|
S. No.
|
Question
|
|---|---|
|
1
|
Which of the following does NOT help with mobile data security?
|
|
2
|
What is the full form of WSDL? Continue reading at https://www.trenovision.com/web-services-quiz/
|
|
3
|
Which of the following is a major role within the web service architecture?
|
|
4
|
What is the root element of all WSDL documents?
|
|
5
|
Which of the following associates the web service binding with the URI where the running service can be accessed?
|
|
6
|
Which element describes the data being exchanged between the web service providers and the consumers?
|
|
7
|
Which java tool is used to generate java artifacts from wsdl?
|
|
8
|
What is the Java API specification for web services using SOAP?
|
|
9
|
Which of the following describes how to access a web service and what operations it will perform?
|
|
10
|
Which of the following is an XML-based protocol for exchanging information via web services? Continue reading at https://www.trenovision.com/web-services-quiz/
|
|
11
|
How do you pass the information about a member to an operation?
|
|
12
|
Which segment contains information about different segments in the database?
|
|
13
|
A segment maps to ___ of the database
|
|
14
|
A client to web services
|
|
15
|
Web services are built on which framework?
|
|
16
|
UDDI is used for listing what ______ are available.
|
|
17
|
Which of the following is correct about Service Description layer in Web Service Protocol Stack?
|
|
18
|
In contrast, the contract-first approach encourages you to think of the service contract first in terms of
|
|
19
|
This XML extension is a standard way to describe how to transform the structure of an XML document into an XML document with a different structure.
|
|
20
|
This term encompasses the plans, methods, and tools aimed at modernizing,consolidating, and coordinating the computer applications in an enterprise.
|
|
21
|
This application program interface (API) from Sun Microsystems supports messaging between computers in a network.
|
|
22
|
This is a data structure representing a service type in a Universal Description, Discovery, and Integration registry.
|
|
23
|
This method ensures that each XML element type and attribute name has a unique identity.
|
|
24
|
This platform simplifies application development and decreases the need for programming and programmer training by creating standardized,reusable modular components.
|
|
25
|
This XML-based registry is intended as on online Internet registry for businesses worldwide.
|
|
26
|
This XML-based language is used to describe the services a business offers and to provide a way for individuals and other businesses to access those services electronically.
|
|
27
|
This lightweight protocol provides a way for programs to interact with each other, even if using different operating systems and located behind a firewall.
|
|
28
|
This markup language is considered to be extensible because of its unlimited and self-defining markup symbols.
|
|
29
|
If incremental aggregation option is checked in session properties will the new cache is created during every run
|
|
30
|
The two types of loading available in DWH are
|
|
31
|
In which mode of pmcmd, the username, password and server information are required for each command
|
|
32
|
Which transformations can be used for proceesing the records holding deptno 10 in an employee table
|
|
33
|
What are the types of sources available in informatica
|
|
34
|
How many modes are available for using pmcmd
|
|
35
|
How many types of Workflow variables are available ?
|
|
36
|
Flat file lookup is one newly added feature in Informatica PowerCenter 7.1version
|
|
37
|
Using the repository manager, the entire repository can be backed up in the format of
|
|
38
|
When you create a workflow, the Workflow Designer creates which task by default
|
|
39
|
Which mode is used for handling the sessions and workflows
|
|
40
|
Is it possible to run the workflow from particular task
|
|
41
|
The database designed for queries on transactional data is known as
|
|
42
|
Select a transformation used to load the changed records in target table
|
|
43
|
If the data doesn't fit in the memory cache, the server stores the overflow values in
|
|
44
|
In the Informatica Repository, where is the meta data getting stored?
|
|
45
|
What is the pmcmd command for instructing the server to execute the subsequent commands in the wait mode.
|
|
46
|
Which option is need to be checked for creating shortcuts for folders
|
|
47
|
Which privilege do you need to execute all tasks across all folders in the repository, and can perform any tasks
|
|
48
|
Which Transformation is used to load the rejected records
|
|
49
|
When the Informatica Server executes a worklet, it expands the worklet.
|
|
50
|
What is the transformation used to convert the rows in to columns
|
|
51
|
Salary of all employees in an employee table need to be added with the commission.which transformation is used ?
|
|
52
|
What the option "Fail parent if this task fails' will do in session properties
|
|
53
|
When the Designer validates a mapping variable in a reusable transformation, it treats the variable as
|
|
54
|
Which component is used for New server registration in informatica
|
|
55
|
What is the default repository server connection timeout limit
|
|
56
|
Where is the actual business rules will be implemented
|
|
57
|
By executing the read query directly against the source database, what can be identified
|
|
58
|
Minimum number of transformations required for a simple valid mapping
|
|
59
|
Whenever you're checking in an object, the repository version number is
|
|
60
|
To help you determine which column caused the row to be rejected, the server adds this components to reject files
|
|
61
|
You can create and maintain folders in the
|
|
62
|
The process of pulling data from various hetrogeneous source systems is known as
|
|
63
|
If a task is invalid, the workflow becomes invalid
|
|
64
|
Which Component of informatica is used to configure connection details
|
|
65
|
By default, the PowerCenter Server sets the number of partitions to
|
|
66
|
Which mode allows writing scripts for scheduling the workflows
|
|
67
|
How many important client components available in Informatica
|
|
68
|
Is it possible to change the sequence generator properties
|
|
69
|
Which Transformation is used to handle cobol sources
|
|
70
|
Which is used to store data and perform data cleansing,merging before loading into Datawarehousing
|
|
71
|
How to over ride the default order by clause in lookup query
|
|
72
|
Using session properties, can we able to override parameters established in the mapping ?
|
|
73
|
Which option should be enabled in session properties to see the performance of each transformation
|
|
74
|
What are the transformation used to merge data from multiple sources without removing the duplicates
|
|
75
|
Is it possible to create source and target definition manually
|
|
76
|
A deployment group is a versioning object that allows you to group versioned objects for deploying
|
|
77
|
By default, the PowerCenter Server does not save multiple logs for a single workflow.
|
|
78
|
When you checks out an object in the workspace, the repository obtains a
|
|
79
|
Which component is responsible for reading the parameter file and expanding the flow variable values for the workflow
|
|
80
|
If we export a mapping, session or workflow will create
|
|
81
|
Which Transformation is used to join flat file and oracle source
|
|
82
|
When you connecting to the repository, you need to mention the
|
|
83
|
Can the session be recovered?
|
|
84
|
The latest informatica suite is compatible of
|
|
85
|
In a short description, the data warehouse is a collection of data that is primarily used for
|
|
86
|
For executing a workflow, the PowerCenter server uses the
|
|
87
|
Can sequence generator be used in Mapplet desginer
|
|
88
|
Is it possible to generate a table in relational database using informatica
|
|
89
|
Versioning is a concept where you can configure the repository to store multiple versions of objects
|
|
90
|
The process of converting and summarizing operational data into a consistent, business oriented format
|
|
91
|
With the error tracing level enabled, the Informatica Server logs each row that passes into the mapping
|
|
92
|
When we finetune session performance, we can use
|
|
93
|
The place where debugger pauses and allows you to view and edit transformation output data is known as
|
|
94
|
In general, how many different types of log files are created by PowerCenter Server
|
|
95
|
Is it necessary to run the Informatica server before accessing Repository
|
|
96
|
Can a command task can be re-used
|
|
97
|
How the repository server communicates with the repository database
|
|
98
|
While using pmcmd in command line mode, each command must include the connection information of the
|
|
99
|
Last 3 performer in a department need to loaded in a target table. Which transformation can be used?
|
|
100
|
Which informatica client tool is used to know the run time and status of a workflow
|
|
101
|
What is the meaning of Update as Update?
|
|
102
|
In joiner transformation we override the query?
|
|
103
|
Which process is used for online analytical processing?
|
|
104
|
OLAP stands for?
|
|
105
|
Which task is used anywhere in the workflow to run the shell commands?
|
|
106
|
Which transformation is used numerous times in mapping?
|
|
107
|
Which transformation is used to combine data from different sources?
|
|
108
|
Can you validate all mappings in the repository simultaneously?
|
|
109
|
Which type is NOT used in metadata stored in repository?
|
|
110
|
Can one use mapping parameter or variables created in one mapping into any other reusable transformation?
|
|
111
|
_________ server governs the implementation of various processes among the factors of server’s database repository.
|
|
112
|
Increase in size of a convolutional kernel would necessarily increase the performance of a convolutional network.
|
|
113
|
Consider the scenario. The problem you are trying to solve has a small amount of data. Fortunately, you have a pre-trained neural network that was trained on a similar problem. Which of the following methodologies would you choose to make use of this pre-trained network?
|
|
114
|
For an image recognition problem (recognizing a cat in a photo), which architecture of neural network would be better suited to solve the problem?
|
|
115
|
For a classification task, instead of random weight initializations in a neural network, we set all the weights to zero. Which of the following statements is true?
|
|
116
|
Which gradient technique is more advantageous when the data is too big to handle in RAM simultaneously?
|
|
117
|
When pooling layer is added in a convolutional neural network, translation in-variance is preserved. True or False?
|
|
118
|
Suppose a convolutional neural network is trained on ImageNet dataset (Object recognition dataset). This trained model is then given a completely white image as an input.The output probabilities for this input would be equal for all classes. True or False?
|
|
119
|
What if we use a learning rate that’s too large?
|
|
120
|
Which of the following statement is the best description of early stopping?
|
|
121
|
What is a dead unit in a neural network?
|
|
122
|
In a neural network, which of the following techniques is used to deal with overfitting?
|
|
123
|
The number of neurons in the output layer should match the number of classes (Where the number of classes is greater than 2) in a supervised learning task. True or False?
|
|
124
|
Instead of trying to achieve absolute zero error, we set a metric called bayes error which is the error we hope to achieve. What could be the reason for using bayes error?
|
|
125
|
Batch Normalization is helpful because
|
|
126
|
In which neural net architecture, does weight sharing occur?
|
|
127
|
Can a neural network model the function (y=1/x)?
|
|
128
|
Suppose that you have to minimize the cost function by changing the parameters. Which of the following technique could be used for this?
|
|
129
|
If you increase the number of hidden layers in a Multi Layer Perceptron, the classification error of test data always decreases. True or False?
|
|
130
|
Which of the following is true about model capacity (where model capacity means the ability of neural network to approximate complex functions) ?
|
|
131
|
Which of the following gives non-linearity to a neural network?
|
|
132
|
Which of the following techniques perform similar operations as dropout in a neural network?
|
|
133
|
“Convolutional Neural Networks can perform various types of transformation (rotations or scaling) in an inputâ€. Is the statement correct True or False?
|
|
134
|
What are the steps for using a gradient descent algorithm?
|
|
135
|
In a neural network, knowing the weight and bias of each neuron is the most important step. If you can somehow get the correct value of weight and bias for each neuron, you can approximate any function. What would be the best way to approach this?
|
|
136
|
Considering the above notations, will a line equation (y = mx + c) fall into the category of a neuron?
|
|
137
|
A neural network model is said to be inspired from the human brain.
|
|
138
|
net.isIP(input) returns 6 for IP version 6 addresses.
|
|
139
|
A stream fires end event when there is no more data to read.
|
|
140
|
net.isIP(input) tests if input is an IP address or not.
|
|
141
|
Which of the following is true about Piping streams?
|
|
142
|
Which of the following module is required for DNS specific operations?
|
|
143
|
Which of the following is true about process global object?
|
|
144
|
Which of the following is true about external binding with respect to domain module?
|
|
145
|
Which of the following is true about internal binding with respect to domain module?
|
|
146
|
Which of the following is true about clearTimeout(t) global function?
|
|
147
|
Which of the following module is required for exception handling in Node?
|
|
148
|
Which of the following provides in-built events.
|
|
149
|
Which of the following module is required for operating system specific operations?
|
|
150
|
Which method of fs module is used to truncate a file?
|
|
151
|
How Node based web servers are different from traditional web servers?
|
|
152
|
Which of the following is true about global objects in Node applications?
|
|
153
|
Which method of fs module is used to open a file?
|
|
154
|
Which of the following is true about console global object?
|
|
155
|
Which of the following code prints current directory?
|
|
156
|
Which of the following code print the name of operating system?
|
|
157
|
What is Callback?
|
|
158
|
How can we check the current version of NPM?
|
|
159
|
If an EventEmitter does not have at least one listener registered for the 'error' event, and an 'error' event is emitted, the error is thrown, a stack trace is printed, and the Node.js process ____.
|
|
160
|
What should you do in your code to improve your application’s performance? (Multiple choices)
|
|
161
|
Route paths, in combination with a request method, define the endpoints at which requests can be made. Which of following are valid form of route path
|
|
162
|
Where is captured values are populated regarding route parameters?
|
|
163
|
How many number of callback functions can be attached to handle a request?
|
|
164
|
Is the below code valid? var cb0 = function (req, res, next) { console.log('CB0') next() } var cb1 = function (req, res, next) { console.log('CB1') next() } var cb2 = function (req, res) { res.send('Hello from C!') } app.get('/example/c', [cb0, cb1, cb2])
|
|
165
|
Is the code below valid? var cb0 = function (req, res, next) { console.log('CB0') next() } var cb1 = function (req, res, next) { console.log('CB1') next() } app.get('/example/d', [cb0, cb1], function (req, res, next) { console.log('the response will be sent by the next function ...') next() }, function (req, res) { res.send('Hello from D!') })
|
|
166
|
The methods on the response object (res) in the following table can send a response to the client, and terminate the request-response cycle. If none of these methods are called from a route handler, the client request__________
|
|
167
|
How can we create chainable route handlers for a route path in ExpressJS app?
|
|
168
|
. Fs module provides both synchronous as well as asynchronous methods.
|
|
169
|
What is default module concept for Node.js?
|
|
170
|
How to check whether process is master or slave in "cluster" module?
|
|
171
|
What default encoding is set in fs.writeFile function?
|
|
172
|
What is recommended way to include third-party libs to Node project?
|
|
173
|
Which of these functions could be used to write files?
|
|
174
|
How to run Node script/server in production mode?
|
|
175
|
How to increase heap limit in Node.js?
|
|
176
|
What is EventEmitterclass?
|
|
177
|
In what order program will print results? setTimeout(() => console.log("setTimeout"), 0); setImmediate(() => console.log("setImmediate")); process.nextTick(() => console.log("nextTick"));
|
|
178
|
Why it's recommended to avoid usage of long running sync functions ?
|
|
179
|
Which of this stream types exist in Node?
|
|
180
|
How to stop Node application?
|
|
181
|
Is Node.js platform multithreaded?
|
|
182
|
Which file functions Node.js File API provides ?
|
|
183
|
What should be the first parameter of a callback function?
|
|
184
|
A Node.js application consists of the following except _____
|
|
185
|
Which of the following is the correct way to get a normalized path?
|
|
186
|
Which of the following module is required to create a web server?
|
|
187
|
Which of the following is true about fs module of Node?
|
|
188
|
Which of the following is true about readable stream?
|
|
189
|
Which code converts a buffer buf to JSON object?
|
|
190
|
Node.js application can access which of the following databases?
|
|
191
|
Which method is used to compare the placement of two nodes in the DOM hierarchy (document)?
|
|
192
|
Which of the following code can create a web server ?
|
|
193
|
How can we check the cujrrent version of NPM
|
|
194
|
Select all valid rout parameter formats
|
|
195
|
Select all valid rout parameter formats
|
|
196
|
What code print the endianness of operating system?
|
|
197
|
How to test if two nodes are equal?
|
|
198
|
Which of the following Node object property returns the local part of the name of a node?
|
|
199
|
In Node.js from the following which is true about writable stream?
|
|
200
|
What is the default scope in Node.js application
|
|
201
|
How many Node object methods are available?
|
|
202
|
What npm stands for?
|
|
203
|
Node.js is ________ by default
|
|
204
|
Node.js uses an event-driven, non-blocking I/O model ?
|
|
205
|
REPL stands for.
|
|
206
|
Which method returns the current working directory of the process.
|
|
207
|
Which of the following are not Node.js web application frameworks for?
|
|
208
|
How Node.js modules are availble externally
|
|
209
|
In Node process is ______
|
|
210
|
Node.js is ___________ Language.
|
|
211
|
Which statement is valid in using a Node module fs in a Node based application?
|
|
212
|
How can we create instance of http module?
|
|
213
|
Is console a global object?
|
|
214
|
What are the key features of Node.js?
|
|
215
|
The Node.js modules can be exposed using
|
|
216
|
What actress starred as the wannabe opera singer (who couldn't carry a tune) Florence Foster Jenkins in the 2016 biopic of the same name?
|
|
217
|
Which of the following Commanders of the British Empire was born with the surname "Jenkins"?
|
|
218
|
Country singer Harold Lloyd Jenkins was better known by what name?
|
|
219
|
The War of Jenkins' Ear (1739-1748) was fought between Britain and what other nation?
|
|
220
|
Ferguson Jenkins, the first Canadian to be inducted into the Baseball Hall of Fame, played what position for the Chicago Cubs and Boston Red Sox?
|
|
221
|
Which is function is invoked just before render() during initial rendering?
|
|
222
|
ReactJS is developed by _____?
|
|
223
|
Which function is invoked just before render() during component update?
|
|
224
|
Which statement about ReactJs is incorrect?
|
|
225
|
Will and if yes, when and how immutable data will make big ReactJs application faster?
|
|
226
|
What will happen to the state if you click the <div>(constructor() { super(); this.state = { status: ‘no status’ }; } handleClick() { this.setState({status: ‘I am fine!’}); } render() { return ( <div onClick={this.handleClick}> click me </div> ); } })
|
|
227
|
Which of the following is true about React Library?
|
|
228
|
How set custom html inside ReactJs component?
|
|
229
|
Do you need to add key property on ReactJs elements?
|
|
230
|
How transform JSX code in browser?
|
|
231
|
What does ReactJs provide?
|
|
232
|
What is the first place to start optimizing speed of ReactJs application?
|
|
233
|
What will happen if parent component will fire render function?
|
|
234
|
Which is true for ReactJS components defined as pure JS functions?
|
|
235
|
Which statement about propTypes is incorrect?
|
|
236
|
What is needed to write ReactJs application with ES6 classes and have cross-browser support?
|
|
237
|
What is wrong with the following code?(MyComponent.propTypes = { name: React.PropTypes.string } MyComponent.defaultProps = { name: ‘My name’ })
|
|
238
|
Why do you need dispatcher in flux?
|
|
239
|
Which of the following is the primary mental data flow in Flux?
|
|
240
|
What should be the correct value of the children proptype?(propTypes: { children: React.PropTypes.string.isRequired })
|
|
241
|
Which statement about ReacJs is correct?
|
|
242
|
Can you use ReactJs without flux?
|
|
243
|
What kind of application architecture is widely used together with ReactJs?
|
|
244
|
PropTypes is used for ___ ?
|
|
245
|
Which of the following is true about Flux Dispatcher?
|
|
246
|
What can you develop on React?
|
|
247
|
Where was Walke working when he created React?
|
|
248
|
What does the library aim to provide out of the following
|
|
249
|
What was the side during production?
|
|
250
|
What's the production size of the library?
|
|
251
|
In which month was the last stable release in 2017?
|
|
252
|
On which month do you think it was released?
|
|
253
|
When was the JavaScript library first released?
|
|
254
|
Do you know which of the following can be considered its developer?
|
|
255
|
Who originally wrote the JSL?isma
|
|
256
|
How can we prevent default behavior in React?
|
|
257
|
In React state can be accessed using ________
|
|
258
|
React supports all the syntax of _________________
|
|
259
|
React keeps track of what items have changed, been added, or been removed from a list using ________
|
|
260
|
React considers everything as _______
|
|
261
|
An altered component may be uniquely identified with the help of ref
|
|
262
|
What is the smallest building block of ReactJS
|
|
263
|
If our elements are dynamic, react can keep track of the changes using keys
|
|
264
|
Components cannot refer to other components in their output
|
|
265
|
In JSX most of the errors can be caught during _________
|
|
266
|
ref is used to refer a element / component returned by _______________
|
|
267
|
State can be initialized when code is loaded or state can be set on event changes
|
|
268
|
Lifecycle methods are mainly used ___________
|
|
269
|
Which of the following needs to be updated to achieve dynamic UI updates
|
|
270
|
_________ can be done while more than one element needs to be returned from a component
|
|
271
|
Arbitrary inputs of components are called __________
|
|
272
|
React merges the object you provide into the current state using __________
|
|
273
|
JSX is typesafe
|
|
274
|
We can go for keys when there is possibility that our user could change the data.
|
|
275
|
Which of the following is a concern in Cloud Computing? Continue reading at https://www.trenovision.com/aws-quiz/
|
|
276
|
Which of the following is used to restrict network traffic between two networks?
|
|
277
|
Which one of the following is not a feature of Cloud Computing?
|
|
278
|
In IaaS, the user is not bothered about which of the following pieces in the complete stack?
|
|
279
|
In which of the following Cloud Computing Model, the storage and compute units are hosted inside the Enterprise Network?
|
|
280
|
Which one of the following is not a class of Cloud Computing? Continue reading at https://www.trenovision.com/aws-quiz/
|
|
281
|
DNS service is provided by AWS through Continue reading at https://www.trenovision.com/aws-quiz/
|
|
282
|
Components of auto scaling include Continue reading at https://www.trenovision.com/aws-quiz/
|
|
283
|
Copy of an EC2 instance is also known as
|
|
284
|
Software firewall in AWS is implemented using
|
|
285
|
Availability Zones in AWS correspond to
|
|
286
|
Persistent volume storage in EC2 is also known as
|
|
287
|
AWS EC2 Service provides which type of cloud hosting capability?
|
|
288
|
Paul wanted to isolate a section of the AWS cloud, and launch AWS resources in a defined virtual network. Which of these options should he choose?
|
|
289
|
Which of the following was the first service offered by Amazon to transfer data?
|
|
290
|
Anna wants to create users and groups in AWS service. Which of the following will perform the task?
|
|
291
|
Which of the following is a scalable and an economical amalgamation of your office IT and AWS storage infrastructure?
|
|
292
|
______ means that the storage is temporary, and its contents can be lost when the system is rebooted.
|
|
293
|
Direct Attached Storage is a type of _____.
|
|
294
|
What is used for applications and databases where there is significant amount of traffic?
|
|
295
|
ABC, a public record managing firm, wanted to transfer huge amount of data. Since, it was for public records, they needed some solution that would not charge them much. Which of the following is the most suitable for them?
|
|
296
|
With the decision to store data in Amazon Glacier,the Ahana group of companies came across one of the used cases. Identify the used case from the following.
|
|
297
|
Which of the following is NOT a certification of the AWS IT infrastructure?
|
|
298
|
What does Stack as single unit mean?
|
|
299
|
CloudFormation Components Templates has a format that conforms to the ____.
|
|
300
|
St. Philip University wanted to use AWS service that would create and provision AWS resources. Suggest the appropriate options from the following.
|
|
301
|
Which of the following will XYZ company use to transfer its website to one type of cloud while its brochure is on another?
|
|
302
|
How can you use Amazon CloudWatch?
|
|
303
|
ABC company wants to monitor cloud resources, such as Amazon EC2 and Amazon RDS instances, and applications. What services it should use?
|
|
304
|
If you can specify input parameters, and you can determine their values at the time of creating the stack, it means you are _____.
|
|
305
|
Which of the following can automatically scale resources?
|
|
306
|
Which of the followin can Merrin, a new user to the Amazon Web Service, use to access the provided service?
|
|
307
|
Which of the following are the current list of service groups in the All AWS Services section?
|
|
308
|
Virtual Tape Library provides users with an unlimited __________.
|
|
309
|
Magnetic storage is a persistent type of slower, older _____.
|
|
310
|
Amazon Web Services is Amazon's cloud computing environment that offers benefits of _____.
|
|
311
|
Which of the following clouds is a mix of public and private cloud services?
|
|
312
|
Amazon DynamoDB, as a part of Amazon Web Services, refers to a service that offers _____.
|
|
313
|
The security of global infrastructure services run in which of the following cloud?
|
|
314
|
Which is the vital feature on Navigation Bar?
|
|
315
|
Which of the following is granted according to the least privileged criteria?
|
|
316
|
Which of the following is a singular feature of AWS?
|
|
317
|
True or False is an attribute of _____.
|
|
318
|
Which of the following has a unique decimal number or a code point?
|
|
319
|
Which of the following Dynamo data types includes a string set, a binary set, and a number set?
|
|
320
|
Which of the following is a type Primary Key?
|
|
321
|
What is the other name for attributes?
|
|
322
|
Through which option does Amazon maintain a synchronous reserved replica of that DB instance?
|
|
323
|
What is applied to a DB instance if you do not specify the desired parameter group while creating the instance?
|
|
324
|
A(n)_____ aims to control access to a DB instance.
|
|
325
|
What offers profitable, resizable capacity for your databases?
|
|
326
|
Which of the following services creates and provisions AWS resources?
|
|
327
|
ABC company wants Web services that offer scalable computing capacity servers. What should the company choose?
|
|
328
|
To retain application availability, you should use.
|
|
329
|
ABC company wants to use network services that would implement its code from Amazon EC2 instances on the virtual servers. What should the company use?
|
|
330
|
you have placed an order by amazon fulfillment web service and want to cancel the order. the order can't be canceled if the fulfillmentorderstatus is:
|
|
331
|
you are going to create an amazon mechanical turk hit. which of the following parameters are required in the request?
|
|
332
|
with regard to amazon ec2, the amount of cpu that is allocated to a particular instance is expressed in terms of:
|
|
333
|
with regard to amazon ec2, do volumes need to be un-mounted in order to take a snapshot?
|
|
334
|
with reference to the amazon fulfillment web service, what are inbound apis used for?
|
|
335
|
with reference to the amazon flexible payment service, for how many days is a reserve authorization valid?
|
|
336
|
which type of aws requests do not require access key id authentication?
|
|
337
|
which of the following, defines the term ec2 amazon machine images?
|
|
338
|
which of the following use cases belong to inbound fws apis?
|
|
339
|
which of the following statements is not correct with regard to elastic block store?
|
|
340
|
which of the following statements is not correct with regard to amazon simple storage service (amazon s3)?
|
|
341
|
which of the following statements are true with regard to the amazon mechanical turk notifications?
|
|
342
|
which of the following parameters are mandatory for the installpaymentinstruction operation of the amazon flexible payment service?
|
|
343
|
which of the following is not related to the rebootinstances operation of ec2?
|
|
344
|
which of the following is correct if cname is empty in amazon cloudfront service? 1.<?xml version="1.0" encoding="utf-8"?> <distributionconfig xmlns="http://cloudfront.amazonaws.com/doc/2008-06-30...
|
|
345
|
which of the following are the types of grantee, that can access a bucket or an object of amazon s3?
|
|
346
|
which of the following amazon ec2 operations doesn't require the publicip as a request parameter?
|
|
347
|
what will the amazon s3 putobjectinline operation do if an object already exists in a bucket?
|
|
348
|
what will be the value of the action attribute of the form where the bucket name is johnsmith? example: <form action="???????" method="post" enctype="multipart/form-data">..</form>
|
|
349
|
what is the function of the retrytransaction operation of the amazon flexible payment service?
|
|
350
|
what is the function of the approvework command in amazon mechanical turk?
|
|
351
|
what does the following mechanical turk web service request do? http://mechanicalturk.amazonaws.com/?service=awsmechanicalturkrequester &awsaccesskeyid=[the requester's access key id] &version=200...
|
|
352
|
the following request is submitted to the amazon e-commerce service. what will be the outcome? http://webservices.amazon.com/onca/xml?service=awsecommerceservice &searchindex=books &sort=salesrank...
|
|
353
|
the following request is submitted to the amazon e-commerce service. what will be the outcome? http://webservices.amazon.com/onca/xml?service=awsecommerceservice &searchindex=all &sort=salesrank &...
|
|
354
|
suppose you are making a request to the amazon flexible payment service and you get an error called internalerror. what is the cause of the error?
|
|
355
|
one ec2 compute unit (ecu) provides the cpu capacity equivalentto:
|
|
356
|
once you create an amazon mechanical turk hit, you can't change its hittype.
|
|
357
|
is the following statement true or false? with reference to the amazon flexible payment service, once you subscribe to the caller notification using the subscribeforcallernotification operation, y...
|
|
358
|
is the following statement true or false? it is not possible to retrieve offers and discounts using amazon e-commerce service.
|
|
359
|
in which of the following cases can the status of a mechanical turk hit change from reviewing to reviewable?
|
|
360
|
in conjunction with which of the following other amazon web services does amazon simpledb service work?
|
|
361
|
in case of amazon e-commerce service, what will happen if you pass the associatetag parameter but omit the subscriptionid and awsaccesskeyid parameters?
|
|
362
|
in amazon mechanical turk concept, which of the following is correct?
|
|
363
|
how many cname aliases can you have per distribution?
|
|
364
|
how is amazon s3, tcp window scaling defined ?
|
|
365
|
how do you access amazon s3 buckets and objects that were created using <createbucketconfiguration>?
|
|
366
|
how can you find user selectable kernels in amazon ec2?
|
|
367
|
Which storage service provides encryption services for both data in flight and data at rest?
|
|
368
|
What is AWS Multi-Factor Authentication (MFA)?
|
|
369
|
What can happen if a hacker gets a hold of your account key?
|
|
370
|
True or False: A root account credential can be used to log into your AWS account or buy a book on Amazon.com.
|
|
371
|
Which of these Amazon's tools is for monitoring?
|
|
372
|
What is the practice of distributing responsibility among multiple people so that no one person has full control of everything?
|
|
373
|
Why is it important to enforce a strict password policy for your AWS account?
|
|
374
|
Which is Amazon Web Services' newest encryption tool?
|
|
375
|
Which is a recommended way to protect Access Keys?
|
|
376
|
What are the three authentication options offered by AWS?
|
|
377
|
What is boot time for an Instance store backed instance?
|
|
378
|
EC2 stands for
|
|
379
|
Which of these services are used to distribute content to end users using a global network of edge locations?
|
|
380
|
Amazon S3 is a,
|
|
381
|
highly available and scalable domain name system web service
|
|
382
|
What’s the maximum size of the S3 bucket
|
|
383
|
What is the maximum length of a file name in S3?
|
|
384
|
How can you integrate IAM with data centers security?
|
|
385
|
Which is more secure?
|
|
386
|
have some private servers on my premises, also I have distributed some of my workload on the public cloud, what is this architecture called?
|
|
387
|
_____ mixes the simplicity of ________ with the power of _____, to
|
|
388
|
Does Stopping and Terminating instances have same effect?
|
|
389
|
Cloud-computing providers offer their services as ______________
|
|
390
|
The preferred way to load data into Redshift is through ______ using the COPY command.
|
|
391
|
What does MPP stand for when referring to the type of architecture Redshift has?
|
|
392
|
Amazon SQS was designed to enable a/an _________ number of messaging services to read and write a/an ________ number of messages.
|
|
393
|
What type of queuing system is Amazon SQS?
|
|
394
|
A _____ letter queue is a queue that other queues can target to send messages that could not be processed successfully.
|
|
395
|
Amazon SQS pricing is based on a number of _______ and the amount of ______ transferred in and out.
|
|
396
|
For an EC2 instance launched in a private subnet in VPC, which of the following are the options for it to be able to connect to the internet?
|
|
397
|
What happens to data when an EC2 instance terminates
|
|
398
|
This option is used to control transactions per hour.
|
|
399
|
This option superimposes the contents of two graphs that share a common x- axis.
|
|
400
|
This helps us to compare the results of multiple load test runs.
|
|
401
|
Which function allows you to register a search for a text string for the next Action function?
|
|
402
|
What is the purpose of the strcat function?
|
|
403
|
Which file type has an extension of .lrr?
|
|
404
|
Which LoadRunner tool captures the communication between the browser and web server?
|
|
405
|
Which LoadRunner component runs the Vuser that generates the load?
|
|
406
|
Which performance test determines whether the system handles anticipated real-world load?
|
|
407
|
What instructs LoadRunner to prepare the Vusers so they are in the ready state
|
|
408
|
What is the first stage of the load testing process?
|
|
409
|
When running a Dry run, what should you be looking for?
|
|
410
|
The unit of sampling rate in the monitor setting tab is _______ .
|
|
411
|
Global Sampling Rate, Error Handling, Debugging, and Frequency settings is related to __________.
|
|
412
|
Scenario Group, SLA Pane and Scenario Schedule Pane is related to ____________.
|
|
413
|
How can you validate that the LoadRunner Agent is running on the load generator?
|
|
414
|
During the run of a scenario, which LoadRunner component stores the performance monitoring data?
|
|
415
|
What does the image shown in the exhibit represent?
|
|
416
|
Which types of reports can be automatically generated in the Analysis tool?
|
|
417
|
What are the main types of service level agreements available in the Controller and Analysis
|
|
418
|
What is an example of a stress test?
|
|
419
|
Which statement is an example of a conceptual goal?
|
|
420
|
Can a transaction contain another transaction ?
|
|
421
|
LR records communication between Client & Server only but does not record screen actions performed by user
|
|
422
|
Which methods can be used to fix Corelation problem ?
|
|
423
|
Identify the corelation function
|
|
424
|
Vuser insert a ________________ function into the script indicating that a correlation was done
|
|
425
|
In manual correlation, we can include maximum of _____ parameters per scripts:
|
|
426
|
Granularity of the graph can be set in
|
|
427
|
___________ provides information about the size and download time of each Web page content
|
|
428
|
Which graph is not available when Viewing Summary Data?
|
|
429
|
By default all Vuser information is Stored in:
|
|
430
|
Controller Output window display:
|
|
431
|
The DON’T SHOW setting in the graph instruct LoadRunner
|
|
432
|
What is the default value at which monitor send update to the controller for data point graph?
|
|
433
|
Global sampling rate, error handing, debugging, and frequency settings is related to
|
|
434
|
Scenario Group, SLA pane and Scenario Schedule Pane is related to
|
|
435
|
Which tab is not present in the OUTPUT window of inserting Rendezvous Point?
|
|
436
|
Which is not true in case of inserting Rendezvous point?
|
|
437
|
Script Creation in C and Web Services Vusers is related to
|
|
438
|
What is the extension of analysis session file?
|
|
439
|
By default the online monitor samples the data at interval of ____________.
|
|
440
|
The unit of sampling rate in the monitor setting tab is
|
|
441
|
Percentage mode is used to generate
|
|
442
|
The Correlation Statement instructs VuGen to save the first occurrence of this data to a parameter called __________
|
|
443
|
For each step you performed during recording. Vugen generates ____________ and _________ in the test tree.
|
|
444
|
Vuser uses LRT Function in a _______________ Scripts.
|
|
445
|
There are separate load runner function for C and JAVA.
|
|
446
|
What is the function that an Autoscaling cannot perform?
|
|
447
|
Can EBS tolerate an Availability Zone Failure?
|
|
448
|
Which of the following is a pure infrastructure play?
|
|
449
|
________ Live Services can be used in applications that run in the Azure cloud.
|
|
450
|
Database marketplace based on SQL Azure Database is code-named ________ .
|
|
451
|
Point out the wrong statement: Microsoft’s approach is to Cloud applications as software plus service Microsoft’s cloud operating system is named as Windows Platform Azure is a combination of virtualized infrastructure to which the .NET Framework has been added as a set of .NET Services None of the mentioned Q.13 Which of the following is also known as Compute? Set of virtual machine instances Set of replicas Set of commodity servers Q.14 Database marketplace based on SQL Azure Database is code-named ________ . Akamai Dallas Denali Q.15 Point out the correct statement: The Windows Azure service is a hosted environment of virtual machines turned on by a fabric known asWindows Azure ApplicationFab Windows Live Services is a collection of applications and services that run on the Web All of the above Q.16 ________ Live Services can be used in applications that run in the Azure cloud. Microsoft Windows Yahoo Ruby Q.17 Which of the following is based on Microsoft Dynamics? Static CRM Social CRM Dynamics CRM Q.18 Which of the following is based on Microsoft Sharepoint? Sharepoint Services .NET Services Windows Services Q.19 Azure is Microsoft’s ___________ as a Service Web hosting service. Platform Software Infrastructure Q.20 Which of the following is a pure infrastructure play? Azure Google App Engine AWS Q.21 Can EBS tolerate an Availability Zone Failure? No, all EBS volume is stored in a single availability zone. Yes, it has multiple copies so that will work. Depends on how the set up is installed Depends on how EBS is initiated. Q.22 What is the function that an Autoscaling cannot perform? Increase the instance size when the usage is more than threshold. Add more RDS read copies when usage is more than threshold. Both None of the above Q.23 What will be the benefit of adding Multi-AZ deployment in RDS? Availability Zone failure can be tolerated by multi-AZ database Increase database availability during maintenance tasks Both None of these Q.24 What happens to data when an EC2 instance terminates Decrease latencies if the servers of the apps are accessing database are in multiple Availability zones. Make database access times quicker for all application servers. Make database more available during maintenance tasks. All of the above Q.25 For an EC2 instance launched in a private subnet in VPC, which of the following are the options for it to be able to connect to the internet? Simply attach an elastic IP If there is a public subnet in the same VPC with a NAT instance attached to internet gateway, then a route can be configured from the instance to the NAT. There is no way for an instance in private subnet to talk to the internet Hope you enjoy our last AWS Practice Test, but it’s not an end of learning, explore our AWS Interview Questions. Amazon Quiz Part – 1 Amazon Quiz Part – 2 Tags: Amazon MCQAmazon Mock TestAmazon QuizAmazon Web Service QuizAWS Mock TestAWS Practice TestAWS Quizaws quiz onlineFree AWS QuizOnline AWS Quiz LEAVE A REPLY Comment Name * Email * This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
|
|
452
|
Which of the following is relational database service provided by Amazon?
|
|
453
|
Which of the following is also referred to edge computing?
|
|
454
|
Point out the wrong statement:
|
|
455
|
In case of a disaster, which of the following activities will you perform?
|
|
456
|
How does an Elastic Load Balancer enable higher fault-tolerance level?
|
|
457
|
To retain application availability, you should use
|
|
458
|
If a company wants to use the DNS Web service, what is the appropriate option?
|
|
459
|
MultiPan, a small company with huge clientele, was facing a storage crunch, and it wants the resources to be connected to the Internet. What is the ideal solution?
|
|
460
|
A company wants to use network services that would implement its code from Amazon EC2 instances on the virtual servers. What should the company use?
|
|
461
|
A leading IT firm in Manhattan faces a lot of network traffic issues. What should it use to ease these issues?
|
|
462
|
Which of the following is true about NoSQL and SQL?
|
|
463
|
What does a comprehensive data policy include?
|
|
464
|
What type of API provides a management interface to manage data warehouse clusters programmatically?
|
|
465
|
Amazon Redshift has how many pricing components?
|
|
466
|
The preferred way to load data into Redshift is through ______ using the COPY command.
|
|
467
|
Adding nodes to a Redshift cluster provides _______ performance improvements.
|
|
468
|
Redshift was designed to alleviate the frustrating, time-consuming challenges database clusters have imposed on _____ administrators?
|
|
469
|
Amazon's Redshift data warehouse allows enterprise IT pros to execute ________ against ____ data sets.
|
|
470
|
Redshift can provide fast query performance by leveraging _______ storage approaches and technology.
|
|
471
|
What does MPP stand for when referring to the type of architecture Redshift has?
|
|
472
|
Amazon Redshift is what type of data warehouse service?
|
|
473
|
With Amazon _________, developers can monitor metrics for Amazon SQS and trigger an alarm when a threshold is met.
|
|
474
|
Amazon SQS is optimized for ______ scalability, not for single-threaded sending or receiving speeds.
|
|
475
|
Amazon SQS was designed to enable a/an _________ number of messaging services to read and write a/an ________ number of messages.
|
|
476
|
What type of queuing system is Amazon SQS?
|
|
477
|
A _____ letter queue is a queue that other queues can target to send messages that could not be processed successfully.
|
|
478
|
To prevent messages from being lost or becoming unavailable, all messages are stored __________ across multiple servers and data centres.
|
|
479
|
Amazon SQS pricing is based on a number of _______ and the amount of ______ transferred in and out.
|
|
480
|
Amazon Elastic MapReduce falls under the _______________ and Amazon EC2 falls under the ___________ cloud service model.
|
|
481
|
Route 53 offers Weighted Round Robin (DNS Load Balancing) that allows assigning weights to DNS records to specify routing of traffic
|
|
482
|
It is possible to change the size of a Virtual Private Cloud after it´s creation.
|
|
483
|
The default session timeout for an ELB is
|
|
484
|
As an alternative to prewarming the ELB, we can assign a smaller ELB to load balance between multiple ELBs.
|
|
485
|
In Amazon Route 53, while creating a CNAME record the ideal TTL values while mapping the CNAME (a) to an existing domain and (b) to an ELB or S3 are:
|
|
486
|
Which statement doesn´t suit to S3?
|
|
487
|
You have a front-end webserver that connects to an App layer, through port 80. What is the best practice for setting the firewall access?
|
|
488
|
The number of SSL certificates supported by an ELB at a given time is
|
|
489
|
Which of the following is NOT TRUE of AWS Elastic Load Balancing?
|
|
490
|
To create a mirror image of your environment in another region for disaster recovery, which of the following AWS resources do not need to be recreated in the second region?
|
|
491
|
Which of the following are true regarding AWS CloudTrail?
|
|
492
|
Your company provides several applications from its data center located in Colorado. Your company also uses AWS for several PaaS functions. What type of cloud does your organization use?
|
|
493
|
What is the very popular As A Service model that permits a cloud provider to make applications available that are accessible from anywhere?
|
|
494
|
What is the term commonly used for the cloud’s ability to scale outward and inward automatically based on demand?
|
|
495
|
Which of the following is not a common cloud characteristic as defined by the NIST?
|
|
496
|
Amazon Web Services supports which Type II Audits ?
|
|
497
|
Storage classes available with Amazon s3 are -
|
|
498
|
What are the advantages of auto-scaling?
|
|
499
|
How many buckets can you create in AWS by default?
|
|
500
|
_______________ is the central application in the AWS portfolio.
|
|
501
|
_________________ is a billing and account management service.
|
|
502
|
AWS Stands for Amazon Web Services.
|
|
503
|
What will happen when an EC2 instance fails to pass health checks?
|
|
504
|
If a single instance has failed to launch within 24 hours due to some issues during a set up of Auto-scaling. Then what will happen to the Auto-Scaling condition?
|
|
505
|
What are lifecycle hooks used for in AutoScaling?
|
|
506
|
Which service performs the function that when an instance is healthy it is terminated and replaced with a new one?
|
|
507
|
What can be the option to reduce the load on Amazon EC2 instance when the content management system running on Amazon EC2 instance which is reaching total CPU utilization.
|
|
508
|
If some of the instances are running in the application tier and are using AutoScaling. Then how can the instance type be changed?
|
|
509
|
Name the architecture in which a user can own some private servers as well as they can distribute some of the workloads on the public cloud.
|
|
510
|
Select the wrong statement:
|
|
511
|
Select all elements with a “href†attribute value, which ends with ".png".
|
|
512
|
Select all elements with a “title†attribute value beginning with "Study".
|
|
513
|
Select all elements with a “title†attribute value containing the word “Demo†specifically.
|
|
514
|
How to select all disabled input elements.
|
|
515
|
With jQuery, how to select all button and input elements of type="button".
|
|
516
|
Select all <p> elements with a "lang" attribute value starting with "test".
|
|
517
|
In jQuery, how to get all elements with "href" attribute.
|
|
518
|
With jQuery, how to select all elements with “href†attribute value "studyopedia.com"
|
|
519
|
How to select all input elements with type="text".
|
|
520
|
How to select all hidden <ul> elements in jQuery?
|
|
521
|
Select all <div> elements, which have a <ul> element.
|
|
522
|
The web page has headers like <h1>, <h2>, <h3>. How to get them in jQuery?
|
|
523
|
How to get all animated elements in jQuery?
|
|
524
|
With jQuery, how to get <p> elements, which are descendants of a <div>.
|
|
525
|
Get all <input> elements, which are not empty.
|
|
526
|
With jQuery, get all <p> elements that are siblings of a <div>:
|
|
527
|
How to get all <p> elements, which are direct child of <div>:
|
|
528
|
How to get all <p> elements, which are the only child of their parent?
|
|
529
|
How to select the nth child in jQuery. Select all <p> elements which are the 3rd child of their parent:
|
|
530
|
How to select multiple elements in jQuery. The total elements are <h1>, <h2>, <div>,<span>, <p>. Select only the following: <h1>,<h2>, <div>
|
|
531
|
How to select all elements with class “demo†or “testâ€
|
|
532
|
A dropdown is having the following values: Ronaldo, Messi, Neymar, Ronaldinho. From here, how to select the options Neymar, Messi, Ronaldinho?
|
|
533
|
How to get the HTML content of all matched <p> elements:
|
|
534
|
A dropdown is having the following values: Ronaldo, Messi, Neymar. From here, how to select the option Messi?
|
|
535
|
In a checked checkbox, how to get the first value?
|
|
536
|
How to get the text content of all matched <p> elements?
|
|
537
|
With jQuery, how to remove target attribute of all the links on the web page:
|
|
538
|
Which of the following methods is used to get the html content of the matched element?
|
|
539
|
Set the title of all <input> elements to "Enter Value"
|
|
540
|
How to set alt attribute of all the images. Add the value "Technology" to the "alt" tag:
|
|
541
|
Which of the following methods is used to get the text content of the matched element?
|
|
542
|
Which of the following jQuery methods are used to remove an attribute?
|
|
543
|
How to get the value of an attribute for the first element in the set of matched elements?
|
|
544
|
With jQuery Selectors how to select elements, which are parent of another element?
|
|
545
|
With jQuery Selectors, select all elements matched by <li>, which are last child of their parent.
|
|
546
|
Select elements matched by <p> element, which are children of an element matched by <div> element, using jQuery Selectors.
|
|
547
|
With jQuery Selectors, select all elements matched by <li>, which are first child of their parent.
|
|
548
|
With jQuery Selectors, how to select all elements matched by <li>, which contain the text demo.
|
|
549
|
From a list of <li> elements in <ul>, how to select the first five elements?
|
|
550
|
From a list of <li> elements in <ul>, how to select the fourth element?
|
|
551
|
In a web page, form elements like input, textarea, button, etc are added with other elements. How to select only the form elements using jQuery?
|
|
552
|
In a form, how to select all checked boxes using jQuery Selector.
|
|
553
|
With jQuery Selectors, how to select all elements matched by <li> which are hidden?
|
|
554
|
How to select all radio buttons using jQuery Selectors?
|
|
555
|
With jQuery Selectors, how to select all elements matched by <li> which are visible?
|
|
556
|
How to select all elements matched by <a> with "href" attribute value containing "studyopedia.com"?
|
|
557
|
Using jQuery Selectors, how to select all elements matched by <li>, which do not have class = "demo".
|
|
558
|
How to select all elements that are children of a <p> element with jQuery Selectors?
|
|
559
|
Using jQuery Selectors how to select all even <td> elements in an HTML table:
|
|
560
|
Using jQuery Selectors, how to select all elements with the attribute href:
|
|
561
|
Using jQuery Selectors how to select all even <tr> elements in an HTML table:
|
|
562
|
How to select the first <li> element of the first unordered list element i.e. <ol> using jQuery Selectors?
|
|
563
|
A lot of <p> elements are present in the HTML document. How to select the first <p> element using jQuery Selectors?
|
|
564
|
How can I select all <p> elements with class=â€demo†using jQuery Selectors?
|
|
565
|
What is the correct way of selecting the current element with jQuery Selectors?
|
|
566
|
How to select all the elements i.e. the correct way of using Universal Selector?
|
|
567
|
Which is the correct form of using Id Selector in jQuery? Let’s say id = demo
|
|
568
|
Which is the correct form of using Class Selectors in jQuery? Let’ say class = demo
|
|
569
|
Which is the correct form of using Element Selector in jQuery? Let’s say the element is <div>:
|
|
570
|
Selectors in jQuery begins with?
|
|
571
|
Which is the correct jQuery syntax?
|
|
572
|
What is the role of a selector in jQuery syntax?
|
|
573
|
Which of the following method when used loads jQuery faster on the web page?
|
|
574
|
To host jQuery, which two jQuery CDNs are available for users?
|
|
575
|
Should I use <script> or <script type="text/javascriptâ€>for referencing jQuery in a web document?
|
|
576
|
Which of the following is correct for production version or development version of jQuery?
|
|
577
|
Whatever you achieve with JavaScript can be achieved with jQuery?
|
|
578
|
jQuery is a?
|
|
579
|
What is every function used for?
|
|
580
|
What are the: odd and: even filters?
|
|
581
|
the jQuery library enclose the following features
|
|
582
|
You can check whether the browser supports exact features using..
|
|
583
|
Can you use CSS3 selectors to choose or get elements using jQuery?
|
|
584
|
Can jQuery be used on the similar page beside other libraries?
|
|
585
|
jQuery's main focus is
|
|
586
|
jQuery is a..
|
|
587
|
How do you use JavaScript inside Coffee Script code?
|
|
588
|
Which statement greatest explains what "unobtrusive JavaScript" is?
|
|
589
|
What scripting language is jQuery printed in?
|
|
590
|
Which jQuery method is used to place one or more style properties for selected elements?
|
|
591
|
What is proper coding practice in the flow logic of a Dynpro when a subscreen is defined on the screen
|
|
592
|
SAP Best Practices are the sound foundation for pre-packaged ready-to-use business solutions
|
|
593
|
What is the SAP GUI ?
|
|
594
|
Who are the primary users of ERP systems?
|
|
595
|
What are the primary business benefits of an ERP system?
|
|
596
|
Who are the primary users of SCM systems?
|
|
597
|
What represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors?
|
|
598
|
What are several different types of software, which sit in the middle of and provide connectivity between two or more software applications?
|
|
599
|
Which of the following occurs when everyone involved in sourcing, producing, and delivering the company's product works with the same information?
|
|
600
|
Which of the following is a reason for ERPs explosive growth?
|
|
601
|
What must a system do to qualify as a true ERP solution?
|
|
602
|
What is at the heart of any ERP system?
|
|
603
|
Which of the following describes an ERP system?
|
|
604
|
What is the TCode for ABAP dump analysis?
|
|
605
|
What is the transaction code for "Comparing tables"?
|
|
606
|
Which command is used to flash the database buffer?
|
|
607
|
Data element is an example of Semantic Domain.
|
|
608
|
When should you buffer a table?
|
|
609
|
You can not attach search help to:
|
|
610
|
What is the basic object of data Dictionary?
|
|
611
|
What are the two types of BoM processing?
|
|
612
|
To cancel a billing document, which of the following is correct?
|
|
613
|
How does the system carry out Static Credit limit check?
|
|
614
|
Which of the following are true for an Output Type?
|
|
615
|
In which processes of Consignment “Transfer Order for picking†is used?
|
|
616
|
Regarding standard Class Types, which of the following are correct?
|
|
617
|
When you enter a sales order you don’t need to specify the sales area immediately. If you don’t, where does the system automatically derive the sales area?
|
|
618
|
For Delivery Item Category, if “Relevant for Picking†is not activated then?
|
|
619
|
If a material is handled in batches, the following functions are supported when the expiration date is checked:
|
|
620
|
What are the effects of PGI?
|
|
621
|
If a material is created for Plant X, how is the same material defined for Plant Y? What is the process called?
|
|
622
|
In a Business requirement the price of a material is based on the ‘Region’, ‘Sales Org.’, ‘Distribution Channel’ . If you were to create a Condition Table for this scenario, the order in which the fields are arranged is?
|
|
623
|
Which of the following are correct for a third party order?
|
|
624
|
Backward scheduling is used?
|
|
625
|
Free Goods is supported for which of the following in SAP R/3?
|
|
626
|
Which of the following are true for Inter-Company Sales Processing?
|
|
627
|
If Invoice Correction Request is to be characterized as debit memo, what important changes do you suggest?
|
|
628
|
Which of the following statements are correct?
|
|
629
|
An account group determines?
|
|
630
|
Which of the following factors are generally used for account determination?
|
|
631
|
What is the relationship between company code and credit control Area?
|
|
632
|
Full Buffering would be appropriate for
|
|
633
|
The annual cost of a high utilization reserved usage depends on the number of hours used?
|
|
634
|
An application running on EC2 instances processes sensitive information stored on Amazon S3. The information is accessed over the Internet. The security team is concerned that the Internet connectivity to Amazon S3 is a security risk.
|
|
635
|
An application saves the logs to an S3 bucket. A user wants to keep the logs for one month for troubleshooting purposes, and then purge the logs.
|
|
636
|
) A web application allows customers to upload orders to an S3 bucket. The resulting Amazon S3 events trigger a Lambda function that inserts a message to an SQS queue. A single EC2 instance reads messages from the queue, processes them, and stores them in an DynamoDB table partitioned by unique order ID. Next month traffic is expected to increase by a factor of 10 and a Solutions Architect is reviewing the architecture for possible scaling problems.
|
|
637
|
A Solutions Architect is designing a critical business application with a relational database that runs on an EC2 instance. It requires a single EBS volume that can support up to 16,000 IOPS.
|
|
638
|
) An application requires a highly available relational database with an initial storage capacity of 8 TB. The database will grow by 8 GB every day. To support expected traffic, at least eight read replicas will be required to handle database reads
|
|
639
|
Which action will protect against unintended user actions?
|
|
640
|
A company is developing a highly available web application using stateless web servers. Which services are suitable for storing session state data? (Select TWO.)
|
|
641
|
Which solution will meet the security team’s mandate?
|
|
642
|
Jquery is faster than javascript at execution time.
|
|
643
|
1)jquery.size() 2) jquery.length Which is faster?
|
|
644
|
What does .size() method of jquery returns?
|
|
645
|
For the purposes of selecting specific class, class must contain prefix as ________.
|
|
646
|
In which version of the jquery, efficiency of the web page increased.
|
|
647
|
What is the file size of minified version of jQuery.x.x.x-min.js?
|
|
648
|
What is the file size of normal version of jQuery-x.x.x.js?
|
|
649
|
Is it compulsory to add jquery file both at master page and content page?
|
|
650
|
CDN stands for_______
|
|
651
|
live() function will not work in chaining
|
|
652
|
jQuery ______is used to set/return arbitrary data to/from an element.
|
|
653
|
.css(‘width’) and .width() are the two ways to change the width of _________.
|
|
654
|
How many ways are there to change the width of the element in jquery?
|
|
655
|
How many methods are available in jquery to give fade effect to the elements?
|
|
656
|
There are how many ways to check or unchecked the radio button.
|
|
657
|
$('#pcds').attr('disabled', true); this code is used for the ______ form element.
|
|
658
|
____ symbol is used for indication that this line used for jquery.
|
|
659
|
Jquery library is ____________ file.
|
|
660
|
Jquery is the programming language
|
|
661
|
To select all the elements in the page which symbol do we have to used?
|
|
662
|
How many types of selectors available in jquery
|
|
663
|
The ________ method acts on JQuery objects and translates the match DOM element into query string that can be passed along with AJAX request.
|
|
664
|
JQuery don’t have DOM traversing capability.
|
|
665
|
AHAH means ________
|
|
666
|
AJAX stand for____________
|
|
667
|
By default .clone() method copy any event.
|
|
668
|
For coping the element ________ method is used.
|
|
669
|
Which of the following is jquery primary method for wrapping element around other element?
|
|
670
|
jquery has _______ method for inserting element before other element.
|
|
671
|
The .each method is the more convenient form of _______ loop.
|
|
672
|
The ______ Method acts as explicit iterator.
|
|
673
|
The .animate() method comes in ______ forms.
|
|
674
|
Which method is provided by the jquery to create our own custom animation with fine-grained control?
|
|
675
|
Highlight page element under mouse cursor by using ________
|
|
676
|
________________ is use for alternately expand and collapse a page element
|
|
677
|
Use __________ event handlers to reach to a user click on page element with .bind() or .click().
|
|
678
|
Multiple javascript library coexist on single page using ___________________
|
|
679
|
Ansible is written in Powershell and
|
|
680
|
Who is the author of Ansible?
|
|
681
|
Who is the creator of Jenkins?
|
|
682
|
Jenkins won the geek choice award in
|
|
683
|
Concerning the software architecture, Ansible has how many servers?
|
|
684
|
Jenkins supports the following except
|
|
685
|
The company established to support and manage Ansible is
|
|
686
|
Jenkins is written in
|
|
687
|
When did the Red Hat acquired Ansible?
|
|
688
|
Concerning Jenkins' security which of these is odd?
|
|
689
|
In SoapUI following cannot be executed from command line
|
|
690
|
Command line runs in SoapUI can be used to run
|
|
691
|
What type of test data can be used in SoapUI
|
|
692
|
Where groovy script can be used in SoapUI
|
|
693
|
How to refer a property from test case
|
|
694
|
What are different type of assertions use in SoapUI
|
|
695
|
What is the hierarchy in SoapUI Projects
|
|
696
|
In SoapUI properties are available at level
|
|
697
|
SoapUI can be used to do
|
|
698
|
What platform is SoapUI built over
|
|
699
|
What are the properties available in SoapUI?
|
|
700
|
Service exporters that can export a bean as a remote service based on the
|
|
701
|
What are the levels used by SOAP UI to structure functional tests?
|
|
702
|
What are the major types of assertions available in SoapUI?
|
|
703
|
What type of data sources can be used in SoapUI?
|
|
704
|
Where Groovy Script can be used in Soap UI?
|
|
705
|
What we can do with the SoapUI?
|
|
706
|
What are the different types of assertions used in Soapui?
|
|
707
|
Exposing a stand-alone SOAP endpoint using the
|
|
708
|
What are the communication channels available for a web service?
|
|
709
|
In what year was SoapUI initially released to Source Forge?
|
|
710
|
SoapUI software won the Jolt Awards: The Best Testing Tools in _____
|
|
711
|
The SoapUI software won the ATI Automation Honors in _____
|
|
712
|
The commercial enterprise version of SoapUI is called _____
|
|
713
|
In which of the following languages is SoapUI available?
|
|
714
|
Which of the following is a core feature of SoapUI?
|
|
715
|
All of the following except one are not core features of SoapUI?
|
|
716
|
SoapUI was initially released to _____ in 2005
|
|
717
|
_____ are the developers of the SoapUI software
|
|
718
|
In what year was SoapUI software initially released?
|
|
719
|
A company needs to monitor the read and write IOPS for their AWS MySQL RDS instance and send real-time alerts to their operations team. Which AWS services can accomplish this?
|
|
720
|
I created a key in Oregon region to encrypt my data in North Virginia region for security purposes. I added two users to the key and an external AWS account. I wanted to encrypt an object in S3, so when I tried, the key that I just created was not listed. What could be the reason?
|
|
721
|
How does Elastic Beanstalk apply updates?
|
|
722
|
A customer wants to track access to their Amazon Simple Storage Service (S3) buckets and also use this information for their internal security and access audits. Which of the following will meet the Customer requirement?
|
|
723
|
A customer wants to capture all client connection information from his load balancer at an interval of 5 minutes, which of the following options should he choose for his application?
|
|
724
|
To create a mirror image of your environment in another region for disaster recovery, which of the following AWS resources do not need to be recreated in the second region? ( Choose 2 answers )
|
|
725
|
You have an EC2 Security Group with several running EC2 instances. You changed the Security Group rules to allow inbound traffic on a new port and protocol, and then launched several new instances in the same Security Group. The new rules apply:
|
|
726
|
A user has setup an Auto Scaling group. Due to some issue the group has failed to launch a single instance for more than 24 hours. What will happen to Auto Scaling in this condition?
|
|
727
|
When an instance is unhealthy, it is terminated and replaced with a new one, which of the following services does that?
|
|
728
|
What does Connection draining do?
|
|
729
|
You have a content management system running on an Amazon EC2 instance that is approaching 100% CPU utilization. Which option will reduce load on the Amazon EC2 instance?
|
|
730
|
How will you change the instance type for instances which are running in your application tier and are using Auto Scaling. Where will you change it from the following areas?
|
|
731
|
Suppose you have an application where you have to render images and also do some general computing. From the following services which service will best fit your need?
|
|
732
|
A startup is running a pilot deployment of around 100 sensors to measure street noise and air quality in urban areas for 3 months. It was noted that every month around 4GB of sensor data is generated. The company uses a load balanced auto scaled layer of EC2 instances and a RDS database with 500 GB standard storage. The pilot was a success and now they want to deploy at least 100K sensors which need to be supported by the backend. You need to store the data for at least 2 years to analyze it. Which setup of the following would you prefer?
|
|
733
|
You are running a website on EC2 instances deployed across multiple Availability Zones with a Multi-AZ RDS MySQL Extra Large DB Instance. The site performs a high number of small reads and writes per second and relies on an eventual consistency model. After comprehensive tests you discover that there is read contention on RDS MySQL. Which are the best approaches to meet these requirements? (Choose 2 answers)
|
|
734
|
Your application has to retrieve data from your user’s mobile every 5 minutes and the data is stored in DynamoDB, later every day at a particular time the data is extracted into S3 on a per user basis and then your application is later used to visualize the data to the user. You are asked to optimize the architecture of the backend system to lower cost, what would you recommend?
|
|
735
|
Which of the following use cases are suitable for Amazon DynamoDB? Choose 2 answers
|
|
736
|
A company is deploying a new two-tier web application in AWS. The company has limited staff and requires high availability, and the application requires complex queries and table joins. Which configuration provides the solution for the company’s requirements?
|
|
737
|
Which AWS services will you use to collect and process e-commerce data for near real-time analysis?
|
|
738
|
Your company’s branch offices are all over the world, they use a software with a multi-regional deployment on AWS, they use MySQL 5.6 for data persistence.
|
|
739
|
If I am running my DB Instance as a Multi-AZ deployment, can I use the standby DB Instance for read or write operations along with primary DB instance?
|
|
740
|
When would I prefer Provisioned IOPS over Standard RDS storage?
|
|
741
|
If I launch a standby RDS instance, will it be in the same Availability Zone as my primary?
|
|
742
|
In CloudFront what happens when content is NOT present at an Edge location and a request is made to it?
|
|
743
|
Why do you make subnets?
|
|
744
|
If you want to launch Amazon Elastic Compute Cloud (EC2) instances and assign each instance a predetermined private IP address you should:
|
|
745
|
When you need to move data over long distances using the internet, for instance across countries or continents to your Amazon S3 bucket, which method or service will you use?
|
|
746
|
A customer implemented AWS Storage Gateway with a gateway-cached volume at their main office. An event takes the link between the main and branch office offline. Which methods will enable the branch office to access their data?
|
|
747
|
A customer wants to leverage Amazon Simple Storage Service (S3) and Amazon Glacier as part of their backup and archive infrastructure. The customer plans to use third-party software to support this integration. Which approach will limit the access of the third party software to only the Amazon S3 bucket named “company-backup�
|
|
748
|
Another scenario based interview question. You need to configure an Amazon S3 bucket to serve static assets for your public-facing web application. Which method will ensure that all objects uploaded to the bucket are set to public read?
|
|
749
|
Are the Reserved Instances available for Multi-AZ Deployments?
|
|
750
|
If I want my instance to run on a single-tenant hardware, which value do I have to set the instance’s tenancy attribute to?
|
|
751
|
You have a distributed application that periodically processes large volumes of data across multiple Amazon EC2 Instances. The application is designed to recover gracefully from Amazon EC2 instance failures. You are required to accomplish this task in the most cost effective way.
|
|
752
|
What does the following command do with respect to the Amazon EC2 security groups?
|
|
753
|
Try this AWS scenario based interview question. I have some private servers on my premises, also I have distributed some of my workload on the public cloud, what is this architecture called?
|
|
754
|
What are the Authentication in AWS?
|
|
755
|
Amazon Web Services supports which Type II Audits
|
|
756
|
Storage classes available with Amazon s3 are -
|
|
757
|
The types of AMI provided by AWS are:
|
|
758
|
What are the advantages of auto-scaling?
|
|
759
|
What are the different types of instances?
|
|
760
|
How many buckets can you create in AWS by default?
|
|
761
|
S3 stands for Simple Storage Service
|
|
762
|
AWS reaches customers in ______________countries.
|
|
763
|
Amazon Web Services falls into which of the following cloud-computing category?
|
|
764
|
________________ is the central application in the AWS portfolio.
|
|
765
|
_________________ is a billing and account management service.
|
|
766
|
AWS Stands for Amazon Web Services
|
|
767
|
Pick the odd one out:
|
|
768
|
Which of the following is not an UDDI datatype?
|
|
769
|
In WSDL a <portType> refers to
|
|
770
|
Which of the following statement(s) is/are true with respect to WSDL?
|
|
771
|
Which of the following statement(s) is/are incorrect?
|
|
772
|
Which of the following cannot be used as a Web Service Client?
|
|
773
|
Which of the following statement(s) is/are true?
|
|
774
|
Which of the following statement(s) is/are false ?
|
|
775
|
XML digital signatures provides
|
|
776
|
Which of the following statement(s) is/are true with respect to SOAP 1.2.?
|
|
777
|
The primary goal of this Web Service Design pattern is to move business logic out of the service implementation class and into distinct business objects that are more easily managed and evolved over time.
|
|
778
|
UDDI is a registry and a repository.
|
|
779
|
What does SOAP define?
|
|
780
|
Which component of Web Services acts as a directory?
|
|
781
|
Web Services are
|
|
782
|
Web services components are written in which Markup Language?
|
|
783
|
Service Discovery is responsible for describing the public interface to a specific web service.
|
|
784
|
The service provider implements the service and makes it available on the Internet.
|
|
785
|
A web service takes the help of SOAP to describe the availability of service.
|
|
786
|
A web service enables communication among various applications by using open standards such as HTML, XML, WSDL, and SOAP.
|
|
787
|
Which of the following is a security issue with web services?
|
|
788
|
Which of the following is correct about BEEP protocol?
|
|
789
|
Which of the following role of web service architecture utilizes an existing web service by opening a network connection and sending an XML request?
|
|
790
|
Which of the following is the benefits of having XML based WEB services?
|
|
791
|
Which of the following is true about Web service?
|
|
792
|
What is NOT a part of a SOAP Message ?
|
|
793
|
To implement web services in .NET, HTTP handlers are used that interrupt requests to _________ files.
|
|
794
|
Select the communication channels NOT use in a web service?
|
|
795
|
what DISCO is?
|
|
796
|
What is REST?
|
|
797
|
What do you mean by PKI?
|
|
798
|
What UDDI means?
|
|
799
|
What is SSL?
|
|
800
|
What is WSDL?
|
|
801
|
SOAP is a lightweight _____ based protocol .
|
|
802
|
Schema is an _____ based alternative
|
|
803
|
XSLT is:
|
|
804
|
What is SOAP :
|
|
805
|
A Web Services can be created regardless of the
|
|
806
|
The XKMS is:
|
|
807
|
Which of these test do use an HTTP POST and will send the XML response.
|
|
808
|
The WSDL is:
|
|
809
|
Which of these are not the elements WSDL ?
|
|
810
|
The UDDI is:
|
|
811
|
The XML provides the ________ in which you can write the specialized languages to express the complex interactions between the clients and the services or between the components of a composite service.
|
|
812
|
HTTP is the ubiquitous protocol, which is running practically everywhere on:
|
|
813
|
Using a ______ you can do exchange the data between the different applications and different platforms.
|
|
814
|
The Web services can not offer the application components like:
|
|
815
|
A ________ are the new breed of Web application.
|
|
816
|
UDDI is used for listing what ______ are available
|
|
817
|
WSDL is used for describing the services available.
|
|
818
|
SOAP is used to transfer the:
|
|
819
|
Web Services define a platform-independent standard based on XML to communicate within distributed systems.
|
|
820
|
________ can convert your applications into Web-applications.
|
|
821
|
Registry services such as managing information about service providers, service implementations and service metadata are provided by
|
|
822
|
Web Services attempts to describe architecture based on
|
|
823
|
Web services are the amalgamation of
|
|
824
|
What are the possible pivot-handlers in Java webservices?
|
|
825
|
Can two different programming languages be mixed in a single ASMX file?
|
|
826
|
What is new about web services?
|
|
827
|
Which of the following is an open source SOAP server and client?
|
|
828
|
The core components, registry and repository, business processes, trading partner agreements are defined in _____________ standards of web services
|
|
829
|
Which of the following three kinds of data that web services have?
|
|
830
|
Service Transport, XML Messaging, Service Description and Service Discovery are four layers of
|
|
831
|
Which of the following is used to perform remote procedure calls in web services?
|
|
832
|
In accessing a web service through ‘synchronous call’,
|
|
833
|
State True False. A windows application creation or a web application creation is mandatory in order to test a web service.
|
|
834
|
Which of the following is a directory service where enterprises register and search for web services?
|
|
835
|
Why SOAP is used as a protocol for accessing a web service?
|
|
836
|
Which of the following is used to locate and describe web services?
|
|
837
|
Web services enables
|
|
838
|
What is a web service?
|
|
839
|
Coding and decoding, and transporting the data is performed by
|
|
840
|
The simpler approach of implementing a web service is named as
|
|
841
|
What are the web service platform elements?
|
|
842
|
What is RPC?
|
|
843
|
__________ is used to convert your application into Web-Application.
|
|
844
|
Which of the following is an example of Web services in action?
|
|
845
|
It is necessary to have Web services to build a service-oriented architecture.
|
|
846
|
WSDL is derived from which of the following?
|
|
847
|
Which of the following companies was NOT involved in founding UDDI?
|
|
848
|
True or false: Web services is tied to a specific programming language.
|
|
849
|
Web services is based on which of the following?
|
|
850
|
Web service technology uses which of the following?
|
|
851
|
jQuery guarantees to pass _______ in all event handler.
|
|
852
|
Which of the following statement is TRUE?
|
|
853
|
Which method allows you to filter elements based on specified criteria?
|
|
854
|
$("div p").first(); what it selects?
|
|
855
|
Which method returns all sibling elements of the selected element.
|
|
856
|
Which of the following method is used to hide the element?
|
|
857
|
Which of the following method is used to request data from server?
|
|
858
|
$("div p.myCls"). What does it select?
|
|
859
|
Which jQuery method is used to deal with name conflicts?
|
|
860
|
Which of the following function automatically attaches new DOM elements to an event handler?
|
|
861
|
Which of the following jQuery method add/remove CSS classes from the selected elements?
|
|
862
|
$(this) selects_________.
|
|
863
|
$("div[class *=’myCls’]â€) selects which element(s)?
|
|
864
|
______ selects DOM element by id.
|
|
865
|
Which of the following statement determines document is loaded?
|
|
866
|
jQuery library version 1.x is for ________ browser
|
|
867
|
Which of the following is shorthand for jQuery function?
|
|
868
|
jQuery library add which global function?
|
|
869
|
jQuery is a ________ library.
|
|
870
|
jQuery is a _______ side library.
|
|
871
|
Get the children of each element in the set of matched elements
|
|
872
|
The DOM node originally passed to jQuery
|
|
873
|
Store arbitrary data associated with the matched elements.
|
|
874
|
Attach a function to be executed whenever an Ajax request completes successfully.
|
|
875
|
Register a handler to be called when all Ajax requests have completed.
|
|
876
|
Register a handler to be called when the first Ajax request begins
|
|
877
|
Attach a function to be executed before an Ajax request is sent.
|
|
878
|
Register a handler to be called when Ajax requests complete with an error.
|
|
879
|
Get the children of each element in the set of matched elements.
|
|
880
|
Remove from the queue all items that have not yet been run.
|
|
881
|
Bind an event handler to the "click" JavaScript event.
|
|
882
|
Create a deep copy of the set of matched elements.
|
|
883
|
For each element in the set, get the first element that matches the selector by testing the element itself
|
|
884
|
Insert content, specified by the parameter, to the end of each element in the set of matched elements.
|
|
885
|
Select all elements that are in the progress of an animation at the time the selector is run.
|
|
886
|
Perform a custom animation of a set of CSS properties.
|
|
887
|
Add the previous set of elements on the stack to the current set.
|
|
888
|
Selects all elements in DOM scope.
|
|
889
|
Call all callbacks in a list with the given context and arguments.
|
|
890
|
Determine if the callbacks have already been called at least once.
|
|
891
|
Call all of the callbacks with the given arguments
|
|
892
|
Remove all of the callbacks from a list.
|
|
893
|
Lock a callback list in its current state.
|
|
894
|
Determine whether a supplied callback is in a list.
|
|
895
|
Determine if the callbacks list has been disabled.
|
|
896
|
Disable a callback list from doing anything more.
|
|
897
|
Add a callback or a collection of callbacks to a callback list.
|
|
898
|
Selects all button elements and elements of type button.
|
|
899
|
Determine if the callbacks list has been locked
|
|
900
|
Remove a callback or a collection of callbacks from a callback list.
|
|
901
|
Bind an event handler to the "change" JavaScript event on an element.
|
|
902
|
Selects all elements of type checkbox
|
|
903
|
Matches all elements that are checked or selected
|
|
904
|
Bind an event handler to the "blur" JavaScript event on an element.
|
|
905
|
Attach a handler to an event for the elements.
|
|
906
|
Insert content, specified by the parameter, before each element in the set of matched elements
|
|
907
|
Get the value of an attribute for the first element in the set of matched elements.
|
|
908
|
Insert every element in the set of matched elements to the end of the target.
|
|
909
|
$("div#id1 .cl1"). What does it select?
|
|
910
|
To get the property window in visual basic you have to press
|
|
911
|
Redim statement is used to :
|
|
912
|
In database application, any field does not contain any values can be recognized by:
|
|
913
|
Which of the following example is true about visual programming…
|
|
914
|
Visual Basic language launched early in…
|
|
915
|
An algorithm is…
|
|
916
|
Which option is true when the user clicks a button …….. is opened…
|
|
917
|
Which of the following appears at the top of the screen…
|
|
918
|
In an array will have the same properties as…
|
|
919
|
Which of the following arrays can be declared when the user may not know the exact size of the array at design time…
|
|
920
|
Which statement checks any undeclared variables and reports to the user about the error…
|
|
921
|
Which of the following is true about disabled menu item does not appear in the …
|
|
922
|
Which of the following property is common for many tools…
|
|
923
|
Which of the following box provides a set of choices to the user…
|
|
924
|
Val function translates a …………. value to a variable…
|
|
925
|
The size of 'Boolean' data type is :
|
|
926
|
Currency variable stores fixed point numbers with :
|
|
927
|
In visual basic the default unit is
|
|
928
|
To run an application you have to press
|
|
929
|
In visual basic you can draw something in
|
|
930
|
The full form of IIS is :
|
|
931
|
In case of visual basic, IDE means :
|
|
932
|
The arrange property of MDI form is available at design time.
|
|
933
|
It is possible to load a MDI form without any childform.
|
|
934
|
The other Single Document Interface forms are by default child of MDI form when MDI form is inserted.
|
|
935
|
Delete method of the recordset of Data Control or Data Access Object is delete the record which is pointed out by the record pointer.
|
|
936
|
The project extension name of a VB project is .vbj
|
|
937
|
It is possible to change the shortcut key assigned to any menu for accessing within the menu editor.
|
|
938
|
It is possible to access a menu without using mouse, to access the menu ;pressing the Ctrl key and the letter assigned to access the menu
|
|
939
|
The default startup object can not be changed in a project
|
|
940
|
In runtime it is not possible to change the form size.
|
|
941
|
Terminate is a valid event in form operation
|
|
942
|
Activate event is called before load event
|
|
943
|
CommonDialogs control is visible at runtime
|
|
944
|
If the Flag constant for the font common dialog box is cdlCFPrinterFonts then it causes the dialog box to show only the fonts supports by the printer specified by the hdc property
|
|
945
|
Flag property is used to adjust the function of each common dialog box
|
|
946
|
Dialog title property is used to change the title of any dialog box
|
|
947
|
The title of the dialog box can be changed.
|
|
948
|
CommonDialog control is the default control that anyone can find in the toolbar when a new project is started
|
|
949
|
Sort is a method by which elements can be sorted in flexgrid control
|
|
950
|
cell alignment property can be used to align the cells with different alignment style
|
|
951
|
It is not possible to change the back color property of option button control at run time.
|
|
952
|
It is possible to insert a picture in a option button control.
|
|
953
|
When someone uses the code like list1.list(1); then it will return the first item of the list box control.
|
|
954
|
List count property returns total number of items in list box control.
|
|
955
|
Sorted property of list box control is a design time property and cannot be changed in runtime.
|
|
956
|
It is possible to change the password character property of text box control at run time.
|
|
957
|
In a text box control the default caption for text box is text1.
|
|
958
|
Now() function will return the current drive and directory you are working on as return value.
|
|
959
|
Time() function is used to recover date & time.
|
|
960
|
ABS() function will generate a hole value when used with a number with fraction part (ex: 125.26598)
|
|
961
|
When using do loop-while statement then the statements within the loop body will be executed only once if the condition does not fulfilled
|
|
962
|
Function can return array as return value:
|
|
963
|
It is possible to build an application without using any form:
|
|
964
|
It is possible in visual basic to specifying array limit like from 1 to 10
|
|
965
|
Constants are processed faster than variables :
|
|
966
|
In visual basic 'Break' statement could be used along with "Select Case"
|
|
967
|
It is possible to declare 'Dynamic Array' in visual basic.
|
|
968
|
IsDate() function returns true if its argument is a valid date and time
|
|
969
|
Isnull(), IsEmpty() determines weather any variable has been initialize or not
|
|
970
|
Print' statement can be used to print any statement on the screen.
|
|
971
|
Time variable is used to store date and time in visual basic
|
|
972
|
Can you create Windows Services using VB.Net
|
|
973
|
How do you enable Strict Type Checking in VB.NET
|
|
974
|
How do you Create Constructors in VB.NET ?
|
|
975
|
How do you Dereference an Object in VB.NET ?
|
|
976
|
Select the keyword used to refer the name space in our code in VB.Net
|
|
977
|
To determine the folder in which your application is placed you can use:
|
|
978
|
My.Application.Log.WriteEntry , by default , writes to the file:
|
|
979
|
The metadata stored in the assembly is called :
|
|
980
|
Classes from which namespace will have to be used to read or write to a file ?
|
|
981
|
What’s the difference between a class field property ?
|
|
982
|
A ‘for’ loop will run faster in VB.NET or C# ?
|
|
983
|
which program will you use to assemble a program written in IL:
|
|
984
|
The vbc.exe compiler generates:
|
|
985
|
Can a toolbar display text instead of pictures in the buttons ?
|
|
986
|
What two controls are needed when creating a toolbar ?
|
|
987
|
This programming language model is used sparingly in VB 6 but is one of the cornerstones of VB.NET. Knowing the ins and outs of it will make an application migration project easier and also prepare you for additional work in VB.NET. What is the model ?
|
|
988
|
The Visual Basic Upgrade Wizard will convert all the code in your VB 6 application to VB.NET code for you
|
|
989
|
Some bits of a Visual Basic 6 application, like most APIs, can be easily migrated to VB.NET; other parts are not so straightforward. Which of the following will NOT have to be re-architected during a VB 6-to-VB.NET migration ?
|
|
990
|
If you know want to migrate your Visual Basic 6 application to VB.NET, what is the first thing you should do ?
|
|
991
|
Which class is used to run the EXE application file in VB.NET?
|
|
992
|
Smart Phone applications and other such devices can be written using:
|
|
993
|
Vb.Net classes can be derived in C#
|
|
994
|
Which of the following is not a method of Debug class
|
|
995
|
The serialization of an Object means that it is written out to a stream
|
|
996
|
How you refer the parent class in VB.Net
|
|
997
|
How do you refer the current class in VB.Net
|
|
998
|
How do you add Web Methods in VB.Net
|
|
999
|
Which of the method is used to display the form as modal
|
|
1000
|
The tool provided with .Net framework to register assemblies for use by COM is
|
|
1001
|
The DataAdapter uses which of the following object to retrieve the data from database
|
|
1002
|
Which is the best to retrieve Read-Only, Forward-only stream of data from database
|
|
1003
|
Which is the base class for TypedDataset
|
|
1004
|
Which method of the XMLdocument class takes xml as string while loading
|
|
1005
|
Where do you find COMException class
|
|
1006
|
How do we implement private interfaces
|
|
1007
|
How do you call non shared methods of a class
|
|
1008
|
Which interface allows to implement the Dispose method to do cleanup work
|
|
1009
|
The constructors in VB.Net is similar to which event in previous versions of VB
|
|
1010
|
How do you create a Read only Property in VB.NET
|
|
1011
|
How do you terminate code execute with in a VB.NET method
|
|
1012
|
The methods which return the values back to the calling code are called as
|
|
1013
|
Methods declared with the following modifier are not accessible outside the class
|
|
1014
|
Which of the following class does not belong to Collection namespace
|
|
1015
|
What is the significance of Option Explicit statement when it is set to On
|
|
1016
|
Which of the following Types will have data of fixed size
|
|
1017
|
Every type supported by CTS is derived from
|
|
1018
|
An Assemblyinfo file in a VB.NET project will have blank as file extesion.
|
|
1019
|
Most of the underlying integration of .NET is done through XML
|
|
1020
|
How many levels of compilation happens in .NET Framework
|
|
1021
|
How to dereference an object in VB.NET?
|
|
1022
|
_______ can be accessed from all types within the assembly, but not from outside the assembly.
|
|
1023
|
Using ___________ we can determine if a variable is initialized in VB.NET
|
|
1024
|
Which one of the following collections receives output from Trace and Debug classes?
|
|
1025
|
In VB.NET, the finalizer must use the Overrides keyword
|
|
1026
|
What is the purpose of Invoke Method?
|
|
1027
|
Which NameSpace is used to access the metadata in an Assembly?
|
|
1028
|
Which of the following is not correct about the value types and reference types in VB.NET?
|
|
1029
|
Lower bound value of array in VB.NET
|
|
1030
|
The smallest unit to which one can associate a version number in .NET is
|
|
1031
|
Which of the following namespace provides support for obtaining information and dynamic creation of types at runtime?
|
|
1032
|
If no access modifier is specified for a class, it is considered _________.
|
|
1033
|
Which of the following is not true for Shared members?
|
|
1034
|
Which of the following control doesn't receive the focus and doesn't have a TabIndex property?
|
|
1035
|
Which of the following control can contain other controls?
|
|
1036
|
Choose the correct statement about a delegate in VB.NET
|
|
1037
|
Default properties are always a parameterized property.
|
|
1038
|
The methods declared with the following modifiers are not accessible out side the current VB.NET project.
|
|
1039
|
COMException class is a part of ________
|
|
1040
|
________ is used to step through each line of code as it executes, including calls to other function.
|
|
1041
|
Which of the following is not a method of Debug class?
|
|
1042
|
________ protects system resources from unauthorized calls.
|
|
1043
|
Any project that compiles to an EXE or DLL files produces an assembly in .NET.
|
|
1044
|
Which of the following information is contained in the assembly manifest?
|
|
1045
|
The member “clear†of the Array class that sets a range of array elements to zero, false or null reference is a _____________ method.
|
|
1046
|
The corresponding .Net FCL type for Short is ___________
|
|
1047
|
____ allow custom items of information about a program element to be stored with an assembly’s metadata.
|
|
1048
|
What is the datatype of a variable in VBScript?
|
|
1049
|
What is the difference between the Sub procedure and Function procedure?
|
|
1050
|
In the Select Case statement, which case is used for unknown cases?
|
|
1051
|
What is the purpose of the Set keyword in VBScript?
|
|
1052
|
Which VBScript function returns the day of the week for any date?
|
|
1053
|
Which VBScript function can compare two strings?
|
|
1054
|
Which function is used to get the smallest subscript of an array in VBScript?
|
|
1055
|
Which function is used to get the largest subscript of an array in VBScript?
|
|
1056
|
Which function is used to get a subset of a array in VBScript?
|
|
1057
|
Which function is used to get a combined string from array of string in VBScript?
|
|
1058
|
A __________ variable is one that is declared inside a procedure.
|
|
1059
|
_______ loop repeats a group of statements for each item in a collection of objects or for each element of an array.
|
|
1060
|
_________ is the process of finding and removing errors
|
|
1061
|
The window in which the individual documents are displayed is called ____________window
|
|
1062
|
______ array size can be changed at run-time
|
|
1063
|
The ________ object is a stored query definition, which is a precompiled SQL statement
|
|
1064
|
14 The code in an application can be broken into logical components by _______ process.
|
|
1065
|
__________ is a collection of files
|
|
1066
|
The ______ is a tool used for both the Input and output purpose
|
|
1067
|
The default property for a text box control is _____
|
|
1068
|
____ is a method which moves the focus to the specified control or form
|
|
1069
|
_______ function is used to return a copy of a string without leading spaces.
|
|
1070
|
_______ cannot be declared in a form or class module
|
|
1071
|
_______ is used for finding out about objects, properties and methods
|
|
1072
|
_____ method removes a dialog box from view
|
|
1073
|
Form_Mouse Down ( ) procedure is executed when any mouse button is clicked in a free area of the ______.
|
|
1074
|
Visual Basic is a tool that allows you to develop application in __________
|
|
1075
|
Which of the given function is defined as None Function?
|
|
1076
|
What is the output of the given code snippet? def foo(fname, val): print(fname(val))foo(max, [1, 2, 3])foo(min, [1, 2, 3])
|
|
1077
|
List1 is [2, 33, 222, 14, 25], What is list1[-1]?
|
|
1078
|
What will be the return type of type(s)? Say s = "abcd"
|
|
1079
|
Text encoding in Python 3 is done in
|
|
1080
|
What is the output of the given code snippet? >>>max("what are you")
|
|
1081
|
How many arguments the help function, can take
|
|
1082
|
What is the output of the given code? x = 'abcd'for i in x: print(i.upper())
|
|
1083
|
What will be the output of the given code snippet? numbers = [1, 2, 3, 4]numbers.append([5,6,7,8])print(len(numbers))
|
|
1084
|
A function is defined in _______________.
|
|
1085
|
What is the output of the given code snippet? x = [12, 34] print(len(list(map(int, x))))
|
|
1086
|
Which of the following method are used to read from file
|
|
1087
|
What will be the output of the given code snippet? kvps = { '1' : 1, '2' : 2 }theCopy = kvps.copy()kvps['1'] = 5sum = kvps['1'] + theCopy['1']print(sum)
|
|
1088
|
The pass statement is used for
|
|
1089
|
On UNIX systems, the command to make Python source file, executable, is
|
|
1090
|
The return value of trunc() is _______________.
|
|
1091
|
When a module is imported for first time then,
|
|
1092
|
What is the value in 'x' from following expression x = 19 % 4 + 15 / 2 * 3
|
|
1093
|
What is the output of the given code snippet? i = 1while True: if i%3 == 0: break print(i) i + = 1
|
|
1094
|
What will be the output of the following? “helloâ€+1+2+3?
|
|
1095
|
What is the output of the given code snippet? x = "abcdef"i = "a"while i in x: print(i, end = " ")
|
|
1096
|
What is the extension of an Python program
|
|
1097
|
Which of the following is used to close a file object (fp)?
|
|
1098
|
Suppose list1 is [1, 5, 9], what is sum(list1) ?
|
|
1099
|
Syntactically lambda forms are restricted to how many expressions
|
|
1100
|
What is the value in 'x' from following expression x = 17 / 2 * 3 + 2
|
|
1101
|
What does the readlines() method returns?
|
|
1102
|
Which of the given arithmetic operators cannot be used with Strings?+, *, -, **
|
|
1103
|
A module imported (using an variant) by import statement, does not imports
|
|
1104
|
Which type of exception is raised when an operation or function is applied to an object of inappropriate type
|
|
1105
|
The variadic arguments beyond the formal parameter list are contained in
|
|
1106
|
What is the output of the given code snippet? i = 1while True:if i%2 == 0:breakprint(i)i += 2
|
|
1107
|
What is the output of the given code snippet? i = 0while i < 3: print(i) i += 1else: print(0)
|
|
1108
|
Which of the following function takes a string as argument and displays it to the user
|
|
1109
|
Which amongst the following is not a core datatype?
|
|
1110
|
What will be the output of the given code snippet? names1 = ['Amir', 'Barry', 'Chales', 'Dao']names2 = names1names3 = names1[:]names2[0] = 'Alice'names3[1] = 'Bob'sum = 0for ls in (names1, names2, names3): if ls[0] == 'Alice': sum += 1 if ls[1] == 'Bob': sum += 10print(sum)
|
|
1111
|
If x = 545; what is the output of the given code snippet?print(“%06dâ€%x)
|
|
1112
|
What will be the return type of following code snippet? print "ABCDEF".center()
|
|
1113
|
What will be the return type of type(s)? print ("abababbaababaaab".count("a", 2, 14))
|
|
1114
|
Which character indicates an append mode to open function
|
|
1115
|
The option given at command-line interface during interpreter invocation to discard docstrings for optimization, is
|
|
1116
|
What is the output of the given code snippet? x = 'abcd'for i in range(len(x)): print(i)
|
|
1117
|
What is the output of the given code snippet? x = [12, 34]print(len(''.join(list(map(int, x)))))
|
|
1118
|
What error shall occur when we execute the following?apple = mango
|
|
1119
|
What will be the output of the given code snippet? d1 = {"john":40, "peter":45}d2 = {"john":466, "peter":45}d1 == d2
|
|
1120
|
What is the output of the given code snippet? print("abc DEF".capitalize());
|
|
1121
|
What is the extension of an intermediate form that Python transforms the program into
|
|
1122
|
A imported module is stored as
|
|
1123
|
What is the output of the following codea = ['a','b', 'c']for i in range(len(a)): print(i, a[i],end=' ')
|
|
1124
|
What statement gives the following output?hello\exampleest.txt
|
|
1125
|
The function used to traverse a sequence in reverse direction, is
|
|
1126
|
Which statement is used to tell Python to skip the rest of the statements in the current loop block and to continue to the next iteration of the loop
|
|
1127
|
No value in python is assigned by
|
|
1128
|
Addition of function name in the current symbol table is done by
|
|
1129
|
What is the output of given code snippet?def sum(*args): '''Function returns the sum of all values''' r = 0 for i in args: r += i return rprint(sum.__doc__)print(sum(1, 2, 3))print(sum(1, 2, 3, 4, 5))
|
|
1130
|
What is the output of the given code snippet?x = "abcdef"i = "a"while i in x: x = x[:-1] print(i)
|
|
1131
|
Which of the following statement terminates the loop statement and transfers execution to the statement immediately following the loop?
|
|
1132
|
What will be the output of the given code snippet?boxes = {}jars = {}crates = {}boxes['cereal'] = 1boxes['candy'] = 2jars['honey'] = 4crates['boxes'] = boxescrates['jars'] = jarsprint(len(crates[boxes]))
|
|
1133
|
What will be the output of the given code snippet?kvps = { '1' : 1, '2' : 2 , '3' : 3, '4' : 4, '5' : 5}newData = { '1' : 10, '3' : 30 }kvps.update(newData)print(kvps)
|
|
1134
|
What is the output of the given code snippet?(str1 = 'hello'str2 = ','str3 = 'world'print str1[-1:])
|
|
1135
|
ListExample is [3, 4, 5, 20, 5, 25, 1, 3],What is list1 after listExample.extend([34, 5])?
|
|
1136
|
What is the output of the given code snippet?print("abcdef".center(0))
|
|
1137
|
_____________ refers to mathematical function.
|
|
1138
|
What is the output of the given code snippet?elements = [0, 1, 2]def incr(x): return x+1print(list(map(elements, incr)))
|
|
1139
|
What is the output of the given code snippet?age = 10;if(age<10): print (age)else: print(age+3)
|
|
1140
|
The version number of current python environment is checked by using which module
|
|
1141
|
What will be the output of the given code snippet?kvps = { '1' : 1, '2' : 2 }theCopy = dict(kvps)kvps['1'] = 5sum = kvps['1'] + theCopy['1']print(sum)
|
|
1142
|
The base class for all built-in exceptions, is
|
|
1143
|
What will be the return type of type(s)?str = "Vskills"print str.find("s")
|
|
1144
|
Which of the following are the advantages of functions in python?
|
|
1145
|
What will be the output of the given code snippet?numberGames = {}numberGames[(1,2,4)] = -8numberGames[(4,2,1)] = -10numberGames[(1,2)] = -12sum = 0for k in numberGames: sum += numberGames[k] print(len(numberGames) + sum)
|
|
1146
|
What is the value in 'x' from following expression x = 17 / 2 % 2 * 3**3
|
|
1147
|
What will be the return type of following code snippet?print "ABCDEF".center()
|
|
1148
|
What is the output of the given code snippet?i = 2while True: if i%3 == 0: break print(i) i += 2
|
|
1149
|
The return value of trunc() is _______________
|
|
1150
|
What will be the return type of type(s)?str = "Vskills"print str.rfind("s")
|
|
1151
|
Given the following code, will the program terminate?balance = 14while(True): if(balance<13): break balance = balance-13
|
|
1152
|
Extra parameters in the exception object can be stored by including them in
|
|
1153
|
Python commands can be executed directly by interpreter with using the switch
|
|
1154
|
Reloading a module when it has already been imported is done by using which function
|
|
1155
|
The module name is stored by which variable
|
|
1156
|
What is the output of the given code snippet?print type(type(int))
|
|
1157
|
What is the output of the given code snippet?def foo(fname, val): print(fname(val))foo(max, [1, 2, 3])foo(min, [1, 2, 3])
|
|
1158
|
The data structure which is immutable, is
|
|
1159
|
Arrange the following in the order of precedence in Python.i) Parenthesesii) Exponentialiii) Divisioniv) Multiplicationv) Additionvi) Subtraction
|
|
1160
|
What is the output of the given code snippet?print(0xA + 0xB + 0xC)
|
|
1161
|
What is the output of the given code snippet?(print('The sum of {0:b} and {1:x} is {2:o}'.format(2, 10, 12)))
|
|
1162
|
What will be the output of the given code snippet?aList = [1,2]bList = [3,4]kvps = { '1' : aList, '2' : bList }theCopy = kvps.copy()kvps['1'][0] = 5sum = kvps['1'][0] + theCopy['1'][0]print(sum)
|
|
1163
|
What will be the output of the given code snippet?(names1 = ['Amir', 'Bala', 'Charlie']names2 = [name.lower() for name in names1]print(names2[2][0]))
|
|
1164
|
What will be the return type of type(s)? print("abc DEF".capitalize())
|
|
1165
|
To insert 5 to the third position in list1, which command is used?
|
|
1166
|
Python supports the creation of anonymous functions at runtime, using a construct called ___________________
|
|
1167
|
The weakly internal variables have, which special character to recognize them
|
|
1168
|
What is the output of the given code snippet?(class Test: def __init__(self): self.str = "Functions" self.x = 15 def fun(): return Test()t = fun() print(t.x)print(str))
|
|
1169
|
How do you do a random shuffle in a list named list1?
|
|
1170
|
What is the output of the given code snippet?(i = 5while True: if i%0O9 == 0: break print(i) i += 1)
|
|
1171
|
The _______________ module in the python standard library parses options received from the command line.
|
|
1172
|
What is the output of the given code snippet?(x = "Hello World"print "%s" % x[4:8])
|
|
1173
|
What will be the output of the given code snippet?(kvps = { '1' : 1, '2' : 2 }theCopy = kvps.copy()kvps['1'] = 5sum = kvps['1'] + theCopy['1']print(sum))
|
|
1174
|
What will be the return type of type(s)? print ("abababbaababaaab".count("a",-12,-2))
|
|
1175
|
The character used to indicate end of a block, is
|
|
1176
|
What is the output of the given code snippet?(a = [0, 1, 2, 3]for a[0] in a: print(a[0]))
|
|
1177
|
What is the output of the following code(i=5def f(a=i): print(a)i= 6f())
|
|
1178
|
The format specifier which left aligns the value in Python 3, is
|
|
1179
|
What is the output of the given code snippet?(x = 2for i in range(x): x += 1 print (x))
|
|
1180
|
What will be the output of the given code snippet?(confusion = {}confusion[1] = 1confusion['1'] = 2confusion[1.0] = 4sum = 0for k in confusion: sum += confusion[k]print(sum))
|
|
1181
|
What is the output of the given code snippet?(i = 0while i < 3: print(i) i += 1else: print(0))
|
|
1182
|
What is the output of the given code snippet?(print('abcdefcdghcd'.split('cd', 2)))
|
|
1183
|
What is the output of the given code snippet?(n=9while n!=0: print(n) n=n-2)
|
|
1184
|
The local variable names beginning with an underscore that are discouraged are _____________________
|
|
1185
|
What will be the output of the given code snippet?(d = {"john":40, "peter":45}"john" in d)
|
|
1186
|
What will be the output of the given code snippet?(country_counter = {}def addone(country): if country in country_counter: country_counter[country] += 1 else: country_counter[country] = 1addone('China')addone('Japan')addone('china')print(len(country_counter)))
|
|
1187
|
What is the output of the following code snippet?(def sum(*args): r = 0 for i in args: r += i return rprint(sum.__doc__)print(sum(1, 2))print(sum(1, 2, 3, 4)))
|
|
1188
|
What is the shell prompt symbol usually in Linux
|
|
1189
|
listExample is [3, 4, 5, 20, 5, 25, 1, 3], What is list1 after listExample.pop()?
|
|
1190
|
Which of the given statements create a dictionary?
|
|
1191
|
What is the output of the given code snippet?(x = [[0], [1]]print(len(' '.join(list(map(str, x))))))
|
|
1192
|
The __________ function of dictionary gets all the keys from the dictionary.
|
|
1193
|
Where do the arguments to functions always appear?
|
|
1194
|
What is the output of the given code snippet?(x = ['ab', 'cd']print(list(map(list, x))))
|
|
1195
|
The numeric value that an python variable can be assigned other than float and integer, is
|
|
1196
|
What is the output of the given code snippet?(str = "Hello Python"str[3] = 'o'str[7] = 'i'print(str))
|
|
1197
|
What is the output of the given code snippet?(i = 0while i < 5: print(i) i += 1 if i == 3: breakelse: print(0))
|
|
1198
|
What will happen if no arguments are passed to the seek function?
|
|
1199
|
What is the output of the given code snippet? (i = 5while True: if i%0O10 == 0: break print(i) i += 1)
|
|
1200
|
Bitwise operator works on _______________ and performs _______________ operation, in Python.
|
|
1201
|
What is the output of the given code snippet? (for i in range(int(float('inf'))): print (i))
|
|
1202
|
Suppose list1 is [3, 5, 25, 1, 3], What is min(list1) ?
|
|
1203
|
What is the output of the given code snippet?()x = (i for i in range(3))for i in x: print(i)
|
|
1204
|
What is the output of the given code snippet? (for i in [1, 2, 3, 4, 5][::-2]: print (i))
|
|
1205
|
What is the output of the given code snippet? (x = ['ab', 'cd']print(len(list(map(list, x)))))
|
|
1206
|
To store values in terms of keys and value _______________ is used.
|
|
1207
|
Which type of exception is raised when an operation or function is applied to an object of inappropriate type.
|
|
1208
|
What is the output of the given code snippet? print('abcdefcdghcd'.split('cd',2))
|
|
1209
|
Which parameter displays python version
|
|
1210
|
What is the output of the given code snippet?
|
|
1211
|
MySQL supports user defined functions
|
|
1212
|
Wildcards are
|
|
1213
|
The GROUP BY command cannot be used with aggregate functions together
|
|
1214
|
The ASC and DESC keywords can be used in the same statement
|
|
1215
|
The clause ORDER is used to sort records in either ascending or descending order.
|
|
1216
|
What improvements can be made to the query UPDATE students SET `contact number` = 0999;
|
|
1217
|
What command is used to permanently remove a record from a database table?
|
|
1218
|
What will be the output of the following query INSERT INTO students (student name) VALUE ('James Lenon');
|
|
1219
|
The query SELECT * FROM `movies` INSERT INTO `movies_archive` executes without any errors.
|
|
1220
|
What will be the output of the following query. SELECT * FROM `sales` WHERE amount > 200.
|
|
1221
|
The WHERE clause is exactly HAVING clause
|
|
1222
|
Which of the following scripts will run successfully
|
|
1223
|
The WHERE clause is mandatory when using the SELECT command
|
|
1224
|
the command DROP SCHEMA `STUDENTS`; will delete the students database.
|
|
1225
|
Which of the following SQL statements will generate an error when executed.
|
|
1226
|
a one to many relationship can only contain multiple entries of both primary and foreign keys.
|
|
1227
|
Which of the following is not YES regarding ER modeling
|
|
1228
|
What is a composite key?
|
|
1229
|
Normalizations is...
|
|
1230
|
The database development lifecycle is very important to the successful implementation of a database system.
|
|
1231
|
The logic model of a database is?
|
|
1232
|
MySQL workbench decreases the productivity of a MySQL developer compared to other server access tools such as phpMyAdmin?
|
|
1233
|
MySQL supports multiple database storage engines.
|
|
1234
|
Which type of database management system represents relations using tables?
|
|
1235
|
A systematic collection of data stored in a central location is known as?
|
|
1236
|
During program runtime, you use the class to create discrete objects (instances) in the memory. This process is called instantiation
|
|
1237
|
The CLASS statement can be nested, that is, you can define a class within a class
|
|
1238
|
Which of the following can be used to store control data such as screen sequences or program parameters?
|
|
1239
|
Which of the following receive the request from client and assigns the request to one of the work process?
|
|
1240
|
Which of the following can be called from both the program in which it is defined and from other programs?
|
|
1241
|
ABAP contains a series of statements that allow you to leave an event block. Which of the below is specifically used to leave a GET event block?
|
|
1242
|
Which of the below transaction is used to call Context builder and to create a new context?
|
|
1243
|
To assign data type of another object to the declaring object, which of the following can be used?
|
|
1244
|
Which of the below programs are not executable and act as container for global classes?
|
|
1245
|
In a chained statement in ABAP program, which of the below syntax are used for writing the identical part, to separate variables and to end the statement?
|
|
1246
|
Which of the following statement is correct about Radio button groups in 1 screen?
|
|
1247
|
In SAP ABAP high level architecture, which of the following layer consists of input devices like web browser, mobile devices?
|
|
1248
|
What is the attribute which defines the storage type of a Standard Table or a Custom Table?
|
|
1249
|
Where does the BADI Definition reside at?
|
|
1250
|
Which statements from below are false about Logical Database?
|
|
1251
|
In Debugging, How can the user set a breakpoint?
|
|
1252
|
Which of the following below are true about IDOC?
|
|
1253
|
What is the Structure of LSMW?
|
|
1254
|
What is the Tcode for SQL Trace?
|
|
1255
|
What is the attribute which defines the size of a Standard Table or a Custom Table?
|
|
1256
|
Identify the Keyword that determines if a CMOD function exit has been provided?
|
|
1257
|
In regard to the field selection, which option of the SELECT statement is required?
|
|
1258
|
What does Business Add-in does not consists of?
|
|
1259
|
What are the components of Logical Database?
|
|
1260
|
How can we start an ABAP new Debugger?
|
|
1261
|
What are not the attributes with respect to Tabstrip?
|
|
1262
|
What are the default menu’s seen in the SAP Screen?
|
|
1263
|
What are the servers involved during QRA?
|
|
1264
|
What happens when two “ top-of-page “ statements were given in the Program?
|
|
1265
|
What is the Tcode for RFC Programming?
|
|
1266
|
What is the Tcode for IDoc Testing Tool?
|
|
1267
|
Placing value of screen fields to ABAP fields which one is used?
|
|
1268
|
What is the responsibility of a DBA?
|
|
1269
|
What is the activity done in the Production server of SAP?
|
|
1270
|
Which view uses only one table?
|
|
1271
|
What are the output formats of ALV?
|
|
1272
|
Shipping comes under which module of SAP?
|
|
1273
|
What happens when a Function Module has been called?
|
|
1274
|
Which component of class, preserves its own consistency?
|
|
1275
|
Dynamically generated function code is stored in
|
|
1276
|
Syntax for Static Method Specification?
|
|
1277
|
Customization is done in?
|
|
1278
|
What is the Tcode where we can develop the USER-EXITS?
|
|
1279
|
What is the Tcode for SAP Online Support System?
|
|
1280
|
What happens when a get_instance factory method is called
|
|
1281
|
In a search help, by using which parameter the specialization of a field is found?
|
|
1282
|
What is the Internal Table which has the same response time irrespective with the size o f the table?
|
|
1283
|
What is the Tcode to view the list of users associated with the same client?
|
|
1284
|
What is the Tcode for Lock entries?
|
|
1285
|
What is the Tcode used for calling transport organizer?
|
|
1286
|
How many radio buttons are associated when there are 4 radio buttons as a single radio button group?
|
|
1287
|
Which of the following functions does the ABAP Dispatcher perform?
|
|
1288
|
What are characteristics of a hashed internal table?
|
|
1289
|
You want to define data structures to hold two fields with data elements s_carr_id and s_carrname. Which of the following declarations can be used to define this data structure?
|
|
1290
|
You need to perform a downcast. What should you do?
|
|
1291
|
Which of the following controller types can exist only once in a Web Dynpro component?
|
|
1292
|
Which of the following data types are predefined ABAP data types?
|
|
1293
|
Which of the following conditions must be fulfilled when using a GROUP BY clause in a SELECT statement?
|
|
1294
|
Which of the following rules must you follow when creating subscreens?
|
|
1295
|
Which of the following will be method is executed after component content initialized, during component lifecycle
|
|
1296
|
Which type of forms places form handling logic within a component's class properties and provides interaction through observables
|
|
1297
|
Which type of forms places most of the form handling logic within that form's template
|
|
1298
|
What is not an feature of template driven forms in Angular
|
|
1299
|
Select the output of following, assuming dateObj is (year: 2015, month: 6, day: 15, hour: 21, minute: 43, second: 11) in the local time and locale is 'en-US' - {{ dateObj | date:'shortTime' }}
|
|
1300
|
What is the output, if the value for end is omitted, in SlicePipe
|
|
1301
|
What is the default value of symbolDisplay, while using the CurrencyPipe
|
|
1302
|
Identify the correct output of currencypipe expression - {{num1 | currency:'USD':true:'2.2-4'}} , given the value of num1 as 10.263782
|
|
1303
|
What is the output, of having a negative integer for start, in SlicePipe
|
|
1304
|
Which option value for directive class, enumerates the set of data-bound input properties for a directive
|
|
1305
|
What is the advantages of the component-based architecture
|
|
1306
|
What is the value being assigned to cake in typescript statement - let cake: str = 10;
|
|
1307
|
Which of the following method is executed at first during component lifecycle
|
|
1308
|
Select an invalid expression in Angular
|
|
1309
|
What does NgModules consolidates, in Angular
|
|
1310
|
What is not an feature of reactive forms in Angular
|
|
1311
|
What marks the start and end of an HTML element
|
|
1312
|
What is the output, of having a integer having value of positive and greater than the size of the expression, for start, in SlicePipe
|
|
1313
|
What is the output, of having a integer having value of negative and greater than the size of the expression, for start, in SlicePipe
|
|
1314
|
What is the default ECMAScript target version given by -t parameter of tsc compiler
|
|
1315
|
What does Angular an NgForm component represents in an HTML Web page
|
|
1316
|
Which subdirectory includes files for end-to-end testing, when you invoke the ng command to create an Angular application
|
|
1317
|
What does a component class is defined to
|
|
1318
|
Which of the following will be method is executed after every check of component views, during component lifecycle
|
|
1319
|
Select the correct output of currencypipe expression - {{num1 | currency}} , given the value of num1 as 0.25
|
|
1320
|
What will be the output of decimalpipe expression - {{num1 | number:'3.2-5'}} , given the value of num1 as 12.638467846
|
|
1321
|
What is the default value of minFractionDigits, while using the DecimalPipe
|
|
1322
|
Which schematics in Angular Material, will create a new component that includes a toolbar with the app name and the side nav responsive based on Material breakpoints
|
|
1323
|
Select the output, if trying to evaluate undefined properties, in Angular
|
|
1324
|
Which option value for directive class, maps class properties to host element bindings for properties, attributes, and events, using a set of key-value pairs
|
|
1325
|
How many instance of the Router service should a routed Angular application have
|
|
1326
|
What NgModule metadata does , in Angular
|
|
1327
|
Which of the following is used by Angular to process expression
|
|
1328
|
What is not an feature being offered by Angular
|
|
1329
|
Which type of web applications are more suitable for Angular
|
|
1330
|
What is the output, of having a positive integer for start, in SlicePipe
|
|
1331
|
What is the data type of first parameter of ngInclude directive of Angular
|
|
1332
|
Which of the following is the root element in HTML
|
|
1333
|
What is the benefit of Angular Animation
|
|
1334
|
Which types of directive in Angular, change the behavior of a component or element but don't affect the template
|
|
1335
|
Which of the following will be method is executed after every check of component check, during component lifecycle
|
|
1336
|
What is the default value of maxFractionDigits, while using the DecimalPipe
|
|
1337
|
Select the output of following, assuming dateObj is (year: 2015, month: 6, day: 15, hour: 21, minute: 43, second: 11) in the local time and locale is 'en-US' - {{ dateObj | date:'mmss' }}
|
|
1338
|
How to install TypeScript transpiler
|
|
1339
|
What is sent by server after approval of the client's request
|
|
1340
|
How many parameters are taken by animate function in Angular
|
|
1341
|
Which tsc command will concatenate all the generated JavaScript on a single file called final.js
|
|
1342
|
How you can link together different pages of your app in Angular 8
|
|
1343
|
Which operation does Builders API in Angular 8, provide builders for
|
|
1344
|
What has global CSS rulesets of an Angular 8 project
|
|
1345
|
Which folder in an Angular 8 project, is used for end to end testing
|
|
1346
|
What does differential loading in Angular 8, refers to
|
|
1347
|
Which Ivy feature in Angular 8, focuses on removing the unused code
|
|
1348
|
Which of the following contains the project's dependencies , in an Angular 8 project
|
|
1349
|
What has routing and components for an Angular 8 project
|
|
1350
|
What is an build tool in Angular 8
|
|
1351
|
Which is the minimum Typescript version supported by Angular 8
|
|
1352
|
DATA FROM DIFFERENT CLIENTS IS KEPT SEPARATELY
|
|
1353
|
BASIC FUNCTIONALITY 7.00 MATCHES WITH CORE COMPONENT
|
|
1354
|
COMMUNICATION BETWEEN ABAP STACK AND JAVA STACK IS DONE THROUGH ___.
|
|
1355
|
IN SAP NETWEAVER AS ABAP+JAVA TWO DIFFERENT DATABASES ARE REQUIRED, ONE FOR ABAP, ANOTHER FOR JAVA.
|
|
1356
|
WHICH OF THE FOLLOWING CONTAINS A MESSAGE SERVER?
|
|
1357
|
TRANSACTION SCC1 COPIES CHANGES FROM ONE CLIENT TO ANOTHER CLIENT BASED ON
|
|
1358
|
TRANSPORT REQUEST IS MADEUP OF
|
|
1359
|
WHICH SYSTEM IS RESPONSIBLE FOR MAINTENANCE OF INFRASTRUCTURE & CONFIGURATION OF STMS?
|
|
1360
|
WHICH OF THE FOLLOWING PROPERTY SHOULD ONE CONSIDER WHEN DECIDING THE DOMAIN CONTROLLER SYSTEM.
|
|
1361
|
IS IT POSSIBLE TO DEFINE MORE THAN ONE CONSOLIDATION AND DELIVERY ROUTES IN A TRANSPORT LANDSCAPE?
|
|
1362
|
IN A TRANSPORT DOMAIN CONTAINING 8 SYSTEMS, TWO SYSTEMS CAN SHARE The SAME SYSTEM ID?
|
|
1363
|
WHICH OF THE FOLLOWING STRATEGIES IS MOST RECOMMENDED AS A TRANSPORT STRATEGY IN SAP?
|
|
1364
|
WHICH OF THE FOLLOWING WILL BE DEFAULT NAME OF CONSOLIDATION ROUTE FOR A THREE SYSTEM LANDSCAPE CONTAINING, QMS, DMS AND PMS SYSTEMS?
|
|
1365
|
A PROJECT MANAGER CREATES ______ AND DISTRIBUTES INDIVIDUAL ______ TO THE CUSTOMIZING TEAM
|
|
1366
|
WHICH OF THE FOLLOWING IS CLIENT DEPENDENT REQUEST
|
|
1367
|
WHICH OF THE FOLLOWING WILL CHANGE AFTER APPLYING SUPPORT PACK TO A COMPONENT
|
|
1368
|
IN A THREE SYSTEM LANDSCAPE, HOW CAN YOU APPLY A SNOTE THROUGHOUT THE LANDSCAPE
|
|
1369
|
WHEN DOES THE BUFFER OF PRODUCTION GETS POPULATED IN STANDARD THREE SYSTEM LANDSCAPE?
|
|
1370
|
WHAT WILL YOU CHECK WHEN YOU SEE A TRUCK SYMBOL IN IMPORT QUEUE, AND THE TRANSPORT IS HANGING
|
|
1371
|
THE FOLLOWING TABLES ARE USED FOR COMMUNICATION BETWEEN RDD* JOBS AND TP WHILE IMPORT OF A TRANSPORT REQUEST
|
|
1372
|
THREE SYSTEMS IN A SINGLE LANDSCAPE CAN HAVE DIFFERENT TRANSPORT DIRECTORIES
|
|
1373
|
WHEN YOU WANT TO ADD A NEW PATCH TO YOUR EXISTING COMPONENT, FOR EXAMPLE, FIN_BASIS 700 - YOU WILL USE
|
|
1374
|
WHEN YOU WANT TO ADD A NEW COMPONENT TO YOUR EXISTING NW 700 SYSTEM, FOR EXAMPLE, FIN_BASIS 700 - YOU WILL USE
|
|
1375
|
IS IT POSSIBLE TO DEFINE MORE THAN ONE CONSOLIDATION AND DELIVERY ROUTES IN A TRANSPORT DOMAIN?
|
|
1376
|
THE SYSTEMS IN A SYSTEM LANDSCAPE SHARE CUSTOMIZING AND REPOSITORY OBJECTS VIA ________ ?
|
|
1377
|
Which configuration file is used for scenario test in Yeoman
|
|
1378
|
What is the default scope type in Angular JS
|
|
1379
|
What is used to read or write a cookie by Angular JS
|
|
1380
|
Which of the following is true about AngularJS expressions
|
|
1381
|
How many optional arguments are taken by $resource function
|
|
1382
|
What acts as glue between controller and view?
|
|
1383
|
AngularJS needs data in which format to populate its model?
|
|
1384
|
The legal restrict value "M" is used to invoke directive for which meathod?
|
|
1385
|
Can multiple angular applications be bootstrapped using same element?
|
|
1386
|
Filter is applied to an expression using which character? a
|
|
1387
|
With more than one ng-app in an HTML document (an HTML page), are all of them automatically initialized.
|
|
1388
|
Can an HTML page have multiple "ng-app" directive for bootstrapping multiple AngularJS application?
|
|
1389
|
AngularJS initializes based upon which of the following scenario?
|
|
1390
|
AngularJS expressions support?
|
|
1391
|
AngularJS Expressions is 2-way data binding?
|
|
1392
|
Where the Loading of AngularJS Library is recommended?
|
|
1393
|
Who is known as the Father of AngularJS?
|
|
1394
|
AngularJS is a ________
|
|
1395
|
Which AngularJS attribute will copy the DOM
|
|
1396
|
What is the second argument of $watch()
|
|
1397
|
Which directive is used to render contents of a variable as HTML, in safe manner
|
|
1398
|
Which feature of Angular JS does the law of demeter is applicable to
|
|
1399
|
Which of the following is true about currency filter
|
|
1400
|
What is the state of caching of all requests by default
|
|
1401
|
Which of the following is the character with which the name of the Angular's bundled services start with
|
|
1402
|
Which of the following Angular
|
|
1403
|
Which of the following refers to the view component in Angular JS
|
|
1404
|
What is the default value for priority property in directive definition
|
|
1405
|
What is the style of writing tests being supported by Angular JS, by default
|
|
1406
|
Which directive definition option, is used to replace the current element, if true
|
|
1407
|
Which of the following is true about $routeProvider
|
|
1408
|
Which of the following directive is used to display text
|
|
1409
|
What is the type of method call, is XHR
|
|
1410
|
The term JSON refers to ______________
|
|
1411
|
Which HTML tag is used to define the templates in Angular JS
|
|
1412
|
Which configuration file is used for unit test in Yeoman
|
|
1413
|
How angular.module works
|
|
1414
|
Which of the following character is used to implement data binding in Angular JS
|
|
1415
|
Which of the following creates a configurable service in Angular JS
|
|
1416
|
What is the default port number of the Karma server
|
|
1417
|
How many arguments does 'then' function takes
|
|
1418
|
Which configuration parameter of config object in Angular JS, specify the HTTP request type
|
|
1419
|
Which of the following is not an filter in Angular JS
|
|
1420
|
What does the term AJAX expands to ______________
|
|
1421
|
Which configuration object is used to customize headers for outgoing requests
|
|
1422
|
How many equivalent forms of displaying text are present in Angular JS
|
|
1423
|
What is the unit of time used in timeout configuration parameter of config object in Angular JS
|
|
1424
|
Which binding strategy symbol in isolated scope, means passing in a function from the parent scope to be called later
|
|
1425
|
How many components does localeIDs consists of
|
|
1426
|
What is usually the data type of first argument of $watch()
|
|
1427
|
Which part of the MVC model does the application logic resides in
|
|
1428
|
Which is the valid declaration in Angular JS if validated in an XML parser
|
|
1429
|
Which of the following is true about provider
|
|
1430
|
Which code is optional during specification for $locale in Angular JS
|
|
1431
|
Which binding strategy symbol in isolated scope, means passing this attribute as an string
|
|
1432
|
Which directive definition option, is used to require other directive to be present for proper functioning
|
|
1433
|
Which of the following Angular's service is used to interact with browser's location
|
|
1434
|
Which character is used to chain multiple filters
|
|
1435
|
How many required arguments are taken by $resource function
|
|
1436
|
What is the default value for restrict property in directive definition
|
|
1437
|
Which of the following is not a core AngularJS directive.
|
|
1438
|
What value is assigned to restrict property in directive definition, for being specific to comments
|
|
1439
|
Which type of scope, inherits no model property from it
|
|
1440
|
What value is assigned to restrict property in directive definition, for being specific to attributes
|
|
1441
|
In the _____________ stage of the project life cycle, a major portion of the physical project work performed
|
|
1442
|
When considering the following activities, which is the best example of a project?
|
|
1443
|
Which of the following is NOT considered to be a characteristic of a project
|
|
1444
|
Cause of change that cannot be managed by the PM is
|
|
1445
|
Despite of how carefully a project is planned, it is almost certain to be changed before
|
|
1446
|
Problem of changing the scope or performance, expected of a project is a major
|
|
1447
|
An increase in user or team knowledge or sophistication is the primary factor leading to
|
|
1448
|
Causes for change in projects are basically of
|
|
1449
|
What is the full form of AJAX?
|
|
1450
|
Which programming language driver is not provisioned in selenium core ?
|
|
1451
|
Which amongst the following is not a Component of Selenium?
|
|
1452
|
What type of test design technique, is applied if using unit testing ?
|
|
1453
|
What is the feature of Webdriver API
|
|
1454
|
What character is used to separate cookies, when accessed by selenium in Selenium 1.0
|
|
1455
|
Which of the following is not an locator type
|
|
1456
|
Which operating system supports Selenium installation and application on Chromium web browser
|
|
1457
|
DOM refers to ___________________.
|
|
1458
|
Which WebDriver log level has messages of an informative nature like information about received commands ?
|
|
1459
|
What is common between Selenium 1 and 2
|
|
1460
|
How many parameters does job pattern of Jenkins accept, for periodic execution
|
|
1461
|
When did Selenium was launched
|
|
1462
|
Which of the following is not an locator
|
|
1463
|
How many parameters does an accessor used to extend Selenium, can accept ?
|
|
1464
|
Which CSS selector will locate a element with ID starting with the text ctrl ?
|
|
1465
|
What is used to extend Selenium and refers to finding the element in UI ?
|
|
1466
|
Which of the following web element does, submit function is applicable, in Selenium Webdriver ?
|
|
1467
|
What is the default port used by Selenium Hub for communication ?
|
|
1468
|
Which tag in configuration file of Maven is used to tell the version of Selenium ?
|
|
1469
|
What should be used for dynamically generated identifier ?
|
|
1470
|
What is an cookie in Selenium ?
|
|
1471
|
Which log type collects logs for FirefoxDriver internals under Selenium ?
|
|
1472
|
What does Firefox profile, stores ?
|
|
1473
|
Which column values in the test table will be taken by second argument of custom action used for extending Selenium ?
|
|
1474
|
Which of the following finds the item ending with the value passed in and is equivalent to the Xpath ends-with
|
|
1475
|
Which of the following needs a time value in Selenium
|
|
1476
|
What is called that scale for large test suites or test suites that must be run in multiple environments
|
|
1477
|
Which of the following programming language is not supported by Selenium WebDriver ?
|
|
1478
|
Which amongst the following is considered as a disadvantage of Selenium WebDriver?
|
|
1479
|
Which method will close only the current window the WebDriver is currently controlling ?
|
|
1480
|
Which operating system is supported by Jenkins
|
|
1481
|
Which of the following is prefixed for all accessors registered in selenium object prototype ?
|
|
1482
|
What is not part of HTML5
|
|
1483
|
What is the file extension of Firefox plugins supported earlier by Firefox, on Windows ?
|
|
1484
|
How many listener can be registered with EventFiringWebDriver ?
|
|
1485
|
Which of the following commands is used to pause execution till the page is completely loaded?
|
|
1486
|
What is the default path to the directory used to extract supporting files used by the server in InternetExplorerDriver ?
|
|
1487
|
Which operating system is supported by AutoIT
|
|
1488
|
What is not an advantage of test automation
|
|
1489
|
Which of the following applications can interact with selenium
|
|
1490
|
Which Xpath selector will locate a element with ID ending with the text userName ?
|
|
1491
|
Which of the following can not be extended in Selenium
|
|
1492
|
Which wait type should be used for a method which takes a screenshot and compares with another picture with the condition that Selenium should wait until that method returns true ?
|
|
1493
|
DOM refers to ___________________
|
|
1494
|
Which exception is thrown when the selector is an xpath expression and it is syntactically invalid ?
|
|
1495
|
How many parameters does an custom accessor can take, if the custom accessor is used to extend Selenium ?
|
|
1496
|
Which protocol is used to communicate between Hub and nodes ?
|
|
1497
|
Which function will not throw an exception, if targeted element is not found on the page
|
|
1498
|
What are the number of arguments accepted by beforeClickOn function, event listener ?
|
|
1499
|
Which of the following programming language is not supported by Selenium WebDriver
|
|
1500
|
Which of the following Selenium tool, is a Firefox plugin
|
|
1501
|
Which amongst the following is not considered as a Functional Test Automation?
|
|
1502
|
Which AutoIT function is used to send keyboard keys like enter, to the AUT ?
|
|
1503
|
What prefix pattern specify a globbing pattern parameter for a selenese command as label ?
|
|
1504
|
What is the direction of movement of cursor, if the yOffSet parameter of moveByOffset, is a negative number ?
|
|
1505
|
Whose configuration can be specified in POM file of Maven for integration with Selenium ?
|
|
1506
|
What does a test suite contains?
|
|
1507
|
Which of the following commands is used to pause execution till the time specified element appears?
|
|
1508
|
The character which is equivalent to ends_with partial matching of XPath attribute , is
|
|
1509
|
What is the default value for, number of Chrome web browsers available for concurrent usage after starting the node in Selenium Grid ?
|
|
1510
|
Which of the following Selenium tool, is a JavaScript based automation engine or sandbox, as it needs to comply with the Same-Origin policy ?
|
|
1511
|
What is the default path and file name of the log file used by the InternetExplorerDriver ?
|
|
1512
|
Which amongst the following statement holds true about Data Driven Framework?
|
|
1513
|
What is used so that the test will stop at that point and not run any subsequent checks ?
|
|
1514
|
Select the data type of last parameter of moveToElement function .
|
|
1515
|
Which file type is generated by Junit for test reporting with Selenium RC
|
|
1516
|
Identify the maximum number of parameters, that can be passed to the clickAndHold function
|
|
1517
|
_______________ are being tested under Selenium
|
|
1518
|
Which amongst the following options holds true with reference to creation of excel automation object using POI excel API?
|
|
1519
|
_________________ is the command that is not a type of assertion in Selenium IDE
|
|
1520
|
What is the project configuration file if setting up a Selenium-WebDriver project in Maven
|
|
1521
|
Which of the term refers to wrapping Selenium methods is to check for presence of an element on page before carrying out some operation
|
|
1522
|
Which of the following is usually used to check critical things on a web page, whose failure should not lead to continuation of test ?
|
|
1523
|
What document type uses Xpath
|
|
1524
|
What is the data type of parameter of getCssValue method ?
|
|
1525
|
What is the port number assigned as default by hub
|
|
1526
|
Which of the following command pauses execution for adding an element in the page
|
|
1527
|
Which type of test should be used for static content with no updations ?
|
|
1528
|
Which of the following selects parent, grandparent, and so on of a specified element, related to which axis name in Selenium
|
|
1529
|
What is the return value of moveToElement function ?
|
|
1530
|
Select the output if modifier key is not provided to keyUp function .
|
|
1531
|
Which of the following testing framework, requires the development of data tables and is independent of the test automation tool ?
|
|
1532
|
Which prototype need to be extended to create our own function to locate an element
|
|
1533
|
What is the reason for popularity of web application development and testing ?
|
|
1534
|
What is the correct syntax to instantiate a Chrome/Chromium session
|
|
1535
|
Which operating system does not supports selenium IDE ?
|
|
1536
|
_____________ is the method used to counts the number of elements, in webdriver.
|
|
1537
|
Which of the following URL will point to the console and status of the hub, under Selenium Grid, if running on port 6666
|
|
1538
|
Which operating system supports Selenium installation and application on Internet Explorer web browser
|
|
1539
|
What type of test design technique, is applied if using inspection ?
|
|
1540
|
Which method is used to access cookies
|
|
1541
|
What does the assertTitle checks
|
|
1542
|
Which tool is appropriate to set up a Selenium 2.0 Java project
|
|
1543
|
What is needed for development and testing for Ruby project with Selenium
|
|
1544
|
Which of the following is used to locate an element by using JavaScript
|
|
1545
|
Which object prototype in Selenium, is used for extending Selenium
|
|
1546
|
The command that is used in WebDriver, to enter values onto text boxes is _________________.
|
|
1547
|
What is the data type of parameter of getAttribute method
|
|
1548
|
Which exception is thrown when frame or window target to be switched doesn’t exist ?
|
|
1549
|
Does selenium IDE supported Google chrome as an plug during its launch?
|
|
1550
|
Select the data type which is returned by beforeClickOn function, event listener
|
|
1551
|
What does the regex * character evaluates to
|
|
1552
|
What is the default value of time in seconds before the hub automatically releases a node that hasn't received any requests for more than the specified number of seconds ?
|
|
1553
|
Which exception is thrown when user is no longer on the same page, or the page may have refreshed since the element was located ?
|
|
1554
|
Which command is used for handling AJAX controls by selenium
|
|
1555
|
What are the advantages of test automation
|
|
1556
|
Whose occurance in Junit, is reported as error ?
|
|
1557
|
What is the use of Web driver?
|
|
1558
|
What is the benefit of Selenium Webdriver as compared to Selenium RC ?
|
|
1559
|
Which mechanism is used by Selenium to recognize which custom extensions, are actions, assertions or locators ?
|
|
1560
|
_______________ is not supported by Selenium WebDriver.
|
|
1561
|
Which operating system supports Selenium installation and application on Edge web browser ?
|
|
1562
|
What type of test design technique, is applied if using system testing ?
|
|
1563
|
Which parameter is not optional, when creating the browser instance in Selenium RC
|
|
1564
|
What is the default page load strategy followed by geckodriver
|
|
1565
|
Which WebDriver log level is considered as the lowest log level ?
|
|
1566
|
Which of the following does not support Test design for creating test Cases?
|
|
1567
|
Consider the given situation and identify the most suitable option. In this case, applications does not have the items required for the tests when the tests get to commands. So as to fix this we had a look at adding from waitFor commands to test.
|
|
1568
|
Which object oriented principle does Page object pattern, is based on ?
|
|
1569
|
Which of the following holds true about Jenkins?
|
|
1570
|
What is the default value for, number of Firefox web browsers, available for concurrent usage after starting the node in Selenium Grid ?
|
|
1571
|
What is the data type of value returned by load function if using LoadableComponent ?
|
|
1572
|
What is the full form of JSON?
|
|
1573
|
What is the term 'RC' refer to in Selenium RC ?
|
|
1574
|
What is stored at one place by a UI map for test automation
|
|
1575
|
What is the utility of the Selenium IDE
|
|
1576
|
What is the minimum Selenium version supported by geckodriver ?
|
|
1577
|
Which request type is created for each Selenium command by WebDriver
|
|
1578
|
Which code snippet is used to create array in Java for primitive data types?
|
|
1579
|
Which of the following can not be extended in Selenium ?
|
|
1580
|
Which log type collects logs from within the selenium server ?
|
|
1581
|
Which parallel attribute option, is suitable to group all classes that are not thread safe, while parallelizing test runs in Selenium with TestNG ?
|
|
1582
|
What is not an advantage of linear framework of software testing ?
|
|
1583
|
Which of the following is not an open source software testing tool
|
|
1584
|
What is used so that the test will stop at that point and not run any subsequent checks
|
|
1585
|
____________________ can only test web applications.
|
|
1586
|
Which of the following stores information about configuration items ?
|
|
1587
|
In order to specify a globbing pattern parameter for a Selenese command _________________ label is being used as prefix pattern.
|
|
1588
|
Which of the following command is not a wait command
|
|
1589
|
The regular expression sequence that can loosely translates to "anything or nothing is referred as _____________.
|
|
1590
|
Which amongst the following is not a Test Management Tool?
|
|
1591
|
What is the use of echo() command
|
|
1592
|
Which of the following is present for each accessor used to extend Selenium ?
|
|
1593
|
Whch of the following will search the item ending with the value passed in, similar to the XPath ends-with
|
|
1594
|
What is achieved by parameterization in Selenium ?
|
|
1595
|
What will be the name of wait function for a custom action named TextUpperCase, used to extend Selenium ?
|
|
1596
|
What is the data type of return value of enable function for logging under Java, in Selenium Webdriver ?
|
|
1597
|
The command that is being used to extend the time limit of WAITFOR command is _________________.
|
|
1598
|
Which format is used to test script in source view of the Selenium IDE
|
|
1599
|
Which of the following Jenkins trigger format, will schedule your build every day at 8h00 ?
|
|
1600
|
What does JSON expands to
|
|
1601
|
What is the major change in Selenium 3.0 ?
|
|
1602
|
Which of the following extends the time limit of WAITFOR command
|
|
1603
|
What is the first parameter of a custom locator function, which is used to extend Selenium ?
|
|
1604
|
What is the Java file format of Jenkins installer, usually used
|
|
1605
|
Which of the following is to be modified, to move from ChromeDriver to PhantomJS in Selenium and the present setting is as - System.setProperty("webdriver.chrome.driver", CHROMEDRIVER_PATH); ?
|
|
1606
|
What can be the main reason to use the Selenium-Server with Selenium-WebDriver ?
|
|
1607
|
What extends the time limit of Selenium WAITFOR command?
|
|
1608
|
Which of the following is prefixed for all accessors registered in selenium object prototype
|
|
1609
|
_________________ is referred as the scale for large test suites or the test suites that must be run in multiple environments.
|
|
1610
|
What is the Default time of WAITFOR command?
|
|
1611
|
Which WebDriver log level is used to show all messages for debugging like information about the state of the driver ?
|
|
1612
|
Which exception is thrown if an element being obscured by another when clicking ?
|
|
1613
|
Which of the following is not an assertion in Selenium IDE
|
|
1614
|
The WebDriver method that helps to change focus to an alert, a frame or a browser window is referred as ___________________.
|
|
1615
|
Which programming language driver is not provisioned in selenium core
|
|
1616
|
What aspects of an UI element are stored in a UI map ?
|
|
1617
|
What is the maximum number of parameters, that can be passed to the keyUp function ?
|
|
1618
|
Which Selenium tool, is appropriate for inexperienced users or novices ?
|
|
1619
|
What does the term IDE refers to in Selenium IDE
|
|
1620
|
________________ is the language that is not supported by the Selenium RC.
|
|
1621
|
What will be the output of the following snippet - driver.findElement(By.cssSelector(“#nameâ€)); if there are two elements on page but in sequence as - Name1, Name2
|
|
1622
|
What is an disadvantage of Selenium IDE?
|
|
1623
|
Which of the following applications can interact with selenium ?
|
|
1624
|
How many arguments are accepted by isSelected function, in Selenium Webdriver ?
|
|
1625
|
What is the data type of logfile capability for logging, in Selenium Webdriver ?
|
|
1626
|
Which operating system supports Selenium installation and application on Internet Explorer web browser ?
|
|
1627
|
What is the important feature of Maven ?
|
|
1628
|
Which exception is thrown when trying to click or read text of an element that is hidden from view ?
|
|
1629
|
Whose occurance in Junit, is reported as failure ?
|
|
1630
|
Which of the following is added at beginning, to all methods on the Selenium prototype, to be added as actions ?
|
|
1631
|
Which exception is thrown, while trying to get attribute value but attribute is not available in DOM. ?
|
|
1632
|
What is the use of Selenium RC?
|
|
1633
|
Which command argument will run Selenese html files directly within the Selenium Server by passing the html file to the server’s command line
|
|
1634
|
What is the direction of movement of cursor, if the yOffSet parameter of moveByOffset, is a positive number ?
|
|
1635
|
Which method is useful to locating targeted single element in WebDriver
|
|
1636
|
Which amongst the following represents the basic approach of Data Driven Framework?
|
|
1637
|
What is the main advantages of page object model ?
|
|
1638
|
What is the default page load strategy followed by geckodriver ?
|
|
1639
|
Which of the following programming language is supported by Selenium WebDriver
|
|
1640
|
Which of the following web element does, click function is applicable, in Selenium Webdriver ?
|
|
1641
|
What is the main benefit of logging ?
|
|
1642
|
The method used to close the open browser window that the driver has focus of, in Seelenium webdriver is __________________.
|
|
1643
|
Which of the following is not an Java IDE
|
|
1644
|
Which of the following command prints a string value or a variable in selenium IDE.
|
|
1645
|
Which of the following is not used to read excel file in Selenium ?
|
|
1646
|
What is the utility of Selenium RC
|
|
1647
|
Which exception is thrown when an element is present in the DOM but interactions with that element will hit another element do to paint order ?
|
|
1648
|
Which exception is thrown when element could not be found ?
|
|
1649
|
Which entity is checked by assertTitle
|
|
1650
|
How to check if a check box is checked or not?
|
|
1651
|
Would the two statements given below retrieve the title of a web page?
|
|
1652
|
In Webdriver, which of the following methods navigates to a URL?
|
|
1653
|
Which of the following commands would help to check the presence of a certain element?
|
|
1654
|
Which of the following WebDriver methods counts the number of elements?
|
|
1655
|
In WebDriver, which of the following command would you find the best to enter values into a text box?
|
|
1656
|
Is the below statement correct?
|
|
1657
|
What does the getWindowHandle() method do?
|
|
1658
|
Which of the following code can be used to create excel automation object using POI excel API?
|
|
1659
|
Which of the following WebDriver methods is used to change focus to an alert, a frame or a browser window?
|
|
1660
|
Which of the following testng annotations would complete the below statement?
|
|
1661
|
Which of the following syntax would you use to locate an element using inner text?
|
|
1662
|
In Webdriver, which of the following commands returns the text of a html element?
|
|
1663
|
Which of the following correctly defines the behavior of the below expression?
|
|
1664
|
Is the statement given below true or false?
|
|
1665
|
Which of the following Selenium api calls you find best to complete the below statement?
|
|
1666
|
Which of the following is a valid select statement in Webdriver that selects a value from a drop down element?
|
|
1667
|
Which WebDriver command takes you forward by one page from the browser’s history?
|
|
1668
|
Implicit wait time is applied to all elements in your script and Explicit wait time is applied only for particular specified element.
|
|
1669
|
Selenium IDE is supported by which browser?
|
|
1670
|
In webdriver, deselectAll() is a valid command.
|
|
1671
|
In webdriver, selectAllOptions() is a valid command.
|
|
1672
|
In webdriver, which of the following is a valid select statement that selects a value from a drop down element?
|
|
1673
|
In webdriver, which command takes you forward by one page on the browser’s history?
|
|
1674
|
In WebDriver, which command can be used to enter values onto text boxes? Select the best answer.
|
|
1675
|
In webdriver, what is the method that counts the number of elements?
|
|
1676
|
In webdriver, which methods navigates to a URL?
|
|
1677
|
Which WebDriver method is used to change focus to an alert, a frame or a browser window?
|
|
1678
|
In webdriver, which of the following commands retrieves the text of a html element?
|
|
1679
|
In webdriver, which method closes the open browser?
|
|
1680
|
What is the output of following code?
|
|
1681
|
What is the output of the below Python code?
|
|
1682
|
What does the below code intended to do?
|
|
1683
|
Which of the following functions print the output to the console?
|
|
1684
|
Is the following statement correct?
|
|
1685
|
What is the value of colors[2]?
|
|
1686
|
What is the output of the following code?
|
|
1687
|
Which of the following function checks that all characters of a string are in upper case?
|
|
1688
|
Which function does in-place reversal of objects in a list?
|
|
1689
|
What is the output of the following Python code?
|
|
1690
|
Which module in Python supports regular expressions?
|
|
1691
|
what should the below code print?
|
|
1692
|
Which of the following environment variable for Python is an alternative module search path?
|
|
1693
|
What would be the result of the following expression in Python?
|
|
1694
|
If the following statement is run in Python, what will be the result?
|
|
1695
|
If the following code is run in Python, what would be the result?
|
|
1696
|
What does the function re.match do?
|
|
1697
|
In react, this is used to pass data to component from outside?
|
|
1698
|
What are two ways data gets handled in react?
|
|
1699
|
Reactjs is a _________
|
|
1700
|
What is the default port for webpack dev server?
|
|
1701
|
Webpack command act as a _____________
|
|
1702
|
Babel is a __________
|
|
1703
|
How many elements does a react component returns?
|
|
1704
|
In which directory react components are saved?
|
|
1705
|
Everything in react is __________
|
|
1706
|
Ref in react component is used to assign reference to DOM elements. Ref can be created by
|
|
1707
|
To upload a file from react component, A developer will require to write
|
|
1708
|
For uncontrolled components in react
|
|
1709
|
For controlled components in react
|
|
1710
|
Keys are given to a list of elements in react. These keys should be
|
|
1711
|
componentDidMount lifecycle method is called when____
|
|
1712
|
React Lifecycle method static getDerivedSateFromProps(props , state) is called when ____
|
|
1713
|
As soon as the state of react component is changed, component will
|
|
1714
|
The state in react can be updated by call to setState method. These calls are
|
|
1715
|
In ReactJS, props can be used to pass
|
|
1716
|
props in react can________
|
|
1717
|
State in react is________
|
|
1718
|
Number of elements, a valid react component can return
|
|
1719
|
React is _______
|
|
1720
|
ReactJS uses _____ to increase performance
|
|
1721
|
ReactJS covers _________
|
|
1722
|
React is a ________
|
|
1723
|
In DynamoDB, what type of HTTP response codes indicate that a problem was found with the client request sent to the service?
|
|
1724
|
What is the format of structured notification messages sent by Amazon SNS?
|
|
1725
|
What AWS products and features can be deployed by Elastic Beanstalk?
|
|
1726
|
Which features can be used to restrict access to data in S3?
|
|
1727
|
Which DynamoDB limits can be raised by contacting AWS support?
|
|
1728
|
Which of the following are valid SNS delivery transports?
|
|
1729
|
What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?
|
|
1730
|
An Amazon S3 bucket, “myawsbucket†is configured with website hosting in Tokyo region, what is the region-specific website endpoint?
|
|
1731
|
What is the maximum number of S3 Buckets available per AWS account?
|
|
1732
|
In AWS, which security aspects are the customer’s responsibility?
|
|
1733
|
Which of the following are valid arguments for an SNS Publish request?
|
|
1734
|
Your application is trying to upload a 6 GB file to Simple Storage Service and receive a “Your proposed upload exceeds the maximum allowed object size.†error message. What is a possible solution for this?
|
|
1735
|
How is provisioned throughput affected by the chosen consistency model when reading data from a DynamoDB table?
|
|
1736
|
Which of the following services are key/value stores?
|
|
1737
|
When using a large Scan operation in DynamoDB, what technique can be used to minimize the impact of a scan on a table’s provisioned throughput?
|
|
1738
|
You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business. What is an effective method to mitigate this?
|
|
1739
|
Which statements about DynamoDB are true?
|
|
1740
|
A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in users can only access an S3 keyspace specific to the user. Which two approaches can satisfy the objectives?
|
|
1741
|
Which of the following is chosen as the default region when making an API call with an AWS SDK?
|
|
1742
|
When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to encrypt object data when saved on the server side?
|
|
1743
|
Which of the following programming languages have an officially supported AWS SDK?
|
|
1744
|
If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other users by default?
|
|
1745
|
An application stores payroll information nightly in DynamoDB for a large number of employees across hundreds of offices. Item attributes consist of individual name, office identifier, and cumulative daily hours. Managers run reports for ranges of names working in their office. One query is. “Return all Items in this office for names starting with A through Eâ€. Which table configuration will result in the lowest impact on provisioned throughput for this query?
|
|
1746
|
How can software determine the public and private IP addresses of the Amazon EC2 instance that it is running on?
|
|
1747
|
You are inserting 1000 new items every second in a DynamoDB table. Once an hour these items are analyzed and then are no longer needed. You need to minimize provisioned throughput, storage, and API calls. Given these requirements, what is the most efficient way to manage these Items after the analysis?
|
|
1748
|
Which of the following statements about SQS is true?
|
|
1749
|
Which of the following are correct statements with policy evaluation logic in AWS Identity and Access Management?
|
|
1750
|
EC2 instances are launched from Amazon Machine images (AMIS). A given public AMI can:
|
|
1751
|
You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that it has been successfully stored. You then immediately make another API call and attempt to read this object. S3 tells you that the object does not exist What could explain this behavior?
|
|
1752
|
You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already togged in. This is not behavior you have designed. What is a possible solution to prevent this happening?
|
|
1753
|
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
|
|
1754
|
Company B provides an online image recognition service and utilizes SOS to decouple system components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is burning CPU cycles and increasing costs with empty responses. How can Company B reduce the number of empty responses?
|
|
1755
|
Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table? Assume that no security Keys are allowed to be stored on the EC2 instance. Choose 2 answers
|
|
1756
|
Which of the following is an example of a good DynamoDB hash key schema for provisioned throughput efficiency?
|
|
1757
|
Which code snippet below returns the URL of a load balanced web site created in CloudFormation with an AWS::ElasticLoadBalancing::LoadBalancer resource name “ElasticLoad Balancer�
|
|
1758
|
Which of the following platforms are supported by Elastic Beanstalk? Choose 2 answers
|
|
1759
|
What happens, by default, when one of the resources in a CloudFormation stack cannot be created?
|
|
1760
|
If an application is storing hourly log files from thousands of instances from a high traffic web site, which naming scheme would give optimal performance on S3?
|
|
1761
|
What type of block cipher does Amazon S3 offer for server side encryption?
|
|
1762
|
Which of the following services are included at no additional cost with the use of the AWS
|
|
1763
|
Which of the following statements about SWF are true? Choose 3 answers
|
|
1764
|
Which approach below provides the least impact to provisioned throughput on the “Product†table?
|
|
1765
|
ou require the ability to analyze a customer\’s clickstream data on a website so they can do behavioral analysis. Your customer needs to know what sequence of pages and ads their customer clicked on. This data will be used in real time to modify the page layouts as customers click through the site to increase stickiness and advertising click-through. Which option meets the requirements for captioning and analyzing this data?
|
|
1766
|
What is the best approach to meet your customer’s requirements?
|
|
1767
|
You have an application running on an Amazon Elastic Compute Cloud instance, that uploads 5 GB video objects to Amazon Simple Storage Service (S3). Video uploads are taking longer than expected, resulting in poor application performance. Which method will help improve performance of your application?
|
|
1768
|
You have started a new role as a solutions architect for an architectural firm that designs large sky scrapers in the Middle East. Your company hosts large volumes of data and has about 250Tb of data on internal servers. They have decided to store this data on S3 due to the redundancy offered by it. The company currently has a telecoms line of 2Mbps connecting their head office to the internet. What method should they use to import this data on to S3 in the fastest manner possible.
|
|
1769
|
Which of the following are valid statements about Amazon S3? Choose 2 answers
|
|
1770
|
You are tasked with setting up a Linux bastion host for access to Amazon EC2 instances running in your VPC. Only clients connecting from the corporate external public IP address 72.34.51.100 should have SSH access to the host. Which option will meet the customer requirement?
|
|
1771
|
Natively what are the AWS services which are support encryption ?
|
|
1772
|
How can you secure data at rest on an EBS volume?
|
|
1773
|
Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table? Assume that no security keys are allowed to be stored on the EC2 instance. (Choose 2 answers)
|
|
1774
|
Which of the following are true regarding encrypted Amazon Elastic Block Store (EBS) volumes? Choose 2 answers
|
|
1775
|
How can software determine the public and private IP addresses of the EC2 instance that it is running on?
|
|
1776
|
When will you incur costs with an Elastic IP address (EIP)?
|
|
1777
|
What other information must you gather from this customer in order to determine whether S3 is the right option?
|
|
1778
|
What is one key difference between an Amazon EBS-backed and an instance-store backed instance?
|
|
1779
|
You have a business-critical two-tier web app currently deployed in two Availability Zones in a single region, using Elastic Load Balancing and Auto Scaling. The app depends on synchronous replication (very low latency connectivity) at the database layer. The application needs to remain fully available even if one application Availability Zone goes off-line, and Auto Scaling cannot launch new instances in the remaining Availability Zones. How can the current architecture be enhanced to ensure this?
|
|
1780
|
You run a website which hosts videos and you have two types of members, premium fee paying members and free members. All videos uploaded by both your premium members and free members are processed by a fleet of EC2 instances which will poll SQS as videos are uploaded. However you need to ensure that your premium fee paying members videos have a higher priority than your free members. How do you design SQS?
|
|
1781
|
Which route must be added to your routing table in order to allow connections to the Internet from your subnet?
|
|
1782
|
A customer’s nightly EMR job processes a single 2-TB data file stored on Amazon Simple Storage Service (S3). The EMR job runs on two On-Demand core nodes and three On-Demand task nodes. Which of the following may help reduce the EMR job completion time?
|
|
1783
|
A company is preparing to give AWS Management Console access to developers. Company policy mandates identity federation and role-based access control. Roles are currently assigned using groups in the corporate Active Directory. What combination of the following will give developers access to the AWS console? (Select 2) Choose 2 answers
|
|
1784
|
What does Amazon CloudFormation provide?
|
|
1785
|
A company is building a two-tier web application to serve dynamic transaction-based content. The data tier is leveraging an Online Transactional Processing (OLTP) database. What services should you leverage to enable an elastic and scalable web tier?
|
|
1786
|
What areas does AWS Trusted Advisor provide recommendations?
|
|
1787
|
You need to design a VPC for a web-application consisting of an Elastic Load Balancer (ELB). a fleet of web/application servers, and an RDS database The entire Infrastructure must be distributed over two availability zones. Which VPC configuration works while assuring the database is not available from the Internet?
|
|
1788
|
AWS doesn't have distinct operations in one of the following?
|
|
1789
|
When did AWS receive authorization from Department of Defense?
|
|
1790
|
One of the following isn't a customer
|
|
1791
|
When was it known that AWS had a deal with CIA?
|
|
1792
|
When were the retail sites of Amazon moved under AWS?
|
|
1793
|
Who was promoted to CEO of the AWS section in 2016?
|
|
1794
|
It provides individuals with customer support
|
|
1795
|
What does AWS really do?
|
|
1796
|
The AWS technology is implemented where?
|
|
1797
|
You have been using Amazon Relational Database Service (Amazon RDS) for the last year to run an important application with automated backups enabled. One of your team members is performing routine maintenance and accidentally drops an important table, causing an outage. How can you recover the missing data while minimizing the duration of the outage?
|
|
1798
|
Which AWS Cloud service is best suited for Online Analytics Processing (OLAP)?
|
|
1799
|
You are a solutions architect working for a media company that hosts its website on AWS. Currently, there is a single Amazon Elastic Compute Cloud (Amazon EC2) Instance on AWS with MySQL installed locally to that Amazon EC2 Instance. You have been asked to make the company’s production environment more resilient and to increase performance. You suggest that the company split out the MySQL database onto an Amazon RDS Instance with Multi-AZ enabled. This addresses the company’s increased resiliency requirements. Now you need to suggest how you can increase performance. Ninety-nine percent of the company’s end users are magazine subscribers who will be reading additional articles on the website, so only one percent of end users will need to write data to the site. What should you suggest to increase performance?
|
|
1800
|
Which AWS database service is best suited for non-relational databases?
|
|
1801
|
Which AWS database service is best suited for traditional Online Transaction Processing (OLTP)?
|
|
1802
|
Which of the following are based on temporary security tokens? (Choose 2 answers)
|
|
1803
|
Which of the following are benefits of using Amazon EC2 roles? (Choose 2 answers)
|
|
1804
|
Which of the following are IAM security features? (Choose 2 answers)
|
|
1805
|
Which of the following actions can be authorized by IAM? (Choose 2 answers)
|
|
1806
|
Your AWS account administrator left your company today. The administrator had access to the root user and a personal IAM administrator account. With these accounts, he generated other IAM accounts and keys. Which of the following should you do today to protect your AWS infrastructure? (Choose 4 answers)
|
|
1807
|
Which of the following are found in an IAM policy? (Choose 2 answers)
|
|
1808
|
Which of the following methods will allow an application using an AWS SDK to be authenticated as a principal to access AWS Cloud services? (Choose 2 answers)
|
|
1809
|
When an Amazon Elastic Compute Cloud (Amazon EC2) instance registered with an Elastic Load Balancing load balancer using connection draining is deregistered or unhealthy, which of the following will happen? (Choose 2 answers)
|
|
1810
|
Amazon CloudWatch supports which types of monitoring plans? (Choose 2 answers)
|
|
1811
|
An Auto Scaling group may use: (Choose 2 answers)
|
|
1812
|
Why is the launch configuration referenced by the Auto Scaling group instead of being part of the Auto Scaling group?
|
|
1813
|
Which of the following are characteristics of the Auto Scaling service on AWS? (Choose 3 answers)
|
|
1814
|
For an application running in the ap-northeast-1 region with three Availability Zones (apnortheast- 1a, ap-northeast-1b, and ap-northeast-1c), which instance deployment provides high availability for the application that normally requires nine running Amazon Elastic Compute Cloud (Amazon EC2) instances but can run on a minimum of 65 percent capacity while Auto Scaling launches replacement instances in the remaining Availability Zones?
|
|
1815
|
A cell phone company is running dynamic-content television commercials for a contest. They want their website to handle traffic spikes that come after a commercial airs. The website is interactive, offering personalized content to each visitor based on location, purchase history, and the current commercial airing. Which architecture will configure Auto Scaling to scale out to respond to spikes of demand, while minimizing costs during quiet periods?
|
|
1816
|
In the basic monitoring package for Amazon Elastic Compute Cloud (Amazon EC2), what Amazon CloudWatch metrics are available?
|
|
1817
|
Your web application front end consists of multiple Amazon Compute Cloud (Amazon EC2) instances behind an Elastic Load Balancing load balancer. You have configured the load balancer to perform health checks on these Amazon EC2 instances. If an instance fails to pass health checks, which statement will be true?
|
|
1818
|
You want to host multiple Hypertext Transfer Protocol Secure (HTTPS) websites on a fleet of Amazon EC2 instances behind an Elastic Load Balancing load balancer with a single X.509 certificate. How must you configure the Secure Sockets Layer (SSL) certificate so that clients connecting to the load balancer are not presented with a warning when they connect?
|
|
1819
|
You create an Auto Scaling group in a new region that is configured with a minimum size value of 10, a maximum size value of 100, and a desired capacity value of 50. However, you notice that 30 of the Amazon Elastic Compute Cloud (Amazon EC2) instances within the Auto Scaling group fail to launch. Which of the following is the cause of this behavior?
|
|
1820
|
Which of the following must be configured on an Elastic Load Balancing load balancer to accept incoming traffic?
|
|
1821
|
You are responsible for the application logging solution for your company’s existing applications running on multiple Amazon EC2 instances. Which of the following is the best approach for aggregating the application logs within AWS?
|
|
1822
|
Which of the following are the minimum required elements to create an Auto Scaling launch configuration?
|
|
1823
|
How long does Amazon CloudWatch keep metric data?
|
|
1824
|
You have created an Elastic Load Balancing load balancer listening on port 80, and you registered it with a single Amazon Elastic Compute Cloud (Amazon EC2) instance also listening on port 80. A client makes a request to the load balancer with the correct protocol and port for the load balancer. In this scenario, how many connections does the balancer maintain?
|
|
1825
|
Which of the following are required elements of an Auto Scaling group? (Choose 2 answers)
|
|
1826
|
Which Amazon VPC feature allows you to create a dual-homed instance?
|
|
1827
|
What properties of an Amazon VPC must be specified at the time of creation? (Choose 2 answers)
|
|
1828
|
Which of the following Amazon VPC resources would you use in order for EC2-VPC instances to send traffic directly to Amazon S3?
|
|
1829
|
Which of the following is the security protocol supported by Amazon VPC?
|
|
1830
|
You are responsible for your company’s AWS resources, and you notice a significant amount of traffic from an IP address in a foreign country in which your company does not have customers. Further investigation of the traffic indicates the source of the traffic is scanning for open ports on your EC2-VPC instances. Which one of the following resources can deny the traffic from reaching the instances?
|
|
1831
|
What is the default limit for the number of Amazon VPCs that a customer may have in a region?
|
|
1832
|
Which of the following is the Amazon side of an Amazon VPN connection?
|
|
1833
|
Which of the following AWS resources would you use in order for an EC2-VPC instance to resolve DNS names outside of AWS?
|
|
1834
|
How many VPC Peering connections are required for four VPCs located within the same AWS region to be able to send traffic to each of the others?
|
|
1835
|
Which of the following will occur when an Amazon Elastic Block Store (Amazon EBS)- backed Amazon EC2 instance in an Amazon VPC with an associated EIP is stopped and started? (Choose 2 answers)
|
|
1836
|
You have created a custom Amazon VPC with both private and public subnets. You have created a NAT instance and deployed this instance to a public subnet. You have attached an EIP address and added your NAT to the route table. Unfortunately, instances in your private subnet still cannot access the Internet. What may be the cause of this?
|
|
1837
|
What aspect of an Amazon VPC is stateful?
|
|
1838
|
How many IGWs can you attach to an Amazon VPC at any one time?
|
|
1839
|
You create a new VPC in US-East-1 and provision three subnets inside this Amazon VPC. Which of the following statements is true?
|
|
1840
|
What happens when you create a new Amazon VPC?
|
|
1841
|
You create a new subnet and then add a route to your route table that routes traffic out from that subnet to the Internet using an IGW. What type of subnet have you created?
|
|
1842
|
What is the maximum size IP address range that you can have in an Amazon VPC?
|
|
1843
|
Which of the following is an optional security control that can be applied at the subnet layer of a VPC?
|
|
1844
|
You are a solutions architect working for a large travel company that is migrating its existing server estate to AWS. You have recommended that they use a custom Amazon VPC, and they have agreed to proceed. They will need a public subnet for their web servers and a private subnet in which to place their databases. They also require that the web servers and database servers be highly available and that there be a minimum of two web servers and two database servers each. How many subnets should you have to maintain high availability?
|
|
1845
|
What is the minimum size subnet that you can have in an Amazon VPC?
|
|
1846
|
Is data stored in S3 is always encrypted?
|
|
1847
|
What is the maximum size of a single S3 object?
|
|
1848
|
What does RRS stand for when referring to the storage option in Amazon S3 that offers a lower level of durability at a lower storage cost?
|
|
1849
|
Amazon S3 is which type of storage service?
|
|
1850
|
Does S3 provide read-after-write consistency?
|
|
1851
|
EBS can always tolerate an Availability Zone failure?
|
|
1852
|
Amazon S3 offers developers which combination?
|
|
1853
|
Amazon S3 offers encryption services for which types of data?
|
|
1854
|
Which AWS storage service assists S3 with transferring data?
|
|
1855
|
Object storage systems require less _____ than file systems to store and access files.
|
|
1856
|
Object storage systems store files in a flat organization of containers called what?
|
|
1857
|
Amazon S3 has how many pricing components?
|
|
1858
|
Which three statements describe S3?
|
|
1859
|
What terminology is used by AWS to describes their highly available and scalable Domain Name System?
|
|
1860
|
Which statements are true about the benefits of cloud?
|
|
1861
|
AES Encrpts to what level?
|
|
1862
|
What SLA do AWS provide for their S3 service?
|
|
1863
|
What does S3 stand for?
|
|
1864
|
What does RDS stand for?
|
|
1865
|
Which one of the following is not an Amazon Buisness Unit?
|
|
1866
|
How many AWS clouds are the there in the world
|
|
1867
|
Which statements are true about ELB?
|
|
1868
|
Which of the following SECURITY certifications does AWS have?
|
|
1869
|
What SLA do AWS provide for their EC2 service?
|
|
1870
|
Which statements are true about AWS ElastiCache?
|
|
1871
|
What AWS service needs to be provided to support virtual instances running in multiple availability zones?
|
|
1872
|
What needs to be provided between multi availability zones to support Define EC2 on AWS?
|
|
1873
|
From the list below which are not AWS regions?
|
|
1874
|
Which of the following databases can be run on RDS?
|
|
1875
|
What does EBS stand for?
|
|
1876
|
What type of Database is DynamoDB on AWS?
|
|
1877
|
Which one is not an AWS pricing model
|
|
1878
|
Which three statements describe EBS?
|
|
1879
|
Is deployment and access controlled through IAM?
|
|
1880
|
What statements are true about auto-scaling within EC2?
|
|
1881
|
Which one of the following is not an application service on AWS
|
|
1882
|
Which of the following networking options is not available on AWS?
|
|
1883
|
Which statement is true about S3?
|
|
1884
|
Can you ship portable hard drives to AWS for them to import?
|
|
1885
|
ElastiCache is a web service that makes it easy to set up, operate, and scale a relational database in the cloud!
|
|
1886
|
Edge Locations form part of Cloud Front an AWS service, these help to deliver content across global locations?
|
|
1887
|
Which of the following statements are true in terms of allowing/denying traffic from/to VPC assuming the default rules are not in effect?
|
|
1888
|
You have successfully set up a VPC peering connection in your account between two VPCs – VPC A and VPC B, each in a different region. When you are trying to make a request from VPC A to VPC B, request getting failed. Which of the following could be a reason?
|
|
1889
|
Which of the following is an AWS component which consumes resources from your VPC?
|
|
1890
|
You have launched an RDS instance with MySQL database with default configuration for your file sharing application to store all the transactional information. Due to security compliance, your organization wants to encrypt all the databases and storage on the cloud. They approached you to perform this activity on your MySQL RDS database. How can you achieve this?
|
|
1891
|
Your organization has an existing VPC setup and has a requirement to route any traffic going from VPC to AWS S3 bucket through AWS internal network. So they have created VPC endpoint for S3 and configured to allow traffic for S3 buckets. The application you are developing involves sending traffic to AWS S3 bucket from VPC for which you planned to use a similar approach. You have created a new route table, added route to VPC endpoint and associated route table with your new subnet. However, when you are trying to send a request from EC2 to S3 bucket using AWS CLI, the request is getting failed with 403 access denied errors. What could be causing the failure?
|
|
1892
|
You had set up an internal HTTP(S) Elastic Load Balancer to route requests to two EC2 instances inside a private VPC. However, one of the target EC2 instance is showing Unhealthy status. Which of the following options could not be a reason for this?
|
|
1893
|
You have configured AWS S3 event notification to send a message to AWS Simple Queue Service whenever an object is deleted. You are performing ReceiveMessage API operation on the AWS SQS queue to receive the S3 delete object message onto AWS EC2 instance. For any successful message operations, you are deleting them from the queue. For failed operations, you are not deleting the messages. You have developed a retry mechanism which reruns the application every 5 minutes for failed RecieveMessage operations. However, you are not receiving the messages again during the rerun. What could have caused this?
|
|
1894
|
Organization ABC has a requirement to send emails to multiple users from their application deployed on EC2 instance in a private VPC. Email receivers will not be IAM users. You have decided to use AWS Simple Email Service and configured from email address. You are using AWS SES API to send emails from your EC2 instance to multiple users. However, email sending getting failed. Which of the following options could be the reason?
|
|
1895
|
Which of the following are not backup and restore solutions provided by AWS?
|
|
1896
|
Your organization was planning to develop a web application on AWS EC2. Application admin was tasked to perform AWS setup required to spin EC2 instance inside an existing private VPC. He/she has created a subnet and wants to ensure no other subnets in the VPC can communicate with your subnet except for the specific IP address. So he/she created a new route table and associated with the new subnet. When he/she was trying to delete the route with the target as local, there is no option to delete the route. What could have caused this behavior?
|
|
1897
|
How many VPCs can an Internet Gateway be attached to at any given time?
|
|
1898
|
Your organization has an AWS setup and planning to build Single Sign-On for users to authenticate with on-premise Microsoft Active Directory Federation Services (ADFS) and let users log in to AWS console using AWS STS Enterprise Identity Federation. Which of the following service do you need to call from AWS STS service after you authenticate with your on-premise?
|
|
1899
|
You will be launching and terminating EC2 instances on need basis for your workloads. You need to run some shell scripts and perform certain checks connecting to AWS S3 bucket when the instance is getting launched. Which of the following options will allow performing any tasks during launch? (choose multiple)
|
|
1900
|
Your organization is building a collaboration platform for which they chose AWS EC2 for web and application servers and MySQL RDS instance as the database. Due to the nature of the traffic to the application, they would like to increase the number of connections to RDS instance. How can this be achieved?
|
|
1901
|
Which of the following is not a category in AWS Trusted Advisor service checks?
|
|
1902
|
Organization ABC has a customer base in US and Australia that would be downloading 10s of GBs files from your application. For them to have a better download experience, they decided to use AWS S3 bucket with cross-region replication with the US as source and Australia as the destination. They are using existing unused S3 buckets and had setup cross-region replication successfully. However, when files uploaded to US bucket, they are not being replicated to Australia bucket. What could be the reason?
|
|
1903
|
Which of the following statements are true with respect to VPC? (choose multiple)
|
|
1904
|
When creating an AWS CloudFront distribution, which of the following is not an origin?
|
|
1905
|
Organization XYZ is planning to build an online chat application for their enterprise level collaboration for their employees across the world. They are looking for a single digit latency fully managed database to store and retrieve conversations. What would AWS Database service you recommend?
|
|
1906
|
You are planning to build a fleet of EBS-optimized EC2 instances for your new application. Due to security compliance, your organization wants you to encrypt root volume which is used to boot the instances. How can this be achieved?
|
|
1907
|
Baird also estimates that for every $1 spent on AWS, the traditional IT market loses how much?
|
|
1908
|
The investment firm Robert W. Baird & Co. predicts that AWS revenues will reach how much by 2016?
|
|
1909
|
AWS reaches customers in how many countries?
|
|
1910
|
In the same survey, researchers said the customers' average payback period on their AWS IaaS investments was how long?
|
|
1911
|
When analyst firm IDC interviewed 11 major AWS customers in 2012, researchers found an average five-year return on investment of how much?
|
|
1912
|
All AWS IaaS services are pay-as-you-go.
|
|
1913
|
Amazon Elastic Beanstalk automates the details of which of the following functions?
|
|
1914
|
Amazon Glacier is a storage service allowing customers to store data for as little as:
|
|
1915
|
Amazon Elastic Compute Cloud (Amazon EC2) does which of the following?
|
|
1916
|
Amazon Web Services falls into which cloud-computing category?
|
|
1917
|
Amazon ______ cloud-based storage system allows you to store data objects ranging in size from 1 byte up to 5GB
|
|
1918
|
Which of the following instance class is best used for applications that are processor- or compute-intensive?
|
|
1919
|
AMI’s are operating systems running on the _____ virtualization hypervisor
|
|
1920
|
What is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
|
|
1921
|
Q.12 Point out the correct statement:
|
|
1922
|
Which of the following is a Web service that can publish messages from an application and deliver them to other applications or to subscribers?
|
|
1923
|
Which of the following is a system for creating block-level storage devices that can be used for Amazon Machine Instances in EC2?
|
|
1924
|
Point out the correct statement:
|
|
1925
|
Select the wrong statement
|
|
1926
|
A user has launched one EC2 instance in the US East region and one in the US West region. The user has launched an RDS instance in the US East region. How can the user configure access from both the EC2 instances to RDS?
|
|
1927
|
When using the following AWS services, which should be implemented in multiple Availability Zones for high availability solutions? Choose 2 answers
|
|
1928
|
When you're launching an instance with EC2 in US East Region, AWS recommends which Availability zone for the instance?
|
|
1929
|
EC2 instances are launched from Amazon Machine images (AMIS). A given public AMI can
|
|
1930
|
In order to put multiple EC2 instances inside a placement group, the EC2 instances must be
|
|
1931
|
Can I book a reservation for an infant with a seat with an adult?
|
|
1932
|
Which are the two departments that assist passengers on AA.com?
|
|
1933
|
What is SPAM?
|
|
1934
|
What is AWTS
|
|
1935
|
What would you advise if a passenger need guidance on AA vacations?
|
|
1936
|
AA.com lets you store your credit card in your Aadvantage account for future purchases?
|
|
1937
|
What is AA - Kana?
|
|
1938
|
Select the right options for this term:Which are A.W.S functions?
|
|
1939
|
Which are browsers that have AA.com compatibility on Mac?
|
|
1940
|
AA.com allows you to search flights on the following options:
|
|
1941
|
Select the correct option:For AA.com - What does it means Country of Residence?
|
|
1942
|
Which address should be advised to the passenger when need to log on AA.com?
|
|
1943
|
What is true about protected constructor?
|
|
1944
|
Abstract class cannot have a constructor
|
|
1945
|
What is true about constructor?
|
|
1946
|
What is true about Class.getInstance()?
|
|
1947
|
What is false about constructor?
|
|
1948
|
What would be the behaviour if this() and super() used in a method?
|
|
1949
|
What is true about private constructor?
|
|
1950
|
Which of the following statements are incorrect?
|
|
1951
|
Which function is used to perform some action when the object is to be destroyed?
|
|
1952
|
Which operator is used by Java run time implementations to free the memory of an object when it is no longer needed?
|
|
1953
|
Which of the following is a method having same name as that of its class?
|
|
1954
|
Which keyword is used by the method to refer to the object that invoked it?
|
|
1955
|
What is the return type of Constructors?
|
|
1956
|
Which method can be defined only once in a program?
|
|
1957
|
Which of the following is a method having same name as that of it’s class?
|
|
1958
|
What is the process of defining more than one method in a class differentiated by method signature?
|
|
1959
|
What is the return type of a method that does not return any value?
|
|
1960
|
Which of these statement is incorrect?
|
|
1961
|
Which of these operators is used to allocate memory for an object?
|
|
1962
|
Which of the following is a valid declaration of an object of class Box?
|
|
1963
|
Which of these keywords is used to make a class?
|
|
1964
|
What is use of interpreter?
|
|
1965
|
How can we identify whether a compilation unit is class or interface from a .class file?
|
|
1966
|
What is the extension of compiled java classes?
|
|
1967
|
What is the extension of java code files?
|
|
1968
|
Which of the below is invalid identifier with the main method?
|
|
1969
|
Which statement is true about java?
|
|
1970
|
Which component is responsible to optimize bytecode to machine code?
|
|
1971
|
Which component is responsible to run java program?
|
|
1972
|
Which component is responsible for converting bytecode into machine specific code?
|
|
1973
|
Which component is used to compile, debug and execute java program?
|
|
1974
|
Method overriding is combination of inheritance and polymorphism?
|
|
1975
|
What is it called where object has its own lifecycle and child object cannot belong to another parent object?
|
|
1976
|
What is it called where child object gets killed if parent object is killed?
|
|
1977
|
What is it called if an object has its own lifecycle and there is no owner?
|
|
1978
|
Which concept of Java is achieved by combining methods and attribute into a class?
|
|
1979
|
Which concept of Java is a way of converting real world objects in terms of class?
|
|
1980
|
When Overloading does not occur?
|
|
1981
|
When does method overloading is determined?
|
|
1982
|
Which of the following is a type of polymorphism in Java?
|
|
1983
|
Which of the following is not OOPS concept in Java?
|
|
1984
|
Which of the following is not a valid flow control statement?
|
|
1985
|
From where break statement causes an exit?
|
|
1986
|
Which of the following is not a valid jump statement?
|
|
1987
|
Which of the following is not a decision making statement?
|
|
1988
|
Which of the following is used with the switch statement?
|
|
1989
|
What is true about do statement?
|
|
1990
|
What is true about a break?
|
|
1991
|
The while loop repeats a set of code while the condition is not met?
|
|
1992
|
Which of this statement is incorrect?
|
|
1993
|
Which of these jump statements can skip processing the remainder of the code in its body for a particular iteration?
|
|
1994
|
Which of the following loops will execute the body of loop even when condition controlling the loop is initially false?
|
|
1995
|
none of the mentioned
|
|
1996
|
Which of these selection statements test only for equality?
|
|
1997
|
Which of these have highest precedence?
|
|
1998
|
Which of these statements is correct?
|
|
1999
|
Which of these operators can skip evaluating right hand operand?
|
|
2000
|
Which of these is returned by “greater thanâ€, “less than†and “equal to†operators?
|
|
2001
|
What is the output of relational operators?
|
|
2002
|
Which right shift operator preserves the sign of the value?
|
|
2003
|
On applying Left shift operator, <<, on integer bits are lost one they are shifted past which position bit?
|
|
2004
|
Which operator is used to invert all the digits in a binary representation of a number?
|
|
2005
|
Which of these is not a bitwise operator?
|
|
2006
|
Which of these statements are incorrect?
|
|
2007
|
Modulus operator, %, can be applied to which of these?
|
|
2008
|
Which of the following can be operands of arithmetic operators?
|
|
2009
|
An array elements are always stored in ________ memory locations
|
|
2010
|
Where is an array stored in memory?
|
|
2011
|
Can you make an array volatile?
|
|
2012
|
How to copy contents of array?
|
|
2013
|
How to sort an array?
|
|
2014
|
Generics does not work with?
|
|
2015
|
Which of these is necessary to specify at time of array initialization?
|
|
2016
|
Which of these is an incorrect Statement?
|
|
2017
|
Which of these operators is used to allocate memory to array variable in Java?
|
|
2018
|
What is Truncation is Java?
|
|
2019
|
Which of these is necessary condition for automatic type conversion in Java?
|
|
2020
|
Which of these can not be used for a variable name in Java?
|
|
2021
|
Literal can be of which of these data types?
|
|
2022
|
Literals in java must be appended by which of these?
|
|
2023
|
Which of these can be returned by the operator &?
|
|
2024
|
Which of these is long data type literal?
|
|
2025
|
How to get UTC time?
|
|
2026
|
How to get difference between two dates?
|
|
2027
|
What does LocalTime represent?
|
|
2028
|
How is Date stored in database?
|
|
2029
|
What is the replacement of joda time library in java 8?
|
|
2030
|
How to identify if a timezone is eligible for DayLight Saving?
|
|
2031
|
Is SimpleDateFormat thread safe?
|
|
2032
|
How to format date from one form to another?
|
|
2033
|
Which class is a library of functions to perform arithmetic operations of BigInteger and BigDecimal?
|
|
2034
|
What is BigDecimal.ONE?
|
|
2035
|
BigDecimal is a part of which package?
|
|
2036
|
Which of the following is not provided by BigDecimal?
|
|
2037
|
What is the limitation of toString() method of BigDecimal?
|
|
2038
|
What is the base of BigDecimal data type?
|
|
2039
|
Are enums are type-safe?
|
|
2040
|
Which class does all the Enums extend?
|
|
2041
|
Which method returns the elements of Enum class?
|
|
2042
|
If we try to add Enum constants to a TreeSet, what sorting order will it use?
|
|
2043
|
Can we create an instance of Enum outside of Enum itself?
|
|
2044
|
What is the order of variables in Enum?
|
|
2045
|
Which one is a valid declaration of a boolean?
|
|
2046
|
Which of these occupy first 0 to 127 in Unicode character set used for characters in Java?
|
|
2047
|
Which of these values can a boolean variable contain?
|
|
2048
|
Which of these coding types is used for data type characters in Java?
|
|
2049
|
What is the numerical range of a char data type in Java?
|
|
2050
|
Which data type value is returned by all transcendental math functions?
|
|
2051
|
Which of these literals can be contained in float data type variable?
|
|
2052
|
An expression involving byte, int, and literal numbers is promoted to which of these?
|
|
2053
|
What is the range of byte data type in Java?
|
|
2054
|
What is the range of short data type in Java?
|
|
2055
|
If you create the user administrator before enabling access control, MongoDB disables the ________ exception
|
|
2056
|
MongoDB supports the execution of JavaScript code for certain server-side operations like ____________
|
|
2057
|
Which of the following is used to display the replica set configuration object?
|
|
2058
|
_____________ is used to initiate relica member set
|
|
2059
|
To generate pseudo-random data to use for a keyfile, issue the following __________ command
|
|
2060
|
Use the __________ option to ensure that MongoDB listens for connections from applications on configured addresses
|
|
2061
|
___________ allows administrators to define and limit the resources and operations that a user can access
|
|
2062
|
With ___________ enabled, MongoDB forces all clients to identify themselves before granting access to the server
|
|
2063
|
Use __________ to encrypt communication between mongod and mongos components of a MongoDB client as well as between all applications and MongoDB
|
|
2064
|
The MongoDB _________ Console interface does not support Kerberos authentication
|
|
2065
|
On Linux, MongoDB clients can use Kerberos’s _______ program to initialize a credential cache for authenticating the user principal to servers
|
|
2066
|
Linux systems can store Kerberos authentication keys for a service principal in ______ files
|
|
2067
|
To specify a different value for <service>, use ________ during the start up of mongod
|
|
2068
|
To authenticate using Kerberos, you must add the Kerberos user principals to MongoDB to the _________ database
|
|
2069
|
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset
|
|
2070
|
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keysâ€.
|
|
2071
|
The _________ message limit can result in the truncation of the audit messages
|
|
2072
|
The _____________ option accepts either full path name or relative path name
|
|
2073
|
To view the contents of the file, pass the file to the MongoDB utility ___________
|
|
2074
|
The audit file rotates at the same time as the ________ log file
|
|
2075
|
Use the ____________ option to enable auditing and specify where to output the audit events
|
|
2076
|
Enabling _____________ degrades performance more than logging only the authorization failures
|
|
2077
|
_________ contains the local ip address and the port number of the running instance
|
|
2078
|
The auditing facility can write audit events to the console, the _________ a JSON file, or a BSON file
|
|
2079
|
Config servers listen for connections on port __________
|
|
2080
|
Config servers, host the _______ database that stores metadata for sharded clusters
|
|
2081
|
________ instances provide query routing for sharded clusters
|
|
2082
|
The _______ API to MongoDB provides additional information and write access on top of the HTTP status interface
|
|
2083
|
The HTTP interface is always available on the port numbered _________ greater than the primary mongod port
|
|
2084
|
On _________ mongo.exe reads the .mongorc.js file from %HOME%.mongorc.js
|
|
2085
|
If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting
|
|
2086
|
The mongo program can evaluate JavaScript expressions using the command line ________ option.
|
|
2087
|
The __________ data structure value provides more granular information concerning the number of operations queued because of a lock.
|
|
2088
|
What is the output of this program? #include <iostream> using namespace std; enum cat { temp = 7 }; int main() { int age = 14; age /= temp; cout << "If you were cat, you would be " << age << endl; return 0; }
|
|
2089
|
Which variable does equals in size with enum variable?
|
|
2090
|
What will happen when defining the enumerated type?
|
|
2091
|
To which of these enumerators can be assigned?
|
|
2092
|
In which type does the enumerators are stored by the compiler?
|
|
2093
|
Identify the incorrect option.
|
|
2094
|
What is the output of this program? #include <iostream> using namespace std; int main() { void a = 10, b = 10; int c; c = a + b; cout << c; return 0; }
|
|
2095
|
Choose the incorrect option
|
|
2096
|
What does the following statement mean? void a;
|
|
2097
|
____ have the return type void?
|
|
2098
|
Which of the following will not return a value?
|
|
2099
|
What would be the output of the following program (in 32-bit systems)? #include <iostream> using namespace std; int main() { cout << sizeof(char); cout << sizeof(int); cout << sizeof(float); return 0; }
|
|
2100
|
What is the output of the following program? #include <iostream> using namespace std; int main() { int a = 5; float b; cout << sizeof(++a + b); cout << a; return 0; }
|
|
2101
|
What is the output of the following program? #include <iostream> using namespace std; int main() { int num1 = 10; float num2 = 20; cout << sizeof(num1 + num2); return 0; }
|
|
2102
|
What is the output of the following program? #include <iostream> using namespace std; int main ( ) { static double i; i = 20; cout << sizeof(i); return 0; }
|
|
2103
|
What is the output of the following program? #include <iostream> using namespace std; int main() { int num = 0x20 + 020 + 20; cout << sizeof(num)<<'\n'; return 0; }
|
|
2104
|
Identify the incorrect option.
|
|
2105
|
Size of C++ objects are expressed in terms of multiples of the size of a ____ and the size of a char is _______
|
|
2106
|
Implementation dependent aspects about an implementation can be found in ____
|
|
2107
|
It is guaranteed that a ____ has atleast 8bits and a ____ has atleast 16 bits.
|
|
2108
|
The size of an object or a type can be determined using which operator?
|
|
2109
|
What is the output of this program? #include <iostream> using namespace std; int main() { float f1 = 0.5; double f2 = 0.5; if (f1 == 0.5f) cout << "equal"; else cout << "not equal"; return 0; }
|
|
2110
|
Which is used to indicate single precision value?
|
|
2111
|
What is the output of this program? #include <iostream> using namespace std; int main() { float i = 123.0f; cout << i << endl; return 0; }
|
|
2112
|
What is the output of this program? #include <iomanip> #include <iostream> using namespace std; int main() { cout << setprecision(17); double d = 0.1; cout << d << endl; return 0; }
|
|
2113
|
What is the output of this program? #include <iostream> using namespace std; int main() { float num1 = 1.1; double num2 = 1.1; if (num1 == num2) cout << "stanford"; else cout << "harvard"; return 0; }
|
|
2114
|
Which of three sizes of floating point types should be used when extended precision is required?
|
|
2115
|
What is the range of the floating point numbers?
|
|
2116
|
Which of the following is a valid floating point literal?
|
|
2117
|
Which of the following is not one of the sizes of the floating point types?
|
|
2118
|
What will be output of this function? int main() { register int i = 1; int *ptr = &i; cout << *ptr; return 0; }
|
|
2119
|
What will be output of this program? #include <iostream> using namespace std; int main() { int i = 3; int l = i / -2; int k = i % -2; cout << l << k; return 0; }
|
|
2120
|
What will be the output of this program? #include <iostream> using namespace std; int main() { int a = 8; cout << "ANDing integer 'a' with 'true' :" << a && true; return 0; }
|
|
2121
|
0946, 786427373824, ‘x’ and 0X2f are _____ _____ ____ and _____ literals respectively.
|
|
2122
|
Which of these expressions will isolate the rightmost set bit?
|
|
2123
|
Which of these expressions will make the rightmost set bit zero in an input integer x?
|
|
2124
|
What is the value of the following 8-bit integer after all statements are executed? int x = 1; x = x << 7; x = x >> 7;
|
|
2125
|
Which of these expressions will return true if the input integer v is a power of two?
