet&amp;quot; by adding &amp;quot;Customer&amp;quot; table to it. Which of the following statements should you use to loa...
13146
You use a Command object to retrieve employee names from the employee table in the database. Which of the following will be returned when this command is executed using ExecuteReader method?
13147
You need to install an online parcel tracking application and its supporting assemblies so that the application and its assemblies can be uninstalled using the Add/Remove Programs Control Panel app...
13148
You have developed a custom server control and have compiled it into a file named FirstReport.dll. The code is displayed below: &amp;lt;%@ Register TagPrefix=&amp;quot; CertKing Tag&amp;quot; Namespace=&amp;quot;ReportNS&amp;quot; Assembly...
13149
You create an ASP.NET page that allows a user to enter a requested delivery date in a TextBox control named txtDelDate. The date must be no earlier than two business days after the order date, and ...
13150
You create an ASP.NET page named ProjectCalendar.aspx that shows scheduling information for projects in your company. The page is accessed from various other ASP and ASP.NET pages hosted throughout...
13151
You create an ASP.NET page named Customer.aspx. Customer.aspx contains a Web user control that displays a drop-down list box of Cities. The Web user control is named CityList, and it is defined in ...
13152
You create an ASP.NET application for an online insurance site PremiumInsurance. A page named PersonalDetails.aspx has the following Page directive: &amp;lt;%@ Page Language=&amp;quot;VB&amp;quot; CodeBehind=&amp;quot;PersonalDeta...
13153
You create an ASP.NET application for ABC Corporation. The project manager requires a standard appearance for all Web applications. Standards are expected to change periodically. You need to enforc...
13154
You are the software engineer for Premium Corp.. One of the pages in an ASP.NET application contains the following declaration: &amp;lt;%@ Register Tagprefix=&amp;quot;WoodySideBankControls&amp;quot; Namespace=&amp;quot;WoodySideB...
13155
You are maintaining data for its products in the Products table, and you want to see those products, which are 50 items that is currentStock or more than 50 but less than the minimum stock limit of...
13156
You are developing an application to take orders over the Internet. When the user posts back the order form, you first check to see whether he is a registered customer of your company. If not, you ...
13157
You are developing a website that has four layers. The layers are user interface (web pages), business objects, data objects, and database. You want to pass data from the database to controls on a ...
13158
You are debugging an ASP.NET application for Premium Corp.. Users will use the application to produce reports. Your application contains several Debug.WriteLine statements. Which window in Visual S...
13159
You are debugging a Visual Basic.NET application. You add a variable to the watch window. When Visual Basic enters break mode, the Value of the expression variable is &amp;quot;&amp;quot;. What is the most likely ca...
13160
You are creating an ASP.NET Web site for your company. The Web site will use both Microsoft(R) .NET Framework server controls and ActiveX controls. You want to use Microsoft Visual Studio(R) .NET t...
13161
You are creating an ASP.NET page for your company&amp;#39;s Web site. Customers will use the ASP.NET page to enter payment information. You add a DropDownList control named oPaymentTypeList that enables cu...
13162
You are creating an ASP.NET page for Premium Consultants. You create a GridView control that displays past purchases made by the user. The GridView control is populated from an existing database wh...
13163
You are creating an ASP.NET application. The application will be deployed on intranet. Application uses Microsoft Windows authentication. More than 100 users will use the ASP.NET application simult...
13164
You are creating an ASP.net application to enter timesheet data intuitively. Users will enter data using a DataGrid. You have added a button column to your DataGrid. The button column uses a custom...
13165
You are creating an ASP.NET application that will run on your company&amp;#39;s intranet. You want to control the browser window and respond immediately to non-post-back events. Which should you use?
13166
You are creating an ASP.NET application that will record each customer&amp;#39;s entry. It is possible that thousands of entries could be posted at any given time. Your application will be hosted on twenty...
13167
You are creating an ASP.NET application that is hosted on your company&amp;#39;s Web server. You want to access a database with minimal effort. What you will not do?
13168
You are creating an ASP.NET application for AutoMart Internet Web site. A toolbar is required that will be displayed at the top of each page in the Web site. The toolbar will contain only static HT...
13169
You are a web developer for an international literary website. Your application has a lot of text content that requires translation and few executable components. Which approach would you use?
13170
XYZ is creating an e-commerce site for PremiumBoutique. The site is distributed across multiple servers in a Web farm. Users will be able to navigate through the pages of the site and select produc...
13171
Which query will display data from the Pers table relating to Analysts, clerks and Salesmen who joined between 1/1/2005 and 1/2/2005?
13172
Which operator will be evaluated first in the following statement: select (age + 3 * 4 / 2 - 8) from emp
13173
Which one of the following correctly selects rows from the table myTable that have null in column column1?
13174
Which of the two statements is true? (a)MSIL code is platform independent (b)CLR is platform dependent
13175
Which of the following queries is valid?
13176
Which of the following objects is required by the Dataset to retrieve data from a database and to save updated data back to the database?
13177
Which of the following is the way to handle Unmanaged Code Exceptions in ASP.NET?
13178
Which of the following is the syntax for creating an Index?
13179
Which of the following is the default configuration file for each application in ASP.NET?
13180
Which of the following is not a valid SQL operator?
13181
Which of the following is not a valid directive in ASP.NET?
13182
Which of the following is not a valid ASP.NET Web form control?
13183
Which of the following is not a service provided by Common Language Runtime (CLR)?
13184
Which of the following has the highest order of precedence in SQL Server?
13185
Which of the following datatypes is not supported by SQL-Server?
13186
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
13187
Which of the following connectionstring in Web.Config is correct if Microsoft SQL Server database named ClassList resides on a server named Neptune is to be used?
13188
Which of the following are the valid methods of the SqlTransaction class?
13189
Which of the following are not true in ASP.NET?
13190
Which of the following are false for ASP.NET events?
13191
Which of the following are aggregate functions in SQL?
13192
Which of following is correct if you want to import a C# class called myClass that is implemented in the myClass.cs file into a .aspx page?
13193
Which line of code should you use to copy the edited rows from dataset productInfo into another dataset productChanges?
13194
Which DLL is responsible for processing the page requests running on the server?
13195
When you make some changes to the configuration file, do you need to stop and start IIS to apply the new settings?
13196
When designing a database table, how do you avoid missing column values for non-primary key columns?
13197
What will happen if you query the emp table as shown below: select empno, DISTINCT ename, Salary from emp;
13198
What will happen if the Server configuration file and the Application configuration file have different values for session state?
13199
What is wrong with the following query: select * from Orders where OrderID = (select OrderID from OrderItems where ItemQty &amp;gt; 50)
13200
What is the total no. of events in Global.asax file in Asp.NET?
13201
What is the order of precedence among the following operators? 1 IN 2 NOT 3 AND 4 OR
13202
What is the correct order of clauses in the select statement? 1 select 2 order by 3 where 4 having 5 group by
13203
What does the following line of code do? &amp;lt;%@ Register tagprefix=&amp;quot;ril&amp;quot; Tagname=&amp;quot;test&amp;quot; Src=&amp;quot;rilTest.ascx&amp;quot; %&amp;gt;
13204
What data types do the RangeValidator control support?
13205
View the following Create statement: 1 Create table Pers 2 (EmpNo Int not null, 3 EName Char not null, 4 Join_dt Datetime not null, 5 Pay Int) Which line contains an error?
13206
The STUDENT_GRADES table has these columns: STUDENT_ID INT SEMESTER_END DATETIME GPA FLOAT Which of the following statements finds the highest Grade Point Average (G...
13207
The simplest query must include at least________ and _________.
13208
The sales database contains a customer table and an order table. For each order there is one and only one customer, and for each customer there can be zero or more orders. How should primary and ...
13209
The names of those departments where there are more than 100 employees have to be displayed. Given two relations, employees and departments, what query should be used? Employee --------- Empno Emp...
13210
Study the situation described below and identify the nature of relationship? Each student can enroll into more than one class. Each class can accommodate more than one student.
13211
Sam is developing an application that enables the users to perform read and write operations on text files. He uses structured exception handling to handle the errors. He writes the code for closin...
13212
LAST_NAME DEPARTMENT_ID SALARY ALLEN 10 3000 MILLER 20 1500 King 20 2200 Davis ...
13213
It is time for the annual sales awards at your company. The awards include certificates awarded for the five sales of the highest sale amounts. You need to produce a list of the five highest revenu...
13214
Is the FROM clause necessary in every SELECT statement?
13215
Is it possible to insert several rows into a table with a single INSERT statement?
13216
In Windows built-in authentication, what will happen with the following set of statements? &amp;lt;system.web&amp;gt; &amp;lt;authorization&amp;gt; &amp;lt;deny users=&amp;quot;RIL&amp;quot;/&amp;gt; &amp;lt;allow users=&amp;quot;RIL&amp;quot;/&amp;gt; &amp;lt;/authorization&amp;gt; &amp;lt;/s...
13217
In which sequence are queries and sub-queries executed by the SQL Engine?
13218
In which of the following namespaces is the Assembly class defined?
13219
In SQL Server, you should avoid the use of cursors because:
13220
In SQL Server, which of the following is not a control statement?
13221
In ASP.NET, which of the following is not an event of the Page class?
13222
In ASP.NET, the exception handling should be used:
13223
In ASP.NET, the control&amp;#39;s value set during the postback can be accessed in:
13224
In a SQL Server query, what will the output be if you try to perform arithmetic on NULL values?
13225
How you will generate a report with minimum network traffic?
13226
How can you view the results of Trace.Write() statements?
13227
How can you pop-up a window to display text that identifies the author of the book?
13228
How can you change &amp;quot;Hansen&amp;quot; into &amp;quot;Nilsen&amp;quot; in the LastName column in the Persons Table?
13229
Examine the two SQL statements given below: SELECT last_name, salary, hire_date FROM EMPLOYEES ORDER BY salary DESC SELECT last_name, salary, hire_date FROM EMPLOYEES ORDER BY 2 DESC What is tru...
13230
Examine the query:- select (2/2/4) from tab1; where tab1 is a table with one row. This would give a result of:
13231
Examine the code given below: SELECT employee_id FROM employees WHERE commission_pct=.5 OR salary &amp;gt; 23000 Which of the following statements is correct with regard to this code?
13232
Evaluate the following SQL statement: SELECT e.employee_id,( (.15* e.salary) + (.5 * e.commission_pct) + (s.sales_amount * (.35 * e.bonus))) AS CALC_VALUE FROM employees e, sales s WHERE e.employe...
13233
Consider the transaction: Begin Transaction Create table A ( x smallint, y smallint) Create table B ( p smallint, q smallint) Update A set x=600 where y &amp;gt; 700 Updat...
13234
Consider the query: SELECT name FROM Student WHERE name LIKE &amp;#39;_a%&amp;#39;; Which names will be displayed?
13235
Consider the following two tables: 1. customers( customer_id, customer_name) 2. branch ( branch_id, branch_name ) What will be the output if the following query is executed: Select *, bran...
13236
Consider the following two statements relating to ASP.NET and choose the most appropriate option: Statement 1: Value types are allocated on a stack Statement 2: Reference types are allocated on a ...
13237
Consider the following two statements and choose the most appropriate option: 1. For configuration, ASP.NET uses IIS Metabase 2. For configuration, ASP.NET uses an XML based configuration system
13238
Consider the following table structure of students: rollno int name varchar(20) course varchar(20) What will be the query to display the courses in w...
13239
Consider the following queries: 1. select * from employee where department LIKE &amp;#39;[^F-M]%&amp;#39;; 2. select * from employee where department = &amp;#39;[^F-M]%&amp;#39;; Select the correct option:
13240
Choose the appropriate query for the Products table where data should be displayed primarily in ascending order of the ProductGroup column. Secondary sorting should be in descending order of the Cu...
13241
Check the following code: Public Shared Sub UpdateData(ByVal sql As String,ByVal connectionString As String, ByVal dataTable As DataTable) Dim da As New OleDb.OleDbDataAdapter() Dim cnn As New Ol...
13242
A production house needs a report about the sale where total sale of the day is more than $20,000. Which query should be used?
13243
With which of the following are Declarative Databinding expressions delimited?
13244
With which class is the task of mapping a specific point in time into units such as weeks, months, and years accomplished?
13245
Which of the following will be executed without error? Public Class Fruit End Class Public Class Apple Inherits Fruit End Class
13246
Which of the following types guarantee atomic reads and writes?
13247
Which of the following statements do Expression Trees fit best?
13248
Which of the following statements are true about Passport Authentication?
13249
Which of the following mechanisms are not suitable for returning a single row from a DataTable containing a large number of records?
13250
Which of the following is/are true regarding the use of Authentication to control access to the HTML file (.htm .html)?
13251
Which of the following is used to remove a cookie from a client machine?
13252
Which of the following is true regarding the System.DateTimeOffset structure?
13253
Which of the following is not an unboxing conversion?
13254
Which of the following is applicable when using Secure Socket Level communications?
13255
Which of the following is true about VB generics?
13256
Which of the following events should be used for assigning a Theme dynamically to a page?
13257
Which of the following elements can be adjusted when using the ProcessModel element of the Machine.Config file?
13258
Which of the following does Event Bubbling allow composite controls to perform?
13259
Which of the following differentiates a UserControl from a Custom Server control?
13260
Which of the following controls allows the use of XSL to transform XML content into formatted content?
13261
Which of the following conditions can trigger the automatic recycling of an ASP.NET application hosted in IIS?
13262
Which of the following characteristics does a LINQ query expression should have?
13263
Which of the following can you do when deleting a DataRow from the DataRowCollection of a DataTable?
13264
Which of the following can one use to detect the user&amp;#39;s current language?
13265
Which of the following can be used to preserve state information?
13266
Which of the following can be used to control caching within an ASP.NET application?
13267
Which of the following are valid mechanisms for adding an event handler for Public Event SomeEvent() on class Sample?
13268
Which of the following are true when using a POST command to access a WebService method?
13269
Which of the following are true regarding validation in an ASP.NET application?
13270
Which of the following are true regarding System.Threading.ReaderWriterLockSlim?
13271
Which of the following are true of using ADO.NET DataSets and DataTables?
13272
Which of the following are true of the System.Text.StringBuilder class?
13273
Which of the following are true of ADO.NET?
13274
Which of the following are true about System.Security.Cryptography under version 3.5 of the framework?
13275
Which of the following are true about System.GC under version 3.5 of the Framework?
13276
Which of the following are true about Nullable types?
13277
Which of the following are true about Extension methods.
13278
Which of the following are true about declarative attributes?
13279
Which of the following are true about anonymous types?
13280
Which of the following are the goals of the Windows Communication Foundation?
13281
Which of the following are performed to fully debug an ASP.NET Application running on the same machine as the debugger?
13282
Which of the following are included in the advantages of Lambda Expressions over Anonymous methods?
13283
Which of the following are common methods of supplying &amp;quot;Help&amp;quot; information to an ASP.NET application?
13284
Which of the following accurately describes the class structure when implementing an ASP.Net page which uses the CodeFile attribute?
13285
Which method calls will compile the following? Private Sub Sample(ByVal number As Integer, Optional ByVal bool As Boolean = True) End Sub
13286
Which features that are not supported in the System.TimeZone class does the System.TimeZoneInfo class provide?
13287
Which directive allows the utilization of a custom web control in an ASP.NET page?
13288
Where should information about a control created at design time be stored?
13289
Where should an instance of an object which provides services to all users be stored?
13290
When Windows Communication Foundation is used, the SessionMode property to disallow, require, or permit is applied to which contract?
13291
When Windows Communication Foundation is used to develop a Web Service, which of the following are supported?
13292
When using Cascading Style Sheets (CSS) to format output, which of the following is/are true?
13293
When using asynchronous partial updates with an UpdatePanel, which of the following are true?
13294
When using an implicitly typed array, which of the following is most appropriate?
13295
When using a JavaScript timer control in conjunction with UpdatePanels, which of the following statements are true?
13296
When aggregating data, LINQ is:
13297
What is the value of r after the following code is executed? Dim f As Func(Of Integer, Boolean) = Function(x) (x + 2) &amp;gt; 7 Dim r = f(7)
13298
What is the value of b3 after the following code is executed? Dim b1 As Boolean? = True Dim B2 As Boolean? = Nothing Dim b3 As Boolean? = If(b1 AndAlso b2, b1, b2)
13299
What is the result of the following code? Console.WriteLine(CBool(If(1&amp;gt;2, &amp;quot;True&amp;quot;, &amp;quot;False&amp;quot;)))
13300
What is the result of Console.WriteLine(&amp;quot;{0}:{1}:{2}&amp;quot;, CInt(2.5), CInt(1.5), Fix(1.5))?
13301
What does the OrElse operator do?
13302
What does the AndAlso operator do?
13303
Via which of the following is ViewState maintained by default?
13304
The rights of which Windows Account does anonymous Web Site access use by default?
13305
The earliest event where one can be assured all child controls exist is:
13306
The earliest event in which all viewstate information has been restored is:
13307
In which of the following ways do Structures differ from classes?
13308
In which file are Predefined Client Side Validation Scripts defined?
13309
In the following example,by which technique can the method Test in the derived class Cat access the implementation of MakeNoise in the base class? Public Class Animal Public Overridable Sub Ma...
13310
In order to use the AJAX AuthenticationSErvice class, which of the following must be true?
13311
In order to enable AJAX Functionality, which control is placed on the page?
13312
Identify the syntactically correct LINQ query or queries, assuming dt is a DataTable
13313
Given the following code, which of the following are syntactically correct? &amp;lt;Extension()&amp;gt; _ Public Function AppendTest(ByVal s As String, ByVal suffix As String) Return s &amp;amp; suffix ...
13314
Given the following code, which calls are valid ways to add the elements of a string array to a List(Of String)? Dim values() As String = {&amp;quot;1&amp;quot;, &amp;quot;2&amp;quot;, &amp;quot;3&amp;quot;, &amp;quot;4&amp;quot;} Dim valueList As New ...
13315
Determining the availability of sufficient memory for an operation can be accomplished by:
13316
By which of the following can the .NET class methods be included in .aspx files?
13317
Working with a list of Employees: List&amp;lt;Employee&amp;gt; lstEmployees = new List&amp;lt;Employee&amp;gt; { new Employee{Name=&amp;quot;Harry&amp;quot;,Age=15}, new Employee{Name=&amp;quot;Peter&amp;quot;,Age=22}...
13318
Why is it a bad practice to use iteration variables in lambda expressions?
13319
Which type of class members are associated with the class itself rather than the objects of the class?
13320
Which statements will give the path where the executing assembly is currently located?
13321
Which of the following will output the string below? &amp;quot; &amp;quot;
13322
Which of the following will correctly remove duplicates from a List&amp;lt;T&amp;gt;?
13323
Which of the following will block the current thread for a specified number of milliseconds?
13324
Which of the following statements is true regarding the code samples below? A: try { // code goes here } catch (Exception e) { throw e; } B: try { // code goes here } catch (Exception e) ...
13325
Which of the following statements is true regarding predicate delegates in C#?
13326
Which of the following statements is true about the System.Environment.NewLine property?
13327
Which of the following statements is true about the code below? string[] lines = theText.Split(new string[] { Environment.NewLine }, StringSplitOptions.None);
13328
Which of the following statements is true about IEnumerable&amp;lt;T&amp;gt;?
13329
Which of the following statements are true regarding the ref and out parameters in C#?
13330
Which of the following language code is not &amp;#39;managed&amp;#39; by default in .NET framework?
13331
Which of the following keywords prevents a class from being overridden further?
13332
Which of the following is true regarding a null and an empty collection in C#?
13333
Which of the following is true for CLR?
13334
Which of the following is true about friend functions in C#?
13335
Which of the following is true about constructors and member functions?
13336
Which of the following is the correct way to sort a C# dictionary by value?
13337
Which of the following is the correct way to randomize a generic list of 75 numbers using C#?
13338
Which of the following is the correct way to perform a LINQ query on a DataTable object?
13339
Which of the following is the correct way to implement deep copying of an object in C#?
13340
Which of the following is the correct code to close all references to the com objects below? Workbooks books = excel.WorkBooks; Workbook book = books[1]; Sheets sheets = book.WorkSheets; Worksheet...
13341
Which of the following functions are used to wait for a thread to terminate?
13342
Which of the following exceptions cannot be thrown by the Delete() function of the FileInfo class (ie. FileInfo.Delete())?
13343
Which of the following define the rules for .NET Languages?
13344
Which of the following code snippets will call a generic method when the type parameter is not known at compile time?
13345
Which of the following code snippets for catch shows a better way of handling an exception? 1. catch (Exception exc) { throw exc; } 2. catch (Exception exc) { throw; }
13346
Which of the following code snippets converts an IEnumerable&amp;lt;string&amp;gt; into a string containing comma separated values?
13347
Which of the following code samples will execute a command-line program in C# and return its STD OUT results?
13348
Which of the following code samples will create a comma separated list from IList&amp;lt;string&amp;gt; or IEnumerable&amp;lt;string&amp;gt;?
13349
Which of the following code samples will check if a file is in use?
13350
Which object oriented term is related to protecting data from access by unauthorized functions?
13351
Where does a C# assembly store the information regarding the other external dependencies, such as satellite assemblies, global assemblies etc, and their versions so that they can be loaded correctl...
13352
What will happen if the following code is compiled in .NET 4 or above (Assume required namespaces are included)? public class var { } public class main { public static void main(string[] args)...
13353
What will be the value of the result variable after these two statements? int num1 = 10, num2 = 9; int result = num1 &amp;amp; num2;
13354
What will be the value of result after these two statements? int num1 = 10, num2 = 9; int result = num1 ^ num2;
13355
What will be the return value if the function fn is called with a value of 50 for the parameter var? public int fn(int var) { int retvar = var - (var / 10 * 5); return retvar; }
13356
What will be the output of the following Main program in a C# console application (Assume required namespaces are included)? static void Main(string[] args) { string sPrint = St...
13357
What will be the output of the following Main program in a C# console application (Assume required namespaces are included)? static void Main(string[] args) { string Invalid = &amp;quot;$am$it$&amp;quot;; s...
13358
What will be the output of the following Main program in a C# console application (Assume required namespaces are included): static void Main(string[] args) { for (int i = 0; i &amp;lt; 1; i++) {...
13359
What will be the output of the following Main program in a C# console application (Assume required namespaces are included): static void Main(string[] args) { int @int = 15; ...
13360
What will be the output if in a WinForms application, the following code is executed in the Load event of a form? Assume this form has lblMessage as a Label Control. private void Form1_Load(object...
13361
What type of code is written to avail the services provided by Common Language Runtime?
13362
What is the syntax required to load and use a normal unmanaged windows DLL (e.g. kernel32.DLL) in a managed .NET C# code?
13363
What is the purpose of the vshost.exe file in Visual Studio?
13364
What is the purpose of the catch block in the following code? try { // Code that might throw exceptions of different types } catch { // Code goes here }
13365
What is the problem with the following function, which is supposed to convert a Stream into byte array? public static byte[] ReadFully(Stream input) { using (MemoryStream ms = new MemoryStream(...
13366
What is the output of the following code? class Test { static void Main() { string myString = “1 2 3 4 5” myString = Regex.Replace(myString, @&amp;quot;s+&amp;quot;, &amp;quot; &amp;quot;); System.Console.Writ...
13367
What is the output of the following code: class CCheck { public static void Main() { string str = @&amp;quot;E:RIL est.cs&amp;quot;; Console.WriteLine(str); } }
13368
What is the issue with the following function? public string GetName(int iValue) { string sValue = &amp;quot;0&amp;quot;; switch (iValue) { case 1: sValue = iValue.ToString(); ...
13369
What is the difference between the String and StringBuilder class objects with respect to mutability?
13370
What is the difference between int and System.Int32 CLR types?
13371
What is the difference between Expression&amp;lt;Func&amp;lt;T&amp;gt;&amp;gt; and Func&amp;lt;T&amp;gt;?
13372
What is the difference between data types &amp;quot;System.String&amp;quot; and &amp;quot;string&amp;quot; in C#?
13373
What is the benefit of using a finally{} block with a try-catch statement in C#?
13374
What is the advantage of using IList&amp;lt;T&amp;gt; over List&amp;lt;T&amp;gt;?
13375
What is an Action delegate?
13376
What are the benefits of using the ExpandoObject class over a using dictionary?
13377
What are Satellite assemblies in C# .NET?
13378
There is a class that has a public int counter field that is accessed by multiple threads. This int is only incremented or decremented. To increment this field, three thread-safe approaches are men...
13379
The global assembly cache:
13380
The .NET Framework consists of:
13381
The ___________ namespace is not defined in the .NET class library.
13382
Suppose there is a List of type Person with a property of LastName(string) and PopulateList is a function which returns a Generic List of type Person: List&amp;lt;Person&amp;gt; people = PopulateList(); What do...
13383
Suppose a class is declared as a protected internal: protected internal class A { } Which statement is correct with regards to its accessibility?
13384
Performance-wise, which of the following is the most efficient way to calculate the sum of integers stored in an object array?
13385
One of the ternary operators provided in C# is:
13386
Is it possible to define custom Exception classes in C#?
13387
In which of the following namespaces is the Assembly class defined?
13388
In the sample code given below, which of the data members are accessible from class Y? class X { private int i; protected float f; public char c; } class Y : X { }
13389
In C#, can global functions that are not associated with a particular class be defined?
13390
If i == 0, why is (i += i++) == 0 in C#?
13391
How can a single instance application be created in C#?
13392
Consider the following code: string s1 = &amp;quot;Old Value&amp;quot;; string s2 = s1; s1 = &amp;quot;New Value&amp;quot;; Console.WriteLine(s2); What will be the output printed, and why?
13393
Consider the following code block: public class Person { public string GetAge() { lock (this) { // Code to get Age of this person object. } } } Wh...
13394
Complete the following sentence: In C#, exception handling should be used...
13395
Asynchronous execution is supported in ADO.NET 2.0 for?
13396
An Interface represents which kind of relationship?
13397
An enum is defined in a program as follows: [Flags] public enum Permissions { None = 0, Read = 1, Write = 2, Delete = 4 ...
13398
Writing to STDOUT and STDERR is fairly inflexible, and most of the time the print statement accomplishes the same purpose more flexibly. How many arguments can a print statement handle?
13399
Which user input method will act like a file-object on which read and readline functions can be called?
13400
Which Python module can be used for copying files?
13401
Which of the following will throw an exception in Python?
13402
Which of the following will disable output buffering in Python?
13403
Which of the following will determine the number of CPUs available in the operating environment?
13404
Which of the following variables store parameters passed from outside?
13405
Which of the following statements imports every name in a module namespace into the current namespace?
13406
Which of the following statements copy the contents of a list and not just a reference to the list?
13407
Which of the following statements can be used to remove an item from a list by giving the index?
13408
Which of the following statements are true? A. ._variable is semi-private and meant just for convention. B. .__variable is considered superprivate and gets name mangled to prevent accidental acces...
13409
Which of the following protocol libraries can be used for an email implementation in a Python application?
13410
Which of the following options are true regarding these two code samples? Code sample 1: def main(): for i in xrange(10**8): pass main() Code sample 2: for i in xrange(10**8): pass
13411
Which of the following modules lets you check whether two files are identical, and whether two directories contain some identical files?
13412
Which of the following modules keep prior directory listings in the memory to avoid the need for a new call to the file system?
13413
Which of the following modules is used internally to determine whether a path matches?
13414
Which of the following methods returns the ASCII value of a character in Python?
13415
Which of the following members of the object class compare two parameters?
13416
Which of the following is the correct way to write a generator which will output the numbers between 1 and 100 (inclusive)?
13417
Which of the following is the correct way to get the size of a list in Python?
13418
Which of the following is the correct way to flush output of Python print?
13419
Which of the following is the correct way to execute a program from inside Python without having to consider how the arguments/quotes are formatted?
13420
Which of the following is the correct way to check to see if the variable theVar is an integer?
13421
Which of the following is the correct way to call the private method, myPrivateMethod(), in class MyClass, using dir(obj)? class MyClass: def __myPrivateMethod(self): print &amp;quot;Private Me...
13422
Which of the following is the correct prototype of the string.find() function?
13423
Which of the following is the correct prototype for the &amp;#39;open&amp;#39; function of the file class in python 2.2+?
13424
Which of the following is the correct method for changing a global variable inside a function?
13425
Which of the following is the best way to reverse the string &amp;#39;Test String&amp;#39; in Python?
13426
Which of the following is the best method to find the indices of all occurances of a word in a string? line = &amp;#39;mary had a little lamb, little lamb, little lamb&amp;#39; word = &amp;#39;lamb&amp;#39;
13427
Which of the following is the base class for new-style file objects?
13428
Which of the following is a way to find a local computer&amp;#39;s IP address with Python?
13429
Which of the following functions modifies the list in place to indicate which items are directories, and which are plain files?
13430
Which of the following functions is used to send audio data via the Internet?
13431
Which of the following functions can change the maximum level of recursion?
13432
Which of the following exceptions occurs while importing a module?
13433
Which of the following commands would produce the following result: result: &amp;#39;line 1 line 2&amp;#39;
13434
Which of the following code snippets concatenates the list a_list = [1, 2, 3] with the tuple a_tuple = (4, 5), so the result would be [1, 2, 3, 4, 5]?
13435
Which of the following are the main features of Python?
13436
Which list flattening method will have the shortest running time?
13437
Which is the correct way to remove an installed Python package?
13438
Which is not used to install Python packages?
13439
Which function could be used to list every file and folder in the current directory?
13440
When is the &amp;quot;yield&amp;quot; keyword used in Python?
13441
What would the &amp;#39;sorted_tel&amp;#39; be in the following code: tel = {&amp;#39;jack&amp;#39;: 4098, &amp;#39;sape&amp;#39;: 5139, &amp;#39;bill&amp;#39;: 3678, &amp;#39;mike&amp;#39;: 2122} sorted_tel = sorted(tel.items(), key=lambda x: x[1])
13442
What will be the output of the following statements: &amp;gt;&amp;gt;&amp;gt; import string &amp;gt;&amp;gt;&amp;gt; string.ljust(width=30,s=&amp;quot;Mary had a little lamb&amp;quot;)
13443
What is the result of the following code: &amp;gt;&amp;gt;&amp;gt; import itertools &amp;gt;&amp;gt;&amp;gt; x = itertools.count(0) &amp;gt;&amp;gt;&amp;gt; x.__class__.__name__
13444
What is the output of the following code? def foo(param1, *param2): print param1 print param2 def bar(param1, **param2): print param1 print param2 foo(1,2,3,4,5) bar(1,a=2,b=3)
13445
What is the output of the following code: name = &amp;#39;Jon&amp;#39; name.rjust(4, &amp;#39;A&amp;#39;)
13446
What is the most flexible way to call the external command &amp;quot;ls -l&amp;quot; in Python?
13447
What is the correct way to delete a directory that is not empty using Python?
13448
What is the best way to check if the object &amp;#39;myobject&amp;#39; is iterable in Python?
13449
What is a metaclass in Python?
13450
Various email and news clients store messages in a variety of formats, many providing hierarchical and structured folders. Which of the following provides a uniform API for reading the messages sto...
13451
The most important element of the email package is the message. The email class provides the classes for messages in Python. Which of the following classes is used for the message?
13452
The least sophisticated form of text output in Python is writing to open files. In particular, which of the following streams can be used?
13453
The core text processing tasks in working with email are parsing, modifying, and creating the actual messages. Which of the following modules deal with parsing and processing email messages?
13454
Read the following statements: Statement 1: Many string module functions are now also available as string object methods. Statement 2: To use string object methods, there is no need to import the...
13455
Read the following statements: Statement 1: A simple assignment statement binds a name into the current namespace, unless that name has been declared as global. Statement 2: A name declared as gl...
13456
Read the following statements: &amp;gt;&amp;gt;&amp;gt; word = &amp;#39;Help&amp;#39; + &amp;#39;A&amp;#39; &amp;gt;&amp;gt;&amp;gt; &amp;#39;&amp;lt;&amp;#39; + word*5 + &amp;#39;&amp;gt;&amp;#39; Which of the following will be the output of the above code snippet?
13457
Read the following statements: &amp;gt;&amp;gt;&amp;gt; lst = [&amp;#39;spam&amp;#39;,&amp;#39;and&amp;#39;,&amp;#39;eggs&amp;#39;] &amp;gt;&amp;gt;&amp;gt; lst[2] = &amp;#39;toast&amp;#39; &amp;gt;&amp;gt;&amp;gt; print &amp;#39;&amp;#39;.join(lst) &amp;gt;&amp;gt;&amp;gt; print &amp;#39; &amp;#39;.join(lst) Which of the following is the output of the second print stateme...
13458
Read the following statements: &amp;gt;&amp;gt;&amp;gt; import string &amp;gt;&amp;gt;&amp;gt; s = &amp;#39;mary11had a little lamb&amp;#39; &amp;gt;&amp;gt;&amp;gt; print s Which of the following will be the output of the above code snippet?
13459
Read the following statements: &amp;gt;&amp;gt;&amp;gt; import array &amp;gt;&amp;gt;&amp;gt; a = array.array(&amp;#39;c&amp;#39;,&amp;#39;spam and eggs&amp;#39;) &amp;gt;&amp;gt;&amp;gt; a[0] = &amp;#39;S&amp;#39; &amp;gt;&amp;gt;&amp;gt; a[-4:] = array.array(&amp;#39;c&amp;#39;,&amp;#39;toast&amp;#39;) &amp;gt;&amp;gt;&amp;gt; print &amp;#39;&amp;#39;.join(a) Which of the following will be t...
13460
One common way to test a capability in Python is to try to do something, and catch any exceptions that occur. Which of the following is the correct mechanism of trapping an error?
13461
Object is the base class of new-style datatypes. Which of the following functions is not a member of the object class?
13462
It is possible to use encoding other than ASCII in Python source files. The best way to do it is to put one more special comment line right after the #! line to define the source file encoding. Whi...
13463
Inheriting from a base class enables a custom class to use a few new capabilities, such as slots and properties. Which of the following is the base class of new-style datatypes?
13464
In Python, what is the default maximum level of recursion?
13465
In Python, built-in exceptions can be inherited from. Which of the following is the base exception class?
13466
In Python 2.x, which of the following is the way to check to make sure that the variable &amp;#39;x&amp;#39; is not a string?
13467
How many arguments can a print statement handle?
13468
How can an element be removed from a list using its list index?
13469
How can a numeric String (eg. &amp;quot;545.2222&amp;quot;) be converted to Float or Integer?
13470
How can a null object be declared in Python?
13471
How can a list be split into equal sized chunks?
13472
Given a program that saved a text file in the directory &amp;quot;/temp_files&amp;quot;, which of the following will make sure that &amp;quot;/temp_files&amp;quot; exists before writing the file?
13473
Examine the following prototype for the &amp;#39;open&amp;#39; function of the file class in Python 2.2+: open(fname [,mode [,buffering]]) Which of the following is correct for the &amp;#39;buffering&amp;#39; argument?
13474
Which command enables you to input data using keyboard into your node application?
13475
Which of the following methods can be used to write a file in Node.js? (check all that apply)
13476
&lt;p&gt;Which of the following flags working with npm?&lt;/p&gt;
13477
&lt;p&gt;Which of the following is operates asynchronous logic?&lt;/p&gt;
13478
How can you stop reading from stdin?
13479
&lt;p&gt;Which of the following modules is required to create server for NodeJS?&lt;/p&gt;
13480
&lt;p&gt;Which following code is valid to get a joint path?&lt;/p&gt;
13481
&lt;p&gt;Which following command _&lt;strong&gt;__&lt;/strong&gt; shows version of Node?&lt;/p&gt;
13482
You would like to inherit the prototype methods from one constructor into another. How could that be accomplished with core node.js functionality?
13483
&lt;p&gt;Which of the following engine built of NodeJS framework/platform?&lt;/p&gt;
13484
Which of the following events are emitted by the Readable Stream?
13485
&lt;p&gt;Which of the following libraries are used for mocking modules?&lt;/p&gt;
13486
How would you get operating system name?
13487
&lt;p&gt;Which following code is valid to print the current operating system?&lt;/p&gt;
13488
&lt;p&gt;Which of the following classes is the parent for &lt;code&gt;repl.REPLServer&lt;/code&gt; class?&lt;/p&gt;
13489
&lt;p&gt;Which following code is valid to convert a buffer buf to JSON object?&lt;/p&gt;
13490
How would you get the name of the JavaScript file being executed?
13491
Which of the following implements stream.Readable interface?
13492
&lt;p&gt;Which of the following frameworks is most popular Node.js framework?&lt;/p&gt;
13493
&lt;p&gt;Which of the following is correct while using a Node module http in a Node based application?&lt;/p&gt;
13494
&lt;p&gt;Which of the following keywords is used to achieve await-like behaviour?&lt;/p&gt;
13495
&lt;p&gt;Which of the following names is second param of &lt;code&gt;res.render&lt;/code&gt; method?&lt;/p&gt;
13496
&lt;p&gt;Which of the following template engines is working with Express.js?&lt;/p&gt;
13497
What happens when executing the following code? assert = require(&#039;assert&#039;); assert(false, &#039;assert false&#039;);
13498
&lt;p&gt;Which of the libs are exists in Node Core Libraries?&lt;/p&gt;
13499
Which of the following will remove a file from your file system?
13500
Which module of core node.js API is used for writing unit tests for your applications?
13501
You have a file rect.js with the following contents, What would be the appropriate ways to call the exported function? module.exports = function area(a, b) { return a*b; }
13502
&lt;p&gt;Which of the following variables you can use in modules?&lt;/p&gt;
13503
&lt;p&gt;Which of the following is the result of &lt;code&gt;module.id&lt;/code&gt; ?&lt;/p&gt;
13504
Which following functions are partially buffered?
13505
&lt;p&gt;Which of the following file extensions supports Node Module System ?&lt;/p&gt;
13506
What does the following code do? var http = require(&#039;http&#039;); var fs = require(&#039;fs&#039;); var file = fs.createWriteStream(&quot;file.png&quot;); var request = http.get(&quot;http://path/to/file.png&quot;, function(response) { response.pipe(file); });
13507
Which of the following will synchronously check if a file/directory exists?
13508
Which of the following will open a file, then read its contents one line at a time?
13509
Which of the following will copy a file in Node.js?
13510
Which of the following statements is true about the process object in Node.js?
13511
Which of the following statements is true about the console Object in Node.js?
13512
Which of the following statements are true about the module.exports object in Node.js?
13513
Which of the following statements are true about the child_process module in Node.js?
13514
Which of the following NPM commands will install both dependencies and devDependencies of a given project?
13515
Which of the following methods will print to the console without a trailing new line?
13516
Which of the following methods can be used to write a file in Node.js?
13517
Which of the following methods can be used to read the contents of a directory?
13518
Which of the following console commands will update all installed global packages to the latest available versions?
13519
Which of the following command-line arguments to &amp;quot;npm install&amp;quot; will allow an NPM package&amp;#39;s binaries to be run outside the project folder?
13520
Which of the following can be used to get the currently running script&amp;#39;s path in Node.js?
13521
Which of the following can be used to access the environment variable, &amp;quot;ENV_VARIABLE&amp;quot; in Node.js?
13522
Which Node.js module can be used to get the IP address of the server the program is running on?
13523
Which array contains the command line arguments in Node.js?
13524
What does the following command do? npm view &amp;lt;package-name&amp;gt; version
13525
What does the following code do? var http = require(&amp;#39;http&amp;#39;); var fs = require(&amp;#39;fs&amp;#39;); var file = fs.createWriteStream(&amp;quot;file.png&amp;quot;); var request = http.get(&amp;quot;http://path/to/file.png&amp;quot;, function(respon...
13526
Which of the following will randomly choose an element from an array named myStuff, given that the number of elements changes dynamically?
13527
Which of the following will detect which DOM element has the focus?
13528
Which of the following will check whether the variable vRast exists or not?
13529
Which of the following will change the color of a paragraph&amp;#39;s text to blue when a user hovers over it, and reset it back to black when the user hovers out?
13530
Which of the following statements is correct?
13531
Which of the following results is returned by the JavaScript operator &amp;quot;typeof&amp;quot; for the keyword &amp;quot;null&amp;quot;?
13532
Which of the following Regular Expression pattern flags is not valid?
13533
Which of the following prints &amp;quot;AbBc&amp;quot;?
13534
Which of the following options can be used for adding direct support for XML to JavaScript?
13535
Which of the following objects in JavaScript contains the collection called &amp;quot;plugins&amp;quot;?
13536
Which of the following modifiers must be set if the JavaScript lastIndex object property was used during pattern matching?
13537
Which of the following methods will copy data to the Clipboard?
13538
Which of the following JavaScript Regular Expression modifiers finds one or more occurrences of a specific character in a string?
13539
Which of the following is true about setTimeOut()?
13540
Which of the following is the most secure and efficient way of declaring an array?
13541
Which of the following is the correct syntax for using the JavaScript exec() object method?
13542
Which of the following is not a valid method in generator-iterator objects in JavaScript?
13543
Which of the following is not a valid method for looping an array?
13544
Which of the following is not a valid JavaScript operator?
13545
Which of the following is not a valid HTML event?
13546
Which of the following determines whether cookies are enabled in a browser or not?
13547
Which of the following descriptions is true for the code below? var object0 = {}; Object.defineProperty(object0, &amp;quot;prop0&amp;quot;, { value : 1, enumerable:false, configurable : true }); Object.defineProper...
13548
Which of the following descriptions best describes the code below? &amp;lt;script&amp;gt; var variable1 = { fastFood: &amp;quot;spaghetti&amp;quot;, length: 10 }; Object.freeze(variable1); variable1.price = 50; delete variable1....
13549
Which of the following correctly uses a timer with a function named rearrange()?
13550
Which of the following correctly sets a class for an element?
13551
Which of the following code snippets will toggle a div element&amp;#39;s background color? &amp;lt;button id=&amp;quot;toggle&amp;quot;&amp;gt;Toggle&amp;lt;/button&amp;gt; &amp;lt;div id=&amp;quot;terd&amp;quot;&amp;gt;Change Background Color.&amp;lt;/div&amp;gt;
13552
Which of the following code snippets will return all HTTP headers?
13553
Which of the following code snippets will correctly split &amp;quot;str&amp;quot;?
13554
Which of the following code snippets will correctly get the length of an object?
13555
Which of the following code snippets trims whitespace from the beginning and end of the given string str?
13556
Which of the following code snippets returns &amp;quot;[object object]&amp;quot;?
13557
Which of the following code snippets removes objects from an associative array?
13558
Which of the following code snippets is more efficient, and why? &amp;lt;script language=&amp;quot;JavaScript&amp;quot;&amp;gt; for(i=0;i&amp;lt;document.images.length;i++) document.images[i].src=&amp;quot;blank.gif&amp;quot;; &amp;lt;/...
13559
Which of the following code snippets gets an image&amp;#39;s dimensions (height &amp;amp; width) correctly?
13560
Which of the following code snippets changes an image on the page?
13561
Which of the following choices will turn a string into a JavaScript function call (case with objects) of the following code snippet? &amp;lt;script&amp;gt; window.foo = { bar: { baz: function() { ...
13562
Which of the following choices will detect if &amp;quot;variableName&amp;quot; declares a function? &amp;lt;script&amp;gt; var variableName= function(){}; &amp;lt;/script&amp;gt;
13563
Which of the following choices will change the source of the image to &amp;quot;image2.gif&amp;quot; when a user clicks on the image?
13564
Which of the following can be used to invoke an iframe from a parent page?