|
|
2126
|
What is the output of the following program? #include <iostream> using namespace std; int main() { int x = -1; unsigned int y = 2; if(x > y) { cout << "x is greater"; } else { cout << "y is greater"; } }
|
|
2127
|
The size_t integer type in C++ is?
|
|
2128
|
What constant defined in <climits> header returns the number of bits in a char?
|
|
2129
|
Suppose in a hypothetical machine, the size of char is 32 bits. What would sizeof(char) return?
|
|
2130
|
Is the size of character literals different in C and C++?
|
|
2131
|
In C++, what is the sign of character data type by default?
|
|
2132
|
What is the output of this program? #include <stdio.h> int main() { char a = '\012'; printf("%d", a); return 0; }
|
|
2133
|
How do we represent a wide character of the form wchar_t?
|
|
2134
|
What will be the output of this program? #include <iostream> using namespace std; int main() { char c = 74; cout << c; return 0; }
|
|
2135
|
Which of the following belongs to the set of character types?
|
|
2136
|
Select the right option. Given the variables p, q are of char type and r, s, t are of int type 1. t = (r * s) / (r + s); 2. t = (p * q) / (r + s);
|
|
2137
|
How many characters are specified in the ASCII scheme?
|
|
2138
|
Evaluate the following (false && true) || false || true
|
|
2139
|
What is the value of p? #include <iostream> using namespace std; int main() { int p; bool a = true; bool b = false; int x = 10; int y = 5; p = ((x | y) + (a + b)); cout << p; return 0; }
|
|
2140
|
What is the output of the following program? #include <iostream> using namespace std; int f(int p, int q) { if (p > q) return p; else return q; } main() { int a = 5, b = 10; int k; bool x = true; bool y = f(a, b); k =((a * b) + (x + y)); cout << k; }
|
|
2141
|
Which of the two operators ++ and — work for the bool datatype in C++?
|
|
2142
|
For what values of the expression is an if-statement block not executed?
|
|
2143
|
Which of the following statements are false ?
|
|
2144
|
What happens when a null pointer is converted into bool?
|
|
2145
|
What is the value of the bool? bool is_int(789.54)
|
|
2146
|
Find the odd one out:
|
|
2147
|
Is bool a fundamental datatype in C++?
|
|
2148
|
Pick the odd one out.
|
|
2149
|
When a language has the capability to produce new data type mean, it can be called as
|
|
2150
|
The value 132.54 can represented using which data type?
|
|
2151
|
Which of the following statements are true ?
|
|
2152
|
Identify the user-defined types from the following?
|
|
2153
|
Which type is best suited to represent the logical values?
|
|
2154
|
What does a escape code represent?
|
|
2155
|
Which datatype is used to represent the absence of parameters?
|
|
2156
|
Pick the odd one out
|
|
2157
|
What is the size of wchar_t in C++?
|
|
2158
|
Value of a in a = (b = 5, b + 5); is
|
|
2159
|
The output of this program is int main () { cout << “Hello World!†return 0; }
|
|
2160
|
The return value of the following code is Class1& test(Class1 obj) { Class1 *ptr = new Class1(); ……… return ptr; }
|
|
2161
|
The output of { int a = 5; int b = 10; cout << (a>b?a:b); }
|
|
2162
|
The output of this program is int a = 10; void main() { int a = 20; cout << a << ::a; }
|
|
2163
|
Observe following program and answer class Example{ public: int a,b,c; Example(){a=b=c=1;} //Constructor 1 Example(int a){a = a; b = c = 1;} //Constructor 2 Example(int a,int b){a = a; b = b; c = 1;} //Constructor 3 Example(int a,int b,int c){ a = a; b = b; c = c;} //Constructor 4 } In the above example of constructor overloading, the following statement will call which constructor Example obj = new Example (1,2,3);
|
|
2164
|
. Which of the following correctly describes the meaning of‘namespace’ feature in C++?
|
|
2165
|
In mulitÂlist organization
|
|
2166
|
. A direct access file is:
|
|
2167
|
What’s wrong? (x = 4 && y = 5) ? (a = 5) ; (b = 6);
|
|
2168
|
. If the class name is X, what is the type of its “this†pointer (in a nonstatic, nonÂconst member function)?
|
|
2169
|
What will be output if you will compile and execute the following c code? #include int main(){ int a=1,2; int b=(1,2); printf(“%d %dâ€,a,b); return 0; }
|
|
2170
|
What is output ? int main(){ int i=10; static int x=i; if(x==i) printf(“Equalâ€); else if(x>i) printf(“Greater thanâ€); else printf(“Less thanâ€); return 0; }
|
|
2171
|
To ensure that every object in the array receives a destructor call, always delete memory allocated as an array with operator __________
|
|
2172
|
Which of the following statements are correct?
|
|
2173
|
Which of the following never requires any arguments?
|
|
2174
|
Which of the following implicitly creates a default constructor when the programmer does not explicitly define at least one constructor for a class?
|
|
2175
|
If the programmer does not explicitly provide a destructor, then which of the following creates an empty destructor?
|
|
2176
|
Which of the following are NOT provided by the compiler by default?
|
|
2177
|
Which of the following gets called when an object goes out of scope?
|
|
2178
|
Copy constructor must receive its arguments by __________ .
|
|
2179
|
What happens when a class with parameterized constructors and having no default constructor is used in a program and we create an object that needs a zero-argument constructor?
|
|
2180
|
Which of the following function / types of function cannot have default parameters?
|
|
2181
|
Which of the following statement is correct?
|
|
2182
|
Which of the following function declaration is/are incorrect?
|
|
2183
|
Which of the following function prototype is perfectly acceptable?
|
|
2184
|
Which of the following can be overloaded?
|
|
2185
|
Which of the following means “The use of an object of one class in definition of another class�
|
|
2186
|
What does the class definitions in following code represent? class Bike { Engine objEng; }; class Engine { float CC; };
|
|
2187
|
Which of the following also known as an instance of a class?
|
|
2188
|
What happens when we try to compile the class definition in following code snippet? class Birds {}; class Peacock : protected Birds {};
|
|
2189
|
How “Late binding†is implemented in C++?
|
|
2190
|
Which of the following correctly describes overloading of functions?
|
|
2191
|
How many types of polymorphisms are supported by C++?
|
|
2192
|
Which of the following concept of oops allows compiler to insert arguments in a function call if it is not specified?
|
|
2193
|
i) Exceptions can be traced and controlled using conditional statements. ii) For critical exceptions compiler provides the handler
|
|
2194
|
What is the output of the following program? #include<iostream> #include<string.h> using namespace std; main() { char s[] = "Hello\0Hi"; cout<<strlen(s)<<" "<<sizeof(s); }
|
|
2195
|
What is the output of the following program? #include<iostream> using namespace std; void main() { char s[] = "C++"; cout<<s<<" "; s++; cout<<s<<" "; }
|
|
2196
|
What is the output of the following program? #include<iostream> using namespace std; void main() { char *s = "C++"; cout<<s<<" "; s++; cout<<s<<" "; }
|
|
2197
|
What is the built in library function to compare two strings?
|
|
2198
|
What is the output of the following program? #include<iostream> using namespace std; main() { char s[] = "Fine"; *s = 'N'; cout<<s<<endl; }
|
|
2199
|
What is the output of the following program? #include<iostream> using namespace std; main() { int a[] = {10, 20, 30}; cout<<*a+1; }
|
|
2200
|
Does both the loops in the following programs prints the correct string length? #include<iostream> using namespace std; main() { int i; char s[] = "hello"; for(i=0; s[i]; ++i); cout<<i<<endl; i=0; while(s[i++]); cout<<i; }
|
|
2201
|
What is the output of the following program? main() { }
|
|
2202
|
What is the output of the following program? #include<iostream> using namespace std; void f() { static int i = 3; cout<<i; if(--i) f(); } main() { f(); }
|
|
2203
|
The default executable generation on UNIX for a C++ program is ___
|
|
2204
|
What is the output of the following program? #include<iostream> using namespace std; int x = 5; int &f() { return x; } main() { f() = 10; cout<<x; }
|
|
2205
|
Following is the invalid inclusion of a file to the current program. Identify it
|
|
2206
|
An inline function can execute faster than a normal function.
|
|
2207
|
Choose the invalid identifier from the below
|
|
2208
|
A single line comment in C++ language source code can begin with _____
|
|
2209
|
Special symbol permitted with in the identifier name.
|
|
2210
|
What is the output of the following program? #include<iostream> using namespace std; main() { union abc { int x; char ch; } var; var.ch = 'A'; cout<<var.x; }
|
|
2211
|
What is the output of the following program? #include<iostream> using namespace std; main() { int i = 13, j = 60; i^=j; j^=i; i^=j; cout<<i<<" "<<j; }
|
|
2212
|
What is the output of the following program? #include<iostream> using namespace std; main() { int a[] = {1, 2}, *p = a; cout<<p[1]; }
|
|
2213
|
What is the size of ‘int’?
|
|
2214
|
What is the output of the following program? #include<iostream> using namespace std; main() { int r, x = 2; float y = 5; r = y%x; cout<<r; }
|
|
2215
|
What will be the output of the following program? #include<iostream> #include<string.h> using namespace std; main() { cout<<strcmp("strcmp()","strcmp()"); }
|
|
2216
|
What is the output of the following program? #include<iostream> using namespace std; void swap(int m, int n) { int x = m; m = n; n = x; } main() { int x = 5, y = 3; swap(x,y); cout<<x<<" "<<y; }
|
|
2217
|
What is the output of the following program? #include <iostream> using namespace std; int main () { // local variable declaration: int x = 1; switch(x) { case 1 : cout << "Hi!" << endl; break; default : cout << "Hello!" << endl; } }
|
|
2218
|
What is the output of the following program? #include<iostream> using namespace std; void f() { cout<<"Hello"<<endl; } main() { }
|
|
2219
|
What is the output of the following program? #include<iostream> using namespace std; main() { short unsigned int i = 0; cout<<i--; }
|
|
2220
|
What is the outpout of the following program? #include<iostream> using namespace std; main() { enum { india, is = 7, GREAT }; cout<<india<<" "<<GREAT; }
|
|
2221
|
What is the output of the following program? #include<iostream> using namespace std; main() { const int a = 5; a++; cout<<a; }
|
|
2222
|
i) Exception handling technically provides multi branching. ii) Exception handling can be mimicked using ‘goto’ construct.
|
|
2223
|
An exception is __
|
|
2224
|
(i) ‘ios’ is the base class of ‘istream’ (ii) All the files are classified into only 2 types. (1) Text Files (2) Binary Files.
|
|
2225
|
With respective to streams >> (operator) is called as
|
|
2226
|
- i) single file can be opened by several streams simultaneously. ii) several files simultaneously can be opened by a single stream
|
|
2227
|
Which type of data file is analogous to an audio cassette tape?
|
|
2228
|
What is the full form of STL?
|
|
2229
|
An array can be passed to the function with call by value mechanism.
|
|
2230
|
What is a generic class.
|
|
2231
|
HAS-A relationship between the classes is shown through.
|
|
2232
|
A C++ program statements can be commented using
|
|
2233
|
Choose the option not applicable for the constructor.
|
|
2234
|
The copy constructor is executed on
|
|
2235
|
The programs machine instructions are store in __ memory segment.
|
|
2236
|
Objects created using new operator are stored in __ memory.
|
|
2237
|
Which feature of the OOPS gives the concept of reusability?
|
|
2238
|
What is the output of the following program? #include<iostream> using namespace std; main() { int const a = 5; a++; cout<<a; }
|
|
2239
|
What is the output of the following program? #include<iostream> using namespace std; main() { int *p = new int; delete p; delete p; cout<<"Done"; }
|
|
2240
|
What is the output of the following program? #include<iostream> using namespace std; class Base { public: void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; }; }; main() { Derived obj; obj.Base::f(); }
|
|
2241
|
What is the output of the following program? #include<iostream> using namespace std; class Base { public: void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; } }; main() { Derived obj; obj.Base::f(); }
|
|
2242
|
What is the output of the following program? #include<iostream> using namespace std; class Base { public: void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; } }; main() { Base *p = new Derived(); p->f(); }
|
|
2243
|
How many number of arguments can a destructor of a class receives?
|
|
2244
|
Designer of C++ programming language.
|
|
2245
|
We can use this pointer in static member function of the class.
|
|
2246
|
The pointer which stores always the current active object address is __
|
|
2247
|
How can we make an class act as an interface in C++?
|
|
2248
|
Escape sequence character '\0' occupies __ amount of memory.
|
|
2249
|
Class function which is called automatically as soon as the object is created is called as __
|
|
2250
|
Choose the Object oriented programming language from below.
|
|
2251
|
Runtime polymorphism is done using.
|
|
2252
|
A protected member of the class in accessible in
|
|
2253
|
In the following program f() is overloaded. void f(int x) { } int f(signed x) { return 1; } main() { }
|
|
2254
|
In the following program f() is overloaded. void f(int x) { } void f(signed x) { } main() { }v
|
|
2255
|
What is the output of the following program? #include<iostream> using namespace std; main() { int i = 1, j = 2, k = 3, r; r = (i, j, k); cout<<r<<endl; }
|
|
2256
|
We can have varying number of arguments for the overloaded form of () operator.
|
|
2257
|
Operators sizeof and ?:
|
|
2258
|
The following operator can be used to calculate the value of one number raised to another.
|
|
2259
|
Which is the storage specifier used to modify the member variable even though the class object is a constant object?
|
|
2260
|
Which data type can be used to hold a wide character in C++?
|
|
2261
|
A user defined header file is included by following statement in general.
|
|
2262
|
The operator used to access member function of a structure using its object.
|
|
2263
|
‘cin’ is an __
|
|
2264
|
Choose the respective delete operator usage for the expression ‘ptr=new int[100]’.
|
|
2265
|
From the below class choose the proper definition of the member function f(). template <class T> class abc { void f(); };
|
|
2266
|
By default the members of the structure are
|
|
2267
|
What is the output of the following program? #include<iostream> using namespace std; class abc { public: int i; abc(int i) { i = i; } }; main() { abc m(5); cout<<m.i; }
|
|
2268
|
Which of the following is not the keyword in C++?
|
|
2269
|
Which operator is required to be overloaded as member function only
|
|
2270
|
A constructor can be virtual.
|
|
2271
|
Choose the operator which cannot be overloaded.
|
|
2272
|
What is the output of the following program? #include<iostream> using namespace std; class abc { public: static int x; int i; abc() { i = ++x; } }; int abc::x; main() { abc m, n, p; cout<<m.x<<" "<<m.i<<endl; }
|
|
2273
|
What is the output of the following program? #include<iostream> using namespace std; class abc { void f(); void g(); int x; }; main() { cout<<sizeof(abc)<<endl; }
|
|
2274
|
Choose the pure virtual function definition from the following.
|
|
2275
|
One of the following is true for an inline function.
|
|
2276
|
A trigraph character begins with
|
|
2277
|
The default access specifer for the class members is
|
|
2278
|
(i) ‘ios’ is the base class of ‘istream’ (ii) All the files are classified into only 2 types. (1) Text Files (2) Binary Files.
|
|
2279
|
Runtime polymorphism is done using.
|
|
2280
|
Abstract class is __
|
|
2281
|
A C++ program statements can be commented using
|
|
2282
|
Which operator is used to resolve the scope of the global variable?
|
|
2283
|
What is the output of the following program? #include<iostream> using namespace std; main() { class student { int rno = 10; } v; cout<<v.rno; }
|
|
2284
|
Compiler generates ___ file
|
|
2285
|
C++ does not supports the following
|
|
2286
|
What is the output of the following program? #include<iostream> using namespace std; main() { char s[] = "Fine"; *s = 'N'; cout<<s<<endl; }
|
|
2287
|
Following is the invalid inclusion of a file to the current program. Identify it
|
|
2288
|
What is the output of the following program? #include<iostream> using namespace std; void main() { char *s = "C++"; cout<<s<<" "; s++; cout<<s<<" ";
|
|
2289
|
What is the output of the following program? #include<iostream> using namespace std; int x = 5; int &f() { return x; } main() { f() = 10; cout<<x; }
|
|
2290
|
What is the output of the following program? #include<iostream> using namespace std; main() { char s[] = "hello", t[] = "hello"; if(s==t) cout<<"eqaul strings"; }
|
|
2291
|
What is the output of the following program? #include<iostream> using namespace std; main() { float t = 2; switch(t) { case 2: cout<<â€Hiâ€; default: cout<<"Hello"; } }
|
|
2292
|
What is the output of the following program? #include<iostream> using namespace std; main() { int x = 5; if(x==5) { if(x==5) break; cout<<"Hello"; } cout<<â€Hiâ€; }
|
|
2293
|
What is the full form of RTTI.
|
|
2294
|
What is the output of the following program? #include<iostream> using namespace std; void f() { static int i = 3; cout<<i; if(--i) f(); } main() { f(); }
|
|
2295
|
What is the output of the following program? #include<iostream> using namespace std; void swap(int m, int n) { int x = m; m = n; n = x; } main() { int x = 5, y = 3; swap(x,y); cout<<x<<" "<<y; }
|
|
2296
|
What is the size of the following union definition? #include<iostream> using namespace std; main() { union abc { char a, b, c, d, e, f, g, h; int i; }; cout<<sizeof(abc); }
|
|
2297
|
What is the output of the following program? #include<iostream> using namespace std; main() { char *s = "Fine"; *s = 'N'; cout<<s<<endl; }
|
|
2298
|
Identify the C++ compiler of Linux
|
|
2299
|
What is the output of the following program? #include<iostream> using namespace std; main() { int a[] = {1, 2}, *p = a; cout<<p[1]; }
|
|
2300
|
What is the output of the following program? #include<iostream> using namespace std; void f() { static int i; ++i; cout<<i<<" "; } main() { f(); f(); f(); }
|
|
2301
|
i) single file can be opened by several streams simultaneously. ii) several files simultaneously can be opened by a single stream
|
|
2302
|
What is the output of the following program? #include<iostream> using namespace std; main() { int *p = new int; delete p; delete p; cout<<"Done"; }
|
|
2303
|
What is the output of the following program? #include<iostream> using namespace std; class Base { public: virtual void f() { cout<<"Base\n"; } }; class Derived:public Base { public: void f() { cout<<"Derived\n"; } }; main() { Base *p = new Derived(); p->f(); }
|
|
2304
|
Pick up the valid declaration for overloading ++ in postfix form where T is the class name.
|
|
2305
|
From the below class choose the proper definition of the member function f(). template <class T> class abc { void f(); };
|
|
2306
|
The default access specifer for the class members is
|
|
2307
|
The four major enterprise applications are
|
|
2308
|
What is the most important function of an enterprise application?
|
|
2309
|
Using the Internet to buy or sell goods is called
|
|
2310
|
Executive support systems are information systems that support the
|
|
2311
|
Which level of the organization are ESS specifically designed to serve?
|
|
2312
|
________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.
|
|
2313
|
To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems.
|
|
2314
|
The term "management information systems" designates a specific category of information systems serving
|
|
2315
|
Converting raw data into a more meaningful form is called:
|
|
2316
|
Investing in a new business model that is appropriate for a new product or service is an example of:
|
|
2317
|
A description of how a company produces, delivers and sells a product or service to create wealth is called :
|
|
2318
|
Using an Information System to enhance productivity is an example of which of the six strategic business objectives?
|
|
2319
|
Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective?
|
|
2320
|
The use of information systems because of necessity describes the business objective of:
|
|
2321
|
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and:
|
|
2322
|
Order data for baseball tickets and bar code data are examples of:
|
|
2323
|
In an information system, which of the following transfers information to the people or groups in an organization who use it:
|
|
2324
|
Using an Information System to help determine how many products to distribute to retail outlets is an example of which strategic business objectives?
|
|
2325
|
Internet advertising is growing at a rate of more than 25 percent a year:
|
|
2326
|
Ina an information system,which of the following accepts data from the environment?
|
|
2327
|
Sets of logically related tasks & behaviors that organizations develop to produce specific business results are called:
|
|
2328
|
Which of the following operators can be overloaded?
|
|
2329
|
The average number of tickets sold daily online is an example of:
|
|
2330
|
How do we define a constructor?
|
|
2331
|
Which of the following below can perform conversions between pointers to related classes?
|
|
2332
|
Investment in information technology accounts for approximately what % of all capital invested today in the U.S:
|
|
2333
|
Which of the following language feature is not an access specifier in C++
|
|
2334
|
The behavioral approach to information systems tends to focus on:
|
|
2335
|
Verizon's implementation of a Web-based digital dashboard to provide managers with real-time information such as customer complaints is an example of
|
|
2336
|
class derived: public base1, public base2 { } is an example of
|
|
2337
|
An Organization co-ordinates work through a structured hierarchy and formal:
|
|
2338
|
Each pass through a loop is called a/an
|
|
2339
|
Which of the STL containers store the elements contiguously (in adjacent memory locations)?
|
|
2340
|
A single sharded cluster must have exclusive use of its _______ servers
|
|
2341
|
The ______ instances are the routers for the cluster
|
|
2342
|
For most deployments, the default value of chunk is _____ megabytes is ideal
|
|
2343
|
The shards manage _______ migrations as a background operation between an origin shard and a destination shard
|
|
2344
|
Which of the following is not true about preprocessor directives
|
|
2345
|
_________ is a background process that keeps chunks from growing too large
|
|
2346
|
How many background process runs behind balanced cluster?
|
|
2347
|
Which of the following correctly describes C++ language?
|
|
2348
|
Which of the following is a valid destructor of the class name “Countryâ€
|
|
2349
|
Tags are the primary mechanism to control the behavior of the _______ and the distribution of chunks in a cluster
|
|
2350
|
MongoDB allows administrators to direct the balancing policy using ______ aware sharding
|
|
2351
|
_______ based partitioning, by contrast, ensures an even distribution of data at the expense of efficient range queries
|
|
2352
|
With hash based partitioning, two documents with _____ shard key values are unlikely to be part of the same chunk
|
|
2353
|
To divide the shard key values into chunks, MongoDB uses _____ based partitioning
|
|
2354
|
A _________ key is either an indexed field or an indexed compound field that exists in every document in the collection.
|
|
2355
|
The two types of file structure existing in VSAM file are
|
|
2356
|
Production sharded clusters have exactly ______ config servers.
|
|
2357
|
Latency time is:
|
|
2358
|
The query router uses __________ to target operations to specific shards
|
|
2359
|
________ servers store the cluster’s metadata
|
|
2360
|
An inverted file
|
|
2361
|
Originally ‘C’ was developed as:
|
|
2362
|
A sharded cluster can contain __________ query router to divide the client request load
|
|
2363
|
_________ interface with client applications and direct operations to the appropriate shard or shards
|
|
2364
|
To provide high availability and data consistency, in a production sharded cluster, each shard is a ___________
|
|
2365
|
How many components are present in sharded cluster?
|
|
2366
|
MongoDB supports sharding through the configuration of a sharded ______
|
|
2367
|
_______ divides the data set and distributes the data over multiple servers, or shards
|
|
2368
|
_______ scaling adds more CPU and storage resources to increase capacity
|
|
2369
|
How many types of sharding exist in MongoDB?
|
|
2370
|
MongoDB uses _________ to support deployments with very large data sets and high throughput operations.
|
|
2371
|
__________ prints a report of the status of the replica set from the perspective of the secondaries
|
|
2372
|
______ returns basic help text for replica set functions
|
|
2373
|
Remove the secondary from the replica set by calling ___________ method
|
|
2374
|
_________ members allow you to add additional members for read distribution beyond the maximum seven voting members
|
|
2375
|
Which of the following is/are advantages of cellular partitioned structure:
|
|
2376
|
If the oplog is shorter than the slaveDelay window, the _______ member cannot successfully replicate operations
|
|
2377
|
In mulit-list organization
|
|
2378
|
The _________ shell method can force the current primary to step down, which causes an election
|
|
2379
|
To modify priorities, you update the members _________ in the replica configuration object
|
|
2380
|
The ________ settings of replica set members affect the outcomes of elections for primary
|
|
2381
|
A direct access file is:
|
|
2382
|
__________ explicitly override the default logic for selecting a member to replicate from
|
|
2383
|
If class A is friend of class B and if class B is friend of class C, which of the following is true?
|
|
2384
|
_______ is an internal command that applies oplog entries to the current data set
|
|
2385
|
Which of the command is for master-slave replication only?
|
|
2386
|
________ applies a new configuration to an existing replica set
|
|
2387
|
When enabled replSetMaintenance: true, the member enters the ________ state
|
|
2388
|
__________ enables or disables a maintenance mode, which puts a secondary node in a RECOVERING state
|
|
2389
|
________ returns a document that reports on the status of the replica set
|
|
2390
|
For most replica sets, the hostnames in the _________ field never change.
|
|
2391
|
You can use the ________ setting in Replica Set Configuration to disable chained replication for situations where chained replication is causing lag
|
|
2392
|
You cannot use a _________backup for the data files, only a snapshot backup
|
|
2393
|
During initial sync, mongod will remove the content of the _______
|
|
2394
|
A replica set member becomes _________ when its replication process falls so far behind that the primary overwrites oplog entries the member has not yet replicated.
|
|
2395
|
You also can force a member never to become primary by setting its priority value to ___________
|
|
2396
|
To finish the rolling maintenance operation, step down the primary with the _________ method
|
|
2397
|
_________ shut down the mongod instance for one of the non-primary members of your replica set
|
|
2398
|
A delayed member may show as 0 seconds behind the primary when the inactivity period on the primary is greater than the ________ value.
|
|
2399
|
Replication _______ is a delay between operation on the primary and the application of that operation from the oplog to the secondary
|
|
2400
|
When ______________ is true, the mongod instance saves all documents migrated from the shard to the moveChunk directory of the storage.dbPath
|
|
2401
|
Secondaries apply operations from the primary asynchronously to provide __________ consistency
|
|
2402
|
For a member to sync from another, both members must have the same value for the _________ setting
|
|
2403
|
Use _________ from a secondary member and the replication status output to assess the current state of replication
|
|
2404
|
The oplog must translate multi-updates into individual operations in order to maintain ____________
|
|
2405
|
Before mongod creates an oplog, you can specify its size with the __________ option.
|
|
2406
|
__________ sets the member that this replica set member will sync from, overriding the default sync target selection logic
|
|
2407
|
_______ re-configures a replica set by applying a new replica set configuration object.
|
|
2408
|
________ prints a report of the status of the replica set from the perspective of the primary
|
|
2409
|
_________ returns the replica set configuration document
|
|
2410
|
_________ prevents the current member from seeking election as primary for a period of time
|
|
2411
|
Which of the following ddds an arbiter to a replica set?
|
|
2412
|
______ is used to load all the scripts saved in the system.js collection for the current database
|
|
2413
|
Which of the following can store JavaScript functions for reuse?
|
|
2414
|
Which of the following The collection holds special JavaScript code for use in server side JavaScript?
|
|
2415
|
The <database>.system.indexes collection lists all the _________ in the database
|
|
2416
|
The ___________ collection stores the user’s authentication credentials as well as any roles assigned to the user
|
|
2417
|
In replica sets, each ________ maintains a connection to all other members of the set.
|
|
2418
|
MongoDB stores additional instance-local metadata in the _______ database
|
|
2419
|
If the query planner selects a _________ the explain result includes an IXSCAN stage
|
|
2420
|
In _____________ mode, MongoDB returns statistics describing the execution of the winning plan as well as statistics for the other candidate plans captured during plan selection
|
|
2421
|
Which of the following parameter specifies the verbosity mode for the explain output?
|
|
2422
|
If the query planner selects a collection scan, the explain result includes a _________ stage.
|
|
2423
|
For sharded collections, explain returns the __________ for each accessed shard
|
|
2424
|
_________ corresponds to the millis field returned by cursor.explain() in earlier versions of MongoDB
|
|
2425
|
Which of the following provides information on the MongoDB instance?
|
|
2426
|
____________ does not provide query execution information for the rejected plans
|
|
2427
|
By default, db.collection.explain() runs in ___________ verbosity mode
|
|
2428
|
____________ returns information on the query plan for aggregate function
|
|
2429
|
Which of the operator is used to access the query field of documents within system.profile?
|
|
2430
|
MongoDB reports its triggered page faults as the total number of page faults in ________ second
|
|
2431
|
You can inspect __________ to check the amount of mapped memory that mongod is using
|
|
2432
|
The memory usage statuses metrics of the _________ output can provide insight into MongoDB’s memory use.
|
|
2433
|
With the _______ storage engine, MongoDB uses memory-mapped files to store data
|
|
2434
|
MongoDB’s _______ is a database profiling system that can help identify inefficient queries and operations
|
|
2435
|
______ field contains total number of current clients that connect to the database instance
|
|
2436
|
serverStatus includes all fields by default, except _________
|
|
2437
|
The __________ data structure value provides more granular information concerning the number of operations queued because of a lock
|
|
2438
|
If __________ is high relative to uptime, the database has existed in a lock state for a significant amount of time
|
|
2439
|
________ provide the number of times the lock acquisitions encountered deadlocks
|
|
2440
|
Which of the following setting defines what constitutes a “slow†operation?
|
|
2441
|
You cannot create a TTL index on a ________ collection
|
|
2442
|
You cannot use _________ to change the value of expireAfterSeconds of an existing index
|
|
2443
|
Which field does not support TTL indexes?
|
|
2444
|
A collection with a TTL index has __________ enabled.
|
|
2445
|
Secondary members replicate _________ operations from the primary
|
|
2446
|
If the indexed field in a document is not a _____ or an array that holds a date value(s), the document will not expire
|
|
2447
|
Which of the following collection do not support the TTL property?
|
|
2448
|
Which of the following command obtains a global write lock and will block other operations until it has completed?
|
|
2449
|
_________ command creates the capped collection and imports the data
|
|
2450
|
___________ convert a non-capped collection to a capped collection
|
|
2451
|
Which of the following should is used to check whether collection is capped or not?
|
|
2452
|
If you perform a ________ on a capped collection with no ordering specified, MongoDB guarantees that the ordering of results is the same as the insertion order.
|
|
2453
|
________ is also used to pre-allocate space for an ordinary collection.
|
|
2454
|
_________ stores a log of the operations in a replica set
|
|
2455
|
Which of the following collections work in a way similar to circular buffers?
|
|
2456
|
Which of the following preference does not affect the visibility of data?
|
|
2457
|
All read preference modes except _______ may return stale data
|
|
2458
|
Read preference modes are also available to clients connecting to a sharded cluster through ______________
|
|
2459
|
Which of the following should not be used to provide extra capacity for reads?
|
|
2460
|
By default, an application directs its ______ operations to the primary member in a replica set
|
|
2461
|
MongoDB stores tag sets in the replica set configuration object, which is the document returned by ____________
|
|
2462
|
The _______ migrates chunks of documents in a sharded collection to the shards associated with a tag.
|
|
2463
|
MongoDB supports tagging a range of _______ key values to associate that range with a shard or group of shards.
|
|
2464
|
_____ is a command-line tool for monitoring network use
|
|
2465
|
The TCP keepalive on the Azure load balancer is ______ seconds by default
|
|
2466
|
Which of the following is especially important in Sharded Clusters?
|
|
2467
|
WiredTiger can compress collection data using either snappy or zlib compression library
|
|
2468
|
MongoDB Cloud Manager provides integration with Amazon Web Services (AWS) and lets you deploy new ______ instances directly from MongoDB Cloud Manager
|
|
2469
|
MongoDB requires a filesystem that supports ______ on directories
|
|
2470
|
With the WiredTiger storage engine, use of _______ is strongly recommended to avoid performance issues
|
|
2471
|
Which of the following should be avoided with MongoDB Deployments?
|
|
2472
|
________ do not typically provide sufficient performance to support a MongoDB deployment
|
|
2473
|
The ________ command returns information regarding the number of open connections
|
|
2474
|
______ concern describes the guarantee that MongoDB provides when reporting on the success of a write operation.
|
|
2475
|
MongoDB uses ________ logging to an on-disk journal
|
|
2476
|
_________ supports concurrent access by readers and writers to the documents in a collection
|
|
2477
|
All collections have a unique ________ lock that allows multiple clients to modify documents in different collections at the same time
|
|
2478
|
Which of the following storage engine is supported by default?
|
|
2479
|
On Linux, use the ______ command to check if disk I/O is a bottleneck for your database
|
|
2480
|
Which of the following represents Shared lock?
|
|
2481
|
MongoDB stores tag sets in the replica set configuration object, which is the document returned by _____
|
|
2482
|
When the TTL thread is active, you will see _______ operations in the output of db.currentOp()
|
|
2483
|
The _________ field provides the amount of resident memory in use
|
|
2484
|
The ___________ collection stores custom roles that administrators create and assign to users to provide access to specific resources.
|
|
2485
|
_______ contains a counter of the total number of clients with active operations in progress or queued.
|
|
2486
|
Which of the following document configures the threshold which determines whether a query is “slow†for the purpose of the logging system?
|
|
2487
|
Which of the following sets the database profiler level?
|
|
2488
|
What is the size of Chunk by default?
|
|
2489
|
Which of the following provide acceptable performance levels for multiple mongod instances?
|
|
2490
|
_____ bit builds of mongod enable journaling by default
|
|
2491
|
______ is /srv/mongodb, which specifies where MongoDB will store its data files.
|
|
2492
|
Setting _______ enables authentication and specifies a key file for the replica set member use to when authenticating to each other
|
|
2493
|
Replica set configuration requires that the _______ have a value that is consistent among all members of the set.
|
|
2494
|
_______ provides statistics that resemble dbStats on the collection level.
|
|
2495
|
The ________ reflect the amount of storage used, the quantity of data contained in the database, and object, collection, and index counters.
|
|
2496
|
___________ returns a general overview of the status of the database, detailing disk usage, memory use, connection, journaling, and index access
|
|
2497
|
______ method is useful tool for identifying the database instance’s in-progress operations.
|
|
2498
|
_______ tracks and reports the current read and write activity of a MongoDB instance, and reports these statistics on a per collection basis.
|
|
2499
|
_________ captures and returns the counts of database operations by type.
|
|
2500
|
Which of the following document details the state and configuration of the replica set and statistics about its members?
|
|
2501
|
Which of the following command returns quickly and does not impact MongoDB performance?
|
|
2502
|
Backup can also create snapshots of _________ that are run as single-member replica sets
|
|
2503
|
The agent ships initial sync and oplog data over HTTPS back to ___________
|
|
2504
|
Ops Manager maintains one _____ database for each backed-up replica set
|
|
2505
|
Ops Manager reads directly from the Backup Blockstore database and transfers files either through ___________
|
|
2506
|
Sharded clusters snapshots temporarily stop the balancer via ______________
|
|
2507
|
Ops Manager ______ provides scheduled snapshots and point-in-time recovery of your MongoDB replica sets and sharded clusters
|
|
2508
|
Ops Manager _________ provides an interface for configuring MongoDB nodes and clusters and for upgrading your MongoDB deployment
|
|
2509
|
Ops Manager provides Ops Manager ________ and Ops Manager Backup, which helps users optimize clusters and mitigate operational risk
|
|
2510
|
________ an on-premise solution, has similar functionality to the cloud version
|
|
2511
|
To mitigate the impact of mongodump on the performance of the replica set, use mongodump to capture backups from a _________ member of a replica set
|
|
2512
|
When connected to a MongoDB instance, mongodump can adversely affect ______ performance
|
|
2513
|
On Linux the ______ manager can create a snapshot
|
|
2514
|
The MongoDB ______ supports the backing up and restoring of MongoDB deployments
|
|
2515
|
If applications modify data while mongodump is creating a backup _________ will compete for resources with those applications
|
|
2516
|
For replica sets, mongodump also supports a point in time feature with the ________ option
|
|
2517
|
mongodump and mongorestore can operate against a running _______ process
|
|
2518
|
The _________ tool can populate a MongoDB database with the data from these BSON files
|
|
2519
|
If your storage system does not support snapshots, you can copy the files directly using ____________
|
|
2520
|
The _______ tool reads data from a MongoDB database and creates high fidelity BSON files
|
|
2521
|
To get a correct snapshot of a running mongod process, you must have _________ enabled.
|
|
2522
|
The $rename operator logically performs a _______ of both the old name and the new name
|
|
2523
|
Updates that include _________ of field names may result in the reordering of fields in the document
|
|
2524
|
If your driver has a version number of 2.9.1, What is the major version?
|
|
2525
|
User-defined indexes on multiple fields is called ___________
|
|
2526
|
An application communicates with MongoDB by way of a client library, called _____________
|
|
2527
|
Which of the following data structures are documents in MongoDB?
|
|
2528
|
MongoDB uses the ________ notation to access the elements of an array and to access the fields of an embedded document.
|
|
2529
|
Index keys that are of the _______ type are more efficiently stored in the index
|
|
2530
|
To store documents larger than the maximum size, MongoDB provides the _______ API
|
|
2531
|
MongoDB documents are composed of field-and-value pairs and have the following structure?
|
|
2532
|
BSON is a binary representation of ________ documents
|
|
2533
|
The __________ JavaScript shell and the MongoDB language drivers translate between BSON and the language-specific document representation.
|
|
2534
|
Which of the following query is used to generate a new ObjectId, use the ObjectId() constructor with no argument?
|
|
2535
|
__________ returns the JavaScript representation in the form of a string literal
|
|
2536
|
The ______ field is always the first field in the document
|
|
2537
|
To ensure functioning replication, do not store values that are of the _______ regular expression type in the _id field
|
|
2538
|
Which of the field is reserved for use as a primary key?
|
|
2539
|
Object_Id is similar to _________ key in Relational Databases.
|
|
2540
|
In the mongo shell, you can access the creation time of the ObjectId, using the ______ method
|
|
2541
|
There is _________ byte counter in BSON, starting with a random value
|
|
2542
|
Each data type has a corresponding number that can be used with the _______ operator to query documents by BSON type
|
|
2543
|
Which of the following data type is depreciated?
|
|
2544
|
_________ is a binary serialization format used to store documents and make remote procedure calls in MongoDB
|
|
2545
|
The GridFS index allows efficient retrieval of __________ using the files_id and n values
|
|
2546
|
The ___ field contains the sequence number of the chunk
|
|
2547
|
GridFS uses a _________ index on the chunks collection for the files_id and n fields.
|
|
2548
|
Each document in the __________ collection represents a distinct chunk of a file as represented in the GridFS store
|
|
2549
|
MongoDB represents queries as ___________ objects
|
|
2550
|
When you query a GridFS store for a file, the _______ will reassemble the chunks as needed.
|
|
2551
|
By default GridFS limits chunk size to ______ k
|
|
2552
|
__________ is a specification for storing and retrieving files that exceed the BSON-document size limit of 16MB.
|
|
2553
|
In one field, exact monetary value is encoded as a _________ data type.
|
|
2554
|
The ______ factor is a constant and known property of the currency
|
|
2555
|
Use of the approximation field for the query and sort operations requires that applications perform _______ side post-processing
|
|
2556
|
Which of the following is used to handle arbitrary or unforeseen number of precision?
|
|
2557
|
MongoDB stores times in _____ by default, and will convert any local time representations into this form
|
|
2558
|
Which of the following precision uses two values for the field?
|
|
2559
|
__________ precision multiplies the monetary value by a power of 10
|
|
2560
|
To add structures to your document to support keyword-based queries add the keywords as ______ in the array
|
|
2561
|
Which of the following is related to the parsing of document for root?
|
|
2562
|
Which of the following is related to document that provide support for synonym or related queries in the application layer?
|
|
2563
|
Which of the following is related to document that do not provide a way to weight results?
|
|
2564
|
____ indexes can include any field whose value is a string or an array of string elements.
|
|
2565
|
___________ bulk indexes may be more efficient for some kinds of content and workloads in real time
|
|
2566
|
Which of the following operations are atomic on document level?
|
|
2567
|
Which of the following pattern is best for static trees that do not change?
|
|
2568
|
____________ pattern requires additional steps of working with strings and regular expressions
|
|
2569
|
The ____________ pattern identifies each node in the tree as stops in a round-trip traversal of the tree.
|
|
2570
|
The Array of Ancestors pattern is slightly slower than the ________________ pattern
|
|
2571
|
Which of the following pattern is more straightforward to use?
|
|
2572
|
Which of the following pattern may provide a suitable solution for storing graphs?
|
|
2573
|
The _________ References pattern stores each tree node in array the id(s) of the node’s children
|
|
2574
|
The ________ Links pattern provides a simple solution to tree storage but requires multiple queries to retrieve subtrees.
|
|
2575
|
The ________ References pattern stores each tree node in a document; in addition to the tree node, the document stores the id of the node’s parent.
|
|
2576
|
Which of the following statement is incorrect about documents in MongoDB?
|
|
2577
|
The ___________ JavaScript shell and the MongoDB language drivers translate between BSON and the language-specific document representation.The ___________ JavaScript shell and the MongoDB language drivers translate between BSON and the language-specific document representation.
|
|
2578
|
__________ define what records to select for read, update, and delete operations
|
|
2579
|
Which of the following is used to avoid the repetition of data in MongoDB schema?
|
|
2580
|
Which of the following relationship uses references to describe documents between connected data?
|
|
2581
|
Which of the following field allows efficient retrieval of chunks?
|
|
2582
|
The files_id field contains the _id of the chunk’s __________ document
|
|
2583
|
___________ is the _id is of the data type chosen for the original document in files collections
|
|
2584
|
The default chunk size is changed from 256k to 255k in which version
|
|
2585
|
_______________ is a specification for storing and retrieving files that exceed the BSON-document size limit of 16MB
|
|
2586
|
Capped collections provide __________ management of inserted documents in MongoDB
|
|
2587
|
To get the current number of namespaces in the mongo shell, use ____________
|
|
2588
|
MongoDB using the mmapv1 storage engine has limits on the number of __________
|
|
2589
|
Normalized data models describe relationships using ___________ between documents
|
|
2590
|
Embedded data model is used when you have _________ relationships between entities
|
|
2591
|
___________ strategy is used to explicitly avoid document growth.
|
|
2592
|
______________ documents capture relationships between data by storing related data in a single document structure
|
|
2593
|
_______ store the relationships between data by including links or references from one document to another.
|
|
2594
|
A query _______ consists of a combination of query, sort, and projection specifications
|
|
2595
|
_________ is used to view statistics about the query plan for a given query
|
|
2596
|
The update() method uses the _______ command, which uses the default write concern
|
|
2597
|
_____ can modify specific fields of an existing document or documents or replace an existing document entirely, depending on the update parameter
|
|
2598
|
The ________ message is used to update a document in a collection
|
|
2599
|
___________ is used to determine whether a query is a covered query
|
|
2600
|
Indexes are typically available in ______ or located sequentially on disk
|
|
2601
|
With a receipt acknowledged write concern, the _________confirms that it received the write operation and applied the change to the in-memory view of data
|
|
2602
|
MongoDB does not ___________ modifications made before the wtimeout interval expired
|
|
2603
|
The mongo shell and the MongoDB drivers use __________ as the default write concern
|
|
2604
|
When inserts, updates and deletes have a _________ write concern, write operations return quickly
|
|
2605
|
Point out the correct statement
|
|
2606
|
__________ concern describes the guarantee that MongoDB provides when reporting on the success of a write operation.
|
|
2607
|
An index cannot cover a query on a _______ collection when run against a mongos if the index does not contain the shard key.
|
|
2608
|
Which of the following operator is not very selective?
|
|
2609
|
____________ is a client or database-generated identifier that uniquely identifies this message
|
|
2610
|
The __________ method returns a document that includes a metrics field.
|
|
2611
|
______________ specifies the number of documents to return in each batch of the response from the MongoDB instance
|
|
2612
|
To describe the message structure, a ________ like struct is used
|
|
2613
|
Which of the following will display complete list of available cursor flags?
|
|
2614
|
Which of the following flag can be set by mongo shell?
|
|
2615
|
Ongoing activity of system support is
|
|
2616
|
System development of cross life-cycle is?
|
|
2617
|
________ is NOT a phase of the systems development life cycle?
|
|
2618
|
In PIECES framework Which one is NOT a category of problems represented
|
|
2619
|
What is the deliverable phase of the problem analysis
|
|
2620
|
Project Management ensures that
|
|
2621
|
__________ is an Example of Open database connectivity (OBDC) tools
|
|
2622
|
keyless interfaces include_________
|
|
2623
|
A definition of the user moves from window to window, interacting with the application programs to perform useful work is called:
|
|
2624
|
A Language-based, machine that representations of how a software process is supposed to do, or how a software process is supposed to accomplish its tasks.
|
|
2625
|
The transactions flow in business processes to ensure that appropriate checks and approvals are implemented is called
|
|
2626
|
________ not a typical business function?
|
|
2627
|
How many people that actually use the system to perform or support the work to be completed?
|
|
2628
|
________ done in the Credit checking
|
|
2629
|
________ not a class information system applications?
|
|
2630
|
Information systems that support the business functions that reach out to suppliers are known as:
|
|
2631
|
Contemporary Information Systems that are interfacing with customers and suppliers:
|
|
2632
|
______ is a part of a static view of information?
|
|
2633
|
Password and accounts responsibilities to 29 Use-case analysis focuses upon
|
|
2634
|
_______ is not a part of an acceptable use policy?
|
|
2635
|
Frederic W. Taylor present the idea(s) of
|
|
2636
|
For a web site, _______ is not a type of navagation system
|
|
2637
|
_______ relates to enterprise interoperability?
|
|
2638
|
______ done in the Credit checking
|
|
2639
|
Which statement is incorrect about XML schemas?
|
|
2640
|
which statement satisfy taxonomy?
|
|
2641
|
______ is the collection of UML depicts information systems
|
|
2642
|
_____ is depicted by web blueprint.
|
|
2643
|
The DBA is
|
|
2644
|
_____ represented an information flow diagram?
|
|
2645
|
The legal constraints Monitoring by a company which operates under requires review of:
|
|
2646
|
Which attribute manager require for quality information
|
|
2647
|
_________ is the general transformation cycle for information
|
|
2648
|
What is the primary outcome of web self-services that is offered by the bank for customers?
|
|
2649
|
Using a business performance management software to monitor performance __________
|
|
2650
|
What are the advantage(s) of transistors
|
|
2651
|
A university creates a web-based information system that gives access to faculty who can record student grades and advise students, this is an example of a/an CRM.
|
|
2652
|
In which phase of the system development process specifications for a solution that fulfills the business requirements is undertaken and the technical blueprint is developed
|
|
2653
|
short form of AI
|
|
2654
|
In information system Which one is not a business driver?
|
|
2655
|
Which of the following is responsible for the systems development, budget, on-time development and with acceptable quality
|
|
2656
|
Which one is the organizations Back Bone?
|
|
2657
|
which of the following application of information is used to scan an organization’s environment?
|
|
2658
|
who have concerned with tactical (short-term) operational problems and decision making ?
|
|
2659
|
Which of the following information system supports planning and assessment needs of executive management?
|
|
2660
|
In a formal system development process which of the following
|
|
2661
|
In an information system which one is not a technology driver for an information system?
|
|
2662
|
How are data organized in a spreadsheet?
|
|
2663
|
Which types of charts can excel produce?
|
|
2664
|
You can open the consolidate dialog box byt choosing Consolidate from the ….. menu.
|
|
2665
|
Macros are “run†or executed from the ….. menu.
|
|
2666
|
Except for the …… function, a formula with a logical function shows the word “TRUE†or “FALSE†as a result
|
|
2667
|
When you insert an Excel file into a Word document, the data are
|
|
2668
|
What function displays row data in a column or column data in a row?
|
|
2669
|
You can add an image to a template by clicking the Insert Picture From File button on the …. Toolbar.
|
|
2670
|
What do we call a computer program that organizes data in rows and columns of cells? You might use this type of program to keep a record of the money you earned moving lawns over the summer.
|
|
2671
|
What type of chart will you use to compare performance of sales of two products ?
|
|
2672
|
It is a collection of data that is stored electronically as a series of records in a table.
|
|
2673
|
An Excel file is generally called a / an :
|
|
2674
|
In Excel, which one denoted a range from B1 through E5
|
|
2675
|
How many sheets are there, by default, when we create a new Excel file ?
|
|
2676
|
The basic unit of a worksheet into which you enter data in Excel is called a
|
|
2677
|
What type of chart is good for single series of data ?
|
|
2678
|
How will you graphically represent expenditure in different departments ?
|
|
2679
|
What do you use to create a chart?
|
|
2680
|
In Excel, Rows are labelled as ______
|
|
2681
|
What type of chart is useful for comparing parts of a whole ?
|
|
2682
|
The ____ feature of MS Excel quickly completes a series of data
|
|
2683
|
The process of arrenging the items of a column in some sequence or order is known as :
|
|
2684
|
What type of chart is useful for showing trends or changes over time ?
|
|
2685
|
The Greater Than sign (>) is an example of _____ operator.
|
|
2686
|
In Excel, Columns are labelled as ___
|
|
2687
|
Which functionin Excel checks whether a condition is true or not ?
|
|
2688
|
Functions in MS Excel must begin with ___
|
|
2689
|
Which one is not a Function in MS Excel ?
|
|
2690
|
What type of chart will you use to compare performance of two employees in the year 2016 ?
|
|
2691
|
Statistical calculations and preparation of tables and graphs can be done using
|
|
2692
|
A features that displays only the data in column (s) according to specified criteria
|
|
2693
|
Which functionin Excel tells how many numeric entries are there ?
|
|
2694
|
What type of chart is useful for comparing values over categories ?
|
|
2695
|
What is the intersection of a column and a row on a worksheet called ?
|
|
2696
|
In Load Generator Information dialog, The Security tab is disabled if the load generator is Localhost
|
|
2697
|
In Load Generator Information dialog, If you select the Enable firewall option, the Temporary directory option for storing temporary files is enabled
|
|
2698
|
If you are monitoring or running Vusers over the firewall, the UNIX Environment settings are more relevant.
|
|
2699
|
In the scenario, LoadRunner replaces human users with virtual users or Vusers.
|
|
2700
|
When analyzing a technical aspect of a system under test, which group is a helpful source of information?
|
|
2701
|
Define -Think Time
|
|
2702
|
Which of the following is NOT a component of LR ?
|
|
2703
|
In Analyer , can graphs be corelated /overlayed?
|
|
2704
|
_______ address represents the physical location of the record in file system.
|
|
2705
|
Which one of the following is a function of the systems analysis stage?
|
|
2706
|
MICR magnetic ink character recognition used in ________.
|
|
2707
|
Decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition would be characterized as ________________.
|
|
2708
|
________ system has transformed office into an in house publisher of business documents.
|
|
2709
|
The majority of publically available internet information sources are____________.
|
|
2710
|
MODEM stands for _____.
|
|
2711
|
An information system that supports the planning and assessment needs of executive management is ______________________.
|
|
2712
|
In communication ______ controls the input and output activities
|
|
2713
|
A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process is _______________.
|
|
2714
|
The ______ is monitors the activities of the computer system
|
|
2715
|
The person who ensures that systems are developed on time, within budget, and with acceptable quality is a __________________.
|
|
2716
|
_____ software describes the programs that are written for users system.
|
|
2717
|
Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________.
|
|
2718
|
_____ is a device that makes pen and ink drawings of lines, curves and shapes.
|
|
2719
|
ESS and GDSS are mostly used by ____________.
|
|
2720
|
_______ is small figures that look like a file folder appears in the screen.
|
|
2721
|
User training and system conversion belong to _________ phase of SDLC
|
|
2722
|
In database, table is made of _______.
|
|
2723
|
Prototyping replaces unplanned work with _______________.
|
|
2724
|
Data encryption concept is used for ______ purposes.
|
|
2725
|
Developing Products, Services, or Process that give a Company a Superior Business Position is termed as _________________.
|
|
2726
|
involves capturing and assembling elements that enter the system to be processed
|
|
2727
|
_______is (are) the important component(s) of DSS.
|
|
2728
|
The system is an orderly grouping of various components linked together to reach ______.
|
|
2729
|
Where, when and how to apply knowledge is referred as __________________.
|
|
2730
|
In network while transferring the data, whole is divided in to _____.
|
|
2731
|
A supply strategy in which components arrive exactly at the moment they are needed is called _________________.
|
|
2732
|
_____ duplex transmission can flow data in two ways but one direction at a time.
|
|
2733
|
Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives?
|
|
2734
|
Medium bans channels use ____ type of cables used for transmissions.
|
|
2735
|
Which type of system tracks day-to-day activities of an organization?
|
|
2736
|
A ___ is a binary event representing a signal change from positive to negative
|
|
2737
|
In network the term protocols means ____.
|
|
2738
|
_____ configurations provide extremely a fast transmission between workstations contains only one
|
|
2739
|
A formal document would be classified as __________.
|
|
2740
|
In networks can be classified by their shape are called _____.
|
|
2741
|
E-commerce is ubiquitous it reduces __________.
|
|
2742
|
In network the different communication are interconnected by using a communication processors called a _____.
|
|
2743
|
A method of interacting with customers such as a Web site or a wireless device is called _____________.
|
|
2744
|
A ______ is a communication processor that connects two similar LANs
|
|
2745
|
A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________.
|
|
2746
|
______ type of cables need minimum numbers of repeaters
|
|
2747
|
This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________.
|
|
2748
|
_______ type of cables uses the copper wire for data transmission
|
|
2749
|
____________ is a plastic card with a built-in microprocessor, used typically to perform financial transactions.
|
|
2750
|
In very big network the ______device is used to find the effective part in time.
|
|
2751
|
Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.
|
|
2752
|
________ system uses the condition concept for processing.
|
|
2753
|
Common threats against information systems come from all of the following factors except ___________________.
|
|
2754
|
________ system can process data that are incomplete
|
|
2755
|
Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n) ______________.
|
|
2756
|
FIFO stands for ______.
|
|
2757
|
Google are using information technology to pursue this generic strategy of ____________.
|
|
2758
|
The ________ has no pre-established decision procedures.
|
|
2759
|
Structured decisions are ___________ in nature.
|
|
2760
|
_________ will produce the periodic financial statements and reports of the business.
|
|
2761
|
The main characteristics of Knowledge Process Outsourcing are___________.
|
|
2762
|
________ keeps tracks of data concerning purchase from and payments to suppliers.
|
|
2763
|
The MIS should be developed by____________.
|
|
2764
|
_________ is the period in days between the ordering and delivering of goods.
|
|
2765
|
A decision support system, which provides support for decision making by a group of persons is __________.
|
|
2766
|
________ language use for artificial intelligence and symbolic applications
|
|
2767
|
In the Financial Decision-Making System which of the following is not a transaction processing system input _____________.
|
|
2768
|
Assembly language use _______ technology for programming
|
|
2769
|
Which of the following is Electronic Conference Tool(s)?
|
|
2770
|
The system software are also called _______.
|
|
2771
|
Which one of the following is not one of the major dimensions for developing international information systems architecture?.
|
|
2772
|
GUI stands for _______
|
|
2773
|
Restructuring & transforming a business process by a rethinking and redesign done by ____________.
|
|
2774
|
Primary storage device such as semiconductor memory chips are called _______.
|
|
2775
|
______ type of printer function like a photocopying
|
|
2776
|
______ type of printer is good for text, but not for images
|
|
2777
|
The _____ most common form of visual output for user interface
|
|
2778
|
The growth of corporate intranets, extranets, as well as the web, has accelerated the development and use of executive class information delivery and decision support software tools by lower levels of management and by individuals and teams of business professionals. This dramatic expansion has opened the door to the use of which of the following tool?
|
|
2779
|
VDT stands for ______.
|
|
2780
|
The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.
|
|
2781
|
In punched card system, holes are punched by device are called ______.
|
|
2782
|
Which of the following level of managers develop short and medium range plans, schedules, and budgets and specify the policies, procedures, and business objectives for their sub units of the company?
|
|
2783
|
In OOPS the member functions also called _____.
|
|
2784
|
The internal memory in computer is also called ____.
|
|
2785
|
GB in memory stands for _____.
|
|
2786
|
In _____ organization, authority is delegated down the hierarchy.
|
|
2787
|
PDA means ______.
|
|
2788
|
____ is the oldest and most widely used from of grouping activities.
|
|
2789
|
_______ type of computers is manufactures through silicon chips
|
|
2790
|
Which one of the following is used for evaluating credit risks?
|
|
2791
|
_____ leader who commands both positional and personal influence.
|
|
2792
|
A _____ types of processor design uses a group of instruction processors to execute program at the same time.
|
|
2793
|
The _____ organization often constructs its own messages.
|
|
2794
|
Finger print system of security control comes under ______.
|
|
2795
|
In which of the following types of analysis, the goal is to find the optimum value for one or more target variables, given certain constraints?
|
|
2796
|
The evolution of Electronic data processing_______
|
|
2797
|
________ type of testing ensures the system is free of errors and is ready to be placed into operation.
|
|
2798
|
In which of the following types of analysis, the value of only one variable is changed repeatedly, and the resulting changes on other variables are observed.
|
|
2799
|
TPS stands for_____
|
|
2800
|
Program testing concept use ________ approaches
|
|
2801
|
Decision support system involves all of the following types of analytical modeling activities except?
|
|
2802
|
RFP stands for ______.
|
|
2803
|
A _______ evaluation process reduces the possibility of buying inadequate hardware.
|
|
2804
|
______________ is unauthorized copying of software.
|
|
2805
|
________________ is obsessive use of a computer or unauthorized access and use of computer systems.
|
|
2806
|
________ steps ensure the success of the new systems
|
|
2807
|
______ type of feasibility deals with the costs of both development and operations of the system.
|
|
2808
|
The project team is composed of the system professional are directly responsible for _____ the system
|
|
2809
|
__________ charts are used to represent the project tasks and durations.
|
|
2810
|
_____________ is a distinct program that can run unaided.
|
|
2811
|
_______ takes responsibility and keeps track of progress in MIS design. Development and implementation.
|
|
2812
|
________________ is a program code that cannot work without being inserted into another program.
|
|
2813
|
__________ type of budgeting is based on estimation of total project cost by the top management.
|
|
2814
|
_________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making.
|
|
2815
|
In overall business side the MIS planning initiates from business _____.
|
|
2816
|
An instruction in a computer program that triggers a malicious act is called as ____________.
|
|
2817
|
___ sub system covers granting of credit and cost management
|
|
2818
|
_________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents.
|
|
2819
|
____ sub system deals with activities as purchasing, receiving inventory control and distribution
|
|
2820
|
________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.
|
|
2821
|
In general the information system can also describe in terms of ____.
|
|
2822
|
_____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources
|
|
2823
|
A manufacturing company products may decide to diversify into ____ lines.
|
|
2824
|
______________________ decision support system that provides support for decision making by groups of people
|
|
2825
|
___ models to analysis a problem and provides possible solution for management evaluation
|
|
2826
|
The most advanced graphics software in any system used by management is normally found in __________________.
|
|
2827
|
The operating decisions resulting actions usually cover ____ periods.
|
|
2828
|
The major source of data for other systems is __________________.
|
|
2829
|
Decision varies as to the ____ structure within each level of management.
|
|
2830
|
An ________________ system has a stored knowledge base and an inference engine.
|
|
2831
|
The total process of a system is the net contribution of ____ individual process in the design.
|
|
2832
|
In any real time system ___ factors are termed as boundaries of the system.
|
|
2833
|
Expert System contains _____________.
|
|
2834
|
In database handling ____ reports used by software for data.
|
|
2835
|
ECS means ___________________.
|
|
2836
|
In a firm the reports are generated under condition are called _____ reports.
|
|
2837
|
TPS means ____________.
|
|
2838
|
Managers can receive information from _____ that supports their decision making systems.
|
|
2839
|
The analysis and design of application systems are the responsibility of a ___________.
|
|
2840
|
Critical information for top management is provided by ____ information system.
|
|
2841
|
Electronic Filing, Voice Mail are the reponsibilities of _______________.
|
|
2842
|
AIS stands for _______.
|
|
2843
|
The process of helping users see patterns and relationships in large amounts of data by presenting the data in graphical form is called __________________.
|
|
2844
|
Information System specialists also called as ______.
|
|
2845
|
The results of "what-if" questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________.
|
|
2846
|
ATG in network stands for ____.
|
|
2847
|
A type of decision in which there may be several "right" answers and no precise way to get a right answer is ____________________.
|
|
2848
|
Acquiring, training and retaining good network _____ should be a top priority.
|
|
2849
|
The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________.
|
|
2850
|
The overall recruit process will be control by _____ person
|
|
2851
|
Security systems based on physical or behavioral traits are called ________________.
|
|
2852
|
____ manager typically manage the operation of specific LAN and WAN.
|
|
2853
|
Which activity of an Information System converts raw input into a meaningful form__________.
|
|
2854
|
____ system that allocate costs to users based on the information services rendered
|
|
2855
|
Raw facts that have not been organized into a useful form are called_______________.
|
|
2856
|
HRM stand for ___.
|
|
2857
|
Data shaped into meaningful form are called ________.
|
|
2858
|
In a company ______ is the centre which consists of all processing activities.
|
|
2859
|
Decision trees could be represented in different ways such as ____________________.
|
|
2860
|
_____ system monitors the processing of jobs, development and schedule in the overall systems.
|
|
2861
|
Expand GDSS.
|
|
2862
|
In company side the outsourcing people also called______.
|
|
2863
|
The basic component(s) of DSS is (are) _________________.
|
|
2864
|
____ information system planning us the last stage of the planning process.
|
|
2865
|
__________ details are given by Management to Marketing Service System.
|
|
2866
|
____ of information systems that support key business functions as well as cross functional business processes.
|
|
2867
|
In companies can develop ____ information system to gain a competitive edge.
|
|
2868
|
The flow of information through MIS is ______________.
|
|
2869
|
____ system will monitor and control the industrial processing activities.
|
|
2870
|
The back bone of any organization is ____________.
|
|
2871
|
____ system provide information in easy to use displays to top and = middle management.
|
|
2872
|
The information of MIS comes from the_______.
|
|
2873
|
POS stands for ____.
|
|
2874
|
Sales and inventory processing and accounting systems are examples of __________ systems.
|
|
2875
|
____ type of processing, data is processed immediately after a transaction occurs.
|
|
2876
|
______________ is a support team, workgroup, and enterprise communications and collaborations.
|
|
2877
|
____ is media used in network which is used to connect between countries.
|
|
2878
|
Petroleum refining, power generation and steel production systems are example of ____________ systems.
|
|
2879
|
In network based systems ____ devices is used to connect all the system in to one for sharing information.
|
|
2880
|
________________ monitors and control industrial processes.
|
|
2881
|
In a big network the system are called as ______.
|
|
2882
|
____________process data resulting from business transactions, update operational databases, and produce business documents.
|
|
2883
|
The computer system uses _____ forms of data for usage.
|
|
2884
|
An individual is credited with the development of the five forces competitive model is ______________.
|
|
2885
|
MODEM means ___.
|
|
2886
|
Data about the performance of a system is ____________.
|
|
2887
|
___ communication media is more expensive one in network.
|
|
2888
|
___________ is the process of defining the current problem, determining why a new system is needed, identifying the objectives of the proposed system:
|
|
2889
|
In a big network the communication media refers to use _____.
|
|
2890
|
Cybernetic system is the one which is ______________
|
|
2891
|
The following statement which one is true to information systems.
|
|
2892
|
Which of the system uses Multidimensional data analysis?
|
|
2893
|
____ type of data uses pictures and graphics shapes for usage.
|
|
2894
|
Knowledge based system supports, _____________.
|
|
2895
|
Knowledge bases that hold knowledge in a variety of forms such as ____.
|
|
2896
|
Which computer based model is developed after human brain?
|
|
2897
|
CPU means ____.
|
|
2898
|
Which is not a domain of Artificial Intelligence?
|
|
2899
|
____ is the people who develop and operate the information systems.
|
|
2900
|
On-line transaction processing is used when ______________. I) it is required to answer random queries. II) it is required to ensure correct processing. III) all files are available on-line. IV) all files are stored using hard disk.
|
|
2901
|
In any of the system _____ resource is consider as people resources.
|
|
2902
|
A human order taker can be bypassed when using _________________.
|
|
2903
|
____ information system that express a fundamental concept and activities of information systems.
|
|
2904
|
Which of the following is not a characteristic of good information?
|
|
2905
|
____ information system uses the information technology to develop all features in the products.
|
|
2906
|
Customer numbers and their names would be an example of the ________________ component of an order management information system.
|
|
2907
|
BPR means ______.
|
|
2908
|
A computer security protocol for logging in would be an example of the component of an information system ____________.
|
|
2909
|
In Information system the operation managed by a _____ officer
|
|
2910
|
Enterprise systems support _______________.
|
|
2911
|
__________system is that two or more subsystems share the data over a network.
|
|
2912
|
Information systems can facilitate supply chain management by ______________.
|
|
2913
|
_____ is the mortar that holds all the functional systems together.
|
|
2914
|
Materials into intermediate and finished products, and distributing the finished products to customers?
|
|
2915
|
____ type of system is essential for applying boundaries of the problem.
|
|
2916
|
Assembling a product, identifying customers and hiring employees are _________________.
|
|
2917
|
In MIS ____ plays economically sound and logically in development process.
|
|
2918
|
Tracking employee training, skills, and performance appraisal is an example of a human resource information system operating at the ____________________.
|
|
2919
|
Plan must include the _____ systems concept for implementation of the new Information system.
|
|
2920
|
Deciding where to locate new production facilities is an example of a manufacturing and production information system operating at the _______.
|
|
2921
|
______ is a prominent attribute of management information procured through MIS of an organization.
|
|
2922
|
Identifying customers and markets using data on demographics, markets, consumer behaviour, and trends is an example of ____________.
|
|
2923
|
____ means that information must reach the recipients within the prescribe timerframe.
|
|
2924
|
Management information systems usually______________.
|
|
2925
|
In among the firms executives, managers, and supervisors are comes under _____ of workers.
|
|
2926
|
Which of these items is a major component of today's IT infrastructure?
|
|
2927
|
Reporting the status of an activity through a feedback mechanism is called _____ information.
|
|
2928
|
In which of the following functions of MIS reports are generated based on the enterprise's need ______________.
|
|
2929
|
The information generated at regular intervals is a _____ information.
|
|
2930
|
______________ Systems keep a track on the daily regular business transactions of the organisation.
|
|
2931
|
The word data is the plural form of _____.
|
|
2932
|
The first phase of IT planning is called _____________ planning.
|
|
2933
|
_____ is the fact that are properly arranged, classified and organized.
|
|
2934
|
A combination of a MIS and DSS called _____________ which helps top managers make decisions.
|
|
2935
|
The final element of feedback is essential fro system operation and for ____.
|
|
2936
|
The _________ provides a manager with the information needed to make decisions regarding, the firm's operational activities.
|
|
2937
|
The _____ system which is closest to the stress will change the most.
|
|
2938
|
The Management information System receives input from the _____________.
|
|
2939
|
____ system is concerned with the way information is used for purpose of control and applies technologies.
|
|
2940
|
MIS stands for ________________.
|
|
2941
|
____ system grouping of people and behavior has been subjected to research.
|
|
2942
|
The direct, computer to computer exchange of standardized, common business transaction documents between business partners, suppliers, and customers is ______________.
|
|
2943
|
A deterministic system operate in a predictable _____.
|
|
2944
|
EDI stands for _____________.
|
|
2945
|
____ refers to the holism of the system in real time.
|
|
2946
|
The popular term for the software component that supports the collaborative efforts of a team is ______________.
|
|
2947
|
To become an effective MIS department must state its _____.
|
|
2948
|
Which of the following is a computer based system that stores and, manipulates data that are viewed from a geographical point or reference?
|
|
2949
|
The starting point of MIS planning is general ______ planning.
|
|
2950
|
Accounting, finance, marketing, and human resources are known as ____________.
|
|
2951
|
EDP means ____.
|
|
2952
|
Expand TPS.
|
|
2953
|
The ____ component plays a decision rule for the computer.
|
|
2954
|
What is Software?
|
|
2955
|
____ planning systems deals with the projections of the future.
|
|
2956
|
CASE Tool is _______________.
|
|
2957
|
The ____ information system deals with the flow of information about people working in the organization
|
|
2958
|
The tools that support different stages of software development life cycle are called ________________.
|
|
2959
|
_____ is an overall performance summary to date and compared with the previous periods, budgets.
|
|
2960
|
Which phase is not available in software life cycle?
|
|
2961
|
The effectiveness of marketing information system depends to a larger extent of _____ from market place to the firm.
|
|
2962
|
Which of the following is not an attribute of software engineering?
|
|
2963
|
The most rapidly growing application for computer assisted decision making is called ____ .
|
|
2964
|
Top down approach is used for ___________.
|
|
2965
|
The major drawbacks in decision making by MIS is difficult due ____ for business problems.
|
|
2966
|
In the system concepts, the term integration is ________________.
|
|
2967
|
processing is considered as the classical method of processing data.
|
|
2968
|
The art of getting things done through people, with the people __________________.
|
|
2969
|
The _____ will make the automated inventory system understandable to everyone.
|
|
2970
|
________is the information about data.
|
|
2971
|
In compilation process the program is placed in the memory in the form ___.
|
|
2972
|
The first step in the systems development life cycle (SDLC) is _______________.
|
|
2973
|
A sequence of instructions that works together to perform a task is called a ______.
|
|
2974
|
System Development process is also called as ______________.
|
|
2975
|
The ___ language is used to solve the numeric problems.
|
|
2976
|
SDLC stands for ____________.
|
|
2977
|
In computer the number system of 0 and 1 is called as ____.
|
|
2978
|
_________is the real world object, such as a person, place etc.
|
|
2979
|
The advantages of creating a prototype are ____________________.
|
|
2980
|
The most creative and challenging phase of system life cycle is ___________.
|
|
2981
|
System development is a __________.
|
|
2982
|
______________System can be any organized combination of people, hardware, software, communications networks and data resources that collects, transforms and disseminates information in an organization.
|
|
2983
|
Prototype is a ______________.
|
|
2984
|
Which of the following individuals typically have less formal, advanced educational degrees and tend to process rather than create information?
|
|
2985
|
Summary transaction data, high-volume data, and simple models are information inputs characteristic of _________________.
|
|
2986
|
Projections and responses to queries are Information output characteristics associated with ______________________.
|
|
2987
|
Information systems that monitor the elementary activities and transactions of the organizations are _________________.
|
|
2988
|
Hyperlinks cannot be
|
|
2989
|
when you work with large worksheets, you may need to
|
|
2990
|
How do you change column width to fit the contents?
|
|
2991
|
The Name box
|
|
2992
|
Charts tips can
|
|
2993
|
When integrating Ms-Word and Excel, Word is usually the
|
|
2994
|
To center worksheet titles across a range of cell, you must
|
|
2995
|
To insert three columns between columns D and E you would
|
|
2996
|
What’s a quick way to extend these numbers to a longer sequence, for instance 1 through 20?
|
|
2997
|
Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
|
|
2998
|
when you use the fill effects in the format data series dialog box, you can not
|
|
2999
|
Which of the following describes how to select all the cells in a single column?
|
|
3000
|
Got functions? No? You need the insert function dialog box. How do you get it?
|
|
3001
|
Which of the following setup options can not be set in the page setup dialog box?
|
|
3002
|
A data map is helpful
|
|
3003
|
when working in the page break preview, you can
|
|
3004
|
You can open the Sort dialog box by choosing Sort from the ….. menu
|
|
3005
|
You can open the scenario Manager dialog box by choosing scenarios from the ….. menu.
|
|
3006
|
To edit data in an embedded Excel worksheet object in a Word document
|
|
3007
|
Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet?
|
|
3008
|
To hold row and column titles in places so that they do not scroll when you scroll a worksheet, click the
|
|
3009
|
When you see a cell with a red triangle in the top right corner, what does this signify?
|
|
3010
|
When you link data maintained in Excel workbook to a Word document
|
|
3011
|
Weight refers to
|
|
3012
|
You can group noncontiguous worksheets with
|
|
3013
|
when you print preview a worksheet
|
|
3014
|
In a worksheet you can select
|
|
3015
|
When the formula bar is activated, you can see
|
|
3016
|
to activate the previous cell in a pre-selected range, press
|
|
3017
|
When creating a vertical page break
|
|
3018
|
To drag a selected range of data to another worksheet in the same workbook, use the
|
|
3019
|
The default header for a worksheet is
|
|
3020
|
When you group worksheets
|
|
3021
|
Data marker on a chart are linked to data points in a worksheet, therefore,
|
|
3022
|
which function will calculate the number of workdays between 6/9/2004 and 8/12/2004?
|
|
3023
|
This type of software is similar to an accountant’s worksheet
|
|
3024
|
You can not link Excel worksheet data to a Word document
|
|
3025
|
You can zoom a worksheet
|
|
3026
|
Prototype of a function means ___
|
|
3027
|
A C variable name can start with a __
|
|
3028
|
Which one is not a reserve keyword in C Language?
|
|
3029
|
Language was developed in the year ___
|
|
3030
|
Who is known as the father of C Language ?
|
|
3031
|
In worst case, the number of comparison need to search a singly linked list of length n for a given element is
|
|
3032
|
Linked lists are not suitable to for the implementation of?
|
|
3033
|
Which of the following statements about linked list data structure is/are TRUE?
|
|
3034
|
In circular linked list, insertion of node requires modification of?
|
|
3035
|
A variant of the linked list in which none of the node contains NULL pointer is?
|
|
3036
|
A variation of linked list is circular linked list, in which the last node in the list points to first node of the list. One problem with this type of list is?
|
|
3037
|
What kind of linked list is best to answer question like “What is the item at position n?â€
|
|
3038
|
In doubly linked lists, traversal can be performed?
|
|
3039
|
A variant of linked list in which last node of the list points to the first node of the list is?
|
|
3040
|
The concatenation of two list can performed in O(1) time. Which of the following variation of linked list can be used?
|
|
3041
|
What would be the asymptotic time complexity to insert an element at the second position in the linked list?
|
|
3042
|
What would be the asymptotic time complexity to find an element in the linked list?
|
|
3043
|
What would be the asymptotic time complexity to add an element in the linked list?
|
|
3044
|
What would be the asymptotic time complexity to add a node at the end of singly linked list, if the pointer is initially pointing to the head of the list?
|
|
3045
|
In linked list each node contain minimum of two fields. One field is data field to store the data second field is?
|
|
3046
|
Which of the following operations is performed more efficiently by doubly linked list than by singly linked list?
|
|
3047
|
A linear collection of data elements where the linear node is given by means of pointer is called?
|
|
3048
|
In a circular linked list
|
|
3049
|
Deletion of a node in linked list involves keeping track of address of node which comes immediately
|
|
3050
|
In a doubly linked list traversing comes to a halt at:
|
|
3051
|
A pointer in which a pointer variable contains the address of a variable that has already been allocated:
|
|
3052
|
In which data structure direct or random access not possible?
|
|
3053
|
To make a queue empty, elements can be deleted, till
|
|
3054
|
An array A[15][20] is stored in memory. Each element is of integer type. If ther base address is 600 determine the address of A[8][13] when the array is stored as row major wise
|
|
3055
|
To find out maximum element in a list of n numbers, one needs at least
|
|
3056
|
Which of the following is true in case of a null pointer?
|
|
3057
|
Underflow condition in linked list may occur when attempting to
|
|
3058
|
In linked list representation, a node contains at least
|
|
3059
|
Full Buffering would be appropriate for ?
|
|
3060
|
Full Buffering would be appropriate for ?
|
|
3061
|
package.json is is used to define the properties of a package?
|
|
3062
|
The $ npm ls -g statement is used to list down all the locally installed module?
|
|
3063
|
How can we create instance of http module ?
|
|
3064
|
The $ npm ls statement is used to list down all the locally installed module?
|
|
3065
|
To install Node.js express module
|
|
3066
|
How can we check the cujrrent version of NPM?
|
|
3067
|
Which statement execute the code of sample.js file?
|
|
3068
|
Which of the following is true about RESTful web services?
|
|
3069
|
APIs of Node.JS are
|
|
3070
|
Which of the following is true about Chaining streams ?
|
|
3071
|
In Nodejs what is use of underscore variable in REPL session
|
|
3072
|
Which is the following can use to avoid callbacks?(Multiple Selection)
|
|
3073
|
Which is used for install any package globally?
|
|
3074
|
For split a single Node process into multiple processes which inbuilt method is used?
|
|
3075
|
Who is the main Author of Nodejs?
|
|
3076
|
How to concatenate buffers module in NodeJS?
|
|
3077
|
REPL stand for?
|
|
3078
|
Which module is used for creating both clients and servers?
|
|
3079
|
An approach to connect the output of one stream to the input of another stream is known as?
|
|
3080
|
IS < fs > module provides both synchronous and asynchronous methods.
|
|
3081
|
For file based operations which module is used ?
|
|
3082
|
For terminating the current command which REPL command is used
|
|
3083
|
Does node run on windows?
|
|
3084
|
Which module is used for compress/decompress files?
|
|
3085
|
Which Stream can be used for both the read and write operations?
|
|
3086
|
Which command is used to check the version of NPM?(Multiple Selection)
|
|
3087
|
Can We access DOM in node?
|
|
3088
|
Which command is used to exit from the REPL?
|
|
3089
|
Is Node a single threaded application?
|
|
3090
|
Which inbuilt module is deprecated now in node.js?
|
|
3091
|
Which method is used to fired any event?
|
|
3092
|
Which module is working for file upload ?
|
|
3093
|
What is the The first argument of the res.writeHead() method is the status code that shows all is OK?
|
|
3094
|
Node.js is a JavaScript framework?
|
|
3095
|
Which function is used to include any modules?
|
|
3096
|
What command does CTRL+c do on the Node.js REPL terminal?
|
|
3097
|
What does CTRL+d do on the Node.js REPL terminal?
|
|
3098
|
What do the tab keys do on the Node.js REPL terminal?
|
|
3099
|
What does REPL stand for?
|
|
3100
|
A Node.js application consists of the following except _____
|
|
3101
|
It is not advisable to use Node.js in which of the following
|
|
3102
|
On what engine was Node.js built?
|
|
3103
|
The first Node.js build supporting Windows was released in _____
|
|
3104
|
Node.js was initially released in _____
|
|
3105
|
_____ is the original author of Node.js
|
|
3106
|
What are Nodejs characteristics?
|
|
3107
|
All objects that emit events are instances of the EventEmitter class
|
|
3108
|
When the EventEmitter object emits an event, all of the functions attached to that specific event are called _______. Any values returned by the called listeners are ignored and will be discarded.
|
|
3109
|
Which methods can be use to switch listener functions asynchronous mode:
|
|
3110
|
By default EventEmitters will print a warning if more than ______ listeners are added for a particular event
|
|
3111
|
How many listenners can be attached to an event in NodeJS?
|
|
3112
|
Which method can be used to handle an event just only one time?
|
|
3113
|
How to store local variables that can be access within the application?
|
|
3114
|
In ExpressJS, the method app.all(path, callback [, callback ...]) can accept all HTTP methods
|
|
3115
|
Route paths, in combination with a request method, define the endpoints at which requests can be made.
|
|
3116
|
Something that happened in our application that we can respond too.
|
|
3117
|
Node uses _________ engine in core.*
|
|
3118
|
How do you kill a process in Node.js?
|
|
3119
|
How do you install Nodemon using Node.js?
|
|
3120
|
Which of the following are Node.js streams types?
|
|
3121
|
Which of the following module is required for path specific operations ?
|
|
3122
|
Node.js uses an event-driven, non-blocking I/O model ?
|
|
3123
|
A stream fires finish event when all data has been flushed to underlying system.?
|
|
3124
|
What is Callback?
|
|
3125
|
Command to list all modules that are install globally?
|
|
3126
|
Command to show installed version of Node?
|
|
3127
|
For What npm stands?
|
|
3128
|
Command to start Node REPL
|
|
3129
|
REPL stands for
|
|
3130
|
In which of the following areas, Node.js is perfect to use?
|
|
3131
|
Which method returns the current working directory of the process.
|
|
3132
|
Which of the following are not Node.js web application frameworks for?
|
|
3133
|
What does the fs module stand for?
|
|
3134
|
How Node.js modules are availble externally
|
|
3135
|
Which of following is not builtin node module.
|
|
3136
|
Which function is used to include modules in Node Js.
|
|
3137
|
Node Js is _________
|
|
3138
|
In Node process is ______
|
|
3139
|
Which extension is used to save NodeJs files?
|
|
3140
|
Is node js multithreaded?
|
|
3141
|
Node.js is written in _____________ .
|
|
3142
|
Node.js is ___________ Language.
|
|
3143
|
Node.js application can access which of the following databases?
|
|
3144
|
Which of the followings are valid languages for Node.js?
|
|
3145
|
Which of the following types of application can be built using Node.js?
|
|
3146
|
Which of the followings are web application frameworks for Node.js?
|
|
3147
|
Which of the following is a GUI-based debugging tool for Node.js?
|
|
3148
|
How to import module in Node.js?
|
|
3149
|
Which of the following core module is used to create a web server in Node.js?
|
|
3150
|
Third-party packages can be install/update/delete using ________.
|
|
3151
|
The Node.js modules can be exposed using _________.
|
|
3152
|
Simple or complex functionality organized in a single or multiple JavaScript files which can be reused throughout your Node.js application is called ________.
|
|
3153
|
Node.js application runs on __________.
|
|
3154
|
What is the default scope in Node.js application.
|
|
3155
|
Node.js terminal (REPL) is used for _________.
|
|
3156
|
Node.js is ________ by default.
|
|
3157
|
Node.js runs on __________
|
|
3158
|
Child processes always have three streams child.stdin, child.stdout, and child.stderr which may be shared with the stdio streams of the parent process.
|
|
3159
|
Which statement is valid in using a Node module fs in a Node based application?
|
|
3160
|
In Nodejs what is use of underscore variable in REPL session?
|
|
3161
|
Which of the following statements holds good with respect to Node?
|
|
3162
|
Which of following are a valid form of route path?
|
|
3163
|
Node.js supports which of the following platform?
|
|
3164
|
How can we create instance of http module?
|
|
3165
|
Which of the following template engines can be used with Node.js?
|
|
3166
|
Which of the following class is used to create and consume custom events in Node.js?
|
|
3167
|
In Node.js APIs of Node.JS are which of the following?
|
|
3168
|
Which of the following tool automates various tasks of Node.js application?
|
|
3169
|
Which of the followings are valid languages for Node.js?
|
|
3170
|
To install Node.js express module
|
|
3171
|
Is console a global object?
|
|
3172
|
What should you do in your code to improve your application’s performance?
|
|
3173
|
Which module is used to serve static resources in Node.js?
|
|
3174
|
What is REPL in Node.js?
|
|
3175
|
Why a Node.JS code is pretty fast although being written in JavaScript?
|
|
3176
|
What is the advantage of using node.js?
|
|
3177
|
How can we check the current version of NPM?
|
|
3178
|
What are the key features of Node.js?
|
|
3179
|
Which statement executes the code of sample.js file?
|
|
3180
|
In Nodejs how node based web servers differ from traditional web servers?
|
|
3181
|
The Node.js modules can be exposed using
|
|
3182
|
ali bhai osma abhai mugha sari books asign kar raha hain
|
|
3183
|
Which of the following addressing modes can be used for writing formulas in a cell in a worksheet in Microsoft Excel
|
|
3184
|
Which of the following alignments will apply by default when some text is entered in a cell in a worksheet of Microsoft Excel
|
|
3185
|
Which function is use to display the current date and time in a cell
|
|
3186
|
Which chart displays values as percentages of the whole
|
|
3187
|
The function that counts the number of cells in a range that are not blank is known as ________ function
|
|
3188
|
In Excel all styles are ___________ styles
|
|
3189
|
The Chart title option is available in
|
|
3190
|
What is the syntax of Minimum function ()
|
|
3191
|
The process of keep the top row visible while scrolling through the rest of the worksheet is known as
|
|
3192
|
Maximum column width in Excel sheet is
|
|
3193
|
Where you can change the "number of Recent Documents" shown option in Excel Office button
|
|
3194
|
Which function returns the most common value in a data set
|
|
3195
|
A function inside another function is known as
|
|
3196
|
In Excel Options, the Auto Correct Option can be found in
|
|
3197
|
Zoom slider option is available in
|
|
3198
|
Strikethrough, Superscript and Subscript are the _______ in Excel
|
|
3199
|
Which one is not available in print area selection option when you print a Excel document
|
|
3200
|
In Excel 2007, Axes option can be found in
|
|
3201
|
Which one/are the Chart Tool tab/tabs that adds in the ribbon when you display a chart
|
|
3202
|
In excel, which one chart type is not available
|
|
3203
|
In excel, which chart is also known as X Y chart
|
|
3204
|
In which year, Microsoft released the first version of Excel for Windows version
|
|
3205
|
Which commanad need to excute from "run window" to open a new excel file
|
|
3206
|
If "A1" is displayed in Name Box, then is indicates which one
|
|
3207
|
All formulas in MS Excel is start with _______ sign
|
|
3208
|
Which function key generates a bar graph from the values enterd in excel
|
|
3209
|
Total number of characters that a cell can contain
|
|
3210
|
VBA in MS-Excel was used from which version
|
|
3211
|
What is the default extention of Microsoft Excel 2003 saved file
|
|
3212
|
What is the maximum number of columns supported in a Excel 2007 worksheet
|
|
3213
|
What is the maximum number of rows supported in a Excel 2007 worksheet
|
|
3214
|
The intesection of rows and columns are called
|
|
3215
|
The output of this program is int a = 10; void main() { int a = 20; cout << a << ::a; }
|
|
3216
|
Observe following program and answer class Example{ public: int a,b,c; Example(){a=b=c=1;} //Constructor 1 Example(int a){a = a; b = c = 1;} //Constructor 2 Example(int a,int b){a = a; b = b; c = 1;} //Constructor 3 Example(int a,int b,int c){ a = a; b = b; c = c;} //Constructor 4 } In the above example of constructor overloading, the following statement will call which constructor Example obj = new Example (1,2,3);
|
|
3217
|
The return value of the following code is Class1& test(Class1 obj) { Class1 *ptr = new Class1(); ……… return ptr; }
|
|
3218
|
The output of this program is int main () { cout << “Hello World!†return 0; }
|
|
3219
|
C++ provides facility to specify that the compiler should match function calls with the correct definition at the run time. This process is called as
|
|
3220
|
There is nothing like a virtual constructor of a class
|
|
3221
|
Minimum number of temporary variable needed to swap the contents of 2 variables is:
|
|
3222
|
Value of a in a = (b = 5, b + 5); is
|
|
3223
|
If a member needs to have unique value for all the objects of that same class, declare the member as
|
|
3224
|
Which of the following is not a valid conditional inclusions in preprocessor directives
|
|
3225
|
Which of the following operators below allow to define the member functions of a class outside the class?
|
|
3226
|
Which of the following operator cannot be overloaded? #NAME?
|
|
3227
|
What is the implicit pointer that is passed as the first argument for nonstatic member functions?
|
|
3228
|
hich of the following operators can be implemented as a nonmember operator? #NAME?
|
|
3229
|
Which header file should we include for using std::auto_ptr?
|
|
3230
|
Which of the following is the most common way of implementing C++?
|
|
3231
|
In a C language ‘3’ represents
|
|
3232
|
Which looping process is best used when the number of iterations is known?
|
|
3233
|
Which of the following members do get inherited but become private members in child class
|
|
3234
|
If there is more than one statement in the block of a for loop, which of the following must be placed at the beginning and the ending of the loop block?
|
|
3235
|
STL is based on which of the following programmingparadigms?
|
|
3236
|
STL is based on which of the following programmingparadigms?
|
|
3237
|
STL is based on which of the following programming paradigms?
|
|
3238
|
Statement scanf(“%dâ€,80);
|
|
3239
|
Which of the following functions below can be used Allocate space for array in memory?
|
|
3240
|
Under which of the following circumstances, synchronization takes place?
|
|
3241
|
What defines a general set of operations that will be applied to various types of data?
|
|
3242
|
Which of the following below is /are a valid iterator type?
|
|
3243
|
What is deep copy?
|
|
3244
|
What is shallow copy?
|
|
3245
|
Inline functions are invoked at the time of
|
|
3246
|
What is the Difference between struct and class in terms of Access Modifier?
|
|
3247
|
In a group of nested loops, which loop is executed the most number of times?
|
|
3248
|
Which of the following is the most general exception handler that catches exception of ‘any type’?
|
|
3249
|
Which of the following is the most general exception handler that catches exception of any type?
|
|
3250
|
When class B is inherited from class A, what is the order in which the constructers of those classes are called
|
|
3251
|
Vtables
|
|
3252
|
How do we define a constructor?
|
|
3253
|
Which of the following below can perform conversions between pointers to related classes?
|
|
3254
|
Value of ix+j, if i,j are integer type and ix long type would be
|
|
3255
|
If a member needs to have unique value for all the objects of that same class, declare the member as
|
|
3256
|
Which of the following library function below by default aborts the program?
|
|
3257
|
In C language, a hexadecimal number is represented by writing
|
|
3258
|
The statement i++; is equivalent to
|
|
3259
|
Expression C=i++ causes
|
|
3260
|
Which of the following language feature is not an access specifier in C++?
|
|
3261
|
What happens when a pointer is deleted twice?
|
|
3262
|
Which of the following is not an advantage of secondary memory
|
|
3263
|
How do we declare an abstract class?
|
|
3264
|
How do we declare an ‘interface’ class?
|
|
3265
|
Which of the following languages is a subset of C++ language?
|
|
3266
|
class derived: public base1, public base2 { } is an example of
|
|
3267
|
Which of the following language is not supported by C++?
|
|
3268
|
Which of the following correctly describes the meaning of ‘namespace’ feature in C++?
|
|
3269
|
Which of the following correctly describes the meaning of‘namespace’ feature in C++?
|
|
3270
|
The default access level assigned to members of a class is ___________
|
|
3271
|
Which looping process checks the test condition at the end of the loop?
|
|
3272
|
How many copies of a class static member are shared between objects of the class?
|
|
3273
|
The two types of file structure existing in VSAM file are
|
|
3274
|
Select the off-cycle payroll which DOESNOT run in a SAP.
|
|
3275
|
Transaction for checking your job.
|
|
3276
|
Transaction code for creating an organizational unit within existing structure.
|
|
3277
|
Transaction code for creating an organizational unit
|
|
3278
|
Transaction code for run time evaluation.
|
|
3279
|
Transaction for fast entry.
|
|
3280
|
What is overview of an Infotype?
|
|
3281
|
Out of the following which is NOT subtype of the Infotype 0006?
|
|
3282
|
Which object type is used for the position.
|
|
3283
|
What is OM and PA?
|
|
3284
|
Which standard report in SAP HCM can be used to list all existing objects according to their type and ID?
|
|
3285
|
Before executing a report it is possible to set up Structure Parameters. One of these parameters is Status vector. What does this parameter control?
|
|
3286
|
Please indicate which of the following structures is defined as follows. This structure represents assignments of positions to organizational units and the relationships between positions and persons.
|
|
3287
|
Please indicate which of the following statements regarding a payroll process are false.
|
|
3288
|
What is a prerequisite for using the Manager’s Desktop?
|
|
3289
|
Please indicate if the following statement is true or false. Positions are concrete and can be occupied by employees. One position may be filled by only one person or by several people at the same time.
|
|
3290
|
What is the correct order of SAP implementation steps according to The Implementation Guide?
|
|
3291
|
Please indicate if the following statement is true or false. Deduction rules for absence quotas depend on the personnel subarea grouping for time quotas and the employee subgroup grouping for time quotas.
|
|
3292
|
Which substitution type is recommended for recording changes to planned working time that cannot be represented in daily work schedules or work schedules?
|
|
3293
|
Please indicate if the following statement regarding the appraisal process in SAP HCM is true of false. Upon completion of the appraisal process, an SAP system stores the result of the appraisal in a historical record and the results cannot be changed anymore.
|
|
3294
|
Please indicate which of the following elements are not used for setting up the business events catalog.
|
|
3295
|
What is the primary function of profile matchups in SAP HCM?
|
|
3296
|
Where does an SAP system normally store working schedules of employees?
|
|
3297
|
When an applicant interacts with a company regarding one or several vacancies, the SAP system maintains the applicant status. This status helps to track the progress of the applicant. Please indicate which of the following statements regarding the applicant status are correct.
|
|
3298
|
Please indicate if the following statement is true or false. When you enter data about an employee’s children in the Family infotype (0021) an SAP system automatically checks whether the number of the children matches the data in the Personal Data infotype (0002). If the number specified in both infotypes is not the same, the SAP system will display a warning message.
|
|
3299
|
In an SAP system, it is possible to set permissibility of infotypes per countries. Is it possible to set permissibility of subtypes for an infotype per countries?
|
|
3300
|
Please determine if the following statement is correct. When an employee leaves the company his or her personnel number cannot be deleted.
|
|
3301
|
Please indicate if the following statement regarding time data IDs in the Time Manager’s Workplace is true or false. Time data IDs need to be uniformly defined in an enterprise and be the same for different areas of the enterprise.
|
|
3302
|
Please indicate which of the following statements about day dominants in the Time Manager’s Workplace are not correct?
|
|
3303
|
In a certain company, salaried employees are granted with 20 days of annual leave. On the other hand, hourly-wage earners are granted with 19 days of annual leave in the same company. How this distinction should be reflected in an SAP system?
|
|
3304
|
Please indicate which of the following answers are the groupings for absence quota types?
|
|
3305
|
Which of the following items are defined in a counting rule for attendances/absences? Please select one or more answers.
|
|
3306
|
What are the possible ways in which part-time working provisions can be set up in an SAP system? Please identify all correct answers.
|
|
3307
|
A period work schedule can cover one week or several weeks but not a part of a week. Please indicate if this statement is true or false.
|
|
3308
|
SAP supports management of the global employment. Global employees can have several personnel assignments in different countries. Which of the following phases are included in the global employment procedure in SAP?
|
|
3309
|
Please indicate which of the following statements regarding personnel actions are false.
|
|
3310
|
When an infotype menu is not defined as user group dependent the infotype sequence can only be maintained for the user group 00 and will be valid for all users who select this menu. Please indicate if this statement is true or false.
|
|
3311
|
In customizing the user interfaces for working with infotypes, what is the function of the header modifier?
|
|
3312
|
What are the elements of a screen for maintaining infotype records? Please select the correct answers.
|
|
3313
|
When an SAP system suggests default wage types for the Basic Pay infotype it uses a decision tree. Which of the following levels does this decision tree have?
|
|
3314
|
Please indicate which of the following customizing steps should be performed in the IMG for setting up a wage type belonging to the wage type group ‘Basic Pay’.
|
|
3315
|
What is the relationship between the Planned Working Time and the Basic Pay infotypes? Please select all correct answers.
|
|
3316
|
Which of the following statements are true regarding features?
|
|
3317
|
The organizational structure of a company includes a number of jobs and positions. Please indicate which of the following statements are true?
|
|
3318
|
Please indicate which of the following statements regarding an employee group are correct.
|
|
3319
|
A customer needs to ensure the correct pay scale type and area is entered on IT0008 (Basic Pay). What could you configure to achieve this?
|
|
3320
|
Within a client, what is the correct sequence of steps for configuring the Enterprise Structure?
|
|
3321
|
You want a report that shows the relationship between a legal entity and a person and includes their organizational unit and position. Which evaluation path would return the appropriate data using standard relationships?
|
|
3322
|
When terminating an employee, customers need to record and evaluate the various causes of termination. What do you need to do to enable this?
|
|
3323
|
During a payroll run, organizational data and planned working time are not being imported. Which payroll function should be enabled in the schema to fix this issue?
|
|
3324
|
A customer wants to implement the infotypes for minimal time management. In addition to IT0000 (Actions) and IT0001 (Organization Assignment), which infotypes are required?
|
|
3325
|
What is the purpose of using personnel subarea control indicators in SAP Time Management?
|
|
3326
|
Which of the following are functions of the logical database in Reporting?
|
|
3327
|
Where do you find all the fields that can be used for decisions in a feature such as PINCH or ABKRS?
|
|
3328
|
Which is the first task you need to perform to include an Ad Hoc Query report in the SAP Easy Access menu?
|
|
3329
|
The function...... checks whether all master data has been imported:
|
|
3330
|
Indirect Valuations Table is?
|
|
3331
|
nfo types 1000 to 1999 are for?
|
|
3332
|
nfo types 0000 to 9999 are for?
|
|
3333
|
A profile match-up means
|
|
3334
|
In which Infotype are an employee’s Enterprise and Personnel Structure assignment stored?
|
|
3335
|
The following is true about Payroll Accounting:
|
|
3336
|
New features in Advanced Adapter Engine are
|
|
3337
|
What is the order of the pipeline steps in SAP PI
|
|
3338
|
You can create and maintain alert categories on the Integration Server?
|
|
3339
|
SAP PI is a single component that works flexibly to implement integration scenarios
|
|
3340
|
SAP PI is open and flexible as it uses
|
|
3341
|
Types of Lookups in SAP PI are
|
|
3342
|
To maintain IDoc metadata and port, which transaction codes are used in PI
|
|
3343
|
Sender Agreement is not required for
|
|
3344
|
System Landscape Directory adheres to
|
|
3345
|
You can save and reuse the part of message mapping as
|
|
3346
|
What ensures a central point of access to information, applications and services in the company
|
|
3347
|
Define installed units
|
|
3348
|
What is the central component in the User Productivity Area?
|
|
3349
|
What SAP component can be used to provide a single integrated user interface for users to SAP products?
|
|
3350
|
Which are the backend systems from which the Web Dynpro Model Object can be supplied with information
|
|
3351
|
When you create new content objects in the PCD, there are two main procedures, out of which one is using Copies. How many methods are there to create copies and which are they?
|
|
3352
|
The Universal Work list (UWL) collects tasks and notifications from multiple provider systems and is integrated with Alert Management. The statement is:
|
|
3353
|
You would like to share content between SAP and non-SAP portal systems that are distributed across your landscape, thus providing a single portal access point per user to portal, with one portal as logon portal for all users. Which of the following can you use?
|
|
3354
|
With the collaboration capabilities, SAP NetWeaver allows communication and collaboration in the portal. This allows SAP NetWeaver to bring together members of project groups regardless of time and of their geographic location. Which of the following functionalities are supported by ‘Collaboration’?
|
|
3355
|
Which of the following statements about Knowledge Management (KM) are true?
|
|
3356
|
You can implement an SAP NetWeaver Portal in your landscape to achieve various business goals. Which of the following scenarios are supported by SAP Netweaver Portal?
|
|
3357
|
Which Info type used for storing Personnel ids like PAN,Passport. | SAP HR mcqs
|
|
3358
|
If today is day type 2 then, today is a __________
|
|
3359
|
What are the day to day activities in Training and Event Management?
|
|
3360
|
How do you set up integration between Personnel Administration and Organizational Management?
|
|
3361
|
A Work Schedule Rule comprises of the following elements:
|
|
3362
|
The following are the options available in SAP Time Management
|
|
3363
|
Secondary Incoming wage types is ?
|
|
3364
|
different views in TMW?
|
|
3365
|
Stocks that are counted on predefined date is known as?
|
|
3366
|
Which of the following is a valid stock transfer?
|
|
3367
|
To check the reason for goods movement in inventory management, which of the following field can be used?
|
|
3368
|
Which of the following field can be changed once you past the material document?
|
|
3369
|
In SAP MM, you can view the most up to date planning data on a material using which of the following?
|
|
3370
|
Withdrawing of material for sampling or returning the goods back to vendor is called?
|
|
3371
|
Stock need to be blocked in advance so that it can be available at a particular point of time. This is known as?
|
|
3372
|
What is the movement type for Goods issue for a cost center?
|
|
3373
|
Goods receipt will show increase in warehouse stock?
|
|
3374
|
A Contract can be made from a Purchase Order and vice a versa?
|
|
3375
|
(Quota Allocated Quantity + Quota Base Quantity)/Quota is called?
|
|
3376
|
Total requirement of a material is distributed to different vendor’s i.e. quota is assigned to each source of supply and is known as?
|
|
3377
|
Which of the following is known as an invitation that is sent to vendors to submit indicating pricing and their terms and conditions?
|
|
3378
|
Purchase requisition can be created for which of the following procurement types?
|
|
3379
|
Which of the following Transaction can be used to create a Purchase Order?
|
|
3380
|
Which of the following Info record has information on material that is kept at ordering party premises and contains vendor’s price that is to be paid for withdrawing material?
|
|
3381
|
Which of the following is correct about movement type in SAP system?
|
|
3382
|
After processing of purchase order by vendor, material is delivered to ordering party and this process is called as goods receipt?
|
|
3383
|
Purchase Order is a reply by a vendor in response to request for quotation?
|
|
3384
|
While performing invoice verification, system picks the rate at which tax is calculated from vendor master record?
|
|
3385
|
Data that is associated with processing of business transaction is called as?
|
|
3386
|
Which of the following is/are basic and must assignments in standard SAP system?
|
|
3387
|
Which of the following category represents an account assignment category?
|
|
3388
|
Which of the following document in SAP system involves release procedure?
|
|
3389
|
Which of the following document types can appear in the purchase order history for a purchase order line item?
|
|
3390
|
A plant in SAP MM module is assigned to which of the following entity?
|
|
3391
|
In SAP MM system, which of the following document type is used as reference document?
|
|
3392
|
Which of the following Transaction code is used to create a plant in SAP system?
|
|
3393
|
Storage location is an organizational unit which actually differentiates between different material stocks in a Plant?
|
|
3394
|
Which of the following element is a commercial organizational unit in R/3 system and is at highest level in SAP system?
|
|
3395
|
The vendor receives components from the ordering party with the help of which it produces a product is known as?
|
|
3396
|
Material that is available at your store premises, however it still belongs to the vendor (seller)/Owner of the material is known as?
|
|
3397
|
The stocks that did not belong to company and these are being kept at some particular location is known as?
|
|
3398
|
Which of the following material is kept under stock once received from vendor?
|
|
3399
|
Arrange the below steps of Procurement Lifecycle in correct order 1. Determination of requirement 2. Invoice verification/ Vendor Payment 3. Goods receipt/ Invoice Received 4. Creating Purchase Requisition 5. Creating Purchase Order
|
|
3400
|
The process of buying materials and obtaining services in SAP MM from vendors or dealers is procurement?
|
|
3401
|
Which of the following is not a feature of SAP MM module?
|
|
3402
|
Scheduling agreement is a long term outline agreement between vendor and ordering party over a predefined material or service which are procured on predetermined dates over a framework of time?
|
|
3403
|
You can make changes to Purchase Order once it is released?
|
|
3404
|
Which of the following module is a part of Logistics area and helps to manage the procurement activity of an organization from procurement?
|
|
3405
|
Which of the following stock type allows movement of stock?
|
|
3406
|
Withdrawing of material for sampling or returning the goods back to vendor is called?
|
|
3407
|
Which of the following purchasing type, a purchasing organization is not assigned to any company code and it procures for all company codes belonging to different client?
|
|
3408
|
To check the reason for goods movement in inventory management, which of the following field can be used?
|
|
3409
|
Which of the following is first step in Procurement life cycle?
|
|
3410
|
Which of the following element has its own profit, loss and balance statement?
|
|
3411
|
You can use a material in SAP MM even after it is flagged for deletion?
|
|
3412
|
Contract and Scheduling Agreement are same?
|
|
3413
|
Which of the following stock type allows movement of stock?
|
|
3414
|
(Quota Allocated Quantity + Quota Base Quantity)/Quota is called?
|
|
3415
|
In Source lists, which of the following can be sources of supply?
|
|
3416
|
Which of the following represents a master category?
|
|
3417
|
Which of the following movement type can’t be reversed in Warehouse?
|
|
3418
|
Which of the following purchasing type, a purchasing organization is not assigned to any company code and it procures for all company codes belonging to different client?
|
|
3419
|
The Organizational Structure in MM consists of which of the following elements?
|
|
3420
|
Which of the following is not a feature of SAP MM module?
|
|
3421
|
Employee groups are not used for:
|
|
3422
|
What is assigned to the payroll status info type 0003) to personnel numbers with errors?
|
|
3423
|
Communication between time recording systems and HR time management takes place via standard interface?
|
|
3424
|
Out of the following which is NOT subtype of the Infotype 0006?
|
|
3425
|
Select the component which is used as selection criteria for evaluations and used in authorization checks UK.
|
|
3426
|
Select the structure which is NOT used in SAP.
|
|
3427
|
Communication between time recording systems and HR time management takes place via standard interface?
|
|
3428
|
Which organizational units make up the Personnel structure?
|
|
3429
|
The Organizational Key is used for which of the following?
|
|
3430
|
In case of which time constraint, it is mandatory for a record to exist, and only 1 can exist at any point in time.
|
|
3431
|
Which object type is used for the position
|
|
3432
|
A Work Schedule Rule do not comprises of the following elements
|
|
3433
|
You are reviewing the Personnel structure in SAP ERP Human Capital Management. Which element of the Personnel structure defines different payroll procedures, such as hourly versus salaried?
|
|
3434
|
What is the T Code for "Run Payroll"?
|
|
3435
|
What is the T Code for creating work schedule?
|
|
3436
|
What elements comprise the Work Schedule?
|
|
3437
|
What is the T Code for Salary Administration?
|
|
3438
|
What is the T Code for Maintaining HR Master data?
|
|
3439
|
Which feature determines the administrator group?
|
|
3440
|
What are the methods for transferring employee time data to the SAP system?
|
|
3441
|
The different method for transferring employee time data to the SAP system are:
|
|
3442
|
What is the T Code for creating functions and operations in Payroll?
|
|
3443
|
Which Personal Actions have you performed on an employee?
|
|
3444
|
What is the T Code for salary administration?
|
|
3445
|
Out of following, which is NOT the SAP Transaction Code?
|
|
3446
|
Select invalid component of the enterprise structure.
|
|
3447
|
The following statements are true for compounded info objects.
|
|
3448
|
Which feature that determines the administrator group?
|
|
3449
|
Secondary Incoming wage types is?
|
|
3450
|
What is assigned in the payroll status infotype(0003) to personnel numbers with errors?
|
|
3451
|
Out of the following which NOT subtypes of the Infotype 0006?
|
|
3452
|
Select the object type which is used for the cost center.
|
|
3453
|
Personnel Area has which of the following functions?
|
|
3454
|
The Payroll Accounting area includes which functions
|
|
3455
|
What is the role of a administrator in PA?
|
|
3456
|
How many bytes are occupied by near, far and huge pointers (DOS)?
|
|
3457
|
It is necessary that a header files should have a .h extension?
|
|
3458
|
In a function two return statements should never occur.
|
|
3459
|
The modulus operator cannot be used with a long double
|
|
3460
|
it is necessary to call the macro va_end if va_start is called in the function.
|
|
3461
|
Can I increase the size of dynamically allocated array?
|
|
3462
|
Data written into a file using fwrite() can be read back using fscanf()
|
|
3463
|
Which standard library function will you use to find the last occurance of a character in a string in C?
|
|
3464
|
Even if integer/float arguments are supplied at command prompt they are treated as strings.
|
|
3465
|
A pointer union CANNOT be created
|
|
3466
|
A structure can contain similar or dissimilar elements
|
|
3467
|
malloc() allocates memory from the heap and not from the stack.
|
|
3468
|
In a file contains the line "I am a boy\r\n" then on reading this line into the array str using fgets(). What will str contain?
|
|
3469
|
How will you free the allocated memory ?
|
|
3470
|
A preprocessor directive is a message from programmer to the preprocessor.
|
|
3471
|
In the expression a=b=5 the order of Assignment is NOT decided by Associativity of operators
|
|
3472
|
va_list is an array that holds information needed by va_arg and va_end
|
|
3473
|
Which header file should you include, if you are going to develop a function, which can accept variable number of arguments?
|
|
3474
|
The first argument to be supplied at command-line must always be count of total arguments
|
|
3475
|
Bit fields CANNOT be used in union.
|
|
3476
|
The library function used to find the last occurrence of a character in a string is
|
|
3477
|
The keyword used to transfer control from a function back to the calling function is
|
|
3478
|
We should not read after a write to a file without an intervening call to fflush(), fseek() or rewind()
|
|
3479
|
canf() or atoi() function can be used to convert a string like "436" in to integer.
|
|
3480
|
he macro va_arg is used to extract an argument from the fixed micro argument list and advance the pointer to the next argument.
|
|
3481
|
Associativity of an operator is either Left to Right or Right to Left.
|
|
3482
|
The maximum combined length of the command-line arguments including the spaces between adjacent arguments is
|
|
3483
|
You want to set such that when you type Baishakh and drag the fill handle, Excel should produceJestha, Aashadh and so on. What will you set to effect that?
|
|
3484
|
Each excel file is a workbook that contains different sheets. Which of the following cannot be a sheet in workbook?
|
|
3485
|
who is not a Function in MS Excel ?
|
|
3486
|
_____________functionin Excel tells how many numeric entries are there.
|
|
3487
|
We Can Cancel Marquee By Pressing ?
|
|
3488
|
Merge Cells Option Can Be Applied From ?
|
|
3489
|
Hyperlinks Can Be In
|
|
3490
|
To Minimize Workbook In Ms Excel:
|
|
3491
|
Which Of These Keys Are Used In Ms Excel To Copy Value From Above Cell?
|
|
3492
|
3-D Reference In A Formula ?
|
|
3493
|
VLOOKUP Function Used To ?
|
|
3494
|
Which Types Of Charts Can Excel Produce ?
|
|
3495
|
Which Function Calculates Your Monthly Mortage Payment ?
|
|
3496
|
Which Of These Keys Are Used In Ms Excel To Insert Current Time In Workbook?
|
|
3497
|
How Can We Set Page Border In Excel ?
|
|
3498
|
Which Of The Following Is Not A Valid Zoom Percentage In Excel ?
|
|
3499
|
Which Key Is Used To "Goto" Tab In Ms Excel?
|
|
3500
|
To Create An Interactive Pivot Table For The Web, You Use A Microsoft Office Web Component Called ?
|
|
3501
|
You Can Convert Existing Excel Worksheet Data And Charts To HTML Document By Using The ?
|
|
3502
|
Which Key Is Used For Help In Ms Excel?
|
|
3503
|
Which Of The Following Keyboard Shortcut Can Be Used For Creating A Chart From The Selected Cells ?
|
|
3504
|
On An Excel Sheet The Active Cell In Indicated By ?
|
|
3505
|
Excel uniquely identifies cells within a worksheet with a cell name
|
|
3506
|
The auto calculate feature
|
|
3507
|
You can use drag-and-drop to embed excel worksheet data in a word document
|
|
3508
|
Data can be arranged in a worksheet in a easy to understand manner using
|
|
3509
|
Concatenation of text can be done using
|
|
3510
|
A numeric value can be treated as a label value if it precedes with
|
|
3511
|
Tab scrolling button
|
|
3512
|
Getting data from a cell located in a different sheet is called ......
|
|
3513
|
A worksheet range is a
|
|
3514
|
The Chart wizard term data categories refers to;
|
|
3515
|
The chart wizard term data series refers to
|
|
3516
|
Which of the following is not an example of a value?
|
|
3517
|
A worksheet can have a maximum of .... Number of rows
|
|
3518
|
How many characters can be typed in a single cell in Excel?
|
|
3519
|
A typical worksheet has ..... Number of columns
|
|
3520
|
Which of the following formulas will Excel Not be able to calculate?
|
|
3521
|
Which of the following formulas is not entered correctly? a. b. c. d.
|
|
3522
|
Which symbol must all formula begin with?
|
|
3523
|
What symbol is used before a number to make it a label?
|
|
3524
|
Which of the following is an absolute cell reference?
|
|
3525
|
Which menu option can be sued to split windows into two
|
|
3526
|
The autofill feature
|
|
3527
|
When you copy a formula
|
|
3528
|
Which of the following is the latest version of Excel
|
|
3529
|
To copy cell contents using drag and drop press the
|
|
3530
|
Which of the following is not a worksheet design criterion?
|
|
3531
|
Comments can be added to cells using
|
|
3532
|
To delete an embedded objects, first
|
|
3533
|
Files created with Lotus 1-2-3 have an extension
|
|
3534
|
Documentation should include
|
|
3535
|
Right clicking something in Excel:
|
|
3536
|
How can you delete a record?
|
|
3537
|
You can use the drag and drop method to
|
|
3538
|
Which elements of worksheet can be protected from accidental modification
|
|
3539
|
You can select a single range of cells by
|
|
3540
|
You can edit a cell by
|
|
3541
|
To save a workbook, you:
|
|
3542
|
When you want to insert a blank imbedded excel object in a word document you can
|
|
3543
|
To view a cell comment
|
|
3544
|
If you begin typing an entry into a cell and then realize that you don't want your entry placed into a cell, you:
|
|
3545
|
Which of the following methods can not be used to edit the contents of a cell?
|
|
3546
|
Without using the mouse or the arrow keys, what is the fastest way of getting to cell A1 in a spreadsheet?
|
|
3547
|
You want to track the progress of the stock market on a daily basis. Which type of chart should you use?
|
|
3548
|
Which of the following options is not located in the Page Setup dialog box?
|
|
3549
|
Excel worksheet cells work very similarly to what common element of the windows graphical user interface
|
|
3550
|
The numbers in our worksheet look like this: You want them to look like this: $1,000.How can you accomplish this?
|
|
3551
|
The Paste Special command lets you copy and paste:
|
|
3552
|
Which of the following is a correct order of precedence in formula calculation?
|
|
3553
|
All worksheet formula
|
|
3554
|
You can enter which types of data into worksheet cells?
|
|
3555
|
Excel probably considers the cell entry January 1, 2000 to be a
|
|
3556
|
Each excel file is called a workbook because
|
|
3557
|
Which of the following is not information you can specify using the solver?
|
|
3558
|
When you insert an excel file into a word document. The data are
|
|
3559
|
Which of following is Not one of Excel's what-if function?
|
|
3560
|
A circular reference is
|
|
3561
|
You can convert existing excel worksheet data an charts to an HTML document by using
|
|
3562
|
You can use the formula palette to
|
|
3563
|
You can use the format painter multiple times before you turn it off by
|
|
3564
|
Excel files have a default extension of in Excel-2003
|
|
3565
|
An excel workbook is a collection of
|
|
3566
|
Which of the following is a popular DOS based spreadsheet package?
|
|
3567
|
You cannot link excel worksheet data to a word document
|
|
3568
|
You can copy data or formulas
|
|
3569
|
Rounding errors can occur
|
|
3570
|
Which of the following is the oldest spreadsheet package?
|
|
3571
|
Status indicators are located on the
|
|
3572
|
To create a formula, you can use:
|
|
3573
|
To edit in an embedded excel worksheet object in a word document
|
|
3574
|
To hold row and column titles in place so that they do not scroll when you scroll a worksheet click the
|
|
3575
|
Which area in an excel window allows entering values and formulas
|
|
3576
|
When you link data maintained in an excel workbook to a word document
|
|
3577
|
In a worksheet you can select
|
|
3578
|
To copy formatting from one area in a worksheet and apply it to another area you would use:
|
|
3579
|
When the formula bar is active, you can see
|
|
3580
|
Which button do you click to add up a series of numbers?
|
|
3581
|
To activate the previous cell in a pre-selected range, press
|
|
3582
|
Hyperlinks can be
|
|
3583
|
Multiple calculations can be made in a single formula using
|
|
3584
|
You can use the horizontal and vertical scroll bars to
|
|
3585
|
Which is used to perform what if analysis?
|
|
3586
|
Comments put in cells are called
|
|
3587
|
The name box
|
|
3588
|
When a label is too long to fit within a worksheet cell, you typically must
|
|
3589
|
When integrating word and excel, word is usually the
|
|
3590
|
How can you find specific information in a list?
|
|
3591
|
How do you delete a column?
|
|
3592
|
To center worksheet titles across a range of cells, you must
|
|
3593
|
To create a formula, you first:
|
|
3594
|
How can you print three copies of a workbook?
|
|
3595
|
How do you select an entire column?
|
|
3596
|
Which of the following is not a basic step in creating a worksheet?
|
|
3597
|
How do you insert a row?
|
|
3598
|
Text formulas:
|
|
3599
|
You can activate a cell by
|
|
3600
|
Which of the following is not a way to complete a cell entry?
|
|
3601
|
Which of the following will not cut information?
|
|
3602
|
Which of the following methods cannot be used to enter data in a cell
|
|
3603
|
The Cancel and Enter buttons appear in the:
|
|
3604
|
B7:B9 indicates:
|
|
3605
|
Which function is used to calculate depreciation, rates of return, future values and loan payment amounts?
|
|
3606
|
The active cell
|
|
3607
|
A __________ is a grid with labeled columns and rows.
|
|
3608
|
In help menu of Excel, which of the following tabs are found?
|
|
3609
|
In Excel, the Fill Color button on the Formatting toolbar is used for what?
|
|
3610
|
In Excel, a Data Series is defined as what?
|
|
3611
|
What is represented by the small, black square in the lower-right corner of an active cell or range?
|
|
3612
|
What are the tabs that appear at the bottom of each workbook called?
|
|
3613
|
What happens when dollar signs ($) are entered in a cell address? (e$B$2:$B$10)
|
|
3614
|
The first cell in EXCEL worksheet is labeled as
|
|
3615
|
We can save and protect the workbook by
|
|
3616
|
To record a sequence of keystrokes and mouse actions to play back later we use:
|
|
3617
|
Which key do you press to check spelling?
|
|
3618
|
The spelling dialog box can be involved by choosing spelling from ________ menu.
|
|
3619
|
What do you call the chart that shows the proportions of how one or more data elements relate to another data element?
|
|
3620
|
Which setting you must modify to print a worksheet using letterhead?
|
|
3621
|
Which would you choose to create a bar diagram?
|
|
3622
|
How many worksheets can a workbook have?
|
|
3623
|
Which of the following is not a term of MS-Excel?
|
|
3624
|
Which language is used to create macros in Excel?
|
|
3625
|
What is the correct way to refer the cell A10 on sheet3 from sheet1?
|
|
3626
|
Excel displays the current cell address in the ........
|
|
3627
|
In the formula, which symbol specifies the fixed columns or rows?
|
|
3628
|
What is the short cut key to highlight the entire column?
|
|
3629
|
What does COUNTA () function do?
|
|
3630
|
How do you wrap the text in a cell?
|
|
3631
|
How do you display current date only in MS Excel?
|
|
3632
|
How do you display current date and time in MS Excel?
|
|
3633
|
What will be the output if you format the cell containing 5,436.8 as '#,##0.00' ?
|
|
3634
|
Which Chart can be created in Excel?
|
|
3635
|
How do you rearrange the data in ascending or descending order?
|
|
3636
|
Microsoft Excel is a powerful ...........
|
|
3637
|
Which is not the function of "Edit, Clear" command?
|
|
3638
|
Which function is not available in the Consolidate dialog box?
|
|
3639
|
To return the remainder after a number is divided by a divisor in EXCEL we use the function?
|
|
3640
|
To select an entire column in MS-EXCEL, press?
|
|
3641
|
In EXCEL, you can sum a large range of data by simply selecting a tool button called .....?
|
|
3642
|
An Excel Workbook is a collection of .......
|
|
3643
|
Multiple calculations can be made in a single formula using .......
|
|
3644
|
Which area in an Excel window allows entering values and formulas?
|
|
3645
|
Which menu option can be used to split windows into two?
|
|
3646
|
Comments can be added to cells using ......
|
|
3647
|
What is the short cut key to replace a data with another in sheet?
|
|
3648
|
You can move a sheet from one workbook into new book by
|
|
3649
|
Which of the following is not true about Find and Replace in Excel
|
|
3650
|
While Finding and Replacing some data in Excel, which of the following statement is valid?
|
|
3651
|
Which of the following action removes a sheet from workbook?
|
|
3652
|
By default Excel provides 3 worksheets. You need only two of them, how will you delete the third one?
|
|
3653
|
If you need to remove only the formatting done in a range (numbers and formula typed there should not be removed), you must
|
|
3654
|
To remove the content of selected cells you must issue ______ command
|
|
3655
|
Edit >> Delete command
|
|
3656
|
Paste Special allows some operation while you paste to new cell. Which of the following operation is valid?
|
|
3657
|
Which of the following you can paste selectively using Paste Special command?
|
|
3658
|
Which of the following series type is not valid for Fill Series dialog box?
|
|
3659
|
The command Edit >> Fill Across Worksheet is active only when
|
|
3660
|
The short cut key Ctrl + R is used in Excel to
|
|
3661
|
Ctrl + D shortcut key in Excel will
|
|
3662
|
When a row of data is to be converted into columns
|
|
3663
|
MS Excel provides the default value for step in Fill Series dialog box
|
|
3664
|
Long text can be broken down into many lines within a cell. You can do this through
|
|
3665
|
You can auto fit the width of column by
|
|
3666
|
Which of the cell pointer indicate that you can move the content to other cell?
|
|
3667
|
Which of the cell pointer indicates that you can fill series?
|
|
3668
|
Which of the cell pointer indicates you that you can make selection?
|
|
3669
|
Which command will you choose to convert a column of data into row?
|
|
3670
|
Which of the following option is not available in Paste Special dialog box?
|
|
3671
|
What happens when you press Ctrl + X after selecting some cells in Excel?
|
|
3672
|
Which of the following Excel screen components can NOT be turned on or off?
|
|
3673
|
How can you show or hide the gridlines in Excel Worksheet?
|
|
3674
|
Where can you change automatic or manual calculation mode in Excel?
|
|
3675
|
You want to set such that when you type Baishakh and drag the fill handle, Excel should produce Jestha, Aashadh and so on. What will you set to effect that?
|
|
3676
|
How can you update the values of formula cells if Auto Calculate mode of Excel is disabled?
|
|
3677
|
You can merge the main document with data source in Excel. In mail merge operation, Word is usually
|
|
3678
|
Which of the following is not the correct method of editing the cell content?
|
|
3679
|
Each excel file is a workbook that contains different sheets. Which of the following can not be a sheet in workbook?
|
|
3680
|
The Name box on to the left of formula bar
|
|
3681
|
Tab scroll buttons are place on Excel screen
|
|
3682
|
Which tool you will use to join some cells and place the content at the middle of joined cell?
|
|
3683
|
When a range is selected, how can you activate the previous cell?
|
|
3684
|
You can use the formula pallette to
|
|
3685
|
Which of the following is invalid statement?
|
|
3686
|
Which of the following is not true regarding Conditional Formatting?
|
|
3687
|
You can check the conditions against __________ when applying conditional formatting
|
|
3688
|
When all the numbers between 0 and 100 in a range should be displayed in Red Color, apply
|
|
3689
|
You can set Page Border in Excel from
|
|
3690
|
Where can you set the shading color for a range of cells in Excel?
|
|
3691
|
How can you remove borders applied in cells?
|
|
3692
|
Which of the following format you can decide to apply or not in AutoFormat dialog box?
|
|
3693
|
Which of the cell pointer indicate that you can move the content to other cell ?
|
|
3694
|
Which of the cell pointer indicates you that you can make selection ?
|
|
3695
|
It is acceptable to let long text flow into adjacent cells on a worksheet when
|
|
3696
|
Which command will you choose to convert a column of data into row ?
|
|
3697
|
A _____ object represents a connection to a remote database used as a data source for the associated commands
|
|
3698
|
____ of the query designer interface displays the input sources for querying
|
|
3699
|
The print command in Visual basic programming is used to ____
|
|
3700
|
The ________ method of the connection object is used to run the queries against the database
|
|
3701
|
Visual basic Programming is an _______ driven programming concept
|
|
3702
|
The Data control implements data access by using the _________
|
|
3703
|
The _______ method creates a connection between the application and the ODBC database and assigns it to a database type object
|
|
3704
|
_______ queries are SQL statements that perform specific actions on the database
|
|
3705
|
A __________ is a collection of object classes that model the structure of a relational database system
|
|
3706
|
_______ is a process involving a minimum of two independent entries one being the client and the other is the server
|
|
3707
|
……… type of recordset creates a dynamic set of records that represents a database table or the results of a query containing fields from one or more tables
|
|
3708
|
Through ………. controls we can access information in the databases
|
|
3709
|
……….. allows you to define exactly what the startmenu group contains and what icons are used
|
|
3710
|
….. is a compressed file that is well suited to distribution on either disks or the internet
|
|
3711
|
……….. automates much of work involved in creating and deploying the files needed for our program to run on another computer
|
|
3712
|
In event-driven programming an event is generated by
|
|
3713
|
which statement about objects is true?
|
|
3714
|
______ kinds of rows and columns are created in the Ms Flex Grid control
|
|
3715
|
_____ property is set to change the height of a cell
|
|
3716
|
A cell is an intersection of _______ and _______
|
|
3717
|
_______ method with _______ argument is used to cascade forms
|
|
3718
|
________ event occurs whenever the size of the form is changed
|
|
3719
|
_____ property of an image control sizes the picture loaded to it
|
|
3720
|
The point method returns the ________ of a particular pixel
|
|
3721
|
______ function specifies the file name and assigns the picture to the picture property
|
|
3722
|
The common Dialog is used as a _________ that lets the user select and saves files
|
|
3723
|
________ and ________ functions are used to add predefined dialog boxes
|
|
3724
|
________ argument gives the status of the SHIFT, CTRL and ALT keys
|
|
3725
|
…….. control returns Boolean value
|
|
3726
|
…….. property is used to return the index of a selected item in a listbox
|
|
3727
|
……. is the important event of a timer control
|
|
3728
|
……. is an important property of a file list box
|
|
3729
|
By using …….. keyword we can create a collection
|
|
3730
|
…….. is a group of objects gathered together as a single object
|
|
3731
|
....... keyword is used to create an object for the class
|
|
3732
|
……… event occurs when an object of a class is created
|
|
3733
|
________ event occurs when the user presses any mouse button A MouseDo
|
|
3734
|
________ argument is an integer called button
|
|
3735
|
Check mark can be placed on a menu item using __________ property
|
|
3736
|
_______ is displayed as a horizontal line between items on a menu bar
|
|
3737
|
________ statement removes a control from an array
|
|
3738
|
Control arrays are added at run time using __________ statement
|
|
3739
|
________ method removes list entries from a list box at run time
|
|
3740
|
A Combobox combines the feature of ________ and _________
|
|
3741
|
The value property of the scroll bar represents its current value which may be any integer between ________ and ________ value
|
|
3742
|
_______ function returns a Variant (Long) specifying the position of the first occurrence of one string within another
|
|
3743
|
The ________ function returns the length of string
|
|
3744
|
The __________ function returns the intervals between two dates in terms of years, months or days
|
|
3745
|
______ is the function used to compare two strings
|
|
3746
|
The _________ function with symbols representing the date and time is used to print the formatted dates and times
|
|
3747
|
…….. is an event of a class
|
|
3748
|
In a class, …………is used to pass object itself as a function argument
|
|
3749
|
In a class, …………is used to store data in a property and returns the property.
|
|
3750
|
In a class, …………is used to pass value to the property
|
|
3751
|
………… are called runtime entities
|
|
3752
|
………. control provides all standard dialog boxes into our VB form
|
|
3753
|
………… method used to load or import a text file or .rtf file into a rich text box A Load
|
|
3754
|
……. connectivity is independent of any DBMS or operating system
|
|
3755
|
UDA stands for ……
|
|
3756
|
The ________ statement first executes the statements and then tests the condition after each execution
|
|
3757
|
Writing code in _________ modules can create new object
|
|
3758
|
Writing code in _________ modules can create new objects
|
|
3759
|
A ________ procedure is used to create and manipulate custom properties
|
|
3760
|
The ________ box displays the name of the selected object associated with the form A checkbox
|
|
3761
|
Form files are saved with an extension ______
|
|
3762
|
Visual basic project files are saved with an extension _______
|
|
3763
|
A ________ is a window that contains application code and has other objects placed on it to create the user interfac
|
|
3764
|
The ________ method is used to display a form object
|
|
3765
|
……… object in DAO model represents objects like saved forms, modules, reports etc:
|
|
3766
|
…… object contains information about an error occurred during a DAO operation
|
|
3767
|
…… represents a user account with particular access permission in a particular workspace
|
|
3768
|
………… defines and manages the current user account
|
|
3769
|
…. is the top level object in DAO hierarchy
|
|
3770
|
The _______ event occurs when the form is closed by the user
|
|
3771
|
_______ is used to link or embed object, display and manipulate data from other windows based application
|
|
3772
|
A complete repaint of a form or control can be enforced by ________ method
|
|
3773
|
_ function is used to delete all the data items be completely removed
|
|
3774
|
In list box concept ____ function is used to insert item to the list
|
|
3775
|
The ____ statement is used to change the control to specified location without any condition
|
|
3776
|
In for loop concept in visual basic ____ keyword is used to come out the loop immediately
|
|
3777
|
The ____ is a keyword is used to combine two conditions for checking at same time
|
|
3778
|
The ___ type of operator is used for checking comparing values
|
|
3779
|
__ is the keyword represents the end of the for loop in Visual basic
|
|
3780
|
In for loop operation ____ keyword is used to increment the value of variable for execution
|
|
3781
|
In the following logic, the condition is check at the end of the loop
|
|
3782
|
The ____ concept is used to check for multiple conditions in VB
|
|
3783
|
Which of the following checks and repairs errors and inconsistencies in data storage?
|
|
3784
|
__________ is the _id is of the data type chosen for the original document in files collections.
|
|
3785
|
Which of the collection in GridFS stores the binary chunks?
|
|
3786
|
The default chunk size is changed from 256k to 255k in which version?
|
|
3787
|
How many does collections GridFS use to store files?
|
|
3788
|
_______________ is a specification for storing and retrieving files that exceed the BSON-document size limit of 16MB.
|
|
3789
|
Capped collections provide __________ management of inserted documents in MongoDB.
|
|
3790
|
The __________ feature of collections expires documents after a period of time.
|
|
3791
|
To get the current number of namespaces in the mongo shell, use ________
|
|
3792
|
MongoDB using the mmapv1 storage engine has limits on the number of __________
|
|
3793
|
To interact with embedded documents, use ___________ notation to “reach into†embedded documents.
|
|
3794
|
Normalized data models describe relationships using ___________ between documents.
|
|
3795
|
Embedded data model is used when you have _________ relationships between entities.
|
|
3796
|
__________ data models allow applications to store related pieces of information in the same database record.
|
|
3797
|
Each index in MongoDB requires at least _________ of data space.
|
|
3798
|
_________ strategy is used to explicitly avoid document growth.
|
|
3799
|
With MongoDB 3.0.0, the default use of the Power of _________ Allocations minimizes the occurrences of re-allocations as well as allows for the effective reuse of the freed record space.
|
|
3800
|
For the __________ storage engine, if the document size exceeds the allocated space for that document, MongoDB relocates the document on disk.
|
|
3801
|
A ____________ data model with embedded data combines all related data for a represented entity in a single document.
|
|
3802
|
___________ documents capture relationships between data by storing related data in a single document structure.
|
|
3803
|
In MongoDB, write operations are atomic at the __________ level.
|
|
3804
|
A query _______ consists of a combination of query, sort, and projection specifications.
|
|
3805
|
A ________ query plan has returned a threshold number of matching results.
|
|
3806
|
_______ is used to view statistics about the query plan for a given query.
|
|
3807
|
The update() method uses the _______ command, which uses the default write concern.
|
|
3808
|
____ can modify specific fields of an existing document or documents or replace an existing document entirely, depending on the update parameter.
|
|
3809
|
The ________ message is used to update a document in a collection.
|
|
3810
|
_______ is used to determine whether a query is a covered query.
|
|
3811
|
Indexes are typically available in ______ or located sequentially on disk.
|
|
3812
|
With a receipt acknowledged write concern, the _________confirms that it received the write operation and applied the change to the in-memory view of data.
|
|
3813
|
With an __________ write concern, MongoDB does not acknowledge the receipt of write operations.
|
|
3814
|
MongoDB does not ___________ modifications made before the wtimeout interval expired.
|
|
3815
|
Clients can set a __________ value as part of a replica acknowledged write concern
|
|
3816
|
_____________ is used to control mongod commits in the journal
|
|
3817
|
The mongo shell and the MongoDB drivers use __________ as the default write concern.
|
|
3818
|
When inserts, updates and deletes have a _________ write concern, write operations return quickly.
|
|
3819
|
_________ concern describes the guarantee that MongoDB provides when reporting on the success of a write operation.
|
|
3820
|
Which of the following is not true for Ant?
|
|
3821
|
Which command can be used to check maven version?
|
|
3822
|
Can we run Junits as a part of Jenkins job?
|
|
3823
|
Which of the below is a source code management tool?
|
|
3824
|
Which environment variable is used to specify the path to maven?
|
|
3825
|
Which file is used to specify the packaging cycle?
|
|
3826
|
Which of the following is not a maven goal?
|
|
3827
|
Which of below is not a dependency management tool?
|
|
3828
|
Which operator in C is used to return the size of a variable?
|
|
3829
|
The first character of an identifier in C langauge can contain?
|
|
3830
|
Which of the following is not a valid keyword in C language?
|
|
3831
|
Which of the following statement is true according to C syntax rule?
|
|
3832
|
Which of the following function reads a character (only one at a time) from the terminal and return it as an integer?
|
|
3833
|
_________ is a collection of built-in functions that can be used directly in C programs?
|
|
3834
|
What will be the output of the following arithmetic expression ? 5+3*2%10-8*6
|
|
3835
|
Which is the correct syntax to declare constant pointer?
|
|
3836
|
In which linked list last node address is null?
|
|
3837
|
What is Dequeue?
|
|
3838
|
The Default Parameter Passing Mechanism is called as
|
|
3839
|
C is ______ Language?
|
|
3840
|
In which tree, for every node the height of its left subtree and right subtree differ almost by one?
|
|
3841
|
The worst case time complexity of AVL tree is better in comparison to binary search tree for
|
|
3842
|
The "C" language is
|
|
3843
|
Number of binary trees formed with 5 nodes are
|
|
3844
|
The _______ memory allocation function modifies the previous allocated space.
|
|
3845
|
The statement printf("%c", 100); will print?
|
|
3846
|
Which of the following data structure is linear type?
|
|
3847
|
To represent hierarchical relationship between elements, which data structure is suitable?
|
|
3848
|
The statement print f ("%d", 10 ? 0 ? 5 : 1 : 12); will print?
|
|
3849
|
Queue is a _____________ list.
|
|
3850
|
Recursive functions are executed in a?
|
|
3851
|
Which one of the following is not a linear data structure?
|
|
3852
|
A binary tree with 27 nodes has _______ null branches.
|
|
3853
|
Which one of the following sentences is true ?
|
|
3854
|
What is function?
|
|
3855
|
What is the work of break keyword?
|
|
3856
|
In switch statement, each case instance value must be _______?
|
|
3857
|
Which operators are known as Ternary Operator?
|
|
3858
|
Which is the right way to declare constant in C?
|
|
3859
|
What is constant?
|
|
3860
|
What is Keywords?
|
|
3861
|
What is C Tokens?
|
|
3862
|
Bitwise operators can operate upon?
|
|
3863
|
perror( ) function used to ?
|
|
3864
|
What is the right way to access value of structure variable book{ price, page }?
|
|
3865
|
An array elements are always stored in _________ memory locations.
|
|
3866
|
What is right way to Initialization array?
|
|
3867
|
What is an array?
|
|
3868
|
Which of the following shows the correct hierarchy of arithmetic operations in C
|
|
3869
|
Which of the following is allowed in a C Arithmetic instruction
|
|
3870
|
A C variable cannot start with
|
|
3871
|
C programs are converted into machine language with the help of
|
|
3872
|
For 16-bit compiler allowable range for integer constants is ______ ?
|
|
3873
|
C Language developed at _____?
|
|
3874
|
Who is father of C Language?
|
|
3875
|
C++ name was suggested by
|
|
3876
|
C++ was originally developed by
|
|
3877
|
When a language has the capability to produce new data type, it is called
|
|
3878
|
What is a reference?
|
|
3879
|
The standard C++ comment
|
|
3880
|
State the object oriented languages
|
|
3881
|
The operator >> is called
|
|
3882
|
The operator << is called
|
|
3883
|
The C++ symbol <<
|
|
3884
|
What is the range of double data type for a 16-bit compiler?
|
|
3885
|
Which of the following statements about unions is incorrect?
|
|
3886
|
Which of the following statements about the null pointer is correct?
|
|
3887
|
Which function would you use to convert 1.98 to 1?
|
|
3888
|
What is the correct way of treating 9.81 as a long double?
|
|
3889
|
Which of the following statements about functions is false?
|
|
3890
|
Which of the following has a global scope in the program?
|
|
3891
|
Which of the following is the correct operator to compare two variables?
|
|
3892
|
Which of the following is not a correct variable type?
|
|
3893
|
Which of the following is a correct comment?
|
|
3894
|
What punctuation ends most lines of C code?
|
|
3895
|
What punctuation is used to signal the beginning and end of code blocks?
|
|
3896
|
What is the only function all C programs must contain?
|
|
3897
|
What is the correct value to return to the operating system upon the successful completion of a program?
|
|
3898
|
The expression 4 + 6 / 3 * 2 - 2 + 7 % 3 evaluates to
|
|
3899
|
The expression 5 -2 - 3 * 5 - 2 will evaluate to 18, if
|
|
3900
|
Which of the following comments about the ++ operator are correct ?
|
|
3901
|
Pick the operators whose meaning is context dependent
|
|
3902
|
Pick the operators that assosiate from left to right
|
|
3903
|
The operators . , || , < , = , if arranged in the ascending order of precedence reads
|
|
3904
|
Pick the operators that assosiate from the right
|
|
3905
|
Pick the operators that assosciate from the left
|
|
3906
|
In an operation involving || operator, evaluation
|
|
3907
|
Which of the following operators takes only integer operands ?
|
|
3908
|
Coercion
|
|
3909
|
The expression 5 - 2 - 3 * 5 - 2 will evaluate to 18, if - is left associative and
|
|
3910
|
The expression a << 6 shifts all bits of a six places to the left. If a Ox6db7, then what is the value of a << 6
|
|
3911
|
In C programming language, which of the following operators has the highest precedence?
|
|
3912
|
In C programming language, which of the following type of operators have the highest precedence
|
|
3913
|
In a 'C'expression involving || operator, evaluation
|
|
3914
|
Integer division in a 'C' program results in:
|
|
3915
|
A string that is a formal parameter can be declared
|
|
3916
|
Which of the following comments regarding the reading of a string using scanf( with %s option and gets, is true ?)
|
|
3917
|
Length of the string " correct " is
|
|
3918
|
If space occupied by two strings s1 and s2 in 'C' are respectively m and n, then space occupied by string obtained by concatenating sâ‚and sâ‚‚is always
|
|
3919
|
If space occupied by a null terminated string "S1" and "S2"in "C" are respectively "m" and "n",the space occupied by the string obtained by concentrating "Sâ‚"and "Sâ‚‚"is always
|
|
3920
|
In what kind of structure for strings, one can easily insert, delete, concatenate and rearrange sustrings?
|
|
3921
|
cb is a
|
|
3922
|
The number of possible values of m, such that m & 0x3f equals 0x23 is
|
|
3923
|
lint is
|
|
3924
|
Which of the following comments are correct when macro definition includes arguments?
|
|
3925
|
The scope of a macro definition
|
|
3926
|
The ascending order of precedence of the bit-wise operators &, ^, | is
|
|
3927
|
Choose the correct statements.
|
|
3928
|
Preprocessing is typically done
|
|
3929
|
If the word size is 16 bit, then ~0xc5 will be
|
|
3930
|
If the bit pattern corresponding to a signed integer is shifted to the right then
|
|
3931
|
The most significant hit will be lost in which of the following operations?
|
|
3932
|
Which of the following comments about the preprocessor directive # are correct?
|
|
3933
|
In a certain machine, the sum of an integer and its 1's complement is 226 - 1. Then sizeof intl. in bits, will be
|
|
3934
|
Assume an unsigned integer occupies 1 byte. Let myVar be an unsigned integer. Then myVar « 1 multiplies myVar by 2 if it is not greater than
|
|
3935
|
a << 1 is equivalent to
|
|
3936
|
How many bits are absolutely necessary to store an ASCII character ?
|
|
3937
|
If 7 bits are used to store a character, the percentage reduction of needed storage will be
|
|
3938
|
How many bits are absolutely necessary to store an ASCII character?
|
|
3939
|
The process of transforming one bit pattern into another by bit-wise operations is called
|
|
3940
|
The use of macro in the place of functions
|
|
3941
|
Choose the correct statement.
|
|
3942
|
A preprocessor command
|
|
3943
|
C preprocessor
|
|
3944
|
Bit-fields will he accommodated in a word
|
|
3945
|
The declaration int x : 4; means
|
|
3946
|
Choose the correct comments In a bit-field
|
|
3947
|
Bit field
|
|
3948
|
puts(argv[0]);
|
|
3949
|
Choose the best answer. Storage class defines
|
|
3950
|
Which of the following features of C is meant to provide reliable access to special memory locations?
|
|
3951
|
Choose the correct statement
|
|
3952
|
Which of the following are not the keywords in C?
|
|
3953
|
In standard C, trigraphs in the source program are translated
|
|
3954
|
Which of the following comments about EOF are true?
|
|
3955
|
Which of the following comments are true ?
|
|
3956
|
C is a
|
|
3957
|
A text is made up of the characters a, b, c, d, e each occurring with the probability 0.12, 0.4, 0.15,0.08 and .25 respectively. The optimal coding tech-nique will have the average length of
|
|
3958
|
The number of binary relations on a set with n elements is
|
|
3959
|
Which of the following types of programs would require the program data to be sorted in order for the programs to work correctly ?
|
|
3960
|
Let f : {a, b}* (a, b}* be given by f (n) = ax for every value of n ε {a, b} then f is
|
|
3961
|
The number of binary strings of n zeroes and K ones such that no two ones are adjacent, is
|
|
3962
|
The order of an algorithm that finds whether a given boolean function of 'n' variables, produces a 1 is
|
|
3963
|
In the statement template � class T�,
|
|
3964
|
An object oriented language is used because
|
|
3965
|
The for statement can precede a loop to be executed 50 times or till a boolean variable "found" become false is given by
|
|
3966
|
Find the output of following code segment for(putchar('c');putchar('a');putchar('r')) putchar('t');
|
|
3967
|
Find the output of the following : for (i=1,j=10;i
|
|
3968
|
Printf("%d"printf("tim"));
|
|
3969
|
In a 'C' program, constant is defined
|
|
3970
|
If following variables are set to the values as shown below, then what is the value of the expression following it? answer=2; marks=10; !((answer2))
|
|
3971
|
What is the output of the following 'C' program? main() { printf("%f",sqrt(36.0)); }
|
|
3972
|
The statement printf ( "%d" , sizeof (" "')); prints
|
|
3973
|
The statement printf ("%d", ( a++) ) ; prints
|
|
3974
|
The statement printf ("%d", ++5) ; prints
|
|
3975
|
The statement printf ("%d", 10 ? 0 ? 5 : 11 : 12 ) ;
|
|
3976
|
Replacing > by < in the previous question results in
|
|
3977
|
printf( "%c", 100);
|
|
3978
|
x - = y + 1; means
|
|
3979
|
If n has the value 3, then the output of the statement printf( " %d %d " , n++, ++n);
|
|
3980
|
Which of the following statements is incorrect ?
|
|
3981
|
Which of the following tools can be used to automate the process of wireless penetration testing?
|
|
3982
|
Wireless adapter, used to connect to Wifi, should be in which mode in order to monitor all traffic received on a wireless channel?
|
|
3983
|
OS Command Injection can be prevented by following which of the following mitigation?
|
|
3984
|
Which of the following character can be used to test if web-app is vulnerable to SQL injection?
|
|
3985
|
What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?
|
|
3986
|
WHich of the following softwares can be used for vulnerability scanning and network discovery?
|
|
3987
|
Consider the following ASM: mov eax, cr3 mov cr3, eax Which of the following is the result of the above execution?
|
|
3988
|
Consider the following code: int x_value = 99; int* x = &x_value; Which of the following lines of code would properly dereference "x" to get the value of "x_value?"
|
|
3989
|
Which of the following stack pivot gadgets would not preserve a pointer to the original stack frame in eax?
|
|
3990
|
Which of the following would properly result in C++ function overloading? (Choose Two)
|
|
3991
|
In a 64-bit Windows application, the RBP register is most commonly used for which of the following purpose?
|
|
3992
|
Control Flow Guard (CFG works by mandating that an endbr32/endbr64 be the first instruction executed during an indirect function call.
|
|
3993
|
Windows 10 is a ____ ring processor access mode operating system?
|
|
3994
|
Which of the following functions is most commonly used to disable Data Execution Prevention (DEP) inside of a Windows process?
|
|
3995
|
Which of the following groups must a penetration testing review?
|
|
3996
|
What is a risk involved in doing penetration testing?
|
|
3997
|
Which of the following Operating Systems are most effective in penetration testing in networks?
|
|
3998
|
What is social engineering?
|
|
3999
|
Penetration testing should focus in what scenarios?
|
|
4000
|
Which of the following are ways to conduct penetration testing?
|
|
4001
|
Is penetration testing used for helping or for damaging a system?
|
|
4002
|
Pen testers will use _____ to protect the possibility of data leakage and add another layer of security.
|
|
4003
|
Pick out the merits of manual testing.
|
|
4004
|
What are the disadvantages of manual testing?
|
|
4005
|
Identify the benefits of using automated tools.
|
|
4006
|
dentify the disadvantages of using automated tools.
|
|
4007
|
Manual testing requires:
|
|
4008
|
______ testing aims to exploit identified vulnerabilities to check what information is exposed to the outside world.
|
|
4009
|
__________ saves time and resources, but is not accurate or professional.
|
|
4010
|
but is not accurate or professional.
|
|
4011
|
Which attack can be much more devastating?
|
|
4012
|
What remains the same in both internal and external testing?
|
|
4013
|
Which step is essential for the organization to be compliant with certain ISOs or other certification bodies?
|
|
4014
|
A vulnerability scan tries to verify the vulnerabilities found with little or no user interaction.
|
|
4015
|
Nexpose and GFI are tools that try to match conditions found on the target system with known vulnerabilities, and can find new vulnerabilities.
|
|
4016
|
Penetration testing
|
|
4017
|
Which stage does not verify or try to exploit the vulnerability, just lists and ranks the identified weaknesses.
|
|
4018
|
Find the wrong statement about penetration testing.
|
|
4019
|
When a function is recursively called, all automatic variables
|
|
4020
|
Which of the following is not a primitive recursive but partially recursive?
|
|
4021
|
Running out of memory may occur due to
|
|
4022
|
Use of macro instead of function is recommended
|
|
4023
|
Which of the following is/are syntactically correct?
|
|
4024
|
It is not advisable to use macros instead of functions because
|
|
4025
|
Feature for accessing a variable through its address is desireable because
|
|
4026
|
Any C program
|
|
4027
|
void can be used
|
|
4028
|
Forward declaration is absolutely necessary
|
|
4029
|
max is a function that returns the larger of the two integers, given as arguments. Which of the following statements finds the largest of three given numbers?
|
|
4030
|
Pick the correct statements
|
|
4031
|
Use of functions
|
|
4032
|
The default parameter passing mechanism is
|
|
4033
|
Let a, b be two non-negative integers. Which of the following calls, finds the positive difference of a and b ?
|
|
4034
|
A function can make
|
|
4035
|
If max is a function that returns the larger of the two integers, given as arguments, then which of the following statements finds the largest of three given numbers
|
|
4036
|
The function is lower(char) checks whether a character is in lower case or not, therefore it should return
|
|
4037
|
The function fprintf is used in a program
|
|
4038
|
A function that is prototyped as double calculate (int, num); may
|
|
4039
|
A function that uses variable types is called
|
|
4040
|
The function that actually created from a call to a template function is called
|
|
4041
|
It is necessary to declare the type of a function in the calling program if the function
|
|
4042
|
The contents of a file will be lost if it is opened in
|
|
4043
|
The fseek function
|
|
4044
|
ftell
|
|
4045
|
If a file is opened in w+ mode then
|
|
4046
|
If a file is opened in r+ mode then
|
|
4047
|
The process of accessing data stored in a tape is similar to manipulating data on a
|
|
4048
|
The statement fseek(fp,0L,0)i - if syntactically correct,means
|
|
4049
|
Expression ((fpt=fopen("Samples","w"))==NULL)would be true if
|
|
4050
|
To instantiate an object with the statement ifstream items("C:inven.txt");,the file on the disk is identified by the name
|
|
4051
|
The function sprintf()works like printf(),but operatres on
|
|
4052
|
The function fopen("filename","r")returns
|
|
4053
|
Using goto inside for loop is equivalent to using
|
|
4054
|
Code in the previous question can never print
|
|
4055
|
Break statement can be simulated by using
|
|
4056
|
The switch feature
|
|
4057
|
If switch feature is used, then
|
|
4058
|
Choose the correct answers
|
|
4059
|
Which of the following comments about for loop are correct ?
|
|
4060
|
Which of the following comments about for loop are correct?
|
|
4061
|
In a for loop, if the condition is missing, then infinite looping can be avoided by a
|
|
4062
|
In a for loop, if the condition is missing, then,
|
|
4063
|
Choose the statements that are syntactically correct
|
|
4064
|
Which is true of conditional compilation ?
|
|
4065
|
Choose the correct statement
|
|
4066
|
A "switch" statement is used to
|
|
4067
|
Which of the following is a tabular listing of contents of certain registers and memory locations at different times during the execution of a program ?
|
|
4068
|
Which of the following statement about for loop is true ?
|
|
4069
|
For loop in a C program, if the condition is missing
|
|
4070
|
The library function sqrt operates on a double precision argument. If, i is an integer variable, then which of the following calls would correctly compute sqrt(i)?
|
|
4071
|
When a variable of data type double is converted into float, then
|
|
4072
|
By default, any real number in 'C' is treated as
|
|
4073
|
What is the correct way to round offx, a float, to an int value?
|
|
4074
|
The rule for implicit type conversion is
|
|
4075
|
In a C program constant is defined
|
|
4076
|
If a variable can take only integral values from 0 to n. where n is a constant integer, then the variable can be represented as a bit-field whose width is the integral part of (the log in the answers arc to the base 2)
|
|
4077
|
As soon as a pointer variable is freed, its value
|
|
4078
|
Which of the following is true of external variables?
|
|
4079
|
Which of the following comments about wide characters is/are true ?
|
|
4080
|
Which of the following are true regardless of the implementation ?
|
|
4081
|
Literal means
|
|
4082
|
printf ( "%d" , printf ( "tim" ) ):
|
|
4083
|
If integer needs two bytes of storage, then maximum value of a signed integer is
|
|
4084
|
If integer needs two bytes of storage, then maximum value of an unsigned integer is
|
|
4085
|
The minimum number of temporary variables needed to swap the contents of two variables is
|
|
4086
|
If integer needs two bytes of storage, then maximum value of a signed interger is
|
|
4087
|
Which of the following comments regarding the reading of a string, using scanf(with optional) and get is true?
|
|
4088
|
Choose the correct answer
|
|
4089
|
The value of an automatic variable that is declared but not initialized will be
|
|
4090
|
If a is an unsigned integer variable whose value is hx6db7, what is the value of -a?
|
|
4091
|
In case of ordinary int variables
|
|
4092
|
A static variable
|
|
4093
|
The rule for implicit type conversion in 'C' is
|
|
4094
|
The variables which can be accessed by all modules in a program, are called
|
|
4095
|
C programming language by itself provides
|
|
4096
|
C programming language provides operations which deal directly with objects such as
|
|
4097
|
In C programming language, if the first and the second operands of operator + are of types int and float, respectively, the result will be of type
|
|
4098
|
The value of ab if ab & 0 x 3f equals 0 x 27 is
|
|
4099
|
int i = 5; is a statement in a C program.
|
|
4100
|
Printing a character as an integer
|
|
4101
|
Which of the following 'C' type is not a primitive data structure?
|
|
4102
|
A declaration "short int" is used for variables
|
|
4103
|
The declaration "unsigned u" indicates u is a/an
|
|
4104
|
An external variable
|
|
4105
|
A file is preferable to an array of structures because
|
|
4106
|
if x is an one dimensional array, then
|
|
4107
|
While sorting a set of names, representing the names as an array of pointers is preferable to representing the names as a two dimensional array of characters because
|
|
4108
|
If arr is a two dimensional array of 10 rows and 12 columns, then arr (5) logically points to the
|
|
4109
|
A set of names can be represented as a
|
|
4110
|
Choose the correct statements
|
|
4111
|
Choose the statement that best defines an array
|
|
4112
|
C does no automatic array bound checking. This is
|
|
4113
|
If a two dimensional array is used as a formal parameter, then
|
|
4114
|
Under which of the following conditions, the size of an one-dimensional array need not be specified?
|
|
4115
|
The maximum number of dimension an array can have in C is
|
|
4116
|
The parameter passing mechanism for an array is
|
|
4117
|
While passing an array as an actual argument, the function call must have the array name
|
|
4118
|
If storage class is missing in the array definition, by default it will be taken to be
|
|
4119
|
Choose the correct statements
|
|
4120
|
The const feature can be applied to
|
|
4121
|
The minmum number of inter changes needed to convert the array 89,19,40,17,12,10,2,5,7,11,6,9,70 into a heap with maximum element at the root is
|
|
4122
|
In which of the following cases, linked list implementation of sparse matrices consumes the same memory space as the conventional way of storing the entire array?
|
|
4123
|
The information about an array used in a program will be sorted in
|
|
4124
|
Minimun number of comparison required to compute the largest and second largest element in array is
|
|
4125
|
Which of the following is an illegal array definition?
|
|
4126
|
Minimum number of interchange needed to convert the array 89,19,40,14,17,12,10,2,5,7,11,6,9,70, into a heap with the maximum element at the root is
|
|
4127
|
A one dimensional array A has indices 1....75.Each element is a string and takes up three memory words. The array is stored starting at location 1120 decimal. The starting address of A[49] is
|
|
4128
|
Size of the array need not be specified, when
|
|
4129
|
If S is an array of 80 characters, then the value assigned to S through the statement scanf("%s",S) with input 12345 would be
|
|
4130
|
If x is an array of interger, then the value of &x[i] is same as
|
|
4131
|
What is the maximun number of dimensions an array in C may have?
|
|
4132
|
For 'C' programming language
|
|
4133
|
O(N)(linear time) is better than O(1) constant time.
|
|
4134
|
Which of the following option is correct?
|
|
4135
|
A program attempts to generate as many permutations as possible of the string, 'abcd' by pushing the characters a, b, c, d in the same order onto a stack, but it may pop off the top character at any time. Which one of the following strings CANNOT be generated using this program?
|
|
4136
|
Let x be an integer which can take a value of 0 or 1. The statement if(x = =0) x = 1; else x = 0; is equivalent to which one of the following?
|
|
4137
|
Choose the correct statement w.r.t. above variables.
|
|
4138
|
Pick the best statement for the above C program snippet.
|
|
4139
|
Choose the correct statement w.r.t. above C program.
|
|
4140
|
What’s the size returned for each of sizeof() operator?
|
|
4141
|
Assuming size of pointer is 4 bytes and size of int is also 4 bytes, pick the most correct answer from the given options.
|
|
4142
|
The event that is processed after all data has been read but before the list is displayed is:
|
|
4143
|
A DO loop increments the system field ____.
|
|
4144
|
If calculation of update gate in GRU unit is close to 1, which of the following would occur?
|
|
4145
|
If calculation of reset gate in GRU unit is close to 0, which of the following would occur?
|
|
4146
|
It is generally recommended to replace pooling layers in generator part of convolutional generative adversarial nets with ________ ?
|
|
4147
|
When deriving a memory cell in memory networks, we choose to read values as vector values instead of scalars. Which type of addressing would this entail?
|
|
4148
|
Which architecture of neural network would be better suited to solve the problem?
|
|
4149
|
Dropout technique is not an advantageous technique for which of the following layers?
|
|
4150
|
Which of the following is a bottleneck for deep learning algorithm?
|
|
4151
|
A recurrent neural network can be unfolded into a full-connected neural network with infinite length.
|
|
4152
|
As the length of sentence increases, it becomes harder for a neural translation machine to perform as sentence meaning is represented by a fixed dimensional vector. To solve this, which of the following could we do?
|
|
4153
|
Xavier’s init is used to help the input signals reach deep into the network. Which of the following statements are true?
|
|
4154
|
Mini-Batch sizes when defining a neural network are preferred to be multiple of 2’s such as 256 or 512. What is the reason behind it?
|
|
4155
|
Backpropagation works by first calculating the gradient of ___ and then propagating it backwards.
|
|
4156
|
Image inpainting is one of those problems which requires human expertise for solving it. It is particularly useful to repair damaged photos or videos. Below is an example of input and output of an image inpainting example.
|
|
4157
|
What is the best place in the graph for early stopping?
|
|
4158
|
Which of the following would be the best for a non-continuous objective during optimization in deep neural net?
|
|
4159
|
Which of the following is not a direct prediction technique for NLP tasks?
|
|
4160
|
What is the technical difference between vanilla backpropagation algorithm and backpropagation through time (BPTT) algorithm?
|
|
4161
|
A ReLU unit in neural network never gets saturated.
|
|
4162
|
What is generally the sequence followed when building a neural network architecture for semantic segmentation for image?
|
|
4163
|
Deep learning can be applied to which of the following NLP tasks?
|
|
4164
|
Which of the following categories would be suitable for this type of problem?
|
|
4165
|
Increase in size of a convolutional kernel would necessarily increase the performance of a convolutional neural network.
|
|
4166
|
Which of the following is a representation learning algorithm?
|
|
4167
|
The difference between deep learning and machine learning algorithms is that there is no need of feature engineering in machine learning algorithms, whereas, it is recommended to do feature engineering first and then apply deep learning.
|
|
4168
|
In the correct order, sort the following lines of code to populate a ListBox from a DataControl RecordSet.
|
|
4169
|
How can we get a fresh RecordSet for a DataControl?
|
|
4170
|
A DataControl RecordSet is still valid after…
|
|
4171
|
Can we delete records on multiple database tables from the same DataControl instance?
|
|
4172
|
Can we affect several database tables using the Insert method?
|
|
4173
|
In order to use multiple tables…
|
|
4174
|
The Update method from the DataControl…
|
|
4175
|
The Insert method from the DataControl.
|
|
4176
|
The Delete method from a DataControl…
|
|
4177
|
The NewRecord method…
|
|
4178
|
Is it possible to set a Control DataSource and DataField from code?
|
|
4179
|
When we save the information for the Control on the associated DataField…
|
|
4180
|
The communication between the DataField for the selected control and the column is…
|
|
4181
|
How to set a data column to a user interface Control?
|
|
4182
|
We can set the data source from…
|
|
4183
|
What is the function of the Commit property?
|
|
4184
|
The DataControl SQLQuery property only admits the use of simple queries.
|
|
4185
|
The DataControl Table property allows choosing several tables from the selected database.
|
|
4186
|
The DataControl Inspector Panel allows selecting any database we want to work with.
|
|
4187
|
For a DataControl to be functional, it has to be always visible and placed inside the limits of the Window where it is used.
|
|
4188
|
We can only set the Database name and table used by the DataControl via the Inspector Panel.
|
|
4189
|
DataControl offers databinding for all the available Framework controls.
|
|
4190
|
DataControl offers SQL Injection attacks protection.
|
|
4191
|
Once we execute the SQL sentence assigned to a DataControl, we get the matching records in a…
|
|
4192
|
DataControl is the recommended control to access and navigate SQLite databases from Xojo.
|
|
4193
|
What project types support the DataControl?
|
|
4194
|
Index creation for a Table…
|
|
4195
|
We can limit the field length for SQLite tables using the Length property.
|
|
4196
|
Xojo automatically saves every change made using the integrated Database Editor, so we can rely on this.
|
|
4197
|
nce we have created a new SQLite database using the integrated Database Editor, the path to the database file will be resolved at execution time; so we can rely on this for our products' deployment.
|
|
4198
|
Xojo just supports adding already created SQLite databases to the project.
|
|
4199
|
SQLite admits creating columns that will be empty during the database use.
|
|
4200
|
Once a table has been created, we can…
|
|
4201
|
The SQLite data Types supported by SQLite are:
|
|
4202
|
A table definition consist fundamentally of…
|
|
4203
|
Does SQLite use strict Types checking for columns definition?
|
|
4204
|
Can we use RegEx (Regular Expressions) in the SQLite queries?
|
|
4205
|
What are the advantages of using the WAL feature on SQLite?
|
|
4206
|
Is it possible to place a SQLite database in a Server? Check all the right answers.
|
|
4207
|
What is the name of the Class (or Classes) in Xojo we can use to work with SQLite databases?
|
|
4208
|
Xojo supports saving an in-memory database to disk.
|
|
4209
|
SQLite supports in-memory databases.
|
|
4210
|
What Xojo Licenses offer support for SQLite?
|
|
4211
|
Xojo supports multiple SQLite databases use.
|
|
4212
|
Xojo always implements the latest available SQLite Library.
|
|
4213
|
Check all the right affirmations.
|
|
4214
|
If today is day type 2 then, today is a __________
|
|
4215
|
What is called into Absence type
|
|
4216
|
Which infotype can be maintained without validity dates
|
|
4217
|
Payday rule 2 stands for:
|
|
4218
|
You have to default time management staus and an employee is incorrectly assigned status "9". So what will that denote?
|
|
4219
|
Holiday class " " is
|
|
4220
|
In Payroll, ADDWT* is used to
|
|
4221
|
Position is
|
|
4222
|
What is the feature to default number ranges?
|
|
4223
|
What is the status to be maintained in a control record to post the payroll results?
|
|
4224
|
What are the day to day activities in Training and Event Management?
|
|
4225
|
How can we select an induvidual infotype? (two correct answers)
|
|
4226
|
How can we select an induvidual infotype? (two correct answers)
|
|
4227
|
What steps make up the payroll process?
|
|
4228
|
How can we default the values of pay scale data?
|
|
4229
|
What are the main areas of Organization and Staffing user Interface?
|
|
4230
|
Where do you maintain relationships between objects?
|
|
4231
|
Qualifications are assigned to _______?
|
|
4232
|
What is cross application time sheet (CATS)
|
|
4233
|
How do we process an infogroup?
|
|
4234
|
What is an info type?
|
|
4235
|
What are the info types you used in OM?
|
|
4236
|
How many structures are there in SAP HCM?
|
|
4237
|
Using which Tcode do you hire an Employee?
|
|
4238
|
How do you set up integration between Personnel Administration and Organizational Management?
|
|
4239
|
How can we generate absence quotas in negative time management for a group of employees?
|
|
4240
|
RFC and IDoc metadata cannot be modified within PI.
|
|
4241
|
You design and configure PI objects in Integration Builder
|
|
4242
|
You can create and maintain alert categories on the Integration Server? | SAP NetWeaver Mcqs
|
|
4243
|
SAP PI is a single component that works flexibly to implement integration scenarios.? | SAP NetWeaver Mcqs
|
|
4244
|
The Universal Work list (UWL) collects tasks and notifications from multiple provider systems and is integrated with Alert Management. The statement is: | SAP NetWeaver Mcqs
|
|
4245
|
You would like to share content between SAP and non-SAP portal systems that are distributed across your landscape, thus providing a single portal access point per user to portal, with one portal as logon portal for all users. Which of the following can you use? | SAP NetWeaver Mcqs
|
|
4246
|
You can implement an SAP NetWeaver Portal in your landscape to achieve various business goals. Which of the following scenarios are supported by SAP Netweaver Portal? | SAP NetWeaver Mcqs
|
|
4247
|
Which of the following statements about Knowledge Management (KM) are true? | SAP NetWeaver Mcqs
|
|
4248
|
With the collaboration capabilities, SAP NetWeaver allows communication and collaboration in the portal. This allows SAP NetWeaver to bring together members of project groups regardless of time and of their geographic location. Which of the following functionalities are supported by ‘Collaboration’? | SAP NetWeaver Mcqs
|
|
4249
|
When you create new content objects in the PCD, there are two main procedures, out of which one is using Copies. How many methods are there to create copies and which are they? | SAP NetWeaver Mcqs
|
|
4250
|
Which are the backend systems from which the Web Dynpro Model Object can be supplied with information? | SAP NetWeaver Mcqs
|
|
4251
|
What SAP component can be used to provide a single integrated user interface for users to SAP products? | SAP NetWeaver Mcqs
|
|
4252
|
What is the central component in the User Productivity Area? | SAP NetWeaver Mcqs
|
|
4253
|
Define installed units? | SAP NetWeaver Mcqs
|
|
4254
|
What ensures a central point of access to information, applications and services in the company? | SAP NetWeaver Mcqs
|
|
4255
|
You can save and reuse the part of message mapping as | SAP NetWeaver Mcqs
|
|
4256
|
System Landscape Directory adheres to ? | SAP NetWeaver Mcqs
|
|
4257
|
Sender Agreement is not required for | SAP NetWeaver Mcqs
|
|
4258
|
To maintain IDoc metadata and port, which transaction codes are used in PI ? | SAP NetWeaver Mcqs
|
|
4259
|
Types of Lookups in SAP PI are | SAP NetWeaver Mcqs
|
|
4260
|
SAP PI is open and flexible as it uses | SAP NetWeaver Mcqs
|
|
4261
|
What is the order of the pipeline steps in SAP PI | SAP NetWeaver Mcqs
|
|
4262
|
New features in Advanced Adapter Engine are
|
|
4263
|
File Content Conversion is used to read
|
|
4264
|
You configure an Adapter in
|
|
4265
|
Which one is import following objects in Enterprise Service Repository?
|
|
4266
|
Proxies for outbound interfaces are called?
|
|
4267
|
Components of Runtime Workbench are
|
|
4268
|
You define Technical system and Business system in
|
|
4269
|
For Business Processes, what kind of mode is used ?
|
|
4270
|
Which Personal Actions have you performed on an employee
|
|
4271
|
Which of the following apply to Personnel Subareas?
|
|
4272
|
The Personnel Control Record has which of the following functions?
|
|
4273
|
The Organizational Assignment Infotype (IT0001) is used for which of the following purposes?
|
|
4274
|
Communication between time recording systems and HR time management takes place via standard interface ?
|
|
4275
|
What is assigned in the payroll status infotype(0003) to personnel numbers with errors ?
|
|
4276
|
Statement A: “Business event groups serve to structure the catalog. They can contain multiple hierarchy levels.†Statement B: “Business event types carry almost all of the information relevant to the business event. They form the basic structure of the catalog.
|
|
4277
|
Pick the “True†statements regarding “Check List for the Global assignment Change
|
|
4278
|
How many number of subtypes are present in Compensation Package Offer Infotype?
|
|
4279
|
Where is an employee’s work schedule stored?
|
|
4280
|
SAP E-recruiting Can be used as
|
|
4281
|
The E-recruiting solution enables you to recruite english speaking employees? ( T/F )
|
|
4282
|
360 feedback appraisals: appraisals that draw on diverse sources(supervisors, peers and self-appraisals). True or False?
|
|
4283
|
You must start one report for the gross payroll and one for the net payroll for each payroll perioD.
|
|
4284
|
True or False? In order to read developer traces you have to go the operating system because SAP does not have a way to do this within the application.
|
|
4285
|
To prevent having to adjust output devices (e.g. print queue definitions) in every system each time they are transported from one system to another, an administrator can:
|
|
4286
|
How can the logon screen be modified to include informational text, such as the company name, address, the system role, etC.?
|
|
4287
|
After a new installation of R/3 Enterprise, the system has a temporary license. How long does this license last?
|
|
4288
|
The following statements are not true about navigational attributes.
|
|
4289
|
The following transactions are relevant to the data sources in an SAP BW source system.
|
|
4290
|
If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action?
|
|
4291
|
What does transaction SPAM do?
|
|
4292
|
True or False? It is possible to create a key figure without assigning currency or unit.
|
|
4293
|
True or False? A reference characteristic will use the SID table and master data table of the referred characteristiC.
|
|
4294
|
True or False? MS-SQL Server can be installed using all the delivered default settings. Everything is controlled within the application, so SAP requires only a database engine to work.
|
|
4295
|
You assign indirect valuation module TARIF to a wage type on table T511 (Wage Type Characteristics) to accomplish which outcome on IT0008 Basic Pay?
|
|
4296
|
Which of the following definitions are part of the counting rule configuration?
|
|
4297
|
In which area of the Organization and Staffing user interface (transaction PPOME) do you update account assignment features?
|
|
4298
|
How does the system respond when you attempt to create a time entry prior to the earliest retro accounting period on the payroll control record?
|
|
4299
|
Your employee receives a pay raise effective July 1st of the current year. What is the recommended way to update IT0008 (Basic Pay)_
|
|
4300
|
A customer pays a vacation bonus for each day of leave, depending on the employee's organizational assignment. What do you need to configure to enable this
|
|
4301
|
You need to outline the payroll process for the end users in a company. What is the correct sequence of steps?
|
|
4302
|
Valuation Bases - Division) provides the working hours per period as read from IT0008 and stored on the PARTT table?
|
|
4303
|
Which functions import HR master data into the payroll run?
|
|
4304
|
Your customer pays overtime to hourly employees. For the first three hours of overtime, an employee receives a 50% premium. For any hours beyond this, the premium increases to 100%.What do you include in the wage type selection configuration?
|
|
4305
|
Which functions are performed by the payroll control record?
|
|
4306
|
A customer wants to ensure that average working hours per period on IT0008 are updated when planned working hours on IT0007 change. How can you achieve this?
|
|
4307
|
Which feature should be used to default wage types on IT0008 (Basic Pay)?
|
|
4308
|
A customer has implemented SAP HCM Talent Management Suite and wants to have detailed view into the talent and organizational data using pie charts and bar graphs for strategic decisions. What do you recommend?
|
|
4309
|
A customer is implementing SAP ERP 6.0 EhP4 and wants to migrate all open requisitions from a legacy system. What steps are needed to do this?
|
|
4310
|
A customer wants to design the hierarchical representation of their global business organization. They use Portal, MSS and Workflow to manage process approvals. How do you set up the OM structure to alleviate concerns with crossing country and legal entity lines?
|
|
4311
|
The customer would like to have reports from Talent Management that enables them to analyze the talent distribution across the population by age, ethnicity and seniority What is the best solution?
|
|
4312
|
Your customer has implemented SAP Training and Event Management (TEM) and wants to know what additional functionality will be available by implementing SAP Learning Solution (LSO).Which features are unique to LSO?
|
|
4313
|
A company is implementing Performance Management. They want to migrate the Appraisal history to SAP.What solution do you recommend?
|
|
4314
|
Which component used to produce customer-specific output documents requires an additional license?
|
|
4315
|
Function MOD call personnel calculation rule... which queries employees work centre data and sets modifiers for table access during payroll?
|
|
4316
|
You want to repeat the process of finding additional objects along the subordinate organizational structure. What would you add to the following evaluation path?
|
|
4317
|
In which logical database are you able to restrict the info set using an object type ?
|
|
4318
|
Standard SAP ERP Organizational Management integrates with which of the following areas ?
|
|
4319
|
An employee was on vacation.In addition a vacation absence record , the employee also wants to create an overtime record on the same day. Which elements must be configured to prevent this scenario ?
|
|
4320
|
How can you update the employment status of an employee ?
|
|
4321
|
Time wage type selection occurs in subschema
|
|
4322
|
TC00 schema is called by function .....from function XT00.
|
|
4323
|
The function..... in schema XT00 creates only the time wage types?
|
|
4324
|
The main task of TC00 is wage type selection?
|
|
4325
|
Personnel calculation rule X010 is called from within sub schema XT00?
|
|
4326
|
There are two possible payroll runs in SAP HCM?
|
|
4327
|
You are not required to use which functions when simulating a payroll run
|
|
4328
|
Time data entry is of the following types?
|
|
4329
|
Which function imports the bonuses for dirty work entered as employee remuneration information?
|
|
4330
|
Personnel Calculation rule..... is called to perform the valuation set-up in Customizing if time wage types are present in Internal Table IT.
|
|
4331
|
This Calculation Rule queries processing class 01 for the basic pay wage types in internal table IT?
|
|
4332
|
The internal table ( IT ) contains the wage type /001 , which is for the employees who are not paid by the hour.This wage type calls the personnel calculation rule?
|
|
4333
|
Time Z writes the wage type to the internal time wage type table
|
|
4334
|
Each wage type is assigned to a?
|
|
4335
|
Each wage type contains , how many value fields?
|
|
4336
|
The main schema consists of a sequence of sub schemas that are included in the main schema using the function?
|
|
4337
|
o run the payroll program you need?
|
|
4338
|
Schema attributes can also be changed using the program?
|
|
4339
|
Which function provides the payroll driver with data on the type of program that the schema uses?
|
|
4340
|
The function...... checks whether all master data has been imported:
|
|
4341
|
Indirect Valuations Table is?
|
|
4342
|
A set of data grouped together into Ares with similar content is?
|
|
4343
|
nfo types 1000 to 1999 are for?
|
|
4344
|
nfo types 0000 to 9999 are for?
|
|
4345
|
Info types 2000 to 2999 are for?
|
|
4346
|
Infortypes 4000 to 4999 are for?
|
|
4347
|
Infortypes 9000 to 9999 are for?
|
|
4348
|
Identify the steps needed to build the organizational Plan?
|
|
4349
|
What are the three ways in which you can process info type records?
|
|
4350
|
What are the ways of recording employee working times in SAP HCM Time Management ?
|
|
4351
|
What is the prerequisites of Time Management?
|
|
4352
|
Which of the following master data info types are required for negative time management?
|
|
4353
|
Where can you set the earliest retroactive accounting date for an employee?
|
|
4354
|
Which of the following items are elements of the pay scale structure?
|
|
4355
|
What is the purpose of recording an info type 2002 record?
|
|
4356
|
Which variable is used to determine the screen modification for Master?
|
|
4357
|
-sv’ option of PMCMD command is used to specify______________ name
|
|
4358
|
How many levels are there in the Enterprise structure?
|
|
4359
|
A scheduling tool from BMC software
|
|
4360
|
A person, object type ‘P’ can be assigned to :
|
|
4361
|
which command is used to execute workflow tasks from the command line
|
|
4362
|
Which of the following is the Contract Element info type?
|
|
4363
|
Organization Management The following modules are available in SAP R/3 for a Professional User?
|
|
4364
|
You can view properties for which of the following items in the Workflow Monitor?
|
|
4365
|
A qualification Catalogue consists of the following objects:
|
|
4366
|
At which tracing level does the Integration Service not write error messages or row-level information for reject data.
|
|
4367
|
What is Default Recovery Strategy for Session
|
|
4368
|
he Time Evaluation driver is RPCALC00?
|
|
4369
|
Info type 0050 is created using a dynamic action when positive Time Management is used, and contains Time Events :
|
|
4370
|
You can also create an _________ file for workflow log events
|
|
4371
|
To determine the cause of workflow or session problems & resolve it?
|
|
4372
|
A Workflow log does not contain which of the following?
|
|
4373
|
A workflow fails and you need to consult the logs. Which PowerCener application will allow you consult the session and workflow logs?
|
|
4374
|
Which of the following is a type of workflow task?
|
|
4375
|
Are user-defined events supported in PowerCenter workflows?
|
|
4376
|
In a Workflow , you need to run an operating system script between two sessions. How can you best accomplish this?
|
|
4377
|
Which feature that determine the administrator group ?
|
|
4378
|
Elements of the enterprise structure?
|
|
4379
|
secondary Incoming wage types is ?
|
|
4380
|
A is the key for which object type?
|
|
4381
|
Chrological details of workflow tasks can be viewed in
|
|
4382
|
Public Holidays can have the following characteristics:
|
|
4383
|
A session task is a type of :
|
|
4384
|
What is the main switch for integration of OM with PA?
|
|
4385
|
The following are the options available in SAP Time Management:
|
|
4386
|
Which among the following is not a type of workflow task
|
|
4387
|
different views in TMW?
|
|
4388
|
The different methods for transferring employee time data to the SAP system are:
|
|
4389
|
A Work Schedule Rule comprises of the following elements:
|
|
4390
|
A session :
|
|
4391
|
The following is true about single sign-on using Kerberos 5 (Kerberos 5 SSO):
|
|
4392
|
. If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action?
|
|
4393
|
A set of instructions to execute tasks such as sessions, emails, shell commands etc is called :
|
|
4394
|
What SAP transaction can assist in detecting I/O bottlenecks?
|
|
4395
|
For triming leading & trailing spaces of a in Informatica the following function is used
|
|
4396
|
Which of the following are possible ways to display the R/3 Kernel patch of a system?
|
|
4397
|
What value would the function GET_DATE_PART (DATE_SHIPPED, ‘HH’) return when the value of DATE_SHIPPED is null?
|
|
4398
|
If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action?
|
|
4399
|
What types of transformation ports are valid ones?
|
|
4400
|
What does transaction SPAM do?
|
|
4401
|
What SAP transaction can assist in detecting I/O bottlenecks?
|
|
4402
|
True or False? MS-SQL Server can be installed using all the delivered default settings. Everything is controlled within the application, so SAP requires only a database engine to work.
|
|
4403
|
True or False? In order to read developer traces you have to go the operating system because SAP does not have a way to do this within the application.
|
|
4404
|
How can the logon screen be modified to include informational text, such as the company name, address, the system role, etc.?
|
|
4405
|
To prevent having to adjust output devices (e.g. print queue definitions) in every system each time they are transported from one system to another, an administrator can:
|
|
4406
|
After a new installation of R/3 Enterprise, the system has a temporary liscence. How long does this lisence last?
|
|
4407
|
What is CUA?
|
|
4408
|
To prevent the use of common password combinations, a system can be set up to include:
|
|
4409
|
What does report RSUSR003 do?
|
|
4410
|
True or False: Since the release of SQL Server 2000, database integrity checks — and DBCC CHECKDB in particular– are a thing of the past in SAP.
|
|
4411
|
The following is true about single sign-on using Kerberos 5 (Kerberos 5 SSO):
|
|
4412
|
What is SAP MMC good for?
|
|
4413
|
The Payroll Accounting area includes which functions?
|
|
4414
|
Which of the following are groupings for Employee Subgroups?
|
|
4415
|
Which of the following applies to a feature in SAP HR?
|
|
4416
|
Which of the following apply to Personnel Subareas?
|
|
4417
|
Which of the following is not True with respect to Sorter transformation ?
|
|
4418
|
Aggregator Transformation performs :
|
|
4419
|
To concatenate first name and last name of an employee, which transformation would be used ?
|
|
4420
|
Which of the following statements about integration between PA & PD are valid?
|
|
4421
|
The Personnel Control Record has which of the following functions?
|
|
4422
|
……………….. is used to control on a row by row basis, whether the row is to be inserted, updated, deleted or a rejected based on some logical condition
|
|
4423
|
…………….. is an example of Passive Transformation
|
|
4424
|
The Organizational Assignment Infotype (IT0001) is used for which of the following purposes?
|
|
4425
|
A transformation that does not change the number of rows that pass through it, is called :
|
|
4426
|
To test data for one or more conditions and route rows of data that do not meet any of the conditions to a default output group, which transformation would you use ?
|
|
4427
|
In which Infotype are an employee’s Enterprise and Personnel Structure assignment stored?
|
|
4428
|
In Joiner Transformation, if Master Outer Join type is used, it will :
|
|
4429
|
Personnel Area has which of the following functions?
|
|
4430
|
When you add a relational or a flat file source definition to a mapping, you need to connect it to a
|
|
4431
|
The Organizational Key is used for which of the following?
|
|
4432
|
An Active Transformation :
|
|
4433
|
The Payroll Accounting area includes which functions?
|
|
4434
|
The following is true about Payroll Accounting:
|
|
4435
|
Organizational Structure includes which of the following areas?
|
|
4436
|
The following consideration(s) should be taken into account when defining the Personnel Structure:
|
|
4437
|
What elements make up the Enterprise Structure?
|
|
4438
|
The following consideration(s) should be taken into account when defining the Enterprise Structure:
|
|
4439
|
……….. contains a set of transformations that can be reused in multiple mappings
|
|
4440
|
There are three structures in HR, which are Enterprise Structure, Personnel Structure and Organizational Structure.
|
|
4441
|
The output from an Aggregator transformation without a Group by will return?
|
|
4442
|
Which of the following transformations does not have variable port ?
|
|
4443
|
Which of the following is not a lookup cache property ?
|
|
4444
|
Which of the following Transformations does not use cache files ?
|
|
4445
|
Which of the following is not a Active Transformation ?
|
|
4446
|
Shortcuts can be created from which of the following?
|
|
4447
|
Which of these mobile devices should be protected with a password?
|
|
4448
|
Which of the following objects cannot be included in a mapplet?
|
|
4449
|
A flat file cannot be used as the following
|
|
4450
|
Which of the following cannot be used as Targets
|
|
4451
|
If your laptop has wireless networking, you should keep it enabled all the time so you can quickly connect to any available wireless networks.
|
|
4452
|
An "evil twin" is a wireless network set up by a hacker. It is disguised as a legitimate network, to trick you into logging in.
|
|
4453
|
Which of the following changes cause the session to be invalid ?
|
|
4454
|
It is not necessary to encrypt confidential files on a mobile computing device.
|
|
4455
|
Every mapping must contain which of the following components :
|
|
4456
|
If you use a public computer, before leaving you should:
|
|
4457
|
When the Integration Service runs a ……………, it uses the instructions configured in the mapping to read, transform, and write data
|
|
4458
|
When talking on the phone in a public place:
|
|
4459
|
Mappings represent :
|
|
4460
|
Which types of target definitions can be created in the Target Designer ?
|
|
4461
|
When traveling for business:
|
|
4462
|
In which of the following ways can the target definitions be created ?
|
|
4463
|
Target Designer is used to :
|
|
4464
|
What type of files can be imported for flat-file source/target definitions in the repository ?
|
|
4465
|
When a relational source definition is imported, which of the following source metadata is imported ?
|
|
4466
|
Relational source definitions can be imported from :
|
|
4467
|
To extract data from a source, first step in the Designer is :
|
|
4468
|
To create or import source definitions, ………….. is used in the Designer
|
|
4469
|
ETL Stands for -
|
|
4470
|
Which is the reusable component in Informatica?
|
|
4471
|
What Is Informatica.
|
|
4472
|
When you update the database where it will get updated?
|
|
4473
|
Which will not return values in the user defined data types
|
|
4474
|
How will user-defined variables be stored in a worklet?
|
|
4475
|
To Transformation from one session to another using debugger
|
|
4476
|
Enhanced Security option
|
|
4477
|
Components derived from Informatica (choose 3)
|
|
4478
|
Types of Caches in Lookup.-connected,unconnected,static,dynamic,recache,persistant,shared (Refer to the reasons in above pages...)
|
|
4479
|
.What is not an option in Informatica?
|
|
4480
|
Performance degradation occurs due to………
|
|
4481
|
worklet variables are not used for……….
|
|
4482
|
While importing relational source data from DB, What metadata u import?
|
|
4483
|
It takes some more time when I used Sorting.What is the reason
|
|
4484
|
Which of the following is Active
|
|
4485
|
Log initialisation, Error message and Notification of related data.
|
|
4486
|
Which of following is Passive Transformation………
|
|
4487
|
…………… is a repository object that generates, modifies, or passes data
|
|
4488
|
A set of source and target definitions linked by transformation objects that define the rules for data transformation is called a
|
|
4489
|
Which are the types of services which need not to be created by the Administrator?
|
|
4490
|
Which service is responsible for executing the mappings
|
|
4491
|
Which among the following is not an Application service
|
|
4492
|
The Integration Service connects to the repository through the …………… to fetch metadata from the repository
|
|
4493
|
………… allow users to create shortcuts to objects in the folder
|
|
4494
|
A ……….. is the logical representation of a machine in a domain
|
|
4495
|
…………….. is the primary unit for management and administration within PowerCenter
|
|
4496
|
You define a set of instructions to execute tasks, using :
|
|
4497
|
When you install Jenkins without any plug-ins configured, what is the only type of Jenkins build job you can create?
|
|
4498
|
What is the profession of the Jenkins mascot?
|
|
4499
|
What embedded runtime does the stand-alone Jenkins application use?
|
|
4500
|
During installation, the wizard recommends a set of Jenkins plug-ins. Which of the following Jenkins plug-ins is not recommended?
|
|
4501
|
Which environment variable do you optionally use to specify the folder in which Jenkins configuration and runtime data is contained?
|
|
4502
|
Which source code management plug-in does Jenkins install by default?
|
|
4503
|
Who is credited with the creation of Jenkins?
|
|
4504
|
Which version of the Java Development Kit (JDK) is required to run the latest version of Jenkins (since Jenkins 2.54)?
|
|
4505
|
Jenkins is a fork of what other CI tool?
|
|
4506
|
Which of the following commands runs Jenkins from the command line?
|
|
4507
|
How can we setup Jenkins jobs?
|
|
4508
|
Which maven plugin creates the project structure?
|
|
4509
|
How can we secure Jenkins?
|
|
4510
|
Which command can be used to check maven version?
|
|
4511
|
Which file is used to define dependency in maven?
|
|
4512
|
Which Scm Tools Does Jenkins Support?
|
|
4513
|
What are the useful plugins in Jenkin?
|
|
4514
|
How can we move or copy Jenkins from one server to another?
|
|
4515
|
What are the advantages of Jenkins?
|
|
4516
|
What is the requirement for using Jenkins?
|
|
4517
|
Reactjs data flow implementation?
|
|
4518
|
ReactJS renders Components start with?
|
|
4519
|
To achieve dynamic UI updates. Which of the following needs to be updated ?
|
|
4520
|
React.s focuses on which of the following part when considering MVC?
|
|
4521
|
JSX is necessary to work with React.js?
|
|
4522
|
Which of the following methods used for state of the component?(Multiple selction)
|
|
4523
|
Which functions allow to bind the context of the components?
|
|
4524
|
Which of the following called fat arrow function in react?
|
|
4525
|
Which is used to pass the data from parent to child?
|
|
4526
|
Which of the following API is necessary for React.js component?
|
|
4527
|
Which of the following mounting methods are invoked before the component is inserted into DOM?
|
|
4528
|
Once you create an element, React you can’t change its children or attributes?
|
|
4529
|
A parent component could access or read its children components properties?
|
|
4530
|
Who Develop React.js?
|
|
4531
|
Which of the following is the correct data flow sequence of flux concept?
|
|
4532
|
In component lifecycle which one is executed before rendering?
|
|
4533
|
Which is used to update the state?
|
|
4534
|
which of the following method define default values for properties using props?
|
|
4535
|
What is the name of React.js Developer ?
|
|
4536
|
Which of the following represented the Pre and post life cycle methods of components ?
|
|
4537
|
React.js Covers only the view layer of the app?
|
|
4538
|
Which helps react for keeping their data unidirectional?
|
|
4539
|
Which is used to keep the value of components unique?
|
|
4540
|
Life cycle methods of a components fall under following categories?
|
|
4541
|
Which of the following is not components of Redux?
|
|
4542
|
How many elements does a react component return?
|
|
4543
|
What create-react-app command do
|
|
4544
|
For what "webpack" command is used?
|
|
4545
|
What is state in React?
|
|
4546
|
Arbitrary inputs of components in React are called
|
|
4547
|
React.js was created by
|
|
4548
|
What function allows you to render React content in an HTML page?
|
|
4549
|
Which of following is used to pass data to a component from outside?
|
|
4550
|
What kind of component import React from 'react' is?
|
|
4551
|
Invoked once, only on the client, after rendering occurs.
|
|
4552
|
How can we prevent default behavior in React?
|
|
4553
|
In React state can be accessed using ___
|
|
4554
|
React supports all the syntax of __________
|
|
4555
|
React is mainly for building _____________
|
|
4556
|
React keeps track of what items have changed, been added, or been removed from a list using _____
|
|
4557
|
React considers everything as _______.
|
|
4558
|
An altered component may be uniquely identified with the help of ref.
|
|
4559
|
What is the smallest building block of ReactJS?
|
|
4560
|
Function that does not change its results for the same set of inputs are called __________
|
|
4561
|
If our elements are dynamic, react can keep track of the changes using keys.
|
|
4562
|
JSX is faster because it performs ____________ while compiling code to JavaScript
|
|
4563
|
Components cannot refer to other components in their output.
|
|
4564
|
In JSX most of the errors can be caught during _________.
|
|
4565
|
ref is used to refer a element / component returned by _________
|
|
4566
|
State can be initialized when code is loaded or state can be set on event changes.
|
|
4567
|
Lifecycle methods are mainly used ___________.
|
|
4568
|
Which of the following needs to be updated to achieve dynamic UI updates?
|
|
4569
|
________ can be done while more than one element needs to be returned from a component.
|
|
4570
|
Arbitrary inputs of components are called __________.
|
|
4571
|
React merges the object you provide into the current state using __________.
|
|
4572
|
JSX is typesafe.
|
|
4573
|
We can go for keys when there is possibility that our user could change the data.
|
|
4574
|
In React what is used to pass data to a component from outside?
|
|
4575
|
What are the two ways that data gets handled in React?
|
|
4576
|
What is ReactJS?
|
|
4577
|
What port is the default where the webpack-dev-server will run?
|
|
4578
|
What does the "webpack" command do?
|
|
4579
|
What is Babel?
|
|
4580
|
What is state in React?
|
|
4581
|
How many elements does a react component return?
|
|
4582
|
In which directory React Components are saved?
|
|
4583
|
Everything in React is a _____________
|
|
4584
|
What is a react.js in MVC?
|
|
4585
|
What does the “webpack†command do?
|
|
4586
|
How does React handle Web Accessibility Initiative - Accessible Rich Internet Applications (WAI-ARIA) standard?
|
|
4587
|
What are the advantages of React JS?
|
|
4588
|
At the highest level, React components have lifecycle events that fall into
|
|
4589
|
Which of the following API is a MUST for every ReactJS component?
|
|
4590
|
Props are __________ into other components
|
|
4591
|
How can you access the state of a component from inside of a member function?
|
|
4592
|
What are the limitations of ReactJS?
|
|
4593
|
What is ReactJS?
|
|
4594
|
Application written in AngularJS is cross browser compliant
|
|
4595
|
Data binding can be done in two ways in Angular js - data binding in classical template systems and data binding in angular templates?
|
|
4596
|
Explain what is angular.bootstrap is used for?
|
|
4597
|
Explain what Angular JS routes does?
|
|
4598
|
What is MVC (Mode View Controller) ?
|
|
4599
|
What is the correct syntax for a variable “a†in AngularJS?
|
|
4600
|
Which of the service modes can be easiest to test while using AngularJS?
|
|
4601
|
Which of the following statements are invalid AngularJS filters?
|
|
4602
|
What is the purpose of $destroy method in AngularJS?
|
|
4603
|
What is AngularJS?
|
|
4604
|
Check whether the code syntax is correct app.factory('TestFactory', function myTestFactory($rootScope, $http, $location) { return function myTestReusable() { // processing goes here }; });
|
|
4605
|
Does the aim of AngularJS “promise†is to interrupt and perform an activity when it taking a long time?
|
|
4606
|
For the code below <html ng-app="myApp"> <head> </head> <body> <div ng-view></div> </body> </html> Is the syntax current
|
|
4607
|
Is AngualarJS built on jQuery?
|
|
4608
|
How to use dependency injection in AngularJS ?
|
|
4609
|
Which of the following statements are true? Choose all that apply.
|
|
4610
|
Code written in AngularJS can be _____________.
|
|
4611
|
Check whether the code below is correct app.config(function ($routeProvider) { $routeProvider .when('/inbox', { templateUrl: 'views/inbox.html', controller: 'InboxCtrl', controllerAs: 'inbox' }) .when('/inbox/email/:id', { templateUrl: 'views/email.html', controller: 'EmailCtrl', controllerAs: 'email' }) .otherwise({ redirectTo: '/inbox' }); });
|
|
4612
|
Elements of AngularJS MVC views are rendered in which order?
|
|
4613
|
Is AngularJS extensible?
|
|
4614
|
In AngulsrJS HTML document is loaded and evaluated first in the browser. Mean while in AngularJS _________ ?
|
|
4615
|
There is a controller which takes a single parameter. We call it . . . . . parameter.
|
|
4616
|
AngularJS directives are used in ________
|
|
4617
|
AngularJS module can be created using ________
|
|
4618
|
Which of the following is true about AngularJS expressions
|
|
4619
|
What is a controller in MVC?
|
|
4620
|
We need to incorporate corresponding js according to locale of the country to support Internationalization in AngularJS based application.
|
|
4621
|
AngularJS bootstraps itself during config phase.
|
|
4622
|
Inbuilt services are always prefixed with $ symbol.
|
|
4623
|
In controllers, model data is accessed via $scope object.
|
|
4624
|
novalidate with a form declaration disables any browser specific validation.
|
|
4625
|
We can use $dirty and $invalid flags to do the form validations.
|
|
4626
|
orderby filter is applied to an expression using pipe character.
|
|
4627
|
currency filter is applied to an expression using pipe character.
|
|
4628
|
lowercase filter is applied to an expression using pipe character.
|
|
4629
|
uppercase filter is applied to an expression using pipe character
|
|
4630
|
AngularJS Expressions are written inside double braces like {{ expression}}.
|
|
4631
|
AngularJS Expressions are used to bind application data to html.
|
|
4632
|
Each controller accepts $scope as a parameter which refers to the application/module that controller is to control.
|
|
4633
|
AngularJS uses two way data binding.
|
|
4634
|
ng-bind binds the AngularJS Application data to HTML tags.
|
|
4635
|
ng-model binds the values of AngularJS application data to HTML input controls.
|
|
4636
|
Being JavaScript only framework, application written in AngularJS are not safe and secure.
|
|
4637
|
With AngularJS, developer writes less code and gets more functionality.
|
|
4638
|
- AngularJS provides capability to create Single Page Application in a very clean and maintainable way.
|
|
4639
|
Templates can be a single file (like index.html) or multiple views in one page.
|
|
4640
|
Templates are the rendered view with information from the controller and model.
|
|
4641
|
Filters select a subset of items from an array and return a new array.
|
|
4642
|
Services are singleton objects which are instantiated only once in app
|
|
4643
|
AngularJS supports inbuilt internationalization for three types of filters currency, date and numbers.
|
|
4644
|
Custom directives are used in AngularJS to extend the functionality of HTML.
|
|
4645
|
Is AngularJS extensible?
|
|
4646
|
constants are used to pass values at config phase.
|
|
4647
|
config phase is the phase during which AngularJS bootstraps itself
|
|
4648
|
Which of the following is true about provider?
|
|
4649
|
service method is used to create a service whose purpose is to do some defined task.
|
|
4650
|
factory method is used to define a factory which can later be used to create services as and when required.
|
|
4651
|
Using service method, we define a service and then assign method to it.
|
|
4652
|
Child controller inherits the scope of its parent controller.
|
|
4653
|
Which of the following is true about $routeProvider?
|
|
4654
|
Model available in $rootScope can be overridden by its all child scopes.
|
|
4655
|
Model available in $rootScope is available to its all child scopes.
|
|
4656
|
$rootScope is the parent of all of the scope variables.
|
|
4657
|
$http service is used to make an Ajax call to server.
|
|
4658
|
Use novalidate with a form declaration to disable any browser specific validation.
|
|
4659
|
Which of the following is true about $error?
|
|
4660
|
Which of the following is true about $invalid flag?
|
|
4661
|
Which of the following is true about ng-hide directive?
|
|
4662
|
Which of the following is true about ng-show directive?
|
|
4663
|
Which of the following is true about ng-disabled directive?
|
|
4664
|
Which of the following is true about filter filter?
|
|
4665
|
Which of the following is true about currency filter?
|
|
4666
|
Which of the following is true about lowercase filter?
|
|
4667
|
AngularJS application expressions are pure JavaScript expressions.
|
|
4668
|
AngularJS expressions behave in same way as ng-bind directives.
|
|
4669
|
AngularJS expressions are written using.
|
|
4670
|
What is MVC?
|
|
4671
|
Which of the following is true about ng-bind directive?
|
|
4672
|
Which of the following is not a core AngularJS directive
|
|
4673
|
Do AngularJS provide reusable components?
|
|
4674
|
Is AngularJS code unit testable?
|
|
4675
|
What is deep linking in AngularJS?
|
|
4676
|
- What are the filters in AngularJS?
|
|
4677
|
What are the controllers in AngularJS?
|
|
4678
|
What are scopes in AngularJS?
|
|
4679
|
What happens when page containing AngularJS based Application loads
|
|
4680
|
Which directive is used for data binding in AngularJS?
|
|
4681
|
What is data binding in AngularJS?
|
|
4682
|
Are application written using AngularJS cross browser compliant?
|
|
4683
|
Is AngularJS open source?
|
|
4684
|
Internationalization is a way to show locale specific information on a website.
|
|
4685
|
AngularJS uses one way data binding.
|
|
4686
|
Custom directives are defined using "directive" function.
|
|
4687
|
Using factory method, we first define a factory and then assign method to it.
|
|
4688
|
ng-click directive represents a AngularJS click event.
|
|
4689
|
Which of the following is true about ng-include directive?
|
|
4690
|
Which of the following is true about uppercase filter?
|
|
4691
|
Which of the following is true about ng-model directive?
|
|
4692
|
When integer value overflows, they become
|
|
4693
|
Chr ( ) function changes a string into a/an
|
|
4694
|
Is_unicode (arg) function returns true when
|
|
4695
|
Which function is used to convert a float type into integers?
|
|
4696
|
Conversion functions, Type casts and what is third way to manipulate a data type?
|
|
4697
|
Which data type in PHP offers special variables that hold references of resources that are external to PHP?
|
|
4698
|
Ord ( ) function is used convert a
|
|
4699
|
For checking a data type, PHP offers a function called
|
|
4700
|
Which data type is not valid in PHP for type casting?
|
|
4701
|
How many different ways are offered by PHP to manipulate a data type?
|
|
4702
|
Which one is not a data type in PHP?
|
|
4703
|
Which of following type conversion behavior is offered by PHP?
|
|
4704
|
Floatval ( ) function will convert your argument in
|
|
4705
|
How many basic data types are offered by PHP?
|
|
4706
|
How resources are created in PHP?
|
|
4707
|
Three ways to create an array is Direct assignment, array ( ) construct and
|
|
4708
|
Multidimensional arrays are simple arrays that have
|
|
4709
|
Other than index values an array can be retrieved by a function that is called as
|
|
4710
|
As compared to associative arrays vector arrays are much
|
|
4711
|
In vector arrays they elements must have
|
|
4712
|
$multi_array [1] [2] [3] [4] = "I am working on PHP"; will create
|
|
4713
|
Next ( ) function returns value after the
|
|
4714
|
A function that takes two integers as arguments and returns an array filled with all integers between them, is known as
|
|
4715
|
Foreach ( ), current ( ), next ( ), reset ( ), each ( ) and array_walk ( ) all these functions are example of
|
|
4716
|
Default numbering for an array indices starts from
|
|
4717
|
For getting rid of an assigned variable in an array which function is used?
|
|
4718
|
Unlike vector arrays of C and C++ PHP arrays can store
|
|
4719
|
User defined functions or may be built-in functions that's make an array via methods internal to PHP is called as
|
|
4720
|
For purpose of iteration Foreach is a
|
|
4721
|
There are how many ways to create an array in PHP script
|
|
4722
|
Which function take two arguments and returns true if element contained as a value of an array?
|
|
4723
|
An array is a collection of
|
|
4724
|
Is_array ( ) function that takes a single argument of any type and returns a true value if
|
|
4725
|
Count ( ) function is identical to
|
|
4726
|
PHP function calls are
|
|
4727
|
When we simply want iteration through looping an array values we can use
|
|
4728
|
PHP arrays are also called as
|
|
4729
|
Creating a new array from specification of its elements and associated keys, is known as
|
|
4730
|
Current ( ) function is a
|
|
4731
|
Prev ( ) function is used for
|
|
4732
|
Internal linked keys in an array can be retrievable by
|
|
4733
|
You cannot alter an array while you are iterating your array through
|
|
4734
|
Arrays that can store their values in association with unique keys or indices are called
|
|
4735
|
Which function takes two arguments, an array to be traversed and name of a function to apply to each key/value pair?
|
|
4736
|
To rewind pointer at beginning of list
|
|
4737
|
End ( ) function jumps pointer
|
|
4738
|
To retrieve a value from an array we can use its
|
|
4739
|
Indices of arrays can be either strings or numbers and they are denoted as
|
|
4740
|
Pointing before moving current pointer ahead is a behavior of
|
|
4741
|
Pos ( ) function is an alias for
|
|
4742
|
For finding nonempty elements in array we use
|
|
4743
|
In multidimensional arrays rather than a single key they values are stored in
|
|
4744
|
PHP does not support multiple inheritance but it supports
|
|
4745
|
Destruct ( ) function is used to call a
|
|
4746
|
Pear coding style recommends that class name begins with
|
|
4747
|
Parent class is a
|
|
4748
|
To ask objects about their classes, and ask classes about their parents without searching in code, is example of
|
|
4749
|
Namespaces defines a area in which an identifier
|
|
4750
|
PHP supports
|
|
4751
|
If everything is fine in object selftest ( ) function returns what?
|
|
4752
|
Constructor function must have a same name as name of a
|
|
4753
|
Derived class is also known as
|
|
4754
|
Encapsulation is
|
|
4755
|
Protected members of a class is accessible to class in which
|
|
4756
|
Which function returns TRUE if string argument is name of a class?
|
|
4757
|
Get_class ( ) function returns name of class from where
|
|
4758
|
A process that converts a string of bytes in such a way that you can produce original data again, is known as
|
|
4759
|
An abstract class is one that cannot be instantiated but
|
|
4760
|
PHP offers no support for
|
|
4761
|
How many functions are used by PHP that can encode and decode values into string?
|
|
4762
|
An individual instance in OOP is called as
|
|
4763
|
_sleep ( ) function is called when you
|
|
4764
|
For changing string again into original value which function is used
|
|
4765
|
Functionality of Destructors are offered in
|
|
4766
|
After unserialize ( ) function which function is called
|
|
4767
|
Ability to recover a class name, member function names, and member variable names from an instance, is called as
|
|
4768
|
For finding data in object is valid and consistent across instance which function is used?
|
|
4769
|
Serialize ( ) function takes a value of any type and then
|
|
4770
|
Defining a class in terms of another class and then specifying only things that you want to be different from that class, is called as
|
|
4771
|
Methods are also known as
|
|
4772
|
TextUtils and TextUtils_WordCounter classes are those which belongs to
|
|
4773
|
Which version of PHP support get_declared_classes ( ) function?
|
|
4774
|
When function have same prototype in base class as well as in derived class function is called
|
|
4775
|
Member variables of a class is also known as
|
|
4776
|
To define a function with default arguments, simply you need to turn formal parameter names into
|
|
4777
|
In PHP default behavior for user defined functions is
|
|
4778
|
What is included in phpinfo ( ) function with release of PHP5.2.1 version?
|
|
4779
|
How many ways that PHP offers to modify arguments of a function?
|
|
4780
|
PHP function arguments are modified in function definition and
|
|
4781
|
All these func_num_args ( ), func_get_arg ( ), func_get_args ( ), functions are introduced in
|
|
4782
|
In compile time installation PHP offers some
|
|
4783
|
Which of the following is not a superglobals in PHP?
|
|
4784
|
Which function is used to get ASCII value of character in PHP?
|
|
4785
|
__________ is used to unset a variable in PHP?
|
|
4786
|
How many error levels are available in PHP?
|
|
4787
|
In which version of PHP E_STRICT Error level is introduced?
|
|
4788
|
Which function in PHP is used to get the length of string variable?
|
|
4789
|
Which of the following function returns the number of characters in a string variable?
|
|
4790
|
Which of the following function returns a text in title case from a variable?
|
|
4791
|
Which of the following method sends input to a script via a URL?
|
|
4792
|
When you need to obtain the ASCII value of a character which of the following function you apply in PHP?
|
|
4793
|
Which of the following variables is not a predefined variable?
|
|
4794
|
PHP scripts are enclosed within _______
|
|
4795
|
PHP is an example of ___________ scripting language.
|
|
4796
|
What is the output of below PHP program? <?php $country = 'india'; $$country = 'banglore'; echo $country.' , '.$india
|
|
4797
|
How do you write "Hello World" in PHP?
|
|
4798
|
<?php $str1 = 'hellow'; $str2 = 'hEllow'; strcmp($str1, $str2); ?>
|
|
4799
|
Will session can pass the values from one page to another page.
|
|
4800
|
What output will give the following statement?
|
|
4801
|
PHP offers no support for
|
|
4802
|
Functionality of Constructors are offered in
|
|
4803
|
Extends clause is used for
|
|
4804
|
Defining a class in terms of another class and then specifying only things that you want to be different from that class, is called as
|
|
4805
|
Member variables of a class is also known as
|
|
4806
|
For accessing global variables anywhere from script, PHP uses
|
|
4807
|
$GLOBALS, $_SERVER, $_REQUEST, $_POST, $_GET, $_FILES, $_COOKIE, $_SESSION all are example of
|
|
4808
|
In PHP6 Register_ globals are
|
|
4809
|
PHP stores all global variables in an array called
|
|
4810
|
Superglobal array was introduced in
|
|
4811
|
All variables in PHP are assigned with the
|
|
4812
|
All variables in PHP are denoted by
|
|
4813
|
Error reporting is turned off and on in
|
|
4814
|
A function that writes directly into log of operating system, is
|
|
4815
|
Error logging is similar to error reporting but causes error events to be recorded at a
|
|
4816
|
Which from following error defining codes has highest severity?
|
|
4817
|
Get, Post, Cookies and Sessions all are examples of
|
|
4818
|
Which method is used for generating complex URL strings for dynamic web pages?
|
|
4819
|
Floor ( ), ceil ( ), round ( ), abs ( ), min ( ), max ( ) all functions are example of
|
|
4820
|
Which of the following is not a projection operator?
|
|
4821
|
Which function is used for determining location of syntax error?
|
|
4822
|
To suppress the _id field from the result set, specify _________ in the projection document.
|
|
4823
|
There are how many main methods for passing information between web pages and server
|
|
4824
|
Which of the following functionality is used for aggregation framework?
|
|
4825
|
Which of the following query selects documents in the records collection that match the condition { “user_idâ€: { $lt: 42 } }?
|
|
4826
|
Which of the following is the second argument to projection?
|
|
4827
|
Which is most important thing in configuration of PHP?
|
|
4828
|
Which one from followings is used for configuring PHP?
|
|
4829
|
Which of the following method returns one document?
|
|
4830
|
In aggregation pipeline, the _______ pipeline stage provides access to MongoDB queries.
|
|
4831
|
If we want to use XML functions we must set off
|
|
4832
|
The order of documents returned by a query is not defined unless you specify a _____
|
|
4833
|
There are how many ways to configure PHP
|
|
4834
|
An error reporting function, E_ALL &~E_NOTICE stands for
|
|
4835
|
Meaning of superglobal arrays is it can be
|
|
4836
|
$_SESSION array is one of superglobal variables introduced in
|
|
4837
|
Which of the following pipeline is used for aggregation in MongoDB?
|
|
4838
|
If you want PHP to transparently handle passing session variables for you when cookies are not available, you have to configure
|
|
4839
|
MongoDB process collection of documents using _________ operations.
|
|
4840
|
When a session ia active, PHP provides a special constant called
|
|
4841
|
Applications can also control the behavior of write operations using _______ concern.
|
|
4842
|
Which of the following preference determines how the client direct read operations to the set?
|
|
4843
|
Which of the following operation adds a new document to the users collection?
|
|
4844
|
Increment operator is denoted by
|
|
4845
|
=== operator is true if its two arguments are exactly
|
|
4846
|
Comparison operators have higher precedence than
|
|
4847
|
Decrement operator is denoted by
|
|
4848
|
Which operators have higher precedence?
|
|
4849
|
In MongoDB _________ operations modify the data of a single collection.
|
|
4850
|
PHP is sometimes
|
|
4851
|
PHP is a scripting language, whereas java is a
|
|
4852
|
MongoDB stores all documents in _____________
|
|
4853
|
There is some similarities between PHP and Java, that is
|
|
4854
|
JSP stands for
|
|
4855
|
A query may include a ___________ that specifies the fields from the matching documents to return
|
|
4856
|
We can integrate PHP into a java servlet environment using
|
|
4857
|
SAPI stands for
|
|
4858
|
Everything compatible with PHP on client side is also compatible with
|
|
4859
|
Although PHP is embedded with HTML but PHP syntax only applies in
|
|
4860
|
Can the output statement echo take multiple parameters?
|
|
4861
|
Can the output statement print take multiple parameters?
|
|
4862
|
Which of the following PHP loop is used to loop through each key/value pair in an array?
|
|
4863
|
Which of the following PHP function is used to break a string into an array?
|
|
4864
|
What will be the output for the following code snippet? if ('9' == '009') { echo 'Studyopedia Tutorial!'; } else { echo 'Studyopedia Quiz!'; } ?>
|
|
4865
|
The default execution time set in set_time_limit() in PHP?
|
|
4866
|
Which of the following is a PHP superglobal?
|
|
4867
|
Which of the following methods are used to send information to web server, which is secure?
|
|
4868
|
The usage of strpos() PHP function?
|
|
4869
|
The following PHP code snippet will result in True or False? $v = 'false'; if ($v) { echo 'true'; } else { echo 'false'; }
|
|
4870
|
What will be the output of the following code snippet, $v1 = 80; $v2 = 60; print $v1 . "+". $v2 ?>
|
|
4871
|
User defined functions are case in-sensitive or case sensitive?
|
|
4872
|
What is used to declare a constant in PHP?
|
|
4873
|
Which of the following is the correct way of creating comment in PHP?
|
|
4874
|
What is the file extension for PHP files?
|
|
4875
|
PHP introduced to the web world in which year?
|
|
4876
|
PHP was previously known as?
|
|
4877
|
Who developed PHP?
|
|
4878
|
PHP comments end with:
|
|
4879
|
PHP comments start with:
|
|
4880
|
Correct way of writing PHP comments:
|
|
4881
|
PHP constants are define using keyword:
|
|
4882
|
How do you write "Hello world " in PHP?
|
|
4883
|
All variables in PHP start with:
|
|
4884
|
PHP server scripts are surrounded by delimiters:
|
|
4885
|
Which of the following key is used to denote uniqueness in the collection?
|
|
4886
|
Every PHP statement end with:
|
|
4887
|
To iterate the cursor and return more documents, type _________ in the mongo shell.
|
|
4888
|
The mongo shell loads and parses the ___________ file on startup.
|
|
4889
|
PHP syntax is most similar to:
|
|
4890
|
Which of the following statement will insert 400 documents in to the testData collection?
|
|
4891
|
_id is a ________ bytes hexadecimal number which assures the uniqueness of every document.
|
|
4892
|
Which of the following method returns a cursor?
|
|
4893
|
What is the use of VLR in mobile forensic?
|
|
4894
|
What is the full form of a VLR?
|
|
4895
|
How the Home Location Registry (HLR) is useful in mobile forensic?
|
|
4896
|
Which of the following is NOT the variant of MSC?
|
|
4897
|
…… is a special tool available in VB to access databases directly
|
|
4898
|
Which of the following is NOT included for routing in Mobile Switching Center?
|
|
4899
|
…………. method of recordset object can be used to allocate memory for a new blank record
|
|
4900
|
………… can access data from relational and non relational databases
|
|
4901
|
Assertion (A): BSC works between BTS and Mobile switching center (MSC). Reason (R): BSC act as “manager†and responsible for performing radio channel setup, frequency hopping, and handoffs.
|
|
4902
|
………. allows access to the client server databases on a network
|
|
4903
|
hich of the following is NOT true for BSC?
|
|
4904
|
…………… is used to select a particular recor
|
|
4905
|
Extension of ActiveX controls …
|
|
4906
|
……..files contains bitmaps, strings, and other data that we can change without having to reedit and recompile the program code
|
|
4907
|
……. method adds a row to an MSHFlexGrid
|
|
4908
|
Assertion (A): If a user calls a number from its phone-book, it goes directly to BTS. Reason (R): It is the first step for transmission of the call.
|
|
4909
|
A………. is used to display information entered at design time, by a user at runtime ,or assigned within the code
|
|
4910
|
The ____ is the function is used to display the picture using picture box
|
|
4911
|
The _____ number of events related to form execution
|
|
4912
|
____ property is used to set the flow of control in between the multiple controls
|
|
4913
|
In command button, the ____ symbol is used to make the button with shortcut key access
|
|
4914
|
In VB form, the name property can be named with alphabets; ____ is the maximum number of character allowe
|
|
4915
|
From the following _____tool is used to display pictures in VB form
|
|
4916
|
In declaration a variables _____ length of characters is allotted for a variable A 32
|
|
4917
|
The ____ is a shortcut key used to replace the content by specific data in coding window A Ctrl + F
|
|
4918
|
In visual basic form, the caption property content will reflect in ____ area
|
|
4919
|
To open the property window for usage ____ shortcut key is used A F4
|
|
4920
|
____ option in project explorer window used display the coding of the program
|
|
4921
|
To run / to install the Visual basic 6.0 minimum of ____ ram capaciy
|
|
4922
|
In data type the ____ prefix used to represent the Boolean data
|
|
4923
|
The _____data type is the default and standard type used in programming side
|
|
4924
|
The Type Of statement is used to find out…….
|
|
4925
|
………. displays a list of the files in the current directory or sudirectory
|
|
4926
|
…………. displays the current drive and allows the user to select a different drive by using a drop down arrow
|
|
4927
|
………… present a list of choices to the user
|
|
4928
|
When the form is first referenced in any manner by program, the triggered event is ……
|
|
4929
|
The ……. allows direct exit from a For loop, Do loop, Sub procedure, or Function procedure
|
|
4930
|
…………. are used by VB to hold information needed by an application
|
|
4931
|
In visual basic the, Visible property consists _____ state
|
|
4932
|
The ____ shortcut is used to get the QuickInfo option in visual basic A Ctrl + Q
|
|
4933
|
The right hand drop down list box in the coding window is called _____ list box
|
|
4934
|
In coding window the _____ shortcut key is used to find the particular character or code A Ctrl + Q
|
|
4935
|
Which of the following is NOT true for BSC?
|
|
4936
|
At BTS level which of the following pieces of equipment are used?
|
|
4937
|
What is the major component of the BTS?
|
|
4938
|
Assertion (A): If a user calls a number from its phone-book, it goes directly to BTS. Reason (R): It is the first step for transmission of the call.
|
|
4939
|
The F5 is key pressed the ____ event of form is executed first
|
|
4940
|
In visual basic the _____ value is equivalent to the vb YES NO button in message box A 2
|
|
4941
|
In VB the order in which you create the controls is the order used by using ____ key
|
|
4942
|
___ boxes display information in a dialog box superimposed on the form
|
|
4943
|
The component option is used to insert new tool in to the toolbox, ____ menu is used
|
|
4944
|
__ is a command used to come out of the loop A continue
|
|
4945
|
SDI stands for ____
|
|
4946
|
If variables are not implicitly or explicitly type, they are assigned the type by default…
|
|
4947
|
……… statement is used to define a property procedure that assigns the value of a property
|
|
4948
|
…….. is a built in function to return the upper bound of an array
|
|
4949
|
…….. is a set of sequentially indexed elements having the same type of data
|
|
4950
|
…….. is a meaningful name that takes the place of a number or string that does not change
|
|
4951
|
……….. is the extension of a class module
|
|
4952
|
In …………….. there is no need to declare a variable before using it
|
|
4953
|
____ property is used to hide the tool in run time by setting value as false
|
|
4954
|
Among the various properties of the tools in VB, in general _____ property in not supposed to change the value at maximum time
|
|
4955
|
Like text box, _____ is another tool used for display / output the information A input box
|
|
4956
|
In multiple form based project the current form represented by ___ keyword
|
|
4957
|
Self Length Property is supported by ____ control in V
|
|
4958
|
In visual basic the _____ file consist of complete coding and form design
|
|
4959
|
In command button the _____ property is used to change the label value for any content
|
|
4960
|
The ____ key is used as control key on moving around the form without mouse
|
|
4961
|
____event will execute automatically at the activation of the tool
|
|
4962
|
In coding window, the programming statement has been written in the _____
|
|
4963
|
A Boolean datatype can store……….bytes
|
|
4964
|
Mouse down event takes place when you
|
|
4965
|
……… property is used to check whether the object is active or deactivate
|
|
4966
|
……… is an example for control
|
|
4967
|
……. allows you to position the forms in your application using a small graphical representation of the screen
|
|
4968
|
…….. is one of the main building blocks in a VB application
|
|
4969
|
…….. is an action recognized by a form or the control
|
|
4970
|
Which of the following keywords is used to keep track of active window
|
|
4971
|
___ window is used to align the form execution in desired position or location
|
|
4972
|
The Data Report designer is broken into ____ different sections
|
|
4973
|
Among the events in VB, the Load event is associated with _____
|
|
4974
|
The ____ is shortcut key used for execution of visual basic program
|
|
4975
|
In VB the main form consist of more than one sub form is called ____
|
|
4976
|
While designing the visual basic there are _____ methods used for adding a tools in to form window
|
|
4977
|
In visual basic _____ types of scroll bars available in visual basic
|
|
4978
|
The ____ menu is used for executing the program in Visual basic
|
|
4979
|
The _____ menu used for adding tools in to existing tools box
|
|
4980
|
The list of forms will display in tree like structure in _____window
|
|
4981
|
To load graphics on a control at runtime, we have to use the function……….
|
|
4982
|
Which of the following is an open-source extension of the part of the UML system dealing with profiles?
|
|
4983
|
Which of the following system models creates a graphical representation of software systems in the form of a set of diagram types?
|
|
4984
|
______ is a methodology for representing business processes as a set of connected visual objects.
|
|
4985
|
Which of the following statement is incorrect related to BPEL?
|
|
4986
|
Which of the following messaging protocol is used with XML in BPEL?
|
|
4987
|
Which of the following is the language standard for Web service interactions?
|
|
4988
|
Which of the following object is used to describe the data, usually as part of the XML schema?
|
|
4989
|
Which of the following essential object in WSDL is used to support message transfer?
|
|
4990
|
Which of the following version of WSDL is a W3C standard?
|
|
4991
|
Which of the following statement is incorrect related to catalog servers?
|
|
4992
|
Which of the following combination is possible in WebSphere ESB?
|
|
4993
|
How many different protocol types are required for message passing in SOA?
|
|
4994
|
Which of the following catalog service requires some sort of synchronization or update to maintain a unified data store across the servers involved?
|
|
4995
|
Which of the following is used to aid for locating services in SOA?
|
|
4996
|
Which of the following service monitors compliance of your operations with governmental regulation?
|
|
4997
|
Which of the following stores business logic and aid in governance of business processes?
|
|
4998
|
Which of the following statement is incorrect related to a repository and a registry in ESB?
|
|
4999
|
Which of the following manage message transactions?
|
|
5000
|
Which of the following is an ESB based on open standards such as Java EE?
|
|
5001
|
Which of the following function is performed by the service bus?
|
|
5002
|
How many types of methods are used to combine web services?
|
|
5003
|
In the ______ model, data and messages are exchanged in a Service Data Object (SDO).
|
|
5004
|
Which of the following is a collaborative effort where the logic of the business process is pushed out to the members?
|
|
5005
|
What does CVE in SOA design stand for?
|
|
5006
|
Which of the following application has the ability to query event data in the same way that a stock ticker or trading application can query trading data?
|
|
5007
|
SOA _____ an extension of the Service Oriented Architecture to respond to events that occur as a result of business processes.
|
|
5008
|
Which of the following element is used by orchestrated business process commonly referred to as?
|
|
5009
|
Which of the following provides commands for defining logic using conditional statements?
|
|
5010
|
Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint?
|
|
5011
|
Which of the following is used to define the service component that performs the service?
|
|
5012
|
Which of the following is a repeatable task within a business process?
|
|
5013
|
Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand?
|
|
5014
|
_________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
|
|
5015
|
Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards?
|
|
5016
|
Which of the following provides a token service that can be used to present validated access to resources?
|
|
5017
|
Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials?
|
|
5018
|
Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
|
|
5019
|
In mobile forensic, BTS stands for
|
|
5020
|
Which of the following standard is the key to creating Single Sign-On (SSO) systems?
|
|
5021
|
Which of the following is required by Cloud Computing?
|
|
5022
|
The handset along with SIM is called
|
|
5023
|
Assertion (A): The Mobile station is a device that is placing the call. Reason (R): MS is using a handset and SIM to connect to the network.
|
|
5024
|
Which of the following is done by Identity management?
|
|
5025
|
Amazon Web Services supports ________ Type II Audits.
|
|
5026
|
Assertion (A): MIN is the derivative of IMSI and used to identify the device on the network. Reason (R): MIN is used to identify a Mobile station (MS)
|
|
5027
|
Which of the following is one of the most actively developing and important areas of cloud computing technology?
|
|
5028
|
Which is NOT true for MIN?
|
|
5029
|
Which of the following was one of the weaker aspects of early cloud computing service offerings?
|
|
5030
|
Which of the following is the standard for interoperable cloud-based key management?
|
|
5031
|
Which of the following are a common means for losing encrypted data?
|
|
5032
|
What is the full form of MDN?
|
|
5033
|
Assertion (A): In the case of locked SIM, ICCID value has major advantage over IMSI value. Reason (R): ICCID value is readable while the IMSI value remains unreadable due to security lock.
|
|
5034
|
How many security accounts per client is provided by Microsoft?
|
|
5035
|
ICCID number comprised of
|
|
5036
|
Which of the following is a key mechanism for protecting data?
|
|
5037
|
What is the length of the ICCID number?
|
|
5038
|
Which number is commonly printed on the SIM cards?
|
|
5039
|
Which of the following is a compliance standard?
|
|
5040
|
How many digits are in the string of IMSI numbers?
|
|
5041
|
Assertion (A): All Type of Sim have IMSI number on SIM itself. Reason (R): IMSI can be used for the identification of the SIM module.
|
|
5042
|
The IMSI value is associated with
|
|
5043
|
What is IMSI stands for?
|
|
5044
|
Which of the following is NOT the part of the IMSI number of SIM?
|
|
5045
|
Which of the following has infrastructure security managed and owned by the vendor?
|
|
5046
|
Which of the following model type is not trusted in terms of security?
|
|
5047
|
Which of the following service model is owned in terms of infrastructure by both vendor and customer?
|
|
5048
|
Which of the following cloud does not require mapping?
|
|
5049
|
Which of the following model allows vendor to provide security as part of the Service Level Agreement?
|
|
5050
|
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
|
|
5051
|
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
|
|
5052
|
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
|
|
5053
|
What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?
|
|
5054
|
Which of the following facilitates the enforcement of mobile device policies and procedures?
|
|
5055
|
Which of the following enables installation of software that is not available through the official Apple App Store?
|
|
5056
|
Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?
|
|
5057
|
Which of the following service provider provides the highest level of service?
|
|
5058
|
Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.
|
|
5059
|
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:
|
|
5060
|
An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.
|
|
5061
|
Which of the following examples meets the requirement of multi-factor authentication on a mobile device?
|
|
5062
|
Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone's screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).
|
|
5063
|
Which of the following enable(s) biometric authentication on a mobile device? (Select all that apply)
|
|
5064
|
By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it.
|
|
5065
|
Which of the following is application and infrastructure management software for hybrid multi-clouds?
|
|
5066
|
Which of the following is used for Web performance management and load testing?
|
|
5067
|
Which of the following Apple services enables remote mobile device backups?
|
|
5068
|
Which of the following is considered an essential element in cloud computing by CSA?
|
|
5069
|
A mobile device's built-in functionality enabling the usage of locator applications is known as:
|
|
5070
|
Which of the following is the operational domain of CSA?
|
|
5071
|
Which of the following allows to erase data on a lost or stolen mobile device?
|
|
5072
|
Which of the following area of cloud computing is uniquely troublesome?
|
|
5073
|
Which of the following services that need to be negotiated in Service Level Agreements?
|
|
5074
|
Which of the following answers refers to (a) screen lock type(s) used for securing access to a mobile device?
|
|
5075
|
Which of the following service provider provides the least amount of built in security?
|
|
5076
|
A user interface element controlling access to a mobile device after the device is powered on is called:
|
|
5077
|
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
|
|
5078
|
Which of the following is a workflow control and policy based automation service by CA?
|
|
5079
|
Which of the following is open and both hypervisor and processor-architecture-agnostic?
|
|
5080
|
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
|
|
5081
|
Which of the following is used to extend CIM to virtual computer system management?
|
|
5082
|
Which of the following is an industry organization that develops industry system management standards for platform interoperability?
|
|
5083
|
Which of the following is a core management feature offered by most cloud management service products?
|
|
5084
|
Which of the following is used for performance management for virtualized Java Apps with VMware integration?
|
|
5085
|
Which of the following is used for Web site monitoring and analytics?
|
|
5086
|
Which of the following is a virtualization provisioning system that will be rolled into Dell’s AIM?
|
|
5087
|
______ is Microsoft’s cloud-based management service for Windows systems.
|
|
5088
|
Which of the following is the Virtual machine conversion cloud?
|
|
5089
|
Which of the following is not a phase of cloud lifecycle management?
|
|
5090
|
Which of the following provides tools for managing Windows servers and desktops?
|
|
5091
|
When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities?
|
|
5092
|
Which of the following is a standard protocol for network monitoring and discovery?
|
|
5093
|
How many categories need to be monitored for entire cloud computing?
|
|
5094
|
Which of the following “cloudly†characteristics that cloud management service must have?
|
|
5095
|
___________ is a framework tool for managing cloud infrastructure.
|
|
5096
|
Which of the following package provides all five elements of FCAPS?
|
|
5097
|
Which of the following is not the feature of Network management systems?
|
|
5098
|
Which of the following aims to deploy methods for measuring various aspects of cloud performance in a standard way?
|
|
5099
|
Which does C in FCAPS stand for?
|
|
5100
|
Which of the following are photo storage and sharing service?
|
|
5101
|
Which of the following service allows you to create beautiful, memorable movies?
|
|
5102
|
Which of the following is Web-based free email service with contacts and calendar?
|
|
5103
|
__________ is a personalization Web page and tool for Windows Live with status information and navigation features.
|
|
5104
|
Which of the following adds an RSS feed to digital photo frame devices?
|
|
5105
|
Which of the following has address book service with a synchronization feature?
|
|
5106
|
Which of the following is used for synchronization and remote access service for files stored on PCs and mobile devices?
|
|
5107
|
Which of the following generates alerts sent to email, mobile device, or Windows Messenger?
|
|
5108
|
Which of the following service allows applications to incorporate the features of the Windows Live Writer?
|
|
5109
|
Which of the following service use XML-RPC calls to get and send Weblog data?
|
|
5110
|
Which of the following synchronizes information obtained from RSS and ATOM sources?
|
|
5111
|
___________ is Management service for Windows Live ID and relationships.
|
|
5112
|
Which of the following way can be used to access Windows Live?
|
|
5113
|
Which of the following was formerly called Windows Live Dev?
|
|
5114
|
Which of the following is a management utility for a domain using SOAP and RPC?
|
|
5115
|
Which of the following has core services shown in the following figure?
|
|
5116
|
The connection between storage and Microsoft’s Content Delivery Network is stated to be at least _______ percent uptime.
|
|
5117
|
Microsoft offers a _______ calculator for the Windows Azure Platform.
|
|
5118
|
Which of the following Azure edition has storage up to 10GB database?
|
|
5119
|
SQL Azure Database looks like and behaves like a local database with a few exceptions like _____________
|
|
5120
|
Azure data is replicated ________ times for data protection and writes are checked for consistency.
|
|
5121
|
Which of the following was formerly called SQL Server Data Service?
|
|
5122
|
SQL Azure is a cloud-based relational database service that is based on _______
|
|
5123
|
Which of the following are a worldwide content caching and delivery system for Windows Azure blob content?
|
|
5124
|
Which of the following function of VBScript converts a given number of any variant subtype to Long?
|
|
5125
|
Which of the following function of VBScript converts a given number of any variant subtype to Integer?
|
|
5126
|
Which of the following function of VBScript converts a given number of any variant subtype to Double?
|
|
5127
|
Which of the following is the correct syntax to create a cookie using VBScript?
|
|
5128
|
Which of the following is true about cookie handling in VBScript?
|
|
5129
|
Can you access Cookie using VBScript?
|
|
5130
|
What is the output of A + B in VBScript if A = 5 and B = 10?
|
|
5131
|
Which of the following operator can be used to do an XOR operation in VBScript?
|
|
5132
|
Which of the following operator can be used to check if two numbers are equal or not in VBScript?
|
|
5133
|
Which of the following operator can be used to get the exponent of two numbers in VBScript?
|
|
5134
|
Which of the following operator can be used to get the modulus of two numbers in VBScript?
|
|
5135
|
Which of the following operator is supported in VBScript?
|
|
5136
|
What is the scope of a constant declared using Private in VBScript?
|
|
5137
|
What is the scope of a constant declared using Public in VBScript?
|
|
5138
|
Which of the following is used to create a constant in VBScript?
|
|
5139
|
Which of the following is correct about variable declared using 'Private' in VBScript?
|
|
5140
|
Which of the following is correct about variable declared using 'Public' in VBScript?
|
|
5141
|
Which of the following is correct about variable declared using 'Dim' in VBScript?
|
|
5142
|
In Which of the following scope, variables are available to all the procedures across all the associated scripts in VBScript?
|
|
5143
|
Which of the following is a valid scope in VBScript?
|
|
5144
|
Is it required to specify the type of variable during declaration in VBScript?
|
|
5145
|
Which of the following keyword is used to declare a variable in VBScript?
|
|
5146
|
Which of the following is true about variable naming conventions in VBScript?
|
|
5147
|
Which of the following is true about VBScript?
|
|
5148
|
Which one of the following describes why it is important to have a secure off-site backup copy of files?
|
|
5149
|
Which one of the following is MOST likely to be a hoax?
|
|
5150
|
Which one of the following is the reason that users should log on with a username and password?
|
|
5151
|
Which one of the following describes why it is important to update antivirus software regularly?
|
|
5152
|
Which one of the following would NOT happen if a computer suddenly malfunctions?
|
|
5153
|
Which one of the following is unsafe online activity?
|
|
5154
|
Which one of the following statements about a password is TRUE?
|
|
5155
|
Which one of the following describes how a breach in IT security should be reported?
|
|
5156
|
Which one of the following would prevent the theft of a laptop?
|
|
5157
|
Which one of the following describes a public network?
|
|
5158
|
VBScript is an
|
|
5159
|
Which one of the following could be the unexpected outcome of deleting a large group of files?
|
|
5160
|
VBScript was launched in
|
|
5161
|
VBScript stands for
|
|
5162
|
Which one of the following should you use to backup personal data?
|
|
5163
|
VBScript is provided by
|
|
5164
|
Which one of the following could lead to the spread of a malicious program?
|
|
5165
|
Which one of the following describes spam?
|
|
5166
|
Which of these are Time and Date Functions available in VBScript
|
|
5167
|
Which of these are math functions available in VBScript
|
|
5168
|
Which of these are conversion functions available in VBScript
|
|
5169
|
Which one of the following would be considered the BEST way to store a PIN number?
|
|
5170
|
Which of these are string functions available in VBScript.
|
|
5171
|
Two kinds of procedures in VBScript
|
|
5172
|
The command used in VBScript for writing some text on a page is
|
|
5173
|
Which one of the following describes why you should follow guidelines and procedures while using IT resources in an organisation?
|
|
5174
|
A scripting language is a
|
|
5175
|
Which one of the following describes how software can be stored safely?
|
|
5176
|
Which of these VBScript commands can be used to to iterate through loops ?
|
|
5177
|
Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organisation?
|
|
5178
|
VBScript is a
|
|
5179
|
How to take request using post method ?
|
|
5180
|
How to take request using get bmethod ?
|
|
5181
|
How to take request from the user ?
|
|
5182
|
How to disply values to the user ?
|
|
5183
|
What does the Option Explicit directive do ?
|
|
5184
|
There are two methods for declaring variables in VBScript
|
|
5185
|
Why is a scripting language called a scripting language ?
|
|
5186
|
What language is VBScript based on ?
|
|
5187
|
Which one of the following describes why Bluetooth device settings should be adjusted?
|
|
5188
|
Which one of the following should be used to change your password?
|
|
5189
|
What is ENUM?
|
|
5190
|
Which one of the following describes why users should lock their computer when leaving their desk?
|
|
5191
|
What two VBScript commands can be used to make decisions ?
|
|
5192
|
Which one of the following should you do to ensure that your USB storage device is kept safe and secure?
|
|
5193
|
VBScript is an
|
|
5194
|
Which one of the following describes Bluetooth?
|
|
5195
|
Which one of the following protects a computer from the risk of malicious programs?
|
|
5196
|
Which one of the following can protect a computer from the risk of unwanted emails?
|
|
5197
|
Which one of the following describes what you should do if you receive a chain letter email?
|
|
5198
|
Which one of the following describes how confidential information should be sent using an unsecured network?
|
|
5199
|
Which one of the following describes a computer hacker?
|
|
5200
|
Which one of the following describes why firewalls are used?
|
|
5201
|
VB Script was launched in
|
|
5202
|
Which loop is used to iterate till a condition becomes true?
|
|
5203
|
Extension of ActiveX designers _______
|
|
5204
|
Which statement is true for VBScript names e.g. variable names or procedure names?
|
|
5205
|
Which of these are string functions available in VBScript.
|
|
5206
|
How will you get a random number between 0 and 1 in VBScript?
|
|
5207
|
……… method is used to delete items from a list box
|
|
5208
|
……. property designates the text appearing in the form’s title bar
|
|
5209
|
…………. allows us to control the flow of our program’s execution based on certain condition
|
|
5210
|
……….. returns numeric code of a character
|
|
5211
|
…….. returns numeric code of a character
|
|
5212
|
……. are objects that are placed on form objects
|
|
5213
|
………… contains shortcuts to frequently performed actions
|
|
5214
|
………. shows the property type as well as a short description of the property
|
|
5215
|
__ is a tool used in form window for grouping the option button
|
|
5216
|
_____ property is related with Command button specific for displaying picture
|
|
5217
|
The Visual basic programming is ______ based programming concept in general
|
|
5218
|
The width of any tool in visual basic can be changed at ___ time
|
|
5219
|
Scroll bar is of _____ types in Visual Basic for usage
|
|
5220
|
The _____ keyboard refers to current form in VB project
|
|
5221
|
Status bar appears at the _____ of the MDI form
|
|
5222
|
In Visual basic more than one child _____ is allowed to add in project
|
|
5223
|
There can be only ____ MDI form in an application
|
|
5224
|
The Line method can be used to draw ______ shape in VB
|
|
5225
|
Which of these is true?
|
|
5226
|
Which of these is a safe practice?
|
|
5227
|
……. shows the value of any variables within the scope of the current procedure
|
|
5228
|
……. property is used to return or sets a value that determines whether the control can respond to user-generated events
|
|
5229
|
Storage size of Byte datatype is………
|
|
5230
|
Which of these is true about smartphones?
|
|
5231
|
……. modules can be reused in many different applications
|
|
5232
|
The ______control used to insert image to the form
|
|
5233
|
While entering a new project ______ option to be select from the dialog box
|
|
5234
|
The ______property of a form automatically sizes the picture loaded to it
|
|
5235
|
In default ____ numbers of tools exist in toolbox
|
|
5236
|
_____ is a tool used in visual basic to draw rectangle in the form
|
|
5237
|
A menu can include a maximum of ___ levels of sub menus
|
|
5238
|
What is the default range of horizontal scroll bar?
|
|
5239
|
By default, the textbox control can hold text as …
|
|
5240
|
………. property is an integer value corresponding to the position of the scroll box in the scroll bar
|
|
5241
|
……….. combines the features of the text box and list box
|
|
5242
|
……….. returns or sets the number of characters selected A Sellength
|
|
5243
|
A disabled menu item does not appear in the ____ bar
|
|
5244
|
A _____ bar appears in the top of the screen
|
|
5245
|
Option button can be grouped in a ______control
|
|
5246
|
The _____ property in Visual basic is common for many a tools
|
|
5247
|
All the controls in an array will have the same ___
|
|
5248
|
…………. is a block of code that is executed in response to an event
|
|
5249
|
……. arrays can be resized at anytime
|
|
5250
|
We can preserve the value of a local variable by making the variable………
|
|
5251
|
………. control is used to display text, but user cannot change it directly
|
|
5252
|
___ box provides a set of choices to the user
|
|
5253
|
___ function translates a numeric value to a variable
|
|
5254
|
DVariables of different data types when combined as a single variable to hold several related information is called as ______ data types
|
|
5255
|
Dynamic arrays can be declared when the user may not know the _____of the array at design time
|
|
5256
|
The ____ statement checks in the module for usage of any undeclared variables and reports an error to the user
|
|
5257
|
Code window consists of a ______ box and procedure list box
|
|
5258
|
……. property is used to set the maximum length of a text, a textbox can hold
|
|
5259
|
…….. control is used to provide an identifiable grouping for other controls
|
|
5260
|
A text box can hold as many as …...…. characters for a single line text
|
|
5261
|
The form module has file extension
|
|
5262
|
____variables are not reinitialized each time Visual basic invokes a procedure and thus retains or preserves value even when a procedure ends
|
|
5263
|
A module-level is available to all the _______ in the module
|
|
5264
|
Debug window is the same as ____ window
|
|
5265
|
____ bar contains a set of tools to provide controls in the Form
|
|
5266
|
One or more option button controls can be selected from _____ choices
|
|
5267
|
Which of the following provides quick access to commonly used commands in the programming environment?
|
|
5268
|
Which of the following windows is the central to the development of Visual Basic applications?
|
|
5269
|
Which windows displays a list of all forms and modules making up your application?
|
|
5270
|
IDE stands for…………
|
|
5271
|
When the form is first referenced in any manner by program, the triggered event is.....
|
|
5272
|
_________ method is used to forcibly set the CPU focus to a particular control.
|
|
5273
|
__________ event occurs when a form loaded into the memory.
|
|
5274
|
________ control is used to represent the items in a hierarchical manner
|
|
5275
|
How do access Form Designer?
|
|
5276
|
What property do you update to change the title of your window?
|
|
5277
|
What main menu do you click to create a new project?
|
|
5278
|
What property of label do we update to change the colo of written text?
|
|
5279
|
What control you need to display a text on your form?
|
|
5280
|
What template do you select when you want to create a new windows application?
|
|
5281
|
From where do we get the "label" on our form?
|
|
5282
|
What main menu option do we click to start the application?
|
|
5283
|
Which button do you use to close your application?
|
|
5284
|
What property of label do we update to change the text on the form?
|
|
5285
|
What will be the output of the following PHP code? <?php for ($i == 2; ++$i == $i; ++$i) print "In for loop "; print "After loop\n"; ?>
|
|
5286
|
What will be the output of the following PHP code? <?php for (1; $i == 1; $i = 2) print "In for loop "; print "After loop\n"; ?>
|
|
5287
|
What will be the output of the following PHP code? <?php for ($i++; $i == 1; $i = 2) print "In for loop "; print "After loop\n"; ?>
|
|
5288
|
What will be the output of the following PHP code? <?php $x; for ($x = -3; $x < -5; ++$x) { print ++$x; } ?>
|
|
5289
|
What will be the output of the following PHP code? <?php for ($x = -1; $x < 10;--$x) { print $x; } ?>
|
|
5290
|
What will be the output of the following PHP code? <?php for ($x = 1; $x < 10;++$x) { print "*\t"; } ?>
|
|
5291
|
What will be the output of the following PHP code? <?php for ($x = 0; $x <= 10; print ++$x) { print ++$x; } ?>
|
|
5292
|
What will be the output of the following PHP code? <?php for ($x = 0; $x <= 10; $x++) { echo "The number is: $x <br>"; } ?>
|
|
5293
|
What will be the output of the following PHP code? <?php $colors = array("red","green","blue","yellow"); foreach ($colors as $value) { echo "$value <br>"; } ?>
|
|
5294
|
What will be the output of the following PHP code?hp $i = 0; for ($i) { print $i; } ?>
|
|
5295
|
What will be the output of the following PHP code? <?php $a = array("hi", "hello", "bye"); for (;count($a) < 5;) { if (count($a) == 3) print $a; } ?>
|
|
5296
|
What will be the output of the following PHP code? <?php $a = array("hi", "hello", "bye"); foreach ($a as $value) { if (count($a) == 2) print $value; } ?>
|
|
5297
|
What will be the output of the following PHP code? <?php for ($i = 0; $i < 5; $i++) { for(; $i < 5; $i++) print"i"; } ?>
|
|
5298
|
What will be the output of the following PHP code? <?php for ($i = 0; $i % ++$i; $i++) { print"i"; } ?>
|
|
5299
|
What will be the output of the following PHP code? <?php $user = array("Ashley", "Bale", "Shrek", "Blank"); for ($x = 0; $x < count($user); $x) { if ($user[$x++] == "Shrek") continue; printf ($user[$x]); } ?>
|
|
5300
|
What will be the output of the following PHP code? <?php $user = array("Ashley", "Bale", "Shrek", "Blank"); for ($x=0; $x < count($user) - 1; $x++) { if ($user[$x++] == "Shrek") continue; printf ($user[$x]); } ?>
|
|
5301
|
What will be the output of the following PHP code? <?php $user = array("Ashley", "Bale", "Shrek", "Blank"); for ($x = 0; $x < count($user); $x++) { if ($user[$x] == "Shrek") continue; printf ($user[$x]); } ?>
|
|
5302
|
What will be the output of the following PHP code? <?php for ($i = 0; $i < 5; $i++) { for ($j = $i;$j > $i; $i--) print $i; } ?>
|
|
5303
|
What will be the output of the following PHP code? <?php for ($i = 0; $i < 5; $i++) { for ($j = $i; $j > 0; $i--) print $i; } ?>
|
|
5304
|
What will be the output of the following PHP code? <?php for ($i = 0; 0; $i++) { print"i"; } ?>
|
|
5305
|
What will be the output of the following PHP code? < ?php $num = 10; echo 'What is her age? \n She is $num years old'; ?>
|
|
5306
|
What will be the output of the following PHP code? < ?php $team = "arsenal"; switch ($team) { case "manu": echo "I love man u"; case "arsenal": echo "I love arsenal"; case "manc": echo "I love manc"; } ?>
|
|
5307
|
What will be the output of the following PHP code? < ?php $a = "clue"; $a .= "get"; echo "$a"; ?>
|
|
5308
|
What will be the output of the following code? < ?php function track() { static $count = 0; $count++; echo $count ; } track(); track(); track(); ?>
|
|
5309
|
Which statement will output $x on the screen?
|
|
5310
|
Which of the below statements is equivalent to $add += $add ?
|
|
5311
|
What will be the output of the following PHP code? < ?php $total = "25 students"; $more = 10; $total = $total + $more; echo "$total" ; ?>
|
|
5312
|
What will be the output of the following PHP code? < ?php $score = 1234; $scoreboard = (array) $score; echo $scoreboard[0]; ?>
|
|
5313
|
What will be the output of the following PHP code? < ?php $color = "maroon"; $var = $color[2]; echo "$var" ; ?>
|
|
5314
|
Which of the following PHP statements will output Hello World on the screen? (i) echo (“Hello Worldâ€); (ii) print (“Hello Worldâ€); (iii) printf (“Hello Worldâ€); (iv) sprintf (“Hello Worldâ€);
|
|
5315
|
If $a = 12 what will be returned when ($a == 12) ? 5 : 1 is executed?
|
|
5316
|
What will be the output of the following code? < ?php $foo = 'Bob'; $bar = &$foo; $bar = "My name is $bar"; echo $bar; echo $foo; ?>
|
|
5317
|
Which of following variables can be assigned a value to it? (i) $3hello (ii) $_hello (iii) $this (iv) $This
|
|
5318
|
What will be the output of the following php code? < ?php $num = "1"; $num1 = "2"; print $num+$num1 ; ?>
|
|
5319
|
What will be the output of the following php code < ?php $num = 1; $num1 = 2; print $num . "+". $num1 ; ?>
|
|
5320
|
Which of the following php statement/statements will store 111 in variable num? i) int $num = 111; ii) int mum = 111; iii) $num = 111; iv) 111 = $num;
|
|
5321
|
Which of the below symbols is a newline character?
|
|
5322
|
We can use ___ to comment a single line? i) /? ii) // iii) # iv) /* */
|
|
5323
|
Which version of PHP introduced Try/catch Exception?
|
|
5324
|
Which of the following must be installed on your computer so as to run PHP script? i) Adobe Dreamweaver ii) PHP iii) Apache iv) IIS
|
|
5325
|
Which of the following is/are a PHP code editor? ditor? i) Notepad ii) Notepad++ iii) Adobe Dreamweaver iv) PDT
|
|
5326
|
Which of the looping statements is/are supported by PHP? i) for loop ii) while loop iii) do-while loop iv) foreach loop
|
|
5327
|
A PHP script should start with ___ and end with ___:
|
|
5328
|
PHP files have a default file extension of.
|
|
5329
|
What will be printed by the below code? $a = 1; { $a = 2; } echo $a, "\n";
|
|
5330
|
What gets printed? class MyException extends Exception {} try { throw new MyException('Oops!'); } catch (Exception $e) { echo "Caught Exception\n"; } catch (MyException $e) { echo "Caught MyException\n"; }
|
|
5331
|
What will be printed? $a = array(); if ($a[1]) null; echo count($a), "\n";
|
|
5332
|
What gets printed? $str = 'a\\b\n'; echo $str;
|
|
5333
|
Which statement about the code below is correct? class A {} class B {} class C extends A, B {}
|
|
5334
|
What will be printed? $a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), "\n";
|
|
5335
|
What will be printed? $var = 'a'; $VAR = 'b'; echo "$var$VAR";
|
|
5336
|
Which of the following is NOT a valid PHP comparison operator?
|
|
5337
|
What will be printed? if ('2' == '02') { echo 'true'; } else { echo 'false'; }
|
|
5338
|
What will be the value of $var below? $var = true ? '1' : false ? '2' : '3';
|
|
5339
|
What gets printed? <?php $RESULT = 11 + 011 + 0x11; echo "$RESULT"; ?>
|
|
5340
|
What will be printed if (null === false) { echo 'true'; } else { echo 'false'; }
|
|
5341
|
What will be printed? $a = array(); if ($a == null) { echo 'true'; } else { echo 'false'; }
|
|
5342
|
How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c', 'd' );
|
|
5343
|
What will be the value of $var? $var = 1 / 2;
|
|
5344
|
What will be printed? $var = '0'; if ($var) { echo 'true'; } else { echo 'false'; }
|
|
5345
|
What gets printed? $var = 'false'; if ($var) { echo 'true'; } else { echo 'false'; }
|
|
5346
|
A value that has no defined value is expressed in PHP with the following keyword:
|
|
5347
|
Which of the following is the way to create comments in PHP?
|
|
5348
|
What will be printed by the code below? <?php FUNCTION TEST() { ECHO "HELLO WORLD!\n"; } test(); ?>
|
|
5349
|
What value is printed for "a" below <?php $a = 1; function Test() { echo "a = $a"; } Test(); ?>
|
|
5350
|
Which of the following function checks if a specified value exists in an array ?
|
|
5351
|
Which of the following variable is used for the PHP script name ?
|
|
5352
|
Which of the following function is used to locate a string within a string ?
|
|
5353
|
Which of the following magic constant of PHP returns function name ?
|
|
5354
|
Which of the following type of variables are whole numbers, without a decimal point, like 4195 ?
|
|
5355
|
Which of the following method can be used to parse an XML document using PHP ?
|
|
5356
|
Which of the following is correct about eregi() function ?
|
|
5357
|
Which of the following is used to destroy the session ?
|
|
5358
|
Which of the following is used to check if session variable is already set or not in PHP ?
|
|
5359
|
Which of the following function can be used to get an array in the reverse order ?
|
|
5360
|
Which of the following array represents an array with a numeric index ?
|
|
5361
|
Which of the following magic constant of PHP returns function name ?
|
|
5362
|
Which of the following is correct about determine the "truth" of any value not already of the Boolean type ?
|
|
5363
|
Which of the following is true about php.ini file ?
|
|
5364
|
Which of the following method acts as a constructor function in a PHP class ?
|
|
5365
|
Which of the following method of Exception class returns array of the backtrace ?
|
|
5366
|
Which of the following is used to check that a cookie is set or not ?
|
|
5367
|
Which of the following function is used to redirect a page
|
|
5368
|
Which of the following is correct about NULL ?
|
|
5369
|
You add, delete, modify elements within your database thru PHP.
|
|
5370
|
Which of the following is correct about PHP ?
|
|
5371
|
If $a = 12 what will be returned when ($a == 12) ? 5 : 1 is executed ?
|
|
5372
|
Which of following variables can be assigned a value to it ?
|
|
5373
|
Which of the following php statement(s) will store 111 in variable num
|
|
5374
|
We can use _____ to comment a single line.
|
|
5375
|
Which of the following must be installed on your computer so as to run PHP script ?
|
|
5376
|
Which of the following is/are a PHP code editor ?
|
|
5377
|
Which of the looping statements is/are supported by PHP ?
|
|
5378
|
Which of the following magic constant of PHP returns class name ?
|
|
5379
|
An Object is a/an _____ of a class.
|
|
5380
|
Which method is invoked when an undefined property is accessed ?
|
|
5381
|
_____ clone() is run on the _____ object.
|
|
5382
|
Which keyword must be added before $first variable on the third line of the above question to make $second and $first as distinct objects in PHP 5 ?
|
|
5383
|
Which method introduced in PHP 5, is invoked just before an object is garbage collected ?
|
|
5384
|
Which one of the following method is invoked when an undefined method is called by client code ?
|
|
5385
|
Which one of the following method is invoked when a value is assigned to an undefined property ?
|
|
5386
|
PHP provides built-in interceptor methods, which can intercept messages sent to undefined methods and properties. This is also known as
|
|
5387
|
Which keyword is used to put a stop on inheritance ?
|
|
5388
|
Which one of the following keyword is used in conjunction with an Exception object ?
|
|
5389
|
A PHP script should start with _____ and end with _____.
|
|
5390
|
PHP files have a default file extension of
|
|
5391
|
What does PHP stand for ?
|
|
5392
|
What should be done in the kick off phase of a formal review
|
|
5393
|
non-functional test does not belong to which of the following categories?
|
|
5394
|
When would the testing have been stopped?
|
|
5395
|
Select from which of the following the regression testing should be performed.
|
|
5396
|
A deviation from the specified or expected behavior that is visible to end-users is called:
|
|
5397
|
Code Coverage is used as a measure of what?
|
|
5398
|
Evaluating testability of the requirements and system are a part of which phase
|
|
5399
|
Statement Coverage will not check for the following.
|
|
5400
|
The Kick Off phase of a formal review includes the following:
|
|
5401
|
Repeated Testing of an already tested program, after modification, to discover any defects introduced or uncovered as a result of the changes in the software being tested or in another related or unrelated software component:
|
|
5402
|
Which of the following techniques is NOT a black box technique?
|
|
5403
|
Which of the following is not phase of the Fundamental Test Process?
|
|
5404
|
Impact Analysis helps to decide:
|
|
5405
|
The later in the development life cycle a fault is discovered, the more expensive it is to fix. Why?
|
|
5406
|
Test ware(test cases, test dataset)
|
|
5407
|
Which of the following is NOT included in the Test Plan document of the Test Documentation Standard?
|
|
5408
|
Which statement about expected outcomes is FALSE?
|
|
5409
|
What is NOT included in typical costs for an inspection process?
|
|
5410
|
Which of the following is the main purpose of the integration strategy for integration testing in the small?
|
|
5411
|
. Which one of the following describes the major benefit of verification early in the life cycle?
|
|
5412
|
Which of the following is a form of functional testing?
|
|
5413
|
How would you estimate the amount of re-testing likely to be required?
|
|
5414
|
Which one of the following statements, about capture-replay tools, is NOT correct?
|
|
5415
|
Which of the following tools would you use to detect a memory leak?
|
|
5416
|
When should you stop testing?
|
|
5417
|
Which of the following statements is not true
|
|
5418
|
When should testing be stopped?
|
|
5419
|
IEEE 829 test plan documentation standard contains all of the following except
|
|
5420
|
Regression testing should be performed: v) Every week w) After the software has changed x) As often as possible y) When the environment has changed z) When the project manager says
|
|
5421
|
Which of the following is not a white box technique?
|
|
5422
|
Error guessing is a:
|
|
5423
|
In order to control cost, defects should ideally be detected in which phase:
|
|
5424
|
Which of the following is not a Software Development Life Cycle Phase?
|
|
5425
|
Unit testing is done by:
|
|
5426
|
A program with high cyclometic complexity is likely to be:
|
|
5427
|
Beta Testing is done at:
|
|
5428
|
Testing of software with actual data and in actual environment is known as?
|
|
5429
|
Which of the following is the component test standard?
|
|
5430
|
What is Fault Masking?
|
|
5431
|
White-box testing can be started:
|
|
5432
|
Which is not a type of incremental testing approach?
|
|
5433
|
Exhaustive testing is:
|
|
5434
|
Static analysis can be best described as:
|
|
5435
|
Which of the following is not a Test Type?
|
|
5436
|
The technique applied for usability testing is:
|
|
5437
|
Which is not the other name for structural testing?
|
|
5438
|
Test cases are designed during which of the following stages?
|
|
5439
|
What is “V†Model?
|
|
5440
|
The order in which test levels are performed is:
|
|
5441
|
During which test activity could faults be found most cost effectively?
|
|
5442
|
Verification is:
|
|
5443
|
A Plan to overcome the risk called as
|
|
5444
|
Which of the following is NOT a static testing technique?
|
|
5445
|
The name of the testing which is done to make sure the existing features are not affected by new changes
|
|
5446
|
Testing beyond normal operational capacity is __________
|
|
5447
|
The inputs for developing a test plan are taken from
|
|
5448
|
End result of Software Requirement Analysis is ________
|
|
5449
|
In white box testing what do you verify?
|
|
5450
|
When an expected result is not specified in test case template then ___________
|
|
5451
|
For testing …………….. may involve ensuring all items of testware are identified, version controlled, tracked for changes, related to each other and related to the development items, so that traceability can be maintained throughout the test process.
|
|
5452
|
In a risk-based approach, the risks identified may be used to i) Determine the test techniques to be employed. ii) Determine the extent of testing to be carried out. iii) Prioritize testing in an attempt to find the critical defects as early as possible. iv) Determine whether and testing activities could be employed to reduce risk.
|
|
5453
|
……………. provide developers and other parties with feedback about the problem to enable identification, isolation, and correction as necessary.
|
|
5454
|
Details of the incident report include which of the following. i) Date of issue, issuing organization and author ii) Expected and actual results iii) Priority to fix iv ) Conclusions, recommendations and approvals
|
|
5455
|
Select the risks that fall under project risks. i) Problems in defining the right requirements. ii) Test environment not ready on time iii) Poor software characteristics
|
|
5456
|
Which of the following risk does NOT include product risks in software testing?
|
|
5457
|
The purpose of …………………. is to establish and maintain the integrity of the products of the software or system through the project and product lifecycle.
|
|
5458
|
The purpose of ……………… is to provide feedback and visibility about test activities.
|
|
5459
|
. ……………. is concerned with summarizing information about the testing endeavor.
|
|
5460
|
……………. describes any guiding or corrective actions taken as a result of information and metrics gathered and reported.
|
|
5461
|
…….. are used on those in which test coverage is driven primarily by the advice and guidance of technology and/or business domain experts outside the test team.
|
|
5462
|
………… are used on stochastic testing using statistical information about failure rates or usage.
|
|
5463
|
………… are used for risk-based testing where testing is directed to areas of greatest risk.
|
|
5464
|
Which of the following are typical exit criteria for testing? i) costs ii) Schedules such as those based on time to market iii) Test environment availability and readiness iv) Estimates of defect density or reliability measures.
|
|
5465
|
Which of the following are typical entry criteria for testing? i) Test data availability ii) Testable code availability iii) Costs iv) Test tool readiness in the test environment.
|
|
5466
|
Which of the following are the tasks performed by the typical tester? i) Review tests developed by others ii) Decide on the implementation of the test environment iii) Prepare and acquire test data
|
|
5467
|
State whether the following statements about different test positions are True or False. i) The test manager plans testing activities and chooses the tools and controls to be used. ii) The test manager plans organize and control the testing activities while the tester specifies and executes tests.
|
|
5468
|
Which of the following are the typical tasks should be performed by test leader? i) Prepare and acquire test data ii) Write or review a test strategy iii) Write test summary reports based on the information gathered during testing. iv) Review and contribute to test plans
|
|
5469
|
Which of the following are the drawbacks of independent testing? i) Independent tester cannot verify assumptions people made during specification and implementation of the system. ii) Independent testers are isolated from the development team. iii) Independent testers may be seen as a bottleneck or blamed for delays in release.
|
|
5470
|
Which of the following is a possible benefit of independent testing?
|
|
5471
|
The oracle assumption:
|
|
5472
|
Given the following sets of test management terms (v-z), and activity descriptions (1-5), which one of the following best pairs the two sets? v – Test control w – Test monitoring x – Test estimation y – Incident management z – Configuration control 1 – Calculation of required test resources 2 – Maintenance of record of test results 3 – Re-allocation of resources when tests overrun 4 – Report on deviation from test plan 5 – Tracking of anomalous test results
|
|
5473
|
A program with high cyclometic complexity is almost likely to be:
|
|
5474
|
Increasing the quality of the software, by better development methods, will affect the time needed for testing (the test phases) by:
|
|
5475
|
Alpha testing is:
|
|
5476
|
Integration testing in the small:
|
|
5477
|
Which of the following characterizes the cost of faults?
|
|
5478
|
Which one of the following statements about system testing is NOT true?
|
|
5479
|
Which of the following is NOT true of test coverage criteria?
|
|
5480
|
What is the main difference between a walkthrough and an inspection?
|
|
5481
|
Which of the following is NOT a white box technique?
|
|
5482
|
A test harness is a
|
|
5483
|
Pick the best definition of quality
|
|
5484
|
The oracle assumption:
|
|
5485
|
To test a function, the programmer has to write a _________, which calls the function to be tested and passes it test data.
|
|
5486
|
Which is not the fundamental test process
|
|
5487
|
The cost of fixing a fault:
|
|
5488
|
Poor software characteristics are
|
|
5489
|
Which of the following is a requirement of an effective software environment? I. Ease of use II. Capacity for incremental implementation III. Capability of evolving with the needs of a project IV. Inclusion of advanced tools
|
|
5490
|
Enough testing has been performed when:
|
|
5491
|
Error guessing is best used:
|
|
5492
|
From the below given choices, which one is the Confidence testing
|
|
5493
|
Test cases are designed during:
|
|
5494
|
One Key reason why developers have difficulty testing their own work is :
|
|
5495
|
The difference between re-testing and regression testing is:
|
|
5496
|
Which of the following functions is typically supported by a software quality information system? I. Record keeping II. System design III. Evaluation scheduling IV. Error reporting
|
|
5497
|
How much testing is enough?
|
|
5498
|
Independent Verification & Validation is
|
|
5499
|
When should we stop testing?
|
|
5500
|
When should we run regression tests? Choose TWO Answers.
|
|
5501
|
Non-functional system testing includes:
|
|
5502
|
When what is visible to end-users is a deviation from the specific or expected behavior, this is called:
|
|
5503
|
What statement about expected outcomes is FALSE:
|
|
5504
|
In practice, which Life Cycle model may have more, fewer or different levels of development and testing, depending on the project and the software product. For example, there may be component integration testing after component testing, and system integration testing after system testing.
|
|
5505
|
The most important thing about early test design is that it:
|
|
5506
|
Which of the following requirements is testable?
|
|
5507
|
Which of the following should NOT normally be an objective for a test?
|
|
5508
|
Which one of the following are non-functional testing methods?
|
|
5509
|
Which is not a test Oracle
|
|
5510
|
A failure is:
|
|
5511
|
Which is not a testing principle
|
|
5512
|
Which of these activities provides the biggest potential cost saving from the use of CAST?
|
|
5513
|
Consider the following statements about early test design: i. early test design can prevent fault multiplication ii. faults found during early test design are more expensive to fix iii. early test design can find faults iv. early test design can cause changes to the requirements v. early test design takes more effort
|
|
5514
|
Which of the following is true of the V-model?
|
|
5515
|
Which one of the following describes the major benefit of verification early in the life cycle?
|
|
5516
|
Is JMeter a Web based Software Application?
|
|
5517
|
Does Cucumber Supports BDD Framework?
|
|
5518
|
….Tool is for Agile Testing and DevOps teams to deliver quality software faster?
|
|
5519
|
…..is not a Configuration Management Tool?
|
|
5520
|
…..is not a Commercial Tool?
|
|
5521
|
…..is not an Open Source Tool?
|
|
5522
|
…..is not a Test Tool?
|
|
5523
|
Does UFT Supports Desktop Application Testing?
|
|
5524
|
……doesn’t supports Database Testing?
|
|
5525
|
Cucumber supports to write…..?
|
|
5526
|
JMeter doesn’t Support…..?
|
|
5527
|
UFT Doesn’t Supports Database Testing?
|
|
5528
|
…….is not a Performance Test Tool?
|
|
5529
|
…….is a Defect Management Tool?
|
|
5530
|
……..is not a Test Management Solution?
|
|
5531
|
IBM – RPT Supports….?
|
|
5532
|
Selenium IDE Supports Java for writing Test Scripts?
|
|
5533
|
Selenium supports Python Programming for writing Test Scripts?
|
|
5534
|
…….Supports Web Services Testing?
|
|
5535
|
Appium doesn’t support……?
|
|
5536
|
Which of the following a static analysis doesn’t find?
|
|
5537
|
Which of the following statements relates more closely to the cost of fixing a fault?
|
|
5538
|
Which of the following activities doesn’t befall during system testing?
|
|
5539
|
Which of the following is a valid difference between re-testing and regression testing?
|
|
5540
|
Whether reviews or inspections are part of testing and why?
|
|
5541
|
Which of the following statements is not correct in the context of performance testing?
|
|
5542
|
Which of the following testing types is done in-house before the launch of a software?
|
|
5543
|
Which of the following is best suited to find the Unreachable code?
|
|
5544
|
Which of the following statements is the central point for the acceptance testing?
|
|
5545
|
What is the goal of test fulfillment criteria in a test plan?
|
|
5546
|
Which of the following items need not be included in the defect report?
|
|
5547
|
Who should first use a testing tool which your team has purchased recently?
|
|
5548
|
Which of the following tasks is critical for test planning?
|
|
5549
|
Which of the following standards defines the testing terms?
|
|
5550
|
Which of the following statements is related to Expected results?
|
|
5551
|
Which of the following statements is true for Beta testing to take place?
|
|
5552
|
Which of the following statements is related to Error guessing?
|
|
5553
|
Which of the following is a valid indicator of the test progress?
|
|
5554
|
Which of the following items isn’t a Standard part of the Test Plan document?
|
|
5555
|
Which of the following actions a Test manager shouldn’t allow?
|
|
5556
|
User Acceptance testing is
|
|
5557
|
The number of defects in a particular software is given by which metric?
|
|
5558
|
Which of the following is not a level in CMM?
|
|
5559
|
In which model functional expertise can be used to estimate cost?
|
|
5560
|
Quality Control is a validation technique whereas Quality Assurance is a verification technique
|
|
5561
|
Which of the following is not a white box testing technique
|
|
5562
|
Code inspection of a program is a dynamic testing technique
|
|
5563
|
Which of the following is not a black-box testing technique?
|
|
5564
|
Which of the following techniques does not require the understanding of internal data structures and algorithms?
|
|
5565
|
Histogram refers to
|
|
5566
|
Defects are less costly if detected in which of the following phases?
|
|
5567
|
Which of the following acceptance testing is done prior to a new build?
|
|
5568
|
Which of the following is not a cost of quality?
|
|
5569
|
Which of the following defect attribute denotes the order in which defects need to be fixed?
|
|
5570
|
Which of the following verifies the product rather than the process?
|
|
5571
|
Comparing processes or products against best practices with the goal of improvement is
|
|
5572
|
Exit criteria in test plan mentions
|
|
5573
|
Relation between two variables over time is given by
|
|
5574
|
Which of the following statements about reviews is true?
|
|
5575
|
Which of the following would NOT normally form part of a test plan?
|
|
5576
|
We split testing into distinct stages primarily because:
|
|
5577
|
Which of the following uses Impact Analysis most?
|
|
5578
|
Expected results are:
|
|
5579
|
A typical commercial test execution tool would be able to perform all of the following, EXCEPT:
|
|
5580
|
What can static analysis NOT find?
|
|
5581
|
Functional system testing is:
|
|
5582
|
Given the following code, which statement is true about the minimum number of test cases required for full statement and branch coverage? Read p Read q IF p+q > 100 THEN Print "Large" ENDIF IF p > 50 THEN Print "p Large" ENDIF
|
|
5583
|
What is the purpose of a test completion criterion?
|
|
5584
|
Which of the following tools would you use to detect a memory leak?
|
|
5585
|
Which of the following is NOT a type of non-functional test?
|
|
5586
|
Regression testing should be performed: v) every week w) after the software has changed x) as often as possible y) when the environment has changed z) when the project manager says
|
|
5587
|
If the pseudo code below were a programming language ,how many tests are required to achieve 100% statement coverage? 1.If x=3 then 2. Display_messageX; 3. If y=2 then 4. Display_messageY; 5.Else 6.Display_messageZ; 7.Else 8.Display_messageZ;
|
|
5588
|
What is the important criterion in deciding what testing technique to use?
|
|
5589
|
When should you stop testing?
|
|
5590
|
Coverage measurement
|
|
5591
|
Increasing the quality of the software, by better development methods, will affect the time needed for testing (the test phases) by:
|
|
5592
|
An incident logging system
|
|
5593
|
Testware(test cases, test dataset)
|
|
5594
|
A test design technique is
|
|
5595
|
Which is not true-The black box tester
|
|
5596
|
The later in the development life cycle a fault is discovered, the more expensive it is to fix. why?
|
|
5597
|
In which order should tests be run?
|
|
5598
|
When reporting faults found to developers, testers should be:
|
|
5599
|
which of the following statements is not true
|
|
5600
|
What is the main reason for testing software before releasing it?
|
|
5601
|
Faults found by users are due to:
|
|
5602
|
Software testing activities should start
|
|
5603
|
______________ is not a Test Management Tool?
|
|
5604
|
______________ is not a Bug Tracking Tool?
|
|
5605
|
______________ is not a Performance Test Tool?
|
|
5606
|
__________ is an Advantage of Selenium WebDriver?
|
|
5607
|
_________ is the use of Firebug in Selenium?
|
|
5608
|
Selenium IDE supports__________Browser only to create and execute Test Cases.
|
|
5609
|
_________ supports Parallel Test Execution
|
|
5610
|
Data classification is done by which type of Decision Tree?
|
|
5611
|
Assertion Testing is _________ .
|
|
5612
|
What is the order of Priority Testing?
|
|
5613
|
Cyclomatic Complexity cannot be applied in _______ .
|
|
5614
|
Which coupling should be avoided in software?
|
|
5615
|
Minimum of four test data are available in ______ .
|
|
5616
|
First component of the DFD is ______ .
|
|
5617
|
Difference between Retesting and Regression Testing is _________ .
|
|
5618
|
______ is an existing defect that has not yet caused a failure because the conditions that is required to invoke the defect is not meet.
|
|
5619
|
Top-down Design does not require ______ .
|
|
5620
|
Which testing cannot be performed by QA Team?
|
|
5621
|
STLC is related to which model?
|
|
5622
|
Defects can be found more easily in ________ .
|
|
5623
|
Focus Testing comes under ______.
|
|
5624
|
Which is not true in case of Unit Testing?
|
|
5625
|
Which of the following is / are not a Iterative Model?
|
|
5626
|
____________ is done by suddenly increasing the load for a small period of time and observing the behavior of the system.
|
|
5627
|
Test plans are based on _______.
|
|
5628
|
Which is not a part of Decision Table?
|
|
5629
|
Component Drivers are not needed for ______.
|
|
5630
|
Coupling and Cohesion is explained by _______ .
|
|
5631
|
Which is not true in case of Sanity Testing?
|
|
5632
|
Confidence Testing refers to ________.
|
|
5633
|
Which of the following is / are not part of Specification Based Testing?
|
|
5634
|
Which testing application security has the purpose to prevent problems which may affect the application integrity and stability?
|
|
5635
|
What is the ratio of effort needed to fixing a defect in Requirement Phase, Design Phase, Coding Phase and Implementing Phase?
|
|
5636
|
Which is not Data Driven Testing?
|
|
5637
|
Pesticide Paradox principle of testing says that ______________.
|
|
5638
|
Which is not true in case of Soak Testing?
|
|
5639
|
Which of the following is / are true regarding Catastrophic Defect?
|
|
5640
|
White Box Testing is not concern with _________.
|
|
5641
|
Which is not a part of Specification Testing?
|
|
5642
|
The Cyclomatic number theory in a graph is defined by ________.
|
|
5643
|
________ calls the function and passes it test data.
|
|
5644
|
Which debugging technique is most used for debugging in small software?
|
|
5645
|
__________ exercises the full functionality of a product but does not test features in detail.
|
|
5646
|
Which is not true regarding Spiral Model?
|
|
5647
|
Which is not true regarding Smoke and Sanity Testing?
|
|
5648
|
Which testing enables the tester to evaluate the software behaviour when exceptions occur?
|
|
5649
|
Which is not true in context of Decision Tree?
|
|
5650
|
Which testing is performed with Planning and Documentation?
|
|
5651
|
Which testing cannot be performed on first build of the software?
|
|
5652
|
Which testing focuses on heavily testing of one particular module?
|
|
5653
|
7n test cases are generated in which case of Boundary Value Analysis?
|
|
5654
|
A tester is executing a test to evaluate and it complies with the user requirement for a certain field be populated by using a dropdown box containing a list of values, at that time tester is performing __________ .
|
|
5655
|
Which of the following is / are not use for the Usability Improvement of the website?
|
|
5656
|
Test cases are created in which phase?
|
|
5657
|
Which is not true?
|
|
5658
|
The expected results of the software is _________________.
|
|
5659
|
Testing beyond normal operational capacity is __________.
|
|
5660
|
Verification and Validation uses __________.
|
|
5661
|
Which Testing is performed first?
|
|
5662
|
Bug status is set to postpone due to ________.
|
|
5663
|
End result of Software Requirement Analysis is ________.
|
|
5664
|
A test technique that involves testing with various ranges of valid and invalid inputs of a particular module or component functionality extensively is ___________.
|
|
5665
|
When an expected result is not specified in test case template then ___________.
|
|
5666
|
Requirement Engineering is not concern with ____________.
|
|
5667
|
Do you agree project management is an isolated discipline being used by only a few specific industry sectors?
|
|
5668
|
If you are only allowed one tool to manage a project, which of the following would you choose?
|
|
5669
|
What most distinguishes projects from day-to-day operation?
|
|
5670
|
Why is Habbitat for Humanity different from other international projects of it's kind?
|
|
5671
|
Why was Glasgow Caledonian Universitys New York Campus unsuccessful
|
|
5672
|
What was the main reason for the failure of the Daimler-Chrysler merger?
|
|
5673
|
"This revolves around the degree to which societies can exercise control over their impulses and desires." Is which Cultural Dimension from Hofstedes Theory?
|
|
5674
|
"This dimension expresses the degree at which less powerful members of society accept and expect the fact power is distributed unequally." Is which Cultural Dimension from Hofstedes Theory?
|
|
5675
|
Which one of these is NOT a cost of utilising technology?
|
|
5676
|
Projects in warmer climates may mean the project manager has to plan around the heat and humidity that could occur. What kind of project management challenge is this?
|
|
5677
|
What project management factor is “Ramadan and Eid and daily prayer times in certain counties need to be consideredâ€
|
|
5678
|
A way of identifying cultural differences was created by which psychologist:
|
|
5679
|
International projects often face many sharp changes. The reasons are often due to the large competition on global markets, and that there are many parties involved within the project is an example of what project management challenge?
|
|
5680
|
Operating using different currencies along with taxation issues, local inflammation rates, profit repatriation problems are an example of which international project characteristic?
|
|
5681
|
____________ deal with dedicated areas they manage on behalf of the project manager.
|
|
5682
|
_________ is the group (or individual) using the capital of the owner in order to produce the product/service or results the owner would like to have
|
|
5683
|
"These organisations are involved in large and small scale operations around the world to help make a difference globally" is an example of which international project operation?
|
|
5684
|
Which of the following is true of Practice Tests
|
|
5685
|
The lessons learned register is which of the following?
|
|
5686
|
The Scope Baseline is described correctly by which of the following?
|
|
5687
|
What is CPI?
|
|
5688
|
What is Earned Value Management
|
|
5689
|
Which is true of the PMI Code of Ethics and Professional Conduct?
|
|
5690
|
Net Present Value is correctly described by which of the following?
|
|
5691
|
Which of the following is an Enterprise Environmental Factor
|
|
5692
|
In Maslow's hierarchy of needs, self-actualization means self-fulfillment, growth and:
|
|
5693
|
In which motivation theory do hygiene factors play a part?
|
|
5694
|
Out puts from the initiation process includes:
|
|
5695
|
As the project manager you will be required to report periodically to upper management on the progress of the project. What item below will you require to report your progress as the basis for the budget ,schedule ,resource allocation and scope definition.
|
|
5696
|
You have negotiated a major deliverable with a contractor several of your colleagues have utilized in the past without problems. Its is critical the contactor meet the December 4th deliverable.this is an example of :
|
|
5697
|
What is the Delphi technique?
|
|
5698
|
Which of the following Human Resource process generates Roles & Responsibilities :
|
|
5699
|
Which of the following is not correct:
|
|
5700
|
Crashing, and Fast tracking are techniques used in the following process:
|
|
5701
|
Group brainstorming encourages all of the following except:
|
|
5702
|
Which of the following models of conflict resolution allows a cooling off period, but seldom resolves the issue in the long term?
|
|
5703
|
A Project Manager is at the project kick-off meeting. He confidently states the vision and mission for the project. This PM is exhibiting the following leadership style:
|
|
5704
|
The terms of union contracts are considered ______________ in your project plan.
|
|
5705
|
When is the BEST time to have project kickoff meetings?
|
|
5706
|
Which of the following is NOT a characteristic of the Project Management Plan?
|
|
5707
|
You are managing a software project. During a walkthrough of newly implemented functionality, your team shows you a new feature that they have added to help make the workflow in the product easier for your client. The client didn’t ask for the feature, but it does look like it will make the product easier to use. The team developed it on their own time because they wanted to make the client happy. You know this change would never have made it through change control. What is this an example of?
|
|
5708
|
You are the project manager for a railroad construction project. Your sponsor has asked you for a forecast for the cost of project completion. The project has a total budget of $80,000 and CPI of .95. The project has spent $25,000 of its budget so far. How much more money do you plan to spend on the project?
|
|
5709
|
Which of the following is NOT an input to Perform Quality Control?
|
|
5710
|
Which is the BEST definition of quality?
|
|
5711
|
Which of the following is not a tool or technique of the Perform Quality Control process?
|
|
5712
|
Which enterprise environmental factor defines how work is assigned to people?
|
|
5713
|
In which plan do you define the processes that will be used to keep people informed throughout the project?
|
|
5714
|
When are the most expensive defects most likely to be introduced into a product?
|
|
5715
|
Which is the BEST definition of quality?
|
|
5716
|
When do you perform stakeholder analysis?
|
|
5717
|
Which of the following is NOT a source of information about specific project constraints and assumptions?
|
|
5718
|
Adam is a project manager on a software development project. About halfway through development, his team found that they had not estimated enough time for some of the technical work they needed to do. He requested that the new work be added to the scope statement and that the time to do the work be added to the schedule. The change control board approved his change. What’s his next step?
|
|
5719
|
Which of the following shows roles and responsibilities on your project?
|
|
5720
|
Which of the following is NOT true of obtaining project plan approval?
|
|
5721
|
Which of the following is not a feature of a project?
|
|
5722
|
Your IT Company is responsible for making software virus programs. You are responsible for managing both individual product releases and co-ordination of multiple released over time. Your role is that of a :
|
|
5723
|
What are the 4 stages of team development?
|
|
5724
|
Which type of leadership is best suited for optimizing team performance in projects?
|
|
5725
|
All of the following are contract types except:
|
|
5726
|
A narrative description of products or services to be supplied under contract is called ?
|
|
5727
|
A Project manager would find team development the most difficult in which form of organization ?
|
|
5728
|
Which of the following contracts should you use for projects that have a degree of uncertainty and require a large investment early in the project life cycle?
|
|
5729
|
What is one of the most important skills a project manager can have?
|
|
5730
|
Project managers have the highest level of authority and the most power in which type of organizational structure?
|
|
5731
|
Project managers have to assess the risks that may affect a project.
|
|
5732
|
An independent relationship must exist between the attribute that can be measured and the external quality attribute.
|
|
5733
|
Identify the sub-process of process improvement
|
|
5734
|
Which of the following is incorrect activity for the configuration management of a software system?
|
|
5735
|
Quality planning is the process of developing a quality plan for
|
|
5736
|
Which of the following is/are main parameters that you should use when computing the costs of a software development project?
|
|
5737
|
A 66.6% risk is considered as
|
|
5738
|
The process each manager follows during the life of a project is known as
|
|
5739
|
Which of the following is not considered as a risk in project management?
|
|
5740
|
Which of the following is not project management goal?
|
|
5741
|
Which of the following activities are involved during the administrative closure of a project?
|
|
5742
|
Adam is managing a new project, and he has spent several days meeting with key project resources to review his procurements. What project process is Adam involved with if he tells his project team to close all inventory and contract management records to update the final procurement results?
|
|
5743
|
In order to ensure that all project deliverables are complete during project closure, a project manager needs to measure prior information from the previous phase closures. From the following list, select the documents the project manager would use and review to measure project scope and ensure completion of deliverables before considering the project closed.
|
|
5744
|
Dora has just taken over an IT project. This project was terminated six months ago due to a shortage of funds and resources. Dora wants to determine the reasons for the fund shortage as well as the situation with the incomplete deliverables. Of the following documents, which should Dora examine in order to determine the facts about her project?
|
|
5745
|
In a crime prevention software development project for a municipal organization, a steering committee is responsible for approving all deliverables before they are transferred to operations. This steering committee is made up of directors from three different municipal agencies. If the steering committee approves the transfer of deliverables with a 2-1 vote, which of the following statements is correct?
|
|
5746
|
Wilma is examining the data on her control chart. It shows four consecutive points above +3 sigma and three subsequent points below -3 sigma. If the lower and upper control limits are set at +-3 sigma, what should Wilma report as the status of the process?
|
|
5747
|
Which of the following processes describes the collection, measurement and distribution of performance information, and measuring the health of the project to identify project areas that require corrective or preventive actions?
|
|
5748
|
John has just finished the requirements documentation including the deliverable acceptance criteria to determine the success of the project in terms of the deliverables produced. A series of tasks are included in the criteria. Both John and the customer must perform this series of tasks in order to complete the acceptance and sign-off the final deliverables. Which of the following project processes would use these criteria to provide formal acceptance of the deliverables?
|
|
5749
|
Ryan Systems is in the 3rd week of a 5-week project to consolidate all of its data servers to a central location in its new data center. The amount of money spent on this project to date is approximately $80,000. The planned value for the move as of the 3rd week is $50,000. What is the status of the project at this time? Over budget
|
|
5750
|
If one standard deviation is equal to 0.02, what is the upper control limit in a control chart if the upper control limit is set at +2 Sigma?
|
|
5751
|
During project execution, the planned value, earned value and the actual cost all have identical values. In this scenario, which of the following statements best describes the status of the project?
|
|
5752
|
Clifford is managing a project to build non-nuclear components for nuclear weapons. His project team consists of scientists, engineers, designers, and technical experts with extensive backgrounds in their fields. In an effort designed to create a degree of trust among team members, Clifford has initiated a kickoff meeting with all team members. During this meeting, Clifford wants to clarify the project objective and learn about each team member's interests and levels of influence. In addition, he needs to assign the roles and responsibilities for each team member. In this scenario, Clifford's team is in which of the following stages?
|
|
5753
|
Earned value analysis can be used for measuring the project performance. Project managers use this analysis to plan for risks based on the actual cost, schedule and progress of the work. During the executing phase, if a project has negative values for the cost variance and the schedule variance, which of the following would most accurately represent the project's status?
|
|
5754
|
Project communication involves dissemination of information by various methods. Communication may be formal, informal, verbal, and nonverbal. Which of the following would define direct communication with peers?
|
|
5755
|
Which of the following are inputs to the Manage Stakeholder Engagement process?
|
|
5756
|
On a project schedule network diagram, leads and lags are used to define the relationships between activities. These leads and lags indicate either acceleration or delay, respectively, of the successor activity. If a team member on your project indicates FF+3 on the network diagram, what does that notation indicate?
|
|
5757
|
Earned Value (EV) for a new optic radar design project is calculated at $100,000 and the Actual Cost (AC) is $80,000. The Budget at Completion (BAC) is estimated at $200,000. What is the current CPI on this project?
|
|
5758
|
Earned Value (EV) for a new operating system design project is calculated at $300,000 and the Actual Cost (AC) is $280,000. The Budget at Completion (BAC) is estimated at $500,000. The project is progressing well from a budgetary point of view, since the CPI value is greater than one. What is the Estimate at Completion (EAC) if the future work of the project is performed at the budgeted rate?
|
|
5759
|
Which of the following are inputs to the Develop Project Management Plan process?
|
|
5760
|
In situations involving a large number of ideas on requirements provided by various stakeholders, a project manager must sort, review and analyze those ideas. Which of the following tools can be utilized to accomplish this?
|
|
5761
|
Stakeholder management is a critical aspect of managing a project. In order to manage stakeholder expectations, the project manager must come up with a strategy. One technique that can be used to develop this strategy is the ______________________.
|
|
5762
|
An office furniture manufacturing company has initiated a project to computerize and automate some of their manufacturing process systems. The manufacturing personnel are not happy with this idea, and they are afraid they may lose their jobs because of the automation. As the project manager, what would your first step be?
|
|
5763
|
In a phased project, phase end meetings are used to sign-off on the deliverables associated with that phase. These phase end points typically provide a good opportunity to evaluate the progress and performance in that phase. Which of the following terms is synonymous for phase end?
|
|
5764
|
Since the levels of both cost and risk vary throughout the project life cycle, which of the following statements is true?
|
|
5765
|
Dave is managing a new project to create a radio-operated model plane. The project budget is set at $200,000 and the project must be completed within six months of the starting date. The initial document authorizing this project and giving Dave the authority to apply organizational resources to the project activities is called _______________.
|
|
5766
|
You are three months into a six month project. Assume the budget burn rate is constant. The budget at completion (BAC) is $120,000. AC = $65,000. The SPI = 1.2. What is the CPI of this project? (Round to 2 decimal places)
|
|
5767
|
Several stakeholders on the project have been questioning the effectiveness of some of the technical team. While the work is proceeding according to plan, some of the stakeholders are not satisfied with the work delivered to date, even though it meets requirements specifications. You have held several meetings with the stakeholders to try to get to the root cause of the problem. With some of the technical team present at these meetings, it becomes obvious that some of the stakeholders have had great difficulty in describing what they want. As a result, some of the delivered product doesn't meet stakeholder expectations. Currently your CPI is 1.3 and the SPI is .89. What is your largest concern right now?
|
|
5768
|
Management Contingency Reserve is identified in which process
|
|
5769
|
A particular project in the domain of civil construction requires that every on-site worker be insured. Which of the following inputs BEST conveys this requirement to the Cost Estimation process so that the insurance cost is estimated and subsequently budgeted?
|
|
5770
|
CPI is 1.2, SPI is 1.1. Four months later CPI is.91 and SPI is .86. The most likely reason for this change is:
|
|
5771
|
You are having a discussion with the key stakeholder about the best estimating method to use for the upcoming project. You argue for what provides the best team buy-in, while your stakeholder argues for a bottom-up estimate. What is the real issue?
|
|
5772
|
What is a basis of estimate and how does it apply to Earned Value calculations?
|
|
5773
|
Which of the following is not needed to generate a schedule performance index (SPI)?
|
|
5774
|
Cost variance is computed by
|
|
5775
|
Reserve Analysis involves:
|
|
5776
|
Your team is reviewing the project activities and has started to estimate the durations of the work packages identified in the WBS. Some of these work packages and activities have significant uncertainty associated with them for which the team has created contingency buffers. The tool and technique that is used for this process is called:
|
|
5777
|
The customer has demanded that you reduce the schedule by three weeks. What does this mean in terms of the Project schedule?
|
|
5778
|
The customer has asked that you reduce activity D by 2 weeks. What impact does this have on the schedule?
|
|
5779
|
What is the critical path of the network described above?
|
|
5780
|
Your project has produced an optimistic estimate of 25 weeks, a pessimistic estimate of 95 weeks, and a calculated PERT of 40 weeks. What is the range of completion of the project with a 95% confidence factor?
|
|
5781
|
Crashing a network schedule works only when________________________.
|
|
5782
|
The project optimistic estimate is 10 weeks and the pessimistic estimate is 40 weeks. What is the standard deviation of the estimate?
|
|
5783
|
Your project is experiencing resource constraints at certain times in the project timeline, requiring you to adjust start and finish dates on the schedule. What tool is best to use in this situation?
|
|
5784
|
The blueprints for the new construction projects have been completed and construction is ready to begin. While the organization was thinking about erecting a modular structure, they decided on a more traditional approach. The foundation will be poured and cured before the framing begins. This is an example of:
|
|
5785
|
When performing the scope control process, which of the following statements is correct?
|
|
5786
|
The validate scope process can occur at the end of the project or at the end of a project phase. What is used to validate the scope of the deliverables?
|
|
5787
|
Who creates the scope baseline?
|
|
5788
|
What is scope decomposition?
|
|
5789
|
Validate Scope defines a process that
|
|
5790
|
Work Performance Measurement is an output of which process:
|
|
5791
|
Which of the following can be BEST described as a characteristic of Work Package?
|
|
5792
|
Project Charter is an input to all of the following processes EXCEPT
|
|
5793
|
All of the below are inputs to Define Scope process EXCEPT
|
|
5794
|
Which of the following is not true about project charter?
|
|
5795
|
Your project team is well underway with the construction of the product of the project. Some of the work has progressed and some deliverables have been reviewed by key stakeholders. During a deliverables review, one of the stakeholders found a discrepancy in one of the deliverables that needed to be addressed immediately. The team reviewed the stakeholder’s issue and agreed that some action needed to be taken to bring the deliverable back into compliance. The best definition for this activity is called:
|
|
5796
|
The key output of Direct and Manage Project Work Process is which one of the following
|
|
5797
|
Which of the following is not included in a project charter?
|
|
5798
|
Which of the following is not a process in the Project Integration Management process group?
|
|
5799
|
The difference between a configuration management system and a change control system is?
|
|
5800
|
All of the following actions occur in the Direct and Manage Project Work process except which of the following?
|
|
5801
|
The project management plan is complete and is ready to be baselined. However, a key stakeholder just discovered a critical omission and requests an adjustment to the PM plan. What should you do next as the project manager?
|
|
5802
|
Which of the following is true about change requests that result in corrective or preventive actions?
|
|
5803
|
Which process formally authorizes the project?
|
|
5804
|
In the Monitoring and Controlling process group, one of the primary goals of that group is to monitor and control the project work. What is the second equally important, major goal of the monitoring and control process?
|
|
5805
|
The team has completed all design work and is ready to start creating a product of the project. There are construction and IT elements in this project, and the project manager has leaned heavily on the subject matter experts in the organization for their technical expertise and know-how. You have determined that some of the work needs to be contracted to an external vendor who has the necessary expertise to deliver what is needed for the project. You are in the process of selecting a vendor. What process group are you in?
|
|
5806
|
All the following happen in the Initiating process with the exception of:
|
|
5807
|
What is a synonym for 'progressive elaboration’?
|
|
5808
|
Processes that provide the project team with insight into the health of the project and identifies any area requiring additional attention are performed in _______________.
|
|
5809
|
Raw observations and measurements taking during the performance of project activities is defined by PMI as _____________________?
|
|
5810
|
You are a project manager in an organization with a strong PMO. One of the newly hired project managers told you that he has been a PMP® since 1998. While perusing the PMI website looking for some standards documentation, you happen to do a lookup on this person and find out that they are not in the PMI repository of PMP®s in good standing. What do you do?
|
|
5811
|
There are many reasons for creating a lessons learned document in a project. All of the following represent reasons why you would create a lessons learned document with the exception of:
|
|
5812
|
You are just initiating a project for your organization. Which of the following is a true statement regarding the Initiating process?
|
|
5813
|
The Planning process group touches all ten of the key knowledge areas in that planning has to occur in each of these areas. Which of the following is not part of the planning process?
|
|
5814
|
Validate Scope is part of what process group?
|
|
5815
|
Objectives of the DP process include ensuring the project has authority for which of these?
|
|
5816
|
Who approves the Project Initiation Documentation?
|
|
5817
|
The purpose of the Initiating a Project stage is which one of these?
|
|
5818
|
Who approves an End Project Report?
|
|
5819
|
What are the following objectives of? To obtain Project Board agreement on quality expectations To communicate agreed quality expectations to stakeholders To establish a baseline for the project's quality controls
|
|
5820
|
Which role has to be independent of the Project Manager?
|
|
5821
|
Which of these are in the four steps in product-based planning?
|
|
5822
|
Which of the following need not be included in a Product Description?
|
|
5823
|
Which of the following are event-driven controls?
|
|
5824
|
Define the operational environment into which the project must fit is part of what?
|
|
5825
|
Following is (are) the tool(s) for changing a process
|
|
5826
|
Controlling the changes in the project may affect
|
|
5827
|
“Devising and maintaining a workable scheme to accomplish the business need†is
|
|
5828
|
Following are the characteristics of Project Mindset.
|
|
5829
|
Following is (are) the component(s) of risk management
|
|
5830
|
Each component of the software product is separately estimated and the results aggregated to produce an estimate for the overall job.
|
|
5831
|
Tool used for comparison of the proposed project to complete projects of a similar nature whose costs are known.
|
|
5832
|
The entire process of a project may be considered to be made up on number of sub process placed in different stage called the
|
|
5833
|
In the initial stage of the project the probability of completing the project is ___ .
|
|
5834
|
The probability of completing the project can be estimated based upon the ____
|
|
5835
|
-Resorce requirement in project becomes constant while the project is in its _____ progress stage.
|
|
5836
|
Five dimensions that must be managed on a project
|
|
5837
|
Project performance consists of
|
|
5838
|
Design phase consist of
|
|
5839
|
Following are the phases of Project Management Life Cycle. Arrange them in correct order Design, 2. Marketing, 3. Analysis and evaluation, 4. Inspection, testing and delivery
|
|
5840
|
Following is(are) the responsibility(ies) of the project manager.
|
|
5841
|
The project life cycle consists of
|
|
5842
|
Developing a technology is an example of
|
|
5843
|
Resources refers to
|
|
5844
|
A ____ is a set of activities which are networked in an order and aimed towards achieving the goals of a project.
|
|
5845
|
Shenhar 's Second dimension of classification covers
|
|
5846
|
PM should build and maintain a solid
|
|
5847
|
A PM with reasonable technical competence seems to be associated with project
|
|
5848
|
PM learns by experience, but a wise PM learns from the
|
|
5849
|
At project completion phase, obstacles tend to be
|
|
5850
|
Breaking problems into smaller parts to understand parts better and solve problem is called
|
|
5851
|
PM must also make trade-offs between project progress and process, i.e.
|
|
5852
|
Environment of a system is defined as everything outside system that receives system outputs from it or delivers
|
|
5853
|
Shenhar (1998) classifies projects across dimensions of
|
|
5854
|
In process being managed, functional manager?s knowledge must be in the
|
|
5855
|
Incomplete information can blind PM to an incipient crisis, just as excessive information can desensitize PM to
|
|
5856
|
Functional manager uses analytic approach and PM uses the
|
|
5857
|
If a PM directs more than one project, he or she must make trade-offs between
|
|
5858
|
Running a project requires constant selling, reselling, and explaining project to
|
|
5859
|
Unique demand on a PM is acquiring adequate physical resources and
|
|
5860
|
PM must make trade-offs between project goals of ancillary goals and
|
|
5861
|
A person who helps people overcome problems regarding technical and functional issues is a
|
|
5862
|
During initialization, when project is being planned, most important goal of achievement is
|
|
5863
|
At design phase, project builds momentum, grows, and operates at
|
|
5864
|
Problematic cultural issues include group?s perception of time and manner of
|
|
5865
|
A single descriptor could be used to characterize project management, adjective would be
|
|
5866
|
PM must negotiate with functional department managers for desired
|
|
5867
|
In order to meet demands of job, project manager must be a highly skilled
|
|
5868
|
Functional managers have little or no direct responsibility for the
|
|
5869
|
If support of top-management is weak, future of project is clouded with
|
|
5870
|
A PM must be able to interpret technical needs and wants of client and senior management to the
|
|
5871
|
First credibility required by PM is known as
|
|
5872
|
Analytic approach is merely inadequate way for understanding
|
|
5873
|
Responsibility to parent organization is also a key role of
|
|
5874
|
Motivation among people problems are often less severe for
|
|
5875
|
A wide-ranging method for addressing problems that considers multiple and interacting relationships is called
|
|
5876
|
Project Manager is responsible for organizing, staffing, budgeting and
|
|
5877
|
From initiation of project to its termination, crises appear without
|
|
5878
|
Arranging finance, contracts, planning, procurement and quality is task done by
|
|
5879
|
Project manager should be more skilled at
|
|
5880
|
Maintaining a balanced, positive outlook among team members is a delicate job of
|
|
5881
|
Projects can rapidly get into deep trouble if team members hide their
|
|
5882
|
PMI updated and approved Code of Ethics for project managers in
|
|
5883
|
A system can be taken as a set of interrelated components that accepts inputs and generates outputs in a
|
|
5884
|
Every project on which PM has worked, whether as project manager or not, is a source of
|
|
5885
|
"corporate culture" within organization, or even project is known as
|
|
5886
|
At inception of project, "fires" tend to be associated with
|
|
5887
|
Adoption of systems approach is crucial for the
|
|
5888
|
Problem-oriented people tend to learn and adopt whatever problem-solving techniques appear
|
|
5889
|
Managers, who are administratively responsible for deciding how something will be done to accomplish task, are known as
|
|
5890
|
Projects are only as successful as degree to which project manager is an effective
|
|
5891
|
According to Shehnar, as system complexity increases from "assembly" to "system", style progresses from
|
|
5892
|
Precise nature of trade-offs varied depending on stage of project
|
|
5893
|
Demands of uniqueness in a PM concerned areas are
|
|
5894
|
A unique role of PM is to contrast it with that of a functional manager in charge of one of a firm?s functional departments such as
|
|
5895
|
Resources initially budgeted for a project are frequently
|
|
5896
|
Scope creep affect not only project but PM as well, to make trade-offs to keep project
|
|
5897
|
Discipline-oriented individuals tend to view problem through eyes of their
|
|
5898
|
A ratio to evaluate a proposed course of action is known as
|
|
5899
|
Great number of fairly small, short-term projects when managed by an experienced PM, serve a purpose
|
|
5900
|
Project success is dependent on support from parent organization's
|
|
5901
|
PM is responsible for project, but functional managers will probably make some of fundamental and critical
|
|
5902
|
It is assumed that in order to ensure creativity, professionals require
|
|
5903
|
Main obstacles clustered around Project completion phase includes
|
|
5904
|
Every decision PM makes limits scope of
|
|
5905
|
Project's success is result of a delicate balance of power between
|
|
5906
|
Functional manager should be more skilled at
|
|
5907
|
To be useful, PM's experience must be generalized and
|
|
5908
|
Nature of interrelationships between components in a system defines the
|
|
5909
|
Functional manager is a direct, technical supervisor, whereas project manager is
|
|
5910
|
A Code of Ethics for project managers was created by the
|
|
5911
|
Many firms have a wide variety of types and sizes of
|
|
5912
|
Most effective team members have high quality technical skills, Strong problem orientation and
|
|
5913
|
Projects require cooperation by individuals and groups of firm. However, geographical or organizations differences doesn't matter, but
|
|
5914
|
Analytic method focuses on breaking components of a system into
|
|
5915
|
A Code of Ethics for project managers was created by PMI in
|
|
5916
|
Second set of trade-offs concerns sacrificing smoothness of running project team for
|
|
5917
|
Compared to a functional manager, a PM is a
|
|
5918
|
Best person to select as PM is one who will get the
|
|
5919
|
PM needs credibility of kinds:
|
|
5920
|
An alternative plan for action if expected result fails to materialize is known as
|
|
5921
|
An ability to put many pieces of a task together to form a coherent whole, is job of
|
|
5922
|
At project completion phase, obstacles tend to be clustered mainly around
|
|
5923
|
Shenhar 's first dimension of classification covers
|
|
5924
|
Project environment includes economic, political, legal, and
|
|
5925
|
A project manager in public sector, may easily become embroiled in ethics concerning issues as
|
|
5926
|
Second credibility required by PM is known as
|
|
5927
|
Changes in required project performance is better known as
|
|
5928
|
Institutions of a culture make up society's
|
|
5929
|
PMP stands for
|
|
5930
|
Everything outside system that delivers inputs or receives outputs from system is known as
|
|
5931
|
In a highly structured social class society, it is difficult to practice
|
|
5932
|
PM should adopt a systems approach to
|
|
5933
|
Language is a particularly critical aspect of
|
|
5934
|
Microcultures are to differentiate corporate from broader national or
|
|
5935
|
Boundary of inputs and outputs differentiates system from its
|
|
5936
|
Most of people needed for a project must be "borrowed." by PM from
|
|
5937
|
Key to solving a problem is that PM should make open communications between PM and team members about
|
|
5938
|
On international projects, PM (or PM?s senior management) can expect to deal with bureaucracy at
|
|
5939
|
At project completion phase, high-priority goal is
|
|
5940
|
Common characteristics of effective project team members includes high-quality technical skills, political sensitivity and
|
|
5941
|
Technical plans to accomplish project have been translated into a
|
|
5942
|
Need to preserve some balance between project time, cost, and performance is in
|
|
5943
|
Technology of a culture includes such things as the
|
|
5944
|
PM must perceive sufficient technical knowledge to
|
|
5945
|
Projects provide an excellent growth environment for future executives and for developing
|
|
5946
|
Just like cultures, microcultures may vary from
|
|
5947
|
PM will also be involved in making choices that require balancing in
|
|
5948
|
Chances for successful completion of a multidisciplinary project are
|
|
5949
|
_________ control displays current directory with any sub directories and allows the user to change directly.
|
|
5950
|
__________ method is used to retrieve the stored text from the clipboard
|
|
5951
|
__________ is property is used to hide the content in textbox with some symbols.
|
|
5952
|
The __________ property is used in VB for maximum form at run time
|
|
5953
|
The _______ function returns a string stored in a variant data type.
|
|
5954
|
________ method is used to clear the contents of MSHFlexGrid control
|
|
5955
|
An object datatype can store _______ bytes.
|
|
5956
|
In visual basic the declaration of variables is done by _____ key word
|
|
5957
|
The ______ is a tool used for both the Input and output purpose.
|
|
5958
|
________ method removes a dialog box from view
|
|
5959
|
Form_Mouse Down( ) procedure is executed when any mouse button is clicked in a free area of the ______.
|
|
5960
|
Frame Control acts as a _________
|
|
5961
|
__________ statement enables us to trap runtime error.
|
|
5962
|
_______ indicates whether a particular condition is on or off.
|
|
5963
|
Extension of ActiveX designers ____________
|
|
5964
|
__________ displays current directory with any subdirectories and allows the user to change directory.
|
|
5965
|
The _________ allows direct exit from a For loop, Do loop, Sub procedure, or Function procedure.
|
|
5966
|
________ is a built in function to return lower bound of an array
|
|
5967
|
The default datatype for VB is ___________
|
|
5968
|
__________ do not return a value.
|
|
5969
|
__________ cannot be declared in a form or class module.
|
|
5970
|
A _______control in visual basic is used to create applications that present information in rows and columns.
|
|
5971
|
MDI stands for _________
|
|
5972
|
_______ control executes the timer events at specified intervals of time.
|
|
5973
|
A __________ variable is one that is declared inside a procedure.
|
|
5974
|
________ loop repeats a group of statements for each item in a collection of objects or for each element of an array.
|
|
5975
|
________ is the process of finding and removing errors
|
|
5976
|
The window in which the individual documents are displayed is called ____________window.
|
|
5977
|
_____ array size can be changed at run-time.
|
|
5978
|
________ function returns the intervals between two dates in terms of years, months or days.
|
|
5979
|
The ________ object is a stored query definition, which is a precompiled SQL statement.
|
|
5980
|
The code in an application can be broken into logical components by _______ process.
|
|
5981
|
__________ is a collection of files.
|
|
5982
|
The default property for a text box control is __________
|
|
5983
|
In visual basic ______ is the extension to represent project file.
|
|
5984
|
Variables are named storage locations in memory, the value of which does not change during program __________
|
|
5985
|
__________ is a data type that can be used to declare a text of maximum 10 million characters.
|
|
5986
|
The function procedures are ___________ by default.
|
|
5987
|
_________ is a method which moves the focus to the specified control or form.
|
|
5988
|
The variables that does not change the value during execution of program is ____
|
|
5989
|
__________ function is used to return a copy of a string without leading spaces
|
|
5990
|
In Visual Basic, a variable name cannot be more than __________ characters.
|
|
5991
|
________ is used for finding out about objects, properties and methods.
|
|
5992
|
Visual Basic is a tool that allows you to develop application in ______
|
|
5993
|
How to take request using get bmethod?
|
|
5994
|
In the Select Case statement, which case is used for unknown cases?
|
|
5995
|
Which browser has built-in support for executing VBScript?
|
|
5996
|
VBScript is developed by
|
|
5997
|
VBScript was launched in
|
|
5998
|
Extension of ActiveX designers
|
|
5999
|
Which VBScript function converts an input string to all lowercase?
|
|
6000
|
State whether the statement true or false. i) Function procedures are public by default. ii) Function procedure return values whereas sub procedures cannot return a value to the calling procedure.
|
|
6001
|
What does the Option Explicit directive do?
|
|
6002
|
Type casting in VB.Net is implemented by means of ____________ statement.
|
|
6003
|
Where to Put the VBScript code
|
|
6004
|
How will you trim the leading as well as trailing spaces of a string using VBScript?
|
|
6005
|
Every optional argument in the procedure definition must specify a _________ value which must be a constant expression.
|
|
6006
|
Windows Server AppFabric enables Web data caching for application data and provides managed services using ___________Foundation and Windows Communication.
|
|
6007
|
Which of the following can be used to create distributed systems based on SOA?
|
|
6008
|
Which of the following is used to negotiate the exchange of information between a client and the service?
|
|
6009
|
The _________ portion of Azure AppFabric is a claims access control system that provides a token-based trust mechanism for identity management.
|
|
6010
|
Which of the following was formerly called Microsoft .NET Services?
|
|
6011
|
A particular set of endpoints and its associated Access Control rules for an application is referred to as the _______________
|
|
6012
|
The ___________ method converts an OLE automation date value to a DateTime Instance.
|
|
6013
|
The member "clear" of the Array class that sets a range of array elements to zero, false or null reference is a _____________ method.
|
|
6014
|
The corresponding .Net FCL type for Short is ___________.
|
|
6015
|
Which of the following is a version of Hyper-V that runs on Windows Server 2008?
|
|
6016
|
Which of the following element in Azure stands for management service?
|
|
6017
|
Azure Storage plays the same role in Azure that ______ plays in Amazon Web Services.
|
|
6018
|
The _____ model does not offer a model for source code reuse.
|
|
6019
|
Which of the following element is a non-relational storage system for large-scale storage?
|
|
6020
|
Which of the following element allows you to create and manage virtual machines that serve either in a Web role and a Worker role?
|
|
6021
|
A _________ role is a virtual machine instance running the Microsoft IIS Web server that can accept and respond to HTTP or HTTPS requests.
|
|
6022
|
Which of the following web applications can be deployed with Azure?
|
|
6023
|
What does IPsec in the Azure platform refer to?
|
|
6024
|
Which of the following standard does Azure use?
|
|
6025
|
The ______________ method converts the value of this instance to a double representing the OLE automation date.
|
|
6026
|
Which of the following is a pure infrastructure play?
|
|
6027
|
The ___________is a systematic class framework used for the development of system tools and utilities.
|
|
6028
|
Azure is Microsoft’s ___________ as a Service Web hosting service.
|
|
6029
|
Which of the following is based on Microsoft Sharepoint?
|
|
6030
|
The _______________ class provides static methods to start, stop, or filter Windows messages in an application.
|
|
6031
|
Which of the following is based on Microsoft Dynamics?
|
|
6032
|
_________ are interactive objects that you place in dialog boxes or other windows to carry out user actions.
|
|
6033
|
_______ Live Services can be used in applications that run in the Azure cloud.
|
|
6034
|
Database marketplace based on SQL Azure Database is code-named ________
|
|
6035
|
The ______________________ group classes according to their common services.
|
|
6036
|
Which of the following is also known as Compute?
|
|
6037
|
The ___________________________________ does not describe inherited member functions, inherited operators, and overridden virtual member functions.
|
|
6038
|
Which of the following service creates an application hosting environment?
|
|
6039
|
A ___________ performs invisible tasks even if you write no code.
|
|
6040
|
Using a ________ variable does not enable us to create read-only properties that are often required by a class.
|
|
6041
|
Which of the following database should be used for a solution that has a very high availability?
|
|
6042
|
Amazon Relational Database Service is a variant of the _______ 5.1 database system.
|
|
6043
|
---------- is used to step through each line of code as it executes, including calls to other function?
|
|
6044
|
Which of the following can be considered as a distributed caching system?
|
|
6045
|
Which of the following is relational database service provided by Amazon? a) SimpleDB
|
|
6046
|
Data stored in __________ domains doesn’t require maintenance of a schema.
|
|
6047
|
Is the Class type in VB.NET a value type?
|
|
6048
|
CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.
|
|
6049
|
Which of the following is the best to retrieve Read-Only, Forward-only stream of data from database?
|
|
6050
|
Which of the following is also referred to edge computing?
|
|
6051
|
Which of the following is not the member of System.Collections?
|
|
6052
|
How do you limit implicit type conversion in VB.NET?
|
|
6053
|
Which of the following tool is used for measuring I/O of your systems to estimate these transaction costs?
|
|
6054
|
Which of the following statement is wrong about Amazon S3?
|
|
6055
|
Which of the following object is used by the DataAdapter to retrieve the data from database?
|
|
6056
|
Which of the following operation retrieves the newest version of the object?
|
|
6057
|
Which of the following can be done with S3 buckets through the SOAP and REST APIs?
|
|
6058
|
Which of the following namespaces is used to access "computer name" and its IP address in VB.NET?
|
|
6059
|
Amazon ______ cloud-based storage system allows you to store data objects ranging in size from
|
|
6060
|
Any project that compiles to an EXE or DLL files produces an assembly in .NET?
|
|
6061
|
How many EC2 service zones or regions exist?
|
|
6062
|
Which of the following is a batch processing application?
|
|
6063
|
Which of the following instance has an hourly rate with no long-term commitment?
|
|
6064
|
Which of the following is a method for bidding on unused EC2 capacity based on the current spot price?
|
|
6065
|
Which of the following instance class is best used for applications that are processor or compute-intensive?
|
|
6066
|
AMIs are operating systems running on the _____ virtualization hypervisor.
|
|
6067
|
________ is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
|
|
6068
|
Which of the following uses an authentication device?
|
|
6069
|
Which of the following provides access for developers to charge Amazon’s customers for their purchases?
|
|
6070
|
What is CTS?
|
|
6071
|
Which of the following allows merchants to fill orders through Amazon.com fulfillment service?
|
|
6072
|
Which of the following is Amazon’s technical support and consulting business?
|
|
6073
|
Which of the following provides a bridge between a company’s existing network and the AWS cloud?
|
|
6074
|
Which of the following Loop structure does not supported by VB.Net?
|
|
6075
|
Which language is not a true object-oriented programming language?
|
|
6076
|
he ______________ method converts the value of this instance to a double representing the OLE automation date.
|
|
6077
|
Which of the following is an entry point method of VB.NET program?
|
|
6078
|
The _________________ enable us to pass data between a program and a class.
|
|
6079
|
Microsoft Windows uses a GUI environment. GUI (pronounced "gooey") stands for _______
|
|
6080
|
Which of the following is an online backup and storage system?
|
|
6081
|
Which of the following metrics are used to support Elastic Load Balancing?
|
|
6082
|
Which of the following is not correct about the value types and reference types in VB.NET?
|
|
6083
|
Which of the following is a Web service that can publish messages from an application and deliver them to other applications or to subscribers?
|
|
6084
|
Which of the following feature is used for scaling of EC2 sites?
|
|
6085
|
_____ allow custom items of information about a program element to be stored with an assembly’s metadata.
|
|
6086
|
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2?
|
|
6087
|
Visual Studio .NET provides which feature:
|
|
6088
|
Which of the following is a message queue or transaction system for distributed Internet-based applications?
|
|
6089
|
Which of the following is the central application in the AWS portfolio?
|
|
6090
|
A ___________ performs invisible tasks even if you write no code
|
|
6091
|
Which of the following accesss modifier specifies that one or more declared programming elements are accessible from within the assembly that contains their declaration, not only by the component that declares them?
|
|
6092
|
Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud?
|
|
6093
|
The default property for a text box control is
|
|
6094
|
Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis?
|
|
6095
|
Which of the following is a billing and account management service?Which of the following is a billing and account management service?
|
|
6096
|
Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
|
|
6097
|
Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?
|
|
6098
|
Which method will return the number of elements in an array?
|
|
6099
|
What is the value of the index for the first element in a VB.NET array?
|
|
6100
|
Which variable name uses a standard naming convention for module variables?
|
|
6101
|
How many return statements are allowed in a Function Procedure?
|
|
6102
|
Which of the following allows you to create instances of the MySQL database to support your Web sites?
|
|
6103
|
Which part of a function procedure declaration statement is optional?
|
|
6104
|
Which of the following is an edge-storage or content-delivery system that caches data in different physical locations?
|
|
6105
|
Which statement will send the value generated by a function procedure, called CalculateTax, back to the calling code?
|
|
6106
|
Which is a valid way to write a sub procedure declaration?
|
|
6107
|
Which is not an optional element of a sub procedure declaration?
|
|
6108
|
A sub procedure is valuable because it:
|
|
6109
|
Which is a valid way to write the procedure stub for an object’s default event?
|
|
6110
|
What happens when a parameter in a procedure is declared ByVal?
|
|
6111
|
Which of the following is an open-source platform that has been used to create Google Wave and Google AdWords?
|
|
6112
|
Which of the following service that provides offline access to online data?
|
|
6113
|
Which parameter is found in an event procedure?
|
|
6114
|
Which of the following system was replaced with Google Translate?
|
|
6115
|
From how many places in the code can a procedure be called?
|
|
6116
|
When using a procedure the calling code sends data via the:
|
|
6117
|
Google __________ is the most widely used Web traffic analysis tool on the Internet.
|
|
6118
|
The methodology where code is broken into small, logical procedures is called:
|
|
6119
|
Which of the following is a targeted ad service based on matching advertisers and their keywords to users and their search profiles?
|
|
6120
|
Which is a type of procedure found in VB.Net?
|
|
6121
|
Which event is activated when a RadioButton is selected?
|
|
6122
|
Which of the following is the smaller version of the GSA that stores 300,000 indexed documents?
|
|
6123
|
Which of the following can be deployed within an organization to speed up both local (Intranet) and Internet searching?
|
|
6124
|
It is an artificial language that can be used to control the behavior of a computer machine.
|
|
6125
|
Which of the following is a search service for online retailers that markets their products in their site searches with a number of navigations?
|
|
6126
|
It translates high level language instructions into machine code, line by line, as the program is being run.
|
|
6127
|
Which of the following gives statistical information on different search terms?
|
|
6128
|
It is the process of giving step-by-step instruction to a computer.
|
|
6129
|
Which of the following product allows users to create 3D models and share them with others?
|
|
6130
|
The program that supports the creation of application for wireless, Internet-enabled hand-held devices.
|
|
6131
|
Which of the following is photo-editing and management software?
|
|
6132
|
The Java and Visual Basic .NET belong to this type of programming language.
|
|
6133
|
Google _______ is a collection of applications and utilities under development and testing.
|
|
6134
|
Which of the following indexes content on your local drive for fast searches?
|
|
6135
|
It translates all high level instructions into machine code first before running the program.
|
|
6136
|
The control that is used to display text in other parts of the application.
|
|
6137
|
Which of the following is an online atlas and mapping service with mashups?
|
|
6138
|
Which of the following product searches Web by topics?
|
|
6139
|
The control that is used to accept input from the user.
|
|
6140
|
Which of the following creates a custom search utility for a particular Web site?
|
|
6141
|
It is collection of services and classes designed to simplify the application development.
|
|
6142
|
A window that lists the solution name, the project name and all the forms used in the project.
|
|
6143
|
It is a programming language that uses 0's and 1's.
|
|
6144
|
Which of the following is a payment processing system by Google?
|
|
6145
|
Which of the following google product sends you periodic email alerts based on your search term?
|
|
6146
|
It contains several items or controls that you can use in your applications.
|
|
6147
|
Dynamic content presented in Google _______ crawling isn’t normally indexed.
|
|
6148
|
It displays the properties that are associated with an object.
|
|
6149
|
Which of the following is not provided by “Deep Web�
|
|
6150
|
It allows the user to design the user interface for an application.
|
|
6151
|
Which of the following protocol lets a Web site list in an XML file information?
|
|
6152
|
The process of writing, testing and maintaining computer programs.
|
|
6153
|
The control which we can click and release to perform some action.
|
|
6154
|
Based on PageRank algorithm, Google returns __________ for a query that is parsed for its keywords.
|
|
6155
|
Which of the following algorithm is used by Google to determine the importance of a particular page?
|
|
6156
|
Which of the following architecture is shown in the following figure?
|
|
6157
|
__________ tool is used to create business logic for your application.
|
|
6158
|
Which of the following is a WYSIWYG web builder?
|
|
6159
|
Which of the following technologies are used in LongJump’s PaaS?
|
|
6160
|
Which of the following object database has the ability to create rich data objects and create relationships between them?
|
|
6161
|
Which of the following lets you sort, aggregate, display, and format report information based on the data in your application?
|
|
6162
|
Which of the following instrumentation tool displays the real-time parameters of your application in a visual form in AppBase?
|
|
6163
|
Which of the following AppBase tool allows you to assign access rights to different objects in the system?
|
|
6164
|
__________ PaaS application delivery platform creates SOA applications that work on several different IaaS vendors.
|
|
6165
|
Which of the following programming language solves problems by acting on constraints and inputs?
|
|
6166
|
Which of the following module feature is provided by Drupal CMS?
|
|
6167
|
Point out the wrong statement related to the common characteristics of SOA.
|
|
6168
|
Which of the following environment best describes WorkXpress?
|
|
6169
|
Which of the following is based on the notion of information management and organization?
|
|
6170
|
Application frameworks provide a means for creating ________ hosted applications using IDE.
|
|
6171
|
What is the maximum no of dimension that an array can have in VB.NET ?
|
|
6172
|
How to concatenate two TextBoxes
|
|
6173
|
Scaling _____ indefinitely leads you to an architecture with a large number of servers
|
|
6174
|
Which of the following is used to evaluate your own cloud application’s network performance?
|
|
6175
|
_________ scaling allows you to use a virtual system to run more virtual machines.
|
|
6176
|
Which of the following type of Integrity ensures that each row can be uniquely identified by an attribute called the primary ?
|
|
6177
|
Which of the following factor can be considered to determine WAN Capacity?
|
|
6178
|
Which of the following packet sniffer was formerly called Ethereal?
|
|
6179
|
Private Sub Display_Click() Dim DA As String DA="RAMANUJA RAO P#ASM-1#Asthana Mandapam#123" astrsplititems = Split(DA, "#") For intX = 0 To UBound(astrsplititems) List1.Items.Add "Item(" & intX & "): " & astrsplititems(intX) Next Close #1 End Sub Click the Display Button Output is
|
|
6180
|
Which of the following utility is used to monitor traffic in Windows?
|
|
6181
|
Which of the following is not the aspect considered for network capacity?
|
|
6182
|
Which class is used to run the EXE application file in VB.NET
|
|
6183
|
How does VB.NET instantiates the .NET object
|
|
6184
|
How many aspects need to be considered while assessing network capacity?
|
|
6185
|
Which command is used for saving the transaction ?
|
|
6186
|
Web.Config file is of the type
|
|
6187
|
Which of the following cloud computing infrastructures automatically manage your capacity?
|
|
6188
|
Which SQL statement is used to extract data from a database ?
|
|
6189
|
Which of the following instance has the lowest performance in AMI?
|
|
6190
|
EC2 Compute Unit is the equivalent of a _____ GHz 2007 Opteron or 2007 Xeon processor.
|
|
6191
|
Can I send keystrokes to a DOS application from VB.Net?
|
|
6192
|
Which of the following instance has an API name: m2.4xlarge?
|
|
6193
|
system databases stores server specific configuration information, including authorized users, databases, system configuration settings and remote servers ?
|
|
6194
|
Consider the emp table having columns empno, ename Which of eth following SQL query fetches empno that occur more than twice in the emp table
|
|
6195
|
Which of the following instance is used by default in AMI?
|
|
6196
|
Which SQL statement is used to update data in a database ?
|
|
6197
|
Which of the following instance has 68.4GB of memory and 26 EC2 Compute Units?
|
|
6198
|
Which of the following performance analysis tool lets you save its state for Windows?
|
|
6199
|
VbOk,VbCancel,VbAbort are all the enumerated members of
|
|
6200
|
Which is faster?
|
|
6201
|
A master/slave MySQL replication architectural scheme is used for ________ database applications.
|
|
6202
|
What does WnsP represent in the following formula? (WT = Σ(WSnP WSnV))
|
|
6203
|
Which of the following is often a bottleneck in Web servers?
|
|
6204
|
What is the significance of Shadowing a method in VB.Net ?
|
|
6205
|
Which of the following application can replay requests to Web servers?
|
|
6206
|
Which SQL statement is used to delete data from a database ?
|
|
6207
|
How to determine if a variable has not been initialized in VB.NET?
|
|
6208
|
Which of the following resource(s) represents the bottleneck in the current system that limits the system’s performance?
|
|
6209
|
Which of the following aggregate functions returns a row count as an integer?
|
|
6210
|
Which are the exceptions that VB.Net supports ,C# & other languages doesn’t support ?
|
|
6211
|
How are the parameters referenced by default in VB.NET?
|
|
6212
|
A server at 10% load is having 308 watts power and at 50% load is having 451 watts of power, saving is
|
|
6213
|
A query within a query where the inner query is evaluated for each row in the outer query is called
|
|
6214
|
In addition to power-supply, Barroso and H?lzle in 2007, stated that goal for entire server should be
|
|
6215
|
Networking infrastructure, which can be scaled to 100,000 ports or 1 petabit/sec of
|
|
6216
|
A _____ column cannot contain NULL values since it is used to uniquely identify rows in a table.
|
|
6217
|
What is the output : dim i,j as integer for i=1 to 10 for j=1 to 5 msgbox i next j next i
|
|
6218
|
The Visual Basic Compiler is
|
|
6219
|
What is the maximum size of a row ?
|
|
6220
|
Which types of joins let you retrieve nonmatching data?
|
|
6221
|
Which of the following testing seeks to answer maximum load that my current system can support?
|
|
6222
|
To find out the role of the logged in user, you’ll use
|
|
6223
|
Which of the following is available as both open source and commercial version?
|
|
6224
|
Which of the following is not a commercial third-party Web site performance monitor?
|
|
6225
|
Which of the following is used as an Open source distributed monitoring system?
|
|
6226
|
What will be the result of the following statement ? SELECT ROUND(689.89, -1, 1)
|
|
6227
|
Which of the following tool is used for Web site monitoring service in LAMP?
|
|
6228
|
An Employee Table Having Data in the sequence Employee No [numeric], Employee Name [varchar(100)], Emp Date of Birth [date&time], Designation [varchar(50)], Department [varchar(50)] to Insert data by using Query displayed in textbox1 = 123 textbox2 = MURTHY textbox3 = 12/12/1980 textbox4 = Engineer textbox5 = Data Center Which Query is Used
|
|
6229
|
Which of the following tool captures time-dependent performance data from resources such as a CPU load?
|
|
6230
|
Which of the following command is used to display the level of CPU activity in Linux?
|
|
6231
|
Which of the following is the hardest factor to determine?
|
|
6232
|
Which of the following is a critical step in capacity planning?
|
|
6233
|
Which of the following RDBMS is used by LAMP?
|
|
6234
|
Which of the following is used as a substitute for PHP as a scripting language in LAMP?
|
|
6235
|
Which of the following is one of the major categories of Amazon Machine Instances that you can create on the Amazon Web Service?
|
|
6236
|
What does L in LAMP stands for?
|
|
6237
|
What is the relation of the capacity attribute to performance?
|
|
6238
|
How to add the item to combo box if it names cmb
|
|
6239
|
Which of the following is a potent cloud-building technology?
|
|
6240
|
Which keyword refers the parent of the current object
|
|
6241
|
Which of the following is the most widely used technique for abstraction?
|
|
6242
|
Which part of the .NET Framework provides Context for managed code?
|
|
6243
|
Which of the following application delivery platform’s main focus is on desktop installations?
|
|
6244
|
How do you join strings in VB.NET
|
|
6245
|
Which of the following layer serves as the mediator for file I/O, the memory I/O, and application calls and response to DLLs?
|
|
6246
|
How do you achieve interface implementation in VB.NET?
|
|
6247
|
An Employee Table Having Data in the sequence Employee No [numeric], Employee Name [varchar(100)], Emp Date of Birth [date&time], Designation [varchar(50)], Department [varchar(50)] to Retrive data by using query select * from employee displayed in textbox1, textbox2, textbox3, textbox4, textbox5
|
|
6248
|
What does msgbox shows for s value: dim s as string s=mid(now,3,2) msgbox s
|
|
6249
|
_______ creates a container that encapsulates the application and all the application’s dependencies within a set of files.
|
|
6250
|
How To Get The Server Date & Time and Displayed in a Label
|
|
6251
|
The __________ solution creates a virtual application appliance as an architectural layer between the Windows or the UNIX operating system and applications.
|
|
6252
|
Simple Cloud API is useful for applications written in ____________
|
|
6253
|
Expansion of SQL?
|
|
6254
|
What is the symbol for creating temporary Table in SQL Server.
|
|
6255
|
Which of the following vendor is offering optimization appliances for VMware infrastructure?
|
|
6256
|
Classes from which namespace will have to be used to read or write to a file?
|
|
6257
|
Which of the following runs on Xen Hypervisor?
|
|
6258
|
Which statement shows Boxing?
|
|
6259
|
AMI imaging service is provided by Amazon for ______________
|
|
6260
|
_________ is used by Amazon Web Services to store copies of a virtual machine.
|
|
6261
|
Which of the following is an open standard for storing a system image?
|
|
6262
|
Which of the following is a comparison operator?
|
|
6263
|
A _______ image makes a copy or a clone of the entire computer system inside a single container such as a file.
|
|
6264
|
Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address?
|
|
6265
|
________ virtualization abstracts networking hardware and software into a virtual network that can be managed
|
|
6266
|
Which of the following product migrate files from one datastore to another datastore?
|
|
6267
|
Which of the following allows a virtual machine to run on two or more physical processors at the same time?
|
|
6268
|
_______ is a service that creates and manages virtual network interfaces.
|
|
6269
|
Which of the following is a service that aggregates servers into an assignable pool? a) VMware vStorage
|
|
6270
|
Which of the following operating system support operating system virtualization?
|
|
6271
|
In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
|
|
6272
|
In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware.
|
|
6273
|
Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V?
|
|
6274
|
Which of the following will be the host operating system for Windows Server?
|
|
6275
|
Which of the following is Type 2 VM?
|
|
6276
|
Which of the following is Type 1 Hypervisor?
|
|
6277
|
An operating system running on a Type ______ VM is full virtualization.
|
|
6278
|
Which of the following provide system resource access to virtual machines?
|
|
6279
|
Which of the following is another name for the system virtual machine?
|
|
6280
|
A ______ is a combination load balancer and application server that is a server placed between a firewall or router.
|
|
6281
|
Which of the following is a more sophisticated load balancer?
|
|
6282
|
Which of the following network resources can be load balanced?
|
|
6283
|
Which of the following software can be used to implement load balancing?
|
|
6284
|
The technology used to distribute service requests to resources is referred to as _____
|
|
6285
|
Which of the following type of virtualization is also characteristic of cloud computing?
|
|
6286
|
_______ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.
|
|
6287
|
________ is used for merchant transactions under the Payment Card Industry Data Security Standard.
|
|
6288
|
________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
|
|
6289
|
Which of the following can be used for the banking industry?
|
|
6290
|
_________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.
|
|
6291
|
The body of a For…Next loop in Visual Basic will always be executed once no matter what the initial and terminating values are. duplicate question?
|
|
6292
|
The value of the control variable should not be altered within the body of a For?Next loop.
|
|
6293
|
Which of the following is provided by Identity as a Service?
|
|
6294
|
_________ is one of the more expensive and complex areas of network computing.
|
|
6295
|
The input to a user-defined function can consist of:
|
|
6296
|
Function procedures can invoke other Function procedures.
|
|
6297
|
The input to a user-defined function can consist of one or more values
|
|
6298
|
Which of the following is a valid Visual Basic conditional statement? A. 2 < n < 5 B. 2 < n Or < 5 C. 2 < n Or 5 D. (2 < n) Or (n < 5) Ans: D 32. The three main logical operators are ________, _________, and ________. A. And, Or, Not B. And, Not, If C. Or, Not, If D. False, And, True Ans: A 33. Which value for x would make the following condition true: x >= 5
|
|
6299
|
Which of the following expressions has as its value the words “Hello World? surrounded by quotation marks?
|
|
6300
|
The following lines of code are correct. If age >= 13 And < 20 Then txtOutput.Text = "You are a teenager." End If A. True B. False Ans: B 26. Given that x = 7, y = 2, and z = 4, the following If block will display "TRUE". If (x > y) Or (y > z) Then txtBox.Text = “TRUE†End If
|
|
6301
|
What will be the output of the following statement? txtBox.Text = FormatCurrency(1234.567)
|
|
6302
|
_______ is the assignment of a network identity to a specific MAC address that allows systems to
|
|
6303
|
To continue a long statement on another line, use:
|
|
6304
|
Which of the following arithmetic operations has the highest level of precedence?
|
|
6305
|
A variable declared outside of an event procedure is said to have class-level scope.
|
|
6306
|
Pseudocode is
|
|
6307
|
__________ authentication requires the outside use of a network security or trust service.
|
|
6308
|
Which of the following attribute should be unique?
|
|
6309
|
SaaS supports multiple users and provides a shared data model through _________ model
|
|
6310
|
Which of the following is a SaaS characteristic?
|
|
6311
|
Which of the following aspect of the service is abstracted away?
|
|
6312
|
Which of the following software can be used to implement load balancing?
|
|
6313
|
The technology used to distribute service requests to resources is referred to as _______
|
|
6314
|
Which of the following type of virtualization is also characteristic of cloud computing?
|
|
6315
|
_______ is used for merchant transactions under the Payment Card Industry Data Security Standard.
|
|
6316
|
Which of the following is a PCI CaaS service?
|
|
6317
|
_______ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
|
|
6318
|
Which of the following can be used for the banking industry?
|
|
6319
|
Which of the following is a man-in-the-middle type of service?
|
|
6320
|
Which of the following is an example of a vertical cloud that advertise CaaS capabilities?
|
|
6321
|
Which of the following is authorization markup language?
|
|
6322
|
The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.
|
|
6323
|
_______ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.
|
|
6324
|
Which of the following standard is concerned with the exchange and control of identity information?
|
|
6325
|
________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.
|
|
6326
|
Which of the following allows a distributed ID system to write and enforce custom policy expressions?
|
|
6327
|
Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider.
|
|
6328
|
Which of the following is provided by Identity as a Service?
|
|
6329
|
______ is one of the more expensive and complex areas of network computing.
|
|
6330
|
________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks.
|
|
6331
|
__________ authentication requires the outside use of a network security or trust service
|
|
6332
|
Which of the following attribute should be unique?
|
|
6333
|
Which of the following group is dedicated to support technologies that implement enterprise mashups?
|
|
6334
|
Salesforce.com is the largest ______ provider of CRM software.
|
|
6335
|
The componentized nature of SaaS solutions enables many solutions to support a feature called _____________
|
|
6336
|
Open source software used in a SaaS is called _______ SaaS.
|
|
6337
|
SaaS supports multiple users and provides a shared data model through _________ model.
|
|
6338
|
________ applications have a much lower barrier to entry than their locally installed competitors.
|
|
6339
|
The library function strrchr() finds the first occurrence of a substring in another string.
|
|
6340
|
Choose the correct order from given below options for the calling function of the code “a = f1(23, 14) * f2(12/4) + f3();�
|
|
6341
|
In DOS, What is the purpose of the function randomize() in Turbo C?
|
|
6342
|
Which of the following is a logical NOT operator?
|
|
6343
|
Following is the invalid inclusion of a file to the current program. Identify it.
|
|
6344
|
Which of the following is a SaaS characteristic?
|
|
6345
|
What is your comment on the below C statement? signed int *p=(int*)malloc(sizeof(unsigned int));
|
|
6346
|
Which of the following SaaS platform is with an exposed API?
|
|
6347
|
Which of the following aspect of the service is abstracted away?
|
|
6348
|
Which of the following is the most complete cloud computing service model?
|
|
6349
|
Rackspace Cloud Service is an example of _____________
|
|
6350
|
Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to ______________
|
|
6351
|
______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
|
|
6352
|
__________ is the most refined and restrictive service model.
|
|
6353
|
Which of the following can be considered PaaS offering?
|
|
6354
|
n event-driven programming an event is generated by?
|
|
6355
|
________ serves as a PaaS vendor within Google App Engine system.
|
|
6356
|
Which of the following is associated with considerable vendor lock-in?
|
|
6357
|
_____ offering provides the tools and development environment to deploy applications on another vendor’s application.
|
|
6358
|
Pods are aggregated into pools within an IaaS region or site called an _________ zone.
|
|
6359
|
Which is not true about forms and controls in Visual Basic?
|
|
6360
|
A group of users within a particular instance is called _____________
|
|
6361
|
Which of the following is the management console in AWS?
|
|
6362
|
_________ is designed specifically to run connected to the cloud as a dedicated cloud client.
|
|
6363
|
Which is not a main component of the Visual Studio IDE?
|
|
6364
|
Which of the following is a classic example of an IaaS service model?
|
|
6365
|
The method which is used to clear a form control is……..
|
|
6366
|
…………. method is used to store the selected text into clipboard.
|
|
6367
|
Which of the following is a third-party VPN based on Google’s GoogleTalk?
|
|
6368
|
………..method is used to retrieve the stored text from the clipboard.
|
|
6369
|
Which of the following is based on the IETF Session Initiation Protocol?
|
|
6370
|
………….is the temporary buffer area which is used to store data temporarily.
|
|
6371
|
One of the important method of a flexgrid control is ……..
|
|
6372
|
…………….is used to display the data in a tabular format on the form .
|
|
6373
|
………….. is the property of a flexgrid to access the index of current row.
|
|
6374
|
…………. event occurs while the scroll box is moved by dragging the mouse
|
|
6375
|
By using ……… property of Drive list box we can access the selected drive
|
|
6376
|
………. can act as a container for other controls
|
|
6377
|
……….. control displays current directory with any sub directories and allows the user to change directly.
|
|
6378
|
By using ……….. property of a progress bar, we can display the progress of an operation.
|
|
6379
|
……… control specifies current status of the form.
|
|
6380
|
……… represents the immediate parent node for the new node in a tree view control.
|
|
6381
|
How many types of virtual private server instances are partitioned in an IaaS stack?
|
|
6382
|
Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
|
|
6383
|
________ is a cloud computing service model in which hardware is virtualized in the cloud.
|
|
6384
|
_________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build.
|
|
6385
|
Inorder to add a new node into a tree view control we must use ……… method.
|
|
6386
|
Which of the following is a specification for multicast discovery on a LAN?
|
|
6387
|
………….. control is used to represent the items in a hierarchical manner.
|
|
6388
|
Which of the following lets a Web service advertise itself in terms of a collection of endpoints?
|
|
6389
|
Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems?
|
|
6390
|
__________ is a CPU emulator and virtual machine monitor.
|
|
6391
|
_______ offers various Linux distributions upon which you can build a virtual machine.
|
|
6392
|
The only object that is not a collection and is not contained within another container in the DAO is …………
|
|
6393
|
Which of the following offers virtual appliances, including ones based on Windows, all of which run on VMware Player?
|
|
6394
|
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.
|
|
6395
|
The important property of a timer control is …………
|
|
6396
|
________ allows different operating systems to run in their own memory space.
|
|
6397
|
Which is not a property of the Common control class?
|
|
6398
|
Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________
|
|
6399
|
Which statement about objects is true?
|
|
6400
|
Which of the following component is called hypervisor?
|
|
6401
|
Where is a collection of related data elements stored?
|
|
6402
|
Which of the following provider rely on the virtual machine technology to deliver servers?
|
|
6403
|
Which is not a standard dialog box?
|
|
6404
|
Communication between services is done widely using _______ protocol.
|
|
6405
|
Which symbol creates an access key in the text of a menu item?
|
|
6406
|
Which of the following benefit is provided by the PaaS service provider?
|
|
6407
|
Which menu object property places a check mark in the display of the menu text?
|
|
6408
|
Which of the architectural layer is used as a front end in cloud computing?
|
|
6409
|
In the statement, Dim Days(7) as String, what part of the array does the number 7 refer to?
|
|
6410
|
Which of the following is the highest degree of integration in cloud computing?
|
|
6411
|
The scope of a variable refers to:
|
|
6412
|
A service provider reselling a _______ may have the option to offer one module to customize the information.
|
|
6413
|
What is the most number of states a CheckBox can have?
|
|
6414
|
From the standpoint of a ________ it makes no sense to offer non-standard machine instances to customers.
|
|
6415
|
Which function should be used to validate that input is not a string before performing arithmetic operations?
|
|
6416
|
Which of the following is the property of the composable component?
|
|
6417
|
Which is not a valid Exit statement?
|
|
6418
|
A _______ service provider gets the same benefits from a composable system that a user does.
|
|
6419
|
A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts.
|
|
6420
|
…………. method is used to retrieve a particular record on the basis ofa criteria
|
|
6421
|
A ________ cloud requires virtualized storage to support the staging and storage of data.
|
|
6422
|
Which of the architectural layer is used as backend in cloud computing?
|
|
6423
|
VDM is available from ……….. menu
|
|
6424
|
Which of the following language is used to manage transactions?
|
|
6425
|
In VB, arguments are passed by default by ……..
|
|
6426
|
The most commonly used set of protocols uses ______ as the messaging forma
|
|
6427
|
……….. event occurs when the form is set to nothing.
|
|
6428
|
……….. event occurs when a form loaded into the memory
|
|
6429
|
Cloud computing doesn’t require that ________ and software be composable
|
|
6430
|
A _________ is a cloud computing service that is both hardware and software.
|
|
6431
|
……….. procedures have return values.
|
|
6432
|
…….. keyword is used to preserve the previously stored values of a dynamic array.
|
|
6433
|
Which of the following is one of the properties that differentiates cloud computing?
|
|
6434
|
The default event of a text box is ……..
|
|
6435
|
Which of the following service is used for backing up a licensed computer?
|
|
6436
|
……………event occurs when the content of a control changes.
|
|
6437
|
Cloud computing shifts capital expenditures into ________ expenditures.
|
|
6438
|
The button parameter used to identify the right mouse button is ………..
|
|
6439
|
When you purchase shrink-wrapped software, you are using that software based on a licensing agreement called ________
|
|
6440
|
Which of the following is specified parameter of SLA?
|
|
6441
|
The button parameter used to identify the left mouse button is ………..
|
|
6442
|
A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider.
|
|
6443
|
…….. event occurs when the user presses a key from the keyboard.
|
|
6444
|
………… method is used to forcibly set the CPU focus to a particular control.
|
|
6445
|
The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a cloud deployment on Windows Azure in an attractive report format.
|
|
6446
|
The important property of a scroll bar is …….
|
|
6447
|
____ is a financial estimate for the costs of the use of a product or service over its lifetime.
|
|
6448
|
The main objective of the COM philosophy is ……..
|
|
6449
|
COM stands for ………….
|
|
6450
|
______ sizing is possible when the system load is cyclical or in some cases when there are predictable bursts or spikes in the load.
|
|
6451
|
Cloud computing is also a good option when the cost of infrastructure and management is _____
|
|
6452
|
_______ is surely an impediment to established businesses starting new enterprises.
|
|
6453
|
………. is the capability to wrap all aspects of functionality and user interface into a single entity?
|
|
6454
|
……… is a pointer in to a set of records.
|
|
6455
|
……….. type of recordset creates a static copy of a set of records that we can use to find data or generate reports.
|
|
6456
|
Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider.
|
|
6457
|
The overhead associated with ____ staff is a major cost.
|
|
6458
|
………. type of recordset creates a set of records that represent a single database table that we can use to add change or delete records.
|
|
6459
|
For a server with a four-year lifetime, you would therefore need to include an overhead roughly equal to ___ percent of the system’s acquisition cost.
|
|
6460
|
……… type of recordset creates a dynamic set of records that represents a database table or the results of a query containing fields from one or more tables.
|
|
6461
|
Through ………. Controls we can access information in the databases.
|
|
6462
|
………….. allows you to define exactly what the startmenu group contains and what icons are used
|
|
6463
|
…….. is a compressed file that is well suited to distribution on either disks or the internet.
|
|
6464
|
The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER.
|
|
6465
|
………….. automates much of work involved in creating and deploying the files needed for our program to run on another computer
|
|
6466
|
he cost of a cloud computing deployment is roughly estimated to be ___________
|
|
6467
|
___________ is a function of the particular enterprise and application in an on-premises deployment.
|
|
6468
|
Cloud ________ are standardized in order to appeal to the majority of its audience.
|
|
6469
|
Which two controls combined to form the ComboBox control?
|
|
6470
|
The reputation for cloud computing services for the quality of those services is shared by _________
|
|
6471
|
Network bottlenecks occur when ______ data sets must be transferred.
|
|
6472
|
In event-driven programming an event is generated by:
|
|
6473
|
Which of the following captive area deals with monitoring?
|
|
6474
|
Which statement about objects is true?
|
|
6475
|
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area.
|
|
6476
|
Which is true about the name and text property of a control?
|
|
6477
|
_______ captive requires that the cloud accommodate multiple compliance regimes.
|
|
6478
|
……….. control returns Boolean value
|
|
6479
|
Which of the following subject area deals with pay-as-you-go usage model?
|
|
6480
|
………….. property is used to return the index of a selected item in a listbox
|
|
6481
|
…………is the important event of a timer control
|
|
6482
|
………. is an important property of a file list box
|
|
6483
|
To find out the total number of items in a collection we can use …….. property
|
|
6484
|
By using …….. keyword we can create a collection.
|
|
6485
|
………… event occurs when an object of a class is created A
|
|
6486
|
In a class, …………is used to store data in a property and returns the property.
|
|
6487
|
……….. is a group of objects gathered together as a single object.
|
|
6488
|
…….. keyword is used to create an object for the class.
|
|
6489
|
………. event occurs when last reference to the class goes out of scope.
|
|
6490
|
……….. is an event of a class
|
|
6491
|
In a class, …………is used to pass value to the property.
|
|
6492
|
………… are called runtime entities.
|
|
6493
|
………. are called design time entities
|
|
6494
|
…………… method used to load or import a text file or .rtf file into a rich text box.
|
|
6495
|
………. connectivity is independent of any DBMS or operating system
|
|
6496
|
UDA stands for ………..
|
|
6497
|
Which of these activities is not one of the activities recommended to be performed by an independent SQA group?
|
|
6498
|
Which of the following is not an issue to consider when reverse engineering?
|
|
6499
|
The ISO quality assurance standard that applies to software engineering is
|
|
6500
|
Advantages of outsourcing project work may likely include all of the following except
|
|
6501
|
Which of these is not an example of data restructuring?
|
|
6502
|
Which of these are not valid software configuration items?
|
|
6503
|
At the end of a formal technical review all attendees can decide to
|
|
6504
|
Software reengineering process model does not include restructuring activities for
|
|
6505
|
Six Sigma methodology defines three core steps.
|
|
6506
|
When software configuration management is a formal activity the software configuration audit is conducted by the
|
|
6507
|
Which of these is not a benefits achieved when software is restructured?
|
|
6508
|
The Hofstede framework for global engagements includes all of the following dimensions except
|
|
6509
|
Which of the following activities is not part of the software reengineering process model?
|
|
6510
|
Which of the following is not ISO 9126 software quality factors?
|
|
6511
|
Software reliability problems can almost always be traced to
|
|
6512
|
A review summary report answers which three questions?
|
|
6513
|
Software safety is a quality assurance activity that focuses on hazards that
|
|
6514
|
Which of the following tasks is not part of software configuration management?
|
|
6515
|
Which of the following is not considered one of the four important elements that should exist when a configuration management system is developed?
|
|
6516
|
The first reverse engineering activity involves seeking to understand
|
|
6517
|
Which of the following is not an example of a business process?
|
|
6518
|
Which of these are reasons for using technical product measures during software development?
|
|
6519
|
Learning curves are more likely to apply in situations where most of the costs are
|
|
6520
|
Project selection criteria are typically classified as
|
|
6521
|
The waterfall model of software development is
|
|
6522
|
The incremental model of software development is
|
|
6523
|
Which of the following is not necessary to apply agility to a software process?
|
|
6524
|
Which of the following is not a weak point of waterfall lifecycle?
|
|
6525
|
One reason to involve everyone on the software team in the planning activity is to
|
|
6526
|
The Process Models differ from one another based on following factors except
|
|
6527
|
FP-based estimation techniques require problem decomposition based on
|
|
6528
|
LOC-based estimation techniques require problem decomposition based on
|
|
6529
|
Which of these are the 5 generic software engineering framework activities?
|
|
6530
|
Which of the following is not one of the commonly heard comments of project managers?
|
|
6531
|
When can selected common process framework activities be omitted during process decomposition?
|
|
6532
|
Make/Buy decisions are usually not driven by
|
|
6533
|
Which of the following is NOT a main element of the project management activities?
|
|
6534
|
Requirements can be best refined using
|
|
6535
|
Which of the following is not a main project objective?
|
|
6536
|
The objective of software project planning is to
|
|
6537
|
Which of the following is not a measurable characteristic of an object-oriented design?
|
|
6538
|
One of the most important attributes for a software product metric is that it should be
|
|
6539
|
The most important feature of spiral model is
|
|
6540
|
Which of the following items are not measured by software project metrics?
|
|
6541
|
In agile software development estimation techniques focus on the time required to complete each
|
|
6542
|
Which measurement activity is missing from the list below?
|
|
6543
|
Which of following are advantages of using LOC(lines of code) as a size-oriented metric?
|
|
6544
|
To be an effective aid in process improvement the baseline data used must be
|
|
6545
|
From among the following activities, which is the best example of a project?
|
|
6546
|
The prototyping model of software development is
|
|
6547
|
Which of these is not a characteristic of Personal Software Process?
|
|
6548
|
Software feasibility is based on which of the following
|
|
6549
|
Changes made to an information system to add the desired but not necessarily the required features is called
|
|
6550
|
Why is it important to measure the process of software engineering and software it produces?
|
|
6551
|
"To construct a high-quality, custom home within five months at costs not to exceed Rs15,00,000" is best classified as
|
|
6552
|
The first step in project planning is to
|
|
6553
|
Software risk impact assessment should focus on consequences affecting
|
|
6554
|
The critical path in a project network is the
|
|
6555
|
Which of the following is not one of the attributes of software quality?
|
|
6556
|
A risk table will not contain following information about risk
|
|
6557
|
Which of the following is not one of the guiding principles of software project scheduling:
|
|
6558
|
Hazard analysis focuses on the identification and assessment of potential hazards that can cause
|
|
6559
|
As per Putnam's Software Equation, when development time is reduced by 5%, effort goes up by
|
|
6560
|
Empirical estimation models are typically based on
|
|
6561
|
The IEEE software maturity index (SMI) is used to provide a measure of the
|
|
6562
|
Software risk always involves two characteristics
|
|
6563
|
In earned value analysis, it is desirable that variance and index are
|
|
6564
|
The best indicator of progress on a software project is the completion of
|
|
6565
|
Three categories of risks in software projects are
|
|
6566
|
Risk tables are sorted by
|
|
6567
|
Which of the following provide useful measures of software quality?
|
|
6568
|
Which of the following are objectives for formal technical reviews?
|
|
6569
|
Which of the following is not an approach to sizing problem
|
|
6570
|
Process indicators enable management to
|
|
6571
|
The purpose of earned value analysis is to
|
|
6572
|
While scheduling a project, effort validation is required for
|
|
6573
|
The level of review formality is not determined by
|
|
6574
|
Resource leveling can not help with
|
|
6575
|
A task set is a collection of
|
|
6576
|
The 40-20-40 rule suggests that the least of amount of development effort be spent on: Select one:
|
|
6577
|
A project budget report shows spending of Rs. 350,000/- against a budgeted amount of Rs. 400,000/-. Which of the following is true?
|
|
6578
|
Risk projection attempts to rate each risk in two ways
|
|
6579
|
The software equation can be used to show that Select one:
|
|
6580
|
Resource Histogram is an effective tool for staff planning and coordination.
|
|
6581
|
Abbreviate the term PERT.
|
|
6582
|
Which chart is a tool that depicts project as network diagram. It is capable of graphically representing main events of project in both parallel and consecutive way.
|
|
6583
|
In project execution and monitoring, every project is divided into multiple phases in which all major tasks are performed based on which phase of SDLC.
|
|
6584
|
Size of software product can be calculated using which of these methods.
|
|
6585
|
Software scope is not a well-defined boundary, which encompasses all the activities that are done to develop and deliver the software product.
|
|
6586
|
The software scope identifies what the product will do and what it will not do, what the end product will contain and what it will not contain.
|
|
6587
|
Software project manager is engaged with software management activities. He is responsible for.
|
|
6588
|
A software project manager is a person who undertakes the responsibility of carrying out the software project.
|
|
6589
|
Software project management is the process of managing all activities that are involved in software development, they are.
|
|
6590
|
In Risk management process what make note of all possible risks, that may occur in the project.
|
|
6591
|
State if the following are true or false For scheduling a project, it is necessary to. 1) Break down the project tasks into smaller, manageable form 2) Find out various tasks and correlate them 3) Estimate time frame required for each task 4) Divide time into work-units
|
|
6592
|
In the Empirical Estimation Technique which model is developed by Barry W. Boehm?
|
|
6593
|
Which may be estimated either in terms of KLOC (Kilo Line of Code) or by calculating number of function points in the software.
|
|
6594
|
In which estimation software size should be known.
|
|
6595
|
COCOMO stands for
|
|
6596
|
State if the following are true for Project Management. During Project Scope management, it is necessary to - 1) Define the scope 2) Decide its verification and control 3) Divide the project into various smaller parts for ease of management. 4) Verify the scope
|
|
6597
|
Software project management comprises of a number of activities, which contains.
|
|
6598
|
A Project can be characterized as.
|
|
6599
|
Object inherits a class is known as.
|
|
6600
|
During the procurement phase, you are analyzing whether you should outsource a particular task or do it on your own with your team. Which process are you currently in?
|
|
6601
|
There is a risk which has a 7% chance of happening, and if it occurs it will cost you 2,500 USD. What is the EMV of this event?
|
|
6602
|
Who should be involved in identifying the project risks?
|
|
6603
|
Tom is a low-power stakeholder in your project, He is very interested and enthusiastic about your project. He wants you to complete the project successfully. How will you manage him?
|
|
6604
|
You have been given a task to accurately calculate the cost of a project. Which of the following techniques will you use to get the most accurate cost of the project?
|
|
6605
|
Which of the following risks remain even after applying the risk response of an identified risk?
|
|
6606
|
Your project is delayed by 45 days and the client has threatened that he will impose a heavy penalty if you do not complete the project on time. Therefore, to bring the project back on schedule you hire some equipment and bring more team members to work with you. This is an example of:
|
|
6607
|
Regarding the project expeditor and the project coordinator, which of the following statements is correct?
|
|
6608
|
Which of the following graphs shows the major of problems due to a minority of causes?
|
|
6609
|
The successor activity cannot be finished until the predecessor activity starts. This is an example of which kind of relationship:
|
|
6610
|
Which document authorizes the existence of the project?
|
|
6611
|
In a balanced matrix organization, who has authority over the budget?
|
|
6612
|
Your project is late and to bring it back on track you are adding extra resources to some activities and giving overtime to your team members. This is an example of:
|
|
6613
|
Which is not an example of organizational process assets?
|
|
6614
|
Your management has asked you to provide them with the rough order estimate for a project on an urgent basis. In this case, which of the following techniques will you use?
|
|
6615
|
For all your needs you have to go to the functional manager; moreover, you do not have control over the budget. In what kind of organization are you working?
|
|
6616
|
Which of the following diagram looks like a fish skeleton?
|
|
6617
|
What may happen if your project has more than one critical path?
|
|
6618
|
You are developing the project charter, with management, for a new project. You are going to be the project manager. Who will sign the project charter?
|
|
6619
|
For your project, you have identified your project stakeholders, developed strategy and now you are in the execution phase. In which project phases do you identify the project stakeholders?
|
|
6620
|
During which phase of the project will risks be the highest?
|
|
6621
|
In which procurement contract does the buyer have the minimum risk?
|
|
6622
|
What does the Variance at Completion show?
|
|
6623
|
Which estimate is given more weight in the PERT estimate formula?
|
|
6624
|
In Six Sigma what percentage of accuracy is desired?
|
|
6625
|
Which one is not a stakeholder of your project?
|
|
6626
|
In your project you identify a risk that, due to the possibility of the entrance of a new supplier, may provide some components at a cheaper price. What kind of risk is this?
|
|
6627
|
Which of the following is not an output of a project?
|
|
6628
|
What is a Project Scope?
|
|
6629
|
Fishbone diagram is also known as:
|
|
6630
|
Which of the following is the most accurate cost estimate method?
|
|
6631
|
What is a prototype?
|
|
6632
|
Which Conflict Resolution Technique leads to consensus and commitment?
|
|
6633
|
In which phase will the risks be at the lowest level?
|
|
6634
|
Which is an example of Triple Constraint?
|
|
6635
|
The client inspects the deliverables with you, and finds that it meets the acceptance criteria. He signed off and formally approves the deliverables. Which process is this?
|
|
6636
|
You are reviewing the control chart and observe that there are seven points in a row that are below the mean. What does it mean?
|
|
6637
|
You are managing a project with a budget of 500,000 USD, and 250,000 USD has been spent. Upon review, you observe that only 40% of the work has been completed; though, your schedule says that you should have completed 50% of the work. What is the Actual Cost?
|
|
6638
|
While inspecting, you find a defective component and you repaired it. This act is known as:
|
|
6639
|
What is a Workaround?
|
|
6640
|
Pareto Chart helps you find:
|
|
6641
|
Which of the following statements is true about the Point of Total Assumption?
|
|
6642
|
Rearranging resources to optimize their utilization is known as:
|
|
6643
|
Which document is created by breaking the project scope into smaller and manageable elements?
|
|
6644
|
In risk management, you have many strategies to manage risks. Which strategy will you not use with the negative risks?
|
|
6645
|
The role of the Develop Project Management Plan process is to:
|
|
6646
|
Which of the following represents the correct order of project management phases?
|
|
6647
|
You have identified a large number of risks during your risk identification process. What will be your next step?
|
|
6648
|
What is the goal of Quality Management?
|
|
6649
|
When should you update lessons learned?
|
|
6650
|
Due to a miscommunication with the client, some features are added to the product. This process is known as:
|
|
6651
|
Which one of the following is not true about the change request?
|
|
6652
|
TCPI = 1.5, what does it mean?
|
|
6653
|
Which one is an example of Crashing?
|
|
6654
|
You have added a few extra features to the product with the intention to make the client happy. This activity is known as:
|
|
6655
|
You are developing the project management plan for your project. What will be your main emphasis during this process?
|
|
6656
|
Who contributes, develops and updates the Lessons Learned document?
|
|
6657
|
If an un-identified risk occurs:
|
|
6658
|
A project has more than one critical path. What does this mean to you?
|
|
6659
|
A contract cannot be a legal document until:
|
|
6660
|
What does the Cost Performance Index (CPI) say about the project?
|
|
6661
|
If the optimistic estimate is 10 days, and the pessimistic estimate is 22 days, what is the standard deviation for this activity?
|
|
6662
|
Whenever you receive a change request, what will be your next step?
|
|
6663
|
In which process you close the contract?
|
|
6664
|
The most common cause of conflict within a project is:
|
|
6665
|
What does the Schedule Performance Index (SPI) say about the project?
|
|
6666
|
Which of the following statements is not true about the Project Charter?
|
|
6667
|
In which of the following phases of the project will most of the money be spent?
|
|
6668
|
A subcontractor is delaying the delivery of the deliverables. Which of the following should you do?
|
|
6669
|
You have been given 100,000 USD to complete the project. 60,000 USD has been spent, though as per the schedule, 55,000 USD should have been spent to complete the same work. What is the Planned Value (PV)?
|
|
6670
|
Which of the following is not an example of Organizational Process Assets?
|
|
6671
|
Which of the following risks will be managed with the Contingency Reserve?
|
|
6672
|
You have been given 100,000 USD to complete the project. 60,000 USD has been spent, though as per the schedule, 55,000 USD should have been spent to complete the same work. What is the Actual Cost (AC)?
|
|
6673
|
Which of the following is not a component of the Scope Baseline?
|
|
6674
|
Which of the following is not an example of Enterprise Environmental Factor?
|
|
6675
|
How will you deal with the stakeholders with High Interest but Low Power?
|
|
6676
|
What should be your goal while negotiating with the seller?
|
|
6677
|
A Risk that is caused by the response of another risk, is known as:
|
|
6678
|
You have six team members working under you. How many lines of communication will you have in your communication plan?
|
|
6679
|
You have been given 100,000 USD to complete the project. 60,000 USD has been spent, though as per the schedule, 55,000 USD should have been spent to complete the same work. What is the Budget at Completion (BAC)?
|
|
6680
|
Which of the following statement is true about the Project Charter?
|
|
6681
|
For your project you need to outsource some work, so you sign a fixed price contract with a contractor. In this contract, the price above which the seller bears all costs of cost overrun is known as:
|
|
6682
|
In which type of organization does the Functional Manager manage the project budget?
|
|
6683
|
During a bidder conference you see that one bidder is your close friend. What should your next step be?
|
|
6684
|
Which contract is considered most risky for the bidders?
|
|
6685
|
Which of the following strategies is not used for negative risks?
|
|
6686
|
Which of the following is part of the Maslow theory?
|
|
6687
|
Money spent during a specific time period is known as:
|
|
6688
|
What is the duration of the Milestone?
|
|
6689
|
Which of the following statement is true about a Program?
|
|
6690
|
Code of Ethics and Professional Conduct applies to:
|
|
6691
|
A person who is directly or indirectly involved with your project, or affected by your project or its outcome, is known as:
|
|
6692
|
You hired a programmer for $25/hour for two months. What kind of contract is this?
|
|
6693
|
Risks included in the Watch List are known as:
|
|
6694
|
What is meant by RACI?
|
|
6695
|
Which of the following is not a basic element of Earn Value Management (EVM)?
|
|
6696
|
In Rolling Wave Planning:
|
|
6697
|
What is a Product Scope?
|
|
6698
|
What is the purpose of the Project Proposal?
|
|
6699
|
Which one of these is not an example of a Project Stakeholder?
|
|
6700
|
Who are the stakeholders in a project?
|
|
6701
|
How often should a status meeting ideally be held to catch up on people's progress?
|
|
6702
|
What is contingency?
|
|
6703
|
Why would using a PERT (Program Evaluation Review Technique) diagram help you effectively manage projects?
|
|
6704
|
What is the purpose of identifying milestones?
|
|
6705
|
Actions and activities necessary to satisfy completion or exit criteria for the phase or project and to tranfer the project's products, services, or results to the next phase or to production and/or operations are addressed:
|
|
6706
|
Significant changes occuring throughout the project life cycle can trigger:
|
|
6707
|
Who determines the requirement of a new project
|
|
6708
|
Benefit Measurement and Constrained optimization mthod are used for
|
|
6709
|
A Project sceduling software application can be considered par of organization's
|
|
6710
|
The tool and technique known as "expert judgement" in the intiating process group is used to:
|
|
6711
|
Outputs of the Monitor and Control Project Work process include all of the following EXCEPT:
|
|
6712
|
Include change control meetings
|
|
6713
|
Which process is included in Project Integration Management.
|
|
6714
|
All of the following is true about Project Charter except;
|
|
6715
|
The peak of the sum is never ________ than the sum of the peaks.
|
|
6716
|
A __________ site is one that is environmentally friendly: locations that are on a network backbone.
|
|
6717
|
The reliability of a system with n redundant components and a reliability of r is ____________
|
|
6718
|
Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems do.
|
|
6719
|
Cutting latency in half requires ______ times the number of nodes in a system
|
|
6720
|
How many laws exist for Cloudonomics by Weinman?
|
|
6721
|
A _____ is a facility that is a self-contained semiconductor assembly line.
|
|
6722
|
_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand.
|
|
6723
|
______ enables batch processing, which greatly speeds up high-processing applications.
|
|
6724
|
______ feature allows you to optimize your system and capture all possible transactions.
|
|
6725
|
______ is a pay-as-you-go model matches resources to need on an ongoing basis.
|
|
6726
|
Which of the following is the most refined and restrictive service model?
|
|
6727
|
A service that concentrates on hardware follows the _________ as a Service model.
|
|
6728
|
Applications that work with cloud computing that have low margins and usually low risk are _____________
|
|
6729
|
Which of the following is one of the unique attributes of Cloud Computing?
|
|
6730
|
Which of the following architectural standards is working with cloud computing industry?
|
|
6731
|
You can’t count on a cloud provider maintaining your _____ in the face of government actions.
|
|
6732
|
Which of the following is the most important area of concern in cloud computing?
|
|
6733
|
Which of the following was one of the top 5 cloud applications in 2010?
|
|
6734
|
Which of the following is the IaaS service provider?
|
|
6735
|
CaaS stands for _____________ as service.
|
|
6736
|
The three different service models are together known as the _____ model of cloud computing.
|
|
6737
|
How many types of service model are mainly present in Cloud?
|
|
6738
|
_______ is a complete operating environment with applications, management, and user interface.
|
|
6739
|
Which of the following provides development frameworks and control structures?
|
|
6740
|
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
|
|
6741
|
Which of the following is owned by an organization selling cloud services?
|
|
6742
|
A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit.
|
|
6743
|
__________ cloud is one where the cloud has been organized to serve a common function or purpose.
|
|
6744
|
The ________ cloud infrastructure is operated for the exclusive use of an organization.
|
|
6745
|
_______ dimension corresponds to two different states in the eight possible cloud forms.
|
|
6746
|
Which of the following is related to the service provided by Cloud?
|
|
6747
|
_________ is a measure of whether the operation is inside or outside the security boundary or network firewall.
|
|
6748
|
Which of the following is provided by ownership dimension of Cloud Cube Model?
|
|
6749
|
How many types of security boundary values exist in Cloud Cube model?
|
|
6750
|
Which of the following dimension is related to organization’s boundaries?
|
|
6751
|
………… object in DAO model represents objects like saved forms, modules, reports etc:
|
|
6752
|
How many types of dimensions exists in Cloud Cube Model?