13565
Which of the following can be used to escape the &amp;#39; character?
13566
Which of the following can be used for disabling the right click event in Internet Explorer?
13567
Which of the following built-in functions is used to access form elements using their IDs?
13568
Which of the following best describes a &amp;quot;for&amp;quot; loop?
13569
Which of the following Array methods in JavaScript runs a function on every item in the Array and collects the result from previous calls, but in reverse?
13570
Which of the following are not global methods and properties in E4X?
13571
Which of the following are JavaScript unit testing tools?
13572
Which of the following are correct values of variableC, and why? &amp;lt;script&amp;gt; variableA = [6,8]; variableB =[7,9]; variableC = variableA + variableB; &amp;lt;/script&amp;gt;
13573
Which of following uses the &amp;quot;with&amp;quot; statement in JavaScript correctly?
13574
Which object can be used to ascertain the protocol of the current URL?
13575
Which event can be used to validate the value in a field as soon as the user moves out of the field by pressing the tab key?
13576
When setting cookies with JavaScript, what will happen to the cookies.txt data if the file exceeds the maximum size?
13577
What would be the value of &amp;#39;ind&amp;#39; after execution of the following code? var msg=&amp;quot;Welcome to ExpertRating&amp;quot; var ind= msg.substr(3, 3)
13578
What would be the use of the following code? function validate(field) { var valid=&amp;#39;&amp;#39;ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz&amp;#39;&amp;#39;; var ok=&amp;#39;&amp;#39;yes&amp;#39;&amp;#39;; var temp; for(var i=0;i...
13579
What will be the final value of the variable &amp;quot;apt&amp;quot;? var apt=2; apt=apt&amp;lt;&amp;lt;2;
13580
What will be output of the following code? function testGenerator() { yield &amp;quot;first&amp;quot;; document.write(&amp;quot;step1&amp;quot;); yield &amp;quot;second&amp;quot;; document.write(&amp;quot;step2&amp;quot;); yield &amp;quot;third&amp;quot;; docu...
13581
What value would JavaScript assign to an uninitialized variable?
13582
What is the purpose of while(1) in the following JSON response? while(1);[[&amp;#39;u&amp;#39;,[[&amp;#39;smsSentFlag&amp;#39;,&amp;#39;false&amp;#39;],[&amp;#39;hideInvitations&amp;#39;,&amp;#39;false&amp;#39;],[&amp;#39;remindOnRespondedEventsOnly&amp;#39;,&amp;#39;true&amp;#39;],[&amp;#39;hideInvitations_remindO...
13583
What is the meaning of obfuscation in JavaScript?
13584
What is the final value of the variable bar in the following code? var foo = 9; bar = 5; (function() { var foo = 2; bar= 1; }()) bar = bar + foo;
13585
What is the error in the statement: var charConvert = toCharCode(&amp;#39;x&amp;#39;);?
13586
What is the difference between call() and apply()?
13587
What does the following JavaScript code do? contains(a, obj) { for (var i = 0; i &amp;lt; a.length; i++) { if (a[i] === obj) { return true; } } return false; }
13588
var profits=2489.8237 Which of the following code(s) produces the following output? output : 2489.824
13589
The following are the samples for getting a selected value in the from a dropdown list: &amp;lt;select id=&amp;quot;ddlViewBy&amp;quot;&amp;gt; &amp;lt;option value=&amp;quot;1&amp;quot;&amp;gt;test1&amp;lt;/option&amp;gt; &amp;lt;option value=&amp;quot;2&amp;quot; selected=&amp;quot;selected&amp;quot;&amp;gt;test2&amp;lt;/option...
13590
Select the following function that shuffles an array?
13591
Performance-wise, which is the fastest way of repeating a string in JavaScript?
13592
In an HTML page, the form tag is defined as follows: &amp;lt;form onsubmit=&amp;quot;return Validate()&amp;quot; action=&amp;quot;http://www.mysite.com/&amp;quot;&amp;gt; The validate() function is intended to prevent the form from being submitted...
13593
If an image is placed styled with z-index=-1 and a text paragraph is overlapped with it, which one will be displayed on top?
13594
How can the user&amp;#39;s previously navigated page be determined using JavaScript?
13595
How can the operating system of the client machine be detected?
13596
How can global variables be declared in JavaScript?
13597
How can created cookies be deleted using JavaScript?
13598
How can a JavaScript object be printed?
13599
Having an array object var arr = new Array(), what is the best way to add a new item to the end of an array?
13600
Consider the three variables: someText = &amp;#39;JavaScript1.2&amp;#39;; pattern = /(w+)(d).(d)/i; outCome = pattern.exec(someText); What does outCome[0] contain?
13601
Consider the following variable declarations: var a=&amp;quot;adam&amp;quot; var b=&amp;quot;eve&amp;quot; Which of the following would return the sentence &amp;quot;adam and eve&amp;quot;?
13602
Consider the following JavaScript validation function: function ValidateField() { if(document.forms[0].txtId.value ==&amp;quot;&amp;quot;) {return false;} return true; } Which of the...
13603
Consider the following JavaScript validation function: &amp;lt;script type=&amp;quot;text/JavaScript&amp;quot;&amp;gt; function ValidateField() { if(document.forms[0].txtId.value ==&amp;quot;&amp;quot;) {return false;} ...
13604
Consider the following JavaScript alert: &amp;lt;script type=&amp;quot;text/JavaScript&amp;quot;&amp;gt; function message() { alert(&amp;quot;Welcome to ExpertRating!!!&amp;quot;) } &amp;lt;/script&amp;gt; Which of the following will run the function when a...
13605
Consider the following JavaScript alert: &amp;lt;script type=&amp;quot;text/JavaScript&amp;quot;&amp;gt; function message() { alert(&amp;quot;Welcome to ExpertRating!!!&amp;quot;) } &amp;lt;/script&amp;gt; Which of the following will run the function when...
13606
Consider the following image definition: &amp;lt;img id=&amp;quot;logo&amp;quot; src=&amp;quot;companylogo1.gif&amp;quot; height=&amp;quot;12&amp;quot; width=&amp;quot;12&amp;quot; &amp;gt; Which of the following will change the image to companylogo2.gif when the page loads?
13607
Consider the following image definition: &amp;lt;img id=&amp;quot;logo&amp;quot; src=&amp;quot;companylogo1.gif&amp;quot; height=&amp;quot;12&amp;quot; width=&amp;quot;12&amp;quot; &amp;gt; Which of the following will change the image to &amp;quot;companylogo2.gif&amp;quot; when the page loads?
13608
Are the two statements below interchangeable? object.property object[&amp;#39;&amp;#39;property&amp;#39;&amp;#39;]
13609
Analyze the following code snippet which uses a Javascript Regular Expression character set. What will be the output of this code? &amp;lt;html&amp;gt; &amp;lt;body&amp;gt; &amp;lt;script type=&amp;quot;text/javascript&amp;quot;&amp;gt; var str = &amp;quot;Is ...
13610
An image tag is defined as follows: &amp;lt;img id=&amp;quot;ERImage&amp;quot; width=&amp;quot;100&amp;quot; height=&amp;quot;100&amp;quot; onmouseover=&amp;quot;ImageChange()&amp;quot; src=&amp;quot;Image1.jpg&amp;quot;&amp;gt; The purpose of the ImageChange() function is to change the image source...
13611
An image tag is defined as follows: &amp;lt;img id=&amp;quot;ERImage&amp;quot; width=&amp;quot;100&amp;quot; height=&amp;quot;100&amp;quot; onmouseover=&amp;quot;ImageChange()&amp;quot; src=&amp;quot;Image1.jpg&amp;quot;&amp;gt; The purpose of the ImageChange() function is to change the image sour...
13612
An HTML form contains 10 checkboxes all named &amp;quot;chkItems&amp;quot;. Which JavaScript function can be used for checking all the checkboxes together?
13613
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php print null == NULL; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13614
Which of the following is the best way to get the index(es) of the highest value(s) in an array?
13615
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php &amp;lt;/script&amp;gt; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13616
Which of the following functions is not related to garbage collection in PHP?
13617
Which of the following will return the extension of a file name?
13618
Which of the following is correct with regard to echo and print?
13619
Which of the following features are supported in PHP5?
13620
Is the ||= operator present in PHP?
13621
Which of the following code snippets has the most appropriate headers to force the browser to download a CSV file?
13622
&lt;p&gt;What will be the output of following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php $x = 10; function foo() { $x = 20; echo $x; global $x; echo $GLOBALS[&#039;x&#039;]; echo $x; } foo(); echo $x; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13623
What is meant by Synchronous Server Calls within PHP&#039;s cURL features?
13624
&lt;p&gt;Consider the following 2D array in PHP:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;$array = array(array(141,151,161), 2, 3, array(101, 202, 303));&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;Which of the following will display all values in the array?&lt;/p&gt;
13625
Which of the following statements is incorrect, with regards to inheritance in PHP?
13626
Within the PHPDoc Standard, what is the correct way of &quot;doc commenting&quot; the code?
13627
Which statement will return true?
13628
What is the output of the following code? echo &#039;1&#039;.print(2) + 3;
13629
Which of the following is not a valid PHP parser tag?
13630
&lt;p&gt;What is the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php echo &quot;&amp;lt;pre&amp;gt;&quot;; $array = array(&quot;red&quot;,&quot;green&quot;,&quot;blue&quot;); $last_key = end(array_keys($array)); foreach ($array as $key =&amp;gt; $value) { if ($key == $last_key) { echo &quot;a&amp;lt;br&amp;gt;&quot;; } else { echo &quot;b&amp;lt;br&amp;gt;&quot;; } } ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13631
Which of the following is the right MIME to use as a Content Type for JSON data?
13632
Which of the following is not a valid cURL parameter in PHP?
13633
Which of the following variables are supported by the &#039;str_replace()&#039; function?
13634
When comparing two arrays, what is the difference between &quot;==&quot; and &quot;===&quot;?
13635
What is the difference between $a == $b and $a === $b in PHP?
13636
&lt;p&gt;What is the output of the following PHP code snippet?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php $var = &quot;testing module&quot;; $statement = &#039;This is a $var&#039;; echo ($statement); ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13637
Which of the following is a ternary operator?
13638
What is the difference between $_SERVER[&#039;HTTP_HOST&#039;] and $_SERVER[&#039;SERVER_NAME&#039;]?
13639
If you are given two dates in this form: Start Date: 2007-03-24 End Date: 2009-06-26 Which code snippet finds the difference between these two in the following form: 2 years, 3 months and 2 days PHP &amp;gt; 5.3
13640
Which line would move the internal pointer to the end of an array?
13641
Which of these is not a valid PHP XML API?
13642
Which of the following will not return an array containing all normal Latin alphabet characters (A-Z)?
13643
&lt;p&gt;What is the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php function vec_add (&amp;amp;$a, $b) { $a[&#039;x&#039;] += $b[&#039;x&#039;]; $a[&#039;y&#039;] += $b[&#039;y&#039;]; $a[&#039;z&#039;] += $b[&#039;z&#039;]; } $a = array (x =&amp;gt; 3, y =&amp;gt; 2, z =&amp;gt; 5); $b = array (x =&amp;gt; 9, y =&amp;gt; 3, z =&amp;gt; -7); vec_add (&amp;amp;$a, $b); print_r ($a); ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13644
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php $a = (1 &amp;lt;&amp;lt; 0); $b = (1 &amp;lt;&amp;lt; $a); $c = (1 &amp;lt;&amp;lt; $b); echo ($c || $b) &amp;lt;&amp;lt; 2 * $a | $a; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13645
Which of the following is not related to debugging in PHP?
13646
Which of the following statements is incorrect?
13647
What is &quot;empty()&quot;?
13648
Which of the following is not a valid Xdebug configuration setting?
13649
Which of the following is true regarding the str_replace() function in PHP?
13650
Which of the following is not a valid php.ini parameter with respect to file uploading?
13651
What will be the output of the following code? $var = 10; function fn() { $var = 20; return $var; } fn(); echo $var;
13652
Which of the following printing construct/function accepts multiple parameters?
13653
What will be the output of the following code? class Person { protected $name; public function __construct($name) { $this-&amp;gt;name = $name; } public function getName() { return $this-&amp;gt;name; } } $person = new Person(&quot;Foo&quot;); echo $person-&amp;gt;getName();
13654
With regards to the &quot;static&quot; keyword in PHP, which of the following statements is false?
13655
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;? $a = (1 &amp;lt;&amp;lt; 0); $b = (1 &amp;lt;&amp;lt; 1); echo ($b | $a) &amp;lt;&amp;lt; 2 ; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13656
What is the fastest way to insert an item $item into the specified position $position of the array $array?
13657
Which of the following are not considered Boolean false?
13658
&lt;p&gt;What is the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php $array = array(&quot;1&quot;,&quot;2&quot;,&quot;3&quot;,&quot;4&quot;); $variable = end(array_keys($array)); echo $variable; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13659
Which of the following is false about cURL?
13660
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php echo 30 * 5 . 7; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13661
What is the best way to load a file that contains necessary functions and classes?
13662
Which of the following will produce a value of &quot;83&quot; as its output?
13663
&lt;p&gt;What would be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php $arr = array(&quot;foo&quot;, &quot;bar&quot;, &quot;baz&quot;); for ($i = 0; $i &amp;lt; count($arr); $i++) { $item = $arr[$i]; } echo &quot;&amp;lt;pre&amp;gt;&quot;; print_r($item); echo &quot;&amp;lt;/pre&amp;gt;&quot;; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13664
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php $str=&quot;Hello&quot;; $test=&quot;lo&quot;; echo substr_compare($str, $test, -strlen($test), strlen($test)) === 0; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13665
Which of the following is not a valid DOM method in PHP?
13666
What is the difference between die() and exit() in PHP?
13667
Which of the following file modes is used to write into a file at the end of the existing content, and create the file if the file does not exist?
13668
&lt;p&gt;What is the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php function abc() { return __FUNCTION__; } function xyz() { return abc(); } echo xyz(); ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13669
Which of the following is not a predefined constant?
13670
Which of the following regular expressions can be used to check the validity of an e-mail addresss?
13671
Which of the following is true about posting data using cURL in PHP?
13672
Which of the following environment variables is used to fetch the IP address of the user in a PHP application?
13673
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;? $foo = 5 + &quot;10 things&quot;; print $foo; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13674
Which of the following functions is not used in debugging?
13675
Should assert() be used to check user input?
13676
What is the meaning of the system message, &quot;Allowed memory size of &amp;lt;number&amp;gt; bytes exhausted&quot;?
13677
Consider the following class: 1 class Insurance 2 { 3 function clsName() 4 { 5 echo get_class($this); 6 } 7 } 8 $cl = new Insurance(); 9 $cl-&amp;gt;clsName(); 10 Insurance::clsName(); Which of the following lines should be commented to print the class name without errors?
13678
Which of these is not a valid SimpleXML Parser method?
13679
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;? $a = 3; print &#039;$a&#039;; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13680
Which of the following methods is used to check if an array is associative or numeric?
13681
What is the correct syntax of mail() function in PHP?
13682
&lt;p&gt;What will be the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php var_dump (3*4); ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13683
What is the correct PHP command to use to catch any error messages within the code?
13684
Without introducing a non-class member variable, which of the following can be used to keep an eye on the existing number of objects of a given class?
13685
Which of the the following are PHP file upload-related functions?
13686
&lt;p&gt;What is wrong with the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php curl_setopt($ch, CURLOPT_URL, &quot;http://www.example.com/&quot;); curl_setopt($ch, CURLOPT_HEADER, 0); curl_exec($ch); curl_close($ch); ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13687
What is the difference between the float and the double type in PHP?
13688
Which of the following is not a valid API?
13689
Which of the following cryptographic functions in PHP returns the longest hash value?
13690
Which of the following is the correct way to check if a session has already been started?
13691
Which function will suitably replace &#039;X&#039; if the size of a file needs to be checked? $size=X(filename);
13692
&lt;p&gt;What is the output of the following code?&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&amp;lt;?php echo 0x500; ?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
13693
Given the following array: $array = array(0 =&amp;gt; &#039;blue&#039;, 1 =&amp;gt; &#039;red&#039;, 2 =&amp;gt; &#039;green&#039;, 3 =&amp;gt; &#039;red&#039;); Which one of the following will print 2?
13694
Which one of the following is not an encryption method in PHP?
13695
Which of the following will store order number (34) in an &amp;#39;OrderCookie&amp;#39;?
13696
Which of the following will start a session?
13697
Which of the following will read an object into an array variable?
13698
Which of the following will print out the PHP call stack?
13699
Which of the following will check if a function exists?
13700
Which of the following variable declarations within a class is invalid in PHP?
13701
Which of the following methods should be used for sending an email using the variables $to, $subject, and $body?
13702
Which of the following is useful for method overloading?
13703
Which of the following is used to maintain the value of a variable over different pages?
13704
Which of the following is true about the singleton design pattern?
13705
Which of the following is not a PHP magic constant?
13706
Which of the following is not a file-related function in PHP?
13707
Which of the following is incorrect with respect to separating PHP code and HTML?
13708
Which of the following is correct about Mysqli and PDO?
13709
Which of the following characters are taken care of by htmlspecialchars?
13710
Which function can be used to delete a file?
13711
What would occur if a fatal error was thrown in your PHP program?
13712
What will be the output of the following code? &amp;lt;?php var_dump (3*4); ?&amp;gt;
13713
What will be the output of the following code? &amp;lt;? echo 5 * 6 / 2 + 2 * 3; ?&amp;gt;
13714
What is the string concatenation operator in PHP?
13715
What is the correct way to send a SMTP (Simple Mail Transfer Protocol) email using PHP?
13716
What is the correct line to use within the php.ini file, to specify that 128MB would be the maximum amount of memory that a script may use?
13717
What is the best way to change the key without changing the value of a PHP array element?
13718
What is the best practice for running MySQL queries in PHP? Consider the risk of SQL injection.
13719
What function should you use to join array elements with a glue string?
13720
What enctype is required for file uploads to work?
13721
For the following code: &amp;lt;?php function Expenses() { function Salary() { } function Loan() { function Balance() { } } } ?&amp;gt; Which of the following s...
13722
You can&amp;#39;t save Duotone, Multichannel, or Bitmap mode images in JPEG 2000 format.State whether the statement is true or false.
13723
You can make a selection prior to selecting the Patch tool. State whether its true or false.
13724
Why do we use Defringe in layers?
13725
Why do we Choose Select &amp;gt; Reselect?
13726
Which of the following video filters restricts the gamut of colors to bleed across television scan lines?
13727
Which of the following tools works when you are in Bitmap Color mode?
13728
Which of the following options would you be selecting to create a custom Filter?
13729
Which of the following options represents Freeze Mask tool in the picture given above of Liquify Filter box?
13730
Which among these is the right option to Warp an item?
13731
Which among the following type of swatches can be shared with any other Adobe CS2 application by saving a swatch library for exchange?
13732
Which among the following tool selects similarly colored areas?
13733
Which among the following tool removes the red reflection caused by Flash?
13734
Which among the following tool changes the color saturation of an area?
13735
Which among the following options would you choose to optimize your artwork while saving it?
13736
Which among the following options represents Midtones in the given Histogram palette?
13737
Which among the following options is true about the DCS file format?
13738
Which among the following option would you be selecting to create a custom Filter?
13739
Which among the following option represents Midtones in the given Histogram palette?
13740
Which among the following option is true about the DCS file format?
13741
Which among the following is true about the Weighted optimization?
13742
Which among the following is the right command to Merge the images to HDR in photoshop?
13743
Which among the following is not true about TIFF file format?
13744
Which among the following is not true about the Image Processor?
13745
Which among the following is not true about Flattening layers?
13746
Which among the following is not a Light type in Lighting Effects?
13747
Which among the following is a windows keyboard shortcut for selecting Edge Highlighter tool in the Extract toolbox?
13748
Which among the following is a windows Function Key for showing and hiding Color palette?
13749
Which among the following icon leads to Go to Adobe Bridge?
13750
Which among the following format is used for rendering three-dimensional images and animation?
13751
Which among the following filter has been applied to produce such kind of effect?
13752
Which among the following file format will you be using to import annotations?
13753
Which among the following file format supports layers?
13754
Which among the following file format is not supported by Photoshop when you save images for web?
13755
Which among the following feature is not true about the Vanishing point?
13756
Which among the following feature is not true about Bitmap Mode?
13757
Which among the following determines how pixels are added or deleted while saving the file?
13758
What would happen if we set undefined feature to wrap around option in Displace Filter box?
13759
What option will you be using to convert a layer-based slice to a user slice to unlink it from the layer in photoshop?
13760
What does Photomerge command do in Photoshop?
13761
What among the following is true about Color Separation?
13762
State whether the statement is true or false. For type layers, Lock Transparency and Lock Image options in the layer panel are selected by default and they cannot be deselected.
13763
State whether the statement is true or false. Embedding color profiles does not increase the size of PDF files.
13764
State whether the statement is true or false. You can apply layer effects and styles to a background, a locked layer, or a group.
13765
State whether the statement is True or False. All filters can not be applied to 8-bit images.
13766
State whether the statement is true or false: In the diagram given above of image ready, A represents Lock icon. Locking colors does not prevent them from dithering in a browser.
13767
In the given picture, what does the icon represent in the Layers palette denoted by A?
13768
In the given diagram A represents Out of Gamut option. Among which of the following color mode does this option work?
13769
In the diagram given above, which option represents Color replacement tool?
13770
In the diagram given above of web palette,which among the following slice includes a rollover effect?
13771
ImageReady only uses the RGB mode to work with images. State whether the statement is true or false.
13772
You can move Alpha or Spot channels above the default color channels only when the image is in the __________ mode?
13773
While using the Action Panel in the button mode, how would you exclude all the commands in an action except the selected one?
13774
While using a smudge tool, if the &amp;quot;Sample All Layers&amp;quot; option is selected, how will the smudge tool behave?
13775
Which type of the blending mode is supported by layers that use the Fill With Neutral Color option?
13776
Which type of slices has gray symbols as shown in the picture?
13777
Which type of layers contains information required for alignment?
13778
Which type of blending modes is not available for the Apply Image and Calculations commands?
13779
Which Texture filter is used on picture A to produce the result of picture B, as shown in the picture?
13780
Which smart blur mode has been used as shown in the given image?
13781
Which slice type will you choose to enter HTML text as shown in the picture?
13782
Which save options are not available in the Batch or Create Droplet commands?
13783
Which Quick Mask option sets masked areas to white (transparent) and selected areas to red (opaque) as shown in the picture?
13784
Which option would you choose to set the timeline duration you want to preview in the Animation panel?
13785
Which option would you choose to display the HDR color picker?
13786
Which option would you choose to crop to the original size of the page while placing a PDF file in photoshop as shown in the picture?
13787
Which option of Create UV Overlay shows model areas using a solid rendering mode?
13788
Which option in the info panel box displays values in the current color mode of the image as shown in the picture?
13789
Which option in the given picture displays Normals as default render presets?
13790
Which of the following types of swatches can be shared between applications? (choosing colors)
13791
Which of the following type of channels is created automatically when you open a new image?
13792
Which of the following properties of a 3D layer can not be animated?
13793
Which of the following photoshop tools can not be used to edit an HDR/32-bpc image?
13794
Which of the following options will let you use the white balance settings as provided by the camera in the camera raw dialog box as shown in the picture?
13795
Which of the following layers affects all the layers below it?
13796
Which of the following information is not retained when a 3D file is opened in photoshop?
13797
Which of the following command is used to delete a section of the footage in selected layers and leave the gap of the same duration in timeline mode?
13798
Which of the following command cannot be applied to composite channels while blending channels?
13799
Which mode in the animation panel shows the frame duration and animation properties for document layers?
13800
Which interpolation method maintains the current property setting?
13801
Which format can be used to save your camera raw file in Photoshop?
13802
Which file format does Vanishing Point support to preserve the perspective plane information?
13803
Which condition should be satisfied first to transform video layers?
13804
Which command would you use to re-link the video layer to the source file?
13805
Which command converts the pixel edits to the document&amp;#39;s color space but does not convert the colors of the video frames?
13806
Which command allows you to use free memory used by the History Panel or the Clipboard?
13807
Which color mode supports the Match Color command?
13808
Which color mode does not support layers?
13809
Which channel would you choose for grayscale images in the Color Halftone Filter dialog box as shown in the picture?
13810
Which Auto-Align layers option aligns layers and matches overlapping content without changing the shape of the objects in the image as shown in the picture?
13811
Which Artistic filter is used on picture A to produce picture B as shown in the picture?
13812
Which among the labeled buttons in the given diagram will you use to have a changed position attribute apply to all other frames in the active layer in the frame animation mode?
13813
Which action can not be undone?
13814
Which 3D tool is used to rotate the camera around the z-axis?
13815
When is an image flattened?
13816
When does white color appear in the histogram and RGB levels in Camera Raw as shown in the picture?
13817
When does the Cached Data Warning icon appear in the Histogram panel?
13818
When does the 3D Axis appear?
13819
When does Layer → Arrange → Reverse option appear active?
13820
What would you use to insert non-recordable commands into an action?
13821
What values would you enter in the focal plane box to move the plane in the 3D render settings box as shown in the picture?
13822
What is the use of the Monochromatic option in the Add Noise dialog box as shown in the picture?
13823
What can you not copy using duplicate command on an image?
13824
To paint or clone on video frames contained by a smart object, you can:
13825
To change the settings for a command within an action or pauses in an action so that you can specify values in a dialog box, You will use:
13826
The scale styles option is available only when:
13827
The Photoshop Extended Measurement Feature can be used for measuring area selected by the:
13828
The Divide Slice dialog box can not be used to divide:
13829
The Displace filter creates displacement maps using a flattened file saved in which format?
13830
Merging of channels is possible only:
13831
In which option is the selection placed in a channel in your active image by default as shown in the picture?
13832
In which frame disposal method does a disposal icon not appear on the frame?
13833
In the Save for Web dialog box, when multiple slices using different color tables are selected for saving as gif images, the color table shows up for:
13834
In the given picture, which reconstruction mode in the Liquify filter scales back distortions uniformly without any kind of smoothing?
13835
In the given picture, the Conté Crayon filter(sketch filter) uses the foreground color for:
13836
In Paint Mask mode, which area does blue color highlight in the given image?
13837
In All Channels View, the individual histograms do not include:
13838
If there is no background, Deep knocks out to which of the following options as shown in the picture?
13839
If one step in an action converts an image with a source mode of RGB to a target mode of CMYK, applying this action to an image in Grayscale mode will result in:
13840
How would you apply a layer style to a background layer?
13841
For which type of the following options is Auto Blend Layers available?
13842
For the Type and Shape layer, which lock options are selected by default and cannot be deselected as shown in the picture?
13843
For previewing which of the following image modes is the 32-Bit Preview option not available?
13844
As shown in the picture, the Mask Incomplete Blocks option in the Extrude Filter dialog box is selected:
13845
As shown in the image, which option would you select to increase or decrease the tiling for texture?
13846
With which of the given options does the Signal Strength Meter appear?
13847
Which View will you choose to display a Histogram with no controls or statistics?
13848
Which type of information is not displayed by the Info Palette?
13849
Which type of images are resolution-dependent?
13850
Which type of character is generated by Photoshop when the font does not include superscript or subscript characters?
13851
Which option will you select to remove an effect from a style?
13852
Which option will you select to open the Levels dialog box?
13853
Which option will you select to export layers?
13854
Which option will you select to display a file at 100% size?
13855
Which option will you select to convert Types to Shapes?
13856
Which option will you select to apply the Extrude filter?
13857
Which option will you choose to select all layers of a similar type?
13858
Which option will you choose to Refresh a Histogram?
13859
Which option will you choose to convert Document Colors into another profile?
13860
Which of the Saving commands is available for an image that is managed by a Version Cue Workspace?
13861
Which of the given file formats works with the Image Processor?
13862
Which of the following Slices is created with the Slice Tool?
13863
Which of the following Layer properties can be animated?
13864
Which of the following is not true about the Options Bar?
13865
Which of the following is not true about the Multichannel mode?
13866
Which of the following is not true about the Curves dialog box?
13867
Which of the following is not true about Filters?
13868
Which of the following is not true about a Droplet?
13869
Which of the following is not a type of Variable?
13870
Which of the following is not a kind of text type?
13871
Which of the following is not a Color Adjustment command?
13872
Which of the following Filters cannot be applied to a Smart Object?
13873
Which of the following file formats supports embedded color profiles?
13874
Which of the following features is supported by the EPS file format?
13875
Which keyboard shortcut (Mac OS) will you choose to select the History Brush tool?
13876
Which keyboard shortcut (Mac OS) will you choose to permanently Clear History (no Undo)?
13877
Which keyboard shortcut (Mac OS) will you choose to group Layers?
13878
Which keyboard shortcut (Mac OS) will you choose for Auto Leading?
13879
Which Filter embeds a digital Watermark into an image to store a copyright information?
13880
Which file format saves a document of any size as well as preserves all the Photoshop features?
13881
Which file format can be used to save Lab images?
13882
Which Command lets you free memory, used by the Undo command, the History Palette, or the Clipboard?
13883
Which Animation mode shows the frame duration and keyframed layer properties of the videos and animations in a Timeline?
13884
Which among the following Slices cannot be divided?
13885
Which among the following QuickTime Video formats is supported by Photoshop extended?
13886
Which among the following Modes does not support layers?
13887
Which among the following is not a right option for selecting a web-safe color from the Color Palette?
13888
Which among the following is not a Duotone mode type?
13889
Which among the following files, saved in the Adobe Photoshop format, is used by the filter to create the displacement maps?
13890
Which among the following blending modes is available only for the Apply Image and Calculations commands?
13891
What is the use of the Make Work Path command in the Paths palette?
13892
What do you mean by kerning?
13893
What do you mean by Contact Sheet?
13894
The individual Histograms in the All Channels View does not include which of the following?
13895
The Color Replacement Tool does not work in which of the following Image modes?
13896
State whether True or False: You cannot transform the background layer.
13897
State whether True or False: You cannot create Work paths from the fonts that do not include the outline data.
13898
State whether True or False: You cannot change the order of the Vector masks or working paths in the Paths palette.
13899
State whether True or False: You cannot arrange the stacking order of the Auto slices.
13900
State whether True or False: When you create a new image with the transparent content, the image does not have a background layer.
13901
State whether True or False: Video layers do not work in the Frame mode.
13902
State whether True or False: Variable names contain spaces and special characters.
13903
State whether True or False: The Out Of Gamut option works only on RGB and Lab images.
13904
State whether True or False: The Match Color command works only in the RGB mode.
13905
State whether True or False: The mask created by the Replace Color command is permanent.
13906
State whether True or False: The Healing Brush Tool cannot be applied to video or animation frames.
13907
State whether True or False: Photoshop supports a maximum pixel dimension of 300,000 by 300,000 pixels per image
13908
State whether True or False: Hanging Punctuation controls the alignment of the punctuation marks for a specific paragraph.
13909
State whether True or False: Color Dodge, Color Burn, Lighten, Darken, Difference, and Exclusion blending modes do not work on Lab images.
13910
State whether True or False: Changing units on the Info Palette automatically changes the units on Rulers.
13911
State whether True or False: By default, Masks applied to Smart objects are linked to Smart object layers.
13912
State whether True or False: A working space is an intermediate color space used to define and edit color in Adobe applications
13913
Refer to the given image. Why do we select Remember Palette Locations option as shown in the given image?
13914
Refer to the given image. Which option, When in a checked state, displays a message Whenever you open an untagged document?
13915
Refer to the given image. Which option will you select to remove the existing profile from the document in the given image?
13916
Refer to the given image. Which option adjusts Highlights in the Levels dialog box?
13917
Refer to the given image. Which of the given options displays the Set Tsume option in the Character Palette?
13918
Refer to the given image. Which of the given options displays the Modal control in the Actions palette?
13919
Refer to the given image. Which of the given options displays left indent in the Paragraph palette?
13920
Refer to the given image. Which of the given options displays Converts to Timeline mode in an Animation palette?
13921
Refer to the given image. Which of the given options displays an Action Safe Area?
13922
Refer to the given image. Which of the following options displays the Spot Channels in the Channels palette?
13923
Refer to the given image. Which of the following options displays Temporary Work Path in the Paths palette?
13924
Refer to the given image. Which of the following Lock options in the Layers palette prevents modification of the layer&amp;#39;s pixels using the painting tools?
13925
Refer to the given image. Which of the following icons displays the Panel Title Bar in the Photoshop workspace?
13926
Refer to the given image. Which Liquify Tool is used to reconstruct a part of a distorted image?
13927
Refer to the given image. Which icon indicates Type 1 kind of fonts?
13928
Refer to the given image. Which among the following Methods adds pixels by averaging the color values of the surrounding pixels and produces medium-quality results?
13929
Refer to the given image. Which among the following is not true about the Fill Pixels (Drawing mode) as shown in the picture?
13930
Refer to the given image. When will the Dynamic shortcuts appear in the Character Palette Menu as shown in the picture?
13931
Refer to the given image. When is the Canvas Extension Color Menu not available as shown in the given image?
13932
Refer to the given image. What is the colored box in the Navigator Palette known as?
13933
Refer to the given image. What happens when Use Legacy is selected as shown in the given picture?
13934
Refer to the given image. In which format will you save your document to preserve the Perspective Plane Information in an image while working with the vanishing point, as shown in the given picture?
13935
Layer styles cannot be applied to which of the following options?
13936
In which of the following Modes can you draw while working with the Shape or Pen tools?
13937
In which Format will you save your file to preserve the Alpha channels?
13938
Channels can not be added to which of the following image modes?
13939
Auto Blend Layers is available for which of the following modes?
13940
Anti-aliasing option is available for which of the given Tools?
13941
You can define the area that you want to crop out of any image using the Crop tool.
13942
You can apply Brush, Eraser and Clone Stamp on vector based layers.
13943
With which options can you get the effects shown in the image above?
13944
Which tool of Photoshop makes the image shown above appear on screen?
13945
Which option in Stamp tool will you select if you want to clone all the layers simultaneously?
13946
Which option allows you to change the Background layer&amp;#39;s appearance when part of your image is transparent?
13947
Which of the given image(s) belongs to the red channel if the source image is in RGB mode?
13948
Which of the following values define the maximum softness and hardness limits of the round brush tip?
13949
Which of the following values define the maximum hardness and softness limits of the round brush tip?
13950
Which of the following settings is/are available in the Lighting Effects dialog box?
13951
Which of the following options will you choose if you want to increase or decrease the size of the mask while editing the mask?
13952
Which of the following options are contained in the Brush dialog box?
13953
Which of the following are image sharpening techniques available in Photoshop?
13954
Which of the following action sequences will make the above given dialog box appear on screen?
13955
Which method of Resample Image gives the lowest image quality?
13956
Which layer blend mode lightens the image by decreasing its contrast?
13957
Which command lets you paste an image inside the selection you have made?
13958
Which among the following is measured in terms of pixels per inch in any Photoshop document?
13959
Which &amp;quot;layer blend mode&amp;quot; lightens the image by increasing its contrast?
13960
What will be the default blending mode of a layer group?
13961
What purpose does the area marked in blue in the given image serve?
13962
What option will you choose if you want to merge a selected layer with the layer lying immediately below it?
13963
What option in the Character panel will you choose for moving the text away or toward the shape it is bound to?
13964
What is the subtractive color system used for?
13965
What file formats are available to you when you save a file using the Save for Web &amp;amp; Devices dialog box?
13966
What effect will checking the Constrain Proportions option shown above have on the size of an image?
13967
What does the Use Global Light option in the Layer Style dialog box do when checked?
13968
What does the Baseline option in the Curves Display Options dialog box do?
13969
What do the width and height of the histogram in levels adjustments represents?
13970
What do the Horizontal Type Mask Tool and Vertical Type Mask Tool do?
13971
What are the names of the tools marked in red in the image above?
13972
What are anchor points?
13973
Using Render filters, you can :
13974
The Path Selection tool lets you select individual nodes on the path, whereas the Direct Selection tool lets you the select path as a whole.
13975
The Mode pop-up menu of Puppet warp tells Photoshop how stretchable you want the mesh to be.
13976
The Fractional widths command in the Character panel rounds character widths to the nearest part of a pixel instead of the normal whole pixel.
13977
Smooth and Corner are two kinds of anchor points in Photoshop.
13978
Revert command reverts the document to its most recent saved state.
13979
Proximity Match option in Spot Healing Brush tells it to use pixels just outside the edge of your cursor to fix spots.
13980
Onscreen images are called ___________________because they are made up of red, blue, green light.
13981
Levels adjustments do NOT change the intensity levels of your shadows, midtones, and highlights.
13982
It is possible to convert a type layer into a shape layer.
13983
It is possible to avoid Adjustment Layers while working with the Healing Brush tool.
13984
In the Screen layer blend mode, Photoshop multiplies the opposite of the blend and base colors, making everything very light.
13985
Images in which mode are called 1-bit images?
13986
Image Processor option is used for resizing the Images in masses.
13987
How many drawing modes are available in Photoshop?
13988
How many drawing modes are available in Photoshop, when you work with shape or pen tools?
13989
How many channels do lab colors have?
13990
How does the &amp;quot;Expansion Field&amp;quot; of Puppet Warp tool work?
13991
How do you write around any shape as shown in the image above?
13992
How do you use a shape with gradient as a mask as shown in the image above?
13993
Filters can affect multiple layers simultaneously.
13994
Duotone refers to an image that&amp;#39;s made from two ink colors.
13995
Content Aware Scale tool can work on the locked background layer.
13996
Channels contain all the color information of a Photoshop document.
13997
Bit depth controls the amount of color information that a pixel can hold.
13998
Anti-aliasing allows you to smoothen the edges of a selection as well as smoothen text.
13999
Alpha Channels are basically grayscale representations of saved selections.
14000
A gray warning symbol means that you are using a font that is not installed in your system, whereas a yellow warning symbol means that the document you have opened was created in a different versio...
14001
_________________control how pixels on different layers interact with each other.
14002
__________________filter helps to draw perspective planes or a mesh grid that can be used in editing.
14003
___________________is a process in which Photoshop responds to your size-change request either by adding or subtracting pixels.
14004
____________________is the process of converting vector based layers into pixel based layers.
14005
____________________ is a grid-like mesh on your image that contains handles to distort the content the way you want.
14006
____________________ helps change the spacing between all letters in a word by the same amount.
14007
__________________ is/are available only if you have an alpha channel selected.
14008
__________________ appears when you check the Tint checkbox, as shown in the image above, in the Adjustments panel&amp;gt;&amp;gt; Black &amp;amp; White layer.
14009
________________ does NOT affect the original quality and size even if you resize the object.
14010
You can move Alpha or Spot channels above the default color channels only when the image is in the __________ mode?
14011
While using a smudge tool, if the &amp;quot;Sample All Layers&amp;quot; option is selected, how will the smudge tool behave?
14012
Which type of the blending mode is supported by layers that use the Fill With Neutral Color option?
14013
Which type of slices has gray symbols as shown in the picture?
14014
Which type of layers contains information required for alignment?
14015
Which type of channels is created automatically when you open a new image?
14016
Which type of blending modes is not available for the Apply Image and Calculations commands?
14017
Which Texture filter is used on picture A to produce the result of picture B, as shown in the picture?
14018
Which smart blur mode has been used as shown in the preview in the given image?
14019
Which slice type will you choose to enter HTML text as shown in the picture?
14020
Which save options are not available in the Batch or Create Droplet commands?
14021
Which Quick Mask option sets masked areas to white (transparent) and selected areas to black (opaque) as shown in the picture?
14022
Which option would you choose to set the timeline duration you want to preview in the Animation panel?
14023
Which option would you choose to open the HDR color picker dialog box while editing a 32- bpc image?
14024
Which option would you choose to crop to the original size of the page while placing a PDF file in photoshop as shown in the picture?
14025
Which option of Create UV Overlay shows model areas using a solid rendering mode?
14026
Which option in the info panel box displays values in the current color mode of the image as shown in the picture?
14027
Which option in the given picture displays Normals as default render presets?
14028
Which of the following will list the saved selections when dialog box appears same as shown in the image given above?
14029
Which of the following types of swatches can be shared between applications? (choosing colors)
14030
Which of the following properties of a 3D layer can not be animated?
14031
Which of the following photoshop tools can be used to edit an HDR/32-bpc image?
14032
Which of the following options will let you use the white balance settings as provided by the camera in the camera raw dialog box as shown in the picture?
14033
Which of the following layers affects all the layers below it?
14034
Which of the following information is not retained when a 3D file is opened in photoshop?
14035
Which mode in the animation panel shows the frame duration and animation properties for document layers?
14036
Which Interpolation(Tweening) method will you use to animate a visibility of a layer when you want the layer to appear or disappear suddenly across the timeline?
14037
Which format can be used to save your camera raw file in Photoshop?
14038
Which file format does Vanishing Point support to preserve the perspective plane information?
14039
Which condition should be satisfied first to transform video layers?
14040
Which command would you use to re-link the video layer to the source file?
14041
Which command is used to delete footage in one or more layers and leave a gap of same duration in the timeline mode?
14042
Which command does not convert the pixel edits to a video layer while managing colors in video layers?
14043
Which command cannot be applied to composite channels?
14044
Which command allows you to use free memory used by the History Panel, or the Clipboard?
14045
Which color mode supports the Match Color command?
14046
Which color mode does not support layers?
14047
Which channel would you choose for grayscale images in the Color Halftone Filter dialog box as shown in the picture?
14048
Which Auto-Align layers option aligns layers and matches overlapping content without changing the shape of the objects in the image as shown in the picture?
14049
Which Artistic filter is used on picture A to produce picture B as shown in the picture?
14050
Which among the labeled buttons in the given diagram will you use to have a changed position attribute apply to all other frames in the active layer in the frame animation mode?
14051
Which action can not be undone?
14052
Which 3D tool is used to rotate the camera around the z-axis?
14053
When is an image flattened?
14054
When does white color appear in the histogram and RGB levels in Camera Raw as shown in the picture?
14055
When does the Cached Data Warning icon appear in the Histogram panel?
14056
When does the 3D Axis appear?
14057
When does Layer → Arrange → Reverse option appear active?
14058
What would you use to insert non-recordable commands into an action?
14059
What will happen if you enter a negative value in the roundness option of a postcrop vignette in the camera raw dialog box as shown in the picture?
14060
What values would you enter in the focal plane box to move the plane from red hightlighted box to blue highlighted box in the 3D render settings box as shown in the picture?
14061
What is the use of the Monochromatic option in the Add Noise dialog box as shown in the picture?
14062
What can you not copy using duplicate command on an image?
14063
To paint or clone on video frames contained by a smart object, you can:
14064
To change the settings for a command within an action or pauses in an action so that you can specify values in a dialog box, You will use:
14065
The scale styles option is available only when:
14066
The Photoshop Extended Measurement Feature can be used for measuring area selected by the:
14067
The Divide Slice dialog box can not be used to divide:
14068
Merging of channels is possible only:
14069
In which frame disposal method does a disposal icon not appear on the frame?
14070
In the Save for Web dialog box, when multiple slices using different color tables are selected for saving as gif images, the color table shows up for:
14071
In the given picture, which Reconstruction mode in the Liquify filter scales back distortions uniformly without any kind of smoothing?
14072
In the given picture, the Conté Crayon filter(sketch filter) uses the foreground color for:
14073
In Paint Mask mode, which area does blue color highlight in the given image?
14074
In All Channels View, the individual histograms do not include:
14075
If there is no background, Deep knocks out to which of the following options as shown in the picture?