|
|
6753
|
_______ model attempts to categorize a cloud network based on four dimensional factors.
|
|
6754
|
Through the properties and methods of……….. object, we can set validation rules and return information about linked tables in DAO model.
|
|
6755
|
The __________ model originally did not require a cloud to use virtualization to pool resources.
|
|
6756
|
Which of the following is best known service model?
|
|
6757
|
……….. object contains information about an error occurred during a DAO operation
|
|
6758
|
Which of the following is the deployment model
|
|
6759
|
……….. represents a user account with particular access permission in a particular workspace.
|
|
6760
|
________ refers to the location and management of the cloud’s infrastructure.
|
|
6761
|
…………. defines and manages the current user account
|
|
6762
|
_________ model consists of the particular types of services that you can access on a cloud computing platform.
|
|
6763
|
Which of the following is Cloud Platform by Amazon?
|
|
6764
|
………. is the top level object in DAO hierarchy.
|
|
6765
|
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.
|
|
6766
|
……… is a special tool available in VB to access databases directly
|
|
6767
|
Which of the following can be identified as cloud?
|
|
6768
|
…………. method of recordset object can be used to allocate memory for a new blank record.
|
|
6769
|
________ has many of the characteristics of what is now being called cloud computing
|
|
6770
|
Which of the following cloud concept is related to pooling and sharing of resources?
|
|
6771
|
………… can access data from relational and non relational databases.
|
|
6772
|
………. allows access to the client server databases on a network
|
|
6773
|
Which of the following is essential concept related to Cloud?
|
|
6774
|
_______ as a utility is a dream that dates from the beginning of the computing industry itself.
|
|
6775
|
…….. is a Microsoft product for windows platform
|
|
6776
|
_________ computing refers to applications and services that run on a distributed network using virtualized resources.
|
|
6777
|
…………. is a collection of code which translates application request into physical operation on datastore.
|
|
6778
|
Extension of ActiveX designers………..
|
|
6779
|
Extension of ActiveX controls ……….
|
|
6780
|
……..files contains bitmaps,strings, and other data that we can change without having to reedit and recompile the program code.
|
|
6781
|
………. method is used to clear the contents of MSHFlexGrid control.
|
|
6782
|
………. method adds a row to an MSHFlexGrid.
|
|
6783
|
The event occurs when certain key of keyboard is pressed
|
|
6784
|
What August event was widely seen as an example of the risky nature of cloud computing?
|
|
6785
|
Link the cloud-based service on the left with the desktop or server application it is designed to displace on the right.
|
|
6786
|
To attach a scroll bar to the textbox , the property of textbox should be set to:
|
|
6787
|
The term "cloud computing" is a metaphor that originated in what?
|
|
6788
|
The TypeOf statement is used to find out……..
|
|
6789
|
IBM, EMC and Boeing Co. were among the companies signing what document whose title is reminiscent of a famous political statement?
|
|
6790
|
Cloud computing embraces many concepts that were previously touted as the next big thing in information technology. Which of these is not an antecedent of the cloud?
|
|
6791
|
Match the provider with the cloud-based service.
|
|
6792
|
An internal cloud is…
|
|
6793
|
………. displays a list of the files in the current directory or sudirectory.
|
|
6794
|
Which of these techniques is vital for creating cloud-computing centers?
|
|
6795
|
………… displays current directory with any subdirectories and allows the user to change directory.
|
|
6796
|
What widely used service is built on cloud-computing technology?
|
|
6797
|
What exactly is cloud computing?
|
|
6798
|
…………. displays the current drive and allows the user to select a different drive by using a drop down arrow.
|
|
6799
|
What feature does not belong in a private cloud?
|
|
6800
|
Which of these services is not Platform as a Service?
|
|
6801
|
Which company recently shut the doors on its cloud storage service?
|
|
6802
|
………… present a list of choices to the user.
|
|
6803
|
Which of the following isn't an advantage of cloud?
|
|
6804
|
What properties are required to be specified for a menu item
|
|
6805
|
When the form is first referenced in any manner by program,the triggered event is …….
|
|
6806
|
What is the name of the organization helping to foster security standards for cloud computing?
|
|
6807
|
Which Amazon cloud product recently experienced a massive outage?
|
|
6808
|
If you declare an array in a module and you want every procedures to access it, then declare it as………
|
|
6809
|
What is the name of the Rackspace cloud service?
|
|
6810
|
…………. are used by VB to hold information needed by an application.
|
|
6811
|
All the following statements are true about variable names except
|
|
6812
|
If variables are not implicitly or explicitly type, they are assigned the type by default...............
|
|
6813
|
"Cloud" in cloud computing represents what?
|
|
6814
|
………… statement is used to define a property procedure that assigns the value of a property
|
|
6815
|
……….. is a built in function to return the upper bound of an array
|
|
6816
|
I've a website containing all static pages. Now I want to provide a simple Feedback form for end users. I don't have software developers, and would like to spend minimum time and money. What should I do?
|
|
6817
|
Which of the following statements about Google App Engine (GAE) is INCORRECT.
|
|
6818
|
……….. is a built in function to return lower bound of an array
|
|
6819
|
This is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet.
|
|
6820
|
What is Cloud Foundry?
|
|
6821
|
……….. is a set of sequentially indexed elements having the same type of data.
|
|
6822
|
Google Docs is a type of cloud computing.
|
|
6823
|
……….. is a meaningful name that takes the place of a number or string that does not change
|
|
6824
|
What is private cloud?
|
|
6825
|
……… is the extension of the standard module
|
|
6826
|
Which of the following is true of cloud computing?
|
|
6827
|
……….. is the extension of a class module
|
|
6828
|
In order to participate in cloud-computing, you must be using the following OS _______ .
|
|
6829
|
The term 'Cloud' in cloud-computing refers to ______.
|
|
6830
|
………….. is the extension of a form module.
|
|
6831
|
The typical three-layer switching topology will not create latency within a cloud network
|
|
6832
|
In……….scope, variables are available only to the module in which they are declared
|
|
6833
|
A larger cloud network can be built as either a layer 3 or layer 4 network.
|
|
6834
|
A good cloud computing network can be adjusted to provide bandwidth on demand.
|
|
6835
|
Cloud computing networks are designed to support only private or hybrid clouds
|
|
6836
|
Amazon Web Services is which type of cloud computing distribution model?
|
|
6837
|
An object datatype can stroe…….. bytes
|
|
6838
|
Geographic distribution of data across a cloud provider's network is a problem for many enterprises because it:
|
|
6839
|
A Boolean datatype can store……….bytes.
|
|
6840
|
Which vendor recently launched a cloud-based test and development service for enterprises?
|
|
6841
|
Google Apps Engine is a type of
|
|
6842
|
Mouse down event takes place when you,
|
|
6843
|
Cloud Service consists of
|
|
6844
|
Virtual Machine Ware (VMware) is an example of
|
|
6845
|
………… property is used to check whether the object is active or deactive.
|
|
6846
|
What’s the most popular use case for public cloud computing today?
|
|
6847
|
Which of these companies specializes in cloud computing management tools and services?
|
|
6848
|
What is the name of the organization helping to foster security standards for cloud computing?
|
|
6849
|
………… is an example for control
|
|
6850
|
………. allows you to position the forms in your application using a small graphical representation of the screen.
|
|
6851
|
What is the name of Rackspace’s cloud service?
|
|
6852
|
Cloud Services have a________ relationship with their customers.
|
|
6853
|
Which of these is not a major type of cloud computing usage?
|
|
6854
|
What facet of cloud computing helps to guard against downtime and determines costs?
|
|
6855
|
What second programming language did Google add for App Engine development?
|
|
6856
|
MDI stands for…………
|
|
6857
|
……….. is one of the main building blocks in a VB application.
|
|
6858
|
Which of the following cloud concept is related to pooling and sharing of resources
|
|
6859
|
……….. is an action recognized by a form or the control.
|
|
6860
|
_______ is a complete operating environment with applications, management, and the user interface.
|
|
6861
|
………….loop repeats a group of statements for each item in a collection of objects or for each element of an array.
|
|
6862
|
________ dimension corresponds to two different states in the eight possible cloud forms.
|
|
6863
|
Which of the following is related to service provided by Cloud ?
|
|
6864
|
The default datatype for VB is …………………..
|
|
6865
|
The __________ model originally did not require a cloud to use virtualization to pool resources.
|
|
6866
|
Which of the following is best known service model ?
|
|
6867
|
A……… is a place in the code where the program temporarily stops
|
|
6868
|
Cloud computing is a _______ system and it is necessarily unidirectional in nature.
|
|
6869
|
………… is the process of finding and removing errors
|
|
6870
|
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
|
|
6871
|
Which of the following is most refined and restrictive service model ?
|
|
6872
|
Which window shows information that results from debugging statements in our code
|
|
6873
|
When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.
|
|
6874
|
………… statement enables us to trap runtime error.
|
|
6875
|
Which of the following keywords is used to keep track of active window.
|
|
6876
|
The window in which the individual documents are displayed is called….. window.
|
|
6877
|
To load graphics on a control at runtime, we have to use the function………..
|
|
6878
|
RTF stands for…….
|
|
6879
|
………… method is used to delete items from a list box.
|
|
6880
|
The method, which loads the form into memory and displays it on screen
|
|
6881
|
……….. returns numeric code of a character.
|
|
6882
|
…………. is a group of controls that share the same name and type.
|
|
6883
|
………… indicates whether a particular condition is on or off.
|
|
6884
|
In GUI , ……….. is a means of selecting one of several options.
|
|
6885
|
……. are objects that are placed on form objects.
|
|
6886
|
Visual Basic maintains a project file with the extension…..
|
|
6887
|
……….shows the property type as well as a short description of the property
|
|
6888
|
………. shows the value of any variables within the scope of the current procedure.
|
|
6889
|
………. is a collection of files
|
|
6890
|
………. property is used to return or sets a value that determines whether the control can respond to user-generated events.
|
|
6891
|
The default property for a text box control is…….
|
|
6892
|
Storage size of Byte datatype is………..
|
|
6893
|
……. modules can be reused in many different applications.
|
|
6894
|
……… is a method which moves the focus to the specified control or form
|
|
6895
|
A………. displays a list of items from which user can select one or more items
|
|
6896
|
What is the default range of horizontal scroll bar
|
|
6897
|
By default, the textbox control can hold text as ……..
|
|
6898
|
………property is an integer value corresponding to the position of the scroll box in the scroll bar.
|
|
6899
|
………….. combines the features of the text box and list box
|
|
6900
|
………….. returns or sets the number of characters selected.
|
|
6901
|
Which of them is not an example of physical data leakage?
|
|
6902
|
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
|
|
6903
|
Unintentional data leakage can still result in the same penalties and reputational damage.
|
|
6904
|
Unauthorized†data leakage doesn’t essentially mean intended or malicious.
|
|
6905
|
There are __________ major types of data leakage.
|
|
6906
|
Data leakage is popularly known as ___________
|
|
6907
|
Data leakage threats do not usually occur from which of the following?
|
|
6908
|
_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
|
|
6909
|
____________ protocol attack is done in the data-link layer.
|
|
6910
|
Which of the protocol is not used in the network layer of the TCP/IP model?
|
|
6911
|
Which 2 protocols are used in the Transport layer of the TCP/IP model?
|
|
6912
|
Which of them is not an appropriate method of router security?
|
|
6913
|
Which of them is not an attack done in the network layer of the TCP/IP model?
|
|
6914
|
When the form is first referenced in any manner by program,the triggered event is….
|
|
6915
|
…….. is a control related event
|
|
6916
|
What is the output of the following code: MyString=â€Hello World†LeftString=left(MyString,3)
|
|
6917
|
The variables that does not change the value during execution of program is……
|
|
6918
|
All the following statements are true about variable scope except
|
|
6919
|
__________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.
|
|
6920
|
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.
|
|
6921
|
………….is a block of code that is executed in response to an event.
|
|
6922
|
There are __________ different versions of IP popularly used.
|
|
6923
|
.………. arrays can be resized at anytime
|
|
6924
|
RoBOT is abbreviated as ___________
|
|
6925
|
We can preserve the value of a local variable by making the variable……….
|
|
6926
|
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat
|
|
6927
|
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).
|
|
6928
|
In Visual Basic, a variable name cannot be more than ……… characters
|
|
6929
|
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________
|
|
6930
|
The default datatype for Visual Basic is ………………
|
|
6931
|
…………. control is used to display text, but user cannot change it directly.
|
|
6932
|
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?
|
|
6933
|
TCP/IP is composed of _______ number of layers.
|
|
6934
|
……….property is used to set the maximum length of a text, a textbox can hold
|
|
6935
|
……….. control is used to provide an identifiable grouping for other controls
|
|
6936
|
A text box can hold as many as ……… characters for a multi-line text
|
|
6937
|
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
|
|
6938
|
Which of the following is an example of application layer vulnerability?
|
|
6939
|
A text box can hold as many as ……. characters for a single line text.
|
|
6940
|
Which of the following is an example of presentation layer vulnerability?
|
|
6941
|
The form module has file extension...................
|
|
6942
|
………… is used for finding out about objects, properties and methods.
|
|
6943
|
In ……………… window we can write code
|
|
6944
|
Which of the following is an example of session layer vulnerability?
|
|
6945
|
Which of the following provides quick access to commonly used commands in the programming environment
|
|
6946
|
Which of the following is an example of Transport layer vulnerability?
|
|
6947
|
Which of the following is not a vulnerability of the application layer?
|
|
6948
|
Which of the following is not an example of presentation layer issues?
|
|
6949
|
Which of the following windows is the central to the development of Visual Basic applications
|
|
6950
|
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
|
|
6951
|
Properties can be viewed in two ways
|
|
6952
|
Which windows displays a list of all forms and modules making up your application
|
|
6953
|
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
|
|
6954
|
Which of the following is not session layer vulnerability?
|
|
6955
|
IDE stands for…………..
|
|
6956
|
Which of the following is not a transport layer vulnerability?
|
|
6957
|
Visual Basic is a tool that allows you to develop application in…………
|
|
6958
|
The body of a For…Next loop in Visual Basic will always be executed once no matter what the initial and terminating values are. duplicate question?
|
|
6959
|
The body of a For…Next loop in Visual Basic will always be executed once no matter what the initial and terminating values are.
|
|
6960
|
The value of the control variable should not be altered within the body of a For?Next loop.
|
|
6961
|
A counter variable is normally incremented or decremented by 1.
|
|
6962
|
A Do?Loop Until block is always executed at least once
|
|
6963
|
A Do While loop checks the While condition before executing the statements in the loop.
|
|
6964
|
The arguments appearing in a Call statement must match the parameters in the appropriate Sub or Function header in all but one of the following ways. Which one?
|
|
6965
|
Variables appearing in the header of a Function procedure are called ____________.
|
|
6966
|
The input to a user-defined function can consist of:
|
|
6967
|
A Function may return up to two values.
|
|
6968
|
Function procedures can invoke other Function procedures.
|
|
6969
|
Although a function can return a value, it cannot directly display information in a text box.
|
|
6970
|
Which of the following is an example of network layer vulnerability?
|
|
6971
|
Which of the following is an example of data-link layer vulnerability?
|
|
6972
|
Suppose you want to write a procedure that takes three numbers, num1, num2, and num3; and returns their sum, product, and average. It is best to use a Function procedure for this task.
|
|
6973
|
Which of the following is an example of physical layer vulnerability?
|
|
6974
|
Which of the following is not a vulnerability of the network layer?
|
|
6975
|
_______________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
|
|
6976
|
Both the input and output of a Function procedure can consist of several values.
|
|
6977
|
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
|
|
6978
|
The input to a user-defined function can consist of one or more values.
|
|
6979
|
Which of the following is not a vulnerability of the data-link layer?
|
|
6980
|
Function names should be suggestive of the role performed. The names also must conform to the rules for naming variables.
|
|
6981
|
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
|
|
6982
|
The statement Const TAX_RATE As Doubleface=Calibri size=2> is not valid.
|
|
6983
|
Each individual variable in the list student(0), student(1), student(2) is known as a(n)
|
|
6984
|
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.
|
|
6985
|
Which one of the following is true about arguments and parameters?
|
|
6986
|
Which of the following is not physical layer vulnerability?
|
|
6987
|
Which of the following is NOT a reason for using procedures?
|
|
6988
|
The full form of OSI is OSI model is ______________
|
|
6989
|
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.
|
|
6990
|
The ______________ of a Sub procedure are vehicles for passing numbers and strings to the Sub procedure.
|
|
6991
|
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.
|
|
6992
|
One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________
|
|
6993
|
It is important to limit ____________ to all data and information as well as limit the authority for installing software.
|
|
6994
|
Which of the following do not comes under security measures for cloud in firms?
|
|
6995
|
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.
|
|
6996
|
Suppose the variable myName is declared in a Dim statement in two different Sub procedures. Which statement is true?
|
|
6997
|
_______________ important and precious file is a solution to prevent your files from ransomware
|
|
6998
|
What will be the output of the following program when the button is clicked? Private Sub btnDisplay_Click(…) Handles btnDisplay.Click Dim number As Double = 3 DoubleAndSquare(number) txtBox.Text = CStr(number) End Sub Sub DoubleAndSquare(ByRef myVar As Double) myVar = myVar + myVar myVar = myVar * myVar
|
|
6999
|
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.
|
|
7000
|
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.
|
|
7001
|
Use of _______________ can bring external files and worms and virus along with it to the internal systems.
|
|
7002
|
Variables declared inside a procedure are said to have ________________.
|
|
7003
|
The declaration statement for a class-level variable should be placed __________.
|
|
7004
|
Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.
|
|
7005
|
Suppose a variable is passed by value to a parameter of a Sub procedure, and the parameter has its value changed inside the Sub procedure. What will the value of the variable be after the Sub procedure has executed?
|
|
7006
|
It is very important to block unknown, strange and ______________ within the corporate network.
|
|
7007
|
Which of the following is not a proper aspect of user integration?
|
|
7008
|
Suppose a variable is passed by reference to a parameter of a Sub procedure, and the parameter has its value changed inside the Sub procedure. What will the value of the variable be after the Sub procedure has executed?
|
|
7009
|
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.
|
|
7010
|
_____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.
|
|
7011
|
What happens to a variable declared locally inside a Sub procedure after the procedure terminates?
|
|
7012
|
What type of items are valid for use in the value list of a Case clause?
|
|
7013
|
Which Case clause will be true whenever the value of the selector in a Select Case block is greater than or equal to 7?
|
|
7014
|
Different items appearing in the same value list of a Select Case block must be separated by a ____________.
|
|
7015
|
Suppose that the selector in a Select Case block is the string variable myVar. Which of the following is NOT a valid Case clause?
|
|
7016
|
You can specify a range of values in a Case clause by using the To keyword.
|
|
7017
|
A single Case statement can contain multiple values.
|
|
7018
|
Items in the value list must evaluate to a literal of the same type as the selector
|
|
7019
|
Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.
|
|
7020
|
Select Case choices are determined by the value of an expression called a selector.
|
|
7021
|
One may use an If block within a Select Case block.
|
|
7022
|
Constructs in which an If block is contained inside another If block are called:
|
|
7023
|
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________
|
|
7024
|
Which value for x would make the following condition true: (x >= 5) And (x <= 6)
|
|
7025
|
An attacker may use automatic brute forcing tool to compromise your ____________
|
|
7026
|
Which value for x would make the following condition true: Not (x >= 5)
|
|
7027
|
Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.
|
|
7028
|
Which value for x would make the following condition true: x >= 5
|
|
7029
|
The antivirus or PC defender software in a system helps in detecting virus and Trojans.
|
|
7030
|
_____________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.
|
|
7031
|
The three main logical operators are ________, _________, and ________.
|
|
7032
|
_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.
|
|
7033
|
ATM Skimmers are used to take your confidential data from your ATM cards.
|
|
7034
|
Which of the following is a valid Visual Basic conditional statement?
|
|
7035
|
You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________
|
|
7036
|
An attacker, who is an employee of your firm may ___________ to know your system password.
|
|
7037
|
___________ will give you an USB which will contain ___________ that will take control of your system in the background.
|
|
7038
|
Which of the companies and organizations do not become the major targets of attackers for data stealing?
|
|
7039
|
What types of data are stolen by cyber-criminals in most of the cases?
|
|
7040
|
Which of the following expressions has as its value the words “Hello World? surrounded by quotation marks?
|
|
7041
|
Which of these is not a step followed by cyber-criminals in data breaching?
|
|
7042
|
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
|
|
7043
|
Asc(“Aâ€) is 65. What is displayed by txtBox.Text = Chr(65) & “BCâ€?
|
|
7044
|
Asc(“Aâ€) is 65. What is Asc(“Câ€)?
|
|
7045
|
A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures.
|
|
7046
|
_______ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.
|
|
7047
|
Given that x = 7, y = 2, and z = 4, the following If block will display “TRUEâ€. If (x > y) Or (y > z) Then txtBox.Text = “TRUE†End If
|
|
7048
|
__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.
|
|
7049
|
After performing ____________ the ethical hacker should never disclose client information to other parties.
|
|
7050
|
What will be the output of the following statement? txtBox.Text = FormatCurrency(1234.567)
|
|
7051
|
An ethical hacker must ensure that proprietary information of the firm does not get leaked.
|
|
7052
|
Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?
|
|
7053
|
What is the proper syntax when using a message dialog box?
|
|
7054
|
The legal risks of ethical hacking include lawsuits due to __________ of personal data.
|
|
7055
|
___________ is the technique used in business organizations and firms to protect IT assets.
|
|
7056
|
o continue a long statement on another line, use:
|
|
7057
|
Leaking your company data to the outside network without prior permission of senior authority is a crime.
|
|
7058
|
___________ has now evolved to be one of the most popular automated tools for unethical hacking.
|
|
7059
|
Keywords in Visual Basic are words that
|
|
7060
|
Performing a shoulder surfing in order to check other’s password is ____________ ethical practice
|
|
7061
|
Which of the following is a valid name for a variable?
|
|
7062
|
What is the ethics behind training how to hack a system?
|
|
7063
|
What value will be assigned to the numeric variable x when the following statement is executed? x = 2 + 3 * 4
|
|
7064
|
hich of the following arithmetic operations has the highest level of precedence?
|
|
7065
|
What is the correct statement when declaring and assigning the value of 100 to an Integer variable called numPeople
|
|
7066
|
Option Explicit requires you to declare every variable before its use.
|
|
7067
|
A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software.
|
|
7068
|
A variable declared inside an event procedure is said to have local scope
|
|
7069
|
ISMS is abbreviated as __________
|
|
7070
|
An algorithm is defined as:
|
|
7071
|
__________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed.
|
|
7072
|
Security bugs are also known as _______
|
|
7073
|
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.
|
|
7074
|
Pseudocode is
|
|
7075
|
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
|
|
7076
|
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.
|
|
7077
|
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.
|
|
7078
|
There are ________ types of exploit.
|
|
7079
|
A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.
|
|
7080
|
____________ is a special type of vulnerability that doesn’t possess risk.
|
|
7081
|
Risk and vulnerabilities are the same things.
|
|
7082
|
When creating a new application in Visual Basic, you are asked to supply a name for the program. If you do not specify a name, a default name is XXXXX XXXXX is this default name?
|
|
7083
|
___________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.
|
|
7084
|
________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.
|
|
7085
|
The Properties window plays an important role in the development of Visual Basic applications. It is mainly used
|
|
7086
|
___________ is a weakness that can be exploited by attackers.
|
|
7087
|
Sizing Handles make it very easy to resize virtually any control when developing applications with Visual Basic. When working in the Form Designer, how are these sizing handles displayed?
|
|
7088
|
L0phtCrack is formerly known as LC3.
|
|
7089
|
_______ is a password recovery and auditing tool
|
|
7090
|
What property of controls tells the order they receive the focus when the tab key is pressed during run time?
|
|
7091
|
Which of the following attack-based checks WebInspect cannot do?
|
|
7092
|
__________ is a web application assessment security tool.
|
|
7093
|
____________ scans TCP ports and resolves different hostnames.
|
|
7094
|
Visual Basic responds to events using which of the following?
|
|
7095
|
______________ is a popular tool used for network analysis in multiprotocol diverse network.
|
|
7096
|
____________ is a popular IP address and port scanner.
|
|
7097
|
The divide-and-conquer-method of problem solving breaks a problem into large, general pieces first, then refines each piece until the problem is manageable.
|
|
7098
|
Aircrack-ng is used for ____________
|
|
7099
|
Keywords are also referred to as reserved words.
|
|
7100
|
The Visual Basic Code Editor will automatically detect certain types of errors as you are entering code.
|
|
7101
|
Which of the below-mentioned tool is used for Wi-Fi hacking?
|
|
7102
|
Wireshark is a ____________ tool.
|
|
7103
|
Which of the following deals with network intrusion detection and real-time traffic analysis?
|
|
7104
|
Which of this Nmap do not check?
|
|
7105
|
__________ is a popular tool used for discovering networks as well as in security auditing.
|
|
7106
|
Nmap is abbreviated as Network Mapper.
|
|
7107
|
________ framework made cracking of vulnerabilities easy like point and click.
|
|
7108
|
____________ helps in protecting corporate data, communications and other assets.
|
|
7109
|
what is the use of performselector in ios?
|
|
7110
|
__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.
|
|
7111
|
____________ helps in protecting businesses against data breaches that may make threats
|
|
7112
|
what is the maximum size of an ios application?
|
|
7113
|
______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes
|
|
7114
|
________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.
|
|
7115
|
_________ is a popular command-line packet analyser.
|
|
7116
|
__________ is a debugger and exploration tool.
|
|
7117
|
what gets returned if xib is not properly connected to a parent controller?
|
|
7118
|
ToneLoc is abbreviated as __________
|
|
7119
|
what does the "strong" property attribute do?
|
|
7120
|
Network Stumbler is a Windows Wi-Fi monitoring tool.
|
|
7121
|
_____________ is a tool which can detect registry issues in an operating system.
|
|
7122
|
what does exc_bad_access signal received mean in xcode?
|
|
7123
|
____________is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.
|
|
7124
|
Which of the following attach is not used by LC4 to recover Windows password?
|
|
7125
|
what does a "__block" type specifier mean?
|
|
7126
|
what could be the probable result if selector is unknown or undefined?
|
|
7127
|
select all incorrect bundle id(s):
|
|
7128
|
is it possible to set multiple architecture from build settings tab in xcode for a project?
|
|
7129
|
is it possible to deploy beta build on any device?
|
|
7130
|
how can the application name of an ios project be changed?
|
|
7131
|
how can an sms be sent programmatically from the iphone (ios 4.0 or later)?
|
|
7132
|
consider the following code: (bool)application:(uiapplication *)application didfinishlaunchingwithoptions:(nsdictionary *)launchoptions { // set background color/pattern self.window.backg...
|
|
7133
|
which of the following statements could be used to determine if a given variable is of string type?
|
|
7134
|
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
|
|
7135
|
Stealing of digital files comes under __________ of the Indian IT Act.
|
|
7136
|
Sending offensive message to someone comes under _____________ of the Indian IT Act ______
|
|
7137
|
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
|
|
7138
|
which keyword is used in swift when we want a property of a class to initialize when it is accessed for the first time?
|
|
7139
|
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
|
|
7140
|
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
|
|
7141
|
which is correct regarding swift enumeration members when they are defined?
|
|
7142
|
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
|
|
7143
|
which is the wrong definition of a protocol in swift?
|
|
7144
|
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
|
|
7145
|
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
|
|
7146
|
what keyword is used to indicate a custom operator that will appear in between two targets, similar to the addition operator in this example? var sum = 10 + 10
|
|
7147
|
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act
|
|
7148
|
what is used to import objective-c files into swift?
|
|
7149
|
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
|
|
7150
|
what is the type of swift enumerations?
|
|
7151
|
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________
|
|
7152
|
what is the output of this segment of code ? var x = 0 for index in 1...5 { ++x } println("(x)")
|
|
7153
|
what is the name of the xcode generated header file used to import swift classes into an objective-c class given a product module named example?
|
|
7154
|
what is the name of the swift language feature that objective-c blocks are translated into?
|
|
7155
|
what is the name of the deinitializer in a class declaration?
|
|
7156
|
what does a retaincount represent in arc?
|
|
7157
|
in context of a swift subscript, which of the following is correct?
|
|
7158
|
if we have a class named myclass with a nested enum called status, declared like so: class myclass { enum status { case on, off } } how would one indicate that a variable is an enum...
|
|
7159
|
given that we have defined mychar like so : let mychar: character = "b" which code segment can be considered a complete switch statement and will run without any error?
|
|
7160
|
all swift classes must inherit from which root class?
|
|
7161
|
Download copy, extract data from an open system done fraudulently is treated as ________
|
|
7162
|
Accessing Wi-Fi dishonestly is a cyber-crime.
|
|
7163
|
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
|
|
7164
|
Accessing computer without prior authorization is a cyber-crimes that come under _______
|
|
7165
|
. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
|
|
7166
|
In which year the Indian IT Act, 2000 got updated?
|
|
7167
|
What is the updated version of the IT Act, 2000?
|
|
7168
|
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
|
|
7169
|
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
|
|
7170
|
The Information Technology Act -2000 bill was passed by K. R. Narayanan.
|
|
7171
|
What is the full form of ITA-2000?
|
|
7172
|
In which year India’s IT Act came into existence?
|
|
7173
|
What is the name of the IT law that India is having in the Indian legislature?
|
|
7174
|
Which of the following is not done by cyber criminals?
|
|
7175
|
Which of the following is not an example of a computer as weapon cyber-crime?
|
|
7176
|
Which of the following is not a type of peer-to-peer cyber-crime?
|
|
7177
|
Cyber-crime can be categorized into ________ types.
|
|
7178
|
Cyber-laws are incorporated for punishing all criminals only.
|
|
7179
|
Which of the following is not a type of cyber crime?
|
|
7180
|
CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures.
|
|
7181
|
National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards.
|
|
7182
|
__________________ are some very frequent updates that come for every anti-virus.
|
|
7183
|
Known bugs can be solved or removed by __________________ develop by the vendors of the application.
|
|
7184
|
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.
|
|
7185
|
How can we access the value of a KVC?
|
|
7186
|
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it.
|
|
7187
|
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies.
|
|
7188
|
Known exploits have a confirmation of and measures can be taken against it to resolve them.
|
|
7189
|
How many types of exploits are there based on their nature from hacking’s perspective?
|
|
7190
|
There are __________ types of exploits based on their working.
|
|
7191
|
Which of the following are not a vulnerability-listed site/database?
|
|
7192
|
__________ is the specific search engine for exploits where anyone can find all the exploits associated to vulnerability.
|
|
7193
|
Which value is not equivalent to the others?
|
|
7194
|
Which of them is not a powerful vulnerability detecting tool?
|
|
7195
|
The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________
|
|
7196
|
What should you do If you want to return an object back to the caller of your method and you want to mark the object for a later release?
|
|
7197
|
________________ are piece of programs or scripts that allow hackers to take control over any system.
|
|
7198
|
Which is an example of an invalid variable name?
|
|
7199
|
The configuration of DNS needs to be done in a secure way.
|
|
7200
|
Which of the following operations DNSenum cannot perform?
|
|
7201
|
Given int a = 10, b = 20, c; b *= a + 5; What is the resulting value of b?
|
|
7202
|
___________________ is the method used to locate all the DNS-servers and their associated records for an organization.
|
|
7203
|
What is wrong with this sequence of code? sum = 100; int sum;
|
|
7204
|
The _____________ command is used on Linux for getting the DNS and host-related information.
|
|
7205
|
Ping sweep is also known as ________________
|
|
7206
|
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.
|
|
7207
|
What is a local variable that has no default initial value and does not retain its value through method calls?
|
|
7208
|
To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server.
|
|
7209
|
What is the value of z after executing this sequence (check indentation)? int x = 100, y = 50, z = -1; if ( x + y > 50) if ( x + y < 100) z = 0; else z = 1;
|
|
7210
|
What is the value of s after executing this loop: int i = 0, s = 0; while (i < 5) s += ++i;
|
|
7211
|
____________ is a common tool used for doing OS fingerprinting.
|
|
7212
|
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely
|
|
7213
|
What does the leading + sign at the start of a method indicate?
|
|
7214
|
What is the file extension name used for Objective-C code?
|
|
7215
|
Which of the following do not comes under the important element of OS fingerprinting?
|
|
7216
|
How many basic elements are there for OS fingerprinting?
|
|
7217
|
______________________ is based on sniffer traces from the remote system.
|
|
7218
|
_____________________ is gained if you send especially skilled packets to a target machine.
|
|
7219
|
How many types of fingerprinting are there in ethical hacking?
|
|
7220
|
________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.
|
|
7221
|
Information Gathering about the system or the person or about organization or network is not important.
|
|
7222
|
For hacking a database or accessing and manipulating data which of the following language the hacker must know?
|
|
7223
|
Understanding of ___________ is also important for gaining access to a system through networks.
|
|
7224
|
Why programming language is important for ethical hackers and security professionals?
|
|
7225
|
Which of the following do not comes under the intangible skills of hackers?
|
|
7226
|
________________ enables a hacker to open a piece of program or application and re-build it with further features & capabilities
|
|
7227
|
_________ persistence and up-to-date with the latest technological updates and their flaws are some of the major qualities; an ethical hacker must need to have.
|
|
7228
|
An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the technology works.
|
|
7229
|
Network enumerator is also known as ________________
|
|
7230
|
A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.
|
|
7231
|
Network enumeration is the finding of __________ or devices on a network.
|
|
7232
|
__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.
|
|
7233
|
Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email
|
|
7234
|
To stop your system from getting enumerated, you have to disable all services.
|
|
7235
|
__________ is used that tries for guessing the usernames by using SMTP service.
|
|
7236
|
enum4linux is used to enumerate _______________
|
|
7237
|
________ suite is used for NTP enumeration.
|
|
7238
|
Enumeration does not depend on which of the following services?
|
|
7239
|
Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?
|
|
7240
|
______________ is the first phase of ethical hacking.
|
|
7241
|
What common web scripting languages are used by attackers to fetch various details from its surfing users?
|
|
7242
|
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.
|
|
7243
|
Attackers commonly target ____________ for fetching IP address of a target or victim user.
|
|
7244
|
Testing for buffer-overflow in a system can be done manually and has two possible ways.
|
|
7245
|
How many primary ways are there for detecting buffer-overflow?
|
|
7246
|
Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure.
|
|
7247
|
Malicious code can be pushed into the _________ during ______________ attack.
|
|
7248
|
In an application that uses stack, the memory for data is allocated ____________
|
|
7249
|
In an application that uses heap, the memory for data is allocated ____________
|
|
7250
|
With the lack of boundary check, the program ends abnormally and leads to ___________ error
|
|
7251
|
_____________ buffer overflows, which are more common among attackers.
|
|
7252
|
Among the two types ____________buffer-overflow is complex to execute and the least common attack that may take place.
|
|
7253
|
Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment.
|
|
7254
|
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.
|
|
7255
|
Why apps developed in languages like C, C++ is prone to Buffer-overflow?
|
|
7256
|
Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.
|
|
7257
|
Buffer-overflow may remain as a bug in apps if __________ are not done fully.
|
|
7258
|
Buffer-overflow is also known as ______________
|
|
7259
|
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.
|
|
7260
|
Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________
|
|
7261
|
How many types of buffer-overflow attack are there?
|
|
7262
|
In a _____________ attack, the extra data that holds some specific instructions in the memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
|
|
7263
|
A __________ is a sequential segment of the memory location that is allocated for containing some data such as a character string or an array of integers.
|
|
7264
|
RBAC is abbreviated as ______________
|
|
7265
|
DTE is abbreviated as ___________________
|
|
7266
|
_______________ in a system is given so that users can use dedicated parts of the system for which they’ve been given access to.
|
|
7267
|
MAC is abbreviated as _______________
|
|
7268
|
In a Linux-based system, the accounts may be members of 1 or more than one group.
|
|
7269
|
In your Linux-based system, you have to log-in with your root account for managing any feature of your system.
|
|
7270
|
Using the ______ account of a UNIX system, one can carry out administrative functions.
|
|
7271
|
Which of the following comes under secured Linux based OS?
|
|
7272
|
Subgraph OS is a Debian based Linux distro which provides hardcore anonymity and is approved by Edward Snowden.
|
|
7273
|
____________ is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help in preserving users’ data private.
|
|
7274
|
Which of the following OS does not comes under a secured Linux OS list?
|
|
7275
|
_________ is one of the most secured Linux OS that provides anonymity and incognito option for securing its user data.
|
|
7276
|
Using VPN, we can access _______________
|
|
7277
|
_________ are also used for hides user’s physical location
|
|
7278
|
__________ masks your IP address.
|
|
7279
|
A ______ can hide a user’s browsing activity.
|
|
7280
|
For secure connection, Remote access VPNs rely on ___________ and ____________
|
|
7281
|
There are ________ types of VPN protocols.
|
|
7282
|
Site-to-Site VPN architecture is also known as _________
|
|
7283
|
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
|
|
7284
|
_________ type of VPNs are used for home private and secure connectivity.
|
|
7285
|
Site-to-site VPNs are also known as ________
|
|
7286
|
There are _________ types of VPNs.
|
|
7287
|
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
|
|
7288
|
What types of protocols are used in VPNs?
|
|
7289
|
Which of the statements are not true to classify VPN systems?
|
|
7290
|
__________ provides an isolated tunnel across a public network for sending and receiving data privately, as if the computing devices were directly connected to the private network.
|
|
7291
|
VPN is abbreviated as __________
|
|
7292
|
Application layer firewalls are also called ____________
|
|
7293
|
Stateful Multilayer firewalls are also called _________
|
|
7294
|
acket filtering firewalls are also called ____________
|
|
7295
|
One advantage of Stateful Multilayer Inspection firewall is __________
|
|
7296
|
We can also implement ____________ in Stateful Multilayer Inspection firewall.
|
|
7297
|
Stateful Multilayer Inspection firewall cannot perform which of the following?
|
|
7298
|
___________ firewalls are a combination of other three types of firewalls.
|
|
7299
|
Application level gateway firewalls are also used for configuring cache-servers.
|
|
7300
|
Application level gateway firewalls protect the network for specific __________
|
|
7301
|
____________ gateway firewalls are deployed in application-layer of OSI model.
|
|
7302
|
Which of the following is a disadvantage of Circuit-level gateway firewalls?
|
|
7303
|
Which of these comes under the advantage of Circuit-level gateway firewalls?
|
|
7304
|
Circuit-level gateway firewalls are installed in _______ layer of OSI model.
|
|
7305
|
Packet filtering firewalls are vulnerable to _________
|
|
7306
|
Packet filtering firewalls work effectively in _________ networks.
|
|
7307
|
One advantage of Packet Filtering firewall is __________
|
|
7308
|
Network administrators can create their own ACL rules based on _______ ________ and _______
|
|
7309
|
When a packet does not fulfil the ACL criteria, the packet is _________
|
|
7310
|
ACL stands for _____________
|
|
7311
|
The __________ defines the packet filtering firewall rules.
|
|
7312
|
In the ______________ layer of OSI model, packet filtering firewalls are implemented.
|
|
7313
|
Packet filtering firewalls are deployed on ________
|
|
7314
|
There are ______ types of firewall.
|
|
7315
|
A firewall protects which of the following attacks?
|
|
7316
|
Firewall examines each ____________ that are entering or leaving the internal network.
|
|
7317
|
Which of the following is not a software firewall?
|
|
7318
|
_________ is software that is installed using internet connection or they come by-default with operating systems.
|
|
7319
|
_________________ is the kind of firewall is connected between the device and the network connecting to internet.
|
|
7320
|
Firewalls can be of _______ kinds.
|
|
7321
|
Which of the following is the port number for SNMP – Trap?
|
|
7322
|
Which of the following is the port number for SNMP?
|
|
7323
|
Which of the following is the port number for POP3?
|
|
7324
|
Which of the following is the port number for Kerberos?
|
|
7325
|
TACACS+ uses TCP port 49.
|
|
7326
|
Which of the following is the port number for HTTP?
|
|
7327
|
Which of the following is the port number for SFTP service?
|
|
7328
|
Why it is important to know which service is using which port number?
|
|
7329
|
Port 80 handles unencrypted web traffic.
|
|
7330
|
Which of the following is the port number for TFTP service?
|
|
7331
|
Which of the following are the port numbers for DHCP?
|
|
7332
|
Which of the following are the port numbers for IPSec service?
|
|
7333
|
Which of the following is the port number for SMTP service?
|
|
7334
|
Which of the following is the port number for Telnet?
|
|
7335
|
Which of the following is the port number for SSH (Secure Shell)?
|
|
7336
|
Which of the following is the port number for FTP control?
|
|
7337
|
Which of the following is the port number for FTP data?
|
|
7338
|
The logical port is associated with the type of protocol used along with the IP address of the host
|
|
7339
|
_______ needs some control for data flow on each and every logical port.
|
|
7340
|
Virtual ports help software in sharing without interference all hardware resources
|
|
7341
|
Logical ports are also known as ________________
|
|
7342
|
Number of logical ports ranges from _____ to _____
|
|
7343
|
____________ are logical numbers assigned for logical connections
|
|
7344
|
Physical ports are usually referred to as ___________
|
|
7345
|
There are ______ major types of ports in computers.
|
|
7346
|
_____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.ClickjackingClickjacking
|
|
7347
|
_________ is a device which secretly collects data from credit / debit cards.
|
|
7348
|
___________ is a device which secretly collects data from credit / debit cards.
|
|
7349
|
____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
|
|
7350
|
What is the shortcut key to show Spelling and Grammar ?
|
|
7351
|
____________ is a scenario when information is accessed without authorization.
|
|
7352
|
Which object is created by the UIApplicationMain function at app launch time?
|
|
7353
|
Automatic Reference Counting (ARC) is a ?
|
|
7354
|
Interactive experience of a scripting language can be enabled by ______________
|
|
7355
|
A Cocoa is a ?
|
|
7356
|
How many types of Protocols are there?
|
|
7357
|
A special C data type that encapsulates other pieces of data into a single cohesive unit is called?
|
|
7358
|
Which is true about the XCode command line tools?
|
|
7359
|
_________ are a specific section of any virus or malware that performs illicit activities in a system.
|
|
7360
|
Which shortcut keys can be used to add files in XCode?
|
|
7361
|
What is the shortcut to Edit variables in scope?
|
|
7362
|
When we use NSArray?
|
|
7363
|
Whaling is the technique used to take deep and _________ information about any individual.
|
|
7364
|
XCode is the integrated development environment (IDE) that developer use to write software for IOS or __________ applications ?
|
|
7365
|
In IP address, IP is abbreviated as ________
|
|
7366
|
What is the shortcut key in XCode to Find Previous?
|
|
7367
|
Is the delegate for a CAAnimation retained?
|
|
7368
|
Let's assume that an app is not in foreground but is still executing code. In which state will it be in?
|
|
7369
|
What is the shortcut to open the Code Snippet Library in XCode?
|
|
7370
|
Which of the following is used to design GUI of Apps (Inbuilt feature of the iPhone SDK) ?
|
|
7371
|
Name the application thread from where UIKit classes should be used?
|
|
7372
|
_______ is an attack technique occurs when excess data gets written to a memory block.
|
|
7373
|
How many operators are supported by C++?
|
|
7374
|
Each element of an array is searched against searching key, is specialty of
|
|
7375
|
In object oriented programming there are two distinct views, one is consumer and second is manufacturer view, that consumer action are called
|
|
7376
|
Adware are pre-chosen _______ developed to display ads.
|
|
7377
|
First object oriented language 'Smalltalk' were first appeared in
|
|
7378
|
Backdoors are also known as ____________
|
|
7379
|
os: : skipws, ios: : left, ios: : dec, ios: : fixed, is an example of
|
|
7380
|
________ automates an action or attack so that repetitive tasks are done at a faster rate.
|
|
7381
|
anguage that has become key programming language for Mac OSX operating system is
|
|
7382
|
IPods, iPhones and iPads programming is based on
|
|
7383
|
Data masking is also known as _________
|
|
7384
|
Object-oriented language based on C is
|
|
7385
|
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
|
|
7386
|
________ is an act of hacking by the means of which a political or social message is conveyed.
|
|
7387
|
_______ is a way to breach the security by using the vulnerability of that system.
|
|
7388
|
An/A ________ is an act that violates cyber-security.
|
|
7389
|
When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
|
|
7390
|
Existence of weakness in a system or network is called _______
|
|
7391
|
_______ is any action that might compromise cyber-security.
|
|
7392
|
IKE is abbreviated as Internet Key Exchange.
|
|
7393
|
_______ is the entity for issuing digital certificates.
|
|
7394
|
ESP is abbreviated as ___________
|
|
7395
|
SRTP is abbreviated as ________
|
|
7396
|
In which of the following cases Session Initiation Protocol is not used?
|
|
7397
|
SIP is abbreviated as __________
|
|
7398
|
The latest version of TLS is _____
|
|
7399
|
Authentication in PCT requires _____ keys.
|
|
7400
|
PCT is abbreviated as ________
|
|
7401
|
SFTP is abbreviated as _______
|
|
7402
|
Why did SSL certificate require in HTTP?
|
|
7403
|
Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection.
|
|
7404
|
S/MIME is abbreviated as __________________
|
|
7405
|
_________ is used for encrypting data at network level.
|
|
7406
|
In SSL, what is used for authenticating a message?
|
|
7407
|
SSL primarily focuses on _______
|
|
7408
|
HTTPS is abbreviated as _________
|
|
7409
|
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
|
|
7410
|
__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?
|
|
7411
|
Given that we have defined myChar like so : let myChar: Character = “b†Which code segment can be considered a complete Switch statement and will run without any error?
|
|
7412
|
Which of the following is not a secured mail transferring methodology?
|
|
7413
|
Which of the following is not a strong security protocol?
|
|
7414
|
Which keyword in the context of a Switch statement is required to force the execution of a subsequent case?
|
|
7415
|
___________ ensures the integrity and security of data that are passing over a network.
|
|
7416
|
What is the output of this segment of code ? var x = 0 for index in 1…5 { ++x } println(“(x)â€)
|
|
7417
|
In context of a Swift subscript, which of the following is correct?
|
|
7418
|
Physical _________ is important to check & test for possible physical breaches.
|
|
7419
|
Which of them is not an example of physical hacking?
|
|
7420
|
IT security department must periodically check for security logs and entries made during office hours.
|
|
7421
|
Which of the following is not a physical security measure to protect against physical hacking?
|
|
7422
|
Which of the following is not considering the adequate measure for physical security?
|
|
7423
|
________ is the ability of an individual to gain physical access to an authorized area
|
|
7424
|
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
|
|
7425
|
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.
|
|
7426
|
Tailgating is also termed as ___________
|
|
7427
|
In a phishing, attackers target the ________ technology to so social engineering.
|
|
7428
|
Which of the following is not an example of social engineering?
|
|
7429
|
Which of the following is the technique used to look for information in trash or around dustbin container?
|
|
7430
|
_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.
|
|
7431
|
Which of the following do not comes under Social Engineering?
|
|
7432
|
___________ is a special form of attack using which hackers’ exploit – human psychology.
|
|
7433
|
Which of the following is not a footprint-scanning tool?
|
|
7434
|
_________ is the last phase of ethical hacking process.
|
|
7435
|
Which of them is not a track clearing technique?
|
|
7436
|
In _______ phase, the hackers try to hide their footprints.
|
|
7437
|
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
|
|
7438
|
_______ is the tool used for this purpose.
|
|
7439
|
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
|
|
7440
|
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
|
|
7441
|
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?
|
|
7442
|
Which of the following is not done in gaining access phase?
|
|
7443
|
In __________ phase the hacker exploits the network or system vulnerabilities
|
|
7444
|
Which of the following comes after scanning phase in ethical hacking?
|
|
7445
|
Which of them is not a scanning tool?
|
|
7446
|
Which of them do not comes under scanning methodologies?
|
|
7447
|
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
|
|
7448
|
_______ phase in ethical hacking is known as the pre-attack phase.
|
|
7449
|
Which of the following is an example of passive reconnaissance?
|
|
7450
|
Which of the following is an example of active reconnaissance?
|
|
7451
|
There are ______ subtypes of reconnaissance.
|
|
7452
|
Which of the following is not a reconnaissance tool or technique for information gathering?
|
|
7453
|
__________ is the information gathering phase in ethical hacking from the target user.
|
|
7454
|
How many basic processes or steps are there in ethical hacking?
|
|
7455
|
Possible threat to any information cannot be ________________
|
|
7456
|
Lack of access control policy is a __________
|
|
7457
|
Compromising confidential information comes under _________
|
|
7458
|
_______ technology is used for analyzing and monitoring traffic in network and information flow.
|
|
7459
|
The full form of EDR is _______
|
|
7460
|
Which of the following information security technology is used for avoiding browser-based hacking?
|
|
7461
|
_____ platforms are used for safety and protection of information in the cloud.
|
|
7462
|
From the options below, which of them is not a vulnerability to information security?
|
|
7463
|
From the options below, which of them is not a threat to information security?
|
|
7464
|
_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
|
|
7465
|
One common way to maintain data availability is __________
|
|
7466
|
______ is the latest technology that faces an extra challenge because of CIA paradigm
|
|
7467
|
Data integrity gets compromised when _____ and _____ are taken control off.
|
|
7468
|
Which of these is not a proper method of maintaining confidentiality?
|
|
7469
|
Data ___________ is used to ensure confidentiality.
|
|
7470
|
This helps in identifying the origin of information and authentic user. This referred to here as __________
|
|
7471
|
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
|
|
7472
|
_______ of information means, only authorised users are capable of accessing the information
|
|
7473
|
When integrity is lacking in a security system, _________ occurs.
|
|
7474
|
______ means the protection of data from modification by unknown users
|
|
7475
|
When you use the word _____ it means you are protecting your data from getting disclosed
|
|
7476
|
CIA triad is also known as ________
|
|
7477
|
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this†referred to here?
|
|
7478
|
According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
|
|
7479
|
In general how many key elements constitute the entire security structure?
|
|
7480
|
When declaring an enumeration, multiple member values can appear on a single line, separated by which punctuation mark?
|
|
7481
|
___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain
|
|
7482
|
Which of the following types can be used use as raw value types for an enumeration?
|
|
7483
|
Stuxnet is a _________
|
|
7484
|
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium
|
|
7485
|
_________ are the special type of programs used for recording and tracking user’s keystroke
|
|
7486
|
What attribute can be used to allow a protocol to contain optional functions and to be used in ObjC?
|
|
7487
|
Which method of hacking will record all your keystrokes?
|
|
7488
|
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
|
|
7489
|
Which of them is not a wireless attack?
|
|
7490
|
Which of this is an example of physical hacking?
|
|
7491
|
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________
|
|
7492
|
When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place
|
|
7493
|
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this†attack referred to here?
|
|
7494
|
XSS is abbreviated as __________
|
|
7495
|
_____________ is a code injecting method used for attacking the database of a system / website.
|
|
7496
|
Which is used for down casting?
|
|
7497
|
Who deploy Malwares to a system or network?
|
|
7498
|
The full form of Malware is ________
|
|
7499
|
What is the type of Swift Enumerations?
|
|
7500
|
Which keyword in the context of a Switch statement is required to force the execution of a subsequent case? Answers:
|
|
7501
|
Someone (from outside) who tests security issues for bugs before launching a system or application, and who is not a part of that organization or company are ______
|
|
7502
|
What type of object are Swift Structures?
|
|
7503
|
Governments hired some highly skilled hackers. These types of hackers are termed as _______
|
|
7504
|
Which is correct regarding Swift enumeration members when they are defined?
|
|
7505
|
__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.
|
|
7506
|
What keyword is used to indicate a custom operator that will appear in between two targets, similar to the addition operator in this example? var sum = 10 + 10
|
|
7507
|
________ are senior level corporate employees who have the role and responsibilities of creating and designing secured network or security structures
|
|
7508
|
Role of security auditor is to _______
|
|
7509
|
Which of the following statements could be used to determine if a given variable is of String type?
|
|
7510
|
_________ are those individuals who maintain and handles IT security in any firm or organization
|
|
7511
|
These types of hackers are the most skilled hackers in the hackers’ community. Who are “they†referred to?
|
|
7512
|
One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________
|
|
7513
|
Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________
|
|
7514
|
Which is the wrong definition of a protocol in Swift?
|
|
7515
|
Which of these is not a valid property declaration in Swift?
|
|
7516
|
Which of these is an appropriate syntax for declaring a function that takes an argument of a generic type?
|
|
7517
|
Suicide Hackers are those _________
|
|
7518
|
Which of these is an appropriate syntax for dispatching a heavy operation to a background thread?
|
|
7519
|
The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________
|
|
7520
|
________ are the combination of both white as well as black hat hackers.
|
|
7521
|
Which of these is a valid syntax for iterating through the keys and values of a dictionary? let dictionary = [keyOne : valueOne, keyTwo : valueTwo]
|
|
7522
|
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they†referred to here?
|
|
7523
|
Which one of the below functions definitions is wrong considering Swift language?
|
|
7524
|
Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
|
|
7525
|
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________
|
|
7526
|
What is the name of the Xcode generated header file used to import Swift classes into an Objective-C Class given a product module named Example?
|
|
7527
|
What is used to import Objective-C files into Swift?
|
|
7528
|
Which of the following could be used to indicate the Function Type of the following function: func joinStrings(stringOne: String, stringTwo: String) -> String { return stringOne + stringTwo }
|
|
7529
|
How would one indicate that a variable is an enum of type Status outside the context of MyClass?
|
|
7530
|
Which one is the correct keyword for defining a constant in Swift? ( or To declare a constant in Swift you would use: )
|
|
7531
|
Which of these is an appropriate syntax for dispatching a heavy operation to a background thread?
|
|
7532
|
Which of these is a valid definition of a generic function that incorporates inout parameters in Swift?
|
|
7533
|
Which is correct for Enumerations?
|
|
7534
|
Which keyword is used on a function in an enumeration to indicate that the function will modify ‘self’?
|
|
7535
|
What is the name of the Swift language feature that Objective-C Blocks are translated into?
|
|
7536
|
Which of these statements is a valid way to extend the capabilities of our theoretical class, MyClass to conform to protocol MyProtocol?
|
|
7537
|
What does a retainCount represent in ARC?
|
|
7538
|
All Swift classes must inherit from which root class?
|
|
7539
|
Considering var index = UInt8.max, which of the following operation results to the value of zero for var index?
|
|
7540
|
Which of the following structures has both computed and stored properties?
|
|
7541
|
C# (C-Sharp) belong to which framework ?
|
|
7542
|
What is C# (C-Sharp) ?
|
|
7543
|
C# (C-Sharp) was developed by
|
|
7544
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Text; public class Program { public static void Main(string[] args) { String str = ""; StringBuilder sb1 = new StringBuilder("TechBeamers"); StringBuilder sb2 = new StringBuilder("TechBeamers"); StringBuilder sb3 = new StringBuilder("Welcome"); StringBuilder sb4 = sb3; if (sb1.Equals(sb2)) str += "1"; if (sb2.Equals(sb3)) str += "2"; if (sb3.Equals(sb4)) str += "3"; String str1 = "TechBeamers"; String str2 = "Welcome"; String str3 = str2; if (str1.Equals(str2)) str += "4"; if (str2.Equals(str3)) str += "5"; Console.WriteLine(str); } }
|
|
7545
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Console.WriteLine("H" + 'I'); Console.WriteLine('h' + 'i'); } }
|
|
7546
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public Program(Object o) { Console.WriteLine("Object argument"); } public Program(double[] arr) { Console.WriteLine("double array argument"); } public static void Main(string[] args) { new Program(null); } }
|
|
7547
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { static void Main(string[] args) { double num1 = 1.000001; double num2 = 0.000001; Console.WriteLine((num1 - num2) == 1.0); } }
|
|
7548
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { for (int x = 0; x < 10; x++) { Console.Write(x + ' '); } } }
|
|
7549
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { float num = 56, div = 0; try { Console.WriteLine(num / div); } catch (DivideByZeroException) { Console.WriteLine("Division By Zero"); } } }
|
|
7550
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { int[] singleDimArray = { 1, 2, 3, 4 }; int[,] multiDimArray = { { 1, 2 }, { 3, 4 } }; int[][] jaggedArray = { new int[] { 1, 2 }, new int[] { 3, 4 } }; Console.WriteLine(singleDimArray.Length); Console.WriteLine(multiDimArray.Length); Console.WriteLine(jaggedArray.Length); } }
|
|
7551
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { string str1 = "\U0010FADE"; string str2 = "\U0000FADE"; Console.WriteLine(str1.Length); Console.WriteLine(str2.Length); } }
|
|
7552
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Boolean b1 = true, b2 = false; if ((b2 = true) | (b1 ^ b2)) { Console.WriteLine("execution success"); } else { Console.WriteLine("execution failure"); } } }
|
|
7553
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int val = (byte)+(char)-(int)+(long)-2; Console.WriteLine(val); } }
|
|
7554
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { int num = 0; (num++); Console.WriteLine(num); } }
|
|
7555
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { Sample s = new Sample(); s.Print(); ISample i = s; i.Print(); } public interface ISample { void Print(string val = "Interface Executed"); } public class Sample : ISample { public void Print(string val = "Class Executed") { Console.WriteLine(val); } } }
|
|
7556
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { string str1 = "TechBeamers"; string str2 = "Techbeamers"; if (str1 == str2) Console.WriteLine("Both Strings are Equal"); else Console.WriteLine("Both Strings are Unequal"); if (str1.Equals(str2)) Console.WriteLine("Both Strings are Equal"); else Console.WriteLine("Both Strings are Unequal"); Console.ReadLine(); } }
|
|
7557
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { static void Main(string[] args) { Derived d = new Derived(); int i = 10; d.Func(i); Console.ReadKey(); } } public class Base { public virtual void Func(int x) { Console.WriteLine("Base.Func(int)"); } } public class Derived : Base { public override void Func(int x) { Console.WriteLine("Derived.Func(int)"); } public void Func(object o) { Console.WriteLine("Derived.Func(object)"); } }
|
|
7558
|
What Will Be The Output Of The Following Code Snippet: using System; public class Calculation { int sum = 0; int count = 0; float average; public void CalAverage() { if ( count == 0) throw ( new CountIsZeroException ("Zero count in DoAverage")); { average = sum / count; Console.WriteLine( "Program executed successfully" ); } } } public class CountIsZeroException : ApplicationException { public CountIsZeroException ( string message ) : base ( message ) { } } class Program { static void Main ( string[ ] args ) { Calculation c = new Calculation(); try { c.CalAverage(); } catch ( CountIsZeroException e ) { Console.WriteLine( "CountIsZeroException : {0}",e ); } Console.ReadLine(); } }
|
|
7559
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { try { Console.WriteLine("TechBeamers Welcomes Its Readers"); Environment.Exit(0); } finally { Console.WriteLine("To the World of C# !!"); } } }
|
|
7560
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static void Main() { var test = SingletonB.Test; } } class SingletonB { static readonly SingletonB _instance = new SingletonB(); public static SingletonB Test { get { return _instance; } } private SingletonB() { Console.WriteLine("Default Constructor"); } static SingletonB() { Console.WriteLine("Static Constructor"); } }
|
|
7561
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int i = 3; int j = 2; func1(ref i); func2(out j); Console.WriteLine(i + " " + j); } static void func1(ref int num) { num = num + num; } static void func2(out int num) { num = num * num; } }
|
|
7562
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { enum Color: int { red, green, blue = 5, cyan, magenta = 10, yellow } public static void Main() { Console.WriteLine( (int) Color.green + ", " ); Console.WriteLine( (int) Color.yellow ); } }
|
|
7563
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { public static int i = 0; public static void Main() { (i++).Assign(); } } static class Extensions { public static void Assign(this int i) { Console.WriteLine(Program.i); Console.WriteLine(i); } }
|
|
7564
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main() { int[] arr = { 1, 2, 3 }; int i = 1; arr[i++] = arr[i] + 10; Console.WriteLine(String.Join(",", arr)); } }
|
|
7565
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { static void Main(string[] args) { string str = "100p"; int i = 0; if(int.TryParse(str,out i)) {Console.WriteLine("Yes string contains Integer and it is " + i); } else { Console.WriteLine("string does not contain Integer"); } } }
|
|
7566
|
What Will Be The Output Of The Following Code Snippet: using System; class Program { static void Main(string[] args) { String s1 = "TechBeamers"; String s2 = "Welcomes its readers"; String s3 = s2; Console.WriteLine((s3 == s2) + " " + s2.Equals(s3)); Console.ReadLine(); } }
|
|
7567
|
What Will Be The Output Of The Following Code Snippet: using System; namespace TechBeamers { class Sample { public int num; public int[] arr = new int[10]; public void assign(int i, int val) { arr[i] = val; } } class Program { static void Main(string[] args) { Sample s = new Sample(); s.num = 100; Sample.assign(0, 10); s.assign(0, 9); Console.WriteLine(s.arr[0]); } } }
|
|
7568
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int i, j = 1, k; for (i = 0; i < 5; i++) { k = j++ + ++j; Console.Write(k + " "); } } }
|
|
7569
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int n = 5; int x = 4; int z, c, k; z = 3 * x * x + 2 * x + 4 / x + 8; for (c = 1; c <= n; c++) { for (k = 1; k <= c; k++) { Console.Write(Convert.ToString(Convert.ToChar(z))); z++; } Console.WriteLine("\n"); } Console.ReadLine(); } }
|
|
7570
|
What Will Be The Output Of The Following Code Snippet: using System; namespace TechBeamers { class sample { public int x; private int y; public void assign(int a, int b) { x = a + 1; y = b; } } public class Program { public static void Main(string[] args) { sample s = new sample(); s.assign(1, 1); Console.WriteLine(s.x + " " + s.y); } } }
|
|
7571
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main() { classA a = new classC(); Console.WriteLine(a.Print()); } public class classA { public virtual string Print() { return "classA"; } } public class classB : classA { public override string Print() { return "classB"; } } public class classC : classB { public new string Print() { return "ClassC"; } } }
|
|
7572
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { bool a = true; bool b = false; a |= b; Console.WriteLine(a); Console.ReadLine(); } }
|
|
7573
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { bool a = true; bool b = false; a ^= b; Console.WriteLine(a); Console.ReadLine(); } }
|
|
7574
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.ObjectModel; using System.Collections.Generic; namespace TechBeamers { delegate void A(ref string str); public class sample { public static void StringMarker(ref string a) { a = a.Substring(0, a.Length - 6); } } public class Program { public static void Main(string[] args) { A str1; string str = "Let's Learn CSharp"; str1 = sample.StringMarker; str1(ref str); Console.WriteLine(str); } } }
|
|
7575
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main() { Nullable number = 0; int num = 1; Console.WriteLine(number.GetType() == num.GetType()); } }
|
|
7576
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.ObjectModel; using System.Collections.Generic; public class Program { public static void Main() { var arr = new List { 20, 40, 35, 85, 70 }; var collection = new Collection(arr); arr.Add(60); arr.Sort(); Console.WriteLine(String.Join(",", collection)); } }
|
|
7577
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; namespace TechBeamers { public delegate void sampleDelegate(int num); public class testDelegate { public void checkEven(int num) { if(num%2 ==0) Console.WriteLine("This number is an even number"); else Console.WriteLine("This number is an odd number"); } public void squareNumber(int num) { Console.WriteLine("Square of this number is: {0}", num*num); } } class sample { public static void Main( ) { testDelegate obj = new testDelegate(); sampleDelegate delegateObj = new sampleDelegate(obj.checkEven); delegateObj += new sampleDelegate(obj.squareNumber); delegateObj(25); } } }
|
|
7578
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; namespace TechBeamers { delegate string del(string str); class sample { public static string DelegateSample(string a) { return a.Replace(',', '*'); } } public class InterviewProgram { public static void Main(string[] args) { del str1 = new del(sample.DelegateSample); string str = str1("Welcome,,friends,,to,,TechBeamers"); Console.WriteLine(str); } } }
|
|
7579
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; public class Program { public static void Main(string[] args) { var actions = new List(); for (int i = 0; i < 4; i++) actions.Add(() => Console.WriteLine(i)); foreach (var action in actions) action(); } }
|
|
7580
|
What Will Be The Output Of The Following Code Snippet: using System; using System.Collections.Generic; public class Program { public static void Main(string[] args) { string[] strings = { "abc", "def", "ghi" }; var actions = new List(); foreach (string str in strings) actions.Add(() => { Console.WriteLine(str); }); foreach (var action in actions) action(); } }
|
|
7581
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Program obj = null; Console.WriteLine(Program.print()); } private static String print() { return "Hi, I am a Tech-savvy!!"; } }
|
|
7582
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { char[] num = { '1', '2', '3' }; Console.WriteLine(" char array: " + num); } }
|
|
7583
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int num1 = 20; int num2 = 30; num1 ^= num2 ^= num1 ^= num2; Console.WriteLine(num1 + ","+ num2); } }
|
|
7584
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { char x = 'A'; int i = 0; Console.WriteLine (true ? x : 0); Console.WriteLine(false ? i : x); } }
|
|
7585
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Program p = new Program(); p.print(2, 3, 8); int[] arr = { 2, 11, 15, 20 }; p.print(arr); Console.ReadLine(); } public void print(params int[] b) { foreach (int i in b) { Console.WriteLine(i); } } }
|
|
7586
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { static void arrayMethod(int[] a) { int[] b = new int[5]; a = b; } public static void Main(string[] args) { int[] arr = new int[10]; arrayMethod(arr); Console.WriteLine(arr.Length); }
|
|
7587
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { String a = "TechBeamers"; String b = "TECHBEAMERS"; int c; c = a.CompareTo(b); Console.WriteLine(c); } }
|
|
7588
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int[] arr = new int[2]; arr[1] = 10; Object o = arr; int[] arr1 = (int[])o; arr1[1] = 100; Console.WriteLine(arr[1]); ((int[])o)[1] = 1000; Console.WriteLine(arr[1]); } }
|
|
7589
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { #if (!pi) Console.WriteLine("i"); #else Console.WriteLine("PI undefined"); #endif Console.WriteLine("ok"); Console.ReadLine(); } }
|
|
7590
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { byte num = 100; dynamic val = num; Console.WriteLine(val.GetType()); val += 100; Console.WriteLine(val.GetType()); } }
|
|
7591
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { int[] i = new int[0]; Console.WriteLine(i[0]); } }
|
|
7592
|
What Will Be The Output Of The Following Code Snippet: using System; public class Program { public static void Main(string[] args) { Console.WriteLine(Math.Round(6.5)); Console.WriteLine(Math.Round(11.5)); } }
|
|
7593
|
What Will Be The Output Of The Following Code Snippet? using System; class Program { static void Main(string[] args) { int num = 5; int square = 0, cube = 0; Mul (num, ref square, ref cube); Console.WriteLine(square + " & " +cube); Console.ReadLine(); } static void Mul (int num, ref int square, ref int cube) { square = num * num; cube = num * num * num; } }
|
|
7594
|
What Will Be The Output Of The Following Code Snippet? using System; class sum { public int value; int num1; int num2; int num3; public sum ( int a, int b, int c) { this.num1 = a; this.num2 = b; this.num3 = c; } ~ sum() { value = this.num1 * this.num2 * this.num3; Console.WriteLine(value); } } class Program { public static void Main(string[] args) { sum s = new sum(4, 5, 9); } }
|
|
7595
|
What Will Be The Output Of The Following Code Snippet? using System; class sample { int i; double k; public sample (int ii, double kk) { i = ii; k = kk; double j = (i) + (k); Console.WriteLine(j); } ~sample() { double j = i - k; Console.WriteLine(j); } } class Program { static void Main(string[] args) { sample s = new sample(9, 2.5); } }
|
|
7596
|
What Is The Correct Name Of A Method Which Has The Same Name As That Of Class And Used To Destroy Objects?
|
|
7597
|
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int x = 8; int b = 16; int c = 64; x /= c /= b; Console.WriteLine(x + " " + b+ " " +c); Console.ReadLine(); } }
|
|
7598
|
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int x = 4 ,b = 2; x -= b/= x * b; Console.WriteLine(x + " " + b); Console.ReadLine(); } }
|
|
7599
|
Which Of The Following Statements Correctly Tell The Differences Between ‘=’ And ‘==’ In C#?
|
|
7600
|
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int[] arr = new int[] {1 ,2 ,3 ,4 ,5 }; fun1(ref arr); Console.ReadLine(); } static void fun1(ref int[] array) { for (int i = 0; i < array.Length; i=i+2) { array[i] = array[i] + 10; } Console.WriteLine(string.Join(",", array)); } }
|
|
7601
|
What Will Be The Output Of The Following Code Snippet? using System; class program { static void Main(string[] args) { int num = 2; fun1 (ref num); Console.WriteLine(num); Console.ReadLine(); } static void fun1(ref int num) { num = num * num * num; } }
|
|
7602
|
What Will Be The Output Of The Following Code Snippet? using System; class sample { public static void first() { Console.WriteLine("first method"); } public void second() { first(); Console.WriteLine("second method"); } public void second(int i) { Console.WriteLine(i); second(); } } class program { public static void Main() { sample obj = new sample(); sample.first(); obj.second(10); }
|
|
7603
|
Which Of The Following Gives The Correct Count Of The Constructors That A Class Can Define?
|
|
7604
|
Which Of The Following Statements Are Correct For The Given Code Snippet: shape obj; obj = new shape();
|
|
7605
|
What Will Be The Output Of The Following Code Snippet? using System; class emp { public string name; public string address; public void display() { Console.WriteLine("{0} is in city {1}", name, address); } } class Program { static void Main(string[] args) { emp obj = new emp(); obj.name = "Akshay"; obj.address = "new delhi"; obj.display(); Console.ReadLine(); } }
|
|
7606
|
Which Of The Following Operator Can Be Used To Access The Member Function Of A Class?
|
|
7607
|
Which Of The Following Can Be Used To Define The Member Of A Class Externally?
|
|
7608
|
Which of the following data types is implicitly passed by reference in PHP 5 while it is passed by value in PHP 4?
|
|
7609
|
Correct way to assign values to variable c when int a=12, float b=3.5,int c;
|
|
7610
|
Which of the following types of cursors is available with ADO.NET DataReader object?
|
|
7611
|
What is the output of the following code? <?php $a = 'a'; $b = 'b'; echo isset($c) ? $a.$b.$c : ($c = 'c').'d'; ?>
|
|
7612
|
Which datatype should be more preferred for storing a simple number like 35 to improve execution speed of a program?
|
|
7613
|
What is the maximum size of the VARCHAR column type?
|
|
7614
|
You created a stored procedure to retrieve the following details for the given customer: CustomerName, Address, PhoneNumber Which of the following is an ideal choice to get the best performance?
|
|
7615
|
Which of the following is capable of returning multiple rows and multiple columns from the database?
|
|
7616
|
An assembly must have an permission to connect with web server is?
|
|
7617
|
Which of the following are value types
|
|
7618
|
Which of the following converts a type to a signed byte type in C#?
|
|
7619
|
Arrange the following datatype in order of increasing magnitude sbyte, short, long, int.
|
|
7620
|
Correct Declaration of Values to variables a and b?
|
|
7621
|
For locking the data with synchronization which class will be used?
|
|
7622
|
Which of the following preprocessor directive defines a sequence of characters as symbol in C#?
|
|
7623
|
How many Bytes are stored by Long Datatype in C# .net?
|
|
7624
|
Which access specifier will you use to make base class members accessible in the derived class and not accessible for the rest of the program?
|
|
7625
|
The original name of Common Intermediate Language is
|
|
7626
|
The global assembly cache
|
|
7627
|
In order to lock/unlock an object use the
|
|
7628
|
Which of the following did not result in an output error in PHP 4 but does in PHP 5?
|
|
7629
|
Which of the following keyword is used for including the namespaces in the program in C#?
|
|
7630
|
Which of the following did not result in an output error in PHP 4 but does in PHP 5?:
|
|
7631
|
Which sentence describes the following regular expression match? preg_match('/^\d*(?:\.[0-9]+)?$/', $test);
|
|
7632
|
_____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
|
|
7633
|
Who was the first individual to distribute computer worms through internet?
|
|
7634
|
In which year the Computer Fraud & Abuse Act was adopted in the United States?
|
|
7635
|
What is the ideal method of copying data between two opened files?
|
|
7636
|
In which year computer scientists try to integrate encryption technique in TCP/IP protocol?
|
|
7637
|
Who coined the term “cyberspace�
|
|
7638
|
Name the hacker who breaks the ARPANET systems?
|
|
7639
|
Who was the first individual who performed a major hacking in the year 1971?
|
|
7640
|
In which year, hacking became a practical crime and a matter of concern in the field of technology?
|
|
7641
|
In which year, first practical technology hacking came into origin?
|
|
7642
|
______ is the oldest phone hacking techniques used by hackers to make free calls
|
|
7643
|
What is the name of the first hacker’s conference?
|
|
7644
|
In which year the first popular hacker conference took place?
|
|
7645
|
What is the one thing that old hackers were fond of or find interests in?
|
|
7646
|
From where the term ‘hacker’ first came to existence?
|
|
7647
|
From where the term ‘hacker’ first came to existence?
|
|
7648
|
In which year the term hacking was coined?
|
|
7649
|
Which of the following features is activated in iPhone when you rotate the device from portrait to landscape?
|
|
7650
|
What is resolution of iPad Min in portrait mode?
|
|
7651
|
What Does SAX stands for?
|
|
7652
|
Which iOS version supports multitasking?
|
|
7653
|
What is meant by Nil?
|
|
7654
|
Where does an activity exists when it doesn't exist in memory?
|
|
7655
|
What does DOM stands for?
|
|
7656
|
Which are the app specific objects that stores the app's content?
|
|
7657
|
Is it true that the iPhone browser supports flash applications?
|
|
7658
|
Which of the following is NOT a state in the life cycle of an iOS app?
|
|
7659
|
What is meaning of "synthesize" keyword ?
|
|
7660
|
Which wireless mode connects machines directly to one another, without the use of an access point?
|
|
7661
|
What is the major difference between an 'Ethical Hacker' and a 'Cracker'?
|
|
7662
|
How can we find the memory leaks in an app that uses MRC (Manual Reference Counting)?
|
|
7663
|
What does KVC stands for?
|
|
7664
|
What are the two basic types of attacks ?
|
|
7665
|
In a UITableViewCell constructor, What is the use of reuseIdentifier ?
|
|
7666
|
What does the term "Ethical Hacking" mean?
|
|
7667
|
What is the best reason to implement a security policy?
|
|
7668
|
Which tool can be used to perform a DNS zone transfer on Windows?
|
|
7669
|
How can we use a reusable cell in UITableview?
|
|
7670
|
Why would an attacker want to perform a scan on port 137?
|
|
7671
|
A packet with all flags set is which type of scan?
|
|
7672
|
What does the TCP RST command do?
|
|
7673
|
Banner grabbing is an example of what?
|
|
7674
|
What port number does HTTPS use?
|
|
7675
|
Which are the four regional Internet registries?
|
|
7676
|
When a hacker attempts to attack a host via the Internet it is known as what type of attack?
|
|
7677
|
Hacking for a cause is called .................
|
|
7678
|
Which type of hacker represents the highest risk to your network?
|
|
7679
|
What is the first phase of hacking?
|
|
7680
|
what is the primary goal of an Ethical Hacker ?
|
|
7681
|
A good security policy can help to protect a network
|
|
7682
|
This attack involves eavesdropping on a network and capturing sensitive information
|
|
7683
|
Active cracking is more effective than passive cracking
|
|
7684
|
Rainbow table attack uses the algorithms that try to guess all possible logical combination to crack the password
|
|
7685
|
Brute force attack uses wordlist to crack a passwords
|
|
7686
|
The Encrypted information is known as a ____
|
|
7687
|
Can we change the default services port number like for FTP?
|
|
7688
|
Name the tool that can be used to install, delete & replicate programs
|
|
7689
|
Patch management is use of software code to fix bugs and secure the software
|
|
7690
|
The ____ attack used to compromise the DNS servers to redirect all the traffic to a malicious site
|
|
7691
|
Which attack is used to crash Web Server
|
|
7692
|
Telnet service runs on which Port number
|
|
7693
|
____ is used to intercept packages as they are transmitted over the network
|
|
7694
|
Which service runs on port 21
|
|
7695
|
Which of the following was NOT one of the pseudonyms under which Swift published?
|
|
7696
|
How many number of bits are used by IPv6
|
|
7697
|
SHA-512 encryption uses ____ bit words
|
|
7698
|
Swift had a rich literary ancestry. He had some family relation to all of the following people EXCEPT whom?
|
|
7699
|
____is the art of exploiting the human elements to gain access to un-authorized resources
|
|
7700
|
A worm is not a malicious computer program
|
|
7701
|
Swift was perhaps best known for what historically popular work?
|
|
7702
|
A ____ is a program that allows the attack to control the user's computer from a remote location
|
|
7703
|
NetStumbler is cross platform and open source tool
|
|
7704
|
True or False: Though he used many pen names, Swift never published completely anonymously
|
|
7705
|
The password cracking utility John The Ripper is cross platform
|
|
7706
|
A ______ who gains access to systems with a view to fix the identified weaknesses
|
|
7707
|
Although he was a poet and an essayist, Swift was best known as a ___________.
|
|
7708
|
Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc
|
|
7709
|
The _____ defines a threat is the potential cause of an incident that may result in harm of systems and organization
|
|
7710
|
Name the hacker who uses hacking to send social, religious, and political, etc messages. This is, usually, done by hijacking websites and leaving a message on the hijacked website
|
|
7711
|
Which of the following is true regarding WEP cracking?
|
|
7712
|
Which of the following is a passive wireless discovery tool?
|
|
7713
|
What is the maximum length of an SSID?
|
|
7714
|
CDMA stands for
|
|
7715
|
Which wireless mode connects machines directly to one another, without the use of an access point?
|
|
7716
|
What is the attack called “evil twin�
|
|
7717
|
What are the forms of password cracking techniques?
|
|
7718
|
At which layer of the OSI communication model dose bridge operate?
|
|
7719
|
What Is A LLVM ?
|
|
7720
|
Which wireless standard can operate at speeds of 100+ Mbps and uses the 2.4GHz to 5GHz range?
|
|
7721
|
What is the preferred communications method used with systems on a bot-net?
|
|
7722
|
Double Has A Precision Of At Least _ Decimal Digits In Swift.
|
|
7723
|
To Create Contants In Swift We Use Keyword ...
|
|
7724
|
Which Of The Following IOS Frameworks Is A Commonly Used Third Party Library?
|
|
7725
|
To Create Mutable Object __ Is Used
|
|
7726
|
Which of the following class implements the behavior of scrollable, multiline text region.
|
|
7727
|
to switch from one viewController to another , the method use is presentViewController() is used
|
|
7728
|
What is the full form of XIB?
|
|
7729
|
what is the extension of compiled version of main.storyboard file??
|
|
7730
|
All view in iOs derived from
|
|
7731
|
Where you can use protocol as a type?
|
|
7732
|
Which framework delivers event to custom object when app is in foreground?
|
|
7733
|
Who calls the main function of app during the app launch cycle?
|
|
7734
|
Which of these could be an appropriate protocol declaration in Swift?
|
|
7735
|
Which is the wrong definition of a protocol in Swift?
|
|
7736
|
Which is the content of UITableViewCell ?
|
|
7737
|
Types of Lookup cache…….
|
|
7738
|
which one of these non-reusable transformation
|
|
7739
|
The application has not been launched or was running but terminated by the device.Determine the current state of App.
|
|
7740
|
What is true about UIViewTable Section?
|
|
7741
|
What are tasks can do in designer …..
|
|
7742
|
Which of following are security tasks of repository manager
|
|
7743
|
Which of the following is a property of TableView?
|
|
7744
|
Which of following Joins in Informatica………
|
|
7745
|
You need to escape special characters to use user input inside a regular expressionWhich functions would you use?
|
|
7746
|
we want to compare objects in Filter and aggregate transformation which data type you use……..
|
|
7747
|
ios method for onStart() is???
|
|
7748
|
How do you know that session has heterogeneous target?
|
|
7749
|
Which of the following may be used in conjunction with CASE inside a SWITCH statement?
|
|
7750
|
For Updating Record on database table,
|
|
7751
|
___ helps us to navigate among many ViewController.
|
|
7752
|
which of the following method is called only once in iOS viewController life cycle?
|
|
7753
|
For Unconnected Lookup how many ports can be given as input values
|
|
7754
|
How many port values can be retrieved by an unconnected lookup and connected lookup respectively
|
|
7755
|
onDestroy() method in Android activity life cycle is similar to___ method in iOS viewController life cycle.
|
|
7756
|
Which Component gets metadata from Repository?
|
|
7757
|
Which of the following function returns an index path representing the row and section of a given table-view cell.
|
|
7758
|
In which Order does the execution of ports take place
|
|
7759
|
Which of the following function returns the table cell at the specified index path?
|
|
7760
|
Joiner Can
|
|
7761
|
Which of the following is/are true?
|
|
7762
|
Which of the following is not a part of life cycle of iOS
|
|
7763
|
Which of the following is/are true?
|
|
7764
|
When you call Save on an XElement or XDocument to write its content to a file, an XML declaration is included in the output:
|
|
7765
|
IBOutlet is used to create functions of UIfield?
|
|
7766
|
In the following example, what’s the namespace of the inner element name? XNamespace ns = "http://albahari.com/linqquiz"; var x = new XElement (ns + "customer", new XElement ("name", "Bloggs") );
|
|
7767
|
Which of the following is/are better option if all below satisfies the requirement
|
|
7768
|
What does the following example print? var city = new XElement ("city", "Seattle"); var customer1 = new XElement ("customer", city); var customer2 = new XElement ("customer", city); city.SetValue ("London"); Console.WriteLine (customer2.Element ("city").Value);
|
|
7769
|
In Swift there are two kinds of types: named and __.
|
|
7770
|
If Sorted Input of Aggregator is unchecked,
|
|
7771
|
Can an Output Port be used in the editable area of widgets
|
|
7772
|
In LINQ to SQL, to request that an entity’s association properties be populated along with the entity (in a single round trip), you would:
|
|
7773
|
Which of the among class is super class of view controller objects?
|
|
7774
|
In Sequence Generator, If Current Value = 10, Increment By value=1, what is the NextVal value?
|
|
7775
|
A LINQ to SQL query can include calls to your own local methods:
|
|
7776
|
Which Client component can be used for creating Repository?
|
|
7777
|
IBActikn and IBOutlet are macros defined to denote variables and method that can be referred in interface Builder.
|
|
7778
|
A LINQ to SQL query that uses join clauses can perform the equivalent of which of the following kind(s) of SQL JOIN
|
|
7779
|
What manages the scheduling and execution of workflows?
|
|
7780
|
Storyboard is used as UI designing file inside Ios?
|
|
7781
|
Which Function(s) cannot be used in Expression Widget(doubt)
|
|
7782
|
A LINQ to SQL query that uses multiple from clauses (or SelectMany) can perform the equivalent of which of the following kind(s) of SQL JOIN:
|
|
7783
|
Uninitialized array can be declared implicitly true or false
|
|
7784
|
Which of the following are active Transformations?
|
|
7785
|
ARC in swift is functionally similar to destructor
|
|
7786
|
some question like………….. what are the groups in router transformation
|
|
7787
|
The compiler translates queries containing multiple generators (i.e., multiple from clauses) into:
|
|
7788
|
How does the compiler resolve the let clause, in the following query? from c in colors let middle = c.Substring (1, c.Length - 2) where middle.Contains ("e") select middle
|
|
7789
|
Which choice is the output value of the following code Var a = 0 let b = ++a let c = a++ "Print "(\(a)\(b)\(c))
|
|
7790
|
What's the output from the following? string s = "e"; var query = colors.Where (c => c.Contains (s)); s = "n"; query = query.Where (c => c.Contains (s)); Console.WriteLine (query.Count());
|
|
7791
|
An informatica variable contains
|
|
7792
|
What's the output from the following? string[ ] colors = { "green", "brown", "blue", "red" }; var query = colors.Where (c => c.Contains ("e")); query = query.Where (c => c.Contains ("n")); Console.WriteLine (query.Count());
|
|
7793
|
Application is in background. Not executing any code. What is the current application state?
|
|
7794
|
What does the following example output? var list = new List<string> (colors); IEnumerable<string> query = list.Where (c => c.Length == 3); list.Remove ("red"); Console.WriteLine (query.Count());
|
|
7795
|
What are the things that should be configured when a source is directly imported from database?
|
|
7796
|
Assuming we make it syntactically correct, how many times does the Max subquery execute in the preceding example, when query is enumerated?
|
|
7797
|
Info.plist is application configuration file inside ios??
|
|
7798
|
Config tab contains -------- and ------- properties (check box one)
|
|
7799
|
What's the output from the following? var query = from c in colors where c.Length == colors.Max (c => c.Length) select c; foreach (var element in query) Console.WriteLine (element);
|
|
7800
|
Given the following statement: var query = from c in colors where c.Length > 3 orderby c.Length select c; what type is query?
|
|
7801
|
What are the dependencies of repository manager (check box question?)
|
|
7802
|
What does the following expression evaluate to? colors.Max (c => c.Length)
|
|
7803
|
which of the following is a default UI property?
|
|
7804
|
What does this expression evaluate to?
|
|
7805
|
Which type of class object is returned by method "storyBoard.instantiateViewControllerWithIdentifier()" ?
|
|
7806
|
IF max no of sessions are 20 then what is the minimum shared memory size
|
|
7807
|
What is the data format u prefer for informatica server
|
|
7808
|
What does the following expression evaluate to?
|
|
7809
|
To access documentation, hold down ___ while clicking a class you want to view.
|
|
7810
|
HOW MANY TYPES OF DATA EXTRACTION ARE THERE
|
|
7811
|
Multitasking for iOS was first released in which year?
|
|
7812
|
___________________ allow to encapsulate discrete units of functionality and provide a graphical representation of that functionality to the user
|
|
7813
|
The iPhone has a feature that activates when you rotate the device from portrait to landscape.
|
|
7814
|
ios apps are based on ____.
|
|
7815
|
version of Ios for first iPad is ...........
|
|
7816
|
UIAlertController is inherited from UIViewController ?
|
|
7817
|
which of the following are main responsibilities of view controller?
|
|
7818
|
Trace the output namespace A { class MyClass { public void fun() { Console.WriteLine( " C # is fun " ); } } namespace B { class MyClass { public void fun() { Console.WriteLine( " C # is interesting " ); } } } } Consider the above code what will be the output of following program class Program { static void Main(string[] args) { A.B.MyClass obj = new A.B.MyClass(); obj.fun(); } }
|
|
7819
|
Trace the output namespace A { class MyClass { public void fun() { Console.WriteLine("C # is fun"); } } namespace B { class MyClass { public void fun() { Console.WriteLine("C # is interesting"); } } } } Consider the above code what will be the output of following program class Program { static void Main(string[] args) { A.MyClass obj = new A.MyClass(); obj.fun(); } }
|
|
7820
|
InstantaiteViewControllerWithIdentifier() this method return object of...
|
|
7821
|
Trace the output class Myclass { public int count = 0; public Myclass() { count++; } } class Program { static void Main(string[] args) { Myclass obj1 = new Myclass(); Console.WriteLine(obj1.count); Myclass obj2 = new Myclass(); Console.WriteLine(obj2.count); Myclass obj3 = new Myclass(); Console.WriteLine(obj3.count); } }
|
|
7822
|
Which of the following are correct? 1. An interface can be instantiated directly. 2. Interfaces can contain constructor. 3. Interfaces contain no implementation of methods. 4. Classes and structs can implement more than one interface. 5. An interface itself can inherit from multiple interfaces.
|
|
7823
|
What are the animations in UI MODEL TRANSITION STYLE ?
|
|
7824
|
Which of the following are correct? 1. Delegates are like C++ function pointers. 2. Delegates allow methods to be passed as parameters. 3. Delegates can be used to define callback methods. 4. Delegates are not type safe.
|
|
7825
|
Every UIView Class in ios Subclass of
|
|
7826
|
The jQuery animate() method can be used to animate ANY CSS property?
|
|
7827
|
Properties in .NET can be declare as 1. Static, Protected internal, Virtual 2. Public, internal, Protected internal 3. Only public 4. None
|
|
7828
|
Which of the following statements are correct? 1. Indexers enable objects to be indexed in a similar manner to arrays. 2. The this keyword is used to define the indexers. 3. Indexers can be overloaded. 4. Indexer cannot be used in interface
|
|
7829
|
Which jQuery method returns the direct parent element of the selected element?
|
|
7830
|
Look at the following selector: $(":disabled"). What does it select?
|
|
7831
|
Which jQuery method is used to remove selected elements?
|
|
7832
|
Look at the following selector: $("p#intro"). What does it select?
|
|
7833
|
Look at the following selector: $("div p"). What does it select?
|
|
7834
|
What is default animation for view controller?
|
|
7835
|
n which year Apple introduced multitasking supported iphones ?
|
|
7836
|
How to add UI elements.
|
|
7837
|
What is the iOS version launched by apple with iPhone 5S ?
|
|
7838
|
All Swift classes must inherit from which root class?
|
|
7839
|
ios apps are based on ____.
|
|
7840
|
the protocol that defines a text fields delegate is called _____.
|
|
7841
|
)Which of the following is a default UI property?
|
|
7842
|
What is role of init( )?
|
|
7843
|
Which of the following statement is true for iOS Storyboards?
|
|
7844
|
In view controller which is by default model transition style?
|
|
7845
|
By defult instantiateViewControllerWithIdentifire return object of...
|
|
7846
|
Which one of the below functions definitions is wrong considering Swift language?
|
|
7847
|
In which year multitasking was introduced?
|
|
7848
|
What is "Ib" in IBOutlet?
|
|
7849
|
___ is used to mask the password?
|
|
7850
|
Look at the following selector: $("div"). What does it select?
|
|
7851
|
which property is used in iOS to set hint?
|
|
7852
|
jQuery uses CSS selectors to select elements?
|
|
7853
|
used to connect button with function.
|
|
7854
|
Question: which key is use to emulate gesture in ios?
|
|
7855
|
To switch from one viewController to another , the method use is presentViewController() is used.
|
|
7856
|
To switch from one view controller to another , the concept of segueway is used.
|
|
7857
|
To make connection with interface builder which keyword is used?
|
|
7858
|
Which built-in method returns the string representation of the number's value?
|
|
7859
|
Flash Applications is supported in iPhone browsers.Is it true?
|
|
7860
|
Which built-in method returns the calling string value converted to upper case?
|
|
7861
|
Which built-in method returns the calling string value converted to lower case?
|
|
7862
|
Type casting in Swift is implemented with the__ operator.
|
|
7863
|
Which built-in method returns the characters in a string beginning at the specified location?
|
|
7864
|
Which built-in method sorts the elements of an array?
|
|
7865
|
which version of iOS work only on iPad??
|
|
7866
|
The best way for handling exception when dealing with a database connection?
|
|
7867
|
Which built-in method reverses the order of the elements of an array?
|
|
7868
|
In which year Apple introduced multitasking supported iphones ?
|
|
7869
|
For building new types at runtime which class can be used?
|
|
7870
|
Which built-in method adds one or more elements to the end of an array and returns the new length of the array?
|
|
7871
|
Which of the following statement(s) is/are incorrect? 1. Properties associate values with a particular class, structure, or enumeration. 2. Methods are functions that are associated with a particular type.
|
|
7872
|
Reflection can be used when?
|
|
7873
|
Which built-in method removes the last element from an array and returns that element?
|
|
7874
|
Which of the following statement(s) is/are correct? 1. Every instance of a type has an implicit property called self. 2. It is exactly equivalent to the instance itself. 3. self property is used to refer to the current instance within its own instance methods.
|
|
7875
|
Which built-in method returns the length of the string?
|
|
7876
|
Which built-in method returns the index within the calling String object of the first occurrence of the specified value?
|
|
7877
|
Which built-in method calls a function for each element in the array?
|
|
7878
|
Which built-in method combines the text of two strings and returns a new string?
|
|
7879
|
What is the correct way to find intersection between two Set s1 and s2 ?
|
|
7880
|
Choose the correct one 1) XML serialization serializes the public fields and properties of an object. 2) XML serialization serializes the private fields and properties of an object. 3) XML serialization serializes only the public methods.
|
|
7881
|
Choose the correct one 1) Sealed class can be declared as abstract 2) Abstract class cannot be declared as abstract 3) Abstract class can be declared as abstract
|
|
7882
|
A write - only property can be specified if the following is present
|
|
7883
|
An indexer is
|
|
7884
|
You need to select a class that is optimized for key - based item retrieval from both small and large collections. Which class should you choose?
|
|
7885
|
You need to identify a type that meets the following criteria: • Is always a number. • Is not greater than 65,535. Which type should you choose?
|
|
7886
|
Which of the following is dictionary object?
|
|
7887
|
You want to configure the application to use the following authorization rules in web.config file. • Anonymous users must not be allowed to access the application. • All employees except ABC must be allowed to access the application.
|
|
7888
|
An assembly must have an permission to connect with web server is?
|
|
7889
|
Thread class has the following property. A. ManagedThreadID B. IsBackground C. IsBackgroundColor D. Abort
|
|
7890
|
Which delegate is required to start a thread with one parameter?
|
|
7891
|
For locking the data with synchronization which class will be used?
|
|
7892
|
How many readers can simultaneously read data with ReaderWriterLock if there is no writer locks apply?
|
|
7893
|
Which of the following are value types?
|
|
7894
|
Which of the following are reference types?
|
|
7895
|
Why should you write the cleanup code in Finally block?
|
|
7896
|
When the garbage collector runs.
|
|
7897
|
Method parameters are enclosed in parentheses and are separated by
|
|
7898
|
In C#, exception handling should be used
|
|
7899
|
Property that Array class in C# checks whether Array is read only is <br/> <code> int[] a = {11, 3, 5, 9, 4}; </code>
|
|
7900
|
A function capable of returning
|
|
7901
|
When you begin a new C# Windows project, a new form is automatically added to project and given name
|
|
7902
|
A subroutine capable of returning values
|
|
7903
|
Find correctly initialized constructor
|
|
7904
|
Basis of boolean logic were formed by
|
|
7905
|
A master page
|
|
7906
|
Term metadata refers to
|
|
7907
|
Signature of a function is defined by
|
|
7908
|
To fully abstract a class from its implementation we use
|
|
7909
|
An inheritance mechanism facilitates
|
|
7910
|
Process of defining a method in terms of itself, that is a method that calls itself is
|
|
7911
|
Output for following code will be <br/> <code> static void Main(string[] args) { int a = 3, b = 5, c = 1; int z = ++b; int y = ++c; b = Convert.ToInt32((Convert.ToBoolean(z)) && (Convert.ToBoolean(y)) || Convert.ToBoolean(Convert.ToInt32(!(++a == b)))); a = Convert.ToInt32(Convert.ToBoolean(c) || Convert.ToBoolean(a--)); Console.WriteLine(++a); Console.WriteLine(++b); Console.WriteLine(c); } </code>
|
|
7912
|
Original name of Common Intermediate Language is
|
|
7913
|
Choose from given options one that can be overloaded
|
|
7914
|
In order to lock/unlock an object use the
|
|
7915
|
Function types can be used as ................... types for nesting functions.
|
|
7916
|
Which of the following is correct about callbacks?
|
|
7917
|
Which of the following declares a mutable array in swift ?
|
|
7918
|
Disadvantages of Explicit type conversion are that it
|
|
7919
|
Which of the following type of variable takes precedence over other if names are same?
|
|
7920
|
Which of the following type of variable is visible only within a function where it is defined?
|
|
7921
|
Which one creates a dictionary with a key type of Integer and value of String?
|
|
7922
|
Which of the following type of variable is visible everywhere in your JavaScript code?
|
|
7923
|
How can you get the total number of arguments passed to a function?
|
|
7924
|
Which keyword do you use to declare enumeration?
|
|
7925
|
How can you get the type of arguments passed to a function?
|
|
7926
|
Swift’s closure expressions have a clean, clear style, with optimizations that encourage brief, clutter-free syntax in common scenarios. For These purpose which optimizations must be included ?
|
|
7927
|
Can you assign a anonymous function to a variable?
|
|
7928
|
Which of the following is a valid type of function javascript supports?
|
|
7929
|
Can we overload destructor in swift?
|
|
7930
|
Which of the following is correct about jQuery?
|
|
7931
|
uninitialized array can be declared implicitly true or false
|
|
7932
|
Which of the following statement are ture for the set ? Statement I. sequence doesn't matter II. does not allow duplicate value III. Can be created only explicitly
|
|
7933
|
which xcode tool runs swift code ?
|
|
7934
|
which of the following is the correct way to move an element into another element?
|
|
7935
|
What is the name of the initializer in a Class declaration?
|
|
7936
|
which option is correct to use the below function to set cursor position for textarea? function: $.fn.selectrange = function(start, end) { return this.each(function() { if (this.setselectionrange) { this.focus(); this.setselectionrange(start, end); } else if (this.createtextrange) { var range = this.createtextrange(); range.collapse(true); range.moveend('character', end); range.movestart('character', start); range.select(); } }); };
|
|
7937
|
var name : String? = "CodingBull" name = name + 10
|
|
7938
|
the css() function allows you to ___.
|
|
7939
|
which of the following is the correct way to check the existence of an element in jquery other than the following code? if ($(selector).length>0) { // do something }
|
|
7940
|
which of the following functions moves p tags that have para class to div with content id?
|
|
7941
|
which of the following is the correct way to refresh a page with jquery?
|
|
7942
|
which of the following is the best method for adding options to a select from a json object using jquery?
|
|
7943
|
What is the name of the deinitializer in a Class declaration?
|
|
7944
|
how can an additional row be added to a table as the last row using jquery?
|
|
7945
|
which of the following is the correct way to use jquery with node.js?
|
|
7946
|
All swift classes must inherit from which root class?
|
|
7947
|
which of the following will make the background of a page change, upon being refreshed?
|
|
7948
|
Class by default initializes the variable using public initializer method.
|
|
7949
|
which of the following statements returns the number of matched elements of $('.class1')?
|
|
7950
|
how can jquery be used or optimized in such a way that the web applications can become richer and more functional?
|
|
7951
|
What will be the output of following program? var array1 = [1,2,3,4,5] var array2 = array1 array2.append(6) var len1 = array1.count var len2 = array2.count print("len1 = \(len1)") print("len2 = \(len2)")
|
|
7952
|
Difference between Set and Array is :-
|
|
7953
|
Which is not a type of collections in Swift.
|
|
7954
|
Which type of collection uses key-value pair in iOS?
|
|
7955
|
which of the following is the correct way to get "option b" with the value '2' from following html code in jquery? <select id='list'> <option value='1'>option a</option> <option value='2'>option b</option> <option value='3'>option c</option> </select>
|
|
7956
|
Which statement is correct in case of set?
|
|
7957
|
$.grep(array1, function1); the above statement ___ the elements of array1 array which satisfy function1 function.
|
|
7958
|
which of the following is the correct way to check which key was pressed?
|
|
7959
|
which of the following is the correct way to do the following javascript code with jquery? var d = document; var odv = d.createelement("div"); odv.style.display = "none"; this.outerdiv = odv; var t = d.createelement("table"); t.cellspacing = 0; t.classname = "text"; odv.appendchild(t);
|
|
7960
|
Closure optimizations are :
|
|
7961
|
which of the following is the correct way to select <a> on the basis of href using jquery?
|
|
7962
|
which of the following is the best way to open a jquery ui dialog box without a title bar?
|
|
7963
|
which of the following is the correct way to distinguish left and right mouse click event in jquery?
|
|
7964
|
Which of the following is incorrect about Array collection?
|
|
7965
|
which of the following is the correct way to assign a selected value of a drop-down list using jquery?
|
|
7966
|
using an element of some kind that is being hidden using .hide() and shown via .show(). which of the following is the best way to determine if that element is currently hidden or visible on the screen?
|
|
7967
|
Which is not a function of IOS
|
|
7968
|
$.merge(array1, array2); the above function merges ___.
|
|
7969
|
which of the following values is/are valid argument(s) of the eq() function?
|
|
7970
|
By default Set is treated as__
|
|
7971
|
which of the following methods can be used to load data?
|
|
7972
|
consider having multiple $(document).ready() functions in one or many linked javascript files. given this information, which of the following will be executed?
|
|
7973
|
general syntax for closure is_____.
|
|
7974
|
which of the following is correct with regards to how to upload a file asynchronously with jquery?
|
|
7975
|
which of the following makes use of jquery to select multiple elements?
|
|
7976
|
how or where can a plugin be declared, so that the plugin methods are available for the script?
|
|
7977
|
which of the following functions will return an empty set when end() function is chained right after that function?
|
|
7978
|
which of the following will select a particular option in a <select> element using its index?
|
|
7979
|
var name : String?= "CodingBull" name=name+10
|
|
7980
|
whats the right way to access the contents of an iframe using jquery?
|
|
7981
|
which is not function of iOS?
|
|
7982
|
which option is correct to perform a synchronous ajax request?
|
|
7983
|
which option can be used to have jquery wait for all images to load before executing something on a page?
|
|
7984
|
which of the following will show an alert containing the content(s) of a database selection?
|
|
7985
|
which of the following will get the first column of all tables using jquery?
|
|
7986
|
which of the following values is/are valid value(s) of secondargument in addclass('turnred', secondargument); function, if the jquery ui library is being used?
|
|
7987
|
which of the following returns the children tags of "id1"?
|
|
7988
|
which of the following represents the best way to make a custom right-click menu using jquery?
|
|
7989
|
which of the following methods can be used to utilize the animate function with the backgroundcolor style property?
|
|
7990
|
which of the following methods can be used to copy element?
|
|
7991
|
A____block enclose the code that could throw an exception.
|
|
7992
|
which of the following is the correct way to select an option based on its text in jquery?
|
|
7993
|
which of the following is the correct way to manage a redirect request after a jquery ajax call?
|
|
7994
|
An abstract class
|
|
7995
|
which of the following is the correct way to get the value of a textbox using id in jquery?
|
|
7996
|
Exception objects are derived from the class.
|
|
7997
|
which of the following is the correct way to get "option b" with the value '2' from following html code in jquery? <select id='list'> <option value='1'>option a</option> <option value='2'>o...
|
|
7998
|
A method_____an exception when that method detects that a problem has occured.
|
|
7999
|
which of the following is the correct way to disable an input field with jquery?
|
|
8000
|
Which of these are not Value type in Swift
|
|
8001
|
which of the following is the correct way to debug javascript/jquery event bindings with firebug or a similar tool?
|
|
8002
|
Assuming that public class B : A { public B(int i) :base(i) { } } compiles and runs correctly, what can we conclude about the constructors in the class A?
|
|
8003
|
which of the following is the correct way to change the image source during click event of a button in jquery?
|
|
8004
|
The code public class B : A { }
|
|
8005
|
which of the following is the correct way to add an additional option and select it with jquery?
|
|
8006
|
Classes declared with the sealed keyword cannot be base class.
|
|
8007
|
which of the following is the correct use of ajaxstart() function?
|
|
8008
|
Methods that are declared abstract in the base class must show implementation at the time of declaration.
|
|
8009
|
All methods in an abstract base class must be declared abstract.
|
|
8010
|
which of the following gets the href attribute of "id1"?
|
|
8011
|
o output the value of multidimensional array, Console.WriteLines(___)
|
|
8012
|
Which of the following framework is not used in iOS ?
|
|
8013
|
Polymorphism occurs when the methods of the child class.
|
|
8014
|
The concept of composition specifies that you can.
|
|
8015
|
Every class directly or indirectly extends the______class.
|
|
8016
|
In order for a class to use an interface, it must
|
|
8017
|
What is the proper header for a class that intends to use an interface.
|
|
8018
|
All interfaces must contain IDrivable
|
|
8019
|
Is it possible to pass methods as arguments for other methods without modification.
|
|
8020
|
A delegate defines
|
|
8021
|
An Event is
|
|
8022
|
String mystring; Creates a(n)
|
|
8023
|
In the body of a method, C# uses the variable named_____to refer to the current object whose method is being invoked
|
|
8024
|
Find any errors in the following BankAccount constructor: Public int BankAccount() { balance = 0; }
|
|
8025
|
Defining two methods with the same name but with different parameters is called.
|
|
8026
|
A variable declared inside a method is called a________variable
|
|
8027
|
class Test: Form { }
|
|
8028
|
A Constructor
|
|
8029
|
An instance method
|
|
8030
|
Private Button print = new button();
|
|
8031
|
An instance variable
|
|
8032
|
A local variable
|
|
8033
|
Which of the following .NET components can be used to remove unused references from the managed heap?
|
|
8034
|
Identify which is true
|
|
8035
|
Managed methods will be marked as ———— in MSIL code
|
|
8036
|
Which of the following statements is correct about the C#.NET program given below? namespace PskillsConsoleApplication { class Baseclass { int i; public Baseclass(int ii) { i = ii; Console.Write(“Base “); } } class Derived : Baseclass { public Derived(int ii) : base(ii) { Console.Write(“Derived “); } } class MyProgram { static void Main(string[ ] args) { Derived d = new Derived(10); } } }
|
|
8037
|
Which of the following constitutes the .NET Framework? ASP.NET Applications 2. CLR 3. Framework Class Library 4. WinForm Applications 5. Windows Services
|
|
8038
|
Is it possible to change the value of a variable while debugging a C# application?
|
|
8039
|
Different ways a method can be overloaded in C#.NET
|
|
8040
|
Features of Read only variables
|
|
8041
|
Which file contains configuration data for each unique URl resource used in project?
|
|
8042
|
Two methods with the same name but with different parameters.
|
|
8043
|
A variable which is declared inside a method is called a________variable
|
|
8044
|
How does assembly versioning in .NET prevent DLL Hell?
|
|
8045
|
Which of the following statements is correct about Managed Code?
|
|
8046
|
Which of the following jobs are NOT performed by Garbage Collector? 1.Freeing memory on the stack. 2.Avoiding memory leaks. 3.Freeing memory occupied by unreferenced objects. 4.Closing unclosed database collections. 5.Closing unclosed files.
|
|
8047
|
Your company uses Visual Studio.NET 2005 as its application development platform. You are developing an application using the .NET Framework 2.0. You are required to use a datatype that will store only numbers ranging from -32,768 to 32,767. Which of the following datatypes will you use to accomplish the task?
|
|
8048
|
C# doesnot support:
|
|
8049
|
Which of the following is the root of the .NET type hierarchy?
|
|
8050
|
What is the wild card character in the SQL “like†statement?
|
|
8051
|
Is it possible to store multiple data types in System.Array?
|
|
8052
|
The ______ parentheses that follow _____ indicate that no information is passed to Main ().
|
|
8053
|
Web Forms consists of a _______ and a _________ .
|
|
8054
|
Duck typing is implemented by using_________ keyword.
|
|
8055
|
_________parameters allows you to give a method parameter a default value so that you do not have to specify it every time you call the method.
|
|
8056
|
Covariance and Contravariance are new features introduced in C# 4.0.True/False?
|
|
8057
|
COM Interop is simplified in C#4.0 e.g.var doc = Application.GetDocument(“MyFile.txtâ€); In above statement_______ keyword was essential in parameters of GetDocument() in previous versions of C#.
|
|
8058
|
myMobile.Accept(55, inReject: false); Above statement is an example of which new concept of C# 4.0?
|
|
8059
|
_______ methods are not supported for dynamic types.
|
|
8060
|
.The___________keyword is new to C# 4.0, and is used to tell the compiler that a variable’s type can change or that it is not known until runtime.
|
|
8061
|
.The infrastructure that supports these dynamic operations at run time is called the__________.
|
|
8062
|
The controls available in the tool box of the ______ are used to create the user interface of a web based application.
|
|
8063
|
In Microsoft Visual Studio, ______ technology and a programming language such as C# is used to create a Web based application.
|
|
8064
|
The ______ are the Graphical User Interface (GUI) components created for web based interactions..
|
|
8065
|
Exponential formatting character (‘E’ or ‘e’) converts a given value to string in the form of _______.
|
|
8066
|
_______ is a set of devices through which a user communicates with a system using interactive set of commands.
|
|
8067
|
The reason that C# does not support multiple inheritances is because of ______.
|
|
8068
|
C# supports a technique known as________, which allows a method to specify explicitly the name of the interface it is implementing.
|
|
8069
|
C# treats the multiple catch statements like cases in a _____________ statement.
|
|
8070
|
In C#, having unreachable code is always an _____.
|
|
8071
|
The point at which an exception is thrown is called the _______.
|
|
8072
|
Inheritance is ______ in nature.
|
|
8073
|
The theory of _____ implies that user can control the access to a class, method, or variable.
|
|
8074
|
When an instance method declaration includes the abstract modifier, the method is said to be an ______.
|
|
8075
|
The C# provides special methods known as _____ methods to provide access to data members.
|
|
8076
|
The methods that have the same name, but different parameter lists and different definitions is called______.
|
|
8077
|
A _______ creates an object by copying variables from another object.
|
|
8078
|
Struct’s data members are ____________ by default.
|
|
8079
|
A structure in C# provides a unique way of packing together data of ______ types.
|
|
8080
|
C# does not support _____ constructors.
|
|
8081
|
_______ variables are visible only in the block they are declared.
|
|
8082
|
The formal-parameter-list is always enclosed in _______.
|
|
8083
|
______ parameters are used to pass results back to the calling method.
|
|
8084
|
Multidimensional arrays are sometimes called _______ Arrays.
|
|
8085
|
Arrays in C# are ______ objects
|
|
8086
|
An ____ is a group of contiguous or related data items that share a common name.
|
|
8087
|
which of the following functions is/are built-in jquery regular expression function(s)?
|
|
8088
|
which of the following functions can be used to stop event propagation?
|
|
8089
|
which of the following events can be used to disable right click contextual menu?
|
|
8090
|
which of the following code snippets insert(s) the code snippet <font size=2><div class="footer">footer</div></font> at the end of div tags?
|
|
8091
|
________causes the loop to continue with the next iteration after skipping any statements in between.
|
|
8092
|
which of the following code snippets insert(s) the code snippet <div class="footer">footer</div> at the end of div tags?
|
|
8093
|
what is the result of this function: jquery.makearray ( true )?
|
|
8094
|
what is the result of nan == nan?
|
|
8095
|
C# has _______ operator, useful for making two way decisions.
|
|
8096
|
what is the purpose of $(document).ready() function in jquery?
|
|
8097
|
what does $('tr.rowclass:eq(1)'); return?
|
|
8098
|
using an element of some kind that is being hidden using .hide() and shown via .show(). which of the following is the best way to determine if that element is currently hidden or visible on the sc...
|
|
8099
|
the position function gets the ___ positions of an element that are relative to its offset parent.
|
|
8100
|
the hide() function hides an element by ___.
|
|
8101
|
the height function returns the height of an element in ___.
|
|
8102
|
one advantage of $.ajax function over $.get or $.post is that ___.
|
|
8103
|
jQuery does not have this feature. 2.0% jquery allows you to use ___ function to switch between showing and hiding an element.
|
|
8104
|
A _____ is any valid C# variable ending with a colon.
|
|
8105
|
jquery allows simulating an event to execute an event handler as if that event has just occurred by using ___.
|
|
8106
|
An _______ is a symbol that tells the computer to perform certain mathematical or logical manipulations.
|
|
8107
|
In C#, all binary operators are ______.
|
|
8108
|
if jquery is included before another library, how can conflict between jquery and that library be avoided?
|
|
8109
|
The character pair ?: is a________________available in C#.
|
|
8110
|
Boxing converts a value type on the stack to an ______ on the heap.
|
|
8111
|
_________ are reserved, and cannot be used as identifiers.
|
|
8112
|
A _______ is an identifier that denotes a storage location
|
|
8113
|
how can the href for a hyperlink be changed using jquery?
|
|
8114
|
All C# applications begin execution by calling the _____ method.
|
|
8115
|
how can the child img be selected inside the div with a selector?
|
|
8116
|
In C#, a subroutine is called a ________.
|
|
8117
|
The ____ language allows more than one method in a single class
|
|
8118
|
SOAP stands for __________.
|
|
8119
|
The CLR is physically represented by an assembly named _______
|
|
8120
|
CLR is the .NET equivalent of _________.
|
|
8121
|
how can an ajax request that has not yet received a response be canceled or aborted?
|
|
8122
|
consider the following code snippet: $(document).ready(function1); $(document).ready(function2); $(document).ready(function3); which of the following functions are executed when dom is ready?
|
|
8123
|
consider the following code snippet: $('span.item').each(function (index) { $(this).wrap('<li>item</li>'); }); what does this code snippet do?
|
|
8124
|
consider the following code snippet: $('a.arrow-1').click(function () { $('.second-row').slideup(); $(this).parent('.first-row').siblings('.second-row').slidedown(); }); the order of the a...
|
|
8125
|
Debugging is the technique for?
|
|
8126
|
consider the following code snippet: <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> which of the following code snippets returns the same re...
|
|
8127
|
An array is the collection of?
|
|
8128
|
A Program must never be?
|
|
8129
|
consider the following code snippet: <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> which of the following code snippets return(s) a set of ...
|
|
8130
|
consider the following code snippet: <font size=2> <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> </font> which of the following code snippe...
|
|
8131
|
What can be used to create the objects?
|
|
8132
|
consider the following code snippet: $(document).ready(function() { $('div').each(function(index) { alert(this); }); }); which of the following objects does the 'this' variable refer to?
|
|
8133
|
Divided by zero is?
|
|
8134
|
consider the following code snippet: $('#table1').find('tr').filter(function(index) { return index % 3 == 0}).addclass('firstrowclass'); the result of the above code snippet is ___.
|
|
8135
|
consider the following code snippet: $('#id1').animate({width:"240px"}, { queue:false, duration:1000 }).animate({height:"320px"}, "fast"); the order of the animations of this code snippet is ___.
|
|
8136
|
consider the following code snippet: $('#ul1 li').live('click', function1); $('#ul1').after('<li id="lastli">last item</li>'); is function1 executed if "lastli" is clicked?
|
|
8137
|
consider the following code snippet: $('#button1').bind('click', function(data) {...}); what is the data argument?
|
|
8138
|
consider the following code snippet: <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> which of the following code snippets returns the...
|
|
8139
|
consider the following code snippet: <font size=2> <ul id='id1'> <li id='li1'>items 1</li> <li id='li2'>items 2</li> <li id='li3'>items 3</li> </ul> </font> which of the following c...
|
|
8140
|
assuming that the jquery ui library is used to make a list sortable, which of the following code snippets makes "list1" sortable?
|
|
8141
|
assume that you want that first the tag with "id1" fades out and then the tag with "id2" fades in. which of the following code snippets allow(s) you to do so?
|
|
8142
|
$("div").find("p").andself().addclass("border"); the statement adds class border to ___.
|
|
8143
|
$('#id1').animate({width:"80%"}, "slow") the above code snippet will ___.
|
|
8144
|
$('#a1').one('click', {times: 3}, function1); which of the following is true for the above?
|
|
8145
|
which option is correct to use the below function to set cursor position for textarea? function: $.fn.selectrange = function(start, end) { return this.each(function() { if (this.sets...
|
|
8146
|
$(“div#id1 .cl1?). What does it select?
|
|
8147
|
jQuery method to set one or more style properties for selected elements?
|
|
8148
|
Which layer is exemplified by the use of ADO.NET?
|
|
8149
|
Is it possible to use jQuery together with AJAX?
|
|
8150
|
Which set of symbols are used to signify the presence of ASP.NET code?
|
|
8151
|
Which is the file extension used for an ASP.NET file?
|
|
8152
|
What is the extension for a Visual Basic web form code file?
|
|
8153
|
What is the extension for a Visual Basic web form interface file?
|
|
8154
|
When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML page contains?
|
|
8155
|
Which user action will not generate a server-side event?
|
|
8156
|
Which property is used to name a web control?
|
|
8157
|
It is best to use a web instead of a windows application when the application?
|
|
8158
|
Which language is used to create an ASP.NET code file?
|
|
8159
|
$("span.intro"). What does it select?
|
|
8160
|
Which jQuery function is used to prevent code from running, before the document is finished loading?
|
|
8161
|
With jQuery, look at the following selector: $(“divâ€). What does it select?
|
|
8162
|
Do you wonder why we do not have type=â€text/javascript†inside the <script> tag?
|
|
8163
|
$(“div#id1 .cl1?). What does it select?
|
|
8164
|
jQuery method is used to perform an asynchronous HTTP request?
|
|
8165
|
jQuery method to set one or more style properties for selected elements?
|
|
8166
|
jQuery method to hide selected elements?
|
|
8167
|
$(“span.introâ€). What does it select?
|
|
8168
|
jQuery code to set the background color of all span elements to blue?
|
|
8169
|
$(“spanâ€). What does it select?
|
|
8170
|
Is jQuery a W3C standard?
|
|
8171
|
jQuery uses CSS selectors and XPath expressions to select elements?
|
|
8172
|
Which of the following is correct?
|
|
8173
|
Which of the following is correct?
|
|
8174
|
What does the $('#myDiv').hover() method do?
|
|
8175
|
How do you fetch the first span on the page, which has the class ‘green’?
|
|
8176
|
What is the difference between .width() and .outerWidth()?
|
|
8177
|
Why do we usually add the stop() method before calling animate()?
|
|
8178
|
What does the function $(“.selectorâ€) return?
|
|
8179
|
When do you use the $(this) code?
|
|
8180
|
Which function do you reference in HTML form data?
|
|
8181
|
If you want to stop your jQuery for a few milliseconds, which function do you use?
|
|
8182
|
The speed options can be applied to which jQuery functions?
|
|
8183
|
What are the various speed options?
|
|
8184
|
What is the difference between Hover and Mouseover
|
|
8185
|
What is the each function used for?
|
|
8186
|
When referencing an HTML element preceded by a . (dot), what javascript function is this equivalent to?
|
|
8187
|
When referencing an HTML element preceded by a # (pound or hash), what javascript function is this equivalent to?
|
|
8188
|
What are the :odd and :even filters?
|
|
8189
|
Polymorphism?
|
|
8190
|
Which of the following is/are true about the class?
|
|
8191
|
Which of the following is/are true about the structure?
|
|
8192
|
Triggers, or binds a function to the error event of selected elements.
|
|
8193
|
Load remote data using HTTP GET
|
|
8194
|
AJAX and jQuery
|
|
8195
|
The jQuery library contains the following features
|
|
8196
|
What is jQuery?
|
|
8197
|
You can attach a handler to an event using which method?
|
|
8198
|
The CSS selector engine that jQuery uses is called?
|
|
8199
|
The method that provides AJAX functionality within jQuery is named..
|
|
8200
|
Query.noConflict(true) is used to..
|
|
8201
|
Multiple document.ready blocks can be placed in a page without detriments. This statement is..
|
|
8202
|
You can test whether the browser supports specific features using...
|
|
8203
|
Can you can use CSS3 selectors to select or find elements using jQuery?
|
|
8204
|
var ps = $("p");ps will be..
|
|
8205
|
Can jQuery be used on the same page alongside other libraries?
|
|
8206
|
$.foo() is equivalent to..
|
|
8207
|
jQuery's main focus is..
|
|
8208
|
jQuery is a...
|
|
8209
|
which keyword in swift used to initialize the variable?
|
|
8210
|
In swift Variables are always initialized before use.
|
|
8211
|
In JavaScript, we can keep a reference to the context outside a function by assigning it to a variable: var self = this. In CoffeeScript, we use:
|
|
8212
|
How do you use JavaScript within CoffeeScript code?
|
|
8213
|
Which of these is NOT a valid comment in JavaScript?
|
|
8214
|
Which statement best explains what "unobtrusive JavaScript" is?
|
|
8215
|
Objective-C itself has evolved to support ____enabling framework adoption of modern language technologies without disruption.
|
|
8216
|
Is jQuery a W3C standard?
|
|
8217
|
Look at the following jQuery selector: $("div#intro .head"). What does it select?
|
|
8218
|
To get value inside optional use ....?
|
|
8219
|
Which jQuery method is used to switch between adding/removing one or more classes (for CSS) from selected elements?
|
|
8220
|
What is the return type of following function? Func myfunc( ) -->String{ return "hello" }
|
|
8221
|
Which jQuery method should be used to deal with name conflicts?
|
|
8222
|
Which jQuery function is used to prevent code from running, before the document is finished loading?
|
|
8223
|
What scripting language is jQuery written in?
|
|
8224
|
Which of the following is true. 1.we can wrap unwrapped values 2. we can unwrap wrapped values 3.we cannot wrap unwrapped values 4.we cannot unwrap wrapped values
|
|
8225
|
Which statement is true?
|
|
8226
|
Which jQuery method is used to perform an asynchronous HTTP request?
|
|
8227
|
Which jQuery method is used to set one or more style properties for selected elements?
|
|
8228
|
Which of the following is immutable?
|
|
8229
|
With jQuery, look at the following selector: $("div.intro"). What does it select?
|
|
8230
|
Question: Which of the following statements is/are false? 1. var is used to declare variable whose value we can change. 2. let is used to make variable as constant.
|
|
8231
|
What is the correct jQuery code to set the background color of all p elements to red?
|
|
8232
|
The jQuery html() method works for both HTML and XML documents
|
|
8233
|
Is it possible to use jQuery together with AJAX?
|
|
8234
|
With jQuery, look at the following selector: $("div"). What does it select?
|
|
8235
|
jQuery uses CSS selectors to select elements?
|
|
8236
|
jQuery is a
|
|
8237
|
Tuples as well as structs both allow us to combine different types into one type.
|
|
8238
|
Which of the following jQuery method loads and executes a JavaScript file using an HTTP GET request?
|
|
8239
|
Which of the following jQuery method can be used to attach a function to be executed whenever an AJAX request fails?
|
|
8240
|
Which of the following jQuery method returns the top and left position of an element relative to its offset parent?
|
|
8241
|
Multitasking in iOS was introduced in which version?
|
|
8242
|
Which of the following jQuery method gets the inner height (excluding the border) of an element?
|
|
8243
|
iOS is a __software.
|
|
8244
|
Which of the following jQuery method finds all sibling elements after the current element?
|
|
8245
|
Which of the following is TRUE
|
|
8246
|
Which of the following jQuery method checks the current selection against an expression?
|
|
8247
|
Which of the following jQuery method removes an attribute from each of the matched elements?
|
|
8248
|
what are the features of swift programming?
|
|
8249
|
Which of the following is correct about jQuery selector?
|
|
8250
|
Which built-in method reverses the order of the elements of an array?
|
|
8251
|
Can you pass a anonymous function as an argument to another function?
|
|
8252
|
Which jQuery method is used to switch between adding/removing one or more classes (for CSS) from selected elements?
|
|
8253
|
--------------- takes a selector as its argument and returns true if at least one of the selected elements also matches the specified selector.
|
|
8254
|
Get the value of a style property for the first element in the set of matched elements.
|
|
8255
|
The most recent version of macOS is based on ... ?
|
|
8256
|
What are the methods used to provide effects?
|
|
8257
|
Which of the following is/are the sources of Content Distribution Network(CDN) for jQuery.
|
|
8258
|
In which year jQuery developed?
|
|
8259
|
With jQuery, look at the following selector: $(“div.introâ€). What does it select?
|
|
8260
|
jQuery method is used to perform an asynchronous HTTP request?
|
|
8261
|
Which of the following is incorrect data type in SWIFT ?
|
|
8262
|
Which sign does jQuery use as a shortcut for jQuery?
|
|
8263
|
.We can return multiple values in swift from function by using?
|
|
8264
|
The______ method is used to represent an array or an object in serialize manner.
|
|
8265
|
Is jQuery a library for client scripting or server scripting?
|
|
8266
|
Select all elements that contain the specified text.
|
|
8267
|
To deal with cookies in jQuery we have to use ______ cookie plugin
|
|
8268
|
Which of the following jQuery method checks the current selection against an expression
|
|
8269
|
What is the correct jQuery code for making all div elements 100 pixels high?
|
|
8270
|
Which of the following is used for parsing JSON text?
|
|
8271
|
What does the min mean?
|
|
8272
|
jQuery code to set the background color of all span elements to blue?
|
|
8273
|
The ………. method is like offset(), except that it is a getter only and it returns element positions relative to their offset parent, rather to the document as a whole.
|
|
8274
|
Using ________ function, we can hold or release the execution of jQuery’s ready event.
|
|
8275
|
Which built-in method returns the character at the specified index?
|
|
8276
|
$.foo() is equivalent to
|
|
8277
|
In iOS, a folder with .app extension is known as Bundle.
|
|
8278
|
Look at the following jQuery selector: $(“div#intro .headâ€). What does it select?
|
|
8279
|
The IDE used in swift is____
|
|
8280
|
Which jQuery method is used to hide selected elements?
|
|
8281
|
Which of the following is a single global function defined in the jQuery library?
|
|
8282
|
Arrange the TCP/IP model layers in the order from farthest to closest to the end user.
|
|
8283
|
What are the various possessions in the three-way handshake by the TCP?
|
|
8284
|
Which layer handles top-level communication?
|
|
8285
|
The layer in which the TCP (or UDP) communication takes place is _____________
|
|
8286
|
Which layer is used to handle the network addressing and routing?
|
|
8287
|
Which layer is used to control the communication between the hardware in the network?
|
|
8288
|
What is the return type of the remote server?
|
|
8289
|
How will the HTTP GET request be sent from the browser?
|
|
8290
|
Why is the total size of the page important?
|
|
8291
|
What are the features of an interpreter?
|
|
8292
|
Which is the alternate name for JavaScriptCore that is used by Safari?
|
|
8293
|
Carakan is used by which of the following browsers?
|
|
8294
|
SpiderMonkey was developed by _______
|
|
8295
|
Which of the following render HTML?
|
|
8296
|
Iphone OS is based on which language?
|
|
8297
|
Which of the following first developed Gecko?
|
|
8298
|
Which company owns Iphone?
|
|
8299
|
Which of the following browsers use Webkit?
|
|
8300
|
The User Interface is taken care of which layer?
|
|
8301
|
What is Iphone?
|
|
8302
|
Which layer is used to handle the HTTP requests?
|
|
8303
|
What is the purpose of the JavaScript Engine?
|
|
8304
|
Which version of Iphone OS supports video calling and multitasking?
|
|
8305
|
What is the purpose of a Rendering Engine?
|
|
8306
|
Who is responsible for development of Iphone OS?
|
|
8307
|
Which Iphone version supports flash? O
|
|
8308
|
How do you restore a saved coordinate system?
|
|
8309
|
How many generations are there for Iphone OS?
|
|
8310
|
Which of the following is a property used to check how crisp or fuzzy shadows are?
|
|
8311
|
Which of the following are not the properties of a canvas object?
|
|
8312
|
Which is the method invoked to connect the last vertex back to the first?
|
|
8313
|
Which is the method invoked to begin a path?
|
|
8314
|
What is the latest version of Iphone OS?
|
|
8315
|
How does SVG describe complex shapes?
|
|
8316
|
What is the returning value of the getContext() method?
|
|
8317
|
Iphone has its OS under which licence?
|
|
8318
|
Which method is used to obtain the “drawing context†object?
|
|
8319
|
From which version of IE is canvas supported?
|
|
8320
|
What is the purpose of the canvas element?
|
|
8321
|
Which of the following is the parameter used to invoke the Audio() constructor?
|
|
8322
|
Which of the following is not the property of the video tag?
|
|
8323
|
If you delete contents of NVRAM and reboot router, in which mode you will enter
|
|
8324
|
Which of the following attributes are common to both audio and video?
|
|
8325
|
Which layer of OSI model will have problem if you get message "Serial1 is down, line protocol is down" after typing "show interface serial 1"
|
|
8326
|
Which of the following elements are used to include audio?
|
|
8327
|
Which is a possible way of finding all the img elements in the document?
|
|
8328
|
When is JavaScript called obtrusive?
|
|
8329
|
What is the purpose of image replacement?
|
|
8330
|
Which HTML element is used to include images?
|
|
8331
|
Which of the following uses a lot of CPU cycles?
|
|
8332
|
Command to delete NVRAM on a router
|
|
8333
|
What is the advantage of the code produced graphics being smaller than the images themselves?
|
|
8334
|
How many simultaneous sessions a Cisco router support by default
|
|
8335
|
Command to show if DTE or DCE cable is plugged int o serial 0
|
|
8336
|
Command to find the broadcast address from router
|
|
8337
|
Which is the method to look up the objects for a range of keys?
|
|
8338
|
Which command will end configuration mode and returns to EXEC
|
|
8339
|
Which is the function used to look up an object?
|
|
8340
|
Which command will take cursor to one word back
|
|
8341
|
What is the alternate way to search in an IndexedDB API?
|
|
8342
|
Which command will take cursor to the end of line
|
|
8343
|
Which of the following is a feature of the IndexedDB API?
|
|
8344
|
Which command will take cursor to beginning of line
|
|
8345
|
How does IndexedDB provide atomicity?
|
|
8346
|
Which command will show all commands available from that particular mode
|
|
8347
|
A key path is defined as ____________
|
|
8348
|
In the IndexedDB database, database is defined as _____________
|
|
8349
|
Which mode commands affects interfaces/processes only
|
|
8350
|
Which of the following are objective database and not a relational database?
|
|
8351
|
Which of the following use the Web SQL Database?
|
|
8352
|
The Client-Side Databases are stored in the ____________
|
|
8353
|
Which mode provide access to all router commands
|
|
8354
|
Which is the function used to store a value?
|
|
8355
|
Which user mode has limited monitoring commands in IOS
|
|
8356
|
Which is the function used to retrieve a value?
|
|
8357
|
What is the lifetime of the data stored through localStorage?
|
|
8358
|
Which mode provides interactive configuration dialog
|
|
8359
|
What is the main difference between localStorage and sessionStorage?
|
|
8360
|
The localStorage and sessionStorage belongs to ________
|
|
8361
|
Subinterfaces allows to you to
|
|
8362
|
CLI in IOS terminology is short form of
|
|
8363
|
What happens first after starting a router
|
|
8364
|
Which is not a function of IOS
|
|
8365
|
Which command cane be used at User mode to enter Privileged EXEC mode
|
|
8366
|
How to display configurable parameters and statistics of all interfaces on router
|
|
8367
|
Which of the following data types is used to represent a 32-bit floating-point number and numbers with smaller decimal points?
|
|
8368
|
The following are the keywords used in declarations except:
|
|
8369
|
Can we override private virtual methods?
|
|
8370
|
Which of the following in not service model (three-tier application) in c sharp?
|
|
8371
|
How can we sort the elements of the array in descending order?
|
|
8372
|
Which of the following is/are not types of arrays in C#?
|
|
8373
|
Is it possible to store multiple data types in System.Array?
|
|
8374
|
Which of the following are not types of access modifiers in C#?
|
|
8375
|
Which of the following namespaces used in C#.NET?
|
|
8376
|
Which of the following is/are not types of comment in C#?
|
|
8377
|
Are private class-level variables can inherited?
|
|
8378
|
Is it possible to change the value of a variable while debugging a C# application?
|
|
8379
|
What does Dispose method do with connection object?
|
|
8380
|
What is ENUM?
|
|
8381
|
When a form loaded into the memory, the event occurs…
|
|
8382
|
Which of the following method is used to forcibly set to CPU…
|
|
8383
|
Which symbol create an access key …
|
|
8384
|
Getset method used to retrieve the stored text from…
|
|
8385
|
Which of the following is true that access specifier allows a class to expose its member variables and member functions to other functions and objects?
|
|
8386
|
Which statements are true, IDE is…
|
|
8387
|
Select the true option, prefix and postfix have other forms is…
|
|
8388
|
Which option is true that defines with the sign [ ]…
|
|
8389
|
—— is casing to Passing arguments to a destructor, or specifying return type to destructor…
|
|
8390
|
Which is true in the option that Destructors do not receive values and do not…
|
|
8391
|
Which of the following include in primary programming languages…
|
|
8392
|
Which of the following box given a set of choices to the user
|
|
8393
|
Which of the following option is correct for an example of “instanceofâ€â€¦
|
|
8394
|
Which of the following is not a characteristic of exception handling…
|
|
8395
|
Which of the following is not true about destructor…
|
|
8396
|
Which of the following statements is not correct about constructors…
|
|
8397
|
Which of the following property represents the current position of the stream…
|
|
8398
|
Which of the following String method used to compare two strings…
|
|
8399
|
Preprocessor allows testing a symbol to see if they evaluate to true…
|
|
8400
|
Choose which one is converts a type to a string…
|
|
8401
|
Which of the following is true about C#…
|
|
8402
|
Which of the following function translates a numeric value to a variable…
|
|
8403
|
Which of the following is the same as the code window…
|
|
8404
|
Menu bar contains a set of ……. to provide controls in the form...
|
|
8405
|
Which of the following is the correct way to find out the index of the second 's' in the string "She sells sea shells on the sea-shore"?
|
|
8406
|
Which of the following statements are correct? String is a value type. String literals can contain any character literal including escape sequences. The equality operators are defined to compare the values of string objects as well as references. Attempting to access a character that is outside the bounds of the string results in an IndexOutOfRangeException. The contents of a string object can be changed after
|
|
8407
|
Which of the following statements are correct about the String Class in C#.NET? Two strings can be concatenated by using an expression of the form s3 = s1 + s2; String is a primitive in C#.NET. A string built using StringBuilder Class is Mutable. A string built using String Class is Immutable. Two strings can be concatenated by using an expression of t
|
|
8408
|
Which of the following will be the correct output for the C#.NET code snippet given below? String s1 = "Five Star"; String s2 = "FIVE STAR"; int c; c = s1.CompareTo(s2); Console.WriteLine(c);
|
|
8409
|
Which of the following statement is correct about a String in C#.NET?
|
|
8410
|
Which of the following statements about a String is correct?
|
|
8411
|
Which of the following will be the correct output for the C#.NET code snippet given below? String s1="Kicit"; Console.Write(s1.IndexOf('c') + " "); Console.Write(s1.Length);
|
|
8412
|
Which of the following snippets are the correct way to convert a Single into a String? Single f = 9.8f; String s; s = (String) (f); Single f = 9.8f; String s; s = Convert.ToString(f); Single f = 9.8f; String s; s = f.ToString(); Single f = 9.8f; String s; s = Clnt(f); Single f = 9.8f; String s; s = CString(f);
|
|
8413
|
What will be the output of the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class SampleProgram { static void Main(string[ ] args) { string str= "Hello World!"; Console.WriteLine( String.Compare(str, "Hello World?" ).GetType() ); } } }
|
|
8414
|
If s1 and s2 are references to two strings, then which of the following is the correct way to compare the two references?
|
|
8415
|
Which of the following will be the correct output for the C#.NET code snippet given below? String s1 = "Nagpur"; String s2; s2 = s1.Insert(6, "Mumbai"); Console.WriteLine(s2);
|
|
8416
|
The string built using the String class are immutable (unchangeable), whereas, the ones built- using the StringBuilder class are mutable.
|
|
8417
|
Which of the following statements will correctly copy the contents of one string into another ?
|
|
8418
|
Which of the following statements are true about the C#.NET code snippet given below? String s1, s2; s1 = "Hi"; s2 = "Hi"; String objects cannot be created without using new. Only one object will get created. s1 and s2 both will refer to the same object. Two objects will get created, one pointed to by s1 and another pointed to by s2. s1 and s2 are references to the same object.
|
|
8419
|
What will be the output of the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class Sample { public static void fun1() { Console.WriteLine("Bix1 method"); } public void fun2() { fun1(); Console.WriteLine("Bix2 method"); } public void fun2(int i) { Console.WriteLine(i); fun2(); } } class MyProgram { static void Main(string[ ] args) { Sample s = new Sample(); Sample.fun1(); s.fun2(123); } } }
|
|
8420
|
Which of the following statements is correct about constructors in C#.NET?
|
|
8421
|
What will be the output of the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class Sample { static Sample() { Console.Write("Sample class "); } public static void Bix1() { Console.Write("Bix1 method "); } } class MyProgram { static void Main(string[ ] args) { Sample.Bix1(); } } }
|
|
8422
|
Which of the following statements are correct about static functions?
|
|
8423
|
Is it possible for you to prevent an object from being created by using zero argument constructor?
|
|
8424
|
Which of the following statements are correct about the C#.NET code snippet given below? class Sample { static int i; int j; public void proc1() { i = 11; j = 22; } public static void proc2() { i = 1; j = 2; } static Sample() { i = 0; j = 0; } }
|
|
8425
|
Is it possible to invoke Garbage Collector explicitly?
|
|
8426
|
Which of the following statements are correct about constructors in C#.NET? Constructors cannot be overloaded. Constructors always have the name same as the name of the class. Constructors are never called explicitly. Constructors never return any value. Constructors allocate space for the object in memory.
|
|
8427
|
Can static procedures access instance data?
|
|
8428
|
In which of the following should the methods of a class differ if they are to be treated as overloaded methods? Type of arguments Return type of methods Number of arguments Names of methods Order of arguments
|
|
8429
|
Which of the following is the correct way to define the constructor(s) of the Sample class if we are to create objects as per the C#.NET code snippet given below? Sample s1 = new Sample(); Sample s2 = new Sample(9, 5.6f);
|
|
8430
|
Which of the following statements is correct about constructors?
|
|
8431
|
Which of the following statements are correct about static functions? Static functions can access only static data. Static functions cannot call instance functions. It is necessary to initialize static data. Instance functions can call static functions and access static data. this reference is passed to static functions.
|
|
8432
|
Which of the following ways to create an object of the Sample class given below will work correctly? class Sample { int i; Single j; double k; public Sample (int ii, Single jj, double kk) { i = ii; j = jj; k = kk; } }
|
|
8433
|
Which of the following statements is correct about the C#.NET code snippet given below? namespace IndiabixConsoleApplication { class Sample { public int func() { return 1; } public Single func() { return 2.4f ; } } class Program { static void Main(string[ ] args) { Sample s1 = new Sample(); int i; i = s1.func(); Single j; j = s1.func(); } } }
|
|
8434
|
0. Suppose n is a variable of the type Byte and we wish, to check whether its fourth bit (from right) is ON or OFF. Which of the following statements will do this correctly?
|
|
8435
|
Which of the following are Logical operators in C#.NET? && || ! Xor %
|
|
8436
|
Which of the following statements are correct about the Bitwise & operator used in C#.NET? The & operator can be used to Invert a bit. The & operator can be used to put ON a bit. The & operator can be used to put OFF a bit. The & operator can be used to check whether a bit is ON. The & operator can be used to check whether a bit is OFF.
|
|
8437
|
Which of the following is the correct output for the C#.NET code snippet given below? Console.WriteLine(13 / 2 + " " + 13 % 2);
|
|
8438
|
Which of the following statements is correct about the C#.NET code snippet given below? int d; d = Convert.ToInt32( !(30 < 20) );
|
|
8439
|
Which of the following is NOT a Bitwise operator in C#.NET?
|
|
8440
|
Which of the following are NOT Relational operators in C#.NET? >= != Not <= <>=
|
|
8441
|
Which of the following is NOT an Arithmetic operator in C#.NET?
|
|
8442
|
What will be the output of the C#.NET code snippet given below? byte b1 = 0xF7; byte b2 = 0xAB; byte temp; temp = (byte)(b1 & b2); Console.Write (temp + " "); temp = (byte)(b1^b2); Console.WriteLine(temp);
|
|
8443
|
Which of the following are the correct ways to increment the value of variable a by 1? ++a++; a += 1; a ++ 1; a = a +1; a = +1;
|
|
8444
|
If a class has unmanaged resources and no managed resources, it should do which of the following?
|
|
8445
|
If a class has managed resources and no unmanaged resources, it should do which of the following?
|
|
8446
|
If a class implements IDisposable , its Dispose method should do which of the following?
|
|
8447
|
Which of the following statements about destructors is false?
|
|
8448
|
Which of the following statements about garbage collection is false?
|
|
8449
|
A program can use the IEnumerable and IEnumerator interfaces to do which of the following?
|
|
8450
|
Suppose you want to make a Recipe class to store cooking recipes and you want to sort the Recipes by the MainIngredient property. In that case, which of the following interfaces would probably be most useful?
|
|
8451
|
Which of the following is not a good use of interfaces?
|
|
8452
|
Suppose the HouseBoat class implements the IHouse interface implicitly and the IBoat inter- face explicitly. Which of the following statements is false?
|
|
8453
|
Suppose you have defined the House and Boat classes and you want to make a HouseBoat class that inherits from both House and Boat. Which of the following approaches would not work?
|
|
8454
|
Which the following statements about the this keyword is false?
|
|
8455
|
Which the following statements about the base keyword is false?
|
|
8456
|
Which of the following techniques should you use to watch for floating point operations that cause overflow or underflow?
|
|
8457
|
Which of the following statements can you use to catch integer overflow and underflow errors?
|
|
8458
|
Which of the following techniques does not create a String containing 10 spaces?
|
|
8459
|
Which of the following is not a String method?
|
|
8460
|
If Employee inherits from Person and Manager inherits from Employee, which of the following statements is valid?
|
|
8461
|
The statement object obj = 72 is an example of which of the following?
|
|
8462
|
Which of the following methods is the best way to store an integer value typed by the user in a variable?
|
|
8463
|
Which of the following statements generates a string containing the text "Veni, vidi,vici"?
|
|
8464
|
Assuming total is a decimal variable holding the value 1234.56, which of the following statements displays total with the currency format $1,234.56?
|
|
8465
|
Which of the following statements is true for narrowing conversions?
|
|
8466
|
Which of the following statements is true for widening conversions?
|
|
8467
|
If i is an int and l is a long, which of the following statements is true?
|
|
8468
|
To parse a string that might contain a currency value such as $1,234.56, you should pass the Parse or TryParse method which of the following values?
|
|
8469
|
How are the values passed in generic methods?
|
|
8470
|
What does the designator indicate in a generic class?
|
|
8471
|
What is an advantage of using generics in .NET?
|
|
8472
|
What is one advantage of using named parameters?
|
|
8473
|
Boxing refers to:
|
|
8474
|
How do you enforce encapsulation on the data members of your class?
|
|
8475
|
When you create an abstract method, how do you use that method in a derived class?
|
|
8476
|
What is the parameter in this method known as? public void displayAbsoluteValue(int value = 1)
|
|
8477
|
What are two methods with the same name but with different parameters?
|
|
8478
|
In the following enumeration, what will be the underlying value of Wed? enum Days {Mon = 1, Tue, Wed, Thur, Fri, Sat, Sun};
|
|
8479
|
What is the correct way to access the firstName property of a struct named Student?
|
|
8480
|
True or false: structs can contain methods.
|
|
8481
|
Which declaration can assign the default value to an int type?
|
|
8482
|
double and float data types can store values with decimals.
|
|
8483
|
What is the maximum value you can store in an int data type?
|
|
8484
|
How many times will this loop execute? int value = 0; do { Console.WriteLine (value); } while value > 10;
|
|
8485
|
What are the four basic repetition structures in C#?
|
|
8486
|
What is the purpose of break; in a switch statement?
|
|
8487
|
If you want to iterate over the values in an array of integers called arrNumbers to perform an action on them, which loop statement enables you to do this?
|
|
8488
|
In the following code sample, will the second if structure be evaluated? bool condition = true; if(condition) if(5 < 10) Console.WriteLine("5 is less than 10);
|
|
8489
|
What are the keywords supported in an if statement?
|
|
8490
|
You need to make a logical comparison where two values must return true in order for your code to execute the correct statement. Which logical operator enables you to achieve this?
|
|
8491
|
You want to declare an integer variable called myVar and assign it the value 0. How can you accomplish this?
|
|
8492
|
When using the standard files that come with the C++ compiler, you should surround the header file name with _____
|
|
8493
|
The last statement in a function is often a(n) _____
|
|
8494
|
Which DOS command is used to remove and scan memory and disk from viruses?
|
|
8495
|
The insect type robot Attila is a more competent version of the robot Genghis an weights 1.7 kg. What is the number of microprocessors carried by its body?
|
|
8496
|
Which of the following hardware components is the most important to the operation of a database management system?
|
|
8497
|
What kind of battery is most likely included in a cordless electric knife?
|
|
8498
|
Terminals are used to
|
|
8499
|
A programming structure that contains data and a pointer to the next object is a
|
|
8500
|
A customer calls and says her computer won't boot, she can hear noises and can see lights on the box, but nothing comes up on the screen, what should you take to the site to fix the problem?
|
|
8501
|
What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?
|
|
8502
|
A function can make_________
|
|
8503
|
Which of the following conditions is used to transmit two packets over a medium at the same time?
|
|
8504
|
Which option will be used with ps command to show the entire command line of the process being run?
|
|
8505
|
The command used to compare the files is known as
|
|
8506
|
One method of programming a computer to exhibit human intelligence is called modeling or:
|
|
8507
|
The Data flow diagram (DFD) shows;
|
|
8508
|
Before sending data, a modem sends a request to send signal, or RTS.
|
|
8509
|
What would you ask to determine if the display is working?
|
|
8510
|
What is the size of a sector?
|
|
8511
|
In the IBM PC-AT, what do the words AT stand for?
|
|
8512
|
which of the following commands adds the data model info to the model file?
|
|
8513
|
which of the following code samples will get the index of |page| inside of a loop?
|
|
8514
|
which of the following choices will write routes for the api versioning scenario described below? /api/users returns a 301 to /api/v2/users /api/v1/users returns a 200 of users index at version 1 ...
|
|
8515
|
which of the following actions is fired by default when a new controller is created?
|
|
8516
|
which is the best way to add a page-specific javascript code in a rails 3 app? <%= f.radio_button :rating, 'positive', :onclick => "$('some_div').show();" %>
|
|
8517
|
which gem is used to install a debugger in rails 3?
|
|
8518
|
when using full-page caching, what happens when an incoming request matches a page in the cache?
|
|
8519
|
when a new controller named "admin2" is created, the js and the css files are created in:
|
|
8520
|
what is the singleton design pattern?
|
|
8521
|
what is the recommended rails way to iterate over records for display in a view?
|
|
8522
|
what is the output of the following ruby code? puts "the multiplication output of 10,10,2 is #{10*10*2}"
|
|
8523
|
what is the output of the following code? puts "aeiou".sub(/[aeiou]/, '*')
|
|
8524
|
what is the output of the following code? "test"*5
|
|
8525
|
what is the output of the following code in ruby? x= "a" + "b" puts x y= "c" << "d" puts y
|
|
8526
|
what is the difference between :dependent => :destroy and :dependent => :delete_all in rails?
|
|
8527
|
what is the difference between _url and _path while being used in routes?
|
|
8528
|
what is the convention for methods which end with a question mark? e.g. #all?, #kind_of?, directory?
|
|
8529
|
what is the best way to get the current request url in rails?
|
|
8530
|
what is the behavior of class variables with subclasses?
|
|
8531
|
what is green-threading?
|
|
8532
|
what is output of following statements? 1) "".nil? == "".empty? && "".blank? == "".empty? 2) !"".nil? == "".empty? && "".blank? == "".empty? 3) nil.nil? == nil.empty? && nil.blank? == nil.empty? 4)...
|
|
8533
|
what is difference between "has_one" and "belong_to"?
|
|
8534
|
The HTML5 specification does not includes __________
|
|
8535
|
The service(s) that enables networking through scripted HTTP requests is _______
|
|
8536
|
The behaviour of the document elements can be defined by __________
|
|
8537
|
A JavaScript program can traverse and manipulate document content through __________
|
|
8538
|
The main purpose of JavaScript in web browser is to ___________
|
|
8539
|
Ios: : floatfield mask has how many format flags?
|
|
8540
|
What is mask of ios: :dec, ios: :oct, ios: : hex in format flags?
|
|
8541
|
Which from following format flag is not included in ios: : adjustfield mask?
|
|
8542
|
Ios state variables holds
|
|
8543
|
Ios: : skipws, ios: : left, ios: : dec, ios: : fixed, is an example of
|
|
8544
|
Which is the method used for registering handlers?
|
|
8545
|
Why does Node not block while waiting for operations to complete?
|
|
8546
|
The necessary globals of a node are defined under which namespace?
|
|
8547
|
Among the below given functions, Node supports which of the following client-side timer functions?
|
|
8548
|
What is the code to print hello one second from now?
|
|
8549
|
Which of the following commands displays the syntax for the clock command?
|
|
8550
|
What is the command used for debugging output in Node?
|
|
8551
|
You need to assign an IP address to your Catalyst 1912 switch. You are at the HQ_SW1>prompt. What is the correct series of commands? (cr = carriage return)
|
|
8552
|
What is the alternative command used in Node for load()?
|
|
8553
|
What is the command to run the node programs?
|
|
8554
|
Why does the Node rely on event handlers?
|
|
8555
|
You would like to assign a meaningful name to your Catalyst 1900 series switch—what command should you use?
|
|
8556
|
Which is a fast C++ based JavaScript interpreter?
|
|
8557
|
You have made a console connection to your Cisco Catalyst 1900 series switch and you see the > symbol in HyperTerminal. What does it mean?
|
|
8558
|
The new Java arrays can be created into JavaScript programs using which of the following classes?
|
|
8559
|
Which of the following prompts indicates your router is in Privileged EXEC mode?
|
|
8560
|
The JavaScript classes can be instantiated using _____ operator.
|
|
8561
|
You have just received 14 Catalyst 3550 switches for your network. What is required to get them functioning correctly in your network?
|
|
8562
|
What does Rhino do when the getter and setter methods exist?
|
|
8563
|
Which command would you use in the CLI at User mode to enter Privileged EXEC mode?
|
|
8564
|
Which is a more formal way of importing packages and classes as JavaScript objects?
|
|
8565
|
You need to troubleshoot your network IP connectivity. Which of the following commands would you use to find the IP address on your Ethernet 0 interface?
|
|
8566
|
You are the network administrator for a large corporation. You want to be able to store all your configurations in a centralized location. Which of these servers will allow you to do so? (Choose all that apply.)
|
|
8567
|
Which is a useful way to try out small and simple Rhino programs and one-liners?
|
|
8568
|
In which of the following modes in Cisco's IOS can you issue showcommands?
|
|
8569
|
Which Rhino command quits Rhino environment?
|
|
8570
|
You are configuring your router and type in an Enable password and an Enable Secretpassword. Your fellow network technician asks you why you have two passwords set when you only need one. What do you tell him?
|
|
8571
|
Which of the following reads the textual contents of a URL and returns as a string?
|
|
8572
|
Which of the following are global functions that are not part of core JavaScript?
|
|
8573
|
You can execute show commands at which prompt? (Choose all that apply.)
|
|
8574
|
Rhino is originated by _______
|
|
8575
|
You need to set up passwords on all your default Telnet lines. What command would you start with?
|
|
8576
|
What will be the return value of the write() method when the Node cannot write the data immediately and has to buffer it internally?
|
|
8577
|
When the “end†event fires on EOF when no more data will arrive, which function is called?
|
|
8578
|
When setting up your serial interfaces, what does the clockrate command do for your connection?
|
|
8579
|
What is the method used to pause “data†events?
|
|
8580
|
Which among the following POSIX signals generate events?
|
|
8581
|
You need to set up a password that will prevent unauthorized users from telnetting into your router. What series of commands would you use?
|
|
8582
|
When do uncaught exceptions generate events?
|
|
8583
|
Which of the following is an event emitter?
|
|
8584
|
Which function is a synonym for on()?
|
|
8585
|
What is the function used to remove all handlers for name events?
|
|
8586
|
Your boss is concerned about security on your network. She wants to make sure that no one can identify passwords if they happen to view a configuration on your router. What command will encrypt all passwords on your router?
|
|
8587
|
What is the function used to deregister event handler ‘f’?
|
|
8588
|
What are the events generated by the Node objects called?
|
|
8589
|
You are consulting a small business that is establishing its first WAN link. The client wants to know what encapsulation you will be using on the link. Which of the following are valid encapsulations for WAN links? (Choose all that apply.)
|
|
8590
|
What is the code required to delete all “weight†tags?
|
|
8591
|
Which of the following is an example to perform the most common XML manipulations using the XML objects invocation?
|
|
8592
|
You need to back up the configurations you just made but there are no TFTP servers available. Which of the following commands are options to backup your currently running configuration? (Choose all that apply.)
|
|
8593
|
Which of the following is the descendant operator?
|
|
8594
|
Which method to use while working with XML fragments, instead of XML()?
|
|
8595
|
Your routers at ACME are having some connectivity issues. You issueshow commands for each connecting router's interface. Why are they unable to communicate?
|
|
8596
|
What is the return type of typeof for standard JavaScript objects
|
|
8597
|
The android OS comes with many useful system services, which include processes you can easily ask for things such as your..
|
|
8598
|
When will the finally block be called?
|
|
8599
|
What will be the reaction when a catch clause has no conditionals?
|
|
8600
|
An Android application is a loose collection of content providers, activities, broadcast receivers, and services.
|
|
8601
|
The iPhone is a line of Internet and multimedia-enabled smartphones designed and marketed by Intel Corporation.
|
|
8602
|
What is the code to be used to trim whitespaces?
|
|
8603
|
The timeline receiver will receive messages from the Android system.
|
|
8604
|
Which method of the iterable object returns an iterator object for the collection?
|
|
8605
|
Which looping statement allows XML tags to appear in JavaScript programs and adds API for operating on XML data?
|
|
8606
|
When the activity is not in focus, but still visible on the screen it is in?
|
|
8607
|
The main difference between the variables declared with var and with let is __________
|
|
8608
|
The Iphone has a feature that activates when you rotate the device from portrait to landscape.
|
|
8609
|
Which method of the iterable object returns an iterator object for the collection? a) iterator()
|
|
8610
|
The ___________ file specifies the layout of your screen.
|
|
8611
|
WHAT IS FACE TIME IN APPLE ?
|
|
8612
|
Which exception does the Iterators throw from their next() method when there are no more values to iterate, that work on finite collections?
|
|
8613
|
Which looping statement allows XML tags to appear in JavaScript programs and adds API for operating on XML data?
|
|
8614
|
App Widgets are can be place on the home screen by the user to check for updates are available?
|
|
8615
|
The main difference between the variables declared with var and with let is ______
|
|
8616
|
To create an emulator, you need an AVD. What does it stand for?
|
|
8617
|
The let keyword cannot be used ___________
|
|
8618
|
What built-in database is Android shipped with?
|
|
8619
|
Which is the subset that transforms web content into secure modules that can be safely hosted on a web page?
|
|
8620
|
Which was one of the first security subsets proposed?
|
|
8621
|
Which is the object that defines methods that allow complete control over page content?
|
|
8622
|
Which are the two functions that are not allowed in any secure subset?
|
|
8623
|
Why is this keyword not preferred in JavaScript?
|
|
8624
|
Which is the subset that is a secure container designed for the purpose of safely running untrusted JavaScript?
|
|
8625
|
The Iphone camera can:
|
|
8626
|
Why was “The Good Parts†designed as a language subset in JavaScript?
|
|
8627
|
Creating a UI (User Interface) in Android requires careful use of...
|
|
8628
|
What is being imposed on each subset to ensure that it conforms to the subset?
|
|
8629
|
What does javascript use instead of == and !=?
|
|
8630
|
What built-in database is Android shipped with?
|
|
8631
|
The Crockford’s subset does not include which function in JavaScript?
|
|
8632
|
When an activity doesn't exist in memory it is in. | IOS Mcqs
|
|
8633
|
What would be the result of the following statement in JavaScript using regular expression methods?
|
|
8634
|
Which of the following is NOT a state in the lifecycle of a service?
|
|
8635
|
Does the Iphone browser support flash applications?
|
|
8636
|
The method that performs the search-and-replace operation to strings for pattern matching is _______
|
|
8637
|
What is the most essential purpose of parentheses in regular expressions?
|
|
8638
|
When an activity doesn't exist in memory it is in.
|
|
8639
|
What does the subexpression /java(script)?/ result in?
|
|
8640
|
What will be the result when non greedy repetition is used on the pattern /a+?b/?
|
|
8641
|
What does /[^(]* regular expression indicate?
|
|
8642
|
The regular expression to match any one character not between the brackets is ______
|
|
8643
|
The ‘$’ present in the RegExp object is called a __________
|
|
8644
|
Application is running in foreground and receiving events.What is the current App State?
|
|
8645
|
What can be done in order to avoid the creation of global variables in JavaScript?
|
|
8646
|
The provides() function and the exportsobject are used to _________
|
|
8647
|
Modules that have more than one item in their API can _____
|
|
8648
|
The scope of a function is also called as ________
|
|
8649
|
iOS remote push notification is introduced by apple in which version?
|
|
8650
|
Application in background & executing background tasks.Determine current state of Application.
|
|
8651
|
To define each of the set classes as a property of the sets object (namespace) for the module, the statement is
|
|
8652
|
Which of the following statement is wrong?
|
|
8653
|
The maximum number of global symbols a module can define is ___________
|
|
8654
|
Application is in background. Not executing any code.What is the current application state?
|
|
8655
|
The functions provide() and require() of Dojo toolkit and Google’s Closure library are used for _________
|
|
8656
|
Which of the following statement is wrong ?
|
|
8657
|
You can refresh the webpage in JavaScript by using ________
|
|
8658
|
What is the procedure to add methods to HTMLElement so that they will be inherited by the objects that represent the HTML tags in the current document?
|
|
8659
|
How can we make methods available on all objects?
|
|
8660
|
Which is the correct code that returns a complex number that is the complex conjugate of this one?
|
|
8661
|
Which of the following hierarchy is correct?
|
|
8662
|
The class that represents the regular expressions is ________
|
|
8663
|
Which variables are used internally in object methods and are also globally visible?
|
|
8664
|
The object whose properties are inherited by all instances of the class, and properties whose values are functions behaving like instance methods of the class, is ________
|
|
8665
|
Different kinds of the object involved in a class definition are _____
|
|
8666
|
The four kinds of class members are ________
|
|
8667
|
Multi-tasking in iOS was introduced in which version ?
|
|
8668
|
iOS is a __________ software.
|
|
8669
|
The method that can be used to create new properties and also to modify the attributes of existing properties is _________
|
|
8670
|
We can return multiple values in swift from function by using __________.
|
|
8671
|
The snippet that filters the filtered set is __________
|
|
8672
|
To create constants in swift we used __________
|
|
8673
|
If A is the superclass and B is the subclass, then subclass inheriting the superclass can be represented as _______
|
|
8674
|
When a class B can extend another class A, we say that?
|
|
8675
|
The IDE i.e. Integrated Development Environment used in swift programming is __________
|
|
8676
|
The property of JSON() method is __________
|
|
8677
|
iOS Stands for iPhone Operating System
|
|
8678
|
The meaning for Augmenting classes is that _________
|
|
8679
|
The basic difference between JavaScript and Java is _________
|
|
8680
|
The keyword or the property that you use to refer to an object through which they were invoked is _________
|
|
8681
|
The behaviour of the instances present of a class inside a method is defined by _________
|
|
8682
|
What should you use to provide a default value for a variable in Swift?
|
|
8683
|
What does the question mark (?) indicate? A particular property is...
|
|
8684
|
Which of these is not a control transfer statement in Swift?
|
|
8685
|
How do you write comments in Swift?
|
|
8686
|
What are numbers with fractional components called in Swift?
|
|
8687
|
Swift integers are presented in all of these bit forms except which of the following?
|
|
8688
|
How many types of integers are in Swift?
|
|
8689
|
Which keyword do you use to announce constants in Swift?
|
|
8690
|
Swift is primarily used to develop content for ____ devices.
|
|
8691
|
What is the element that is used to specify the type of a variable or expression?
|
|
8692
|
The expression that creates a closure in Swift is called ____; in other languages it is also called a Lambda or Anonymous Function.
|
|
8693
|
What is the name for the Swift element that describes what sequence of characters are used to form valid tokens of the language?
|
|
8694
|
In Swift there are two kinds of types: named and ____.
|
|
8695
|
Java Virtual Machine is platform independent.
|
|
8696
|
Which method returns a reference to the currently executing thread object?
|
|
8697
|
hich keyword is used to make the classes and interface of another package accessible to the current package?
|
|
8698
|
The Object class is not a parent class of all the classes in java by default.
|
|
8699
|
What Swift element can be used to introduce a new name or code construct into your program?
|
|
8700
|
What element can be used to learn more information about a declaration or type?
|
|
8701
|
In Swift, there are three kinds of statements: simple, compiler control,and ____.
|
|
8702
|
The most basic of expressions in Swift are called ____ expressions.
|
|
8703
|
what is best way to create primary key as a string field instead of integer in rails.
|
|
8704
|
what exception cannot be handled with the rescue_from method in the application controller? e.g class applicationcontrollers < actioncontroller::base rescue_from exception, with: error_handler ...
|
|
8705
|
what does the 4xx series of http errors represent?
|
|
8706
|
what does rest stand for?
|
|
8707
|
what declaration would you use to set the layout for a controller?
|
|
8708
|
what component of rails are tested with unit tests?
|
|
8709
|
using erb for views, what filename should be given to a partial called 'login'?
|
|
8710
|
users who are new to mvc design often ask how to query data from views. is this possible? and if so, is this a good idea?
|
|
8711
|
unit tests are used to test which of the following components of ruby on rails?
|
|
8712
|
there is a table named product in a rails application. the program is required to fetch any 5 rows where the productid is 2. which of the following is the correct option to perform this action?
|
|
8713
|
the =~ operator is used to do inline regular expression matching, for instance: "function" =~ /fun/ "function" =~ /dinosaurs/ what are possible return values for the =~ matcher?
|
|
8714
|
suppose a model is created as follows: rails generate model sales rake db:migrate what would be the best way to completely undo these changes, assuming nothing else has changed in the mean...
|
|
8715
|
select all incorrect statements regarding the ruby version manager (rvm):
|
|
8716
|
rails automatically requires certain files in an application. which of the following files are automatically included without an explicit 'require' being necessary?
|
|
8717
|
is an ajax call synchronous or asynchronous?
|
|
8718
|
in order to enable locking on a table, which of the following columns is added?
|
|
8719
|
in a rails migration, which of the following will make a column unique, and then have it indexed?
|
|
8720
|
in a rails application, the developmental and production configuration are stored in the:
|
|
8721
|
in a rails application, a gemfile needs to be modified to make use of sqlite3-ruby gems. which of the following options will use these gems, as per the new gemfile?
|
|
8722
|
in a has_many association, what is the difference between build and new? // user.rb has_many :posts // post.rb belongs_to :user
|
|
8723
|
Which method in thread class causes the currently executing thread object to temporarily pause and allow other threads to execute?
|
|
8724
|
Which package is used for GUI?
|
|
8725
|
Which method causes the current thread to wait for the specified milliseconds, until the another thread notifies? (invokes notify() or notifyAll() method)?
|
|
8726
|
if a model called blogcomment is defined, what would its db table be called?
|
|
8727
|
if a method #decoupage(n) is described as o(n^2), what does that mean?
|
|
8728
|
What are the main subclasses of the Exception class?
|
|
8729
|
If there is no constructor in a class, compiler automatically creates a default constructor.
|
|
8730
|
Which method is used to invoke the garbage collector to perform the cleanup processing?
|
|
8731
|
If a subclass has the same method as declared in the parent class it is known as ______.
|
|
8732
|
Which type of inheritance one super-class have more than one sub-class?
|
|
8733
|
Which stream does Java application uses to read data from a source, it may be a file, an array, peripheral device or socket?
|
|
8734
|
if a float is added to an integer, what is the class of the resulting number? i.e. 1.0 + 2
|
|
8735
|
Which method is used in thread class to starts the execution of the thread?
|
|
8736
|
if a controller is named "users", what would its helpers module be called?
|
|
8737
|
how can a value be stored so that it's shared across an entire request (i.e. make it accessible in controllers, views and models)?
|
|
8738
|
how can a partial called "cart" be rendered from a controller called "productscontroller", assuming the partial is in a directory called "shared"?
|
|
8739
|
given the following code, where is the "party!" method available? module partyanimal def self.party! puts "hard! better! faster! stronger!" end end class person include partya...
|
|
8740
|
Which packages are also termed as Java API Packages?
|
|
8741
|
given below are two statements regarding the ruby programming language: statement x: "redo" restarts an iteration of the most internal loop, without checking loop condition. statement y: "retry" r...
|
|
8742
|
for the string class, what's the difference between "#slice" and "#slice!"?
|
|
8743
|
consider the following information for a user view: user_path named route with value "/users/" @user = 1 now, consider the following code in the html erb template: <%= link_to user_path(@user)...
|
|
8744
|
Which symbol is used to contain the values of automatically initialized arrays. Also used to define a block of code, for classes, methods, and local scopes?
|
|
8745
|
PatternSyntaxException Class Methods is an unchecked exception that indicates a syntax error in a regular expression pattern.
|
|
8746
|
What is the advantage of Method Overloading?
|
|
8747
|
Garbage Collection is the process of reclaiming the runtime unused memory automatically.
|
|
8748
|
An abstract class has no use when it is extended by some other class.
|
|
8749
|
Which provides a new way for your programs to interface with code libraries written in other languages?
|
|
8750
|
Which classes has Sun Microsystem suggested not to use for read and write the textual information?
|
|
8751
|
Can we start a thread twice?
|
|
8752
|
Who is also called father of Java Programming Language?
|
|
8753
|
Which string function returns the number of characters in a string?
|
|
8754
|
What is the disadvantage of Garbage Collection?
|
|
8755
|
Relative path make your hypertext links______.
|
|
8756
|
Colors in plain HTML can be specified using ?
|
|
8757
|
A class is declared inside a class but outside a method it is known as ________.
|
|
8758
|
Which method of 'Class' class is used to register the driver class and the method is used to dynamically load the driver class?
|
|
8759
|
Which program do you need to write HTML?
|
|
8760
|
Which keyword is used by classes to implement an interface?
|
|
8761
|
The <br>tag adds what to your webpage ?
|
|
8762
|
When making bulleted lists you have what options ?
|
|
8763
|
JVM stands for?
|
|
8764
|
Which package includes StringTokenizer that tokenizes a string into independent words?
|
|
8765
|
colspan can be added to only what tag?
|
|
8766
|
Which method waits for a thread to die?
|
|
8767
|
How many characters can be written with 1 Kilobyte ?
|
|
8768
|
What will happen if we call the run() method directly instead of calling the start() method?
|
|
8769
|
If you do not include a DESCRIPTION meta tag, most search engine will simply list what ?
|
|
8770
|
Which package includes all the standard classes of java?
|
|
8771
|
Which is NOT a predefined target for links ?
|
|
8772
|
How many types of constructor are defined in the StringTokenizer class?
|
|
8773
|
Hexadecimal numbers are numbers based on the value of what ?
|
|
8774
|
Which class is used when a program does not want to handle an exception?
|
|
8775
|
What type of constructor is used to provide different values to the distinct objects?
|
|
8776
|
All XHTML tags and attributes must be in lower case
|
|
8777
|
By interface, we cannot support the functionality of multiple inheritances.
|
|
8778
|
The Java Virtual Machine is the cornerstone of the Java platform.
|
|
8779
|
Which method of DataInputStream class reads a line from the file and returns it as a string?
|
|
8780
|
Which state is the thread still alive, but is currently not eligible to run?
|
|
8781
|
Both threads are waiting for each other to release the lock, the condition is called deadlock.
|
|
8782
|
WYSIWYG stands for ?
|
|
8783
|
How many ways are there to access package from another package?
|
|
8784
|
Under which package is the string class encapsulated?
|
|
8785
|
Which keyword is used for the block to handle the exceptions generated by try block?
|
|
8786
|
Nested interface must be public if it is declared outside the interface but it cannot have any access modifier if declared within the class.
|
|
8787
|
Multiple inheritances is not supported in case of class but it is supported in case of interface.
|
|
8788
|
Which class automatically flushes the data so that there is no need to call the flush() method. Moreover, its methods don't throw IOException?
|
|
8789
|
Is attribute minimization allowed in XHTML?
|
|
8790
|
Gif and jpg are the two main types of what ?
|
|
8791
|
How many methods does a thread class provides for sleeping a thread?
|
|
8792
|
Which class members can be accessed from the classes in the same package as well as classes in other Packages that are subclasses of the declaring class?
|
|
8793
|
When is the content of a table shown ?
|
|
8794
|
XHTML documents must be "well-formed"
|
|
8795
|
Which method of object class can clone an object?
|
|
8796
|
To make the appearance of the colors more powerful on your site do which of the following ?
|
|
8797
|
Which is a technique in Java in which a class can have any number of constructors that differ in parameter lists?
|
|
8798
|
The DOCTYPE declaration has no closing tag
|
|
8799
|
Is this correct XHTML? ( <ul> <li>Shope</li> <li>Cloths <ul> <li>Cloths Shope</li> <li>T Shirt</li> </ul> <li>Jeans</li> </ul>)
|
|
8800
|
All elements in XHTML must be closed
|
|
8801
|
If you don't want the frame windows to be resizeable, simply add what to the <frame> lines ?
|
|
8802
|
The <title> tag belongs where in your HTML ?
|
|
8803
|
What is correct XHTML for a horizontal line?
|
|
8804
|
XML and HTML will be replaced by XHTML
|
|
8805
|
consider the following code snippet: def index render end the corresponding index.html.erb view is as following: <html> <head> <title>ruby on rails sample application | <%=@title%></title> ...
|
|
8806
|
choose the best way to implement sessions in rails 3: a) using cookiestore b) by creating a session table and setting config/initializers/session_store.rb with rails.application.config.session_sto...
|
|
8807
|
Which of the following statements about Java Threads is correct?
|
|
8808
|
where we use attr_accessor and attr_accessible in rails ?
|
|
8809
|
bgcolor is an attribute of body tag
|
|
8810
|
XHTML is a Web standard
|
|
8811
|
For Frames in HTML, how do you specify the rest of the screen?
|
|
8812
|
Is it a common myth that meta tags seriously improve search engine rankings ?
|
|
8813
|
To define the space between the element's border and content, you use the padding property, but are you allowed to use negative values?
|
|
8814
|
Consider the following statements:
|
|
8815
|
Increasing the cellpadding value will what ?
|
|
8816
|
What attribute is used to specify number of rows?
|
|
8817
|
How do you display a border like this: The top border = 10 pixels The bottom border = 5 pixels The left border = 20 pixels The right border = 1pixel?
|
|
8818
|
In a class definition, the special method provided to be called to create an instance of that class is known as a/an
|
|
8819
|
Can I play audios in HTML? Answer :
|
|
8820
|
Re-implementing an inherited method in a sub class to perform a different task from the parent class is called
|
|
8821
|
What is cell padding?
|
|
8822
|
An abstract data type typically comprises a …………… and a set of ……………… respectively.
|
|
8823
|
In Java, a try block should immediately be followed by one or more ……………….. blocks.
|
|
8824
|
In Java, a character constant’s value is its integer value in the ………………………character set.
|
|
8825
|
…………….. are used to document a program and improve its readability.
|
|
8826
|
Java compiler javac translates Java source code into ………………
|
|
8827
|
What would the argument passing method be which is used by the above Program – III?
|
|
8828
|
What would the output be of the above Program – III before and after it is called?
|
|
8829
|
Identify, from among the following, the incorrect variable name(s).
|
|
8830
|
Which of the following is not a component of Java Integrated Development Environment (IDE)?
|
|
8831
|
Screen colors are defined by which colors ?
|
|
8832
|
How do you make each word in a text start with a capital letter?
|
|
8833
|
Is width="100" and width="100%" the same?
|
|
8834
|
Which of the following attributes below are used for a font name?
|
|
8835
|
Use<td> and </td>to add what to your tables?
|
|
8836
|
< meta > tags always goes inside the < head > element.
|
|
8837
|
What does the GENERATOR meta tag tell ?
|
|
8838
|
Which of the following tags below are used for a multi-line text input control?
|
|
8839
|
<a> and </a> are the tags used for ?
|
|
8840
|
In java, objects are passed as
|
|
8841
|
Mark the incorrect statement from the following:
|
|
8842
|
When an overridden method is called from within a subclass, it will always refer to the version of that method defined by the
|
|
8843
|
Which format usually works best for photos ?
|
|
8844
|
All exception types are subclasses of the built-in class
|
|
8845
|
How do you add a background color for all <h1> elements? (
|
|
8846
|
A protected member can be accessed in,
|
|
8847
|
What is the REFRESH meta tag used for ?
|
|
8848
|
Each list item in an ordered or unordered list has which tag? (
|
|
8849
|
An overloaded method consists of,
|
|
8850
|
If you wanted to create text that was a different color or font than other text in your Web page, what type of tag would you use?
|
|
8851
|
The correct order of the declarations in a Java program is,
|
|
8852
|
The java run time system automatically calls this method while garbage collection.
|
|
8853
|
You read the following statement in a Java program that compiles and executes.(submarine.dive(depth); What can you say for sure?)
|
|
8854
|
When you use a heading tag in a document, what does the Web browser assumes? (
|
|
8855
|
When you count to 15 using hexadecimal numbers, the highest number is what ?
|
|
8856
|
What is garbage collection in the context of Java?
|
|
8857
|
What is byte code in the context of Java?
|
|
8858
|
Which of the following is TRUE?
|
|
8859
|
Which of the following variable declaration would NOT compile in a java program?
|
|
8860
|
What is the type and value of the following expression? (Notice the integer division).(-4 + 1/2 + 2*-3 + 5.0)
|
|
8861
|
Among these expressions, which is(are) of type String?
|
|
8862
|
Which of the following is true?
|
|
8863
|
Which of the following is not true?
|
|
8864
|
The fields in an interface are implicitly specified as,
|
|
8865
|
Which one of the following is not true?
|
|
8866
|
To prevent any method from overriding, we declare the method as,
|
|
8867
|
Which statement is not true in java language?
|
|
8868
|
Multiple inheritance means,
|
|
8869
|
The default value of a static integer variable of a class in Java is,
|
|
8870
|
Ritchie and Brian Kernighan jointly carried out the development of C and that version is ________ .
|
|
8871
|
Which Committee standardize C Programming Language ?
|
|
8872
|
Who was Creator of B Language , which inspired Dennis Ritchie to create Strong Procedural Language called C ?
|
|
8873
|
C Programming was created at ______ by Dennis Ritchie.
|
|
8874
|
Many features of C were derived from an earlier language called _____.
|
|
8875
|
Dennis Was Author of Famous Programming Book _________ .
|
|
8876
|
Dennis Ritchie received following awards - [Select 2]
|
|
8877
|
C Programming was created in Year _______ .
|
|
8878
|
Why do designers often use slight variations of black and white as background colors ?
|
|
8879
|
Which tag is used to insert images into your web page ?
|
|
8880
|
There are how many "browser safe colors" ? (
|
|
8881
|
Which two meta tags have special relevance for search engines ?
|
|
8882
|
What is the most important tool for adding colors to certain areas of the page rather than the entire background ?
|
|
8883
|
What tag adds a paragraph break after the text ?
|
|
8884
|
Which of these sentences most accurately describes the GET VBAK LATE. event?
|
|
8885
|
To create a list of the top 25 customers, you should use
|
|
8886
|
To summarize the contents of several matching lines into a single line, use this SELECT statement clause.
|
|
8887
|
To both add or change lines of a database table, use ___
|
|
8888
|
Which of these is NOT a valid type of function module?
|
|
8889
|
After a DESCRIBE TABLE statement SY-TFILL will contain
|
|
8890
|
The following code indicates:(CALL SCREEN 9000 STARTING AT 10 5 ENDING AT 60 20)
|
|
8891
|
To prevent duplicate accesses to a master data field:
|
|
8892
|
This data type has a default length of one and a default value = '0'
|
|
8893
|
In regard to the START-OF-SELECTION event, which of the following is a true statement?
|
|
8894
|
Defining clickable sub-areas on an image is called?
|
|
8895
|
Imagelinks can show a text label if you add which property?
|
|
8896
|
Which of the following is NOT a valid pair for browser safe colors ?
|
|
8897
|
If a table contains many duplicate values for a field, minimize the number of records returned by using this SELECT statement addition.
|
|
8898
|
Adding a border to your image helps the visitor to recognize it as what ?
|
|
8899
|
One should never combine the "start" and "type" option ?
|
|
8900
|
What tag tells the browser where the page starts and stops ?
|
|
8901
|
Why should you specify a background color if you are using an image for the actual background of your page ?
|
|
8902
|
What is used to store information usually relevant to browsers and searchengines?
|
|
8903
|
Why should you add alternative text to your images ?
|
|
8904
|
To select one record for a matching primary key, use ____
|
|
8905
|
Is it possible to link within the current page ?
|
|
8906
|
To allow the user to enter a single value on a selection screen, use the ABAP keyword ____.
|
|
8907
|
In the code <frameset cols="120,*"> the following would be true.
|
|
8908
|
Which section is used for text and tags that are shown directly on your web page ?
|
|
8909
|
Hex-colors are the only way to define colors on the web?
|
|
8910
|
A Web document is broken into sections. What are the tags called that create these sections?
|
|
8911
|
When you use a heading tag in a document, what does the Web browser assumes?
|
|
8912
|
Kind of Parsers are
|
|
8913
|
What does vlink mean ?
|
|
8914
|
If the background image is smaller than the screen, what will happen ?
|
|
8915
|
A 6 digit Hex color (#FF9966) defines values of Red, Blue and Green in which order ?
|
|
8916
|
All normal webpages consist of what two parts ?
|
|
8917
|
Use what to prevent confusion on numbers higher than 9 with hexadecimal colors ?
|
|
8918
|
To specify a font for your whole page add which tag ?
|
|
8919
|
Why do designers often use slight variations of black and white as background colors ? (
|
|
8920
|
Do all XHTML documents require a doctype?
|
|
8921
|
colspan=n can be added to only what tag?
|
|
8922
|
All of these allow you to step through the flow of a program line-by-line except:
|
|
8923
|
What would be the value of lv_char_len?
|
|
8924
|
What would be the value of lv_byte_len?
|
|
8925
|
Which of the following lines of code will not show a match?
|
|
8926
|
Which of the following functions does not accept any argument?
|
|
8927
|
Which of the following statements regarding the output of the function re.match is incorrect?
|
|
8928
|
Which of the following functions returns a dictionary mapping group names to group numbers?
|
|
8929
|
In the functions re.search.start(group) and re.search.end(group), if the argument groups not specified, it defaults to ________
|
|
8930
|
Which of the codes shown below results in a match?
|
|
8931
|
Which of the following special characters matches a pattern only at the end of the string?
|
|
8932
|
The special character \B matches the empty string, but only when it is ____________
|
|
8933
|
The function of re.match is ____________
|
|
8934
|
Which of the following pattern matching modifiers permits whitespace and comments inside the regular expression?
|
|
8935
|
Which of the following functions creates a Python object?
|
|
8936
|
The function of re.search is __________
|
|
8937
|
The difference between the functions re.sub and re.subn is that re.sub returns a _______________ whereas re.subn returns a __________________
|
|
8938
|
The function re.error raises an exception if a particular string contains no match for the given pattern.
|
|
8939
|
Which of the following functions results in case insensitive matching?
|
|
8940
|
Which of the following functions clears the regular expression cache?
|
|
8941
|
Choose the function whose output can be: <_sre.SRE_Match object; span=(4, 8), match=’aaaa’>.
|
|
8942
|
_______ matches the start of the string._______ matches the end of the string.
|
|
8943
|
The expression a{5} will match _____________ characters with the previous regular expression.
|
|
8944
|
The character Dot (that is, ‘.’) in the default mode, matches any character other than _____________
|
|
8945
|
What happens if no arguments are passed to the seek function?
|
|
8946
|
How do you change the file position to an offset value from the start?
|
|
8947
|
How do you delete a file?
|
|
8948
|
How do you rename a file?
|
|
8949
|
How do you get the current position within the file?
|
|
8950
|
How do you close a file object (fp)?
|
|
8951
|
Which of the following is not a valid attribute of a file object (fp)?
|
|
8952
|
How do you get the name of a file from a file object (fp)?
|
|
8953
|
What is the difference between r+ and w+ modes?
|
|
8954
|
Which of the following is not a valid mode to open a file?
|
|
8955
|
Which of the following are the modes of both writing and reading in binary format in file?
|
|
8956
|
Is it possible to create a text file in python?
|
|
8957
|
Which function is used to close a file in python?
|
|
8958
|
Which function is used to write a list of string in a file?
|
|
8959
|
Which function is used to write all the characters?
|
|
8960
|
Which function is used to read single line from file?
|
|
8961
|
What is a FTP program used for?
|
|
8962
|
Which function is used to read all the characters?
|
|
8963
|
Which of the following is used to explore the Internet?
|
|
8964
|
What is the use of “a†in file handling?
|
|
8965
|
A keyword is the —
|
|
8966
|
What is the use of “w†in file handling?
|
|
8967
|
In file handling, what does this terms means “r, a�
|
|
8968
|
Which domain must be present in the website address (URL) of a university library?
|
|
8969
|
Correct syntax of file.readlines() is?
|
|
8970
|
Correct syntax of file.writelines() is?
|
|
8971
|
What is the correct syntax of open() function?
|
|
8972
|
Pick the odd one tag out?
|
|
8973
|
What is unpickling?
|
|
8974
|
What is the pickling?
|
|
8975
|
Which of the following mode will refer to binary data?
|
|
8976
|
Which is/are the basic I/O connections in file?
|
|
8977
|
What is the use of truncate() method in file?
|
|
8978
|
What is the use of seek() method in files?
|
|
8979
|
The first page of website is called?
|
|
8980
|
What is the current syntax of remove() a file?
|
|
8981
|
What is the current syntax of rename() a file?
|
|
8982
|
What is the use of tell() method in python?
|
|
8983
|
Which one of the following is not attributes of file?
|
|
8984
|
How do I add scrolling text to my page?
|
|
8985
|
Can a data cell contain images?
|
|
8986
|
Which is a valid Internet address?
|
|
8987
|
Tags and test that are not directly displayed on the page are written in _____ section.
|
|
8988
|
Which are the two built-in functions to read a line of text from standard input, which by default comes from the keyboard?
|
|
8989
|
HTML tags are surrounded by which type of brackets.
|
|
8990
|
The readlines() method returns ____________
|
|
8991
|
HTML uses
|
|
8992
|
To read the remaining lines of the file from a file object infile, we use _________
|
|
8993
|
To read the next line of the file from a file object infile, we use ____________
|
|
8994
|
Apart from <b> tag, what other tag makes text bold ?
|
|
8995
|
To read the entire remaining contents of the file as a string from a file object infile, we use ____________
|
|
8996
|
To read two characters from a file object infile, we use ________
|
|
8997
|
Fundamental HTML Block is known as ___________.
|
|
8998
|
The year in which HTML was first proposed _______.
|
|
8999
|
To open a file c:\scores.txt for appending data, we use _________
|
|
9000
|
To open a file c:\scores.txt for writing, we use ____________
|
|
9001
|
To open a file c:\scores.txt for reading, we use _____________
|
|
9002
|
Which function overloads the // operator?
|
|
9003
|
By default Hyperlinks are displayed with an underline. How do you remove the underline from all hyperlinks by using CSS code ?
|
|
9004
|
Which operator is overloaded by the __or__() function?
|
|
9005
|
Let A and B be objects of class Foo. Which functions are called when print(A + B) is executed?
|
|
9006
|
How will you make all paragraph elements 'RED' in color ?
|
|
9007
|
Which function overloads the >> operator?
|
|
9008
|
The default value of "position" attribute is _________.
|
|
9009
|
Which CSS property is used to control the text size of an element ?
|
|
9010
|
Which operator is overloaded by __lg__()?
|
|
9011
|
Which function overloads the == operator?
|
|
9012
|
Which operator is overloaded by __invert__()?
|
|
9013
|
Which css property you will use if you want to add some margin between a DIV's border and its inner text ?
|
|
9014
|
Which function overloads the + operator?
|
|
9015
|
When we write <img src="img.png">, what "img.png" inside double quote implies?
|
|
9016
|
Which attribute can be added to many HTML / XHTML elements to identify them as a member of a specific group ?
|
|
9017
|
Method issubclass() checks if a class is a subclass of another class.
|
|
9018
|
Which element is used in the <HEAD> section on an HTML / XHTMLpage, if we want to use an external style sheet file to decorate the page ?
|
|
9019
|
Which of the following statements isn’t true?
|
|
9020
|
What should be the table width, so that the width of a table adjust to the current width of the browser window?
|
|
9021
|
What does single-level inheritance mean?
|
|
9022
|
Which of the following properties will we use to display border around a cell without any content ?
|
|
9023
|
What does built-in function help do in context of classes?
|
|
9024
|
If we want to use a nice looking green dotted border around an image, which css property will we use?
|
|
9025
|
Which of the following is not a type of inheritance?
|
|
9026
|
What does built-in function type do in context of classes?
|
|
9027
|
If we want to show an Arrow as cursor, then which value we will use ?
|
|
9028
|
Suppose B is a subclass of A, to invoke the __init__ method in A from B, what is the line of code you should write?
|
|
9029
|
Is it possible to declare font-weight, font-face & font-size by using ONLY ONE css propery ?
|
|
9030
|
When defining a subclass in Python that is meant to serve as a subtype, the subtype Python keyword is used.
|
|
9031
|
All subclasses are a subtype in object-oriented programming.
|
|
9032
|
Can we define the text direction via css property ?
|
|
9033
|
Which of the following statements is wrong about inheritance?
|
|
9034
|
If we want to wrap a block of text around an image, which css property will we use ?
|
|
9035
|
Can we align a Block element by setting the left and right margins ?
|
|
9036
|
Which of the following best describes inheritance?
|
|
9037
|
Suppose we want to arragnge five nos. of DIVs so that DIV4 is placed above DIV1. Now, which css property will we use to control the order of stack?
|
|
9038
|
What does print(Test.__name__) display (assuming Test is the name of the class)?
|
|
9039
|
__del__ method is used to destroy instances of a class.
|
|
9040
|
What is delattr(obj,name) used for?
|
|
9041
|
What is hasattr(obj,name) used for?
|
|
9042
|
Special methods need to be explicitly called during object creation.
|
|
9043
|
What are the methods which begin and end with two underscore characters called?
|
|
9044
|
Which of the following is not a class method?
|
|
9045
|
The assignment of more than one function to a particular operator is _______
|
|
9046
|
What is Instantiation in terms of OOP terminology?
|
|
9047
|
What is getattr() used for?
|
|
9048
|
What is setattr() used for?
|
|
9049
|
____ is used to create an object.
|
|
9050
|
_____ represents an entity in the real world with its identity and behaviour.
|
|
9051
|
Which of the following is false about protected class members?
|
|
9052
|
The purpose of name mangling is to avoid unintentional access of private class members.
|
|
9053
|
Private members of a class cannot be accessed.
|
|
9054
|
Methods of a class that provide access to private members of the class are called as ______ and ______
|
|
9055
|
Which of the following is the most suitable definition for encapsulation?
|
|
9056
|
Which of these is not a fundamental features of OOP?
|
|
9057
|
Overriding means changing behaviour of methods of derived class methods in the base class.
|
|
9058
|
A class in which one or more methods are only implemented to raise an exception is called an abstract class.
|
|
9059
|
What is the use of duck typing?
|
|
9060
|
What is the biggest reason for the use of polymorphism?
|
|
9061
|
Which of the following best describes polymorphism?
|
|
9062
|
Which of the following blocks will be executed whether an exception is thrown or not?
|
|
9063
|
______________________ exceptions are raised as a result of an error in opening a particular file.
|
|
9064
|
If we don't want to allow a floating div to the left side of an element, which css property will we use ?
|
|
9065
|
An exception is ____________
|
|
9066
|
Syntax errors are also known as parsing errors.
|
|
9067
|
If we want define style for an unique element, then which css selector will we use ?
|
|
9068
|
Which of the following is not a standard exception in Python?
|
|
9069
|
Which of the following is not an exception handling keyword in Python?
|
|
9070
|
What happens when ‘1’ == 1 is executed?
|
|
9071
|
When is the finally block executed?
|
|
9072
|
Can one block of except statements handle multiple exception?
|
|
9073
|
When will the else part of try-except-else be executed?
|
|
9074
|
How many except statements can a try-except block have?
|
|
9075
|
<p> tag defines a
|
|
9076
|
To which of the following the “in†operator can be used to check if an item is in it?
|
|
9077
|
For controlling page's dimensions and scaling which element is used in <meta> tag?
|
|
9078
|
Which of following is a new input type in HTML5?
|
|
9079
|
Suppose listExample is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after listExample.pop()?
|
|
9080
|
Suppose listExample is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after listExample.pop(1)?
|
|
9081
|
HTML block-level elements always starts on a
|
|
9082
|
Suppose listExample is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after listExample.extend([34, 5])?
|
|
9083
|
What is first version of HTML?
|
|
9084
|
Suppose list1 is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after list1.reverse()?
|
|
9085
|
Non breaking space is denoted by
|
|
9086
|
Suppose list1 is [3, 4, 5, 20, 5, 25, 1, 3], what is list1.count(5)?
|
|
9087
|
Cols attribute in forms text area specifies what?
|
|
9088
|
Suppose list1 is [3, 4, 5, 20, 5], what is list1.index(5)?
|
|
9089
|
Default method while submitting a form is
|
|
9090
|
To remove string “hello†from list1, we use which command?
|
|
9091
|
For using an external style sheet in your web document which tag is used?
|
|
9092
|
To insert 5 to the third position in list1, we use which command?
|
|
9093
|
HTML <br> element defines
|
|
9094
|
o add a new element to a list we use which command?
|
|
9095
|
<h1 style="text-align: center;"> My Web Page </h1> displays?
|
|
9096
|
Suppose list1 = [0.5 * x for x in range(0, 4)], list1 is:
|
|
9097
|
Non-semantic elements in HTML5 is?
|
|
9098
|
Suppose list1 is [1, 3, 2], What is list1 * 2?
|
|
9099
|
Which method uploads a representation of a specified URI in HTML?
|
|
9100
|
CSS stands for?
|
|
9101
|
Suppose list1 is [2, 33, 222, 14, 25], What is list1[:-1]?
|
|
9102
|
For opening linked document in same window which target attribute is more suitable?
|
|
9103
|
Suppose list1 is [2, 33, 222, 14, 25], What is list1[-1]?
|
|
9104
|
Suppose list1 is [4, 2, 2, 4, 5, 2, 1, 0], Which of the following is correct syntax for slicing operation?
|
|
9105
|
To shuffle the list(say list1) what function do we use?
|
|
9106
|
Suppose list1 is [1, 5, 9], what is sum(list1)?
|
|
9107
|
Suppose list1 is [3, 5, 25, 1, 3], what is min(list1)?
|
|
9108
|
Hypertext transfer protocol (HTTP) is designed to enable communications between?
|
|
9109
|
While submitting a form method attribute specifies what?
|
|
9110
|
Suppose list1 is [2445,133,12454,123], what is max(list1)?
|
|
9111
|
Suppose listExample is [‘h’,’e’,’l’,’l’,’o’], what is len(listExample)?
|
|
9112
|
Attributes usually come in name/value pairs forms like:
|
|
9113
|
What is the output when we execute list(“helloâ€)?
|
|
9114
|
MPEG stands for?
|
|
9115
|
Which of the following commands will create a list?
|
|
9116
|
In HTML tables space between cell content and cell border is called
|
|
9117
|
.midi extension file format is a\an
|
|
9118
|
In HTML links an unvisited link is underlined and
|
|
9119
|
Suppose x is 345.3546, what is format(x, “10.3fâ€) (_ indicates space).
|
|
9120
|
HTML <dl> tag defines the
|
|
9121
|
Which tag is used to define links in HTML document?
|
|
9122
|
What function do you use to read a string?
|
|
9123
|
In HTML you can display a color by using only
|
|
9124
|
Suppose i is 5 and j is 4, i + j is same as _______
|
|
9125
|
HTML <canvas> element is used to draw graphics, on fly via
|
|
9126
|
To check whether string s1 contains another string s2, use ________
|
|
9127
|
This <!-- Your text --> tag is used for?
|
|
9128
|
If a class defines the __str__(self) method, for an object obj for the class, you can use which command to invoke the __str__ method.
|
|
9129
|
For applying styles on many web pages which style sheet is more preferable?
|
|
9130
|
Semantic element <nav> defines
|
|
9131
|
To return the length of string s what command do we execute?
|
|
9132
|
For creating a drop-down list in HTML forms which element is suitable?
|
|
9133
|
For specifying character set, page description, keywords, authors and other metadata which tag is used?
|
|
9134
|
To retrieve the character at index 3 from string s=â€Hello†what command do we execute (multiple answers allowed)?
|
|
9135
|
Visible part of HTML document lies in
|
|
9136
|
What is “Helloâ€.replace(“lâ€, “eâ€)?
|
|
9137
|
A small program that can be embedded within web pages to perform a specific functionality is called as
|
|
9138
|
Say s=â€hello†what will be the return value of type(s)?
|
|
9139
|
What will be displayed by print(ord(‘b’) – ord(‘a’))?
|
|
9140
|
Starting and ending tag of HTML document is
|
|
9141
|
What will be the output of the “hello†+1+2+3?
|
|
9142
|
RGB stands for
|
|
9143
|
The format function, when applied on a string returns __________
|
|
9144
|
Plug-ins can be added to web pages with <object> tag and?
|
|
9145
|
For adding styles in HTML tables we can use properties of?
|
|
9146
|
A tag which is used for overriding current text direction e.g. Right to left side
|
|
9147
|
Suppose s is “\t\tWorld\nâ€, what is s.strip()?
|
|
9148
|
Which of the following statement prints hello\example\test.txt?
|
|
9149
|
To concatenate two strings to a third what statements are applicable?
|
|
9150
|
Given a string example=â€hello†what is the output of example.count(‘l’)?
|
|
9151
|
Scrolling piece of text displayed either horizontally or vertically is created by
|
|
9152
|
print(0xA + 0xB + 0xC):
|
|
9153
|
What arithmetic operators cannot be used with strings?
|
|
9154
|
The output of executing string.ascii_letters can also be achieved by:
|
|
9155
|
What will be the output of the following Python statement?(>>>"abcd"[2:])
|
|
9156
|
What will be the output of the following Python statement?(>>>"a"+"bc")
|
|
9157
|
Which of the following statement is used for changing Recovery Model with T-SQL?
|
|
9158
|
Type of tag used for inserting an image in web document is
|
|
9159
|
The _______ recovery model is a special-purpose model that works in a similar manner to the full recovery model.
|
|
9160
|
Which of following is not an inline element?
|
|
9161
|
How many types of backups you can run when the data is in the “Full†recovery model?
|
|
9162
|
Web design that makes your web page look good on all devices is called as?
|
|
9163
|
Which of the following recovery models requires log backups?
|
|
9164
|
Which of the following feature cannot be used in simple recovery mode?
|
|
9165
|
XHTML stands for?
|
|
9166
|
HTML classes that is already defined and allow us to apply styles on it are called as
|
|
9167
|
No log backups is a feature of __________ recovery model.
|
|
9168
|
In HTML form <input type="text"> is used for
|
|
9169
|
How many types of recovery model is provided by SQL Server?
|
|
9170
|
HTML local storage object that stores data for one session is?
|
|
9171
|
SQL Server backup and restore operations occur within the context of the _______ model of the database
|
|
9172
|
To define a style for a special type of elements, we can add a
|
|
9173
|
_blank target attribute opens a linked document in
|
|
9174
|
Purpose of syspolicy_system_health_state in policy based management is _________
|
|
9175
|
Parameters remain in browser history is an example of
|
|
9176
|
___________ displays the condition expressions that were executed.
|
|
9177
|
Which of following element is used for creating a separate table footer?
|
|
9178
|
How many types of execution mode are present in syspolicy_policies?
|
|
9179
|
Anchor tag in HTML is denoted as
|
|
9180
|
Which of the following column is a part of syspolicy_policies result?
|
|
9181
|
An image-map is an image with clickable areas, so which tag we can use for defining an image-map?
|
|
9182
|
"href " attribute in HTML document is used to define
|
|
9183
|
Policy based management view is owned by _______ schema.
|
|
9184
|
Which method is same as GET but returns only HTTP headers and no document body?
|
|
9185
|
XML is application of Extensible Markup Language (XML) whereas HTML is an application of
|
|
9186
|
Which of the following is Policy-based management view?
|
|
9187
|
Which of the following is policy based management tip related to administration?
|
|
9188
|
Point out the correct statement related to database configuration
|
|
9189
|
Next version of XHTML 1.0 is
|
|
9190
|
Policy based management views are present in _________ database
|
|
9191
|
Users need _________ permission to create collection model object in MDS.
|
|
9192
|
Creation of a Derived Hierarchy requires permission to ___________
|
|
9193
|
Which of the following action cannot be performed with MDS?
|
|
9194
|
Which of the following data tools comes installed with SQL Server 2012?
|
|
9195
|
Key component that help you build an EIM solution is ___________
|
|
9196
|
Which is the more preferred way tool of effective data management strategy and decision making?
|
|
9197
|
Which of the following SQL Server tools is used to enhance data management and governance?
|
|
9198
|
Which of the following tools is used for enterprise information management?
|
|
9199
|
Which of the following network protocol should be selected to enable IP address?
|
|
9200
|
Which is the most serious issue after migration of access database to SQL Server?
|
|
9201
|
Point out the wrong statement
|
|
9202
|
Title element defines title of document at
|
|
9203
|
Action attribute in HTMl forms specifies that
|
|
9204
|
Which of following is not semantic element?
|
|
9205
|
Tags used to tell browser that how to display text enclosed (e.g. <b>, <big>) are called as
|
|
9206
|
When form data contains sensitive or personal information than which method is more preferable?
|
|
9207
|
Which language is used to create web documents?
|
|
9208
|
For defining a submit button which tag is used?
|
|
9209
|
Which tag is used for defining an alternate content for users that do not support client-side scripts?
|
|
9210
|
What does DRY mean?
|
|
9211
|
Does Ruby on Rails make app development easier?
|
|
9212
|
Who wrote Ruby on Rails?
|
|
9213
|
What is Ruby on Rails?
|
|
9214
|
what is a layout?
|
|
9215
|
what is called a set of test data?
|
|
9216
|
A form bound to a model object is called -------.
|
|
9217
|
what test that tests the whole system?
|
|
9218
|
.In Rails, a test of an individual controller is called ------------------.
|
|
9219
|
.In Rails, a test of a model class is called ---------------
|
|
9220
|
how is authenticity token works?
|
|
9221
|
which web application that integrates data and services from other places on the web
|
|
9222
|
how you start a form that doesn't match a model object
|
|
9223
|
how you start a form that matches a model object?
|
|
9224
|
.------sets the location and type of your databbase as well as a few other settings (like how long messages will be recorded)
|
|
9225
|
.What is scriptlet?
|
|
9226
|
what is partial page templates (or partials)?
|
|
9227
|
what does "erb" stand for in file_name.erb?
|
|
9228
|
what file corresponds to the "show" method
|
|
9229
|
show errors in object "t"
|
|
9230
|
what do you write to indicate that a tweet from table "tweets" only belongs to one zombie? (from table "zombies")?
|
|
9231
|
how do you change show method in the controller to render in "status.html.erb"
|
|
9232
|
what code generates the url "/tweets"?
|
|
9233
|
how do you make a link?
|
|
9234
|
.How to create multiple hashes inside "params" (like "status" within "tweet")?
|
|
9235
|
what code generates the url "/tweets/new"? (action = new tweet form)
|
|
9236
|
how do you do validate to ensure ":status" exists and that it's length is at least 3 long?
|
|
9237
|
.how do you make a link to a zombie's profile with the text of a zombies name?
|
|
9238
|
how do you make sure your forms don't get hacked?
|
|
9239
|
.how includes all stylesheet files?
|
|
9240
|
what do you use to send messages to the user?
|
|
9241
|
.How to includes all javascript?
|
|
9242
|
let's say you have a method... def get_tweet @tweet = Tweet.find(params[:id]) end how do you tie an action to that that only kicks in for the edit, update, and destroy methods?
|
|
9243
|
how do you check the logged in user's id?
|
|
9244
|
how do you define a "status" parameter (within a "tweet" parameter)?
|
|
9245
|
What is a controller?
|
|
9246
|
.What's the difference between a hash and an array?
|
|
9247
|
What is the /spec directory in rails?
|
|
9248
|
What is the most special aspect of nil?
|
|
9249
|
What is an integration test?
|
|
9250
|
.Name two ways to indicate a "block" in Rails
|
|
9251
|
What is the main benefit that a Class gets by inheritance from ApplicationController?
|
|
9252
|
What is the command to print to the screen?
|
|
9253
|
What is the status code for "success" when throwing a GET?
|
|
9254
|
Describe a "symbol" in Rails?
|
|
9255
|
What does the routes.rb file do with "get pages/home"?
|
|
9256
|
What kind of object is "@title" and what is special about it in Rails?
|
|
9257
|
What is a Class?
|
|
9258
|
What's the best way to describe an object in Ruby?
|
|
9259
|
.What is a .erb file?
|
|
9260
|
How does a local variable differ from an instance variable when empty?
|
|
9261
|
Describe the TDD cycle.
|
|
9262
|
When is it best to use an array rather than a hash?
|
|
9263
|
what are the main principles of REST?
|
|
9264
|
when data is retrieved from the database, what does Rails turn it into?
|
|
9265
|
how do you ask for all records of the Ads table?
|
|
9266
|
.what method name indicates to rails that it should validate before saving/updating?
|
|
9267
|
what precedes the "check_logged_in" method in a class?
|
|
9268
|
what is the second uri indicate?
|
|
9269
|
how would you insert "1 + 1" into a string?
|
|
9270
|
if the table Seats is associated with the table Flights, how should you name the table column in Seats to indicate its flight?
|
|
9271
|
what expression do all layouts have?
|
|
9272
|
what's special about a search form?
|
|
9273
|
how do you run the latest migrations?
|
|
9274
|
how do you call a partial?
|
|
9275
|
how do you add an error (called "there was an error") in the validate method?
|
|
9276
|
what parameters are in <% form_for() %>?
|
|
9277
|
what does REST stand for?
|
|
9278
|
.what is "format" in "repond_to do |format|"?
|
|
9279
|
.what kind of test do you create yourself?
|
|
9280
|
what does Embedded Ruby (ERb) process as inputs?
|
|
9281
|
what scripts does the model-generator command create?
|
|
9282
|
.how do you start a loop that reads through the array object "@ads"?
|
|
9283
|
what does "rake" mean?
|
|
9284
|
what does a model object do before it saves or updates data?
|
|
9285
|
if looping through “f†object, how do you make a text field “name�
|
|
9286
|
where do you edit routs?
|
|
9287
|
what generates web pages from page templates?
|
|
9288
|
a RESTful application uses ... to define an interaction with the data.
|
|
9289
|
why do you only need to call "render" in the controller sometimes and not always?
|
|
9290
|
what is naming convention for file names ?
|
|
9291
|
.what variable changes the environment?
|
|
9292
|
to create scafolding for "thing" data, run...
|
|
9293
|
what is naming convention for classes?
|
|
9294
|
what comes after "def check_logged_in" line for site "ads"?
|
|
9295
|
what is params[...]?
|
|
9296
|
what tag starts a form?
|
|
9297
|
.what are the three "magic columns"
|
|
9298
|
how do you express error messages in a form (do |f|)?
|
|
9299
|
how does Rails choose to correct format to generate?
|
|
9300
|
how does rake tell which migrations have been run and which have not?
|
|
9301
|
do models have singular or plural names?
|
|
9302
|
why should partials generally use local variables?
|
|
9303
|
.how does "rake" differ from "ruby"?
|
|
9304
|
how do partials look compared to regular erb files?
|
|
9305
|
.to add login security, which two pieces of code do you need?
|
|
9306
|
what should you write in routes.rb to give meaning to http://mebay.com/ads/3?
|
|
9307
|
how should you order routes?
|
|
9308
|
how do you generate regular model code (not scaffolding)?
|
|
9309
|
.what environments does Rails have by default?
|
|
9310
|
.which two steps to include test.xml data to the partial "map" (via the variable "data")...?
|
|
9311
|
why is it good to redirect after inserting info into the database?
|
|
9312
|
where do you add the filter code?
|
|
9313
|
what is Rails' object-relational mapping library?
|
|
9314
|
Which of the following network protocol should be selected to enable IP address?
|
|
9315
|
________ shows information about Access databases that have been added to the project.
|
|
9316
|
Which of the following change took place in JULY 2014 release of SSMA?
|
|
9317
|
Which of the following option is used to find database objects by using filter criteria?
|
|
9318
|
what checks if an input is numeric?
|
|
9319
|
converts database records to objects is called -------------.
|
|
9320
|
Which is the most serious issue after migration of access database to SQL Server?
|
|
9321
|
representation of a resource is called -------------.
|
|
9322
|
_________ is a tool for migrating databases from Microsoft Access versions 97 through 2010 to Microsoft SQL Server 2005.
|
|
9323
|
what is the filter code that calls on the "check_logged_in" method for only the "edit" and "update" methods?
|
|
9324
|
When you _______ an Access table from a SQL Server, SSMA restores the original Access table and its data.
|
|
9325
|
The __________ is an Access add-in program that provides data analysis tools for financial analysis.
|
|
9326
|
Which of the following evaluation operation is provided in SSIS?
|
|
9327
|
what steps get you from fild.erb to file.html?
|
|
9328
|
A basic package in SSIS includes the following elements?
|
|
9329
|
Purpose of SQLISPackage_12546 event in SQLIS package is to _____________
|
|
9330
|
Which of the following is the event logged by the Integration Services?
|
|
9331
|
Which of the following error message indicates that the package cannot run in SSIS?
|
|
9332
|
Which of the following steps should be carried out using data types in SSIS for efficient results?
|
|
9333
|
.what is "migration"?
|
|
9334
|
When you execute SQL statements within Integration Services, the following optimization can be made?
|
|
9335
|
what's the difference between model names and controller names?
|
|
9336
|
.what does the "h" in <%=h ... %> mean?
|
|
9337
|
what is scriptlet versus expression
|
|
9338
|
Which of the following will increase the Rows/sec calculation in SSIS?
|
|
9339
|
when you put something into an array, does the array keep a separate copy?
|
|
9340
|
how do you specify a format like html or xml in routes.rb?
|
|
9341
|
what kind of tests are there?
|
|
9342
|
what comes after <% form_for()... ?
|
|
9343
|
how do you update?
|
|
9344
|
what does "show" refer to as the :action value?
|
|
9345
|
how do you run a migration?
|
|
9346
|
how do you create a migration that adds a "phone" field to the "tickets" table?
|
|
9347
|
Rails' application framework is called ----------?
|
|
9348
|
What is rvm?
|
|
9349
|
What is rake?
|
|
9350
|
what is scaffold command?
|
|
9351
|
What is gem?
|
|
9352
|
What is gemset?
|
|
9353
|
What is bundler?
|
|
9354
|
What is the output of the given code? a=[1,2,3,4,5] b=[1,2,3,4,5] if a==b print "Equal" else print "Not equal" end
|
|
9355
|
___________ represents how many network transfers per second are occurring.
|
|
9356
|
What do you understand by design limitation in SSIS package?
|
|
9357
|
What is the output of the given code? string_array = ["a","e","i","o","u"] boolean_array = ["True","False"] puts string_array[3] puts boolean_array
|
|
9358
|
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array[3]
|
|
9359
|
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array
|
|
9360
|
What is the output of the given code? a=[["a","b"]] b=[["e","a"]] print a + b
|
|
9361
|
What is the output of the given code? array1 = [[1,2,3,4,5],[0,0,0,0]] array2 = [[1,2,3],[0,0,0]] print !array1
|
|
9362
|
What is the output of the given code? array1 = [[1,2,3,4,5],[0,0,0,0]] array2 = [[1,2,3],[0,0,0]] print array1 || array2
|
|
9363
|
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3],[0,0,0]] print array1 && array2
|
|
9364
|
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] print array1*array2
|
|
9365
|
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] print array1-array2
|
|
9366
|
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] print array1+array2
|
|
9367
|
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3,4],[0,0,0,0]] if array1==array2 print "Equal" else print "Not equal" end
|
|
9368
|
What is the output of the given code? array1 = [[1,2,3,4],[0,0,0,0]] array2 = [[1,2,3],[0,0,0,0]] if array1==array2 print "Equal" else print "Not equal" end
|
|
9369
|
The following Network perfom counters can help you tune your topology?
|
|
9370
|
What is the output of the given code? multi_d_array = [[1,2,3,4],[0,0,0,0]] multi_d_array.each { |x| puts "#{x}\n" }
|
|
9371
|
________ represents to total memory pressure on the system in SSIS.
|
|
9372
|
The key counters for Integration Services and SQL Server are _______________
|
|
9373
|
What is the output of the given code? multi_d_array = [[0,0,0,0],[0,0,0,0],[0,0,0,0],[0,0,0,0]] print multi_d_array
|
|
9374
|
Array of arrays are called multidimensional arrays.
|
|
9375
|
If SSIS is not able to drive close to 100% CPU load, this may be indicative of ________
|
|
9376
|
Which of the following is the best practice related to SSIS?
|
|
9377
|
What is the output of the given code? a=["hey", "ruby", "language"] b=[1, 2, 3] puts b[1] puts a[2]
|
|
9378
|
SSMS provides different options to develop your SSIS package starting with ___________ wizard.
|
|
9379
|
What is the output of the given code? a=["hey", "ruby", "language"] b=["hey", "language", "ruby"] if a==b print "Equal" else print "Not equal" end
|
|
9380
|
Two types of subscriptions present for replication is __________
|
|
9381
|
What is the output of the given code? a=["hey", "ruby", "language"] b=["hey", "ruby", "language"] if a==b print "Equal" else print "Not equal" end
|
|
9382
|
Which of the following makes data available for replication?
|
|
9383
|
What is the output of the given code? a=[1,2,3,4,5] b=[1,2,3,4,5] if a==b print "Equal" else print "Not equal" end
|
|
9384
|
How many types of replication components are present in SQL Server?
|
|
9385
|
What is the output of the given code? a=[1,2,3,4,5] b=[1,2,4,6,8] if a[3]==b[2] print "Equal" end
|
|
9386
|
Which of the following stored procedure provide replication support for AlwaysOn?
|
|
9387
|
Which of the following is a disadvantage of replication?
|
|
9388
|
Replication in SQL Server is used to overcome _______________
|
|
9389
|
How many types of replication is provided by SQL Server?
|
|
9390
|
What is the output of the given code? string_array = ["a","e","i","o","u"] boolean_array = ["True","False"] puts string_array[3] puts boolean_array[1]
|
|
9391
|
What is the output of the given code? string_array = ["a","e","i","o","u"] boolean_array = ["True","False"] puts string_array[3] puts boolean_array
|
|
9392
|
__________ is a set of technologies for copying and distributing data and database objects from one database to another.
|
|
9393
|
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array[3]
|
|
9394
|
What is the output of the given code? string_array = ["a","e","i","o","u"] print string_array
|
|
9395
|
Which of the utility is used for reporting the issue in Service Broker?
|
|
9396
|
Which of the following is a Service Broker Related Dynamic Management View?
|
|
9397
|
Which of the following change was introduced in SQL Server 2012 related to Service Broker?
|
|
9398
|
It is possible to make array of booleans.
|
|
9399
|
(SSBS) is a new architecture which allows you to write ____________ message based application.
|
|
9400
|
Service Broker also provides security by preventing __________ access from networks and by message encryption.
|
|
9401
|
What will be the output of the following? array1 = [1,2,3] array2 = [0,0,0] if array1 == array2 print "Equal" else print "Not equal" end
|
|
9402
|
What will be the output of the following? array1 = [1,2,3] array2 = [0,0,0] if array1 >= array2 print "Greater or equal" else print "Not equal" end
|
|
9403
|
Which of the following service broker component defines the infrastructure used for exchanging messages between instances?
|
|
9404
|
What will be the output of the following? array1 = [0,0,0] array2 = [0,0,0] if array1 == array2 print "They are equal" else print "Not equal" end
|
|
9405
|
There are _________ components of the Service broker in SQL Server.
|
|
9406
|
What will be the output of the following? array1 = [100, 200, 300, 400, 500] array2 = [1,2,3,4,5] if array1 == array2 print "They are equal" else print "Not equal" end
|
|
9407
|
What will be the output of the following? array = [100, 200, 300, 400, 500] print "array[5]"
|
|
9408
|
What will be the output of the following? array = [100, 200, 300, 400, 500] print array[5]
|
|
9409
|
Service broker was added to SQL Server ___________
|
|
9410
|
What will be the output of the following? array = [100, 200, 300, 400, 500] print array[4]
|
|
9411
|
What will be output of the given code? my_array = [1, 2, 3, 4] print my_array
|
|
9412
|
Each element in an array has an index and the starting index is index 1.
|
|
9413
|
Arrays can be used to store multiple values in one single variable.
|
|
9414
|
Which of the following method is used to delete records in LINQ?
|
|
9415
|
What is the output of the given code? i=5 j=10 for i in 5..10 && j in 5..10 puts i**j end
|
|
9416
|
DataContext object is constructed in LINQ to SQL using ________
|
|
9417
|
What does the 1..10 indicate?
|
|
9418
|
What is the output of the given code? i=1 for i in 5..10 puts i^2 end
|
|
9419
|
The ______ pre-compiler translates embedded SQL into calls to the Oracle runtime library
|
|
9420
|
LINQ to Entities applications requires __________ mapping provider.
|
|
9421
|
LINQ to SQL in SQL Server fully supports _________
|
|
9422
|
LINQ to SQL is considered to be one of Microsoft’s _______ products.
|
|
9423
|
_________object is used to fill a DataSet/DataTable with query results in ADO.net.
|
|
9424
|
The main features of dotConnect for SQL Server includes ___________
|
|
9425
|
Syntax for closing and opening the connection in ADO.net is _____________
|
|
9426
|
Which of the following is enumeration for ADO.net with SQL Server?
|
|
9427
|
Code snippet for having a named instance of SQL Server would be ___________
|
|
9428
|
To use the .NET Framework Data Provider for SQL Server, an application must reference the _____________ namespace.
|
|
9429
|
The easiest way to start is to create a linked server ‘localhost’ by using _________
|
|
9430
|
What is the output of the given code? loop do m += 1 puts m break if m == 3 end
|
|
9431
|
Which of the following SQL syntax elements is dictated by the SQL dialect levels?
|
|
9432
|
What is the output of the given code? for num in 1..3 puts num*num m= 0 loop do m += 1 puts m break if m == 3 end end
|
|
9433
|
What is the output of the given code? for num in 1..5 puts num*num end
|
|
9434
|
What is the output of the given code? m= 0 loop do m += 1 print m break if m == 10 end
|
|
9435
|
What is the output of the given code? for num in 1..3 puts num for i in 1..2 puts num*i end end
|
|
9436
|
What does the 1…10 indicate?
|
|
9437
|
What is the output of the given code? for num in 1...5 puts num end
|
|
9438
|
Which is the default field terminator for bulk insert in SQL Server?
|
|
9439
|
________ parameter specifies the number of rows in a batch in bulk insert script.
|
|
9440
|
Which of the following performance considerations are regarding bulk operations?
|
|
9441
|
__________ does not allow bulk export operation in SQL Server.
|
|
9442
|
Which of the following utility supports bulk exports and bulk imports data and generates format files?
|
|
9443
|
Which of the following is a bulk import operation?
|
|
9444
|
Under the _______ recovery model, all bulk operations are fully logged.
|
|
9445
|
Which of the following operation cannot be performed in bulk?
|
|
9446
|
What is short form of Secure HyperText Transfer Protocol?
|
|
9447
|
Text inside a <pre> element tag is displayed
|
|
9448
|
_______________ is time based SQL injection attack.
|
|
9449
|
For uniquely identifying an elements name which attribute is used?
|
|
9450
|
Which of the following script is an example of Quick detection in the SQL injection attack?
|
|
9451
|
If you want to merge two or more rows in a table which attribute you can use?
|
|
9452
|
If xp_cmdshell has been disabled with sp_dropextendedproc, we can simply inject the following code?
|
|
9453
|
Which one from following is a block level element in HTML?
|
|
9454
|
Which of the stored procedure is used to test the SQL injection attack?
|
|
9455
|
For playing soundtrack in background which tag is used?
|
|
9456
|
Any user-controlled parameter that gets processed by the application includes vulnerabilities like ___________
|
|
9457
|
XHTML is dynamic web page whereas HTML is
|
|
9458
|
When we want to add many spaces in content than what element we can use
|
|
9459
|
SQL injection is an attack in which _________ code is inserted into strings that are later passed to an instance of SQL Server.
|
|
9460
|
(document.getElementById("demo").innerHTML = "Hello!"; ) Function is an example of?
|
|
9461
|
Which of the stored procedure used for dynamic SQL is prone to attacks?
|
|
9462
|
Dir, lang and xml:lang attributes are example of
|
|
9463
|
Which of the following is a disadvantage of dynamic SQL?
|
|
9464
|
The basic syntax for using EXECUTE command is ___________
|
|
9465
|
The Dynamic SQL Queries in a variable are __________ until they are executed.
|
|
9466
|
HTML tags are?
|
|
9467
|
In HTML Geolocation getCurrentPosition() method is used to
|
|
9468
|
Which of the following is a calling syntax for sp_executesql?
|
|
9469
|
SGML stands for
|
|
9470
|
Dynamic SQL Statements in SQL Server can be easily built using ________________
|
|
9471
|
What is the output of the given code? m=5 loop do m-=1 break if m==0 end
|
|
9472
|
In HTML tables table header is defined by
|
|
9473
|
Which of the following is a way to build dynamic sql statements?
|
|
9474
|
What is the output of the given code? m=0 loop do puts 101 m+=1 break if m==5 end
|
|
9475
|
What is the output of the given code? m=0 loop do puts m*10 m+=1 break if m==5 end
|
|
9476
|
To specify number intervals for numeric type input which attribute is used?
|
|
9477
|
What is the output of the given code? m=0 loop do print "ruby" m+=1 break if m==5 end
|
|
9478
|
What is the output of the given code? m= 8 loop do m += 2 puts m break if m == 16 end
|
|
9479
|
What is the output of the given code? a="hungry" until !a puts "hungry" a=!a end
|
|
9480
|
What is the output of the given code? i = 3 while i > 0 do puts i i -= 1 end j = 3 until j == 0 do puts j j -= 1 end
|
|
9481
|
What is the output of the given code? counter = 0 until counter >= 10 puts counter counter+=1 end
|
|
9482
|
What is the output of the given code? counter = 1 until counter > 10 puts counter counter+=1 end
|
|
9483
|
The complement of while loop is until loop.
|
|
9484
|
What is the output of the given code? i = 50 j=55 while i > 25 && i*j<100 do puts (50*j)/i i -= 1 j-=2 end
|
|
9485
|
What is the output of the given code? i = 50 j=55 while i > 25 && j>35 do puts 50*j/i i -= 1 j-=2 end
|
|
9486
|
hat is the output of the given code? a = 5 b=10 while a<b do puts a*b a+=2 b-=2 end
|
|
9487
|
What is the output of the given code? i = 50 while i > 25 do print 50/i i -= 1 end
|
|
9488
|
What is the output of the given code? i = 3 while i > 0 do print i i -= 1 end
|
|
9489
|
What is the output of the given code? a=5 b=15 while b>a puts a*(b-a) while a>b a+=1 b-=1 end end
|
|
9490
|
What is the output of the given code? a=5 b=15 while a&&b puts a+b end
|
|
9491
|
What is the output of the given code? i = 0 while i < 5 puts i i=(i+1)**2 end
|
|
9492
|
What is the output of the given code? counter = true while counter !=false puts counter end
|
|
9493
|
What is the output of the given code? counter = 1 while counter < 11 puts counter counter = counter + 1 end
|
|
9494
|
While loop checks the condition and the loop keeps on running till the condition is true, it stops when the condition becomes false.
|
|
9495
|
What is the output of the given code? a = 5 b=10 while (a <10 || b<20)&&true puts a*b a+=2 b+=2 end
|
|
9496
|
What is the output of the given code? a = 5 b=10 while a <10 || b<20 puts a*b a+=2 b+=2 end
|
|
9497
|
What is the output of the given code? a= 5 b=10 while a <10 && b<20 puts a-b a+=2 b+=2 end
|
|
9498
|
What is the output of the given code? a = 5 b=10 while a <10 && b<20 puts a*b a+=2 b+=2 end
|
|
9499
|
What is the output of the given code? a = 5 b=10 while a <10 && b<20 puts a+b a+=2 b+=2 end
|
|
9500
|
The given two expression means the same. counter=counter+1 and counter++
|
|
9501
|
What is the output of the given code? a = 22.5 while a >11.5 puts a a-=3.5 end
|
|
9502
|
What is the output of the given code? counter = -50 while counter <0 puts counter counter+=10 end
|
|
9503
|
What is the output of the given code? counter = 100 while counter > 0 puts counter counter-=25 end
|
|
9504
|
What is the output of the given code? counter = 100 while counter > 0 puts counter counter/=5 end
|
|
9505
|
Ruby does not support ++ operator, it only supports += operator.
|
|
9506
|
What is the output of the given code? counter = 1 while counter < 11 puts counter counter+=1 end
|
|
9507
|
What is the output of the given code? counter = 2 while counter < 68 puts counter counter**=2 end
|
|
9508
|
What does the **= assignment operator do?
|
|
9509
|
Which of the following is a valid assignment operator?
|
|
9510
|
What will be the output of the given code? boolean_1 = !true puts boolean_1 boolean_2 = !true && !true puts boolean_2
|
|
9511
|
What will be the output of the given code? boolean_2 = !true && (!true || 100 != 5**2) puts boolean_2
|
|
9512
|
What will be the output of the given code? boolean_1 = !(700 / 10 == 70) puts boolean_1
|
|
9513
|
What will be the output of the given code? boolean_1 = false || -10 > -9 puts boolean_1
|
|
9514
|
What will be the output of the given code? boolean_1 = 2**3 != 3**2 || true puts boolean_1
|
|
9515
|
What will be the output of the given code? boolean_1 = !(3 < 4 || false) && (false || true) puts boolean_1
|
|
9516
|
What will be the output of the given code? boolean_1 = (3 < 4 || false) && (false || true) puts boolean_1
|
|
9517
|
What will the following expression evaluate to? !true && !false
|
|
9518
|
What will the following expression evaluate to? (true && false) || (!true)
|
|
9519
|
What will the following expression evaluate to? true || false
|
|
9520
|
What will be the output of the given code? boolean_1 = 77 < 78 && 77 < 77 puts boolean_1
|
|
9521
|
Which of the following is a valid boolean operator?
|
|
9522
|
What will the following expression evaluate to? true && false
|
|
9523
|
The boolean operator && only result in true when both the values are true?
|
|
9524
|
Boolean opeartors are also known as logical operators.
|
|
9525
|
What is the output of the given code? counter=1 if counter<=5 puts (counter) counter=counter+1
|
|
9526
|
What is the output of the given code? if(a==10 && b=9) print "true" else print "false" end
|
|
9527
|
Which of the following are used for comparison?
|
|
9528
|
What is the output of the given code? a=10 b=9 if(a>b) print ("a greater than b") else print "Not greater" end
|
|
9529
|
What is the output of the given code? a="string" b="strings" if(a==b) print ("a and b are same") else print "Not same" end
|
|
9530
|
What is the output of the given code? test_1 = 17 > 16 puts(test_1) test_2 = 21 <= 30 puts(test_2) test_3 = 9 >= 9 puts(test_3) test_4 = -11 > 4 puts(test_4)
|
|
9531
|
What will the following code evaluate to? a=9!=10
|
|
9532
|
The ‘=’ is used for assigning value to variable?
|
|
9533
|
The == ‘is equal to’ is known as relational operator.
|
|
9534
|
A case statement compares the expression specified by case and that specified by when using the === operator and executes the code of the when clause that matches.
|
|
9535
|
What is the output of the given code? l=9 case l print "ruby" when l==9 print "language" when l==10 end
|
|
9536
|
Scope of DDL triggers in SQL Server can be _____________
|
|
9537
|
___________ triggers do not create the special inserted and deleted tables.
|
|
9538
|
How many types of DDL Trigger is present in SQL Server?
|
|
9539
|
DDL triggers can only fire after the ______ statement has occurred.
|
|
9540
|
Purpose of DDL Trigger is to _____________
|
|
9541
|
What is the output of the given code? length=gets.chomp case length.reverse.length when length=4 print "length is 4" when length=5 print "length is 5" end
|
|
9542
|
What is the output of the given code? length=gets.chomp case length.length when length=4 print "length is 4" when length=5 print "length is 5" end
|
|
9543
|
INSTEAD of clause cannot be used for ____________ trigger.
|
|
9544
|
DDL triggers can be applied to __________ statement.
|
|
9545
|
The expression specified by the when clause is evaluated as the left operand. If no when clauses match, case executes the code of the else clause.
|
|
9546
|
What is the output of the given code? string = gets.chomp case string when string = "a" print "alphabet a" when string = "b" print "alphabet b" when string = "c" print "alphabet c" else print "some other alphabet" end
|
|
9547
|
_____________ is special type of trigger based on CLR environment.
|
|
9548
|
What is the output of the given code? for counter in 1..5 case counter when 0 .. 2 puts counter puts "baby" when 3 .. 6 puts counter puts "little child" when 7 .. 12 puts counter puts "child" else puts counter puts "adult" end end
|
|
9549
|
What is the output of the given code? age = 4 case age puts "baby" when 0 .. 2 puts "little child" when 3 .. 6 puts "child" when 7 .. 12 puts "youth" when 13 .. 18 puts "adult" else end
|
|
9550
|
Which HTML element is used to define a multi-line input field?
|
|
9551
|
The following syntax is used for the ruby case statement. case expression when expression , expression ... then code ... else code end
|
|
9552
|
What is the output of the given code? age = 5 case age when 0 .. 2 puts "baby" when 3 .. 6 puts "little child" when 7 .. 12 puts "child" when 13 .. 18 puts "youth" else puts "adult" end
|
|
9553
|
Triggers can be enabled or disabled with the ________ statement.
|
|
9554
|
How can we insert Javascript in HTML?
|
|
9555
|
Which of the following is not a typical trigger action?
|
|
9556
|
Which tag is used to define a block of text that have quotation marks?
|
|
9557
|
Triggers created with FOR or AFTER keywords is ____________
|
|
9558
|
For defining default font size, color, and typeface for any part of document which element attribute you will use
|
|
9559
|
DML triggers in SQL Server is applicable to _____________
|
|
9560
|
<applet> element in HTML5 is replaced with?
|
|
9561
|
AFTER trigger in SQL Server can be applied to ______
|
|
9562
|
SVG stands for?
|
|
9563
|
An absolute file path is referred as?
|
|
9564
|
How many types of DML triggers are present in SQL Server?
|
|
9565
|
HTML grouping tags are
|
|
9566
|
How many types of triggers are present in SQL Server?
|
|
9567
|
For adding quotation marks in web page paragraph or in line which tag we can use?
|
|
9568
|
What is the output of the given code? x=8 y=10 unless x<y puts "x is less than y" end unless x>y+1 puts "x is less than y+1" end
|
|
9569
|
In HTML, each parameter in RGB(red, green, blue) defines intensity of color between?
|
|
9570
|
What is the output of the given code? x="ruby".length y="language".length puts x,y unless x>y print "length of x is less than that of y" end
|
|
9571
|
Trigger is special type of __________ procedure.
|
|
9572
|
Which tag is used for marked and highlighted text in web document?
|
|
9573
|
What is the output of the given code? x=8 y=10 unless x>y puts "x is less than y" end unless x>y+1 puts "x is less than y+1" end
|
|
9574
|
The ability to create a user-defined function (UDF) is a new feature added to ________________
|
|
9575
|
<input type="datetime-local"> specifies date and time with
|
|
9576
|
Which of the user defined function will be preferred for adding two numbers?
|
|
9577
|
When to choose scalar function over inline table valued function?
|
|
9578
|
CSS hover class is used for
|
|
9579
|
What is the output of the given code? unless true && false print "false" else print "ruby" end
|
|
9580
|
UDFs in SQL Server is composed of _______ parts.
|
|
9581
|
What is the output of the given code? counter=12 unless counter print counter+1 else print counter+2 end
|
|
9582
|
Which of the following is the most visible benefit of user-defined function?
|
|
9583
|
The following syntax is also used for unless conditional statement. code unless conditional
|
|
9584
|
CREATE FUNCTION requires __________ permission in the database.
|
|
9585
|
What is the output of the given code? hungry=false unless hungry print "Not hungry" else print "Hungry" end
|
|
9586
|
Which of the following statements cannot be included in the definition of a Transact-SQL user-defined function?
|
|
9587
|
Which inline function embeds an independent HTML document into current document?
|
|
9588
|
What is the output of the given code? var = 1 print "1 -- Value is set\n" if var print "2 -- Value is set\n" unless var var = false print "3 -- Value is set\n" unless var
|
|
9589
|
Which of the following is not a limitation of user defined function?
|
|
9590
|
What is the output of the given code? x=3 unless x>2 puts "x is less than 2" else puts "x is greater than 2" end
|
|
9591
|
Server-Sent Events allows a web page to get updates from
|
|
9592
|
In HTML tables gap between two cells of same tables are known as
|
|
9593
|
Which character tells browser that it?s end of tag in HTML statement?
|
|
9594
|
A simply defined functions which can be called against any mouse or keyboard is known as
|
|
9595
|
<article> element defines a complete, self-contained block of related elements but <div> element defines?
|
|
9596
|
For arranging your list items in same way as they were arranged in dictionary which tag you will use?
|
|
9597
|
Syntax for unless conditional statement is unless conditional [then] code else code end
|
|
9598
|
User defined scalar function can return only __________ data type values
|
|
9599
|
A well-known helper plug-in for HTML is?
|
|
9600
|
Which of the following does not return a table variable?
|
|
9601
|
What is the output of the given code? a=10 b=2 if a>b a=a*b puts (a) elsif a<b a=a*a+b puts (a) else a=a-b puts (a) end
|
|
9602
|
An unordered list in HTML document starts with a
|
|
9603
|
Which of the following is not a User defined function?
|
|
9604
|
In HTML, hexadecimal values each color defines intensity between?
|
|
9605
|
How many types of user defined function is provided by SQL Server?
|
|
9606
|
What is the output of the given code? a=true b=false if a && b puts "False" elsif a || b puts "True" else puts "neither true nor false" end
|
|
9607
|
Syntax for creation of user defined function is ____________
|
|
9608
|
What is the output of the given code? x=7 y=9 if x==y print "equal" elsif x>y print "greater" else print "less" end
|
|
9609
|
In HTML5 how many new semantic elements were introduced?
|
|
9610
|
In 1989 Tim Berners-Lee invented WWW and in 1991 he invented?
|
|
9611
|
What is the output of the given code? variable = false if variable print "false" elsif !variable print "true" end
|
|
9612
|
What is the output of the given code? if !true print "False" elsif !true || true print "True" end
|
|
9613
|
What is output of the given code? counter=-3 if counter<=5 puts (counter) counter=counter+1 puts (counter) elsif counter>5 puts (counter) counter=2*counter puts(counter) end
|
|
9614
|
The benefit of using user-defined functions in SQL Server are ____________
|
|
9615
|
<b> and <i> tags in HTML document are used for?
|
|
9616
|
What is the output of the given code? counter=6 if counter<=5 puts (counter) counter=counter+1 puts (counter) elsif counter>5 puts (counter) counter=2*counter puts(counter) else puts(counter) counter=counter-1 puts(counter) end
|
|
9617
|
Which tag we can use for adding an emphasized text in web document?
|
|
9618
|
The elsif statement can add many alternatives to if/else statements.
|
|
9619
|
The elsif conditional statement is written with an expression.
|
|
9620
|
Why <hr> tag is used in HTML page?
|
|
9621
|
Which of the following is valid conditional statement in Ruby?
|
|
9622
|
To specify a hint that describes expected value of an input field which attribute is used?
|
|
9623
|
In image tag " alt " attribute specifies what?
|
|
9624
|
It is necessary that always if should come with else block?
|
|
9625
|
Function cannot be used for __________ statement
|
|
9626
|
What is the output of given code? #counter=1 if counter<=5 puts (counter) counter=counter+1 else puts(counter) counter=counter-1 end
|
|
9627
|
What is the output of given code? counter=1 if counter<=5 puts (counter) counter=counter+1 else puts(counter) counter=counter-1 end
|
|
9628
|
Which tag is used for creating a horizontal line to break up section in web document?
|
|
9629
|
Which of the following is valid conditional statement?
|
|
9630
|
What is the output of the code? variable="true".length if variable puts "true" else puts "false" end
|
|
9631
|
What is the output of the code? variable=true if !variable puts "true" else puts "false" end
|
|
9632
|
What is the output of the code? variable="true".reverse if variable puts "true" else puts "false" end
|
|
9633
|
What is the output of the code? variable=true if variable puts "true" else puts "false" end
|
|
9634
|
What is the output of the code? if 1>2 puts "false" end else puts "True" end
|
|
9635
|
For smallest size headings which tag you most prefer to use
|
|
9636
|
What is the output of the given code? if 1>2 puts "false" else puts "True"
|
|
9637
|
Is the following syntax correct? if conditional code... elsif conditional code.. else code end
|
|
9638
|
What is the use of else statement?
|
|
9639
|
User defined function in SQL Server can return ____________
|
|
9640
|
Nesting limit OF stored procedure is up to ________level.
|
|
9641
|
This <a href="url"> Your text </a> tag is used to define a
|
|
9642
|
Type of procedure that are based on the CLR (Common Language Runtime) is __________
|
|
9643
|
Extended procedures starts with the __________ prefix.
|
|
9644
|
System defined Procedure logically appear in ____________
|
|
9645
|
It’s a good habit to give two spaces between if statement and condition
|
|
9646
|
What is the output of the given code? x=1 if x > 2 puts "x is greater than 2" elsif x <= 2 and x!=0 puts "x is 1" else puts "I can't guess the number" end
|
|
9647
|
Which of the following stored procedure is already defined in Sql Server?
|
|
9648
|
If statement inside if statement is called Nested if statements.
|
|
9649
|
Which of the following procedures are created by user for own actions?
|
|
9650
|
What is the output of the given code? if 79>78 puts "True".upcase if 9>8 puts "True".Upcase if 7==7 puts "equal".downcase end end end
|
|
9651
|
How many types of stored procedures are present in SQL Server?
|
|
9652
|
What is the output of the given code? if 79>78 puts "True".upcase if 9>8 puts "True".reverse if 7==7 puts "equal".downcase end end end
|
|
9653
|
Stored procedure is a __________ set of one or more SQL stateme
|
|
9654
|
What is the output of the given code? if 11>2 puts "Eleven is greater than two" end print "You'r right"
|
|
9655
|
What is the output of the code? if 11<2 print "Eleven is less than two" end print "11 is greater"
|
|
9656
|
What is the output of the following? if 1<2 print "one is less than two" end
|
|
9657
|
What error does the if condition gives if not terminated with end statement?
|
|
9658
|
If expression. The expression can be of which type?
|
|
9659
|
The following syntax is correct for if conditional statement. if condition code end
|
|
9660
|
If you want to create your web layout faster, than which framework you would preferably use
|
|
9661
|
Space between 2+5 or 2 + 5 is valid but =begin and = begin is not valid.
|
|
9662
|
Which are commonly used methods for request and response between a client and server?
|
|
9663
|
Stored procedure used to remember the exact number of bytes is _____________
|
|
9664
|
What is the output of the given code? "Ruby Language".length = begin calculate length = end
|
|
9665
|
Using style sheets in head section of a web document is called
|
|
9666
|
What is the output of the given code? "Ruby Language".length =begin calculate length =end
|
|
9667
|
Why do we use =begin and =end?
|
|
9668
|
__________ is used to build the code dynamically and execute it.
|
|
9669
|
For converting Non-ASCII characters into format that can be transmitted over Internet is called?
|
|
9670
|
The following is the correct way to use multiline comment. = begin # comment = end
|
|
9671
|
____________ sets procedure options in SQL Server.
|
|
9672
|
The following syntax is used for multiline comment. =begin iam in a multi line comment =end
|
|
9673
|
Which of the following stored procedure is used for error messages?
|
|
9674
|
Which one is resolution independent?
|
|
9675
|
Server-Sent Events usually denoted as?
|
|
9676
|
his the right way to comment a single line. “Rubyâ€.length # I’m a single line comment!
|
|
9677
|
How to comment a single line?
|
|
9678
|
How to comment multiple lines in ruby?
|
|
9679
|
Which of the following type of comments are valid in ruby?
|
|
9680
|
Why do we use comments?
|
|
9681
|
What does %x!ls! represents?
|
|
9682
|
What does %Q{ Learn ruby language } represents?
|
|
9683
|
What does %{Learn ruby language} represents?
|
|
9684
|
What is the output of the given code? x, y, z = 12, 36, 72 puts "The value of x is #{ x }." puts "The sum of x and y is #{ x + y }." puts "The average was #{ (x + y + z)/3 }."
|
|
9685
|
In HTML tables table data or cell is defined by
|
|
9686
|
__________create the removable database.
|
|
9687
|
Mailto tag is used for
|
|
9688
|
What do we mean by expression substitution?
|
|
9689
|
What is the output of the given code? print "What's your first name?" first_name=gets.chomp a=first_name.capitalize a=a.reverse puts"My name is #{a}"
|
|
9690
|
Which tag provides data about page expiry, page author, list of keywords, page description etc.
|
|
9691
|
What is the output of the given code? print "what's your first name?" first_name=gets.chomp a=first_name.capitalize "a".reverse puts"My name is #{a}"
|
|
9692
|
What is the output of the given code? print "what's your first name?" first_name=gets.chomp a=first_name.capitalize "first_name.capitalize!".reverse puts"My name is #{first_name}"
|
|
9693
|
Which of the following has support for transaction?
|
|
9694
|
What is the output of the code? print "What's your first name?" first_name=gets.chomp a=first_name.capitalize first_name.capitalize! print "What's your last name?" last_name=gets.chomp b=last_name.capitalize last_name.capitalize puts "My name is #{first_name} #{last_name}"
|
|
9695
|
What is the output of the code? print "What's your first name?" first_name=gets.chomp a=first_name.capitalize first_name.capitalize! print "What's your last name?" last_name=gets.chomp b=last_name.capitalize last_name.capitalize! puts "My name is #{first_name} #{last_name}"
|
|
9696
|
HTML5.1 was released in
|
|
9697
|
_________ takes no parameters and returns all kinds of interesting information.
|
|
9698
|
Which tag is used for bigger headings in HTML document?
|
|
9699
|
HTML only uses
|
|
9700
|
Reasons for consideration of the stored procedure can be?
|
|
9701
|
<fieldset> element in HTML forms is used for
|
|
9702
|
"src" attribute for an image specifies what?
|
|
9703
|
HTML documents transmitted from web servers to web browsers using
|
|
9704
|
Nesting level of a stored procedure’s execution is stored in the _________ function.
|
|
9705
|
<input type="reset"> defines a
|
|
9706
|
Nesting level of stored procedure is applicable for ____________
|
|
9707
|
<head> element is a container for?
|
|
9708
|
_____________ procedure cannot be created in Resource database.
|
|
9709
|
Which of the following is an extended procedure?
|
|
9710
|
To display many types of map e.g. ROADMAP, SATELLITE, HYBRID, and TERRAIN which property of googlemap is used?
|
|
9711
|
_________ provides details on any database object.
|
|
9712
|
For specifying height and width of an image which attribute is used in image tag?
|
|
9713
|
All HTML documents must start with a
|
|
9714
|
Which of the following is a system procedure?
|
|
9715
|
There are how many ways to add CSS sheets in HTML elements?
|
|
9716
|
Data return using output parameter is ____________
|
|
9717
|
Ismap attribute makes a special image when user click somewhere on image
|
|
9718
|
Window.localStorage HTML object stores data with
|
|
9719
|
For using subscript in web document which tag is used?
|
|
9720
|
How many ways of returning data is present in SQL Server 2000?
|
|
9721
|
HTML is a set of
|
|
9722
|
Which style of CSS sheets are more preferable for applying a unique style in single web element?
|
|
9723
|
Which attribute is used to declare language in HTML document?
|
|
9724
|
Autofocus attribute is an example of
|
|
9725
|
For displaying contact information in web document or in article, we can use?
|
|
9726
|
In HTML, a color can be specified using a hexadecimal value in form of
|
|
9727
|
Default character set in HTML 5 is
|
|
9728
|
There are how many types of tag for HTML headings
|
|
9729
|
Which of the following is a global variable for error handling?
|
|
9730
|
ERROR_SEVERITY() returns the ________level of the error.
|
|
9731
|
There are how many ways to create multicolumn layouts in a web document?
|
|
9732
|
Which of the following is an Error function used within CATCH block?
|
|
9733
|
For defining a client-side script e.g. JavaScript which tag is used in HTML documents?
|
|
9734
|
Which attribute is used to add video controls like play, pause, and volume in Video
|
|
9735
|
When connection of a web page is opened to a server which event is invoked?
|
|
9736
|
In HTML web sockets are not available whereas in HTML5
|
|
9737
|
Exception handling is possible in SQL Server using _________
|
|
9738
|
Which from following is not a type of screen frames in HTML
|
|
9739
|
Which of the following benefit does Exception handling with the TRY and CATCH blocks provide?
|
|
9740
|
External style sheets are referred in web document through a
|
|
9741
|
Tags that are used to tell meaning of enclosed text (e.g. <strong> </strong> ) these type of tags are called
|
|
9742
|
Purpose of TRY…CATCH block in SQL Server is ___________
|
|
9743
|
For checking a regular expression in input fields of HTML forms which attribute is used?
|
|
9744
|
Which of the following statements can be checked for Errors?
|
|
9745
|
Web application that can store data within user's browser is called as?
|
|
9746
|
Which of the following blocks are used for error handling in SQL Server?
|
|
9747
|
A small piece of program that can add interactivity to your website is called as
|
|
9748
|
SQL Server static cursors are always ___________
|
|
9749
|
___________ cursor is sensitive to any changes to the data source.
|
|
9750
|
CSS padding property is used for?
|
|
9751
|
Which of the following FORWARD ONLY Cursor is populated at the time of creation?
|
|
9752
|
Which of the cursors further have their subtypes?
|
|
9753
|
What is the use of .capitalize method?
|
|
9754
|
A dynamic cursor in SQL Server allows you to see __________ data.
|
|
9755
|
The .upcase and .capitalize method are used for capitalizing the whole string.
|
|
9756
|
Methods should not be written inside double quotes.
|
|
9757
|
What will we the output of the given code? I'am Learning RUBY Language.downcase
|
|
9758
|
What will be the output of the given code? "Come let's learn.reverse Ruby.length language".upcase
|
|
9759
|
What is the output of given code? string="I'am Learning RUBY Language".downcase string.upcase
|
|
9760
|
What will we the output of the given code? "I'am Learning RUBY Language".downcase
|
|
9761
|
The downcase method changes the whole string to smallcase letters.
|
|
9762
|
What will be the output of the given code? "I'am learning Ruby Language".reverse.upcase.length
|
|
9763
|
What will be the output of the given code? "I'am learning Ruby Language".length.reverse.upcase
|
|
9764
|
What will be the output of the following? "Ruby".reverse.upcase
|
|
9765
|
What does the .upcase method do?
|
|
9766
|
What will be the output of the following? "Eric".irreverse
|
|
9767
|
Life cycle of typical cursor involves ______ steps in SQL Server.
|
|
9768
|
What is the output of the following?
|
|
9769
|
What is the output of the following? "Iam learning ruby language".length
|
|
9770
|
The .length method is used to check number of characters.
|
|
9771
|
What is the output of the given code? Ruby puts "#[Ans] is an oop language"
|
|
9772
|
@@LANGUAGE variable whose return type nvarchar is specified in _____________
|
|
9773
|
_________ gives amount of time, in ticks, that SQL Server has been idle since it was last started
|
|
9774
|
What is the output of the given code? Ans=Ruby puts "#{Ans} is an oop language" puts "It is very efficient langauge" puts "#{expr} is used on rails platform"
|
|
9775
|
If you want to use a background color for your entire webpage, which tag should you select in your CSS?
|
|
9776
|
What is the output of the the given code? puts "My name is #{Name}"
|
|
9777
|
Which of the following global has return type ‘numeric’?
|
|
9778
|
What is the output of the given code? print "What's your address" city,state,pin=gets.chomp,gets.chomp,gets.chomp puts "Iam from #{city} city, #{state} state, pincode: #{pin} "
|
|
9779
|
Where in an HTML document is the correct place to include CSS in your HTML?
|
|
9780
|
Point out the right statement.
|
|
9781
|
Which of the following is a global variable?
|
|
9782
|
Which HTML element defines the title of a document?
|
|
9783
|
Which of the following keyword is not associated with initialization of variable?
|
|
9784
|
first_name,Last_name=gets.chomp,gets.chomp is the correct way to get the input from the user.
|
|
9785
|
Why is gets not preferred instead of gets.chomp?
|
|
9786
|
Which sequence can be used to substitute the value of any ruby expression in a string?
|
|
9787
|
Variables was added newly to SQL Server version ____________
|
|
9788
|
Which of the following components constitutes use CASE expression?
|
|
9789
|
The BEGIN and END statements are used when ____________
|
|
9790
|
Which of the following scenario makes use of BEGIN..END keyword redundant?
|
|
9791
|
Which of the following is the valid string method?
|
|
9792
|
Which of the following two Transact-SQL statements are commonly used with WHILE?
|
|
9793
|
Which tag would you generally use to make a list of items that have no particular order (by default, will show up as a bullet list)?
|
|
9794
|
Which of the following is a control flow keyword?
|
|
9795
|
Which tag is used when creating a list with a specific order (by default, will show up as a numbered list)?
|
|
9796
|
Inline elements are normally displayed without starting a new line.
|
|
9797
|
Which of the following language is used for procedural flow in SQL Server?
|
|
9798
|
Which character is used to indicate an end tag?
|
|
9799
|
Which of the following statement decrypts a symmetric key?
|
|
9800
|
Purpose of CLOSE MASTER KEY is _______________
|
|
9801
|
Which of the following is- a security statement?
|
|
9802
|
Purpose of GET_TRANSMISSION_STATUS is _____________
|
|
9803
|
Which of the following Statement ends one side of an existing conversation?
|
|
9804
|
RECEIVE service broker statement applies to which of the versions?
|
|
9805
|
Which of the following is not a SERVICE BROKER statement?
|
|
9806
|
Applications that can generate Transact-SQL can be _________
|
|
9807
|
Which of the following is a proprietary extension of SQL for Microsoft SQL Server?
|
|
9808
|
Which of the following statement drops the synonym?
|
|
9809
|
DDL statements not used for Synonym is __________
|
|
9810
|
Purpose of ALTER CERTIFICATE is ______
|
|
9811
|
Creation of new database role in the current database is made by __________
|
|
9812
|
Command used to modify the schema is _______
|
|
9813
|
Statement used to remove a user from the current database is ____________
|
|
9814
|
Which of the following creates a new Microsoft Windows or SQL Server login account?
|
|
9815
|
Which is a new DDL statement?
|
|
9816
|
Which of the following adds MOVE TO clause?
|
|
9817
|
Point out the wrong statement with respect to ALTER INDEX statement.
|
|
9818
|
Which of the following index options are added by the CREATE INDEX statement?
|
|
9819
|
Which of the following statement modifies view index?
|
|
9820
|
If You Want To Change The Text Colour To Red Which Of The Following Tags Will You Use?
|
|
9821
|
When does most ALTER DATABASE statements fail?
|
|
9822
|
Which Of The Following Is A Declaration For An HTML Document?
|
|
9823
|
Maximum number of filegroups specified for each database is __________
|
|
9824
|
Command used to shrink the size of the database is _____________
|
|
9825
|
Which HTML Element Is Used To Define The Description Data?
|
|
9826
|
Features provided by ALTER DATABASE statement do not include ___________
|
|
9827
|
The DROP DATABASE statement must run in ________ mode.
|
|
9828
|
HTML Links Are Defined With <a> Tag And Address Is Specified By Attribute
|
|
9829
|
Which of the following database should be backed up regularly?
|
|
9830
|
. Intensity Of A Color Can Be Described Through
|
|
9831
|
Which Of The Following Attribute Triggers Event When An Element Gets User Input?
|
|
9832
|
HTML Tags Are Surrounded By Which Type Of Brackets.
|
|
9833
|
View used used for displaying current status of database is _______
|
|
9834
|
HTML Web Pages Can Be Read And Rendered By
|
|
9835
|
Syntax for dropping a database snapshot named “Sushant†would be ____________
|
|
9836
|
Which of the following statement is used to create database snapshot?
|
|
9837
|
What Tag Is Used To Display A Picture In A HTML Page?
|
|
9838
|
Which of the following statement removes sales and suppliers database?
|
|
9839
|
What Should Be The First Tag In Any HTML Document?
|
|
9840
|
Which is the minimal permission that a user must have to drop the database?
|
|
9841
|
How Can You Make A Bulleted List With Numbers?
|
|
9842
|
Who Is Known As The Father Of World Wide Web (WWW)?
|
|
9843
|
Apart From <b> Tag, What Other Tag Makes Text Bold ?
|
|
9844
|
Which of the following database cannot be dropped?
|
|
9845
|
Which Element Represents A Control For Generating A Public-private Key Pair?
|
|
9846
|
Which of the following statement removes database including its related components?
|
|
9847
|
Which Of The Following Element Marks The Ruby Text Component Of A Ruby Annotation?
|
|
9848
|
Which of the following item is provided by CREATE DATABASE statement?
|
|
9849
|
The __________ Element Represents A Span Of Text That Is Isolated From Its Surroundings For The Purposes Of Bidirectional Text Formatting
|
|
9850
|
What options did ALTER DATABASE statement add?
|
|
9851
|
All Elements Are Identified By Their __________ And Are Marked Up Using Either Start Tags And End Tags Or Self-closing Tags
|
|
9852
|
CONTAINS and CONTAINSTABLE look for a _______ match for the phrase.
|
|
9853
|
The CONTAINS and FREETEXT predicates return a _________ value.
|
|
9854
|
HTML Uses
|
|
9855
|
FREETEXTTABLE is a full text _____________
|
|
9856
|
Which of the following predicates is used for full text search?
|
|
9857
|
HTML Is What Type Of Language ?
|
|
9858
|
Full text indexing is a great feature that solves a database problem, the searching of _________ columns for specific words and phrases in SQL Server databases.
|
|
9859
|
Which Of The Following Encoding An XML Parser Assumes ?
|
|
9860
|
We can create a full-text index on _____________
|
|
9861
|
__________ Is The XML Equivalent To Strict HTML 4.01.
|
|
9862
|
Full-text search is an ________ component of the SQL Server Database Engine.
|
|
9863
|
Which Tag Is Used If You Want To Indicate The Importance Of The Phrase?
|
|
9864
|
Full-Text Search in SQL Server lets users and applications run _________ queries.
|
|
9865
|
Which Of The Following Adds Checkmark Icon Inside Input?
|
|
9866
|
Why do we use exist methods in Xquery?
|
|
9867
|
With XML DML, which of the operations can be performed on nodes?
|
|
9868
|
Which Of The Following Will Create Hamburger Menu?
|
|
9869
|
Atomization is process of extracting ________ value of an item.
|
|
9870
|
Functions on numerical values in Xquery are ___________
|
|
9871
|
. Which Of The Following Will Provide Additional Information About Something?
|
|
9872
|
Different types of errors raised during Xquery operation are _____________
|
|
9873
|
Every database you create has which collection by default?
|
|
9874
|
Which Of The Following Aligns Media Objects?
|
|
9875
|
What is every identifier in an XQuery called?
|
|
9876
|
Which html attribute is used to provide an advisory text about an element or Its contents.
|
|
9877
|
SQL Server provides how many Xquery methods?
|
|
9878
|
Which of the following function returns an instance of the XML data type?
|
|
9879
|
Which of the following function is contained by both full text search and Xquery?
|
|
9880
|
Following content of XML elements are indexed in full text?
|
|
9881
|
Sample applications to illustrate XML functionality in SQL Server are _____________
|
|
9882
|
Different xml modes available for xml clauses are __________
|
|
9883
|
Statement for dropping XML index is __________
|
|
9884
|
What is the purpose of the primary XML index?
|
|
9885
|
SQL Server lets you define how many types of secondary XML indexes?
|
|
9886
|
Which of the following indexes can be created on XML columns?
|
|
9887
|
Which of the following is not a xml data type method?
|
|
9888
|
Which Is Not A Property Of Attribute Behaviour Of <Marquee> Tag?
|
|
9889
|
SQL Server 2008 has made several extensions to the XML Schema support which includes?
|
|
9890
|
Can we use untyped XML data type in the following situations?
|
|
9891
|
Which operation cannot be performed on XML schema collection?
|
|
9892
|
Which of the following statement would import additional schema or schema components into an existing collection object?
|
|
9893
|
Contents of sys.xml_schema_collections are ________
|
|
9894
|
The space use of XML indexes can be found in the table-valued function named?
|
|
9895
|
What is index type for XML index entries?
|
|
9896
|
Which of the following following is used for retrieving XML Schema Collections?
|
|
9897
|
The BODY Tag Is Usually Used After
|
|
9898
|
What are Catalog Views for XML?
|
|
9899
|
Which of the following feature of SQL Server was used before XML technology for semi structured data?
|
|
9900
|
HTML Is A Subset Of
|
|
9901
|
XML datatype was introduced in which of the following versions of SQL Server?
|
|
9902
|
Which of the following part of the XML data stored in an XML column is very important for locking?
|
|
9903
|
Reasons to use native XML features in SQL Server instead of managing your XML data in the file system would be:
|
|
9904
|
What is the hybrid model in SQL Server?
|
|
9905
|
XML View Technology is useful in the following situations?
|
|
9906
|
In which of the following scenario, using XML native storage would be inappropriate?
|
|
9907
|
The choice of XML technology, native XML versus XML view, generally depends upon the following factors?
|
|
9908
|
Which of the following is not a XML storage option?
|
|
9909
|
Which of the reasons will force you to use XML data model in SQL Server?
|
|
9910
|
Which of the code deletes node H using hierarchical data type?
|
|
9911
|
Which of the constraint can be enforced one per table?
|
|
9912
|
How many types of constraints are present in SQL Server?
|
|
9913
|
Which of the following foreign key constraint specifies that the deletion fails with an error?
|
|
9914
|
Which of the following is not a foreign key constraint?
|
|
9915
|
Purpose of foreign key constraint in SQL Server is __________
|
|
9916
|
Constraints can be applied on ___________
|
|
9917
|
Which of the following constraint does not enforce uniqueness?
|
|
9918
|
Which of the following is not a class of constraint in SQL Server?
|
|
9919
|
Which of the following statement is true?
|
|
9920
|
The UNION SQL clause can be used with ____________
|
|
9921
|
Which is the duplication of computer operations and routine backups to combat any unforeseen problems?
|
|
9922
|
Aggregate functions can be used in the select list or the_______clause of a select statement or subquery. They cannot be used in a ______ clause.
|
|
9923
|
The command ________________ such tables are available only within the transaction executing the query, and are dropped when the transaction finishes.
|
|
9924
|
Which of the following is an aggregate function?
|
|
9925
|
The EXISTS keyword will be true if _________
|
|
9926
|
To alter a database ___________ command is used.
|
|
9927
|
_____________ joins are SQL server default.
|
|
9928
|
Which is a duplicate copy of a file program that is stored on a different storage media than the original location?
|
|
9929
|
The ________________ is essentially used to search for patterns in target string.
|
|
9930
|
To delete a database ___________ command is used.
|
|
9931
|
Insert into employee _________ (1002,Joey,2000); In the given query which of the keyword has to be inserted?
|
|
9932
|
Select * from employee where salary>10000 and dept_id=101; Which of the following fields are displayed as output?
|
|
9933
|
Select * from student join takes using (ID); The above query is equivalent to ____________
|
|
9934
|
Select ID, name, dept name, salary * 1.1 where instructor; The query given below will not give an error. Which one of the following has to be replaced to get the desired output?
|
|
9935
|
Select ________ dept_name from instructor; Here which of the following displays the unique values of the column?
|
|
9936
|
Which server can join the indexes when only multiple indexes combined can cover the query?
|
|
9937
|
Which of the following is not the function of client?
|
|
9938
|
Select ID, GPA from student grades order by GPA ____________ Inorder to give only 10 rank on the whole we should use.
|
|
9939
|
The ________ connective tests for set membership, where the set is a collection of values produced by a select clause. The _________ connective tests for the absence of set membership.
|
|
9940
|
Select __________ from instructor where dept name= ’Comp. Sci.’; Which of the following should be used to find the mean of the salary?
|
|
9941
|
Which of the following function is used when you want all tied rows to have the same ranking?
|
|
9942
|
Which of the following functions are similar?
|
|
9943
|
Which of the following error message will be displayed if ORDER CLAUSE is not mentioned in ROW NUMBER function?
|
|
9944
|
Which of the following will not raise error if not used?
|
|
9945
|
Which of the function provides consecutive numbering except in the case of a tie?
|
|
9946
|
Which of the clause is not mandatory?
|
|
9947
|
Which of the following is the simplest ranking function?
|
|
9948
|
Which of the following is not a ranking function?
|
|
9949
|
LAST_VALUE comes in the category of _____________
|
|
9950
|
Which of the following function is an analytic window function?
|
|
9951
|
How many types of window functions are present in SQL Server?
|
|
9952
|
Which of the following is not a type of window function?
|
|
9953
|
Which of the function is not a ranking window function?
|
|
9954
|
Point out the wrong statement related to window function.
|
|
9955
|
Which is the most important benefit of window function?
|
|
9956
|
Windowing function was added in which of the following versions of SQL Server?
|
|
9957
|
Which of the following is a set function?
|
|
9958
|
You can create an ABAP program that only contain subroutines?
|
|
9959
|
Which of the following T-code is used search the fields ABAP table?
|
|
9960
|
Which of the following can be used to format the ABAP code written in editor?
|
|
9961
|
ABAP contains a series of statements that allow you to leave an event block. Which of the below is specifically used to leave a GET event block?
|
|
9962
|
Dialog programs are of which of program type?
|
|
9963
|
Which of the below Object type contain the data with which programs work at run time?
|
|
9964
|
Which of the below programs are directly executable and also known as Report?
|
|
9965
|
What is the transaction code to open ABAP editor to create or change ABAP program?
|
|
9966
|
In ABAP editor, which of the following object shows current name of application/business?
|
|
9967
|
Code for creating an HTML report that lists the name of each service along with its status is __________
|
|
9968
|
Unrestricted execution policy can be set up in SQL Server can be done using _______
|
|
9969
|
Syntax for viewing the methods and properties we can pipe our output to Get-Member by ______________
|
|
9970
|
___________ convert object properties into CSV objects.
|
|
9971
|
Which of the following command is used to get child items in powershell?
|
|
9972
|
Which Of The Following Is For Title Of The Modal?
|
|
9973
|
Which Of The Following Will Create Hamburger Menu?
|
|
9974
|
Which Of The Following Will Provide Additional Information About Something?
|
|
9975
|
Which Of The Following Aligns Media Objects?
|
|
9976
|
Which Of the following class centers tabs/pills?
|
|
9977
|
We can test for the nonexistence of tuples in a subquery by using the __________ construct.
|
|
9978
|
Which html attribute is used to provide an advisory text about an element or Its contents.
|
|
9979
|
The phrase “greater than at least one†is represented in SQL by ___________
|
|
9980
|
Which attribute sets the text direction as related to lang attribute.
|
|
9981
|
Which tag is used to create a checkbox in HTML?
|
|
9982
|
A Boolean data type that can take values true, false, and ____________
|
|
9983
|
Which HTML Tag Is ssed to define A Client - Side Script Such as The Javascript?
|
|
9984
|
A Simple Text File Which Tells The Browser What To Cache Is Known As A ________.
|
|
9985
|
Which Is Not A Property Of Attribute Behaviour Of <Marquee> Tag?
|
|
9986
|
A Much Better Approach To Establish The Base URL Is To Use The ______ Element.
|
|
9987
|
All aggregate functions except __________ ignore null values in their input collection.
|
|
9988
|
To Start A List Using Circles, Use
|
|
9989
|
If we do want to eliminate duplicates, we use the keyword __________in the aggregate expression.
|
|
9990
|
Gif And Jpg Are The Two Main Types Of What ?
|
|
9991
|
Choose The Correct HTML Tag To Make A Text Italic
|
|
9992
|
The BODY Tag Is Usually Used After
|
|
9993
|
Aggregate functions are functions that take a ___________ as input and return a single value.
|
|
9994
|
ALL HTML Tags Are Must Be Enclosed In?
|
|
9995
|
HTML Is A Subset Of
|
|
9996
|
___________ is stored only in the Master database.
|
|
9997
|
Which of following is not an attribute of <form> tag
|
|
9998
|
Which of the following is not a SQL Server INFORMATION_SCHEMA view?
|
|
9999
|
What is SCHEMABINDING a VIEW?
|
|
10000
|
Which Of The Following Selector Selects An Element If It's The Only Child Of Its Parent?
|
|
10001
|
You can delete a view with ___________ command.
|
|
10002
|
Which Of The Following Selector Selects An Element That Has No Children?
|
|
10003
|
Syntax for creating views is __________
|
|
10004
|
Dynamic Management View is a type of _________
|
|
10005
|
Which Of The Following Selector Selects The Elements That Are Checked?
|
|
10006
|
SQL Server has mainly how many types of views?
|
|
10007
|
Which Of The Following Selector Selects All Elements Of E That Have The Attribute Attr That End With The Given Value?
|
|
10008
|
Which CSS Property Is Used To Control The Text Size Of An Element ?
|
|
10009
|
Which of the following is not a limitation of view?
|
|
10010
|
What is a view?
|
|
10011
|
Which is not a type of join in T-SQL?
|
|
10012
|
When We Write <img Src="img.png">, What "img.png" Inside Double Quote Implies?
|
|
10013
|
What Should Be The Table Width, So That The Width Of A Table Adjust To The Current Width Of The Browser Window?
|
|
10014
|
How many tables may be included with a join?
|
|
10015
|
Which Of The Following Properties Will We Use To Display Border Around A Cell Without Any Content ?
|
|
10016
|
Which of the following is a correlated subquery?
|
|
10017
|
If We Want Define Style For An Unique Element, Then Which Css Selector Will We Use ?
|
|
10018
|
Which of the following statements is true concerning subqueries?
|
|
10019
|
A UNION query is which of the following?
|
|
10020
|
Which CSS Property Sets A Background Image For An Element?
|
|
10021
|
Which of the following is one of the basic approaches for joining tables?
|
|
10022
|
Which CSS Property Is Used For Controlling The Layout?
|
|
10023
|
What type of join is needed when you wish to return rows that do have matching values?
|
|
10024
|
What type of join is needed when you wish to include rows that do not have matching values?
|
|
10025
|
Which Is The Correct CSS Syntax?
|
|
10026
|
The command to remove rows from a table ‘CUSTOMER’ is ________________
|
|
10027
|
Pseudo-classes In CSS
|
|
10028
|
Find all the cities with temperature, condition and humidity whose humidity is in the range of 63 to 79.
|
|
10029
|
Find all the tuples having a temperature greater than ‘Paris’.
|
|
10030
|
Find the name of those cities with temperature and condition whose condition is either sunny or cloudy but temperature must be greater than 70.
|
|
10031
|
The Default Value Of "position" Attribute Is
|
|
10032
|
Find the names of these cities with temperature and condition whose condition is neither sunny nor cloudy.
|
|
10033
|
What is the meaning of LIKE ‘%0%0%’?
|
|
10034
|
SQL query to find the temperature in increasing order of all cities.
|
|
10035
|
SQL query to find all the cities whose humidity is 95
|
|
10036
|
Which TCL command undo all the updates performed by the SQL in the transaction?
|
|
10037
|
Which of the following command makes the updates performed by the transaction permanent in the database?
|
|
10038
|
How can you change “Hansen†into “Nilsen†in the “LastName†column in the Persons table?
|
|
10039
|
Which SQL keyword is used to sort the result-set?
|
|
10040
|
Which SQL statement is used to return only different values?
|
|
10041
|
The UNION SQL clause can be used with _____________
|
|
10042
|
The UPDATE SQL clause can _____________
|
|
10043
|
Where in an HTML document is the correct place to refer to an external style sheet?
|
|
10044
|
What does the ALTER TABLE clause do?
|
|
10045
|
How do you make a list that lists its items with squares?
|
|
10046
|
With SQL, how can you return the number of not null records in the “Persons†table?
|
|
10047
|
With SQL, how can you return all the records from a table named “Persons†sorted descending by “FirstName�
|
|
10048
|
To define the space between the element's border and content, you use the padding property, you are allowed to use negative values?
|
|
10049
|
How do you change the left margin of an element?
|
|
10050
|
With SQL, how do you select all the records from a table named “Persons†where the value of the column “FirstName†ends with an “a�
|
|
10051
|
How do you change the font of an element?
|
|
10052
|
What does DML stand for?
|
|
10053
|
Which CSS property controls the text size?
|
|
10054
|
What is the purpose of the SQL AS clause?
|
|
10055
|
How do you change the text color of an element?
|
|
10056
|
Which of the following statement is true?
|
|
10057
|
If you don’t specify ASC or DESC after a SQL ORDER BY clause, the following is used by default ______________
|
|
10058
|
How do you add a background color for all elements?
|
|
10059
|
________________ is not a category of SQL command.
|
|
10060
|
Which of the following are TCL commands?
|
|
10061
|
Which of the following is not a DDL command?
|
|
10062
|
___________removes all rows from a table without logging the individual row deletions.
|
|
10063
|
Which of the following SQL clauses is used to DELETE tuples from a database table?
|
|
10064
|
Which SQL keyword is used to retrieve a maximum value?
|
|
10065
|
Which SQL function is used to count the number of rows in a SQL query?
|
|
10066
|
Built in Functions in SQL Server is categorized into how many categories?
|
|
10067
|
______________ returns the rank of rows within the partition of a result set, without any gaps in the ranking
|
|
10068
|
Which of the following is not a conversion function?
|
|
10069
|
Text and Image Functions are ______
|
|
10070
|
DecryptByKeyAutoCert is ________________ type function.
|
|
10071
|
_________ are used for supporting encryption, decryption, digital signing and their validation.
|
|
10072
|
@@NESTLEVEL function falls under which of the following category?
|
|
10073
|
Which of the following is not a mathematical function?
|
|
10074
|
Which of the following function checks whether the expression is a valid date or not?
|
|
10075
|
______________ function returns current date and time.
|
|
10076
|
Which of the data type has a storage size of 8 bytes?
|
|
10077
|
______________ is monetary data type in SQL Server.
|
|
10078
|
Which of the following data type is not present in SQL Server?
|
|
10079
|
________ is a spatial data type.
|
|
10080
|
You want to track date and time of the last write access per row?
|
|
10081
|
A column of type __________ may contain rows of different data types.
|
|
10082
|
ntext data type falls under which category?
|
|
10083
|
Exact Numeric data type is ___________
|
|
10084
|
Data types in SQL Server are organized into how many categories?
|
|
10085
|
Which of the following is a large object data type?
|
|
10086
|
___________ is schematic drawing used for representing relationships in database.
|
|
10087
|
Which of the following is used to build sql statements without writing code?
|
|
10088
|
Which menu is used to restore windows to their original locations?
|
|
10089
|
Ctrl+K+K shortcut refers to _________
|
|
10090
|
Which of the following pane option is not provided by Query Designer?
|
|
10091
|
Which of the following tool is used for designing schema of the database in SSMS?
|
|
10092
|
___________ is not available on standard toolbar.
|
|
10093
|
Template Explorer is used to manage __________
|
|
10094
|
_________ is free database software running free SQL Server technology.
|
|
10095
|
Which of the following companies originally worked together to create and market the first version of SQL Server?
|
|
10096
|
Which property is used to change the background color?
|
|
10097
|
How do you insert a comment in a CSS file?
|
|
10098
|
Which is the correct CSS syntax?
|
|
10099
|
What is the correct HTML for referring to an external style sheet?
|
|
10100
|
Activating a lock object automatically creates function modules for setting the lock and releasing lock?
|
|
10101
|
What does CSS stand for?
|
|
10102
|
Maximum of How many key fields per table is allowed?
|
|
10103
|
What table is used to store the control records for IDOC?
|
|
10104
|
Which type pool is used for ALV Type-pools?
|
|
10105
|
What is the Purpose of REUSE_ALV_COMMENTARY_WRITE Function Module?
|
|
10106
|
Which is the mandatory to input field for Dialogue Programming / Module Pool design?
|
|
10107
|
The is doctype mandatory.
|
|
10108
|
Types of Windows in SAP SCRIPTS?
|
|
10109
|
What is the correct CSS syntax for making all the elements bold?
|
|
10110
|
T-Code for BDC's Session process?
|
|
10111
|
What is the name of every homepage on the WWW?
|
|
10112
|
How can you make a list that lists the items without bullets or numbers?
|
|
10113
|
What is the correct HTML for inserting an image?
|
|
10114
|
Which of the following functional Modules are optional For SAPScript?
|
|
10115
|
How can you make a list that lists the items with bullets?
|
|
10116
|
How to Declare the Static Variables in OOABAP?
|
|
10117
|
How can you make a list that lists the items with numbers?
|
|
10118
|
To insert the data for ONE transaction (BDC_INSERT) into a session. To transfer the data, you require an internal table (BDC table). You must specify the following parameters:
|
|
10119
|
How can you open a link in a new browser window?
|
|
10120
|
T-Code for uploading the ALV LOGO?
|
|
10121
|
How can you create an e-mail link?
|
|
10122
|
Which one of the. following statements creates a GUI-status in a dialog program?
|
|
10123
|
The screen flow logic must contain at least the two statements in the correct order
|
|
10124
|
What is the correct HTML for creating a hyperlink?
|
|
10125
|
T-Code for Remote Function Call (RFC) is the standard SAP interface for communication between SAP systems?
|
|
10126
|
Choose the correct HTML tag to make a text italic
|
|
10127
|
Choose the correct HTML tag to make a text bold
|
|
10128
|
Which Function Modules is Used In Hierarchical ALV Report Display?
|
|
10129
|
Syntax for BDCDATA Structure to declare in the Program?
|
|
10130
|
What is the correct HTML tag for inserting a line break?
|
|
10131
|
Choose the correct HTML tag for the largest heading
|
|
10132
|
Who is making the Web standards?
|
|
10133
|
What does HTML stand for?
|
|
10134
|
Call Transaction syntax?
|
|
10135
|
Select the correct HTML for creating a hyperlink?
|
|
10136
|
Which of the Following Fields are NOT for BDCDATA Structure?
|
|
10137
|
In CSS, what is the correct option to select only the paragraphs with class name “warningâ€? <p class=â€warningâ€>Don’t do it.</p> <p>Do it.</p> <p class=â€warningâ€>Nooo, don’t do it.</p>
|
|
10138
|
What is the system field for the current date for scripts
|
|
10139
|
In CSS,select the property used to set the background color of an image?
|
|
10140
|
In CSS, Select the property to set an image in a list instead of a standard bullet?
|
|
10141
|
For users that use the tab key to navigate websites, what property represents this way of moving from one element to another?
|
|
10142
|
Select the property that is used to change the list style to show roman numerals instead of normal numbers?
|
|
10143
|
In CSS,Select the property used to set the spacing in between lines of text?
|
|
10144
|
Select the option to make a list that lists the items with bullets?
|
|
10145
|
Select the correct option to create an e-mail link?
|
|
10146
|
In CSS, choose the correct option to select this image by its id? <img id=â€mainpic†src=â€cat.pngâ€>
|
|
10147
|
Select the correct option to open a link in a new browser window?
|
|
10148
|
Select the option to make a list that lists the items with numbers?
|
|
10149
|
Select the correct HTML tag to make a text italic?
|
|
10150
|
Select the appropriate HTML tag used for the largest heading?
|
|
10151
|
Select the property used to create space between the element’s border and inner content?
|
|
10152
|
In CSS, Select the appropriate option to style an element so that the next element would appear right next to it not underneath it if both elements widths were collectively smaller than the container element?
|
|
10153
|
Select the correct HTML tag to make a text bold.
|
|
10154
|
Select the property that is used to create spacing between HTML elements?
|
|
10155
|
In CSS, what is the correct option to select all the tags on a page?
|
|
10156
|
What is the output of given code? puts "what is your first name?" name=gets.chomp puts "what is your surname?" surname=gets.chomp
|
|
10157
|
We use semicolon or parentheses after every print or puts statement.
|
|
10158
|
For getting an input from the user which method is used?
|
|
10159
|
What is the output of the given code? print "Hey" puts "Everyone!" print "We are learning Ruby"
|
|
10160
|
Why is the library function ‘puts’used for?
|
|
10161
|
Which of the following is not a valid library function?
|
|
10162
|
What is the range of octal notation (\nnn)?
|
|
10163
|
Which of the following is not a valid datatype?
|
|
10164
|
What is the output of the given code? my_string=Ruby puts(my_string)
|
|
10165
|
What is the sequence of ruby strings?
|
|
10166
|
What does the notataion \b stands for?
|
|
10167
|
Objects of which class does the integer from the range -2^30 to 2^(30-1) belong to?
|
|
10168
|
What is the output of the given code?
|
|
10169
|
Ruby can deal with both numbers and floating point values.
|
|
10170
|
Ruby is a case-sensitive language.
|
|
10171
|
What is the size of an integer data type in ruby?
|
|
10172
|
What will any variable evaluate to if it is of Boolean data type?
|
|
10173
|
Which of the following datatypes are valid in Ruby?
|
|
10174
|
Ruby can be used for developing internet and intranet applications.
|
|
10175
|
It is must for Ruby to use a compiler.
|
|
10176
|
Next Page » Ruby Questions and Answers – Basics This set of Ruby Programming Multiple Choice Questions & Answers (MCQs) focuses on “Basicsâ€. 1. Ruby is an object oriented general purpose programming language. a) True b) False View Answer Answer: a Explanation: Ruby allow users to manipulate data structures called objects to build and execute programs. advertisement 2. Which of the following is supported by Ruby? a) Multiple Programming Paradigms b) Dynamic Type System c) Automatic Memory Management d) All of the Mentioned View Answer Answer: d Explanation: Ruby supports all the features because it is a object oriented programming language. 3. Which of the following features does the 2.0 version of ruby supports? a) Method keyword arguments b) New literals c) Security fixes d) All of the mentioned View Answer Answer: d Explanation: Ruby2.0 has several new added features and it is much stable than its older versions. 4. Which of the following languages syntax matches with the Ruby’s syntax? a) Perl b) PHP c) Java d) Jquery View Answer Answer: a Explanation: Most of the syntax of perl language matches with that of Ruby’s. advertisement 5. What is the extension used for saving the ruby file? a) .ruby extension b) .rb extension c) .rrb extension d) None of the mentioned View Answer Answer: b Explanation: Ruby files must be saved with the extension .rb. 6. Which of the following are valid floating point literal? a) .5 b) 2 c) 0.5 d) None of the mentioned View Answer Answer: c Explanation: floating point literals are valid only when they have digits on both the sides of decimal point. 7.
|
|
10177
|
What is the extension used for saving the ruby file?
|
|
10178
|
Which of the following languages syntax matches with the Ruby’s syntax?
|
|
10179
|
Which of the following features does the 2.0 version of ruby supports?
|
|
10180
|
Ruby is an object oriented general purpose programming language.
|
|
10181
|
What will be the output of the following? "Eric".irreverse
|
|
10182
|
Which sequence can be used to substitute the value of any ruby expression in a string
|
|
10183
|
What is the output of the given code? print "Hey" puts "Everyone!" print "We are learning Ruby"
|
|
10184
|
What is the role of ! at the end of the capitalize method?
|
|
10185
|
What is the output of the given code? boolean_1 = 77 less than 78 puts(boolean_1)
|
|
10186
|
Why can not we use quotation marks (‘ or “) with boolean?
|
|
10187
|
Why do we use =begin and =end?
|
|
10188
|
What is the output of the given code? “Rubyâ€.length #to find the length of given string
|
|
10189
|
Which of the following are valid floating point literal?
|
|
10190
|
Which of the following is supported by Ruby?
|
|
10191
|
Ruby on Rails was used to build user's interface of
|
|
10192
|
A web application development framework written in Ruby language is
|
|
10193
|
Programming language which is an open-source, object oriented programming language with simple syntax similar to Perl and Python is
|
|
10194
|
Ruby was developed in mid
|
|
10195
|
Selenium script can only be written in Java programming Language. True or false?
|
|
10196
|
Which Interface is used to execute JavaScript in Selenium WebDriver Script?
|
|
10197
|
What is return type getWindowHandles method?
|
|
10198
|
What is return type getWindowHandle method?
|
|
10199
|
What is return type findElements method?
|
|
10200
|
What is return type findElement method?
|
|
10201
|
switchTo command is used to switch to?
|
|
10202
|
List and Set Interface is present in which package?
|
|
10203
|
Which method is used to select an item from dropdown in Select class?
|
|
10204
|
In Alert Interface which method is not available?
|
|
10205
|
Which method is used to work with multiple browser windows?
|
|
10206
|
Which method is used to retrieve any attribute value inside any HTML tags?
|
|
10207
|
Which method is used to retrieve the contents inside any HTML tags?
|
|
10208
|
Which method is present in Action Interface?
|
|
10209
|
What arguments accept by until method of WebDriverWait and FluentWait classes?
|
|
10210
|
Which methods is not present in Navigation Interface?
|
|
10211
|
Which method is Overloaded method Selenium WebDriver?
|
|
10212
|
Which method is used to find an Object uniquely on any web Page?
|
|
10213
|
Which is a Class?
|
|
10214
|
Which is used for writing Selenium 3.0 Script?
|
|
10215
|
Which of the following WebDriver methods is used to clear all selected entries?
|
|
10216
|
Which of the following statements won’t hold true for Selenium 3.0?
|
|
10217
|
What are the different navigation methods of WebDriver?
|
|
10218
|
What type of Wait objects keep alive until the WebDriver object dies?
|
|
10219
|
What are the types of exceptions thrown in web driver?
|
|
10220
|
What is the similarity between WebDriver’s close() and quit() methods?
|
|
10221
|
Which one is not the WebDriver’s expected condition?
|
|
10222
|
Which one is not the correct type of locater?
|
|
10223
|
WebDriver’s Actions commands are <… complete the sentence … >?
|
|
10224
|
Which of the following commands is used to print a string value or a variable in Selenium IDE?
|
|
10225
|
Which of the following WebDriver methods is used to select the option at a given index?
|
|
10226
|
Which of the following are the major changes that Selenium 3.0 brought in?
|
|
10227
|
Which of the following exceptions is not an ideal candidate to ignore via FluentWait?
|
|
10228
|
Which of the following languages is supported by The Selenium Web Driver?
|
|
10229
|
Which of the following parameters is not required to initialize Fluent wait?
|
|
10230
|
Which of the following WebDriver commands is used to check the presence of a web element?
|
|
10231
|
The Selenium RC is used <… complete the sentence …>?
|
|
10232
|
Which type of exception is handled during compile time?
|
|
10233
|
What can be used to test Flex/Flash applications using Selenium?
|
|
10234
|
Which of the following components is not the part of Selenium suite?
|
|
10235
|
What are the WebDriver methods to manage web-based alerts?
|
|
10236
|
Which of the following commands is not a type of assertion in Selenium IDE?
|
|
10237
|
Which of the following OS is not supported by Selenium IDE?
|
|
10238
|
Which of the following features does Selenium IDE support?
|
|
10239
|
Which of the following steps is not mandatory to launch Firefox in Selenium 3?
|
|
10240
|
Selenium supports ____________Testing Level
|
|
10241
|
______________ is not a Test Management Tool?
|
|
10242
|
______________ is not a Mobile Test Tool?
|
|
10243
|
______________ is not a Bug Tracking Tool?
|
|
10244
|
______________ is not a Performance Test Tool?
|
|
10245
|
______________ is not for Functional Test Automation?
|
|
10246
|
___________ is the built-in feature of Mozilla Firefox Browser to inspect elements?
|
|
10247
|
Selenium WebDriver doesn’t support_______
|
|
10248
|
Selenium IDE doesn’t support_______
|
|
10249
|
Selenium supports Computer Web Applications and _____________
|
|
10250
|
__________ is a Disadvantage of Selenium WebDriver?
|
|
10251
|
__________ is an Advantage of Selenium WebDriver?
|
|
10252
|
_________ is the use of Firebug in Selenium?
|
|
10253
|
What is Jenkins?
|
|
10254
|
Selenium IDE supports__________Browser only to create and execute Test Cases.
|
|
10255
|
_________ supports Parallel Test Execution
|
|
10256
|
What is Maven?
|
|
10257
|
________ doesn’t support programming.
|
|
10258
|
__________ doesn’t support Test design (Creating test Cases)
|
|
10259
|
_______ is not a Selenium Component.
|
|
10260
|
Selenium doesn’t support __________ to write programs (Test Scripts)
|
|
10261
|
What does the assertTitle checks ?
|
|
10262
|
What is a test suite made of ?
|
|
10263
|
Which label is used as prefix pattern to specify a globbing pattern parameter for a Selenese command ?
|
|
10264
|
What does the term regex expands to ?
|
|
10265
|
What does the term DOM refers to ?
|
|
10266
|
Where is XPath used in ?
|
|
10267
|
What is called that scale for large test suites or test suites that must be run in multiple environments?
|
|
10268
|
What is Selenium IDE ?
|
|
10269
|
What does the term CSS refers to ?
|
|
10270
|
Which selenium command check whether specific text exists somewhere on the page ?
|
|
10271
|
Selenium variables are stored in _____________.
|
|
10272
|
Method which selects the option which displays the text matching the parameter passed to it
|
|
10273
|
Select the method which clears all selected entries in Web driver Selenium
|
|
10274
|
Which method is used when you want to verify whether a certain check box, radio button, or option in a drop-down box is selected in Web driver Selenium
|
|
10275
|
Which is a faster component between the SeleniumWeb driver and Selenium RC?
|
|
10276
|
Select the variation which finds elements based on the driver’s underlying CSS selector engine in Web driver Selenium.
|
|
10277
|
Select the syntax to locate an element using inner text.
|
|
10278
|
Select the command which is used to pause execution until the page is loaded completely.
|
|
10279
|
Select the command that will NOT wait for a new page to load before moving onto the next command.
|
|
10280
|
Select the command which is used to compare the contents of a table with expected values.
|
|
10281
|
. Which component of Selenium can create customized test results.
|
|
10282
|
Select the command which is used to check the presence of a certain element.
|
|
10283
|
In case of Selenium IDE, the Source view shows your script in
|
|
10284
|
Select the language which is supported by The Selenium Web Driver
|
|
10285
|
Which command can be used to enter values onto text boxes?
|
|
10286
|
Can Unix operating system be supported by Selenium IDE?
|
|
10287
|
The Selenium
|
|
10288
|
Out of the following which can only test web applications
|
|
10289
|
The Selenium IDE is used
|
|
10290
|
Select the operating system which is NOT supported by Selenium IDE.
|
|
10291
|
Select the name which is NOT the type of the locaters.
|
|
10292
|
Select the language which is NOT supported by the Selenium RC.
|
|
10293
|
Select the component which is NOT part of Selenium suite.
|
|
10294
|
echo(): is used
|
|
10295
|
Selects all the parent, grandparent, and so on of the element is related to which axis name in Selenium:
|
|
10296
|
In selenium, parent and child nodes are in the same query because HTML has a tree structure.
|
|
10297
|
Which two commands you use to validate a button?
|
|
10298
|
What is the default port number used by a hub in selenium?
|
|
10299
|
To delete a cookie we need to call the deleteCookie method, passing in two parameters.
|
|
10300
|
If you wanted to access the element that has the text “This element has an ID that changes every time the page is loaded†in it, then which of the following is used:
|
|
10301
|
Which of the following is not verify and asserts method in Selenium?
|
|
10302
|
Which process uses the JavaScript to find an element?
|
|
10303
|
Which is not true in case of Globs, in Selenium?
|
|
10304
|
Applications do not have the items needed for the tests when the tests get to commands. To get around this, we had a look at adding for waitFor commands to test. This is related to
|
|
10305
|
We use the dot (.) operator followed by either a * or a +. The + tells the regular expression that there will be instances between “0†and “nâ€, while the * tells the regular expression that there will be instances between “1†and “nâ€.
|
|
10306
|
Variable can be saved in which format?
|
|
10307
|
Which is a procedure?
|
|
10308
|
Which regular expression sequence that loosely translates to “anything or nothing?â€
|
|
10309
|
In regular Expression * quantifier refers to:
|
|
10310
|
The // tells the query that
|
|
10311
|
In Selenium, Following Axis is related to:
|
|
10312
|
___________ finds the item ending with the value passed in. This is the equivalent to the XPath ends-with. Is concern with?
|
|
10313
|
Which command is used to extend the time limit of WAITFOR command?
|
|
10314
|
Which is the odd one out?
|
|
10315
|
How to execute a specific command?
|
|
10316
|
Which is the following is true in case of waitFor command?
|
|
10317
|
Which command should be used to confirm that test will pass in the future when a new element is added after page loaded?
|
|
10318
|
In Selenium variables are stored in _________ .
|
|
10319
|
Selenium is compatible with
|
|
10320
|
By Default time of WAITFOR command is :
|
|
10321
|
Select the method which performs a context-click at the current mouse location.
|
|
10322
|
Select the command which retrieves the alert message and stores it in a variable that you will specify.
|
|
10323
|
Out of the following which is NOT a wait command.
|
|
10324
|
Method which selects the option which displays the text matching the parameter passed to it
|
|
10325
|
Select the method which clears all selected entries in Web driver Selenium.
|
|
10326
|
Select the View which shows your script in HTML format.
|
|
10327
|
Which Component is used to run multiple tests simultaneously in different browsers and platforms?
|
|
10328
|
Which method is used when you want to verify whether a certain checkbox, radio button, or option in a drop-down box is selected in Web driver Selenium
|
|
10329
|
Which Navigate command takes you forward by one page on the browser’s history in Web driver Selenium.
|
|
10330
|
Select the Get command which fetches the inner text of the element that you specify in Web driver Selenium.
|
|
10331
|
Select the variation which locates elements by the value of their “id†attribute in Web Driver Selenium
|
|
10332
|
Which is a faster component between the selenium web driver and Selenium RC?
|
|
10333
|
Select the tab that shows which command Selenium IDE is currently executing.
|
|
10334
|
Select the variation which locates elements by the value of the “name†attribute in Web driver Selenium
|
|
10335
|
Select the variation which finds elements based on the driver’s underlying CSS selector engine in Web driver Selenium.
|
|
10336
|
What is TestNG?
|
|
10337
|
Select the tab which gives feedback and other useful information when executing tests.
|
|
10338
|
Select the command which is NOT used in verifying page elements.
|
|
10339
|
Select the command which is used to compare the actual page title with an expected value.
|
|
10340
|
Select the syntax to locate an element using inner text.
|
|
10341
|
Select the command which is used to pause execution until the page is loaded completely.
|
|
10342
|
Select the command that will NOT wait for a new page to load before moving onto the next command.
|
|
10343
|
Select the command which is used to pause execution until the specified element becomes present.
|
|
10344
|
Select the command which is used to compare the contents of a table with expected values.
|
|
10345
|
Which component of Selenium can create customized test results?
|
|
10346
|
Select the command which is used to print a string value or a variable in Selenium IDE.
|
|
10347
|
Select the command which is used to check the presence of a certain element
|
|
10348
|
In the case of Selenium IDE, the Source view shows your script in
|
|
10349
|
Select the command in Selenium IDE used to open a page using the URL.
|
|
10350
|
The Actions commands
|
|
10351
|
Which Selenium component supports All Operating System?
|
|
10352
|
Can the Unix operating system be supported by Selenium IDE?
|
|
10353
|
Can Google chrome be supported by Selenium IDE?
|
|
10354
|
Select the language which is supported by The Selenium Web Driver
|
|
10355
|
Which command can be used to enter values into text boxes?
|
|
10356
|
The Selenium
|
|
10357
|
Select the method which selects the option at the given index.
|
|
10358
|
Select the command which is NOT a type of assertion in Selenium IDE.
|
|
10359
|
The Selenium can
|
|
10360
|
Out of the following which can only test web application
|
|
10361
|
The Selenium RC is used
|
|
10362
|
The Selenium IDE is used
|
|
10363
|
The Web driver is used
|
|
10364
|
Select the operating system which is NOT supported by Selenium IDE.
|
|
10365
|
Select the Browser which is supported by Selenium IDE
|
|
10366
|
Selenium IDE stands for
|
|
10367
|
Is Web Driver a component of the Selenium?
|
|
10368
|
Select the name which is NOT the type of the locators.
|
|
10369
|
Select the language which is NOT supported by the Selenium RC.
|
|
10370
|
Select the component which is NOT part of the Selenium suite.
|
|
10371
|
What does the assertTitle checks?
|
|
10372
|
What is a test suite made of?
|
|
10373
|
Which label is used as a prefix pattern to specify a globbing pattern parameter for a Selenese command?
|
|
10374
|
What does the term regex expand to?
|
|
10375
|
What does the term DOM refer to?
|
|
10376
|
Where is XPath used in?
|
|
10377
|
What is called that scale for large test suites or test suites that must be run in multiple environments?
|
|
10378
|
What is Selenium IDE?
|
|
10379
|
What does the term CSS refer to?
|
|
10380
|
Which selenium command check whether specific text exists somewhere on the page?
|
|
10381
|
Selenium variables are stored in _____________.
|
|
10382
|
Selenium tests _____________.
|
|
10383
|
The term JSON refers to ______________.
|
|
10384
|
The term AJAX expands to ________.
|
|
10385
|
The test language usually used in Selenium is ________________.
|
|
10386
|
What is the command to load a page?
|
|
10387
|
Which command is used for typing in a textbox?
|
|
10388
|
Which command is used for verifying if a web element exists?
|
|
10389
|
Which command is used to get the alert box?
|
|
10390
|
Which Selenium command do you use to run commands in slow motion in Selenium RC?
|
|
10391
|
How do you start selenium rc server with user extensions?
|
|
10392
|
How many parameters does the Selenium object take when using DefaultSelenium?
|
|
10393
|
Do you need to have Selenium .jar files as a dependency of your tests?
|
|
10394
|
How do you start the browser?
|
|
10395
|
What are the different modes that Selenium uses?
|
|
10396
|
Which of the following statements is correct for a Test Suite?
|
|
10397
|
What is data parameterization?
|
|
10398
|
What happens when the application creates a JavaScript alert during test case play?
|
|
10399
|
What is the best way to handle asynchronous data retrieval from the server as in AJAX applications?
|
|
10400
|
Which of the following is an incorrect target for pattern matching as in verifyTextPresent command?
|
|
10401
|
Why are relative XPaths preferred over absolute XPaths as locators?
|
|
10402
|
Which add-on is commonly used with Selenium IDE to identify individual elements on a web page?
|
|
10403
|
Which one of the following statements is incorrect?
|
|
10404
|
What is the purpose of the Find button?
|
|
10405
|
What URLs does the Selenium open command allow?
|
|
10406
|
Where can you create your own Selenium commands?
|
|
10407
|
In which associative array does Selenium store all of a test case's variables and their respective values?
|
|
10408
|
What is the difference between assert and verify commands?
|
|
10409
|
What is the correct syntax to access the value of a Selenium variable called name?
|
|
10410
|
What is the difference between a command and the same command with "AndWait" (e.g. click and clickAndWait commands)?
|
|
10411
|
5. What is the Selenium print command?
|
|
10412
|
What features are available in Selenium IDE to debug an automated test case?
|
|
10413
|
By default, in which format does the Selenium IDE save a test case?
|
|
10414
|
A Selenium IDE test case has three columns, Command, Target and Value. What data is stored in the Target column?
|
|
10415
|
What kind of application is the Selenium IDE?
|
|
10416
|
Which is not true in case of Globs, in Selenium?
|
|
10417
|
Which is not the advantage of Selenium IDE?
|
|
10418
|
Which of the following is false in case of waitFor command?
|
|
10419
|
Which regular expression sequence loosely translates to "anything or nothing?"
|
|
10420
|
In Selenium variables are stored in _____________ .
|
|
10421
|
In selenium, parent and child nodes are in same query because HTML has a tree structure.````````
|
|
10422
|
Which is the odd one out?
|
|
10423
|
Which Command is used to extend the time limit of WAITFOR Command?
|
|
10424
|
Variable can be saved in which format?
|
|
10425
|
Selenium is compatible with _______ .
|
|
10426
|
Which two commands you can use to validate a button?
|
|
10427
|
What is the default port number used by hub in Selenium?
|
|
10428
|
If you wanted to access the element that has the text "This element has an ID that changes every time the page is loaded" in it, then which of the following is used?
|
|
10429
|
Which process will be used in JavaScript to find an element?
|
|
10430
|
We use the dot (.) operator followed by either a * or a +. The + tells the regular expression that there will be instances between "0" and "n", while the * tells the regular expression that there will be instances between "1" and "n".
|
|
10431
|
Which of the following is not a verify and asserts method in Selenium?
|
|
10432
|
Which axis name in Selenium is related to the selection of all the parent, grandparent and so on?
|
|
10433
|
During which phase is the Entry Criteria determined?
|
|
10434
|
Which command should be used to confirm that the test will pass in the future when the new element is added after the page is loaded?
|
|
10435
|
What is the most common way to find an element on a page?
|
|
10436
|
Applications do not have the items needed for the tests when the tests get to commands. To get around this, we had a look at adding for 'waitFor' commands to test. This is related to while ___________.
|
|
10437
|
Which is a Procedure?
|
|
10438
|
To delete a cookie we need to call the deleteCookie method and we are passing in two parameters, what are those parameters?
|
|
10439
|
By Default time of WAITFOR command is ______.
|
|
10440
|
The ' // ' tells the query that ___________.
|
|
10441
|
How to execute specific command?
|
|
10442
|
What is the best element locator in selenium webdriver?
|
|
10443
|
Selenium method to get content which is inside any HTML tags?
|
|
10444
|
Which one is a class in Selenium ?
|
|
10445
|
Which of the following method is used to work with multiple browser windows?
|
|
10446
|
Which of the following language is not supported by Selenium
|
|
10447
|
Selenium command for entering text into text boxes?
|
|
10448
|
Which of the following is not a wait command in Selenium?
|
|
10449
|
Select the odd one using in Selenium
|
|
10450
|
Which of the following expression is used for "anything"?
|
|
10451
|
What versions of Internet Explorer does WebDriver support?
|
|
10452
|
Will a findElements type call throw a NoSuchElementException when it can't find the element?
|
|
10453
|
What is the best call for finding multiple elements using XPath?
|
|
10454
|
Which of the following attribute triggers event when the window gets focus?
|
|
10455
|
Pick two from the following if you wanted do a partial match on an attribute on an element from the beginning of the value:
|
|
10456
|
What is the most common way to find an element on a page?
|
|
10457
|
If an element got added after the page has loaded what command would you use to make sure the test passed in the future?
|
|
10458
|
If you want to validate that a button has appeared on a page, which two commands would be the best two to use?
|
|
10459
|
Which of the following attribute triggers events when a form gets user input?
|
|
10460
|
Which of the following attribute triggers events when the document has change?
|
|
10461
|
Which of the following attribute triggers event when an element gets user input?
|
|
10462
|
Which of the following attribute triggers event when an element is invalid?
|
|
10463
|
Which of the following attribute triggers event when media data is loaded?
|
|
10464
|
Which of the following attribute triggers event when the duration and other media data of a media element is loaded?
|
|
10465
|
Which of the following attribute triggers event when the browser starts to load the media data?
|
|
10466
|
Which of the following attribute triggers event when the message is triggered?
|
|
10467
|
Which of the following attribute triggers event when the document comes online? A
|
|
10468
|
R objects can have attributes, which are like ________ for the object.
|
|
10469
|
Which of the following can be considered as object attribute ?
|
|
10470
|
The ___ function can be used to create vectors of objects by concatenating things together.
|
|
10471
|
Which of the following method make vector of repeated values ?
|
|
10472
|
Which of the following finds the position of a quantile in a dataset ?
|
|
10473
|
Which of the following function cross-tabulate tables using formulas ?
|
|
10474
|
which of the following statement make a mosaic plot ?
|
|
10475
|
Which of the following compute proportions from a contingency table ?
|
|
10476
|
Which of the following is lattice command for producing a scatterplot ?
|
|
10477
|
Which of the following builds empirical cumulative distribution function ?
|
|
10478
|
Which of the following is used to view dataset in a spreadsheet-type format ?
|
|
10479
|
________ function carries out a chi-square test.
|
|
10480
|
Which of the following statement is invalid ?
|
|
10481
|
What would be the result of following code ? > x <- 6 > class(x)
|
|
10482
|
What will the following code print ? > x <- 0:6 > as.logical(x)
|
|
10483
|
What would be the output of the following code ? > sqrt(-17)
|
|
10484
|
Which of the following code constructs vector of length 11 ?
|
|
10485
|
_______ function returns a vector of the same size as x with the elements arranged in increasing order
|
|
10486
|
Which of the following statement would print “0†“1†“2†“3†“4†“5†“6†for the following code ? > x <- 0:6
|
|
10487
|
What would the following code print ? > x <- c("a", "b", "c") > as.logical(x)
|
|
10488
|
What would be the output of the following code ? > m <- matrix(nrow = 2, ncol = 3) > dim(m)
|
|
10489
|
What would be the output of the following code ? > m <- matrix(1:6, nrow = 2, ncol = 3) > m
|
|
10490
|
What would the following code print ? > m <- 1:10 > m
|
|
10491
|
What would the following code print ? > x <- 1:3 > y <- 10:12 > cbind(x, y)
|
|
10492
|
The ________ function takes an arbitrary number of arguments and concatenates them one by one into character strings.
|
|
10493
|
What would be the result of following code ? > x <- 1:3 > y <- 10:12 > rbind(x, y)
|
|
10494
|
What would be the output of the following code ? > x <- vector("list", length = 5) > x
|
|
10495
|
What would be the output of the following code ? > x <- factor(c("yes", "yes", "no", "yes", "no")) > table(x)
|
|
10496
|
What would the following code print ? > x <- c(1, 2, NaN, NA, 4) > is.na(x)
|
|
10497
|
Which of the following would print the following output ? foo bar 1 1 TRUE 2 2 TRUE 3 3 FALSE 4 4 FALSE
|
|
10498
|
What would the following code print ? > x <- data.frame(foo = 1:4, bar = c(T, T, F, F)) > ncol(x)
|
|
10499
|
Which of the following is invalid assignment ?
|
|
10500
|
What would be the output of the following code ? > x <- 1:3 > names(x)
|
|
10501
|
What would be the output of the following code ? > m <- matrix(1:4, nrow = 2, ncol = 2) > dimnames(m) <- list(c("a", "b"), c("c", "d")) > m
|
|
10502
|
Which of the following is used for reading in saved workspaces ?
|
|
10503
|
________ is used for outputting a textual representation of an R object
|
|
10504
|
Which of the following statement would read file “foo.txt†?
|
|
10505
|
Which of the followin code would read 100 rows ?
|
|
10506
|
What is the result of the following code ? > y <- data.frame(a = 1, b = "a") > dput(y)
|
|
10507
|
Which of the following is used for reading tabular data ? > y <- data.frame(a = 1, b = "a") > dput(y, file = "y.R") > new.y <- dget("y.R") > new.y
|
|
10508
|
Which of the following convert a matrix of phi coefficients to polychoric correlations ?
|
|
10509
|
Which of the following is used to plot multiple histograms ?
|
|
10510
|
Which of the following count the number of good cases when doing pairwise analysis ?
|
|
10511
|
Which of the following gives the summary of values likes mean etc ?
|
|
10512
|
The purpose of correct.cor is to correct _________ in values.
|
|
10513
|
The IBM _________ analytics appliances combine high-capacity storage for Big Data with a massively-parallel processing platform for high-performance computing.
|
|
10514
|
______ is an integrated hosted analytics platform for marketing insights, predictive models, and marketing optimizationâ€
|
|
10515
|
________ is rapidly being adopted for computing descriptive and query types of analytics on Big data.
|
|
10516
|
Which of the following contains pre-built predictive tools ?
|
|
10517
|
Which of the following is preferred for text analytics ?
|
|
10518
|
When you create Function Group By default which includes will Create?
|
|
10519
|
T-Code for unlock the Objects?
|
|
10520
|
Assuming a pushbutton with function code 'FUNC' is available in the toolbar of a list report, what event is processed when the button is clicked?
|
|
10521
|
T100 Table has the following Structure?
|
|
10522
|
T-Code for Message Class Creation ?
|
|
10523
|
What is the default mode for passing actual parameters in a Perform?
|
|
10524
|
File ABC contains 10 records. How many records will be read in the following code? PERFORM READ_RECORDS_FROM_FILE. ….. ….. FORM READ_RECORDS_FROM_FILE. READ DATASET ABC INTO REC. IF SY-SUBRC = 0. EXIT. ENDIF. DO. READ DATASET ABC INTO REC. IF SY-SUBRC = 0. EXIT. ENDIF. ENDDO. ENDFORM.
|
|
10525
|
______ is simplest class of analytics.
|
|
10526
|
_________ is a JavaScript charting library and feature-rich API set that lets you build interactive Flash or HTML5 charts.
|
|
10527
|
Which of the following statement will save the output to the file for following code ? > a <- data.frame(x = rnorm(100), y = runif(100)) > b <- c(3, 4.4, 1 / 3)
|
|
10528
|
Which of the following statement will load the objects to the file named “mydata.RData†?
|
|
10529
|
________ opens a connection to a file compressed with gzip.
|
|
10530
|
Which of the following extracts first element from the following vector ? > x <- c("a", "b", "c", "c", "d", "a")
|
|
10531
|
Which of the following extracts first four element from the following vector ? > x <- c("a", "b", "c", "c", "d", "a")
|
|
10532
|
An internal table icode contains the following entries: Field1 Field2 -------------- John 12345 Alice 23478 Sam 54321 john 50000 DATA: BEGIN OF ICODE OCCURS 0, FIELD1(5), FIELD2(5), END OF ICODE. READ TABLE ICODE WITH KEY FIELD1 = 'John' BINARY SEARCH. Why does executing the above code return a sy-subrc of 4?
|
|
10533
|
What would be the output of the following code ? > x <- c("a", "b", "c", "c", "d", "a") > x[c(1, 3, 4)]
|
|
10534
|
What are the 2 boxes in your system for coding for Abap and their logins?
|
|
10535
|
What would be the output of the following code ? > x <- matrix(1:6, 2, 3) > x[1, 2]
|
|
10536
|
What would be the output of the following code ? > x <- matrix(1:6, 2, 3) > x[1, ]
|
|
10537
|
T-Code for release the Transport request Number?
|
|
10538
|
Which of the following is not a Message type?
|
|
10539
|
What is the result of the following code? Report abc. Data : a(3) , b(3). A = '123'. B = '456'. Perform modify using a b. Write a. Write b. Form abc using x value(y). X = 'abc'. Y = 'xyz'. Endform.
|
|
10540
|
Which of the followin code extracts the second column for the following matrix ? > x <- matrix(1:6, 2, 3)
|
|
10541
|
What would be the output of the following code ? > x <- matrix(1:6, 2, 3) > x[1, , drop = FALSE]
|
|
10542
|
What would be the output of the following code ? > x <- list(foo = 1:4, bar = 0.6) > x
|
|
10543
|
Which line in the following code contains a syntax error? Report abc message-id ZP. Message Id 'ZP' type 'E' number 012. Message e013(ZP). Message e013 with '123'.
|
|
10544
|
Which of the following extracts first element from the following list ? > x <- list(foo = 1:4, bar = 0.6)
|
|
10545
|
What is the use of interactive reporting?
|
|
10546
|
What would be the output of the following code ? > x <- list(foo = 1:4, bar = 0.6, baz = "hello") > name <- "foo" > x$name
|
|
10547
|
What would be the output of the following code ? > x <- list(foo = 1:4, bar = 0.6, baz = "hello") > name <- "foo" > x[[name]]
|
|
10548
|
What is the right order in which the events are trigerred? START-OF SELECTION , INITIALIZATION ,AT SELECTION-SCREEN
|
|
10549
|
What would be the output of the following code ? > x <- list(a = list(10, 12, 14), b = c(3.14, 2.81)) > x[[c(1, 3)]]
|
|
10550
|
What would be the output of the following code ? > x <- list(aardvark = 1:5) > x$a
|
|
10551
|
How can you suppress the default title of a list?
|
|
10552
|
GUI status contains the following Structure? More than one answer is correct.
|
|
10553
|
Which of the followin code extracts 1st element of the 2nd element ? > x <- list(a = list(10, 12, 14), b = c(3.14, 2.81))
|
|
10554
|
Colors can be associated with the report fields using one of the following commands
|
|
10555
|
What would be the output of the following code ? > x <- list(aardvark = 1:5) > x[["a", exact = FALSE]]
|
|
10556
|
TOP-OF-PAGE does one of the following
|
|
10557
|
What would be the output of the following code ? > x <- c(1, 2, NA, 4, NA, 5) > bad <- is.na(x) > print(bad)
|
|
10558
|
Which of the following is example of vectorized operation as far as subtraction is concerned ? > x <- 1:4 > y <- 6:9
|
|
10559
|
What would be the output of the following code ? > x <- 1:4 > y <- 6:9 > z <- x + y > z
|
|
10560
|
What would be the output of the following code ? > x <- 1:4 > x > 2
|
|
10561
|
What would be the output of the following code ? > x <- 1:4 > y <- 6:9 > x/y
|
|
10562
|
What would be the output of the following code ? > x <- matrix(1:4, 2, 2) > y <- matrix(rep(10, 4), 2, 2) > x * y
|
|
10563
|
Which of the following function gives the day of the week ?
|
|
10564
|
What is the system field for the current Page Number?
|
|
10565
|
What would be the output of the following code ? > p <- as.POSIXlt(x) > names(unclass(p)) > p$wday
|
|
10566
|
What would be the output of the following code ? > datestring <- c(
|
|
10567
|
What would be the output of the following code ? > x <- as.Date("2012-01-01") > y <- strptime("9 Jan 2011 11:34:21", "%d %b %Y %H:%M:%S") > x-y
|
|
10568
|
What would be the output of the following code ? > x <- as.Date("2012-03-01") > y <- as.Date("2012-02-28") > x-y
|
|
10569
|
What would be the output of the following code ? > x <- as.POSIXct("2012-10-25 01:00:00") > y <- as.POSIXct("2012-10-25 06:00:00", tz = "GMT") > y-x
|
|
10570
|
Which of the following return a subset of the columns of a data frame ?
|
|
10571
|
Which statements are true about the issue of goods?
|
|
10572
|
_________ generate summary statistics of different variables in the data frame, possibly within strata
|
|
10573
|
What is the T Code for "Billing due list"?
|
|
10574
|
What is the T Code for "Cancel goods issue"?
|
|
10575
|
How is the schedule line determined?
|
|
10576
|
The _______ operator is used to connect multiple verb actions together into a pipeline
|
|
10577
|
What is the T Code for "Sales order change"?
|
|
10578
|
The dplyr package can be installed from GitHub using the _______ package
|
|
10579
|
How does the SAP system enable you to check the reason for documents not being combined in a billing document?
|
|
10580
|
The dplyr package can be installed from CRAN using :
|
|
10581
|
When processing a billing due list, you have the following options:
|
|
10582
|
Which of the following object is masked from ‘package:stats’ ?
|
|
10583
|
The _________ function can be used to select columns of a data frame that you want to focus on.
|
|
10584
|
________ function is similar to the existing subset() function in R but is quite a bit faster.
|
|
10585
|
What is the T Code for "List of deliveries"?
|
|
10586
|
The _________ function is used to generate summary statistics from the data frame within strata defined by a variable.
|
|
10587
|
There is an SQL interface for relational databases via the _______ package.
|
|
10588
|
Identify a Cardinality type that is not part of webdynpro.
|
|
10589
|
Full Buffering would be appropriate for __________
|
|
10590
|
What is the transaction code for "Comparing tables"?
|
|
10591
|
During conversion process of databases, the data is copied from temporary table to the database table using the statement
|
|
10592
|
Selection screen entries referring to data dictionary objects have certain checks in-built in them. Additional checks can be written using event
|
|
10593
|
It is better to buffer a table when
|
|
10594
|
What is the system field for the current Page Number
|
|
10595
|
Sub query usually more efficient because:
|
|
10596
|
Types of Debugging in SAP?
|
|
10597
|
earch help can not be attach to
|
|
10598
|
The code of BAdl implementation is stored in a __________ of an automatically generated customer class.
|
|
10599
|
To implement a Business Add-In (BAdl), the BADI definition name must be investigated.
|
|
10600
|
An object of the BAdl adapter class is instantiated by the call of the static method GET_INSTANCE of the class CL_EXITHANDLER.
|
|
10601
|
With a Business Add-In (BAdl), an SAP application program provides the enhancement option through an interface method.
|
|
10602
|
A handler method can be either a class method (static method) or an instance method of an object.
|
|
10603
|
To create a handler object for an event, we must first define a _________.
|
|
10604
|
Container controls do not provide the technical connection between the screen and application control.
|
|
10605
|
The ABAP List viewer (ALV) Grid Control is a tool that you can use to display non-hierarchical lists in a standardized form.
|
|
10606
|
You cannot use the Refactoring Assistant to move the components of a class within the inheritance hierarchy.
|
|
10607
|
Local type of the global class are encapsulated and cannot be acceded from outside.
|
|
10608
|
Which of the following pushbutton is used to override an inherited method?
|
|
10609
|
Which of the following is used to generate UML diagrams for existing coding?
|
|
10610
|
"The naming convention for SAP interfaces is “ZIF_ or YIF_â€.
|
|
10611
|
The naming convention for SAP interfaces is “ZIF_ or YIF_â€.
|
|
10612
|
You cannot convert to functional modern writing style when generating method calls as of SAP NW AS 7.0.
|
|
10613
|
Which of the following are used to test the triggering of events in a class?
|
|
10614
|
You can only use local classes or interfaces within the same program in which they are defined and implemented.
|
|
10615
|
Which visibility of the event ensures that it can only be handled in the class itself and its subclasses?
|
|
10616
|
Events are registered using the SET HANDLER statement. Registration is only active at program runtime.
|
|
10617
|
Which of the following are not defined as interface components?
|
|
10618
|
Which of the following statements is used to trigger events?
|
|
10619
|
Which of the following statements is used to define events within a class?
|
|
10620
|
Interfaces like regular superclasses can include other interfaces.
|
|
10621
|
Which of the following strongly resembles inheritance?
|
|
10622
|
Interface reference variables can contain references to instances of the class that is not implemented at runtime.
|
|
10623
|
?= is the down-cast assignment operator.
|
|
10624
|
You can access interface components only by using an object reference.
|
|
10625
|
Which of the following statements is used to implement an interface in a class?
|
|
10626
|
What are the advantages of correctly using class hierarchies?
|
|
10627
|
Which of the following is the down-cast assignment operator?
|
|
10628
|
Which of the following is used to assign a superclass reference to a subclass reference?
|
|
10629
|
A typical use for __________ assignments is to prepare for generic access.
|
|
10630
|
When objects from different classes react differently to the same method calls, this is known as _________.
|
|
10631
|
Which of the following is determined by the assignment?
|
|
10632
|
Which of the following section is used to change superclasses without the need to know the subclasses?
|
|
10633
|
A superclass is a generalization of its subclasses.
|
|
10634
|
Which of the following can be called automatically in the superclass?
|
|
10635
|
Which of the following are the characteristics of generalization and specialization?
|
|
10636
|
Which of the following is a relationship in which the subclass inherits all the main characteristics of the superclass?
|
|
10637
|
The constructor’s signature can have importing parameters or exceptions.
|
|
10638
|
Which of the following points do you consider when defining static constructors?
|
|
10639
|
The constructor is automatically called at runtime with the CREATE OBJECT statement.
|
|
10640
|
The __________ is a special instance method in a class.
|
|
10641
|
You have to pass the RETURNING parameter using the VALUE addition, that is they must be pass by value.
|
|
10642
|
You can describe methods that have a _______ parameter as functional methods.
|
|
10643
|
In which of the following expressions can functional methods be called directly?
|
|
10644
|
When calling a static method from within the class, you can omit the class name.
|
|
10645
|
Which of the following options is used to administer objects in the internal tables?
|
|
10646
|
Independent references are references that have been defined within a class.
|
|
10647
|
The Garbage Collector is a system routine that starts automatically if the runtime system does not have important tasks to carry out.
|
|
10648
|
During program runtime, you use the class to create discrete objects (instances) in the memory. This process is called instantiation.
|
|
10649
|
You cannot create and address objects using reference variables.
|
|
10650
|
Which of the following options is used to create an object?
|
|
10651
|
Which one of the following syntax elements is used to define static attributes?
|
|
10652
|
The CLASS statement can be nested, that is, you can define a class within a class.
|
|
10653
|
You can group all characteristics and behaviors of similar objects into one central class.
|
|
10654
|
The __________ diagram pays particular attention to the sequence in which the objects relate to each other.
|
|
10655
|
Which of the following describes how instances of different classes respond differently to the same messages?
|
|
10656
|
Which of the following is(are) the step(s) in the output design process?
|
|
10657
|
Which of the following is NOT a general principle for output design?
|
|
10658
|
Which kind of chart is useful for comparing series or categories of data, each in its own bar?
|
|
10659
|
dplyr can be integrated with the ________ package for large fast tables.
|
|
10660
|
Which of the following function is similar to summarize ?
|
|
10661
|
Which of the following syntax is correct for while loop ?
|
|
10662
|
A count of the number of students who earned A, B, C, D, and F grades in a given course would be an example of a(n):
|
|
10663
|
A turnaround output is an example of
|
|
10664
|
Which of the following reports categorizes information for managers who are not interested to wade through the details?
|
|
10665
|
The most common medium for computer outputs is:
|
|
10666
|
A listing of the names and addresses of all the employees for an organization would be an example of a(n):
|
|
10667
|
A list of the names of all customers who purchased only one product within a six-month period would be an example of a(n):
|
|
10668
|
Which of the following reports presents information with little or no filtering or restrictions?
|
|
10669
|
In cases where the data item has a large number of predefine values and screen space is tight, the following GUI control should be used for an input
|
|
10670
|
Which of the following advanced input controls provides a nonnumeric means of selecting a value?
|
|
10671
|
Optical character recognition:
|
|
10672
|
Remote batch processing has the following characteristic(s):
|
|
10673
|
If you need to collect employee status information (e.g., full-time vs. part-time) on a computer screen, your best choice for a GUI control would be:
|
|
10674
|
If you need a student to select from a list of eighty courses of the university’s on-line catalogue, your best choice for a GUI control would be:
|
|
10675
|
Which of the following is NOT an advanced input control?
|
|
10676
|
A form used to record data about a transaction is a(n)
|
|
10677
|
Which of the following is(are) an input process method(s)?
|
|
10678
|
Which of the following is(are) the inputs to the Systems Construction phase?
|
|
10679
|
Which of the following is(are) the deliverables of the Systems Implementation phase?
|
|
10680
|
Which of the following is the first phase of the Systems Implementation phase?
|
|
10681
|
Which of the following is(are) the primary inputs into the task of writing and testing new programs?
|
|
10682
|
Which of the tests is a final system test performed by end users using real data over an extended period of time?
|
|
10683
|
_______ is used to break the execution of a loop.
|
|
10684
|
Which of the following statement can be used to explicitly control looping ?
|
|
10685
|
Which of the following code can be used to avoid numeric problems such as taking the logarithm of a negative number ?
|
|
10686
|
What will be the output of the following code ? > x <- 3 > switch(2, 2+2, mean(1:10), rnorm(5))
|
|
10687
|
Which will be the output of following code ? > x <- 3 > switch(6, 2+2, mean(1:10), rnorm(5))
|
|
10688
|
What will be the output of the following code ? > y <- "fruit" > switch(y, fruit = "banana", vegetable = "broccoli", "Neither")
|
|
10689
|
What will be the output of the following code ? > centre <- function(x, type) { + switch(type, +mean = mean(x), + median = median(x), + trimmed = mean(x, trim = .1)) + } > x <- rcauchy(10) > centre(x, "mean")
|
|
10690
|
Which of the following code will print “Neither†?
|
|
10691
|
R has ________ basic indexing operators.
|
|
10692
|
Which of the following is apply function in R ?
|
|
10693
|
Functions are defined using the _________ directive and are stored as R objects
|
|
10694
|
What will be the output of the following code ? > f <- function() { +## This is an empty function + } > f()
|
|
10695
|
What will be the output of the following code ? > f <- function() { + ## This is an empty function + } > class(f)
|
|
10696
|
What will be the output of following code ? > f <- function(num) { + for(i in seq_len(num)) { +cat("Hello, world!\n") + } + } > f(3)
|
|
10697
|
The syntax of the for loop is :
|
|
10698
|
What will be the output of following code ? > f <- function(num) { + hello <- "Hello, world!\n" + for(i in seq_len(num)) { + cat(hello) + } + chars <- nchar(hello) * num + chars + } > meaningoflife <- f(3) > print(meaningoflife)
|
|
10699
|
What will be the output of following code snippet ? > paste("a", "b", se = ":")
|
|
10700
|
What will be the output of the following code ? > f <- function(num = 1) { +hello <- "Hello, world!\n" +for(i in seq_len(num)) { + cat(hello) + } +chars <- nchar(hello) * num + chars + } > f()
|
|
10701
|
You can check to see whether an R object is NULL with the _________ function.
|
|
10702
|
Which of the following code will print NULL ?
|
|
10703
|
What will be the output of following code ? > f <- function(a, b) { + a^2 + } > f(2)
|
|
10704
|
What will be the output of following code snippet ? > paste("a", "b", sep = ":")
|
|
10705
|
What will be the output of following code ? > f <- function(a, b) { +print(a) +print(b) + } > f(45)
|
|
10706
|
What would be the value of following expression ? log(-1)
|
|
10707
|
To get the current date, the _______ function will return a Date object which can be converted to a different class if necessary.
|
|
10708
|
Which of the followin code represents internal representation of a Date object ?
|
|
10709
|
What would be the output of the following code ? > x <- as.Date("1970-01-01") > x
|
|
10710
|
What would be the output of the following code ? > printmessage <- function(x) { + if(x > 0) + print("x is greater than zero") + else +print("x is less than or equal to zero") + invisible(x) + } > printmessage(NA)
|
|
10711
|
What will be the output of following code snippet ? > lm <- function(x) { x * x } > lm
|
|
10712
|
Which of the variable in the following code is variable ? > f <- function(x, y) { + x^2 + y / z + }
|
|
10713
|
R uses _________ scopingâ¶â° or static scoping.
|
|
10714
|
The only environment without a parent is the ________ environment.
|
|
10715
|
The ________ for R are the main feature that make it different from the original S language
|
|
10716
|
The _________ function is a kind of “constructor function†that can be used to construct other functions.
|
|
10717
|
What is the range of the floating point numbers?
|
|
10718
|
Which of three sizes of floating point types should be used when extended precision is required?
|
|
10719
|
Which is used to indicate single precision value?
|
|
10720
|
Which is correct with respect to size of the datatypes?
|
|
10721
|
The size of an object or a type can be determined using which operator?
|
|
10722
|
Latency time is:
|
|
10723
|
Which of the following is not a file operation:
|
|
10724
|
An inverted file
|
|
10725
|
Originally ‘C’ was developed as
|
|
10726
|
The conditional compilation
|
|
10727
|
*ptr++ is equivalenet to:
|
|
10728
|
Which of the following is/are advantages of cellular partitioned structure
|
|
10729
|
In mulit-list organization
|
|
10730
|
‘Prime area’ in context of file system is defined as
|
|
10731
|
Seek time is
|
|
10732
|
Which of the following is not a component of file system
|
|
10733
|
A direct access file is:
|
|
10734
|
If class A is friend of class B and if class B is friend of class C, which of the following is true?
|
|
10735
|
Which of the following relationship is known as inheritancerelationship?
|
|
10736
|
Which of the following is true about const member functions?
|
|
10737
|
Each pass through a loop is called a/an
|
|
10738
|
Which one of the following is not a valid reserved keyword in C++
|
|
10739
|
What is the difference between overloaded functions and overridden functions?
|
|
10740
|
What does STL stand for?
|
|
10741
|
Which of the following is not a standard exception built in C++.
|
|
10742
|
Which of the STL containers store the elements contiguously (in adjecent memory locations)?
|
|
10743
|
Which of the following is not recommended in a header file?
|
|
10744
|
What’s wrong? for (int k = 2, k <=12, k++)
|
|
10745
|
What’s wrong? (x = 4 && y = 5) ? (a = 5) ; (b = 6);
|
|
10746
|
A continue statement causes execution to skip to
|
|
10747
|
What’s wrong? while( (i < 10) && (i > 24))
|
|
10748
|
Which of the following is not true about preprocessor directives
|
|
10749
|
Which of the following is the most preferred way of throwing and handling exceptions?
|
|
10750
|
Which of the following keyword supports dynamic method resolution?
|
|
10751
|
Which of the following correctly describes C++ language?
|
|
10752
|
Which of the following is a valid destructor of the class name “Countryâ€
|
|
10753
|
Which one of the following is not a fundamental data type in C++
|
|
10754
|
When is std::bad_alloc exception thrown?
|
|
10755
|
Which classes allow primitive types to be accessed as objects?
|
|
10756
|
If the class name is X, what is the type of its “this†pointer (in a nonstatic, non-const member function)?
|
|
10757
|
Which of the following is the default authentication mode for IIS?
|
|
10758
|
Which of these data source controls do not implement Caching?
|
|
10759
|
An ASP.NET page uses a Datagrid displays employee information.The Web application supports a large number of concurrent users, who will be saving data from the grid back to the database. It is important that the Web application doesn't overwhelm the Web Server.
|
|
10760
|
For your ASP.NET web application your graphics designer created elaborate images that show the product lines of your company. Some of graphics of the product line are rectangular, circular, and others are having complex shapes. You need to use these images as a menu on your Web site. What is the best way of incorporating these images into your Web site?
|
|
10761
|
Explain the significance of Server .MapPath
|
|
10762
|
You need to store state data that is accessible to any user who connects to your Web application. Which object should you use?
|
|
10763
|
How to implement authentication via web.config?
|
|
10764
|
In your ASP.NET web application you want to display a list of clients on a Web page. The client list displays 10 clients at a time, and you require the ability to edit the clients. Which Web control is the best choice for this scenario?
|
|
10765
|
Which one of the following namespaces contains the definition for IdbConnection?
|
|
10766
|
Select the control which does not have any visible interface.
|
|
10767
|
How do you explicitly kill a user session?
|
|
10768
|
Does the EnableViewState allows the page to save the users input on a form?
|
|
10769
|
What is the maximum number of cookies that can be allowed to a web site?
|
|
10770
|
Select the type Processing model that asp.net simulate
|
|
10771
|
Where is the default Session data is stored in ASP.Net?
|
|
10772
|
Select the caching type supported by ASP.Net
|
|
10773
|
Which property of the session object is used to set the local identifier?
|
|
10774
|
The number of forms that can be added to aspx page is
|
|
10775
|
How do you manage states in asp.net application
|
|
10776
|
What is the extension of a web user control file?
|
|
10777
|
Why is Global.asax is used?
|
|
10778
|
There can be more than 1 machine.config file in a system
|
|
10779
|
What's the difference between Response.Write() and Response.Output.Write()?
|
|
10780
|
How ASP.Net Different from classic ASP?
|
|
10781
|
Custom Controls are derived from which of the classes
|
|
10782
|
To add a custom control to a web form we have to register with
|
|
10783
|
Which of the following is true?
|
|
10784
|
How do you register a user control?
|
|
10785
|
Which method do you invoke on the Data Adapter control to load your generated dataset?
|
|
10786
|
What namespace does the Web page belong in the .NET Framework class hierarchy?
|
|
10787
|
Postback occurs in which of the following forms.
|
|
10788
|
The first event to be triggered in an aspx page is.
|
|
10789
|
The Asp.net server control, which provides an alternative way of displaying text on web page, is
|
|
10790
|
When an .aspx page is requested from the web server, the out put will be rendered to browser in following format.
|
|
10791
|
Which of the following languages can be used to write server side scripting in ASP.NET?
|
|
10792
|
In ASP.NET the sessions can be dumped by using
|
|
10793
|
Which method do you invoke on the DataAdapter control to load your generated dataset with data?
|
|
10794
|
What tags one need to add within the asp:datagrid tags to bind columns manually?
|
|
10795
|
Which of the following is TRUE about Windows Authentication in ASP.NET?
|
|
10796
|
Which of the following method is used to obtain details about information types of assembly?
|
|
10797
|
The namespace within the Microsoft .NET framework which provides the functionality to implement transaction processing is ....................
|
|
10798
|
The technique that allow code to make function calls to .NET applications on other processes and on other machines is
|
|
10799
|
Suppose a .NET programmer wants to convert an object into a stream of bytes then the process is called ______________ ?
|
|
10800
|
Which of the following can be used to add alternating color scheme in a Repeater control?
|
|
10801
|
Suppose one wants to modify a SOAP message in a SOAP extension then how this can be achieved. Choose the correct option from below:
|
|
10802
|
How many classes can a single .NET DLL contain?
|
|
10803
|
Which of the following denote the property in every validation control?
|
|
10804
|
Which of the following allow writing formatted output?
|
|
10805
|
The actual work process of ASP.NET is taken care by _____________?
|
|
10806
|
Common type system is built into which of the following:
|
|
10807
|
The type of code found in Code-Behind class is ________ ?
|
|
10808
|
In ASP.NET the < authorization > section contain which of the following elements?
|
|
10809
|
In .NET the operation of reading metadata and using its contents is known as ______?
|
|
10810
|
In my .NET Framework I have threads. Which of the following denote the possible priority level for the threads?
|
|
10811
|
If one has two different web form controls in a application and if one wanted to know whether the values in the above two different web form control match what control must be used?
|
|
10812
|
Which of the following transfer execution directly to another page?
|
|
10813
|
Which of the following is FALSE?
|
|
10814
|
Which of the following must be done in order to connect data from some data resource to Repeater control?
|
|
10815
|
WSDL stands for _________________ ?
|
|
10816
|
What is the base class from which all Web forms inherit?
|
|
10817
|
Which of the following denote ways to manage state in an ASP.Net Application?
|
|
10818
|
Find the term: The .NET framework which provides automatic memory management using a technique called ______________ ?
|
|
10819
|
In ASP.NET in form page the object which contains the user name is ______ ?
|
|
10820
|
The .NET Framework provides a runtime environment called..... ?
|
|
10821
|
___________________ tests make sure that new code does not break existing code.
|
|
10822
|
What attributes do you use to hide a public .Net class from COM?
|
|
10823
|
Which of the following authentication is best suited for a corporate network?
|
|
10824
|
By default, code written with the Debug class is stripped out of release builds.
|
|
10825
|
The ________________ property affects how the .Net Framework handles dates, currencies, sorting and formatting issues.
|
|
10826
|
Where do we include the user lists for Form authentication?
|
|
10827
|
Where do we include the user lists for windows authentication?
|
|
10828
|
Which of the following is the way to monitor the web application?
|
|
10829
|
Which of the following is the performance attributes of processModel?
|
|
10830
|
______________ element in the web.config file to run code using the permissions of a specific user
|
|
10831
|
__________________ is a special subfolder within the windows folder that stores the shared .NET component.
|
|
10832
|
Which of the following is faster and consume lesser memory?
|
|
10833
|
You can have only one Global.asax file per project.
|
|
10834
|
Which of the following is not the way to maintain state?
|
|
10835
|
Mode of storing ASP.NET session
|
|
10836
|
Which of the following control is used to validate that two fields are equal?
|
|
10837
|
Which of the following object is used along with application object in order to ensure that only one process accesses a variable at a time?
|
|
10838
|
Which of the following ASP.NET object encapsulates the state of the client?
|
|
10839
|
Which object can help you maintain data across users?
|
|
10840
|
How do you get information from a form that is submitted using the "post" method?
|
|
10841
|
Default scripting language in ASP.
|
|
10842
|
Default Session data is stored in ASP.Net.
|
|
10843
|
Which DLL translate XML to SQL in IIS?
|
|
10844
|
Which of the following is not a member of ADODBCommand object?
|
|
10845
|
Why is Global.asax is used?
|
|
10846
|
An alternative way of displaying text on web page using
|
|
10847
|
File extension used for ASP.NET files.
|
|
10848
|
What is used to validate complex string patterns like an e-mail address?
|
|
10849
|
Caching type supported by ASP.Net
|
|
10850
|
Attribute must be set on a validator control for the validation to work.
|
|
10851
|
We can manage states in asp.net application using
|
|
10852
|
What class does the ASP.NET Web Form class inherit from by default?
|
|
10853
|
Which of the following tool is used to manage the GAC?
|
|
10854
|
How do we create a FileSystemObject?
|
|
10855
|
Which of the following method must be overridden in a custom control?
|
|
10856
|
Difference between Response.Write() andResponse.Output.Write().
|
|
10857
|
The first event triggers in an aspx page is.
|
|
10858
|
Which of the following object is not an ASP component?
|
|
10859
|
Web.config file is used...
|
|
10860
|
Choose the form in which Postback occur
|
|
10861
|
An ASP.NET page uses a Datagrid displays employee information.The Web application supports a large number of concurrent users, who will be saving data from the grid back to the database. It is important that the Web application doesn't overwhelm the Web Server.
|
|
10862
|
What is the name of default Viewstart Page in ASP.Net MVC?
|
|
10863
|
Does MVC 6 introduced new JSON project based structure?
|
|
10864
|
How to set Default Value to Hidden Input Box using ASP.Net MVC?
|
|
10865
|
Which Namespace is used for ASPX View Engine?
|
|
10866
|
You can use . . . . . class to send the result back in JSON format in MVC.
|
|
10867
|
In the model-view-controller (MVC) architecture, the view corresponds to the
|
|
10868
|
MVC is composed of three components:
|
|
10869
|
In which format data can be return from XML into table?
|
|
10870
|
Viewstart comes under which folder name ?
|
|
10871
|
. . . . . helps you to maintain data when you move from controller to view.
|
|
10872
|
Does TempData used to pass data from one page to another page in MVC?
|
|
10873
|
In the model-view-controller (MVC) architecture, the model defines the
|
|
10874
|
Which Namespaces are required to Data Annotation using MVC?
|
|
10875
|
You are designing an ASP.NET MVC 4 application that uses an Oracle database for persistence. What session configuration choices enable you to deploy your application on a web farm? (Choose all that apply.)
|
|
10876
|
What is the transaction code for "viewing background jobs"?
|
|
10877
|
Which of the below program type can only be started using a transaction code?
|
|
10878
|
What will be the output of following code ? > g <- function(x) { + a <- 3 + x+a+y + ## 'y' is a free variable + } > g(2)
|
|
10879
|
Types of Debugging in SAP
|
|
10880
|
Search help can not be attach to:
|
|
10881
|
________ functions can be “built which contain all of the necessary data for evaluating the function
|
|
10882
|
Which of the following language supports lexical scoping ?
|
|
10883
|
In an ABAP program, which of the following Processing blocks are not allowed?
|
|
10884
|
For controller action method . . . . . returns nothing as the result.
|
|
10885
|
_________ require you to pass a function whose argument is a vector of parameters
|
|
10886
|
Can we create change document history (CDHDR/CDPOS entries) for custom tables?
|
|
10887
|
What will be the output of the following code ? > nLL <- make.NegLogLik(normals, c(FALSE, 2)) > optimize(nLL, c(-1, 3))$minimum
|
|
10888
|
We have an option for events in the table maintenance generator.
|
|
10889
|
What will be the output of the following code ? > nLL <- make.NegLogLik(normals, c(1, FALSE)) > optimize(nLL, c(1e-6, 10))$minimum
|
|
10890
|
Transaction code for the maintaining table is __________.
|
|
10891
|
Among the below which is not the valid delivery class
|
|
10892
|
We can create the table maintenance with below types of screens.
|
|
10893
|
What will be the output of following code ? > g <- function(x) { + a <- 3 + x+a+y +## 'y' is a free variable + } > y <- 3 > g(2)
|
|
10894
|
________ loop over a list and evaluate a function on each element
|
|
10895
|
__________ function is same as lapply in R
|
|
10896
|
________ applies a function over the margins of an array.
|
|
10897
|
_______ is used to apply a function over subsets of a vector.
|
|
10898
|
lappy functions takes _________ arguments in R language.
|
|
10899
|
What will be the output of following code ? > x <- list(a = 1:5, b = rnorm(10)) > lapply(x, mean)
|
|
10900
|
Which of the following code will print the following result ? [[1]] [1] 2.263808 [[2]] [1] 1.314165 9.815635 [[3]] [1] 3.270137 5.069395 6.814425 [[4]] [1] 0.9916910 1.1890256 0.5043966 9.2925392
|
|
10901
|
What will be the output of the following code ? > x <- list(a = matrix(1:4, 2, 2), b = matrix(1:6, 3, 2)) > lapply(x, function(elt) { elt[,1] })
|
|
10902
|
Which of the following is valid body of split function ?
|
|
10903
|
What will be the output of the following code ? > f <- function(elt) { + elt[, 1] + } > lapply(x, f)
|
|
10904
|
What will be the output of following code ? > x <- list(a = 1:4, b = rnorm(10), c = rnorm(20, 1), d = rnorm(100, 5)) > sapply(x, mean)
|
|
10905
|
_________ is an indication that a fatal problem has occurred and execution of the function stops
|
|
10906
|
What would be the value of following expression ? > log(-2.3)
|
|
10907
|
Warnings are generated by the _________ function
|
|
10908
|
What will be the output of the following code ? > printmessage <- function(x) { +if(x > 0) + print("x is greater than zero") + else + print("x is less than or equal to zero") +invisible(x) + } > printmessage(1)
|
|
10909
|
What will be the value of following expression ?
|
|
10910
|
Which of the following code represents internal representation of a Date object ?
|
|
10911
|
When we create the table, text table will automatically gets created.
|
|
10912
|
Whenever we create and activate the table below index will get automatically created.
|
|
10913
|
What would be the output of the following code ? > printmessage2 <- function(x) { +if(is.na(x)) +print("x is a missing value!") + else if(x > 0) +print("x is greater than zero") +else + print("x is less than or equal to zero") + invisible(x) + } > printmessage2(NA)
|
|
10914
|
We cannot create data element without creating the domain
|
|
10915
|
Prerequisite for creating foreign key relationship are_____.
|
|
10916
|
What would be the output of the following code ? > printmessage <- function(x) { + if(x > 0) + print("x is greater than zero") + else + print("x is less than or equal to zero") + invisible(x) + } > printmessage(NA)
|
|
10917
|
Difference between the projection view and the database view.
|
|
10918
|
Single record buffering should be used when _________
|
|
10919
|
__________ prints out the function call stack after an error occurs.
|
|
10920
|
We need to create primary index explicitly:
|
|
10921
|
We can assign search help to the select option or parameter using below statement:
|
|
10922
|
________ allows you to insert debugging code into a function a specific places
|
|
10923
|
_______ allows you to modify the error behavior so that you can browse the function call stack
|
|
10924
|
Can we include customizing include or an append structure with Pooled or Cluster tables?
|
|
10925
|
What is the maximum number of structures that can be included in a table or structure?
|
|
10926
|
What would be the output of the following code ? > mean(x) Error in mean(x) : object 'x' not found > traceback()
|
|
10927
|
Text table should consist of?
|
|
10928
|
Without maintaining the following, the table cannot be activated:
|
|
10929
|
Can we create transaction code for the table maintenance?
|
|
10930
|
The recover() function will first print out the function call stack when an _______ occurs.
|
|
10931
|
We provide reference table and reference field to which type of fields?
|
|
10932
|
Conversion routine is assigned to ____?
|
|
10933
|
Value table can be assigned to ____?
|
|
10934
|
Lock object is created with the initial letter ________?
|
|
10935
|
Why ‘+’ sign is displayed instead of the field description while maintaining the table entries using tcode SM30?
|
|
10936
|
Search help is assigned to which level of the table?
|
|
10937
|
________ generate random Normal variates with a given mean and standard deviation
|
|
10938
|
EXTRACT statement
|
|
10939
|
What are field symbols?
|
|
10940
|
______ evaluate the cumulative distribution function for a Normal distribution
|
|
10941
|
The following are true about ‘EXEC SQL’.
|
|
10942
|
Open SQL vs. Native SQL
|
|
10943
|
_______ generate random Poisson variates with a given rate
|
|
10944
|
A database commit is triggered by
|
|
10945
|
A logical unit of work (LUW or transaction) begins
|
|
10946
|
Which of the following are true?
|
|
10947
|
Which of the following evaluate the Normal probability density (with a given mean/SD) at a point ?
|
|
10948
|
HIDE statement support deep structures?
|
|
10949
|
_________ is the most common probability distribution to work with.
|
|
10950
|
What is the difference between the TYPE and LIKE statements in data declaration?
|
|
10951
|
What will be the output of the following code ? > x <- rnorm(10) > x
|
|
10952
|
When using Open SQL statements in an ABAP/4 program, you must ensure the following.
|
|
10953
|
Can a view container have more than one view active at a time.
|
|
10954
|
What will be the output of the following code ? > x <- rnorm(10) > summary(x)
|
|
10955
|
Which of the Below is not a Valid Webdynpro UI element
|
|
10956
|
What is the right sequence of event trigger in Webdynpro
|
|
10957
|
which standard WD component is used to build ALV in Webdynpro
|
|
10958
|
Identify a Window Outbound Plug type to exit the View completely
|
|
10959
|
What will be the output of the following code ? > pnorm(2)
|
|
10960
|
_________ ensures reproducibility of the sequence of random numbers.
|
|
10961
|
A View in Webdynpro is associated with _______ in SAP GUI.
|
|
10962
|
Passing Parameters to webydnpro Application using the Applicatino URL are called_________Parameters
|
|
10963
|
which data type do you use to declare a visibility attribute in webdynpro
|
|
10964
|
5 Normal random numbers can be generated with rnorm() by setting seed value to :
|
|
10965
|
Identify a Cardinality type that is not part of webdynpro.
|
|
10966
|
Which method do you use to read the contents of a attribute attached to the context node.
|
|
10967
|
_______ function is used to simulate binary random variables.
|
|
10968
|
which method do you use to read the contents of a internal table displayed in the webdynpro window
|
|
10969
|
How do you access the attributes declared in component controller in the method of a view Ex: emp_id type numc10
|
|
10970
|
Where does the Business Logic exists in the Webdynpro Component
|
|
10971
|
What will be the output of the following code > > set.seed(10) > x <- rbinom(100, 1, 0.5) > str(x)
|
|
10972
|
A webdynpro Component consists of the below items except
|
|
10973
|
The UI Element and the Context Attributes of Webdynpro are linked. The process of doing this is called
|
|
10974
|
__________ distribution is commonly used to model data that come in the form of counts.
|
|
10975
|
The Webdynpro Programming model is based on
|
|
10976
|
What will be the output of the following code ? > rpois(10, 1) An
|
|
10977
|
What is the equivalent for Transaction in Webdynpro
|
|
10978
|
Which of the following code represents count with mean of 2 ?
|
|
10979
|
What is the Cardinality for the Node created for storing the Table
|
|
10980
|
Eliminate the Event that is not part of Webdynpro
|
|
10981
|
When starting the Debugger, what circumstance causes the runtime error DEBUGGINGNOTPOSSIBLE?
|
|
10982
|
It is possible to make multiple changes to data objects at the same time in the Debugger.
|
|
10983
|
All breakpoints are valid for the entire Debugger session, and all can be changed by the Debugger.
|
|
10984
|
Setting breakpoints for a method or function module within the Debugger allows the use of [F4] (value help) to find the correct name
|
|
10985
|
What is the maximum number of watchpoints that can exist at one time?
|
|
10986
|
A non-exclusive debugging mode means? (Select all that apply.)
|
|
10987
|
Under which circumstances will the classical Debugger start as the Debugger? (Select all that apply.)
|
|
10988
|
Both the classical Debugger and the new Debugger can be used on all ABAP code without restriction.
|
|
10989
|
A watchpoint stops program execution every time the condition specified is met
|
|
10990
|
The Debugger displays a maximum of eight data objects at one time.
|
|
10991
|
What are the differences between SAP memory and ABAP memory? (Multiple Answer)
|
|
10992
|
Is Session Method, Asynchronous or Synchronous?
|
|
10993
|
What is the difference between UPLOAD and WSUPLOAD? (Multiple Answer)
|
|
10994
|
How many types of tables exist in data dictionary? (Multiple Answer)
|
|
10995
|
What are the main events interactive reports have? (Multiple Answer)
|
|
10996
|
What is the difference between Synchronous and Asynchronous updates? (Multiple Answer)
|
|
10997
|
What are presentation and application servers in SAP? (Multiple Answer)
|
|
10998
|
What are the check tables and value tables? (Multiple Answer)
|
|
10999
|
How many lists can exist in parallel in an interactive reporting?
|
|
11000
|
Command flushes the database buffers
|
|
11001
|
What is true
|
|
11002
|
What is invalid attribute of a domain
|
|
11003
|
It is better to buffer a table when
|
|
11004
|
Sub query usually more efficient because:
|
|
11005
|
Search help can not be attach to:
|
|
11006
|
Full Buffering would be appropriate for ?
|
|
11007
|
What is the basic object of data Dictionary
|
|
11008
|
What kind of component of a business object are BAPIs ?
|
|
11009
|
What are the ways to link LDB to executable program?
|
|
11010
|
Which layer is NOT used in R/3 system?
|
|
11011
|
Which attribute is invalid for a domain?
|
|
11012
|
The message types are one of the following:
|
|
11013
|
What table is used to store all the Message Class Texts?
|
|
11014
|
Identify a layout that is not part of the Webdynpro Layout types
|
|
11015
|
Method used to sort an array alphabetically is known to be
|
|
11016
|
Numeric array values can be sorted through an array method named as
|
|
11017
|
In JavaScript, there are objects of
|
|
11018
|
An array can be sorted in a reverse manner through method
|
|
11019
|
To find highest number in an array, method to be used is
|
|
11020
|
A function with parameters cannot be decorated.
|
|
11021
|
The ______ symbol along with the name of the decorator function can be placed above the definition of the function to be decorated works as an alternate way for decorating a function.
|
|
11022
|
Is Tuple mutable?
|
|
11023
|
Which of the following has more precedance?
|
|
11024
|
. class test: def __init__(self): print "Hello World" def __init__(self): print "Bye World" obj=test()
|
|
11025
|
Python allows string slicing. What is the output of below code: s='cppbuzz chicago' print(s[3:5])
|
|
11026
|
Select the reserved keyword in python-
|
|
11027
|
Which Of The Following Keywords Mark The Beginning Of The Class Definition?
|
|
11028
|
What is the output of the following? print("Hello {0!r} and {0!s}".format('foo', 'bin'))
|
|
11029
|
Which of the following is not a developer’s privilege?
|
|
11030
|
Which of the following is not true about a sequence?
|
|
11031
|
Which of the following is true about the CREATE TABLE statement?
|
|
11032
|
Which of the following comparison operators could be used in a multiple row query?
|
|
11033
|
A subquery can be placed in which of the SQL clauses?
|
|
11034
|
What is returned by SUBSTR(‘TUTORIALS POINT’, -1, 1)?
|
|
11035
|
Which of the following is not true about SQL statements?
|
|
11036
|
Which is the operator, takes the results of two queries and returns only rows that appear in both result sets ?
|
|
11037
|
Which is the operator, takes the results of two queries and returns only rows that appear in both result sets ?
|
|
11038
|
The _______operation performs a set union of two “similarly structured†tables :
|
|
11039
|
Which one of the following is a procedural language ?
|
|
11040
|
A domain is atomic if elements of the domain are considered to be ____________ units.
|
|
11041
|
Logical design of database, is known to be
|
|
11042
|
Query languages used in practice includes
|
|
11043
|
Contents of a relation instance may change with time as relation :
|
|
11044
|
A table is a collection of relationships, there is a close correspondence between concept of :
|
|
11045
|
Minimal superkeys are called ?
|
|
11046
|
Query language is a language in which a user ?
|
|
11047
|
Primary key should be chosen such that its attribute values are
|
|
11048
|
In a relational Database a referential integrity constraint cab be specified with the help of ;
|
|
11049
|
What is the full form of RDBMS ?
|
|
11050
|
The union of primary keys of the related entity sets becomes a -------------------------- of the relation ?
|
|
11051
|
Which is the false statement from the following ?
|
|
11052
|
The relational model is concerned with ?
|
|
11053
|
Address field of a person should not be part of primary key, since it is likely to ?
|
|
11054
|
In relational model, the row of table is known to be ?
|
|
11055
|
The term attribute refers to a ___________ of a table.
|
|
11056
|
A RDBMS consists a collection of ?
|
|
11057
|
Which function is offered by PHP for connecting to a postgreSQL?
|
|
11058
|
True or False? To enable continuous archiving, all you have to do is set archive_mode to ‘on’ in postgresql.conf
|
|
11059
|
True or false: With table inheritance child tables inherit primary and foreign key definitions from their parents
|
|
11060
|
When identifying rows uniquely, we use__________keys.
|
|
11061
|
The __________ database model has the advantage of being able to quickly discover all of the records of one type that are related to a specific record of another type by following the pointers from the starting record.
|
|
11062
|
WAL segment size is determined:
|
|
11063
|
True or False: PostgreSQL allows you to implement table inheritance. This should be defined with the special keyword INHERITIS in the table design.
|
|
11064
|
What is a TOAST file?
|
|
11065
|
What will be the output of the following code ? > set.seed(20) > x <- rnorm(100) > e <- rnorm(100, 0, 2) > y <- 0.5 + 2 * x + e > summary(y)
|
|
11066
|
________ is a systematic way to examine how much time is spent in different parts of a program.
|
|
11067
|
The _______ function computes the time (in seconds) needed to execute an expression.
|
|
11068
|
To create a database that supports UTF-8, the following command can be used:
|
|
11069
|
Which of the following is NOT a feature of user defined functions?
|
|
11070
|
The extension used for data encryption/decryption within PostgreSQL is:
|
|
11071
|
Which statement is not true about a PostgreSQL domain?
|
|
11072
|
The elapsed time may be ________ than the user time if your machine has multiple cores/processors
|
|
11073
|
True or false: When a table is created which uses a table name as a column type, not null constraints on the column type’s table definition are honored by the including table.
|
|
11074
|
True or False? When restoring a database backed up with pg_dump, it’s generally a good idea to enable WAL.
|
|
11075
|
True or false? Hash indexes are not crash-safe
|
|
11076
|
Parallel processing is done via __________ package can make the elapsed time smaller than the user time.
|
|
11077
|
Locks are recorded in:
|
|
11078
|
The syntax to view the indexes of an existing postgreSQL table is:
|
|
11079
|
You can time ________ expressions by wrapping them in curly braces within the call to system.time().
|
|
11080
|
True or False? To increase server performance, automated CHECKPOINT operations should be setup in cron or Task Scheduler.
|
|
11081
|
What is the difference between DO ‘some code…’ and EXECUTE ‘some code…’ statements?
|
|
11082
|
The profiler can be turned off by passing _________ to Rprof().
|
|
11083
|
Which of the following is not a valid integer array?
|
|
11084
|
To copy a database from server1 to server2, you might use which of the following:
|
|
11085
|
What are the join strategies available to the postgreSQL planner when a SELECT query contains two or more relations?
|
|
11086
|
What is “index bloat�
|
|
11087
|
True or False? PostgreSQL supports Index Only Scans.
|
|
11088
|
_______ divides the time spend in each function by the total run time
|
|
11089
|
Which is NOT true of array indexes?
|
|
11090
|
By default, in what subdirectory of the database data directory are WAL logs contained?
|
|
11091
|
What does MCV stand for?
|
|
11092
|
Which of the following function actually fits the linear model ?
|
|
11093
|
Bob works for StegaCorp. His workstation’s IP address is 10.5.34.8. He needs access to a database called “partners†directly from his workstation. Which of the following is the correct entry in pg_hba.conf?
|
|
11094
|
_________ time is time charged to the CPU(s) for the R expression.
|
|
11095
|
True or False? Dynamic Tracing is enabled by default at compile time.
|
|
11096
|
In order to echo all input from script, you use the ________ psql command.
|
|
11097
|
The final bit of output that summaryRprof() provides is the ______ interval and the total runtime.
|
|
11098
|
To restore a PostgreSQL backup created with pg_dump, the following may be used:
|
|
11099
|
Which of the following statement gives sampling interval ?
|
|
11100
|
Advisory locks are allocated out of a shared memory pool whose size is defined by the configuration variables….
|
|
11101
|
What command turns on timing?
|
|
11102
|
Which of the following code is not profiled ?
|
|
11103
|
Which statement is true about PostgreSQL data types?
|
|
11104
|
_______ grammar makes a clear distinction between your data and what gets displayed on the screen or page.
|
|
11105
|
This is used to determine how text is stored and sorted within PostgreSQL?
|
|
11106
|
True or False? Only the administrator can make use of tablespaces.
|
|
11107
|
When looking at ‘ps’ output on a unix system, you see the following: postgres 1016 0.1 2.4 6532 3080 pts/1 SN 13:19 0:00 postgres: tgl regression [local] idle in transaction What does “idle in transaction†mean?
|
|
11108
|
Asynchronous Commits:
|
|
11109
|
The rule system:
|
|
11110
|
To prevent transaction wraparound, a VACUUM operation should be run on every table no less than once every:
|
|
11111
|
Which of the following cuts numeric vector into intervals of equal length ?
|
|
11112
|
What command allows you to edit PostgreSQL queries in your favorite editor ?
|
|
11113
|
Which of the following is a plot to investigate the order in which observations were recorded ?
|
|
11114
|
________ is used for translating between qplot and base graphics.
|
|
11115
|
Which of the following creates fluctuation plot ?
|
|
11116
|
What does the following statement do? CREATE INDEX lower_title_idx ON books ((lower(title)));
|
|
11117
|
________ is used to create a plot to illustrate patterns of missing values.
|
|
11118
|
To create a database in PostgreSQL, you must have the special CREATEDB privilege or
|
|
11119
|
_________ generate aesthetic mappings that describe how variables in the data are.
|
|
11120
|
The value NULL, in database terminology, means?
|
|
11121
|
To describe a table in PostgreSQL which of the following is correct:
|
|
11122
|
______ generate aesthetic mappings from a string
|
|
11123
|
Query trees can be viewed in the server logs as long as which of the following configuration parameters are enabled?
|
|
11124
|
Unless you specify NOT NULL, PostgreSQL will assume that a column is:
|
|
11125
|
The core PostgreSQL source code includes what interfaces?
|
|
11126
|
True or False? Within a table, a single column may be encrypted.
|
|
11127
|
__________ create a complete ggplot appropriate to a particular data type
|
|
11128
|
________ is used for relative sizing of theme elements.
|
|
11129
|
_________ display contours of a 3d surface in 2d.
|
|
11130
|
______ display a smooth density estimate.
|
|
11131
|
____________ allow us to define formally in the database how different tables relate to each other.
|
|
11132
|
PostgreSQL can be installed?
|
|
11133
|
What command tells PostgreSQL that all of the changes you made to a database should become permanent?
|
|
11134
|
Which of the following draws nothing.?
|
|
11135
|
PostgreSQL runs on:
|
|
11136
|
What is the wrapper around the SQL command CREATE DATABASE?
|
|
11137
|
The SQL condition for pattern matching is?
|
|
11138
|
PostgreSQL has many modern features including:
|
|
11139
|
_________ describe the type of plot you will produce.
|
|
11140
|
With PostgreSQL, you can access data by
|
|
11141
|
PostgreSQL used what model of communication?
|
|
11142
|
We add data to PostgreSQL by using which statement?
|
|
11143
|
When retrieving data in a particular table, we use the_____________ statement.
|
|
11144
|
PostgreSQL is:
|
|
11145
|
PostgreSQL is
|
|
11146
|
The heart of SQL is the __________ statement.
|
|
11147
|
In PostgreSQL, a named collection of tables is called what?
|
|
11148
|
The basic psql command to list tables is?
|
|
11149
|
The most common method to get data into a table is to use what command?
|
|
11150
|
Which of the following best describes a role:
|
|
11151
|
What do you call the application that makes requests of the PostgreSQL server?
|
|
11152
|
True or False? When using a SELECT statement on a table, or group of tables, those resources are locked exclusively.
|
|
11153
|
True or False? VACUUM FULL shrinks indexes, optimizing database performance.
|
|
11154
|
When you want to use a join between columns that are in the same table, you use what type of join?
|
|
11155
|
A meta-command always begins with what?
|
|
11156
|
PostgreSQL can be used from just about any major programming language, including C, C++, Perl, Python, Java, Tcl, and PHP
|
|
11157
|
Which of the algorithmic languages is not lexical scoping standardized in?
|
|
11158
|
What is the purpose of the dynamic scoping?
|
|
11159
|
What is the opposite approach to the lexical scoping?
|
|
11160
|
What is the fundamental rule of lexical scoping?
|
|
11161
|
Which of the following uses a lot of CPU cycles?
|
|
11162
|
Which of the following is not an example of closures?
|
|
11163
|
What is closure?
|
|
11164
|
What must be done in order to implement Lexical Scoping?
|
|
11165
|
What kind of scoping does JavaScript use?
|
|
11166
|
If you have a function f and an object o, you can define a method named m of o with ________
|
|
11167
|
Do functions in JavaScript necessarily return a value?
|
|
11168
|
Which is an equivalent code to invoke a function m of class o that expects two arguments x and y?
|
|
11169
|
Which keyword is used to define the function in javascript?
|
|
11170
|
The function stops its execution when it encounters?
|
|
11171
|
A function with no return value is called ___________
|
|
11172
|
What will happen if a return statement does not have an associated expression?
|
|
11173
|
What is the purpose of a return statement in a function?
|
|
11174
|
When does the function name become optional in JavaScript?
|
|
11175
|
The function definitions in JavaScript begins with ____________
|
|
11176
|
The reduce and reduceRight methods follow a common operation called __________
|
|
11177
|
The primary purpose of the array map() function is that it __________
|
|
11178
|
What will happen if reverse() and join() methods are used simultaneously?
|
|
11179
|
The pop() method of the array does which of the following task?
|
|
11180
|
The basic purpose of the toLocaleString() is to _________
|
|
11181
|
The purpose of extensible attribute is to __________
|
|
11182
|
To determine whether one object is the prototype of (or is part of the prototype chain of) another object, one should use the ____________
|
|
11183
|
A linkage of series of prototype objects is called as ________
|
|
11184
|
The object has three object attributes namely ________
|
|
11185
|
The unordered collection of properties, each of which has a name and a value is called _________
|
|
11186
|
Among the keywords below, which one is not a statement?
|
|
11187
|
What will be the step of the interpreter in a jump statement when an exception is thrown?
|
|
11188
|
What will happen if the body of a for/in loop deletes a property that has not yet been enumerated?
|
|
11189
|
One of the special features of an interpreter in reference with the for loop is that ___________
|
|
11190
|
What are the three important manipulations done in a for loop on a loop variable?
|
|
11191
|
The enumeration order becomes implementation dependent and non-interoperable if ___________
|
|
11192
|
The “var†and “function†are __________
|
|
11193
|
When an empty statement is encountered, a JavaScript interpreter __________
|
|
11194
|
What is a block statement in JavaScript?
|
|
11195
|
A conditional expression is also called a _______________
|
|
11196
|
JavaScript is a _______________ language.
|
|
11197
|
“An expression that can legally appear on the left side of an assignment expression.†is a well known explanation for variables, properties of objects, and elements of arrays. They are called ___________
|
|
11198
|
Among the following, which one is a ternary operator?
|
|
11199
|
Which of the operator is used to test if a particular property exists or not?
|
|
11200
|
What kind of expression is “new Point(2,3)�
|
|
11201
|
The expression of calling (or executing) a function or method in JavaScript is called ________
|
|
11202
|
The property of a primary expression is __________
|
|
11203
|
A function definition expression can be called as __________
|
|
11204
|
Assume that we have to convert “false†that is a non-string to string. The command that we use is (without invoking the “new†operator).
|
|
11205
|
The statement a===b refers to _________
|
|
11206
|
The snippet that has to be used to check if “a†is not equal to “null†is _________
|
|
11207
|
The escape sequence ‘\f’ stands for _________
|
|
11208
|
Which of the following is not considered as an error in JavaScript?
|
|
11209
|
JavaScript _________ when there is an indefinite or an infinite value during an arithmetic computation.
|
|
11210
|
__________ is interval represented by a vertical line, with a point in the middle.
|
|
11211
|
The generalised syntax for a real number representation is __________
|
|
11212
|
A hexadecimal literal begins with __________
|
|
11213
|
The type of a variable that is volatile is _______________
|
|
11214
|
Which of the following creates a new ggplot plot from a data frame ?
|
|
11215
|
Which of the following draws plot on current graphics device ?
|
|
11216
|
Which of the following create a set of identity mappings ?
|
|
11217
|
_________ is new package that makes it easy to “tidy†your data.
|
|
11218
|
A proper scripting language is a __________
|
|
11219
|
Which of the following Attribute is used to include External JS code inside your HTML Document?
|
|
11220
|
Which of the following is complementary to tidyr ?
|
|
11221
|
JavaScript can be written __________
|
|
11222
|
How many functions exist for tidying the data ?
|
|
11223
|
Which of the following function takes multiple columns ?
|
|
11224
|
JavaScript Code can be called by using ___________
|
|
11225
|
__________ uses regexp groups instead of a splitting pattern or position.
|
|
11226
|
Which attribute is used to specify that the script is executed when the page has finished parsing? (only for external scripts)
|
|
11227
|
JavaScript is ideal to ________
|
|
11228
|
A JavaScript program developed on a Unix Machine ________
|
|
11229
|
Which of the following d takes two columns and spreads them in to multiple columns ?
|
|
11230
|
The script tag must be placed in __________
|
|
11231
|
Spread function is known as ___________ in spreadsheets.
|
|
11232
|
The main purpose of a “Live Wire†in NetScape is to ________
|
|
11233
|
__________ is used when you have variables that form rows instead of columns.
|
|
11234
|
The web development environment (JavaScript) offers which standard construct for data validation of the input entered by the user.
|
|
11235
|
Which of the following merges two variables into one ?
|
|
11236
|
How many functions exist for wrangling the data with dplyr package ?
|
|
11237
|
________ function is similar to the existing subset() function in R
|
|
11238
|
The ______ operator allows you to string operations in a left-to-right fashion
|
|
11239
|
________ add new variables/columns or transform existing variables
|
|
11240
|
_________ extract a subset of rows from a data frame based on logical conditions.
|
|
11241
|
dplyr can be integrated with the ________ package for large fast tables
|
|
11242
|
The syntax of close method for document object is ________
|
|
11243
|
What is the role of exploratory graphs in data analysis ?
|
|
11244
|
The syntax of capture events method for document object is _______.
|
|
11245
|
The syntax of a blur method in a button object is _______.
|
|
11246
|
Which of the following is true about the base plotting system ?
|
|
11247
|
Which of the following is an example of a valid graphics device in R?
|
|
11248
|
The JavaScript exception is available to the Java code as an instance of _______.
|
|
11249
|
_________ is a wrapped Java array, accessed from within JavaScript code.
|
|
11250
|
______ class provides an interface for invoking JavaScript methods and examining JavaScript properties.
|
|
11251
|
When a JavaScript object is sent to Java, the runtime engine creates a Java wrapper of type ________.
|
|
11252
|
______ is the tainted property of a window object.
|
|
11253
|
To set up the window to capture all Click events, we use which of the following statement?
|
|
11254
|
JavaScript is interpreted by ______.
|
|
11255
|
The syntax of Eval is _______.
|
|
11256
|
____method evaluates a string of JavaScript code in the context of the specified object.
|
|
11257
|
Which of the following navigator object properties is the same in both Netscape and IE?