14076
If one step in an action converts an image with a source mode of RGB to a target mode of CMYK, applying this action to an image in Grayscale mode will result in:
14077
How would you apply a layer style to a background layer?
14078
For which type of the following options is Auto Blend Layers available?
14079
For the type and shape layer, which lock options are selected by default and cannot be deselected as shown in the picture?
14080
For previewing which of the following image modes is the 32-Bit Preview option not available?
14081
As shown in the picture, the Mask Incomplete Blocks option in the Extrude Filter dialog box is selected:
14082
You use the Edit -&amp;gt; Define Pattern command to create new patterns based on a selection. Which of the following statements is true while defining a pattern:
14083
You cannot insert a path when recording an action or after it has been recorded. State(True/False)
14084
You can apply transformations to the background as a layer. You cannot however, transform selections on the background. State(True/False)
14085
You can add notes and audio annotations anywhere on a Photoshop image canvas. State(True/False)
14086
With the &amp;quot;Magnetic lasso tool&amp;quot;, the border snaps to the edges of defined areas in the image. State(True/False)
14087
Why is the &amp;quot;Stroke command&amp;quot; used?
14088
Why is &amp;quot;Type&amp;quot; given in gradient tool option?
14089
Which Tool or Option gave the encircled area an orange color?
14090
Which Tool or Effect has led to the effect in the image?
14091
Which tool is activated by default, when a color adjustment dialog box is opened?
14092
Which tool has led to the effect within the encircled area in the image?
14093
Which tool among the following allows you to create &amp;quot;Arrow heads&amp;quot;?
14094
Which step has to be performed first to give &amp;quot;Stroke to text&amp;quot;?
14095
Which one of the below is the first step to publish the images online, through Adobe Photoshop.
14096
Which of the below will be most suitable for resizing and resampling images for printed or online display.
14097
Which of the below tools is shown in the picture?
14098
Which of the below steps has to be performed to open a note or play an audio annotation?
14099
Which of the below steps has to be performed to delete all annotations of the same type?
14100
Which of the below operations is to be performed to reverse all changes made to the image since it was last saved?
14101
Which of the below is the only way to affect multiple layers at once?
14102
Which of the below is the first step to import annotations?
14103
Which of the below is the advantage of working in RGB mode?
14104
Which of the below is not the function of the &amp;quot;Convert direction point tool&amp;quot;?
14105
Which of the below is not the function of &amp;quot;Alt Tag&amp;quot; in the Slice options window?
14106
Which of the below file formats can be used when you choose to optimize images?
14107
Which of the below defines the purpose of creating a Slice from an image?
14108
Which of the below are &amp;quot;Primary colors&amp;quot;?
14109
Which Mode of the Air Brush tool has created the black effect shown in the image?
14110
Which below tool is shown in the picture?
14111
Which &amp;quot;Tool&amp;quot; is shown in the image?
14112
When adjusting out of gamut colors or making color corrections in RGB mode, CMYK colors can be previewed in an RGB image. State(True/False)
14113
What will be the most suitable option if you have to replace parrot green with red color in the image. The layers in the image are merged.
14114
What is the role of the &amp;quot;History palette&amp;quot; in Photoshop?
14115
What is the role of the &amp;quot;Crop tool&amp;quot;?
14116
What is the role of &amp;quot;The Eye dropper tool&amp;quot;?
14117
What is the role of &amp;quot;Info palette&amp;quot; and &amp;quot;Color palette&amp;quot;?
14118
What is the role of &amp;quot;Edit&amp;quot; in the gradient tool options?
14119
What is the role of &amp;quot;Dodge tool&amp;quot;?
14120
What is &amp;quot;Clone Aligned&amp;quot; option in &amp;quot;Rubber stamp tool&amp;quot; used for?
14121
What information does the &amp;quot;Info palette&amp;quot; of the Measure tool contain?
14122
What happens when you create a &amp;quot;Note&amp;quot;?
14123
What happens if you double-click the slice with the slice select tool?
14124
What does the term &amp;quot;Resampling&amp;quot; refer to?
14125
What does the option &amp;quot;Message Text&amp;quot; in the Slice option window let you do?
14126
What does the option &amp;quot;discontiguous&amp;quot; in the Background eraser tool mean?
14127
What does the option &amp;quot;Auto Erase&amp;quot; for the pencil tool let you do?
14128
What does the encirled area represent?
14129
What does the encircled area in the image represent?
14130
What does the Anti alias PostScript option let you do, when you open a PDF or an EPS file?
14131
What does the &amp;quot;Stop command&amp;quot; let you do in the Actions palette?
14132
What does the &amp;quot;Image Size&amp;quot; command let you do?
14133
What does the &amp;quot;history brush tool&amp;quot; let you do?
14134
What does duplicating an action or command do?
14135
What does a &amp;quot;Magic wand tool&amp;quot; let you do?
14136
What does &amp;quot;The red box&amp;quot; in the image indicate?
14137
What does &amp;quot;Smudge tool&amp;quot; let you do?
14138
What does &amp;quot;Rubber stamp tool&amp;quot; let you do?
14139
What does &amp;quot;RGB color mode&amp;quot; stand for?
14140
What does &amp;quot;Opacity option&amp;quot; in Eraser tool let you do?
14141
What does &amp;quot;Once&amp;quot; in the Sampling option in the background eraser tool mean?
14142
What does &amp;quot;Image&amp;#39;s color mode&amp;quot; contain?
14143
What does &amp;quot;Flatten Image&amp;quot; let you do?
14144
What does &amp;quot;Fade out rate&amp;quot; in the Eraser tool let you do?
14145
What does &amp;quot;Accelerated&amp;quot; in the Playback options let you do ?
14146
We cannot change the opacity of an image that has only a background, or a locked layer. State(True/False)
14147
To use the Apply Image command, the destination and source images:
14148
To subtract more of a selection, to an existing pixel selection, which of the below is used?
14149
To apply a &amp;quot;Blur filter&amp;quot; to the edges of a layer, it is necessary to deselect the preserve Transparency option in the Layers palette. State (True/False)
14150
To add more of a selection, to an existing pixel selection, which of the below is used?
14151
The Snapshot command lets you make a temporary copy of any state of the image. State(True/False)
14152
The rubber stamp tool can be used to clone an area containing pixels from all the visible layers and layer sets. State (True/False)
14153
The maximum file size and pixel dimension which Photoshop supports is:
14154
The magic wand, smudge, or pattern stamp tools can be used for applying color sampled from pixels on the all visible layers. State(True/False)
14155
The Image Size command lets you adjust the pixel dimensions, print dimensions, and resolution of an image.State(True/False)
14156
The effect in the encircled area is the result of which Tool or Filter?
14157
The Create Droplets command lets you ....
14158
The &amp;quot;Render filter&amp;quot; creates 3D shapes, cloud patterns, refraction patterns, and simulated light reflections in an image. State(True/False)
14159
The &amp;quot;Preset Manager&amp;quot; allows you to easily reuse or share preset sets. State (True/False)
14160
The &amp;quot;Magnetic lasso&amp;quot; only detects edges within the specified distance from the pointer. State(True/False)
14161
The &amp;quot;Magnetic lasso tool&amp;quot; is especially useful for quickly selecting objects with complex edges set against high-contrast backgrounds. State(True/False)
14162
The &amp;quot;Line tool&amp;quot; is used to create curved lines. State(True/False)
14163
The &amp;quot;Lasso and Polygon lasso tools&amp;quot; let you draw both straight-edged and freehand segments of a selection border. State(True/False)
14164
The &amp;quot;Info palette&amp;quot; only displays information about the color values beneath the pointer. State(True/False)
14165
The &amp;quot;Blur More&amp;quot; filter produces an effect three or four times stronger than that of the Blur filter. State(True/False)
14166
Snapshots are not saved with the image. Closing an image deletes its snapshots. State(True/False)
14167
Playing actions that insert complex paths may require significant amounts of computer memory. State(True/False)
14168
Locked layers can be moved to a different location within the Layers palette, but they can&amp;#39;t be deleted. State(True/False)
14169
It is possible to drag italicized commands from the History palette to the Actions palette. State(True/False)
14170
In which mode, can modal control be set?
14171
In the brush option palette, what is the role of &amp;quot;Hardness&amp;quot;?
14172
In the actions palette a modal control pauses an action so that you can specify values in a dialog box or use a modal tool. State (True/False)
14173
In CMYK mode, &amp;quot;K&amp;quot; stands for:
14174
If corrections are made to an &amp;quot;Adjustment layer&amp;quot;, changes reside not only in the adjustment layer but also alter pixels in the image. State (True/False)
14175
How many speeds does the Playback Options command give you, so that you can watch each command as it is carried out?
14176
How many sets of color values for the pixels under the pointer are displayed when you work with a color adjustment dialog box?
14177
How many colors are used when an image is given a &amp;quot;Grayscale mode&amp;quot;?
14178
For type layers, preserve Transparency in the layer&amp;#39;s palette is switched on by default and cannot be turned off. State (True/False)
14179
For the &amp;quot;Magnetic lasso tool&amp;quot;, a higher value detects lower-contrast edges; a lower value detects only edges that contrast sharply with their surroundings. State(True/False)
14180
For &amp;quot;Creating Type&amp;quot; you need to add a new layer in the layer palette. State(True/False)
14181
Corrections made to an image, which uses RGB color spaces, are preserved regardless of the monitor, computer, or output device used. State whether the statement is true or false
14182
Choosing the &amp;quot;No Image type&amp;quot;(in the Slice options window) for a slice lets you enter text that will appear in the slice area of the resulting Web page. State(True/False)
14183
Channels cannot be rearranged or duplicated within or between images. State(True/False)
14184
Changing pixel dimensions...
14185
Assigning a URL to a slice makes the entire slice area a hotspot, when a user clicks in the hotspot, the Web browser links to the specified URL and target frame. State(True/False)
14186
Adding nontransparent layers to an image increases its file size. State(True/False)
14187
A modal control pauses an action so that you can specify values in a dialog box or use a modal tool. What is the result if you do not set a modal control?
14188
&amp;quot;Merge visible&amp;quot; compresses all unhidden layers into a single layer. State (True/False)
14189
&amp;quot;Merge Down&amp;quot; merges selected layer with the layer below it. State (True/False)
14190
With which of the given options does the Signal Strength Meter appear?
14191
Which View will you choose to display a Histogram with no controls or statistics?
14192
Which type of images are resolution-dependent?
14193
Which type of character is generated by Photoshop when the font does not include superscript or subscript characters?
14194
Which option will you select to remove an effect from a style?
14195
Which option will you select to open the Levels dialog box?
14196
Which option will you select to export layers?
14197
Which option will you select to display a file at 100% size?
14198
Which option will you select to convert Types to Shapes?
14199
Which option will you select to apply the Extrude filter?
14200
Which option will you choose to select all layers of a similar type?
14201
Which option will you choose to Refresh a Histogram?
14202
Which option will you choose to convert Document Colors into another profile?
14203
Which option is not turned off by the Extras command in the View menu?
14204
Which of the Saving commands is available for an image that is managed by a Version Cue Workspace?
14205
Which of the given file formats works with the Image Processor?
14206
Which of the following Slices is created with the Slice Tool?
14207
Which of the following Layer properties can be animated?
14208
Which of the following is not true about the Multichannel mode?
14209
Which of the following is not true about the Curves dialog box?
14210
Which of the following is not true about Filters?
14211
Which of the following is not true about a Droplet?
14212
Which of the following is not a type of Variable?
14213
Which of the following is not a kind of text type?
14214
Which of the following is not a Color Adjustment command?
14215
Which of the following Filters cannot be applied to a Smart Object?
14216
Which of the following file formats supports embedded color profiles?
14217
Which of the following features is/are supported by the EPS file format?
14218
Which keyboard shortcut (windows) will you choose to select the History Brush tool?
14219
Which keyboard shortcut (windows) will you choose to permanently Clear History (no Undo)?
14220
Which keyboard shortcut (windows) will you choose to group Layers?
14221
Which keyboard shortcut (windows) will you choose to close a Path?
14222
Which keyboard shortcut (windows) will you choose for Auto Leading?
14223
Which Filter embeds a digital Watermark into an image to store a copyright information?
14224
Which file format saves a document of any size as well as preserves all the Photoshop features?
14225
Which file format can be used to save Lab images?
14226
Which Command lets you free memory, used by the Undo command, the History Palette, or the Clipboard?
14227
Which Animation mode shows the frame duration and keyframed layer properties of the videos and animations in a Timeline?
14228
Which among the following Slices cannot be divided?
14229
Which among the following QuickTime Video formats is supported by Photoshop extended?
14230
Which among the following Modes does not support layers?
14231
Which among the following is/are not true about the Fill Pixels (Drawing mode)?
14232
Which among the following is not a right option for selecting a web-safe color from the Color Palette?
14233
Which among the following is not a Duotone mode type?
14234
Which among the following files, saved in the Adobe Photoshop format, is used by the filter to create the displacement maps?
14235
Which among the following blending modes is available only for the Apply Image and Calculations commands?
14236
What is the use of the Make Work Path command in the Paths palette ?
14237
What is meant by Contact Sheet?
14238
The Rotate Canvas command does not work on which of the following
14239
The individual Histograms in the All Channels View does not include which of the following?
14240
The Color Replacement Tool does not work in which of the following Image modes?
14241
State whether True or False: You cannot transform the background layer.
14242
State whether True or False: You cannot create Work paths from the fonts that do not include the outline data.
14243
State whether True or False: You cannot change the order of the Vector masks or working paths in the Paths palette.
14244
State whether True or False: You cannot arrange the stacking order of the Auto slices.
14245
State whether True or False: When you create a new image with the transparent content, the image does not have a background layer.
14246
State whether True or False: Video layers do not work in the Frame mode.
14247
State whether True or False: The Out Of Gamut option works only on RGB and Lab images.
14248
State whether True or False: The Match Color command works only in the RGB mode.
14249
State whether True or False: The mask created by the Replace Color command is permanent.
14250
State whether True or False: The Healing Brush Tool cannot be applied to video or animation frames.
14251
State whether True or False: Photoshop supports a maximum pixel dimension of 300,000 by 300,000 pixels per image.
14252
State whether True or False: Hanging Punctuation controls the alignment of the punctuation marks for a specific paragraph.
14253
State whether True or False: Color Dodge, Color Burn, Lighten, Darken, Difference, and Exclusion blending modes do not work on Lab images.
14254
State whether True or False: Changing units on the Info Palette automatically changes the units on Rulers.
14255
State whether True or False: By default, Masks applied to Smart objects are linked to Smart object layers.
14256
State whether True or False: A working space is an intermediate color space used to define and edit color in Adobe applications.
14257
Refer to the given image. Why do we select Remember Palette Locations option (marked as A) as shown in the given image?
14258
Refer to the given image. Which option, when in a checked state, displays a message whenever you open an untagged document?
14259
Refer to the given image. Which option will you select to remove the existing profile from the document in the given image?
14260
Refer to the given image. Which option adjusts Highlights in the Levels dialog box?
14261
Refer to the given image. Which of the given options refers an Action Safe Margin?
14262
Refer to the given image. Which of the given options displays the Set Tsume option in the Character Palette?
14263
Refer to the given image. Which of the given options displays the Modal control in the Actions palette?
14264
Refer to the given image. Which of the given options displays left indent in the Paragraph palette?
14265
Refer to the given image. Which of the given options displays Converts to Timeline mode in an Animation palette?
14266
Refer to the given image. Which of the following options displays the Spot Channels in the Channels palette?
14267
Refer to the given image. Which of the following options displays Temporary Work Path in the Paths palette?
14268
Refer to the given image. Which of the following Lock options in the Layers palette prevents modification of the layer&amp;#39;s pixels using the painting tools?
14269
Refer to the given image. Which Liquify Tool is used to reconstruct a part of a distorted image?
14270
Refer to the given image. Which icon indicates Type 1 kind of fonts?
14271
Refer to the given image. Which among the following Methods adds pixels by averaging the color values of the surrounding pixels and produces medium-quality results?
14272
Refer to the given image. When will the Dynamic shortcuts appear in the Character Palette Menu as shown in the picture?
14273
Refer to the given image. When is the Canvas Extension Color Menu not available as shown in the given image?
14274
Refer to the given image. What is the colored box in the Navigator Palette known as?
14275
Refer to the given image. What happens when Use Legacy is selected as shown in the given picture?
14276
Refer to the given image. In which of the given instances, a caution icon appears next to the layer comp name as shown in the picture?
14277
Refer to the given image. In which format will you save your document to preserve the Perspective Plane Information in an image while working with the vanishing point, as shown in the given picture?
14278
Layer styles cannot be applied to which of the following options?
14279
Kerning is the adjustment of the space between individual letter.
14280
In which of the following Modes can you draw while working with the Shape or Pen tools?
14281
In which Format will you save your file to preserve the Alpha channels?
14282
Channels can not be added to which of the following image modes?
14283
Auto Blend Layers is available for which of the following modes?
14284
Anti-aliasing option is available for which of the given Tools?
14285
Device which scans program code and extract them from database management system for processing is classified as
14286
Process of designing new database or designing new application for database which already exists is classified as
14287
Weak entities are used in entity relationship diagrams and are denoted by
14288
Generalization and specialization lattices are classified as
14289
System which provides active rules to initiate certain actions after meeting specific conditions is classified as
14290
In large database management applications, theses customary constraints are classified as
14291
When foreign key refers to a tuple which does not exists in subjected relation then constraint violated is
14292
Type of attributes that can be easily divided into smaller parts is classified as
14293
In SQL standard, variable which is considered as communication variable and is string of five characters is named as
14294
One of module in database management system which is responsible for choosing efficient execution plan considering queries is considered as
14295
Operator which is useful for a single relation is classified as
14296
IS-AN-INSTANCE-OF and IS-A-MEMBER-OF are types of relationships to associate
14297
Computing model in which large number of printers, PCs, Web servers and database servers are connected to each other with help of network is classified as
14298
Joining property which guarantees that spurious tuple generation problem is not created after decomposition is called
14299
Diagrams in unified modified language which includes executable component, interfaces and dependency relationships are called
14300
Type of association which associates a owner entity to weak entity is classified as
14301
Constraint between two different attributes sets is classified as
14302
Operation which only selects some of columns from table and neglect remaining columns is classified as
14303
Number of values taken by hash field are called
14304
Data model, access path and number of users of database management system are criteria for
14305
If matching tuples are not found, kind of OUTER JOIN operation which keeps all tuples of first relation out of two relations is classified as
14306
Decomposition of one relation say R into two relations is classified as
14307
Considering device specifications, byte sizes are usually from
14308
If matching tuples are not found, kind of OUTER JOIN operation which keeps all tuples of second relation out of two relations is classified as
14309
Command which returns first record of just opened file is classified as
14310
Distribution in which each row denote some related values collection is classified as
14311
User defined operations which includes update transactions and retrieval transactions are classified as
14312
Other names of weak entity types are
14313
Representation of relational calculus internal queries is classified as
14314
Considering functional dependency, one in which removal of some attributes does not affect dependency is called
14315
Procedure of sorting algorithms for larger records that does not fit in main memory and are stored on disk is classified as
14316
Data type often used in SQL-99 to specify columns with large values is classified as
14317
Group of people whose job description requires updating database, generating reports or using queries is called
14318
In allocation of file blocks on disk, clusters are also called
14319
Operation which is used to select subset of tuples by satisfying selection constraint and selection is made from relation is classified as
14320
In database management systems, record which contains all information needed for one statement of standard query language is called
14321
Applications that are used for weather information or collection of maps for geographical information is classified as
14322
Type of relationship between attributes in which similar entity participates more than once by playing different roles is classified as
14323
Systematic collection of data is classified as
14324
In CREATE TABLE command in standard query language, referential integrity constraints is specified only after the
14325
Consider two tuples A and B, operation whose result includes tuples that are included in both relations is classified as
14326
Concept in which shared subclass take over relationship from multiple classes is considered as
14327
Operation which violates only one constraint called referential integrity when it is performed is called
14328
File which consists of ordering fields for records is called
14329
Combination of track number, block number and cylinder number is classified as
14330
In traditional DBMS, application programs are considered to be part of domain of
14331
Storage capacity of digital video disk is
14332
In entity-relationship diagram, key attributes are represented by
14333
JOIN operation in which two attributes joined have same name in both relations is classified as
14334
In two-tier client ⁄ server architecture, functions of transaction server and query server are controlled by
14335
Leaf nodes in diagrams of generalization and specialization are considered as
14336
In unary relational operations, PROJECT operation is partition of relation usually classified as
14337
In functional dependency between two sets of attributes A and B then set of attributes A of database is classified as
14338
Clause used in SQL for ensuring referential integrity is classified as
14339
In normalization of relations, property which is critical and must be achieved is classified as
14340
Access to an online purchasing procedures, airline ticket reservation systems and inventory management in local grocery stores are examples of
14341
Magnetic tapes are examples of
14342
Menu-driven interface of DBMS and forms-style interface of DBMS is classified as
14343
Considering disks, command with which buffer is copied into block of disk is classified as
14344
Command in DBMS software which is used to locate records that fulfills search condition is classified as
14345
In TIMESTAMP data type, relative value which is used to decrease or increase absolute value of time stamp is classified as
14346
Partial key is differentiated by other keys in database by underlining key with
14347
In ER diagrams, partial participation is shown by
14348
Fields which are used to retrieve related records from other files are called
14349
If each tuple have relation R within it then this type of relation is classified as
14350
If completion of processing is to be shown then command which is used for this purpose is called
14351
Life cycle of database system is also called
14352
Multiple access users and access to database programs simultaneously is considered as
14353
Special node in tree structure which has many child nodes and one parent node is called
14354
Column header of table in relational model terminology is classified as
14355
Command used in SQL to specify new relation, its initial constraints and attributes is classified as
14356
In UML class diagrams, inheritances that are permitted includes
14357
Types of template dependencies are
14358
In state chart diagrams, element which is shown with help of double line filled circle with pointing arrow is classified as
14359
Collection of all concepts that must be used to describe database structure is called
14360
State in which database follows all integrity constraints is classified as
14361
Index which has an entry for every key value is classified as
14362
Type of subclass constraint that one entity can be member of at most one subclass is classified as
14363
Hashing process if used for disk files is classified as
14364
Objects in database description is called
14365
Command used in SQL which deletes table definition as well as all records available in table is called
14366
In relational calculus, expression which does not guarantees finite number of tuples is classified as
14367
Extensions of relation that satisfy constraint of functional dependency are considered as
14368
Dynamic aspects related to a system are shown with help of
14369
Disk units which has an actuator attached into it are called
14370
Two main types of constraints of entity relationships are
14371
Other name of project-join normal form is
14372
Example of tertiary storage media is
14373
In multiple tuples retrieval, command which is used to fetch queries from database is classified as
14374
Subclass which has more than one super class is called
14375
Property of DBMS which ensures whether hundreds of applications are executed, each transaction must be executed in isolation is classified as
14376
JOIN operation in which only equality operator is used is classified as
14377
Ordered list of all n-values is classified as
14378
Handling of user interface, data dictionary, concurrency control and global query optimization are tasks of
14379
Processor used to run code of queries of interpreted mode or compiled mode is classified as
14380
If explicit value of attributes is not provided in SQL then value included in new tuple in such situation is called
14381
IN DBMS, set of associations can be defined among different entities from different entity types as
14382
Constraint which is used to specify consistency in two or more relations among tuples is classified as
14383
Database catalog or dictionary defining descriptive information which is stored in database is called
14384
Kind of field with which record searching is done is classified as
14385
In multilevel indexes, blocking factor is also called
14386
Entity types, super classes and subclasses are classified as
14387
While designing database management system, if performance is main issue to be considered then DBMS designed is called
14388
Template conclusion is a set of tuples that must be included in relations in template dependency called
14389
In notation for query graphs, single circles are used to represent
14390
Database management architecture in which there is middle level between database server and client server is classified as
14391
Capacity to alter database schema at one level without altering any other schema level is classified as
14392
A row of table in relational model terminology is classified as
14393
Type of organization in which records are inserted at end of stored file is classified as
14394
Concept which checks syntax of query whether is written according to rules of grammar is classified as
14395
Kind of record which is used to keep information of specific database connection is classified as
14396
Popular technique in Web-based user interfaces are
14397
Process of defining entity type subclasses is classified as
14398
In relational database schemas, transition constraints are also known as
14399
Group of employees who are responsible for maintenance running hardware of system is classified as
14400
In data model schemas, constraints that are expressed directly are classified as
14401
Multivalued dependencies used to develop relational design theory of database is classified as
14402
Structuring of database by specifying types and constraints of data is classified as
14403
Set of key attributes that identify weak entities related to some owner entity is classified as
14404
Control feature in database management system which ensures accuracy of data updated by multiple users is classified as
14405
In database management system, executing process or executing program which considers updating or reading of records stored in database is called
14406
When two different schemas used a same name to describe schemas then this is called
14407
In reflexive rule (IR1), true dependencies generated are classified as
14408
In SQL, identifier which are used to indicate user of schema is classified as
14409
In phases of macro life cycle or information system life cycle, phase which consists of study of cost benefit and potential areas of application is called
14410
If attribute of relation schema R is not a member of some candidate key then this type of attribute is classified as
14411
In entity-relationship, entity type which has existence dependency constraint is classified as
14412
In database, set of all entities related to a particular entity type is classified as
14413
Operations used to combine multiple relations to present information in single table are classified as
14414
Association between two or more entities in a database system is classified as
14415
Procedure of storing higher normal form relations which are in lower normal form as a base relation is classified as
14416
Relations that are declared in SQL through CREATE VIEW statements are classified as
14417
In fixed length character string CHAR(n), 'n' represents
14418
Diagrams which are used to distribute files, libraries and tables across topology of hardware are called
14419
Kind of index which is based on any candidate key or a non key field which may have duplicate values is classified as
14420
General purpose programming languages such as COBOL and ADA is classified as
14421
If super class contains entities in subclasses and is derived from super class then super class is considered as
14422
In designing of software, functional requirements are specified with help of
14423
Kind of diagrams which are used to show interactions between series of messages are classified as
14424
Behavior which allows database designer to specify user defined operations for databases is called
14425
In multilevel indexes, primary index created for its second level is classified as
14426
Derived attributes in entity relationship diagrams are denoted by
14427
Kind of hashing technique in which a directory of having addresses 2d is maintained is called
14428
Users that maintain databases with help of ready made program packages are considered as
14429
In declaration statement DECIMAL (I, j), 'I' is classified as
14430
Considering conceptual synthesis and refinement, specialization process is classified as
14431
Constraints which deals with changes in database are classified as
14432
Degree of PROJECT operation is equal to
14433
In client ⁄ server architecture, system which consists of software's and peripheral devices for archiving, printing and accessing files is called
14434
Conference on Data Systems Languages Database Task Group is a committee to
14435
Inclusion dependencies that are preceding are used to represent
14436
Hash functions that does not maintain order of values of hash field are called
14437
In database schema, database snapshot is also called
14438
Attributes which have only more than one value for a specific entity are classified as
14439
If attribute of relation schema R is member of some candidate key then this type of attributes are classified as
14440
Category which considers union of super class entities is called
14441
Command in high level programming which completes release of buffers and perform other cleanup operations remaining is classified as
14442
Specification given to database management system regarding data whether it is string, integers or special characters is classified as
14443
Considering relational database, functional dependency between two attributes A and B is denoted by
14444
Property of DBMS which ensures execution of all operations in transaction or none of operation is executed is classified as
14445
If common attributes of two relations are classified as join attributes then OUTER UNION must be equal to
14446
If current number of records are 92, blocking factor is 20 and number of file buckets are 5 then file load factor is
14447
Command in SQL which is used when any of schema is no longer needed in relation is classified as
14448
Relationship between two independent data tables is classified as
14449
Compatibility condition which states that relations for union and intersection operations must consist of same type of tuples is classified as
14450
Weak entities are represented in UML diagrams by using aggregations called
14451
In two-tier client ⁄ server architecture, running of application programs and user interface programs is in control of
14452
Expression used in relational calculus to specify request of retrieval is classified as
14453
Type of constraint in which value of each attribute (X) must be an indivisible value from domain (X) is classified as
14454
Problem arises because of incompatibility between data structures of programming language and database management structures is called
14455
Person who implements specifications of database programs is considered as
14456
In database management system, module which support handling of data search, data access and data storage is classified as
14457
Technique used in DBMS to store all related objects in mixed file is classified as
14458
In notation for query trees, node which is used to terminate execution is classified as
14459
Time which is needed for consecutive blocks transferring is classified as
14460
Model in which multi-valued and composite attributes is considered as
14461
Module of DBMS which focuses on eliminating redundancies, operations reordering and rearrangements is classified as
14462
In statement DECIMAL (I, j) to specify numeric data type, digits after decimal point are called
14463
Multi-valued dependencies and functional dependencies are classified as category of
14464
Data type in SQL which includes various size integers and floating point numbers are classified as
14465
Tuples that are represented in one of two relations and are lost if JOIN operation is performed are called
14466
In data model, inherent constraints are classified as
14467
Total participation constraint is also known as
14468
In a particular time, data available in database at specific moment is called
14469
In constructing ER diagrams, double ovals are used to denote
14470
Consider two tuples R and S, maximum size of R and S relations is divided to expected size of join is classified as
14471
As compared to Cartesian product, tuples which appears in result by applying JOIN are ones
14472
In database management system, if cursor is to be moved to next rows in queries result then command is classified as
14473
In component diagrams, building block which is represented with two rectangles laid on left side is classified as
14474
Variable in DBMS used to communicate error conditions between database management system and program are
14475
In modeling of union type classes, total category of super class is represented by
14476
Characteristic of database management system which allows program operation independence and program data independence is classified as
14477
In Standard Query Language, data types included are
14478
In commercial database management system, relational database model is also known as
14479
Additional access path added into ordered file is called
14480
Type of function which allows performing additional operations and sending messages to other tables in database program is considered as
14481
Main constraints applicable in specialization are
14482
In SQL, type of character string value which is specified as being case sensitive and placed between apostrophes is called
14483
Process of analyzing relation schemas to achieve minimal redundancy and insertion or update anomalies is classified as
14484
Constraint which specifies minimum number of relationship instances is classified as
14485
Relationship type with two degrees is classified as
14486
Record searching technique which is based on blocks rather than records is called
14487
If two or more constraints are violated by using insert operation then by default the
14488
Parent entity type or identifying entity type are considered as other names of
14489
Consider two tuples X and Y, operation whose result includes tuples that are only in X but not in Y is classified as
14490
First field in primary index having same data type as in ordering field is considered as
14491
Considering knowledge representation and conceptual modeling, reasoning mechanisms are classified as part of
14492
Kind of subclass in which there are no constraints for deciding membership in any given subclass is classified as
14493
Kind of subclass on which entity become part of subclass by putting some condition on attribute values is classified as
14494
Kind of operation by which one tuple can be created with help of combining tuples from two relations is classified as
14495
In query result, type of variable which is used to loop tuples is called
14496
Considering disks, command with which block from disk is copied from specific buffer is classified as
14497
Process of suppression of details regarding storage and data type to highlight important features for better understanding is called
14498
Hierarchy of computer storage media includes
14499
Middle computer system which is accessed to access database server is classified as
14500
For a relationship type, participation constraints and cardinality ratio are considered together to make
14501
Files used for speedy disk search by providing specialized structures of data are classified as
14502
Type of data independence in which schema can be altered on conceptual level without altering external level is classified as
14503
Schema which specifies that all database users requirements have been met is called
14504
Levels in which three schema architecture can be defined includes
14505
In process of specialization, subclasses are attached by
14506
Type of data manipulation language which is embedded in programming and used to retrieve individual objects from database is classified as
14507
JOIN operation which uses any of comparison operators is classified as
14508
Entities that have key attributes to be distinct are considered as
14509
Users who access database occasionally but need different information every time are classified as
14510
Open addressing, multiple hashing and chaining are all methods used for
14511
Type of iterator which is used to list types of attributes that are included in query result is called
14512
Second phase of micro life cycle is
14513
In Unified Modeling Language, diagrams that organize system elements into groups are classified as
14514
In unary relational operations, symbols such as equal to, less than and greater than are classified as
14515
In extendible hashing array of bucket addresses 2d then d is considered as
14516
Standard which allows access to DBMS by Java client programs is classified as
14517
Command in DBMS in which all records existed in file are retrieved in specific order is classified as
14518
Predefined procedures to specify operations for each class is called
14519
Field on which equality condition is placed is hashing technique is called
14520
Type of application program which controls all task from order processing to customer support functions is classified as
14521
Networking system in which online peripherals of storage are configured as nodes on very high speed network is classified as
14522
Database interface in which data is directly entered into monitor is classified as
14523
Normal form which consider all types of constraints and dependencies is classified as
14524
If there is separation between conceptual and internal levels then language used by database designers is
14525
Data type DATE has three components where as its insertion considers
14526
Relationship type in which one attribute is migrated to N-side of relationship is classified as
14527
Feature of database management which makes it effortless to find any particular record from collection is called
14528
Files that can fit in available buffer space in phase of external sorting must be read into
14529
Type of lattice in which a subclass can be class or subclass in more than one association of subclasses is classified as
14530
If referential integrity constraint is violated then specific action clause attached by database designers other than by default action is classified as
14531
In Unified Modeling Language, diagrams which captures system static structure and provide foundation for other models is called
14532
User interface which uses both menus technique and forms is classified as
14533
In entity-relationship diagrams, participating entities are represented by
14534
Example of computer's primary storage is
14535
For a three-schema architecture, there is strict partition between external, internal and conceptual level and language used in this structure is
14536
In ER diagrams, rectangles are used to denote
14537
Type of data model which provide concepts in a way users of data recognize data models is considered as
14538
When schema is to be dropped in SQL which has no elements then type of DROP Command used is called
14539
Data type which can be fixed length or varying length as CHAR(n) and VARCHAR(n) respectively is classified as
14540
Constraint violated when given value of attribute is not included in corresponding domain is
14541
DVD devices and CD-ROM are examples of
14542
Type of legacy data model in which related records are represented by each hierarchy in tree structure is classified as
14543
Functional dependency of two sets E and F are considered as equivalent if
14544
File which has secondary index for its every field is classified as
14545
Diagrams in unified modified language which are used to test class diagrams for accuracy purpose are called
14546
Considering storage capacity, one million bytes of data are equal to
14547
Hierarchy in which each subclass participates in one subclass relationship is classified as
14548
Same class objects are arranged and organized in a way called
14549
Memory which loses contents because of power cut is classified as
14550
Weak entities and their identifying relationship in ER diagrams are represented by
14551
In data file, first record of any of block is called
14552
In SQL environment, collection of schemas is classified as
14553
In relational calculus, variables are bounded with help of
14554
Activity diagram, use case diagram, collaboration diagram and sequence diagram are considered as types of
14555
Possible specialization constraint includes
14556
Example of non dense index is
14557
In database management system, CAD is an abbreviation of
14558
Type of memories used in MP3 players and cameras are called
14559
Usage of operations with help of arguments without considering structure of operation implementation is classified as
14560
Rule which states that addition of same attributes to right side and left side will results in other valid dependency is classified as
14561
Cardinality in relational data model is considered as
14562
If global depth is more than local depth then operation must be performed in directory array is
14563
Types of database system utilities are
14564
First step in designing high level conceptual data model is
14565
Operations which are used to enhance power of expression of relational algebra includes
14566
Property of normalization of relations which guarantees that functional dependencies are represented in separate relations after decomposition is classified as
14567
Type of data organization which does not allow cross block boundaries is called
14568
DBMS in which systems involved are coupled together while having local autonomy is classified as
14569
Form of dependency in which set of attributes that are neither a subset of any of keys nor candidate key is classified as
14570
In data model schemas, constraints that are can not be expressed directly are classified as
14571
In linear hashing, formula used to calculate number of records if blocking factor, loading factor and file buckets are known is as
14572
According to enhanced-entity relationships, association between super class and subclass is as
14573
Hashing technique which allows increase or decrease in number of buckets without a need of directory is classified as
14574
Compiler which pull out commands written in host programming language from application program is classified as
14575
Storage capacity of computer system is measured in
14576
Kind of class whose entities belongs to some other data class is called
14577
If matching tuples are not found, kind of OUTER JOIN operation which keeps all tuples of first and second relation is classified as
14578
Constraints that are applied on individual tuples and are verified whenever any tuple is modified or new tuple is inserted are called
14579
Collection of known and useful raw facts that has some meaning and can be processed in useful way is classified as
14580
Hashing technique which allocates fixed number of buckets is classified as
14581
Process of converting requests into results between three-schema architecture internal, external and conceptual levels is called
14582
Operation which is used to take union of tuples from relations that are not union compatible is classified as
14583
Data model in which relationships are explained in terms of attributes is classified as
14584
Kind of allocation in which file blocks contain pointer to next blocks of file is classified as
14585
In a query tree, operations of relational algebra are classified as
14586
Category which considers subset of union of entities included in super class is classified
14587
In a relation schema, each key of schema having more than one key is classified as
14588
Considering abstraction concepts, process of assigning similar entities to similar entity types systematically is called
14589
Kind of constraint which cannot let two entities to have similar values is classified as
14590
Hierarchical models and network models are considered as types of
14591
Module of database management system which controls access to database stored on disk is considered as
14592
Branch of calculus which is based on mathematical logic is classified as
14593
Concept which describes domain of knowledge is considered as
14594
Operation which allows to process relationships from multiple relations rather than single relation is classified as
14595
In programming languages, available data types are
14596
Indexes which specifies address of records on disk with a physical pointer are classified as
14597
In database management system, module which is designed to be used on workstation and personal computer systems is classified as
14598
Type of constraints that specifies uniqueness of data stored in database are considered as
14599
In database management system, term which is used to represent real world concept or object is classified as
14600
Standardized types of database queries and methods of updating database are called
14601
Phase in data designing in which access paths and database indexes are specified is classified as
14602
In notation for query graphs, double ovals or circles are used to represent
14603
Application program interface in two tier architecture database management system is provided by the
14604
Implications of database management approaches includes
14605
Format or data type must be specified for
14606
Types of binary operations includes
14607
Information stored in information repository can be accessed by
14608
Key which specifies that two different tuples cannot have same value is classified as
14609
Boolean expression used in SELECT operation consists of clauses such as
14610
Attributes which have only one value for a specific entity are called
14611
Types of partial constraints are
14612
In linear hashing, formula of file load factor is
14613
In EQUIJOIN condition, operation which is used to avoid superfluous attribute is classified as
14614
In DBMS, record-at-a-time manipulation language is also called
14615
Association between aggregate and primitive objects is classified as
14616
Concept in which extra bit or byte is stored for record deletion and that extra stored bit is called
14617
Command used in high level programs to transfer record block in to main memory buffer is classified as
14618
Non-procedural language and procedural language are classified as types of
14619
Concepts of data models that are only useful to computer specialists rather than end users of programs are classified as
14620
If there is more than one key for relation schema in DBMS then each key in relation schema is classified as
14621
Detailed description on entity constraints, entity relationships and entity types is expressed in
14622
In categories of data modeling, low level data models are also called
14623
Kind of memories that use an array of platters of CD-ROM must be loaded on demand into drives are classified as
14624
Type of server in two-tier architectures which provides data to client stored on disk pages is called
14625
Type of legacy data model in which data is represented as record types and limited one to many relationships is called
14626
Form of data model which focuses concepts in same way as data stored in computer system is classified as
14627
Root super class in diagrams of generalization and specialization is considered as
14628
In relational model terminology, table is considered as
14629
DIVISION operation can be applied to two relations A and B such as R(A) ÷ R(B) where as
14630
Data communication system and database management system is also considered as
14631
If every functional dependency in set E is also in closure of F then this is classified as
14632
Kind of class which does not have its own subclasses is called
14633
Database program which handles software applications and include database servers calls to update data is classified as
14634
Because of calculus expression, relational calculus is considered as
14635
Range of capacity for number of tracks is
14636
Type data abstraction which allows conceptual representation of data in database management system is considered as
14637
Considering conceptual synthesis and refinement, generalization process is classified as
14638
Function which causes retrieval of any kind of data from database is considered as
14639
Life cycle of information system is also called
14640
Class diagram, component diagram, object diagram and deployment diagram are considered as types of
14641
Architecture of database in which characteristics such as program insulations, multiple user support and use of catalogs are achieved is classified as
14642
In relational database management system, server is classified as
14643
In database management systems, record which contains all data regarding tuples of database is called
14644
Name of operation and type of data of parameters must be included in
14645
Time period required to transfer blocks in consecutive order is classified as
14646
Particular database and set of related programs which helps in implementation of updates and queries is called
14647
Parts of an operation or function must includes
14648
Reserved area that holds one block in main storage is classified as
14649
Entity type from which subgroups can be made is classified as
14650
Package of software that facilitate modeling of database and improved performance of database system is classified as
14651
Type of classes which specifies operations and attributes but corresponding classes are not available are classified as
14652
In multilevel indexes, primary index created for its first level is classified as
14653
In external sorting, number of runs that can be merged in every pass are called
14654
Technique which is used to retrieve data from disk in form of continuous blocks of stream and eliminates seek time is classified as
14655
Type of attributes that can be divided into smaller parts is classified as
14656
Set of values which specifies which values are to be assigned to individual entities is considered as
14657
Set of all entities having same attributes is classified as
14658
If in JOIN operation, conditions of JOIN operation are not satisfied then results of operation is
14659
Storage media that is operated directly from computer's central processing unit is considered as
14660
Attributes that can be arranged into hierarchy are called
14661
In Standard Query Language, types of DROP commands include
14662
Considering binary relationships, possible cardinality ratios are
14663
Primary indexes, secondary indexes and cluster indexes are all types of
14664
In formal relational model, set of indivisible values is called
14665
Operators in SELECT operation statement such as 'and' , 'or' and 'not' are classified as
14666
Objects in DBMS belongs to same structure and behaves in same way are considered as
14667
Form of data model in which concepts provided are useful for end users and are also close to way it is stored in computer system is called
14668
Index which has an entry for some of key value is classified as
14669
Software whose main function is to provide access database from remote location with help of work stations, local PCs and computer terminals is called
14670
In three-tier architecture, intermediate layer between database and client servers is classified as
14671
When primary key is null of new tuple then constraint violated is
14672
Database system which supports majority of concurrent users is classified as
14673
State in database management system which satisfies constraints and specified schema structure is classified as
14674
In modeling of union type classes, partial category of super class is represented by
14675
Element of state chart diagrams which uses round corner boxes to represent situations of an object is classified as
14676
In unary relational operations, SELECT operation is partition of relation usually classified as
14677
Type of diagram in which operations are specified on objects is considered as
14678
Technique in which source program are replaced by database management generated code is classified as
14679
You are meeting a new LoadRunner customer. The application under test is a call center application used by the customer representatives. The representatives are located in Phoenix- AZ and Columbus- OH. A large customer base resides in Flagstaff- AZ an
14680
Which scenario type helps you plan for future growth and provides a safety factor with the application?
14681
Which LoadRunner component runs the vuser that generates the load?
14682
Which type of script is a lower level that records in Analog mode when using the web protocol in VuGen?
14683
When performing a manual correlation, where do you search for the dynamic value?
14684
Which VuGen view guides you through the steps in script creation?
14685
What is the common function used to display messages in the Replay Log?
14686
Which type of parameter can use the parameter simulation?
14687
You want to apply Script A Run-time settings, parameters, extra files, and actions to Script B. How can this be accomplished?
14688
What is the recommended Logging Run-time setting when playing back a script prior to manual correlation?
14689
Which performance test is used to find the system breaking point?
14690
Which performance test finds the behavior and performance of each tier?
14691
What is the LoadRunner term for varying values defined in a placeholder that replaces the hard-coded values?
14692
What allows you to gather performance metrics for a variety of major backend system components including firewalls, application servers, and database servers?
14693
Script should define the Update transaction, and the load test should achieve 2,500 concurrent users.
14694
During a top time transaction run, what is the recommended load percentage?
14695
On which platform can the Controller be installed?
14696
What is the first stage of the load testing process?
14697
What is the appropriate scenario outline if your quantitative goal is to attain 2,500 concurrent users for the Update transaction during peak time?
14698
What displays business processes and volume across a time line?
14699
Which performance test objective is met when determining if the new version of the software adversely affects response time?
14700
You configure a scenario to start with a delay of (HH:MM:SS) just before leaving from work. You return the next morning to find that the scenario did not run. Why would this happen?
14701
While running a script in the Controller you notice a scripting error. While the scenario is still open, you return to VuGen, make the coding modification & save the script. What do you need to do before running the scenario again?
14702
What does the elapsed time in the Scenario Status window refer to?
14703
Which Analysis graph details the delay for the complete path between the source and destination machines?
14704
What is an intersection point in a business process?
14705
Which option in the Analysis tool allows you to compare a measurement in a graph with other measurements during a specific time range of a scenario and view similar trends?
14706
Which LoadRunner component is supported on UNIX?
14707
You want to control the delay between iterations. Where do you set this in the IZun-time settings?
14708
You are analyzing the results for a Debug run and realize that response times are better than SLAs. What should you do?
14709
Which level of concurrency identifies how many users are currently in the process of buying a ticket?
14710
You run a load test & the performance does not agree with your goals. What is the next step that should be taken?
14711
Which scenario execution run allows you to look for potential transactions that require significantly longer times to complete?
14712
How can you validate that the LoadRunner Agent is running on the load generator?
14713
A script was recorded with an average think time for an advanced user. An advanced user pauses 5 seconds between clicks. A first-time user pauses an average of 10 seconds between clicks. How can you modify the think time run-time settings to emulate a
14714
Which step comes after scenario execution in the load testing process?
14715
When you define a rendezvous point in a scenario, where should the Ir_start transaction function be placed?
14716
View the Business Process Profile table for the e-commerce site shown in the exhibit. Which business processes are the most critical to record?
14717
When you specify to iterate a script 10 times, which sections of the script are iterated?
14718
Which performance test objective is met when determining if the system is stable enough to go into production?
14719
Which LoadRunner tool captures the communication between the browser and web server?
14720
Where in the Run-time settings can you define to only send messages when an error occurs?
14721
You are running a test and notice that during the ramp up, the response times are beginning to drastically increase. How can you instruct LoadRunner to stop ramping up Vusers and hold the current number?
14722
Which option in the Analysis tool allows you to focus on a specific measurement within your graph?
14723
What is NOT an advantages of using automated load tests over manual load tests?
14724
hat are the main types of service level agreements available in the Controller and Analysis?
14725
What is an external data source?
14726
Which file defines the Vusers to execute, the number of Vusers to run, the goals of the test, the computer that hosts the Vusers, and the conditions under which to run the load test?
14727
During the analysis of a scenario, you realize that the hits per second become flat as Vusers continue to increase. What is likely to cause?
14728
Which term defines the end-to-end measurement of time when one or more steps are completed?
14729
You are a LoadRunner expert consultant and have been assigned to a client that needs to performance test an application that has not yet been released. How can you obtain information about the application anticipated load?
14730
Does Load Runner Support Parametrization
14731
Which Options (Settings) are NOT part of run -time settings dialog box ?
14732
Can a transaction contain another transaction ?
14733
Corelation problem is caused by
14734
Select valid recording modes in LR
14735
LR records communication between Client & Server only but does not record screen actions performed by user
14736
Which component of LR will be used play back a script in multi-user mode ?
14737
Can Load Runner be integrated with Quality Center and Quick Test Pro (QTP) ?
14738
Which methods can be used to fix Corelation problem ?
14739
What type of scenarios can be created in Load Runner
14740
Browsers supported by Load Runner -
14741
Define -Think Time
14742
Which of the following is NOT a supported scripting language for Load Runner
14743
Which of the following is NOT a component of LR ?
14744
Which of the following function sends a message to the output winow
14745
In Analyer, can graphs be corelated /overlayed?
14746
Identify the corelation function
14747
Which Options (Settings) are available for scheduling a scenario ?
14748
Types of Checks supported by LR
14749
Default Actions generated in a Load Runner Script are
14750
When you run a scenario, by default, the script is copied to a ...... directory on the Vuser group machine. This enables the Vuser group load generator to access the script locally instead of over a network.
14751
While editing and viewing the details of a script used by an individual Vuser, Modifying the run-time settings for one Vuser modifies the run-time settings for all the Vusers in the group that are using the same script.
14752
Only users with administrator privileges can connect from the Controller to a local load generator via a terminal services session.
14753
You can use LoadRunner’s .......... to remotely manage multiple load generators running in your load testing scenario on a terminal server.
14754
In Load Generator Information dialog, The Security tab is disabled if the load generator is Localhost.
14755
In Load Generator Information dialog, If you select the Enable firewall option, the Temporary directory option for storing temporary files is enabled.
14756
The maximum number of Vuser types that the load generator will initialize or stop simultaneously is
14757
If you are monitoring or running Vusers over the firewall, the UNIX Environment settings are more relevant.
14758
To allow LoadRunner to run your application under the Korn shell, you first need to make sure that the ....... file contains all of the LoadRunner environment settings
14759
If the load generator is ......., then LoadRunner stores the scripts and results on a shared network drive, and the options for setting the location are all disabled.
14760
In the Load Generator Information dialog box, select the ...... tab to specify the result directory for the performance data that LoadRunner gathers from each load generator during a scenario.
14761
The Controller monitors a Windows load generator’s CPU usage and automatically stops loading Vusers on a load generator when it becomes overloaded.
14762
Opens one window containing all of the run-time settings in blank mode. In this mode, you set only the options that you would like to modify for all selected scripts. All other run-time settings remain unchanged.
14763
Pausing a Vuser group will not affect its transaction response time.
14764
Once you have created your Vuser groups, you can sort them by or
14765
To run Visual C++ Vusers on a remote load generator, you must add the ...... of the Vuser to the files used by script list.
14766
While Modifying a Vuser Group, You can modify the script, and load generator for a Vuser group directly from the ........ pane of the Controller, or by using the Group Information dialog box.
14767
Select the true statement
14768
A the time of creating Vuser Group, to allow the load generator to take part in the scenario, check ....
14769
By default, LoadRunner stores temporary files on the load generator during scenario execution, in a temporary directory specified by the load generator’s ....... environment variables.
14770
The Scenario Groups pane lists all enabled and disabled Vuser Groups, their paths, the number of Vusers assigned to each group, and the load generators.
14771
You create Vuser groups that contain Vusers with ......... characteristics
14772
In a goal-oriented scenario, you define the goals you want your test to achieve, and LoadRunner automatically builds a scenario for you, based on these goals.
14773
To test your system with LoadRunner, you must create a ........ —a file with information about the test session.
14774
During scenario execution, you use the ...... pane in the Run view to monitor the actions of all the Vusers and Vuser groups in the scenario.
14775
Closing a scenario closes all the Controller windows.
14776
The New command creates a completely new scenario. The New command unclears all the information displayed in the Controller windows.
14777
After you create the scenario, LoadRunner saves the information in a scenario file with extension.......
14778
You can run ...... LoadRunner commands by clicking a button on the toolbar in the Controller.
14779
The Controller window has the following main views
14780
While selecting the script or scripts that you want to use in your scenario, for choosing a VB Vuser script, browse to locate the .....,......... file.
14781
You can change the maximum number of scripts displayed in the Available Scripts list by modifying the following registry key: HKEY_CURRENT_USER\Software\Mercury Interactive\RecentScripts\.........
14782
You can select one of two methods to create a scenario: ........
14783
By default, the Controller opens with the New Scenario dialog box.
14784
You can use LoadRunner to create ....... on the system: force the system to handle extended activity in a compressed time period to simulate the kind of activity a system would normally experience over a period of weeks or months.
14785
You can measure network and server response time, including response time of the GUI front end, by running Vusers (not GUI) on the client machine.
14786
To undo the last change made to your graphic design, the keys may be used.
14787
When using the SAVE AS: feature, the ________ file type saves my graphic design with all layers visible for changes upon opening the next time. Choose all that apply. You must select all correct possibilities.
14788
To select a new color in the foreground or background squares, use the tool.
14789
must select a to give your text perspective against your background.
14790
A design in Adobe Photoshop consists of multiple of graphics and
14791
The name of the areas that include the color swatches, layers and toolbox is
14792
If you have a solid color to select and delete, the tool is the quickest and most effective.
14793
To turn-off the use of a tool, or deselect it, you must push the keys.
14794
Clouds, motion blur, ocean ripple and plastic wrap are all examples of that can be used in your graphic design.
14795
By changing the % of , you can blend multiple layers with one another.
14796
you use the edit -> define pattern command to create new patterns based on a selection. which of the following statements is true while defining a pattern:
14797
you cannot insert a path when recording an action or after it has been recorded. state(true/false)
14798
you can apply transformations to the background as a layer. you cannot however, transform selections on the background. state(true/false)
14799
you can add notes and audio annotations anywhere on a photoshop image canvas. state(true/false)
14800
with the "magnetic lasso tool", the border snaps to the edges of defined areas in the image. state(true/false)
14801
why is the "stroke command" used?
14802
why is "type" given in gradient tool option?
14803
which tool or option gave the encircled area an orange color?
14804
which tool or effect has led to the effect in the image?
14805
which tool is activated by default, when a color adjustment dialog box is opened?
14806
which tool has led to the effect within the encircled area in the image?
14807
which tool among the following allows you to create "arrow heads"?
14808
which step has to be performed first to give "stroke to text"?
14809
which one of the below is the first step to publish the images online, through adobe photoshop.
14810
which of the below will be most suitable for resizing and resampling images for printed or online display.
14811
which of the below tools is shown in the picture?
14812
which of the below steps has to be performed to open a note or play an audio annotation?
14813
which of the below steps has to be performed to delete all annotations of the same type?
14814
which of the below operations is to be performed to reverse all changes made to the image since it was last saved?
14815
which of the below is the only way to affect multiple layers at once?
14816
which of the below is the first step to import annotations?
14817
which of the below is the advantage of working in rgb mode?
14818
which of the below is not the function of the "convert direction point tool"?
14819
which of the below is not the function of "alt tag" in the slice options window?
14820
which of the below file formats can be used when you choose to optimize images?
14821
which of the below defines the purpose of creating a slice from an image?
14822
which of the below are "primary colors"?
14823
which mode of the air brush tool has created the black effect shown in the image?
14824
which below tool is shown in the picture?
14825
which "tool" is shown in the image?
14826
when adjusting out of gamut colors or making color corrections in rgb mode, cmyk colors can be previewed in an rgb image. state(true/false)
14827
what will be the most suitable option if you have to replace parrot green with red color in the image. the layers in the image are merged.
14828
what is the role of the "history palette" in photoshop?
14829
what is the role of the "crop tool"?
14830
what is the role of "the eye dropper tool"?
14831
what is the role of "info palette" and "color palette"?
14832
what is the role of "edit" in the gradient tool options?
14833
what is the role of "dodge tool"?
14834
what is "clone aligned" option in "rubber stamp tool" used for?
14835
what information does the "info palette" of the measure tool contain?
14836
what happens when you create a "note"?
14837
what happens if you double-click the slice with the slice select tool?
14838
what does the term "resampling" refer to?
14839
what does the option "message text" in the slice option window let you do?
14840
what does the option "discontiguous" in the background eraser tool mean?
14841
what does the option "auto erase" for the pencil tool let you do?
14842
what does the encirled area represent?
14843
what does the encircled area in the image represent?
14844
what does the anti alias postscript option let you do, when you open a pdf or an eps file?
14845
what does the "stop command" let you do in the actions palette?
14846
what does the "image size" command let you do?
14847
what does the "history brush tool" let you do?
14848
what does duplicating an action or command do?
14849
what does a "magic wand tool" let you do?
14850
what does "the red box" in the image indicate?
14851
what does "smudge tool" let you do?
14852
what does "rubber stamp tool" let you do?
14853
what does "rgb color mode" stand for?
14854
what does "opacity option" in eraser tool let you do?
14855
what does "once" in the sampling option in the background eraser tool mean?
14856
what does "image's color mode" contain?
14857
what does "flatten image" let you do?
14858
what does "fade out rate" in the eraser tool let you do?
14859
what does "accelerated" in the playback options let you do ?
14860
we cannot change the opacity of an image that has only a background, or a locked layer. state(true/false
14861
to use the apply image command, the destination and source images:
14862
to subtract more of a selection, to an existing pixel selection, which of the below is used?
14863
to apply a "blur filter" to the edges of a layer, it is necessary to deselect the preserve transparency option in the layers palette. state (true/false)
14864
to add more of a selection, to an existing pixel selection, which of the below is used?
14865
the snapshot command lets you make a temporary copy of any state of the image. state(true/false)
14866
the rubber stamp tool can be used to clone an area containing pixels from all the visible layers and layer sets. state (true/false)
14867
the maximum file size and pixel dimension which photoshop supports is:
14868
the magic wand, smudge, or pattern stamp tools can be used for applying color sampled from pixels on the all visible layers. state(true/false)
14869
the image size command lets you adjust the pixel dimensions, print dimensions, and resolution of an image.state(true/false)
14870
the effect in the encircled area is the result of which tool or filter?
14871
the create droplets command lets you ....
14872
the "render filter" creates 3d shapes, cloud patterns, refraction patterns, and simulated light reflections in an image. state(true/false)
14873
the "preset manager" allows you to easily reuse or share preset sets. state (true/false)
14874
the "magnetic lasso" only detects edges within the specified distance from the pointer. state(true/false)
14875
the "magnetic lasso tool" is especially useful for quickly selecting objects with complex edges set against high-contrast backgrounds. state(true/false)
14876
the "line tool" is used to create curved lines. state(true/false)
14877
the "lasso and polygon lasso tools" let you draw both straight-edged and freehand segments of a selection border. state(true/false)
14878
the "info palette" only displays information about the color values beneath the pointer. state(true/false)
14879
the "blur more" filter produces an effect three or four times stronger than that of the blur filter. state(true/false)
14880
snapshots are not saved with the image. closing an image deletes its snapshots. state(true/false)
14881
playing actions that insert complex paths may require significant amounts of computer memory. state(true/false)
14882
locked layers can be moved to a different location within the layers palette, but they can't be deleted. state(true/false)
14883
it is possible to drag italicized commands from the history palette to the actions palette. state(true/false)
14884
in which mode, can modal control be set?
14885
in the brush option palette, what is the role of "hardness"?
14886
in the actions palette a modal control pauses an action so that you can specify values in a dialog box or use a modal tool. state (true/false)
14887
in cmyk mode, "k" stands for:
14888
if corrections are made to an "adjustment layer", changes reside not only in the adjustment layer but also alter pixels in the image. state (true/false)
14889
how many speeds does the playback options command give you, so that you can watch each command as it is carried out?
14890
how many sets of color values for the pixels under the pointer are displayed when you work with a color adjustment dialog box?
14891
how many colors are used when an image is given a "grayscale mode"?
14892
for type layers, preserve transparency in the layer's palette is switched on by default and cannot be turned off. state (true/false)
14893
for the "magnetic lasso tool", a higher value detects lower-contrast edges; a lower value detects only edges that contrast sharply with their surroundings. state(true/false)
14894
for "creating type" you need to add a new layer in the layer palette. state(true/false)
14895
corrections made to an image, which uses rgb color spaces, are preserved regardless of the monitor, computer, or output device used. state whether the statement is true or false
14896
choosing the "no image type"(in the slice options window) for a slice lets you enter text that will appear in the slice area of the resulting web page. state(true/false)
14897
channels cannot be rearranged or duplicated within or between images. state(true/false)
14898
changing pixel dimensions...
14899
assigning a url to a slice makes the entire slice area a hotspot, when a user clicks in the hotspot, the web browser links to the specified url and target frame. state(true/false)
14900
adding nontransparent layers to an image increases its file size. state(true/false)
14901
a modal control pauses an action so that you can specify values in a dialog box or use a modal tool. what is the result if you do not set a modal control?
14902
"merge visible" compresses all unhidden layers into a single layer. state (true/false)
14903
"merge down" merges selected layer with the layer below it. state (true/false)
14904
"feathering" blurs edges by building a transition boundary between the selection and its surrounding pixels. state(true/false)
14905
The GIF file format is ideal for photographic images.
14906
The shortcut Ctrl+Backspace fills a selection with the background color.
14907
The Inverse function (Ctrl+Shift+I) inverts a selection such that all pixels outside the current selection become selected.
14908
Blending mode determines how a selection’s edge pixels blend with the pixels outside the selection.
14909
Adjusting the proximity setting causes the magic wand tool to select a larger or smaller color range.
14910
The elliptical marquee can be constrained to select a perfect circle by holding the Shift key.
14911
Multiple tools can be used at one time.
14912
The tools in the toolbox are not organized in any particular order.
14913
Use the zoom tool to pan an image from one side to another.
14914
The shortcut for zooming in is Ctrl+(plus).
14915
Vector images are resolution independent.
14916
Text created with the text tool and shapes created with the shape tool are raster graphics.
14917
Vector images lose quality when enlarged.
14918
Each pixel in a raster image is stored as a particular combination of colors when it is saved.
14919
Applying a matte helps transparent images blend into the background on which they are placed.
14920
Web browsers can display images in any file format.
14921
Anti-aliasing is a process which smooths edges on scalable fonts and graphics
14922
Hexadecimal notation is a code which Web browsers use to define shape.
14923
The HSB color model and the RGB color model produce the same colors but use different notation to describe them.
14924
Photoshop Elements has an infinite number of active colors.
14925
The primary colors in light are red, yellow and blue.
14926
The image resolution is specified in the New dialog.
14927
Photoshop Elements is a graphics application that can only edit existing graphics.
14928
Many images are available free for download on the Internet.
14929
The addition of graphics to Web pages has no effect on the user experience.
14930
Dreamweaver is available for both Mac and Windows ________.
14931
Although a hybrid WYSIWYG and code-based web design and development application, Dreamweaver’s WYSIWYG mode can hide the ________code details of pages from the user, making it possible for non-coders to create web pages and sites.
14932
______ (XSLT)
14933
Dreamweaver can use third-party “Extensions” to extend core functionality of the application, which any web developer can write (largely in________ and JavaScript).
14934
Recent versions have incorporated support for web technologies such asCSS, JavaScript, and various server-side scripting languages and frameworksincluding ASP, ________, and PHP.
14935
Dreamweaver, like other HTML editors, edits files locally then uploads them to the remote web server using FTP, SFTP, or ________.
14936
Which of the following platforms does Adobe Dreamweaver run on?
14937
Who developed Adobe Dreamweaver?
14938
Creating of the Adobe Sound Document allowing ________ to create multi-track audio projects in Soundbooth.
14939
InDesign exports documents in Adobe’s ________ (PDF) and has multilingual support
14940
In October 2005, Adobe released “InDesign Server CS2”, a modified version of InDesign (without________) for Windows and Macintosh server platforms.
14941
By 1998 PageMaker had lost almost the entire professional market to the comparatively feature-rich________ 3.3, released in 1992, and 4.0, released in 1996.
14942
Adobe InDesign is a software applicationproduced by ________.
14943
Ability to use Arabic, Persian or ________ digits
14944
In 2002, InDesign was the first ________-native desktop publishing (DTP) software.
14945
Longer documents are often still designed with Adobe’s FrameMaker (manuals, technical documents, etc.) or with ________ (books, catalogs, etc.).
14946
Who developed Adobe InDesign?
14947
To increase type size in Illustrator (on a Mac), what keyboard combo should you use?
14948
Hitting which of the following keys will make palettes and the toolbox go away?
14949
How would you get the most precise results using the transformation tools?
14950
What’s the quickest way to move all tab stops an equal distance in Illustrator 8 text?
14951
Creating text as a graphic in Illustrator gives you all the following advantages except.
14952
If an Illustrator document won’t print, which of the following does Real World Illustrator 8 author Deke McClelland suggest you try?
14953
If you want a new brush you’ve created to show up in the Brushes palette of all new illustrations, where must you save it?
14954
What can’t you do to a brushstroke you apply in Illustrator 8?
14955
An art brush can be made from which of the following in Illustrator 8?
14956
Which of the following isn’t a type of Illustrator brush?
14957
Which of the following platforms does Adobe InDesign run on?
14958
Which of the following languages is spoken in Adobe Creative Suite?
14959
What license is Adobe Dreamweaver distributed under?
14960
What license is Adobe Premiere Pro distributed under?
14961
What license is Adobe Acrobat distributed under?
14962
Who developed Adobe ImageReady?
14963
________ is a raster graphics editor (with significant vector graphics functionality).
14964
Which of the following platforms does Adobe Illustrator run on?
14965
What was Adobe Fireworks written in?
14966
What license is Adobe Creative Suite distributed under?
14967
A layer that is active must be visible.
14968
The letter “S” key can be pressed to change the screenmode.
14969
The tool that will take lookout off ocusis the sharpentool.
14970
In the foreground color picker box there are 7 characters in a hexidecial color code combination.
14971
Hue,Saturation and Brightnes saretermsused with color.
14972
As election can be made with as so, marquee, magicwand, and quick selection tools.
14973
Holding the shift button will allow you to add to as election.
14974
Layers are viewed from bottom totop.
14975
Layers cannot be deleted once they’ve been created.
14976
The magicw and works with a setting called to lerance to determine the sensitivity level of what is being selected by this tool.
14977
A layer is a separate image to an overall image.
14978
The zoomtool and the navigator palette work to gether in zooming in/out on an image.
14979
There are 3 panels that are visible in the default workspace environment.
14980
The rights side of the interface is occupied by panels.
14981
Only certain tools display a tools option bar where you can change the settings of a tool.
14982
Every tool can be activated by a letter key stroke.
14983
The default colors for the foreground and background colors are black and white.
14984
The toolbox is located on the left side of the interface and houses manytools that a revisible and hidden.
14985
The Image title bar states the name of the application.
14986
MicrosoftcreatedAdobePhotoshop?
14987
To cut down the size of the entire graphic design, including all layers, you should select the ______ tool.
14988
When selecting an area of pixels to delete, which of the following tools could be used? Choose all that apply. You must select all correct possibilities.
14989
BMP stands for?
14990
PNG stands for?
14991
TIFF stands for?
14992
GIF stands for?
14993
JPEG stands for?
14994
Bitmap is sometimes referred as
14995
There are how many types of 2D graphics?
14996
Computer monitor primary color allows how many individual shades?
14997
computer monitor palette holds which color?
14998
To fill a background layer with clouds, pull down the filter menu and go to render.
14999
The average image size of 640 x 480 is measured in picas.
15000
What will be the output of 7^10 in python?
15001
What is the maximum possible length of an identifier?
15002
Which statement is correct....??
15003
Which of the following data types is not supported in python ?
15004
Mathematical operations can be performed on a string. State whether true or false -
15005
Consider the results of a medical experiment that aims to predict whether someone is going to develop myopia based on some physical measurements and heredity. In this case, the input dataset consists of the person’s medical characteristics and the target variable is binary: 1 for those who are likely to develop myopia and 0 for those who aren’t. This can be best classified as
15006
time.time() returns ________
15007
Suppose list1 is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after list1.pop(1)?
15008
What is called when a function is defined inside a class?
15009
What is the output of the following segment : chr(ord('A'))
15010
What is the output of the following code :
15011
What will be the output of the following code : print type(type(int))
15012
Give one word: What model does ASP.NET request processing is based on__________________?
15013
Suppose a .NET programmer wants to convert an object into a stream of bytes then the process is called ________________?
15014
In ASP.NET if one wants to set the focus on a particular control________________?
15015
When an .aspx page is requested from the web server, the out put will be rendered to browser in following format ?
15016
Select the validation control used for “PatternMatching”?
15017
How ASP.Net Different from classic ASP ?
15018
Select the output of the statement ?
15019
How do you explicitly kill a user session ?
15020
Which method displays the custom control________________?
15021
Which class can be used to create an XML document from scratch ?
15022
Which of the following can be used to add alternating color scheme in a Repeater control ?
15023
Which of the following is used to write error message in event Log File ?
15024
Choose the form in which Postback occur_________________?
15025
In order to prevent a browser from caching a page which of these xstatements should be written ?
15026
We can manage states in asp.net application using________________?
15027
If a developer of ASP.NET defines style information in a common location. Then that location is called as________________?
15028
What executable unit gets created when we build an ASP.Net application ?
15029
To add a custom control to a Web form we have to register with?
15030
Custom Controls are derived from which of the classes_________________?
15031
Whats is the significance of Response.ClearHeaders( ) ?
15032
What is/are the predefined TraceListener(s) in ASP.Net?
15033
In .NET the operation of reading metadata and using its contents is known as ________________?
15034
Which of these classes maps to the tag ?
15035
Common type system is built into which of the following?
15036
What is a strong name ?
15037
A developer wanted to achieve graphics in his display using ASP.NET. Which of the following web controls are available in ASP.NET to achieve the above ?
15038
The first event to be triggered in an aspx page is?
15039
How do you add ASP.Net 3rd party component__________________?
15040
The Following are the minimum requirement to run Asp.net pages_________________?
15041
The first event to be triggered in an aspx page is__________________?
15042
#NAME ?
15043
Which of the following are not a member of Server Object_________________?
15044
What section of the config.Web file is used for storing a list of authorized users ?
15045
In ASP.NET what does the following return ?
15046
What is the transport protocol used to call a webservice ?
15047
What is a diffgram ?
15048
Which of the following object is not an ASP component ?
15049
____________ is a special subfolder within the windows folder that stores the shared .NET component?
15050
Which of the following transfer execution directly to another page ?
15051
What namespace does the Web page belong in the .NET Framework class hierarchy ?
15052
You need to store state data that is accessible to any user who connects to your Web application. Which object should you use ?
15053
Which property is used to name a web control ?
15054
I have an ASP.NET application. I have a page loaded from server memory. At this instance which of the following methods gets fired ?
15055
How do you disable client side validation ?
15056
Which namespace allows us to formauthentication ?
15057
An alternative way of displaying text on web page using ?
15058
Which of the following is the way to monitor the web application ?
15059
Difference between Response.Write() and Response.Output.Write() ?
15060
File extension used for ASP.NET files ?
15061
Which of the following ASP.NET object encapsulates the state of the client ?
15062
Which of the following is faster and consume lesser memory ?
15063
In ASP.NET in form page the object which contains the user name is ________________?
15064
Which of the following is used to send email message from my ASP.NET page?
15065
How many classes can a single .NET DLL contain ?
15066
Which method do you invoke on the DataAdapter control to load your generated dataset with data ?
15067
How do you register a user control ?
15068
Select the type Processing model that asp.net simulate ?
15069
Which of these data source controls do not implement Caching ?
15070
Which of the following is a requirement when merging modified data into a DataSet ?
15071
Where we can assign value to Static read only member variable of a static class ?
15072
An organization has developed a web service in which the values of the forms are validated using ASP.NET application. Suppose this web service is got and used by a customer then in such a scenario whi ?
15073
Who can access Session state variables ?
15074
We can manage states in asp.net application using_______________?
15075
If a developer of ASP.NET defines style information in a common location. Then that location is called as_________________?
15076
When does Garbage collector run ?
15077
What attributes do you use to hide a public .Net class from COM ?
15078
When a .aspx page is requested from the web server, the out put will be rendered to browser in following format ?
15079
Which of the following must be done in order to connect data from some data resource to Repeater control ?
15080
How many configuration files can an ASP.NET projects have?
15081
ASP.NET separates the HTML output from program logic using a feature named as_______________?
15082
The namespace within the Microsoft .NET framework which provides the functionality to implement transaction processing is _______________?
15083
What is the Server.MachineName does_________________?
15084
In ASP.NET application the Global.asax file lie in which directory_________________?
15085
Which of the following languages can be used to write server side scripting in ASP.NET ?
15086
To set page title dynamically in ASP.NET which of the following is used ?
15087
Which of the following denote New Data-bound Controls used with ASP.NET ?
15088
Which of the following denote the web control associated with Table control function of ASP.NET ?
15089
Which of these files takes the web application in offline mode ?
15090
Which Kind Of data we can store in viewstate ?
15091
Which of the following is the default authentication mode for IIS ?
15092
What is the maximum number of cookies that can be allowed to a web site ?
15093
Which of the following is true ?
15094
In ASP.NET the sessions can be dumped by using ?
15095
Suppose one wants to modify a SOAP message in a SOAP extension then how this can be achieved. Choose the correct option from below ?
15096
In my .NET Framework I have threads. Which of the following denote the possible priority level for the threads ?
15097
The .NET framework which provides automatic memory management using a technique called _________________?
15098
Which of the following object is used along with application object in order to ensure that only one process accesses a variable at a time ?
15099
Which of the following method must be overridden in a custom control ?
15100
What data types do a Rangevalidator supports ?
15101
In ASP.NET page framework an automatic way to associate page events and methods is______________?
15102
The GridView control in ASP.NET has which of the following features ?
15103
While creating a Web site with the help of Visual Studio 2005 on a remote computer that does not have Front Page Server Extensions installed, which Web site type will you create in Visual Studio 2005 ?
15104
Which property of the session object is used to set the local identifier ?
15105
Which of the following is TRUE about Windows Authentication in ASP.NET ?
15106
Which of the following allow writing formatted output ?
15107
In your ASP.NET web application you want to display a list of clients on a Web page. The client list displays 10 clients at a time, and you require the ability to edit the clients. Which Web control- ?
15108
In your ASP.NET 2.0 web application you want to display an image that is selected from a collection of images. What approach will you use to implementing this ?
15109
How to find out what version of ASP.NET I am using on my machine ?
15110
Which language is used to create an ASP.NET code file ?
15111
The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?
15112
Output : Response.Buffer = True Response.ExpiresAbsolute = Now().Subtract(New TimeSpan(1, 0, 0, 0)) Response.Expires = 0 Response.CacheControl = “no-cache” ?
15113
What is the significance of Response.AddHeaders( ) ?
15114
Caching type supported by ASP.Net ?
15115
How do you get information from a form that is submitted using the “post” method ?
15116
____________ tests make sure that new code does not break existing code?
15117
Which filter will be execute at last using ASP.Net MVC?
15118
Which filter will be execute at first using ASP.Net MVC?
15119
WebApiConfig.cs file is under in which App folder ?
15120
RouteConfig.cs file is under in which App folder ?
15121
FilterConfig.cs file is under in which App folder ?
15122
BundleConfig.cs file is under in which App folder ?
15123
AuthConfig.cs file is under in which App folder ?
15124
How to check all errors of Model using ASP.Net MVC?
15125
How to set Default Value to Hidden Input Box using ASP.Net MVC?
15126
If Razor View Engine need to add JQuery function and contain @ special character then how we can write it in Razor View?
15127
Which name space using can send email in ASP.Net MVC?
15128
How can we write Chart output to MVC View?
15129
How can we add Chart Type to MVC Charts?
15130
How can we add Series to MVC Charts?
15131
How can we give Title to MVC Charts?
15132
How can we set theme to MVC Charts?
15133
How can we provide Height and Width to MVC Charts ?
15134
Which Name space is used to create chart using ASP.Net MVC?
15135
For which ModelState.IsValid Validate ?
15136
How to check Request coming from which controller using MVC ASP.Net?
15137
What is the benefits of Html.Partial using ASP.Net MVC Razor Engine?
15138
What is the benefits of Html.RenderPartial using ASP.Net MVC Razor Engine?
15139
What is the difference between HtmlTextbox and HtmlTextboxFor using ASP.Net MVC Razor Engine?
15140
What is RouteConfig.cs in ASP.Net MVC?
15141
What is FilterConfig.cs in ASP.Net MVC ?
15142
What is BundleConfig.cs in ASP.Net MVC ?
15143
What is AuthConfig.cs in ASP.Net MVC ?
15144
Can ASP.Net Web API has ability to transport non HTTP protocols like TCP, UDP, Named Pipes etc ?
15145
Can ASP.Net Web API ability to both self hosting (outside of IIS) and IIS ?
15146
Can ASP.Net Web API, it works HTTP standard verbs like POST, GET, PUT, DELETE (CRUD Operations) ?
15147
Does Web API (ASP.Net) supports to both version mobile apps and others ?
15148
Does Web API (ASP.Net) supports to non SOAP based like XML or JSON ?
15149
Can ASP.Net Web API specialize to XML or JSON ?
15150
Does TempData used to pass data from one page to another page in MVC?
15151
Are both TempData/ViewData property of Controller base class in MVC?
15152
Is ViewData faster than ViewBag in MVC?
15153
Is ViewBag slower than ViewData in MVC?
15154
Are both TempData/ViewData require typecasting in MVC?
15155
Which Namespaces are required to Data Annotation using MVC ?
15156
Which Namespace is used to “Display” in Data Annotation using MVC ?
15157
Which is the way to render Partial View using ASP.Net MVC Razor Engine?
15158
What is the name of default Viewstart Page in ASP.Net MVC ?
15159
Does Viewstart override all Views layout/template under “Views” folder in MVC ?
15160
Viewstart comes under which folder name ?
15161
How does work Viewstart in MVC (ASP.Net)?
15162
Can vNext runs on both Mac and Linux today (Mono Version)?
15163
Does vNext is now Open Sourced via the .NET Foundation and open to public contributions.
15164
Does MVC 6 allow only save change, hitting the save but then refreshing the browser to reflect changes?
15165
Does MVC 6 introduced new JSON project based structure?
15166
Are MVC and Web API merged into one in MVC 6?
15167
How to Print value from Controller to View in MVC ?
15168
Does ASPX View Engine supports for TDD ?
15169
Does Razor Engine supports for TDD ?
15170
Which is more faster between ASPX View Engine and Razor View Engine.
15171
The ASPX View Engine uses to render server side content.
15172
The Razor View Engine uses to render server side content.
15173
Which Namespace is used for ASPX View Engine ?
15174
Which Namespace is used for Razor View Engine ?
15175
How can you comment using Razor Syntax?
15176
What is the extension of MVC view when using vb.net?
15177
What is the extension of MVC view when using C#?
15178
What is default authentication in Internet Information Services (IIS)?
15179
What is DRY principle in ASP.Net ?
15180
What Request Processing technique follows ASP.Net ?
15181
Can we use view state in MVC ?
15182
In which format data can be return from XML into table ?
15183
RedirectToAction() works like in ASP.Net MVC C# as
15184
return View() works like in ASP.Net MVC C# as
15185
What is ViewResult() ?
15186
What is ActionResult() ?
15187
RedirectToAction() Method for which Status code represents?
15188
RedirectToActionPermanent() Method for which Status code represents?
15189
Which is the best approach to assign a session in MVC?
15190
Simulation run to be carried out before live run
15191
PPOC_OLD Is the transaction code for changing the Organizational structure
15192
Cost ditribution infotype is mandatory for FI Posting
15193
Which transaction to be used for changing the details of info type
15194
Which infotype used for storing the Shift details
15195
Infotype 0021 is used for storing
15196
MOnthly payments (Salary)to be stored in the Info type
15197
PA40 is used for Maintaining the Master data
15198
Which infotype used for storing the Nomination details
15199
Which infotype used for storing the Address
15200
Which Info type used for storing Personnel ids like PAN,Passport
15201
You assign Pay scale type & pay scale to individual
15202
The wage type that starts with ‘/’is known as
15203
Wage types can not include deductions :
15204
In SAP, what is the country grouping (Molga) for Great Britain :
15205
Which infotype reflects the Basic pay :
15206
T code to access implementation guide (IMG)
15207
T code to perform personnel actions:
15208
T code to check reports :
15209
T code to maintain employee master data
15210
T code to check the configuration tables:
15211
T code to check the database tables :
15212
In SAP, organizational assignment IT0001 consist of :
15213
Feature to default Pay scale data is
15214
Payroll area is defaulted in :
15215
In SAP one should group in the same pay roll area all the employees for whom payroll is run on ….
15216
You can create the project IMG by selecting..
15217
What are the different stages of payroll
15218
The return code matrix in LGMST feature has the following structure
15219
The indirect valuation module SUMME applies
15220
You can perform Indirect Valuation of the following infotypes:
15221
Following are wage type characteristic
15222
The copies of Model wage type must start with a :
15223
Which function of the wage type controls whether it is a payment or a deduction?
15224
In SAP system , wage type categories are:
15225
In SAP Pay Scale Area represents:
15226
Rule 3 – Employee subgroup grouping the Personnel calculation Rule refers to:
15227
The control record
15228
Can all wage types be entered in all infotypes?
15229
What is a payroll area? Which criteria are important for defining a payroll area?
15230
To define default wage type for basic pay infotype(0008) , the feature is:
15231
In SAP the system performs Indirect valuation of wage types in infotype:
15232
Several infotypes can use one wage type without defining any permissibility:
15233
The wage type which are defined by the individual company to depict their specific payroll requirement is:
15234
The employee subgroup grouping for collective agreement provision allows you to assign different employees to different :
15235
Employee grouping for PCR is done to :
15236
Features are used to …
15237
The Feature _________determines default values for payroll area
15238
T code to maintain a FEATURE is
15239
The control record :
15240
You must create control record for:
15241
Can echo in php accept more than 1 parameter?
15242
Can I run several versions of PHP at the same time?
15243
Can I generate DLL files from PHP scripts like i can in Perl ?
15244
Is strstr and strchr aliases?
15245
What is the purpose of $_SESSION[]?
15246
What is PHP heredoc used for?
15247
Which function is used to Strip whitespace (or other characters) from the beginning and end of a string?
15248
In which variable is the users IP address stored?
15249
What is the default execution time set in set_time_limit()?
15250
What is Joomla in PHP?
15251
What is the default size of a file set in upload_max_filesize ?
15252
What is the difference between echo and print?
15253
How do I create PHP arrays in a HTML <form>?
15254
What is array_keys() used for?
15255
____________ function in PHP Returns a list of response headers sent (or ready to send)
15256
What is the difference between GET and POST method?
15257
Can we use include (”test.php”) two times in a PHP page “test1.PHP”?
15258
Which of the following differences are valid between PHP 4 and PHP 5?
15259
What is the strpos() function used for?
15260
What gets printed? <?php $RESULT = 11 + 011 + 0x11; echo "$RESULT"; ?>
15261
Which of the following is NOT a magic predefined constant?
15262
Which statement about the code below is correct?class A {} class B {} class C extends A, B {}
15263
What gets printed?class MyException extends Exception {} try { throw new MyException('Oops!'); } catch (Exception $e) { echo "Caught Exception "; } catch (MyException $e) { echo "Caught MyException "; }
15264
How do we access the value of 'd' later?$a = array( 'a', 3 => 'b', 1 => 'c', 'd'
15265
What will be the value of $var?
15266
Which of the following is the way to create comments in PHP?
15267
What gets printed?$var = 'false';if ($var) { echo 'true';} else { echo 'false';}
15268
Which of the following is used to declare a constant
15269
Which of the following method acts as a constructor function in a PHP class?
15270
Which of the following method of Exception class returns the code of exception when error occured?
15271
Which of the following is an associative array containing session variables available to the current script?
15272
Which of the following is used to set cookies?
15273
Which of the following function opens a file?
15274
Which of the following can be used to get information sent via get/post method in PHP?
15275
Which of the following function is used to get length of a string?
15276
Which of the following is correct about determine the "truth" of any value not already of the Boolean type?
15277
Which of the following is correct about determine the "truth" of any value not already of the Boolean type?
15278
Which of the following is true about php variables?
15279
The if statement is used to execute some code only if a specified condition is true
15280
In PHP, the only way to output text is with echo.
15281
The die() and exit() functions do the exact same thing.
15282
PHP can be run on Microsoft Windows IIS(Internet Information Server):
15283
How do you create a cookie in PHP?
15284
Which one of these variables has an illegal name?
15285
Which superglobal variable holds information about headers, paths, and script locations?
15286
What is the correct way to open the file "time.txt" as readable?
15287
What is the correct way to include the file "time.inc" ?
15288
Include files must have the file extension ".inc"
15289
In PHP you can use both single quotes ( ' ' ) and double quotes ( " " ) for strings:
15290
How do you get information from a form that is submitted using the "get" method?
15291
The PHP syntax is most similar to:
15292
What is the correct way to end a PHP statement?
15293
All variables in PHP start with which symbol?
15294
How do you write "Hello World" in PHP
15295
PHP server scripts are surrounded by delimiters, which?
15296
How do you get information from a form that is submitted using the “get” method?
15297
What is the correct way to open the file “student.txt” as readable?
15298
What is the correct way to create a function in PHP?
15299
Which of the following is used to declare a constant
15300
PHP allows you to send emails directly from a script
15301
When using the POST method, variables are displayed in the URL:
15302
What is a correct way to add a comment in PHP?
15303
Which version of PHP introduced Try/catch Exception ?
15304
In PHP you can use both single quotes ( ‘ ‘ ) and double quotes ( ” ” ) for strings:
15305
What does PHP stand for?
15306
All variables in PHP start with which symbol?
15307
PHP files have a default file extension of
15308
Which superglobal variable holds information about headers, paths, and script locations?
15309
Who is the father of PHP ?
15310
What is the correct way to add 1 to the $count variable?
15311
How do you create a cookie in PHP?
15312
How do you create an array in PHP?
15313
Include files must have the file extension “.inc”
15314
Which operator is used to check if two values are equal and of same data type?
15315
How do you write “Hello World” in PHP
15316
For Web tests, you can create a ....... scenario, in which you define the goals you want your test to achieve. LoadRunner automatically builds a scenario for you, based on these goals.
15317
You can also create a scenario using the ......., in which you define the total number of Vusers to be used in the scenario, and the load generators and percentage of the total number of Vusers to be assigned to each Vuser script.
15318
A scenario includes a list of machines on which Vusers run, a list of scripts that the Vusers run, and a specified number of Vusers or Vuser groups that run during the scenario.
15319
Successful load testing requires that you develop a thorough .......
15320
You develop Vuser scripts ...........
15321
Vusers have a very easy to understand user interface
15322
Because Vusers are not reliant on client software, you can use Vusers to test server performance even before the client software has been developed.
15323
GUI Vusers generate load on a server by submitting input directly to the server.
15324
LoadRunner can integrate functional testing scripts in the form of .......... Vuser scripts into a load testing scenario.
15325
Application Deployment Solution, E-business, Java are types of
15326
The LoadRunner Agent enables the .......... and the load generator to communicate with each other.
15327
On each Windows load generator, you install the ........
15328
When you execute a scenario, the Controller distributes each Vuser in the scenario to a .......
15329
You insert ...... points into Vuser scripts to emulate heavy user load on the server
15330
You can join two graphs together to see the effect of the one graph’s data upon the other graph’s data. This is called ....... two graphs.
15331
While Analysing your scenario, You can access available graphs from the ...........
15332
The Scenario Behavior Over Time section shows how each transaction performed during different time intervals. The green squares show time intervals where the transaction performed within the SLA threshold, red squares where the transaction failed, and ..... squares where no relevant SLA was defined.