|
|
11258
|
What is the correct JavaScript syntax to write "Hello World"?
|
|
11259
|
How does JavaScript store dates in a date object?
|
|
11260
|
Which of the following communicates with server-side CGI scripts through HTML form submissions and can be written without the use of JavaScript?
|
|
11261
|
What is the programming philosophy that argues that content and behaviour should as much as possible be kept separate?
|
|
11262
|
Client-side JavaScript code is embedded within HTML documents in
|
|
11263
|
JavaScript code between a pair of “script†tags are called
|
|
11264
|
Which of the following are not advanced services?
|
|
11265
|
The HTML5 specification includes
|
|
11266
|
The service(s) that enables networking through scripted HTTP requests is
|
|
11267
|
The behaviour of the document elements can be defined by
|
|
11268
|
JavaScript is ______ Side scripting language.
|
|
11269
|
JavaScript is ______ language.
|
|
11270
|
Is JavaScript case-sensitive?
|
|
11271
|
What will the following code return: Boolean(10 > 9)
|
|
11272
|
Which operator is used to assign a value to a variable?
|
|
11273
|
How do you declare a JavaScript variable?
|
|
11274
|
Which event occurs when the user clicks on an HTML element?
|
|
11275
|
How can you detect the client's browser name?
|
|
11276
|
JavaScript is the same as Java.
|
|
11277
|
What is the correct JavaScript syntax for opening a new window called "w2" ?
|
|
11278
|
How do you find the number with the highest value of x and y?
|
|
11279
|
How do you round the number 7.25, to the nearest integer?
|
|
11280
|
What is the correct way to write a JavaScript array?
|
|
11281
|
How to insert a comment that has more than one line?
|
|
11282
|
How can you add a comment in a JavaScript?
|
|
11283
|
How does a FOR loop start?
|
|
11284
|
How does a WHILE loop start?
|
|
11285
|
How to write an IF statement for executing some code if "i" is NOT equal to 5?
|
|
11286
|
How to write an IF statement in JavaScript?
|
|
11287
|
How do you call a function named "myFunction"?
|
|
11288
|
How do you create a function in JavaScript?
|
|
11289
|
How do you write "Hello World" in an alert box?
|
|
11290
|
The external JavaScript file must contain the <script> tag.
|
|
11291
|
What is the correct syntax for referring to an external script called "xxx.js"?
|
|
11292
|
Where is the correct place to insert a JavaScript?
|
|
11293
|
What is the correct JavaScript syntax to change the content of the HTML element below? (<p id="demo">This is a demonstration.</p>)
|
|
11294
|
Which was the first browser to support JavaScript ?
|
|
11295
|
We use _______ style comment to prevent showing Java Script as Content in the old browsers.
|
|
11296
|
All modern browsers supports JS.
|
|
11297
|
The async attribute can be set in the following ways -
|
|
11298
|
______ attribute is used to specify the character encoding used in an external script file.
|
|
11299
|
Which attribute is used to specifies that the script is executed when the page has finished parsing (only for external scripts)
|
|
11300
|
Which of the following Attribute is used to include External JS code inside your HTML Document -
|
|
11301
|
It is good programming procedure to include JS in a external sheet and make it available than writing inside HTML.
|
|
11302
|
It is good to include JS code inside footer section in order to speed up the Page loading time of Webpage.
|
|
11303
|
JS code included inside head section is loaded before loading page.
|
|
11304
|
We cannot Place JS Code in the body tag . Say true/false.
|
|
11305
|
Select all the correct option(s). State the correct place of JS Code inside HTML -
|
|
11306
|
JavaScript Code can be called by using _________.
|
|
11307
|
We can embed JS code inside HTML directly ?
|
|
11308
|
Local Browser used for validations on the Web Pages uses __________.
|
|
11309
|
Choose appropriate Option(s) : JavaScript is also called as _____________.
|
|
11310
|
Why JavaScript is called as Lightweight Programming Language ?
|
|
11311
|
JavaScript Code is written inside file having extension __________.
|
|
11312
|
Cost for Using JavaScript in your HTML is _________ .
|
|
11313
|
JavaScript is an ________ language.
|
|
11314
|
Select Appropriate Option(s) : JavaScript is can be written -
|
|
11315
|
JavaScript is designed for following purpose -
|
|
11316
|
JavaScript is ______ Side Scripting Language.
|
|
11317
|
Javascript is _________ language.
|
|
11318
|
Which was the first browser to support JavaScript?
|
|
11319
|
Predict the output of the following JavaScript Code.(<script type="text/javascript"> <!-- document.write("Hello"); //--> </script> )
|
|
11320
|
JavaScript is ________ language.
|
|
11321
|
Predict the output on the console for the following JavaScript code.(<script>function geek() { if(true) { var a = 5;} document.write(a); } geek(); </script> )
|
|
11322
|
JavaScript is a ________ Side Scripting Language.
|
|
11323
|
Which function of an Array object calls a function for each element in the array?
|
|
11324
|
Which of the following is an advantage of using JavaScript?
|
|
11325
|
Predict the output on the console for the following JavaScript code.(<script> let geek = 'GeeksforGeeks'; console.log(typeof geek); geek=1; console.log(typeof geek); </script> )
|
|
11326
|
Predict the output on the console for the following JavaScript code.(<script> let myName = "Geek"; let myCity = "Geekistan"; console.log(`My name is ${myName}. My favorite city is ${myCity}.`) </script> )
|
|
11327
|
In JavaScript, we do not have datatypes like integer and float. What is the function that can be used to check if the number is an integer or not?
|
|
11328
|
What is the method in JavaScript used to remove the whitespace at the beginning and end of any string ?
|
|
11329
|
What will be the command to print the number of characters in the string (“GeeksforGeeks�)
|
|
11330
|
What will be the output of the following code?(<script> document.write(typeof(24.49)); </script> )
|
|
11331
|
How to initialize an array in JavaScript?
|
|
11332
|
What is the JavaScript syntax for printing values in Console?
|
|
11333
|
How to insert a multi-line comment in JavaScript?
|
|
11334
|
What is the correct syntax for adding comments in JavaScript?
|
|
11335
|
How to write an ‘if’ statement for executing some code.(If “i†is NOT equal to 8?)
|
|
11336
|
How is the function called in JavaScript?
|
|
11337
|
What is the syntax for creating a function in JavaScript named as Geekfunc?
|
|
11338
|
Predict the output of the following JavaScript code.(<script type="text/javascript" language="javascript"> var x=5; var y=6; var res=eval("x*y"); document.write(res); </script>)
|
|
11339
|
Predict the output of the following JavaScript code.(<script type="text/javascript" language="javascript"> var a = "GeeksforGeeks"; var result = a.substring(4, 5); document.write(result); </script>)
|
|
11340
|
Which of the following is not a reserved word in JavaScript?
|
|
11341
|
Predict the output of the following JavaScript code.(<script type="text/javascript"> var a="GeeksforGeeks"; var x=a.lastIndexOf("G"); document.write(x); </script> )
|
|
11342
|
Predict the output of the following JavaScript code.(<script type="text/javascript"> a = 8 + "8"; document.write(a); </script> )
|
|
11343
|
The external JavaScript file must contain <script> tag. True or False?
|
|
11344
|
What is the correct syntax for referring to an external script called “geek.js�
|
|
11345
|
Which of the following is the correct syntax to display “GeeksforGeeks†in an alert box using JavaScript?
|
|
11346
|
Choose the correct JavaScript syntax to change the content of the following HTML code.(<p id="geek">GeeksforGeeks</p>)
|
|
11347
|
What is the HTML tag under which one can write the JavaScript code?
|
|
11348
|
Bitmapped file formats can be most useful for
|
|
11349
|
Which of the following functions is typically used to add elements to a plot in the base graphics system?
|
|
11350
|
Which function opens the screen graphics device for the Mac ?
|
|
11351
|
What does the ‘pch’ option to par() control ?
|
|
11352
|
If I want to save a plot to a PDF file, which of the following is a correct way of doing that?
|
|
11353
|
__________ produces box-and-whisker plots.
|
|
11354
|
What command is used to count the total number of lines, words, and characters contained in a file?
|
|
11355
|
__________ produces bivariate scatterplots or time-series plots.
|
|
11356
|
Annotation of plots in any plotting system involves adding points, lines, or text to the plot, in addition to customizing axis labels or adding titles. Different plotting systems have different sets of functions for annotating plots in this way. Which of the following functions can be used to annotate the panels in a multi-panel lattice plot?
|
|
11357
|
____________ produces one-dimensional scatterplots.
|
|
11358
|
What are the main features of UNIX?
|
|
11359
|
The advantage of binary files over text files is that
|
|
11360
|
which of the following functions can be used to finely control the appearance of all lattice plots ?
|
|
11361
|
How will you assign the value of variable var2 to var1?
|
|
11362
|
The directory structure used in Unix file system is called
|
|
11363
|
Which of the following flags are set when ‘JMP’ instruction is executed?
|
|
11364
|
Unix is a
|
|
11365
|
For barchart and _________, non-trivial methods exist for tables and arrays, documented at barchart.table.
|
|
11366
|
Which command can be used to query for terminal type being in use?
|
|
11367
|
Which command is used to display the top of the file?
|
|
11368
|
What is a geom in the ggplot2 system ?
|
|
11369
|
What are positional parameters?
|
|
11370
|
To run the script, we should make it executable first by using _____
|
|
11371
|
Logical flag is applicable to which of the following plots ?
|
|
11372
|
___________ is used to determine what is plotted for each group.
|
|
11373
|
Which of the following code create n samples of size “size†with probability prob from the binomial ?
|
|
11374
|
Which of the following code create a n item vector of random normal deviates ?
|
|
11375
|
Which of the following statement can read csv files ?
|
|
11376
|
To block/allow regular users to send write messages to your session, you use:
|
|
11377
|
Which of the following statement read a tab or space delimited file ?
|
|
11378
|
newgrp will:
|
|
11379
|
In chgrp command, the letter you use to add a sticky bit (e.g., to prevent removal of files by non-owner from a directory) is:
|
|
11380
|
Will tar extract information about file permissions?
|
|
11381
|
which of the following statement chose those objects meeting a logical criterion ?
|
|
11382
|
The last privileged port (any port that can’t be opened by anyone else but the root user) is:
|
|
11383
|
Can `ip` in iproute2 take multiple commands in a row?
|
|
11384
|
Which of the following statement is another way to get a subset ?
|
|
11385
|
What file will show you how the kernel was started?
|
|
11386
|
Apart from SIGKILL, which other signal cannot be caught nor ignored?
|
|
11387
|
A user has a file called OriginalFile, and then creates a hard link to it by executing the following command (brackets not part of command): [ cp -l OriginalFile CopyOfFile ] Which of the following are true?
|
|
11388
|
Which of the following sort a dataframe by the order of the elements in B
|
|
11389
|
modprobe -d:
|
|
11390
|
Which of the following is Mac menu command ?
|
|
11391
|
What is the result of echo ‘$MyVar’ ?
|
|
11392
|
What does the command “set $(date)†do?
|
|
11393
|
In a file delimited by commas, what command will print the 3rd column of data:
|
|
11394
|
The cksum command will read from standard input if:
|
|
11395
|
_____ list the variables in the workspace
|
|
11396
|
Which command will tell you how long a system has been up and running since it was last booted?
|
|
11397
|
___________ remove all the variables from the workspace
|
|
11398
|
What is the maximum size of an ext3 file system?
|
|
11399
|
Which one of these lines will check if the directory “foo†exists and create it if it doesn’t?
|
|
11400
|
In POSIX-compatible shell, what will you see if you enter “echo foo*†when there are no files beginning with “foo†in the current directory?
|
|
11401
|
Which of the following code will drop the nth column ?
|
|
11402
|
To create hard-links instead of copies with the cp command, you use:
|
|
11403
|
Which command is used for initializing physical volume(hard disk, or partition) for LVM usage?
|
|
11404
|
What is the file /etc/nsswitch.conf?
|
|
11405
|
What is cgroups ?
|
|
11406
|
/bin/true is a command whose exit status is always:
|
|
11407
|
Which of the following code drop the ith and jth column ?
|
|
11408
|
Which of the following statement find cases with no missing values ?
|
|
11409
|
How are typical native code debuggers implemented?
|
|
11410
|
Man pages are written using what markup language?
|
|
11411
|
Which of the following commands shows routing table information?
|
|
11412
|
Which of the following statement is normal distribution ?
|
|
11413
|
If no filesystems are specified on the command line, and the _____ option is not specified, then the command “fsck†will default to checking filesystems in “/etc/fstab†serial order.
|
|
11414
|
As a non-privileged user, if you use ‘nice’, it will:
|
|
11415
|
which of the following statement gives cumulative sum ?
|
|
11416
|
Which of the following is uniform distribution ?
|
|
11417
|
What is the expected output of the following command: unset x; test -z $x && echo 1
|
|
11418
|
What is the purpose of the “tset†command?
|
|
11419
|
Which of the following tests each element of x for membership in y ?
|
|
11420
|
nfsstat will…
|
|
11421
|
The ________ command can be used to “kill†the ‘X server’.
|
|
11422
|
What does the Linux “yes†command do?
|
|
11423
|
Which of the following produces the variance covariance matrix ?
|
|
11424
|
You need which of the following access modes in order to cd to a system directory?
|
|
11425
|
To do unlimited precision arithmetic calculations from the shell, you use:
|
|
11426
|
Which of the following will reverse the order of values in x ?
|
|
11427
|
To format a device as an ext3 (journaled) Linux extended filesystem, you use the commands:
|
|
11428
|
How find the current system runlevel?
|
|
11429
|
‘mv -u’ will:
|
|
11430
|
newaliases will:
|
|
11431
|
mktemp -d’ will:
|
|
11432
|
Which of the following commands will correctly display the version of the Linux kernel running?
|
|
11433
|
Running “man –locale=LLL†instructs man to override the value of which of these functions?
|
|
11434
|
Which of the following statement applies the function (FUN) to either rows (1) or columns (2) on object X ?
|
|
11435
|
Which of the following statement finds the maximum for each column ?
|
|
11436
|
In the command ‘mv source target’, if source is a directory and target is an existing directory, the result will be to:
|
|
11437
|
Which of the following is a way to update mlocate’s index?
|
|
11438
|
which of the following statement tells the row with the minimum value for every column ?
|
|
11439
|
What happens if you try to write to /dev/null and /dev/zero?
|
|
11440
|
In bash you can use these quote marks for command substitution.
|
|
11441
|
In a BASH script this command line parameter contains the scripts own name:
|
|
11442
|
Which of the following finds row sums for each level of a grouping variable ?
|
|
11443
|
The acronym WINE stands for:
|
|
11444
|
What does permission 641 (octal) mean?
|
|
11445
|
The backslash on the command line indicates
|
|
11446
|
Given that the ip command is installed, what is the effect of the command ip a ls
|
|
11447
|
What does the following line mean when it is run in a script ‘#!/bin/bash’?
|
|
11448
|
What will “cat /proc/mdstat†tell you?
|
|
11449
|
To format a device as a Linux second extended filesystem (ext2), you use the command:
|
|
11450
|
Reset will…
|
|
11451
|
If the system is not in runlevel 0 or 6, before performing a power-off operation, the poweroff command will execute:
|
|
11452
|
Which of the following files ‘probably’ contains the default “windows manager settings�
|
|
11453
|
options (switches) to the ps command may start with:
|
|
11454
|
“Run Level Zero (0)†stands for _____.
|
|
11455
|
Which of the following sets the size of the outer margins for the graph ?
|
|
11456
|
Which of the following function is used for plotting histogram ?
|
|
11457
|
Which of the following will add the title “R language†to the graph ?
|
|
11458
|
______ let’s you perform SQL queries on your R data frames.
|
|
11459
|
______ splits a data frame and results an array (hence the da). Hopefully you’re getting the idea here.
|
|
11460
|
________ makes it incredibly easy to fit time series models like ARIMA, ARMA, AR, Exponential Smoothing, etc.
|
|
11461
|
________ provides needed string operators in R.
|
|
11462
|
Which of the following commands can be used to change the run level?
|
|
11463
|
To send a file to the printer spool queue, you use the command:
|
|
11464
|
What is not part of the Linux Kernel?
|
|
11465
|
Which of the following is similar to Moment.js ?
|
|
11466
|
The user smith issued the egrep “^[[:upper:]]†words.txt command. What does this command do?
|
|
11467
|
__________ modifies geom/stat aesthetic defaults for future plots
|
|
11468
|
Information about modules, like module dependency, and where certain types of modules reside in the filesystem, is found in:
|
|
11469
|
What source control system does the Linux kernel use?
|
|
11470
|
Which of the following is a library for statistical quality control. ?
|
|
11471
|
______ specializes in converting data from wide to long format.
|
|
11472
|
_________ is used to convert wide data to long data.
|
|
11473
|
For what purposes can socat be used?
|
|
11474
|
______ is used to view all packages installed.
|
|
11475
|
What does it mean when a variable is unbound?
|
|
11476
|
Executing the command “init 6†will _____.
|
|
11477
|
______ is used to get library location in R.
|
|
11478
|
How do you find all files in /etc which end in .conf?
|
|
11479
|
How to display current iptables rules?
|
|
11480
|
What will you get if you try to read from the pseudo-device /dev/null?
|
|
11481
|
________ is used to view packages currently loaded.
|
|
11482
|
To write a message to all users (on their terminals) over a network, you use:
|
|
11483
|
Can I have swap partition and swap file activated at the same time?
|
|
11484
|
rev will:
|
|
11485
|
________ contains tools for Approximate Bayesian Computation (ABC).
|
|
11486
|
How do you make a list of all filenames in the /tmp directory that the contain the text “userâ€, regardless of case?
|
|
11487
|
What program is launched by the kernel at system start up first?
|
|
11488
|
Which of the following package combine multi-dimensional arrays ?
|
|
11489
|
‘mkdir -m 444 any’ will:
|
|
11490
|
By default what file contains encrypted user passwords?
|
|
11491
|
SSH uses _____ to authenticate remote computers.
|
|
11492
|
pwconv will…
|
|
11493
|
What is the uid of root?
|
|
11494
|
What is “vmlinuz�
|
|
11495
|
To see the kernel routing tables, you do:
|
|
11496
|
What binary format do Linux Executables use?
|
|
11497
|
Single User Mode equivalent to _____.
|
|
11498
|
The mkraid command will:
|
|
11499
|
Write a command to list all files with 5 characters in the name.
|
|
11500
|
What does the $ represent within the context of a shell command?
|
|
11501
|
Which of the following contains functions for processing uniaxial minute-to-minute accelerometer data ?
|
|
11502
|
To search one or more files for matching lines, which command may be used?
|
|
11503
|
Which of the following file ‘probably’ contains the ‘user specific’ settings for the “windows manager�
|
|
11504
|
modprobe
|
|
11505
|
modinfo [options] ofile’ will:
|
|
11506
|
Typing the “cd†command at the shell prompt will take you to the _____.
|
|
11507
|
What, according to bc, is 2^2?
|
|
11508
|
How do you redirect stderr to stdout?
|
|
11509
|
_____ is not a ‘Terminal Emulator’.
|
|
11510
|
In a ps command output, the PPID displays the:
|
|
11511
|
The at command allows you to execute a command at:
|
|
11512
|
To display contents of files on standard output, you could use the command:
|
|
11513
|
To create one or more directories with the mkdir command, which permissions in the directory’s parent directory do you need?
|
|
11514
|
Which Run Level provides “Full multiuser mode with network and X display manager�
|
|
11515
|
True or false: The Linux OS is not affected by malware.
|
|
11516
|
What flag makes “ls -l†print file sizes in human readable format (e.g. 1K, 231M, 2G, etc)?
|
|
11517
|
To print the first 10 lines of one or more files to the standard output, you use the command:
|
|
11518
|
Is it possible to increase SWAP space without rebooting?
|
|
11519
|
printenv will:
|
|
11520
|
command1 | command2 will?
|
|
11521
|
The behavior of the system for each “runlevel†is available in the _____ file.
|
|
11522
|
If you use the rm command to accidentally delete a file, how can you get the file back?
|
|
11523
|
What does the “uname†command do?
|
|
11524
|
In a date +format, you add the hour in 24 hours format using:
|
|
11525
|
To report the amount of free disk space available on all mounted file systems you use the command:
|
|
11526
|
When does /tmp normally get cleaned out?
|
|
11527
|
The run level in a system can be configured in the file _____.
|
|
11528
|
What is the maximum length of a file name on Linux?
|
|
11529
|
Which of the following accurately describes a “ping?â€
|
|
11530
|
lsof command means:
|
|
11531
|
If DDD is a non empty directory, and you execute ‘rmdir DDD’, it will:
|
|
11532
|
You want to load the main kernel module for USB support. Which command would help you achieve this task?
|
|
11533
|
_____ command starts the default desktop environment.
|
|
11534
|
How to reveal detailed information about CPU?
|
|
11535
|
To access the value of an environment variable, we _____.
|
|
11536
|
How would you create an alias for the cat command?
|
|
11537
|
To use chown recursively, instead of using _recursive you can use:
|
|
11538
|
Which of the following is not an editor?
|
|
11539
|
If a host is called HHH, ‘rstat HHH’ will:
|
|
11540
|
Which is an example of a shell comment?
|
|
11541
|
What is a zombie process?
|
|
11542
|
LILO is _____.
|
|
11543
|
What does “chmod 755 file†accomplish?
|
|
11544
|
Why hasn’t ZFS been added to the Linux kernel?
|
|
11545
|
The command du -h ~
|
|
11546
|
What does the Linux “no†command do?
|
|
11547
|
The jobs command
|
|
11548
|
The command “free†reports on:
|
|
11549
|
Which return value from an ioctl request indicates success?
|
|
11550
|
the ‘-r’ switch to the mount command will:
|
|
11551
|
To read one or more files and type them on standard output, you use:
|
|
11552
|
Which tool is similar to find except that it uses an index to search?
|
|
11553
|
Consider using the command “cd /a/b/câ€, then executing “cd ..â€. What does this last command do?
|
|
11554
|
uname -a will output…
|
|
11555
|
LVM is…
|
|
11556
|
LILO…
|
|
11557
|
/etc/resolv.conf is …
|
|
11558
|
Which firewall is most commonly used on Linux?
|
|
11559
|
To transfer files in an insecure way to and from a remote network site host, you use the command:
|
|
11560
|
On Red Hat Linux and its derivatives, which of the following commands will be appropriate to check whether a particular “package†is installed or not?
|
|
11561
|
What command can be used to delete a directory, recursively searching for files and other directories and deleting them?
|
|
11562
|
As a privileged user, you may set the hostname with the command:
|
|
11563
|
With which userspace is Linux typically paired?
|
|
11564
|
Fedora Linux uses _____ packages.
|
|
11565
|
What is the right command to save file and exit in Vim?
|
|
11566
|
Add this symbol to a command to run it in the background
|
|
11567
|
To query DNS (Internet domain name) servers, you use the command:
|
|
11568
|
To start another shell under the current shell you use the command:
|
|
11569
|
Which answer assists you in finding help on the whois command?
|
|
11570
|
What is swap?
|
|
11571
|
How do you view the documentation for the command ‘kill’ in the Linux terminal?
|
|
11572
|
To repeat the last command in the bash shell history, type…
|
|
11573
|
The netstat command give information on:
|
|
11574
|
What does it means when the ps commands shows a ‘Z’ in the status column for a process?
|
|
11575
|
_____ is a Linux “desktop environmentâ€.
|
|
11576
|
Executing “pwd†in shell will return:
|
|
11577
|
The loaded modules in the kernel are listed in /proc/modules. You can get this list using the command:
|
|
11578
|
If you wanted to execute a shell command in the background, which character would you put at the end of the command line?
|
|
11579
|
mknod can create special file (used for sending or receiving data) of type:
|
|
11580
|
SSH stands for _____.
|
|
11581
|
What is the ssh command?
|
|
11582
|
What makes up a Linux kernel?
|
|
11583
|
The â€rm†command is used to:
|
|
11584
|
‘mkfs’ is used to:
|
|
11585
|
Which directory contains all the files needed to boot the Linux system?
|
|
11586
|
What will show you all the subdirectories of the current directory?
|
|
11587
|
The Linux Kernel was written by?
|
|
11588
|
How do you activate the noclobber shell option?
|
|
11589
|
Ubuntu is based on…
|
|
11590
|
What is GNOME ?
|
|
11591
|
mount -a’ will load all filesystems listed in:
|
|
11592
|
GRUB stands for _____.
|
|
11593
|
What does GRUB stand for?
|
|
11594
|
How do you show all processes being run by a particular user?
|
|
11595
|
What is the linux mascot?
|
|
11596
|
In Kernel Signals are used to notify a certain
|
|
11597
|
File name that handle interrupts in Linux is
|
|
11598
|
Linux is an
|
|
11599
|
In Linux a user can load or upload
|
|
11600
|
System structure of Linux is
|
|
11601
|
There can be only ----- job in foreground.
|
|
11602
|
To see the process status which command you will use?
|
|
11603
|
chmod 632 stuff means
|
|
11604
|
Read & Write permission means
|
|
11605
|
The command for changing the permission relating to files is
|
|
11606
|
What is the meaning of chmod 444 stuf?
|
|
11607
|
Output of 'sort > shoppinglist' is
|
|
11608
|
The symbol of wildcard(s) is
|
|
11609
|
ls j?e - output will be
|
|
11610
|
/dev is used for
|
|
11611
|
Output of the command 'wc <filename>' is
|
|
11612
|
Which command is used for character translation?
|
|
11613
|
What is the relation between grep & egrep
|
|
11614
|
The main function of grep is
|
|
11615
|
The --------- command sorts lines of all the named files.
|
|
11616
|
Which command is used to compare files?
|
|
11617
|
What will be the output of the command 'tail sample'?
|
|
11618
|
Which command is used to see the system date?
|
|
11619
|
who -h is used to
|
|
11620
|
Which command is used to see the content of a file
|
|
11621
|
mkdir - p is used for
|
|
11622
|
ls - t is used for
|
|
11623
|
ls -o is used for
|
|
11624
|
Protocols used by Linux are
|
|
11625
|
Linux is a ---------------Operating System
|
|
11626
|
To delete user the command is
|
|
11627
|
The encrypted password is stored in which field of /etc/password file ?
|
|
11628
|
To give all permission to a file to all users the command is all of the above
|
|
11629
|
During Linux booting the init program is called by
|
|
11630
|
The X-Window system in Linux is a
|
|
11631
|
Name of the kernel file in Linux is
|
|
11632
|
The type of shell mostly used for Linux is
|
|
11633
|
Linux is a dedicated server
|
|
11634
|
To access a directory the minimum permission required is
|
|
11635
|
Home directory of root is
|
|
11636
|
An user can login without password
|
|
11637
|
______ gives information about an user
|
|
11638
|
_____ is used to change the file/folder permission
|
|
11639
|
_______ is used to rename files
|
|
11640
|
To remove a directory which is not empty ____ is used
|
|
11641
|
To unmount a filesystem ________ command is ised
|
|
11642
|
______ will add contents to an existing file
|
|
11643
|
The command to view the partition information is
|
|
11644
|
Samba password and user password are same
|
|
11645
|
For a user _______ is an autoexec.bat equivalent file in Linux
|
|
11646
|
A user is logged in on a terminal; root tries to delete the user. Will the user be deleted?
|
|
11647
|
init 6 is
|
|
11648
|
To get information about the Ethernet card, ___________ command is used
|
|
11649
|
In practical, at the most _____ terminals can be opened at a time
|
|
11650
|
To setup a Firewall, the command is
|
|
11651
|
All device files are stored in
|
|
11652
|
The mounted partition information is stored in
|
|
11653
|
Linux mount partition must be a primary partition
|
|
11654
|
When an user is deleted it home directory contents are also deleted
|
|
11655
|
If there is any problem with the command, the error is given by
|
|
11656
|
The core of Linux OS is also called
|
|
11657
|
To change the ownership of a file use
|
|
11658
|
__________ is used for selecting regression transformations
|
|
11659
|
In comm the 2nd column displays
|
|
11660
|
Linux is a
|
|
11661
|
Which of the following is an R package for the exploratory analysis of genetic and genomic data ?
|
|
11662
|
wc -l will give the
|
|
11663
|
______ specializes in functions for analytical Customer Relationship Management.
|
|
11664
|
sort file, will sort the contents of the file and the effect will be reflected in the file
|
|
11665
|
-wxrwx-x is equivalent to
|
|
11666
|
_________ searches for significant clusters in genetic data.
|
|
11667
|
Hidden file can be viewed using
|
|
11668
|
To create multiple directories in one shot ________ is used
|
|
11669
|
______ Uses Grieg-Smith method on 2 dimensional spatial data
|
|
11670
|
To search a pattern in a file _________ can be used
|
|
11671
|
The command to check a partition is
|
|
11672
|
______ finds K best paths in a given graph.
|
|
11673
|
While installing Linux, users can be created
|
|
11674
|
________ is a package for parsing, applying, and manipulating data cleaning rules
|
|
11675
|
Samba is actually a
|
|
11676
|
User can be assigned to a group while creating the user. The command for this is
|
|
11677
|
________ performs class prediction based on microarray data and clinical parameters
|
|
11678
|
To start graphics mode use
|
|
11679
|
To view all the installed RPM packages use
|
|
11680
|
Password is applied using
|
|
11681
|
Which of the following package provide namespace management functions not yet present in base R ?
|
|
11682
|
To check if a service is running, the command is
|
|
11683
|
Which of the following is used to analyze paleontological time-series ?
|
|
11684
|
A swap partition is actually
|
|
11685
|
__________ is used for the analysis of air pollution data.
|
|
11686
|
Default file system type of Linux is
|
|
11687
|
All run levels are stored in
|
|
11688
|
User passwords are stored in
|
|
11689
|
To delete an user along with its home directory, the command is
|
|
11690
|
cat > abc, if the requested file does not exist, error will be given by
|
|
11691
|
Linux kernel file name is
|
|
11692
|
_________ uniforms and customizes plots of packages ggplot2, graphics and lattice.
|
|
11693
|
Shell is a
|
|
11694
|
______ is used for Visualisation, verification and calibration of ternary probabilistic forecasts.
|
|
11695
|
The application, that communicates with application MongoDB by way of a client library, is called
|
|
11696
|
which field is always the first field in the document.?
|
|
11697
|
In which format MongoDB represents document structure?
|
|
11698
|
Which of the following is correct option ?
|
|
11699
|
Which is not a supported index type in MongoDB?
|
|
11700
|
A collection in MongoDB is a group of ......................
|
|
11701
|
what is MongoDB?
|
|
11702
|
in how much time the MongDB writes are written to the journal?
|
|
11703
|
A collection and a document in MongoDB is equivalent to............. concepts respectively.
|
|
11704
|
In which year the MongoDB was Initial release?
|
|
11705
|
Which of the foliowing is wrong statement -
|
|
11706
|
The MongoDB is written in .................... language.
|
|
11707
|
Which among the following syntax is used to create a reference for "Test" collection in Java?
|
|
11708
|
Which one of the following is correct?
|
|
11709
|
Which of the following is lattice command for producing boxplots ?
|
|
11710
|
Which sets also allow the routing of read operations to specific machines?
|
|
11711
|
Which of the following groups find the correlation matrix ?
|
|
11712
|
Which of the following is the recommended step to optimize query performance?
|
|
11713
|
Which of the following involves predicting a categorical response ?
|
|
11714
|
What should be the priority of member to prevent them from becoming primary?
|
|
11715
|
Which of the following package contains functions for reading and displaying satellite data for oceanographic applications with R ?
|
|
11716
|
What is the name of default storage engine in MongoDB?
|
|
11717
|
Which of the following dynamic schema phenomenon is made easier for the application by MongoDB?
|
|
11718
|
________ contains tools for Approximate Bayesian Computation (ABC).
|
|
11719
|
Which of the following syntax is used to install forecast package ?
|
|
11720
|
________ provides needed string operators in R.
|
|
11721
|
Which of the following may be used for linear regression ?
|
|
11722
|
Which of the following truncates real x to integers ?
|
|
11723
|
Which of the following is Mac menu command ?
|
|
11724
|
Which of the following function works similar to separate() ?
|
|
11725
|
Which of the following is an example of a vector graphics device in R?
|
|
11726
|
What is ggplot2 an implementation of ?
|
|
11727
|
Which of the following is discrete state calculator ?
|
|
11728
|
Which of the following is a differentiation related aesthetic ?
|
|
11729
|
Which among following is not a supported index type in MongoDB?
|
|
11730
|
You want to return maximum 5 matching documents that will return with only the _id, name, and address fields. Which of the following queries will you use?
|
|
11731
|
A collection in MongoDB is a group of:
|
|
11732
|
_______ member is used to support dedicated functions, such as backup or reporting.
|
|
11733
|
We search for fields, queries etc. in MongoDB using _________.
|
|
11734
|
Which of the following command queries the amount of storage used, the quantity of data contained in the database, object, collection, and index counters?
|
|
11735
|
Which of the following creates a new ggplot plot from a data frame ?
|
|
11736
|
system.time function returns an object of class _______ which contains two useful bits of information.
|
|
11737
|
What should be the priority of member to prevent them from becoming primary?
|
|
11738
|
How many methods exist for normalizing the data ?
|
|
11739
|
Which among the following is the way to access the different documents in the result set?
|
|
11740
|
What does the following query do when performed on the posts collection? db.posts.update({_id:1},{$set:{Author:Tom"}})
|
|
11741
|
ObjectId is a 12-byte BSON type, in which the last 3 bytes represent:
|
|
11742
|
What will be the output of the following code set.seed(10) x - rbinom(100, 1, 0.5) str(x)
|
|
11743
|
Which of the following statement is incorrect?
|
|
11744
|
Select the correct query to isplay user age in the descending order.
|
|
11745
|
A collection and a document in MongoDB is equivalent to which of the SQL concepts respectively?
|
|
11746
|
Which of the following statement will save the output to the file for following code ? a - data.frame(x = rnorm(100), y = runif(100)) b - c(3, 4.4, 1 / 3)
|
|
11747
|
Connections to text files can be created with the ________ function.
|
|
11748
|
Columns can be arranged in descending order too by using the special ____ operator.
|
|
11749
|
In a replica set, all write operations go to the set's primary that applies the write operation and then records the operations in a file called:
|
|
11750
|
What would be the output of the following code ? x - c("a", "b", "c", "c", "d", "a") x[c(1, 3, 4)]
|
|
11751
|
Which of the following statements is correct about mongoose in MongoDB?
|
|
11752
|
What would be the output of the following code ? x - 1:4 y - 6:9 x/y
|
|
11753
|
What would be the output of the following code ? x - 1:4 y - 6:9 z - x + y z
|
|
11754
|
What would be the output of the following code ? p - as.POSIXlt(x) names(unclass(p)) p$wday
|
|
11755
|
The _________ function is used to plot negative likelihood.
|
|
11756
|
A function, together with an environment, makes up what is called a ______ closure.
|
|
11757
|
Which of the following is multivariate version of lapply ?
|
|
11758
|
The __________ function returns a list of all the formal arguments of a function
|
|
11759
|
Which of the following is primary tool for debugging ?
|
|
11760
|
_______ is used to skip an iteration of a loop.
|
|
11761
|
Which will be the output of following code ? x - 3 switch(6, 2+2, mean(1:10), rnorm(5))
|
|
11762
|
What would be the output of the following code ? sqrt(-17)
|
|
11763
|
What would be the output of the following code ? m - matrix(nrow = 2, ncol = 3) dim(m)
|
|
11764
|
What would the following code print ? x - c("a", "b", "c") as.logical(x)
|
|
11765
|
Which of the following sorting is not supported by MongoDB ?
|
|
11766
|
Which of the following language is MongoDB written in ?
|
|
11767
|
What would be the output of the following code ? x - vector("list", length = 5) x
|
|
11768
|
Which of the following is a wide-column store ?
|
|
11769
|
Which of the following is a NoSQL Database Type ?
|
|
11770
|
ata frames can be converted to a matrix by calling data._______
|
|
11771
|
Point out the wrong statement :
|
|
11772
|
_____________ can be used for batch processing of data and aggregation operations.
|
|
11773
|
Point out the correct statement :
|
|
11774
|
MongoDB can be used as a ____________, taking advantage of load balancing and data replication features over multiple machines for storing files.
|
|
11775
|
Point out the correct statement :
|
|
11776
|
R Language functionality is divided into a number of ________
|
|
11777
|
Which of the following command will find the maximum value in the vector x, exclude the missing values
|
|
11778
|
Many quantitative analysts use R as their ____ tool?
|
|
11779
|
Vectors come in two parts _____ and _____.
|
|
11780
|
_________ and _________ are types of matrices functions?
|
|
11781
|
Which function is used to create the vector with more than one element?
|
|
11782
|
R is an interpreted language. It can be access through _____________ ?
|
|
11783
|
In R Language every operation has a ______ call?
|
|
11784
|
_______ command is used to skip an iteration of a loop.
|
|
11785
|
R was named partly after the first names of ____ R authors?
|
|
11786
|
_________ initiates an infinite loop right from the start.
|
|
11787
|
In 1991, R was created by Ross Ihaka and Robert Gentleman in the Department of Statistics at the University of
|
|
11788
|
Packages are useful in collecting sets into a _____ unit
|
|
11789
|
If I have two vectors x <- c(1,3, 5) and y <- c(3, 2, 10), what is produced by the expression rbind(x, y)?
|
|
11790
|
A key property of vectors in R language is that
|
|
11791
|
What function is used to test the missing observation in data frame
|
|
11792
|
In R language the following are all atomic data types EXCEPT
|
|
11793
|
Suppose I have a vector x <- 1:4 and y <- 2:3. What is produced by the expression x + y?
|
|
11794
|
The definition of free software consists of four freedoms (freedoms 0 through 3). Which of the following is NOT one of the freedoms that are part of the definition?
|
|
11795
|
Suppose I have a list defined as x <- list(2, “aâ€, “bâ€, TRUE). What does x[[2]] give me?
|
|
11796
|
_________ is function in R to get number of observation in a data frame
|
|
11797
|
Suppose I have a vector x <- c(3, 5, 1, 10, 12, 6) and I want to set all elements of this vector that are less than 6 to be equal to zero. What R code achieves this?
|
|
11798
|
If I execute the expression x <- 4 in R language, what is the class of the object “x†as determined by the “class()†function?
|
|
11799
|
What is the class of the object defined by the expression x <- c(4, “aâ€, TRUE)?
|
|
11800
|
How to obtain the transpose of a matrix in R?
|
|
11801
|
What is the output for the below expression all(NA==NA)?
|
|
11802
|
what is the syntax for creating scatterplot matrices.
|
|
11803
|
_______ command to create a histogram.
|
|
11804
|
What is the output of the command – paste(1:3,c(“xâ€,â€yâ€,â€zâ€),sep=â€â€) ?
|
|
11805
|
30) If I have two vectors x<- c(1,3, 5) and y<-c(3, 2), what is produced by the expression cbind(x, y)?
|
|
11806
|
The R language is a dialect of which of the following programming languages?
|
|
11807
|
Suppose we have two vectors p <- c(1,3, 5) and q <- c(3, 2, 10), what is produced by the expression rbind(x, y)?
|
|
11808
|
In R Language the following are all atomic data types EXCEPT
|
|
11809
|
The role of vector in R Programming is that
|
|
11810
|
What is the class of the object by the expression m <- p(7, "g", TRUE)?
|
|
11811
|
_______is function in R to get number of observation in a data.
|
|
11812
|
What function is used to test the missing observation in data?
|
|
11813
|
What will this code print to screen? f <- function() { x<-3 y<-x+3 return(c(x, y))} y
|
|
11814
|
What will this code return? x <- 1 f <- function() { y <- 2 return(c(x, y)) } f()
|
|
11815
|
The ______ operator allows you to string operations in a left-to-right fashion.
|
|
11816
|
Columns can be arranged in descending order too by ______operator.
|
|
11817
|
What is the syntax of the for loop ?
|
|
11818
|
R language support to______ indexing operators.
|
|
11819
|
What will be the output of the following code ? > x <- 3 > switch(2, 2+2, mean(1:10), rnorm(5))
|
|
11820
|
You need to connect one system with RFC to another System having three clients. Which of the following is true if all clients of the called system are to be connected to all clients of the calling ...
|
|
11821
|
You can change the UME properties using which of the following SAP Standard Tools?
|
|
11822
|
While configuring the SSO between ECC and EP, which program is used to maintain or check the setting for the Integration into Portal?
|
|
11823
|
While applying the Support Patch, it throws the error &quot;CANNOT_CREATE_COFILE&quot;. What is the solution to this problem?
|
|
11824
|
Which users CANNOT make adjustments to the repository during an upgrade?
|
|
11825
|
Which user is used for communication between the SAPCCMSR agent and the central monitoring system? Note that this user is a communication user with very specific authorizations.
|
|
11826
|
Which two RFC connections are tested when you run SLDCHECK Transaction Code?
|
|
11827
|
Which transaction code is used to stop/re-start a Java Instance via SAP GUI?
|
|
11828
|
Which tools are available for user administration under Java?
|
|
11829
|
Which steps are required (among others) to establish periodic data exchanges between the System Landscape Directory and the SAP Solution Manager system?
|
|
11830
|
Which statements concerning the transport of non-ABAP objects with the help of the ABAP Change and Transport System (CTS) are correct?
|
|
11831
|
Which services can you use to change the severity of log files?
|
|
11832
|
Which SAP Standard User is used to communicate between UME and ABAP User Management?
|
|
11833
|
Which RFC connections are used to establish a connection between Integration Server and System Landscape directory?
|
|
11834
|
Which parameter specifies the maximum size of a security audit file?
|
|
11835
|
Which parameter sets the storage location for TemSe (TEMporary SEquential Database) objects in the spool system?
|
|
11836
|
Which of the following statements concerning the Change and Transport System are true?
|
|
11837
|
Which of the following statements about connecting SAP systems to the System Landscape Directory (SLD) are correct?
|
|
11838
|
Which of the following should be monitored for Database performance?
|
|
11839
|
Which of the following requirements must be met to perform a modification in a SAP system?
|
|
11840
|
Which of the following reports is used to display a list of all Instance-specific parameters and system-wide parameters?
|
|
11841
|
Which of the following is the correct sequence of starting the SAP Web AS ABAP +Java?
|
|
11842
|
Which of the following is a Component of SAP NetWeaver Development Infrastructure (NWDI).
|
|
11843
|
Which of the following are characteristics of Upgrade Strategy Downtime-Minimized?
|
|
11844
|
Which of the following activities can be performed by using user management administration console in SAP User Management Engine (UME)?
|
|
11845
|
Which files are required to update JDI Software component?
|
|
11846
|
Which file of SAP gateway is used to control start-startup and registration of external RFC to secure the RFC connection?
|
|
11847
|
Which CCMS agent is used to configure in SAP NetWeaver Web AS ABAP+JAVA?
|
|
11848
|
Which blocked qRFC queues should be monitored in an XI/PI system?
|
|
11849
|
Which are the different Solution Manager Scenarios?
|
|
11850
|
Where is CSMCONF file stored at OS level (UNIX)?
|
|
11851
|
What UME Installation Options can you select during the installation of SAP Web Application Server AS Java?
|
|
11852
|
What tool is provided by SAP for monitoring the SAP Web AS Java and Java applications?
|
|
11853
|
What prerequisite must be met before applying the Support Package on the System?
|
|
11854
|
What kind of data can be retrieved from SLD?
|
|
11855
|
What is the sequence in which a SAP system reads a profile during startup?
|
|
11856
|
What is the default value of the parameter &quot;rstr/max_filesize_MB&quot; SAP Enterprise Core Component 5.0 (SAP ECC)?
|
|
11857
|
What is an RFC used for?
|
|
11858
|
What functions are available in SAP NetWeaver Administrator (NWA)?
|
|
11859
|
What could be the possible causes of a transport request taking a long time to import in QAS system?
|
|
11860
|
What components can be installed on the SAP Web as ABAP + Java?
|
|
11861
|
What are the sources of User Persistence Store in UME in Enterprise Portal?
|
|
11862
|
What are the functions of the Visual administrator in SAP web?
|
|
11863
|
What are the different tools that are provided by the SAP to monitor and administer Java Instance processes from the OS level (UNIX Platform)?
|
|
11864
|
What are the different levels of protection for communication connection secured with SNC?
|
|
11865
|
What are the Contents of the System Landscape Directory?
|
|
11866
|
What are the benefits of configuring trusted relationship between SAP Systems?
|
|
11867
|
What are different status a profile can have in SAP System.
|
|
11868
|
Through which functional module can we switch the operation mode?
|
|
11869
|
The SAP software component designed for registering the software components of your whole system landscape is known as _____________.
|
|
11870
|
The logging and tracing infrastructure for SAP Web AS Java consists of ________
|
|
11871
|
SAP Web AS JAVA system is restarting after 30 minutes again and again. What could the problem be?
|
|
11872
|
SAP system is not coming up and it is showing an error &quot;MsSClientHandle: no server provides service ENQ (4), requested from DEVSAPECC _DEV_01&quot; in dev_ms file. Choose the correct reason of error?
|
|
11873
|
SAP Logon Ticket used for authentication should contain:
|
|
11874
|
Local work process memory is used for:
|
|
11875
|
It is now peak production hours, the production system is hanging due to archive directory/filesystem being 100% full. There is a DDS4 autoloader connected directly to the database server dedicated...
|
|
11876
|
Instance SAP Management Console has 3 Dialog iInstances (Application Server) - D01, D02 and D03. One of the Instances - D01 shows Yellow color status while others are green. What does the Yellow co...
|
|
11877
|
In which sequence are the system parameters read from the specified locations by the system?
|
|
11878
|
In which scenario can SAP Web Dispatcher be used?
|
|
11879
|
In Web Dynpro, Navigation Modeler allows to change which of the following entities.
|
|
11880
|
In case of an error or issue while starting a Java Instance, which of the following log files or trace files can be used to find out the exact cause of the problem?
|
|
11881
|
If a user is already logged on to a logon group using logon load balancing, how are dialog work processes assigned to this user. Which of the following is correct?
|
|
11882
|
HTTP service is not running on Integration Server. This can cause connection problems, which in turn can cause the notification of the cache on the Integration Server to fail or messages which not ...
|
|
11883
|
How can you activate all ICF services for the PI systems?
|
|
11884
|
Given that modification adjustments for the ABAP Dictionary are being performed using transaction SPDD during a SAP system upgrade, which of the following statements are correct?
|
|
11885
|
For Integrated Planning, which of the following JCO destinations must be defined in the Web Dynpro Content Administrator of the J2EE Engine?
|
|
11886
|
By which Transaction code can you execute RTCCTOOL &amp; RSECNOTE in the SAP system?
|
|
11887
|
Before which phase of the Support Package Implementation can you reset the queue if import aborts or fails?
|
|
11888
|
Which standard function is used to clear memory allocated by the malloc() function?
|
|
11889
|
Which of the following standard functions is used to close a file?
|
|
11890
|
Which of the following sets of conversion statements may result in the loss of data?
|
|
11891
|
Which of the following is not a valid mode for opening a file?
|
|
11892
|
Which of the following is not a string function?
|
|
11893
|
Which of the following is not a file related function?
|
|
11894
|
Which of the following is a function for formatting data in memory?
|
|
11895
|
Which of the following declarations of structures is/are valid? 1) struct node { int count; char *word; struct node next; ...
|
|
11896
|
Which function will you use to write a formatted output to the file?
|
|
11897
|
Which function will convert a string into an integer?
|
|
11898
|
Which function will convert a string into a double precision quantity?
|
|
11899
|
Which function returns the current pointer position within a file?
|
|
11900
|
Which function allocates memory and initializes elements to 0?
|
|
11901
|
Which file header is to be included for file handling in a C program?
|
|
11902
|
What would be printed on the standard output as a result of the following code snippet? char i = &#39;A&#39;; char *j; j = &amp; i; *j = *j + 32; printf(&quot;%c&quot;,i);
|
|
11903
|
What would be printed on the standard output as a result of the following code snippet? #include&lt;stdio.h&gt; main() { unsigned char a=255; a = a+1; printf(&quot;%d&quot;,a); ret...
|
|
11904
|
What would be printed on the standard output as a result of the following code snippet? #define max(a, b) ((a) &gt; (b)?(a):(b)) main() { int a=4; float b=4.5; printf(&quot;%.2f
&quot;...
|
|
11905
|
What would be printed on the standard output as a result of the following code snippet? #define func(t, a, b) { t temp; temp=a; a=b; b=temp; } main() { int a=3, b=4; float c=4.5, d...
|
|
11906
|
What would be printed on the standard output as a result of the following code snippet? main() { int arr[10]; int a = sizeof(arr); printf(&quot;%d
&quot;,a); return 0; }
|
|
11907
|
What would be printed on the standard output as a result of the following code snippet? main() { enum {red, green, blue = 6, white}; printf(&quot;%d %d %d %d&quot;, red, green, blue, white); return 0; }
|
|
11908
|
What would be printed on the standard output as a result of the following code snippet? main() { char *pmessage = &quot;asdfgh&quot;; *pmessage++; printf(&quot;%s&quot;, pmessage); return 0; }
|
|
11909
|
What would be printed on the standard output as a result of the following code snippet? main() { int u = 1, v = 3; printf(&quot;%d %d&quot;,u,v); funct1(&amp;u,&amp;v); printf(&quot;%d %d
&quot;,u,v); } void func...
|
|
11910
|
What will be the output of the following program? #include &lt;assert.h&gt; main() { int n = 5; assert(n &gt; 3); //statement 1 n = n+2; assert(n &gt; 7);//statement 2 return 0; }
|
|
11911
|
What will be the output of following code? int main() { int i; i = 0; for (i = 1; i &lt;2; i++) { i++; printf( &quot;%d&quot;, i ); continue; ...
|
|
11912
|
What will be printed on the standard output as a result of the following code snippet? void main() { int i,j,k; i=4; j=30; k=0; k=j++/i++; ++k; printf(&quot;%d %d %d&quot;,i,j,k); }
|
|
11913
|
What will be printed on the standard output as a result of the following code snippet? void main() { int num1 = 30, num2 = 4; float result; result = (float)(num1/num2); ...
|
|
11914
|
What will be printed on the standard output as a result of the following code snippet? void main() { char arr[] = {&#39;R&#39;,&#39;A&#39;,&#39;M&#39;}; printf(&quot;%d&quot;,strlen(arr)); }
|
|
11915
|
What will be printed on the standard output as a result of the following code snippet? void func() { static int i = 1; int j = 1; i++; j++; printf(&quot;%d %d &quot;,i,j); } vo...
|
|
11916
|
What is wrong with the following statement? int func();
|
|
11917
|
What is the output of the following program ? main() { int u = 1, v = 3; printf(&quot;%d %d&quot;,u,v); funct1(&amp;u,&amp;v); printf(&quot; %d %d
&quot;,u,v); } void funct1(int *pu, int *pv) { *pu=0; *pv=0; re...
|
|
11918
|
What is the function to concatenate two strings?
|
|
11919
|
What does the argv[0] represent?
|
|
11920
|
Suppose there is a file a.dat which has to be opened in the read mode using the FILE pointer ptr1, what will be the correct syntax?
|
|
11921
|
Study the following code: int n = 2; int a[n]; What is the error in the above code?
|
|
11922
|
Study the following code where num is an integer array and n is the length of the array: for(i=0;i&lt;n-1;i++) { for(j=i+1;j&lt;n;j++) { ...
|
|
11923
|
Read the following two declaration statements. 1. #include &lt;stdio.h&gt; 2. #include &quot;stdio.h&quot; Which of the following statements pertaining to the above two statements are correct?
|
|
11924
|
Is the following statement correct? If not, why not? If yes, what is the size of the array? int array[][3] = { {1,2}, {2,3}, {3,4,2} };
|
|
11925
|
Identify the incorrect statement.
|
|
11926
|
Given the operators: 1) * 2) / 3) % What would be the order of precedence?
|
|
11927
|
Given the following array: int a[8] = {1,2,3,4,5,6,7,0}; what would be the output of printf(&quot;%d&quot;,a[4]); ?
|
|
11928
|
Given the following array: char books[][40]={ &quot;The Little World of Don Camillo&quot;, &quot;To Kill a Mockingbird&quot;, &quot;My ...
|
|
11929
|
Given the following array declaration: int a[2][3][4] what would be the number of elements in array a?
|
|
11930
|
Which property would be used to get the UDID of UIDevice on iOS?
|
|
11931
|
Which one is true regarding integrating and using custom fonts in an iOS application?
|
|
11932
|
Which one is the best resolution for the following error? &quot;A valid signing identity matching this profile could not be found in your keychain&quot;
|
|
11933
|
Which of the following will set the font of UISegmentedControl?
|
|
11934
|
Which of the following will set an image on UIButton?
|
|
11935
|
Which of the following will return the device&#39;s current location?
|
|
11936
|
Which of the following will change the placeholder text color in UITextField?
|
|
11937
|
Which of the following UILabel properties help adjust text within a UILabel?
|
|
11938
|
Which of the following properties would be used to draw a shadow under UIView?
|
|
11939
|
Which of the following is the correct way to transfer data from one view controller to another?
|
|
11940
|
Which of the following is the correct way to set UIButton&#39;s Highlight Tint color programmatically?
|
|
11941
|
Which of the following is the correct way to set the Navigation Bar Color of the Tab Bar Configure Menu?
|
|
11942
|
Which of the following is the correct way to set the font size of UIButton title label?
|
|
11943
|
Which of the following is the correct way to print out stack/trace to the console/log in Cocoa application?
|
|
11944
|
Which of the following is the correct way to get the value of the first object of a NsMutableArray stored in another NsMutableArray?
|
|
11945
|
Which of the following is the correct way to check whether the view controller view is loaded or visible?
|
|
11946
|
Which of the following is the best way to add a UIToolbar above keyboard?
|
|
11947
|
Which of the following is the best practice to find an active internet connection?
|
|
11948
|
Which of the following is the best practice to find active internet connection?
|
|
11949
|
Which of the following is not an Open Source Framework/Library?
|
|
11950
|
Which of the following is not a valid UIGestureRecognizer?
|
|
11951
|
Which of the following is not a valid Touch method with respect to Cocoa Touch programming?
|
|
11952
|
Which of the following is not a valid MPVolumeView method?
|
|
11953
|
Which of the following is not a valid MKAnnotationView property?
|
|
11954
|
Which of the following is not a valid icon size for any iOS device (iPhone, iPod, iPad)?
|
|
11955
|
Which of the following is best JSON library to be used in iOS applications?
|
|
11956
|
Which of the following frameworks is needed to apply a border to an object?
|
|
11957
|
Which of the following framework is needed to round corners of UILabel?
|
|
11958
|
Which of the following font packages are supported by Cocoa-Touch?
|
|
11959
|
Which of the following correctly sets an image on UIButton?
|
|
11960
|
Which of the following correctly describes when the - (void)viewDidUnload method is called?
|
|
11961
|
Which of the following code samples will declare a variable inside a block in Objective-C?
|
|
11962
|
Which of the following allows it to determine if an application is running on iPhone, or if it&#39;s running on an iPod Touch?
|
|
11963
|
Which method of Objective-C handles detecting the shake gesture on an iOS device?
|
|
11964
|
Which framework can be used to call SOAP web services in iOS applications?
|
|
11965
|
When does this behavior usually happen? &quot;Xcode Message: finished running &lt;my app&gt;&quot; on targeted device shows, but nothing happens
|
|
11966
|
What will be output of following code? NSLog(@&quot;%.2f&quot;,[[UIDevice currentDevice].systemVersion floatValue]);
|
|
11967
|
What property in info.plist handles the association of file types in an iPhone application?
|
|
11968
|
What is true about ARC and manual memory management?
|
|
11969
|
What is the use of performSelector in iOS?
|
|
11970
|
What is the maximum size of an iOS application?
|
|
11971
|
What is the difference between new and [[alloc]init] in iOS?
|
|
11972
|
What is the difference between assign and retain in Objective-C?
|
|
11973
|
What is the correct method to define a delegate object in an ARC Environment?
|
|
11974
|
What is the best way to show multiple lines text in the UILabel?
|
|
11975
|
What gets returned if XIB is not properly connected to a parent controller?
|
|
11976
|
What does the &quot;strong&quot; property attribute do?
|
|
11977
|
What does EXC_BAD_ACCESS signal received mean in Xcode?
|
|
11978
|
What does a &quot;__block&quot; type specifier mean?
|
|
11979
|
What could be the probable result if selector is unknown or undefined?
|
|
11980
|
Select which of the following is not UITableViewCellSelectionStyle values?
|
|
11981
|
Select all incorrect bundle ID(s):
|
|
11982
|
Is it possible to set multiple architecture from Build Settings tab in Xcode for a project?
|
|
11983
|
Is it possible to deploy beta build on any device?
|
|
11984
|
How can the application name of an iOS project be changed?
|
|
11985
|
How can it be detected if the app is running on an iPhone 5?
|
|
11986
|
How can an SMS be sent programmatically from the iPhone (iOS 4.0 or later)?
|
|
11987
|
With the two models Hive and Bee; when creating a belongs_to association from the Bee model to Hive, what is the foreign key generated on Bee?
|
|
11988
|
Which part of the MVC stack does ERB or HAML typically participate in?
|
|
11989
|
Which of the following will return a User object when used with a model which deals with a table named User?
|
|
11990
|
Which of the following will disable browser page caching in Rails?
|
|
11991
|
Which of the following validations in Rails checks for null fields?
|
|
11992
|
Which of the following statements is incorrect?
|
|
11993
|
Which of the following serves as a structural skeleton for all HTML pages created?
|
|
11994
|
Which of the following replaced the Prototype JavaScript library in Ruby on Rails as the default JavaScript library?
|
|
11995
|
Which of the following options, when passed as arguments, skips a particular validation?
|
|
11996
|
Which of the following options will disable the rendering of the view associated with a controller action?
|
|
11997
|
Which of the following options is used to create a form HTML in the erb files?
|
|
11998
|
Which of the following methods is used to check whether an object is valid or invalid?
|
|
11999
|
Which of the following items are stored in the models subdirectory?
|
|
12000
|
Which of the following is true about writing tests for a Ruby on Rails application?
|
|
12001
|
Which of the following is the default way that Rails seeds data for tests?
|
|
12002
|
Which of the following is the correct way to skip ActiveRecords in Rails 3?
|
|
12003
|
Which of the following is the correct way to rollback a migration?
|
|
12004
|
Which of the following is the correct way to know the Rails root directory path?
|
|
12005
|
Which of the following is the correct syntax for an input field of radio buttons in form_for?
|
|
12006
|
Which of the following is not true about log levels in Ruby on Rails?
|
|
12007
|
Which of the following is not a built-in Rails caching strategy used to reduce database calls?
|
|
12008
|
Which of the following HTML template languages are supported by Ruby?
|
|
12009
|
Which of the following correctly handles the currency field? A) add_column :items, :price, :decimal, :precision =&gt; 8, :scale =&gt; 2 B) add_money :items, :price, currency: { present: false }
|
|
12010
|
Which of the following controller actions (by default) are best suited to handle the GET HTTP request?
|
|
12011
|
Which of the following commands will test a particular test case, given that the tests are contained in the file test/unit/demo_test.rb, and the particular test case is test_one?
|
|
12012
|
Which of the following commands will clear out sample users from the development database?
|
|
12013
|
Which of the following commands adds the data model info to the model file?
|
|
12014
|
Which of the following code samples will get the index of |page| inside of a loop?
|
|
12015
|
Which of the following choices will write routes for the API versioning scenario described below? /api/users returns a 301 to /api/v2/users /api/v1/users returns a 200 of users index at version 1 ...
|
|
12016
|
Which of the following assertions are used in testing views?
|
|
12017
|
Which of the following actions is fired by default when a new controller is created?
|
|
12018
|
Which is the best way to add a page-specific JavaScript code in a Rails 3 app? &lt;%= f.radio_button :rating, &#39;positive&#39;, :onclick =&gt; &quot;$(&#39;some_div&#39;).show();&quot; %&gt;
|
|
12019
|
Which gem is used to install a debugger in Rails 3?
|
|
12020
|
When using full-page caching, what happens when an incoming request matches a page in the cache?
|
|
12021
|
When a new controller named &quot;admin2&quot; is created, the JS and the CSS files are created in:
|
|
12022
|
What is the Singleton design pattern?
|
|
12023
|
What is the recommended Rails way to iterate over records for display in a view?
|
|
12024
|
What is the output of the following Ruby code? puts &quot;The multiplication output of 10,10,2 is #{10*10*2}&quot;
|
|
12025
|
What is the output of the following code? $val = 20 print &quot;Sample Text
&quot; if $val
|
|
12026
|
What is the output of the following code? puts &quot;aeiou&quot;.sub(/[aeiou]/, &#39;*&#39;)
|
|
12027
|
What is the output of the following code? &amp;quot;test&amp;quot;*5
|
|
12028
|
What is the output of the following code in Ruby? x= &quot;A&quot; + &quot;B&quot; puts x y= &quot;C&quot; &lt;&lt; &quot;D&quot; puts y
|
|
12029
|
What is the difference between :dependent =&gt; :destroy and :dependent =&gt; :delete_all in Rails?
|
|
12030
|
What is the difference between _url and _path while being used in routes?
|
|
12031
|
What is the convention for methods which end with a question mark? e.g. #all?, #kind_of?, directory?
|
|
12032
|
What is the best way to get the current request URL in Rails?
|
|
12033
|
What is the behavior of class variables with subclasses?
|
|
12034
|
What is output of following statements? 1) &quot;&quot;.nil? == &quot;&quot;.empty? &amp;&amp; &quot;&quot;.blank? == &quot;&quot;.empty? 2) !&quot;&quot;.nil? == &quot;&quot;.empty? &amp;&amp; &quot;&quot;.blank? == &quot;&quot;.empty? 3) nil.nil? == nil.empty? &amp;&amp; nil.blank? == nil.empty? 4)...
|
|
12035
|
What is green-threading?
|
|
12036
|
What is difference between &quot;has_one&quot; and &quot;belong_to&quot;?
|
|
12037
|
What is best way to create primary key as a string field instead of integer in rails.
|
|
12038
|
What exception cannot be handled with the rescue_from method in the application controller? e.g class ApplicationControllers &lt; ActionController::Base rescue_from Exception, with: error_handler ...
|
|
12039
|
What does the 4xx series of HTTP errors represent?
|
|
12040
|
What does REST stand for?
|
|
12041
|
What declaration would you use to set the layout for a controller?
|
|
12042
|
What component of Rails are tested with unit tests?
|
|
12043
|
Using ERB for views, what filename should be given to a partial called &#39;login&#39;?
|
|
12044
|
Users who are new to MVC design often ask how to query data from Views. Is this possible? And if so, is this a good idea?
|
|
12045
|
Unit tests are used to test which of the following components of Ruby on Rails?
|
|
12046
|
There is a table named Product in a Rails application. The program is required to fetch any 5 rows where the productid is 2. Which of the following is the correct option to perform this action?
|
|
12047
|
The =~ operator is used to do inline Regular Expression matching, for instance: &quot;function&quot; =~ /fun/ &quot;function&quot; =~ /dinosaurs/ What are possible return values for the =~ matcher?
|
|
12048
|
Suppose a model is created as follows: rails generate model Sales rake db:migrate What would be the best way to completely undo these changes, assuming nothing else has changed in the mean...
|
|
12049
|
Select all incorrect statements regarding the Ruby Version Manager (RVM):
|
|
12050
|
Rails automatically requires certain files in an application. Which of the following files are automatically included without an explicit &#39;require&#39; being necessary?
|
|
12051
|
Is an AJAX call synchronous or asynchronous?
|
|
12052
|
In the case of Rails application performance optimization, select all valid ways to do assets compilation:
|
|
12053
|
In order to enable locking on a table, which of the following columns is added?
|
|
12054
|
In a Rails Migration, which of the following will make a column unique, and then have it indexed?
|
|
12055
|
In a Rails application, the developmental and production configuration are stored in the:
|
|
12056
|
In a Rails application, a Gemfile needs to be modified to make use of sqlite3-ruby gems. Which of the following options will use these gems, as per the new Gemfile?
|
|
12057
|
In a has_many association, what is the difference between build and new? // user.rb has_many :posts // post.rb belongs_to :user
|
|
12058
|
If a model called BlogComment is defined, what would its DB table be called?
|
|
12059
|
If a method #decoupage(n) is described as O(n^2), what does that mean?
|
|
12060
|
If a float is added to an integer, what is the class of the resulting number? i.e. 1.0 + 2
|
|
12061
|
If a controller is named &quot;Users&quot;, what would its helpers module be called?
|
|
12062
|
How can a value be stored so that it&#39;s shared across an entire request (i.e. make it accessible in controllers, views and models)?
|
|
12063
|
How can a partial called &quot;cart&quot; be rendered from a controller called &quot;ProductsController&quot;, assuming the partial is in a directory called &quot;shared&quot;?
|
|
12064
|
Given the following code, where is the &quot;party!&quot; method available? module PartyAnimal def self.party! puts &quot;Hard! Better! Faster! Stronger!&quot; end end class Person include PartyA...
|
|
12065
|
Given below are two statements regarding the Ruby programming language: Statement X: &quot;redo&quot; restarts an iteration of the most internal loop, without checking loop condition. Statement Y: &quot;retry&quot; r...
|
|
12066
|
For the String class, what&#39;s the difference between &quot;#slice&quot; and &quot;#slice!&quot;?
|
|
12067
|
Consider the following information for a User view: user_path named route with value &quot;/users/&quot; @user = 1 Now, consider the following code in the HTML erb template: &lt;%= link_to user_path(@user)...
|
|
12068
|
Consider the following code snippet: def index render end The corresponding index.html.erb view is as following: &lt;html&gt; &lt;head&gt; &lt;title&gt;Ruby on Rails sample application | &lt;%=@title%&gt;&lt;/title&gt; ...
|
|
12069
|
Choose the best way to implement sessions in Rails 3: A) Using CookieStore B) By creating a session table and setting config/initializers/session_store.rb with Rails.application.config.session_sto...
|
|
12070
|
Which of the following is the correct way to move an element into another element?
|
|
12071
|
<p>Consider the following code snippet:</p>
<pre><code>&lt;form id="form1"&gt;
&lt;input type="text" id="text1" value="default" /&gt;
&lt;input type="text" name="email" /&gt;
&lt;/form&gt;
&lt;script type="text/javascript"&gt;
function submitForm1() {
alert($('#form1').serialize());
}
&lt;/script&gt;</code></pre>
<p>What does the alert box display when the function submitForm1 is called?</p>
|
|
12072
|
Which option is correct to use the below function to set cursor position for textarea?
Function:
$.fn.selectRange = function(start, end) {
return this.each(function() {
if (this.setSelectionRange) {
this.focus();
this.setSelectionRange(start, end);
} else if (this.createTextRange) {
var range = this.createTextRange();
range.collapse(true);
range.moveEnd('character', end);
range.moveStart('character', start);
range.select();
}
});
};
|
|
12073
|
The css() function allows you to ___.
|
|
12074
|
Which of the following is the correct way to check the existence of an element in jQuery other than the following code?
if ($(selector).length&gt;0) {
// Do something
}
|
|
12075
|
Which of the following functions moves p tags that have para class to div with content id?
|
|
12076
|
Which of the following is the correct way to refresh a page with jQuery?
|
|
12077
|
Which of the following is the best method for adding options to a select from a JSON object using jQuery?
|
|
12078
|
How can an additional row be added to a table as the last row using jQuery?
|
|
12079
|
Which of the following is the correct way to use jQuery with node.js?
|
|
12080
|
Which of the following will make the background of a page change, upon being refreshed?
|
|
12081
|
Which of the following statements returns the number of matched elements of $('.class1')?
|
|
12082
|
How can jQuery be used or optimized in such a way that the web applications can become richer and more functional?
|
|
12083
|
<p>Consider the following code snippet:</p>
<pre><code>$.map(array1, function1);</code></pre>
<p>Which of the following arguments is/are valid arguments of function1?</p>
|
|
12084
|
Which of the following is the correct way to get "Option B" with the value '2' from following HTML code in jQuery?
&lt;select id='list'&gt;
&lt;option value='1'&gt;Option A&lt;/option&gt;
&lt;option value='2'&gt;Option B&lt;/option&gt;
&lt;option value='3'&gt;Option C&lt;/option&gt;
&lt;/select&gt;
|
|
12085
|
$.grep(array1, function1);
The above statement ___ the elements of array1 array which satisfy function1 function.
|
|
12086
|
Which of the following is the correct way to check which key was pressed?
|
|
12087
|
<p>Consider the following code snippet:</p>
<pre><code>&lt;div id='id1'&gt;
&lt;div id='id2'&gt;Div 2&lt;/div&gt;
&lt;/div&gt;</code></pre>
<p>Which of the following tags is/are in the result of $('#id2').parents();?</p>
|
|
12088
|
Which of the following is the correct way to do the following JavaScript Code with jQuery?
var d = document;
var odv = d.createElement("div");
odv.style.display = "none";
this.OuterDiv = odv;
var t = d.createElement("table");
t.cellSpacing = 0;
t.className = "text";
odv.appendChild(t);
|
|
12089
|
Which of the following is the correct way to select &lt;a&gt; on the basis of href using jQuery?
|
|
12090
|
Which of the following is the best way to open a jQuery UI dialog box without a title bar?
|
|
12091
|
Which of the following is the correct way to distinguish left and right mouse click event in jQuery?
|
|
12092
|
Which of the following is the correct way to assign a selected value of a drop-down list using jQuery?
|
|
12093
|
<p>Consider the following code snippet:</p>
<pre><code>$('#id1').animate({width:"240px"}, "slow").animate({height:"320px"}, "fast");</code></pre>
<p>The order of the animations of this code snippet is:</p>
|
|
12094
|
Using an element of some kind that is being hidden using .hide() and shown via .show(). Which of the following is the best way to determine if that element is currently hidden or visible on the screen?
|
|
12095
|
$.merge(array1, array2);
The above function merges ___.
|
|
12096
|
Which of the following values is/are valid argument(s) of the eq() function?
|
|
12097
|
Which of the following methods can be used to load data?
|
|
12098
|
Consider having multiple $(document).ready() functions in one or many linked JavaScript files.
Given this information, which of the following will be executed?
|
|
12099
|
Which of the following is correct with regards to how to upload a file asynchronously with jQuery?
|
|
12100
|
Which of the following makes use of jQuery to select multiple elements?
|
|
12101
|
How or where can a plugin be declared, so that the plugin methods are available for the script?
|
|
12102
|
<p>Consider the following code snippet:</p>
<pre><code>var message = 'Message';
$('#id1').bind('click', function() {
alert(message);
});
message = 'New message';
$('#id2').bind('click', function() {
alert(message);
});</code></pre>
<p>What does the alert box display if "id1" is clicked?</p>
|
|
12103
|
Which of the following functions will return an empty set when end() function is chained right after that function?
|
|
12104
|
<p>Consider the following code snippet:</p>
<pre><code>$('#ul1 li').live('click', function1);
$('#ul1').after('&lt;li id="lastLi"&gt;Last item&lt;/li&gt;');</code></pre>
<p>Is <code>function1</code> executed if <code>lastLi</code> is clicked?</p>
|
|
12105
|
<p>Which of the following will select a particular option in a <code>&lt;select&gt;</code> element using its index?</p>
|
|
12106
|
<p>Consider the following code snippet:</p>
<pre><code>&lt;ul id='id1'&gt;
&lt;li id='li1'&gt;Items 1&lt;/li&gt;
&lt;li id='li2'&gt;Items 2&lt;/li&gt;
&lt;li id='li3'&gt;Items 3&lt;/li&gt;
&lt;/ul&gt;</code></pre>
<p>Which of the following code snippets returns the same result as <code>$('#id1 li').not($('#li2'));</code>?</p>
|
|
12107
|
Whats the right way to access the contents of an iframe using jQuery?
|
|
12108
|
<p>Consider the following code snippet:</p>
<pre><code>&lt;ul id='id1'&gt;
&lt;li id='li1'&gt;Items 1&lt;/li&gt;
&lt;li id='li2'&gt;Items 2&lt;/li&gt;
&lt;li id='li3'&gt;Items 3&lt;/li&gt;
&lt;/ul&gt;</code></pre>
<p>Which of the following code snippets return(s) a set of all <code>li</code> tags within <code>id1</code> except for the <code>li</code> tag with id <code>li2</code>?</p>
|
|
12109
|
Which option is correct to perform a synchronous AJAX request?
|
|
12110
|
Which option can be used to have jQuery wait for all images to load before executing something on a page?
|
|
12111
|
Which of the following will show an alert containing the content(s) of a database selection?
|
|
12112
|
Which of the following will get the first column of all tables using jQuery?
|
|
12113
|
Which of the following values is/are valid value(s) of secondArgument in addClass(&#39;turnRed&#39;, secondArgument); function, if the jQuery UI library is being used?
|
|
12114
|
Which of the following returns the children tags of &quot;id1&quot;?
|
|
12115
|
Which of the following represents the best way to make a custom right-click menu using jQuery?
|
|
12116
|
Which of the following methods can be used to utilize the animate function with the backgroundColor style property?
|
|
12117
|
Which of the following methods can be used to copy element?
|
|
12118
|
Which of the following is the correct way to select an option based on its text in jQuery?
|
|
12119
|
Which of the following is the correct way to manage a redirect request after a jQuery Ajax call?
|
|
12120
|
Which of the following is the correct way to get the value of a textbox using id in jQuery?
|
|
12121
|
Which of the following is the correct way to get &quot;Option B&quot; with the value &#39;2&#39; from following HTML code in jQuery? &lt;select id=&#39;list&#39;&gt; &lt;option value=&#39;1&#39;&gt;Option A&lt;/option&gt; &lt;option value=&#39;2&#39;&gt;O...
|
|
12122
|
Which of the following is the correct way to disable an input field with jQuery?
|
|
12123
|
Which of the following is the correct way to debug JavaScript/jQuery event bindings with Firebug or a similar tool?
|
|
12124
|
Which of the following is the correct way to change the image source during click event of a button in jQuery?
|
|
12125
|
Which of the following is the correct way to add an additional option and select it with jQuery?
|
|
12126
|
Which of the following is the correct use of ajaxStart() function?
|
|
12127
|
Which of the following gets the href attribute of &quot;id1&quot;?
|
|
12128
|
Which of the following functions is/are built-in jQuery regular expression function(s)?
|
|
12129
|
Which of the following functions can be used to stop event propagation?
|
|
12130
|
Which of the following events can be used to disable right click contextual menu?
|
|
12131
|
Which of the following code snippets insert(s) the code snippet &lt;font size=2&gt;&lt;div class=&quot;footer&quot;&gt;footer&lt;/div&gt;&lt;/font&gt; at the end of div tags?
|
|
12132
|
Which of the following code snippets insert(s) the code snippet &lt;div class=&quot;footer&quot;&gt;footer&lt;/div&gt; at the end of div tags?
|
|
12133
|
What is the result of this function: jQuery.makeArray ( true )?
|
|
12134
|
What is the result of NaN == NaN?
|
|
12135
|
What is the purpose of $(document).ready() function in Jquery?
|
|
12136
|
What does $(&#39;tr.rowClass:eq(1)&#39;); return?
|
|
12137
|
Using an element of some kind that is being hidden using .hide() and shown via .show(). Which of the following is the best way to determine if that element is currently hidden or visible on the sc...
|
|
12138
|
The position function gets the ___ positions of an element that are relative to its offset parent.
|
|
12139
|
The hide() function hides an element by ___.
|
|
12140
|
The height function returns the height of an element in ___.
|
|
12141
|
One advantage of $.ajax function over $.get or $.post is that ___.
|
|
12142
|
offset function gets the current offset of the first matched element in pixels relative to the ___.
|
|
12143
|
jQuery allows you to use ___ function to switch between showing and hiding an element.
|
|
12144
|
jQuery allows simulating an event to execute an event handler as if that event has just occurred by using ___.
|
|
12145
|
If jQuery is included before another library, how can conflict between jQuery and that library be avoided?
|
|
12146
|
How can the href for a hyperlink be changed using jQuery?
|
|
12147
|
How can the child img be selected inside the div with a selector?
|
|
12148
|
How can an Ajax request that has not yet received a response be canceled or aborted?
|
|
12149
|
each() is a generic ___ function.
|
|
12150
|
Consider the following code snippet: $(document).ready(function1); $(document).ready(function2); $(document).ready(function3); Which of the following functions are executed when DOM is ready?
|
|
12151
|
Consider the following code snippet: $(&#39;span.item&#39;).each(function (index) { $(this).wrap(&#39;&lt;li&gt;Item&lt;/li&gt;&#39;); }); What does this code snippet do?
|
|
12152
|
Consider the following code snippet: $(&#39;a.arrow-1&#39;).click(function () { $(&#39;.second-row&#39;).slideUp(); $(this).parent(&#39;.first-row&#39;).siblings(&#39;.second-row&#39;).slideDown(); }); The order of the a...
|
|
12153
|
Consider the following code snippet: $(&#39;#id1&#39;).animate({width:&quot;240px&quot;}, { queue:false, duration:1000 }).animate({height:&quot;320px&quot;}, &quot;fast&quot;); The order of the animations of this code snippet is ___.
|
|
12154
|
Consider the following code snippet: $(&#39;#button1&#39;).bind(&#39;click&#39;, function(data) {...}); What is the data argument?
|
|
12155
|
Consider the following code snippet: &lt;ul id=&#39;id1&#39;&gt; &lt;li id=&#39;li1&#39;&gt;Items 1&lt;/li&gt; &lt;li id=&#39;li2&#39;&gt;Items 2&lt;/li&gt; &lt;li id=&#39;li3&#39;&gt;Items 3&lt;/li&gt; &lt;/ul&gt; Which of the following code snippets returns the same re...
|
|
12156
|
Consider the following code snippet: &lt;ul id=&#39;id1&#39;&gt; &lt;li id=&#39;li1&#39;&gt;Items 1&lt;/li&gt; &lt;li id=&#39;li2&#39;&gt;Items 2&lt;/li&gt; &lt;li id=&#39;li3&#39;&gt;Items 3&lt;/li&gt; &lt;/ul&gt; Which of the following code snippets return(s) a set of ...
|
|
12157
|
Consider the following code snippet: &lt;font size=2&gt; &lt;ul id=&#39;id1&#39;&gt; &lt;li id=&#39;li1&#39;&gt;Items 1&lt;/li&gt; &lt;li id=&#39;li2&#39;&gt;Items 2&lt;/li&gt; &lt;li id=&#39;li3&#39;&gt;Items 3&lt;/li&gt; &lt;/ul&gt; &lt;/font&gt; Which of the following code snippe...
|
|
12158
|
Consider the following code snippet: $(document).ready(function() { $(&#39;div&#39;).each(function(index) { alert(this); }); }); Which of the following objects does the &#39;this&#39; variable refer to?
|
|
12159
|
Consider the following code snippet: $(&#39;#table1&#39;).find(&#39;tr&#39;).filter(function(index) { return index % 3 == 0}).addClass(&#39;firstRowClass&#39;); The result of the above code snippet is ___.
|
|
12160
|
Consider the following code snippet: $(&#39;#id1&#39;).animate({width:&quot;240px&quot;}, { queue:false, duration:1000 }).animate({height:&quot;320px&quot;}, &quot;fast&quot;); The order of the animations of this code snippet is ___.
|
|
12161
|
Consider the following code snippet: $(&#39;#ul1 li&#39;).live(&#39;click&#39;, function1); $(&#39;#ul1&#39;).after(&#39;&amp;#60;li id=&quot;lastLi&quot;&amp;#62;Last item&amp;#60;/li&amp;#62;&#39;); Is function1 executed if &quot;lastLi&quot; is clicked?
|
|
12162
|
Consider the following code snippet: $(&#39;#button1&#39;).bind(&#39;click&#39;, function(data) {...}); What is the data argument?
|
|
12163
|
Consider the following code snippet: &lt;ul id=&#39;id1&#39;&gt; &lt;li id=&#39;li1&#39;&gt;Items 1&lt;/li&gt; &lt;li id=&#39;li2&#39;&gt;Items 2&lt;/li&gt; &lt;li id=&#39;li3&#39;&gt;Items 3&lt;/li&gt; &lt;/ul&gt; Which of the following code snippets returns the...
|
|
12164
|
Consider the following code snippet: &lt;font size=2&gt; &lt;ul id=&#39;id1&#39;&gt; &lt;li id=&#39;li1&#39;&gt;Items 1&lt;/li&gt; &lt;li id=&#39;li2&#39;&gt;Items 2&lt;/li&gt; &lt;li id=&#39;li3&#39;&gt;Items 3&lt;/li&gt; &lt;/ul&gt; &lt;/font&gt; Which of the following c...
|
|
12165
|
Assuming that the jQuery UI library is used to make a list sortable, which of the following code snippets makes &quot;list1&quot; sortable?
|
|
12166
|
Assume that you want that first the tag with &quot;id1&quot; fades out and then the tag with &quot;id2&quot; fades in. Which of the following code snippets allow(s) you to do so?
|
|
12167
|
$(&quot;div&quot;).find(&quot;p&quot;).andSelf().addClass(&quot;border&quot;); The statement adds class border to ___.
|
|
12168
|
$(&quot;div&quot;).find(&quot;p&quot;).andSelf().addClass(&quot;border&quot;); The statement adds class border to ___.
|
|
12169
|
$(&#39;#id1&#39;).animate({width:&quot;80%&quot;}, &quot;slow&quot;) The above code snippet will ___.
|
|
12170
|
$(&#39;#a1&#39;).one(&#39;click&#39;, {times: 3}, function1); Which of the following is true for the above?
|
|
12171
|
You don&#39;t have any database recovery/backup system in place. Which of the following statements is true with regard to committed and uncommitted data of your entity bean?
|
|
12172
|
You define an enterprise bean as follows: Public class CalcSessionBean implements javax.ejb.SessionBean Which of the following method definitions is not mandatory?
|
|
12173
|
You are working with EJB2.0. You have to retrieve a previously saved handle to an EJBObject named &#39;bookEJBObject.&#39; In order to restart the processing for that particular request, you need to get th...
|
|
12174
|
Which of the following transaction modes are supported by Enterprise Java Beans?
|
|
12175
|
Which of the following statements is not correct with regard to relationships in EJB?
|
|
12176
|
Which of the following statements is not correct with regard to Passivation of beans?
|
|
12177
|
Which of the following statements is not correct for an Enterprise Java Bean?
|
|
12178
|
Which of the following statements is incorrect with regard to the process of Instance Pooling in EJB?
|
|
12179
|
Which of the following statements is correct with regard to the method ejbSelect()?
|
|
12180
|
Which of the following statements is correct with regard to JavaBeans and Enterprise JavaBeans?
|
|
12181
|
Which of the following statements is correct with regard to entity, session, and message-driven beans?
|
|
12182
|
Which of the following statements is correct with regard to &#39;poison&#39; message?
|
|
12183
|
Which of the following statements are correct with regard to EJB QL?
|
|
12184
|
Which of the following services does EJB container provide to a bean?
|
|
12185
|
Which of the following services does an EJB Server/Container provides to EJB?
|
|
12186
|
Which of the following must be implemented by a JMS message-driven bean?
|
|
12187
|
Which of the following methods should be invoked by the container to get a bean back to its working state?
|
|
12188
|
Which of the following is not implemented by a stateless session bean?
|
|
12189
|
Which of the following is a name of the design pattern not associated with EJB?
|
|
12190
|
Which of the following is a language in which IDL compiler of CORBA generates proxies and skeletons?
|
|
12191
|
Which of the following constitute the enhancements made to EJB 2.0?
|
|
12192
|
What will happen to the running session beans if the EJB container crashes or restarts?
|
|
12193
|
What is the restriction that EJB specification imposes on CMP fields?
|
|
12194
|
What are the three classes that a Session EJB class must provide?
|
|
12195
|
We are saving a handle to an EJBObject named &#39;bookEJBObject&#39; for an online book shop: 1. javax.ejb.Handle bookHandle = _____________; 2. 3. ObjectOutputStream stream = 4. new Objec...
|
|
12196
|
To disable the Passivaton process, set the EJBPassivationTimeout() variable to zero.
|
|
12197
|
The transaction attribute of a bean is set to &#39;TX_REQUIRES_NEW.&#39; What do you infer about its behavior?
|
|
12198
|
The principal finder method that must be implemented by every entity bean class is:
|
|
12199
|
The PrimaryKey class is used to provide each entity bean with a ____________:
|
|
12200
|
The methods declared in Session Bean interface are known as Callback (methods).
|
|
12201
|
The method ejbCreate() allows session beans to perform initializations. Which of the following methods should be called by the container before ejbCreate()?
|
|
12202
|
The interface that must be implemented by a stateless session bean is javax.ejb.SessionBean.
|
|
12203
|
The following method signature is found in an implemented entity bean named &#39;CustomerBean.&#39; &#39;CustomerPK&#39; is a class representing the primary key. public CustomerPK ejbFindByPrimaryKey(CustomerPK k...
|
|
12204
|
The EJB specification defines six distinct roles in the application development and deployment life cycle. Which of the following roles is not mentioned in it?
|
|
12205
|
SessionSynchronization Interface must be implemented to reset the instance variables.
|
|
12206
|
One of the methods of your entity bean retrieves the names of all the patients admitted in a particular ward of a hospital. Using a connection named &#39;con&#39;, you want to execute the following query: ...
|
|
12207
|
How do Enterprise Java Beans access the database?
|
|
12208
|
Database connection pooling is beneficial because:
|
|
12209
|
By interoperating via IIOP, an EJB can directly access:
|
|
12210
|
Both RMI and CORBA define messaging protocols called:
|
|
12211
|
An online shop employs a stateless session bean (named &#39;Eshop&#39;) to process the requests. &#39;Eshop&#39; uses a declarative transaction management system. The following code is from the xml deployment desc...
|
|
12212
|
An online medical shop uses Container Managed persistent beans for its operations. An OrderBean uses a query to list all the orders where payable amount is more than $800. The XML query tag in the ...
|
|
12213
|
A pre-cached instance is used to load state information on creation of an EJB.
|
|
12214
|
A heavy tool manufacturing company manages its business and production by using enterprise beans. A session bean named &#39;Status&#39; is used to get the production status for the day. The following code ...
|
|
12215
|
X.509 version 3 specifies which of the following?
|
|
12216
|
With regard to the destroy lifecycle method, identify the correct statements about its purpose or about how and when it is invoked.
|
|
12217
|
Why can&#39;t a Graphics object be created using the following statement? Graphics g = new Graphics();
|
|
12218
|
Which statements are true? Select all true statements.
|
|
12219
|
Which statements are true regarding ServletContext Init Parameters in the deployment descriptor?
|
|
12220
|
Which statement is true regarding ServletContext Initialization Parameters in the deployment descriptor?
|
|
12221
|
Which statement is true about the given code? public class Test78 { public static void main(String[] args) throws Exception { new JBean().setHeight(1).setWidth(2).setDepth(...
|
|
12222
|
Which sequence will be printed when the following program is run? import java.util.*; public class Test { public static void main(String str[]) { List l = new ArrayList(); l.add(&#39;&#39;1&#39;&#39;); ...
|
|
12223
|
Which option lists Java access modifiers in the right order from the most permissive to the most restrictive?
|
|
12224
|
Which option could be used to see additional warnings about code that mixes legacy code with code that uses generics?
|
|
12225
|
Which of these is not an event listener adapter defined in the java.awt.event package?
|
|
12226
|
Which of these interfaces is the most applicable when creating a class that associates a set of keys with a set of values?
|
|
12227
|
Which of these interfaces are used by implementations of models for JTable?
|
|
12228
|
Which of the following transaction modes are supported by Enterprise Java Beans?
|
|
12229
|
Which of the following symbols are metacharacters supported by the java.util.regex API?
|
|
12230
|
Which of the following statements regarding abstract classes are true?
|
|
12231
|
Which of the following statements is true?
|
|
12232
|
Which of the following statements is true of the HashMap class?
|
|
12233
|
Which of the following require explicit try/catch exception handling by the programmer?
|
|
12234
|
Which of the following methods should be invoked by the container to get a bean back to its working state?
|
|
12235
|
Which of the following methods can be used for reporting a warning on a Connection object, Statement object &amp; ResultSet object?
|
|
12236
|
Which of the following methods are members of the Vector class and allow you to input a new element?
|
|
12237
|
Which of the following JDBC methods is used to retrieve large binary objects?
|
|
12238
|
Which of the following is the name of the cookie used by Servlet Containers to maintain session information?
|
|
12239
|
Which of the following is the correct syntax for suggesting that the JVM perform garbage collection?
|
|
12240
|
Which of the following is the correct syntax for creating a Session object?
|
|
12241
|
Which of the following is false?
|
|
12242
|
Which of the following is a well-known HTTP port?
|
|
12243
|
Which of the following interfaces makes it possible for Java to save an object to a file and turn it into a data stream?
|
|
12244
|
Which of the following illustrates correct synchronization syntax?
|
|
12245
|
Which of the following code snippets will take transform input string &quot;2012/06/05&quot; to output string &quot;05 - 06 - 2012&quot;?
|
|
12246
|
Which of the following code snippets will generate five random numbers between 0 and 200?
|
|
12247
|
Which of the following cannot apply to constructors?
|
|
12248
|
Which of the following are valid ways to define a thread in Java?
|
|
12249
|
Which of the following are the methods of the Thread class?
|
|
12250
|
Which method is called by the servlet container just after the servlet is removed from service?
|
|
12251
|
Which method in the HttpServlet class corresponds to the HTTPPUT method?
|
|
12252
|
Which is a proper way to declare and throw exception of class XYException?
|
|
12253
|
Which exception must a setter of a constrained JavaBean property throw to prevent the property value from changing?
|
|
12254
|
Which distributed object technology is most appropriate for systems that consist of objects written in different languages and that execute on different operating system platforms?
|
|
12255
|
Which distributed object technology is most appropriate for systems that consist entirely of Java objects?
|
|
12256
|
Which design pattern reduces network traffic by acting as a caching proxy of a remote object?
|
|
12257
|
Which class contains a method to create a directory?
|
|
12258
|
What would happen on trying to compile and run the following code? class House { public final void MaintainMethod() { System.out.println(&quot;MaintainMethod&quot;); } } public class Building extends...
|
|
12259
|
What would be the result of compiling and running the following code class? public class Test { public static void main(String args[]) { Test t = new Test(); t.start(); } public void sta...
|
|
12260
|
What will be the output, if the following program is run? public class Test8 { public static void main(String[] args) { System.out.println(Math.sqrt(-4)); } }
|
|
12261
|
What will be the output when this code is compiled and run? public class Test { public Test() { Bar b = new Bar(); Bar b1 = new Bar(); update(b); update(b1); ...
|
|
12262
|
What will be the output when this code is compiled and run? public class Test { public Test() { Bar b = new Bar(); Bar b1 = new Bar(); update(b); update(b1); b1 = b; update(b); up...
|
|
12263
|
What will be the output of this program? public class Test { public static void main(String args[]) { int a, b; a = 2; b = 0; System.out.println(g(a, new int[] { b })); } public stat...
|
|
12264
|
What will be the output of the following code? public class MyTest { public static void main(String[] args) { for (int i=0; i &gt; 10; i+=2) { System.out.println(i); }...
|
|
12265
|
What should be the replacement of &quot;//ABC&quot; in the following code? class Krit { String str= new String(&quot;OOPS !!! JAVA&quot;); public void KritMethod(final int iArgs) { int iOne; c...
|
|
12266
|
What protocol is used by the DatagramSocket class?
|
|
12267
|
What is the term to describe a situation where two or more threads are blocked forever, waiting for each other?
|
|
12268
|
What is the result of an attempt to compile and run the given program? public class Test107 { public static void main(String[] args) { System.out.println(test()); }...
|
|
12269
|
What is the output of the given program? public class Test97 { public static void main(String[] args) { int[][] a = new int[2][2]; System.out.println(a.leng...
|
|
12270
|
What is the output of the given program? public class Test93 { private int x = 0; public static void main(String[] args) { new Test93().test(); } ...
|
|
12271
|
What is the output of the given program? public class Test89 { public static void main(String[] args) { T x = new T(&quot;X&quot;, null); x.start(); T y = new T(&quot;Y&quot;, ...
|
|
12272
|
What is the output of the given program? public class Test89 { public static void main(String[] args) { T x = new T(&quot;&quot;X&quot;&quot;, null); x.start(); T y = new T(&quot;&quot;Y...
|
|
12273
|
What is the output of the given program? public class Test130 { public static void main(String[] args) { A a = new A2(); B b = new B2(); Sys...
|
|
12274
|
What is the output of the given program? public class Test129 { public static void main(String[] args) { A a = new A2(); B b = new B2(); Sys...
|
|
12275
|
What is the output of the given program? public class Test120 extends _Test120 { { System.out.print(&quot;_INIT&quot;); } static { System.out.print(&quot;_...
|
|
12276
|
What is the output of the given program? public class Test118 extends _Test118 { { System.out.print(&quot;_INIT&quot;); } static { System.out.print(&quot;_...
|
|
12277
|
What is the output of the given program? public class Test106 { public static void main(String[] args) { Integer x = 0; Integer y = 0; Integ...
|
|
12278
|
What is the output of the given console application? public class Test31 { public static void main(String[] args) { test(); } public static void test() { ...
|
|
12279
|
What is the output of the given console application? public class Test19 { public static void main(String[] args) { final int X = 9; int[][] a = {{5, 4, 3},...
|
|
12280
|
What is the output of the given code? public class Test15 { public static void main(String[] args) { VO a = new VO(2); VO b = new VO(3); swa...
|
|
12281
|
What exception is thrown by this code, if arr[j]&gt;arr[j+1]: public static void main(String[] args) { int []arr={12,23,43,34,3,6,7,1,9,6}; { int temp; for ...
|
|
12282
|
There are three classes named A, B, and C. The class B is derived from class A and class C is derived from B. Which of the following relations are correct for the given classes?
|
|
12283
|
The transaction attribute of a bean is set to &#39;TX_REQUIRES_NEW.&#39; What can be inferred about its behavior?
|
|
12284
|
The principal finder method that must be implemented by every entity bean class is:
|
|
12285
|
The JDK comes with a special program that generates skeleton and stub objects that is known as:
|
|
12286
|
The following code was written to save a handle to an EJBObject named &#39;bookEJBObject&#39; for an online book shop: javax.ejb.Handle bookHandle = _____________; ObjectOutputStream stream = new ObjectO...
|
|
12287
|
SQLException has a feature of chaining - identify the right code to execute the same from the following options:
|
|
12288
|
Select all true statements:
|
|
12289
|
Select all correct statements:
|
|
12290
|
RMI allows remote communication between:
|
|
12291
|
JDBC is based on:
|
|
12292
|
In which class is the notify method defined?
|
|
12293
|
How many objects are created in the given code? Object x, y, z; x = new Object(); y = new Object();
|
|
12294
|
How many objects are created in the given code? Object x, y, z; x = new Object(); y = new Object()
|
|
12295
|
How many objects are created by the following code? Object a, b, c, d, e; e = new Object (); b = a = e; e = new Object ();
|
|
12296
|
How does the set collection deal with duplicate elements?
|
|
12297
|
Conventionally, which directory do servlet class files get placed on?
|
|
12298
|
Consider the following code: public static void main(String bicycle[]) { System.out.println(bicycle[0]); } What would be the result if &quot;java TwoTyre one two&quot; is entered in the command line?
|
|
12299
|
Consider the following code: public class Jam { public void apple(int i, String s) { } //ABC } Choose possible valid code replacements of &quot;//ABC&quot; among the choices:
|
|
12300
|
Choose all valid forms of the argument list for the FileOutputStream constructor shown below:
|
|
12301
|
Assuming the servlet method for handling HTTPGET requests is doGet(HttpServletRequest req, HTTPServletResponse res), how can the request parameter in that servlet be retrieved?
|
|
12302
|
Assuming that val has been defined as an int for the code below, which values of val will result in &quot;Test C&quot; being printed? if( val &gt; 4 ) { System.out.println(&quot;Test A&quot;); } else if( val &gt; 9 ) { ...
|
|
12303
|
As part of the type erasure process, when compiling a class or interface that extends a parameterized class or implements a parameterized interface, the compiler may need to create a synthetic meth...
|
|
12304
|
You have placed an order by Amazon Fulfillment Web Service and want to cancel the order. The order can&#39;t be canceled if the FulfillmentOrderStatus is:
|
|
12305
|
You are going to create an Amazon Mechanical Turk HIT. Which of the following parameters are required in the request?
|
|
12306
|
With regard to Amazon EC2, the amount of CPU that is allocated to a particular instance is expressed in terms of:
|
|
12307
|
With regard to Amazon EC2, do volumes need to be un-mounted in order to take a snapshot?
|
|
12308
|
With reference to the Amazon Fulfillment Web Service, what are inbound APIs used for?
|
|
12309
|
With reference to the Amazon Flexible Payment Service, for how many days is a Reserve authorization valid?
|
|
12310
|
Which type of AWS requests do not require Access Key ID authentication?
|
|
12311
|
Which of the following, defines the term EC2 Amazon Machine Images?
|
|
12312
|
Which of the following Use Cases belong to Inbound FWS APIs?
|
|
12313
|
Which of the following statements is not correct with regard to Elastic Block Store?
|
|
12314
|
Which of the following statements is not correct with regard to Amazon Simple Storage Service (Amazon S3)?
|
|
12315
|
Which of the following statements are true with regard to the Amazon Mechanical Turk Notifications?
|
|
12316
|
Which of the following parameters are mandatory for the InstallPaymentInstruction operation of the Amazon Flexible Payment Service?
|
|
12317
|
Which of the following is not related to the RebootInstances Operation of EC2?
|
|
12318
|
Which of the following is correct if CNAME is empty in Amazon CloudFront service? 1.&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt; &lt;DistributionConfig xmlns=&quot;http://cloudfront.amazonaws.com/doc/2008-06-30...
|
|
12319
|
Which of the following are the types of Grantee, that can access a bucket or an object of Amazon S3?
|
|
12320
|
Which of the following Amazon EC2 Operations doesn&#39;t require the PublicIP as a request parameter?
|
|
12321
|
What will the Amazon S3 PutObjectInline operation do if an object already exists in a bucket?
|
|
12322
|
What will be the value of the Action attribute of the form where the bucket name is johnsmith? Example: &lt;form action=&quot;???????&quot; method=&quot;post&quot; enctype=&quot;multipart/form-data&quot;&gt;..&lt;/form&gt;
|
|
12323
|
What is the function of the RetryTransaction operation of the Amazon Flexible Payment Service?
|
|
12324
|
What is the function of the approveWork command in Amazon Mechanical Turk?
|
|
12325
|
What does the following Mechanical Turk web service request do? http://mechanicalturk.amazonaws.com/?Service=AWSMechanicalTurkRequester &amp;AWSAccessKeyId=[tHe Requester&#39;s Access Key ID] &amp;Version=200...
|
|
12326
|
The following request is submitted to the Amazon E-Commerce Service. What will be the outcome? http://webservices.amazon.com/onca/xml?Service=AWSECommerceService &amp;SearchIndex=Books &amp;Sort=salesrank...
|
|
12327
|
The following request is submitted to the Amazon E-Commerce Service. What will be the outcome? http://webservices.amazon.com/onca/xml?Service=AWSECommerceService &amp;SearcHIndex=All &amp;Sort=salesrank &amp;...
|
|
12328
|
Suppose you are making a request to the Amazon Flexible Payment Service and you get an error called InternalError. What is the cause of the error?
|
|
12329
|
One EC2 Compute Unit (ECU) provides the CPU capacity eQuivalentto:
|
|
12330
|
Once you create an Amazon Mechanical Turk HIT, you can&#39;t change its HITType.
|
|
12331
|
Is the following statement true or false? With reference to the Amazon Flexible Payment Service, once you subscribe to the caller notification using the SubscribeForCallerNotification operation, y...
|
|
12332
|
Is the following statement true or false? It is not possible to retrieve offers and discounts using Amazon E-Commerce Service.
|
|
12333
|
In which of the following cases can the status of a Mechanical Turk HIT change from Reviewing to Reviewable?
|
|
12334
|
In conjunction with which of the following other Amazon web services does Amazon SimpleDB service work?
|
|
12335
|
In case of Amazon E-Commerce Service, what will happen if you pass the AssociateTag parameter but omit the SubscriptionId and AWSAccessKeyId parameters?
|
|
12336
|
In Amazon Mechanical Turk concept, which of the following is correct?
|
|
12337
|
How many CNAME aliases can you have per distribution?
|
|
12338
|
How is Amazon S3, TCP Window Scaling defined ?
|
|
12339
|
How do you access Amazon S3 buckets and objects that were created using &lt;CreateBucketConfiguration&gt;?
|
|
12340
|
Why has the IRS allowed employers to combine federal taxes when computing withholding amounts?
|
|
12341
|
Who issues an EIN to a company?
|
|
12342
|
Who decides if a person is an employee or an independent contractor?
|
|
12343
|
Who controls the regulations for the timing of payment of wages?
|
|
12344
|
Which of the following statements about independent contractors is true?
|
|
12345
|
Which of the following should happen in the payroll system after an employee is terminated?
|
|
12346
|
Which of the following payroll items is worth auditing?
|
|
12347
|
Which of the following journal entries would be made to void a payroll check printed in error?
|
|
12348
|
Which of the following is an example of an internal control for payroll?
|
|
12349
|
Which of the following is a major payroll processor?
|
|
12350
|
Which of the following is a disadvantage of an automated payroll system?
|
|
12351
|
Which of the following is a benefit of an automated payroll system?
|
|
12352
|
Which of the following illustrates the basic Balance Sheet formula?
|
|
12353
|
Which of the following factors might prompt a company to switch to an automated payroll system?
|
|
12354
|
Which of the following age groups is covered by the Age Discrimination in Employment Act of 1967?
|
|
12355
|
Which of the following accounts is debited when FUTA taxes are paid to the government?
|
|
12356
|
What is the purpose of Form W2?
|
|
12357
|
What is the purpose of Form 941?
|
|
12358
|
What is the purpose of Form 940?
|
|
12359
|
What is the purpose of auditing payroll ?
|
|
12360
|
What is the purpose of an EIN?
|
|
12361
|
What is the purpose of accruing vacation expense?
|
|
12362
|
What is the purpose of a time card?
|
|
12363
|
What is Form W3?
|
|
12364
|
What is an EIN?
|
|
12365
|
What does the acronym SUTA stand for?
|
|
12366
|
The term &quot;workers compensation insurance&quot; refers to ______________.
|
|
12367
|
The term &quot;withholding allowance&quot; refers to ______________.
|
|
12368
|
The term &quot;wage bracket method for withholding taxes&quot; refers to ______________.
|
|
12369
|
The term &quot;unemployment compensation benefits&quot; refers to ______________.
|
|
12370
|
The term &quot;the accounting process&quot; refers to ______________.
|
|
12371
|
The term &quot;taxable wages&quot; refers to ______________.
|
|
12372
|
The term &quot;statutory employee&quot; refers to ______________.
|
|
12373
|
The term &quot;self-employment income&quot; refers to ______________.
|
|
12374
|
The term &quot;profit sharing&quot; refers to ______________.
|
|
12375
|
The term &quot;piece rate plan&quot; refers to ______________.
|
|
12376
|
The term &quot;percentage method of withholding&quot; refers to ______________.
|
|
12377
|
The term &quot;payroll register&quot; refers to ______________.
|
|
12378
|
The term &quot;payroll period&quot; refers to ____________.
|
|
12379
|
The term &quot;overtime&quot; refers to ______________.
|
|
12380
|
The term &quot;oppressive child labor&quot; refers to ____________.
|
|
12381
|
The term &quot;internal control&quot; refers to ______________.
|
|
12382
|
The term &quot;incentive payment plan&quot; refers to _______________.
|
|
12383
|
The term &quot;guaranteed wage&quot; refers to ______________.
|
|
12384
|
The term &quot;escheat law&quot; refers to ____________.
|
|
12385
|
The term &quot;employee earnings record&quot; refers to ______________.
|
|
12386
|
The term &quot;earned income credit&quot; refers to ______________.
|
|
12387
|
The term &quot;disability insurance&quot; refers to ______________.
|
|
12388
|
The term &quot;direct deposit&quot; refers to ______________.
|
|
12389
|
The term &quot;cumulative method of withholding&quot; refers to ______________.
|
|
12390
|
The term &quot;contribution report&quot; refers to ______________.
|
|
12391
|
The term &quot;commission plan&quot; refers to ______________.
|
|
12392
|
The term &quot;bonus&quot; refers to ______________.
|
|
12393
|
The term &quot;bona fide occupational qualification&quot; refers to _______________.
|
|
12394
|
The term &quot;audit trail&quot; refers to ______________.
|
|
12395
|
The Fair Labor Standards Act of 1938 __________________.
|
|
12396
|
The Equal Pay Act ____________________.
|
|
12397
|
The Circular E: Employer&#39;s Tax Guide is ______________.
|
|
12398
|
Payroll system software can be hosted _____________.
|
|
12399
|
On which of the following financial statements is Revenue reported?
|
|
12400
|
On which of the following financial statements is Payroll Expense reported?
|
|
12401
|
Of the following, which is the best safeguard against employees accessing the payroll system?
|
|
12402
|
How often should payroll be reconciled?
|
|
12403
|
How are FUTA taxes recorded at the time of payroll?
|
|
12404
|
For an employer, which of the following is a disadvantage of using direct deposit?
|
|
12405
|
For an employer, which of the following is a benefit of using direct deposit?
|
|
12406
|
For an employee, which of the following is a benefit of using direct deposit?
|
|
12407
|
Employee C wants to contribute $8,000 a year to his tax shelter annuity. The district allows payroll deductions for tax shelter annuities to be spread over 18 pay periods. How much will have to be ...
|
|
12408
|
Employee B has an annual salary of $50,000 that is paid to him over 26 pay periods. He works 260 days per year. He retires after working 65 days, during which time he received 6 paychecks. Given t...
|
|
12409
|
At ABC School, the current salary schedule for custodians is as follows: Step 1: $12.47 Step 2: $13.09 Step 3: $13.75 Step 4: $14.44 Step 5: $15.16 Employees are moved to the next s...
|
|
12410
|
Are meals provided on the company&#39;s premises subject to employment taxes as a benefit?
|
|
12411
|
According to the Self-Employment Contributions Act, any enterprise ___________________ is considered a business.
|
|
12412
|
A W4 is ____________.
|
|
12413
|
A company that employs ______________ is subject to the Civil Rights Act of 1964.
|
|
12414
|
A company must send W2 forms every year to its employees by _____________.
|
|
12415
|
A company must file Form W3 every year by _____________.
|
|
12416
|
You have users from two different countries- England and Norway. You would like the ability to let the user choose whether he or she would like to use the Norwegian element names or the English ele...
|
|
12417
|
You have an element named &#39;comments&#39;. You want to prohibit all line feeds, carriage returns, and tab characters. Which of the following will do it?
|
|
12418
|
you have a single-dimensional array of five elements, and you want to transmit only the last two. Which of the following achieves this?
|
|
12419
|
You can specify time zones in an XML Schema. Which of the following are specifying a time zone along with date?
|
|
12420
|
You are designing an XML Schema and you want to prohibit line feeds, carriage returns, tabs, leading and trailing spaces, and multiple spaces from an element. Which of the following datatypes will ...
|
|
12421
|
You are designing an XML Schema and you have a numeric element &#39;NegativeBalance&#39;. You want to store negative values in this element along with zero. Which of the following numeric datatypes will yo...
|
|
12422
|
Which type of array in SOAP messages represents a grid of values with specified dimensions that may or may not contain any data?
|
|
12423
|
Which two among the following represent the correct syntax for a two dimensional array in a SOAP message?
|
|
12424
|
Which of the following XML attributes defines exactly how native application and platform data types are to be encoded into a common XML syntax?
|
|
12425
|
Which of the following string types is recommended by SOAP specifications Section 5 for SOAP messages?
|
|
12426
|
Which of the following shows the correct implementation of a single dimension array?
|
|
12427
|
Which of the following represents an array in SOAP messages?
|
|
12428
|
Which of the following represents a structure in SOAP messages?
|
|
12429
|
Which of the following protocols cannot be used to exchange SOAP messages?
|
|
12430
|
Which of the following namespaces is used for messages in SOAP version 1.2?
|
|
12431
|
Which of the following namespaces is used for messages in SOAP version 1.1?
|
|
12432
|
Which of the following is the correct format of the date datatype in an XML Schema?
|
|
12433
|
Which of the following is the base namespace for a SOAP message?
|
|
12434
|
Which of the following is correct regarding SOAP Faults?
|
|
12435
|
Which of the following is an optional part in a message of SOAP version 1.1?
|
|
12436
|
Which of the following is an invalid child of a Fault element of a SOAP message?
|
|
12437
|
Which of the following is an example of referring an external document through a SOAP envelope?
|
|
12438
|
Which of the following is an example of a sparse array in SOAP messages?
|
|
12439
|
Which of the following is a single-referenced accessor?
|
|
12440
|
Which of the following is a multi-referenced accessor?
|
|
12441
|
Which of the following header blocks has been introduced in SOAP version 1.2 to specify which headers were not understood?
|
|
12442
|
Which of the following header blocks authenticates the SOAP message?
|
|
12443
|
Which of the following Fault types is used when an error, that cannot be directly linked to the processing of the message, occurs?
|
|
12444
|
Which of the following contains valid syntax for typing values?
|
|
12445
|
Which of the following child elements of a Fault element is used to express application-specific details about the error that occurred?
|
|
12446
|
Which of the following can the header of a SOAP message contain?
|
|
12447
|
Which of the following attributes manages an array in a SOAP message?
|
|
12448
|
Which of the following attributes indicates whether an accessor contains a null value?
|
|
12449
|
Which of the following are used for data representation in multiple-referenced accessors?
|
|
12450
|
Which of the following are true for packaging an RPC request in a SOAP envelope?
|
|
12451
|
Which of the following are mandatory in a message of SOAP version 1.1?
|
|
12452
|
Which of the following are basic parts of the SOAP message architecture?
|
|
12453
|
Which of following is the correct position of the header in a SOAP message?
|
|
12454
|
When applications report a version mismatch error back to the sender of the message, it may optionally include a header block that tells the sender which version of SOAP it supports. Which of the f...
|
|
12455
|
When a SOAP message is sent from one application to another, there is an implicit requirement that the recipient must know how to process that message. If the recipient does not understand the mess...
|
|
12456
|
Version 1.2 of the SOAP specifications introduced some new implementations. Which of the following implementations are new to the version 1.2 specifications?
|
|
12457
|
There is an improper application in the Section 5 encoding style rules. Which of the following type of SOAP Faults occurs in this scenario?
|
|
12458
|
The fundamental idea behind SOAP is that two applications, regardless of the operating system, programming language, or any other technical implementation detail, may openly share information using...
|
|
12459
|
The duration datatype is used to specify a time interval in an XML Schema. Which of the following indicates the number of years in an element of type duration?
|
|
12460
|
SOAP uses messages for client-server communication. Which of the following is correct for SOAP messages?
|
|
12461
|
SOAP has become a new medium of method invocation. Business transactions are widely using SOAP to provide business information. Which of the following are correct about data types in SOAP?
|
|
12462
|
SOAP defines four standard types of faults that belong to the http://www.w3.org/2001/06/soap-envelope namespace. Which of the following is correct regarding extensibility of those standard types?
|
|
12463
|
SOAP defines four standard types of faults that belong to the http://www.w3.org/2001/06/soap-envelope namespace. Which of the following is an incorrect Fault code?
|
|
12464
|
Read the following statements: Statement 1: Encoding styles define how applications on different platforms share information, even though they may not have common data types or representations. S...
|
|
12465
|
Read the following statements: Address address = new Address( ); Person person = new Person( ); person.setAddress(address); The above code is creating two objects, one for the Address class and t...
|
|
12466
|
Read the following statements: &lt;s:Envelope xmlns:s=&quot;http://www.w3.org/2001/06/soap-envelope&quot;&gt; &lt;s:Body&gt; &lt;n:getQuote xmlns:n=&quot;urn:QuoteService&quot; s:encodingStyle=&quot;http://www.w3.org/2001/06/soap/encodi...
|
|
12467
|
Read the following statements: &lt;s:Envelope xmlns:s=&quot;http://schemas.xmlsoap.org/soap/envelope/&quot;&gt; &lt;s:Header&gt; &lt;V:Upgrade xmlns:V=&quot;http://www.w3.org/2001/06/soap-upgrade&quot;&gt; &lt;envelope qname=&quot;ns1:Envelop...
|
|
12468
|
Read the following statements: &lt;s:Envelope xmlns:s=&quot;...&quot;&gt; &lt;s:Body&gt; &lt;s:Faults&gt; &lt;faultcode&gt;Client.Authentication&lt;/faultcode&gt; &lt;faultstring&gt; Invalid credentials &lt;/faultstring&gt; &lt;faultactor&gt;http://acme....
|
|
12469
|
Read the following statements about SOAP Faults: Statement 1: The SOAP fault structure is not allowed to express any information about which headers were not understood. Statement 2: The faultstri...
|
|
12470
|
Read the following statements about SOAP datatypes: Statement 1: The datatypes supported by the SOAP encoding style are the datatypes defined by the &quot;XML Schema data types&quot; specification. Statemen...
|
|
12471
|
In state chart diagrams, element which is shown with help of solid circle with outgoing arrow is classified as
|
|
12472
|
Read the following statement regarding arrays in SOAP: Statement 1: A single-referenced accessor doesn&#39;t have an identity except as a child of its parent element. Statement 2: A multi-referenced a...
|
|
12473
|
Read the following SOAP message: &lt;s:Envelope xmlns:s=&quot;...&quot;&gt; &lt;s:Body&gt; &lt;s:Faults&gt; &lt;faultcode&gt;Client.Authentication&lt;/faultcode&gt; &lt;faultstring&gt; Invalid credentials &lt;/faultstring&gt; &lt;faultactor&gt;http://acm...
|
|
12474
|
Read the following SOAP message: &lt;s:Envelope xmlns:s=&quot;...&quot;&gt; &lt;s:Body&gt; &lt;s:Fault&gt; &lt;faultcode&gt;Client.Authentication&lt;/faultcode&gt; &lt;faultstring&gt; Invalid credentials &lt;/faultstring&gt; &lt;faultactor&gt;http://acme...
|
|
12475
|
Read the following snippet: &lt;!-- Version 1.2 SOAP Envelope --&gt; &lt;s:Envelope xmlns:s=&quot;http://schemas.xmlsoap.org/soap/envelope/&quot;&gt; &lt;s:Body&gt; &lt;n:getQuote xmlns:n=&quot;urn:QuoteService&quot;&gt; &lt;symbol xsi:type=&quot;x...
|
|
12476
|
Read the following snippet: ... &lt;xs:element name=&quot;person&quot;&gt; &lt;xs:complexType&gt; &lt;xs:sequence&gt; &lt;xs:element name=&quot;firstname&quot; type=&quot;xs:string&quot;/&gt; &lt;xs:element name=&quot;lastname&quot; type=&quot;xs:str...
|
|
12477
|
Read the following snippet of a SOAP message: &lt;s:Envelope xmlns:s=&quot;http://www.w3.org/2001/06/soap/soapEnvelope&quot;&gt; &lt;s:Header&gt; &lt;m:transaction xmlns:m=&quot;soap-transaction&quot; s:mustUnderstand=&quot;true&quot;&gt; &lt;tran...
|
|
12478
|
Read the following code snippet of a SOAP message: &lt;s:Envelope xmlns:s=&quot;http://www.w3.org/2001/06/soap/soap-envelope&quot;&gt; &lt;s:Header&gt; &lt;m:transaction xmlns:m=&quot;soap-transaction&quot; s:mustMatch=&quot;true&quot;&gt; &lt;tra...
|
|
12479
|
Read the following code snippet of a SOAP message: &lt;s:Envelope xmlns:s=&quot;http://www.w3.org/2001/06/soap-envelope&quot;&gt; &lt;s:Body&gt; &lt;n:getQuote xmlns:n=&quot;urn:QuoteService&quot;&gt; &lt;symbol xsi:type=&quot;xsd:string&quot;&gt; Mi...
|
|
12480
|
PremiumSoft Web Service provides financial quotes. Function getQuote () returns a financial quote for a QuoteID. The message returned in getQuote contains invalid authentication credentials. Which...
|
|
12481
|
One of the greatest strengths of XML Schemas is the support for datatypes. Which of the following namespaces is used while creating elements and datatypes that are used to construct schemas?
|
|
12482
|
Fill in the blank: A ________________ Array is a type of array in which only a part of the array is serialized into the SOAP envelope.
|
|
12483
|
Encoding styles define how applications on different platforms share information. Which of the following is correct about data types of both applications while implementing encoding styles?
|
|
12484
|
Because of its pervasiveness on the Internet, HTTP is by far the most common transport used to exchange SOAP messages. Which of the following HTTP headers indicates the intent of the SOAP HTTP requ...
|
|
12485
|
As part of the overall specification, Section 5 of the SOAP standard introduces a concept known as encoding styles. An encoding style is a set of rules that define exactly how native application an...
|
|
12486
|
An XML schema describes the structure of an XML document. The purpose of an XML Schema is to define the legal building blocks of an XML document. Which of the following are true about an XML Schema?
|
|
12487
|
An error message from a SOAP message is carried inside a Fault element. How many times can a Fault element be used in a single SOAP message?
|
|
12488
|
ABC Corp., a client of PremiumSoft, uses SOAP 1.2 specifications whereas PremiumSoft uses SOAP 1.1 specifications. What will be the result when PremiumSoft sends a message to ABC Corp.?
|
|
12489
|
ABC Corp., a client of PremiumSoft, uses SOAP 1.1 specifications whereas PremiumSoft uses SOAP 1.2 specifications. What will be the result when PremiumSoft sends a message to ABC Corp.?
|
|
12490
|
A subroutine call is going to be XML encoded for SOAP by passing two parameters using the same memory location. How will this be implemented?
|
|
12491
|
A SOAP message may travel from a sender to a receiver by passing different endpoints along the message path. Not all parts of the SOAP message may be intended for the ultimate endpoint of the SOAP ...
|
|
12492
|
A SOAP message is based on XML. Infact, SOAP follows all validation rules from XML specifications. On which of the following are SOAP messages based?
|
|
12493
|
You are developing a Mobile Web Application for the Chinese market. Which of the following is true?
|
|
12494
|
You are designing a fighting game with six levels. Suppose a user clears the fourth level and then loses all his lives. To ensure the best gaming experience, which of the following features should ...
|
|
12495
|
With respect to sound guidelines, which of the following should be avoided when designing a mobile game?
|
|
12496
|
With respect to game user experience guidelines, which of the following should a game designer avoid to keep players motivated and interested?
|
|
12497
|
With regard to Mobile Web Applications, which of the following types of files does not benefit from transfer compression, and have a negative net impact instead?
|
|
12498
|
Which of the following widget interaction models is the best choice for creating a widget that contains thousands of links?
|
|
12499
|
Which of the following usability methods in Mobile Application development projects consists of observing and interviewing representative users in their own environment?
|
|
12500
|
Which of the following technologies can be used to create innovation in mobile-based games?
|
|
12501
|
Which of the following style elements has the highest priority in the cascading rules?
|
|
12502
|
Which of the following statements regarding CSS in mobile widgets is/are correct?
|
|
12503
|
Which of the following is/are the most important factor(s) affecting mobile video production, distribution, and playback?
|
|
12504
|
Which of the following is/are the hardware limitation(s) that must be considered when creating a Mobile Application?
|
|
12505
|
Which of the following guidelines must be applied for the presentation of text in a mobile device?
|
|
12506
|
Which of the following Gestalt principles is used to visually set apart certain elements as belonging to a group even if they are far apart?
|
|
12507
|
Which of the following components can be used to achieve unity in the design of Mobile Applications?
|
|
12508
|
Which of the following audio codecs for 3GPP content supports AAC-LC (Low Complexity Mode)?
|
|
12509
|
When using Flash Lite for mobile web applications, why should alpha transparencies and gradients be avoided?
|
|
12510
|
When designing Mobile Applications, what must the designer keep in mind with regard to the end users of the mobile phone?
|
|
12511
|
When designing a game, the designer can detect multiple key presses in which of the following platform(s)?
|
|
12512
|
When designing a game for mobile devices, which of the following pre-game usability guidelines should be followed?
|
|
12513
|
What will happen if the name of a widget exceeds the maximum visible characters in the Application menu?
|
|
12514
|
What will happen if a widget is running on a device and that same device receives an incoming call?
|
|
12515
|
What is wrong with the theme in the given image?
|
|
12516
|
What is the recommended size of the icon that is to be displayed on the mobile device&#39;s Applications menu?
|
|
12517
|
What is the maximum bit rate suggested by RealNetworks guidelines for Local playback in Video encoding?
|
|
12518
|
What is the function of the left softkey in a mobile user interface?
|
|
12519
|
What is the advantage of aggregating static images (sprites) into a single composite resource?
|
|
12520
|
What does a Wireframe model of an Interaction design describe?
|
|
12521
|
The term Card in Mobile Applications refers to ________________.
|
|
12522
|
The given images show various types of themes. Which type should a theme designer generally avoid?
|
|
12523
|
The given images show various types of themes. Considering the consistency and contrast of each, which theme would be most preferable?
|
|
12524
|
The given images show a theme and two active backgrounds. Which active background would be used with the theme as shown?
|
|
12525
|
The color depth of the majority of Mobile devices is _______________.
|
|
12526
|
SVGT is a language for describing 2D graphics using ___________.
|
|
12527
|
Is the following statement true or false? The Best Practices Working Group for Mobile Web Application recommends that percentages and relative measures be avoided in favour of pixel and absolute m...
|
|
12528
|
Is the following statement true or false? S60 devices from Nokia use font S60 Sans.
|
|
12529
|
Is the following statement true or false? In widgets, the control panel that shows the softkey labels is hidden by default.
|
|
12530
|
If the screen width measures between 160 and 176 pixels, in which group will the mobile device be categorized in terms of screen width?
|
|
12531
|
If a video conversion is completed using Nokia Video Manager, what will the output of an .AVI file be?
|
|
12532
|
How do streaming, local playback, and progressive download differ from one another?
|
|
12533
|
How can the Figure-to-ground Gestalt principle be achieved?
|
|
12534
|
From the point of view of user experience design, who is the primary user and who is the secondary user if a hospital manager purchases software and the hospital staff uses it?
|
|
12535
|
During Mobile Application Development, which option below represents the best order to follow for the usability implementation process?
|
|
12536
|
As defined by S60 UI style for index finger usage, the minimum size of an element on the touch screen should be ________________.
|
|
12537
|
Which one of the following is a major benefit of verification early in the software development life cycle?
|
|
12538
|
Which of the following types of testing is likely to benefit the most from the use of test tools that provide the test capture and replay facilities?
|
|
12539
|
Which of the following types of testing emulates the real world use of a system and verifies that the product fulfills the intended requirements?
|
|
12540
|
Which of the following types of errors are uncovered in White-box testing?
|
|
12541
|
Which of the following tools supports traceability, recording of incidents, and scheduling of tests?
|
|
12542
|
Which of the following testing occurs outside the development environment?
|
|
12543
|
Which of the following test activities provides the maximum potential cost savings from the use of Computer-Aided Software Testing (CAST)?
|
|
12544
|
Which of the following strategies are used for Integration testing?
|
|
12545
|
Which of the following statements is not true regarding capture/replay tools?
|
|
12546
|
Which of the following statements is incorrect in relation to Test Automation?
|
|
12547
|
Which of the following statements is incorrect in relation to Smoke testing and Sanity testing?
|
|
12548
|
Which of the following statements is incorrect in relation to Code coverage?
|
|
12549
|
Which of the following statements holds true for Verification and Validation?
|
|
12550
|
Which of the following statements about Equivalence partitioning is correct?
|
|
12551
|
Which of the following Security testing concepts deals with the process of determining whether a requester is allowed to receive a service or perform an operation?
|
|
12552
|
Which of the following resources are tested by most of the Stress testing tools?
|
|
12553
|
Which of the following options correctly defines the term &quot;test harness&quot;?
|
|
12554
|
Which of the following models of software development incorporates testing into the whole software development life cycle?
|
|
12555
|
Which of the following is written by a programmer and is meant to call the function to be tested by passing test data to it?
|
|
12556
|
Which of the following is true regarding Static Analysis tools?
|
|
12557
|
Which of the following is true about Sanity Testing?
|
|
12558
|
Which of the following is not included in Non-functional testing?
|
|
12559
|
Which of the following is not a type of Incremental testing approach?
|
|
12560
|
Which of the following is not a Static testing methodology?
|
|
12561
|
Which of the following is not a part of System testing?
|
|
12562
|
Which of the following is incorrect for Black-box testing?
|
|
12563
|
Which of the following is false about software testing?
|
|
12564
|
Which of the following are the objectives of using a &quot;test harness&quot;?
|
|
12565
|
Which of the following are benefits of automated testing?
|
|
12566
|
When a defect is detected and fixed, the software should be retested to confirm that the original defect has been successfully removed. This is called:
|
|
12567
|
What would be the appropriate result of a Stress test at its peak?
|
|
12568
|
What is the normal order of activities in which software testing is carried out?
|
|
12569
|
What is the name of the testing method in which (for each pair of input parameters) all the possible discrete combinations of parameters are passed on?
|
|
12570
|
What is the main reason for testing a software immediately before releasing it?
|
|
12571
|
What is the difference between Regression testing and Retesting?
|
|
12572
|
What is Boundary value testing?
|
|
12573
|
What do you understand by the term &quot;Monkey test&quot;?
|
|
12574
|
Usability testing indicates that the design and system should be modified if:
|
|
12575
|
The testing phase in which individual software modules are combined and tested as a group is called:
|
|
12576
|
The testing performed by external organizations or standards bodies to give greater guarantees of compliance is called:
|
|
12577
|
The review of a technical document such as requirements specs or a test plan, with the purpose of looking for problems and seeing what is missing, without fixing anything is called:
|
|
12578
|
The process of using a test case to test a specific unit of code, function, or capability is called:
|
|
12579
|
The main focus of Black-box testing is:
|
|
12580
|
The determination of adherence or non adherence to a compliance is carried out during:
|
|
12581
|
The cursory examination of all the basic components of a software system to ensure that they work is called:
|
|
12582
|
Selecting the test inputs that are likely to reveal a failure associated with a particular defect is an example of the use of:
|
|
12583
|
Performance testing is used for real-time systems only.
|
|
12584
|
In which type of testing is random data generated for input into the software?
|
|
12585
|
In which of the following testing methodologies does the automatic generation of efficient test procedures/vectors use models of system requirements and specified functionality?
|
|
12586
|
In Bottom-up integration testing,
|
|
12587
|
Identify the defect which can be detected by Equivalence Partitioning Technique:
|
|
12588
|
Identification of set-use pairs is accomplished during which of the following static analysis activities?
|
|
12589
|
From the options given below which of the dynamic program analysis technique is aimed at improving application performance?
|
|
12590
|
From the following options, choose the best example which represents a reliability failure for an application:
|
|
12591
|
Choose the correct description of a Stub in software testing:
|
|
12592
|
Beta testing is performed by:
|
|
12593
|
You would like to restrict the values that can be entered into a cell so that only whole numbers between 1 and 100 can be entered. Which option in the menu allows you to accomplish this?
|
|
12594
|
You have a worksheet that contains the first names of customers in column A and last names in column B. You want to enter a formula in column F that combines the first name and the last name and at...
|
|
12595
|
You define a print area in your worksheet, but later you select a smaller range of cells to print and then click Selection under the menu File-&gt;Print-&gt;Print What-&gt;Selection. What will happen?
|
|
12596
|
You are making a sales performance report in Excel which you would like to present to the top management. Some of the column headings are too large and look out of place in their cells. You decide ...
|
|
12597
|
Which toolbar is shown in the figure?
|
|
12598
|
Which of the following statements is true if the cell B1 contains the formula =$A$1?
|
|
12599
|
Which of the following statements about the AutoFormat feature in Excel are correct?
|
|
12600
|
Which of the following statements about the AutoCorrect feature in Excel are correct?
|
|
12601
|
Which of the following formats will you use to enter the time, 3 P.M., in a cell?
|
|
12602
|
Which of the following are appropriate date format when you want to enter data into a cell in Microsoft Excel?
|
|
12603
|
What value is displayed if the formula =2+&quot;$9.00&quot; is entered into a cell?
|
|
12604
|
What should you add before a fraction to avoid entering it as a date, e.g. 1/3, in Excel?
|
|
12605
|
What is the quickest way to select all the columns of a worksheet in Microsoft Excel?
|
|
12606
|
What is conditional formatting used for? (It is available under the menu Format-&gt;Conditional Formatting)
|
|
12607
|
The figure shows the Text to Column menu option. What function does it perform?
|
|
12608
|
The figure shows the Calculation tab under the Tools-&gt;Options menu. The option under Calculation has been checked as Automatic. What does this mean?
|
|
12609
|
The figure shows the AutoFit Selection menu option. What function does it perform?
|
|
12610
|
The figure shows an Excel worksheet. You are about to create a new column called Avg Sales in column G which will display the average sales for Jan to April. Which of the following are correct form...
|
|
12611
|
The figure shows an Excel worksheet. What does the red triangle in cell C2 signify?
|
|
12612
|
The figure shows an Excel worksheet. If you want to freeze the row showing the months (row 1) and the column showing the products (column A), what should you do?
|
|
12613
|
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &#39;Z&#39;?
|
|
12614
|
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &#39;Y&#39;?
|
|
12615
|
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &#39;J&#39;?
|
|
12616
|
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &#39;A&#39;?
|
|
12617
|
State whether True or False. When you clear the contents from a cell, the formatting of the cell is also lost.
|
|
12618
|
State whether True or False. We can change the color of the worksheet tabs in our workbook?
|
|
12619
|
In Microsoft Excel, you select the row headings 10, 11 and 12 and then choose the menu option Insert -&gt; Rows. What will happen?
|
|
12620
|
If you enter a Part Number for a product in Excel e.g. 6776736, and want Excel to treat it as text and not a number, what should you do?
|
|
12621
|
How does the AutoComplete feature in Excel help you save time?
|
|
12622
|
You are creating a new formatting rule which will be used to format a PivotTable report. Which of the following formatting styles is NOT available while formatting all cells of PivotTable report ba...
|
|
12623
|
You are a financial consultant to multiple clients and you made an investment model for them. Now you want to find out how investment rates change under different market conditions. Which of the fo...
|
|
12624
|
With reference to the screenshot given, which of the following formulae CANNOT be used to calculate the average of the column &#39;Marks&#39; in the cell &#39;E17&#39;?
|
|
12625
|
Which of the following tools is used to format Excel worksheet data, as shown in the figure above?
|
|
12626
|
Which of the following statements is true regarding PowerPivot in Microsoft Excel 2010?
|
|
12627
|
Which of the following statements is true regarding MS Excel Web Access on a SharePoint Foundation 2010 Server?
|
|
12628
|
Which of the following statements is not true regarding offline cube files in Microsoft Excel 2010?
|
|
12629
|
Which of the following statements is NOT true regarding import of data into PowerPivot?
|
|
12630
|
Which of the following statements are true regarding PowerPivot in Microsoft Excel 2010?
|
|
12631
|
Which of the following sorting options is NOT available under the Sort On option while sorting the data of a table in an Microsoft Excel 2010 worksheet?
|
|
12632
|
Which of the following is available as fill options while formatting cells of an Excel worksheet using the format style as Data Bar?
|
|
12633
|
Which of the following components of Excel Services enables the user to edit a published workbook inside a web browser?
|
|
12634
|
Which of the following axis settings are available for the appearance of data bars for negative values in Microsoft Excel 2010?
|
|
12635
|
Which of the following areas in the Microsoft Excel 2010 PivotTable Field List, calculates the aggregates of columns?
|
|
12636
|
Which among the following settings is the default macro security setting?
|
|
12637
|
When you double-click on a pivot report value of a PivotTable in Microsoft Excel 2010, Excel creates new ________ with data corresponding to the pivot report value.
|
|
12638
|
What is the purpose of time stamping a digital signature in Microsoft Excel 2010?
|
|
12639
|
What is the filename extension of Excel workbooks which are saved as &#39;Excel Templates&#39;?
|
|
12640
|
What does the icon marked with a red square in the figure above signify?
|
|
12641
|
What are the benefits of digitally signing an e-mail in Microsoft Excel 2010?
|
|
12642
|
Suppose you have created a report in Excel named &#39;report.xlsx&#39;. Now you want your team members to be able to see the report remotely on a web browser, and edit the report, as desired. Also it is re...
|
|
12643
|
Suppose you create a workbook in Microsoft Excel 2010 and run the &#39;Check Accessibility&#39; option. This option is used to check the workbook for ____________.
|
|
12644
|
Suppose you clone the slicer shown in the image above into another worksheet in Microsoft Excel 2010. Considering that you make changes to the tile selected, in one of the slicers, which of the fol...
|
|
12645
|
State whether the following statement regarding cell references in Microsoft Excel 2010 is true or false: An Absolute cell reference consists of the column letter and row number.
|
|
12646
|
State whether the following statement regarding cell references in Microsoft Excel 2010 is true or false: A Relative cell reference consists of the column letter and row number surrounded by dolla...
|
|
12647
|
State whether the following is true or false: Excel Web App supports Undo/Redo but it is disabled when multiple users are collaborating on the same workbook
|
|
12648
|
State whether following statement regarding images in Microsoft Excel 2010 is true or false: Microsoft Excel 2010 supports 3D rotation of images.
|
|
12649
|
State whether following statement regarding cell references in Microsoft Excel 2010 is true or false: A Relative cell reference consists of the column letter and row number surrounded by dollar si...
|
|
12650
|
Slicers are filtering components which are used to filter the data in a PivotTable report or CUBE functions. Which of the following data sources is/are supported by Slicers in Microsoft Excel 2010?
|
|
12651
|
Microsoft Excel Services is a component of:
|
|
12652
|
In the given screenshot, there are red triangles in the upper-right corner of each cell under the column titled &#39;Registrations&#39;. What do these signify?
|
|
12653
|
In the given screenshot, the letter X is pointing to an area between the first Row header, and the first Column header. What will happen when this particular area is selected?
|
|
12654
|
In the given screenshot, the contents of the &#39;Name of User&#39; column have been oriented at an angle. How is this done?
|
|
12655
|
In the above given screenshot of a Microsoft Excel 2010 Worksheet, there are two columns B and D containing some integer data. Considering that cell D9 is assigned the formula: =SUM(D3:D7), which o...
|
|
12656
|
How would you assign a macro to a graphic?
|
|
12657
|
Excel keeps the changed history of a workbook for ________ days by default.
|
|
12658
|
Deleting a PivotChart report automatically deletes the associated PivotTable report.
|
|
12659
|
Analyze the syntax of LOOKUP function when used in vector form? LOOKUP(lookup_value, lookup_vector, result_vector) Which of the following arguments of the LOOKUP function is optional?
|
|
12660
|
Analyze the syntax of LOOKUP function when used in vector form? LOOKUP(lookup_value, lookup_vector, result_vector) The values in the lookup_vector must be placed in ________ order.
|
|
12661
|
Which type of additional information is stored within the digital signature?
|
|
12662
|
Which tab should be used to display or hide axes?
|
|
12663
|
Which scoping method should be used to conditionally format a set of fields in the values area for all levels in the hierarchy of data?
|
|
12664
|
Which part of the formula displays references in the given picture?
|
|
12665
|
Which option would you choose to display a list of formula used in the current PivotTable report?
|
|
12666
|
Which of the given methods would you follow to add an alternative text to a picture?
|
|
12667
|
Which of the given Document properties includes both file system properties and statistics that are maintained by Office programs for the user?
|
|
12668
|
Which of the following wildcard characters can be used as comparison criteria for Text Filters?
|
|
12669
|
Which of the following options would you choose to clear a PivotChart report?
|
|
12670
|
Which of the following options should be used to create a connection to a shared network folder, as shown in the picture?
|
|
12671
|
Which of the following options is not available on the Status bar?
|
|
12672
|
Which of the following methods would you follow to remove subtotals?
|
|
12673
|
Which of the following is not true regarding naming a cell?
|
|
12674
|
Which of the following is not true regarding column width?
|
|
12675
|
Which of the following is not true about the Watch Window?
|
|
12676
|
Which of the following is not true about an offline cube file?
|
|
12677
|
Which of the following is not a valid file extension in which an Excel file can be saved?
|
|
12678
|
Which of the following is a default method of a PivotTable report for scoping the conditional format of fields in the values area?
|
|
12679
|
Which of the following charts have no axes?
|
|
12680
|
Which method will you use to update table data from a Sharepoint list?
|
|
12681
|
Which Lookup function should be used when the comparison values are located in a column to the left of the data that is to be found?
|
|
12682
|
Which keyboard shortcut should be used to minimize or restore the ribbon?
|
|
12683
|
Which keyboard shortcut should be used to enter the current time?
|
|
12684
|
Which keyboard shortcut should be used to enter the current time in a cell in an excel sheet using a QWERTY computer keyboard?
|
|
12685
|
Which keyboard shortcut re-calculates all formulas in all open workbooks, regardless of whether or not they have changed since the last time?
|
|
12686
|
Which file format is typically used to remove printer corruption?
|
|
12687
|
Which database function estimates variance based on a sample from selected database entries?
|
|
12688
|
Which Consolidate option would you choose when you want to arrange the data in all the worksheets in identical order and location?
|
|
12689
|
Which Chart type is displayed in the given picture?
|
|
12690
|
Which chart displays axes but cannot display axis titles?
|
|
12691
|
Which among the following settings is the default macro setting?
|
|
12692
|
Which among the following options displays Legend entries in the given picture?
|
|
12693
|
Which among the following is not true regarding a calculated column?
|
|
12694
|
Where can the &#39;Show All Comments&#39; command be found?
|
|
12695
|
When would the data validation command be unavailable on the data tab?
|
|
12696
|
When does the triangle appear in the top-left corner of the cell, as shown in the picture?
|
|
12697
|
When does the error, as shown in the picture, occur?
|
|
12698
|
When &#39;a&#39; or &#39;p&#39; is not typed after the time in Worksheet cells, what does Excel enter the default time as?
|
|
12699
|
What would be the result, when =T(A4) is applied on the given table?
|
|
12700
|
What is the significance of the red symbol at the top right corner of the cell, as shown in the picture?
|
|
12701
|
What is the purpose of using the Keep text flat option, as shown in the picture?
|
|
12702
|
What is the option on the Document Inspector that finds the content type information?
|
|
12703
|
What does the screen tip displaying &quot;Showing All&quot; mean?
|
|
12704
|
What does the red icon indicate, as shown in the given picture?
|
|
12705
|
State whether true or false: When you sign the stamp signature line in an Office document, you add both a visible stamp and a digital signature.
|
|
12706
|
State whether true or false: When you freeze panes, you select specific rows or columns that remain visible when scrolling in the worksheet.
|
|
12707
|
State whether true or false: When the table headers are turned off, the table header Autofilters and all other applied filters are removed from the table.
|
|
12708
|
State whether true or false: When a part of a formula is replaced with its calculated value, it cannot be restored.
|
|
12709
|
State whether true or false: No data is deleted when an outline is hidden or removed.
|
|
12710
|
State whether true or false: If a SmartArt graphic was converted to individual shapes, it is not possible to convert them back to the SmartArt graphic.
|
|
12711
|
State whether true or false: For XY (Scatter) and bubble charts; error bars for the x values, the y values, or both, can be displayed.
|
|
12712
|
State whether true or false: Deleting the PivotChart report automatically deletes the associated PivotTable report.
|
|
12713
|
State whether true or false: A Macro project can be digitally signed.
|
|
12714
|
Referring to the given image, point out which option should be selected to automatically save a backup copy of a workbook.
|
|
12715
|
Refer to the given picture. Which option causes the last row in the table to appear and displays the word Total in the leftmost cell?
|
|
12716
|
Refer to the given image. Which of the following Fill options should be used to add color and transparency to a shape?
|
|
12717
|
Refer to the given image. Which line style option should be used to specify the style used for the end of the line?
|
|
12718
|
Refer to the given image. Which formula should be written on the given table to display &quot;Nancy Davolio&quot;?
|
|
12719
|
Refer to the given image. What will be the result if the formula =B3&amp;&quot;, &quot;&amp;A3 is applied on the given table?
|
|
12720
|
Refer to the given image. What is the purpose of the cell denoted as &#39;A&#39; in the worksheet?
|
|
12721
|
How would you select an entire PivotTable report?
|
|
12722
|
How would you locate the last filled cell on a worksheet?
|
|
12723
|
How would you assign a Macro to a graphic?
|
|
12724
|
How will you reverse the direction of a SmartArt graphic?
|
|
12725
|
How will you find cells with data validation?
|
|
12726
|
How will you display the Go To dialog box?
|
|
12727
|
How should blank cells be inserted on a Worksheet?
|
|
12728
|
How can a chart be modified?
|
|
12729
|
You would like to restrict the values that can be entered into a cell so that only whole numbers between 1 and 100 can be entered. Which option in the menu allows you to accomplish this?
|
|
12730
|
You start Microsoft Excel and you do not want it to automatically run a macro upon starting. What will you do?
|
|
12731
|
You select the row headings 10, 11 and 12 and then choose the menu option Insert-&gt;Rows. What will happen?
|
|
12732
|
You have recorded a macro. By mistake you recorded an action in it which you do not want. How will you remove the unwanted action without having to record the whole macro again?
|
|
12733
|
You have entered text in a cell which is too big for the cell. You want the text to appear in multiple lines inside the same cell. What will you do?
|
|
12734
|
You have entered 4/6 as data in a cell without applying any formats to it. By default, Excel will treat this data entry as a:
|
|
12735
|
You have created a worksheet which consists of confidential data. You want that these values, although present in the worksheet, should remain hidden and as a result the cells containing this data ...
|
|
12736
|
You define a print area in your worksheet, but later you select a smaller range of cells to print and then click Selection under the menu File-&gt;Print-&gt;Selection. What will happen?
|
|
12737
|
You are making a sales performance report in Excel which you would like to present to the top management. Some of the column headings are too large and look out of place in their cells. You decide ...
|
|
12738
|
Which toolbar is shown in the figure?
|
|
12739
|
Which of the following statements regarding the QUARTILE function is not true?
|
|
12740
|
Which of the following statements is true if the cell B1 contains the formula =$A$1
|
|
12741
|
Which of the following statement is true if the author has created the content with restricted permission using IRM?
|
|
12742
|
Which of the following shortcuts can be used to insert a new line in the same cell?
|
|
12743
|
Which of the following options would be used if you need to insert a number 77889867810070809 in a cell?
|
|
12744
|
Which of the following functions would return a value of 8?
|
|
12745
|
Which of the following function you will use to find the highest number in a series of numbers?
|
|
12746
|
Which of the following errors appears when an invalid argument is passed while converting a number from one number system to another system?
|
|
12747
|
Which of the following Date and Time function will you use to return the serial number of the last day of the month before or after a specified number of months?
|
|
12748
|
When using the VLOOKUP function, the error #REF! will appear in a cell if ________________.
|
|
12749
|
What will be the value in the cell C2 as shown in the figure when we use formula =A2+B2?
|
|
12750
|
What will be the output of the function IF(ISNA(MODE(B1:B4)),0,MODE(B1:B4)) when it is applied to the data series given below? B1:27 B2:22 B3:28 B4:21
|
|
12751
|
What should you add before a fraction to avoid entering it as a date, e.g. 1/3, in Excel?
|
|
12752
|
What is the quickest way to select all the columns on a worksheet?
|
|
12753
|
What function does the &#39;Compare Side by Side With&#39; command on the Window menu perform?
|
|
12754
|
What does the purple triangle at the bottom right corner of the cell signify?
|
|
12755
|
What does the NOW() function return?
|
|
12756
|
There is a workbook named Sales.xls which has a worksheet named Quarterly. This worksheet contains the quarterly sales figures for the company in cells A3 to A6. Now you want to create a formula in...
|
|
12757
|
The given figure shows the &#39;Compare Side by Side&#39; toolbar. What function is performed by the button marked with letter &#39;A&#39;?
|
|
12758
|
The figure shows the Text to Column menu option. What function does it perform?
|
|
12759
|
The figure shows the Calculation tab under the Tools-&gt;Options menu. The option under Calculation has been checked as Automatic. What does this mean?
|
|
12760
|
The figure shows the AutoFit Selection menu option. What function does it perform?
|
|
12761
|
The figure shows an Excel worksheet. What does the red triangle in cell C2 signify?
|
|
12762
|
The figure shows an Excel worksheet. If you want to freeze the row showing the months (row 1) and the column showing the products (column A), what should you do?
|
|
12763
|
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &#39;Z&#39;?
|
|
12764
|
The figure shows a view of the Standard Toolbar. What function is performed by the button marked by the letter &#39;A&#39;?
|
|
12765
|
The figure shows a view of the Drawing Toolbar. What function is performed by the button marked by the letter &#39;X&#39; ?
|
|
12766
|
Suppose the value in cell A1 is John and B1 is Smith then which of the following function you will use to get the John_Smith in C1 cell?
|
|
12767
|
State whether True or False. With the help of the Research task pane you can conduct research on Topics using an encyclopedia, Web search and also by accessing third-party content.
|
|
12768
|
State whether True or False. When using Document Workspaces, you cannot work directly on the Document Workspace copy, but you can work on your own copy which you can update periodically with chang...
|
|
12769
|
State whether True or False. AutoFilter drop-downs are automatically added in the header row of a list when the list is created.
|
|
12770
|
State whether True or False: When you clear the contents from a cell, the formatting of the cell is also lost.
|
|
12771
|
Is the following statement true or false? If a workbook is placed in the XLSTART folder, then the same workbook will open each time Excel is launched.
|
|
12772
|
How does the AutoComplete feature in Excel help you save time?
|
|
12773
|
How can you select all the blank cells in your worksheet?
|
|
12774
|
As shown in the figure what information will be enlisted by the tab marked as &quot;B&quot; about the current document?
|
|
12775
|
Your transport request is released in system X and imported in system Y. Which method is used to transport the data from X to Y?
|
|
12776
|
Your customer wants to use SAP NetWeaver Master Data Management ( MDM ) to cleanse and distribute business partners created in SAP CRM within the existing heterogeneous system environment. Which s...
|
|
12777
|
Your customer wants to migrate from an old legacy system to SAP ERP. The databases in both systems are modified. What is an advantage using the Legacy System Migration Workbench (LSMW) for the mig...
|
|
12778
|
You need to read an ABAP report from a database that is not declared in the ABAP Dictionary. How do you do this?
|
|
12779
|
You found an error for a field in Process-after-Input (PAI) of a dynpro. You change the value of this field and start PAI again. Where is the flow control starting in PAI in that case?
|
|
12780
|
You cannot book the business data during processing of an incoming IDoc. How must the function module react to this problem?
|
|
12781
|
You analyze the complexity of a customer-specific program to determine the expected maintenance efforts. Which measure do you use?
|
|
12782
|
Which task do you need to do after printing an Adobe form to avoid a program error?
|
|
12783
|
Which of the following is a use case for SAP Solution Manager?
|
|
12784
|
Which functionality has been introduced with the SAP Enterprise Edition of SAP Solution Manager?
|
|
12785
|
Which ABAP language element can you use in Enterprise Services?
|
|
12786
|
Where do you place the language key field in a customer-specific text table to enable generic buffering of this table?
|
|
12787
|
Where can you check which secondary index of a database table is used in a program?
|
|
12788
|
What should you emphasize when presenting the results of a code review to the customer?
|
|
12789
|
What provides guidelines for the development of Web services?
|
|
12790
|
What is the main advantage of enhancement packages in SAP Business Suite 7.0?
|
|
12791
|
What do you need to consider when using dynamic breakpoints?
|
|
12792
|
What are the effects of a COMMIT WORK during program execution?
|
|
12793
|
There are basically three types of SELECT statements: SELECT SINGLE, SELECT ... ENDSELECT, and SELECT ... INTO TABLE. The SELECT ... ENDSELECT statement is also known as the SELECT loop. Below, yo...
|
|
12794
|
The SAP List Viewer, commonly known as the ALV, is a powerful tool for displaying data. Among the various ALV types, the ALV Grid Control is used for displaying non-hierarchical table data.
|
|
12795
|
The event concept is vital for selection-screens. Which of the following usages of events make sense for selection-screens?
|
|
12796
|
The concept of visibility of components is well-known in object oriented languages. Which of the following statements are correct with regard to ABAP Objects?
|
|
12797
|
Some ABAP statements require an explicit end, like SELECT loops, FORM definitions, or IF clauses. Which of the following ABAP statements can be nested?
|
|
12798
|
Internal tables are used in ABAP to store mass data. Which of the following statements about the relationships between internal tables and database tables are correct?
|
|
12799
|
In which case do you decide to create a new ABAP OO class?
|
|
12800
|
In a report, you want to define a SELECT-OPTION so_xyz. What are possible ways of defining its type?
|
|
12801
|
In a program, you need an elementary data object for some calculations. What are possible ways to specify its type?
|
|
12802
|
In a new customer SAP GUI dynpro program, particular fields should be visible for authorized users only. How do you implement this requirement?
|
|
12803
|
In a customer program, a LOOP statement is processing time consuming database operations on transaction data. The execution of this program takes too long. How can you optimize the performance of ...
|
|
12804
|
In a customer application, it is necessary to save texts with undefined size. Which table type do you use to minimize programming efforts?
|
|
12805
|
How do you characterize customer and user exits?
|
|
12806
|
How do you avoid semantic mistakes for interface parameters in a customer specific routine?
|
|
12807
|
How can you realize a modification free instantiation of objects in a customer-specific ABAP OO development?
|
|
12808
|
During an upgrade project to SAP NetWeaver 7.0, you are asked for a strategy to convert the implemented classic BAdIs to the new BAdI type. What do you recommend?
|
|
12809
|
An international retail company needs a customer-specific list in SAP ERP that shows accumulated order values in a selectable currency. What do you need to know to create this program?
|
|
12810
|
Among the most frequently used enhancement concepts in ABAP, you find customer exits. Which of the following statements about customer exits are correct?
|
|
12811
|
ABAP has built-in types like C, I, N, STRING, or X. If you use these types for defining data objects, which of the following statements are correct?
|
|
12812
|
A customer wants to develop a Web application with Web Dynpro for Java as the front-end technology and a SAP ERP 6.0 system as the backend. Which type of external interface do you use to generate ...
|
|
12813
|
You want to update the last modified timestamp in the orders table. The correct way to do this in a PL/pgSQL function, when the parameter integer order_id is passed, would be:
|
|
12814
|
You want to manipulate some value in the database upon updation in a trigger function. Which line of the code would be appropriate?
|
|
12815
|
You have defined a function &quot;Calculate()&quot; in the template1 database. What will happen when you create a new database &quot;ManagementDB&quot; there?
|
|
12816
|
Will the following function compile and execute? DECLARE intValue int4; BEGIN intValue := 20 * 20; return intValue; END;
|
|
12817
|
Which statements hold true for Partition Tables?
|
|
12818
|
Which of the following variable declarations is not correct?
|
|
12819
|
Which of the following values is not defined to indicate the level of the raise event?
|
|
12820
|
Which of the following trigger function variables is not defined?
|
|
12821
|
Which of the following techniques can be used to obtain a result which is based on comparing one row of a table with another row of the same table?
|
|
12822
|
Which of the following statements regarding views are incorrect?
|
|
12823
|
Which of the following statements is not correct about creating a new operator?
|
|
12824
|
Which of the following statements is correct?
|
|
12825
|
Which of the following statements is correct with regard to PostgreSQL?
|
|
12826
|
Which of the following statements are true for views?
|
|
12827
|
Which of the following statements are incorrect regarding referential integrity?
|
|
12828
|
Which of the following security features is inbuilt in PostgreSQL?
|
|
12829
|
Which of the following programming structures is not available in PL/pgSQL?
|
|
12830
|
Which of the following is true about PostgreSQL clients?
|
|
12831
|
Which of the following is not defined in the PL/pgSQL?
|
|
12832
|
Which of the following is not an SQL operator?
|
|
12833
|
Which of the following is not a single value function?
|
|
12834
|
Which of the following is correct with regard to Password Authentication?
|
|
12835
|
Which of the following is correct regarding VACUUM?
|
|
12836
|
Which of the following is correct for the postmaster -n debugging option?
|
|
12837
|
Which of the following holds true when you have defined a function with &quot;isstrict&quot; attribute?
|
|
12838
|
Which of the following holds true if you have installed PL/pgSQL in the PgDatabase?
|
|
12839
|
Which of the following holds true for functions in PostgreSQL?
|
|
12840
|
Which of the following help PostgreSQL avoid unnecessary locking of records?
|
|
12841
|
Which of the following geometric types is not defined in PostgreSQL?
|
|
12842
|
Which of the following functions is not available in PostgreSQL?
|
|
12843
|
Which of the following functionalities is supported by the pg_ctl script?
|
|
12844
|
Which of the following files controls the host based authentication in PostgreSQL?
|
|
12845
|
Which of the following date function(s) are invalid?
|
|
12846
|
Which of the following date and time constants are not defined in PostgreSQL?
|
|
12847
|
Which of the following copy commands will work in PostgreSQL?
|
|
12848
|
Which of the following clauses are not allowed in a single row sub-query?
|
|
12849
|
Which of the following can be used to uniquely identify a row?
|
|
12850
|
Which of the following are valid in a declare block?
|
|
12851
|
Which of the following are supported by PostgreSQL?
|
|
12852
|
Which of the following are not DCL operations?
|
|
12853
|
Which method should be used to drop the master table if its primary key is being referenced by a foreign key in some other table?
|
|
12854
|
Which component of a DBMS verifies the syntax of the users query?
|
|
12855
|
Which clause should be used to display the rows of a table in ascending order of a particular column?
|
|
12856
|
Which character function should be used to return a specified portion of a character string?
|
|
12857
|
When should sub queries be used?
|
|
12858
|
What is wrong in this query: Select * from Orders where OrderID=(select OrderID from OrderItems where ItemQty&gt;50)
|
|
12859
|
What is the first step in installing PL/pgSQL in PostgreSQL?
|
|
12860
|
What is the error in the following query if the students table contains several records? select name from students where name = (select name from students order by name);
|
|
12861
|
What is the default variable for the PROMPT3?
|
|
12862
|
What is the default location of the standard elog?
|
|
12863
|
What is a cluster?
|
|
12864
|
What does the RAISE statement do in PL/pgSQL?
|
|
12865
|
What does the pg_dump command do? pg_dump CustomerDatabase
|
|
12866
|
What does the following update statement do? Update OrderTable set OrderDiscount=OrderDiscount*1.10
|
|
12867
|
What do you understand by the following PL/pgSQL declaration? c_phone customer.contact_no%TYPE;
|
|
12868
|
What do you infer from the following two lines? 1. host all 192.168.1.10 255.255.255.255 reject 2. host all 127.0.0.1 255.255.255.255 t...
|
|
12869
|
There is a table t upon which a primary key constraint by the name pk is applied. What will be the correct syntax to drop the constraint?
|
|
12870
|
There is a column c1 in the table t to which a primary key pk is to be added. What will be the correct syntax?
|
|
12871
|
There are two tables A and B. You are retrieving data from both tables where all rows from table B and only matching rows from table A should be displayed. Which type of join will you apply between...
|
|
12872
|
The primary key indexing technique does not allow:
|
|
12873
|
The names of those departments where there are more than 100 employees have to be displayed. Given two relations, employees and departments, which query should be used? Employee --------- Empno Emp...
|
|
12874
|
Select the appropriate query for the Products table when data should be primarily ordered by ProductGroup. ProductGroup should be displayed in ascending order and CurrentStock should be in descendi...
|
|
12875
|
Point out the incorrect statement regarding group functions:
|
|
12876
|
Perfect Services provides financial services. You need to display data from the pers table for joining_date from #1/1/2005# to #31/12/2005# and the job should be for Analyst or Clerk or Salesman. W...
|
|
12877
|
Normalization divides tables in a more useful and meaningful manner. Which statement is correct for the FIRST NORMAL FORM?
|
|
12878
|
Is function overloading available in PL/pgSQL?
|
|
12879
|
In which order are primary queries and their sub-queries interpreted:
|
|
12880
|
In which of the following ways can a value in an array column be modified?
|
|
12881
|
If entity x is existence-dependent on entity y, then what is x called?
|
|
12882
|
How can data be accessed by users who do not have direct access to the tables?
|
|
12883
|
For which of the following languages does PostgreSQL provide an API interface?
|
|
12884
|
Food Cart Accounting System (FOCAS) is maintaining products in the products table, and wants to see the products which are 50 or more numbers far from the minimum stock limit. The structure of the ...
|
|
12885
|
Examine the following query: Create table Person (EmpNo Number(4) not null, EName Char not null, Join_dt Date not null, Pay Number) Which of the following field(s) are created correctly?
|
|
12886
|
Every Boyce-Codd Normal Form(BCNF) is in:
|
|
12887
|
Data validation can be implemented at the definition stage through:
|
|
12888
|
Consider the following structure of the students table: rollno number(4) name varchar(20) course varchar(20) What will be the query to display the c...
|
|
12889
|
Choose the correct statements for a trigger function:
|
|
12890
|
Choose the correct statement:
|
|
12891
|
Choose the correct statement regarding WAL in PostgreSQL:
|
|
12892
|
Can you define variables in PostgreSQL pl/pgSQL whose value cannot be null?
|
|
12893
|
A wholesale merchant shop needs a report about the sale where total sale of the day is more than $50,000. Which of the following will fulfill this requirement?
|
|
12894
|
A steel production company has two sales outlets. Both outlets are maintaining their data separately in servers SVA and SVD. Both outlets use the same structure for the Sales table. Which method wi...
|
|
12895
|
A PL/pgSQL code block is defined with DECLARE, BEGIN and END. How many such sub blocks can be nested within a block?
|
|
12896
|
You use UDDI operations to find something when you do not know specifically what you are looking for. Which of the following UDDI operations fall in this category?
|
|
12897
|
You need to serialize an array named &#39;Street&#39;. You want to set the array name as &#39;StreetName&#39; after serialization. Which of the following codes will serialize the array correctly?
|
|
12898
|
You need to send an image from a Web server to an image server in order to customize the image for the Web surfer. Which of the following options will you use to send binary data with a SOAP message?
|
|
12899
|
You have written a method in your Web service which returns a void value. In order to make a one-way communication, which of the following do you need to do?
|
|
12900
|
You have created a Web service named &#39;Service1&#39;. The client application of &#39;Service1&#39; has a textbox called &#39;textbox1&#39; and you want to set the value of textbox1.text as UserAgent of &#39;Service1&#39;. Whic...
|
|
12901
|
You create a webservice which will send a SOAP fault for any request that does not include the right user-agent in the HTTP headers. In this case, the user-agent must be &quot;BasicInfo UserAgent&quot;. Whic...
|
|
12902
|
You are writing a document-encoded client for your Web service &#39;ShareQuotes&#39;. Which of the following indicates that this encoded client is not literal XML?
|
|
12903
|
You are developing a Web service in ASP.NET. Which of the following .net classes will be extended by your service?
|
|
12904
|
XML Serialization uses stream-based parsers in System.Xml. Which of the following types of streams can be used for serialization and deserialization?
|
|
12905
|
WSDL is an XML-based language for describing Web services. Which of the following are correct regarding the functioning of WSDL?
|
|
12906
|
WS-Routing specifies a series of elements that can send a SOAP Fault message in response to an error. Which of the following elements are relevant to the SOAP Fault message specified by WS-Routing?
|
|
12907
|
While creating a client application for a Web service called &#39;QuestionBank&#39;, which of the following should be extended by the client class &#39;Service1&#39;?
|
|
12908
|
Which of the following xml tags does not come with a DISCO document automatically generated by .NET?
|
|
12909
|
Which of the following XML related technologies are part of the .NET Framework&#39;s XML technology?
|
|
12910
|
Which of the following transport protocols can be used for communication of Web service?
|
|
12911
|
Which of the following should you know to send a message correctly while using Web service?
|
|
12912
|
Which of the following rules must be kept in mind while using SOAP with DIME?
|
|
12913
|
Which of the following represents an array in a SOAP message?
|
|
12914
|
Which of the following represents a structure in a SOAP message?
|
|
12915
|
Which of the following protocols form the basis of the Web Service Architecture?
|
|
12916
|
Which of the following namespaces is used for encoding style in SOAP?
|
|
12917
|
Which of the following is true with regard to .NET Web services? Statement 1:.NET Web services use the XmlSerializer as the engine for sending and receiving SOAP messages. Statement 2:.NET Web ser...
|
|
12918
|
Which of the following is the correct position of the header in a SOAP message?
|
|
12919
|
Which of the following is not a correct statement regarding schema?
|
|
12920
|
Which of the following is correct with regard to the statements given below? Statement 1: RPC-encoded clients are very similar to document-encoded ones. Statement 2: RPC-encoded clients need to se...
|
|
12921
|
Which of the following is correct with regard to the statements given below? Statement 1: A Web service is not a web site that a user reads. Statement 2: A Web service is something another process...
|
|
12922
|
Which of the following is correct with regard to the statements given below? Statement 1: A logical name is a URI that necessarily represents the exact location to which a message is sent. Stateme...
|
|
12923
|
Which of the following is correct with regard to SOAP Faults?
|
|
12924
|
Which of the following is an invalid child of a Fault element of a SOAP message?
|
|
12925
|
Which of the following is an example of referring an external document through a SOAP envelope?
|
|
12926
|
Which of the following is a process of making resources and services available on a new system, when the previous system fails while using a federated Web service design?
|
|
12927
|
Which of the following information does a server need to publish in order to meet a client&#39;s needs?
|
|
12928
|
Which of the following does the acronym UDDI stand for?
|
|
12929
|
Which of the following does the acronym DIME stand for?
|
|
12930
|
Which of the following code snippets are serializable?
|
|
12931
|
Which of the following classes provides the symmetric encryption functionality, a major form of encryption?
|
|
12932
|
Which of the following classes is the base class for Soap Extensions?
|
|
12933
|
Which of the following child elements of a Fault element is used to express application-specific details about the error that occurred?
|
|
12934
|
Which of the following can be encrypted with an XML encryption?
|
|
12935
|
Which of the following are the limitations of XML serialization?
|
|
12936
|
Which of the following are correct with regard to XML serialization?
|
|
12937
|
Which of the following are correct with regard to WSDL?
|
|
12938
|
Which of the following are correct with regard to WS-Routing?
|
|
12939
|
Which of the following are correct with regard to WS-Referral protocol?
|
|
12940
|
Which of the following are correct with regard to WS-Inspection?
|
|
12941
|
Which of the following are correct with regard to data types in SOAP?
|
|
12942
|
Which of the following are correct with regard to asynchronous pattern?
|
|
12943
|
Which of the following are correct with regard to operations of WS-Routing?
|
|
12944
|
Which of the following allows you, as a developer, to intercept every request that comes into an ASP.NET Web Service at various events, such as when the request begins, or when an error occurs?
|
|
12945
|
Which Fault type is used when an error occurs that cannot be directly linked to the processing of the message?
|
|
12946
|
Which entity type holds information about specific businesses or corporate entities?
|
|
12947
|
Which design methodology spreads out processes, components, and machines in a way that removes single points of failure?
|
|
12948
|
When reading a stream of XML in .Net, it can be verified that it is valid according to its schema. Which class is capable of performing the schema validation?
|
|
12949
|
When building a Web service, the Web Services Description Language (WSDL) is the most popular option for describing Web services. Which of the following sections are abstract parts of a WSDL in .ne...
|
|
12950
|
What does WSDL stand for?
|
|
12951
|
The Web service infrastructure comes with a special SOAP-based extension feature that enables you to extend the functionality of your Web service or Web service client. Which of the following will ...
|
|
12952
|
The use of attributes in a class and its members can affect the XML into which it serializes. Which of the following rules apply when a class is serialized?
|
|
12953
|
The two major features in .NET are the ability to create XML Web Services Servers and XML Web Services Clients. Which of the following is the engine that drives most of these features?
|
|
12954
|
The System.Xml.Serialization namespace contains classes that are used to serialize objects into XML format documents or streams. Which serialization class provides the serialization and deserializa...
|
|
12955
|
The namespace, System.Security.Cryptography has an abstract class, from which specific implementations of various symmetric, or private keys, and encryption algorithms are derived. Which of the fol...
|
|
12956
|
The fundamental idea behind SOAP is that two applications; regardless of the operating system, the programming language, or any other technical implementation detail, may openly share information u...
|
|
12957
|
The following code has stored the data using the multiple-referenced accessor: &lt;Person&gt; &lt;Address href=&quot;address1&quot; /&gt; &lt;/Person&gt; &lt;Address id=&quot;address1&quot; /&gt; Which of the following is the correct way t...
|
|
12958
|
The extensibility of Web services through the .NET Framework and ASP.NET Web Services contributes to the power and dynamic nature of Web services. Which of the following are correct with regard to ...
|
|
12959
|
State whether True or False: When you serialize an array that is a member of a class, the result is a piece of structured XML that contains (a) a top element which is, by default, the name of the ...
|
|
12960
|
Sometimes, you will want the WSDL file created for your service to indicate that it will be modified by the SOAP extension running on it. Conversely, you will want the proxy generated for you from ...
|
|
12961
|
SOAP defines four standard types of Faults that belong to the http://www.w3.org/2001/06/soap-envelope namespace. Which of the following is the incorrect Fault code?
|
|
12962
|
Security is a hard-to-use feature in .Net. On the contrary, it is rather easy to implement in Web services. Which of the following namespaces is used for encryption?
|
|
12963
|
Referring to the statements given below, which of the following is correct? Statement 1: One of the most powerful design decisions with SOAP was to make it transport independent, which means that ...
|
|
12964
|
Refer to the statements given below and identify the incorrect element: &lt;s:Envelope xmlns:s=&quot;...&quot;&gt; &lt;s:Body&gt; &lt;s:Faults&gt; &lt;faultcode&gt;Client.Authentication&lt;/faultcode&gt; &lt;faultstring&gt; Invalid credential...
|
|
12965
|
Refer to the following statements and identify the lines that are invalid: 1. &lt;%@ Service Class=&quot;TestClass&quot; Language=&quot;C#&quot; %&gt; 2. using System; 3. using System.Web.Service; 4. public class TestCla...
|
|
12966
|
Refer to the following SOAP message and identify the incorrect child element of the Fault element: &lt;s:Envelope xmlns:s=&quot;...&quot;&gt; &lt;s:Body&gt; &lt;s:Fault&gt; &lt;faultcode&gt;Client.Authentication&lt;/faultcode&gt; &lt;fault...
|
|
12967
|
Refer to the following code, which is a part of an xml validation: ... filename = &quot;OrderDetails.xml&quot;; FileStream stream = new FileStream( filename , FileMode.Open); XmlValidatingReader reader = new...
|
|
12968
|
Refer to the following code snippet: ... 1. XmlSerializer ser = new XmlSerializer( typeof(ServiceDescription) ); 2. FileStream objFile = new FileStream( txtWSDL.Text, FileMode.Open ); 3. ServiceDes...
|
|
12969
|
Refer to the following code of a SOAP message and identify the error: &lt;s:Envelope xmlns:s=&quot;http://www.w3.org/2001/06/soap-envelope&quot;&gt; &lt;s:Body&gt; &lt;n:getQuote xmlns:n=&quot;urn:QuoteService&quot;&gt; &lt;symbol xsi:ty...
|
|
12970
|
Refer to the code given below and identify the line numbers that contain errors: .. 1. Inquire.Url = &quot;http://uddi.rte.microsoft.com/inquire&quot;; 2. FindBusiness findBusiness = new FindBusiness(); 3. f...
|
|
12971
|
Often you will want child elements of XML to be in the same namespace as their parent XML elements, and this makes sense for a lot of XML documents. However, sometimes child elements will be in oth...
|
|
12972
|
Mike is writing a RPC-encoded client for his Web service. Which attribute will he use for RPC implementation?
|
|
12973
|
Mike has built the following document literal web service client class by hand. This code contains an invalid syntax in one line. Identify this line. 1. [WebServiceBinding(&quot;MyBinding&quot;, &quot;http://MyN...
|
|
12974
|
Mark is developing a Web service that handles RPC-encoded operations. He wants to make all the methods of the service RPC-encoded, but does not want to put any attribute for each method. Which clas...
|
|
12975
|
Mark intends to use Web services of &#39;Royal Airways&#39; in his application. He is searching for UDDI APIs, available in the .net library. Which of the following codes should he apply in this scenario?
|
|
12976
|
In the .NET UDDI SDK, which of the following contains the businessEntity structure?
|
|
12977
|
Gavin wants to read the WSDL of his Web service as &#39;QBankWS&#39;. Which of the following classes is capable of keeping the WSDL?
|
|
12978
|
Creating a hash with a public key encryption is the ability to verify the integrity of data without necessarily encrypting it. Which of the following are correct with regard to HASH?
|
|
12979
|
Client access is accomplished via custom proxy classes that use the WebRequest and HttpWebRequest classes. Which kinds of .NET applications use these proxy classes?
|
|
12980
|
While troubleshooting Xserver, which of the following steps is not required?
|
|
12981
|
Which statement correctly creates a Volume Group, named vg0, when there are two partitions /dev/hda6 and /dev/hda7 of 150 MB each, totalling 300MB?
|
|
12982
|
Which of the following repquota command option is used to Report all quotas, even if there is no usage?
|
|
12983
|
Which of the following files contains the IP address of the gateway?
|
|
12984
|
Which of the following denotes Raid level 0?
|
|
12985
|
Which of the following commands will format the /test partition?
|
|
12986
|
Which of the following commands enables ip forwarding permanently?
|
|
12987
|
Which is the correct command to start the daemon of the printserver?
|
|
12988
|
Which file contains the configuration of the network card?
|
|
12989
|
Which entry is specified in /etc/resolv.conf ?
|
|
12990
|
Which entry is not required in /etc/sysconfig/network ?
|
|
12991
|
Which entry does not belong to ifcfg-eth0 ?
|
|
12992
|
Which command is used to set a quota for user Debbie. The path is /test, the size of quota is 5MB and soft limit is 4MB. The user is not allowed to use more than 5MB.
|
|
12993
|
When VGs (Volume Groups) are created, where are the VG information files stored?
|
|
12994
|
When the system is started, it shows Redhat Enterprise Linux. When the enter key is pressed, it shows the grub prompt. The present working directory is either / or /boot. How can you find the /boot...
|
|
12995
|
What will be the behavior of the following command: # echo &quot;1&quot; &gt; /proc/sys/net/ipv4/ip_forward
|
|
12996
|
What types of files does /proc filesystem consist of?
|
|
12997
|
What should be the command to view the details of raid device /dev/md0 ?
|
|
12998
|
What should be done to extend a 200MB LVM named lv0 by 50MB. A volume group named vg0 of 100MB is available free, lv0 is mounted on /test ?
|
|
12999
|
What problems will be faced during reboot, when the permissions of /tmp are 655, and the default permissions are 1777?
|
|
13000
|
What is the path of rc.sysinit?
|
|
13001
|
What is the full form of MBR?
|
|
13002
|
What is the correct format for kickstart installation through NFS, when the NFS IP is 192.168.0.254, and the file path on the server is /kickstart/ks.cfg ?
|
|
13003
|
What is proc file system?
|
|
13004
|
What does the entry id:3:initdefault: define in the /etc/inittab file?
|
|
13005
|
Through which of the following commands can a corrupted initrd be recreated?
|
|
13006
|
There are 3 disks of 1 GB each, with mean total 3 GB. If a raid level 5 is implemented, what will be the size of the raid device?
|
|
13007
|
The command which configures devices is:
|
|
13008
|
Sticky bit and suid are to be set on /home/test. Which command should be used to give rwx permissions to each user, group and others?
|
|
13009
|
In which of the following locations are boot messages stored?
|
|
13010
|
In which mode can LVM be created during installation?
|
|
13011
|
If the permissions of rc.sysinit are changed from 655 to 444, what will happen during the next reboot?
|
|
13012
|
If /root partition is installed on /dev/hda2, what defines hda2 ?
|
|
13013
|
How should a raid device /dev/md0, with level 0, and devices /dev/hda6, /dev/hda7 be created?
|
|
13014
|
How should a cron job that prints &quot;hello&quot; every morning at 4:02am, be set up?
|
|
13015
|
How much space does the IPL (Initial Program Loader) take on the disk?
|
|
13016
|
How many disks are required in Raid level 5?
|
|
13017
|
How is an LVM of 200MB named lv0 created within the volume group vg0?
|
|
13018
|
How can you tell which RPM the /etc/inittab file belongs to?
|
|
13019
|
How can kernel-2.6.9-5 rpm be installed?
|
|
13020
|
How can ext3 filesystem be converted to ext2 filesystem if the partition is /dev/hda7 ?
|
|
13021
|
How can ext2 filesystem be converted to ext3 filesystem if the partition is /dev/hda7 ?
|
|
13022
|
During Linux installation, in which mode can RAID be created?
|
|
13023
|
Can the size of LVM be decreased?
|
|
13024
|
Can / partition on lvm device be installed during installation?
|
|
13025
|
A new swap partition is created and entered correctly in /etc/fstab. How will it be mounted?
|
|
13026
|
A new partition /dev/hda6 has been created. How will it be formatted with ext3 file system (one block=1024 bytes, inode size=one inode every 2 blocks)?
|
|
13027
|
Why is the wc command used?
|
|
13028
|
Who developed Linux?
|
|
13029
|
Which of the following vi commands will save the file and exit forcefully from the vi editor?
|
|
13030
|
Which of the following vi commands will exit forcefully from the vi editor without saving changes to the file?
|
|
13031
|
Which of the following vi commands will discard the changes to the file and exit the vi editor?
|
|
13032
|
Which of the following vi commands will delete the current line?
|
|
13033
|
Which of the following vi commands is used to enter in to insert mode?
|
|
13034
|
Which of the following is the path that contains documentation about installed packages?
|
|
13035
|
Which of the following is the parent process in Linux, which further has no parent?
|
|
13036
|
Which of the following is the intermediate between the hardware and the shell in the Linux operating system?
|
|
13037
|
Which of the following is the correct path of the passwd file?
|
|
13038
|
Which of the following is not a valid shell?
|
|
13039
|
Which of the following is an incorrect command?
|
|
13040
|
Which of the following commands will show you a page-wise listing?
|
|
13041
|
Which of the following commands will create a softlink?
|
|
13042
|
Which of the following commands lets you search for text in a file without opening the file first?
|
|
13043
|
Which of the following commands can be used to display a long listing of files, with a human-readable file size (like 6.8M instead of 6819467)?
|
|
13044
|
Which of the following are valid grep syntax?
|
|
13045
|
Which is the correct syntax to give permission 755 to the dir /etc/test ?
|
|
13046
|
Which is the correct syntax to display the calendar of September 2005?
|
|
13047
|
Which command is used to modify the user?
|
|
13048
|
Which command is used to add a new group?
|
|
13049
|
Which command changes permissions of files or directories?
|
|
13050
|
Which command adds a new user?
|
|
13051
|
What output should the ls command show after executing the following command? $ touch {report,graph}_{jan,feb,mar}
|
|
13052
|
What kind of software is the Linux operating system?
|
|
13053
|
What is the purpose of the touch command?
|
|
13054
|
What is the purpose of the makewhatis command?
|
|
13055
|
What is the output of the following command? $ man cal &gt; cal.man
|
|
13056
|
What is the name of the file where groups are added?
|
|
13057
|
What is the meaning of GPL?
|
|
13058
|
What is the correct format to open the file /etc/test into the vi editor?
|
|
13059
|
What does the pwd command do?
|
|
13060
|
What does the history command do?
|
|
13061
|
What does the head command do?
|
|
13062
|
What does the following command do? # whatis cal
|
|
13063
|
What does the du command do?
|
|
13064
|
What does the aspell command do?
|
|
13065
|
What does permission 777 denote?
|
|
13066
|
What does permission 644 denote?
|
|
13067
|
The user&#39;s current path is /root/Desktop/abc. If he runs $ cd ../../../ what will be the user&#39;s current working directory?
|
|
13068
|
Linux operating system is:
|
|
13069
|
If the umask is 0022, what is the default file permission?
|
|
13070
|
How will you display the fifth man page for the inittab command?
|
|
13071
|
How many terminals are provided by default in the Linux operating system?
|
|
13072
|
How can you obtain a short description of the ls command?
|
|
13073
|
How can you locate the file named passwd?
|
|
13074
|
How can the version of the Linux kernel be checked?
|
|
13075
|
Does Linux support wildcard characters, regular expressions and modifiers?
|
|
13076
|
With which of the following are Declarative Databinding expressions delimited?
|
|
13077
|
While using the declaration below, what is the result of clicking on the control? &lt;input id=&quot;Button1&quot; type=&quot;button&quot; onclick=&quot;return Button1_onclick()&quot;/&gt;
|
|
13078
|
Which of the following types guarantee atomic reads and writes?
|
|
13079
|
Which of the following tasks are appropriate for accessing a Web Service from the client code?
|
|
13080
|
Which of the following statements are true about Passport Authentication?
|
|
13081
|
Which of the following statement is not true related to Data Provider in ADO.NET?
|
|
13082
|
Which of the following operators can be overloaded?
|
|
13083
|
Which of the following operations can NOT be performed inside a catch block?
|
|
13084
|
Which of the following mechanisms are not suitable for returning a single row from a DataTable containing a large number of records?
|
|
13085
|
Which of the following is/are true regarding the use of Authentication to control access to the HTML file (.htm .html)?
|
|
13086
|
Which of the following is/are true of the System.Text.StringBuilder class?
|
|
13087
|
Which of the following is/are true about enums?
|
|
13088
|
Which of the following is used to remove a cookie from a client machine?
|
|
13089
|
Which of the following is true about exceptions?
|
|
13090
|
Which of the following is not an unboxing conversion?
|
|
13091
|
Which of the following is not a valid attribute for impacting serialization?
|
|
13092
|
Which of the following is correct for Application Center Test (ACT) to perform load testing?
|
|
13093
|
Which of the following is a primary characteristic of the System.Xml.XmlDataDocument?
|
|
13094
|
Which of the following is true about VB generics?
|
|
13095
|
Which of the following events should be used for assigning a Theme dynamically to a page?
|
|
13096
|
Which of the following event you will use if you want any updates before the server control is rendered to the page?
|
|
13097
|
Which of the following elements can be adjusted when using the ProcessModel element of the Machine.Config file?
|
|
13098
|
Which of the following does Event Bubbling allow composite controls to perform?
|
|
13099
|
Which of the following differentiates a UserControl from a Custom Server control?
|
|
13100
|
Which of the following controls allows the use of XSL to transform XML content into formatted content?
|
|
13101
|
Which of the following conditions can trigger the automatic recycling of an ASP.NET application hosted in IIS?
|
|
13102
|
Which of the following code samples will cause a compilation error?
|
|
13103
|
Which of the following class is used to divide the time into units such as weeks, months, and years?
|
|
13104
|
Which of the following characteristics do overloaded methods have?
|
|
13105
|
Which of the following can you do when deleting a DataRow from the DataRowCollection of a DataTable?
|
|
13106
|
Which of the following can one use to detect the user&#39;s current language?
|
|
13107
|
Which of the following can Interfaces contain?
|
|
13108
|
Which of the following can be used to preserve state information?
|
|
13109
|
Which of the following are valid assignments?
|
|
13110
|
Which of the following are true when comparing built in types for equality?
|
|
13111
|
Which of the following are true regarding validation in an ASP.NET application?
|
|
13112
|
Which of the following are true of using ADO.NET DataSets and DataTables?
|
|
13113
|
Which of the following are true for parameters?
|
|
13114
|
Which of the following are true about Nullable types?
|
|
13115
|
Which of the following are true about event handling?
|
|
13116
|
Which of the following are true about declarative attributes?
|
|
13117
|
Which of the following are required to be true by objects which are going to be used as keys in a System.Collections.HashTable?