15333
The 5 Worst Transactions table shows you up to the .... worst performing transactions where SLAs were defined.
15334
While Analysing your scenario, in the Statistics Summary section, you can see that a maximum of .... Vusers ran in this test.
15335
The preferred place to define an SLA is before a scenario run in the Controller.
15336
SLAs can be defined before running a scenario in the Analysis, or after running a scenario in Controller itself.
15337
Service Level Agreements are specific goals that you define for your load test scenario
15338
Analysis contains three primary windows
15339
The aim of the analysis session is to find the failures in your system’s performance and then pinpoint the source of these failures.
15340
It is very important to watch transaction response time to see the response times your customers will have when the server is under load.
15341
The Hits per Second graph shows the number of hits (HTTP requests) made to the Web server by Vusers during each second of the scenario run.
15342
Users do not log on and off the system at precisely the same time. To emulate real users, LoadRunner provides the capability in the ....... tab (In the Edit Scenario Goal dialog box,) for users to gradually log on and off the system.
15343
When you design a load test scenario, you can define ....... for the performance metrics.
15344
LoadRunner provides you with ...... different types of goals in a goaloriented scenario.
15345
To see how well the application performed under load, you need to look at the transaction response time and determine whether the transaction was within an acceptable limit for the customer.
15346
If an application starts to fail under heavy load, you are likely to encounter errors and failed transactions. The Controller displays error messages in the ..... window.
15347
The Vuser log will only contain information if you enabled the logging feature in the Run-Time Settings Log tab.
15348
To check the progress of an individual Vuser during a running test, you can view a ...... containing a text summary of the Vuser’s actions.
15349
When emulating users, you should be able to view their actions in real time and make sure they are performing the right steps. The Controller lets you view the actions in real time using the ...... viewer.
15350
The Throughout graph shows the amount of data (measured in bytes) that the Vusers receive from the server at any given second.
15351
You use the Controller’s online graphs to view performance data collected by the monitors.
15352
The ..... tab in the Controller window is the control center from which the test is managed and monitored.
15353
Run Time setting Browser Emulation is used by:
15354
Two types of content checks:
15355
Initialization means preparing the Vusers and the load generators for a load test run by running the ....... action in the script.
15356
A ..... Scenario gives you control over the number of running Vusers and the times at which they run, and lets you test how many Vusers your application can run simultaneously.
15357
A ......... verifies that expected information appears on a Web page while the script is running.
15358
The way to mark a user step as a transaction is to place a begin transaction marker before the first step of the transaction and an end transaction marker after the last step.
15359
........ saves the dynamic (changing) values, in our case the session ID, to a parameter.
15360
VuGen’s run-time playback feature displays the Vuser activities in real time as you playback the recorded script.
15361
In LoadRunner Run-Time settings Run Logic means:
15362
Script view is a text-based view that lists the actions of the Vuser as .....
15363
The recording summary includes the protocol information and a list of the actions created during the session.
15364
The ...... lists each step or task in the script creation process.
15365
Advanced users can record several protocols during a single recording session in a ...... script.
15366
The Error Statistics graph provides details about the ......
15367
Transaction Response Time - whole scenario graph lets you monitor
15368
By default, the Controller displays the
15369
The three tabs in the Launcher window of a Loadrunner 9.10 are
15370
Identify LoadRunner components—
15371
LoadRunner uses ASCI C
15372
Think Tank represents the actual time you waited between steps, and can be used to emulate fast and slow user behavior under load.
15373
You can view the LoadRunner script in .......
15374
The LoadRunner ........ works on a record-andplayback principle.
15375
A ........ represents end-user business processes that you are interested in measuring.
15376
In the scenario, LoadRunner replaces human users with virtual users or Vusers.
15377
A ....... is a file that defines the events that occur during each testing session, based on performance requirements.
15378
The ....... provides a single point of access for all of the LoadRunner components.
15379
The LoadRunner component......... create the load by running virtual users.
15380
Which scenario execution run is used to verity the load limit before more resources are required?
15381
Which scenario allows LoadRunner to automatically manage the Vusers?
15382
During the run of a scenario, which LoadRunner component stores the performance monitoring data?
15383
You are running a test and notice that during the ramp up, the response times are beginning to drastically increase. How can you instruct LoadRunner to stop ramping up Vusers and hold the current number?
15384
Which Analysis graph identifies web pages that take the most time; isolates where time is spent; and helps in identifying DNS resolution, SSL, and connection issues?
15385
Which option in the Analysis tool allows you to focus on a specific measurement within your graph?
15386
What does the image shown in the exhibit represent?
15387
Which graph can analyze each web page component's relative server and network time?
15388
Which types of reports can be automatically generated in the Analysis tool?
15389
Which Analysis graph details transaction response times throughout the test?
15390
Which tool is used to manage and maintain a scenario?
15391
What is NOT an advantages of using automated load tests over manual load tests?
15392
Which performance test objective is met when determining the cause of performance degradation?
15393
What are the main types of service level agreements available in the Controller and Analysis?
15394
What is an external data source?
15395
Which file defines the Vusers to execute, the number of Vusers to run, the goals of the test, the computer that hosts the Vusers, and the conditions under which to run the load test?
15396
You are meeting a new LoadRunner customer. The application under test is a call center application used by the customer representatives. The representatives are located in Phoenix, AZ and Columbus, OH. A large customer base resides in Flagstaff, AZ an
15397
What is the first indication of a performance problem?
15398
What is an example of a stress test?
15399
Which scenario type helps you plan for future growth and provides a safety factor with the application?
15400
During the analysis of a scenario, you realize that the hits per second become flat as Vusers continue to increase. What is likely to cause?
15401
Which term defines the end-to-end measurement of time when one or more steps are completed?
15402
Which statement is an example of a conceptual goal?
15403
You are running a 3-tier web application. With which component must the load generator(s) communicate?
15404
Which LoadRunner component runs the vuser that generates the load?
15405
Which file type has an extension .lrr?
15406
Which run-time setting node is available to all protocols?
15407
Where do you define an Auto Correlation rule?
15408
One reason for parameterizing data in a script is to vary one value for an object when another object on the application changes. A common example is username and password. Varying the username requires you to change the password. What is this type of
15409
Which arithmetic operator is used to increment the value of a variable by one?
15410
Which web protocol recording level generates the web_submit_form function?
15411
What is used as an end-to-end measurement of time elapsed when one or more steps in a business process have been completed?
15412
You want to send a message to the log file, Replay Log, and Controller Output window. Which function should you use?
15413
You want to have each step in your script measured as a transaction in the Controller and not shown in the Replay Log in VuGen. How can you accomplish this?
15414
Which function marks the beginning of a measurement of elapsed time?
15415
During which stage is it recommended that the visual cues for verification be established?
15416
Which section in a VuGen script is executed only one time, during Vuser initialization?
15417
You want to have your script always check for the following text on every page: "Sorry. Portlet is currently unavailable. Please try again later". What is the most efficient way to accomplish this?
15418
Which function allows you to register a search for a text string for the next Action function?
15419
You want to emulate a call center for an airline. All representatives login in the morning, perform their business processes, and log out at night. In one day, a representative will Create 40 flight reservations, Modify 10 flight reservations, and Sea
15420
Where should you add a web_reg_save_param function to a script?
15421
What is the programming term for a value that cannot be changed?
15422
What is the purpose of the atoi function?
15423
When do you need to add correlation to your script?
15424
When performing a manual correlation, where do you search for the dynamic value?
15425
For debugging purposes, you would like to show a browser during replay. Where do you enable this option?
15426
What must you do before attempting to automatically correlate after recording?
15427
You have created several new Auto Correlation rules. A new tester on your team is preparing to record a group of scripts on the same application on his work
15428
Which type of script is a higher level that records in Browser or Context Sensitive mode when using the web protocol in VuGen?
15429
What is the output of the following code snippet?
15430
Which function allows you to capture dynamic values returned from the server?
15431
Which function marks the ending of a measurement of elapsed time?
15432
What is the purpose of the strcat function?
15433
What is the programming term for different values at different times?
15434
Which operator is used for AND?
15435
You want to create a Microsoft Word document for your web (HTTP/HTML) script that provides a list of transactions, rendezvous, parameters and step descriptions. How can this be accomplished?
15436
What is the programming term for a series of statements grouped together to perform a specific task
15437
You are a LoadRunner expert consultant and have been assigned to a client that needs to performance test an application that has not yet been released. How can you obtain information about the application anticipated load?
15438
Which file type has an extension .lrr?
15439
When analyzing a technical aspect of a system under test, which group is a helpful source of information?
15440
What is the first stage of load testing process?
15441
What is the LoadRunner term that describes the time a user pauses between steps?
15442
The name of the area upon which the graphic design is completed is
15443
The name of the areas that include the color swatches, layers and toolbox
15444
You must select which tool to give your text perspective against your background.
15445
which tool allows you to reposition an object in your layer
15446
To delete a layer from your image, turn off the "eye" icon showing the layer.
15447
When deleting detailed areas of your image by hand, the tool is the best option.
15448
To select a new color in the foreground or background squares, use the tool.
15449
If you have a solid color to select and delete, the tool is the quickest and most effective.
15450
To delete items from history, drag them into the trash can.
15451
Clouds, motion blur, ocean ripple and plastic wrap are all examples of that can be used in your graphic design.
15452
By changing the % of , you can blend multiple layers with one another.
15453
The tool allows you to cut text out of a scenic background for use in your design
15454
The tool allows you the magnify an area of the design for detail work.
15455
Once you build the layers in your graphic design, you cannot rearrange them.
15456
The ________ tool is best selected when you need to select an abnormally shaped image in a layer.
15457
To resize a graphic in a layer, select the _______ tool, then check mark _____________ to see selection handles.
15458
Pixels represent tiny ________ of color, which are typically unseen by the naked eye.
15459
To fill in a layer as a background, which of the following tools would be useful? Choose all that apply. You must select all correct possibilities.
15460
To turn-off the use of a tool, or deselect it, you must push the keys.
15461
To undo the last change made to your graphic design, the keys may be used.
15462
To delete a series of steps that have been used in a graphic design, you would need to use the _________ pallette.
15463
The _______ tool allows you to select a rectangular or circular area of an layer to change or delete.
15464
The tool allows you to copy one area of the layer to another area of the layer
15465
When using the SAVE AS: feature, the ________ file type saves my graphic design with all layers visible for changes upon opening the next time. Choose all that apply. You must select all correct possibilities.
15466
Drop shadow, inner glow and bevel are examples of _________ you need to use with text.
15467
Luminosity, darken, exclusion and color dodge are examples of __________ you may use to allow graphics to interact with background.
15468
Twirl, ripple and spherize are examples of distortion __________ you may use to change the look of your graphic.
15469
To cut down the size of the entire graphic design, including all layers, you should select the ______ tool.
15470
When selecting an area of pixels to delete, which of the following tools could be used? Choose all that apply. You must select all correct possibilities.
15471
The typical size for a graphic design is measured in __________.
15472
In a Bitmap mode image, the shades are adjusted by changing the quantity of __________ and __________ dots
15473
We can extract a part of an image without the help of any kind of Marquee or Lasso tool
15474
With the help of Text warp option, we can change the style of a text
15475
We can change the color balance of an image with the help of another layer without distorting the actual image through
15476
The full form of GIF is
15477
The keyboard shortcut of Brush option is
15478
We can create a selection of predefined size, with the help of Marquee tool
15479
If any editor save a selection, it takes the name
15480
We can swap between the Lasso tools by
15481
The keyboard shortcut of Notes tool is
15482
In Photoshop, we can leave information for another by recording it
15483
We can get "Export transparent Image" from
15484
For printing purpose, the resolution should be
15485
We can zoom in/out from navigator option
15486
We cal delete any channel from channel option
15487
Grayscale image supports only 8 bit color
15488
We can colorize a Grayscale image
15489
We can add Layer effect in a text
15490
________________ means purity of color
15491
__________________ option give us the information of color etc. of an image.
15492
We can see the exact print size of an image from ___________ option from __________ menu.
15493
The size of the canvas can be increased in any direction by selecting
15494
We can record any action in the canvas
15495
We can change the Photoshop canvas to Expert mode by
15496
We can copy the Layer effects to another layer
15497
We can make the edges smooth of an curved image by selecting
15498
The selections are saved as
15499
We can change Color balance, Tone balance and Purity of color from
15500
Image > Mode > 16 bit is activated, when
15501
-100 range of Contrast
15502
The keyboard shortcut for open Color balance is Ctrl+B
15503
The keyboard shortcut to make a new layer is
15504
The keyboard shortcut of duplicate layer is
15505
We can get Resize image option from
15506
By using Photoshop, we can make a static Web site
15507
The smallest part of a displayed bitmapped image is
15508
For printing purpose, we use CMYK color model
15509
Flatten image option merge all the images and converted them as Background Layer
15510
We can resize the canvas as per the size of an image by using
15511
We can create a printable vector object in Photoshop, though it is a Bitmap software by
15512
We can see the individual channels in their respective color
15513
We can change width or height or resolution of an image respective of other two at a time by
15514
The Keyboard shortcut to convert a shape to a selection is
15515
We can create layer is indexed color image
15516
The range of feather is
15517
The Keyboard shortcut for layer option is
15518
The Keyboard shortcut default foreground and background color is
15519
The Keyboard shortcut of swap foreground and background color is
15520
In Photoshop Red=0 + Green=0 + Blue=0 --- the output is pure Black.
15521
The default size of a web banner is___________*__________
15522
Raster Graphic consists with Pixels.
15523
To get Auto contrast option in Photoshop
15524
To get Desaturate option in Photoshop
15525
To get Feather option in Photoshop.
15526
In a grayscale image we get maximum _______ shades of color
15527
We use Dodge Tool to ___________________ the area of image.
15528
The full form of TIFF is _______________.
15529
In a grayscale image we get a maximum of _____ shades of color?
15530
Which command changes the Overall mixture of colors in an image for generalized color correction?
15531
Which one lets you isolate and protect areas of an image as you apply color changes, filters or other effects to the rest of the image?
15532
Which one is the range of colors that a color system can display or print?
15533
How many selection tools are there in Photoshop?
15534
How many maximum steps we can undo in Photoshop?
15535
Which command selects a specified color or color subset within an existing selection or an entire image?
15536
In Photoshop, maximum how many alpha channels can create in an image?
15537
By default how many channel Indexed color images are there?
15538
Blurs edges by building a transition boundary between the selection and its surrounding pixels is known as
15539
JPEG stands for
15540
GIF stands for
15541
To get Stroke option in Photoshop, we have to select
15542
If R=255, G=0, B=0, the colour will be black.
15543
Luminance means brightness of color.
15544
Photoshop is an Image editing software.
15545
The full form of RGB is Red Green and Black
15546
The default color mode of Photoshop is CMYK.
15547
We cannot save any Selection in Photoshop.
15548
How many types of Gradient are there in Photoshop?
15549
To get Auto contrast option in Photoshop, we have to select
15550
How many type of Marquee Tool are there in Photoshop?
15551
b) We use Lasso Tool for selection, is it true?
15552
a) How many types of Gradient are there in Photoshop?
15553
We cannot import jpeg image in Premiere
15554
The short cut key of Feather is Alt+Ctrl+F.
15555
Liquify is a Filter.
15556
Raster Graphic consists of Pixels.
15557
GIF does not support background transparency.
15558
We can find Variation option under Filter menu in Photoshop.
15559
Is Overlay a Layer Blending Mode in Photoshop?
15560
How many Color Modes are there in Photoshop?
15561
To get Auto contrast option in Photoshop, select
15562
To get Desaturate option in Photoshop, we have to go to
15563
Which of the following is(are) the task(s) of the Systems Conversion phase?
15564
Which installation strategy is a variation on the abrupt and parallel conversion?
15565
Which one of the tests is performed on a subset of a program?
15566
The person generally responsible for the program design strategy, standards, and construction is called a(n):
15567
Which of the following is NOT a guideline for successfully conducting a Joint Requirements Planning (JRP) session?
15568
Which of the following is an advantage of discovery prototyping?
15569
Which of the following types of questions should not be asked on an interview?
15570
All of the following are examples of requirements problems, except
15571
Randomly sampling ten invoices based on a given sample size would be an example of
15572
A fact-finding technique that involves a large number of observations taken at random intervals is called:
15573
Which one is NOT a common fact-finding technique?
15574
The process of requirements discovery consists of the following activities, except
15575
A property or quality the system must have is called a
15576
Cause-and-effect analysis is performed in the following phase of systems analysis
15577
The task of identifying and expressing system requirements is performed in which phase of systems analysis?
15578
The task of establishing system improvement objectives is performed in which phase of systems analysis?
15579
The tasks of defining acceptance tests, structuring functional requirements, and validating functional requirements are performed in which one of the phases?
15580
Which of the following phases identifies and expresses requirements, prioritizes requirements, updates project plan, and communications the requirements statement?
15581
Which of the following is NOT a feasibility analysis criterion?
15582
Prototypes are used in
15583
Which of the following analysis techniques derive system models from existing system or discovery prototypes?
15584
All of the following are phases of systems analysis, except
15585
A model-driven analysis approach that focuses on the structure of stored data in a system rather than on processes is
15586
Which of the following is a principle of analytic graphics?
15587
What will be the output of the following code? > g <- function(x) { + a <- 3 + x+a+y + ## 'y' is a free variable + } > g(2)
15588
What would be the value of the following expression? log(-1)
15589
What would be the output of the following code? > x <- 1:4 > x > 2
15590
What would be the output of the following code? > x <- 1:4 > y <- 6:9 > z <- x + y > z
15591
Which of the following is an example of vectorized operation as far as subtraction is concerned? > x <- 1:4 > y <- 6:9
15592
Which of the following is used for Statistical analysis in R language?
15593
Which of the following will start the R program?
15594
System.time function returns an object of class _______ which contains two useful bits of information.
15595
Which of the following phases is unique to the commercial application package implementation strategy as opposed to the rapid application development strategy
15596
______ splits a data frame and results in an array (hence the da). Hopefully, you’re getting the idea here.
15597
accelerates the requirements analysis and design phases 49 Request for quotation (RFQ) is
15598
________ provides needed string operators in R
15599
_________ involves predicting a response with meaningful magnitude, such as quantity sold, stock price, or return on investment.
15600
Attributes of an object (if any) can be accessed using the ______ function.
15601
R objects can have attributes, which are like ________ for the object
15602
Which of the following method make a vector of repeated values?
15603
Rapid Application Development (RAD) strategy includes all of the following, except
15604
An ongoing activity of systems support is
15605
Data frames can be converted to a matrix by calling data._______
15606
A cross life-cycle activity of system development is
15607
__________ is proprietary tool for predictive analytics.
15608
_______ loop over a list and evaluate a function on each element
15609
Which one is NOT a phase of the systems development life cycle?
15610
Which one is NOT a category of problems represented by the PIECES framework?
15611
The deliverable of the problem analysis phase is
15612
____function is same as lapply() in R
15613
Project Management ensures that
15614
_______applies a function over the margins of an array
15615
The first CMM level at which measurable goals for quality and productivity are established is
15616
____is used to apply a function over subsets of a vector
15617
lapply function takes___ arguments in R language
15618
The _____ function takes a vector or other objects and splits it into groups determined by a factor or list of factors.
15619
Open database connectivity (OBDC) tools are an example of
15620
A matrix is ___dimensionsinal rectangular data set?
15621
Examples of keyless interfaces include:
15622
______ suspends the execution of a function wherever it is called and puts the function in debug mode
15623
A specification of how the user moves from window to window, interacting with the application programs to perform useful work is called:
15624
debug() flags a function for ______ mode in R mode.
15625
Language-based, machine-readable representations of what a software process is supposed to do, or how a software process is supposed to accomplish its task is known as:
15626
R comes with a ________ to help you optimize your code and improve its performance.
15627
The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called:
15628
Which of the following is a base package for R language?
15629
Which is not a typical business function?
15630
Who are the people that actually use the system to perform or support the work to be completed?
15631
Which of the following is not a class of information system applications?
15632
R was created at what University?
15633
Information systems that support the business functions that reach out to suppliers are known as:
15634
R is a dialect of which of the below?
15635
1Contemporary Information Systems are interfacing with customers and suppliers using :
15636
Which of the following is part of a static view of information?
15637
Account and password responsibilities 29 Use-case analysis focuses upon:
15638
R objects can be manipulated by which code?
15639
What should not be part of an acceptable use policy?
15640
What is used for statistical analysis in R language?
15641
Which of the following is not a type of navigation system for a web site?
15642
Which of the following relates to enterprise interoperability
15643
Which of the following statements about XML schemas is incorrect?
15644
R functionality is divided into a number of what?
15645
Which of the following statements describes a taxonomy?
15646
UML depicts information systems as a collection of:
15647
The primary R system is available from the:
15648
A web blueprint depicts:
15649
Which of the following should be represented on an information flow diagram?
15650
Records management:
15651
The majority of publically available Internet information sources are:
15652
Monitoring the legal constraints which a company operates under requires review of:
15653
To improve the performance of a business process, which of the following is most relevant?
15654
The most important attribute of information quality that a manager requires is:
15655
The general transformation cycle for information is:
15656
When a bank offers web self-service for customers to answer their questions, the primary outcome is:
15657
When a bank uses business performance management software to monitor its performance in differences regions this:
15658
When a bank uses information to launch a personalised credit card product this:
15659
The application of information to scan an organisation’s environment is:
15660
Decision makers who are concerned with tactical (short-term) operational problems and decision making are
15661
An information system that supports the planning and assessment needs of executive management is
15662
Which of the following is a deliverable of the system implementation phase in a formal system development process?
15663
Which of the following is not a technology driver for an information system?
15664
If a university sets up a web-based information system that faculty could access to record student grades and to advise students, that would be an example of a/an
15665
A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process
15666
Which one of the following is not a business driver for an information system?
15667
The person who ensures that systems are developed on time, within budget, and with acceptable quality is a
15668
The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is
15669
Management information systems (MIS)
15670
___details are given by Management to Marketing Service System.
15671
-MIS normally found in a manufacturing organization will not be suitable in the ______
15672
Which of the following models are developed on the principles of business management, accounting and econometric’s?
15673
What among the following are the primary characteristics that information must process?
15674
In MIS system design, the sources of information may be categorized as … and ..
15675
Which of the following is NOT an objective of MIS?
15676
The …. is defined as a set of activities performed across the organization creating as output of value to the customer.
15677
n a typical ……………. network, application processing is shared between clients and one more servers.
15678
Which of the following is included in the Office automation systems? i) Word processing ii) Electronic mail iii) Voice mail iv) Electronic calendaring v) Audio conferencing
15679
Which of the following steps is/are the implementation plans involved in MIS? i) Preparing organizational plans ii) Planning of work flow iii) Training of personnel iv) Development of software v) Acquiring computer hardware
15680
A system is called …… when the inputs, process and the outputs are known with certainty.
15681
An …..is a set of processes and procedures that transform data into information and knowledge.
15682
Deciding where to locate new production facilities is an example of a manufacturing and production information system operating at the
15683
………. system provide information in easy to use displays to top and middle management.
15684
A private intranet that is extended to authorized users outside the company is called a(n)
15685
Which of the following best characterizes a marketplace created by computer and communications technologies for linking buyers and sellers?
15686
………… information system that express a fundamental concept and activities of information systems.
15687
Which of the following best describes the process of tracking data about customer activities at web sites and storing them in a log?
15688
……. is the period in days between the ordering and delivering of goods.
15689
…...... means that information must reach the recipients within the prescribe timer frame.
15690
The person in-charge of an organization’s web site is called a
15691
………. is allowed a transaction to be traced through all stages of its information processing
15692
…………….. is the process of testing an integrated system to verify that it meets specified requirements.
15693
State whether the following statements about non-functional testing are True or False. i) Non-functional testing is the process of testing to determine system compliance with coding standards. ii) Non-functional testing is testing system characteristics, such as usability, reliability or maintainability.
15694
…………….. is testing without reference to the internal structure of a system.
15695
. ………….. is the repeated testing of an already tested program, after modification, to discover any defects introduced or uncovered as a result of the change.
15696
State whether the following statements about acceptance testing are True or False. i) Acceptance testing of the usability of a component may be done during component testing. ii) Acceptance testing if a new functional enhancement may come before system testing.
15697
The goal in ……………… is to establish confidence in the system, parts of the system or specific non-functional characteristics of the system.
15698
Which of the following is/are the typical test objects used in system testing? i) System, user, and operational manuals. ii) System configuration and configuration data iii) Forms iv) Use Cases
15699
In ………………….., the test environment should correspond to the final target or production environment as much as possible in order to minimize the risk of environment specific failures not being found in testing.
15700
State whether the following statements about different test levels are True or False. i) One approach to component testing is to prepare and automate test cases before coding. ii) At each stage of integration, testers concentrate solely on the integration itself.
15701
…………….. occurs with access to the code being tested and with the support of a development environment such as a unit test framework or debugging tool.
15702
Which of the following is/are the typical test objects used in integration testing? i) Subsystems ii) System, user and operation manuals iii) Infrastructure iv) Interfaces
15703
………….. tests interfaces between components, interactions with different parts of a system such as operating system, file system and hardware and interfaces between system.
15704
………………. is also known as unit, module or program testing.
15705
Which of the following is/are the typical test objects used in component testing? i) components ii) programs iii) workflows iv) database models
15706
When working with software development models, what is it important to do?
15707
State whether the following statements about the characteristics of good testing and applies to any software development life cycle model are True or False. i) Acceptance testing is always the final test level to be applied. ii) All test levels are planned and completed for each developed feature. iii) For every development activity, there is a corresponding testing activity.
15708
Which of the following statements about regression testing are True. i) Regression testing is a good candidate for test automation. ii) Regression testing is performed to uncover defects as a result of changes in the software. iii) Regression testing should not be performed during integration testing.
15709
……………. is the repeated testing of an already tested program after modification, to discover any defects introduced or uncovered as a result of the change.
15710
State whether the following statements comparing component testing and system testing are True. i) Component testing only focuses on functional characteristics, whereas system testing focuses on functional and non-functional characteristics. ii) Component testing is the responsibility of the testers, whereas system testing typically is the responsibility of the users of the system.
15711
Which of the following is an example of maintenance testing?
15712
Which of the following are the major tasks performed in the analysis and design phase? i) Designing and prioritizing high-level test cases. ii) Evaluating testability of the test basis and test objects. iii) Comparing actual results with expected results.
15713
Which of these tasks would you expect to be performed during the test implementation and execution phase? i) Finalizing, implementation and prioritizing test cases. ii) Using the information gathered to improve the maturity iii) Verifying that the test environment has been set up correctly.
15714
Below is a list of problems that can be observed during testing or in production. Which one of these problems is a failure?
15715
Documenting the acceptance of the system is performed during ………….. phase of the fundamental test process.
15716
……… occur at project milestones such as when a software system is released, a test project is completed, or a maintenance release has been completed.
15717
State whether the following statements about the fundamental test process are True or False. i) Evaluating exit criteria and reporting should be done for each test level ii) In test closure activities, we should check which planned deliverables have been delivered.
15718
State whether the following statements about software testing are True or False. i) A certain degree of independence often makes the tester more effective at finding defects and failures. ii) Testers and developers are curious and focused on finding defects.
15719
The test designed by the persons who wrote the software under test has ………….. of independence.
15720
The test designed by a person from a different organization or company such as outsourcing or certification by an external body has …………… of independence.
15721
Which of the following attributes, qualifications or actions would lead to problems (or conflict) within mixed teams of testers and developers, when observed in reviews and tests.
15722
Which of the following is/are the ways to improve communication and relationships between testers and others. i) Remind every of the common goal of the better quality system. ii) Try to understand how the other person feels and why they react as they do. iii) Confirm that that other person has understood what you have said and vice versa.
15723
Which of the following statements are TRUE. i) Software testing may be required to meet legal or contractual requirements. ii) Software testing is mainly needed to improve the quality of the product.
15724
State whether the following statements are True or False. i) Rigorous testing and fixing of found defects could help reduce the risks of problems occurring in an operational environment. ii) Rigorous testing is sometimes used to prove that all failures have been found.
15725
State whether the following statements are True or False. i) Testing removes faults, debugging identifies the causes of failures. ii) Dynamic testing prevents the causes of failures, debugging removes the failures.
15726
Which of the following statements are TRUE. i) Testing identifies the source of defects, debugging analyzes the faults and proposes prevention activities. ii) Dynamic testing shows failures caused by defects, debugging finds, analyzes and removes the causes of failure in the software.
15727
Which of the following test activities exist before and after test execution. i) Planning and Control ii) Checking results iii) Evaluating exit criteria iv) Finalizing or completing closure
15728
Which of the following is/are the main objective of software testing. i) Finding defects ii) Gaining confidence about the level of quality iii) Preventing defects iv) Making absence of defects
15729
The main objective of ……………. is to cause as many failures as possible so that defects in the software are identified and can be fixed.
15730
In ……………., the main objective may be to conform that the system works as expected.
15731
The main objective of …………. is to verify whether there is no new defects have been introduced during development of the changes.
15732
During ……………, the main objective may be to access such as reliability or availability.
15733
State whether the following statements about software testing are True or False. i) Dynamic testing can show failures that are caused by defects. ii) Debugging is the the development activity that finds, analyzes and removes the cause of failure.
15734
State whether the following statements are True or False about the key principles of software testing. i) By using automated testing it is possible to test everything. ii) It is normally impossible to test all input/output combinations for a software system.
15735
State whether the following statements are True about the key principles of software testing. i) Testing can show that defects are present, but cannot prove that there are no defects. ii) With sufficient effort and tool support, exhaustive testing is feasible for all software. iii) Testing is done differently in different contexts.
15736
. Which of the following are the main activities of fundamental test process. i) Test planning and control ii) Test analysis and design iii) Test implementation and execution iv) Test closure activities
15737
…………… is the activity of defining the objectives of testing and the specification of test activities in order to meet the objective and mission.
15738
…………… is the ongoing activity of comparing actual progress against the plan and reporting the status.
15739
………….. is the activity during which general testing objectives are transformed into tangible test conditions and test cases.
15740
Which of the following tasks would you expect to be performed during the test analysis and design phase of the fundamental test process. i) Reviewing the test basis ii) Evaluating testability iii) Defining test objectives iv) Creating test suites from test procedures
15741
Which of the following tasks would you expect to be performed during evaluating exit criteria phase of the fundamental test process.
15742
Analyzing lessons learned for process improvement is performed during …………. phase of the fundamental test process.
15743
…………. is the activity where test procedures or scripts are specified by combining the test cases in a particular order.
15744
………….. is the activity where test execution is assessed against the defined objectives.
15745
……………. collect data from completed test activities to consolidate experience, testware, facts and numbers.
15746
Creating test suites from the test procedures for efficient test execution is performed during …………… phase of the fundamental test process.
15747
In ………………….., once errors in individual tasks and in system behavior have been isolated, testing shifts to time related errors.
15748
In ……………….., test cases are derived to ensure that all statements in the program have been executed at least once during testing and that all logical conditions have been exercised.
15749
……………………. probes the programs ability to handle data at the limits of acceptability.
15750
…………………. divides the input domain into classes of data that are likely to exercise specific software function.
15751
……………….. tests are designed to validate functional requirements without regard to the internal working of program.
15752
The …………………. in the testing of real-time software is to test each task independently.
15753
………………… can be used to define various classes and input and associated interactions.
15754
A ………………… for documentation can be approached using techniques that are analogous to many of the black-box testing methods.
15755
The …………………. of documentation testing is the live test, which uses the documentation in conjunction with the use of the actual program.
15756
The ……………………. of documentation testing is the review and inspection, which examines the document for editorial clarity.
15757
The independent versions from the basis of a black-box testing technique are called
15758
Boundary value analysis is a test design technique that complements …………………..
15759
……………. is the first step in black-box testing in order to understand the objects that are modeled in software and the relationships that connect these objects.
15760
……………… is black-box testing method that divides the input domain of a program into classes of data from which test cases can be derived.
15761
While using black-box testing techniques, we drive a set of test cases that satisfy which of the following criteria. i) test cases that reduce, by a count that is greater than one. ii) test cases that tell us something about the presence or absence of classes of errors. iii) execute all loops at their boundaries and within their operational bounds.
15762
Black-box testing attempts to find errors in which of the following categories. i) incorrect or missing functions ii) interface errors iii) logical errors iv) behavior or performance errors v) incorrect assumptions
15763
……………. enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program.
15764
………………, also called behavioral testing which focuses on the functional requirements of the software.
15765
While using white-box testing methods, the software engineer can derive test cases that i) guarantee that all independent paths with in a module have been exercised at least once. ii) exercise all logical decisions on their True and False sides. iii) execute all loops at their boundaries and within their operational bounds.
15766
………………….., sometimes called glass-box testing, is a test case design method that uses the control structure of the procedural design to derive test cases.
15767
The Sprint is a/an ___________ effort.
15768
Independent testers are _____________ and identify different defects at the same time.
15769
In software engineering, _______________ is a principle of software development, which aims at reducing repetition of information of every kind, especially useful in multi-tier architectures.
15770
To define a ________ in a JavaBean class, public getter and setter methods have to be supplied.
15771
assertThat(0.03, is(closeTo(1.0, 0.03))) is
15772
Unit Tests can detect
15773
Lean Development follows the principle of
15774
The ________________ is a management paradigm that specifies any manageable system as being limited in achieving more of its goals by a very small number of constraints.
15775
In software testing, a _____________ is a collection of software and test data configured to test a program unit by putting it under varying conditions and monitoring its behavior and output.
15776
Beta Testing is also known as _________ testing.
15777
Software tester should be involved very early during development phase of a project. True or false
15778
Beta testing is useful way of compatibility testing. True or false.
15779
System testing only deals with functional requirements. True or false.
15780
Component testing is a
15781
Who is responsible for component testing?
15782
Verifying that whether software components are functioning correctly and identifying the defects in them is objective of which level of testing?
15783
System architecture is determined during which phase?
15784
System testing is a
15785
Which testing is concerned with behavior of whole product as per specified requirements?
15786
What is the order in which test levels are performed?
15787
A Plan to overcome the risk called as
15788
Unit Testing will be done by
15789
Optimization, Defect Prevention, and Quality Control. Its come under the
15790
Beta testing will be done at
15791
Cost of Production = Right The First time cost(RTF. + Cost of Quality.
15792
TQM represents
15793
------------- means under what test environment(Hardware, software set up. the application will run smoothly
15794
AdHoc testing is a part of
15795
Management and Measurement, It will come under
15796
The name of the testing which is done to make sure the existing features are not affected by new changes
15797
How severely the bug is effecting the application is called as
15798
Which Software Development Life cycle model will require to start Testing Activities when starting development activities itself
15799
A metric used to measure the characteristic of the methods, Techniques and tools employed in developing, implementing and maintaining the software system called as
15800
Check Sheet(Checklist. is considered a simple , but powerful statistical tool because it differentiates between two extremes.
15801
Application should be stable. Clear Design and Flow of the application is needed for Automation testing.
15802
Quality plan describes the quality procedures and standards that will be used in a project.
15803
Project Risk affects The Schedule or Resources.
15804
Integration, It will come under
15805
What is correct Software Process Cycle?
15806
Beta testing will be done by
15807
Maintenance Plan predicts the maintenance requirements of the system, maintenance costs and effort required
15808
Validation plan describes the approach ,resources and schedule used for system validation
15809
Types of quality tools are Problem Identification Tools and Problem Analysis Tools.
15810
Path Tested = Number of Path Tested / Total Number of Paths
15811
It provides a set of levels and an assessment model, and presents a set of recommended practices that allow organizations to improve their testing processes.
15812
Defects generally fall into the following categories?
15813
This type of test include, how well the user will be able to understand and interact with the system?
15814
This Testing Technique examines the basic program structure and it derives the test data from the program logic; Ensuring that all statements and conditions executed at least once. It is called as
15815
Standards and procedures for managing changes in an evolving software product is called?
15816
Requirements Specification, Planning, Test case Design, Execution, Bug Reporting & Maintenance This Life Cycle comes Under
15817
SPICE Means
15818
Retesting modules connected to the program or component after a change has been made?
15819
An Important metric is the number of defects found in internal testing compared to the defects found in customer tests, Status of test activities against the plan, Test coverage achieved so far, comes under
15820
Alpha testing will be done at,
15821
Software Testing is a process of evaluating a system by manual or automatic means and verify that it satisfies specified requirements or identity differences between expected and actual results.
15822
Informing to the developer which bug to be fix first is called as
15823
Earlier a defect is found the cheaper it is to fix it. Is the above statement correct?
15824
Automation Testing should be done before starting Manual testing. Is the above statement correct?
15825
Stratification is a Technique used to analyze/divide a universe of data into homogeneous groups(stratA..
15826
Business Risk affects The Organization developing or Procuring the software
15827
Executing the same test case on a modified build called as
15828
Which is Black-Box Testing method?
15829
The process that deals with the technical and management issues of software development called as?
15830
A metric used to measure the characteristic of documentation and code called as
15831
Product Risk affects The quality or performance of the software.
15832
Which is non-functional software testing?
15833
What are the Types of Integration Testing?
15834
Boundary value analysis belongs to which testing method?
15835
It measures the quality of a product It is a specific part of the QA procedure, It is a corrective process, It applies for particular product & Deals with the product.
15836
Retesting the entire application after a change has been made called as?
15837
Acceptance testing is known as
15838
Software testing which is done without planning and Documentation is known as
15839
Phase Definition. It will come under
15840
This type of testing method attempts to find incorrect or missing functions, errors in data structures or external database access, interface errors, Performance errors and initialization and Termination errors. It is called as
15841
The testing which is done by going thro' the code is known as,
15842
Retesting of a single program or component after a change has been made?
15843
Requirement and Analysis, Design, Development or Coding, Testing and Maintenance is called as Software Development Life Cycle (SDLC)
15844
Name the events that will be analyzed, Count the named incidents, Rank the count by frequency using a bar chart & Validate reasonableness of the analysis is called as
15845
White box testing is not called as___________
15846
Verification is
15847
Variance from product specifications is called?
15848
It measures the quality of processes used to create a quality product. It is a system of management activities, It is a preventive process, It applies for entire life cycle & Deals with Process.
15849
A useful tool to visualize, clarify, link, identify, and classify possible cause of a problem. This is also called as “fishbone diagram” what is this?
15850
Cost of quality = Prevention Cost + Appraisal cost + Failure cost
15851
What are the Testing Levels?
15852
The review and approved document (i.e. Test plan, System Requirement Specification’s) is called as
15853
A Non-Functional Software testing done to check if the user interface is easy to use and understand
15854
It is a set of levels that defines a testing maturity hierarchy
15855
Staff development plan describes how the skills and experience of the project team members will be developed.
15856
To check whether we have developed the product according to the customer requirements r not. It is a Dynamic process.
15857
To check whether we are developing the right product according to the customer requirements are not. It is a static process
15858
Control Charts is a statistical technique to assess, monitor, and maintain the stability of a process.
15859
Executing the same test case by giving the number of inputs on same build called as
15860
The approach/document used to make sure all the requirements are covered when writing test cases
15861
The Switch is switched off once the temperature falls below 18 and then it is turned on when the temperature is more than 21. Identify the Equivalence values which belong to the same class.
15862
Handover of Test-ware is a part of which Phase
15863
Which of the following items would not come under Configuration Management?
15864
Reporting Discrepancies as incidents is a part of which phase :-
15865
Reviewing the test Basis is a part of which phase
15866
One of the fields on a form contains a text box which accepts alpha numeric values. Identify the Valid Equivalence class
15867
Static analysis is best described as:
15868
Testing where in we subject the target of the test , to varying workloads to measure and evaluate the performance behaviors and ability of the target and of the test to continue to function properly under these different workloads.
15869
Testing activity which is performed to expose defects in the interfaces and in the interaction between integrated components is
15870
Which of the following is not a major task of Exit criteria?
15871
Which is the reputed testing standard?
15872
You are performing a test to see that it complies with the user requirement that a certain field be populated by using a drop down box containing a list of values. What kind of testing are you doing?
15873
To which phase will training cost fall?
15874
Test Readiness review is conducted by the
15875
If the measurement taken by the two people are same refers to the terms as
15876
The two types of incremental testing approaches are top down and bottom up approach.
15877
A statistical technique to assess, monitor and maintain the stability of a process is
15878
You are told to prepare a report on the most commonly occurring product defects. You review the software defect reports, which categories the defects of coding errors, requirement errors, documentation errors, etc. The best tool to report this information is
15879
Function point is a measure of
15880
The ‘v’ represent the following term:
15881
Which one is not Statistical Tool?
15882
Which of the following is not a part of test plan?
15883
Which of the following is not true about Incremental testing?
15884
Testing comes under which category of cost of quality?
15885
Which one is not Structural Testing?
15886
Pareto principle advocates
15887
Histogram refers to
15888
Error guessing is a
15889
User Acceptance testing is
15890
Defects are less costly if detected in which of the following phases
15891
AngularJS applications are a mix of _____
15892
AngularJS is the library of
15893
AngularJS applications are built around a design pattern called _____
15894
Which directive defines an AngularJS application?
15895
Which is the correct syntax of creating AngularJS Controller?
15896
Which directive will auto-bootstrap (automatically initialize) the application when a web page is loaded?
15897
Which directive can provide CSS classes for HTML elements?
15898
What is controller in MVC?
15899
config phase is the phase during which AngularJS bootstraps itself.
15900
ng-init directive can be used to put values to the variables to be used in the application.
15901
In controllers, model data is not accessed via $scope object.
15902
In AngularJS, Scope contains the model data.
15903
On which of the following types of component can we create a custom directive?
15904
What are the services in AngularJS?
15905
Angular Js is based on which architecture?
15906
Is AngularJs provides testing feature?
15907
In AngularJs which feature is available for Navigation
15908
Module contains
15909
$rootScope accessible from all controllers
15910
AngularJs is all about Client side code
15911
Two way data binding is supported by AngularJs
15912
The easiest way in AngularJs for localisation is using Directives
15913
Which out of the following features are supported by AngularJs
15914
Best place for Dom Manipulation in AngularJs is
15915
AngularJs is following
15916
There are only eight key features of AngularJS.
15917
Can we download AngularJS from officials websites?
15918
Angular is not a library.
15919
AngularJS does not allow us to use the open source Closure Library with it.
15920
AngularJS adds and removes so many classes on run time?
15921
Angular JS depends on jQuery directly.
15922
AngularJS is a template system
15923
What is the use of ng-controller?
15924
What is the use of ng-model in AngularJS?
15925
What do you understand by Angular JS?
15926
What is the full form of MVC?
15927
Which of the following is true about data binding in Angular JS?
15928
Which of the following is correct about MVC?
15929
Which lines are correct about controllers in Angular JS?
15930
Which of the following defines an AngularJS application to HTML?
15931
Which of the following is used to enable URL routing?
15932
What is ng-repeat directive?
15933
Most five commonly used directives of AngularJS are:
15934
Who is the father of AngularJS?
15935
In which language AngularJS written?
15936
Who is the current developer of Angular JS?
15937
Which of the following is correct about filters?
15938
Which module we need to download and include for animation in AngularJS?
15939
Which is the most used Angular directive?
15940
Router is part of @angular/core?
15941
What is .subscribe?
15942
How Observables are Used?
15943
Which of the following is correct about TypeScript?
15944
Who is sometimes called as father of Angularjs?
15945
Can we nest ng-app directive?
15946
Which sign is used as prefix for the built-in objects in AngularJS?
15947
Which directive is used to specify a controller in HTML element?
15948
How many $RootScope an angular JS application can have?
15949
What is data binding in angular JS?
15950
How to combine filter with expression?
15951
Which of the following is a filter in Angular Js?
15952
Can we create custom directive in Angular JS?
15953
Which directive binds Application data to HTML tags in angular JS?
15954
Which directive binds the values of application data to HTML input controls in angular JS?
15955
Which directive is used to start an angularJS application?
15956
Which of the following can be used as a prefix for Directive?
15957
What is the correct syntax to write an expression?
15958
AngularJS is entirely based on HTML and JavaScript
15959
Which community Angular JS belongs to?
15960
Output of the below code
15961
Output of the below code
15962
Which function is used to create a module?
15963
Can we store controller in an external file?
15964
Which of the following is a purpose of include?
15965
Which directive is used to hide a given control?
15966
Service and factory both are singletons
15967
Which service converts object to string?
15968
Which service is used to communicate with remote server?
15969
Services are _________ object?
15970
By default, How ng-model watches the directive?
15971
What is the priority level of directives?
15972
Which directive display view for various routes?
15973
Which of the following is an in-built service in angular JS?
15974
Which of the followings are validation directives?
15975
Which of the following is validation css class in AngularJS
15976
AngularJS module can be created using ________.
15977
AngularJS filters ___________.
15978
What is service in AngularJS?
15979
Which of the following directive allows us to use form?
15980
The ng-change directive must be used with ng-model directives.
15981
What is $scope?
15982
The ng-bind directive binds ____________.
15983
The ng-model directive is used for __________.
15984
AngularJS directives can be written in HTML element as:
15985
Which of the following statements are true?
15986
Which of the following is a valid AngularJS expression?
15987
Angular 2 is component based ,and in Angular 2 $scope and controllers are replaced by __________ and __________ ?
15988
In Angular 2 which of the following service allows you to dynamically load a component in a certain position on the page. ?
15989
AngularJS module can be created using ________.
15990
What is service in AngularJS?
15991
Which of the following directive allows us to use form?
15992
What is $scope?
15993
AngularJS directives can be written in HTML element as:
15994
How to use dependency injection in AngularJS ?
15995
Using filters AngularJS cannot use _____________.
15996
Which of the following is/are not AngularJS events?
15997
Which of the following statements are invalid AngularJS filters?
15998
Explain what is angular.bootstrap is used for?
15999
Which of the following statements are true?
16000
ng-init directive in angular js is used for?
16001
What is the factory method is used for?
16002
ng-init directive in angular js is used for?
16003
What is the factory method is used for?
16004
How to include HTML content into another HTML?
16005
What does the $dirty flag indicates in angular js?
16006
Explain what Angular JS routes does?
16007
What is link function is used for in angular js?
16008
How does an object or function can get hold of its dependencies in angular js?
16009
Which of the following directive bootstraps AngularJS framework?
16010
AngularJS directives are used in ________.
16011
Reporting the status of an activity through a feedback mechanism is called ……… information.
16012
Which of the following is a type of teleconference whereby two or more users are able to edit and modify data files simultaneously?
16013
……….. takes responsibility and keeps track of progress in MIS design,development and implementation.
16014
The effectiveness of marketing information system depends to a larger extent of ………. from market place to the market.
16015
Which of the following is the type of electronic commerce that has consumers selling directly to consumers?
16016
A number of tasks related to achieve one time objective such creation of an MIS called a …….
16017
In ………. organization, authority is delegated down the hierarchy.
16018
Based on the behavioral definition of an organization, each of the following is a true statement except.
16019
Information system specialists also called as …..
16020
The basic nature of the system refers to ………
16021
The types of data transmission modes are
16022
Decision trees could be represented in different ways such as
16023
GDSS is the short form of
16024
The basic component(s) of DSS is (are)
16025
_______ details are given by Management to Marketing Service System.
16026
MIS normally found in a manufacturing organization will not be suitable in the ______.
16027
One byte is made of
16028
Audit gives details about ________ to Account Payable System
16029
Internal information for MIS may come from any one of the following department.
16030
The elements of control will consist of
16031
The flow of information through MIS is
16032
The advantage(s) of transistors are they
16033
AI is the short form of
16034
The back bone of any organization is
16035
The information of MIS comes from the
16036
Which class is thread-safe i.e. multiple threads cannot access it simultaneously,So it is safe and will result in an order?
16037
Which is a mechanism where one object acquires all the properties and behaviors of the parent object?
16038
Java Virtual Machine is platform independent.
16039
What is the range of the int data type?
16040
Which are subclasses of FilterInputStream and FilterOutputStream?
16041
Which method returns a reference to the currently executing thread object?
16042
If you import a package, subpackages will not be imported.
16043
Which keyword is used to make the classes and interface of another package accessible to the current package?
16044
Which access specifiers can be used for a class so that it’s members can be accessed by a different class in the different package?
16045
The Object class is not a parent class of all the classes in java by default.
16046
Which is a superclass of all exception classes?
16047
An interface is a blueprint of a class. It has static constants and abstract methods.
16048
Which variables are created when an object is created with the use of the keyword 'new' and destroyed when the object is destroyed?
16049
Breaking a string or stream into meaningful independent words is known as tokenization.
16050
What can be accessed or inherited without actual copy of code to each program?
16051
Which provides accessibility to classes and interface?
16052
Packages are used for distributing a collection of reusable classes, usually in a format known as Java Archive (JAR) file.
16053
Which statement provides an easy way to dispatch execution to different parts of your code based on the value of an expression?
16054
Which field of StreamTokenizer if the token is a word, this filed contains the word that can be used in programming?
16055
Which Thread pool is used where container creates a thread pool to process the request?
16056
Which is used to separate the hierarchy of the class while declaring an import statement?
16057
Classes in the same package cannot access each other's package-access members.
16058
Which method of string class in java is used to convert the boolean into String?
16059
By overriding the toString() method of the Object class, we can return values of the object, so we don't need to write much code.
16060
Which Exception occurs when a class is not found while dynamically loading a class using the class loaders?
16061
Which methods are provided by the PrintStream class?
16062
A package can be renamed without renaming the directory in which the classes are stored.
16063
What is known as the classes that extend Throwable class except RuntimeException and Error?
16064
Which is irrecoverable?
16065
Java application uses an output stream to read data from a source, it may be a file, an array, peripheral device or socket.
16066
Mutual exclusive and inter-thread communication are which type of Synchorization?
16067
An exception is an event, which occurs during the execution of a program that disrupts the normal flow of the program's instructions.
16068
Switch is more efficient than nested if or if - else in java.
16069
Which is used for reading streams of raw bytes such as image data and for reading streams of characters, consider using FileReader?
16070
Which class is used to uncompress the file in the deflate compression format, It provides facility to the other uncompression filters?
16071
Which method is used to change the name of a thread?
16072
Which mechanism is used when a thread is paused running in its critical section and another thread is allowed to enter (or lock) in the same critical section to be executed?
16073
How many reserved keywords are currently defined in the Java language?
16074
Which constructor creates an empty string buffer with the specified capacity as length.
16075
ResultSetMetaData interface is useful because it provides methods to get metadata from the ResultSet object.
16076
From the following statements which is a disadvantage of an java array?
16077
The PipedInputStream and PipedOutputStream classes can be used to read and write data simultaneously.
16078
Which method returns the interrupted flag after that it sets the flag to false if it is true?
16079
Unchecked exceptions are checked at compile-time rather they are checked at runtime.
16080
Thread class defines several methods that help manage threads. Which of the following method suspends a thread for a period fo time?
16081
Which access modifier makes a member available only to classes within the same package or subclasses?
16082
Which of the following statements is/are TRUE regarding JAVA ? (a) Constants that cannot be changed are declared using the ‘static’ keyword. (b) A class can only inherit one class but can implement multiple interfaces.
16083
Which of the following reference types cannot be generic?
16084
Which of these packages contain all the Java’s built in exceptions?
16085
A single try block must be followed by which of these?
16086
Which of these clause will be executed even if no exceptions are found?
16087
What is use of join() in threads of Java?
16088
Where is Reference variables allocated?
16089
What is abstract in Java?
16090
Can we define main() method inside abstract class?
16091
Which of the following exception is Checked exception?
16092
which class or interface defines wait(), notify() and notifyall() methods
16093
Which is the base class of all the exceptions & errors in Java?
16094
Enum is most useful in creating
16095
static import provides accessibility to static members of the class only. State true or false
16096
Which of the following is a correct implementation of method overloading?
16097
Converting an object of type (Integer) to its corresponding primitive (int) value is known as
16098
Which collection framework allows null values and is unsynchronized?
16099
Does Java allows default values to arguments? public void sum(int a = 10, int b = 20) ?
16100
Packages resolves ambiguity for classes which have the same name
16101
Different packages can have classes with the same name
16102
Packages can contain hidden classes that are used by the package itself but are not visible or accessible outside the package.
16103
How many instances Singleton class can have in Java?
16104
What is Big-O complexity notation to insert an element in List
16105
What is Big-O complexity notation to search an element in List
16106
Java List has an instance variable to handle the size. It is incremented when you add, and decremented when you remove. Calling list.size() returns a variable, and is therefore O(1)
16107
List is part of Java Collections API
16108
Abstract methods of abstract classes are mandatory to be overridden by sub classes. Is that true?
16109
Can we override final methods of abstract classes?
16110
What is 'abstract' in Java?
16111
Can Abstract classes instantiated?
16112
In Java how arrays are passed in methods?
16113
Can we use 'catch()' without passing arguments in it?
16114
In case of 'try' & 'catch' block, is it possible to use only 'try' block instead of using 'catch'?
16115
Can we call Constructor without creating an object ?
16116
In Java every data type requires some bytes of memory, How many bytes void data type requires?
16117
How may main() methods are allowed in a project of Java?
16118
If a class has no modifier then
16119
What is true about 'private' members of a class?
16120
How many levels of visibility Java has?
16121
If a class is 'public' then
16122
What is the use of Garbage Collector in Java?
16123
Can we call non static methods of a class by static methods of a class without creating object?
16124
Java supports single-line and multi-line comments very similar to C and C++
16125
Arrays is a group of similar type of datatype
16126
What is correct sequence of execution of any Java program?
16127
Java has 5 phases, Editing, Compilation, Loading, Verification & Execution. Which of the following unit is responsible for execution?
16128
Java supports both Primitive & Non-Primitive(User Defined) datatypes. Which one of the following is not a primitive datatype?
16129
The main() method of an application has to be public. Otherwise, it could not be called by a Java interpreter. Is that true?
16130
Which of these are Access Modifiers in java?
16131
Java program processing always starts with main() method
16132
Java is case sensitive langauge
16133
On which platforms Java runs?
16134
Select Odd one out from these about local variables
16135
Which one of the following is Equality operator in Java?
16136
Which one of the following is an Unary operator in Java?
16137
Which of the following operator has more precedence?
16138
What do you mean by >>> operator in Java
16139
Which of the following is not an operator in Java?
16140
Which of the following operators has more precedance in Java?
16141
public class MyClass { public static void main(String[] args){ int a = 10; System.out.println(++a++); } }
16142
Is it possible to return two values by any function?
16143
Is it possible to write C program which it print self?
16144
Numbers are stored and transmitted inside a computer in which format?
16145
The ASCII code of ‘A’ is?
16146
The ASCII code of ‘0’ (zero) is?
16147
What is the Latest Version of C Language?
16148
In compilation process at what sequence Preprocessor comes into picture?
16149
Preprocessor includes content of header files added in source code?
16150
Which compilation unit is responsible for adding header files content in the source code?
16151
Is there any limit in adding no of header files in program?
16152
What is the extension of output file produced by Preprocessor?
16153
__FILE__ is predefined macro and contains the current filename as a string. Is this true/false?
16154
Which of the following ways can be used to include header file in C programs?
16155
Which of the following ways are correct to include header file in C program?
16156
Which one of the following is invalid macro in C programming?
16157
Which of the following ways are correct to comment out preprocessing of any line?
16158
Will compiler produce any compilation error if same header file is included two times?
16159
What is the job of Assembler in C programming?
16160
Which gcc option is used to generate assembly code from C code on Linux?
16161
Which macro is used to insert assembly code in C program (GCC compiler)?
16162
Which macro is used to insert assembly code in C program (VC++ compiler)?
16163
Which command is to compile C code without linking using gcc compiler?
16164
Which gcc flag is used to genarate debug information for any binary file?
16165
Which gcc flag is used to enable all Compiler warnings?
16166
Can we declare function inside structure of C Programming?
16167
Library function pow() belongs to which header file?
16168
Libray function getch() belongs to which header file?
16169
What is the following is invalid header file in C?
16170
The concept of two functions with same name is know as?
16171
What is the meaning of below lines? void sum (int, int);
16172
When C Language was invented?
16173
How many loops are there in C
16174
Which of the following is executed by Preprocess?
16175
Which programming language is more faster among these?
16176
Is the following statement a declaration or definition (extern int i;)
16177
Is it true that a function may have several declaration, but only one definition.
16178
What is sizeof() in C?
16179
How many main() function we can have in our project?
16180
Is it possible to run program without main() function?
16181
Which of the following statement is false?
16182
enum types are processed by _________
16183
Which of the data types has the size that is variable?
16184
Which is correct with respect to the size of the data types?
16185
What is short int in C programming?
16186
What is the size of an int data type?
16187
Which of the following is a User-defined data type?
16188
Which data type is most suitable for storing a number 65000 in a 32-bit system?
16189
The format identifier ‘%i’ is also used for _____ data type.
16190
Which of the following cannot be a variable name in C?
16191
Which of the following is true for variable names in C?
16192
Which of the following is not a valid C variable name?
16193
Variable name resolution (number of significant characters for the uniqueness of variable) depends on ___________
16194
All keywords in C are in ____________
16195
Why do variable names beginning with the underscore is not encouraged?
16196
Which of the following is not a valid variable name declaration?
16197
C99 standard guarantees uniqueness of ___________ characters for external names.
16198
C99 standard guarantees uniqueness of __________ characters for internal names.
16199
Choose the correct order from given below options for the calling function of the code “a = f1(23, 14) * f2(12/4) + f3();”?
16200
Which of the following statement can be used to free the allocated memory?
16201
“Stderr” is a standard error.
16202
In the standard library of C programming language, which of the following header file is designed for basic mathematical operations?
16203
To store a word/sentence declare a variable of the type ‘string’.
16204
Are the expression ++*ptr and *ptr++ are same?
16205
For the array element a[i][j][k][2], determine the equivalent pointer expression.
16206
In a structure, if a variable works as a pointer then from the given below operators which operator is used for accessing data of the structure using the variable pointer?
16207
The return keyword is used for transfer control from a function back to the calling function.
16208
Are the expression &arr and arr different for an array of 15 integers?
16209
Which of the below statements using the name of an array does not yield the base address?
16210
Which of the following statements are correct about array in C?
16211
A pointer to a block of memory is effectively same as an array.
16212
In C, if we pass an array as an argument to a function, what actually get passed?
16213
A function can execute faster than a macro.
16214
Which header file is used for supporting the functions- malloc() and calloc().
16215
The C library function rewind() is used for re-position the file pointer at the beginning of the file.
16216
If two "return" statements are used in a function successively, the compiler will generate warnings.
16217
Functions can only be called either by value or reference.
16218
Which function disconnects the stream from a file pointer?
16219
hat is the value returned by strcmp() function when two strings are the equal?
16220
What is the purpose of using fflush() function?
16221
Which library function can change an unsigned long integer to a string?
16222
Which keyword is used to transfer control from a function back to the calling function?
16223
What is the built-in library function for adjusting the allocated dynamic memory size.
16224
Which function finds the first occurrence of a substring in another string?
16225
What is passed when we pass an array as a function argument?
16226
What is the built-in library function for comparing the two strings?
16227
Can we use switch statement to switch on strings in C?
16228
Which of the following statements are correct about for loop in C-program?
16229
A char variable can store either a Unicode character or an ASCII character.
16230
A long integer is at least 32 bits wide and a short integer is at least 16 bits wide
16231
The break statement is used to take control out of switch and continue statement is used to take control of the beginning of the switch?
16232
If scanf() statement is used for storing a value in char variable, then along with the value a carriage return (\r) also gets stored.
16233
Which statement is correct about the below program? #include<stdio.h> int main() { int i = 8, j = 24; if(i = 8) && if(j = 24) printf("Welcome Programmer"); return 0; }
16234
How many times while loop is executed if a short int is 2 byte wide?
16235
How many times "javaTpoint" is printed?
16236
Which data type cannot be checked in switch-case statement?
16237
How would you round off a value from 1.66 to 2.0?
16238
A character variable can store ___ character(s) at a time.
16239
The C variables are case insensitive.
16240
Who is known as the founder of C language?
16241
What is the correct value returned to the operating system upon successful completion of a program?
16242
Which of the following is true about C Programming?
16243
The types of linkages in C programming language are:
16244
Which operator can be used for accessing the value stored at address of a pointer variable?
16245
What is the data type of "PI" for the below statement: (#define PI 3.141)
16246
Single line comment in C language begins with _______
16247
Which header file is used to define input/output functions, macros and prototypes?
16248
Which of the following are declarations?
16249
The statement used for printing \n on the screen is:
16250
What are the various types of real data type in C language?
16251
In a library of C programming language, which of the following header file is used for performing mathematical operations?
16252
Which of the following statement is used to free the allocated memory space for a program?
16253
Which of the following is a logical AND operator?
16254
The C compiler used for UNIX operating system is
16255
Which of the following is the first operating system developed using C programming language?
16256
What is the transaction used to import SAP-provided support packages into your system?
16257
This is not a key idea that provides the foundation for the SAP solution manager.
16258
This is not part of the solution implementation portion of SAP.
16259
This makes an enterprise services environment work, with a central set of tools that store the services and call those services when required by a business process.
16260
SAP offers this to help resolve the fragmented approach to governance, risk and compliance.
16261
"Velocity of response", meaning how quickly your organization can move in response to an event, is a part of which module?
16262
This allows you to explore market opportunities, reduce the costs of product development, manage your processes efficiently, integrate with suppliers and partners, and ensure product quality.
16263
This provides online interfaces that allow you to place orders, and then receive advance notices of when the orders will ship.
16264
This is not a main area of CRM functionality.
16265
This supports the people working in an enterprise. By providing those individuals with access to their own data and allowing managers to add data about employees.
16266
An open application environment (which means that you can use it with a variety of applications and technologies you might have obtained from different sources).
16267
Which of the following is used for reading tabular data ?
16268
Which of the following statement changes column name to h and f ?
16269
THREE SYSTEMS IN A SINGLE LANDSCAPE CAN HAVE DIFFERENT TRANSPORT DIRECTORIES
16270
Which of the following function takes an arbitrary number of arguments and concatenates them one by one into character strings.
16271
Data frames can be converted to a matrix by calling data
16272
IN SAP NETWEAVER AS ABAP+JAVA TWO DIFFERENT DATABASES ARE REQUIRED, ONE FOR ABAP, ANOTHER FOR JAVA.
16273
Which of the following is a true statement.
16274
WHICH OF THE FOLLOWING CONTANS A MESSAGE SERVER ?
16275
Which of the following code snippet will create a vector with NAs in it ?
16276
WHICH OF THE FOLLOWING DOES NOT COME UNDER /USR/SAP/TRANS
16277
Which of the following is used for generating sequences ?
16278
WHILE DOING SYSTEM COPY, YOU HAVE TO PRESERVE RFC DESTINATIONS (SM59), WHAT PROCEDURE WILL YOU FOLLOW -
16279
The _____ function returns a vector of the same size as x with the elements arranged in increasing order.
16280
Numbers in R programming are generally treated as _____ precision real numbers.
16281
COPYING OF ONE PACKAGE NAME TO ANOTHER PACKAGE NAME IS CALLED
16282
R programming language has how many atomic classes of objects ?
16283
WHICH OF THE FOLLOWING INFORMATIONS ABOUT TRANSPORTS REQUESTS NOT PRESENT IN COFILES?
16284
Collection of objects currently stored in R programming language is called as _____.
16285
IS IT POSSIBLE TO DEFINE MORE THAN ONE CONSOLIDATION AND DELIVERY ROUTES IN A TRANSPORT DOMAIN ?
16286
Which of the following can be used to display the names of the objects which are currently stored within R ?
16287
DEVELOPMENT CLASSES CONTAINS ____________?
16288
HE SYSTEMS IN A SYSTEM LANDSCAPE SHARE CUSTOMIZING AND REPOSITORY OBJECTS VIA ________ ?
16289
Which of the following is a correct statement
16290
IS IT POSSIBLE TO HAVE MULTIPLE LANDSCAPES IN ONE TRANSPORT DOMAIN ?
16291
ON SAP INSTALLATION WHICH OF THE FOLLOWING CLIENT/CLIENTS ARE CREATED BY DEFAULT?
16292
Which of the following is an invalid statement ?
16293
SAP SUPPORT PACKS CAN BE APPLIED TO WHICH TYPE OF LANDSCAPE?
16294
What action needs to be taken when Oracle returns an ORA-1653 error, failure to allocate an extent for a table in a specific tablespace?
16295
What are the 3 different Oracle database shutdown modes?
16296
What are the 3 different Oracle database startup modes?
16297
You were assigned to run an ABAP program with more than one selection screen as a background job. How do you supply input to the selection screen and run it as a back ground job?
16298
The entities that R creates and manipulates are known as _____.
16299
When a user sends a request to sap system via browser, web requests are first handled by?
16300
IDOC stands for
16301
Which of the following level, data from the separate client is kept separate from each other?
16302
Which of the following is used for Statistical analysis in R programming ?
16303
Analyse problem of system startup. Before anyone could login system stops.
16304
Advanced users can write _____ code to manipulate R objects directly.
16305
How many packages exist in R programming for statistics ?
16306
Copying of one package name to another package name is called
16307
Functions are defined using the _____ directive and are stored as R objects
16308
SAP backup parameters are stored in which profile?
16309
Tcode to view a parameter?
16310
Which of the following is correct in regard to R/3 repository
16311
_____ will divert all the subsequent output from the console to an external file.
16312
BW Support Package for Release 30B will be named according to which format?
16313
Which of the following is a wrong statement in R programming ?
16314
Which of the following is correct in regards to R/3 clients?
16315
Which of the following is a true statement ?
16316
SAP was founded in which year?
16317
What is the scheduler that checks the job scheduling table in the databases that are waiting for processing and transfer them to the free background work process in accordance with their priority?
16318
What is the full form of sscr?
16319
Tcode to import the client.
16320
Which of the following is apply function in R programming language ?
16321
Select INVALID type of instance.
16322
The _____ function is a kind of "constructor function" that can be used to construct other functions.
16323
When creating a logon group for Logon Load Balancing, which of the following CANNOT be specified?
16324
What is the transaction used to import SAP-provided support packages into your system.
16325
The _____ for R are the main feature that make it different from the original S language.
16326
Given and R/3 Central Instance with all services installed, using Instance ID01, and having the SAP ID of C11. What is the name of the directory where the work process trace files are written (for Windows NT replace the "/" with "\")?
16327
Which program is used for taking backup of SAP system when connected to DataProtector backup tool?
16328
Which layer in a SAP client server architecture processes ABAP programs?
16329
Parallel Processing in case of Client Copy is
16330
Which of the following statements are correct in regards to modifications.
16331
The Customizing Client should have the option in SCC4 as
16332
Before releasing a change request, the following tasks should be completed
16333
Development classes contains ____________?
16334
Water which enters xylem cells, increase cell's
16335
Warnings are generated by the function _____.
16336
In order to execute query, which of the following authorization object access is mandate in BW?
16337
If special characters are not defined in transaction RSKC in BW then:
16338
Point out the correct statement from the following.
16339
Which of the following is correct about SAP BW Statistics?
16340
What are the architecture of SAP BW system and its components?
16341
Which of the following should be preferred for evaluation from list of alternatives ?
16342
Which of the following is used to break the execution of a loop in R programming ?
16343
Which statement(s) is/are true about Multiproviders?
16344
Point out the correct statement from the following.
16345
What should you do after an InfoCube is converted to be in-memory optimized?
16346
Select the correct statements about ODS settings.
16347
Which of the following syntax is correct for while loop in R programming language ?
16348
A setup table is basically a....
16349
Using BI accelerator the query performance can be boosted by
16350
In SAP BW/BI what are the main areas and activities?
16351
The following statements are not true about navigational attributes
16352
Which of the following is a correct statement ?
16353
The following statements are true for an info cube.
16354
Which of the following is correct about SAP BW Statistics?
16355
Connections to text files can be created with the function _____.
16356
Where can data transformation cannot take place in BW?
16357
Which of the following is correct about Profile Generator?
16358
Which of the following opens a connection to a file compressed with gzip.
16359
Which of the following tools helps in the Web reporting area?
16360
Individual R objects can be saved to a file using the _____ function.
16361
Select the true statement(s) about info sources:
16362
Which of the following code would read 100 rows ?
16363
What is the primary purpose of having multi-dimensional data models?
16364
The following statements is not true for compounded info objects.
16365
The structure of the PSA table created for an info source will be
16366
Point out the true statement from the following.
16367
A combination of characteristics and key figures can be displayed in any desired order by
16368
Which of the following statement will load the objects to the file named "mydata.RData" ?
16369
In BW, special characters are not permitted unless it has been defined using this transaction
16370
Point out the correct statement from the following ?
16371
Select the true statement(s) about read modes in BW:
16372
Which of the following function is identical to read.table ?
16373
What is the transaction code RSBBS to be used for?
16374
In SAP BW, which of the following is not an available option to perform data load from flat file?
16375
Which of the following statement would read file foo.txt ?
16376
Which of the following is a correct statement ?
16377
Which of the following is used for outputting a textual representation of an R object ?
16378
What is the Trusted RFC connection type to specify connection between ABAP systems?
16379
Which of the following is a wrong statement ?
16380
A Transport request consist of which of the following files?
16381
Which of the following argument denotes if the file has a header line ?
16382
Which of the following is used for reading in saved workspaces ?
16383
Which of the following represents a standard format of a Transport request?
16384
Which of the following client should be used to configure STMS?
16385
Which of the following is not a valid job status in job overview tab?
16386
Which of the following job class should be used for urgent or critical task?
16387
Which of the following will start the R program ?
16388
You can have multiple landscapes in one transport domain?
16389
Command lines entered at the console are limited to about ________ bytes.
16390
Which of the following user type in SAP system is used for interactive system access from GUI?
16391
In SAP system, you can create multiple clients on a single instance. It also provides data security as one user will client can’t see data of other user and also there is no need to install the software again?
16392
Elementary commands in R consist of either _______ or assignments.
16393
Advanced users can write ___ code to manipulate R objects directly.
16394
Which of the following Transaction code is used to send messages to users who are logged in and new users logging to the client?
16395
Which of the following is “Recommended” package in R ?
16396
The _________ database is used by SQL Server Agent for scheduling alerts and jobs, and recording operators.
16397
______________ is schematic drawing used for representing relationships in database.
16398
Which of the following is not a database object?
16399
Which of the following is used to build sql statements without writing code?
16400
Which menu is used to restore windows to their original locations?
16401
__________menu allows user to set up some keyboard shortcuts.
16402
Which of the following shortcut is used to clear all bookmarks?
16403
Ctrl+K+K shortcut refers to ___________
16404
Point out the wrong statement :
16405
In 2004, ________ purchased the S language from Lucent for $2 million.
16406
If commands are stored in an external file, say commands.R in the working directory work, they may be executed at any time in an R session with the command :
16407
Files containing R scripts ends with extension :
16408
Which of the following code will print NULL?
16409
You can check to see whether an R object is NULL with the _________ function.
16410
Point out the wrong statement?
16411
The __________ function returns a list of all the formal arguments of a function.
16412
Point out the correct statement?
16413
R functionality is divided into a number of ________
16414
R is technically much closer to the Scheme language than it is to the original _____ language.
16415
Finally, in _________ R version 1.0.0 was released to the public.
16416
In 1991, R was created by Ross Ihaka and Robert Gentleman in the Department of Statistics at the University of _________.
16417
_____ programming language is a dialect of S.
16418
_______ is used to skip an iteration of a loop.
16419
_________ initiates an infinite loop right from the start.
16420
Which of the following sort dataframe by the order of the elements in B
16421
Which of the following finds the maximum value in the vector x, exclude missing values
16422
How many control statements are present in R?
16423
_________and_________ are types of matrices functions?
16424
How many types of vertices functions are peresent?
16425
How many types of atomic vectors are present?
16426
Vectors come in two parts_____ and _____
16427
The ____________ in R is a vector.
16428
In R every operation has a ______call?
16429
Which function is used to create the vector with more than one element?
16430
Which of the following is a primary tool for debugging?
16431
How many types of data types are present in R?
16432
How many types of R objects are present in R data type?
16433
Descriptive analysis tell about________?
16434
How many steps does the predictive analysis process contained?
16435
___________ is used to make predictions about unknown future events?
16436
Predictive analysis is the branch of __________analysis?
16437
Constant
16438
In AngularJS data binding is __________.
16439
Elements of AngularJS MVC views are rendered in which order?
16440
In AngularJS, what is $scope variable used for?
16441
How to include HTML content into another HTML ?
16442
What is the purpose of $destroy method in AngularJS?
16443
AngularJS can show and hide HTML depending on the state of data in the model by using which of the following AngularJs directives ?
16444
AngularJS extends HTML _______________ ?
16445
What is the use of $scope variable in AngularJS ?
16446
Which of the following service is used to handle uncaught exceptions in AngularJS?
16447
Which of the following service is used to retrieve or submit data to the remote server?
16448
What is the parent of $scope in AngualarJS?
16449
In AngularJS which of the following controller take single parameter.?
16450
AngulsrJS directives can be applied to which of the following types ?
16451
Which of the following service modes can be easiest to test while using AngularJS?
16452
In context of AngularJS, what does SPA stand for?
16453
Which of the following is not a valid AngularJS Directives?
16454
In AngularJs which feature is available for Navigation
16455
In AngularJS how to manually start up an AngularJS application ?
16456
Which of the following is validation css class in AngularJS
16457
Which of the following provider can be used to configure routes?
16458
Which of the following module is required for routing?
16459
What is the correct syntax for a variable “a” in AngularJS?
16460
AngularJS application is composition of which of the following___________ ?
16461
_______ AngularJS directive is used to add or remove HTML elements from the DOM based on data in the model.?
16462
Which Directive is used to define and link an AngularJS application to HTML.?
16463
What is AngularJS?
16464
What is AngularJS ?
16465
AngularJS is based on which of the following pattern.?
16466
AngularJS initial release date ?
16467
Who is Inventor of AngularJS?
16468
AngularJS is the library of
16469
AngularJS applications are built around a design pattern called ______
16470
Who is the creator of AngularJS?
16471
Which of the following is component of AngularJS
16472
AngularJS is perfect for ______
16473
AngularJS extends HTML attributes with _____
16474
AngularJS binds data to HTML with ______.
16475
Which of the following is not the valid AngularJS directive?
16476
Which directive defines an AngularJS application?
16477
Which directive binds the value of HTML controls (input, select, textarea) to application data?
16478
Which directive binds application data to the HTML view?
16479
Which directive binds the value of the input field to the application variable name?
16480
Which directive binds the innerHTML of the element to the application variable?
16481
Which directive initializeAngularJS application variables?
16482
AngularJS expressions bind AngularJS data to HTML the same way as the ______ directive.
16483
Which is the correct syntax of creating AngularJS application module?
16484
Which is the correct syntax of creating AngularJS Controller?
16485
Which directive will auto-bootstrap (automatically initialize) the application when a web page is loaded?
16486
Which directive can also provide type validation for application data (number, email, required)?
16487
Which directive can also provide status for application data (invalid, dirty, touched, error)?
16488
Which directive can provide CSS classes for HTML elements?
16489
Which directive can bind HTML elements to HTML forms?
16490
Which directive clones HTML elements once for each item in a collection (in an array)?
16491
The argument to the controller function is called _____
16492
What is controller in MVC?
16493
Which of the following is true about $dirty flag?
16494
Which of the following is true about $invalid flag?
16495
config phase is the phase during which AngularJS bootstraps itself.
16496
Scope act as glue between controller and view.
16497
AngularJS uses dependency injection and make use of separation of concerns.
16498
ng-init directive can be used to put values to the variables to be used in the application.
16499
In controllers, model data is not accessed via $scope object.
16500
AngularJS applications can run on all major browsers and smart phones including Android and iOS based phones/tablets.
16501
AngularJS Expressions are used to bind application data to html
16502
In AngularJS, Scope contains the model data.
16503
What is Model in MVC?
16504
Which of the following is true about $routeProvider?
16505
Which of the following is true about ng-controller directive?
16506
Which of the following is true about AngularJS expressions?
16507
Which of the following is not a core AngularJSdirective.
16508
How angular.module works?
16509
On which of the following types of component can we create a custom directive?
16510
What is View in MVC?
16511
Which of the following is true about AngularJS?
16512
What happens when page containing AngularJS based Application loads.
16513
What are the services in AngularJS?
16514
What is jqLite?
16515
What is the purpose of angular.module in AngularJS?
16516
Which is the right format for calling a ng-bind function?
16517
Which of the following is true about ng-app directive?
16518
Which of the following is true about orderby filter?
16519
Can AngularJS be used to create a service?
16520
Directives can be applied to which all element type?
16521
What MVC stands for?
16522
What is the purpose of $http?
16523
The _______ directive is used if you want to add or remove HTML elements from the DOM based on data in the model.
16524
Which of the following is true about
16525
Which of the following is valid for AngualarJS module
16526
Which of the following is true about AngularJS service?
16527
What is MVC (Mode View Controller)?
16528
How to include HTML content into another HTML?
16529
Who is sometimes called as Father of AngularJS?
16530
AngularJS applications are a mix of _____
16531
What is Angular Js?
16532
AngularJS is based on the _____ pattern
16533
Which is/are the characteristics of scope object?
16534
A controller is a JavaScript object containing ___
16535
Controller, which is the JavaScript function that ___ the data?
16536
Which statement is true about scope in AngularJS?
16537
Which of the following service(s) will be invoked by the controller?
16538
Scope contains the ___?
16539
Which is the correct syntax of creating AngularJs controller?
16540
$rootScope is created with ___
16541
In larger applications,controllers are stored in ___?
16542
Whichdirectives bind the input fields to the controller properties?
16543
Which directive defines the application controller?
16544
AngularJS controllers control ___of AngularJS applications.
16545
$rootScoperefers to an object which is accessible from everywhereof theapplication.
16546
Controller is the link between the model and views.
16547
AngularJS 1.0 was released in 2013.
16548
Scope act as glue between controller and view.
16549
AngularJS needs data in JSON format to populate its model.
16550
Can '$scope' be injected while creating service using 'factory' method?
16551
Which angular function is used to wrap a raw DOM element or HTML string as a jQuery element?
16552
Which angular module is loaded by default?
16553
Which API need to be invoked on the rootScope service to get the child scopes?
16554
angular.module is primarily used to create application module.
16555
Directives can be applied to which all element type?
16556
At framework level, how does Angular retrieve the matching elements for processing?
16557
filter filter is applied to an expression using pipe character.
16558
Can multiple angular applications be bootstrapped using same element??
16559
Which components can be injected as a dependency in AngularJS?
16560
What angular function is used to manually start up an angular application?
16561
What are various possible ways in which angular application can be initialized?
16562
What are various possible prefixes such as 'ng-' using which Angular directives (for example, ng-app) can be defined?
16563
Can angular applications (ng-app) be nested within each other?
16564
With more than one ng-app in an HTML document (an HTML page), are all of them automatically initialized?
16565
Can an HTML page have multiple “ng-app” directive for bootstrapping multiple AngularJS application?
16566
An Angular application can be initialized on ______?
16567
AngularJS is an MVC based framework?
16568
Angular initializes based upon which of the following scenario?
16569
AngularJS bootstraps itself during config phase.
16570
AngularJS expressions are written using.
16571
AngularJS supports two-way data binding?
16572
ng-app directive defines and links an AngularJS application to HTML.
16573
Which of the following directive is used to initialize an angular app?
16574
Which of the following is true about ng-init directive?
16575
Who is sometimes called as Father of AngularJS?
16576
AngularJS is a library?
16577
The . . . . . directive is used if you want to add or remove HTML elements from the DOM based on data in the model.
16578
AngularJS can show or hide HTML depending on the state of data in the model. You do so using a set of AngularJS directives such as . . . . . . which are created specifically for that purpose.
16579
If the data obtained from the model contains HTML elements, these are escaped before being inserted into the HTML template. The escaping means that the HTML is displayed as text, and not as HTML. This is done to prevent . .
16580
You cannot use AngularJS directives to tell AnguluarJS how to mix the data into the HTML template.
16581
First the HTML document is loaded into the browser, and evaluated by the browser. At this time the AngularJS . . . . . . .
16582
The . . . . . . directive is one of the most fundamental directives in AngujarJS. The . . . . . directive inserts the result of an expression into the HTML template.
16583
There is a controller which takes single parameter. We call it . . . . . parameter.
16584
We need to tell AngularJS what part of our HTML page contains the AngularJS app. You do so by adding the . . . . attribute to the root HTML element of the AngularJS app.
16585
AngularJS applications are a mix of . . . . . .
16586
AngularJS is based on the . . . . . . pattern.
16587
Router is part of which of the following module?
16588
Router is part of @angular/core?
16589
Which of the following is not a hook application life cycle?
16590
What does AOT stand for?
16591
How Observables are Used?
16592
RxJS can be used for?
16593
Which character is used for chaining multiple pipes?
16594
Which angular decorator allows us to define the pipe name that is globally available for use in any template in the across application?
16595
What is the decorator used for configuring your module class?
16596
Which of the following is correct about TypeScript?
16597
Who is sometimes called as father of Angularjs?
16598
<?php $a=122; $b=13.1; $c=$a+$b; $d=$a.$c; echo $d; ?>
16599
<?php $numb = 0; while ( $numb <= 10 ){ if ($numb % 2 == 0){ echo "{$numb} Even . "; }else{ echo "{$numb} Odd . "; } $numb++; } ?>
16600
<?php function simple_interest ( $principal , $rate , $time){ $result = $principal * $rate * $time / 100; echo $result; return $result; } simple_interest(2 , 2, 2)
16601
<?php $a=0; $b=0; for($i=0;$i<10;$i++) { if(++$a<5 || $b++<7){ } } echo $a." ".$b; ?>
16602
<?php $a=0; $b=0; for($i=0;$i<10;$i++) { if(++$a<5 && $b++<7){ } } echo $a." ".$b; ?>
16603
Which method is used to check the validation of a email address
16604
<?php $x = 4/5*3; $y = 1/.3; $x ^= $y; $y ^= $x; $x ^= $y; echo "$x, $y"; ?>
16605
<?php class cppbuzz { private $var; function __construct() { $var="cppbuzz"; } } $cppbuzz = new cppbuzz; echo $cppbuzz->var; ?>
16606
find the output of below code <?php class cppbuzz { public $var; function __construct() { return "cppbuzz"; } } $cppbuzz = new cppbuzz; echo $cppbuzz->var; ?>
16607
<?php class cppbuzz { public $var; function __construct($var) { $this->var = ""; } } $cppbuzz = new cppbuzz("cppbuzz"); echo $cppbuzz->var; ?>
16608
<?php class cppbuzz { public $var; function __construct() { $this->var = "cppbuzz"; } } $cppbuzz = new cppbuzz; echo $cppbuzz->var; ?>
16609
<?php function hello(){ echo "hello"; hello(); } hello(); ?>
16610
<?php $a = 5; switch($a){ case 5: echo "Sun"; case 6: echo "Moon"; default: echo "SunMoon"; } ?>
16611
<?php $a = 5; switch($a){ case 5: echo "Sun"; case 6: echo "Moon";break; default: echo "SunMoon"; } ?>
16612
<?php $a = 5; switch($a){ case 5: echo "Sun";break; case 6: echo "Moon";break; default: echo "SunMoon"; } ?>
16613
<?php $a = 5; echo "$a-$a"; ?>
16614
<?php $a = 5/3; echo "$a"; ?>
16615
Which of the following operators has highest precedence?
16616
<?php $a = 10+10*5+15/5; echo "$a"; ?>
16617
<?php if(1%1) echo "Sun"; echo "Moon"; ?>
16618
<?php function cppbuzz(){ return -1; } if(cppbuzz()) echo "Sun"; echo "Moon"; ?>
16619
<?php function cppbuzz(){ return 0; } if(cppbuzz()) echo "Sun"; echo "Moon"; ?>
16620
<?php if(0) echo "Sun"; echo "Moon"; ?>
16621
<?php if(1) echo "Sun"; echo "Moon"; ?>
16622
<?php if(0==0){ echo "Sun"; } else{ echo "Moon"; } ?>
16623
<?php if($a=0){ echo "Sun"; } else{ echo "Moon"; } ?>
16624
<?php function func($a = 50) { echo "a is : $a"; } func(); ?>
16625
<?php $arr = array(13, 14, 22, 11, -3); sort($arr); $arrLen = count($arr); for($x = 0; $x < $arrLen; $x++) { echo " ".$arr[$x]; } ?>
16626
<?php $cars=array("Maruti","Honda","BMW"); echo strlen($cars); ?>
16627
<?php $cars=array("Maruti","Honda","BMW"); echo strlen($cars[0]); ?>
16628
<?php $cars=array("Maruti","Honda","BMW"); echo sizeof($cars) + 1; ?>
16629
<?php $a = 0; if($a > 1 ); { echo "Sun"; } echo "Moon"; ?>
16630
<?php $a = 0; if($a = -1) { echo "Sun"; } else { echo "Moon"; } ?>
16631
<?php $a = 0; if($a = 0) { echo "Sun"; } else { echo "Moon"; } ?>
16632
<?php $a = 0; if($a) { echo "Sun"; } else { echo "Moon"; } ?>
16633
<?php $a = 10; $b = $a>2?"Hi":"Bye"; echo "$b"; ?>
16634
<?php $a = 10 + 10 * (2 + 3) / 3+ 1; echo "$a"; ?>
16635
<?php for($i=0; $i<=5; $i++){ if($i%2==0) echo "$i"; } ?>
16636
<?php for($i=0; $i<5; $i++){ $i = $i+1; } echo "$i"; ?>
16637
Find incorrect way of declaring variables:
16638
Find correct way of declaring variables:
16639
How many types of loops are supported in PHP?
16640
Is it possible to insert HTML code in PHP code?
16641
Which one the following comment is invalid in PHP?
16642
In PHP all variables must begin with a dollar sign character?
16643
Correct syntax to print "Hello" in PHP
16644
PHP is
16645
Which of the following feature is not provided by SSS 2008?
16646
Many quantitative analysts use R as their____tool?
16647
SMO in SQL Server stands for ___________
16648
R is an interpreted language so it can access through_____________?
16649
Packages are useful in collecting sets into a_____unit ?
16650
R was named partly after the first names of____R authors?
16651
Who developed R?
16652
R is an__________programming language?
16653
Which of the following pane option is not provided by Query Designer?
16654
Which of the following tool is used for designing schema of the database in SSMS?
16655
Which of the following is a database object?
16656
_________ is tool in SSMS used to manage multiple servers.
16657
Which command is used to reset default configuration in SSMS?
16658
_____________ is not available on standard toolbar.
16659
Which of the following shortcut is used for displaying error list?
16660
Template Explorer is used to manage ____________
16661
Which panel presents a list of objects under the selected node?
16662
Management Studio is ________ used for development of SQL Server database.