|
|
13118
|
Which of the following are performed to fully debug an ASP.NET Application running on the same machine as the debugger?
|
|
13119
|
Which of the following are not valid namespaces in the .NET framework?
|
|
13120
|
Which of the following are common methods of supplying &quot;Help&quot; information to an ASP.NET application?
|
|
13121
|
Which of the following accurately describes the class structure when implementing an ASP.Net page which uses the CodeFile attribute?
|
|
13122
|
Which method calls will compile the following code? Private Sub Sample(ByVal number As Integer, Optional ByVal bool As Boolean = True) End Sub
|
|
13123
|
Which directive allows the utilization of a custom web control in an ASP.NET page?
|
|
13124
|
Which access limitation does a class member declared &quot;Protected Friend&quot; have?
|
|
13125
|
Where should information about a control created at design time be stored?
|
|
13126
|
Where should an instance of an object which provides services to all users be stored?
|
|
13127
|
When using the Demand method of System.Security.IPermission, which of the following will occur?
|
|
13128
|
When using Cascading Style Sheets (CSS) to format output, which of the following is/are true?
|
|
13129
|
What is the result of Console.WriteLine(&quot;{0}:{1}:{2}&quot;, CInt(2.5), CInt(1.5), Fix(1.5))?
|
|
13130
|
What does the OrElse operator do?
|
|
13131
|
What does the AndAlso operator do?
|
|
13132
|
Via which of the following is ViewState maintained by default?
|
|
13133
|
Transactions initiated in which of the following are supported by the System.Transactions infrastructure?
|
|
13134
|
The earliest event in which all viewstate information has been restored is:
|
|
13135
|
Of which elements does Generics allow parameterization by type?
|
|
13136
|
In which of the following ways do structures differ from classes?
|
|
13137
|
In which file are Predefined Client Side Validation Scripts defined?
|
|
13138
|
In the following example, by which technique can the method Test in the derived class Cat access the implementation of MakeNoise in the base class? Public Class Animal Public Overridable Sub MakeN...
|
|
13139
|
Determining the availability of sufficient memory for an operation can be accomplished by:
|
|
13140
|
DateTime Structures is suitable for which of the following applications?
|
|
13141
|
Custom non-fatal exceptions should be derived from:
|
|
13142
|
By which of the following can the .NET class methods be included in .aspx files?
|
|
13143
|
Your company, StoreIt Inc has stored the text of several journals in a Microsoft SQL Server 7.0 database. Each sentence is stored in a separate record so that the text can be retrieved with the fi...
|
|
13144
|
You want to display the titles of books that meet the following criteria: 1. Purchased before November 11, 2002 2. Price is less than $500 or greater than $900 You want to sort the result by the ...
|
|
13145
|
You want to access data from the &quot;Customer&quot; table in the database. You generate a DataSet named &quot;MyDataSet&quot; by adding &quot;Customer&quot; table to it. Which of the following statements should you use to loa...
|
|
13146
|
You use a Command object to retrieve employee names from the employee table in the database. Which of the following will be returned when this command is executed using ExecuteReader method?
|
|
13147
|
You need to install an online parcel tracking application and its supporting assemblies so that the application and its assemblies can be uninstalled using the Add/Remove Programs Control Panel app...
|
|
13148
|
You have developed a custom server control and have compiled it into a file named FirstReport.dll. The code is displayed below: &lt;%@ Register TagPrefix=&quot; CertKing Tag&quot; Namespace=&quot;ReportNS&quot; Assembly...
|
|
13149
|
You create an ASP.NET page that allows a user to enter a requested delivery date in a TextBox control named txtDelDate. The date must be no earlier than two business days after the order date, and ...
|
|
13150
|
You create an ASP.NET page named ProjectCalendar.aspx that shows scheduling information for projects in your company. The page is accessed from various other ASP and ASP.NET pages hosted throughout...
|
|
13151
|
You create an ASP.NET page named Customer.aspx. Customer.aspx contains a Web user control that displays a drop-down list box of Cities. The Web user control is named CityList, and it is defined in ...
|
|
13152
|
You create an ASP.NET application for an online insurance site PremiumInsurance. A page named PersonalDetails.aspx has the following Page directive: &lt;%@ Page Language=&quot;VB&quot; CodeBehind=&quot;PersonalDeta...
|
|
13153
|
You create an ASP.NET application for ABC Corporation. The project manager requires a standard appearance for all Web applications. Standards are expected to change periodically. You need to enforc...
|
|
13154
|
You are the software engineer for Premium Corp.. One of the pages in an ASP.NET application contains the following declaration: &lt;%@ Register Tagprefix=&quot;WoodySideBankControls&quot; Namespace=&quot;WoodySideB...
|
|
13155
|
You are maintaining data for its products in the Products table, and you want to see those products, which are 50 items that is currentStock or more than 50 but less than the minimum stock limit of...
|
|
13156
|
You are developing an application to take orders over the Internet. When the user posts back the order form, you first check to see whether he is a registered customer of your company. If not, you ...
|
|
13157
|
You are developing a website that has four layers. The layers are user interface (web pages), business objects, data objects, and database. You want to pass data from the database to controls on a ...
|
|
13158
|
You are debugging an ASP.NET application for Premium Corp.. Users will use the application to produce reports. Your application contains several Debug.WriteLine statements. Which window in Visual S...
|
|
13159
|
You are debugging a Visual Basic.NET application. You add a variable to the watch window. When Visual Basic enters break mode, the Value of the expression variable is &quot;&quot;. What is the most likely ca...
|
|
13160
|
You are creating an ASP.NET Web site for your company. The Web site will use both Microsoft(R) .NET Framework server controls and ActiveX controls. You want to use Microsoft Visual Studio(R) .NET t...
|
|
13161
|
You are creating an ASP.NET page for your company&#39;s Web site. Customers will use the ASP.NET page to enter payment information. You add a DropDownList control named oPaymentTypeList that enables cu...
|
|
13162
|
You are creating an ASP.NET page for Premium Consultants. You create a GridView control that displays past purchases made by the user. The GridView control is populated from an existing database wh...
|
|
13163
|
You are creating an ASP.NET application. The application will be deployed on intranet. Application uses Microsoft Windows authentication. More than 100 users will use the ASP.NET application simult...
|
|
13164
|
You are creating an ASP.net application to enter timesheet data intuitively. Users will enter data using a DataGrid. You have added a button column to your DataGrid. The button column uses a custom...
|
|
13165
|
You are creating an ASP.NET application that will run on your company&#39;s intranet. You want to control the browser window and respond immediately to non-post-back events. Which should you use?
|
|
13166
|
You are creating an ASP.NET application that will record each customer&#39;s entry. It is possible that thousands of entries could be posted at any given time. Your application will be hosted on twenty...
|
|
13167
|
You are creating an ASP.NET application that is hosted on your company&#39;s Web server. You want to access a database with minimal effort. What you will not do?
|
|
13168
|
You are creating an ASP.NET application for AutoMart Internet Web site. A toolbar is required that will be displayed at the top of each page in the Web site. The toolbar will contain only static HT...
|
|
13169
|
You are a web developer for an international literary website. Your application has a lot of text content that requires translation and few executable components. Which approach would you use?
|
|
13170
|
XYZ is creating an e-commerce site for PremiumBoutique. The site is distributed across multiple servers in a Web farm. Users will be able to navigate through the pages of the site and select produc...
|
|
13171
|
Which query will display data from the Pers table relating to Analysts, clerks and Salesmen who joined between 1/1/2005 and 1/2/2005?
|
|
13172
|
Which operator will be evaluated first in the following statement: select (age + 3 * 4 / 2 - 8) from emp
|
|
13173
|
Which one of the following correctly selects rows from the table myTable that have null in column column1?
|
|
13174
|
Which of the two statements is true? (a)MSIL code is platform independent (b)CLR is platform dependent
|
|
13175
|
Which of the following queries is valid?
|
|
13176
|
Which of the following objects is required by the Dataset to retrieve data from a database and to save updated data back to the database?
|
|
13177
|
Which of the following is the way to handle Unmanaged Code Exceptions in ASP.NET?
|
|
13178
|
Which of the following is the syntax for creating an Index?
|
|
13179
|
Which of the following is the default configuration file for each application in ASP.NET?
|
|
13180
|
Which of the following is not a valid SQL operator?
|
|
13181
|
Which of the following is not a valid directive in ASP.NET?
|
|
13182
|
Which of the following is not a valid ASP.NET Web form control?
|
|
13183
|
Which of the following is not a service provided by Common Language Runtime (CLR)?
|
|
13184
|
Which of the following has the highest order of precedence in SQL Server?
|
|
13185
|
Which of the following datatypes is not supported by SQL-Server?
|
|
13186
|
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
|
|
13187
|
Which of the following connectionstring in Web.Config is correct if Microsoft SQL Server database named ClassList resides on a server named Neptune is to be used?
|
|
13188
|
Which of the following are the valid methods of the SqlTransaction class?
|
|
13189
|
Which of the following are not true in ASP.NET?
|
|
13190
|
Which of the following are false for ASP.NET events?
|
|
13191
|
Which of the following are aggregate functions in SQL?
|
|
13192
|
Which of following is correct if you want to import a C# class called myClass that is implemented in the myClass.cs file into a .aspx page?
|
|
13193
|
Which line of code should you use to copy the edited rows from dataset productInfo into another dataset productChanges?
|
|
13194
|
Which DLL is responsible for processing the page requests running on the server?
|
|
13195
|
When you make some changes to the configuration file, do you need to stop and start IIS to apply the new settings?
|
|
13196
|
When designing a database table, how do you avoid missing column values for non-primary key columns?
|
|
13197
|
What will happen if you query the emp table as shown below: select empno, DISTINCT ename, Salary from emp;
|
|
13198
|
What will happen if the Server configuration file and the Application configuration file have different values for session state?
|
|
13199
|
What is wrong with the following query: select * from Orders where OrderID = (select OrderID from OrderItems where ItemQty &gt; 50)
|
|
13200
|
What is the total no. of events in Global.asax file in Asp.NET?
|
|
13201
|
What is the order of precedence among the following operators? 1 IN 2 NOT 3 AND 4 OR
|
|
13202
|
What is the correct order of clauses in the select statement? 1 select 2 order by 3 where 4 having 5 group by
|
|
13203
|
What does the following line of code do? &lt;%@ Register tagprefix=&quot;ril&quot; Tagname=&quot;test&quot; Src=&quot;rilTest.ascx&quot; %&gt;
|
|
13204
|
What data types do the RangeValidator control support?
|
|
13205
|
View the following Create statement: 1 Create table Pers 2 (EmpNo Int not null, 3 EName Char not null, 4 Join_dt Datetime not null, 5 Pay Int) Which line contains an error?
|
|
13206
|
The STUDENT_GRADES table has these columns: STUDENT_ID INT SEMESTER_END DATETIME GPA FLOAT Which of the following statements finds the highest Grade Point Average (G...
|
|
13207
|
The simplest query must include at least________ and _________.
|
|
13208
|
The sales database contains a customer table and an order table. For each order there is one and only one customer, and for each customer there can be zero or more orders. How should primary and ...
|
|
13209
|
The names of those departments where there are more than 100 employees have to be displayed. Given two relations, employees and departments, what query should be used? Employee --------- Empno Emp...
|
|
13210
|
Study the situation described below and identify the nature of relationship? Each student can enroll into more than one class. Each class can accommodate more than one student.
|
|
13211
|
Sam is developing an application that enables the users to perform read and write operations on text files. He uses structured exception handling to handle the errors. He writes the code for closin...
|
|
13212
|
LAST_NAME DEPARTMENT_ID SALARY ALLEN 10 3000 MILLER 20 1500 King 20 2200 Davis ...
|
|
13213
|
It is time for the annual sales awards at your company. The awards include certificates awarded for the five sales of the highest sale amounts. You need to produce a list of the five highest revenu...
|
|
13214
|
Is the FROM clause necessary in every SELECT statement?
|
|
13215
|
Is it possible to insert several rows into a table with a single INSERT statement?
|
|
13216
|
In Windows built-in authentication, what will happen with the following set of statements? &lt;system.web&gt; &lt;authorization&gt; &lt;deny users=&quot;RIL&quot;/&gt; &lt;allow users=&quot;RIL&quot;/&gt; &lt;/authorization&gt; &lt;/s...
|
|
13217
|
In which sequence are queries and sub-queries executed by the SQL Engine?
|
|
13218
|
In which of the following namespaces is the Assembly class defined?
|
|
13219
|
In SQL Server, you should avoid the use of cursors because:
|
|
13220
|
In SQL Server, which of the following is not a control statement?
|
|
13221
|
In ASP.NET, which of the following is not an event of the Page class?
|
|
13222
|
In ASP.NET, the exception handling should be used:
|
|
13223
|
In ASP.NET, the control&#39;s value set during the postback can be accessed in:
|
|
13224
|
In a SQL Server query, what will the output be if you try to perform arithmetic on NULL values?
|
|
13225
|
How you will generate a report with minimum network traffic?
|
|
13226
|
How can you view the results of Trace.Write() statements?
|
|
13227
|
How can you pop-up a window to display text that identifies the author of the book?
|
|
13228
|
How can you change &quot;Hansen&quot; into &quot;Nilsen&quot; in the LastName column in the Persons Table?
|
|
13229
|
Examine the two SQL statements given below: SELECT last_name, salary, hire_date FROM EMPLOYEES ORDER BY salary DESC SELECT last_name, salary, hire_date FROM EMPLOYEES ORDER BY 2 DESC What is tru...
|
|
13230
|
Examine the query:- select (2/2/4) from tab1; where tab1 is a table with one row. This would give a result of:
|
|
13231
|
Examine the code given below: SELECT employee_id FROM employees WHERE commission_pct=.5 OR salary &gt; 23000 Which of the following statements is correct with regard to this code?
|
|
13232
|
Evaluate the following SQL statement: SELECT e.employee_id,( (.15* e.salary) + (.5 * e.commission_pct) + (s.sales_amount * (.35 * e.bonus))) AS CALC_VALUE FROM employees e, sales s WHERE e.employe...
|
|
13233
|
Consider the transaction: Begin Transaction Create table A ( x smallint, y smallint) Create table B ( p smallint, q smallint) Update A set x=600 where y &gt; 700 Updat...
|
|
13234
|
Consider the query: SELECT name FROM Student WHERE name LIKE &#39;_a%&#39;; Which names will be displayed?
|
|
13235
|
Consider the following two tables: 1. customers( customer_id, customer_name) 2. branch ( branch_id, branch_name ) What will be the output if the following query is executed: Select *, bran...
|
|
13236
|
Consider the following two statements relating to ASP.NET and choose the most appropriate option: Statement 1: Value types are allocated on a stack Statement 2: Reference types are allocated on a ...
|
|
13237
|
Consider the following two statements and choose the most appropriate option: 1. For configuration, ASP.NET uses IIS Metabase 2. For configuration, ASP.NET uses an XML based configuration system
|
|
13238
|
Consider the following table structure of students: rollno int name varchar(20) course varchar(20) What will be the query to display the courses in w...
|
|
13239
|
Consider the following queries: 1. select * from employee where department LIKE &#39;[^F-M]%&#39;; 2. select * from employee where department = &#39;[^F-M]%&#39;; Select the correct option:
|
|
13240
|
Choose the appropriate query for the Products table where data should be displayed primarily in ascending order of the ProductGroup column. Secondary sorting should be in descending order of the Cu...
|
|
13241
|
Check the following code: Public Shared Sub UpdateData(ByVal sql As String,ByVal connectionString As String, ByVal dataTable As DataTable) Dim da As New OleDb.OleDbDataAdapter() Dim cnn As New Ol...
|
|
13242
|
A production house needs a report about the sale where total sale of the day is more than $20,000. Which query should be used?
|
|
13243
|
With which of the following are Declarative Databinding expressions delimited?
|
|
13244
|
With which class is the task of mapping a specific point in time into units such as weeks, months, and years accomplished?
|
|
13245
|
Which of the following will be executed without error? Public Class Fruit End Class Public Class Apple Inherits Fruit End Class
|
|
13246
|
Which of the following types guarantee atomic reads and writes?
|
|
13247
|
Which of the following statements do Expression Trees fit best?
|
|
13248
|
Which of the following statements are true about Passport Authentication?
|
|
13249
|
Which of the following mechanisms are not suitable for returning a single row from a DataTable containing a large number of records?
|
|
13250
|
Which of the following is/are true regarding the use of Authentication to control access to the HTML file (.htm .html)?
|
|
13251
|
Which of the following is used to remove a cookie from a client machine?
|
|
13252
|
Which of the following is true regarding the System.DateTimeOffset structure?
|
|
13253
|
Which of the following is not an unboxing conversion?
|
|
13254
|
Which of the following is applicable when using Secure Socket Level communications?
|
|
13255
|
Which of the following is true about VB generics?
|
|
13256
|
Which of the following events should be used for assigning a Theme dynamically to a page?
|
|
13257
|
Which of the following elements can be adjusted when using the ProcessModel element of the Machine.Config file?
|
|
13258
|
Which of the following does Event Bubbling allow composite controls to perform?
|
|
13259
|
Which of the following differentiates a UserControl from a Custom Server control?
|
|
13260
|
Which of the following controls allows the use of XSL to transform XML content into formatted content?
|
|
13261
|
Which of the following conditions can trigger the automatic recycling of an ASP.NET application hosted in IIS?
|
|
13262
|
Which of the following characteristics does a LINQ query expression should have?
|
|
13263
|
Which of the following can you do when deleting a DataRow from the DataRowCollection of a DataTable?
|
|
13264
|
Which of the following can one use to detect the user&#39;s current language?
|
|
13265
|
Which of the following can be used to preserve state information?
|
|
13266
|
Which of the following can be used to control caching within an ASP.NET application?
|
|
13267
|
Which of the following are valid mechanisms for adding an event handler for Public Event SomeEvent() on class Sample?
|
|
13268
|
Which of the following are true when using a POST command to access a WebService method?
|
|
13269
|
Which of the following are true regarding validation in an ASP.NET application?
|
|
13270
|
Which of the following are true regarding System.Threading.ReaderWriterLockSlim?
|
|
13271
|
Which of the following are true of using ADO.NET DataSets and DataTables?
|
|
13272
|
Which of the following are true of the System.Text.StringBuilder class?
|
|
13273
|
Which of the following are true of ADO.NET?
|
|
13274
|
Which of the following are true about System.Security.Cryptography under version 3.5 of the framework?
|
|
13275
|
Which of the following are true about System.GC under version 3.5 of the Framework?
|
|
13276
|
Which of the following are true about Nullable types?
|
|
13277
|
Which of the following are true about Extension methods.
|
|
13278
|
Which of the following are true about declarative attributes?
|
|
13279
|
Which of the following are true about anonymous types?
|
|
13280
|
Which of the following are the goals of the Windows Communication Foundation?
|
|
13281
|
Which of the following are performed to fully debug an ASP.NET Application running on the same machine as the debugger?
|
|
13282
|
Which of the following are included in the advantages of Lambda Expressions over Anonymous methods?
|
|
13283
|
Which of the following are common methods of supplying &quot;Help&quot; information to an ASP.NET application?
|
|
13284
|
Which of the following accurately describes the class structure when implementing an ASP.Net page which uses the CodeFile attribute?
|
|
13285
|
Which method calls will compile the following? Private Sub Sample(ByVal number As Integer, Optional ByVal bool As Boolean = True) End Sub
|
|
13286
|
Which features that are not supported in the System.TimeZone class does the System.TimeZoneInfo class provide?
|
|
13287
|
Which directive allows the utilization of a custom web control in an ASP.NET page?
|
|
13288
|
Where should information about a control created at design time be stored?
|
|
13289
|
Where should an instance of an object which provides services to all users be stored?
|
|
13290
|
When Windows Communication Foundation is used, the SessionMode property to disallow, require, or permit is applied to which contract?
|
|
13291
|
When Windows Communication Foundation is used to develop a Web Service, which of the following are supported?
|
|
13292
|
When using Cascading Style Sheets (CSS) to format output, which of the following is/are true?
|
|
13293
|
When using asynchronous partial updates with an UpdatePanel, which of the following are true?
|
|
13294
|
When using an implicitly typed array, which of the following is most appropriate?
|
|
13295
|
When using a JavaScript timer control in conjunction with UpdatePanels, which of the following statements are true?
|
|
13296
|
When aggregating data, LINQ is:
|
|
13297
|
What is the value of r after the following code is executed? Dim f As Func(Of Integer, Boolean) = Function(x) (x + 2) &gt; 7 Dim r = f(7)
|
|
13298
|
What is the value of b3 after the following code is executed? Dim b1 As Boolean? = True Dim B2 As Boolean? = Nothing Dim b3 As Boolean? = If(b1 AndAlso b2, b1, b2)
|
|
13299
|
What is the result of the following code? Console.WriteLine(CBool(If(1&gt;2, &quot;True&quot;, &quot;False&quot;)))
|
|
13300
|
What is the result of Console.WriteLine(&quot;{0}:{1}:{2}&quot;, CInt(2.5), CInt(1.5), Fix(1.5))?
|
|
13301
|
What does the OrElse operator do?
|
|
13302
|
What does the AndAlso operator do?
|
|
13303
|
Via which of the following is ViewState maintained by default?
|
|
13304
|
The rights of which Windows Account does anonymous Web Site access use by default?
|
|
13305
|
The earliest event where one can be assured all child controls exist is:
|
|
13306
|
The earliest event in which all viewstate information has been restored is:
|
|
13307
|
In which of the following ways do Structures differ from classes?
|
|
13308
|
In which file are Predefined Client Side Validation Scripts defined?
|
|
13309
|
In the following example,by which technique can the method Test in the derived class Cat access the implementation of MakeNoise in the base class? Public Class Animal Public Overridable Sub Ma...
|
|
13310
|
In order to use the AJAX AuthenticationSErvice class, which of the following must be true?
|
|
13311
|
In order to enable AJAX Functionality, which control is placed on the page?
|
|
13312
|
Identify the syntactically correct LINQ query or queries, assuming dt is a DataTable
|
|
13313
|
Given the following code, which of the following are syntactically correct? &lt;Extension()&gt; _ Public Function AppendTest(ByVal s As String, ByVal suffix As String) Return s &amp; suffix ...
|
|
13314
|
Given the following code, which calls are valid ways to add the elements of a string array to a List(Of String)? Dim values() As String = {&quot;1&quot;, &quot;2&quot;, &quot;3&quot;, &quot;4&quot;} Dim valueList As New ...
|
|
13315
|
Determining the availability of sufficient memory for an operation can be accomplished by:
|
|
13316
|
By which of the following can the .NET class methods be included in .aspx files?
|
|
13317
|
Working with a list of Employees: List&lt;Employee&gt; lstEmployees = new List&lt;Employee&gt; { new Employee{Name=&quot;Harry&quot;,Age=15}, new Employee{Name=&quot;Peter&quot;,Age=22}...
|
|
13318
|
Why is it a bad practice to use iteration variables in lambda expressions?
|
|
13319
|
Which type of class members are associated with the class itself rather than the objects of the class?
|
|
13320
|
Which statements will give the path where the executing assembly is currently located?
|
|
13321
|
Which of the following will output the string below? &quot; &quot;
|
|
13322
|
Which of the following will correctly remove duplicates from a List&lt;T&gt;?
|
|
13323
|
Which of the following will block the current thread for a specified number of milliseconds?
|
|
13324
|
Which of the following statements is true regarding the code samples below? A: try { // code goes here } catch (Exception e) { throw e; } B: try { // code goes here } catch (Exception e) ...
|
|
13325
|
Which of the following statements is true regarding predicate delegates in C#?
|
|
13326
|
Which of the following statements is true about the System.Environment.NewLine property?
|
|
13327
|
Which of the following statements is true about the code below? string[] lines = theText.Split(new string[] { Environment.NewLine }, StringSplitOptions.None);
|
|
13328
|
Which of the following statements is true about IEnumerable&lt;T&gt;?
|
|
13329
|
Which of the following statements are true regarding the ref and out parameters in C#?
|
|
13330
|
Which of the following language code is not &#39;managed&#39; by default in .NET framework?
|
|
13331
|
Which of the following keywords prevents a class from being overridden further?
|
|
13332
|
Which of the following is true regarding a null and an empty collection in C#?
|
|
13333
|
Which of the following is true for CLR?
|
|
13334
|
Which of the following is true about friend functions in C#?
|
|
13335
|
Which of the following is true about constructors and member functions?
|
|
13336
|
Which of the following is the correct way to sort a C# dictionary by value?
|
|
13337
|
Which of the following is the correct way to randomize a generic list of 75 numbers using C#?
|
|
13338
|
Which of the following is the correct way to perform a LINQ query on a DataTable object?
|
|
13339
|
Which of the following is the correct way to implement deep copying of an object in C#?
|
|
13340
|
Which of the following is the correct code to close all references to the com objects below? Workbooks books = excel.WorkBooks; Workbook book = books[1]; Sheets sheets = book.WorkSheets; Worksheet...
|
|
13341
|
Which of the following functions are used to wait for a thread to terminate?
|
|
13342
|
Which of the following exceptions cannot be thrown by the Delete() function of the FileInfo class (ie. FileInfo.Delete())?
|
|
13343
|
Which of the following define the rules for .NET Languages?
|
|
13344
|
Which of the following code snippets will call a generic method when the type parameter is not known at compile time?
|
|
13345
|
Which of the following code snippets for catch shows a better way of handling an exception? 1. catch (Exception exc) { throw exc; } 2. catch (Exception exc) { throw; }
|
|
13346
|
Which of the following code snippets converts an IEnumerable&lt;string&gt; into a string containing comma separated values?
|
|
13347
|
Which of the following code samples will execute a command-line program in C# and return its STD OUT results?
|
|
13348
|
Which of the following code samples will create a comma separated list from IList&lt;string&gt; or IEnumerable&lt;string&gt;?
|
|
13349
|
Which of the following code samples will check if a file is in use?
|
|
13350
|
Which object oriented term is related to protecting data from access by unauthorized functions?
|
|
13351
|
Where does a C# assembly store the information regarding the other external dependencies, such as satellite assemblies, global assemblies etc, and their versions so that they can be loaded correctl...
|
|
13352
|
What will happen if the following code is compiled in .NET 4 or above (Assume required namespaces are included)? public class var { } public class main { public static void main(string[] args)...
|
|
13353
|
What will be the value of the result variable after these two statements? int num1 = 10, num2 = 9; int result = num1 &amp; num2;
|
|
13354
|
What will be the value of result after these two statements? int num1 = 10, num2 = 9; int result = num1 ^ num2;
|
|
13355
|
What will be the return value if the function fn is called with a value of 50 for the parameter var? public int fn(int var) { int retvar = var - (var / 10 * 5); return retvar; }
|
|
13356
|
What will be the output of the following Main program in a C# console application (Assume required namespaces are included)? static void Main(string[] args) { string sPrint = St...
|
|
13357
|
What will be the output of the following Main program in a C# console application (Assume required namespaces are included)? static void Main(string[] args) { string Invalid = &quot;$am$it$&quot;; s...
|
|
13358
|
What will be the output of the following Main program in a C# console application (Assume required namespaces are included): static void Main(string[] args) { for (int i = 0; i &lt; 1; i++) {...
|
|
13359
|
What will be the output of the following Main program in a C# console application (Assume required namespaces are included): static void Main(string[] args) { int @int = 15; ...
|
|
13360
|
What will be the output if in a WinForms application, the following code is executed in the Load event of a form? Assume this form has lblMessage as a Label Control. private void Form1_Load(object...
|
|
13361
|
What type of code is written to avail the services provided by Common Language Runtime?
|
|
13362
|
What is the syntax required to load and use a normal unmanaged windows DLL (e.g. kernel32.DLL) in a managed .NET C# code?
|
|
13363
|
What is the purpose of the vshost.exe file in Visual Studio?
|
|
13364
|
What is the purpose of the catch block in the following code? try { // Code that might throw exceptions of different types } catch { // Code goes here }
|
|
13365
|
What is the problem with the following function, which is supposed to convert a Stream into byte array? public static byte[] ReadFully(Stream input) { using (MemoryStream ms = new MemoryStream(...
|
|
13366
|
What is the output of the following code? class Test { static void Main() { string myString = “1 2 3 4 5†myString = Regex.Replace(myString, @&quot;s+&quot;, &quot; &quot;); System.Console.Writ...
|
|
13367
|
What is the output of the following code: class CCheck { public static void Main() { string str = @&quot;E:RIL est.cs&quot;; Console.WriteLine(str); } }
|
|
13368
|
What is the issue with the following function? public string GetName(int iValue) { string sValue = &quot;0&quot;; switch (iValue) { case 1: sValue = iValue.ToString(); ...
|
|
13369
|
What is the difference between the String and StringBuilder class objects with respect to mutability?
|
|
13370
|
What is the difference between int and System.Int32 CLR types?
|
|
13371
|
What is the difference between Expression&lt;Func&lt;T&gt;&gt; and Func&lt;T&gt;?
|
|
13372
|
What is the difference between data types &quot;System.String&quot; and &quot;string&quot; in C#?
|
|
13373
|
What is the benefit of using a finally{} block with a try-catch statement in C#?
|
|
13374
|
What is the advantage of using IList&lt;T&gt; over List&lt;T&gt;?
|
|
13375
|
What is an Action delegate?
|
|
13376
|
What are the benefits of using the ExpandoObject class over a using dictionary?
|
|
13377
|
What are Satellite assemblies in C# .NET?
|
|
13378
|
There is a class that has a public int counter field that is accessed by multiple threads. This int is only incremented or decremented. To increment this field, three thread-safe approaches are men...
|
|
13379
|
The global assembly cache:
|
|
13380
|
The .NET Framework consists of:
|
|
13381
|
The ___________ namespace is not defined in the .NET class library.
|
|
13382
|
Suppose there is a List of type Person with a property of LastName(string) and PopulateList is a function which returns a Generic List of type Person: List&lt;Person&gt; people = PopulateList(); What do...
|
|
13383
|
Suppose a class is declared as a protected internal: protected internal class A { } Which statement is correct with regards to its accessibility?
|
|
13384
|
Performance-wise, which of the following is the most efficient way to calculate the sum of integers stored in an object array?
|
|
13385
|
One of the ternary operators provided in C# is:
|
|
13386
|
Is it possible to define custom Exception classes in C#?
|
|
13387
|
In which of the following namespaces is the Assembly class defined?
|
|
13388
|
In the sample code given below, which of the data members are accessible from class Y? class X { private int i; protected float f; public char c; } class Y : X { }
|
|
13389
|
In C#, can global functions that are not associated with a particular class be defined?
|
|
13390
|
If i == 0, why is (i += i++) == 0 in C#?
|
|
13391
|
How can a single instance application be created in C#?
|
|
13392
|
Consider the following code: string s1 = &quot;Old Value&quot;; string s2 = s1; s1 = &quot;New Value&quot;; Console.WriteLine(s2); What will be the output printed, and why?
|
|
13393
|
Consider the following code block: public class Person { public string GetAge() { lock (this) { // Code to get Age of this person object. } } } Wh...
|
|
13394
|
Complete the following sentence: In C#, exception handling should be used...
|
|
13395
|
Asynchronous execution is supported in ADO.NET 2.0 for?
|
|
13396
|
An Interface represents which kind of relationship?
|
|
13397
|
An enum is defined in a program as follows: [Flags] public enum Permissions { None = 0, Read = 1, Write = 2, Delete = 4 ...
|
|
13398
|
Writing to STDOUT and STDERR is fairly inflexible, and most of the time the print statement accomplishes the same purpose more flexibly. How many arguments can a print statement handle?
|
|
13399
|
Which user input method will act like a file-object on which read and readline functions can be called?
|
|
13400
|
Which Python module can be used for copying files?
|
|
13401
|
Which of the following will throw an exception in Python?
|
|
13402
|
Which of the following will disable output buffering in Python?
|
|
13403
|
Which of the following will determine the number of CPUs available in the operating environment?
|
|
13404
|
Which of the following variables store parameters passed from outside?
|
|
13405
|
Which of the following statements imports every name in a module namespace into the current namespace?
|
|
13406
|
Which of the following statements copy the contents of a list and not just a reference to the list?
|
|
13407
|
Which of the following statements can be used to remove an item from a list by giving the index?
|
|
13408
|
Which of the following statements are true? A. ._variable is semi-private and meant just for convention. B. .__variable is considered superprivate and gets name mangled to prevent accidental acces...
|
|
13409
|
Which of the following protocol libraries can be used for an email implementation in a Python application?
|
|
13410
|
Which of the following options are true regarding these two code samples? Code sample 1: def main(): for i in xrange(10**8): pass main() Code sample 2: for i in xrange(10**8): pass
|
|
13411
|
Which of the following modules lets you check whether two files are identical, and whether two directories contain some identical files?
|
|
13412
|
Which of the following modules keep prior directory listings in the memory to avoid the need for a new call to the file system?
|
|
13413
|
Which of the following modules is used internally to determine whether a path matches?
|
|
13414
|
Which of the following methods returns the ASCII value of a character in Python?
|
|
13415
|
Which of the following members of the object class compare two parameters?
|
|
13416
|
Which of the following is the correct way to write a generator which will output the numbers between 1 and 100 (inclusive)?
|
|
13417
|
Which of the following is the correct way to get the size of a list in Python?
|
|
13418
|
Which of the following is the correct way to flush output of Python print?
|
|
13419
|
Which of the following is the correct way to execute a program from inside Python without having to consider how the arguments/quotes are formatted?
|
|
13420
|
Which of the following is the correct way to check to see if the variable theVar is an integer?
|
|
13421
|
Which of the following is the correct way to call the private method, myPrivateMethod(), in class MyClass, using dir(obj)? class MyClass: def __myPrivateMethod(self): print &quot;Private Me...
|
|
13422
|
Which of the following is the correct prototype of the string.find() function?
|
|
13423
|
Which of the following is the correct prototype for the &#39;open&#39; function of the file class in python 2.2+?
|
|
13424
|
Which of the following is the correct method for changing a global variable inside a function?
|
|
13425
|
Which of the following is the best way to reverse the string &#39;Test String&#39; in Python?
|
|
13426
|
Which of the following is the best method to find the indices of all occurances of a word in a string? line = &#39;mary had a little lamb, little lamb, little lamb&#39; word = &#39;lamb&#39;
|
|
13427
|
Which of the following is the base class for new-style file objects?
|
|
13428
|
Which of the following is a way to find a local computer&#39;s IP address with Python?
|
|
13429
|
Which of the following functions modifies the list in place to indicate which items are directories, and which are plain files?
|
|
13430
|
Which of the following functions is used to send audio data via the Internet?
|
|
13431
|
Which of the following functions can change the maximum level of recursion?
|
|
13432
|
Which of the following exceptions occurs while importing a module?
|
|
13433
|
Which of the following commands would produce the following result: result: &#39;line 1
line 2&#39;
|
|
13434
|
Which of the following code snippets concatenates the list a_list = [1, 2, 3] with the tuple a_tuple = (4, 5), so the result would be [1, 2, 3, 4, 5]?
|
|
13435
|
Which of the following are the main features of Python?
|
|
13436
|
Which list flattening method will have the shortest running time?
|
|
13437
|
Which is the correct way to remove an installed Python package?
|
|
13438
|
Which is not used to install Python packages?
|
|
13439
|
Which function could be used to list every file and folder in the current directory?
|
|
13440
|
When is the &quot;yield&quot; keyword used in Python?
|
|
13441
|
What would the &#39;sorted_tel&#39; be in the following code: tel = {&#39;jack&#39;: 4098, &#39;sape&#39;: 5139, &#39;bill&#39;: 3678, &#39;mike&#39;: 2122} sorted_tel = sorted(tel.items(), key=lambda x: x[1])
|
|
13442
|
What will be the output of the following statements: &gt;&gt;&gt; import string &gt;&gt;&gt; string.ljust(width=30,s=&quot;Mary had a little lamb&quot;)
|
|
13443
|
What is the result of the following code: &gt;&gt;&gt; import itertools &gt;&gt;&gt; x = itertools.count(0) &gt;&gt;&gt; x.__class__.__name__
|
|
13444
|
What is the output of the following code? def foo(param1, *param2): print param1 print param2 def bar(param1, **param2): print param1 print param2 foo(1,2,3,4,5) bar(1,a=2,b=3)
|
|
13445
|
What is the output of the following code: name = &#39;Jon&#39; name.rjust(4, &#39;A&#39;)
|
|
13446
|
What is the most flexible way to call the external command &quot;ls -l&quot; in Python?
|
|
13447
|
What is the correct way to delete a directory that is not empty using Python?
|
|
13448
|
What is the best way to check if the object &#39;myobject&#39; is iterable in Python?
|
|
13449
|
What is a metaclass in Python?
|
|
13450
|
Various email and news clients store messages in a variety of formats, many providing hierarchical and structured folders. Which of the following provides a uniform API for reading the messages sto...
|
|
13451
|
The most important element of the email package is the message. The email class provides the classes for messages in Python. Which of the following classes is used for the message?
|
|
13452
|
The least sophisticated form of text output in Python is writing to open files. In particular, which of the following streams can be used?
|
|
13453
|
The core text processing tasks in working with email are parsing, modifying, and creating the actual messages. Which of the following modules deal with parsing and processing email messages?
|
|
13454
|
Read the following statements: Statement 1: Many string module functions are now also available as string object methods. Statement 2: To use string object methods, there is no need to import the...
|
|
13455
|
Read the following statements: Statement 1: A simple assignment statement binds a name into the current namespace, unless that name has been declared as global. Statement 2: A name declared as gl...
|
|
13456
|
Read the following statements: &gt;&gt;&gt; word = &#39;Help&#39; + &#39;A&#39; &gt;&gt;&gt; &#39;&lt;&#39; + word*5 + &#39;&gt;&#39; Which of the following will be the output of the above code snippet?
|
|
13457
|
Read the following statements: &gt;&gt;&gt; lst = [&#39;spam&#39;,&#39;and&#39;,&#39;eggs&#39;] &gt;&gt;&gt; lst[2] = &#39;toast&#39; &gt;&gt;&gt; print &#39;&#39;.join(lst) &gt;&gt;&gt; print &#39; &#39;.join(lst) Which of the following is the output of the second print stateme...
|
|
13458
|
Read the following statements: &gt;&gt;&gt; import string &gt;&gt;&gt; s = &#39;mary 11had a little lamb&#39; &gt;&gt;&gt; print s Which of the following will be the output of the above code snippet?
|
|
13459
|
Read the following statements: &gt;&gt;&gt; import array &gt;&gt;&gt; a = array.array(&#39;c&#39;,&#39;spam and eggs&#39;) &gt;&gt;&gt; a[0] = &#39;S&#39; &gt;&gt;&gt; a[-4:] = array.array(&#39;c&#39;,&#39;toast&#39;) &gt;&gt;&gt; print &#39;&#39;.join(a) Which of the following will be t...
|
|
13460
|
One common way to test a capability in Python is to try to do something, and catch any exceptions that occur. Which of the following is the correct mechanism of trapping an error?
|
|
13461
|
Object is the base class of new-style datatypes. Which of the following functions is not a member of the object class?
|
|
13462
|
It is possible to use encoding other than ASCII in Python source files. The best way to do it is to put one more special comment line right after the #! line to define the source file encoding. Whi...
|
|
13463
|
Inheriting from a base class enables a custom class to use a few new capabilities, such as slots and properties. Which of the following is the base class of new-style datatypes?
|
|
13464
|
In Python, what is the default maximum level of recursion?
|
|
13465
|
In Python, built-in exceptions can be inherited from. Which of the following is the base exception class?
|
|
13466
|
In Python 2.x, which of the following is the way to check to make sure that the variable &#39;x&#39; is not a string?
|
|
13467
|
How many arguments can a print statement handle?
|
|
13468
|
How can an element be removed from a list using its list index?
|
|
13469
|
How can a numeric String (eg. &quot;545.2222&quot;) be converted to Float or Integer?
|
|
13470
|
How can a null object be declared in Python?
|
|
13471
|
How can a list be split into equal sized chunks?
|
|
13472
|
Given a program that saved a text file in the directory &quot;/temp_files&quot;, which of the following will make sure that &quot;/temp_files&quot; exists before writing the file?
|
|
13473
|
Examine the following prototype for the &#39;open&#39; function of the file class in Python 2.2+: open(fname [,mode [,buffering]]) Which of the following is correct for the &#39;buffering&#39; argument?
|
|
13474
|
Which command enables you to input data using keyboard into your node application?
|
|
13475
|
Which of the following methods can be used to write a file in Node.js? (check all that apply)
|
|
13476
|
<p>Which of the following flags working with npm?</p>
|
|
13477
|
<p>Which of the following is operates asynchronous logic?</p>
|
|
13478
|
How can you stop reading from stdin?
|
|
13479
|
<p>Which of the following modules is required to create server for NodeJS?</p>
|
|
13480
|
<p>Which following code is valid to get a joint path?</p>
|
|
13481
|
<p>Which following command _<strong>__</strong> shows version of Node?</p>
|
|
13482
|
You would like to inherit the prototype methods from one constructor into another. How could that be accomplished with core node.js functionality?
|
|
13483
|
<p>Which of the following engine built of NodeJS framework/platform?</p>
|
|
13484
|
Which of the following events are emitted by the Readable Stream?
|
|
13485
|
<p>Which of the following libraries are used for mocking modules?</p>
|
|
13486
|
How would you get operating system name?
|
|
13487
|
<p>Which following code is valid to print the current operating system?</p>
|
|
13488
|
<p>Which of the following classes is the parent for <code>repl.REPLServer</code> class?</p>
|
|
13489
|
<p>Which following code is valid to convert a buffer buf to JSON object?</p>
|
|
13490
|
How would you get the name of the JavaScript file being executed?
|
|
13491
|
Which of the following implements stream.Readable interface?
|
|
13492
|
<p>Which of the following frameworks is most popular Node.js framework?</p>
|
|
13493
|
<p>Which of the following is correct while using a Node module http in a Node based application?</p>
|
|
13494
|
<p>Which of the following keywords is used to achieve await-like behaviour?</p>
|
|
13495
|
<p>Which of the following names is second param of <code>res.render</code> method?</p>
|
|
13496
|
<p>Which of the following template engines is working with Express.js?</p>
|
|
13497
|
What happens when executing the following code?
assert = require('assert');
assert(false, 'assert false');
|
|
13498
|
<p>Which of the libs are exists in Node Core Libraries?</p>
|
|
13499
|
Which of the following will remove a file from your file system?
|
|
13500
|
Which module of core node.js API is used for writing unit tests for your applications?
|
|
13501
|
You have a file rect.js with the following contents, What would be the appropriate ways to call the exported function?
module.exports = function area(a, b) {
return a*b;
}
|
|
13502
|
<p>Which of the following variables you can use in modules?</p>
|
|
13503
|
<p>Which of the following is the result of <code>module.id</code> ?</p>
|
|
13504
|
Which following functions are partially buffered?
|
|
13505
|
<p>Which of the following file extensions supports Node Module System ?</p>
|
|
13506
|
What does the following code do?
var http = require('http');
var fs = require('fs');
var file = fs.createWriteStream("file.png");
var request = http.get("http://path/to/file.png", function(response) {
response.pipe(file);
});
|
|
13507
|
Which of the following will synchronously check if a file/directory exists?
|
|
13508
|
Which of the following will open a file, then read its contents one line at a time?
|
|
13509
|
Which of the following will copy a file in Node.js?
|
|
13510
|
Which of the following statements is true about the process object in Node.js?
|
|
13511
|
Which of the following statements is true about the console Object in Node.js?
|
|
13512
|
Which of the following statements are true about the module.exports object in Node.js?
|
|
13513
|
Which of the following statements are true about the child_process module in Node.js?
|
|
13514
|
Which of the following NPM commands will install both dependencies and devDependencies of a given project?
|
|
13515
|
Which of the following methods will print to the console without a trailing new line?
|
|
13516
|
Which of the following methods can be used to write a file in Node.js?
|
|
13517
|
Which of the following methods can be used to read the contents of a directory?
|
|
13518
|
Which of the following console commands will update all installed global packages to the latest available versions?
|
|
13519
|
Which of the following command-line arguments to &quot;npm install&quot; will allow an NPM package&#39;s binaries to be run outside the project folder?
|
|
13520
|
Which of the following can be used to get the currently running script&#39;s path in Node.js?
|
|
13521
|
Which of the following can be used to access the environment variable, &quot;ENV_VARIABLE&quot; in Node.js?
|
|
13522
|
Which Node.js module can be used to get the IP address of the server the program is running on?
|
|
13523
|
Which array contains the command line arguments in Node.js?
|
|
13524
|
What does the following command do? npm view &lt;package-name&gt; version
|
|
13525
|
What does the following code do? var http = require(&#39;http&#39;); var fs = require(&#39;fs&#39;); var file = fs.createWriteStream(&quot;file.png&quot;); var request = http.get(&quot;http://path/to/file.png&quot;, function(respon...
|
|
13526
|
Which of the following will randomly choose an element from an array named myStuff, given that the number of elements changes dynamically?
|
|
13527
|
Which of the following will detect which DOM element has the focus?
|
|
13528
|
Which of the following will check whether the variable vRast exists or not?
|
|
13529
|
Which of the following will change the color of a paragraph&#39;s text to blue when a user hovers over it, and reset it back to black when the user hovers out?
|
|
13530
|
Which of the following statements is correct?
|
|
13531
|
Which of the following results is returned by the JavaScript operator &quot;typeof&quot; for the keyword &quot;null&quot;?
|
|
13532
|
Which of the following Regular Expression pattern flags is not valid?
|
|
13533
|
Which of the following prints &quot;AbBc&quot;?
|
|
13534
|
Which of the following options can be used for adding direct support for XML to JavaScript?
|
|
13535
|
Which of the following objects in JavaScript contains the collection called &quot;plugins&quot;?
|
|
13536
|
Which of the following modifiers must be set if the JavaScript lastIndex object property was used during pattern matching?
|
|
13537
|
Which of the following methods will copy data to the Clipboard?
|
|
13538
|
Which of the following JavaScript Regular Expression modifiers finds one or more occurrences of a specific character in a string?
|
|
13539
|
Which of the following is true about setTimeOut()?
|
|
13540
|
Which of the following is the most secure and efficient way of declaring an array?
|
|
13541
|
Which of the following is the correct syntax for using the JavaScript exec() object method?
|
|
13542
|
Which of the following is not a valid method in generator-iterator objects in JavaScript?
|
|
13543
|
Which of the following is not a valid method for looping an array?
|
|
13544
|
Which of the following is not a valid JavaScript operator?
|
|
13545
|
Which of the following is not a valid HTML event?
|
|
13546
|
Which of the following determines whether cookies are enabled in a browser or not?
|
|
13547
|
Which of the following descriptions is true for the code below? var object0 = {}; Object.defineProperty(object0, &quot;prop0&quot;, { value : 1, enumerable:false, configurable : true }); Object.defineProper...
|
|
13548
|
Which of the following descriptions best describes the code below? &lt;script&gt; var variable1 = { fastFood: &quot;spaghetti&quot;, length: 10 }; Object.freeze(variable1); variable1.price = 50; delete variable1....
|
|
13549
|
Which of the following correctly uses a timer with a function named rearrange()?
|
|
13550
|
Which of the following correctly sets a class for an element?
|
|
13551
|
Which of the following code snippets will toggle a div element&#39;s background color? &lt;button id=&quot;toggle&quot;&gt;Toggle&lt;/button&gt; &lt;div id=&quot;terd&quot;&gt;Change Background Color.&lt;/div&gt;
|
|
13552
|
Which of the following code snippets will return all HTTP headers?
|
|
13553
|
Which of the following code snippets will correctly split &quot;str&quot;?
|
|
13554
|
Which of the following code snippets will correctly get the length of an object?
|
|
13555
|
Which of the following code snippets trims whitespace from the beginning and end of the given string str?
|
|
13556
|
Which of the following code snippets returns &quot;[object object]&quot;?
|
|
13557
|
Which of the following code snippets removes objects from an associative array?
|
|
13558
|
Which of the following code snippets is more efficient, and why? &lt;script language=&quot;JavaScript&quot;&gt; for(i=0;i&lt;document.images.length;i++) document.images[i].src=&quot;blank.gif&quot;; &lt;/...
|
|
13559
|
Which of the following code snippets gets an image&#39;s dimensions (height &amp; width) correctly?
|
|
13560
|
Which of the following code snippets changes an image on the page?
|
|
13561
|
Which of the following choices will turn a string into a JavaScript function call (case with objects) of the following code snippet? &lt;script&gt; window.foo = { bar: { baz: function() { ...
|
|
13562
|
Which of the following choices will detect if &quot;variableName&quot; declares a function? &lt;script&gt; var variableName= function(){}; &lt;/script&gt;
|
|
13563
|
Which of the following choices will change the source of the image to &quot;image2.gif&quot; when a user clicks on the image?
|
|
13564
|
Which of the following can be used to invoke an iframe from a parent page?
|
|
13565
|
Which of the following can be used to escape the &#39; character?
|
|
13566
|
Which of the following can be used for disabling the right click event in Internet Explorer?
|
|
13567
|
Which of the following built-in functions is used to access form elements using their IDs?
|
|
13568
|
Which of the following best describes a &quot;for&quot; loop?
|
|
13569
|
Which of the following Array methods in JavaScript runs a function on every item in the Array and collects the result from previous calls, but in reverse?
|
|
13570
|
Which of the following are not global methods and properties in E4X?
|
|
13571
|
Which of the following are JavaScript unit testing tools?
|
|
13572
|
Which of the following are correct values of variableC, and why? &lt;script&gt; variableA = [6,8]; variableB =[7,9]; variableC = variableA + variableB; &lt;/script&gt;
|
|
13573
|
Which of following uses the &quot;with&quot; statement in JavaScript correctly?
|
|
13574
|
Which object can be used to ascertain the protocol of the current URL?
|
|
13575
|
Which event can be used to validate the value in a field as soon as the user moves out of the field by pressing the tab key?
|
|
13576
|
When setting cookies with JavaScript, what will happen to the cookies.txt data if the file exceeds the maximum size?
|
|
13577
|
What would be the value of &#39;ind&#39; after execution of the following code? var msg=&quot;Welcome to ExpertRating&quot; var ind= msg.substr(3, 3)
|
|
13578
|
What would be the use of the following code? function validate(field) { var valid=&#39;&#39;ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz&#39;&#39;; var ok=&#39;&#39;yes&#39;&#39;; var temp; for(var i=0;i...
|
|
13579
|
What will be the final value of the variable &quot;apt&quot;? var apt=2; apt=apt&lt;&lt;2;
|
|
13580
|
What will be output of the following code? function testGenerator() { yield &quot;first&quot;; document.write(&quot;step1&quot;); yield &quot;second&quot;; document.write(&quot;step2&quot;); yield &quot;third&quot;; docu...
|
|
13581
|
What value would JavaScript assign to an uninitialized variable?
|
|
13582
|
What is the purpose of while(1) in the following JSON response? while(1);[[&#39;u&#39;,[[&#39;smsSentFlag&#39;,&#39;false&#39;],[&#39;hideInvitations&#39;,&#39;false&#39;],[&#39;remindOnRespondedEventsOnly&#39;,&#39;true&#39;],[&#39;hideInvitations_remindO...
|
|
13583
|
What is the meaning of obfuscation in JavaScript?
|
|
13584
|
What is the final value of the variable bar in the following code? var foo = 9; bar = 5; (function() { var foo = 2; bar= 1; }()) bar = bar + foo;
|
|
13585
|
What is the error in the statement: var charConvert = toCharCode(&#39;x&#39;);?
|
|
13586
|
What is the difference between call() and apply()?
|
|
13587
|
What does the following JavaScript code do? contains(a, obj) { for (var i = 0; i &lt; a.length; i++) { if (a[i] === obj) { return true; } } return false; }
|
|
13588
|
var profits=2489.8237 Which of the following code(s) produces the following output? output : 2489.824
|
|
13589
|
The following are the samples for getting a selected value in the from a dropdown list: &lt;select id=&quot;ddlViewBy&quot;&gt; &lt;option value=&quot;1&quot;&gt;test1&lt;/option&gt; &lt;option value=&quot;2&quot; selected=&quot;selected&quot;&gt;test2&lt;/option...
|
|
13590
|
Select the following function that shuffles an array?
|
|
13591
|
Performance-wise, which is the fastest way of repeating a string in JavaScript?
|
|
13592
|
In an HTML page, the form tag is defined as follows: &lt;form onsubmit=&quot;return Validate()&quot; action=&quot;http://www.mysite.com/&quot;&gt; The validate() function is intended to prevent the form from being submitted...
|
|
13593
|
If an image is placed styled with z-index=-1 and a text paragraph is overlapped with it, which one will be displayed on top?
|
|
13594
|
How can the user&#39;s previously navigated page be determined using JavaScript?
|
|
13595
|
How can the operating system of the client machine be detected?
|
|
13596
|
How can global variables be declared in JavaScript?
|
|
13597
|
How can created cookies be deleted using JavaScript?
|
|
13598
|
How can a JavaScript object be printed?
|
|
13599
|
Having an array object var arr = new Array(), what is the best way to add a new item to the end of an array?
|
|
13600
|
Consider the three variables: someText = &#39;JavaScript1.2&#39;; pattern = /(w+)(d).(d)/i; outCome = pattern.exec(someText); What does outCome[0] contain?
|
|
13601
|
Consider the following variable declarations: var a=&quot;adam&quot; var b=&quot;eve&quot; Which of the following would return the sentence &quot;adam and eve&quot;?
|
|
13602
|
Consider the following JavaScript validation function: function ValidateField() { if(document.forms[0].txtId.value ==&quot;&quot;) {return false;} return true; } Which of the...
|
|
13603
|
Consider the following JavaScript validation function: &lt;script type=&quot;text/JavaScript&quot;&gt; function ValidateField() { if(document.forms[0].txtId.value ==&quot;&quot;) {return false;} ...
|
|
13604
|
Consider the following JavaScript alert: &lt;script type=&quot;text/JavaScript&quot;&gt; function message() { alert(&quot;Welcome to ExpertRating!!!&quot;) } &lt;/script&gt; Which of the following will run the function when a...
|
|
13605
|
Consider the following JavaScript alert: &lt;script type=&quot;text/JavaScript&quot;&gt; function message() { alert(&quot;Welcome to ExpertRating!!!&quot;) } &lt;/script&gt; Which of the following will run the function when...
|
|
13606
|
Consider the following image definition: &lt;img id=&quot;logo&quot; src=&quot;companylogo1.gif&quot; height=&quot;12&quot; width=&quot;12&quot; &gt; Which of the following will change the image to companylogo2.gif when the page loads?
|
|
13607
|
Consider the following image definition: &lt;img id=&quot;logo&quot; src=&quot;companylogo1.gif&quot; height=&quot;12&quot; width=&quot;12&quot; &gt; Which of the following will change the image to &quot;companylogo2.gif&quot; when the page loads?
|
|
13608
|
Are the two statements below interchangeable? object.property object[&#39;&#39;property&#39;&#39;]
|
|
13609
|
Analyze the following code snippet which uses a Javascript Regular Expression character set. What will be the output of this code? &lt;html&gt; &lt;body&gt; &lt;script type=&quot;text/javascript&quot;&gt; var str = &quot;Is ...
|
|
13610
|
An image tag is defined as follows: &lt;img id=&quot;ERImage&quot; width=&quot;100&quot; height=&quot;100&quot; onmouseover=&quot;ImageChange()&quot; src=&quot;Image1.jpg&quot;&gt; The purpose of the ImageChange() function is to change the image source...
|
|
13611
|
An image tag is defined as follows: &lt;img id=&quot;ERImage&quot; width=&quot;100&quot; height=&quot;100&quot; onmouseover=&quot;ImageChange()&quot; src=&quot;Image1.jpg&quot;&gt; The purpose of the ImageChange() function is to change the image sour...
|
|
13612
|
An HTML form contains 10 checkboxes all named &quot;chkItems&quot;. Which JavaScript function can be used for checking all the checkboxes together?
|
|
13613
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?php
print null == NULL;
?&gt;</code></pre>
|
|
13614
|
Which of the following is the best way to get the index(es) of the highest value(s) in an array?
|
|
13615
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?php
&lt;/script&gt;
?&gt;</code></pre>
|
|
13616
|
Which of the following functions is not related to garbage collection in PHP?
|
|
13617
|
Which of the following will return the extension of a file name?
|
|
13618
|
Which of the following is correct with regard to echo and print?
|
|
13619
|
Which of the following features are supported in PHP5?
|
|
13620
|
Is the ||= operator present in PHP?
|
|
13621
|
Which of the following code snippets has the most appropriate headers to force the browser to download a CSV file?
|
|
13622
|
<p>What will be the output of following code?</p>
<pre><code>&lt;?php
$x = 10;
function foo() {
$x = 20;
echo $x;
global $x;
echo $GLOBALS['x'];
echo $x;
}
foo();
echo $x;
?&gt;</code></pre>
|
|
13623
|
What is meant by Synchronous Server Calls within PHP's cURL features?
|
|
13624
|
<p>Consider the following 2D array in PHP:</p>
<pre><code>$array = array(array(141,151,161), 2, 3, array(101, 202, 303));</code></pre>
<p>Which of the following will display all values in the array?</p>
|
|
13625
|
Which of the following statements is incorrect, with regards to inheritance in PHP?
|
|
13626
|
Within the PHPDoc Standard, what is the correct way of "doc commenting" the code?
|
|
13627
|
Which statement will return true?
|
|
13628
|
What is the output of the following code?
echo '1'.print(2) + 3;
|
|
13629
|
Which of the following is not a valid PHP parser tag?
|
|
13630
|
<p>What is the output of the following code?</p>
<pre><code>&lt;?php
echo "&lt;pre&gt;";
$array = array("red","green","blue");
$last_key = end(array_keys($array));
foreach ($array as $key =&gt; $value) {
if ($key == $last_key) {
echo "a&lt;br&gt;";
} else {
echo "b&lt;br&gt;";
}
}
?&gt;</code></pre>
|
|
13631
|
Which of the following is the right MIME to use as a Content Type for JSON data?
|
|
13632
|
Which of the following is not a valid cURL parameter in PHP?
|
|
13633
|
Which of the following variables are supported by the 'str_replace()' function?
|
|
13634
|
When comparing two arrays, what is the difference between "==" and "==="?
|
|
13635
|
What is the difference between $a == $b and $a === $b in PHP?
|
|
13636
|
<p>What is the output of the following PHP code snippet?</p>
<pre><code>&lt;?php
$var = "testing module";
$statement = 'This is a $var';
echo ($statement);
?&gt;</code></pre>
|
|
13637
|
Which of the following is a ternary operator?
|
|
13638
|
What is the difference between $_SERVER['HTTP_HOST'] and $_SERVER['SERVER_NAME']?
|
|
13639
|
If you are given two dates in this form:
Start Date: 2007-03-24
End Date: 2009-06-26
Which code snippet finds the difference between these two in the following form:
2 years, 3 months and 2 days
PHP &gt; 5.3
|
|
13640
|
Which line would move the internal pointer to the end of an array?
|
|
13641
|
Which of these is not a valid PHP XML API?
|
|
13642
|
Which of the following will not return an array containing all normal Latin alphabet characters (A-Z)?
|
|
13643
|
<p>What is the output of the following code?</p>
<pre><code>&lt;?php
function
vec_add (&amp;$a, $b)
{
$a['x'] += $b['x'];
$a['y'] += $b['y'];
$a['z'] += $b['z'];
}
$a = array (x =&gt; 3, y =&gt; 2, z =&gt; 5);
$b = array (x =&gt; 9, y =&gt; 3, z =&gt; -7);
vec_add (&amp;$a, $b);
print_r ($a);
?&gt;</code></pre>
|
|
13644
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?php
$a = (1 &lt;&lt; 0);
$b = (1 &lt;&lt; $a);
$c = (1 &lt;&lt; $b);
echo ($c || $b) &lt;&lt; 2 * $a | $a;
?&gt;</code></pre>
|
|
13645
|
Which of the following is not related to debugging in PHP?
|
|
13646
|
Which of the following statements is incorrect?
|
|
13647
|
What is "empty()"?
|
|
13648
|
Which of the following is not a valid Xdebug configuration setting?
|
|
13649
|
Which of the following is true regarding the str_replace() function in PHP?
|
|
13650
|
Which of the following is not a valid php.ini parameter with respect to file uploading?
|
|
13651
|
What will be the output of the following code?
$var = 10;
function fn()
{
$var = 20;
return $var;
}
fn();
echo $var;
|
|
13652
|
Which of the following printing construct/function accepts multiple parameters?
|
|
13653
|
What will be the output of the following code?
class Person
{
protected $name;
public function __construct($name) {
$this-&gt;name = $name;
}
public function getName() {
return $this-&gt;name;
}
}
$person = new Person("Foo");
echo $person-&gt;getName();
|
|
13654
|
With regards to the "static" keyword in PHP, which of the following statements is false?
|
|
13655
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?
$a = (1 &lt;&lt; 0);
$b = (1 &lt;&lt; 1);
echo ($b | $a) &lt;&lt; 2 ;
?&gt;</code></pre>
|
|
13656
|
What is the fastest way to insert an item $item into the specified position $position of the array $array?
|
|
13657
|
Which of the following are not considered Boolean false?
|
|
13658
|
<p>What is the output of the following code?</p>
<pre><code>&lt;?php
$array = array("1","2","3","4");
$variable = end(array_keys($array));
echo $variable;
?&gt;</code></pre>
|
|
13659
|
Which of the following is false about cURL?
|
|
13660
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?php
echo 30 * 5 . 7;
?&gt;</code></pre>
|
|
13661
|
What is the best way to load a file that contains necessary functions and classes?
|
|
13662
|
Which of the following will produce a value of "83" as its output?
|
|
13663
|
<p>What would be the output of the following code?</p>
<pre><code>&lt;?php
$arr = array("foo",
"bar",
"baz");
for ($i = 0; $i &lt; count($arr); $i++) {
$item = $arr[$i];
}
echo "&lt;pre&gt;";
print_r($item);
echo "&lt;/pre&gt;";
?&gt;</code></pre>
|
|
13664
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?php
$str="Hello";
$test="lo";
echo substr_compare($str, $test, -strlen($test), strlen($test)) === 0;
?&gt;</code></pre>
|
|
13665
|
Which of the following is not a valid DOM method in PHP?
|
|
13666
|
What is the difference between die() and exit() in PHP?
|
|
13667
|
Which of the following file modes is used to write into a file at the end of the existing content, and create the file if the file does not exist?
|
|
13668
|
<p>What is the output of the following code?</p>
<pre><code>&lt;?php
function abc()
{
return __FUNCTION__;
}
function xyz()
{
return abc();
}
echo xyz();
?&gt;</code></pre>
|
|
13669
|
Which of the following is not a predefined constant?
|
|
13670
|
Which of the following regular expressions can be used to check the validity of an e-mail addresss?
|
|
13671
|
Which of the following is true about posting data using cURL in PHP?
|
|
13672
|
Which of the following environment variables is used to fetch the IP address of the user in a PHP application?
|
|
13673
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?
$foo = 5 + "10 things";
print $foo;
?&gt;</code></pre>
|
|
13674
|
Which of the following functions is not used in debugging?
|
|
13675
|
Should assert() be used to check user input?
|
|
13676
|
What is the meaning of the system message, "Allowed memory size of &lt;number&gt; bytes exhausted"?
|
|
13677
|
Consider the following class:
1 class Insurance
2 {
3 function clsName()
4 {
5 echo get_class($this);
6 }
7 }
8 $cl = new Insurance();
9 $cl-&gt;clsName();
10 Insurance::clsName();
Which of the following lines should be commented to print the class name without errors?
|
|
13678
|
Which of these is not a valid SimpleXML Parser method?
|
|
13679
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?
$a = 3;
print '$a';
?&gt;</code></pre>
|
|
13680
|
Which of the following methods is used to check if an array is associative or numeric?
|
|
13681
|
What is the correct syntax of mail() function in PHP?
|
|
13682
|
<p>What will be the output of the following code?</p>
<pre><code>&lt;?php
var_dump (3*4);
?&gt;</code></pre>
|
|
13683
|
What is the correct PHP command to use to catch any error messages within the code?
|
|
13684
|
Without introducing a non-class member variable, which of the following can be used to keep an eye on the existing number of objects of a given class?
|
|
13685
|
Which of the the following are PHP file upload-related functions?
|
|
13686
|
<p>What is wrong with the following code?</p>
<pre><code>&lt;?php
curl_setopt($ch, CURLOPT_URL, "http://www.example.com/");
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_exec($ch);
curl_close($ch);
?&gt;</code></pre>
|
|
13687
|
What is the difference between the float and the double type in PHP?
|
|
13688
|
Which of the following is not a valid API?
|
|
13689
|
Which of the following cryptographic functions in PHP returns the longest hash value?
|
|
13690
|
Which of the following is the correct way to check if a session has already been started?
|
|
13691
|
Which function will suitably replace 'X' if the size of a file needs to be checked?
$size=X(filename);
|
|
13692
|
<p>What is the output of the following code?</p>
<pre><code>&lt;?php
echo 0x500;
?&gt;</code></pre>
|
|
13693
|
Given the following array:
$array = array(0 =&gt; 'blue', 1 =&gt; 'red', 2 =&gt; 'green', 3 =&gt; 'red');
Which one of the following will print 2?
|
|
13694
|
Which one of the following is not an encryption method in PHP?
|
|
13695
|
Which of the following will store order number (34) in an &#39;OrderCookie&#39;?
|
|
13696
|
Which of the following will start a session?
|
|
13697
|
Which of the following will read an object into an array variable?
|
|
13698
|
Which of the following will print out the PHP call stack?
|
|
13699
|
Which of the following will check if a function exists?
|
|
13700
|
Which of the following variable declarations within a class is invalid in PHP?
|
|
13701
|
Which of the following methods should be used for sending an email using the variables $to, $subject, and $body?
|
|
13702
|
Which of the following is useful for method overloading?
|
|
13703
|
Which of the following is used to maintain the value of a variable over different pages?
|
|
13704
|
Which of the following is true about the singleton design pattern?
|
|
13705
|
Which of the following is not a PHP magic constant?
|
|
13706
|
Which of the following is not a file-related function in PHP?
|
|
13707
|
Which of the following is incorrect with respect to separating PHP code and HTML?
|
|
13708
|
Which of the following is correct about Mysqli and PDO?
|
|
13709
|
Which of the following characters are taken care of by htmlspecialchars?
|
|
13710
|
Which function can be used to delete a file?
|
|
13711
|
What would occur if a fatal error was thrown in your PHP program?
|
|
13712
|
What will be the output of the following code? &lt;?php var_dump (3*4); ?&gt;
|
|
13713
|
What will be the output of the following code? &lt;? echo 5 * 6 / 2 + 2 * 3; ?&gt;
|
|
13714
|
What is the string concatenation operator in PHP?
|
|
13715
|
What is the correct way to send a SMTP (Simple Mail Transfer Protocol) email using PHP?
|
|
13716
|
What is the correct line to use within the php.ini file, to specify that 128MB would be the maximum amount of memory that a script may use?
|
|
13717
|
What is the best way to change the key without changing the value of a PHP array element?
|
|
13718
|
What is the best practice for running MySQL queries in PHP? Consider the risk of SQL injection.
|
|
13719
|
What function should you use to join array elements with a glue string?
|
|
13720
|
What enctype is required for file uploads to work?
|
|
13721
|
For the following code: &lt;?php function Expenses() { function Salary() { } function Loan() { function Balance() { } } } ?&gt; Which of the following s...
|
|
13722
|
You can&#39;t save Duotone, Multichannel, or Bitmap mode images in JPEG 2000 format.State whether the statement is true or false.
|
|
13723
|
You can make a selection prior to selecting the Patch tool. State whether its true or false.
|
|
13724
|
Why do we use Defringe in layers?
|
|
13725
|
Why do we Choose Select &gt; Reselect?
|
|
13726
|
Which of the following video filters restricts the gamut of colors to bleed across television scan lines?
|
|
13727
|
Which of the following tools works when you are in Bitmap Color mode?
|
|
13728
|
Which of the following options would you be selecting to create a custom Filter?
|
|
13729
|
Which of the following options represents Freeze Mask tool in the picture given above of Liquify Filter box?
|
|
13730
|
Which among these is the right option to Warp an item?
|
|
13731
|
Which among the following type of swatches can be shared with any other Adobe CS2 application by saving a swatch library for exchange?
|
|
13732
|
Which among the following tool selects similarly colored areas?
|
|
13733
|
Which among the following tool removes the red reflection caused by Flash?
|
|
13734
|
Which among the following tool changes the color saturation of an area?
|
|
13735
|
Which among the following options would you choose to optimize your artwork while saving it?
|
|
13736
|
Which among the following options represents Midtones in the given Histogram palette?
|
|
13737
|
Which among the following options is true about the DCS file format?
|
|
13738
|
Which among the following option would you be selecting to create a custom Filter?
|
|
13739
|
Which among the following option represents Midtones in the given Histogram palette?
|
|
13740
|
Which among the following option is true about the DCS file format?
|
|
13741
|
Which among the following is true about the Weighted optimization?
|
|
13742
|
Which among the following is the right command to Merge the images to HDR in photoshop?
|
|
13743
|
Which among the following is not true about TIFF file format?
|
|
13744
|
Which among the following is not true about the Image Processor?
|
|
13745
|
Which among the following is not true about Flattening layers?
|
|
13746
|
Which among the following is not a Light type in Lighting Effects?
|
|
13747
|
Which among the following is a windows keyboard shortcut for selecting Edge Highlighter tool in the Extract toolbox?
|
|
13748
|
Which among the following is a windows Function Key for showing and hiding Color palette?
|
|
13749
|
Which among the following icon leads to Go to Adobe Bridge?
|
|
13750
|
Which among the following format is used for rendering three-dimensional images and animation?
|
|
13751
|
Which among the following filter has been applied to produce such kind of effect?
|
|
13752
|
Which among the following file format will you be using to import annotations?
|
|
13753
|
Which among the following file format supports layers?
|
|
13754
|
Which among the following file format is not supported by Photoshop when you save images for web?
|
|
13755
|
Which among the following feature is not true about the Vanishing point?
|
|
13756
|
Which among the following feature is not true about Bitmap Mode?
|
|
13757
|
Which among the following determines how pixels are added or deleted while saving the file?
|
|
13758
|
What would happen if we set undefined feature to wrap around option in Displace Filter box?
|
|
13759
|
What option will you be using to convert a layer-based slice to a user slice to unlink it from the layer in photoshop?
|
|
13760
|
What does Photomerge command do in Photoshop?
|
|
13761
|
What among the following is true about Color Separation?
|
|
13762
|
State whether the statement is true or false. For type layers, Lock Transparency and Lock Image options in the layer panel are selected by default and they cannot be deselected.
|
|
13763
|
State whether the statement is true or false. Embedding color profiles does not increase the size of PDF files.
|
|
13764
|
State whether the statement is true or false. You can apply layer effects and styles to a background, a locked layer, or a group.
|
|
13765
|
State whether the statement is True or False. All filters can not be applied to 8-bit images.
|
|
13766
|
State whether the statement is true or false: In the diagram given above of image ready, A represents Lock icon. Locking colors does not prevent them from dithering in a browser.
|
|
13767
|
In the given picture, what does the icon represent in the Layers palette denoted by A?
|
|
13768
|
In the given diagram A represents Out of Gamut option. Among which of the following color mode does this option work?
|
|
13769
|
In the diagram given above, which option represents Color replacement tool?
|
|
13770
|
In the diagram given above of web palette,which among the following slice includes a rollover effect?
|
|
13771
|
ImageReady only uses the RGB mode to work with images. State whether the statement is true or false.
|
|
13772
|
You can move Alpha or Spot channels above the default color channels only when the image is in the __________ mode?
|
|
13773
|
While using the Action Panel in the button mode, how would you exclude all the commands in an action except the selected one?
|
|
13774
|
While using a smudge tool, if the &quot;Sample All Layers&quot; option is selected, how will the smudge tool behave?
|
|
13775
|
Which type of the blending mode is supported by layers that use the Fill With Neutral Color option?
|
|
13776
|
Which type of slices has gray symbols as shown in the picture?
|
|
13777
|
Which type of layers contains information required for alignment?
|
|
13778
|
Which type of blending modes is not available for the Apply Image and Calculations commands?
|
|
13779
|
Which Texture filter is used on picture A to produce the result of picture B, as shown in the picture?
|
|
13780
|
Which smart blur mode has been used as shown in the given image?
|
|
13781
|
Which slice type will you choose to enter HTML text as shown in the picture?
|
|
13782
|
Which save options are not available in the Batch or Create Droplet commands?
|
|
13783
|
Which Quick Mask option sets masked areas to white (transparent) and selected areas to red (opaque) as shown in the picture?
|
|
13784
|
Which option would you choose to set the timeline duration you want to preview in the Animation panel?
|
|
13785
|
Which option would you choose to display the HDR color picker?
|
|
13786
|
Which option would you choose to crop to the original size of the page while placing a PDF file in photoshop as shown in the picture?
|
|
13787
|
Which option of Create UV Overlay shows model areas using a solid rendering mode?
|
|
13788
|
Which option in the info panel box displays values in the current color mode of the image as shown in the picture?
|
|
13789
|
Which option in the given picture displays Normals as default render presets?
|
|
13790
|
Which of the following types of swatches can be shared between applications? (choosing colors)
|
|
13791
|
Which of the following type of channels is created automatically when you open a new image?
|
|
13792
|
Which of the following properties of a 3D layer can not be animated?
|
|
13793
|
Which of the following photoshop tools can not be used to edit an HDR/32-bpc image?
|
|
13794
|
Which of the following options will let you use the white balance settings as provided by the camera in the camera raw dialog box as shown in the picture?
|
|
13795
|
Which of the following layers affects all the layers below it?
|
|
13796
|
Which of the following information is not retained when a 3D file is opened in photoshop?
|
|
13797
|
Which of the following command is used to delete a section of the footage in selected layers and leave the gap of the same duration in timeline mode?
|
|
13798
|
Which of the following command cannot be applied to composite channels while blending channels?
|
|
13799
|
Which mode in the animation panel shows the frame duration and animation properties for document layers?
|
|
13800
|
Which interpolation method maintains the current property setting?
|
|
13801
|
Which format can be used to save your camera raw file in Photoshop?
|
|
13802
|
Which file format does Vanishing Point support to preserve the perspective plane information?
|
|
13803
|
Which condition should be satisfied first to transform video layers?
|
|
13804
|
Which command would you use to re-link the video layer to the source file?
|
|
13805
|
Which command converts the pixel edits to the document&#39;s color space but does not convert the colors of the video frames?
|
|
13806
|
Which command allows you to use free memory used by the History Panel or the Clipboard?
|
|
13807
|
Which color mode supports the Match Color command?
|
|
13808
|
Which color mode does not support layers?
|
|
13809
|
Which channel would you choose for grayscale images in the Color Halftone Filter dialog box as shown in the picture?
|
|
13810
|
Which Auto-Align layers option aligns layers and matches overlapping content without changing the shape of the objects in the image as shown in the picture?
|
|
13811
|
Which Artistic filter is used on picture A to produce picture B as shown in the picture?
|
|
13812
|
Which among the labeled buttons in the given diagram will you use to have a changed position attribute apply to all other frames in the active layer in the frame animation mode?
|
|
13813
|
Which action can not be undone?
|
|
13814
|
Which 3D tool is used to rotate the camera around the z-axis?
|
|
13815
|
When is an image flattened?
|
|
13816
|
When does white color appear in the histogram and RGB levels in Camera Raw as shown in the picture?
|
|
13817
|
When does the Cached Data Warning icon appear in the Histogram panel?
|
|
13818
|
When does the 3D Axis appear?
|
|
13819
|
When does Layer → Arrange → Reverse option appear active?
|
|
13820
|
What would you use to insert non-recordable commands into an action?
|
|
13821
|
What values would you enter in the focal plane box to move the plane in the 3D render settings box as shown in the picture?
|
|
13822
|
What is the use of the Monochromatic option in the Add Noise dialog box as shown in the picture?
|
|
13823
|
What can you not copy using duplicate command on an image?
|
|
13824
|
To paint or clone on video frames contained by a smart object, you can:
|
|
13825
|
To change the settings for a command within an action or pauses in an action so that you can specify values in a dialog box, You will use:
|
|
13826
|
The scale styles option is available only when:
|
|
13827
|
The Photoshop Extended Measurement Feature can be used for measuring area selected by the:
|
|
13828
|
The Divide Slice dialog box can not be used to divide:
|
|
13829
|
The Displace filter creates displacement maps using a flattened file saved in which format?
|
|
13830
|
Merging of channels is possible only:
|
|
13831
|
In which option is the selection placed in a channel in your active image by default as shown in the picture?
|
|
13832
|
In which frame disposal method does a disposal icon not appear on the frame?
|
|
13833
|
In the Save for Web dialog box, when multiple slices using different color tables are selected for saving as gif images, the color table shows up for:
|
|
13834
|
In the given picture, which reconstruction mode in the Liquify filter scales back distortions uniformly without any kind of smoothing?
|
|
13835
|
In the given picture, the Conté Crayon filter(sketch filter) uses the foreground color for:
|
|
13836
|
In Paint Mask mode, which area does blue color highlight in the given image?
|
|
13837
|
In All Channels View, the individual histograms do not include:
|
|
13838
|
If there is no background, Deep knocks out to which of the following options as shown in the picture?
|
|
13839
|
If one step in an action converts an image with a source mode of RGB to a target mode of CMYK, applying this action to an image in Grayscale mode will result in:
|
|
13840
|
How would you apply a layer style to a background layer?
|
|
13841
|
For which type of the following options is Auto Blend Layers available?
|
|
13842
|
For the Type and Shape layer, which lock options are selected by default and cannot be deselected as shown in the picture?
|
|
13843
|
For previewing which of the following image modes is the 32-Bit Preview option not available?
|
|
13844
|
As shown in the picture, the Mask Incomplete Blocks option in the Extrude Filter dialog box is selected:
|
|
13845
|
As shown in the image, which option would you select to increase or decrease the tiling for texture?
|
|
13846
|
With which of the given options does the Signal Strength Meter appear?
|
|
13847
|
Which View will you choose to display a Histogram with no controls or statistics?
|
|
13848
|
Which type of information is not displayed by the Info Palette?
|
|
13849
|
Which type of images are resolution-dependent?
|
|
13850
|
Which type of character is generated by Photoshop when the font does not include superscript or subscript characters?
|
|
13851
|
Which option will you select to remove an effect from a style?
|
|
13852
|
Which option will you select to open the Levels dialog box?
|
|
13853
|
Which option will you select to export layers?
|
|
13854
|
Which option will you select to display a file at 100% size?
|
|
13855
|
Which option will you select to convert Types to Shapes?
|
|
13856
|
Which option will you select to apply the Extrude filter?
|
|
13857
|
Which option will you choose to select all layers of a similar type?
|
|
13858
|
Which option will you choose to Refresh a Histogram?
|
|
13859
|
Which option will you choose to convert Document Colors into another profile?
|
|
13860
|
Which of the Saving commands is available for an image that is managed by a Version Cue Workspace?
|
|
13861
|
Which of the given file formats works with the Image Processor?
|
|
13862
|
Which of the following Slices is created with the Slice Tool?
|
|
13863
|
Which of the following Layer properties can be animated?
|
|
13864
|
Which of the following is not true about the Options Bar?
|
|
13865
|
Which of the following is not true about the Multichannel mode?
|
|
13866
|
Which of the following is not true about the Curves dialog box?
|
|
13867
|
Which of the following is not true about Filters?
|
|
13868
|
Which of the following is not true about a Droplet?
|
|
13869
|
Which of the following is not a type of Variable?
|
|
13870
|
Which of the following is not a kind of text type?
|
|
13871
|
Which of the following is not a Color Adjustment command?
|
|
13872
|
Which of the following Filters cannot be applied to a Smart Object?
|
|
13873
|
Which of the following file formats supports embedded color profiles?
|
|
13874
|
Which of the following features is supported by the EPS file format?
|
|
13875
|
Which keyboard shortcut (Mac OS) will you choose to select the History Brush tool?
|
|
13876
|
Which keyboard shortcut (Mac OS) will you choose to permanently Clear History (no Undo)?
|
|
13877
|
Which keyboard shortcut (Mac OS) will you choose to group Layers?
|
|
13878
|
Which keyboard shortcut (Mac OS) will you choose for Auto Leading?
|
|
13879
|
Which Filter embeds a digital Watermark into an image to store a copyright information?
|
|
13880
|
Which file format saves a document of any size as well as preserves all the Photoshop features?
|
|
13881
|
Which file format can be used to save Lab images?
|
|
13882
|
Which Command lets you free memory, used by the Undo command, the History Palette, or the Clipboard?
|
|
13883
|
Which Animation mode shows the frame duration and keyframed layer properties of the videos and animations in a Timeline?
|
|
13884
|
Which among the following Slices cannot be divided?
|
|
13885
|
Which among the following QuickTime Video formats is supported by Photoshop extended?
|
|
13886
|
Which among the following Modes does not support layers?
|
|
13887
|
Which among the following is not a right option for selecting a web-safe color from the Color Palette?
|
|
13888
|
Which among the following is not a Duotone mode type?
|
|
13889
|
Which among the following files, saved in the Adobe Photoshop format, is used by the filter to create the displacement maps?
|
|
13890
|
Which among the following blending modes is available only for the Apply Image and Calculations commands?
|
|
13891
|
What is the use of the Make Work Path command in the Paths palette?
|
|
13892
|
What do you mean by kerning?
|
|
13893
|
What do you mean by Contact Sheet?
|
|
13894
|
The individual Histograms in the All Channels View does not include which of the following?
|
|
13895
|
The Color Replacement Tool does not work in which of the following Image modes?
|
|
13896
|
State whether True or False: You cannot transform the background layer.
|
|
13897
|
State whether True or False: You cannot create Work paths from the fonts that do not include the outline data.
|
|
13898
|
State whether True or False: You cannot change the order of the Vector masks or working paths in the Paths palette.
|
|
13899
|
State whether True or False: You cannot arrange the stacking order of the Auto slices.
|
|
13900
|
State whether True or False: When you create a new image with the transparent content, the image does not have a background layer.
|
|
13901
|
State whether True or False: Video layers do not work in the Frame mode.
|
|
13902
|
State whether True or False: Variable names contain spaces and special characters.
|
|
13903
|
State whether True or False: The Out Of Gamut option works only on RGB and Lab images.
|
|
13904
|
State whether True or False: The Match Color command works only in the RGB mode.
|
|
13905
|
State whether True or False: The mask created by the Replace Color command is permanent.
|
|
13906
|
State whether True or False: The Healing Brush Tool cannot be applied to video or animation frames.
|
|
13907
|
State whether True or False: Photoshop supports a maximum pixel dimension of 300,000 by 300,000 pixels per image
|
|
13908
|
State whether True or False: Hanging Punctuation controls the alignment of the punctuation marks for a specific paragraph.
|
|
13909
|
State whether True or False: Color Dodge, Color Burn, Lighten, Darken, Difference, and Exclusion blending modes do not work on Lab images.
|
|
13910
|
State whether True or False: Changing units on the Info Palette automatically changes the units on Rulers.
|
|
13911
|
State whether True or False: By default, Masks applied to Smart objects are linked to Smart object layers.
|
|
13912
|
State whether True or False: A working space is an intermediate color space used to define and edit color in Adobe applications
|
|
13913
|
Refer to the given image. Why do we select Remember Palette Locations option as shown in the given image?
|
|
13914
|
Refer to the given image. Which option, When in a checked state, displays a message Whenever you open an untagged document?
|
|
13915
|
Refer to the given image. Which option will you select to remove the existing profile from the document in the given image?
|
|
13916
|
Refer to the given image. Which option adjusts Highlights in the Levels dialog box?
|
|
13917
|
Refer to the given image. Which of the given options displays the Set Tsume option in the Character Palette?
|
|
13918
|
Refer to the given image. Which of the given options displays the Modal control in the Actions palette?
|
|
13919
|
Refer to the given image. Which of the given options displays left indent in the Paragraph palette?
|
|
13920
|
Refer to the given image. Which of the given options displays Converts to Timeline mode in an Animation palette?
|
|
13921
|
Refer to the given image. Which of the given options displays an Action Safe Area?
|
|
13922
|
Refer to the given image. Which of the following options displays the Spot Channels in the Channels palette?
|
|
13923
|
Refer to the given image. Which of the following options displays Temporary Work Path in the Paths palette?
|
|
13924
|
Refer to the given image. Which of the following Lock options in the Layers palette prevents modification of the layer&#39;s pixels using the painting tools?
|
|
13925
|
Refer to the given image. Which of the following icons displays the Panel Title Bar in the Photoshop workspace?
|
|
13926
|
Refer to the given image. Which Liquify Tool is used to reconstruct a part of a distorted image?
|
|
13927
|
Refer to the given image. Which icon indicates Type 1 kind of fonts?
|
|
13928
|
Refer to the given image. Which among the following Methods adds pixels by averaging the color values of the surrounding pixels and produces medium-quality results?
|
|
13929
|
Refer to the given image. Which among the following is not true about the Fill Pixels (Drawing mode) as shown in the picture?
|
|
13930
|
Refer to the given image. When will the Dynamic shortcuts appear in the Character Palette Menu as shown in the picture?
|
|
13931
|
Refer to the given image. When is the Canvas Extension Color Menu not available as shown in the given image?
|
|
13932
|
Refer to the given image. What is the colored box in the Navigator Palette known as?
|
|
13933
|
Refer to the given image. What happens when Use Legacy is selected as shown in the given picture?
|
|
13934
|
Refer to the given image. In which format will you save your document to preserve the Perspective Plane Information in an image while working with the vanishing point, as shown in the given picture?
|
|
13935
|
Layer styles cannot be applied to which of the following options?
|
|
13936
|
In which of the following Modes can you draw while working with the Shape or Pen tools?
|
|
13937
|
In which Format will you save your file to preserve the Alpha channels?
|
|
13938
|
Channels can not be added to which of the following image modes?
|
|
13939
|
Auto Blend Layers is available for which of the following modes?
|
|
13940
|
Anti-aliasing option is available for which of the given Tools?
|
|
13941
|
You can define the area that you want to crop out of any image using the Crop tool.
|
|
13942
|
You can apply Brush, Eraser and Clone Stamp on vector based layers.
|
|
13943
|
With which options can you get the effects shown in the image above?
|
|
13944
|
Which tool of Photoshop makes the image shown above appear on screen?
|
|
13945
|
Which option in Stamp tool will you select if you want to clone all the layers simultaneously?
|
|
13946
|
Which option allows you to change the Background layer&#39;s appearance when part of your image is transparent?
|
|
13947
|
Which of the given image(s) belongs to the red channel if the source image is in RGB mode?
|
|
13948
|
Which of the following values define the maximum softness and hardness limits of the round brush tip?
|
|
13949
|
Which of the following values define the maximum hardness and softness limits of the round brush tip?
|
|
13950
|
Which of the following settings is/are available in the Lighting Effects dialog box?
|
|
13951
|
Which of the following options will you choose if you want to increase or decrease the size of the mask while editing the mask?
|
|
13952
|
Which of the following options are contained in the Brush dialog box?
|
|
13953
|
Which of the following are image sharpening techniques available in Photoshop?
|
|
13954
|
Which of the following action sequences will make the above given dialog box appear on screen?
|
|
13955
|
Which method of Resample Image gives the lowest image quality?
|
|
13956
|
Which layer blend mode lightens the image by decreasing its contrast?
|
|
13957
|
Which command lets you paste an image inside the selection you have made?
|
|
13958
|
Which among the following is measured in terms of pixels per inch in any Photoshop document?
|
|
13959
|
Which &quot;layer blend mode&quot; lightens the image by increasing its contrast?
|
|
13960
|
What will be the default blending mode of a layer group?
|
|
13961
|
What purpose does the area marked in blue in the given image serve?
|
|
13962
|
What option will you choose if you want to merge a selected layer with the layer lying immediately below it?
|
|
13963
|
What option in the Character panel will you choose for moving the text away or toward the shape it is bound to?
|
|
13964
|
What is the subtractive color system used for?
|
|
13965
|
What file formats are available to you when you save a file using the Save for Web &amp; Devices dialog box?
|
|
13966
|
What effect will checking the Constrain Proportions option shown above have on the size of an image?
|
|
13967
|
What does the Use Global Light option in the Layer Style dialog box do when checked?
|
|
13968
|
What does the Baseline option in the Curves Display Options dialog box do?
|
|
13969
|
What do the width and height of the histogram in levels adjustments represents?
|
|
13970
|
What do the Horizontal Type Mask Tool and Vertical Type Mask Tool do?
|
|
13971
|
What are the names of the tools marked in red in the image above?
|
|
13972
|
What are anchor points?
|
|
13973
|
Using Render filters, you can :
|
|
13974
|
The Path Selection tool lets you select individual nodes on the path, whereas the Direct Selection tool lets you the select path as a whole.
|
|
13975
|
The Mode pop-up menu of Puppet warp tells Photoshop how stretchable you want the mesh to be.
|
|
13976
|
The Fractional widths command in the Character panel rounds character widths to the nearest part of a pixel instead of the normal whole pixel.
|
|
13977
|
Smooth and Corner are two kinds of anchor points in Photoshop.
|
|
13978
|
Revert command reverts the document to its most recent saved state.
|
|
13979
|
Proximity Match option in Spot Healing Brush tells it to use pixels just outside the edge of your cursor to fix spots.
|
|
13980
|
Onscreen images are called ___________________because they are made up of red, blue, green light.
|
|
13981
|
Levels adjustments do NOT change the intensity levels of your shadows, midtones, and highlights.
|
|
13982
|
It is possible to convert a type layer into a shape layer.
|
|
13983
|
It is possible to avoid Adjustment Layers while working with the Healing Brush tool.
|
|
13984
|
In the Screen layer blend mode, Photoshop multiplies the opposite of the blend and base colors, making everything very light.
|
|
13985
|
Images in which mode are called 1-bit images?
|
|
13986
|
Image Processor option is used for resizing the Images in masses.
|
|
13987
|
How many drawing modes are available in Photoshop?
|
|
13988
|
How many drawing modes are available in Photoshop, when you work with shape or pen tools?
|
|
13989
|
How many channels do lab colors have?
|
|
13990
|
How does the &quot;Expansion Field&quot; of Puppet Warp tool work?
|
|
13991
|
How do you write around any shape as shown in the image above?
|
|
13992
|
How do you use a shape with gradient as a mask as shown in the image above?
|
|
13993
|
Filters can affect multiple layers simultaneously.
|
|
13994
|
Duotone refers to an image that&#39;s made from two ink colors.
|
|
13995
|
Content Aware Scale tool can work on the locked background layer.
|
|
13996
|
Channels contain all the color information of a Photoshop document.
|
|
13997
|
Bit depth controls the amount of color information that a pixel can hold.
|
|
13998
|
Anti-aliasing allows you to smoothen the edges of a selection as well as smoothen text.
|
|
13999
|
Alpha Channels are basically grayscale representations of saved selections.
|
|
14000
|
A gray warning symbol means that you are using a font that is not installed in your system, whereas a yellow warning symbol means that the document you have opened was created in a different versio...
|
|
14001
|
_________________control how pixels on different layers interact with each other.
|
|
14002
|
__________________filter helps to draw perspective planes or a mesh grid that can be used in editing.
|
|
14003
|
___________________is a process in which Photoshop responds to your size-change request either by adding or subtracting pixels.
|
|
14004
|
____________________is the process of converting vector based layers into pixel based layers.
|
|
14005
|
____________________ is a grid-like mesh on your image that contains handles to distort the content the way you want.
|
|
14006
|
____________________ helps change the spacing between all letters in a word by the same amount.
|
|
14007
|
__________________ is/are available only if you have an alpha channel selected.
|
|
14008
|
__________________ appears when you check the Tint checkbox, as shown in the image above, in the Adjustments panel&gt;&gt; Black &amp; White layer.
|
|
14009
|
________________ does NOT affect the original quality and size even if you resize the object.
|
|
14010
|
You can move Alpha or Spot channels above the default color channels only when the image is in the __________ mode?
|
|
14011
|
While using a smudge tool, if the &quot;Sample All Layers&quot; option is selected, how will the smudge tool behave?
|
|
14012
|
Which type of the blending mode is supported by layers that use the Fill With Neutral Color option?
|
|
14013
|
Which type of slices has gray symbols as shown in the picture?
|
|
14014
|
Which type of layers contains information required for alignment?
|
|
14015
|
Which type of channels is created automatically when you open a new image?
|
|
14016
|
Which type of blending modes is not available for the Apply Image and Calculations commands?
|
|
14017
|
Which Texture filter is used on picture A to produce the result of picture B, as shown in the picture?
|
|
14018
|
Which smart blur mode has been used as shown in the preview in the given image?
|
|
14019
|
Which slice type will you choose to enter HTML text as shown in the picture?
|
|
14020
|
Which save options are not available in the Batch or Create Droplet commands?
|
|
14021
|
Which Quick Mask option sets masked areas to white (transparent) and selected areas to black (opaque) as shown in the picture?
|
|
14022
|
Which option would you choose to set the timeline duration you want to preview in the Animation panel?
|
|
14023
|
Which option would you choose to open the HDR color picker dialog box while editing a 32- bpc image?
|
|
14024
|
Which option would you choose to crop to the original size of the page while placing a PDF file in photoshop as shown in the picture?
|
|
14025
|
Which option of Create UV Overlay shows model areas using a solid rendering mode?
|
|
14026
|
Which option in the info panel box displays values in the current color mode of the image as shown in the picture?
|
|
14027
|
Which option in the given picture displays Normals as default render presets?
|
|
14028
|
Which of the following will list the saved selections when dialog box appears same as shown in the image given above?
|
|
14029
|
Which of the following types of swatches can be shared between applications? (choosing colors)
|
|
14030
|
Which of the following properties of a 3D layer can not be animated?
|
|
14031
|
Which of the following photoshop tools can be used to edit an HDR/32-bpc image?
|
|
14032
|
Which of the following options will let you use the white balance settings as provided by the camera in the camera raw dialog box as shown in the picture?
|
|
14033
|
Which of the following layers affects all the layers below it?
|
|
14034
|
Which of the following information is not retained when a 3D file is opened in photoshop?
|
|
14035
|
Which mode in the animation panel shows the frame duration and animation properties for document layers?
|
|
14036
|
Which Interpolation(Tweening) method will you use to animate a visibility of a layer when you want the layer to appear or disappear suddenly across the timeline?
|
|
14037
|
Which format can be used to save your camera raw file in Photoshop?
|
|
14038
|
Which file format does Vanishing Point support to preserve the perspective plane information?
|
|
14039
|
Which condition should be satisfied first to transform video layers?
|
|
14040
|
Which command would you use to re-link the video layer to the source file?
|
|
14041
|
Which command is used to delete footage in one or more layers and leave a gap of same duration in the timeline mode?
|
|
14042
|
Which command does not convert the pixel edits to a video layer while managing colors in video layers?
|
|
14043
|
Which command cannot be applied to composite channels?
|
|
14044
|
Which command allows you to use free memory used by the History Panel, or the Clipboard?
|
|
14045
|
Which color mode supports the Match Color command?
|
|
14046
|
Which color mode does not support layers?
|
|
14047
|
Which channel would you choose for grayscale images in the Color Halftone Filter dialog box as shown in the picture?
|
|
14048
|
Which Auto-Align layers option aligns layers and matches overlapping content without changing the shape of the objects in the image as shown in the picture?
|
|
14049
|
Which Artistic filter is used on picture A to produce picture B as shown in the picture?
|
|
14050
|
Which among the labeled buttons in the given diagram will you use to have a changed position attribute apply to all other frames in the active layer in the frame animation mode?
|
|
14051
|
Which action can not be undone?
|
|
14052
|
Which 3D tool is used to rotate the camera around the z-axis?
|
|
14053
|
When is an image flattened?
|
|
14054
|
When does white color appear in the histogram and RGB levels in Camera Raw as shown in the picture?
|
|
14055
|
When does the Cached Data Warning icon appear in the Histogram panel?
|
|
14056
|
When does the 3D Axis appear?
|
|
14057
|
When does Layer → Arrange → Reverse option appear active?
|
|
14058
|
What would you use to insert non-recordable commands into an action?
|
|
14059
|
What will happen if you enter a negative value in the roundness option of a postcrop vignette in the camera raw dialog box as shown in the picture?
|
|
14060
|
What values would you enter in the focal plane box to move the plane from red hightlighted box to blue highlighted box in the 3D render settings box as shown in the picture?
|
|
14061
|
What is the use of the Monochromatic option in the Add Noise dialog box as shown in the picture?
|
|
14062
|
What can you not copy using duplicate command on an image?
|
|
14063
|
To paint or clone on video frames contained by a smart object, you can:
|
|
14064
|
To change the settings for a command within an action or pauses in an action so that you can specify values in a dialog box, You will use:
|
|
14065
|
The scale styles option is available only when:
|
|
14066
|
The Photoshop Extended Measurement Feature can be used for measuring area selected by the:
|
|
14067
|
The Divide Slice dialog box can not be used to divide:
|
|
14068
|
Merging of channels is possible only:
|
|
14069
|
In which frame disposal method does a disposal icon not appear on the frame?
|
|
14070
|
In the Save for Web dialog box, when multiple slices using different color tables are selected for saving as gif images, the color table shows up for:
|
|
14071
|
In the given picture, which Reconstruction mode in the Liquify filter scales back distortions uniformly without any kind of smoothing?
|
|
14072
|
In the given picture, the Conté Crayon filter(sketch filter) uses the foreground color for:
|
|
14073
|
In Paint Mask mode, which area does blue color highlight in the given image?
|
|
14074
|
In All Channels View, the individual histograms do not include:
|
|
14075
|
If there is no background, Deep knocks out to which of the following options as shown in the picture?
|
|
14076
|
If one step in an action converts an image with a source mode of RGB to a target mode of CMYK, applying this action to an image in Grayscale mode will result in:
|
|
14077
|
How would you apply a layer style to a background layer?
|
|
14078
|
For which type of the following options is Auto Blend Layers available?
|
|
14079
|
For the type and shape layer, which lock options are selected by default and cannot be deselected as shown in the picture?
|
|
14080
|
For previewing which of the following image modes is the 32-Bit Preview option not available?
|
|
14081
|
As shown in the picture, the Mask Incomplete Blocks option in the Extrude Filter dialog box is selected:
|
|
14082
|
You use the Edit -&gt; Define Pattern command to create new patterns based on a selection. Which of the following statements is true while defining a pattern:
|
|
14083
|
You cannot insert a path when recording an action or after it has been recorded. State(True/False)
|
|
14084
|
You can apply transformations to the background as a layer. You cannot however, transform selections on the background. State(True/False)
|
|
14085
|
You can add notes and audio annotations anywhere on a Photoshop image canvas. State(True/False)
|
|
14086
|
With the &quot;Magnetic lasso tool&quot;, the border snaps to the edges of defined areas in the image. State(True/False)
|
|
14087
|
Why is the &quot;Stroke command&quot; used?
|
|
14088
|
Why is &quot;Type&quot; given in gradient tool option?
|
|
14089
|
Which Tool or Option gave the encircled area an orange color?
|
|
14090
|
Which Tool or Effect has led to the effect in the image?
|
|
14091
|
Which tool is activated by default, when a color adjustment dialog box is opened?
|
|
14092
|
Which tool has led to the effect within the encircled area in the image?
|
|
14093
|
Which tool among the following allows you to create &quot;Arrow heads&quot;?
|
|
14094
|
Which step has to be performed first to give &quot;Stroke to text&quot;?
|
|
14095
|
Which one of the below is the first step to publish the images online, through Adobe Photoshop.
|
|
14096
|
Which of the below will be most suitable for resizing and resampling images for printed or online display.
|
|
14097
|
Which of the below tools is shown in the picture?
|
|
14098
|
Which of the below steps has to be performed to open a note or play an audio annotation?
|
|
14099
|
Which of the below steps has to be performed to delete all annotations of the same type?
|
|
14100
|
Which of the below operations is to be performed to reverse all changes made to the image since it was last saved?
|
|
14101
|
Which of the below is the only way to affect multiple layers at once?
|
|
14102
|
Which of the below is the first step to import annotations?
|
|
14103
|
Which of the below is the advantage of working in RGB mode?
|
|
14104
|
Which of the below is not the function of the &quot;Convert direction point tool&quot;?
|
|
14105
|
Which of the below is not the function of &quot;Alt Tag&quot; in the Slice options window?
|
|
14106
|
Which of the below file formats can be used when you choose to optimize images?
|
|
14107
|
Which of the below defines the purpose of creating a Slice from an image?
|
|
14108
|
Which of the below are &quot;Primary colors&quot;?
|
|
14109
|
Which Mode of the Air Brush tool has created the black effect shown in the image?
|
|
14110
|
Which below tool is shown in the picture?
|
|
14111
|
Which &quot;Tool&quot; is shown in the image?
|
|
14112
|
When adjusting out of gamut colors or making color corrections in RGB mode, CMYK colors can be previewed in an RGB image. State(True/False)
|
|
14113
|
What will be the most suitable option if you have to replace parrot green with red color in the image. The layers in the image are merged.
|
|
14114
|
What is the role of the &quot;History palette&quot; in Photoshop?
|
|
14115
|
What is the role of the &quot;Crop tool&quot;?
|
|
14116
|
What is the role of &quot;The Eye dropper tool&quot;?
|
|
14117
|
What is the role of &quot;Info palette&quot; and &quot;Color palette&quot;?
|
|
14118
|
What is the role of &quot;Edit&quot; in the gradient tool options?
|
|
14119
|
What is the role of &quot;Dodge tool&quot;?
|
|
14120
|
What is &quot;Clone Aligned&quot; option in &quot;Rubber stamp tool&quot; used for?
|
|
14121
|
What information does the &quot;Info palette&quot; of the Measure tool contain?
|
|
14122
|
What happens when you create a &quot;Note&quot;?
|
|
14123
|
What happens if you double-click the slice with the slice select tool?
|
|
14124
|
What does the term &quot;Resampling&quot; refer to?
|
|
14125
|
What does the option &quot;Message Text&quot; in the Slice option window let you do?
|
|
14126
|
What does the option &quot;discontiguous&quot; in the Background eraser tool mean?
|
|
14127
|
What does the option &quot;Auto Erase&quot; for the pencil tool let you do?
|
|
14128
|
What does the encirled area represent?
|
|
14129
|
What does the encircled area in the image represent?
|
|
14130
|
What does the Anti alias PostScript option let you do, when you open a PDF or an EPS file?
|
|
14131
|
What does the &quot;Stop command&quot; let you do in the Actions palette?
|
|
14132
|
What does the &quot;Image Size&quot; command let you do?
|
|
14133
|
What does the &quot;history brush tool&quot; let you do?
|
|
14134
|
What does duplicating an action or command do?
|
|
14135
|
What does a &quot;Magic wand tool&quot; let you do?
|
|
14136
|
What does &quot;The red box&quot; in the image indicate?
|
|
14137
|
What does &quot;Smudge tool&quot; let you do?
|
|
14138
|
What does &quot;Rubber stamp tool&quot; let you do?
|
|
14139
|
What does &quot;RGB color mode&quot; stand for?
|
|
14140
|
What does &quot;Opacity option&quot; in Eraser tool let you do?
|
|
14141
|
What does &quot;Once&quot; in the Sampling option in the background eraser tool mean?
|
|
14142
|
What does &quot;Image&#39;s color mode&quot; contain?
|
|
14143
|
What does &quot;Flatten Image&quot; let you do?
|
|
14144
|
What does &quot;Fade out rate&quot; in the Eraser tool let you do?
|
|
14145
|
What does &quot;Accelerated&quot; in the Playback options let you do ?
|
|
14146
|
We cannot change the opacity of an image that has only a background, or a locked layer. State(True/False)
|
|
14147
|
To use the Apply Image command, the destination and source images:
|
|
14148
|
To subtract more of a selection, to an existing pixel selection, which of the below is used?
|
|
14149
|
To apply a &quot;Blur filter&quot; to the edges of a layer, it is necessary to deselect the preserve Transparency option in the Layers palette. State (True/False)
|
|
14150
|
To add more of a selection, to an existing pixel selection, which of the below is used?
|
|
14151
|
The Snapshot command lets you make a temporary copy of any state of the image. State(True/False)
|
|
14152
|
The rubber stamp tool can be used to clone an area containing pixels from all the visible layers and layer sets. State (True/False)
|
|
14153
|
The maximum file size and pixel dimension which Photoshop supports is:
|
|
14154
|
The magic wand, smudge, or pattern stamp tools can be used for applying color sampled from pixels on the all visible layers. State(True/False)
|
|
14155
|
The Image Size command lets you adjust the pixel dimensions, print dimensions, and resolution of an image.State(True/False)
|
|
14156
|
The effect in the encircled area is the result of which Tool or Filter?
|
|
14157
|
The Create Droplets command lets you ....
|
|
14158
|
The &quot;Render filter&quot; creates 3D shapes, cloud patterns, refraction patterns, and simulated light reflections in an image. State(True/False)
|
|
14159
|
The &quot;Preset Manager&quot; allows you to easily reuse or share preset sets. State (True/False)
|
|
14160
|
The &quot;Magnetic lasso&quot; only detects edges within the specified distance from the pointer. State(True/False)
|
|
14161
|
The &quot;Magnetic lasso tool&quot; is especially useful for quickly selecting objects with complex edges set against high-contrast backgrounds. State(True/False)
|
|
14162
|
The &quot;Line tool&quot; is used to create curved lines. State(True/False)
|
|
14163
|
The &quot;Lasso and Polygon lasso tools&quot; let you draw both straight-edged and freehand segments of a selection border. State(True/False)
|
|
14164
|
The &quot;Info palette&quot; only displays information about the color values beneath the pointer. State(True/False)
|
|
14165
|
The &quot;Blur More&quot; filter produces an effect three or four times stronger than that of the Blur filter. State(True/False)
|
|
14166
|
Snapshots are not saved with the image. Closing an image deletes its snapshots. State(True/False)
|
|
14167
|
Playing actions that insert complex paths may require significant amounts of computer memory. State(True/False)
|
|
14168
|
Locked layers can be moved to a different location within the Layers palette, but they can&#39;t be deleted. State(True/False)
|
|
14169
|
It is possible to drag italicized commands from the History palette to the Actions palette. State(True/False)
|
|
14170
|
In which mode, can modal control be set?
|
|
14171
|
In the brush option palette, what is the role of &quot;Hardness&quot;?
|
|
14172
|
In the actions palette a modal control pauses an action so that you can specify values in a dialog box or use a modal tool. State (True/False)
|
|
14173
|
In CMYK mode, &quot;K&quot; stands for:
|
|
14174
|
If corrections are made to an &quot;Adjustment layer&quot;, changes reside not only in the adjustment layer but also alter pixels in the image. State (True/False)
|
|
14175
|
How many speeds does the Playback Options command give you, so that you can watch each command as it is carried out?
|
|
14176
|
How many sets of color values for the pixels under the pointer are displayed when you work with a color adjustment dialog box?
|
|
14177
|
How many colors are used when an image is given a &quot;Grayscale mode&quot;?
|
|
14178
|
For type layers, preserve Transparency in the layer&#39;s palette is switched on by default and cannot be turned off. State (True/False)
|
|
14179
|
For the &quot;Magnetic lasso tool&quot;, a higher value detects lower-contrast edges; a lower value detects only edges that contrast sharply with their surroundings. State(True/False)
|
|
14180
|
For &quot;Creating Type&quot; you need to add a new layer in the layer palette. State(True/False)
|
|
14181
|
Corrections made to an image, which uses RGB color spaces, are preserved regardless of the monitor, computer, or output device used. State whether the statement is true or false
|
|
14182
|
Choosing the &quot;No Image type&quot;(in the Slice options window) for a slice lets you enter text that will appear in the slice area of the resulting Web page. State(True/False)
|
|
14183
|
Channels cannot be rearranged or duplicated within or between images. State(True/False)
|
|
14184
|
Changing pixel dimensions...
|
|
14185
|
Assigning a URL to a slice makes the entire slice area a hotspot, when a user clicks in the hotspot, the Web browser links to the specified URL and target frame. State(True/False)
|
|
14186
|
Adding nontransparent layers to an image increases its file size. State(True/False)
|
|
14187
|
A modal control pauses an action so that you can specify values in a dialog box or use a modal tool. What is the result if you do not set a modal control?
|
|
14188
|
&quot;Merge visible&quot; compresses all unhidden layers into a single layer. State (True/False)
|
|
14189
|
&quot;Merge Down&quot; merges selected layer with the layer below it. State (True/False)
|
|
14190
|
With which of the given options does the Signal Strength Meter appear?
|
|
14191
|
Which View will you choose to display a Histogram with no controls or statistics?
|
|
14192
|
Which type of images are resolution-dependent?
|
|
14193
|
Which type of character is generated by Photoshop when the font does not include superscript or subscript characters?
|
|
14194
|
Which option will you select to remove an effect from a style?
|
|
14195
|
Which option will you select to open the Levels dialog box?
|
|
14196
|
Which option will you select to export layers?
|
|
14197
|
Which option will you select to display a file at 100% size?
|
|
14198
|
Which option will you select to convert Types to Shapes?
|
|
14199
|
Which option will you select to apply the Extrude filter?
|
|
14200
|
Which option will you choose to select all layers of a similar type?
|
|
14201
|
Which option will you choose to Refresh a Histogram?
|
|
14202
|
Which option will you choose to convert Document Colors into another profile?
|
|
14203
|
Which option is not turned off by the Extras command in the View menu?
|
|
14204
|
Which of the Saving commands is available for an image that is managed by a Version Cue Workspace?
|
|
14205
|
Which of the given file formats works with the Image Processor?
|
|
14206
|
Which of the following Slices is created with the Slice Tool?
|
|
14207
|
Which of the following Layer properties can be animated?
|
|
14208
|
Which of the following is not true about the Multichannel mode?
|
|
14209
|
Which of the following is not true about the Curves dialog box?
|
|
14210
|
Which of the following is not true about Filters?
|
|
14211
|
Which of the following is not true about a Droplet?
|
|
14212
|
Which of the following is not a type of Variable?
|
|
14213
|
Which of the following is not a kind of text type?
|
|
14214
|
Which of the following is not a Color Adjustment command?
|
|
14215
|
Which of the following Filters cannot be applied to a Smart Object?
|
|
14216
|
Which of the following file formats supports embedded color profiles?
|
|
14217
|
Which of the following features is/are supported by the EPS file format?
|
|
14218
|
Which keyboard shortcut (windows) will you choose to select the History Brush tool?
|
|
14219
|
Which keyboard shortcut (windows) will you choose to permanently Clear History (no Undo)?
|
|
14220
|
Which keyboard shortcut (windows) will you choose to group Layers?
|
|
14221
|
Which keyboard shortcut (windows) will you choose to close a Path?
|
|
14222
|
Which keyboard shortcut (windows) will you choose for Auto Leading?
|
|
14223
|
Which Filter embeds a digital Watermark into an image to store a copyright information?
|
|
14224
|
Which file format saves a document of any size as well as preserves all the Photoshop features?
|
|
14225
|
Which file format can be used to save Lab images?
|
|
14226
|
Which Command lets you free memory, used by the Undo command, the History Palette, or the Clipboard?
|
|
14227
|
Which Animation mode shows the frame duration and keyframed layer properties of the videos and animations in a Timeline?
|
|
14228
|
Which among the following Slices cannot be divided?
|
|
14229
|
Which among the following QuickTime Video formats is supported by Photoshop extended?
|
|
14230
|
Which among the following Modes does not support layers?
|
|
14231
|
Which among the following is/are not true about the Fill Pixels (Drawing mode)?
|
|
14232
|
Which among the following is not a right option for selecting a web-safe color from the Color Palette?
|
|
14233
|
Which among the following is not a Duotone mode type?
|
|
14234
|
Which among the following files, saved in the Adobe Photoshop format, is used by the filter to create the displacement maps?
|
|
14235
|
Which among the following blending modes is available only for the Apply Image and Calculations commands?
|
|
14236
|
What is the use of the Make Work Path command in the Paths palette ?
|
|
14237
|
What is meant by Contact Sheet?
|
|
14238
|
The Rotate Canvas command does not work on which of the following
|
|
14239
|
The individual Histograms in the All Channels View does not include which of the following?
|
|
14240
|
The Color Replacement Tool does not work in which of the following Image modes?
|
|
14241
|
State whether True or False: You cannot transform the background layer.
|
|
14242
|
State whether True or False: You cannot create Work paths from the fonts that do not include the outline data.
|
|
14243
|
State whether True or False: You cannot change the order of the Vector masks or working paths in the Paths palette.
|
|
14244
|
State whether True or False: You cannot arrange the stacking order of the Auto slices.
|
|
14245
|
State whether True or False: When you create a new image with the transparent content, the image does not have a background layer.
|
|
14246
|
State whether True or False: Video layers do not work in the Frame mode.
|
|
14247
|
State whether True or False: The Out Of Gamut option works only on RGB and Lab images.
|
|
14248
|
State whether True or False: The Match Color command works only in the RGB mode.
|
|
14249
|
State whether True or False: The mask created by the Replace Color command is permanent.
|
|
14250
|
State whether True or False: The Healing Brush Tool cannot be applied to video or animation frames.
|
|
14251
|
State whether True or False: Photoshop supports a maximum pixel dimension of 300,000 by 300,000 pixels per image.
|
|
14252
|
State whether True or False: Hanging Punctuation controls the alignment of the punctuation marks for a specific paragraph.
|
|
14253
|
State whether True or False: Color Dodge, Color Burn, Lighten, Darken, Difference, and Exclusion blending modes do not work on Lab images.
|
|
14254
|
State whether True or False: Changing units on the Info Palette automatically changes the units on Rulers.
|
|
14255
|
State whether True or False: By default, Masks applied to Smart objects are linked to Smart object layers.
|
|
14256
|
State whether True or False: A working space is an intermediate color space used to define and edit color in Adobe applications.
|
|
14257
|
Refer to the given image. Why do we select Remember Palette Locations option (marked as A) as shown in the given image?
|
|
14258
|
Refer to the given image. Which option, when in a checked state, displays a message whenever you open an untagged document?
|
|
14259
|
Refer to the given image. Which option will you select to remove the existing profile from the document in the given image?
|
|
14260
|
Refer to the given image. Which option adjusts Highlights in the Levels dialog box?
|
|
14261
|
Refer to the given image. Which of the given options refers an Action Safe Margin?
|
|
14262
|
Refer to the given image. Which of the given options displays the Set Tsume option in the Character Palette?
|
|
14263
|
Refer to the given image. Which of the given options displays the Modal control in the Actions palette?
|
|
14264
|
Refer to the given image. Which of the given options displays left indent in the Paragraph palette?
|
|
14265
|
Refer to the given image. Which of the given options displays Converts to Timeline mode in an Animation palette?
|
|
14266
|
Refer to the given image. Which of the following options displays the Spot Channels in the Channels palette?
|
|
14267
|
Refer to the given image. Which of the following options displays Temporary Work Path in the Paths palette?
|
|
14268
|
Refer to the given image. Which of the following Lock options in the Layers palette prevents modification of the layer&#39;s pixels using the painting tools?
|
|
14269
|
Refer to the given image. Which Liquify Tool is used to reconstruct a part of a distorted image?
|
|
14270
|
Refer to the given image. Which icon indicates Type 1 kind of fonts?
|
|
14271
|
Refer to the given image. Which among the following Methods adds pixels by averaging the color values of the surrounding pixels and produces medium-quality results?
|
|
14272
|
Refer to the given image. When will the Dynamic shortcuts appear in the Character Palette Menu as shown in the picture?
|
|
14273
|
Refer to the given image. When is the Canvas Extension Color Menu not available as shown in the given image?
|
|
14274
|
Refer to the given image. What is the colored box in the Navigator Palette known as?
|
|
14275
|
Refer to the given image. What happens when Use Legacy is selected as shown in the given picture?
|
|
14276
|
Refer to the given image. In which of the given instances, a caution icon appears next to the layer comp name as shown in the picture?
|
|
14277
|
Refer to the given image. In which format will you save your document to preserve the Perspective Plane Information in an image while working with the vanishing point, as shown in the given picture?
|
|
14278
|
Layer styles cannot be applied to which of the following options?
|
|
14279
|
Kerning is the adjustment of the space between individual letter.
|
|
14280
|
In which of the following Modes can you draw while working with the Shape or Pen tools?
|
|
14281
|
In which Format will you save your file to preserve the Alpha channels?
|
|
14282
|
Channels can not be added to which of the following image modes?
|
|
14283
|
Auto Blend Layers is available for which of the following modes?
|
|
14284
|
Anti-aliasing option is available for which of the given Tools?
|
|
14285
|
Device which scans program code and extract them from database management system for processing is classified as
|
|
14286
|
Process of designing new database or designing new application for database which already exists is classified as
|
|
14287
|
Weak entities are used in entity relationship diagrams and are denoted by
|
|
14288
|
Generalization and specialization lattices are classified as
|
|
14289
|
System which provides active rules to initiate certain actions after meeting specific conditions is classified as
|
|
14290
|
In large database management applications, theses customary constraints are classified as
|
|
14291
|
When foreign key refers to a tuple which does not exists in subjected relation then constraint violated is
|
|
14292
|
Type of attributes that can be easily divided into smaller parts is classified as
|
|
14293
|
In SQL standard, variable which is considered as communication variable and is string of five characters is named as
|
|
14294
|
One of module in database management system which is responsible for choosing efficient execution plan considering queries is considered as
|
|
14295
|
Operator which is useful for a single relation is classified as
|
|
14296
|
IS-AN-INSTANCE-OF and IS-A-MEMBER-OF are types of relationships to associate
|
|
14297
|
Computing model in which large number of printers, PCs, Web servers and database servers are connected to each other with help of network is classified as
|
|
14298
|
Joining property which guarantees that spurious tuple generation problem is not created after decomposition is called
|
|
14299
|
Diagrams in unified modified language which includes executable component, interfaces and dependency relationships are called
|
|
14300
|
Type of association which associates a owner entity to weak entity is classified as
|
|
14301
|
Constraint between two different attributes sets is classified as
|
|
14302
|
Operation which only selects some of columns from table and neglect remaining columns is classified as
|
|
14303
|
Number of values taken by hash field are called
|
|
14304
|
Data model, access path and number of users of database management system are criteria for
|
|
14305
|
If matching tuples are not found, kind of OUTER JOIN operation which keeps all tuples of first relation out of two relations is classified as
|
|
14306
|
Decomposition of one relation say R into two relations is classified as
|
|
14307
|
Considering device specifications, byte sizes are usually from
|
|
14308
|
If matching tuples are not found, kind of OUTER JOIN operation which keeps all tuples of second relation out of two relations is classified as
|
|
14309
|
Command which returns first record of just opened file is classified as
|
|
14310
|
Distribution in which each row denote some related values collection is classified as
|
|
14311
|
User defined operations which includes update transactions and retrieval transactions are classified as
|
|
14312
|
Other names of weak entity types are
|
|
14313
|
Representation of relational calculus internal queries is classified as
|
|
14314
|
Considering functional dependency, one in which removal of some attributes does not affect dependency is called
|
|
14315
|
Procedure of sorting algorithms for larger records that does not fit in main memory and are stored on disk is classified as
|
|
14316
|
Data type often used in SQL-99 to specify columns with large values is classified as
|
|
14317
|
Group of people whose job description requires updating database, generating reports or using queries is called
|
|
14318
|
In allocation of file blocks on disk, clusters are also called
|
|
14319
|
Operation which is used to select subset of tuples by satisfying selection constraint and selection is made from relation is classified as
|
|
14320
|
In database management systems, record which contains all information needed for one statement of standard query language is called
|
|
14321
|
Applications that are used for weather information or collection of maps for geographical information is classified as
|
|
14322
|
Type of relationship between attributes in which similar entity participates more than once by playing different roles is classified as
|
|
14323
|
Systematic collection of data is classified as
|
|
14324
|
In CREATE TABLE command in standard query language, referential integrity constraints is specified only after the
|
|
14325
|
Consider two tuples A and B, operation whose result includes tuples that are included in both relations is classified as
|
|
14326
|
Concept in which shared subclass take over relationship from multiple classes is considered as
|
|
14327
|
Operation which violates only one constraint called referential integrity when it is performed is called
|
|
14328
|
File which consists of ordering fields for records is called
|
|
14329
|
Combination of track number, block number and cylinder number is classified as
|
|
14330
|
In traditional DBMS, application programs are considered to be part of domain of
|
|
14331
|
Storage capacity of digital video disk is
|
|
14332
|
In entity-relationship diagram, key attributes are represented by
|
|
14333
|
JOIN operation in which two attributes joined have same name in both relations is classified as
|
|
14334
|
In two-tier client â„ server architecture, functions of transaction server and query server are controlled by
|
|
14335
|
Leaf nodes in diagrams of generalization and specialization are considered as
|
|
14336
|
In unary relational operations, PROJECT operation is partition of relation usually classified as
|
|
14337
|
In functional dependency between two sets of attributes A and B then set of attributes A of database is classified as
|
|
14338
|
Clause used in SQL for ensuring referential integrity is classified as
|
|
14339
|
In normalization of relations, property which is critical and must be achieved is classified as
|
|
14340
|
Access to an online purchasing procedures, airline ticket reservation systems and inventory management in local grocery stores are examples of
|
|
14341
|
Magnetic tapes are examples of
|
|
14342
|
Menu-driven interface of DBMS and forms-style interface of DBMS is classified as
|
|
14343
|
Considering disks, command with which buffer is copied into block of disk is classified as
|
|
14344
|
Command in DBMS software which is used to locate records that fulfills search condition is classified as
|
|
14345
|
In TIMESTAMP data type, relative value which is used to decrease or increase absolute value of time stamp is classified as
|
|
14346
|
Partial key is differentiated by other keys in database by underlining key with
|
|
14347
|
In ER diagrams, partial participation is shown by
|
|
14348
|
Fields which are used to retrieve related records from other files are called
|
|
14349
|
If each tuple have relation R within it then this type of relation is classified as
|
|
14350
|
If completion of processing is to be shown then command which is used for this purpose is called
|
|
14351
|
Life cycle of database system is also called
|
|
14352
|
Multiple access users and access to database programs simultaneously is considered as
|
|
14353
|
Special node in tree structure which has many child nodes and one parent node is called
|
|
14354
|
Column header of table in relational model terminology is classified as
|
|
14355
|
Command used in SQL to specify new relation, its initial constraints and attributes is classified as
|
|
14356
|
In UML class diagrams, inheritances that are permitted includes
|
|
14357
|
Types of template dependencies are
|
|
14358
|
In state chart diagrams, element which is shown with help of double line filled circle with pointing arrow is classified as
|
|
14359
|
Collection of all concepts that must be used to describe database structure is called
|
|
14360
|
State in which database follows all integrity constraints is classified as
|
|
14361
|
Index which has an entry for every key value is classified as
|
|
14362
|
Type of subclass constraint that one entity can be member of at most one subclass is classified as
|
|
14363
|
Hashing process if used for disk files is classified as
|
|
14364
|
Objects in database description is called
|
|
14365
|
Command used in SQL which deletes table definition as well as all records available in table is called
|
|
14366
|
In relational calculus, expression which does not guarantees finite number of tuples is classified as
|
|
14367
|
Extensions of relation that satisfy constraint of functional dependency are considered as
|
|
14368
|
Dynamic aspects related to a system are shown with help of
|
|
14369
|
Disk units which has an actuator attached into it are called
|
|
14370
|
Two main types of constraints of entity relationships are
|
|
14371
|
Other name of project-join normal form is
|
|
14372
|
Example of tertiary storage media is
|
|
14373
|
In multiple tuples retrieval, command which is used to fetch queries from database is classified as
|
|
14374
|
Subclass which has more than one super class is called
|
|
14375
|
Property of DBMS which ensures whether hundreds of applications are executed, each transaction must be executed in isolation is classified as
|
|
14376
|
JOIN operation in which only equality operator is used is classified as
|
|
14377
|
Ordered list of all n-values is classified as
|
|
14378
|
Handling of user interface, data dictionary, concurrency control and global query optimization are tasks of
|
|
14379
|
Processor used to run code of queries of interpreted mode or compiled mode is classified as
|
|
14380
|
If explicit value of attributes is not provided in SQL then value included in new tuple in such situation is called
|
|
14381
|
IN DBMS, set of associations can be defined among different entities from different entity types as
|
|
14382
|
Constraint which is used to specify consistency in two or more relations among tuples is classified as
|
|
14383
|
Database catalog or dictionary defining descriptive information which is stored in database is called
|
|
14384
|
Kind of field with which record searching is done is classified as
|
|
14385
|
In multilevel indexes, blocking factor is also called
|
|
14386
|
Entity types, super classes and subclasses are classified as
|
|
14387
|
While designing database management system, if performance is main issue to be considered then DBMS designed is called
|
|
14388
|
Template conclusion is a set of tuples that must be included in relations in template dependency called
|
|
14389
|
In notation for query graphs, single circles are used to represent
|
|
14390
|
Database management architecture in which there is middle level between database server and client server is classified as
|
|
14391
|
Capacity to alter database schema at one level without altering any other schema level is classified as
|
|
14392
|
A row of table in relational model terminology is classified as
|
|
14393
|
Type of organization in which records are inserted at end of stored file is classified as
|
|
14394
|
Concept which checks syntax of query whether is written according to rules of grammar is classified as
|
|
14395
|
Kind of record which is used to keep information of specific database connection is classified as
|
|
14396
|
Popular technique in Web-based user interfaces are
|
|
14397
|
Process of defining entity type subclasses is classified as
|
|
14398
|
In relational database schemas, transition constraints are also known as
|
|
14399
|
Group of employees who are responsible for maintenance running hardware of system is classified as
|
|
14400
|
In data model schemas, constraints that are expressed directly are classified as
|
|
14401
|
Multivalued dependencies used to develop relational design theory of database is classified as
|
|
14402
|
Structuring of database by specifying types and constraints of data is classified as
|
|
14403
|
Set of key attributes that identify weak entities related to some owner entity is classified as
|
|
14404
|
Control feature in database management system which ensures accuracy of data updated by multiple users is classified as
|
|
14405
|
In database management system, executing process or executing program which considers updating or reading of records stored in database is called
|
|
14406
|
When two different schemas used a same name to describe schemas then this is called
|
|
14407
|
In reflexive rule (IR1), true dependencies generated are classified as
|
|
14408
|
In SQL, identifier which are used to indicate user of schema is classified as
|
|
14409
|
In phases of macro life cycle or information system life cycle, phase which consists of study of cost benefit and potential areas of application is called
|
|
14410
|
If attribute of relation schema R is not a member of some candidate key then this type of attribute is classified as
|
|
14411
|
In entity-relationship, entity type which has existence dependency constraint is classified as
|
|
14412
|
In database, set of all entities related to a particular entity type is classified as
|
|
14413
|
Operations used to combine multiple relations to present information in single table are classified as
|
|
14414
|
Association between two or more entities in a database system is classified as
|
|
14415
|
Procedure of storing higher normal form relations which are in lower normal form as a base relation is classified as
|
|
14416
|
Relations that are declared in SQL through CREATE VIEW statements are classified as
|
|
14417
|
In fixed length character string CHAR(n), 'n' represents
|
|
14418
|
Diagrams which are used to distribute files, libraries and tables across topology of hardware are called
|
|
14419
|
Kind of index which is based on any candidate key or a non key field which may have duplicate values is classified as
|
|
14420
|
General purpose programming languages such as COBOL and ADA is classified as
|
|
14421
|
If super class contains entities in subclasses and is derived from super class then super class is considered as
|
|
14422
|
In designing of software, functional requirements are specified with help of
|
|
14423
|
Kind of diagrams which are used to show interactions between series of messages are classified as
|
|
14424
|
Behavior which allows database designer to specify user defined operations for databases is called
|
|
14425
|
In multilevel indexes, primary index created for its second level is classified as
|
|
14426
|
Derived attributes in entity relationship diagrams are denoted by
|
|
14427
|
Kind of hashing technique in which a directory of having addresses 2d is maintained is called
|
|
14428
|
Users that maintain databases with help of ready made program packages are considered as
|
|
14429
|
In declaration statement DECIMAL (I, j), 'I' is classified as
|
|
14430
|
Considering conceptual synthesis and refinement, specialization process is classified as
|
|
14431
|
Constraints which deals with changes in database are classified as
|
|
14432
|
Degree of PROJECT operation is equal to
|
|
14433
|
In client â„ server architecture, system which consists of software's and peripheral devices for archiving, printing and accessing files is called
|
|
14434
|
Conference on Data Systems Languages Database Task Group is a committee to
|
|
14435
|
Inclusion dependencies that are preceding are used to represent
|
|
14436
|
Hash functions that does not maintain order of values of hash field are called
|
|
14437
|
In database schema, database snapshot is also called
|
|
14438
|
Attributes which have only more than one value for a specific entity are classified as
|
|
14439
|
If attribute of relation schema R is member of some candidate key then this type of attributes are classified as
|
|
14440
|
Category which considers union of super class entities is called
|
|
14441
|
Command in high level programming which completes release of buffers and perform other cleanup operations remaining is classified as
|
|
14442
|
Specification given to database management system regarding data whether it is string, integers or special characters is classified as
|
|
14443
|
Considering relational database, functional dependency between two attributes A and B is denoted by
|
|
14444
|
Property of DBMS which ensures execution of all operations in transaction or none of operation is executed is classified as
|
|
14445
|
If common attributes of two relations are classified as join attributes then OUTER UNION must be equal to
|
|
14446
|
If current number of records are 92, blocking factor is 20 and number of file buckets are 5 then file load factor is
|
|
14447
|
Command in SQL which is used when any of schema is no longer needed in relation is classified as
|
|
14448
|
Relationship between two independent data tables is classified as
|
|
14449
|
Compatibility condition which states that relations for union and intersection operations must consist of same type of tuples is classified as
|
|
14450
|
Weak entities are represented in UML diagrams by using aggregations called
|
|
14451
|
In two-tier client â„ server architecture, running of application programs and user interface programs is in control of
|
|
14452
|
Expression used in relational calculus to specify request of retrieval is classified as
|
|
14453
|
Type of constraint in which value of each attribute (X) must be an indivisible value from domain (X) is classified as
|
|
14454
|
Problem arises because of incompatibility between data structures of programming language and database management structures is called
|
|
14455
|
Person who implements specifications of database programs is considered as
|
|
14456
|
In database management system, module which support handling of data search, data access and data storage is classified as
|
|
14457
|
Technique used in DBMS to store all related objects in mixed file is classified as
|
|
14458
|
In notation for query trees, node which is used to terminate execution is classified as
|
|
14459
|
Time which is needed for consecutive blocks transferring is classified as
|
|
14460
|
Model in which multi-valued and composite attributes is considered as
|
|
14461
|
Module of DBMS which focuses on eliminating redundancies, operations reordering and rearrangements is classified as
|
|
14462
|
In statement DECIMAL (I, j) to specify numeric data type, digits after decimal point are called
|
|
14463
|
Multi-valued dependencies and functional dependencies are classified as category of
|
|
14464
|
Data type in SQL which includes various size integers and floating point numbers are classified as
|
|
14465
|
Tuples that are represented in one of two relations and are lost if JOIN operation is performed are called
|
|
14466
|
In data model, inherent constraints are classified as
|
|
14467
|
Total participation constraint is also known as
|
|
14468
|
In a particular time, data available in database at specific moment is called
|
|
14469
|
In constructing ER diagrams, double ovals are used to denote
|
|
14470
|
Consider two tuples R and S, maximum size of R and S relations is divided to expected size of join is classified as
|
|
14471
|
As compared to Cartesian product, tuples which appears in result by applying JOIN are ones
|
|
14472
|
In database management system, if cursor is to be moved to next rows in queries result then command is classified as
|
|
14473
|
In component diagrams, building block which is represented with two rectangles laid on left side is classified as
|
|
14474
|
Variable in DBMS used to communicate error conditions between database management system and program are
|
|
14475
|
In modeling of union type classes, total category of super class is represented by
|
|
14476
|
Characteristic of database management system which allows program operation independence and program data independence is classified as
|
|
14477
|
In Standard Query Language, data types included are
|
|
14478
|
In commercial database management system, relational database model is also known as
|
|
14479
|
Additional access path added into ordered file is called
|
|
14480
|
Type of function which allows performing additional operations and sending messages to other tables in database program is considered as
|
|
14481
|
Main constraints applicable in specialization are
|
|
14482
|
In SQL, type of character string value which is specified as being case sensitive and placed between apostrophes is called
|
|
14483
|
Process of analyzing relation schemas to achieve minimal redundancy and insertion or update anomalies is classified as
|
|
14484
|
Constraint which specifies minimum number of relationship instances is classified as
|
|
14485
|
Relationship type with two degrees is classified as
|
|
14486
|
Record searching technique which is based on blocks rather than records is called
|
|
14487
|
If two or more constraints are violated by using insert operation then by default the
|
|
14488
|
Parent entity type or identifying entity type are considered as other names of
|
|
14489
|
Consider two tuples X and Y, operation whose result includes tuples that are only in X but not in Y is classified as
|
|
14490
|
First field in primary index having same data type as in ordering field is considered as
|
|
14491
|
Considering knowledge representation and conceptual modeling, reasoning mechanisms are classified as part of
|
|
14492
|
Kind of subclass in which there are no constraints for deciding membership in any given subclass is classified as
|
|
14493
|
Kind of subclass on which entity become part of subclass by putting some condition on attribute values is classified as
|
|
14494
|
Kind of operation by which one tuple can be created with help of combining tuples from two relations is classified as
|
|
14495
|
In query result, type of variable which is used to loop tuples is called
|
|
14496
|
Considering disks, command with which block from disk is copied from specific buffer is classified as
|
|
14497
|
Process of suppression of details regarding storage and data type to highlight important features for better understanding is called
|
|
14498
|
Hierarchy of computer storage media includes
|
|
14499
|
Middle computer system which is accessed to access database server is classified as
|
|
14500
|
For a relationship type, participation constraints and cardinality ratio are considered together to make
|
|
14501
|
Files used for speedy disk search by providing specialized structures of data are classified as
|
|
14502
|
Type of data independence in which schema can be altered on conceptual level without altering external level is classified as
|
|
14503
|
Schema which specifies that all database users requirements have been met is called
|
|
14504
|
Levels in which three schema architecture can be defined includes
|
|
14505
|
In process of specialization, subclasses are attached by
|
|
14506
|
Type of data manipulation language which is embedded in programming and used to retrieve individual objects from database is classified as
|
|
14507
|
JOIN operation which uses any of comparison operators is classified as
|
|
14508
|
Entities that have key attributes to be distinct are considered as
|
|
14509
|
Users who access database occasionally but need different information every time are classified as
|
|
14510
|
Open addressing, multiple hashing and chaining are all methods used for
|
|
14511
|
Type of iterator which is used to list types of attributes that are included in query result is called
|
|
14512
|
Second phase of micro life cycle is
|
|
14513
|
In Unified Modeling Language, diagrams that organize system elements into groups are classified as
|
|
14514
|
In unary relational operations, symbols such as equal to, less than and greater than are classified as
|
|
14515
|
In extendible hashing array of bucket addresses 2d then d is considered as
|
|
14516
|
Standard which allows access to DBMS by Java client programs is classified as
|
|
14517
|
Command in DBMS in which all records existed in file are retrieved in specific order is classified as
|
|
14518
|
Predefined procedures to specify operations for each class is called
|
|
14519
|
Field on which equality condition is placed is hashing technique is called
|
|
14520
|
Type of application program which controls all task from order processing to customer support functions is classified as
|
|
14521
|
Networking system in which online peripherals of storage are configured as nodes on very high speed network is classified as
|
|
14522
|
Database interface in which data is directly entered into monitor is classified as
|
|
14523
|
Normal form which consider all types of constraints and dependencies is classified as
|
|
14524
|
If there is separation between conceptual and internal levels then language used by database designers is
|
|
14525
|
Data type DATE has three components where as its insertion considers
|
|
14526
|
Relationship type in which one attribute is migrated to N-side of relationship is classified as
|
|
14527
|
Feature of database management which makes it effortless to find any particular record from collection is called
|
|
14528
|
Files that can fit in available buffer space in phase of external sorting must be read into
|
|
14529
|
Type of lattice in which a subclass can be class or subclass in more than one association of subclasses is classified as
|
|
14530
|
If referential integrity constraint is violated then specific action clause attached by database designers other than by default action is classified as
|
|
14531
|
In Unified Modeling Language, diagrams which captures system static structure and provide foundation for other models is called
|
|
14532
|
User interface which uses both menus technique and forms is classified as
|
|
14533
|
In entity-relationship diagrams, participating entities are represented by
|
|
14534
|
Example of computer's primary storage is
|
|
14535
|
For a three-schema architecture, there is strict partition between external, internal and conceptual level and language used in this structure is
|
|
14536
|
In ER diagrams, rectangles are used to denote
|
|
14537
|
Type of data model which provide concepts in a way users of data recognize data models is considered as
|
|
14538
|
When schema is to be dropped in SQL which has no elements then type of DROP Command used is called
|
|
14539
|
Data type which can be fixed length or varying length as CHAR(n) and VARCHAR(n) respectively is classified as
|
|
14540
|
Constraint violated when given value of attribute is not included in corresponding domain is
|
|
14541
|
DVD devices and CD-ROM are examples of
|
|
14542
|
Type of legacy data model in which related records are represented by each hierarchy in tree structure is classified as
|
|
14543
|
Functional dependency of two sets E and F are considered as equivalent if
|
|
14544
|
File which has secondary index for its every field is classified as
|
|
14545
|
Diagrams in unified modified language which are used to test class diagrams for accuracy purpose are called
|
|
14546
|
Considering storage capacity, one million bytes of data are equal to
|
|
14547
|
Hierarchy in which each subclass participates in one subclass relationship is classified as
|
|
14548
|
Same class objects are arranged and organized in a way called
|
|
14549
|
Memory which loses contents because of power cut is classified as
|
|
14550
|
Weak entities and their identifying relationship in ER diagrams are represented by
|
|
14551
|
In data file, first record of any of block is called
|
|
14552
|
In SQL environment, collection of schemas is classified as
|
|
14553
|
In relational calculus, variables are bounded with help of
|
|
14554
|
Activity diagram, use case diagram, collaboration diagram and sequence diagram are considered as types of
|
|
14555
|
Possible specialization constraint includes
|
|
14556
|
Example of non dense index is
|
|
14557
|
In database management system, CAD is an abbreviation of
|
|
14558
|
Type of memories used in MP3 players and cameras are called
|
|
14559
|
Usage of operations with help of arguments without considering structure of operation implementation is classified as
|
|
14560
|
Rule which states that addition of same attributes to right side and left side will results in other valid dependency is classified as
|
|
14561
|
Cardinality in relational data model is considered as
|
|
14562
|
If global depth is more than local depth then operation must be performed in directory array is
|
|
14563
|
Types of database system utilities are
|
|
14564
|
First step in designing high level conceptual data model is
|
|
14565
|
Operations which are used to enhance power of expression of relational algebra includes
|
|
14566
|
Property of normalization of relations which guarantees that functional dependencies are represented in separate relations after decomposition is classified as
|
|
14567
|
Type of data organization which does not allow cross block boundaries is called
|
|
14568
|
DBMS in which systems involved are coupled together while having local autonomy is classified as
|
|
14569
|
Form of dependency in which set of attributes that are neither a subset of any of keys nor candidate key is classified as
|
|
14570
|
In data model schemas, constraints that are can not be expressed directly are classified as
|
|
14571
|
In linear hashing, formula used to calculate number of records if blocking factor, loading factor and file buckets are known is as
|
|
14572
|
According to enhanced-entity relationships, association between super class and subclass is as
|
|
14573
|
Hashing technique which allows increase or decrease in number of buckets without a need of directory is classified as
|
|
14574
|
Compiler which pull out commands written in host programming language from application program is classified as
|
|
14575
|
Storage capacity of computer system is measured in
|
|
14576
|
Kind of class whose entities belongs to some other data class is called
|
|
14577
|
If matching tuples are not found, kind of OUTER JOIN operation which keeps all tuples of first and second relation is classified as
|
|
14578
|
Constraints that are applied on individual tuples and are verified whenever any tuple is modified or new tuple is inserted are called
|
|
14579
|
Collection of known and useful raw facts that has some meaning and can be processed in useful way is classified as
|
|
14580
|
Hashing technique which allocates fixed number of buckets is classified as
|
|
14581
|
Process of converting requests into results between three-schema architecture internal, external and conceptual levels is called
|
|
14582
|
Operation which is used to take union of tuples from relations that are not union compatible is classified as
|
|
14583
|
Data model in which relationships are explained in terms of attributes is classified as
|
|
14584
|
Kind of allocation in which file blocks contain pointer to next blocks of file is classified as
|
|
14585
|
In a query tree, operations of relational algebra are classified as
|
|
14586
|
Category which considers subset of union of entities included in super class is classified
|
|
14587
|
In a relation schema, each key of schema having more than one key is classified as
|
|
14588
|
Considering abstraction concepts, process of assigning similar entities to similar entity types systematically is called
|
|
14589
|
Kind of constraint which cannot let two entities to have similar values is classified as
|
|
14590
|
Hierarchical models and network models are considered as types of
|
|
14591
|
Module of database management system which controls access to database stored on disk is considered as
|
|
14592
|
Branch of calculus which is based on mathematical logic is classified as
|
|
14593
|
Concept which describes domain of knowledge is considered as
|
|
14594
|
Operation which allows to process relationships from multiple relations rather than single relation is classified as
|
|
14595
|
In programming languages, available data types are
|
|
14596
|
Indexes which specifies address of records on disk with a physical pointer are classified as
|
|
14597
|
In database management system, module which is designed to be used on workstation and personal computer systems is classified as
|
|
14598
|
Type of constraints that specifies uniqueness of data stored in database are considered as
|
|
14599
|
In database management system, term which is used to represent real world concept or object is classified as
|
|
14600
|
Standardized types of database queries and methods of updating database are called
|
|
14601
|
Phase in data designing in which access paths and database indexes are specified is classified as
|
|
14602
|
In notation for query graphs, double ovals or circles are used to represent
|
|
14603
|
Application program interface in two tier architecture database management system is provided by the
|
|
14604
|
Implications of database management approaches includes
|
|
14605
|
Format or data type must be specified for
|
|
14606
|
Types of binary operations includes
|
|
14607
|
Information stored in information repository can be accessed by
|
|
14608
|
Key which specifies that two different tuples cannot have same value is classified as
|
|
14609
|
Boolean expression used in SELECT operation consists of clauses such as
|
|
14610
|
Attributes which have only one value for a specific entity are called
|
|
14611
|
Types of partial constraints are
|
|
14612
|
In linear hashing, formula of file load factor is
|
|
14613
|
In EQUIJOIN condition, operation which is used to avoid superfluous attribute is classified as
|
|
14614
|
In DBMS, record-at-a-time manipulation language is also called
|
|
14615
|
Association between aggregate and primitive objects is classified as
|
|
14616
|
Concept in which extra bit or byte is stored for record deletion and that extra stored bit is called
|
|
14617
|
Command used in high level programs to transfer record block in to main memory buffer is classified as
|
|
14618
|
Non-procedural language and procedural language are classified as types of
|
|
14619
|
Concepts of data models that are only useful to computer specialists rather than end users of programs are classified as
|
|
14620
|
If there is more than one key for relation schema in DBMS then each key in relation schema is classified as
|
|
14621
|
Detailed description on entity constraints, entity relationships and entity types is expressed in
|
|
14622
|
In categories of data modeling, low level data models are also called
|
|
14623
|
Kind of memories that use an array of platters of CD-ROM must be loaded on demand into drives are classified as
|
|
14624
|
Type of server in two-tier architectures which provides data to client stored on disk pages is called
|
|
14625
|
Type of legacy data model in which data is represented as record types and limited one to many relationships is called
|
|
14626
|
Form of data model which focuses concepts in same way as data stored in computer system is classified as
|
|
14627
|
Root super class in diagrams of generalization and specialization is considered as
|
|
14628
|
In relational model terminology, table is considered as
|
|
14629
|
DIVISION operation can be applied to two relations A and B such as R(A) ÷ R(B) where as
|
|
14630
|
Data communication system and database management system is also considered as
|
|
14631
|
If every functional dependency in set E is also in closure of F then this is classified as
|
|
14632
|
Kind of class which does not have its own subclasses is called
|
|
14633
|
Database program which handles software applications and include database servers calls to update data is classified as
|
|
14634
|
Because of calculus expression, relational calculus is considered as
|
|
14635
|
Range of capacity for number of tracks is
|
|
14636
|
Type data abstraction which allows conceptual representation of data in database management system is considered as
|
|
14637
|
Considering conceptual synthesis and refinement, generalization process is classified as
|
|
14638
|
Function which causes retrieval of any kind of data from database is considered as
|
|
14639
|
Life cycle of information system is also called
|
|
14640
|
Class diagram, component diagram, object diagram and deployment diagram are considered as types of
|
|
14641
|
Architecture of database in which characteristics such as program insulations, multiple user support and use of catalogs are achieved is classified as
|
|
14642
|
In relational database management system, server is classified as
|
|
14643
|
In database management systems, record which contains all data regarding tuples of database is called
|
|
14644
|
Name of operation and type of data of parameters must be included in
|
|
14645
|
Time period required to transfer blocks in consecutive order is classified as
|
|
14646
|
Particular database and set of related programs which helps in implementation of updates and queries is called
|
|
14647
|
Parts of an operation or function must includes
|
|
14648
|
Reserved area that holds one block in main storage is classified as
|
|
14649
|
Entity type from which subgroups can be made is classified as
|
|
14650
|
Package of software that facilitate modeling of database and improved performance of database system is classified as
|
|
14651
|
Type of classes which specifies operations and attributes but corresponding classes are not available are classified as
|
|
14652
|
In multilevel indexes, primary index created for its first level is classified as
|
|
14653
|
In external sorting, number of runs that can be merged in every pass are called
|
|
14654
|
Technique which is used to retrieve data from disk in form of continuous blocks of stream and eliminates seek time is classified as
|
|
14655
|
Type of attributes that can be divided into smaller parts is classified as
|
|
14656
|
Set of values which specifies which values are to be assigned to individual entities is considered as
|
|
14657
|
Set of all entities having same attributes is classified as
|
|
14658
|
If in JOIN operation, conditions of JOIN operation are not satisfied then results of operation is
|
|
14659
|
Storage media that is operated directly from computer's central processing unit is considered as
|
|
14660
|
Attributes that can be arranged into hierarchy are called
|
|
14661
|
In Standard Query Language, types of DROP commands include
|
|
14662
|
Considering binary relationships, possible cardinality ratios are
|
|
14663
|
Primary indexes, secondary indexes and cluster indexes are all types of
|
|
14664
|
In formal relational model, set of indivisible values is called
|
|
14665
|
Operators in SELECT operation statement such as 'and' , 'or' and 'not' are classified as
|
|
14666
|
Objects in DBMS belongs to same structure and behaves in same way are considered as
|
|
14667
|
Form of data model in which concepts provided are useful for end users and are also close to way it is stored in computer system is called
|
|
14668
|
Index which has an entry for some of key value is classified as
|
|
14669
|
Software whose main function is to provide access database from remote location with help of work stations, local PCs and computer terminals is called
|
|
14670
|
In three-tier architecture, intermediate layer between database and client servers is classified as
|
|
14671
|
When primary key is null of new tuple then constraint violated is
|
|
14672
|
Database system which supports majority of concurrent users is classified as
|
|
14673
|
State in database management system which satisfies constraints and specified schema structure is classified as
|
|
14674
|
In modeling of union type classes, partial category of super class is represented by
|
|
14675
|
Element of state chart diagrams which uses round corner boxes to represent situations of an object is classified as
|
|
14676
|
In unary relational operations, SELECT operation is partition of relation usually classified as
|
|
14677
|
Type of diagram in which operations are specified on objects is considered as
|
|
14678
|
Technique in which source program are replaced by database management generated code is classified as
|
|
14679
|
You are meeting a new LoadRunner customer. The application under test is a call center application used by the customer representatives. The representatives are located in Phoenix- AZ and Columbus- OH. A large customer base resides in Flagstaff- AZ an
|
|
14680
|
Which scenario type helps you plan for future growth and provides a safety factor with the application?
|
|
14681
|
Which LoadRunner component runs the vuser that generates the load?
|
|
14682
|
Which type of script is a lower level that records in Analog mode when using the web protocol in VuGen?
|
|
14683
|
When performing a manual correlation, where do you search for the dynamic value?
|
|
14684
|
Which VuGen view guides you through the steps in script creation?
|
|
14685
|
What is the common function used to display messages in the Replay Log?
|
|
14686
|
Which type of parameter can use the parameter simulation?
|
|
14687
|
You want to apply Script A Run-time settings, parameters, extra files, and actions to Script B. How can this be accomplished?
|
|
14688
|
What is the recommended Logging Run-time setting when playing back a script prior to manual correlation?
|
|
14689
|
Which performance test is used to find the system breaking point?
|
|
14690
|
Which performance test finds the behavior and performance of each tier?
|
|
14691
|
What is the LoadRunner term for varying values defined in a placeholder that replaces the hard-coded values?
|
|
14692
|
What allows you to gather performance metrics for a variety of major backend system components including firewalls, application servers, and database servers?
|
|
14693
|
Script should define the Update transaction, and the load test should achieve 2,500 concurrent users.
|
|
14694
|
During a top time transaction run, what is the recommended load percentage?
|
|
14695
|
On which platform can the Controller be installed?
|
|
14696
|
What is the first stage of the load testing process?
|
|
14697
|
What is the appropriate scenario outline if your quantitative goal is to attain 2,500 concurrent users for the Update transaction during peak time?
|
|
14698
|
What displays business processes and volume across a time line?
|
|
14699
|
Which performance test objective is met when determining if the new version of the software adversely affects response time?
|
|
14700
|
You configure a scenario to start with a delay of (HH:MM:SS) just before leaving from work. You return the next morning to find that the scenario did not run. Why would this happen?
|
|
14701
|
While running a script in the Controller you notice a scripting error. While the scenario is still open, you return to VuGen, make the coding modification & save the script. What do you need to do before running the scenario again?
|
|
14702
|
What does the elapsed time in the Scenario Status window refer to?
|
|
14703
|
Which Analysis graph details the delay for the complete path between the source and destination machines?
|
|
14704
|
What is an intersection point in a business process?
|
|
14705
|
Which option in the Analysis tool allows you to compare a measurement in a graph with other measurements during a specific time range of a scenario and view similar trends?
|
|
14706
|
Which LoadRunner component is supported on UNIX?
|
|
14707
|
You want to control the delay between iterations. Where do you set this in the IZun-time settings?
|
|
14708
|
You are analyzing the results for a Debug run and realize that response times are better than SLAs. What should you do?
|
|
14709
|
Which level of concurrency identifies how many users are currently in the process of buying a ticket?
|
|
14710
|
You run a load test & the performance does not agree with your goals. What is the next step that should be taken?
|
|
14711
|
Which scenario execution run allows you to look for potential transactions that require significantly longer times to complete?
|
|
14712
|
How can you validate that the LoadRunner Agent is running on the load generator?
|
|
14713
|
A script was recorded with an average think time for an advanced user. An advanced user pauses 5 seconds between clicks. A first-time user pauses an average of 10 seconds between clicks. How can you modify the think time run-time settings to emulate a
|
|
14714
|
Which step comes after scenario execution in the load testing process?
|
|
14715
|
When you define a rendezvous point in a scenario, where should the Ir_start transaction function be placed?
|
|
14716
|
View the Business Process Profile table for the e-commerce site shown in the exhibit. Which business processes are the most critical to record?
|
|
14717
|
When you specify to iterate a script 10 times, which sections of the script are iterated?
|
|
14718
|
Which performance test objective is met when determining if the system is stable enough to go into production?
|
|
14719
|
Which LoadRunner tool captures the communication between the browser and web server?
|
|
14720
|
Where in the Run-time settings can you define to only send messages when an error occurs?
|
|
14721
|
You are running a test and notice that during the ramp up, the response times are beginning to drastically increase. How can you instruct LoadRunner to stop ramping up Vusers and hold the current number?
|
|
14722
|
Which option in the Analysis tool allows you to focus on a specific measurement within your graph?
|
|
14723
|
What is NOT an advantages of using automated load tests over manual load tests?
|
|
14724
|
hat are the main types of service level agreements available in the Controller and Analysis?
|
|
14725
|
What is an external data source?
|
|
14726
|
Which file defines the Vusers to execute, the number of Vusers to run, the goals of the test, the computer that hosts the Vusers, and the conditions under which to run the load test?
|
|
14727
|
During the analysis of a scenario, you realize that the hits per second become flat as Vusers continue to increase. What is likely to cause?
|
|
14728
|
Which term defines the end-to-end measurement of time when one or more steps are completed?
|
|
14729
|
You are a LoadRunner expert consultant and have been assigned to a client that needs to performance test an application that has not yet been released. How can you obtain information about the application anticipated load?
|
|
14730
|
Does Load Runner Support Parametrization
|
|
14731
|
Which Options (Settings) are NOT part of run -time settings dialog box ?
|
|
14732
|
Can a transaction contain another transaction ?
|
|
14733
|
Corelation problem is caused by
|
|
14734
|
Select valid recording modes in LR
|
|
14735
|
LR records communication between Client & Server only but does not record screen actions performed by user
|
|
14736
|
Which component of LR will be used play back a script in multi-user mode ?
|
|
14737
|
Can Load Runner be integrated with Quality Center and Quick Test Pro (QTP) ?
|
|
14738
|
Which methods can be used to fix Corelation problem ?
|
|
14739
|
What type of scenarios can be created in Load Runner
|
|
14740
|
Browsers supported by Load Runner -
|
|
14741
|
Define -Think Time
|
|
14742
|
Which of the following is NOT a supported scripting language for Load Runner
|
|
14743
|
Which of the following is NOT a component of LR ?
|
|
14744
|
Which of the following function sends a message to the output winow
|
|
14745
|
In Analyer, can graphs be corelated /overlayed?
|
|
14746
|
Identify the corelation function
|
|
14747
|
Which Options (Settings) are available for scheduling a scenario ?
|
|
14748
|
Types of Checks supported by LR
|
|
14749
|
Default Actions generated in a Load Runner Script are
|
|
14750
|
When you run a scenario, by default, the script is copied to a ...... directory on the Vuser group machine. This enables the Vuser group load generator to access the script locally instead of over a network.
|
|
14751
|
While editing and viewing the details of a script used by an individual Vuser, Modifying the run-time settings for one Vuser modifies the run-time settings for all the Vusers in the group that are using the same script.
|
|
14752
|
Only users with administrator privileges can connect from the Controller to a local load generator via a terminal services session.
|
|
14753
|
You can use LoadRunner’s .......... to remotely manage multiple load generators running in your load testing scenario on a terminal server.
|
|
14754
|
In Load Generator Information dialog, The Security tab is disabled if the load generator is Localhost.
|
|
14755
|
In Load Generator Information dialog, If you select the Enable firewall option, the Temporary directory option for storing temporary files is enabled.
|
|
14756
|
The maximum number of Vuser types that the load generator will initialize or stop simultaneously is
|
|
14757
|
If you are monitoring or running Vusers over the firewall, the UNIX Environment settings are more relevant.
|
|
14758
|
To allow LoadRunner to run your application under the Korn shell, you first need to make sure that the ....... file contains all of the LoadRunner environment settings
|
|
14759
|
If the load generator is ......., then LoadRunner stores the scripts and results on a shared network drive, and the options for setting the location are all disabled.
|
|
14760
|
In the Load Generator Information dialog box, select the ...... tab to specify the result directory for the performance data that LoadRunner gathers from each load generator during a scenario.
|
|
14761
|
The Controller monitors a Windows load generator’s CPU usage and automatically stops loading Vusers on a load generator when it becomes overloaded.
|
|
14762
|
Opens one window containing all of the run-time settings in blank mode. In this mode, you set only the options that you would like to modify for all selected scripts. All other run-time settings remain unchanged.
|
|
14763
|
Pausing a Vuser group will not affect its transaction response time.
|
|
14764
|
Once you have created your Vuser groups, you can sort them by or
|
|
14765
|
To run Visual C++ Vusers on a remote load generator, you must add the ...... of the Vuser to the files used by script list.
|
|
14766
|
While Modifying a Vuser Group, You can modify the script, and load generator for a Vuser group directly from the ........ pane of the Controller, or by using the Group Information dialog box.
|
|
14767
|
Select the true statement
|
|
14768
|
A the time of creating Vuser Group, to allow the load generator to take part in the scenario, check ....
|
|
14769
|
By default, LoadRunner stores temporary files on the load generator during scenario execution, in a temporary directory specified by the load generator’s ....... environment variables.
|
|
14770
|
The Scenario Groups pane lists all enabled and disabled Vuser Groups, their paths, the number of Vusers assigned to each group, and the load generators.
|
|
14771
|
You create Vuser groups that contain Vusers with ......... characteristics
|
|
14772
|
In a goal-oriented scenario, you define the goals you want your test to achieve, and LoadRunner automatically builds a scenario for you, based on these goals.
|
|
14773
|
To test your system with LoadRunner, you must create a ........ —a file with information about the test session.
|
|
14774
|
During scenario execution, you use the ...... pane in the Run view to monitor the actions of all the Vusers and Vuser groups in the scenario.
|
|
14775
|
Closing a scenario closes all the Controller windows.
|
|
14776
|
The New command creates a completely new scenario. The New command unclears all the information displayed in the Controller windows.
|
|
14777
|
After you create the scenario, LoadRunner saves the information in a scenario file with extension.......
|
|
14778
|
You can run ...... LoadRunner commands by clicking a button on the toolbar in the Controller.
|
|
14779
|
The Controller window has the following main views
|
|
14780
|
While selecting the script or scripts that you want to use in your scenario, for choosing a VB Vuser script, browse to locate the .....,......... file.
|
|
14781
|
You can change the maximum number of scripts displayed in the Available Scripts list by modifying the following registry key: HKEY_CURRENT_USER\Software\Mercury Interactive\RecentScripts\.........
|
|
14782
|
You can select one of two methods to create a scenario: ........
|
|
14783
|
By default, the Controller opens with the New Scenario dialog box.
|
|
14784
|
You can use LoadRunner to create ....... on the system: force the system to handle extended activity in a compressed time period to simulate the kind of activity a system would normally experience over a period of weeks or months.
|
|
14785
|
You can measure network and server response time, including response time of the GUI front end, by running Vusers (not GUI) on the client machine.
|
|
14786
|
To undo the last change made to your graphic design, the keys may be used.
|
|
14787
|
When using the SAVE AS: feature, the ________ file type saves my graphic design with all layers visible for changes upon opening the next time. Choose all that apply. You must select all correct possibilities.
|
|
14788
|
To select a new color in the foreground or background squares, use the tool.
|
|
14789
|
must select a to give your text perspective against your background.
|
|
14790
|
A design in Adobe Photoshop consists of multiple of graphics and
|
|
14791
|
The name of the areas that include the color swatches, layers and toolbox is
|
|
14792
|
If you have a solid color to select and delete, the tool is the quickest and most effective.
|
|
14793
|
To turn-off the use of a tool, or deselect it, you must push the keys.
|
|
14794
|
Clouds, motion blur, ocean ripple and plastic wrap are all examples of that can be used in your graphic design.
|
|
14795
|
By changing the % of , you can blend multiple layers with one another.
|
|
14796
|
you use the edit -> define pattern command to create new patterns based on a selection. which of the following statements is true while defining a pattern:
|
|
14797
|
you cannot insert a path when recording an action or after it has been recorded. state(true/false)
|
|
14798
|
you can apply transformations to the background as a layer. you cannot however, transform selections on the background. state(true/false)
|
|
14799
|
you can add notes and audio annotations anywhere on a photoshop image canvas. state(true/false)
|
|
14800
|
with the "magnetic lasso tool", the border snaps to the edges of defined areas in the image. state(true/false)
|
|
14801
|
why is the "stroke command" used?
|
|
14802
|
why is "type" given in gradient tool option?
|
|
14803
|
which tool or option gave the encircled area an orange color?
|
|
14804
|
which tool or effect has led to the effect in the image?
|
|
14805
|
which tool is activated by default, when a color adjustment dialog box is opened?
|
|
14806
|
which tool has led to the effect within the encircled area in the image?
|
|
14807
|
which tool among the following allows you to create "arrow heads"?
|
|
14808
|
which step has to be performed first to give "stroke to text"?
|
|
14809
|
which one of the below is the first step to publish the images online, through adobe photoshop.
|
|
14810
|
which of the below will be most suitable for resizing and resampling images for printed or online display.
|
|
14811
|
which of the below tools is shown in the picture?
|
|
14812
|
which of the below steps has to be performed to open a note or play an audio annotation?
|
|
14813
|
which of the below steps has to be performed to delete all annotations of the same type?
|
|
14814
|
which of the below operations is to be performed to reverse all changes made to the image since it was last saved?
|
|
14815
|
which of the below is the only way to affect multiple layers at once?
|
|
14816
|
which of the below is the first step to import annotations?
|
|
14817
|
which of the below is the advantage of working in rgb mode?
|
|
14818
|
which of the below is not the function of the "convert direction point tool"?
|
|
14819
|
which of the below is not the function of "alt tag" in the slice options window?
|
|
14820
|
which of the below file formats can be used when you choose to optimize images?
|
|
14821
|
which of the below defines the purpose of creating a slice from an image?
|
|
14822
|
which of the below are "primary colors"?
|
|
14823
|
which mode of the air brush tool has created the black effect shown in the image?
|
|
14824
|
which below tool is shown in the picture?
|
|
14825
|
which "tool" is shown in the image?
|
|
14826
|
when adjusting out of gamut colors or making color corrections in rgb mode, cmyk colors can be previewed in an rgb image. state(true/false)
|
|
14827
|
what will be the most suitable option if you have to replace parrot green with red color in the image. the layers in the image are merged.
|
|
14828
|
what is the role of the "history palette" in photoshop?
|
|
14829
|
what is the role of the "crop tool"?
|
|
14830
|
what is the role of "the eye dropper tool"?
|
|
14831
|
what is the role of "info palette" and "color palette"?
|
|
14832
|
what is the role of "edit" in the gradient tool options?
|
|
14833
|
what is the role of "dodge tool"?
|
|
14834
|
what is "clone aligned" option in "rubber stamp tool" used for?
|
|
14835
|
what information does the "info palette" of the measure tool contain?
|
|
14836
|
what happens when you create a "note"?
|
|
14837
|
what happens if you double-click the slice with the slice select tool?
|
|
14838
|
what does the term "resampling" refer to?
|
|
14839
|
what does the option "message text" in the slice option window let you do?
|
|
14840
|
what does the option "discontiguous" in the background eraser tool mean?
|
|
14841
|
what does the option "auto erase" for the pencil tool let you do?
|
|
14842
|
what does the encirled area represent?
|
|
14843
|
what does the encircled area in the image represent?
|
|
14844
|
what does the anti alias postscript option let you do, when you open a pdf or an eps file?
|
|
14845
|
what does the "stop command" let you do in the actions palette?
|
|
14846
|
what does the "image size" command let you do?
|
|
14847
|
what does the "history brush tool" let you do?
|
|
14848
|
what does duplicating an action or command do?
|
|
14849
|
what does a "magic wand tool" let you do?
|
|
14850
|
what does "the red box" in the image indicate?
|
|
14851
|
what does "smudge tool" let you do?
|
|
14852
|
what does "rubber stamp tool" let you do?
|
|
14853
|
what does "rgb color mode" stand for?
|
|
14854
|
what does "opacity option" in eraser tool let you do?
|
|
14855
|
what does "once" in the sampling option in the background eraser tool mean?
|
|
14856
|
what does "image's color mode" contain?
|
|
14857
|
what does "flatten image" let you do?
|
|
14858
|
what does "fade out rate" in the eraser tool let you do?
|
|
14859
|
what does "accelerated" in the playback options let you do ?
|
|
14860
|
we cannot change the opacity of an image that has only a background, or a locked layer. state(true/false
|
|
14861
|
to use the apply image command, the destination and source images:
|
|
14862
|
to subtract more of a selection, to an existing pixel selection, which of the below is used?
|
|
14863
|
to apply a "blur filter" to the edges of a layer, it is necessary to deselect the preserve transparency option in the layers palette. state (true/false)
|
|
14864
|
to add more of a selection, to an existing pixel selection, which of the below is used?
|
|
14865
|
the snapshot command lets you make a temporary copy of any state of the image. state(true/false)
|
|
14866
|
the rubber stamp tool can be used to clone an area containing pixels from all the visible layers and layer sets. state (true/false)
|
|
14867
|
the maximum file size and pixel dimension which photoshop supports is:
|
|
14868
|
the magic wand, smudge, or pattern stamp tools can be used for applying color sampled from pixels on the all visible layers. state(true/false)
|
|
14869
|
the image size command lets you adjust the pixel dimensions, print dimensions, and resolution of an image.state(true/false)
|
|
14870
|
the effect in the encircled area is the result of which tool or filter?
|
|
14871
|
the create droplets command lets you ....
|
|
14872
|
the "render filter" creates 3d shapes, cloud patterns, refraction patterns, and simulated light reflections in an image. state(true/false)
|
|
14873
|
the "preset manager" allows you to easily reuse or share preset sets. state (true/false)
|
|
14874
|
the "magnetic lasso" only detects edges within the specified distance from the pointer. state(true/false)
|
|
14875
|
the "magnetic lasso tool" is especially useful for quickly selecting objects with complex edges set against high-contrast backgrounds. state(true/false)
|
|
14876
|
the "line tool" is used to create curved lines. state(true/false)
|
|
14877
|
the "lasso and polygon lasso tools" let you draw both straight-edged and freehand segments of a selection border. state(true/false)
|
|
14878
|
the "info palette" only displays information about the color values beneath the pointer. state(true/false)
|
|
14879
|
the "blur more" filter produces an effect three or four times stronger than that of the blur filter. state(true/false)
|
|
14880
|
snapshots are not saved with the image. closing an image deletes its snapshots. state(true/false)
|
|
14881
|
playing actions that insert complex paths may require significant amounts of computer memory. state(true/false)
|
|
14882
|
locked layers can be moved to a different location within the layers palette, but they can't be deleted. state(true/false)
|
|
14883
|
it is possible to drag italicized commands from the history palette to the actions palette. state(true/false)
|
|
14884
|
in which mode, can modal control be set?
|
|
14885
|
in the brush option palette, what is the role of "hardness"?
|
|
14886
|
in the actions palette a modal control pauses an action so that you can specify values in a dialog box or use a modal tool. state (true/false)
|
|
14887
|
in cmyk mode, "k" stands for:
|
|
14888
|
if corrections are made to an "adjustment layer", changes reside not only in the adjustment layer but also alter pixels in the image. state (true/false)
|
|
14889
|
how many speeds does the playback options command give you, so that you can watch each command as it is carried out?
|
|
14890
|
how many sets of color values for the pixels under the pointer are displayed when you work with a color adjustment dialog box?
|
|
14891
|
how many colors are used when an image is given a "grayscale mode"?
|
|
14892
|
for type layers, preserve transparency in the layer's palette is switched on by default and cannot be turned off. state (true/false)
|
|
14893
|
for the "magnetic lasso tool", a higher value detects lower-contrast edges; a lower value detects only edges that contrast sharply with their surroundings. state(true/false)
|
|
14894
|
for "creating type" you need to add a new layer in the layer palette. state(true/false)
|
|
14895
|
corrections made to an image, which uses rgb color spaces, are preserved regardless of the monitor, computer, or output device used. state whether the statement is true or false
|
|
14896
|
choosing the "no image type"(in the slice options window) for a slice lets you enter text that will appear in the slice area of the resulting web page. state(true/false)
|
|
14897
|
channels cannot be rearranged or duplicated within or between images. state(true/false)
|
|
14898
|
changing pixel dimensions...
|
|
14899
|
assigning a url to a slice makes the entire slice area a hotspot, when a user clicks in the hotspot, the web browser links to the specified url and target frame. state(true/false)
|
|
14900
|
adding nontransparent layers to an image increases its file size. state(true/false)
|
|
14901
|
a modal control pauses an action so that you can specify values in a dialog box or use a modal tool. what is the result if you do not set a modal control?
|
|
14902
|
"merge visible" compresses all unhidden layers into a single layer. state (true/false)
|
|
14903
|
"merge down" merges selected layer with the layer below it. state (true/false)
|
|
14904
|
"feathering" blurs edges by building a transition boundary between the selection and its surrounding pixels. state(true/false)
|
|
14905
|
The GIF file format is ideal for photographic images.
|
|
14906
|
The shortcut Ctrl+Backspace fills a selection with the background color.
|
|
14907
|
The Inverse function (Ctrl+Shift+I) inverts a selection such that all pixels outside the current selection become selected.
|
|
14908
|
Blending mode determines how a selection’s edge pixels blend with the pixels outside the selection.
|
|
14909
|
Adjusting the proximity setting causes the magic wand tool to select a larger or smaller color range.
|
|
14910
|
The elliptical marquee can be constrained to select a perfect circle by holding the Shift key.
|
|
14911
|
Multiple tools can be used at one time.
|
|
14912
|
The tools in the toolbox are not organized in any particular order.
|
|
14913
|
Use the zoom tool to pan an image from one side to another.
|
|
14914
|
The shortcut for zooming in is Ctrl+(plus).
|
|
14915
|
Vector images are resolution independent.
|
|
14916
|
Text created with the text tool and shapes created with the shape tool are raster graphics.
|
|
14917
|
Vector images lose quality when enlarged.
|
|
14918
|
Each pixel in a raster image is stored as a particular combination of colors when it is saved.
|
|
14919
|
Applying a matte helps transparent images blend into the background on which they are placed.
|
|
14920
|
Web browsers can display images in any file format.
|
|
14921
|
Anti-aliasing is a process which smooths edges on scalable fonts and graphics
|
|
14922
|
Hexadecimal notation is a code which Web browsers use to define shape.
|
|
14923
|
The HSB color model and the RGB color model produce the same colors but use different notation to describe them.
|
|
14924
|
Photoshop Elements has an infinite number of active colors.
|
|
14925
|
The primary colors in light are red, yellow and blue.
|
|
14926
|
The image resolution is specified in the New dialog.
|
|
14927
|
Photoshop Elements is a graphics application that can only edit existing graphics.
|
|
14928
|
Many images are available free for download on the Internet.
|
|
14929
|
The addition of graphics to Web pages has no effect on the user experience.
|
|
14930
|
Dreamweaver is available for both Mac and Windows ________.
|
|
14931
|
Although a hybrid WYSIWYG and code-based web design and development application, Dreamweaver’s WYSIWYG mode can hide the ________code details of pages from the user, making it possible for non-coders to create web pages and sites.
|
|
14932
|
______ (XSLT)
|
|
14933
|
Dreamweaver can use third-party “Extensions†to extend core functionality of the application, which any web developer can write (largely in________ and JavaScript).
|
|
14934
|
Recent versions have incorporated support for web technologies such asCSS, JavaScript, and various server-side scripting languages and frameworksincluding ASP, ________, and PHP.
|
|
14935
|
Dreamweaver, like other HTML editors, edits files locally then uploads them to the remote web server using FTP, SFTP, or ________.
|
|
14936
|
Which of the following platforms does Adobe Dreamweaver run on?
|
|
14937
|
Who developed Adobe Dreamweaver?
|
|
14938
|
Creating of the Adobe Sound Document allowing ________ to create multi-track audio projects in Soundbooth.
|
|
14939
|
InDesign exports documents in Adobe’s ________ (PDF) and has multilingual support
|
|
14940
|
In October 2005, Adobe released “InDesign Server CS2â€, a modified version of InDesign (without________) for Windows and Macintosh server platforms.
|
|
14941
|
By 1998 PageMaker had lost almost the entire professional market to the comparatively feature-rich________ 3.3, released in 1992, and 4.0, released in 1996.
|
|
14942
|
Adobe InDesign is a software applicationproduced by ________.
|
|
14943
|
Ability to use Arabic, Persian or ________ digits
|
|
14944
|
In 2002, InDesign was the first ________-native desktop publishing (DTP) software.
|
|
14945
|
Longer documents are often still designed with Adobe’s FrameMaker (manuals, technical documents, etc.) or with ________ (books, catalogs, etc.).
|
|
14946
|
Who developed Adobe InDesign?
|
|
14947
|
To increase type size in Illustrator (on a Mac), what keyboard combo should you use?
|
|
14948
|
Hitting which of the following keys will make palettes and the toolbox go away?
|
|
14949
|
How would you get the most precise results using the transformation tools?
|
|
14950
|
What’s the quickest way to move all tab stops an equal distance in Illustrator 8 text?
|
|
14951
|
Creating text as a graphic in Illustrator gives you all the following advantages except.
|
|
14952
|
If an Illustrator document won’t print, which of the following does Real World Illustrator 8 author Deke McClelland suggest you try?
|
|
14953
|
If you want a new brush you’ve created to show up in the Brushes palette of all new illustrations, where must you save it?
|
|
14954
|
What can’t you do to a brushstroke you apply in Illustrator 8?
|
|
14955
|
An art brush can be made from which of the following in Illustrator 8?
|
|
14956
|
Which of the following isn’t a type of Illustrator brush?
|
|
14957
|
Which of the following platforms does Adobe InDesign run on?
|
|
14958
|
Which of the following languages is spoken in Adobe Creative Suite?
|
|
14959
|
What license is Adobe Dreamweaver distributed under?
|
|
14960
|
What license is Adobe Premiere Pro distributed under?
|
|
14961
|
What license is Adobe Acrobat distributed under?
|
|
14962
|
Who developed Adobe ImageReady?
|
|
14963
|
________ is a raster graphics editor (with significant vector graphics functionality).
|
|
14964
|
Which of the following platforms does Adobe Illustrator run on?
|
|
14965
|
What was Adobe Fireworks written in?
|
|
14966
|
What license is Adobe Creative Suite distributed under?
|
|
14967
|
A layer that is active must be visible.
|
|
14968
|
The letter “S†key can be pressed to change the screenmode.
|
|
14969
|
The tool that will take lookout off ocusis the sharpentool.
|
|
14970
|
In the foreground color picker box there are 7 characters in a hexidecial color code combination.
|
|
14971
|
Hue,Saturation and Brightnes saretermsused with color.
|
|
14972
|
As election can be made with as so, marquee, magicwand, and quick selection tools.
|
|
14973
|
Holding the shift button will allow you to add to as election.
|
|
14974
|
Layers are viewed from bottom totop.
|
|
14975
|
Layers cannot be deleted once they’ve been created.
|
|
14976
|
The magicw and works with a setting called to lerance to determine the sensitivity level of what is being selected by this tool.
|
|
14977
|
A layer is a separate image to an overall image.
|
|
14978
|
The zoomtool and the navigator palette work to gether in zooming in/out on an image.
|
|
14979
|
There are 3 panels that are visible in the default workspace environment.
|
|
14980
|
The rights side of the interface is occupied by panels.
|
|
14981
|
Only certain tools display a tools option bar where you can change the settings of a tool.
|
|
14982
|
Every tool can be activated by a letter key stroke.
|
|
14983
|
The default colors for the foreground and background colors are black and white.
|
|
14984
|
The toolbox is located on the left side of the interface and houses manytools that a revisible and hidden.
|
|
14985
|
The Image title bar states the name of the application.
|
|
14986
|
MicrosoftcreatedAdobePhotoshop?
|
|
14987
|
To cut down the size of the entire graphic design, including all layers, you should select the ______ tool.
|
|
14988
|
When selecting an area of pixels to delete, which of the following tools could be used? Choose all that apply. You must select all correct possibilities.
|
|
14989
|
BMP stands for?
|
|
14990
|
PNG stands for?
|
|
14991
|
TIFF stands for?
|
|
14992
|
GIF stands for?
|
|
14993
|
JPEG stands for?
|
|
14994
|
Bitmap is sometimes referred as
|
|
14995
|
There are how many types of 2D graphics?
|
|
14996
|
Computer monitor primary color allows how many individual shades?
|
|
14997
|
computer monitor palette holds which color?
|
|
14998
|
To fill a background layer with clouds, pull down the filter menu and go to render.
|
|
14999
|
The average image size of 640 x 480 is measured in picas.
|
|
15000
|
What will be the output of 7^10 in python?
|
|
15001
|
What is the maximum possible length of an identifier?
|
|
15002
|
Which statement is correct....??
|
|
15003
|
Which of the following data types is not supported in python ?
|
|
15004
|
Mathematical operations can be performed on a string. State whether true or false -
|
|
15005
|
Consider the results of a medical experiment that aims to predict whether someone is going to develop myopia based on some physical measurements and heredity. In this case, the input dataset consists of the person’s medical characteristics and the target variable is binary: 1 for those who are likely to develop myopia and 0 for those who aren’t. This can be best classified as
|
|
15006
|
time.time() returns ________
|
|
15007
|
Suppose list1 is [3, 4, 5, 20, 5, 25, 1, 3], what is list1 after list1.pop(1)?
|
|
15008
|
What is called when a function is defined inside a class?
|
|
15009
|
What is the output of the following segment : chr(ord('A'))
|
|
15010
|
What is the output of the following code :
|
|
15011
|
What will be the output of the following code : print type(type(int))
|
|
15012
|
Give one word: What model does ASP.NET request processing is based on__________________?
|
|
15013
|
Suppose a .NET programmer wants to convert an object into a stream of bytes then the process is called ________________?
|
|
15014
|
In ASP.NET if one wants to set the focus on a particular control________________?
|
|
15015
|
When an .aspx page is requested from the web server, the out put will be rendered to browser in following format ?
|
|
15016
|
Select the validation control used for “PatternMatching�
|
|
15017
|
How ASP.Net Different from classic ASP ?
|
|
15018
|
Select the output of the statement ?
|
|
15019
|
How do you explicitly kill a user session ?
|
|
15020
|
Which method displays the custom control________________?
|
|
15021
|
Which class can be used to create an XML document from scratch ?
|
|
15022
|
Which of the following can be used to add alternating color scheme in a Repeater control ?
|
|
15023
|
Which of the following is used to write error message in event Log File ?
|
|
15024
|
Choose the form in which Postback occur_________________?
|
|
15025
|
In order to prevent a browser from caching a page which of these xstatements should be written ?
|
|
15026
|
We can manage states in asp.net application using________________?
|
|
15027
|
If a developer of ASP.NET defines style information in a common location. Then that location is called as________________?
|
|
15028
|
What executable unit gets created when we build an ASP.Net application ?
|
|
15029
|
To add a custom control to a Web form we have to register with?
|
|
15030
|
Custom Controls are derived from which of the classes_________________?
|
|
15031
|
Whats is the significance of Response.ClearHeaders( ) ?
|
|
15032
|
What is/are the predefined TraceListener(s) in ASP.Net?
|
|
15033
|
In .NET the operation of reading metadata and using its contents is known as ________________?
|
|
15034
|
Which of these classes maps to the tag ?
|
|
15035
|
Common type system is built into which of the following?
|
|
15036
|
What is a strong name ?
|
|
15037
|
A developer wanted to achieve graphics in his display using ASP.NET. Which of the following web controls are available in ASP.NET to achieve the above ?
|
|
15038
|
The first event to be triggered in an aspx page is?
|
|
15039
|
How do you add ASP.Net 3rd party component__________________?
|
|
15040
|
The Following are the minimum requirement to run Asp.net pages_________________?
|
|
15041
|
The first event to be triggered in an aspx page is__________________?
|
|
15042
|
#NAME ?
|
|
15043
|
Which of the following are not a member of Server Object_________________?
|
|
15044
|
What section of the config.Web file is used for storing a list of authorized users ?
|
|
15045
|
In ASP.NET what does the following return ?
|
|
15046
|
What is the transport protocol used to call a webservice ?
|
|
15047
|
What is a diffgram ?
|
|
15048
|
Which of the following object is not an ASP component ?