16663
Which was the first version of SQL Server to introduce in-memory capability?
16664
__________is the first true GUI-based database server.
16665
_________ is free database software running free SQL Server technology.
16666
LocalDB was introduced in which of the following versions of SQL Server?
16667
_________ is a software application first launched with the Microsoft SQL Server 2005.
16668
SQL Server 2005 has the following features?
16669
Codename for SQL Server 2012 is __________
16670
Which of the SQL Server RTM included native support for managing XML data?
16671
Which of the following companies originally worked together to create and market the first version of SQL Server?
16672
When was the first version of Microsoft SQL Server released?
16673
_________ function in VBA displays an input box.
16674
_____________ function in VBA displays a message.
16675
_______ function in VBA formats a number according to given text strings containing 0, # and comma (,).
16676
__________ function in VBA creates a custom error message.
16677
In VBA, CDec function converts String to type.
16678
In VBA, CLng function converts String to ________ type.
16679
In VBA, CCur function converts String to _______ type.
16680
In VBA, CByte function converts String to ______ type.
16681
In VBA, Val function converts String to type.
16682
In VBA, Csng function converts String to _________ type.
16683
In VBA, CInt function converts String to___________ type.
16684
CDbl function converts String to _________ type
16685
In VBA, Cstr function converts any data to ______________ type.
16686
In VBA, the function ChrW converts given numeric value to character value in system.
16687
In VBA, the function ChrB converts given numeric value to character value in system
16688
In VBA, the function Chr converts given numeric value to character value in system.
16689
In VBA, the function AscW converts given character value to numeric code in system
16690
In VBA, the function AscB converts given character value to numeric code in system.
16691
In VBA, the function Asc converts given character value to numeric code in system.
16692
__________ is the shortcut to display properties window in VBA IDE.
16693
________ is the shortcut to run a program in VBA IDE.
16694
___________ is the shortcut to display object browser in VBA IDE
16695
____________ is the shortcut to display help in VBA IDE.
16696
_______ is the shortcut to add breakpoint in VBA IDE.
16697
______________ is the shortcut to display parameter information for selected element in VBA IDE.
16698
_____________ is the shortcut to display project explorer in VBA IDE.
16699
____________ is the shortcut to properties and methods of a component in VBA IDE.
16700
___________ is the shortcut to display information relating to selected component in VBA IDE.
16701
_____________ is the shortcut to stop execution of programs in VBA IDE.
16702
_____________is the shortcut to open list of macros.
16703
__________is the shortcut to open immediate window in VBA IDE
16704
____________is the shortcut to open VBA IDE from MS Excel.
16705
_______________characters should not be used in VBA variable names
16706
Comment in VBA begins with character and continues till the end of that line
16707
MS Excel creates to execute VBA code.
16708
Excel file having VBA code is saved using the extension .
16709
VBA code is compiled into an intermediate code called code
16710
Which is called as a virtual table in SQL?
16711
In a sql subquery , which operator is used to check for existence of record ?
16712
VBA can be used to automate carried out through MS Excel.
16713
To combine the result-set of two or more SELECT statements, SQL clause used is
16714
Which clause is used to combine rows from two or more tables based on a related column between them.
16715
To search for a specified pattern in a column
16716
To specify the number of records to return, which keyword is used
16717
MS Office records macros in language
16718
Logical operators used in SQL are
16719
To give a temporary name to a table, or a column in a table for more readability, what is used?
16720
VBA supports through class module.
16721
In a table, a column contains duplicate value, if you want to list all different value only, then which SQL clause is used?
16722
If you want to allow age of a person > 18 in the column Age of table Person, then which constraint will be applied to AGE column.
16723
VBA supports ready made user interace components like .
16724
Correct syntax query syntax to drop a column from a table is
16725
VBA permits of data from spreadsheets.
16726
Wrong statement about ORDER BY keyword is
16727
Wrong statement about UPDATE keyword is
16728
GUI stands for .
16729
SQL Query to delete all rows in a table without deleting the table (structure, attributes, and indexes)
16730
RAD in the desing applications stands for
16731
In existing table, ALTER TABLE statement is used to
16732
Which is/are correct statements about primary key of a table?
16733
Which statement is wrong about PRIMARY KEY constraint in SQL?
16734
The IDE of VBA supports since it permits drag and drop approach for design of user interface.
16735
The programming environment which permits coding, compilation, running and debugging from a single window is called
16736
VBA has a coding, compilation, running and debugging environment called .
16737
Microsoft's Visual Basic language were launched early in
16738
Programming language used to simplify development of Microsoft Windows applications is
16739
Microsoft's object-oriented primary programming languages includes
16740
Can we create Spatial Index without Primary Key?
16741
How may clustered index are allowed per table?
16742
To save a VBA project with an Excel workbook, the workbook must be saved as what type of file?
16743
INSERT statement can be used insert data into following
16744
Choose the VBA code that will allow you to obtain information about an error.
16745
SQL Server can automatically provide values for followings
16746
Inner Joins are the default join type, so which of the following operator can be used for inner join?
16747
Which of these is not a Visual Basic object?
16748
Which of the following join uses maximum resources if there are large tables?
16749
To force all variables is a VBA project to be declared, which must be stated in a module?
16750
In case of full outer join Nulls are added to the unmatched rows on the following
16751
Is it possible to join Null values?
16752
To continue to run code even if a line of code causes an error, choose the VBA code to continue to the next line of code.
16753
Which of the following operator is used with NOT EXISTS functions to simulate Outer Join operation
16754
Current syntax for Delete Query
16755
What is the shortcut keystroke to debug VBA code one line at a time?
16756
Does delete statement maintains any lock on table?
16757
Index rebuild and index reorganize is one and the same thing in sql?
16758
Which of the following snippets of VBA code is not a loop?
16759
Which of the following SQL function is used to insert a string into another string?
16760
Which one of the following is also known as INNER JOIN?
16761
What does VBA mean?
16762
What does UNION operator do in a SQL statement?
16763
Which of the following would you begin a comment line with?
16764
What do you need to select to set the developer mode?
16765
How full-txt indexes are created?
16766
If any table has duplicate values in any column then that table is in First Normal form?
16767
A table is in BCNF if it is in 3NF and if every determinant is a following key
16768
What is the location of Temporary table?
16769
Visual Studio .NET provides which feature?
16770
Which one of the following is true when SQL connection is closed?
16771
Can we use table, column keyword to name any column?
16772
Tinyint data type can hold only positive values?
16773
The Rnd statement will generate a(n)?
16774
The Activated event is found only in which object?
16775
The Tick event is found only in which object?
16776
Which is not a common control event?
16777
In event-driven programming an event is generated by?
16778
Maximum number of characters a text data type can hold is?
16779
A click event procedure stud for the label control can be created by?
16780
What is default value of any column when it is missing or not known?
16781
The CancelButton property belongs to which object?
16782
What is true about Descending Order?
16783
The Button control can be activated?
16784
Which property determines whether a control is displayed to the user?
16785
Is there any limitation in adding number of conditions in a where clause?
16786
Which of the Order by query is correct one?
16787
Can we use ‘IN’ operator with Where clause?
16788
Correct syntax for Update Statement?
16789
Insert & Update both changes table's values. Can we use insert in place of update?
16790
Is it possible to user 'where' clause in an insert statement?
16791
Which one of the following is correct syntax for Insert Statement?
16792
Default size of n in a column which is defined as VARCHAR(n)?
16793
You can find a button which toggles between Record Macro and Stop Recording in the:
16794
To open the Visual Basic Editor with a key stroke, press:
16795
To run a macro with a single click, assign a:
16796
When you create a workbook from an Excel macro-enabled template, you must first click:
16797
Sql data type using for assigning GUID values?
16798
To run a macro that was recorded with relative references, you must first:
16799
Select the Range of TinyInt data type in SQL Server
16800
You can tell when an Excel template is macro-enabled by looking at its:
16801
In Visual Basic, each line preceded by an apostrophe and shown in green is a:
16802
A single workbook is called an object while more than one workbooks are called:
16803
As you record a macro, Excel converts your keystrokes into:
16804
The first key in a macro shortcut is always:
16805
What is the storage size of smallmoney data type in sql?
16806
Which data type is used to store binary data upto 2,147,483,647?
16807
Which of the following data type is/are used for Date & Time?
16808
Which of the following statement is correct about ‘CREATE TABLE’ command while creating a table?
16809
Which of the following command(s) is / are related to transaction control in SQL?
16810
Which of the following is true for TRUNCATE in SQL?
16811
Which of the following is the correct outcome of the SQL query below?
16812
Difference between a primary key and a unique key?
16813
Which of the following is true for a primary key?
16814
Which of the following is the correct order of occurrence in a typical SQL statement?
16815
A Candidate Key can be any column or a combination of columns that can qualify as unique key in database. There can be multiple Candidate Keys in one table. Each Candidate Key can qualify as Primary Key
16816
A Primary Key is a column or a combination of columns that uniquely identify a record. Only one Candidate Key can be Primary Key
16817
Indexes speed up SELECT's and slow down INSERT's
16818
Sql supports single line comment, which of the following is single line comment?
16819
To activate a file in a Personal Macro workbook, you must first:
16820
Why use Full Join in sql?
16821
Which of the following operator select a range of data between two values?
16822
Instead of typing the code or instructions in a macro program, you:
16823
Which operator is used to match text while search?
16824
Which of the following is not Constraint in SQL?
16825
The security warning bar does not open when you open a workbook with macros if you choose:
16826
How many Primary key a table can max have?
16827
You can check a workbook's macro security settings in:
16828
Macros must be saved in an Excel workbook with this extension:
16829
What is Default in VBA among the Following?
16830
What is the Use of OPTION EXPLICIT
16831
What happens when dollar signs ($) are entered in a cell address? (eg. $A$2:$A$10)
16832
VBA Object hierarchy?
16833
Difference between iserror and iserr
16834
Select methods that can be used to rename a sheet
16835
Declaration Make mandatory with the use of Option Implicit
16836
Private Procedure can be called from anywhere in the project
16837
In regard to MOVE-CORRESPONDING, which of the following is NOT a true statement?
16838
The lookup value must always be located in the first column of the lookup table
16839
Which data type cannot be used to define parameters?
16840
Which menu option can be used to split windows into two In Excel 2007?
16841
Which of the following statements is NOT true about a BAPI?
16842
What does the statement does? Application.Worksheets("Data").Range("1:10").EntireRow.Delete
16843
What would be the value of lv_char_len?
16844
What process is used to establish the automatic transport of data between the view controller's context-attributes and the UI element in its layout?
16845
Which event is used to navigate from basic list to secondary list?
16846
What is the basic object of data Dictionary
16847
What is the Syntax of VLOOKUP Function in Excel?
16848
What kind of component of a business object are BAPIs ?
16849
What are the ways to link LDB to executable program?
16850
TODAY() is Volatile functions?
16851
What are presentation and application servers in SAP?
16852
Which of the following is not a valid data type in Excel?
16853
In Inner and outer join
16854
How to Hide a Sheet using VBA code?
16855
How to define parameters as a data type?
16856
Which layer is NOT used in R/3 system?
16857
Search help cannot be attached to
16858
Data element is an example of
16859
Which attribute is invalid for a domain?
16860
What is Default in VBA among the following?
16861
The statement INITIALIZATION
16862
What are the data types in VBA?
16863
Sub query usually more efficient because
16864
Which of the properties in a control’s list of properties is used to give the control a meaningful name?
16865
What table is used to store all the Message Class Texts?
16866
A VBA unit is called a _____
16867
Data element is an example of
16868
Which of the following refers to computer code, in VBA, that performs some action on or with objects?
16869
Identify a layout that is not part of the Webdynpro Layout types
16870
In an ABAP program, which of the following Processing blocks are not allowed?
16871
When the user clicks a button, _________ is triggered.
16872
In regard to the INITIALIZATION event, which of the following is NOT a true statement?
16873
Which of the following VBA windows shows the code of the active object?
16874
VBA is:
16875
Which of the following is NOT a numeric data type?
16876
What is the difference between iserror and iserr?
16877
Which is the correct sequence of events?
16878
To change one or more lines of a database table, use ____.
16879
The Properties window plays an important role in the development of Visual Basic applications. It is mainly used
16880
In regard to Native SQL, which of the following is NOT a true statement?
16881
In an R/3 environment, where is the work of a dialog program performed?
16882
Which of these sentences most accurately describes the GET VBAK LATE. event?
16883
To create a list of the top 25 customers, you should use
16884
All of the following are considered to be valid ABAP modularization techniques except:
16885
What is output by the following code? DATA: BEGIN OF itab OCCURS 0, letter type c, END OF itab. itab-letter = 'A'. APPEND itab. itab-letter = 'B'. APPEND itab. itab-letter = 'C'. APPEND itab. itab-letter = 'D'. APPEND itab. LOOP AT itab. SY-TABIX = 2. WRITE itab-letter. EXIT. ENDLOOP.
16886
To summarize the contents of several matching lines into a single line, use this SELECT statement clause.
16887
If this code results in an error, the remedy is SELECT * FROM tab1 WHERE fld3 = pfld3. WRITE: /1 tab1-fld1, tab1-fld2. ENDSELECT.
16888
he output for the following code will be report zabaprg. DATA: my_field type I value 99. my_field = my_field + 1. clear my_field. WRITE: 'The value is', my_field left-justified.
16889
After adding rows to an internal table with COLLECT, you should avoid adding More rows with APPEND.
16890
To both add or change lines of a database table, use ____.
16891
Page headers for a secondary/details list can be coded in the event:
16892
Page footers are coded in the event:
16893
A BDC program is used for all of the following except:
16894
A select statement has built-in authorization checks.
16895
Which of the following is NOT a component of the default standard ABAP report header?
16896
The following code indicates write: /5 'I Love ABAP'.
16897
Given: DO. Write: /1 'E equals MC squared.'. ENDDO. This will result in ____.
16898
To call a local subroutine named calculate answer, use this line of code:
16899
Which of these is NOT a valid type of function module?
16900
Within the source code of a function module, errors are handled via the keyword:
16901
This data type has a default length of eight and a default value = '00000000'.
16902
Function module source code may not call a subroutine.
16903
After a DESCRIBE TABLE statement SY-TFILL will contain
16904
The following code indicates: CALL SCREEN 9000 STARTING AT 10 5 ENDING AT 60 20
16905
Which of the following is NOT a true statement in regard to a sorted internal table type?
16906
To place a checkbox on a list, use
16907
The following code indicates: SELECT fld1 FROM tab1 INTO TABLE itab UP TO 100 ROWS WHERE fld7 = pfld7.
16908
In regard to the code below, which of the following is not a true statement? TABLES: KNA1. GET KNA1. Write: /1 kna1-kunnr. END-OF-SELECTION.
16909
True or false: Mobile devices can require a location as an authentication factor to access certain assets.
16910
Which authentication technology identifies users by relying on mobile carrier technology?
16911
To prevent duplicate accesses to a master data field:
16912
Which of the following biometric authentication factors isn't supported by mainstream mobile devices?
16913
This data type has a default length of one and a default value = '0'.
16914
In relation to an internal table as a formal parameter, because of the STRUCTURE syntax, it is possible to:
16915
Which of the following is a benefit of an on-device mobile authenticator app?
16916
Which of the following would be stored in a table as master data?
16917
The following code indicates: CALL SCREEN 300.
16918
The following statement will result in a syntax error. DATA: price(3) type p decimals 2 value '100.23'.
16919
Which of the following is a potential drawback of MFA on mobile devices?
16920
Given: PERFORM subroutine USING var. The var field is known as what type of parameter?
16921
Which of the following is not a category of authentication?
16922
Page headers for a secondary list should be coded in which event?
16923
Which ABAP program attribute provides access protection?
16924
What standard data type is the following user-defined type? TYPES: user_type.
16925
The SAP service that ensures data integrity by handling locking is called:
16926
Tools used to hack mobile devices are not expensive.
16927
The order in which an event appears in the ABAP code determines when the event is processed.
16928
One of the best security principles used to safeguard mobile devices is to maintain the default password it comes with.
16929
Hacking mobile devices is very complicated and difficult, therefore there is no reason to be cautious
16930
In regard to the START-OF-SELECTION event, which of the following is a true statement?
16931
Studies show that Bluetooth enabled phones can be hacked in 10 seconds
16932
Errors to be handled by the calling program are defined in a function module's ____.
16933
To stay safe while using your mobile device you should do which one of the following
16934
In regard to a function group, which of the following is NOT a true statement?
16935
All of the following pertain to interactive reporting in ABAP except:
16936
When writing a SELECT statement, you should place as much load as possible on the database server and minimize the load on the application server.
16937
If a table contains many duplicate values for a field, minimize the number of records returned by using this SELECT statement addition.
16938
The following code reorders the rows so that: DATA: itab LIKE kna1 OCCURS 0 WITH HEADER LINE. itab-name1 = 'Smith'. itab-ort01 = 'Miami'. APPEND itab. itab-name1 = 'Jones'. itab-ort01 = 'Chicago'. APPEND itab. itab-name1 = 'Brown'. itab-ort01 = 'New York'. APPEND itab. SORT itab BY name1 ort01.
16939
The following code indicates: SELECTION-SCREEN BEGIN OF BLOCK B1. PARAMETERS: myparam(10) type C, Myparam2(10) type N, SELECTION-SCREEN END OF BLOCK.
16940
Which table type would be most appropriate for accessing table rows using an index.
16941
To remove lines from a database table, use ____.
16942
To read an exact row number of an internal table, use this parameter of the READ TABLE statement.
16943
The ABAP keyword for adding authorizations to a program is ____.
16944
In regard to MOVE-CORRESPONDING, which of the following is NOT a true statement?
16945
To select one record for a matching primary key, use ____.
16946
Adding a COMMIT WORK statement between SELECT_ENDSELECT is a good method for improving performance.
16947
If itab contains 20 rows, what will SY-TABIX equal when the program reaches the WRITE statement below? SY-TABIX = 10. LOOP AT itab. count_field = count_field + 1. ENDLOOP. WRITE: /1 count_field.
16948
When modifying an internal table within LOOP AT itab. _ ENDLOOP. you must include an index number.
16949
You can define your own key fields when declaring an internal table.
16950
What will be output by the following code? DATA: BEGIN OF itab OCCURS 0, fval type i, END OF itab. itab-fval = 1. APPEND itab. itab-fval = 2. APPEND itab. REFRESH itab. WRITE: /1 itab-fval.
16951
o allow the user to enter a single value on a selection screen, use the ABAP keyword ____.
16952
What will be output by the code below? DATA: alph type I value 3. write: alph. WHILE alph > 2. write: alph. alph = alph - 1. ENDWHILE.
16953
In regard to the three-tier client/server architecture, which of the following is a true statement?
16954
The business (non-technical) definition of a table field is determined by the field's ____.
16955
The event AT SELECTION-SCREEN OUTPUT. occurs before the selection screen is displayed and is the best event for assigning default values to selection criteria.
16956
In regard to the INITIALIZATION event, which of the following is NOT a true statement?
16957
The field declared below is of what data type? DATA: new_fld(25).
16958
The event that is processed after all data has been read but before the list is displayed is:
16959
A DO loop increments the system field ____.
16960
The editor function that formats and indents the lines of code automatically is called ____.
16961
Around 70% of the cyberattacks happen at which layer?
16962
In a line of code, text-100, is an example of which type of text element?
16963
Which of the following may NOT be modified using the ABAP Dictionary transaction?
16964
What size of companies are more likely to be exploited?
16965
All of these allow you to step through the flow of a program line-by-line except:
16966
What is the highest loss component attributed to data breaches?
16967
If a field, NAME1, is declared as a global data object, what will be output by the following code? report zabaprg. DATA: name1 like KNA1-NAME1 value 'ABAP programmer'. name1 = 'Customer name'. CLEAR name1. perform write_name. FORM write_name. name1 = 'Material number'. WRITE name1. ENDFORM.
16968
How do security professionals rate their management’s application security outlook?
16969
A DATA statement may appear only at the top of a program, before START-OFSELECTION.
16970
This data type has a default length of one and a blank default value.
16971
How many malware exist?
16972
What is the top vulnerability leading to data breaches?
16973
On an average, how many days financial companies take to fix found vulnerabilities?
16974
What is the cost of carrying out an application DDoS attack on an average website?
16975
Your web application allows users to download their account statements in PDF format. What is the most secure way to implement this functionality?
16976
A race condition in a web application can lead to a security hole. Which software analysis technique is best suited to identify the existence of a race condition?
16977
What is one way developers can defend against forced browsing attacks?
16978
If you want your web application to defend itself against cross-site scripting attacks that steal session IDs, which cookie attribute is best able to help you?
16979
The formatting method {1:<10} represents the ___________ positional argument, _________ justified in a 10 character wide field.
16980
TRUE or FALSE? Most web applications provide only one method of authentication, namely username + password.
16981
The output of which of the codes shown below will be: “There are 4 blue birds.”?
16982
TRUE or FALSE? Using POST requests with hidden form fields provides a significant level of protection against attackers who want to tamper with requests.
16983
Which of the following formatting options can be used in order to add ‘n’ blank spaces after a given string ‘S’?
16984
TRUE or FALSE? The best way to eliminate SQL injection vulnerabilities in code is to validate input data.
16985
Which of the following Boolean expressions is not logically equivalent to the other three?
16986
TRUE or FALSE? An attacker could use a cross-site scripting (XSS) flaw on a banking site to steal login credentials while the victim appears to remain on the legitimate banking site.
16987
TRUE or FALSE? All web applications are vulnerable to CSRF attacks unless there's a specific protection mechanism in place.
16988
What is the two’s complement of -44?
16989
As a web application user, what puts you at most risk to fall victim to a cross-site request forgery (CSRF) attack?
16990
Which of the following expressions can be used to multiply a given number ‘a’ by 4?
16991
Any odd number on being AND-ed with ________ always gives 1. Hint: Any even number on being AND-ed with this value always gives 0.
16992
Bitwise _________ gives 1 if either of the bits is 1 and 0 when both of the bits are 1.
16993
The one’s complement of 110010101 is:
16994
It is not possible for the two’s complement value to be equal to the original value in any case.
16995
Which of the following is not a security issue for PDAs?
16996
BBProxy tool is used in which mobile OS?
16997
Which of the following tool is used for Blackjacking?
16998
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.
16999
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.
17000
App permissions can cause trouble as some apps may secretly access your memory card or contact data.
17001
Hackers cannot do which of the following after compromising your phone?
17002
DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
17003
Which one of the following is not a python's predefined data type?
17004
Mobile security is also known as ____________
17005
____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.
17006
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
17007
Mobile Phone OS contains open APIs that may be _____________ attack.
17008
Which of the following is not an OS for mobile?
17009
Which of the following is not an appropriate way of targeting a mobile phone for hacking?
17010
The format function, when applied on a string returns :
17011
Applications that create queries dynamically, can be considered as a risk source of
17012
Database that allows a system administrator to associate a function with a relation is called
17013
First point where security enforcement is needed is in the
17014
A method that uses two independent pieces/processes of information to identify a user is known as
17015
class test: def __init__(self): print "Hello World" def __init__(self): print "Bye World" obj=test()
17016
Python allows string slicing. What is the output of below code: s='cppbuzz chicago' print(s[3:5])
17017
Term that is considered as a basis for most robust authentication schemes, is said to be
17018
Are nested if-else are allowed in Python?
17019
Select the reserved keyword in python-
17020
Which Of The Following Keywords Mark The Beginning Of The Class Definition?
17021
According to the American Bankers Association, what percentage of Americans prefer to do all of their banking online?
17022
Which of the following data types is not supported in python ?
17023
What is the output of the following? print("Hello {0!r} and {0!s}".format('foo', 'bin'))
17024
Lost gadgets are so common that the mobile security service Lookout claims it locates a missing mobile device every _______.
17025
What is the return type of function id?
17026
One out of every ______ mobile device users will click on a phishing link every year.
17027
Which one of the following has the highest precedence in the expression?
17028
What percentage of free iPhone apps have the ability to access your location based on GPS coordinates?
17029
Mathematical operations can be performed on a string. State whether true or false.
17030
What's the popular term for malware that's automatically downloaded when a user clicks on an Internet ad?
17031
All keywords in Python are in
17032
In mobile security parlance, what does "repackaging" mean?
17033
The iPhone 4 requires a user to sync the phone with iTunes in order to receive the latest security patches. What percentage of iPhone users never sync their phone?
17034
Which of the following is the use of id() function in python?
17035
What do you call an iPhone that has been hacked in such a way as to allow the user to download apps not approved by the App Store?
17036
Mobile payments are a lucrative target for hackers. What is the projected annual total of mobile payment transactions by 2014?
17037
What's the popular terminology for illegally listening in on an unencrypted WiFi network?
17038
In the first 6 months of 2011, how many apps in the open-source Android Market were identified as malware in disguise?
17039
True or False: Anyone can post an app to the Apple App Store.
17040
How many Android users were infected by the DroidDream malware attack of 2011?
17041
Python was released publicly in
17042
What do security experts call a malicious Web app that masquerades as a useful program?
17043
Extensible programming language that can be extended through classes and programming interfaces is
17044
Python is said to be easily
17045
In 2011, the average mobile phone user spends a total of 74 minutes a day using a Web browser, either on their computer or on their phone. How many minutes a day do they spend using mobile Web apps?
17046
True or False: The passcode lock is a default setting on the iPhone.
17047
If you choose the "erase data" option in your iPhone security settings, how many chances do you have to enter a correct passcode before the phone erases everything?
17048
Which mobile operating system is considered the most vulnerable to mobile security threats?
17049
On March 2, 2011, Apple announced that it had sold how many iPhones since the product was released in 2007?
17050
The expression 2**2**3 is evaluates as: (2**2)**3.
17051
What should users do to protect their devices before they get lost or stolen?
17052
True or false: Enforcing security best practices such as encryption and passcode use improves mobile data security.
17053
Which of the following OSes does not support on-device encryption?
17054
What is a secure data container?
17055
Which of the following expressions results in an error?
17056
Which of the following expressions is an example of type conversion?
17057
What will be the output of the following Python expression?
17058
True or false: It's important that the data stored on USB drives is encrypted.
17059
What is data at rest?
17060
Which of the following does NOT help with mobile data security? MDM software
17061
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
17062
Which of the following expressions involves coercion when evaluated in Python?
17063
If you have to leave your computer in a car, you should put it:
17064
As of August 2011, which operating system owned the most market share in the smartphone sector?
17065
Which of the following mobile data security strategies should your employees use?
17066
If you use a public computer, before leaving you should
17067
The early FM push-to-talk telephone systems were used in
17068
What are the main benefits of Mobile Security?
17069
What are the minimum system requirements to install mobile security?
17070
What does activation do?
17071
How can you prevent the theft of your laptop?
17072
Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?
17073
Which of the following is the truncation division operator?
17074
Which of the following operators has its associativity from right to left?
17075
The value of the expressions 4/(3*(2-1)) and 4/3*(2-1) is the same.
17076
What does 3 ^ 4 evaluate to?
17077
What is the result of round(0.5) – round(-0.5)?
17078
What is the result of cmp(3, 1)?
17079
Which of the following is incorrect?
17080
What does ~~~~~~5 evaluate to?
17081
What does ~4 evaluate to?
17082
Which of the following is a default UI property?
17083
What is the type of inf?
17084
Which of the following is not a complex number?
17085
What is the output of print 0.1 + 0.2 == 0.3?
17086
What is the return value of trunc()?
17087
Which of the following results in a SyntaxError?
17088
In order to store values in terms of key and value we use what core data type.
17089
What is the return type of function id?
17090
What is the iOS version launched by apple with iPhone 5S ?
17091
Which of the following will run without errors?
17092
Given a function that does not return any value, What value is thrown by default when executed in shell
17093
Which of these in not a core data type?
17094
ARC stands for _ _ _ _ _.
17095
Which one of the following has the highest precedence in the expression?
17096
he expression Int(x) implies that the variable x is converted to integer.
17097
Which one of the following has the same precedence level?
17098
What is the output of this expression, 3*1**3?
17099
Operators with the same precedence are evaluated in which manner?
17100
In which year Apple introduced multitasking supported iphones ?
17101
Mathematical operations can be performed on a string.
17102
What is the answer to this expression, 22 % 3 is?
17103
Which one of these is floor division?
17104
Which is the correct operator for power(xy)?
17105
Which of the following cannot be a variable?
17106
Which of the following is true for variable names in Python?
17107
All keywords in Python are in _________
17108
Which of the following is not a keyword?
17109
Why are local variable names beginning with an underscore discouraged?
17110
Which of the following is an invalid variable?
17111
Which of the following is invalid?
17112
which of the following loop is not a part of swift programming language?
17113
In swift language by default the members of class are ..?
17114
Which type of collection uses key-value pair in iOS?
17115
There are __ types of collections in Swift.
17116
Is Python case sensitive when dealing with identifiers?
17117
What symbol is used like a tuple to access arguments in Abbreviated Swift Closure syntax?
17118
Swift was developed by
17119
Which iPhone version supports flash?
17120
What is the full form of "efi"
17121
The -------- provides the resources you need to develop native iOS apps
17122
Is Tuple mutable?
17123
Swift is a
17124
what is the output for: name="Hello World" print(type(name))
17125
Select the command to Find and print Data types using the Type command. name="Hello World"
17126
What is the user interface of Iphone OS called?
17127
Which of the following variable is invalid?
17128
Is Python case sensitive?
17129
Which of the following has more precedance?
17130
What is the associativity of Operators with the same precedence?
17131
19 % 2 in python
17132
Which of the following operators is used to get accurate result (i.e fraction part also) in case of division ?
17133
Select the correct code to print cppbuzz-chicago
17134
Which of the following data type is used to store values in Key & Value format?
17135
What is the data type of X in X = [12.12, 13, 'cppbuzz']
17136
Is it possible to use round function without any argument like round()
17137
How following evaluates in Python? round(0.5) – round(-0.5)
17138
What will be the output of 7^10 in python?
17139
Which one of the following is not a python's predefined data type?
17140
To open a file c:cppbuzz.txt for writing, we use
17141
Suppose list1 is [2, 33, 222, 14, 25], What is list1[-1] ?
17142
Which of the following is an invalid statement?
17143
What is the maximum possible length of an identifier?
17144
Which statement is correct....??
17145
print(chr(ord('b')+1))
17146
Which of these are not Value type in Swift?
17147
The format function, when applied on a string returns :
17148
Xcode is an IDE containing a suite of software development tools developed by Apple for developing software for OS X and iOS
17149
If a='cpp', b='buzz' then which of the following operation would show 'cppbuzz' as output?
17150
What is correct syntax to copy one list into another?
17151
in swift which keyword is work as immutable??
17152
How to find the last element of list in Python? Assume `bikes` is the name of list.
17153
which compiler is use for swift ?
17154
Syntax of constructor in Python?
17155
Which predefined Python function is used to find length of string?
17156
The class files that you create for your application will have file extension ?
17157
Which of the following is correct way to declare string variable in Python?
17158
Which keyword is used to define methods in Python?
17159
Flash Applications is supported in iPhone browsers.Is it true?
17160
Which of the following symbols are used for comments in Python?
17161
What is Bundle in iOS
17162
Select the reserved keyword in python
17163
What is the latest version of iPhone operating system ?
17164
Any file’s attribute information is stored in which structure on the disk
17165
When mv f1 f2 is executed which file’s inode is freed?
17166
What command is used to copy files and directories?
17167
IPhone OS is based on which language?
17168
How do you rename file “new” to file “old”?
17169
Executing the ‘cd ..’ command when at the root level causes
17170
If a file is removed in Unix using ‘rm’ then
17171
Which represents the user home directory
17172
Which option of rmdir command will remove all directories a, b, c if path is a/b/c
17173
What is the element that is used to specify the type of variable or expression?
17174
Which command is used to set limits on file size
17175
Which of the following framework is not used in iOS ?
17176
Which of the following time stamps need not exist for a file on traditional unix file system
17177
Tuples as well as structs both allow us to combine different types into one type.
17178
Application running in foreground but currently not receiving any events .what is the current state of Application?
17179
Which of the following declares a mutable array in Swift?
17180
Swift will automatically assign the data type based on the intial value ?
17181
iOS is a __software.
17182
Which command will you use to see the available routes?
17183
Multitasking in iOS was introduced in which version?
17184
Which screen manipulation command sets the screen back to normal?
17185
What communication command provides communication to another user logged on by writing to the bottom of their terminal?
17186
sed is a command typically used for
17187
It is possible to wrap variable value inside optional after unwrapping value
17188
To open a file file1 with cursor at line number 4
17189
what are the features of swift programming?
17190
Which command gives the first byte where the difference is in the file1 & file2?
17191
What was the original name of iOS?
17192
How to execute ls command inside a vi editor?
17193
How do you add (append) a file “file1” to the example.tar file
17194
for unwrapping value inside optional what should we use?
17195
Which of the following is incorrect value type of the swift?
17196
What is a LLVM ?
17197
Meaning of iOS is?
17198
Which one shows the name of the operating system?
17199
To initialize variable with null require...
17200
The command syntax to display the file ‘sample.txt’ one page at a time is
17201
Write the command to display the current date in the form dd/mm/yyyy.
17202
The most recent version of macOS is based on ... ?
17203
Which of the following commands will allow the user to search contents of a file for a particular pattern
17204
If you do not want to mention external name in function call, then what should be preceded before the parameters while defining the function?
17205
Which tar command option is used to list the files in a tape archive format?
17206
Which of the following commands can be used to change default permissions for files and directories at the time of creation
17207
MAC OS X is true 64 bit unix.
17208
pwd command displays
17209
Using tupel we can return multiple values.
17210
Which of the following commands can be used to copy files across systems?
17211
Which of the following is incorrect data type in SWIFT ?
17212
Which command is used to display all the files including hidden files in your current and its subdirectories ?
17213
We can return multiple values in swift from function by using?
17214
Which of the following command output contains userid?
17215
Which commands will give you information about how much disk space each file in the current directory uses?
17216
First IOS was written in
17217
Which of these commands could you use to show one page of output at a time?
17218
Double has a precision of at least _ decimal digits in swift.
17219
Command used to count number of character in a file is
17220
To create contants in swift we use keyword ...
17221
Command used to determine the path of an executable file is
17222
Swift will automatically assign the data type based on the initial value?
17223
Which of the following iOS frameworks is a commonly used third party Library?
17224
Entry Point function in swift is main()
17225
To create mutable object __ is used
17226
In iOS, a folder with .app extension is known as Bundle.
17227
Swift is which type of language?
17228
What are the collection types in Swift?
17229
Given : var stringValue:String = “Justin Gif”. What is the result of stringValue = nil?
17230
What type of integer is denoted by "Int8"?
17231
What's are the new features in Swift 4.0?
17232
Which of the following line skips the first 5 documents in the bios collection and returns all remaining documents?
17233
The __________ method limits the number of documents in the result set.
17234
Which of the following method corresponds to Order by clause in SQL?
17235
The mongo shell and the drivers provide several cursor methods that call on the cursor returned by the _______ method to modify its behavior.
17236
Which of the following method is called while accessing documents using the array index notation?
17237
____________ method renders the document in a JSON-like format.
17238
Which of the following method returns true if the cursor has documents?
17239
When you query a collection, MongoDB returns a ________ object that contains the results of the query.
17240
Assume that Honda is an instance of the Car class, and that Car class has a member function named run. Which of the following is a correct call to the run function?
17241
C++ Class declarations should never be stored in their own header file
17242
A C++ class is almost similar to a structure
17243
The public access specifier is used to protect important data
17244
Objects in C++ are created from abstract data types that encapsulate data and functions together
17245
When a file is opened by the program, the file stream object’s “read position” is
17246
Closing a file causes any unsaved information still held in the file buffer to be saved to the file.
17247
Which member function writes a single character to a file?
17248
Which of the following statements opens a file and links it to a file stream object?
17249
By default, files are opened in binary mode
17250
When you store data in a variable it is automatically saved in a file
17251
Data stored in RAM disappears once a program ends or the computer is powered down.
17252
After the following statement executes, what value will the MAPLE enumerator be stored as, in memory?
17253
Which of the following statements assigns a value to the hourlyWage member of employee[2}?
17254
In the following structure declaration, idNum is: Struct Employee { String name; int idNum; };
17255
You can define any number of union variables, but each variable can store the value of one member at a time
17256
Structure variables may be passed as arguments to functions
17257
A struct can contain members of various data types
17258
Correct syntax for creating a thread using Function Pointer?
17259
What does this function do?
17260
Will below program run without any compilation errors?
17261
Is it possible to initialize any Vector with an Array in C++?
17262
What is true about his statement in C++?
17263
What is the correct way to initialize vector in C++?
17264
In which version of C++ auto was limited to lambda functions?
17265
Which version of C++ added feature of auto for return type of functions?
17266
Which C++ version support Digit Separators 1'000'000?
17267
Lambda expression are feature of which C++ version?
17268
Is this a valid syntax in C++ 17?
17269
Which of the following is not a C++ 17 library feature?
17270
How many times will A be printed ?
17271
GCC compiler is known as?
17272
Which is the correct command used to compile source code (.cpp files) into object code(.o files)?
17273
Which of the following is not a C++ Library?
17274
A process of repeating the workflow is called ...
17275
The statement structure that is NOT a looping is:
17276
What is the role of tellp() in C++ file handling?
17277
What is the roll of tellg() in C++ file handling?
17278
Why use seekp() in file handling of C++?
17279
Why seekg() is used in file handling of C++
17280
If I want use multiple modes in open() function while file handling then which operator is used for this?
17281
Which mode of the following will append the file if it already exist in C++?
17282
Header file used to perform both read & write operations on files in C++?
17283
Which header file is used to only read files in C++?
17284
What is the correct syntax to access any variable of Namespace?
17285
Which operator is used to access the namespace?
17286
Can we typedef in declaring structure?
17287
Can we declare structure inside structure?
17288
In place of structure which other data type can be used in programming?
17289
Can we initialize structure's elements in structure itself?
17290
How many elements we can have in any structure?
17291
The data elements in structure are also known as ?
17292
What should be the output of below program? Please note all programs are compiled on GCC compiler.
17293
Find the output of below program #include<iostream> using namespace std; enum color{ Black, blue, red }; int main() { color obj = blue; cout<<obj; return 0; }
17294
Is this valid C++ 11 program & get compiled without any error?
17295
Is below program of C++ 11 valid & runs without compilation error?
17296
What should be output of below program? program is compiled on g++ compiler.
17297
Which one of the following is correct syntax for nmake command?
17298
Which one is true ?
17299
In the below program int main(int argc, char *argv[]){} what would be the value of argv[argc]?
17300
Which one is correct syntax to use C++11 features while compilation?
17301
Which one of these is invalide file mode?
17302
Which one of these takes more memory?
17303
What is the advantage of local variable?
17304
What is/are true statements are const volatile variables?
17305
Can a parameter be both const and volatile?
17306
Why use register keyword in C++ code?
17307
What is the use of mutable keyword?
17308
C++ 11 introduces a new keyword. Find out that keyword.
17309
Which one of these is not a keyword?
17310
The following code will fail to compile: template <typename T, typename U> void call_foo(T t, U u) { t.foo<U>(u); } How would you fix this?
17311
If C functions will be called from C++, then C include files will use the following declaration. is this True / False?
17312
Which keyword in C++ 11 is used to prevent a virtual function from being overridden?
17313
In C++11 which data type is newly introduced among these?
17314
What do you understand from lexical analysis?
17315
Does below code compiles successfully on C++11?
17316
What is the correct syntax for lambda expression in C++11?
17317
Which file format is used in Binaries on Linux
17318
Which one of these is not calling convention?
17319
What is true ? when we explicitly declare a function to use the __fastcall convention.
17320
What is the best way to convert int to string according to C++ standard?
17321
A constructor is a special type of?
17322
Which is not an integer data type?
17323
What do you understand by GUI?
17324
Which language is not a true object-oriented programming language?
17325
Estimated C++ users?
17326
Which version of C++ introduced keyword - constexpr?
17327
C++ 17 is also known as ___
17328
Which keyword is used to write Assembly code within a C++ program?
17329
Which of the following is the least safe type casting in C++?
17330
Which of the following is Right Shift operator?
17331
ISO/IEC 14882:1998 represents which version of C++?
17332
What is the latest version of C++?
17333
Are both of the preprocessor directives solving same purpose?
17334
Car contains Engine. Which type of relationship is it?
17335
Which part of memory is used for the allocation of local variables declared inside any function.
17336
hat is the extention of the executable file produced after compiling C/C++ code using g++ on Linux?
17337
Which is the Parent class for all exceptions?
17338
Which exception is thrown when dynamic_cast fails?
17339
Which Exception is thrown when new fails to allocate memory?
17340
Find the output of below program.
17341
How many times CppBuzz.com is printed here?
17342
Find output of below program
17343
Assume all headers are included //What should be printed?
17344
How many times 'its a while loop' should be printed?
17345
What should be printed on screen?
17346
Find the output of below program:-
17347
What should be output of below program if use enter a = 5?
17348
Comma(,) is the operator which has least precdence among all operator.
17349
Which operator has more precedence among the following?
17350
What is Self Referencial Structure?
17351
Which one is more faster?
17352
What is Singleton class?
17353
From which STL we can insert/remove data from anywhere?
17354
Which data structure is used by Map?
17355
Is duplicate data allowed in set?
17356
Can we have constructor as Virtual?
17357
Can we have Pure Virtual Destructor?
17358
Which command is used to identify file type?
17359
Which option of rm command is used to remove a directory with all its subdirectories
17360
Which command creates an empty file if file does not exist?
17361
Which command is used to perform backup in unix?
17362
Which command is used to display disk consumption of a specific directory
17363
Which command is used to extract a column from a text file
17364
Which command is used to extract intermediate result in a pipeline
17365
Which command changes a file’s group owner
17366
What are the advantages of Swift?
17367
Which command is used to view compressed text file contents
17368
What are the control transfer statements used in Swift?
17369
Which command is used to display the octal value of the text
17370
What are the features of Swift Programming?
17371
Find / -name ‘*’ will
17372
How do you declare an Iboutlet property?
17373
Which option of ls command used to view file inode number
17374
Using which command you find resource limits to the session?
17375
What are the characteristics of Switch in Swift?
17376
Which command is used to print a file
17377
Which command is used to display the unix version
17378
Which command is used to display the operating system name
17379
Which command is used to record a user login session in a file
17380
What symbol is used to end a statement, and separate multiple statements in a single line?
17381
What statement is used to introduce a new scope in Swift?
17382
Which command is used to set terminal IO characteristic?
17383
The command “mknod myfifo b 4 16”
17384
The dmesg command
17385
In Swift, a sequence of characters surrounded by double quotes is called a ____.
17386
In Swift, there are three kinds of statements: simple, compiler control,and ____
17387
What Is Bundle In IOS
17388
How do you get help about the command “cp”?
17389
Application Running In Foreground But Currently Not Receiving Any Events .what Is The Current State Of Application?
17390
Which Of The Following Declares A Mutable Array In Swift?
17391
Which among the following is used to write small programs to control Unix functionalities?
17392
What are the sizes of (Integer/Long/Pointer) in LP64 programming model?
17393
Which Of The Following Framework Is Not Used In IOS ?
17394
IOS Is A __software.
17395
Which of the following UNIX flavor is from IBM?
17396
Which of the following statement is FALSE ?
17397
Multitasking In IOS Was Introduced In Which Version?
17398
Which of these is not a Unix Flavor?
17399
What Was The Original Name Of IOS?
17400
SVR4 was developed by
17401
For Unwrapping Value Inside Optional What Should We Use?
17402
Syntax of any Unix command is:
17403
Lp0 device file is used to access:
17404
Which Of The Following Is Incorrect Value Type Of The Swift?
17405
SVR4 stands for?SVR4 stands for?
17406
What Is A LLVM ?
17407
Unix is which kind of Operating System?
17408
Meaning Of IOS Is?
17409
Which of the following is considered as the super daemon in Unix?
17410
Which of the following enables multi-tasking in UNIX?
17411
The system calls in UNIX is written using which language
17412
To Initialize Variable With Null Require...
17413
Which of the following is “NOT” a UNIX variant ?
17414
The Most Recent Version Of MacOS Is Based On ... ?
17415
Solaris is the name of a flavor of UNIX from
17416
If You Do Not Want To Mention External Name In Function Call, Then What Should Be Preceded Before The Parameters While Defining The Function?
17417
Applications communicate with kernel by using:
17418
Which Of The Following Is Incorrect Data Type In SWIFT ?
17419
Which among the following interacts directly with system hardware?
17420
We Can Return Multiple Values In Swift From Function By Using?
17421
Under UNIX the key board is the default input device and the monitor is the default output device
17422
First IOS Was Written In
17423
Double Has A Precision Of At Least _ Decimal Digits In Swift.
17424
Single Unix Specification Version 2 provides enhanced support for
17425
To Create Contants In Swift We Use Keyword ...
17426
Which Of The Following IOS Frameworks Is A Commonly Used Third Party Library
17427
ILP32 stands for
17428
Which is the core of the operating system?
17429
wtmp and utmp files contain
17430
To Create Mutable Object __ Is Used
17431
The IDE Used In Swift Is
17432
At start of process execution, STDOUT & STDERR
17433
IOS Stands For?
17434
To increase the response time and throughput, the kernel minimizes the frequency of disk access by keeping a pool of internal data buffer called
17435
When you use one if or else if statement inside another if or else if statement(s) it is called a/an
17436
The following are assignment operators except
17437
Which of the following is a logical operator?
17438
Which of these is not a type of operator?
17439
Size of each entry in inode table?
17440
The value "nil" represents:
17441
Which of the following is not a Linux command
17442
The default value of Umask is
17443
Which data type is an ordered collection of characters?
17444
Which of the following data types is used to represent a 32-bit floating-point number and numbers with smaller decimal points?
17445
The following are basic data types except:
17446
Which of the following keywords are used in statements?
17447
What is current syntax to export the variable in Linux ?
17448
The following are the keywords used in declarations except
17449
Linux command which print script name when running same script?
17450
Syntax to define array in Bash scripting?
17451
Linux command to print PID of current shell?
17452
Linux command to get first line from any file?
17453
How to check if previous command run successful ?
17454
How to calculate number of passed arguments ?
17455
How to pass argument to a script ?
17456
Which of the following command is used to show current working directory?
17457
What CLI stands for in Linux?
17458
State true of false. In Linux everything is a file (devices, directories, peripherals)
17459
Which of the following account is invalid account in Linux
17460
Which of the following File descriptor is used for standard input ie. STDIN
17461
Which command is used to change the ownership of any file
17462
Linux command to get list of hidden files?
17463
What is Samba?
17464
How to list all installed RPM packages
17465
How to change password of any user in Linux
17466
Which file system is the default type in Linux
17467
All users passwords are stored in
17468
Linux has a command to delete the user with its home directory, the command is
17469
What is the name of Linux Kernel file ?
17470
What is Shell in Linux?
17471
vi command to quit without saving changes in case of accident?
17472
Which of the following command is used to delete a lines to general buffer?
17473
Which of the vi command is used to show line no?
17474
Which of the following is not a valid login shell in Linux?
17475
Which of the following command return exit status of last command?
17476
Which of the following command keep a process running even after you exit from your shell?
17477
On success fork returns?
17478
In which of the following state, the process is terminated but the information is still available in the process table?
17479
Which command is used to get the list of users who are currently logged-in?
17480
Which of the following command is used to record session in Linux?
17481
Which of the following Operating System is not type of Linux?
17482
Which command(s) is/are used to get help about any Linux command?
17483
In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?
17484
What is the purpose of the iconv command?
17485
Which command can be used to delete a group from a Linux system?
17486
Which of the following fields are available in both the global /etc/crontab file as well as in user- specific crontab files?
17487
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?
17488
Which of the following Linux command search forward for string?
17489
Which command create file `b`
17490
Which are the four navigation keys in “vi” editor?
17491
System calls are the classical method of enabling user processes to interact with
17492
What is Linux?
17493
The `else` statement is ___
17494
Which of the following asserts that the variables `A`, `B`, and `C` have unequal values?
17495
Which of these could be a correct way to create an instance of Person?
17496
USERNAME and userName
17497
function foo(){ var tmp = ‘one_two_three_four_five’; return tmp.replace(/_/g, ‘+’); } What does foo() return?
17498
How would one declare a string variable?
17499
Which of these operators compares two variables by value AND type?
17500
How is an object property referenced?
17501
The function call Math.ceil(3.5) returns:
17502
Which of the following invokes a user-defined object constructor function?
17503
Which event fires whenever a control loses focus?
17504
How do you write a conditional statement that will *only* execute the contained code if variable x has a value 5 of type *number*?
17505
Which of the following variable types does not exist in JavaScript?
17506
What is the value of x? var a = false; var x = a ? “A” : “B”;
17507
Which of these is not a logical operator?
17508
To what type are values converted internally when evaluating a conditional statement?
17509
Which of these is a correct method to create a new array?
17510
Which is not a primitive data type in JavaScript?
17511
Primitive types are passed by :
17512
What is the result of the following statement: typeof “x”;
17513
How do you create an object in JavaScript?
17514
What does the following expression return? 1 + 5 + ” bottles of milk”;
17515
Which of the following is a requirement for portability testing for the future of a mobile application?
17516
JavaScript is …
17517
If you are testing how much battery is being used by your application, what are you testing?
17518
Your company has created an application for doing crossword puzzles. The target users are in the age class of over 65 years old. There has already been considerable concentration on creating screens that are easy to navigate and intuitive. It is a primary goal that the software be easy to use. Viewability has been implemented with a revolutionary magnification ability based on moving a magnifying glass across the screen. The beta testers have still had problems using the application, particularly when trying to enter the letters into the squares. Given this information, which area should you target for more complete testing?
17519
You have information from production that the previous version of your product has had a high rate of abandonment after the initial download. In fact, it appears people download the application and never use it. Poor performance is thought to be the main problem that is causing people to give up the application. Which of the following aspects of the application should be specifically targeted for testing to help determine if this is really the problem?
17520
What is the primary use of teststorming?
17521
If your application can only be used within a specific country, what feature of the device might be used to supply information that the application can use to make this determination?
17522
Which of the following types of testing might consider the user’s age?
17523
When conducting security testing on a mobile application, which is the correct set of basic areas to cover?
17524
Correctness can be defined as a combination of which two quality characteristics?
17525
In JavaScript, Window.prompt() method return true or false value ?
17526
You are testing a native application for a smart phone. The application allows the user to make grocery lists on the phone and store up to three lists at a time. A list can contain up to 50 items. Which of the following is the minimum set of test conditions to achieve 100% coverage with the boundary value analysis test technique?
17527
What is mean by "this" keyword in javascript?
17528
Choose the client-side JavaScript object:
17529
Which best explains getSelection()?
17530
Scripting language are
17531
Is it possible to nest functions in JavaScript?
17532
The syntax of close method for document object is ______________
17533
You are testing a native application for a smart phone. The application allows the user to make grocery lists on the phone and store up to three lists at a time. A list can contain up to 50 items. Which of the following is the minimum set of test conditions to achieve 100% coverage with the equivalence partitioning test technique?
17534
The syntax of capture events method for document object is ______________
17535
The syntax of a blur method in a button object is ______________
17536
To open a dialog box each time an error occurs, which of the following is added to prefs.js?
17537
If you are testing a mobile banking application, is it important to test the interaction between the software and the device?
17538
To automatically open the console when a JavaScript error occurs which of the following is added to prefs.js?
17539
The JavaScript exception is available to the Java code as an instance of __________
17540
A ________ object is a reference to one of the classes in a Java package, such as netscape.javascript .
17541
_______ class provides an interface for invoking JavaScript methods and examining JavaScript properties.
17542
In a project that is feature-rich but time-poor, which is the most reasonable approach to risk analysis?
17543
When a JavaScript object is sent to Java, the runtime engine creates a Java wrapper of type ___________
17544
In JavaScript, _________ is an object of the target language data type that encloses an object of the source language.
17545
To enable data tainting, the end user sets the _________ environment variable.
17546
____________ is the tainted property of a window object.
17547
Which tag(s) can handle mouse events in Netscape?
17548
. To set up the window to capture all Click events, we use which of the following statement?
17549
Which of the following requirements documents would be the best source to determine normal usage scenarios?
17550
The _______ method of an Array object adds and/or removes elements from an array.
17551
How to create a Date object in JavaScript?
17552
If you are testing a mobile application that is not safety-critical, which lifecycle model is most likely to be used?
17553
Which of the following is the structure of an if statement?
17554
You are testing an application for a smart phone. You have determined that you only need to test one device from the target family of devices because the behavior of all devices in that family will be the same for this application. This is an example of what test design technique?
17555
Using _______ statement is how you test for a specific condition.
17556
JavaScript is interpreted by _________
17557
If an application resides on the mobile device and was written specifically for that device, what type of application is it?
17558
The syntax of Eval is ________________
17559
Which of the following event fires when the form element loses the focus: <button>, <input>, <label>, <select>, <textarea>?
17560
What types of testing are particularly important for mobile applications based on the user’s expectations?
17561
______method evaluates a string of JavaScript code in the context of the specified object.
17562
Which of the following is not considered a JavaScript operator?
17563
Choose the client-side JavaScript object?
17564
Choose the server-side JavaScript object?
17565
Which of the following best describes JavaScript?
17566
JavaScript entities start with _______ and end with _________.
17567
If para1 is the DOM object for a paragraph, what is the correct syntax to change the text within the paragraph?
17568
What does the <noscript> tag do?
17569
Which is the correct way to write a JavaScript array?
17570
Which of the following navigator object properties is the same in both Netscape and IE?
17571
Which types of image maps can be used with JavaScript?
17572
What is the correct syntax for referring to an external script called " abc.js"?
17573
Inside which HTML element do we put the JavaScript?
17574
Which of the following way can be used to indicate the LANGUAGE attribute?
17575
What is the correct JavaScript syntax to write "Hello World"?
17576
Which of the following attribute can hold the JavaScript version?
17577
How does JavaScript store dates in a date object?
17578
______ tag is an extension to HTML that can enclose any number of JavaScript statements.
17579
Which of the following is not a valid JavaScript variable name?
17580
Which of the following are capabilities of functions in JavaScript?
17581
Which of the following can't be done with client-side JavaScript?
17582
_____ JavaScript statements embedded in an HTML page can respond to user events such as mouse-clicks, form input, and page navigation.
17583
What are variables used for in JavaScript Programs?
17584
__________ JavaScript is also called server-side JavaScript.
17585
______ JavaScript is also called client-side JavaScript.
17586
When a user views a page containing a JavaScript program, which machine actually executes the script?
17587
Why so JavaScript and Java have similar name?
17588
Which CSS has highest priority?
17589
What is default value of position property?
17590
Browser Object Model(BOM) allows JavaScript to “talk to” the browser
17591
Triple equal sign === checks for equal value and equal type. State true or false
17592
Which property controls scrolling of an image in background?
17593
Which of the following tag is used to draw graphics on the fly in Javascript?
17594
Which event occurs when the value of an element has been changed?
17595
Which attribute specifies the stack order of an element?
17596
What if you use parseInt() to convert a string containing decimal value?
17597
Which of the following is not a built-in String method in Javascript?
17598
setInterval method calls a function repeatedly at a set time interval. State true or false
17599
The shift method the first element of an array and returns the removed value. State true or false
17600
Which of the following method checks if its argument is not a number?
17601
Which one of the following is not a popup box in JavaScript?
17602
When the user is working with timing events in Javascript, select the event that would cancel the setTimeout()
17603
The event specific to keyboard is
17604
To create an image rollover which events need to be used
17605
If an exception is thrown, the statements in the finally block execute even if no catch block handles the exception. State true or false
17606
Does JavaScript allow exception handling
17607
In JavaScript, data stored in an array always have to be the same data type State True or False
17608
In JavaScript, Arrays are data type. State True or False
17609
Choose the method which Joins all elements of an array into a string
17610
______ attribute used in <table> element sets the width, in pixels, between the edge of a cell and its content
17611
JavaScript is a case-sensitive language
17612
______ element in HTML5 is used to indicate that text has been added to the document.?
17613
We can use the === (equality) operator to compare a variable with a string, Can we use it to compare two numbers?
17614
A prompt box asks the user for some information and provides a response field for the answer
17615
Javascript string using double quotes is exactly the same as a string using single quotes
17616
Which one is standard way to show popup in Java Script?
17617
Choose the correct HTML element to define important text?
17618
Which HTML element is used to display a scalar measurement within a range?
17619
Which tag is used to specify a list of prefined options for input controls?
17620
Which tag is used to create clickable link?
17621
A ___________ consist of a property and a value,
17622
What does the ID selector do?
17623
In what form are style rules presented?
17624
Which values for font-family property is valid?
17625
Which property applies a color to text?
17626
What is the correct CSS syntax to make all paragraph (p) elements bold?
17627
What is the default margin of the body element?
17628
Where in HTML document is the conventionally correct place to put reference to an external style sheet?
17629
Which is the correct syntax to set the unordered-list item marker to a square.
17630
What is the correct representation to change the color of h2 element?
17631
If "padding: 10px 5px 20px 0px" is given. What does this represent?
17632
How do we add a comment in CSS file?
17633
Which of the following is the correct HTML element to define emphasized text?
17634
Select the correct among the following for linking an external style sheet.
17635
Which of the following is the correct CSS syntax?
17636
Which HTML tag is used for internal style sheet?
17637
Which one of the following is the correct way of adding Inline styles.
17638
Using padding clears the area outside:
17639
Which among the following is a correct way to open a Hyperlink in new tab?
17640
Which HTML element is used for Important text?
17641
How many different styling techniques are used in CSS?
17642
What is the full form of CSS?
17643
Which among the following is the correct way in HTML to insert an image?
17644
Which of the following elements can be used in HTML to create a table?
17645
Which tag is used to add an header in HTML5 table?
17646
Which tag is used for creating a drop-down selection list?
17647
Which among the following is correct HTML code for making a checkbox?
17648
Which of the following is the correct way to add background color in HTML?
17649
Which of the following attributes is used to open an hyperlink in new tab?
17650
Which of the following tags is used to add a line-break in HTML?
17651
Which of the following tags is used to make a portion of text italic in HTML?
17652
What is the purpose of using div tags in HTML?
17653
Which of the following is the correct way of creating an hyperlink in HTML?
17654
Which of the following attributes is used to add link to any element?
17655
How many attributes are there in HTML5?
17656
How many heading tags are there in HTML5?
17657
What is the font-size of the h1 heading tag?
17658
Which of the following characters indicate closing of a tag?
17659
Which of the following HTML element is used for creating an unordered list?
17660
Which of the following HTML Elements is used for making any text bold ?
17661
How is document type initialized in HTML5.?
17662
Which of the following method is used to query documents in collections?
17663
Command to check existence of collection is _____________
17664
Which of the following also returns a list of databases?
17665
Which of the following operation is used to switch to new database mydb?
17666
___________ command display the list of databases.
17667
After starting the mongo shell, your session will use the ________ database by default.
17668
mongo looks for a database server listening on port 27017 on the ________ interface.
17669
__________ is a part of the standard MongoDB distribution and provides a full JavaScript environment.
17670
____________ utility makes it possible to manipulate files stored in your MongoDB instance in GridFS objects from the command line.
17671
Which of the following is a utility to check disk I/O performance independently of MongoDB?
17672
_________ is a diagnostic tool for inspecting BSON files.
17673
__________ is the primary daemon process for the MongoDB system
17674
__________ sends all diagnostic logging information to a log file instead of to standard output or to the host’s syslog system.
17675
___________ is a routing service for MongoDB shard configurations that processes queries from the application layer.
17676
To backup all the databases in a cluster via mongodump, you should have the ___________ role.
17677
____________ does not dump the content of the local database.
17678
Can I play audios in HTML?
17679
Sometimes mongod.exe is visible on public networks without running in _________ Mode with the auth setting.
17680
<meta> tag cannot be defined in the <head> tag.
17681
MongoDB is installed unattended on Windows from the command line using ____________
17682
___________ allows you to scale your cluster linearly by adding more machines.
17683
While searching on the Internet, you decide to check in more than one search engine because?
17684
User account running mongod has _______ permissions for the directory.
17685
Which of the following file is not a MongoDB configuration file?
17686
ASCII stands for______
17687
The MongoDB process listens on port _________ by default.
17688
The MongoDB instance stores its _________ files in /var/lib/mongo by default.
17689
For frames in HTML, how do you specify the rest of the screen?
17690
What are meta tags used for?
17691
To install the latest stable version of MongoDB on SUSE, issue ______________
17692
When creating a Web document, what format is used to express an image's height and width?
17693
How can we resize the image?
17694
What are <div> tags used for?
17695
____________ package contains the mongo shell.
17696
mongod process is stopped by issuing which of the following command?
17697
Command to install the latest stable version of MongoDB Enterprise in Ubuntu is ______________
17698
Is width=”100” and width=”100%” the same?
17699
Which of the following is the Ubuntu package management tool?
17700
MongoDB only provides Enterprise packages for Ubuntu ________ LTS.
17701
The href attribute in the link tag specifies the:
17702
Which of the following is not a part of mongodb-enterprise-tools?
17703
______ package contains the mongod daemon and associated configuration and init scripts.
17704
Which of the following is a metapackage for enterprise?
17705
Text/Html is called the __________ of the page
17706
_____________ is a native OS-X-application for MongoDB management.
17707
Which of the following tool can be used to reload a database dump?
17708
Which of the following is used for creating a binary export of the contents of a Mongo database?
17709
What is mean by DTD ?
17710
__________ is a command-line utility to import content from a JSON, CSV, or TSV.
17711
___________ manipulate files stored in your MongoDB instance in GridFS.
17712
Point out the wrong statement.
17713
DOM stands for
17714
Which of the following network analyzer fully supports MongoDB?
17715
Which of the following is simplest tool for installation of MongoDB?
17716
Which of the following is used increase the col width?
17717
Which of the following provides low-level tracing/sniffing view into database activity?
17718
Which of the following is used increase the row height?
17719
mongosniff requires the ___________ network library and is only available for Unix-like systems.
17720
Which of the following tool is similar to the UNIX/Linux top utility?
17721
mongostat tool is similar to the UNIX/Linux _________ utility.
17722
Caption Tag in HTML ?
17723
___________ is a command-line tool that displays a summary list of status statistics for a currently running MongoDB instance.
17724
___________ provides statistics on the per-collection level.
17725
Which of the following is valid colour code ?
17726
Which of the following is web-based client software for MongoDB?
17727
Administrative information in MongoDB can also be accessed through _____________
17728
Which of the following attributes comes in handy when borders have to be put between groups of columns instead of every column?
17729
What is the interactive shell for MongoDB called?
17730
HTML Code written in MAC can be browsed in a PC with Window 7 installed , User will be able to see same design that was designed on the MAC Pc.
17731
Who was the primary author of HTML?
17732
HTML program is saved using _________ extension.
17733
HTML stands for ________.
17734
Opening Tag of HTML Tag is called as ________.
17735
What is the difference between XML and HTML?
17736
NoSQL databases is used mainly for handling large volumes of ______________ data.
17737
________ stores are used to store information about networks, such as social connections.
17738
Which of the following are the simplest NoSQL databases?
17739
Most NoSQL databases support automatic __________ meaning that you get high availability and disaster recovery.
17740
How to you modify a border image using CSS3?
17741
“Sharding” a database across many server instances can be achieved with _______________
17742
Which of the following is a wide-column store?
17743
Which of the following is a NoSQL Database Type?
17744
Point out the correct statement.
17745
Which of the following is not a NoSQL database?
17746
How to rotate objects using CSS3?
17747
MongoDB uses a ____________ lock that allows concurrent read access to a database but exclusive write access to a single write operation.
17748
MongoDB supports fixed-size collections called ____________ collections.
17749
Has CSS3 been fully supported by all browsers?
17750
_____________ can be used for batch processing of data and aggregation operations.
17751
MongoDB can be used as a ____________ taking advantage of load balancing and data replication features over multiple machines for storing files.
17752
MongoDB scales horizontally using _________ for load balancing purpose.
17753
___________ replicas maintain a copy of the data on the primary using built-in replication.
17754
MongoDB provides high ____________ with replica sets.
17755
With ________ MongoDB supports a complete backup solution and full deployment monitoring.
17756
Dynamic schema in MongoDB makes ____________ easier for applications.
17757
How do four values work on border-radius
17758
MongoDB is a _________ database that provides high performance, high availability, and easy scalability.
17759
MongoDB has been adopted as ________ software by a number of major websites and services.
17760
Initial release of MongoDB was in the year?
17761
Point out the wrong statement.
17762
Can you have multiple box-shadows?
17763
MongoDB Queries can return specific fields of documents which also include user-defined __________ functions.
17764
Which of the following format is supported by MongoDB?
17765
What are the first three values of text-shadow in order?
17766
Point out the correct statement.
17767
Which of the following language is MongoDB written in?
17768
What does the a stand for in RGBa?
17769
Which prefix do you need to get CSS3 properties to work on older Mozilla Firefox browsers?
17770
If you put a value of 0 for a Border-Radius what will happen?.
17771
Box-Shadow is a property that allows developers to apply a....
17772
__________ is a property that allows developers to add rounded corners on the design elements.
17773
What does RGBa mean?
17774
True or False. In vertical offsets for box shadows, the (-1) means that the box-shadow will be below the box?
17775
Does the box-shadow support all browsers ?
17776
Look at the code. What piece of code is missing when make a text shadow? #basicTextShadow p{ text-shadow: 1px 1px 3px; }
17777
How to create transition effects using CSS3?
17778
____________________sorting is not supported by MongoDB.
17779
The application, that communicates with application MongoDB by way of a client library, is called _________________
17780
How to re-size/scale objects using CSS3?
17781
which field is always the first field in the document.?
17782
Howmany byte counter in BSON is starting with a random value ?
17783
How to rotate objects using CSS3?
17784
In which format MongoDB represents document structure?
17785
Which of these are valid CSS3 transformation statements.
17786
Is MongoDB better than other SQL databases?
17787
Which of the following is correct option ?
17788
How to force a word wrap using CSS3?
17789
Which is not a supported index type in MongoDB?
17790
A collection in MongoDB is a group of ......................
17791
How to add text shadow using CSS3?
17792
How to resize a background image using CSS3?
17793
How to you modify a border image using CSS3?
17794
How do you add shadow to elements in CSS3?
17795
Hidden member is used to support dedicated functions, such as backup or reporting.
17796
How can you created rounded corners using CSS3?
17797
Which statements is correct about mongoose in MongoDB ?
17798
What is the good alternatives to MongoDB?
17799
The concatenation of the collection name and database name is called a -
17800
what is MongoDB?
17801
Does MongoDB supports query joins between collections ?
17802
in how much time the MongDB writes are written to the journal?
17803
A collection and a document in MongoDB is equivalent to............. concepts respectively.
17804
In which year the MongoDB was Initial release?
17805
Which of the foliowing is wrong statement -
17806
The MongoDB is written in .................... language.
17807
______________ rolls back all transactions that were incomplete at the time of crash.
17808
__________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.
17809
___________ determines which transactions to undo, which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.
17810
The __________________ contains a list of pages that have been updated in the database buffer.
17811
There are special redo-only log records generated during transaction rollback, called _________ in ARIES.
17812
Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the _______ field of the page.
17813
__________ scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.
17814
______________ is used to minimize unnecessary redos during recovery.
17815
ARIES uses a ___________ to identify log records, and stores it in database pages.
17816
If ___________ are not obtained in undo operation it will cause problem in undo-phase.
17817
For correct behaviour during recovery, undo and redo operation must be
17818
Shadow paging has
17819
Immediate database modification technique uses
17820
An operation is said to be __________ if executing it several times in a row gives the same result as executing it once.
17821
To perform logical redo or undo, the database state on disk must be operation ___________ that is, it should not have partial effects of any operation.
17822
Redo operations are performed exclusively using
17823
Which of the following is used for undo operations alone?
17824
Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called
17825
Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.
17826
If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is
17827
A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is
17828
A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is
17829
A _______________ configuration can make takeover by the backup site almost instantaneous.
17830
The time to process the remote backup can be reduced by
17831
The simplest way of transferring control is for the old primary to receive __________ from the old backup site.
17832
When the __________ the backup site takes over processing and becomes the primary.
17833
The backup is taken by
17834
Remote backup system must be _________ with the primary site.
17835
The remote backup site is sometimes also called the
17836
How can you find rows that do not match some specified condition?
17837
The EXISTS keyword will be true if:
17838
Which of the following is not an aggregate function?
17839
Subqueries cannot:
17840
In the query given above which one of the following is a temporary relation?
17841
Which of the following creates a temporary relation for the query on which it is defined?
17842
The ________ keyword is used to access attributes of preceding tables or subqueries in the from clause.
17843
Aggregate functions can be used in the select list or the_______clause of a select statement or subquery. They cannot be used in a ______ clause.
17844
SQL applies predicates in the _______ clause after groups have been formed, so aggregate functions may be used.
17845
We can test for the nonexistence of tuples in a subquery by using the _____ construct.
17846
The phrase “greater than at least one” is represented in SQL by _____
17847
The ____ connective tests for set membership, where the set is a collection of values produced by a select clause. The ____ connective tests for the absence of set membership.
17848
A Boolean data type that can take values true, false, and________
17849
All aggregate functions except _____ ignore null values in their input collection.
17850
The result of _____unknown is unknown.
17851
The primary key must be
17852
Using the ______ clause retains only one copy of such identical tuples.
17853
In an employee table to include the attributes whose value always have some value which of the following constraint must be used?
17854
The predicate in a where clause can involve Boolean operations such as and. The result of true and unknown is_______ false and unknown is _____ while unknown and unknown is _____
17855
If the attribute phone number is included in the relation all the values need not be entered into the phone number column. This type of entry is given as
17856
A _____ indicates an absent value that may exist but be unknown or that may not exist at all.
17857
The _____________ is essentially used to search for patterns in target string.
17858
_________ joins are SQL server default
17859
_____ clause is an additional filter that is applied to the result.
17860
The number of attributes in relation is called as its
17861
If we want to retain all duplicates, we must write ________ in place of union.
17862
The union operation automatically __________ unlike the select clause.
17863
The intersection operator is used to get the _____ tuples.
17864
The union operation is represented by
17865
_____ operator is used for appending two strings.
17866
In SQL the spaces at the end of the string are removed by _______ function.
17867
’_ _ _ ’ matches any string of ______ three characters. ’_ _ _ %’ matches any string of at ______ three characters.
17868
In the given query which of the keyword has to be inserted?
17869
Which of the following statements contains an error?
17870
Which of the following fields are displayed as output?
17871
This Query can be replaced by which one of the following?
17872
The ________ clause is used to list the attributes desired in the result of a query.
17873
The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predicate.
17874
Here which of the following displays the unique values of the column?
17875
Updates that violate __________ are disallowed.
17876
This command performs which of the following action?
17877
To remove a relation from an SQL database, we use the ______ command.
17878
An attribute A of datatype varchar(20) has the value “Avi”. The attribute B of datatype char(20) has value ”Reed”. Here attribute A has ____ spaces and attribute B has ____ spaces.
17879
The basic data type char(n) is a _____ length character string and varchar(n) is _____ length character.
17880
What type of statement is this?
17881
Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database?
17882
Which one of the following is used to define the structure of the relation, deleting relations and relating schemas?
17883
The _________ provides a set of operations that take one or more relations as input and return a relation as an output.
17884
A ________ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys.
17885
The _______ operator takes the results of two queries and returns only rows that appear in both result sets.
17886
The most commonly used operation in relational algebra for projecting a set of tuple from a relation is
17887
The _______operation performs a set union of two “similarly structured” tables
17888
The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match.
17889
The_____ operation allows the combining of two relations by merging pairs of tuples, one from each relation, into a single tuple.
17890
Which one of the following is a procedural language?
17891
Student(ID, name, dept name, tot_cred) In this query which attributes form the primary key?
17892
Using which language can a user request information from a database?
17893
A _________ integrity constraint requires that the values appearing in specified attributes of any tuple in the referencing relation also appear in specified attributes of at least one tuple in the referenced relation.
17894
The ______ is the one in which the primary key of one relation is used as a normal attribute in another relation.
17895
The relation with the attribute which is the primary key is referenced in another relation. The relation which has the attribute as a primary key is called
17896
An attribute in a relation is a foreign key if the _______ key from one relation is used as an attribute in that relation.
17897
Which one of the following cannot be taken as a primary key?
17898
Which one of the following attribute can be taken as a primary key?
17899
A _____ is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.
17900
The subset of a super key is a candidate key under what condition?
17901
Consider attributes ID, CITY and NAME. Which one of this can be considered as a super key?
17902
Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?
17903
The tuples of the relations can be of ________ order.
17904
A domain is atomic if elements of the domain are considered to be ____________ units.
17905
Department (dept name, building, budget) and Employee (employee_id, name, dept name, salary) Here the dept_name attribute appears in both the relations. Here using common attributes in relation schema is one way of relating ___________ relations.
17906
Course(course_id,sec_id,semester) Here the course_id,sec_id and semester are __________ and course is a _________
17907
For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.
17908
The term attribute refers to a ___________ of a table.
17909
The term _______ is used to refer to a row.
17910
A ________ in a table represents a relationship among a set of values.
17911
A relational database consists of a collection of
17912
Which one of the following statement is not correct for Digital signature?
17913
The convenient place to store contact information for quick retrieval is
17914
Messenger Mailbox is present in
17915
The E-mail component of Internet Explorer is called
17916
SMTP stands for
17917
The program supplied by VSNL when you ask for Internet connection for the e-mail access is
17918
E-mail address is made up of
17919
A popular application of computer networking is the world wide web of newsgroup called
17920
A simple protocol used for fetching e-mail from a mailbox is
17921
SMTP is a simple
17922
Most new readers present newsgroups articles in
17923
What is Usenet?
17924
IRC stands for
17925
Telnet is no versatile that you can establish Telnet session on one of the following types of communication:
17926
The Unix command tty (option) that displays the pathname of your terminals and prints synchronous line number of the device is given by the option:
17927
Name the software which comes with a basic telnet client package:
17928
To use Telnet and the host’s resources, you will need to know
17929
The Telnet protocol assumes that each end of the connection – the client and the server – is
17930
File to the Web site is transferred by using:
17931
The Internet standard is
17932
FTP is used for
17933
The Internet Protocol (IP)
17934
World Wide Web pages can be described as multimedia pages. This means that the pages may contain
17935
A host on the Internet finds another host by its
17936
For a small Web site, one needs to buy space from the
17937
Which of the following topology is least affected by addition/removal of a node?
17938
The network where all the nodes are around a central server is a
17939
Cell based architecture is known as
17940
Main protocol used in Internet
17941
Which of the following topology share a single channel on which all station can receive and transmit?
17942
Which of the following networking solution is suitable for networking in a building?
17943
Computers on the Internet owned and operated by education institution form part of the
17944
A small network making up the Internet and also having a small numbers of computers within it is called
17945
The ground station in VSAT communication is called
17946
In reality, Internet Protocol recognizes only
17947
In MODEMS
17948
Internet is governed by
17949
Web site is a collection of
17950
If a class(has one virtual function) has 5 Objects then how many Vtable it will have?
17951
Is it mandatory to override virtual function in Derived class?
17952
Can we call virtual function using object?
17953
Can we have pure Virtual Destructor?
17954
Can we have Virtual Destructor ?
17955
What is dangling pointer?
17956
How many Access specifier are there in C++?
17957
Can this pointer point to another class?
17958
What is VTable?
17959
Can we overload Constructor?
17960
Can we reinitialize reference variable?
17961
Can we create Nested classes in C++?
17962
Can we create pointer to Abstract class?
17963
Can we reference a pointer
17964
Can we have Constructor in Abstract class?
17965
Is there any difference in below two statements?
17966
Can we create object of Abstract class?
17967
How to stop Name Mangling in C++?
17968
Is it good idea to return an address or a reference of a local variable?
17969
Is const better than #define?
17970
Which of the following is Memory Leak detection tool?
17971
Exceptions are Caught at ?
17972
Can we create array of reference?
17973
When can we have two classes with same name?
17974
Can we create our own workspace?
17975
Can we assign null to void pointer?
17976
Can a class contain another class in it ?
17977
What is the size of empty class?
17978
What is abstract class?
17979
How many object can be created of a Class in C++?
17980
When Virtual Table is created?
17981
C++ is superset of which langauge?
17982
What is size of void in C++?
17983
What should be the output?
17984
Can any function call itself?
17985
What is size of void in bytes?
17986
Can a Structure contain pointer to itself?
17987
Can a for loop contain another for loop?
17988
What is the full form of oop
17989
What is the value of a in below program?
17990
Which operator has highest precedence?
17991
Which operator has highest precedence in * / % ?
17992
How to access and edit data in data file handling using structures
17993
What is output of below program?
17994
How many times CppBuzz.com is printed?
17995
Can we overload functions in C++?
17996
What is currect syntax of for loop?
17997
Can we typecast void * into int *?
17998
What should be the output of below program?
17999
Which operator has more precedance in below list?
18000
Which operator can not be overloaded?
18001
What is size of int data type in cpp?
18002
What following operator is called ?:
18003
What is the output of below program?
18004
How many loops are there in C++ 98?
18005
Voice mail, E-mail, Online service, the Internet and the WWW are all example of
18006
The first page that you normally view at a Website is its
18007
TCP is a commonly used protocol at
18008
Which of the following protocols is used for WWW ?
18009
The first network that planted the seeds of Internet was
18010
The communication protocol used by Internet is
18011
A user can get files from another computer on the Internet by using
18012
The server on the Internet is also known as a
18013
The process of keeping addresses in memory for future use is called
18014
The equipment needed to allow home computers to connect to the Internet is called a
18015
A computer on internet are identified by
18016
Moving from one website to another is called
18017
Full form of HTML is
18018
What is the full form of WWW in web address ?
18019
Internet explorer falls under
18020
Verification of a login name and password is known as
18021
Which one of the following is not a search engine?
18022
A Web site's front page /main page is called
18023
In internet terminology IP means
18024
The process of transferring files from a computer on the Internet to your computer is called
18025
The computer jargon - WWWW, stands for
18026
HTML is used to create
18027
Which of the following is a correct format of Email address?
18028
The Internet was originally a project of which agency?
18029
Free of cost repair of software bug available at Internet is called
18030
Which of the following layer in Web Service Protocol Stack is responsible for centralizing services into a common registry and providing easy publish/find functionality?
18031
Which of the following component of Web service describes interfaces to web services?
18032
Which of the following is correct about SOAP?
18033
How response is sent in XML-RPC?
18034
What SOAP stands for?
18035
Which of the following layer in Web Service Protocol Stack is responsible for encoding messages in a common XML format so that messages can be understood at either end?
18036
What HTTP stands for?
18037
Which of the following role of web service architecture implements the service and makes it available on the Internet?
18038
_________ is a directory for storing information about web services.
18039
SOAP is a W3C standard ! (True / False)
18040
SOAP is a format for sending messages and is also called as __________.
18041
SOAP is platform ___________.
18042
SOAP is a _________.
18043
SOAP is an _________ to let applications exchange information over HTTP.
18044
Web Services is used to -
18045
Web services use ________ to code and to decode data.
18046
Web-applications were developed in order to interact _____________ .
18047
Long form of SOAP is ______________.
18048
UDDI Stands for ______________________.
18049
WSDL Stands for ______________________.
18050
Which of the following is considered as Web Service Platform Elements ?
18051
__________ is the basis for Web services.
18052
Web services can be discovered using ________.
18053
Web services are self-contained and self-describing ! (True / False)
18054
Web services communicate using __________.
18055
The basic Web Services platform is combination of _____ and _______.
18056
Web Services are _______________.
18057
_______________ is used to convert your application into Web-Application.
18058
For implementation of web services, widely used approaches are of type
18059
Simpler approach of implementing a web service is named as
18060
Factory to use our Spring bean as the implementation
18061
The standard for deploying web services on the Java EE platform as of Java EE 1.4
18062
A more complex approach for web service implementation, is referred to as
18063
XML digital signatures provide
18064
Which of the following style(s) is/are Strictly WS-I compliant?
18065
Web services can be discovered using ________
18066
Which of the following is correct about Service Description layer in Web Service Protocol Stack?
18067
The basic Web Services platform is combination of _____ and _______
18068
n contrast, the contract-first approach encourages you to think of the service contract first in terms of
18069
_______ is used to convert your application into Web-Application.
18070
_______ is used to convert your application into Web-Application.
18071
How deep learning models are built on Keras
18072
Which tool is a deep learning wrapper on TensorFlow
18073
Can we use GPU for faster computations in TensorFlow
18074
C=-tf.reduce_sum(Y*tf.log(out))
18075
out=tf.sigmoid(tf.add(tf.matmul(X,W), b))
18076
How do you feed external data into placeholders?
18077
How do we perform caculations in TensorFlow?
18078
Why Tensorflow uses computational graphs?
18079
Can we have multidimentional tensors
18080
Which tool is NOT Suited for building ANN models
18081
What is the meaning of model=sequentil() in Keras?
18082
Kears is a deep learning framework on which tool
18083
How can we improve the calculation speed in TensorFlow, without losing accuracy?
18084
tf.reduce_sum(tf.square(out-Y))
18085
out=tf.add(tf.matmul(X,W), b)
18086
What does feed_dict do?
18087
In TensorFlow, what is the used of a session?
18088
How calculations work in TensorFlow
18089
A tensor is similar to
18090
Which tool is best suited for solving Deep Learning problems
18091
Which of following functions should not be used at the output layer to classify an image?
18092
If it is wished to predict the probabilities of n classes (p1, p2..pk) such that sum equals to unity, which of the following can be used as an activation function?
18093
The nodes in the i/p layer is 10 and that in the hidden layer is 5. The max connections from the i/p layer to the hidden layer are?
18094
From the following choices where can deep learning be used?
18095
While creating the Bayesian network, the relation between a node and its predecessor is?
18096
In the full joint probability distribution, how can the entries be calculated?
18097
The network that involves feedback links from o/p to i/p and hidden layers is called as
18098
Fill in the blank with the correct choice from the options given. Neural Networks are complex functions with many parameters.
18099
The number of 3-D image processing techniques that are present in image perception?
18100
What kind of signal is used in speech recognition?
18101
Plasticity in neural networks is?
18102
If degree 4 polynomial is fitted in linear regression, what will happen?
18103
Which of the following statement is correct in regard to outliers in Linear regression?
18104
Which of the following is accurate with respect to Normal Equation?
18105
Which of the following evaluation metrics can be used to evaluate a model while modeling a continuous output variable?
18106
In backpropagation rule, how can the learning be stopped?
18107
A format will modify both the stored value and the displayed value.
18108
What are the general limitations of back propagation rule?
18109
Considering backpropagation, which of the following options is true?
18110
What of the following is accurate in regard to backpropagation algorithm?
18111
What results in minimization of errors among the favored & real outputs?
18112
Delta learning is of the unsupervised kind?
18113
What changed into the second stage in perceptron version known as?
18114
False minima may be reduced through deterministic updates?
18115
For practical implementation what type of approximation is used on Boltzmann law?
18116
Which of the following option is true about the ok-NN set of rules?
18117
Which of the following distance metric cannot be utilized in k-NN?
18118
k-NN set of rules does more computation on check time rather than train time.
18119
Which of the subsequent is a way regularly utilized in TensorFlow and system learning?
18120
Although system getting to know is an interesting concept, there are restrained business programs wherein it's miles beneficial.
18121
NumPy is imported as?
18122
TensorFlow is imported as?
18123
Growth in length of a convolutional kernel might always boom the performance of a convolutional community.
18124
The trouble you are trying to remedy has a small amount of records. Luckily, you have a pre-educated neural community that turned into educated on a similar problem. Which of the following methodologies could you choose to utilize this pre-skilled community?
18125
What are the elements to choose the intensity of the neural network?
18126
For a photo reputation problem (spotting a cat in a photograph), which architecture of neural network might be higher suited to remedy the trouble?
18127
For a category task, in place of random weight initializations in a neural network, we set all the weights to zero. Which of the subsequent statements is authentic?
18128
Which gradient approach is finer whilst the facts is too massive to address in RAM simultaneously?
18129
While pooling layer is introduced in a convolutional neural network, translation in-variance is preserved. Genuine or fake?
18130
Assume a convolutional neural community is educated on ImageNet dataset (item reputation dataset). This skilled model is then given a totally white image as an enter. The output probabilities for this enter might be same for all lessons. Real or false?
18131
What if we use a gaining knowledge of fee that’s too huge?
18132
Which of the subsequent assertion is the high-quality description of early stopping?
18133
What's a lifeless unit in a neural community?
18134
A numeric variable can shop numeric values with a maximum of eight digits.
18135
Y = ax^2 + bx + c (polynomial equation of degree 2)Can this equation be represented via a neural network of a single hidden layer with linear threshold?
18136
In a neural network, which of the subsequent strategies is used to deal with overfitting in TensorFlow?
18137
14 The variety of neurons inside the output layer must in shape the wide variety of instructions (in which the variety of lessons is extra than 2) in a supervised studying project in TensorFlow. Real or false?
18138
As opposed to trying to acquire absolute 0 error, we set a metric called Bayes blunders that's the error we hope to achieve. What may be the cause for the use of Bayes blunders in TensorFlow?
18139
Batch Normalization is useful due to the fact?
18140
Wherein neural internet architecture, does weight sharing occur in TensorFlow?
18141
Can a neural network model the characteristic (y=1/x) in TensorFlow?
18142
Suppose that you have to limit the value feature via converting the parameters. Which of the subsequent approach could be used for this in TensorFlow?
18143
What's the series of the following duties in a perceptron in tensorflow?
18144
In case you growth the range of hidden layers in a Multi-Layer Perceptron, the category errors of check facts always decreases in TensorFlow. Authentic or fake?
18145
Which of the following is authentic approximately model capability (in which version capacity method the potential of the neural community to approximate complex capabilities) in TensorFlow?
18146
Which of the following techniques perform comparable operations as the dropout in a neural community in TensorFlow?
18147
“Convolutional Neural Networks can carry out various forms of transformation (rotations or scaling) in an enter”. Is the assertion correct true or false in TensorFlow?
18148
What are the stairs for the usage of a gradient descent algorithm in TensorFlow?
18149
In TensorFlow, knowing the weight and bias of each neuron is the maximum crucial step. If you could by some means get the best fee of weight and bias for each neuron, you may approximate any characteristic. What will be the first-class way to technique this?
18150
Which of the subsequent declaration(s) effectively represents an actual neuron in TensorFlow?
18151
Which of the subsequent declaration(s) effectively represents an actual neuron in TensorFlow?
18152
Which of the subsequent declaration(s) effectively represents an actual neuron in TensorFlow?