|
|
15049
|
____________ is a special subfolder within the windows folder that stores the shared .NET component?
|
|
15050
|
Which of the following transfer execution directly to another page ?
|
|
15051
|
What namespace does the Web page belong in the .NET Framework class hierarchy ?
|
|
15052
|
You need to store state data that is accessible to any user who connects to your Web application. Which object should you use ?
|
|
15053
|
Which property is used to name a web control ?
|
|
15054
|
I have an ASP.NET application. I have a page loaded from server memory. At this instance which of the following methods gets fired ?
|
|
15055
|
How do you disable client side validation ?
|
|
15056
|
Which namespace allows us to formauthentication ?
|
|
15057
|
An alternative way of displaying text on web page using ?
|
|
15058
|
Which of the following is the way to monitor the web application ?
|
|
15059
|
Difference between Response.Write() and Response.Output.Write() ?
|
|
15060
|
File extension used for ASP.NET files ?
|
|
15061
|
Which of the following ASP.NET object encapsulates the state of the client ?
|
|
15062
|
Which of the following is faster and consume lesser memory ?
|
|
15063
|
In ASP.NET in form page the object which contains the user name is ________________?
|
|
15064
|
Which of the following is used to send email message from my ASP.NET page?
|
|
15065
|
How many classes can a single .NET DLL contain ?
|
|
15066
|
Which method do you invoke on the DataAdapter control to load your generated dataset with data ?
|
|
15067
|
How do you register a user control ?
|
|
15068
|
Select the type Processing model that asp.net simulate ?
|
|
15069
|
Which of these data source controls do not implement Caching ?
|
|
15070
|
Which of the following is a requirement when merging modified data into a DataSet ?
|
|
15071
|
Where we can assign value to Static read only member variable of a static class ?
|
|
15072
|
An organization has developed a web service in which the values of the forms are validated using ASP.NET application. Suppose this web service is got and used by a customer then in such a scenario whi ?
|
|
15073
|
Who can access Session state variables ?
|
|
15074
|
We can manage states in asp.net application using_______________?
|
|
15075
|
If a developer of ASP.NET defines style information in a common location. Then that location is called as_________________?
|
|
15076
|
When does Garbage collector run ?
|
|
15077
|
What attributes do you use to hide a public .Net class from COM ?
|
|
15078
|
When a .aspx page is requested from the web server, the out put will be rendered to browser in following format ?
|
|
15079
|
Which of the following must be done in order to connect data from some data resource to Repeater control ?
|
|
15080
|
How many configuration files can an ASP.NET projects have?
|
|
15081
|
ASP.NET separates the HTML output from program logic using a feature named as_______________?
|
|
15082
|
The namespace within the Microsoft .NET framework which provides the functionality to implement transaction processing is _______________?
|
|
15083
|
What is the Server.MachineName does_________________?
|
|
15084
|
In ASP.NET application the Global.asax file lie in which directory_________________?
|
|
15085
|
Which of the following languages can be used to write server side scripting in ASP.NET ?
|
|
15086
|
To set page title dynamically in ASP.NET which of the following is used ?
|
|
15087
|
Which of the following denote New Data-bound Controls used with ASP.NET ?
|
|
15088
|
Which of the following denote the web control associated with Table control function of ASP.NET ?
|
|
15089
|
Which of these files takes the web application in offline mode ?
|
|
15090
|
Which Kind Of data we can store in viewstate ?
|
|
15091
|
Which of the following is the default authentication mode for IIS ?
|
|
15092
|
What is the maximum number of cookies that can be allowed to a web site ?
|
|
15093
|
Which of the following is true ?
|
|
15094
|
In ASP.NET the sessions can be dumped by using ?
|
|
15095
|
Suppose one wants to modify a SOAP message in a SOAP extension then how this can be achieved. Choose the correct option from below ?
|
|
15096
|
In my .NET Framework I have threads. Which of the following denote the possible priority level for the threads ?
|
|
15097
|
The .NET framework which provides automatic memory management using a technique called _________________?
|
|
15098
|
Which of the following object is used along with application object in order to ensure that only one process accesses a variable at a time ?
|
|
15099
|
Which of the following method must be overridden in a custom control ?
|
|
15100
|
What data types do a Rangevalidator supports ?
|
|
15101
|
In ASP.NET page framework an automatic way to associate page events and methods is______________?
|
|
15102
|
The GridView control in ASP.NET has which of the following features ?
|
|
15103
|
While creating a Web site with the help of Visual Studio 2005 on a remote computer that does not have Front Page Server Extensions installed, which Web site type will you create in Visual Studio 2005 ?
|
|
15104
|
Which property of the session object is used to set the local identifier ?
|
|
15105
|
Which of the following is TRUE about Windows Authentication in ASP.NET ?
|
|
15106
|
Which of the following allow writing formatted output ?
|
|
15107
|
In your ASP.NET web application you want to display a list of clients on a Web page. The client list displays 10 clients at a time, and you require the ability to edit the clients. Which Web control- ?
|
|
15108
|
In your ASP.NET 2.0 web application you want to display an image that is selected from a collection of images. What approach will you use to implementing this ?
|
|
15109
|
How to find out what version of ASP.NET I am using on my machine ?
|
|
15110
|
Which language is used to create an ASP.NET code file ?
|
|
15111
|
The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?
|
|
15112
|
Output : Response.Buffer = True Response.ExpiresAbsolute = Now().Subtract(New TimeSpan(1, 0, 0, 0)) Response.Expires = 0 Response.CacheControl = “no-cache†?
|
|
15113
|
What is the significance of Response.AddHeaders( ) ?
|
|
15114
|
Caching type supported by ASP.Net ?
|
|
15115
|
How do you get information from a form that is submitted using the “post†method ?
|
|
15116
|
____________ tests make sure that new code does not break existing code?
|
|
15117
|
Which filter will be execute at last using ASP.Net MVC?
|
|
15118
|
Which filter will be execute at first using ASP.Net MVC?
|
|
15119
|
WebApiConfig.cs file is under in which App folder ?
|
|
15120
|
RouteConfig.cs file is under in which App folder ?
|
|
15121
|
FilterConfig.cs file is under in which App folder ?
|
|
15122
|
BundleConfig.cs file is under in which App folder ?
|
|
15123
|
AuthConfig.cs file is under in which App folder ?
|
|
15124
|
How to check all errors of Model using ASP.Net MVC?
|
|
15125
|
How to set Default Value to Hidden Input Box using ASP.Net MVC?
|
|
15126
|
If Razor View Engine need to add JQuery function and contain @ special character then how we can write it in Razor View?
|
|
15127
|
Which name space using can send email in ASP.Net MVC?
|
|
15128
|
How can we write Chart output to MVC View?
|
|
15129
|
How can we add Chart Type to MVC Charts?
|
|
15130
|
How can we add Series to MVC Charts?
|
|
15131
|
How can we give Title to MVC Charts?
|
|
15132
|
How can we set theme to MVC Charts?
|
|
15133
|
How can we provide Height and Width to MVC Charts ?
|
|
15134
|
Which Name space is used to create chart using ASP.Net MVC?
|
|
15135
|
For which ModelState.IsValid Validate ?
|
|
15136
|
How to check Request coming from which controller using MVC ASP.Net?
|
|
15137
|
What is the benefits of Html.Partial using ASP.Net MVC Razor Engine?
|
|
15138
|
What is the benefits of Html.RenderPartial using ASP.Net MVC Razor Engine?
|
|
15139
|
What is the difference between HtmlTextbox and HtmlTextboxFor using ASP.Net MVC Razor Engine?
|
|
15140
|
What is RouteConfig.cs in ASP.Net MVC?
|
|
15141
|
What is FilterConfig.cs in ASP.Net MVC ?
|
|
15142
|
What is BundleConfig.cs in ASP.Net MVC ?
|
|
15143
|
What is AuthConfig.cs in ASP.Net MVC ?
|
|
15144
|
Can ASP.Net Web API has ability to transport non HTTP protocols like TCP, UDP, Named Pipes etc ?
|
|
15145
|
Can ASP.Net Web API ability to both self hosting (outside of IIS) and IIS ?
|
|
15146
|
Can ASP.Net Web API, it works HTTP standard verbs like POST, GET, PUT, DELETE (CRUD Operations) ?
|
|
15147
|
Does Web API (ASP.Net) supports to both version mobile apps and others ?
|
|
15148
|
Does Web API (ASP.Net) supports to non SOAP based like XML or JSON ?
|
|
15149
|
Can ASP.Net Web API specialize to XML or JSON ?
|
|
15150
|
Does TempData used to pass data from one page to another page in MVC?
|
|
15151
|
Are both TempData/ViewData property of Controller base class in MVC?
|
|
15152
|
Is ViewData faster than ViewBag in MVC?
|
|
15153
|
Is ViewBag slower than ViewData in MVC?
|
|
15154
|
Are both TempData/ViewData require typecasting in MVC?
|
|
15155
|
Which Namespaces are required to Data Annotation using MVC ?
|
|
15156
|
Which Namespace is used to “Display†in Data Annotation using MVC ?
|
|
15157
|
Which is the way to render Partial View using ASP.Net MVC Razor Engine?
|
|
15158
|
What is the name of default Viewstart Page in ASP.Net MVC ?
|
|
15159
|
Does Viewstart override all Views layout/template under “Views†folder in MVC ?
|
|
15160
|
Viewstart comes under which folder name ?
|
|
15161
|
How does work Viewstart in MVC (ASP.Net)?
|
|
15162
|
Can vNext runs on both Mac and Linux today (Mono Version)?
|
|
15163
|
Does vNext is now Open Sourced via the .NET Foundation and open to public contributions.
|
|
15164
|
Does MVC 6 allow only save change, hitting the save but then refreshing the browser to reflect changes?
|
|
15165
|
Does MVC 6 introduced new JSON project based structure?
|
|
15166
|
Are MVC and Web API merged into one in MVC 6?
|
|
15167
|
How to Print value from Controller to View in MVC ?
|
|
15168
|
Does ASPX View Engine supports for TDD ?
|
|
15169
|
Does Razor Engine supports for TDD ?
|
|
15170
|
Which is more faster between ASPX View Engine and Razor View Engine.
|
|
15171
|
The ASPX View Engine uses to render server side content.
|
|
15172
|
The Razor View Engine uses to render server side content.
|
|
15173
|
Which Namespace is used for ASPX View Engine ?
|
|
15174
|
Which Namespace is used for Razor View Engine ?
|
|
15175
|
How can you comment using Razor Syntax?
|
|
15176
|
What is the extension of MVC view when using vb.net?
|
|
15177
|
What is the extension of MVC view when using C#?
|
|
15178
|
What is default authentication in Internet Information Services (IIS)?
|
|
15179
|
What is DRY principle in ASP.Net ?
|
|
15180
|
What Request Processing technique follows ASP.Net ?
|
|
15181
|
Can we use view state in MVC ?
|
|
15182
|
In which format data can be return from XML into table ?
|
|
15183
|
RedirectToAction() works like in ASP.Net MVC C# as
|
|
15184
|
return View() works like in ASP.Net MVC C# as
|
|
15185
|
What is ViewResult() ?
|
|
15186
|
What is ActionResult() ?
|
|
15187
|
RedirectToAction() Method for which Status code represents?
|
|
15188
|
RedirectToActionPermanent() Method for which Status code represents?
|
|
15189
|
Which is the best approach to assign a session in MVC?
|
|
15190
|
Simulation run to be carried out before live run
|
|
15191
|
PPOC_OLD Is the transaction code for changing the Organizational structure
|
|
15192
|
Cost ditribution infotype is mandatory for FI Posting
|
|
15193
|
Which transaction to be used for changing the details of info type
|
|
15194
|
Which infotype used for storing the Shift details
|
|
15195
|
Infotype 0021 is used for storing
|
|
15196
|
MOnthly payments (Salary)to be stored in the Info type
|
|
15197
|
PA40 is used for Maintaining the Master data
|
|
15198
|
Which infotype used for storing the Nomination details
|
|
15199
|
Which infotype used for storing the Address
|
|
15200
|
Which Info type used for storing Personnel ids like PAN,Passport
|
|
15201
|
You assign Pay scale type & pay scale to individual
|
|
15202
|
The wage type that starts with ‘/’is known as
|
|
15203
|
Wage types can not include deductions :
|
|
15204
|
In SAP, what is the country grouping (Molga) for Great Britain :
|
|
15205
|
Which infotype reflects the Basic pay :
|
|
15206
|
T code to access implementation guide (IMG)
|
|
15207
|
T code to perform personnel actions:
|
|
15208
|
T code to check reports :
|
|
15209
|
T code to maintain employee master data
|
|
15210
|
T code to check the configuration tables:
|
|
15211
|
T code to check the database tables :
|
|
15212
|
In SAP, organizational assignment IT0001 consist of :
|
|
15213
|
Feature to default Pay scale data is
|
|
15214
|
Payroll area is defaulted in :
|
|
15215
|
In SAP one should group in the same pay roll area all the employees for whom payroll is run on ….
|
|
15216
|
You can create the project IMG by selecting..
|
|
15217
|
What are the different stages of payroll
|
|
15218
|
The return code matrix in LGMST feature has the following structure
|
|
15219
|
The indirect valuation module SUMME applies
|
|
15220
|
You can perform Indirect Valuation of the following infotypes:
|
|
15221
|
Following are wage type characteristic
|
|
15222
|
The copies of Model wage type must start with a :
|
|
15223
|
Which function of the wage type controls whether it is a payment or a deduction?
|
|
15224
|
In SAP system , wage type categories are:
|
|
15225
|
In SAP Pay Scale Area represents:
|
|
15226
|
Rule 3 – Employee subgroup grouping the Personnel calculation Rule refers to:
|
|
15227
|
The control record
|
|
15228
|
Can all wage types be entered in all infotypes?
|
|
15229
|
What is a payroll area? Which criteria are important for defining a payroll area?
|
|
15230
|
To define default wage type for basic pay infotype(0008) , the feature is:
|
|
15231
|
In SAP the system performs Indirect valuation of wage types in infotype:
|
|
15232
|
Several infotypes can use one wage type without defining any permissibility:
|
|
15233
|
The wage type which are defined by the individual company to depict their specific payroll requirement is:
|
|
15234
|
The employee subgroup grouping for collective agreement provision allows you to assign different employees to different :
|
|
15235
|
Employee grouping for PCR is done to :
|
|
15236
|
Features are used to …
|
|
15237
|
The Feature _________determines default values for payroll area
|
|
15238
|
T code to maintain a FEATURE is
|
|
15239
|
The control record :
|
|
15240
|
You must create control record for:
|
|
15241
|
Can echo in php accept more than 1 parameter?
|
|
15242
|
Can I run several versions of PHP at the same time?
|
|
15243
|
Can I generate DLL files from PHP scripts like i can in Perl ?
|
|
15244
|
Is strstr and strchr aliases?
|
|
15245
|
What is the purpose of $_SESSION[]?
|
|
15246
|
What is PHP heredoc used for?
|
|
15247
|
Which function is used to Strip whitespace (or other characters) from the beginning and end of a string?
|
|
15248
|
In which variable is the users IP address stored?
|
|
15249
|
What is the default execution time set in set_time_limit()?
|
|
15250
|
What is Joomla in PHP?
|
|
15251
|
What is the default size of a file set in upload_max_filesize ?
|
|
15252
|
What is the difference between echo and print?
|
|
15253
|
How do I create PHP arrays in a HTML <form>?
|
|
15254
|
What is array_keys() used for?
|
|
15255
|
____________ function in PHP Returns a list of response headers sent (or ready to send)
|
|
15256
|
What is the difference between GET and POST method?
|
|
15257
|
Can we use include (â€test.phpâ€) two times in a PHP page “test1.PHPâ€?
|
|
15258
|
Which of the following differences are valid between PHP 4 and PHP 5?
|
|
15259
|
What is the strpos() function used for?
|
|
15260
|
What gets printed? <?php $RESULT = 11 + 011 + 0x11; echo "$RESULT"; ?>
|
|
15261
|
Which of the following is NOT a magic predefined constant?
|
|
15262
|
Which statement about the code below is correct?class A {} class B {} class C extends A, B {}
|
|
15263
|
What gets printed?class MyException extends Exception {} try { throw new MyException('Oops!'); } catch (Exception $e) { echo "Caught Exception "; } catch (MyException $e) { echo "Caught MyException "; }
|
|
15264
|
How do we access the value of 'd' later?$a = array( 'a', 3 => 'b', 1 => 'c', 'd'
|
|
15265
|
What will be the value of $var?
|
|
15266
|
Which of the following is the way to create comments in PHP?
|
|
15267
|
What gets printed?$var = 'false';if ($var) { echo 'true';} else { echo 'false';}
|
|
15268
|
Which of the following is used to declare a constant
|
|
15269
|
Which of the following method acts as a constructor function in a PHP class?
|
|
15270
|
Which of the following method of Exception class returns the code of exception when error occured?
|
|
15271
|
Which of the following is an associative array containing session variables available to the current script?
|
|
15272
|
Which of the following is used to set cookies?
|
|
15273
|
Which of the following function opens a file?
|
|
15274
|
Which of the following can be used to get information sent via get/post method in PHP?
|
|
15275
|
Which of the following function is used to get length of a string?
|
|
15276
|
Which of the following is correct about determine the "truth" of any value not already of the Boolean type?
|
|
15277
|
Which of the following is correct about determine the "truth" of any value not already of the Boolean type?
|
|
15278
|
Which of the following is true about php variables?
|
|
15279
|
The if statement is used to execute some code only if a specified condition is true
|
|
15280
|
In PHP, the only way to output text is with echo.
|
|
15281
|
The die() and exit() functions do the exact same thing.
|
|
15282
|
PHP can be run on Microsoft Windows IIS(Internet Information Server):
|
|
15283
|
How do you create a cookie in PHP?
|
|
15284
|
Which one of these variables has an illegal name?
|
|
15285
|
Which superglobal variable holds information about headers, paths, and script locations?
|
|
15286
|
What is the correct way to open the file "time.txt" as readable?
|
|
15287
|
What is the correct way to include the file "time.inc" ?
|
|
15288
|
Include files must have the file extension ".inc"
|
|
15289
|
In PHP you can use both single quotes ( ' ' ) and double quotes ( " " ) for strings:
|
|
15290
|
How do you get information from a form that is submitted using the "get" method?
|
|
15291
|
The PHP syntax is most similar to:
|
|
15292
|
What is the correct way to end a PHP statement?
|
|
15293
|
All variables in PHP start with which symbol?
|
|
15294
|
How do you write "Hello World" in PHP
|
|
15295
|
PHP server scripts are surrounded by delimiters, which?
|
|
15296
|
How do you get information from a form that is submitted using the “get†method?
|
|
15297
|
What is the correct way to open the file “student.txt†as readable?
|
|
15298
|
What is the correct way to create a function in PHP?
|
|
15299
|
Which of the following is used to declare a constant
|
|
15300
|
PHP allows you to send emails directly from a script
|
|
15301
|
When using the POST method, variables are displayed in the URL:
|
|
15302
|
What is a correct way to add a comment in PHP?
|
|
15303
|
Which version of PHP introduced Try/catch Exception ?
|
|
15304
|
In PHP you can use both single quotes ( ‘ ‘ ) and double quotes ( ††) for strings:
|
|
15305
|
What does PHP stand for?
|
|
15306
|
All variables in PHP start with which symbol?
|
|
15307
|
PHP files have a default file extension of
|
|
15308
|
Which superglobal variable holds information about headers, paths, and script locations?
|
|
15309
|
Who is the father of PHP ?
|
|
15310
|
What is the correct way to add 1 to the $count variable?
|
|
15311
|
How do you create a cookie in PHP?
|
|
15312
|
How do you create an array in PHP?
|
|
15313
|
Include files must have the file extension “.incâ€
|
|
15314
|
Which operator is used to check if two values are equal and of same data type?
|
|
15315
|
How do you write “Hello World†in PHP
|
|
15316
|
For Web tests, you can create a ....... scenario, in which you define the goals you want your test to achieve. LoadRunner automatically builds a scenario for you, based on these goals.
|
|
15317
|
You can also create a scenario using the ......., in which you define the total number of Vusers to be used in the scenario, and the load generators and percentage of the total number of Vusers to be assigned to each Vuser script.
|
|
15318
|
A scenario includes a list of machines on which Vusers run, a list of scripts that the Vusers run, and a specified number of Vusers or Vuser groups that run during the scenario.
|
|
15319
|
Successful load testing requires that you develop a thorough .......
|
|
15320
|
You develop Vuser scripts ...........
|
|
15321
|
Vusers have a very easy to understand user interface
|
|
15322
|
Because Vusers are not reliant on client software, you can use Vusers to test server performance even before the client software has been developed.
|
|
15323
|
GUI Vusers generate load on a server by submitting input directly to the server.
|
|
15324
|
LoadRunner can integrate functional testing scripts in the form of .......... Vuser scripts into a load testing scenario.
|
|
15325
|
Application Deployment Solution, E-business, Java are types of
|
|
15326
|
The LoadRunner Agent enables the .......... and the load generator to communicate with each other.
|
|
15327
|
On each Windows load generator, you install the ........
|
|
15328
|
When you execute a scenario, the Controller distributes each Vuser in the scenario to a .......
|
|
15329
|
You insert ...... points into Vuser scripts to emulate heavy user load on the server
|
|
15330
|
You can join two graphs together to see the effect of the one graph’s data upon the other graph’s data. This is called ....... two graphs.
|
|
15331
|
While Analysing your scenario, You can access available graphs from the ...........
|
|
15332
|
The Scenario Behavior Over Time section shows how each transaction performed during different time intervals. The green squares show time intervals where the transaction performed within the SLA threshold, red squares where the transaction failed, and ..... squares where no relevant SLA was defined.
|
|
15333
|
The 5 Worst Transactions table shows you up to the .... worst performing transactions where SLAs were defined.
|
|
15334
|
While Analysing your scenario, in the Statistics Summary section, you can see that a maximum of .... Vusers ran in this test.
|
|
15335
|
The preferred place to define an SLA is before a scenario run in the Controller.
|
|
15336
|
SLAs can be defined before running a scenario in the Analysis, or after running a scenario in Controller itself.
|
|
15337
|
Service Level Agreements are specific goals that you define for your load test scenario
|
|
15338
|
Analysis contains three primary windows
|
|
15339
|
The aim of the analysis session is to find the failures in your system’s performance and then pinpoint the source of these failures.
|
|
15340
|
It is very important to watch transaction response time to see the response times your customers will have when the server is under load.
|
|
15341
|
The Hits per Second graph shows the number of hits (HTTP requests) made to the Web server by Vusers during each second of the scenario run.
|
|
15342
|
Users do not log on and off the system at precisely the same time. To emulate real users, LoadRunner provides the capability in the ....... tab (In the Edit Scenario Goal dialog box,) for users to gradually log on and off the system.
|
|
15343
|
When you design a load test scenario, you can define ....... for the performance metrics.
|
|
15344
|
LoadRunner provides you with ...... different types of goals in a goaloriented scenario.
|
|
15345
|
To see how well the application performed under load, you need to look at the transaction response time and determine whether the transaction was within an acceptable limit for the customer.
|
|
15346
|
If an application starts to fail under heavy load, you are likely to encounter errors and failed transactions. The Controller displays error messages in the ..... window.
|
|
15347
|
The Vuser log will only contain information if you enabled the logging feature in the Run-Time Settings Log tab.
|
|
15348
|
To check the progress of an individual Vuser during a running test, you can view a ...... containing a text summary of the Vuser’s actions.
|
|
15349
|
When emulating users, you should be able to view their actions in real time and make sure they are performing the right steps. The Controller lets you view the actions in real time using the ...... viewer.
|
|
15350
|
The Throughout graph shows the amount of data (measured in bytes) that the Vusers receive from the server at any given second.
|
|
15351
|
You use the Controller’s online graphs to view performance data collected by the monitors.
|
|
15352
|
The ..... tab in the Controller window is the control center from which the test is managed and monitored.
|
|
15353
|
Run Time setting Browser Emulation is used by:
|
|
15354
|
Two types of content checks:
|
|
15355
|
Initialization means preparing the Vusers and the load generators for a load test run by running the ....... action in the script.
|
|
15356
|
A ..... Scenario gives you control over the number of running Vusers and the times at which they run, and lets you test how many Vusers your application can run simultaneously.
|
|
15357
|
A ......... verifies that expected information appears on a Web page while the script is running.
|
|
15358
|
The way to mark a user step as a transaction is to place a begin transaction marker before the first step of the transaction and an end transaction marker after the last step.
|
|
15359
|
........ saves the dynamic (changing) values, in our case the session ID, to a parameter.
|
|
15360
|
VuGen’s run-time playback feature displays the Vuser activities in real time as you playback the recorded script.
|
|
15361
|
In LoadRunner Run-Time settings Run Logic means:
|
|
15362
|
Script view is a text-based view that lists the actions of the Vuser as .....
|
|
15363
|
The recording summary includes the protocol information and a list of the actions created during the session.
|
|
15364
|
The ...... lists each step or task in the script creation process.
|
|
15365
|
Advanced users can record several protocols during a single recording session in a ...... script.
|
|
15366
|
The Error Statistics graph provides details about the ......
|
|
15367
|
Transaction Response Time - whole scenario graph lets you monitor
|
|
15368
|
By default, the Controller displays the
|
|
15369
|
The three tabs in the Launcher window of a Loadrunner 9.10 are
|
|
15370
|
Identify LoadRunner components—
|
|
15371
|
LoadRunner uses ASCI C
|
|
15372
|
Think Tank represents the actual time you waited between steps, and can be used to emulate fast and slow user behavior under load.
|
|
15373
|
You can view the LoadRunner script in .......
|
|
15374
|
The LoadRunner ........ works on a record-andplayback principle.
|
|
15375
|
A ........ represents end-user business processes that you are interested in measuring.
|
|
15376
|
In the scenario, LoadRunner replaces human users with virtual users or Vusers.
|
|
15377
|
A ....... is a file that defines the events that occur during each testing session, based on performance requirements.
|
|
15378
|
The ....... provides a single point of access for all of the LoadRunner components.
|
|
15379
|
The LoadRunner component......... create the load by running virtual users.
|
|
15380
|
Which scenario execution run is used to verity the load limit before more resources are required?
|
|
15381
|
Which scenario allows LoadRunner to automatically manage the Vusers?
|
|
15382
|
During the run of a scenario, which LoadRunner component stores the performance monitoring data?
|
|
15383
|
You are running a test and notice that during the ramp up, the response times are beginning to drastically increase. How can you instruct LoadRunner to stop ramping up Vusers and hold the current number?
|
|
15384
|
Which Analysis graph identifies web pages that take the most time; isolates where time is spent; and helps in identifying DNS resolution, SSL, and connection issues?
|
|
15385
|
Which option in the Analysis tool allows you to focus on a specific measurement within your graph?
|
|
15386
|
What does the image shown in the exhibit represent?
|
|
15387
|
Which graph can analyze each web page component's relative server and network time?
|
|
15388
|
Which types of reports can be automatically generated in the Analysis tool?
|
|
15389
|
Which Analysis graph details transaction response times throughout the test?
|
|
15390
|
Which tool is used to manage and maintain a scenario?
|
|
15391
|
What is NOT an advantages of using automated load tests over manual load tests?
|
|
15392
|
Which performance test objective is met when determining the cause of performance degradation?
|
|
15393
|
What are the main types of service level agreements available in the Controller and Analysis?
|
|
15394
|
What is an external data source?
|
|
15395
|
Which file defines the Vusers to execute, the number of Vusers to run, the goals of the test, the computer that hosts the Vusers, and the conditions under which to run the load test?
|
|
15396
|
You are meeting a new LoadRunner customer. The application under test is a call center application used by the customer representatives. The representatives are located in Phoenix, AZ and Columbus, OH. A large customer base resides in Flagstaff, AZ an
|
|
15397
|
What is the first indication of a performance problem?
|
|
15398
|
What is an example of a stress test?
|
|
15399
|
Which scenario type helps you plan for future growth and provides a safety factor with the application?
|
|
15400
|
During the analysis of a scenario, you realize that the hits per second become flat as Vusers continue to increase. What is likely to cause?
|
|
15401
|
Which term defines the end-to-end measurement of time when one or more steps are completed?
|
|
15402
|
Which statement is an example of a conceptual goal?
|
|
15403
|
You are running a 3-tier web application. With which component must the load generator(s) communicate?
|
|
15404
|
Which LoadRunner component runs the vuser that generates the load?
|
|
15405
|
Which file type has an extension .lrr?
|
|
15406
|
Which run-time setting node is available to all protocols?
|
|
15407
|
Where do you define an Auto Correlation rule?
|
|
15408
|
One reason for parameterizing data in a script is to vary one value for an object when another object on the application changes. A common example is username and password. Varying the username requires you to change the password. What is this type of
|
|
15409
|
Which arithmetic operator is used to increment the value of a variable by one?
|
|
15410
|
Which web protocol recording level generates the web_submit_form function?
|
|
15411
|
What is used as an end-to-end measurement of time elapsed when one or more steps in a business process have been completed?
|
|
15412
|
You want to send a message to the log file, Replay Log, and Controller Output window. Which function should you use?
|
|
15413
|
You want to have each step in your script measured as a transaction in the Controller and not shown in the Replay Log in VuGen. How can you accomplish this?
|
|
15414
|
Which function marks the beginning of a measurement of elapsed time?
|
|
15415
|
During which stage is it recommended that the visual cues for verification be established?
|
|
15416
|
Which section in a VuGen script is executed only one time, during Vuser initialization?
|
|
15417
|
You want to have your script always check for the following text on every page: "Sorry. Portlet is currently unavailable. Please try again later". What is the most efficient way to accomplish this?
|
|
15418
|
Which function allows you to register a search for a text string for the next Action function?
|
|
15419
|
You want to emulate a call center for an airline. All representatives login in the morning, perform their business processes, and log out at night. In one day, a representative will Create 40 flight reservations, Modify 10 flight reservations, and Sea
|
|
15420
|
Where should you add a web_reg_save_param function to a script?
|
|
15421
|
What is the programming term for a value that cannot be changed?
|
|
15422
|
What is the purpose of the atoi function?
|
|
15423
|
When do you need to add correlation to your script?
|
|
15424
|
When performing a manual correlation, where do you search for the dynamic value?
|
|
15425
|
For debugging purposes, you would like to show a browser during replay. Where do you enable this option?
|
|
15426
|
What must you do before attempting to automatically correlate after recording?
|
|
15427
|
You have created several new Auto Correlation rules. A new tester on your team is preparing to record a group of scripts on the same application on his work
|
|
15428
|
Which type of script is a higher level that records in Browser or Context Sensitive mode when using the web protocol in VuGen?
|
|
15429
|
What is the output of the following code snippet?
|
|
15430
|
Which function allows you to capture dynamic values returned from the server?
|
|
15431
|
Which function marks the ending of a measurement of elapsed time?
|
|
15432
|
What is the purpose of the strcat function?
|
|
15433
|
What is the programming term for different values at different times?
|
|
15434
|
Which operator is used for AND?
|
|
15435
|
You want to create a Microsoft Word document for your web (HTTP/HTML) script that provides a list of transactions, rendezvous, parameters and step descriptions. How can this be accomplished?
|
|
15436
|
What is the programming term for a series of statements grouped together to perform a specific task
|
|
15437
|
You are a LoadRunner expert consultant and have been assigned to a client that needs to performance test an application that has not yet been released. How can you obtain information about the application anticipated load?
|
|
15438
|
Which file type has an extension .lrr?
|
|
15439
|
When analyzing a technical aspect of a system under test, which group is a helpful source of information?
|
|
15440
|
What is the first stage of load testing process?
|
|
15441
|
What is the LoadRunner term that describes the time a user pauses between steps?
|
|
15442
|
The name of the area upon which the graphic design is completed is
|
|
15443
|
The name of the areas that include the color swatches, layers and toolbox
|
|
15444
|
You must select which tool to give your text perspective against your background.
|
|
15445
|
which tool allows you to reposition an object in your layer
|
|
15446
|
To delete a layer from your image, turn off the "eye" icon showing the layer.
|
|
15447
|
When deleting detailed areas of your image by hand, the tool is the best option.
|
|
15448
|
To select a new color in the foreground or background squares, use the tool.
|
|
15449
|
If you have a solid color to select and delete, the tool is the quickest and most effective.
|
|
15450
|
To delete items from history, drag them into the trash can.
|
|
15451
|
Clouds, motion blur, ocean ripple and plastic wrap are all examples of that can be used in your graphic design.
|
|
15452
|
By changing the % of , you can blend multiple layers with one another.
|
|
15453
|
The tool allows you to cut text out of a scenic background for use in your design
|
|
15454
|
The tool allows you the magnify an area of the design for detail work.
|
|
15455
|
Once you build the layers in your graphic design, you cannot rearrange them.
|
|
15456
|
The ________ tool is best selected when you need to select an abnormally shaped image in a layer.
|
|
15457
|
To resize a graphic in a layer, select the _______ tool, then check mark _____________ to see selection handles.
|
|
15458
|
Pixels represent tiny ________ of color, which are typically unseen by the naked eye.
|
|
15459
|
To fill in a layer as a background, which of the following tools would be useful? Choose all that apply. You must select all correct possibilities.
|
|
15460
|
To turn-off the use of a tool, or deselect it, you must push the keys.
|
|
15461
|
To undo the last change made to your graphic design, the keys may be used.
|
|
15462
|
To delete a series of steps that have been used in a graphic design, you would need to use the _________ pallette.
|
|
15463
|
The _______ tool allows you to select a rectangular or circular area of an layer to change or delete.
|
|
15464
|
The tool allows you to copy one area of the layer to another area of the layer
|
|
15465
|
When using the SAVE AS: feature, the ________ file type saves my graphic design with all layers visible for changes upon opening the next time. Choose all that apply. You must select all correct possibilities.
|
|
15466
|
Drop shadow, inner glow and bevel are examples of _________ you need to use with text.
|
|
15467
|
Luminosity, darken, exclusion and color dodge are examples of __________ you may use to allow graphics to interact with background.
|
|
15468
|
Twirl, ripple and spherize are examples of distortion __________ you may use to change the look of your graphic.
|
|
15469
|
To cut down the size of the entire graphic design, including all layers, you should select the ______ tool.
|
|
15470
|
When selecting an area of pixels to delete, which of the following tools could be used? Choose all that apply. You must select all correct possibilities.
|
|
15471
|
The typical size for a graphic design is measured in __________.
|
|
15472
|
In a Bitmap mode image, the shades are adjusted by changing the quantity of __________ and __________ dots
|
|
15473
|
We can extract a part of an image without the help of any kind of Marquee or Lasso tool
|
|
15474
|
With the help of Text warp option, we can change the style of a text
|
|
15475
|
We can change the color balance of an image with the help of another layer without distorting the actual image through
|
|
15476
|
The full form of GIF is
|
|
15477
|
The keyboard shortcut of Brush option is
|
|
15478
|
We can create a selection of predefined size, with the help of Marquee tool
|
|
15479
|
If any editor save a selection, it takes the name
|
|
15480
|
We can swap between the Lasso tools by
|
|
15481
|
The keyboard shortcut of Notes tool is
|
|
15482
|
In Photoshop, we can leave information for another by recording it
|
|
15483
|
We can get "Export transparent Image" from
|
|
15484
|
For printing purpose, the resolution should be
|
|
15485
|
We can zoom in/out from navigator option
|
|
15486
|
We cal delete any channel from channel option
|
|
15487
|
Grayscale image supports only 8 bit color
|
|
15488
|
We can colorize a Grayscale image
|
|
15489
|
We can add Layer effect in a text
|
|
15490
|
________________ means purity of color
|
|
15491
|
__________________ option give us the information of color etc. of an image.
|
|
15492
|
We can see the exact print size of an image from ___________ option from __________ menu.
|
|
15493
|
The size of the canvas can be increased in any direction by selecting
|
|
15494
|
We can record any action in the canvas
|
|
15495
|
We can change the Photoshop canvas to Expert mode by
|
|
15496
|
We can copy the Layer effects to another layer
|
|
15497
|
We can make the edges smooth of an curved image by selecting
|
|
15498
|
The selections are saved as
|
|
15499
|
We can change Color balance, Tone balance and Purity of color from
|
|
15500
|
Image > Mode > 16 bit is activated, when
|
|
15501
|
-100 range of Contrast
|
|
15502
|
The keyboard shortcut for open Color balance is Ctrl+B
|
|
15503
|
The keyboard shortcut to make a new layer is
|
|
15504
|
The keyboard shortcut of duplicate layer is
|
|
15505
|
We can get Resize image option from
|
|
15506
|
By using Photoshop, we can make a static Web site
|
|
15507
|
The smallest part of a displayed bitmapped image is
|
|
15508
|
For printing purpose, we use CMYK color model
|
|
15509
|
Flatten image option merge all the images and converted them as Background Layer
|
|
15510
|
We can resize the canvas as per the size of an image by using
|
|
15511
|
We can create a printable vector object in Photoshop, though it is a Bitmap software by
|
|
15512
|
We can see the individual channels in their respective color
|
|
15513
|
We can change width or height or resolution of an image respective of other two at a time by
|
|
15514
|
The Keyboard shortcut to convert a shape to a selection is
|
|
15515
|
We can create layer is indexed color image
|
|
15516
|
The range of feather is
|
|
15517
|
The Keyboard shortcut for layer option is
|
|
15518
|
The Keyboard shortcut default foreground and background color is
|
|
15519
|
The Keyboard shortcut of swap foreground and background color is
|
|
15520
|
In Photoshop Red=0 + Green=0 + Blue=0 --- the output is pure Black.
|
|
15521
|
The default size of a web banner is___________*__________
|
|
15522
|
Raster Graphic consists with Pixels.
|
|
15523
|
To get Auto contrast option in Photoshop
|
|
15524
|
To get Desaturate option in Photoshop
|
|
15525
|
To get Feather option in Photoshop.
|
|
15526
|
In a grayscale image we get maximum _______ shades of color
|
|
15527
|
We use Dodge Tool to ___________________ the area of image.
|
|
15528
|
The full form of TIFF is _______________.
|
|
15529
|
In a grayscale image we get a maximum of _____ shades of color?
|
|
15530
|
Which command changes the Overall mixture of colors in an image for generalized color correction?
|
|
15531
|
Which one lets you isolate and protect areas of an image as you apply color changes, filters or other effects to the rest of the image?
|
|
15532
|
Which one is the range of colors that a color system can display or print?
|
|
15533
|
How many selection tools are there in Photoshop?
|
|
15534
|
How many maximum steps we can undo in Photoshop?
|
|
15535
|
Which command selects a specified color or color subset within an existing selection or an entire image?
|
|
15536
|
In Photoshop, maximum how many alpha channels can create in an image?
|
|
15537
|
By default how many channel Indexed color images are there?
|
|
15538
|
Blurs edges by building a transition boundary between the selection and its surrounding pixels is known as
|
|
15539
|
JPEG stands for
|
|
15540
|
GIF stands for
|
|
15541
|
To get Stroke option in Photoshop, we have to select
|
|
15542
|
If R=255, G=0, B=0, the colour will be black.
|
|
15543
|
Luminance means brightness of color.
|
|
15544
|
Photoshop is an Image editing software.
|
|
15545
|
The full form of RGB is Red Green and Black
|
|
15546
|
The default color mode of Photoshop is CMYK.
|
|
15547
|
We cannot save any Selection in Photoshop.
|
|
15548
|
How many types of Gradient are there in Photoshop?
|
|
15549
|
To get Auto contrast option in Photoshop, we have to select
|
|
15550
|
How many type of Marquee Tool are there in Photoshop?
|
|
15551
|
b) We use Lasso Tool for selection, is it true?
|
|
15552
|
a) How many types of Gradient are there in Photoshop?
|
|
15553
|
We cannot import jpeg image in Premiere
|
|
15554
|
The short cut key of Feather is Alt+Ctrl+F.
|
|
15555
|
Liquify is a Filter.
|
|
15556
|
Raster Graphic consists of Pixels.
|
|
15557
|
GIF does not support background transparency.
|
|
15558
|
We can find Variation option under Filter menu in Photoshop.
|
|
15559
|
Is Overlay a Layer Blending Mode in Photoshop?
|
|
15560
|
How many Color Modes are there in Photoshop?
|
|
15561
|
To get Auto contrast option in Photoshop, select
|
|
15562
|
To get Desaturate option in Photoshop, we have to go to
|
|
15563
|
Which of the following is(are) the task(s) of the Systems Conversion phase?
|
|
15564
|
Which installation strategy is a variation on the abrupt and parallel conversion?
|
|
15565
|
Which one of the tests is performed on a subset of a program?
|
|
15566
|
The person generally responsible for the program design strategy, standards, and construction is called a(n):
|
|
15567
|
Which of the following is NOT a guideline for successfully conducting a Joint Requirements Planning (JRP) session?
|
|
15568
|
Which of the following is an advantage of discovery prototyping?
|
|
15569
|
Which of the following types of questions should not be asked on an interview?
|
|
15570
|
All of the following are examples of requirements problems, except
|
|
15571
|
Randomly sampling ten invoices based on a given sample size would be an example of
|
|
15572
|
A fact-finding technique that involves a large number of observations taken at random intervals is called:
|
|
15573
|
Which one is NOT a common fact-finding technique?
|
|
15574
|
The process of requirements discovery consists of the following activities, except
|
|
15575
|
A property or quality the system must have is called a
|
|
15576
|
Cause-and-effect analysis is performed in the following phase of systems analysis
|
|
15577
|
The task of identifying and expressing system requirements is performed in which phase of systems analysis?
|
|
15578
|
The task of establishing system improvement objectives is performed in which phase of systems analysis?
|
|
15579
|
The tasks of defining acceptance tests, structuring functional requirements, and validating functional requirements are performed in which one of the phases?
|
|
15580
|
Which of the following phases identifies and expresses requirements, prioritizes requirements, updates project plan, and communications the requirements statement?
|
|
15581
|
Which of the following is NOT a feasibility analysis criterion?
|
|
15582
|
Prototypes are used in
|
|
15583
|
Which of the following analysis techniques derive system models from existing system or discovery prototypes?
|
|
15584
|
All of the following are phases of systems analysis, except
|
|
15585
|
A model-driven analysis approach that focuses on the structure of stored data in a system rather than on processes is
|
|
15586
|
Which of the following is a principle of analytic graphics?
|
|
15587
|
What will be the output of the following code? > g <- function(x) { + a <- 3 + x+a+y + ## 'y' is a free variable + } > g(2)
|
|
15588
|
What would be the value of the following expression? log(-1)
|
|
15589
|
What would be the output of the following code? > x <- 1:4 > x > 2
|
|
15590
|
What would be the output of the following code? > x <- 1:4 > y <- 6:9 > z <- x + y > z
|
|
15591
|
Which of the following is an example of vectorized operation as far as subtraction is concerned? > x <- 1:4 > y <- 6:9
|
|
15592
|
Which of the following is used for Statistical analysis in R language?
|
|
15593
|
Which of the following will start the R program?
|
|
15594
|
System.time function returns an object of class _______ which contains two useful bits of information.
|
|
15595
|
Which of the following phases is unique to the commercial application package implementation strategy as opposed to the rapid application development strategy
|
|
15596
|
______ splits a data frame and results in an array (hence the da). Hopefully, you’re getting the idea here.
|
|
15597
|
accelerates the requirements analysis and design phases 49 Request for quotation (RFQ) is
|
|
15598
|
________ provides needed string operators in R
|
|
15599
|
_________ involves predicting a response with meaningful magnitude, such as quantity sold, stock price, or return on investment.
|
|
15600
|
Attributes of an object (if any) can be accessed using the ______ function.
|
|
15601
|
R objects can have attributes, which are like ________ for the object
|
|
15602
|
Which of the following method make a vector of repeated values?
|
|
15603
|
Rapid Application Development (RAD) strategy includes all of the following, except
|
|
15604
|
An ongoing activity of systems support is
|
|
15605
|
Data frames can be converted to a matrix by calling data._______
|
|
15606
|
A cross life-cycle activity of system development is
|
|
15607
|
__________ is proprietary tool for predictive analytics.
|
|
15608
|
_______ loop over a list and evaluate a function on each element
|
|
15609
|
Which one is NOT a phase of the systems development life cycle?
|
|
15610
|
Which one is NOT a category of problems represented by the PIECES framework?
|
|
15611
|
The deliverable of the problem analysis phase is
|
|
15612
|
____function is same as lapply() in R
|
|
15613
|
Project Management ensures that
|
|
15614
|
_______applies a function over the margins of an array
|
|
15615
|
The first CMM level at which measurable goals for quality and productivity are established is
|
|
15616
|
____is used to apply a function over subsets of a vector
|
|
15617
|
lapply function takes___ arguments in R language
|
|
15618
|
The _____ function takes a vector or other objects and splits it into groups determined by a factor or list of factors.
|
|
15619
|
Open database connectivity (OBDC) tools are an example of
|
|
15620
|
A matrix is ___dimensionsinal rectangular data set?
|
|
15621
|
Examples of keyless interfaces include:
|
|
15622
|
______ suspends the execution of a function wherever it is called and puts the function in debug mode
|
|
15623
|
A specification of how the user moves from window to window, interacting with the application programs to perform useful work is called:
|
|
15624
|
debug() flags a function for ______ mode in R mode.
|
|
15625
|
Language-based, machine-readable representations of what a software process is supposed to do, or how a software process is supposed to accomplish its task is known as:
|
|
15626
|
R comes with a ________ to help you optimize your code and improve its performance.
|
|
15627
|
The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called:
|
|
15628
|
Which of the following is a base package for R language?
|
|
15629
|
Which is not a typical business function?
|
|
15630
|
Who are the people that actually use the system to perform or support the work to be completed?
|
|
15631
|
Which of the following is not a class of information system applications?
|
|
15632
|
R was created at what University?
|
|
15633
|
Information systems that support the business functions that reach out to suppliers are known as:
|
|
15634
|
R is a dialect of which of the below?
|
|
15635
|
1Contemporary Information Systems are interfacing with customers and suppliers using :
|
|
15636
|
Which of the following is part of a static view of information?
|
|
15637
|
Account and password responsibilities 29 Use-case analysis focuses upon:
|
|
15638
|
R objects can be manipulated by which code?
|
|
15639
|
What should not be part of an acceptable use policy?
|
|
15640
|
What is used for statistical analysis in R language?
|
|
15641
|
Which of the following is not a type of navigation system for a web site?
|
|
15642
|
Which of the following relates to enterprise interoperability
|
|
15643
|
Which of the following statements about XML schemas is incorrect?
|
|
15644
|
R functionality is divided into a number of what?
|
|
15645
|
Which of the following statements describes a taxonomy?
|
|
15646
|
UML depicts information systems as a collection of:
|
|
15647
|
The primary R system is available from the:
|
|
15648
|
A web blueprint depicts:
|
|
15649
|
Which of the following should be represented on an information flow diagram?
|
|
15650
|
Records management:
|
|
15651
|
The majority of publically available Internet information sources are:
|
|
15652
|
Monitoring the legal constraints which a company operates under requires review of:
|
|
15653
|
To improve the performance of a business process, which of the following is most relevant?
|
|
15654
|
The most important attribute of information quality that a manager requires is:
|
|
15655
|
The general transformation cycle for information is:
|
|
15656
|
When a bank offers web self-service for customers to answer their questions, the primary outcome is:
|
|
15657
|
When a bank uses business performance management software to monitor its performance in differences regions this:
|
|
15658
|
When a bank uses information to launch a personalised credit card product this:
|
|
15659
|
The application of information to scan an organisation’s environment is:
|
|
15660
|
Decision makers who are concerned with tactical (short-term) operational problems and decision making are
|
|
15661
|
An information system that supports the planning and assessment needs of executive management is
|
|
15662
|
Which of the following is a deliverable of the system implementation phase in a formal system development process?
|
|
15663
|
Which of the following is not a technology driver for an information system?
|
|
15664
|
If a university sets up a web-based information system that faculty could access to record student grades and to advise students, that would be an example of a/an
|
|
15665
|
A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process
|
|
15666
|
Which one of the following is not a business driver for an information system?
|
|
15667
|
The person who ensures that systems are developed on time, within budget, and with acceptable quality is a
|
|
15668
|
The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is
|
|
15669
|
Management information systems (MIS)
|
|
15670
|
___details are given by Management to Marketing Service System.
|
|
15671
|
-MIS normally found in a manufacturing organization will not be suitable in the ______
|
|
15672
|
Which of the following models are developed on the principles of business management, accounting and econometric’s?
|
|
15673
|
What among the following are the primary characteristics that information must process?
|
|
15674
|
In MIS system design, the sources of information may be categorized as … and ..
|
|
15675
|
Which of the following is NOT an objective of MIS?
|
|
15676
|
The …. is defined as a set of activities performed across the organization creating as output of value to the customer.
|
|
15677
|
n a typical ……………. network, application processing is shared between clients and one more servers.
|
|
15678
|
Which of the following is included in the Office automation systems? i) Word processing ii) Electronic mail iii) Voice mail iv) Electronic calendaring v) Audio conferencing
|
|
15679
|
Which of the following steps is/are the implementation plans involved in MIS? i) Preparing organizational plans ii) Planning of work flow iii) Training of personnel iv) Development of software v) Acquiring computer hardware
|
|
15680
|
A system is called …… when the inputs, process and the outputs are known with certainty.
|
|
15681
|
An …..is a set of processes and procedures that transform data into information and knowledge.
|
|
15682
|
Deciding where to locate new production facilities is an example of a manufacturing and production information system operating at the
|
|
15683
|
………. system provide information in easy to use displays to top and middle management.
|
|
15684
|
A private intranet that is extended to authorized users outside the company is called a(n)
|
|
15685
|
Which of the following best characterizes a marketplace created by computer and communications technologies for linking buyers and sellers?
|
|
15686
|
………… information system that express a fundamental concept and activities of information systems.
|
|
15687
|
Which of the following best describes the process of tracking data about customer activities at web sites and storing them in a log?
|
|
15688
|
……. is the period in days between the ordering and delivering of goods.
|
|
15689
|
…...... means that information must reach the recipients within the prescribe timer frame.
|
|
15690
|
The person in-charge of an organization’s web site is called a
|
|
15691
|
………. is allowed a transaction to be traced through all stages of its information processing
|
|
15692
|
…………….. is the process of testing an integrated system to verify that it meets specified requirements.
|
|
15693
|
State whether the following statements about non-functional testing are True or False. i) Non-functional testing is the process of testing to determine system compliance with coding standards. ii) Non-functional testing is testing system characteristics, such as usability, reliability or maintainability.
|
|
15694
|
…………….. is testing without reference to the internal structure of a system.
|
|
15695
|
. ………….. is the repeated testing of an already tested program, after modification, to discover any defects introduced or uncovered as a result of the change.
|
|
15696
|
State whether the following statements about acceptance testing are True or False. i) Acceptance testing of the usability of a component may be done during component testing. ii) Acceptance testing if a new functional enhancement may come before system testing.
|
|
15697
|
The goal in ……………… is to establish confidence in the system, parts of the system or specific non-functional characteristics of the system.
|
|
15698
|
Which of the following is/are the typical test objects used in system testing? i) System, user, and operational manuals. ii) System configuration and configuration data iii) Forms iv) Use Cases
|
|
15699
|
In ………………….., the test environment should correspond to the final target or production environment as much as possible in order to minimize the risk of environment specific failures not being found in testing.
|
|
15700
|
State whether the following statements about different test levels are True or False. i) One approach to component testing is to prepare and automate test cases before coding. ii) At each stage of integration, testers concentrate solely on the integration itself.
|
|
15701
|
…………….. occurs with access to the code being tested and with the support of a development environment such as a unit test framework or debugging tool.
|
|
15702
|
Which of the following is/are the typical test objects used in integration testing? i) Subsystems ii) System, user and operation manuals iii) Infrastructure iv) Interfaces
|
|
15703
|
………….. tests interfaces between components, interactions with different parts of a system such as operating system, file system and hardware and interfaces between system.
|
|
15704
|
………………. is also known as unit, module or program testing.
|
|
15705
|
Which of the following is/are the typical test objects used in component testing? i) components ii) programs iii) workflows iv) database models
|
|
15706
|
When working with software development models, what is it important to do?
|
|
15707
|
State whether the following statements about the characteristics of good testing and applies to any software development life cycle model are True or False. i) Acceptance testing is always the final test level to be applied. ii) All test levels are planned and completed for each developed feature. iii) For every development activity, there is a corresponding testing activity.
|
|
15708
|
Which of the following statements about regression testing are True. i) Regression testing is a good candidate for test automation. ii) Regression testing is performed to uncover defects as a result of changes in the software. iii) Regression testing should not be performed during integration testing.
|
|
15709
|
……………. is the repeated testing of an already tested program after modification, to discover any defects introduced or uncovered as a result of the change.
|
|
15710
|
State whether the following statements comparing component testing and system testing are True. i) Component testing only focuses on functional characteristics, whereas system testing focuses on functional and non-functional characteristics. ii) Component testing is the responsibility of the testers, whereas system testing typically is the responsibility of the users of the system.
|
|
15711
|
Which of the following is an example of maintenance testing?
|
|
15712
|
Which of the following are the major tasks performed in the analysis and design phase? i) Designing and prioritizing high-level test cases. ii) Evaluating testability of the test basis and test objects. iii) Comparing actual results with expected results.
|
|
15713
|
Which of these tasks would you expect to be performed during the test implementation and execution phase? i) Finalizing, implementation and prioritizing test cases. ii) Using the information gathered to improve the maturity iii) Verifying that the test environment has been set up correctly.
|
|
15714
|
Below is a list of problems that can be observed during testing or in production. Which one of these problems is a failure?
|
|
15715
|
Documenting the acceptance of the system is performed during ………….. phase of the fundamental test process.
|
|
15716
|
……… occur at project milestones such as when a software system is released, a test project is completed, or a maintenance release has been completed.
|
|
15717
|
State whether the following statements about the fundamental test process are True or False. i) Evaluating exit criteria and reporting should be done for each test level ii) In test closure activities, we should check which planned deliverables have been delivered.
|
|
15718
|
State whether the following statements about software testing are True or False. i) A certain degree of independence often makes the tester more effective at finding defects and failures. ii) Testers and developers are curious and focused on finding defects.
|
|
15719
|
The test designed by the persons who wrote the software under test has ………….. of independence.
|
|
15720
|
The test designed by a person from a different organization or company such as outsourcing or certification by an external body has …………… of independence.
|
|
15721
|
Which of the following attributes, qualifications or actions would lead to problems (or conflict) within mixed teams of testers and developers, when observed in reviews and tests.
|
|
15722
|
Which of the following is/are the ways to improve communication and relationships between testers and others. i) Remind every of the common goal of the better quality system. ii) Try to understand how the other person feels and why they react as they do. iii) Confirm that that other person has understood what you have said and vice versa.
|
|
15723
|
Which of the following statements are TRUE. i) Software testing may be required to meet legal or contractual requirements. ii) Software testing is mainly needed to improve the quality of the product.
|
|
15724
|
State whether the following statements are True or False. i) Rigorous testing and fixing of found defects could help reduce the risks of problems occurring in an operational environment. ii) Rigorous testing is sometimes used to prove that all failures have been found.
|
|
15725
|
State whether the following statements are True or False. i) Testing removes faults, debugging identifies the causes of failures. ii) Dynamic testing prevents the causes of failures, debugging removes the failures.
|
|
15726
|
Which of the following statements are TRUE. i) Testing identifies the source of defects, debugging analyzes the faults and proposes prevention activities. ii) Dynamic testing shows failures caused by defects, debugging finds, analyzes and removes the causes of failure in the software.
|
|
15727
|
Which of the following test activities exist before and after test execution. i) Planning and Control ii) Checking results iii) Evaluating exit criteria iv) Finalizing or completing closure
|
|
15728
|
Which of the following is/are the main objective of software testing. i) Finding defects ii) Gaining confidence about the level of quality iii) Preventing defects iv) Making absence of defects
|
|
15729
|
The main objective of ……………. is to cause as many failures as possible so that defects in the software are identified and can be fixed.
|
|
15730
|
In ……………., the main objective may be to conform that the system works as expected.
|
|
15731
|
The main objective of …………. is to verify whether there is no new defects have been introduced during development of the changes.
|
|
15732
|
During ……………, the main objective may be to access such as reliability or availability.
|
|
15733
|
State whether the following statements about software testing are True or False. i) Dynamic testing can show failures that are caused by defects. ii) Debugging is the the development activity that finds, analyzes and removes the cause of failure.
|
|
15734
|
State whether the following statements are True or False about the key principles of software testing. i) By using automated testing it is possible to test everything. ii) It is normally impossible to test all input/output combinations for a software system.
|
|
15735
|
State whether the following statements are True about the key principles of software testing. i) Testing can show that defects are present, but cannot prove that there are no defects. ii) With sufficient effort and tool support, exhaustive testing is feasible for all software. iii) Testing is done differently in different contexts.
|
|
15736
|
. Which of the following are the main activities of fundamental test process. i) Test planning and control ii) Test analysis and design iii) Test implementation and execution iv) Test closure activities
|
|
15737
|
…………… is the activity of defining the objectives of testing and the specification of test activities in order to meet the objective and mission.
|
|
15738
|
…………… is the ongoing activity of comparing actual progress against the plan and reporting the status.
|
|
15739
|
………….. is the activity during which general testing objectives are transformed into tangible test conditions and test cases.
|
|
15740
|
Which of the following tasks would you expect to be performed during the test analysis and design phase of the fundamental test process. i) Reviewing the test basis ii) Evaluating testability iii) Defining test objectives iv) Creating test suites from test procedures
|
|
15741
|
Which of the following tasks would you expect to be performed during evaluating exit criteria phase of the fundamental test process.
|
|
15742
|
Analyzing lessons learned for process improvement is performed during …………. phase of the fundamental test process.
|
|
15743
|
…………. is the activity where test procedures or scripts are specified by combining the test cases in a particular order.
|
|
15744
|
………….. is the activity where test execution is assessed against the defined objectives.
|
|
15745
|
……………. collect data from completed test activities to consolidate experience, testware, facts and numbers.
|
|
15746
|
Creating test suites from the test procedures for efficient test execution is performed during …………… phase of the fundamental test process.
|
|
15747
|
In ………………….., once errors in individual tasks and in system behavior have been isolated, testing shifts to time related errors.
|
|
15748
|
In ……………….., test cases are derived to ensure that all statements in the program have been executed at least once during testing and that all logical conditions have been exercised.
|
|
15749
|
……………………. probes the programs ability to handle data at the limits of acceptability.
|
|
15750
|
…………………. divides the input domain into classes of data that are likely to exercise specific software function.
|
|
15751
|
……………….. tests are designed to validate functional requirements without regard to the internal working of program.
|
|
15752
|
The …………………. in the testing of real-time software is to test each task independently.
|
|
15753
|
………………… can be used to define various classes and input and associated interactions.
|
|
15754
|
A ………………… for documentation can be approached using techniques that are analogous to many of the black-box testing methods.
|
|
15755
|
The …………………. of documentation testing is the live test, which uses the documentation in conjunction with the use of the actual program.
|
|
15756
|
The ……………………. of documentation testing is the review and inspection, which examines the document for editorial clarity.
|
|
15757
|
The independent versions from the basis of a black-box testing technique are called
|
|
15758
|
Boundary value analysis is a test design technique that complements …………………..
|
|
15759
|
……………. is the first step in black-box testing in order to understand the objects that are modeled in software and the relationships that connect these objects.
|
|
15760
|
……………… is black-box testing method that divides the input domain of a program into classes of data from which test cases can be derived.
|
|
15761
|
While using black-box testing techniques, we drive a set of test cases that satisfy which of the following criteria. i) test cases that reduce, by a count that is greater than one. ii) test cases that tell us something about the presence or absence of classes of errors. iii) execute all loops at their boundaries and within their operational bounds.
|
|
15762
|
Black-box testing attempts to find errors in which of the following categories. i) incorrect or missing functions ii) interface errors iii) logical errors iv) behavior or performance errors v) incorrect assumptions
|
|
15763
|
……………. enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program.
|
|
15764
|
………………, also called behavioral testing which focuses on the functional requirements of the software.
|
|
15765
|
While using white-box testing methods, the software engineer can derive test cases that i) guarantee that all independent paths with in a module have been exercised at least once. ii) exercise all logical decisions on their True and False sides. iii) execute all loops at their boundaries and within their operational bounds.
|
|
15766
|
………………….., sometimes called glass-box testing, is a test case design method that uses the control structure of the procedural design to derive test cases.
|
|
15767
|
The Sprint is a/an ___________ effort.
|
|
15768
|
Independent testers are _____________ and identify different defects at the same time.
|
|
15769
|
In software engineering, _______________ is a principle of software development, which aims at reducing repetition of information of every kind, especially useful in multi-tier architectures.
|
|
15770
|
To define a ________ in a JavaBean class, public getter and setter methods have to be supplied.
|
|
15771
|
assertThat(0.03, is(closeTo(1.0, 0.03))) is
|
|
15772
|
Unit Tests can detect
|
|
15773
|
Lean Development follows the principle of
|
|
15774
|
The ________________ is a management paradigm that specifies any manageable system as being limited in achieving more of its goals by a very small number of constraints.
|
|
15775
|
In software testing, a _____________ is a collection of software and test data configured to test a program unit by putting it under varying conditions and monitoring its behavior and output.
|
|
15776
|
Beta Testing is also known as _________ testing.
|
|
15777
|
Software tester should be involved very early during development phase of a project. True or false
|
|
15778
|
Beta testing is useful way of compatibility testing. True or false.
|
|
15779
|
System testing only deals with functional requirements. True or false.
|
|
15780
|
Component testing is a
|
|
15781
|
Who is responsible for component testing?
|
|
15782
|
Verifying that whether software components are functioning correctly and identifying the defects in them is objective of which level of testing?
|
|
15783
|
System architecture is determined during which phase?
|
|
15784
|
System testing is a
|
|
15785
|
Which testing is concerned with behavior of whole product as per specified requirements?
|
|
15786
|
What is the order in which test levels are performed?
|
|
15787
|
A Plan to overcome the risk called as
|
|
15788
|
Unit Testing will be done by
|
|
15789
|
Optimization, Defect Prevention, and Quality Control. Its come under the
|
|
15790
|
Beta testing will be done at
|
|
15791
|
Cost of Production = Right The First time cost(RTF. + Cost of Quality.
|
|
15792
|
TQM represents
|
|
15793
|
------------- means under what test environment(Hardware, software set up. the application will run smoothly
|
|
15794
|
AdHoc testing is a part of
|
|
15795
|
Management and Measurement, It will come under
|
|
15796
|
The name of the testing which is done to make sure the existing features are not affected by new changes
|
|
15797
|
How severely the bug is effecting the application is called as
|
|
15798
|
Which Software Development Life cycle model will require to start Testing Activities when starting development activities itself
|
|
15799
|
A metric used to measure the characteristic of the methods, Techniques and tools employed in developing, implementing and maintaining the software system called as
|
|
15800
|
Check Sheet(Checklist. is considered a simple , but powerful statistical tool because it differentiates between two extremes.
|
|
15801
|
Application should be stable. Clear Design and Flow of the application is needed for Automation testing.
|
|
15802
|
Quality plan describes the quality procedures and standards that will be used in a project.
|
|
15803
|
Project Risk affects The Schedule or Resources.
|
|
15804
|
Integration, It will come under
|
|
15805
|
What is correct Software Process Cycle?
|
|
15806
|
Beta testing will be done by
|
|
15807
|
Maintenance Plan predicts the maintenance requirements of the system, maintenance costs and effort required
|
|
15808
|
Validation plan describes the approach ,resources and schedule used for system validation
|
|
15809
|
Types of quality tools are Problem Identification Tools and Problem Analysis Tools.
|
|
15810
|
Path Tested = Number of Path Tested / Total Number of Paths
|
|
15811
|
It provides a set of levels and an assessment model, and presents a set of recommended practices that allow organizations to improve their testing processes.
|
|
15812
|
Defects generally fall into the following categories?
|
|
15813
|
This type of test include, how well the user will be able to understand and interact with the system?
|
|
15814
|
This Testing Technique examines the basic program structure and it derives the test data from the program logic; Ensuring that all statements and conditions executed at least once. It is called as
|
|
15815
|
Standards and procedures for managing changes in an evolving software product is called?
|
|
15816
|
Requirements Specification, Planning, Test case Design, Execution, Bug Reporting & Maintenance This Life Cycle comes Under
|
|
15817
|
SPICE Means
|
|
15818
|
Retesting modules connected to the program or component after a change has been made?
|
|
15819
|
An Important metric is the number of defects found in internal testing compared to the defects found in customer tests, Status of test activities against the plan, Test coverage achieved so far, comes under
|
|
15820
|
Alpha testing will be done at,
|
|
15821
|
Software Testing is a process of evaluating a system by manual or automatic means and verify that it satisfies specified requirements or identity differences between expected and actual results.
|
|
15822
|
Informing to the developer which bug to be fix first is called as
|
|
15823
|
Earlier a defect is found the cheaper it is to fix it. Is the above statement correct?
|
|
15824
|
Automation Testing should be done before starting Manual testing. Is the above statement correct?
|
|
15825
|
Stratification is a Technique used to analyze/divide a universe of data into homogeneous groups(stratA..
|
|
15826
|
Business Risk affects The Organization developing or Procuring the software
|
|
15827
|
Executing the same test case on a modified build called as
|
|
15828
|
Which is Black-Box Testing method?
|
|
15829
|
The process that deals with the technical and management issues of software development called as?
|
|
15830
|
A metric used to measure the characteristic of documentation and code called as
|
|
15831
|
Product Risk affects The quality or performance of the software.
|
|
15832
|
Which is non-functional software testing?
|
|
15833
|
What are the Types of Integration Testing?
|
|
15834
|
Boundary value analysis belongs to which testing method?
|
|
15835
|
It measures the quality of a product It is a specific part of the QA procedure, It is a corrective process, It applies for particular product & Deals with the product.
|
|
15836
|
Retesting the entire application after a change has been made called as?
|
|
15837
|
Acceptance testing is known as
|
|
15838
|
Software testing which is done without planning and Documentation is known as
|
|
15839
|
Phase Definition. It will come under
|
|
15840
|
This type of testing method attempts to find incorrect or missing functions, errors in data structures or external database access, interface errors, Performance errors and initialization and Termination errors. It is called as
|
|
15841
|
The testing which is done by going thro' the code is known as,
|
|
15842
|
Retesting of a single program or component after a change has been made?
|
|
15843
|
Requirement and Analysis, Design, Development or Coding, Testing and Maintenance is called as Software Development Life Cycle (SDLC)
|
|
15844
|
Name the events that will be analyzed, Count the named incidents, Rank the count by frequency using a bar chart & Validate reasonableness of the analysis is called as
|
|
15845
|
White box testing is not called as___________
|
|
15846
|
Verification is
|
|
15847
|
Variance from product specifications is called?
|
|
15848
|
It measures the quality of processes used to create a quality product. It is a system of management activities, It is a preventive process, It applies for entire life cycle & Deals with Process.
|
|
15849
|
A useful tool to visualize, clarify, link, identify, and classify possible cause of a problem. This is also called as “fishbone diagram†what is this?
|
|
15850
|
Cost of quality = Prevention Cost + Appraisal cost + Failure cost
|
|
15851
|
What are the Testing Levels?
|
|
15852
|
The review and approved document (i.e. Test plan, System Requirement Specification’s) is called as
|
|
15853
|
A Non-Functional Software testing done to check if the user interface is easy to use and understand
|
|
15854
|
It is a set of levels that defines a testing maturity hierarchy
|
|
15855
|
Staff development plan describes how the skills and experience of the project team members will be developed.
|
|
15856
|
To check whether we have developed the product according to the customer requirements r not. It is a Dynamic process.
|
|
15857
|
To check whether we are developing the right product according to the customer requirements are not. It is a static process
|
|
15858
|
Control Charts is a statistical technique to assess, monitor, and maintain the stability of a process.
|
|
15859
|
Executing the same test case by giving the number of inputs on same build called as
|
|
15860
|
The approach/document used to make sure all the requirements are covered when writing test cases
|
|
15861
|
The Switch is switched off once the temperature falls below 18 and then it is turned on when the temperature is more than 21. Identify the Equivalence values which belong to the same class.
|
|
15862
|
Handover of Test-ware is a part of which Phase
|
|
15863
|
Which of the following items would not come under Configuration Management?
|
|
15864
|
Reporting Discrepancies as incidents is a part of which phase :-
|
|
15865
|
Reviewing the test Basis is a part of which phase
|
|
15866
|
One of the fields on a form contains a text box which accepts alpha numeric values. Identify the Valid Equivalence class
|
|
15867
|
Static analysis is best described as:
|
|
15868
|
Testing where in we subject the target of the test , to varying workloads to measure and evaluate the performance behaviors and ability of the target and of the test to continue to function properly under these different workloads.
|
|
15869
|
Testing activity which is performed to expose defects in the interfaces and in the interaction between integrated components is
|
|
15870
|
Which of the following is not a major task of Exit criteria?
|
|
15871
|
Which is the reputed testing standard?
|
|
15872
|
You are performing a test to see that it complies with the user requirement that a certain field be populated by using a drop down box containing a list of values. What kind of testing are you doing?
|
|
15873
|
To which phase will training cost fall?
|
|
15874
|
Test Readiness review is conducted by the
|
|
15875
|
If the measurement taken by the two people are same refers to the terms as
|
|
15876
|
The two types of incremental testing approaches are top down and bottom up approach.
|
|
15877
|
A statistical technique to assess, monitor and maintain the stability of a process is
|
|
15878
|
You are told to prepare a report on the most commonly occurring product defects. You review the software defect reports, which categories the defects of coding errors, requirement errors, documentation errors, etc. The best tool to report this information is
|
|
15879
|
Function point is a measure of
|
|
15880
|
The ‘v’ represent the following term:
|
|
15881
|
Which one is not Statistical Tool?
|
|
15882
|
Which of the following is not a part of test plan?
|
|
15883
|
Which of the following is not true about Incremental testing?
|
|
15884
|
Testing comes under which category of cost of quality?
|
|
15885
|
Which one is not Structural Testing?
|
|
15886
|
Pareto principle advocates
|
|
15887
|
Histogram refers to
|
|
15888
|
Error guessing is a
|
|
15889
|
User Acceptance testing is
|
|
15890
|
Defects are less costly if detected in which of the following phases
|
|
15891
|
AngularJS applications are a mix of _____
|
|
15892
|
AngularJS is the library of
|
|
15893
|
AngularJS applications are built around a design pattern called _____
|
|
15894
|
Which directive defines an AngularJS application?
|
|
15895
|
Which is the correct syntax of creating AngularJS Controller?
|
|
15896
|
Which directive will auto-bootstrap (automatically initialize) the application when a web page is loaded?
|
|
15897
|
Which directive can provide CSS classes for HTML elements?
|
|
15898
|
What is controller in MVC?
|
|
15899
|
config phase is the phase during which AngularJS bootstraps itself.
|
|
15900
|
ng-init directive can be used to put values to the variables to be used in the application.
|
|
15901
|
In controllers, model data is not accessed via $scope object.
|
|
15902
|
In AngularJS, Scope contains the model data.
|
|
15903
|
On which of the following types of component can we create a custom directive?
|
|
15904
|
What are the services in AngularJS?
|
|
15905
|
Angular Js is based on which architecture?
|
|
15906
|
Is AngularJs provides testing feature?
|
|
15907
|
In AngularJs which feature is available for Navigation
|
|
15908
|
Module contains
|
|
15909
|
$rootScope accessible from all controllers
|
|
15910
|
AngularJs is all about Client side code
|
|
15911
|
Two way data binding is supported by AngularJs
|
|
15912
|
The easiest way in AngularJs for localisation is using Directives
|
|
15913
|
Which out of the following features are supported by AngularJs
|
|
15914
|
Best place for Dom Manipulation in AngularJs is
|
|
15915
|
AngularJs is following
|
|
15916
|
There are only eight key features of AngularJS.
|
|
15917
|
Can we download AngularJS from officials websites?
|
|
15918
|
Angular is not a library.
|
|
15919
|
AngularJS does not allow us to use the open source Closure Library with it.
|
|
15920
|
AngularJS adds and removes so many classes on run time?
|
|
15921
|
Angular JS depends on jQuery directly.
|
|
15922
|
AngularJS is a template system
|
|
15923
|
What is the use of ng-controller?
|
|
15924
|
What is the use of ng-model in AngularJS?
|
|
15925
|
What do you understand by Angular JS?
|
|
15926
|
What is the full form of MVC?
|
|
15927
|
Which of the following is true about data binding in Angular JS?
|
|
15928
|
Which of the following is correct about MVC?
|
|
15929
|
Which lines are correct about controllers in Angular JS?
|
|
15930
|
Which of the following defines an AngularJS application to HTML?
|
|
15931
|
Which of the following is used to enable URL routing?
|
|
15932
|
What is ng-repeat directive?
|
|
15933
|
Most five commonly used directives of AngularJS are:
|
|
15934
|
Who is the father of AngularJS?
|
|
15935
|
In which language AngularJS written?
|
|
15936
|
Who is the current developer of Angular JS?
|
|
15937
|
Which of the following is correct about filters?
|
|
15938
|
Which module we need to download and include for animation in AngularJS?
|
|
15939
|
Which is the most used Angular directive?
|
|
15940
|
Router is part of @angular/core?
|
|
15941
|
What is .subscribe?
|
|
15942
|
How Observables are Used?
|
|
15943
|
Which of the following is correct about TypeScript?
|
|
15944
|
Who is sometimes called as father of Angularjs?
|
|
15945
|
Can we nest ng-app directive?
|
|
15946
|
Which sign is used as prefix for the built-in objects in AngularJS?
|
|
15947
|
Which directive is used to specify a controller in HTML element?
|
|
15948
|
How many $RootScope an angular JS application can have?
|
|
15949
|
What is data binding in angular JS?
|
|
15950
|
How to combine filter with expression?
|
|
15951
|
Which of the following is a filter in Angular Js?
|
|
15952
|
Can we create custom directive in Angular JS?
|
|
15953
|
Which directive binds Application data to HTML tags in angular JS?
|
|
15954
|
Which directive binds the values of application data to HTML input controls in angular JS?
|
|
15955
|
Which directive is used to start an angularJS application?
|
|
15956
|
Which of the following can be used as a prefix for Directive?
|
|
15957
|
What is the correct syntax to write an expression?
|
|
15958
|
AngularJS is entirely based on HTML and JavaScript
|
|
15959
|
Which community Angular JS belongs to?
|
|
15960
|
Output of the below code
|
|
15961
|
Output of the below code
|
|
15962
|
Which function is used to create a module?
|
|
15963
|
Can we store controller in an external file?
|
|
15964
|
Which of the following is a purpose of include?
|
|
15965
|
Which directive is used to hide a given control?
|
|
15966
|
Service and factory both are singletons
|
|
15967
|
Which service converts object to string?
|
|
15968
|
Which service is used to communicate with remote server?
|
|
15969
|
Services are _________ object?
|
|
15970
|
By default, How ng-model watches the directive?
|
|
15971
|
What is the priority level of directives?
|
|
15972
|
Which directive display view for various routes?
|
|
15973
|
Which of the following is an in-built service in angular JS?
|
|
15974
|
Which of the followings are validation directives?
|
|
15975
|
Which of the following is validation css class in AngularJS
|
|
15976
|
AngularJS module can be created using ________.
|
|
15977
|
AngularJS filters ___________.
|
|
15978
|
What is service in AngularJS?
|
|
15979
|
Which of the following directive allows us to use form?
|
|
15980
|
The ng-change directive must be used with ng-model directives.
|
|
15981
|
What is $scope?
|
|
15982
|
The ng-bind directive binds ____________.
|
|
15983
|
The ng-model directive is used for __________.
|
|
15984
|
AngularJS directives can be written in HTML element as:
|
|
15985
|
Which of the following statements are true?
|
|
15986
|
Which of the following is a valid AngularJS expression?
|
|
15987
|
Angular 2 is component based ,and in Angular 2 $scope and controllers are replaced by __________ and __________ ?
|
|
15988
|
In Angular 2 which of the following service allows you to dynamically load a component in a certain position on the page. ?
|
|
15989
|
AngularJS module can be created using ________.
|
|
15990
|
What is service in AngularJS?
|
|
15991
|
Which of the following directive allows us to use form?
|
|
15992
|
What is $scope?
|
|
15993
|
AngularJS directives can be written in HTML element as:
|
|
15994
|
How to use dependency injection in AngularJS ?
|
|
15995
|
Using filters AngularJS cannot use _____________.
|
|
15996
|
Which of the following is/are not AngularJS events?
|
|
15997
|
Which of the following statements are invalid AngularJS filters?
|
|
15998
|
Explain what is angular.bootstrap is used for?
|
|
15999
|
Which of the following statements are true?
|
|
16000
|
ng-init directive in angular js is used for?
|
|
16001
|
What is the factory method is used for?
|
|
16002
|
ng-init directive in angular js is used for?
|
|
16003
|
What is the factory method is used for?
|
|
16004
|
How to include HTML content into another HTML?
|
|
16005
|
What does the $dirty flag indicates in angular js?
|
|
16006
|
Explain what Angular JS routes does?
|
|
16007
|
What is link function is used for in angular js?
|
|
16008
|
How does an object or function can get hold of its dependencies in angular js?
|
|
16009
|
Which of the following directive bootstraps AngularJS framework?
|
|
16010
|
AngularJS directives are used in ________.
|
|
16011
|
Reporting the status of an activity through a feedback mechanism is called ……… information.
|
|
16012
|
Which of the following is a type of teleconference whereby two or more users are able to edit and modify data files simultaneously?
|
|
16013
|
……….. takes responsibility and keeps track of progress in MIS design,development and implementation.
|
|
16014
|
The effectiveness of marketing information system depends to a larger extent of ………. from market place to the market.
|
|
16015
|
Which of the following is the type of electronic commerce that has consumers selling directly to consumers?
|
|
16016
|
A number of tasks related to achieve one time objective such creation of an MIS called a …….
|
|
16017
|
In ………. organization, authority is delegated down the hierarchy.
|
|
16018
|
Based on the behavioral definition of an organization, each of the following is a true statement except.
|
|
16019
|
Information system specialists also called as …..
|
|
16020
|
The basic nature of the system refers to ………
|
|
16021
|
The types of data transmission modes are
|
|
16022
|
Decision trees could be represented in different ways such as
|
|
16023
|
GDSS is the short form of
|
|
16024
|
The basic component(s) of DSS is (are)
|
|
16025
|
_______ details are given by Management to Marketing Service System.
|
|
16026
|
MIS normally found in a manufacturing organization will not be suitable in the ______.
|
|
16027
|
One byte is made of
|
|
16028
|
Audit gives details about ________ to Account Payable System
|
|
16029
|
Internal information for MIS may come from any one of the following department.
|
|
16030
|
The elements of control will consist of
|
|
16031
|
The flow of information through MIS is
|
|
16032
|
The advantage(s) of transistors are they
|
|
16033
|
AI is the short form of
|
|
16034
|
The back bone of any organization is
|
|
16035
|
The information of MIS comes from the
|
|
16036
|
Which class is thread-safe i.e. multiple threads cannot access it simultaneously,So it is safe and will result in an order?
|
|
16037
|
Which is a mechanism where one object acquires all the properties and behaviors of the parent object?
|
|
16038
|
Java Virtual Machine is platform independent.
|
|
16039
|
What is the range of the int data type?
|
|
16040
|
Which are subclasses of FilterInputStream and FilterOutputStream?
|
|
16041
|
Which method returns a reference to the currently executing thread object?
|
|
16042
|
If you import a package, subpackages will not be imported.
|
|
16043
|
Which keyword is used to make the classes and interface of another package accessible to the current package?
|
|
16044
|
Which access specifiers can be used for a class so that it’s members can be accessed by a different class in the different package?
|
|
16045
|
The Object class is not a parent class of all the classes in java by default.
|
|
16046
|
Which is a superclass of all exception classes?
|
|
16047
|
An interface is a blueprint of a class. It has static constants and abstract methods.
|
|
16048
|
Which variables are created when an object is created with the use of the keyword 'new' and destroyed when the object is destroyed?
|
|
16049
|
Breaking a string or stream into meaningful independent words is known as tokenization.
|
|
16050
|
What can be accessed or inherited without actual copy of code to each program?
|
|
16051
|
Which provides accessibility to classes and interface?
|
|
16052
|
Packages are used for distributing a collection of reusable classes, usually in a format known as Java Archive (JAR) file.
|
|
16053
|
Which statement provides an easy way to dispatch execution to different parts of your code based on the value of an expression?
|
|
16054
|
Which field of StreamTokenizer if the token is a word, this filed contains the word that can be used in programming?
|
|
16055
|
Which Thread pool is used where container creates a thread pool to process the request?
|
|
16056
|
Which is used to separate the hierarchy of the class while declaring an import statement?
|
|
16057
|
Classes in the same package cannot access each other's package-access members.
|
|
16058
|
Which method of string class in java is used to convert the boolean into String?
|
|
16059
|
By overriding the toString() method of the Object class, we can return values of the object, so we don't need to write much code.
|
|
16060
|
Which Exception occurs when a class is not found while dynamically loading a class using the class loaders?
|
|
16061
|
Which methods are provided by the PrintStream class?
|
|
16062
|
A package can be renamed without renaming the directory in which the classes are stored.
|
|
16063
|
What is known as the classes that extend Throwable class except RuntimeException and Error?
|
|
16064
|
Which is irrecoverable?
|
|
16065
|
Java application uses an output stream to read data from a source, it may be a file, an array, peripheral device or socket.
|
|
16066
|
Mutual exclusive and inter-thread communication are which type of Synchorization?
|
|
16067
|
An exception is an event, which occurs during the execution of a program that disrupts the normal flow of the program's instructions.
|
|
16068
|
Switch is more efficient than nested if or if - else in java.
|
|
16069
|
Which is used for reading streams of raw bytes such as image data and for reading streams of characters, consider using FileReader?
|
|
16070
|
Which class is used to uncompress the file in the deflate compression format, It provides facility to the other uncompression filters?
|
|
16071
|
Which method is used to change the name of a thread?
|
|
16072
|
Which mechanism is used when a thread is paused running in its critical section and another thread is allowed to enter (or lock) in the same critical section to be executed?
|
|
16073
|
How many reserved keywords are currently defined in the Java language?
|
|
16074
|
Which constructor creates an empty string buffer with the specified capacity as length.
|
|
16075
|
ResultSetMetaData interface is useful because it provides methods to get metadata from the ResultSet object.
|
|
16076
|
From the following statements which is a disadvantage of an java array?
|
|
16077
|
The PipedInputStream and PipedOutputStream classes can be used to read and write data simultaneously.
|
|
16078
|
Which method returns the interrupted flag after that it sets the flag to false if it is true?
|
|
16079
|
Unchecked exceptions are checked at compile-time rather they are checked at runtime.
|
|
16080
|
Thread class defines several methods that help manage threads. Which of the following method suspends a thread for a period fo time?
|
|
16081
|
Which access modifier makes a member available only to classes within the same package or subclasses?
|
|
16082
|
Which of the following statements is/are TRUE regarding JAVA ? (a) Constants that cannot be changed are declared using the ‘static’ keyword. (b) A class can only inherit one class but can implement multiple interfaces.
|
|
16083
|
Which of the following reference types cannot be generic?
|
|
16084
|
Which of these packages contain all the Java’s built in exceptions?
|
|
16085
|
A single try block must be followed by which of these?
|
|
16086
|
Which of these clause will be executed even if no exceptions are found?
|
|
16087
|
What is use of join() in threads of Java?
|
|
16088
|
Where is Reference variables allocated?
|
|
16089
|
What is abstract in Java?
|
|
16090
|
Can we define main() method inside abstract class?
|
|
16091
|
Which of the following exception is Checked exception?
|
|
16092
|
which class or interface defines wait(), notify() and notifyall() methods
|
|
16093
|
Which is the base class of all the exceptions & errors in Java?
|
|
16094
|
Enum is most useful in creating
|
|
16095
|
static import provides accessibility to static members of the class only. State true or false
|
|
16096
|
Which of the following is a correct implementation of method overloading?
|
|
16097
|
Converting an object of type (Integer) to its corresponding primitive (int) value is known as
|
|
16098
|
Which collection framework allows null values and is unsynchronized?
|
|
16099
|
Does Java allows default values to arguments? public void sum(int a = 10, int b = 20) ?
|
|
16100
|
Packages resolves ambiguity for classes which have the same name
|
|
16101
|
Different packages can have classes with the same name
|
|
16102
|
Packages can contain hidden classes that are used by the package itself but are not visible or accessible outside the package.
|
|
16103
|
How many instances Singleton class can have in Java?
|
|
16104
|
What is Big-O complexity notation to insert an element in List
|
|
16105
|
What is Big-O complexity notation to search an element in List
|
|
16106
|
Java List has an instance variable to handle the size. It is incremented when you add, and decremented when you remove. Calling list.size() returns a variable, and is therefore O(1)
|
|
16107
|
List is part of Java Collections API
|
|
16108
|
Abstract methods of abstract classes are mandatory to be overridden by sub classes. Is that true?
|
|
16109
|
Can we override final methods of abstract classes?
|
|
16110
|
What is 'abstract' in Java?
|
|
16111
|
Can Abstract classes instantiated?
|
|
16112
|
In Java how arrays are passed in methods?
|
|
16113
|
Can we use 'catch()' without passing arguments in it?
|
|
16114
|
In case of 'try' & 'catch' block, is it possible to use only 'try' block instead of using 'catch'?
|
|
16115
|
Can we call Constructor without creating an object ?
|
|
16116
|
In Java every data type requires some bytes of memory, How many bytes void data type requires?
|
|
16117
|
How may main() methods are allowed in a project of Java?
|
|
16118
|
If a class has no modifier then
|
|
16119
|
What is true about 'private' members of a class?
|
|
16120
|
How many levels of visibility Java has?
|
|
16121
|
If a class is 'public' then
|
|
16122
|
What is the use of Garbage Collector in Java?
|
|
16123
|
Can we call non static methods of a class by static methods of a class without creating object?
|
|
16124
|
Java supports single-line and multi-line comments very similar to C and C++
|
|
16125
|
Arrays is a group of similar type of datatype
|
|
16126
|
What is correct sequence of execution of any Java program?
|
|
16127
|
Java has 5 phases, Editing, Compilation, Loading, Verification & Execution. Which of the following unit is responsible for execution?
|
|
16128
|
Java supports both Primitive & Non-Primitive(User Defined) datatypes. Which one of the following is not a primitive datatype?
|
|
16129
|
The main() method of an application has to be public. Otherwise, it could not be called by a Java interpreter. Is that true?
|
|
16130
|
Which of these are Access Modifiers in java?
|
|
16131
|
Java program processing always starts with main() method
|
|
16132
|
Java is case sensitive langauge
|
|
16133
|
On which platforms Java runs?
|
|
16134
|
Select Odd one out from these about local variables
|
|
16135
|
Which one of the following is Equality operator in Java?
|
|
16136
|
Which one of the following is an Unary operator in Java?
|
|
16137
|
Which of the following operator has more precedence?
|
|
16138
|
What do you mean by >>> operator in Java
|
|
16139
|
Which of the following is not an operator in Java?
|
|
16140
|
Which of the following operators has more precedance in Java?
|
|
16141
|
public class MyClass { public static void main(String[] args){ int a = 10; System.out.println(++a++); } }
|
|
16142
|
Is it possible to return two values by any function?
|
|
16143
|
Is it possible to write C program which it print self?
|
|
16144
|
Numbers are stored and transmitted inside a computer in which format?
|
|
16145
|
The ASCII code of ‘A’ is?
|
|
16146
|
The ASCII code of ‘0’ (zero) is?
|
|
16147
|
What is the Latest Version of C Language?
|
|
16148
|
In compilation process at what sequence Preprocessor comes into picture?
|
|
16149
|
Preprocessor includes content of header files added in source code?
|
|
16150
|
Which compilation unit is responsible for adding header files content in the source code?
|
|
16151
|
Is there any limit in adding no of header files in program?
|
|
16152
|
What is the extension of output file produced by Preprocessor?
|
|
16153
|
__FILE__ is predefined macro and contains the current filename as a string. Is this true/false?
|
|
16154
|
Which of the following ways can be used to include header file in C programs?
|
|
16155
|
Which of the following ways are correct to include header file in C program?
|
|
16156
|
Which one of the following is invalid macro in C programming?
|
|
16157
|
Which of the following ways are correct to comment out preprocessing of any line?
|
|
16158
|
Will compiler produce any compilation error if same header file is included two times?
|
|
16159
|
What is the job of Assembler in C programming?
|
|
16160
|
Which gcc option is used to generate assembly code from C code on Linux?
|
|
16161
|
Which macro is used to insert assembly code in C program (GCC compiler)?
|
|
16162
|
Which macro is used to insert assembly code in C program (VC++ compiler)?
|
|
16163
|
Which command is to compile C code without linking using gcc compiler?
|
|
16164
|
Which gcc flag is used to genarate debug information for any binary file?
|
|
16165
|
Which gcc flag is used to enable all Compiler warnings?
|
|
16166
|
Can we declare function inside structure of C Programming?
|
|
16167
|
Library function pow() belongs to which header file?
|
|
16168
|
Libray function getch() belongs to which header file?
|
|
16169
|
What is the following is invalid header file in C?
|
|
16170
|
The concept of two functions with same name is know as?
|
|
16171
|
What is the meaning of below lines? void sum (int, int);
|
|
16172
|
When C Language was invented?
|
|
16173
|
How many loops are there in C
|
|
16174
|
Which of the following is executed by Preprocess?
|
|
16175
|
Which programming language is more faster among these?
|
|
16176
|
Is the following statement a declaration or definition (extern int i;)
|
|
16177
|
Is it true that a function may have several declaration, but only one definition.
|
|
16178
|
What is sizeof() in C?
|
|
16179
|
How many main() function we can have in our project?
|
|
16180
|
Is it possible to run program without main() function?
|
|
16181
|
Which of the following statement is false?
|
|
16182
|
enum types are processed by _________
|
|
16183
|
Which of the data types has the size that is variable?
|
|
16184
|
Which is correct with respect to the size of the data types?
|
|
16185
|
What is short int in C programming?
|
|
16186
|
What is the size of an int data type?
|
|
16187
|
Which of the following is a User-defined data type?
|
|
16188
|
Which data type is most suitable for storing a number 65000 in a 32-bit system?
|
|
16189
|
The format identifier ‘%i’ is also used for _____ data type.
|
|
16190
|
Which of the following cannot be a variable name in C?
|
|
16191
|
Which of the following is true for variable names in C?
|
|
16192
|
Which of the following is not a valid C variable name?
|
|
16193
|
Variable name resolution (number of significant characters for the uniqueness of variable) depends on ___________
|
|
16194
|
All keywords in C are in ____________
|
|
16195
|
Why do variable names beginning with the underscore is not encouraged?
|
|
16196
|
Which of the following is not a valid variable name declaration?
|
|
16197
|
C99 standard guarantees uniqueness of ___________ characters for external names.
|
|
16198
|
C99 standard guarantees uniqueness of __________ characters for internal names.
|
|
16199
|
Choose the correct order from given below options for the calling function of the code “a = f1(23, 14) * f2(12/4) + f3();�
|
|
16200
|
Which of the following statement can be used to free the allocated memory?
|
|
16201
|
“Stderr†is a standard error.
|
|
16202
|
In the standard library of C programming language, which of the following header file is designed for basic mathematical operations?
|
|
16203
|
To store a word/sentence declare a variable of the type ‘string’.
|
|
16204
|
Are the expression ++*ptr and *ptr++ are same?
|
|
16205
|
For the array element a[i][j][k][2], determine the equivalent pointer expression.
|
|
16206
|
In a structure, if a variable works as a pointer then from the given below operators which operator is used for accessing data of the structure using the variable pointer?
|
|
16207
|
The return keyword is used for transfer control from a function back to the calling function.
|
|
16208
|
Are the expression &arr and arr different for an array of 15 integers?
|
|
16209
|
Which of the below statements using the name of an array does not yield the base address?
|
|
16210
|
Which of the following statements are correct about array in C?
|
|
16211
|
A pointer to a block of memory is effectively same as an array.
|
|
16212
|
In C, if we pass an array as an argument to a function, what actually get passed?
|
|
16213
|
A function can execute faster than a macro.
|
|
16214
|
Which header file is used for supporting the functions- malloc() and calloc().
|
|
16215
|
The C library function rewind() is used for re-position the file pointer at the beginning of the file.
|
|
16216
|
If two "return" statements are used in a function successively, the compiler will generate warnings.
|
|
16217
|
Functions can only be called either by value or reference.
|
|
16218
|
Which function disconnects the stream from a file pointer?
|
|
16219
|
hat is the value returned by strcmp() function when two strings are the equal?
|
|
16220
|
What is the purpose of using fflush() function?
|
|
16221
|
Which library function can change an unsigned long integer to a string?
|
|
16222
|
Which keyword is used to transfer control from a function back to the calling function?
|
|
16223
|
What is the built-in library function for adjusting the allocated dynamic memory size.
|
|
16224
|
Which function finds the first occurrence of a substring in another string?
|
|
16225
|
What is passed when we pass an array as a function argument?
|
|
16226
|
What is the built-in library function for comparing the two strings?
|
|
16227
|
Can we use switch statement to switch on strings in C?
|
|
16228
|
Which of the following statements are correct about for loop in C-program?
|
|
16229
|
A char variable can store either a Unicode character or an ASCII character.
|
|
16230
|
A long integer is at least 32 bits wide and a short integer is at least 16 bits wide
|
|
16231
|
The break statement is used to take control out of switch and continue statement is used to take control of the beginning of the switch?
|
|
16232
|
If scanf() statement is used for storing a value in char variable, then along with the value a carriage return (\r) also gets stored.
|
|
16233
|
Which statement is correct about the below program? #include<stdio.h> int main() { int i = 8, j = 24; if(i = 8) && if(j = 24) printf("Welcome Programmer"); return 0; }
|
|
16234
|
How many times while loop is executed if a short int is 2 byte wide?
|
|
16235
|
How many times "javaTpoint" is printed?
|
|
16236
|
Which data type cannot be checked in switch-case statement?
|
|
16237
|
How would you round off a value from 1.66 to 2.0?
|
|
16238
|
A character variable can store ___ character(s) at a time.
|
|
16239
|
The C variables are case insensitive.
|
|
16240
|
Who is known as the founder of C language?
|
|
16241
|
What is the correct value returned to the operating system upon successful completion of a program?
|
|
16242
|
Which of the following is true about C Programming?
|
|
16243
|
The types of linkages in C programming language are:
|
|
16244
|
Which operator can be used for accessing the value stored at address of a pointer variable?
|
|
16245
|
What is the data type of "PI" for the below statement: (#define PI 3.141)
|
|
16246
|
Single line comment in C language begins with _______
|
|
16247
|
Which header file is used to define input/output functions, macros and prototypes?
|
|
16248
|
Which of the following are declarations?
|
|
16249
|
The statement used for printing \n on the screen is:
|
|
16250
|
What are the various types of real data type in C language?
|
|
16251
|
In a library of C programming language, which of the following header file is used for performing mathematical operations?
|
|
16252
|
Which of the following statement is used to free the allocated memory space for a program?
|
|
16253
|
Which of the following is a logical AND operator?
|
|
16254
|
The C compiler used for UNIX operating system is
|
|
16255
|
Which of the following is the first operating system developed using C programming language?
|
|
16256
|
What is the transaction used to import SAP-provided support packages into your system?
|
|
16257
|
This is not a key idea that provides the foundation for the SAP solution manager.
|
|
16258
|
This is not part of the solution implementation portion of SAP.
|
|
16259
|
This makes an enterprise services environment work, with a central set of tools that store the services and call those services when required by a business process.
|
|
16260
|
SAP offers this to help resolve the fragmented approach to governance, risk and compliance.
|
|
16261
|
"Velocity of response", meaning how quickly your organization can move in response to an event, is a part of which module?
|
|
16262
|
This allows you to explore market opportunities, reduce the costs of product development, manage your processes efficiently, integrate with suppliers and partners, and ensure product quality.
|
|
16263
|
This provides online interfaces that allow you to place orders, and then receive advance notices of when the orders will ship.
|
|
16264
|
This is not a main area of CRM functionality.
|
|
16265
|
This supports the people working in an enterprise. By providing those individuals with access to their own data and allowing managers to add data about employees.
|
|
16266
|
An open application environment (which means that you can use it with a variety of applications and technologies you might have obtained from different sources).
|
|
16267
|
Which of the following is used for reading tabular data ?
|
|
16268
|
Which of the following statement changes column name to h and f ?
|
|
16269
|
THREE SYSTEMS IN A SINGLE LANDSCAPE CAN HAVE DIFFERENT TRANSPORT DIRECTORIES
|
|
16270
|
Which of the following function takes an arbitrary number of arguments and concatenates them one by one into character strings.
|
|
16271
|
Data frames can be converted to a matrix by calling data
|
|
16272
|
IN SAP NETWEAVER AS ABAP+JAVA TWO DIFFERENT DATABASES ARE REQUIRED, ONE FOR ABAP, ANOTHER FOR JAVA.
|
|
16273
|
Which of the following is a true statement.
|
|
16274
|
WHICH OF THE FOLLOWING CONTANS A MESSAGE SERVER ?
|
|
16275
|
Which of the following code snippet will create a vector with NAs in it ?
|
|
16276
|
WHICH OF THE FOLLOWING DOES NOT COME UNDER /USR/SAP/TRANS
|
|
16277
|
Which of the following is used for generating sequences ?
|
|
16278
|
WHILE DOING SYSTEM COPY, YOU HAVE TO PRESERVE RFC DESTINATIONS (SM59), WHAT PROCEDURE WILL YOU FOLLOW -
|
|
16279
|
The _____ function returns a vector of the same size as x with the elements arranged in increasing order.
|
|
16280
|
Numbers in R programming are generally treated as _____ precision real numbers.
|
|
16281
|
COPYING OF ONE PACKAGE NAME TO ANOTHER PACKAGE NAME IS CALLED
|
|
16282
|
R programming language has how many atomic classes of objects ?
|
|
16283
|
WHICH OF THE FOLLOWING INFORMATIONS ABOUT TRANSPORTS REQUESTS NOT PRESENT IN COFILES?
|
|
16284
|
Collection of objects currently stored in R programming language is called as _____.
|
|
16285
|
IS IT POSSIBLE TO DEFINE MORE THAN ONE CONSOLIDATION AND DELIVERY ROUTES IN A TRANSPORT DOMAIN ?
|
|
16286
|
Which of the following can be used to display the names of the objects which are currently stored within R ?
|
|
16287
|
DEVELOPMENT CLASSES CONTAINS ____________?
|
|
16288
|
HE SYSTEMS IN A SYSTEM LANDSCAPE SHARE CUSTOMIZING AND REPOSITORY OBJECTS VIA ________ ?
|
|
16289
|
Which of the following is a correct statement
|
|
16290
|
IS IT POSSIBLE TO HAVE MULTIPLE LANDSCAPES IN ONE TRANSPORT DOMAIN ?
|
|
16291
|
ON SAP INSTALLATION WHICH OF THE FOLLOWING CLIENT/CLIENTS ARE CREATED BY DEFAULT?
|
|
16292
|
Which of the following is an invalid statement ?
|
|
16293
|
SAP SUPPORT PACKS CAN BE APPLIED TO WHICH TYPE OF LANDSCAPE?
|
|
16294
|
What action needs to be taken when Oracle returns an ORA-1653 error, failure to allocate an extent for a table in a specific tablespace?
|
|
16295
|
What are the 3 different Oracle database shutdown modes?
|
|
16296
|
What are the 3 different Oracle database startup modes?
|
|
16297
|
You were assigned to run an ABAP program with more than one selection screen as a background job. How do you supply input to the selection screen and run it as a back ground job?
|
|
16298
|
The entities that R creates and manipulates are known as _____.
|
|
16299
|
When a user sends a request to sap system via browser, web requests are first handled by?
|
|
16300
|
IDOC stands for
|
|
16301
|
Which of the following level, data from the separate client is kept separate from each other?
|
|
16302
|
Which of the following is used for Statistical analysis in R programming ?
|
|
16303
|
Analyse problem of system startup. Before anyone could login system stops.
|
|
16304
|
Advanced users can write _____ code to manipulate R objects directly.
|
|
16305
|
How many packages exist in R programming for statistics ?
|
|
16306
|
Copying of one package name to another package name is called
|
|
16307
|
Functions are defined using the _____ directive and are stored as R objects
|
|
16308
|
SAP backup parameters are stored in which profile?
|
|
16309
|
Tcode to view a parameter?
|
|
16310
|
Which of the following is correct in regard to R/3 repository
|
|
16311
|
_____ will divert all the subsequent output from the console to an external file.
|
|
16312
|
BW Support Package for Release 30B will be named according to which format?
|
|
16313
|
Which of the following is a wrong statement in R programming ?
|
|
16314
|
Which of the following is correct in regards to R/3 clients?
|
|
16315
|
Which of the following is a true statement ?
|
|
16316
|
SAP was founded in which year?
|
|
16317
|
What is the scheduler that checks the job scheduling table in the databases that are waiting for processing and transfer them to the free background work process in accordance with their priority?
|
|
16318
|
What is the full form of sscr?
|
|
16319
|
Tcode to import the client.
|
|
16320
|
Which of the following is apply function in R programming language ?
|
|
16321
|
Select INVALID type of instance.
|
|
16322
|
The _____ function is a kind of "constructor function" that can be used to construct other functions.
|
|
16323
|
When creating a logon group for Logon Load Balancing, which of the following CANNOT be specified?
|
|
16324
|
What is the transaction used to import SAP-provided support packages into your system.
|
|
16325
|
The _____ for R are the main feature that make it different from the original S language.
|
|
16326
|
Given and R/3 Central Instance with all services installed, using Instance ID01, and having the SAP ID of C11. What is the name of the directory where the work process trace files are written (for Windows NT replace the "/" with "\")?
|
|
16327
|
Which program is used for taking backup of SAP system when connected to DataProtector backup tool?
|
|
16328
|
Which layer in a SAP client server architecture processes ABAP programs?
|
|
16329
|
Parallel Processing in case of Client Copy is
|
|
16330
|
Which of the following statements are correct in regards to modifications.
|
|
16331
|
The Customizing Client should have the option in SCC4 as
|
|
16332
|
Before releasing a change request, the following tasks should be completed
|
|
16333
|
Development classes contains ____________?
|
|
16334
|
Water which enters xylem cells, increase cell's
|
|
16335
|
Warnings are generated by the function _____.
|
|
16336
|
In order to execute query, which of the following authorization object access is mandate in BW?
|
|
16337
|
If special characters are not defined in transaction RSKC in BW then:
|
|
16338
|
Point out the correct statement from the following.
|
|
16339
|
Which of the following is correct about SAP BW Statistics?
|
|
16340
|
What are the architecture of SAP BW system and its components?
|
|
16341
|
Which of the following should be preferred for evaluation from list of alternatives ?
|
|
16342
|
Which of the following is used to break the execution of a loop in R programming ?
|
|
16343
|
Which statement(s) is/are true about Multiproviders?
|
|
16344
|
Point out the correct statement from the following.
|
|
16345
|
What should you do after an InfoCube is converted to be in-memory optimized?
|
|
16346
|
Select the correct statements about ODS settings.
|
|
16347
|
Which of the following syntax is correct for while loop in R programming language ?
|
|
16348
|
A setup table is basically a....
|
|
16349
|
Using BI accelerator the query performance can be boosted by
|
|
16350
|
In SAP BW/BI what are the main areas and activities?
|
|
16351
|
The following statements are not true about navigational attributes
|
|
16352
|
Which of the following is a correct statement ?
|
|
16353
|
The following statements are true for an info cube.
|
|
16354
|
Which of the following is correct about SAP BW Statistics?
|
|
16355
|
Connections to text files can be created with the function _____.
|
|
16356
|
Where can data transformation cannot take place in BW?
|
|
16357
|
Which of the following is correct about Profile Generator?
|
|
16358
|
Which of the following opens a connection to a file compressed with gzip.
|
|
16359
|
Which of the following tools helps in the Web reporting area?
|
|
16360
|
Individual R objects can be saved to a file using the _____ function.
|
|
16361
|
Select the true statement(s) about info sources:
|
|
16362
|
Which of the following code would read 100 rows ?
|
|
16363
|
What is the primary purpose of having multi-dimensional data models?
|
|
16364
|
The following statements is not true for compounded info objects.
|
|
16365
|
The structure of the PSA table created for an info source will be
|
|
16366
|
Point out the true statement from the following.
|
|
16367
|
A combination of characteristics and key figures can be displayed in any desired order by
|
|
16368
|
Which of the following statement will load the objects to the file named "mydata.RData" ?
|
|
16369
|
In BW, special characters are not permitted unless it has been defined using this transaction
|
|
16370
|
Point out the correct statement from the following ?
|
|
16371
|
Select the true statement(s) about read modes in BW:
|
|
16372
|
Which of the following function is identical to read.table ?
|
|
16373
|
What is the transaction code RSBBS to be used for?
|
|
16374
|
In SAP BW, which of the following is not an available option to perform data load from flat file?
|
|
16375
|
Which of the following statement would read file foo.txt ?
|
|
16376
|
Which of the following is a correct statement ?
|
|
16377
|
Which of the following is used for outputting a textual representation of an R object ?
|
|
16378
|
What is the Trusted RFC connection type to specify connection between ABAP systems?
|
|
16379
|
Which of the following is a wrong statement ?
|
|
16380
|
A Transport request consist of which of the following files?
|
|
16381
|
Which of the following argument denotes if the file has a header line ?
|
|
16382
|
Which of the following is used for reading in saved workspaces ?
|
|
16383
|
Which of the following represents a standard format of a Transport request?
|
|
16384
|
Which of the following client should be used to configure STMS?
|
|
16385
|
Which of the following is not a valid job status in job overview tab?
|
|
16386
|
Which of the following job class should be used for urgent or critical task?
|
|
16387
|
Which of the following will start the R program ?
|
|
16388
|
You can have multiple landscapes in one transport domain?
|
|
16389
|
Command lines entered at the console are limited to about ________ bytes.
|
|
16390
|
Which of the following user type in SAP system is used for interactive system access from GUI?
|
|
16391
|
In SAP system, you can create multiple clients on a single instance. It also provides data security as one user will client can’t see data of other user and also there is no need to install the software again?
|
|
16392
|
Elementary commands in R consist of either _______ or assignments.
|
|
16393
|
Advanced users can write ___ code to manipulate R objects directly.
|
|
16394
|
Which of the following Transaction code is used to send messages to users who are logged in and new users logging to the client?
|
|
16395
|
Which of the following is “Recommended†package in R ?
|
|
16396
|
The _________ database is used by SQL Server Agent for scheduling alerts and jobs, and recording operators.
|
|
16397
|
______________ is schematic drawing used for representing relationships in database.
|
|
16398
|
Which of the following is not a database object?
|
|
16399
|
Which of the following is used to build sql statements without writing code?
|
|
16400
|
Which menu is used to restore windows to their original locations?
|
|
16401
|
__________menu allows user to set up some keyboard shortcuts.
|
|
16402
|
Which of the following shortcut is used to clear all bookmarks?
|
|
16403
|
Ctrl+K+K shortcut refers to ___________
|
|
16404
|
Point out the wrong statement :
|
|
16405
|
In 2004, ________ purchased the S language from Lucent for $2 million.
|
|
16406
|
If commands are stored in an external file, say commands.R in the working directory work, they may be executed at any time in an R session with the command :
|
|
16407
|
Files containing R scripts ends with extension :
|
|
16408
|
Which of the following code will print NULL?
|
|
16409
|
You can check to see whether an R object is NULL with the _________ function.
|
|
16410
|
Point out the wrong statement?
|
|
16411
|
The __________ function returns a list of all the formal arguments of a function.
|
|
16412
|
Point out the correct statement?
|
|
16413
|
R functionality is divided into a number of ________
|
|
16414
|
R is technically much closer to the Scheme language than it is to the original _____ language.
|
|
16415
|
Finally, in _________ R version 1.0.0 was released to the public.
|
|
16416
|
In 1991, R was created by Ross Ihaka and Robert Gentleman in the Department of Statistics at the University of _________.
|
|
16417
|
_____ programming language is a dialect of S.
|
|
16418
|
_______ is used to skip an iteration of a loop.
|
|
16419
|
_________ initiates an infinite loop right from the start.
|
|
16420
|
Which of the following sort dataframe by the order of the elements in B
|
|
16421
|
Which of the following finds the maximum value in the vector x, exclude missing values
|
|
16422
|
How many control statements are present in R?
|
|
16423
|
_________and_________ are types of matrices functions?
|
|
16424
|
How many types of vertices functions are peresent?
|
|
16425
|
How many types of atomic vectors are present?
|
|
16426
|
Vectors come in two parts_____ and _____
|
|
16427
|
The ____________ in R is a vector.
|
|
16428
|
In R every operation has a ______call?
|
|
16429
|
Which function is used to create the vector with more than one element?
|
|
16430
|
Which of the following is a primary tool for debugging?
|
|
16431
|
How many types of data types are present in R?
|
|
16432
|
How many types of R objects are present in R data type?
|
|
16433
|
Descriptive analysis tell about________?
|
|
16434
|
How many steps does the predictive analysis process contained?
|
|
16435
|
___________ is used to make predictions about unknown future events?
|
|
16436
|
Predictive analysis is the branch of __________analysis?
|
|
16437
|
Constant
|
|
16438
|
In AngularJS data binding is __________.
|
|
16439
|
Elements of AngularJS MVC views are rendered in which order?
|
|
16440
|
In AngularJS, what is $scope variable used for?
|
|
16441
|
How to include HTML content into another HTML ?
|
|
16442
|
What is the purpose of $destroy method in AngularJS?
|
|
16443
|
AngularJS can show and hide HTML depending on the state of data in the model by using which of the following AngularJs directives ?
|
|
16444
|
AngularJS extends HTML _______________ ?
|
|
16445
|
What is the use of $scope variable in AngularJS ?
|
|
16446
|
Which of the following service is used to handle uncaught exceptions in AngularJS?
|
|
16447
|
Which of the following service is used to retrieve or submit data to the remote server?
|
|
16448
|
What is the parent of $scope in AngualarJS?
|
|
16449
|
In AngularJS which of the following controller take single parameter.?
|
|
16450
|
AngulsrJS directives can be applied to which of the following types ?
|
|
16451
|
Which of the following service modes can be easiest to test while using AngularJS?
|
|
16452
|
In context of AngularJS, what does SPA stand for?
|
|
16453
|
Which of the following is not a valid AngularJS Directives?
|
|
16454
|
In AngularJs which feature is available for Navigation
|
|
16455
|
In AngularJS how to manually start up an AngularJS application ?
|
|
16456
|
Which of the following is validation css class in AngularJS
|
|
16457
|
Which of the following provider can be used to configure routes?
|
|
16458
|
Which of the following module is required for routing?
|
|
16459
|
What is the correct syntax for a variable “a†in AngularJS?
|
|
16460
|
AngularJS application is composition of which of the following___________ ?
|
|
16461
|
_______ AngularJS directive is used to add or remove HTML elements from the DOM based on data in the model.?
|
|
16462
|
Which Directive is used to define and link an AngularJS application to HTML.?
|
|
16463
|
What is AngularJS?
|
|
16464
|
What is AngularJS ?
|
|
16465
|
AngularJS is based on which of the following pattern.?
|
|
16466
|
AngularJS initial release date ?
|
|
16467
|
Who is Inventor of AngularJS?
|
|
16468
|
AngularJS is the library of
|
|
16469
|
AngularJS applications are built around a design pattern called ______
|
|
16470
|
Who is the creator of AngularJS?
|
|
16471
|
Which of the following is component of AngularJS
|
|
16472
|
AngularJS is perfect for ______
|
|
16473
|
AngularJS extends HTML attributes with _____
|
|
16474
|
AngularJS binds data to HTML with ______.
|
|
16475
|
Which of the following is not the valid AngularJS directive?
|
|
16476
|
Which directive defines an AngularJS application?
|
|
16477
|
Which directive binds the value of HTML controls (input, select, textarea) to application data?
|
|
16478
|
Which directive binds application data to the HTML view?
|
|
16479
|
Which directive binds the value of the input field to the application variable name?
|
|
16480
|
Which directive binds the innerHTML of the element to the application variable?
|
|
16481
|
Which directive initializeAngularJS application variables?
|
|
16482
|
AngularJS expressions bind AngularJS data to HTML the same way as the ______ directive.
|
|
16483
|
Which is the correct syntax of creating AngularJS application module?
|
|
16484
|
Which is the correct syntax of creating AngularJS Controller?
|
|
16485
|
Which directive will auto-bootstrap (automatically initialize) the application when a web page is loaded?
|
|
16486
|
Which directive can also provide type validation for application data (number, email, required)?
|
|
16487
|
Which directive can also provide status for application data (invalid, dirty, touched, error)?
|
|
16488
|
Which directive can provide CSS classes for HTML elements?
|
|
16489
|
Which directive can bind HTML elements to HTML forms?
|
|
16490
|
Which directive clones HTML elements once for each item in a collection (in an array)?
|
|
16491
|
The argument to the controller function is called _____
|
|
16492
|
What is controller in MVC?
|
|
16493
|
Which of the following is true about $dirty flag?
|
|
16494
|
Which of the following is true about $invalid flag?
|
|
16495
|
config phase is the phase during which AngularJS bootstraps itself.
|
|
16496
|
Scope act as glue between controller and view.
|
|
16497
|
AngularJS uses dependency injection and make use of separation of concerns.
|
|
16498
|
ng-init directive can be used to put values to the variables to be used in the application.
|
|
16499
|
In controllers, model data is not accessed via $scope object.
|
|
16500
|
AngularJS applications can run on all major browsers and smart phones including Android and iOS based phones/tablets.
|
|
16501
|
AngularJS Expressions are used to bind application data to html
|
|
16502
|
In AngularJS, Scope contains the model data.
|
|
16503
|
What is Model in MVC?
|
|
16504
|
Which of the following is true about $routeProvider?
|
|
16505
|
Which of the following is true about ng-controller directive?
|
|
16506
|
Which of the following is true about AngularJS expressions?
|
|
16507
|
Which of the following is not a core AngularJSdirective.
|
|
16508
|
How angular.module works?
|
|
16509
|
On which of the following types of component can we create a custom directive?
|
|
16510
|
What is View in MVC?
|
|
16511
|
Which of the following is true about AngularJS?
|
|
16512
|
What happens when page containing AngularJS based Application loads.
|
|
16513
|
What are the services in AngularJS?
|
|
16514
|
What is jqLite?
|
|
16515
|
What is the purpose of angular.module in AngularJS?
|
|
16516
|
Which is the right format for calling a ng-bind function?
|
|
16517
|
Which of the following is true about ng-app directive?
|
|
16518
|
Which of the following is true about orderby filter?
|
|
16519
|
Can AngularJS be used to create a service?
|
|
16520
|
Directives can be applied to which all element type?
|
|
16521
|
What MVC stands for?
|
|
16522
|
What is the purpose of $http?
|
|
16523
|
The _______ directive is used if you want to add or remove HTML elements from the DOM based on data in the model.
|
|
16524
|
Which of the following is true about
|
|
16525
|
Which of the following is valid for AngualarJS module
|
|
16526
|
Which of the following is true about AngularJS service?
|
|
16527
|
What is MVC (Mode View Controller)?
|
|
16528
|
How to include HTML content into another HTML?
|
|
16529
|
Who is sometimes called as Father of AngularJS?
|
|
16530
|
AngularJS applications are a mix of _____
|
|
16531
|
What is Angular Js?
|
|
16532
|
AngularJS is based on the _____ pattern
|
|
16533
|
Which is/are the characteristics of scope object?
|
|
16534
|
A controller is a JavaScript object containing ___
|
|
16535
|
Controller, which is the JavaScript function that ___ the data?
|
|
16536
|
Which statement is true about scope in AngularJS?
|
|
16537
|
Which of the following service(s) will be invoked by the controller?
|
|
16538
|
Scope contains the ___?
|
|
16539
|
Which is the correct syntax of creating AngularJs controller?
|
|
16540
|
$rootScope is created with ___
|
|
16541
|
In larger applications,controllers are stored in ___?
|
|
16542
|
Whichdirectives bind the input fields to the controller properties?
|
|
16543
|
Which directive defines the application controller?
|
|
16544
|
AngularJS controllers control ___of AngularJS applications.
|
|
16545
|
$rootScoperefers to an object which is accessible from everywhereof theapplication.
|
|
16546
|
Controller is the link between the model and views.
|
|
16547
|
AngularJS 1.0 was released in 2013.
|
|
16548
|
Scope act as glue between controller and view.
|
|
16549
|
AngularJS needs data in JSON format to populate its model.
|
|
16550
|
Can '$scope' be injected while creating service using 'factory' method?
|
|
16551
|
Which angular function is used to wrap a raw DOM element or HTML string as a jQuery element?
|
|
16552
|
Which angular module is loaded by default?
|
|
16553
|
Which API need to be invoked on the rootScope service to get the child scopes?
|
|
16554
|
angular.module is primarily used to create application module.
|
|
16555
|
Directives can be applied to which all element type?
|
|
16556
|
At framework level, how does Angular retrieve the matching elements for processing?
|
|
16557
|
filter filter is applied to an expression using pipe character.
|
|
16558
|
Can multiple angular applications be bootstrapped using same element??
|
|
16559
|
Which components can be injected as a dependency in AngularJS?
|
|
16560
|
What angular function is used to manually start up an angular application?
|
|
16561
|
What are various possible ways in which angular application can be initialized?
|
|
16562
|
What are various possible prefixes such as 'ng-' using which Angular directives (for example, ng-app) can be defined?
|
|
16563
|
Can angular applications (ng-app) be nested within each other?
|
|
16564
|
With more than one ng-app in an HTML document (an HTML page), are all of them automatically initialized?
|
|
16565
|
Can an HTML page have multiple “ng-app†directive for bootstrapping multiple AngularJS application?
|
|
16566
|
An Angular application can be initialized on ______?
|
|
16567
|
AngularJS is an MVC based framework?
|
|
16568
|
Angular initializes based upon which of the following scenario?
|
|
16569
|
AngularJS bootstraps itself during config phase.
|
|
16570
|
AngularJS expressions are written using.
|
|
16571
|
AngularJS supports two-way data binding?
|
|
16572
|
ng-app directive defines and links an AngularJS application to HTML.
|
|
16573
|
Which of the following directive is used to initialize an angular app?
|
|
16574
|
Which of the following is true about ng-init directive?
|
|
16575
|
Who is sometimes called as Father of AngularJS?
|
|
16576
|
AngularJS is a library?
|
|
16577
|
The . . . . . directive is used if you want to add or remove HTML elements from the DOM based on data in the model.
|
|
16578
|
AngularJS can show or hide HTML depending on the state of data in the model. You do so using a set of AngularJS directives such as . . . . . . which are created specifically for that purpose.
|
|
16579
|
If the data obtained from the model contains HTML elements, these are escaped before being inserted into the HTML template. The escaping means that the HTML is displayed as text, and not as HTML. This is done to prevent . .
|
|
16580
|
You cannot use AngularJS directives to tell AnguluarJS how to mix the data into the HTML template.
|
|
16581
|
First the HTML document is loaded into the browser, and evaluated by the browser. At this time the AngularJS . . . . . . .
|
|
16582
|
The . . . . . . directive is one of the most fundamental directives in AngujarJS. The . . . . . directive inserts the result of an expression into the HTML template.
|
|
16583
|
There is a controller which takes single parameter. We call it . . . . . parameter.
|
|
16584
|
We need to tell AngularJS what part of our HTML page contains the AngularJS app. You do so by adding the . . . . attribute to the root HTML element of the AngularJS app.
|
|
16585
|
AngularJS applications are a mix of . . . . . .
|
|
16586
|
AngularJS is based on the . . . . . . pattern.
|
|
16587
|
Router is part of which of the following module?
|
|
16588
|
Router is part of @angular/core?
|
|
16589
|
Which of the following is not a hook application life cycle?
|
|
16590
|
What does AOT stand for?
|
|
16591
|
How Observables are Used?
|
|
16592
|
RxJS can be used for?
|
|
16593
|
Which character is used for chaining multiple pipes?
|
|
16594
|
Which angular decorator allows us to define the pipe name that is globally available for use in any template in the across application?
|
|
16595
|
What is the decorator used for configuring your module class?
|
|
16596
|
Which of the following is correct about TypeScript?
|
|
16597
|
Who is sometimes called as father of Angularjs?
|
|
16598
|
<?php $a=122; $b=13.1; $c=$a+$b; $d=$a.$c; echo $d; ?>
|
|
16599
|
<?php $numb = 0; while ( $numb <= 10 ){ if ($numb % 2 == 0){ echo "{$numb} Even . "; }else{ echo "{$numb} Odd . "; } $numb++; } ?>
|
|
16600
|
<?php function simple_interest ( $principal , $rate , $time){ $result = $principal * $rate * $time / 100; echo $result; return $result; } simple_interest(2 , 2, 2)
|
|
16601
|
<?php $a=0; $b=0; for($i=0;$i<10;$i++) { if(++$a<5 || $b++<7){ } } echo $a." ".$b; ?>
|
|
16602
|
<?php $a=0; $b=0; for($i=0;$i<10;$i++) { if(++$a<5 && $b++<7){ } } echo $a." ".$b; ?>
|
|
16603
|
Which method is used to check the validation of a email address
|
|
16604
|
<?php $x = 4/5*3; $y = 1/.3; $x ^= $y; $y ^= $x; $x ^= $y; echo "$x, $y"; ?>
|
|
16605
|
<?php class cppbuzz { private $var; function __construct() { $var="cppbuzz"; } } $cppbuzz = new cppbuzz; echo $cppbuzz->var; ?>
|
|
16606
|
find the output of below code <?php class cppbuzz { public $var; function __construct() { return "cppbuzz"; } } $cppbuzz = new cppbuzz; echo $cppbuzz->var; ?>
|
|
16607
|
<?php class cppbuzz { public $var; function __construct($var) { $this->var = ""; } } $cppbuzz = new cppbuzz("cppbuzz"); echo $cppbuzz->var; ?>
|
|
16608
|
<?php class cppbuzz { public $var; function __construct() { $this->var = "cppbuzz"; } } $cppbuzz = new cppbuzz; echo $cppbuzz->var; ?>
|
|
16609
|
<?php function hello(){ echo "hello"; hello(); } hello(); ?>
|
|
16610
|
<?php $a = 5; switch($a){ case 5: echo "Sun"; case 6: echo "Moon"; default: echo "SunMoon"; } ?>
|
|
16611
|
<?php $a = 5; switch($a){ case 5: echo "Sun"; case 6: echo "Moon";break; default: echo "SunMoon"; } ?>
|
|
16612
|
<?php $a = 5; switch($a){ case 5: echo "Sun";break; case 6: echo "Moon";break; default: echo "SunMoon"; } ?>
|
|
16613
|
<?php $a = 5; echo "$a-$a"; ?>
|
|
16614
|
<?php $a = 5/3; echo "$a"; ?>
|
|
16615
|
Which of the following operators has highest precedence?
|
|
16616
|
<?php $a = 10+10*5+15/5; echo "$a"; ?>
|
|
16617
|
<?php if(1%1) echo "Sun"; echo "Moon"; ?>
|
|
16618
|
<?php function cppbuzz(){ return -1; } if(cppbuzz()) echo "Sun"; echo "Moon"; ?>
|
|
16619
|
<?php function cppbuzz(){ return 0; } if(cppbuzz()) echo "Sun"; echo "Moon"; ?>
|
|
16620
|
<?php if(0) echo "Sun"; echo "Moon"; ?>
|
|
16621
|
<?php if(1) echo "Sun"; echo "Moon"; ?>
|
|
16622
|
<?php if(0==0){ echo "Sun"; } else{ echo "Moon"; } ?>
|
|
16623
|
<?php if($a=0){ echo "Sun"; } else{ echo "Moon"; } ?>
|
|
16624
|
<?php function func($a = 50) { echo "a is : $a"; } func(); ?>
|
|
16625
|
<?php $arr = array(13, 14, 22, 11, -3); sort($arr); $arrLen = count($arr); for($x = 0; $x < $arrLen; $x++) { echo " ".$arr[$x]; } ?>
|
|
16626
|
<?php $cars=array("Maruti","Honda","BMW"); echo strlen($cars); ?>
|
|
16627
|
<?php $cars=array("Maruti","Honda","BMW"); echo strlen($cars[0]); ?>
|
|
16628
|
<?php $cars=array("Maruti","Honda","BMW"); echo sizeof($cars) + 1; ?>
|
|
16629
|
<?php $a = 0; if($a > 1 ); { echo "Sun"; } echo "Moon"; ?>
|
|
16630
|
<?php $a = 0; if($a = -1) { echo "Sun"; } else { echo "Moon"; } ?>
|
|
16631
|
<?php $a = 0; if($a = 0) { echo "Sun"; } else { echo "Moon"; } ?>
|
|
16632
|
<?php $a = 0; if($a) { echo "Sun"; } else { echo "Moon"; } ?>
|
|
16633
|
<?php $a = 10; $b = $a>2?"Hi":"Bye"; echo "$b"; ?>
|
|
16634
|
<?php $a = 10 + 10 * (2 + 3) / 3+ 1; echo "$a"; ?>
|
|
16635
|
<?php for($i=0; $i<=5; $i++){ if($i%2==0) echo "$i"; } ?>
|
|
16636
|
<?php for($i=0; $i<5; $i++){ $i = $i+1; } echo "$i"; ?>
|
|
16637
|
Find incorrect way of declaring variables:
|
|
16638
|
Find correct way of declaring variables:
|
|
16639
|
How many types of loops are supported in PHP?
|
|
16640
|
Is it possible to insert HTML code in PHP code?
|
|
16641
|
Which one the following comment is invalid in PHP?
|
|
16642
|
In PHP all variables must begin with a dollar sign character?
|
|
16643
|
Correct syntax to print "Hello" in PHP
|
|
16644
|
PHP is
|
|
16645
|
Which of the following feature is not provided by SSS 2008?
|
|
16646
|
Many quantitative analysts use R as their____tool?
|
|
16647
|
SMO in SQL Server stands for ___________
|
|
16648
|
R is an interpreted language so it can access through_____________?
|
|
16649
|
Packages are useful in collecting sets into a_____unit ?
|
|
16650
|
R was named partly after the first names of____R authors?
|
|
16651
|
Who developed R?
|
|
16652
|
R is an__________programming language?
|
|
16653
|
Which of the following pane option is not provided by Query Designer?
|
|
16654
|
Which of the following tool is used for designing schema of the database in SSMS?
|
|
16655
|
Which of the following is a database object?
|
|
16656
|
_________ is tool in SSMS used to manage multiple servers.
|
|
16657
|
Which command is used to reset default configuration in SSMS?
|
|
16658
|
_____________ is not available on standard toolbar.
|
|
16659
|
Which of the following shortcut is used for displaying error list?
|
|
16660
|
Template Explorer is used to manage ____________
|
|
16661
|
Which panel presents a list of objects under the selected node?
|
|
16662
|
Management Studio is ________ used for development of SQL Server database.
|
|
16663
|
Which was the first version of SQL Server to introduce in-memory capability?
|
|
16664
|
__________is the first true GUI-based database server.
|
|
16665
|
_________ is free database software running free SQL Server technology.
|
|
16666
|
LocalDB was introduced in which of the following versions of SQL Server?
|
|
16667
|
_________ is a software application first launched with the Microsoft SQL Server 2005.
|
|
16668
|
SQL Server 2005 has the following features?
|
|
16669
|
Codename for SQL Server 2012 is __________
|
|
16670
|
Which of the SQL Server RTM included native support for managing XML data?
|
|
16671
|
Which of the following companies originally worked together to create and market the first version of SQL Server?
|
|
16672
|
When was the first version of Microsoft SQL Server released?
|
|
16673
|
_________ function in VBA displays an input box.
|
|
16674
|
_____________ function in VBA displays a message.
|
|
16675
|
_______ function in VBA formats a number according to given text strings containing 0, # and comma (,).
|
|
16676
|
__________ function in VBA creates a custom error message.
|
|
16677
|
In VBA, CDec function converts String to type.
|
|
16678
|
In VBA, CLng function converts String to ________ type.
|
|
16679
|
In VBA, CCur function converts String to _______ type.
|
|
16680
|
In VBA, CByte function converts String to ______ type.
|
|
16681
|
In VBA, Val function converts String to type.
|
|
16682
|
In VBA, Csng function converts String to _________ type.
|
|
16683
|
In VBA, CInt function converts String to___________ type.
|
|
16684
|
CDbl function converts String to _________ type
|
|
16685
|
In VBA, Cstr function converts any data to ______________ type.
|
|
16686
|
In VBA, the function ChrW converts given numeric value to character value in system.
|
|
16687
|
In VBA, the function ChrB converts given numeric value to character value in system
|
|
16688
|
In VBA, the function Chr converts given numeric value to character value in system.
|
|
16689
|
In VBA, the function AscW converts given character value to numeric code in system
|
|
16690
|
In VBA, the function AscB converts given character value to numeric code in system.
|
|
16691
|
In VBA, the function Asc converts given character value to numeric code in system.
|
|
16692
|
__________ is the shortcut to display properties window in VBA IDE.
|
|
16693
|
________ is the shortcut to run a program in VBA IDE.
|
|
16694
|
___________ is the shortcut to display object browser in VBA IDE
|
|
16695
|
____________ is the shortcut to display help in VBA IDE.
|
|
16696
|
_______ is the shortcut to add breakpoint in VBA IDE.
|
|
16697
|
______________ is the shortcut to display parameter information for selected element in VBA IDE.
|
|
16698
|
_____________ is the shortcut to display project explorer in VBA IDE.
|
|
16699
|
____________ is the shortcut to properties and methods of a component in VBA IDE.
|
|
16700
|
___________ is the shortcut to display information relating to selected component in VBA IDE.
|
|
16701
|
_____________ is the shortcut to stop execution of programs in VBA IDE.
|
|
16702
|
_____________is the shortcut to open list of macros.
|
|
16703
|
__________is the shortcut to open immediate window in VBA IDE
|
|
16704
|
____________is the shortcut to open VBA IDE from MS Excel.
|
|
16705
|
_______________characters should not be used in VBA variable names
|
|
16706
|
Comment in VBA begins with character and continues till the end of that line
|
|
16707
|
MS Excel creates to execute VBA code.
|
|
16708
|
Excel file having VBA code is saved using the extension .
|
|
16709
|
VBA code is compiled into an intermediate code called code
|
|
16710
|
Which is called as a virtual table in SQL?
|
|
16711
|
In a sql subquery , which operator is used to check for existence of record ?
|
|
16712
|
VBA can be used to automate carried out through MS Excel.
|
|
16713
|
To combine the result-set of two or more SELECT statements, SQL clause used is
|
|
16714
|
Which clause is used to combine rows from two or more tables based on a related column between them.
|
|
16715
|
To search for a specified pattern in a column
|
|
16716
|
To specify the number of records to return, which keyword is used
|
|
16717
|
MS Office records macros in language
|
|
16718
|
Logical operators used in SQL are
|
|
16719
|
To give a temporary name to a table, or a column in a table for more readability, what is used?
|
|
16720
|
VBA supports through class module.
|
|
16721
|
In a table, a column contains duplicate value, if you want to list all different value only, then which SQL clause is used?
|
|
16722
|
If you want to allow age of a person > 18 in the column Age of table Person, then which constraint will be applied to AGE column.
|
|
16723
|
VBA supports ready made user interace components like .
|
|
16724
|
Correct syntax query syntax to drop a column from a table is
|
|
16725
|
VBA permits of data from spreadsheets.
|
|
16726
|
Wrong statement about ORDER BY keyword is
|
|
16727
|
Wrong statement about UPDATE keyword is
|
|
16728
|
GUI stands for .
|
|
16729
|
SQL Query to delete all rows in a table without deleting the table (structure, attributes, and indexes)
|
|
16730
|
RAD in the desing applications stands for
|
|
16731
|
In existing table, ALTER TABLE statement is used to
|
|
16732
|
Which is/are correct statements about primary key of a table?
|
|
16733
|
Which statement is wrong about PRIMARY KEY constraint in SQL?
|
|
16734
|
The IDE of VBA supports since it permits drag and drop approach for design of user interface.
|
|
16735
|
The programming environment which permits coding, compilation, running and debugging from a single window is called
|
|
16736
|
VBA has a coding, compilation, running and debugging environment called .
|
|
16737
|
Microsoft's Visual Basic language were launched early in
|
|
16738
|
Programming language used to simplify development of Microsoft Windows applications is
|
|
16739
|
Microsoft's object-oriented primary programming languages includes
|
|
16740
|
Can we create Spatial Index without Primary Key?
|
|
16741
|
How may clustered index are allowed per table?
|
|
16742
|
To save a VBA project with an Excel workbook, the workbook must be saved as what type of file?
|
|
16743
|
INSERT statement can be used insert data into following
|
|
16744
|
Choose the VBA code that will allow you to obtain information about an error.
|
|
16745
|
SQL Server can automatically provide values for followings
|
|
16746
|
Inner Joins are the default join type, so which of the following operator can be used for inner join?
|
|
16747
|
Which of these is not a Visual Basic object?
|
|
16748
|
Which of the following join uses maximum resources if there are large tables?
|
|
16749
|
To force all variables is a VBA project to be declared, which must be stated in a module?
|
|
16750
|
In case of full outer join Nulls are added to the unmatched rows on the following
|
|
16751
|
Is it possible to join Null values?
|
|
16752
|
To continue to run code even if a line of code causes an error, choose the VBA code to continue to the next line of code.
|
|
16753
|
Which of the following operator is used with NOT EXISTS functions to simulate Outer Join operation
|
|
16754
|
Current syntax for Delete Query
|
|
16755
|
What is the shortcut keystroke to debug VBA code one line at a time?
|
|
16756
|
Does delete statement maintains any lock on table?
|
|
16757
|
Index rebuild and index reorganize is one and the same thing in sql?
|
|
16758
|
Which of the following snippets of VBA code is not a loop?
|
|
16759
|
Which of the following SQL function is used to insert a string into another string?
|
|
16760
|
Which one of the following is also known as INNER JOIN?
|
|
16761
|
What does VBA mean?
|
|
16762
|
What does UNION operator do in a SQL statement?
|
|
16763
|
Which of the following would you begin a comment line with?
|
|
16764
|
What do you need to select to set the developer mode?
|
|
16765
|
How full-txt indexes are created?
|
|
16766
|
If any table has duplicate values in any column then that table is in First Normal form?
|
|
16767
|
A table is in BCNF if it is in 3NF and if every determinant is a following key
|
|
16768
|
What is the location of Temporary table?
|
|
16769
|
Visual Studio .NET provides which feature?
|
|
16770
|
Which one of the following is true when SQL connection is closed?
|
|
16771
|
Can we use table, column keyword to name any column?
|
|
16772
|
Tinyint data type can hold only positive values?
|
|
16773
|
The Rnd statement will generate a(n)?
|
|
16774
|
The Activated event is found only in which object?
|
|
16775
|
The Tick event is found only in which object?
|
|
16776
|
Which is not a common control event?
|
|
16777
|
In event-driven programming an event is generated by?
|
|
16778
|
Maximum number of characters a text data type can hold is?
|
|
16779
|
A click event procedure stud for the label control can be created by?
|
|
16780
|
What is default value of any column when it is missing or not known?
|
|
16781
|
The CancelButton property belongs to which object?
|
|
16782
|
What is true about Descending Order?
|
|
16783
|
The Button control can be activated?
|
|
16784
|
Which property determines whether a control is displayed to the user?
|
|
16785
|
Is there any limitation in adding number of conditions in a where clause?
|
|
16786
|
Which of the Order by query is correct one?
|
|
16787
|
Can we use ‘IN’ operator with Where clause?
|
|
16788
|
Correct syntax for Update Statement?
|
|
16789
|
Insert & Update both changes table's values. Can we use insert in place of update?
|
|
16790
|
Is it possible to user 'where' clause in an insert statement?
|
|
16791
|
Which one of the following is correct syntax for Insert Statement?
|
|
16792
|
Default size of n in a column which is defined as VARCHAR(n)?
|
|
16793
|
You can find a button which toggles between Record Macro and Stop Recording in the:
|
|
16794
|
To open the Visual Basic Editor with a key stroke, press:
|
|
16795
|
To run a macro with a single click, assign a:
|
|
16796
|
When you create a workbook from an Excel macro-enabled template, you must first click:
|
|
16797
|
Sql data type using for assigning GUID values?
|
|
16798
|
To run a macro that was recorded with relative references, you must first:
|
|
16799
|
Select the Range of TinyInt data type in SQL Server
|
|
16800
|
You can tell when an Excel template is macro-enabled by looking at its:
|
|
16801
|
In Visual Basic, each line preceded by an apostrophe and shown in green is a:
|
|
16802
|
A single workbook is called an object while more than one workbooks are called:
|
|
16803
|
As you record a macro, Excel converts your keystrokes into:
|
|
16804
|
The first key in a macro shortcut is always:
|
|
16805
|
What is the storage size of smallmoney data type in sql?
|
|
16806
|
Which data type is used to store binary data upto 2,147,483,647?
|
|
16807
|
Which of the following data type is/are used for Date & Time?
|
|
16808
|
Which of the following statement is correct about ‘CREATE TABLE’ command while creating a table?
|
|
16809
|
Which of the following command(s) is / are related to transaction control in SQL?
|
|
16810
|
Which of the following is true for TRUNCATE in SQL?
|
|
16811
|
Which of the following is the correct outcome of the SQL query below?
|
|
16812
|
Difference between a primary key and a unique key?
|
|
16813
|
Which of the following is true for a primary key?
|
|
16814
|
Which of the following is the correct order of occurrence in a typical SQL statement?
|
|
16815
|
A Candidate Key can be any column or a combination of columns that can qualify as unique key in database. There can be multiple Candidate Keys in one table. Each Candidate Key can qualify as Primary Key
|
|
16816
|
A Primary Key is a column or a combination of columns that uniquely identify a record. Only one Candidate Key can be Primary Key
|
|
16817
|
Indexes speed up SELECT's and slow down INSERT's
|
|
16818
|
Sql supports single line comment, which of the following is single line comment?
|
|
16819
|
To activate a file in a Personal Macro workbook, you must first:
|
|
16820
|
Why use Full Join in sql?
|
|
16821
|
Which of the following operator select a range of data between two values?
|
|
16822
|
Instead of typing the code or instructions in a macro program, you:
|
|
16823
|
Which operator is used to match text while search?
|
|
16824
|
Which of the following is not Constraint in SQL?
|
|
16825
|
The security warning bar does not open when you open a workbook with macros if you choose:
|
|
16826
|
How many Primary key a table can max have?
|
|
16827
|
You can check a workbook's macro security settings in:
|
|
16828
|
Macros must be saved in an Excel workbook with this extension:
|
|
16829
|
What is Default in VBA among the Following?
|
|
16830
|
What is the Use of OPTION EXPLICIT
|
|
16831
|
What happens when dollar signs ($) are entered in a cell address? (eg. $A$2:$A$10)
|
|
16832
|
VBA Object hierarchy?
|
|
16833
|
Difference between iserror and iserr
|
|
16834
|
Select methods that can be used to rename a sheet
|
|
16835
|
Declaration Make mandatory with the use of Option Implicit
|
|
16836
|
Private Procedure can be called from anywhere in the project
|
|
16837
|
In regard to MOVE-CORRESPONDING, which of the following is NOT a true statement?
|
|
16838
|
The lookup value must always be located in the first column of the lookup table
|
|
16839
|
Which data type cannot be used to define parameters?
|
|
16840
|
Which menu option can be used to split windows into two In Excel 2007?
|
|
16841
|
Which of the following statements is NOT true about a BAPI?
|
|
16842
|
What does the statement does? Application.Worksheets("Data").Range("1:10").EntireRow.Delete
|
|
16843
|
What would be the value of lv_char_len?
|
|
16844
|
What process is used to establish the automatic transport of data between the view controller's context-attributes and the UI element in its layout?
|
|
16845
|
Which event is used to navigate from basic list to secondary list?
|
|
16846
|
What is the basic object of data Dictionary
|
|
16847
|
What is the Syntax of VLOOKUP Function in Excel?
|
|
16848
|
What kind of component of a business object are BAPIs ?
|
|
16849
|
What are the ways to link LDB to executable program?
|
|
16850
|
TODAY() is Volatile functions?
|
|
16851
|
What are presentation and application servers in SAP?
|
|
16852
|
Which of the following is not a valid data type in Excel?
|
|
16853
|
In Inner and outer join
|
|
16854
|
How to Hide a Sheet using VBA code?
|
|
16855
|
How to define parameters as a data type?
|
|
16856
|
Which layer is NOT used in R/3 system?
|
|
16857
|
Search help cannot be attached to
|
|
16858
|
Data element is an example of
|
|
16859
|
Which attribute is invalid for a domain?
|
|
16860
|
What is Default in VBA among the following?
|
|
16861
|
The statement INITIALIZATION
|
|
16862
|
What are the data types in VBA?
|
|
16863
|
Sub query usually more efficient because
|
|
16864
|
Which of the properties in a control’s list of properties is used to give the control a meaningful name?
|
|
16865
|
What table is used to store all the Message Class Texts?
|
|
16866
|
A VBA unit is called a _____
|
|
16867
|
Data element is an example of
|
|
16868
|
Which of the following refers to computer code, in VBA, that performs some action on or with objects?
|
|
16869
|
Identify a layout that is not part of the Webdynpro Layout types
|
|
16870
|
In an ABAP program, which of the following Processing blocks are not allowed?
|
|
16871
|
When the user clicks a button, _________ is triggered.
|
|
16872
|
In regard to the INITIALIZATION event, which of the following is NOT a true statement?
|
|
16873
|
Which of the following VBA windows shows the code of the active object?
|
|
16874
|
VBA is:
|
|
16875
|
Which of the following is NOT a numeric data type?
|
|
16876
|
What is the difference between iserror and iserr?
|
|
16877
|
Which is the correct sequence of events?
|
|
16878
|
To change one or more lines of a database table, use ____.
|
|
16879
|
The Properties window plays an important role in the development of Visual Basic applications. It is mainly used
|
|
16880
|
In regard to Native SQL, which of the following is NOT a true statement?
|
|
16881
|
In an R/3 environment, where is the work of a dialog program performed?
|
|
16882
|
Which of these sentences most accurately describes the GET VBAK LATE. event?
|
|
16883
|
To create a list of the top 25 customers, you should use
|
|
16884
|
All of the following are considered to be valid ABAP modularization techniques except:
|
|
16885
|
What is output by the following code? DATA: BEGIN OF itab OCCURS 0, letter type c, END OF itab. itab-letter = 'A'. APPEND itab. itab-letter = 'B'. APPEND itab. itab-letter = 'C'. APPEND itab. itab-letter = 'D'. APPEND itab. LOOP AT itab. SY-TABIX = 2. WRITE itab-letter. EXIT. ENDLOOP.
|
|
16886
|
To summarize the contents of several matching lines into a single line, use this SELECT statement clause.
|
|
16887
|
If this code results in an error, the remedy is SELECT * FROM tab1 WHERE fld3 = pfld3. WRITE: /1 tab1-fld1, tab1-fld2. ENDSELECT.
|
|
16888
|
he output for the following code will be report zabaprg. DATA: my_field type I value 99. my_field = my_field + 1. clear my_field. WRITE: 'The value is', my_field left-justified.
|
|
16889
|
After adding rows to an internal table with COLLECT, you should avoid adding More rows with APPEND.
|
|
16890
|
To both add or change lines of a database table, use ____.
|
|
16891
|
Page headers for a secondary/details list can be coded in the event:
|
|
16892
|
Page footers are coded in the event:
|
|
16893
|
A BDC program is used for all of the following except:
|
|
16894
|
A select statement has built-in authorization checks.
|
|
16895
|
Which of the following is NOT a component of the default standard ABAP report header?
|
|
16896
|
The following code indicates write: /5 'I Love ABAP'.
|
|
16897
|
Given: DO. Write: /1 'E equals MC squared.'. ENDDO. This will result in ____.
|
|
16898
|
To call a local subroutine named calculate answer, use this line of code:
|
|
16899
|
Which of these is NOT a valid type of function module?
|
|
16900
|
Within the source code of a function module, errors are handled via the keyword:
|
|
16901
|
This data type has a default length of eight and a default value = '00000000'.
|
|
16902
|
Function module source code may not call a subroutine.
|
|
16903
|
After a DESCRIBE TABLE statement SY-TFILL will contain
|
|
16904
|
The following code indicates: CALL SCREEN 9000 STARTING AT 10 5 ENDING AT 60 20
|
|
16905
|
Which of the following is NOT a true statement in regard to a sorted internal table type?
|
|
16906
|
To place a checkbox on a list, use
|
|
16907
|
The following code indicates: SELECT fld1 FROM tab1 INTO TABLE itab UP TO 100 ROWS WHERE fld7 = pfld7.
|
|
16908
|
In regard to the code below, which of the following is not a true statement? TABLES: KNA1. GET KNA1. Write: /1 kna1-kunnr. END-OF-SELECTION.
|
|
16909
|
True or false: Mobile devices can require a location as an authentication factor to access certain assets.
|
|
16910
|
Which authentication technology identifies users by relying on mobile carrier technology?
|
|
16911
|
To prevent duplicate accesses to a master data field:
|
|
16912
|
Which of the following biometric authentication factors isn't supported by mainstream mobile devices?
|
|
16913
|
This data type has a default length of one and a default value = '0'.
|
|
16914
|
In relation to an internal table as a formal parameter, because of the STRUCTURE syntax, it is possible to:
|
|
16915
|
Which of the following is a benefit of an on-device mobile authenticator app?
|
|
16916
|
Which of the following would be stored in a table as master data?
|
|
16917
|
The following code indicates: CALL SCREEN 300.
|
|
16918
|
The following statement will result in a syntax error. DATA: price(3) type p decimals 2 value '100.23'.
|
|
16919
|
Which of the following is a potential drawback of MFA on mobile devices?
|
|
16920
|
Given: PERFORM subroutine USING var. The var field is known as what type of parameter?
|
|
16921
|
Which of the following is not a category of authentication?
|
|
16922
|
Page headers for a secondary list should be coded in which event?
|
|
16923
|
Which ABAP program attribute provides access protection?
|
|
16924
|
What standard data type is the following user-defined type? TYPES: user_type.
|
|
16925
|
The SAP service that ensures data integrity by handling locking is called:
|
|
16926
|
Tools used to hack mobile devices are not expensive.
|
|
16927
|
The order in which an event appears in the ABAP code determines when the event is processed.
|
|
16928
|
One of the best security principles used to safeguard mobile devices is to maintain the default password it comes with.
|
|
16929
|
Hacking mobile devices is very complicated and difficult, therefore there is no reason to be cautious
|
|
16930
|
In regard to the START-OF-SELECTION event, which of the following is a true statement?
|
|
16931
|
Studies show that Bluetooth enabled phones can be hacked in 10 seconds
|
|
16932
|
Errors to be handled by the calling program are defined in a function module's ____.
|
|
16933
|
To stay safe while using your mobile device you should do which one of the following
|
|
16934
|
In regard to a function group, which of the following is NOT a true statement?
|
|
16935
|
All of the following pertain to interactive reporting in ABAP except:
|
|
16936
|
When writing a SELECT statement, you should place as much load as possible on the database server and minimize the load on the application server.
|
|
16937
|
If a table contains many duplicate values for a field, minimize the number of records returned by using this SELECT statement addition.
|
|
16938
|
The following code reorders the rows so that: DATA: itab LIKE kna1 OCCURS 0 WITH HEADER LINE. itab-name1 = 'Smith'. itab-ort01 = 'Miami'. APPEND itab. itab-name1 = 'Jones'. itab-ort01 = 'Chicago'. APPEND itab. itab-name1 = 'Brown'. itab-ort01 = 'New York'. APPEND itab. SORT itab BY name1 ort01.
|
|
16939
|
The following code indicates: SELECTION-SCREEN BEGIN OF BLOCK B1. PARAMETERS: myparam(10) type C, Myparam2(10) type N, SELECTION-SCREEN END OF BLOCK.
|
|
16940
|
Which table type would be most appropriate for accessing table rows using an index.
|
|
16941
|
To remove lines from a database table, use ____.
|
|
16942
|
To read an exact row number of an internal table, use this parameter of the READ TABLE statement.
|
|
16943
|
The ABAP keyword for adding authorizations to a program is ____.
|
|
16944
|
In regard to MOVE-CORRESPONDING, which of the following is NOT a true statement?
|
|
16945
|
To select one record for a matching primary key, use ____.
|
|
16946
|
Adding a COMMIT WORK statement between SELECT_ENDSELECT is a good method for improving performance.
|
|
16947
|
If itab contains 20 rows, what will SY-TABIX equal when the program reaches the WRITE statement below? SY-TABIX = 10. LOOP AT itab. count_field = count_field + 1. ENDLOOP. WRITE: /1 count_field.
|
|
16948
|
When modifying an internal table within LOOP AT itab. _ ENDLOOP. you must include an index number.
|
|
16949
|
You can define your own key fields when declaring an internal table.
|
|
16950
|
What will be output by the following code? DATA: BEGIN OF itab OCCURS 0, fval type i, END OF itab. itab-fval = 1. APPEND itab. itab-fval = 2. APPEND itab. REFRESH itab. WRITE: /1 itab-fval.
|
|
16951
|
o allow the user to enter a single value on a selection screen, use the ABAP keyword ____.
|
|
16952
|
What will be output by the code below? DATA: alph type I value 3. write: alph. WHILE alph > 2. write: alph. alph = alph - 1. ENDWHILE.
|
|
16953
|
In regard to the three-tier client/server architecture, which of the following is a true statement?
|
|
16954
|
The business (non-technical) definition of a table field is determined by the field's ____.
|
|
16955
|
The event AT SELECTION-SCREEN OUTPUT. occurs before the selection screen is displayed and is the best event for assigning default values to selection criteria.
|
|
16956
|
In regard to the INITIALIZATION event, which of the following is NOT a true statement?
|
|
16957
|
The field declared below is of what data type? DATA: new_fld(25).
|
|
16958
|
The event that is processed after all data has been read but before the list is displayed is:
|
|
16959
|
A DO loop increments the system field ____.
|
|
16960
|
The editor function that formats and indents the lines of code automatically is called ____.
|
|
16961
|
Around 70% of the cyberattacks happen at which layer?
|
|
16962
|
In a line of code, text-100, is an example of which type of text element?
|
|
16963
|
Which of the following may NOT be modified using the ABAP Dictionary transaction?
|
|
16964
|
What size of companies are more likely to be exploited?
|
|
16965
|
All of these allow you to step through the flow of a program line-by-line except:
|
|
16966
|
What is the highest loss component attributed to data breaches?
|
|
16967
|
If a field, NAME1, is declared as a global data object, what will be output by the following code? report zabaprg. DATA: name1 like KNA1-NAME1 value 'ABAP programmer'. name1 = 'Customer name'. CLEAR name1. perform write_name. FORM write_name. name1 = 'Material number'. WRITE name1. ENDFORM.
|
|
16968
|
How do security professionals rate their management’s application security outlook?
|
|
16969
|
A DATA statement may appear only at the top of a program, before START-OFSELECTION.
|
|
16970
|
This data type has a default length of one and a blank default value.
|
|
16971
|
How many malware exist?
|
|
16972
|
What is the top vulnerability leading to data breaches?
|
|
16973
|
On an average, how many days financial companies take to fix found vulnerabilities?
|
|
16974
|
What is the cost of carrying out an application DDoS attack on an average website?
|
|
16975
|
Your web application allows users to download their account statements in PDF format. What is the most secure way to implement this functionality?
|
|
16976
|
A race condition in a web application can lead to a security hole. Which software analysis technique is best suited to identify the existence of a race condition?
|
|
16977
|
What is one way developers can defend against forced browsing attacks?
|
|
16978
|
If you want your web application to defend itself against cross-site scripting attacks that steal session IDs, which cookie attribute is best able to help you?
|
|
16979
|
The formatting method {1:<10} represents the ___________ positional argument, _________ justified in a 10 character wide field.
|
|
16980
|
TRUE or FALSE? Most web applications provide only one method of authentication, namely username + password.
|
|
16981
|
The output of which of the codes shown below will be: “There are 4 blue birds.�
|
|
16982
|
TRUE or FALSE? Using POST requests with hidden form fields provides a significant level of protection against attackers who want to tamper with requests.
|
|
16983
|
Which of the following formatting options can be used in order to add ‘n’ blank spaces after a given string ‘S’?
|
|
16984
|
TRUE or FALSE? The best way to eliminate SQL injection vulnerabilities in code is to validate input data.
|
|
16985
|
Which of the following Boolean expressions is not logically equivalent to the other three?
|
|
16986
|
TRUE or FALSE? An attacker could use a cross-site scripting (XSS) flaw on a banking site to steal login credentials while the victim appears to remain on the legitimate banking site.
|
|
16987
|
TRUE or FALSE? All web applications are vulnerable to CSRF attacks unless there's a specific protection mechanism in place.
|
|
16988
|
What is the two’s complement of -44?
|
|
16989
|
As a web application user, what puts you at most risk to fall victim to a cross-site request forgery (CSRF) attack?
|
|
16990
|
Which of the following expressions can be used to multiply a given number ‘a’ by 4?
|
|
16991
|
Any odd number on being AND-ed with ________ always gives 1. Hint: Any even number on being AND-ed with this value always gives 0.
|
|
16992
|
Bitwise _________ gives 1 if either of the bits is 1 and 0 when both of the bits are 1.
|
|
16993
|
The one’s complement of 110010101 is:
|
|
16994
|
It is not possible for the two’s complement value to be equal to the original value in any case.
|
|
16995
|
Which of the following is not a security issue for PDAs?
|
|
16996
|
BBProxy tool is used in which mobile OS?
|
|
16997
|
Which of the following tool is used for Blackjacking?
|
|
16998
|
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.
|
|
16999
|
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.
|
|
17000
|
App permissions can cause trouble as some apps may secretly access your memory card or contact data.
|
|
17001
|
Hackers cannot do which of the following after compromising your phone?
|
|
17002
|
DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
|
|
17003
|
Which one of the following is not a python's predefined data type?
|
|
17004
|
Mobile security is also known as ____________
|
|
17005
|
____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.
|
|
17006
|
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
|
|
17007
|
Mobile Phone OS contains open APIs that may be _____________ attack.
|
|
17008
|
Which of the following is not an OS for mobile?
|
|
17009
|
Which of the following is not an appropriate way of targeting a mobile phone for hacking?
|
|
17010
|
The format function, when applied on a string returns :
|
|
17011
|
Applications that create queries dynamically, can be considered as a risk source of
|
|
17012
|
Database that allows a system administrator to associate a function with a relation is called
|
|
17013
|
First point where security enforcement is needed is in the
|
|
17014
|
A method that uses two independent pieces/processes of information to identify a user is known as
|
|
17015
|
class test: def __init__(self): print "Hello World" def __init__(self): print "Bye World" obj=test()
|
|
17016
|
Python allows string slicing. What is the output of below code: s='cppbuzz chicago' print(s[3:5])
|
|
17017
|
Term that is considered as a basis for most robust authentication schemes, is said to be
|
|
17018
|
Are nested if-else are allowed in Python?
|
|
17019
|
Select the reserved keyword in python-
|
|
17020
|
Which Of The Following Keywords Mark The Beginning Of The Class Definition?
|
|
17021
|
According to the American Bankers Association, what percentage of Americans prefer to do all of their banking online?
|
|
17022
|
Which of the following data types is not supported in python ?
|
|
17023
|
What is the output of the following? print("Hello {0!r} and {0!s}".format('foo', 'bin'))
|
|
17024
|
Lost gadgets are so common that the mobile security service Lookout claims it locates a missing mobile device every _______.
|
|
17025
|
What is the return type of function id?
|
|
17026
|
One out of every ______ mobile device users will click on a phishing link every year.
|
|
17027
|
Which one of the following has the highest precedence in the expression?
|
|
17028
|
What percentage of free iPhone apps have the ability to access your location based on GPS coordinates?
|
|
17029
|
Mathematical operations can be performed on a string. State whether true or false.
|
|
17030
|
What's the popular term for malware that's automatically downloaded when a user clicks on an Internet ad?
|
|
17031
|
All keywords in Python are in
|
|
17032
|
In mobile security parlance, what does "repackaging" mean?
|
|
17033
|
The iPhone 4 requires a user to sync the phone with iTunes in order to receive the latest security patches. What percentage of iPhone users never sync their phone?
|
|
17034
|
Which of the following is the use of id() function in python?
|
|
17035
|
What do you call an iPhone that has been hacked in such a way as to allow the user to download apps not approved by the App Store?
|
|
17036
|
Mobile payments are a lucrative target for hackers. What is the projected annual total of mobile payment transactions by 2014?
|
|
17037
|
What's the popular terminology for illegally listening in on an unencrypted WiFi network?
|
|
17038
|
In the first 6 months of 2011, how many apps in the open-source Android Market were identified as malware in disguise?
|
|
17039
|
True or False: Anyone can post an app to the Apple App Store.
|
|
17040
|
How many Android users were infected by the DroidDream malware attack of 2011?
|
|
17041
|
Python was released publicly in
|
|
17042
|
What do security experts call a malicious Web app that masquerades as a useful program?
|
|
17043
|
Extensible programming language that can be extended through classes and programming interfaces is
|
|
17044
|
Python is said to be easily
|
|
17045
|
In 2011, the average mobile phone user spends a total of 74 minutes a day using a Web browser, either on their computer or on their phone. How many minutes a day do they spend using mobile Web apps?
|
|
17046
|
True or False: The passcode lock is a default setting on the iPhone.
|
|
17047
|
If you choose the "erase data" option in your iPhone security settings, how many chances do you have to enter a correct passcode before the phone erases everything?
|
|
17048
|
Which mobile operating system is considered the most vulnerable to mobile security threats?
|
|
17049
|
On March 2, 2011, Apple announced that it had sold how many iPhones since the product was released in 2007?
|
|
17050
|
The expression 2**2**3 is evaluates as: (2**2)**3.
|
|
17051
|
What should users do to protect their devices before they get lost or stolen?
|
|
17052
|
True or false: Enforcing security best practices such as encryption and passcode use improves mobile data security.
|
|
17053
|
Which of the following OSes does not support on-device encryption?
|
|
17054
|
What is a secure data container?
|
|
17055
|
Which of the following expressions results in an error?
|
|
17056
|
Which of the following expressions is an example of type conversion?
|
|
17057
|
What will be the output of the following Python expression?
|
|
17058
|
True or false: It's important that the data stored on USB drives is encrypted.
|
|
17059
|
What is data at rest?
|
|
17060
|
Which of the following does NOT help with mobile data security? MDM software
|
|
17061
|
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
|
|
17062
|
Which of the following expressions involves coercion when evaluated in Python?
|
|
17063
|
If you have to leave your computer in a car, you should put it:
|
|
17064
|
As of August 2011, which operating system owned the most market share in the smartphone sector?
|
|
17065
|
Which of the following mobile data security strategies should your employees use?
|
|
17066
|
If you use a public computer, before leaving you should
|
|
17067
|
The early FM push-to-talk telephone systems were used in
|
|
17068
|
What are the main benefits of Mobile Security?
|
|
17069
|
What are the minimum system requirements to install mobile security?
|
|
17070
|
What does activation do?
|
|
17071
|
How can you prevent the theft of your laptop?
|
|
17072
|
Windows Mobile applications can now be digitally signed. What's the advantage of this feature for enterprise security?
|
|
17073
|
Which of the following is the truncation division operator?
|
|
17074
|
Which of the following operators has its associativity from right to left?
|
|
17075
|
The value of the expressions 4/(3*(2-1)) and 4/3*(2-1) is the same.
|
|
17076
|
What does 3 ^ 4 evaluate to?
|
|
17077
|
What is the result of round(0.5) – round(-0.5)?
|
|
17078
|
What is the result of cmp(3, 1)?
|
|
17079
|
Which of the following is incorrect?
|
|
17080
|
What does ~~~~~~5 evaluate to?
|
|
17081
|
What does ~4 evaluate to?
|
|
17082
|
Which of the following is a default UI property?
|
|
17083
|
What is the type of inf?
|
|
17084
|
Which of the following is not a complex number?
|
|
17085
|
What is the output of print 0.1 + 0.2 == 0.3?
|
|
17086
|
What is the return value of trunc()?
|
|
17087
|
Which of the following results in a SyntaxError?
|
|
17088
|
In order to store values in terms of key and value we use what core data type.
|
|
17089
|
What is the return type of function id?
|
|
17090
|
What is the iOS version launched by apple with iPhone 5S ?
|
|
17091
|
Which of the following will run without errors?
|
|
17092
|
Given a function that does not return any value, What value is thrown by default when executed in shell
|
|
17093
|
Which of these in not a core data type?
|
|
17094
|
ARC stands for _ _ _ _ _.
|
|
17095
|
Which one of the following has the highest precedence in the expression?
|
|
17096
|
he expression Int(x) implies that the variable x is converted to integer.
|
|
17097
|
Which one of the following has the same precedence level?
|
|
17098
|
What is the output of this expression, 3*1**3?
|
|
17099
|
Operators with the same precedence are evaluated in which manner?
|
|
17100
|
In which year Apple introduced multitasking supported iphones ?
|
|
17101
|
Mathematical operations can be performed on a string.
|
|
17102
|
What is the answer to this expression, 22 % 3 is?
|
|
17103
|
Which one of these is floor division?
|
|
17104
|
Which is the correct operator for power(xy)?
|
|
17105
|
Which of the following cannot be a variable?
|
|
17106
|
Which of the following is true for variable names in Python?
|
|
17107
|
All keywords in Python are in _________
|
|
17108
|
Which of the following is not a keyword?
|
|
17109
|
Why are local variable names beginning with an underscore discouraged?
|
|
17110
|
Which of the following is an invalid variable?
|
|
17111
|
Which of the following is invalid?
|
|
17112
|
which of the following loop is not a part of swift programming language?
|
|
17113
|
In swift language by default the members of class are ..?
|
|
17114
|
Which type of collection uses key-value pair in iOS?
|
|
17115
|
There are __ types of collections in Swift.
|
|
17116
|
Is Python case sensitive when dealing with identifiers?
|
|
17117
|
What symbol is used like a tuple to access arguments in Abbreviated Swift Closure syntax?
|
|
17118
|
Swift was developed by
|
|
17119
|
Which iPhone version supports flash?
|
|
17120
|
What is the full form of "efi"
|
|
17121
|
The -------- provides the resources you need to develop native iOS apps
|
|
17122
|
Is Tuple mutable?
|
|
17123
|
Swift is a
|
|
17124
|
what is the output for: name="Hello World" print(type(name))
|
|
17125
|
Select the command to Find and print Data types using the Type command. name="Hello World"
|
|
17126
|
What is the user interface of Iphone OS called?
|
|
17127
|
Which of the following variable is invalid?
|
|
17128
|
Is Python case sensitive?
|
|
17129
|
Which of the following has more precedance?
|
|
17130
|
What is the associativity of Operators with the same precedence?
|
|
17131
|
19 % 2 in python
|
|
17132
|
Which of the following operators is used to get accurate result (i.e fraction part also) in case of division ?
|
|
17133
|
Select the correct code to print cppbuzz-chicago
|
|
17134
|
Which of the following data type is used to store values in Key & Value format?
|
|
17135
|
What is the data type of X in X = [12.12, 13, 'cppbuzz']
|
|
17136
|
Is it possible to use round function without any argument like round()
|
|
17137
|
How following evaluates in Python? round(0.5) – round(-0.5)
|
|
17138
|
What will be the output of 7^10 in python?
|
|
17139
|
Which one of the following is not a python's predefined data type?
|
|
17140
|
To open a file c:cppbuzz.txt for writing, we use
|
|
17141
|
Suppose list1 is [2, 33, 222, 14, 25], What is list1[-1] ?
|
|
17142
|
Which of the following is an invalid statement?
|
|
17143
|
What is the maximum possible length of an identifier?
|
|
17144
|
Which statement is correct....??
|
|
17145
|
print(chr(ord('b')+1))
|
|
17146
|
Which of these are not Value type in Swift?
|
|
17147
|
The format function, when applied on a string returns :
|
|
17148
|
Xcode is an IDE containing a suite of software development tools developed by Apple for developing software for OS X and iOS
|
|
17149
|
If a='cpp', b='buzz' then which of the following operation would show 'cppbuzz' as output?
|
|
17150
|
What is correct syntax to copy one list into another?
|
|
17151
|
in swift which keyword is work as immutable??
|
|
17152
|
How to find the last element of list in Python? Assume `bikes` is the name of list.
|
|
17153
|
which compiler is use for swift ?
|
|
17154
|
Syntax of constructor in Python?
|
|
17155
|
Which predefined Python function is used to find length of string?
|
|
17156
|
The class files that you create for your application will have file extension ?
|
|
17157
|
Which of the following is correct way to declare string variable in Python?
|
|
17158
|
Which keyword is used to define methods in Python?
|
|
17159
|
Flash Applications is supported in iPhone browsers.Is it true?
|
|
17160
|
Which of the following symbols are used for comments in Python?
|
|
17161
|
What is Bundle in iOS
|
|
17162
|
Select the reserved keyword in python
|
|
17163
|
What is the latest version of iPhone operating system ?
|
|
17164
|
Any file’s attribute information is stored in which structure on the disk
|
|
17165
|
When mv f1 f2 is executed which file’s inode is freed?
|
|
17166
|
What command is used to copy files and directories?
|
|
17167
|
IPhone OS is based on which language?
|
|
17168
|
How do you rename file “new†to file “old�
|
|
17169
|
Executing the ‘cd ..’ command when at the root level causes
|
|
17170
|
If a file is removed in Unix using ‘rm’ then
|
|
17171
|
Which represents the user home directory
|
|
17172
|
Which option of rmdir command will remove all directories a, b, c if path is a/b/c
|
|
17173
|
What is the element that is used to specify the type of variable or expression?
|
|
17174
|
Which command is used to set limits on file size
|
|
17175
|
Which of the following framework is not used in iOS ?
|
|
17176
|
Which of the following time stamps need not exist for a file on traditional unix file system
|
|
17177
|
Tuples as well as structs both allow us to combine different types into one type.
|
|
17178
|
Application running in foreground but currently not receiving any events .what is the current state of Application?
|
|
17179
|
Which of the following declares a mutable array in Swift?
|
|
17180
|
Swift will automatically assign the data type based on the intial value ?
|
|
17181
|
iOS is a __software.
|
|
17182
|
Which command will you use to see the available routes?
|
|
17183
|
Multitasking in iOS was introduced in which version?
|
|
17184
|
Which screen manipulation command sets the screen back to normal?
|
|
17185
|
What communication command provides communication to another user logged on by writing to the bottom of their terminal?
|
|
17186
|
sed is a command typically used for
|
|
17187
|
It is possible to wrap variable value inside optional after unwrapping value
|
|
17188
|
To open a file file1 with cursor at line number 4
|
|
17189
|
what are the features of swift programming?
|
|
17190
|
Which command gives the first byte where the difference is in the file1 & file2?
|
|
17191
|
What was the original name of iOS?
|
|
17192
|
How to execute ls command inside a vi editor?
|
|
17193
|
How do you add (append) a file “file1†to the example.tar file
|
|
17194
|
for unwrapping value inside optional what should we use?
|
|
17195
|
Which of the following is incorrect value type of the swift?
|
|
17196
|
What is a LLVM ?
|
|
17197
|
Meaning of iOS is?
|
|
17198
|
Which one shows the name of the operating system?
|
|
17199
|
To initialize variable with null require...
|
|
17200
|
The command syntax to display the file ‘sample.txt’ one page at a time is
|
|
17201
|
Write the command to display the current date in the form dd/mm/yyyy.
|
|
17202
|
The most recent version of macOS is based on ... ?
|
|
17203
|
Which of the following commands will allow the user to search contents of a file for a particular pattern
|
|
17204
|
If you do not want to mention external name in function call, then what should be preceded before the parameters while defining the function?
|
|
17205
|
Which tar command option is used to list the files in a tape archive format?
|
|
17206
|
Which of the following commands can be used to change default permissions for files and directories at the time of creation
|
|
17207
|
MAC OS X is true 64 bit unix.
|
|
17208
|
pwd command displays
|
|
17209
|
Using tupel we can return multiple values.
|
|
17210
|
Which of the following commands can be used to copy files across systems?
|
|
17211
|
Which of the following is incorrect data type in SWIFT ?
|
|
17212
|
Which command is used to display all the files including hidden files in your current and its subdirectories ?
|
|
17213
|
We can return multiple values in swift from function by using?
|
|
17214
|
Which of the following command output contains userid?
|
|
17215
|
Which commands will give you information about how much disk space each file in the current directory uses?
|
|
17216
|
First IOS was written in
|
|
17217
|
Which of these commands could you use to show one page of output at a time?
|
|
17218
|
Double has a precision of at least _ decimal digits in swift.
|
|
17219
|
Command used to count number of character in a file is
|
|
17220
|
To create contants in swift we use keyword ...
|
|
17221
|
Command used to determine the path of an executable file is
|
|
17222
|
Swift will automatically assign the data type based on the initial value?
|
|
17223
|
Which of the following iOS frameworks is a commonly used third party Library?
|
|
17224
|
Entry Point function in swift is main()
|
|
17225
|
To create mutable object __ is used
|
|
17226
|
In iOS, a folder with .app extension is known as Bundle.
|
|
17227
|
Swift is which type of language?
|
|
17228
|
What are the collection types in Swift?
|
|
17229
|
Given : var stringValue:String = “Justin Gifâ€. What is the result of stringValue = nil?
|
|
17230
|
What type of integer is denoted by "Int8"?
|
|
17231
|
What's are the new features in Swift 4.0?
|
|
17232
|
Which of the following line skips the first 5 documents in the bios collection and returns all remaining documents?
|
|
17233
|
The __________ method limits the number of documents in the result set.
|
|
17234
|
Which of the following method corresponds to Order by clause in SQL?
|
|
17235
|
The mongo shell and the drivers provide several cursor methods that call on the cursor returned by the _______ method to modify its behavior.
|
|
17236
|
Which of the following method is called while accessing documents using the array index notation?
|
|
17237
|
____________ method renders the document in a JSON-like format.
|
|
17238
|
Which of the following method returns true if the cursor has documents?
|
|
17239
|
When you query a collection, MongoDB returns a ________ object that contains the results of the query.
|
|
17240
|
Assume that Honda is an instance of the Car class, and that Car class has a member function named run. Which of the following is a correct call to the run function?
|
|
17241
|
C++ Class declarations should never be stored in their own header file
|
|
17242
|
A C++ class is almost similar to a structure
|
|
17243
|
The public access specifier is used to protect important data
|
|
17244
|
Objects in C++ are created from abstract data types that encapsulate data and functions together
|
|
17245
|
When a file is opened by the program, the file stream object’s “read position†is
|
|
17246
|
Closing a file causes any unsaved information still held in the file buffer to be saved to the file.
|
|
17247
|
Which member function writes a single character to a file?
|
|
17248
|
Which of the following statements opens a file and links it to a file stream object?
|
|
17249
|
By default, files are opened in binary mode
|
|
17250
|
When you store data in a variable it is automatically saved in a file
|
|
17251
|
Data stored in RAM disappears once a program ends or the computer is powered down.
|
|
17252
|
After the following statement executes, what value will the MAPLE enumerator be stored as, in memory?
|
|
17253
|
Which of the following statements assigns a value to the hourlyWage member of employee[2}?
|
|
17254
|
In the following structure declaration, idNum is: Struct Employee { String name; int idNum; };
|
|
17255
|
You can define any number of union variables, but each variable can store the value of one member at a time
|
|
17256
|
Structure variables may be passed as arguments to functions
|
|
17257
|
A struct can contain members of various data types
|
|
17258
|
Correct syntax for creating a thread using Function Pointer?
|
|
17259
|
What does this function do?
|
|
17260
|
Will below program run without any compilation errors?
|
|
17261
|
Is it possible to initialize any Vector with an Array in C++?
|
|
17262
|
What is true about his statement in C++?
|
|
17263
|
What is the correct way to initialize vector in C++?
|
|
17264
|
In which version of C++ auto was limited to lambda functions?
|
|
17265
|
Which version of C++ added feature of auto for return type of functions?
|
|
17266
|
Which C++ version support Digit Separators 1'000'000?
|
|
17267
|
Lambda expression are feature of which C++ version?
|
|
17268
|
Is this a valid syntax in C++ 17?
|
|
17269
|
Which of the following is not a C++ 17 library feature?
|
|
17270
|
How many times will A be printed ?
|
|
17271
|
GCC compiler is known as?
|
|
17272
|
Which is the correct command used to compile source code (.cpp files) into object code(.o files)?
|
|
17273
|
Which of the following is not a C++ Library?
|
|
17274
|
A process of repeating the workflow is called ...
|
|
17275
|
The statement structure that is NOT a looping is:
|
|
17276
|
What is the role of tellp() in C++ file handling?
|
|
17277
|
What is the roll of tellg() in C++ file handling?
|
|
17278
|
Why use seekp() in file handling of C++?
|
|
17279
|
Why seekg() is used in file handling of C++
|
|
17280
|
If I want use multiple modes in open() function while file handling then which operator is used for this?
|
|
17281
|
Which mode of the following will append the file if it already exist in C++?
|
|
17282
|
Header file used to perform both read & write operations on files in C++?
|
|
17283
|
Which header file is used to only read files in C++?
|
|
17284
|
What is the correct syntax to access any variable of Namespace?
|
|
17285
|
Which operator is used to access the namespace?
|
|
17286
|
Can we typedef in declaring structure?
|
|
17287
|
Can we declare structure inside structure?
|
|
17288
|
In place of structure which other data type can be used in programming?
|
|
17289
|
Can we initialize structure's elements in structure itself?
|
|
17290
|
How many elements we can have in any structure?
|
|
17291
|
The data elements in structure are also known as ?
|
|
17292
|
What should be the output of below program? Please note all programs are compiled on GCC compiler.
|
|
17293
|
Find the output of below program #include<iostream> using namespace std; enum color{ Black, blue, red }; int main() { color obj = blue; cout<<obj; return 0; }
|
|
17294
|
Is this valid C++ 11 program & get compiled without any error?
|
|
17295
|
Is below program of C++ 11 valid & runs without compilation error?
|
|
17296
|
What should be output of below program? program is compiled on g++ compiler.
|
|
17297
|
Which one of the following is correct syntax for nmake command?
|
|
17298
|
Which one is true ?
|
|
17299
|
In the below program int main(int argc, char *argv[]){} what would be the value of argv[argc]?
|
|
17300
|
Which one is correct syntax to use C++11 features while compilation?
|
|
17301
|
Which one of these is invalide file mode?
|
|
17302
|
Which one of these takes more memory?
|
|
17303
|
What is the advantage of local variable?
|
|
17304
|
What is/are true statements are const volatile variables?
|
|
17305
|
Can a parameter be both const and volatile?
|
|
17306
|
Why use register keyword in C++ code?
|
|
17307
|
What is the use of mutable keyword?
|
|
17308
|
C++ 11 introduces a new keyword. Find out that keyword.
|
|
17309
|
Which one of these is not a keyword?
|
|
17310
|
The following code will fail to compile: template <typename T, typename U> void call_foo(T t, U u) { t.foo<U>(u); } How would you fix this?
|
|
17311
|
If C functions will be called from C++, then C include files will use the following declaration. is this True / False?
|
|
17312
|
Which keyword in C++ 11 is used to prevent a virtual function from being overridden?
|
|
17313
|
In C++11 which data type is newly introduced among these?
|
|
17314
|
What do you understand from lexical analysis?
|
|
17315
|
Does below code compiles successfully on C++11?
|
|
17316
|
What is the correct syntax for lambda expression in C++11?
|
|
17317
|
Which file format is used in Binaries on Linux
|
|
17318
|
Which one of these is not calling convention?
|
|
17319
|
What is true ? when we explicitly declare a function to use the __fastcall convention.
|
|
17320
|
What is the best way to convert int to string according to C++ standard?
|
|
17321
|
A constructor is a special type of?
|
|
17322
|
Which is not an integer data type?
|
|
17323
|
What do you understand by GUI?
|
|
17324
|
Which language is not a true object-oriented programming language?
|
|
17325
|
Estimated C++ users?
|
|
17326
|
Which version of C++ introduced keyword - constexpr?
|
|
17327
|
C++ 17 is also known as ___
|
|
17328
|
Which keyword is used to write Assembly code within a C++ program?
|
|
17329
|
Which of the following is the least safe type casting in C++?
|
|
17330
|
Which of the following is Right Shift operator?
|
|
17331
|
ISO/IEC 14882:1998 represents which version of C++?
|
|
17332
|
What is the latest version of C++?
|
|
17333
|
Are both of the preprocessor directives solving same purpose?
|
|
17334
|
Car contains Engine. Which type of relationship is it?
|
|
17335
|
Which part of memory is used for the allocation of local variables declared inside any function.
|
|
17336
|
hat is the extention of the executable file produced after compiling C/C++ code using g++ on Linux?
|
|
17337
|
Which is the Parent class for all exceptions?
|
|
17338
|
Which exception is thrown when dynamic_cast fails?
|
|
17339
|
Which Exception is thrown when new fails to allocate memory?
|
|
17340
|
Find the output of below program.
|
|
17341
|
How many times CppBuzz.com is printed here?
|
|
17342
|
Find output of below program
|
|
17343
|
Assume all headers are included //What should be printed?
|
|
17344
|
How many times 'its a while loop' should be printed?
|
|
17345
|
What should be printed on screen?
|
|
17346
|
Find the output of below program:-
|
|
17347
|
What should be output of below program if use enter a = 5?
|
|
17348
|
Comma(,) is the operator which has least precdence among all operator.
|
|
17349
|
Which operator has more precedence among the following?
|
|
17350
|
What is Self Referencial Structure?
|
|
17351
|
Which one is more faster?
|
|
17352
|
What is Singleton class?
|
|
17353
|
From which STL we can insert/remove data from anywhere?
|
|
17354
|
Which data structure is used by Map?
|
|
17355
|
Is duplicate data allowed in set?
|
|
17356
|
Can we have constructor as Virtual?
|
|
17357
|
Can we have Pure Virtual Destructor?
|
|
17358
|
Which command is used to identify file type?
|
|
17359
|
Which option of rm command is used to remove a directory with all its subdirectories
|
|
17360
|
Which command creates an empty file if file does not exist?
|
|
17361
|
Which command is used to perform backup in unix?
|
|
17362
|
Which command is used to display disk consumption of a specific directory
|
|
17363
|
Which command is used to extract a column from a text file
|
|
17364
|
Which command is used to extract intermediate result in a pipeline
|
|
17365
|
Which command changes a file’s group owner
|
|
17366
|
What are the advantages of Swift?
|
|
17367
|
Which command is used to view compressed text file contents
|
|
17368
|
What are the control transfer statements used in Swift?
|
|
17369
|
Which command is used to display the octal value of the text
|
|
17370
|
What are the features of Swift Programming?
|
|
17371
|
Find / -name ‘*’ will
|
|
17372
|
How do you declare an Iboutlet property?
|
|
17373
|
Which option of ls command used to view file inode number
|
|
17374
|
Using which command you find resource limits to the session?
|
|
17375
|
What are the characteristics of Switch in Swift?
|
|
17376
|
Which command is used to print a file
|
|
17377
|
Which command is used to display the unix version
|
|
17378
|
Which command is used to display the operating system name
|
|
17379
|
Which command is used to record a user login session in a file
|
|
17380
|
What symbol is used to end a statement, and separate multiple statements in a single line?
|
|
17381
|
What statement is used to introduce a new scope in Swift?
|
|
17382
|
Which command is used to set terminal IO characteristic?
|
|
17383
|
The command “mknod myfifo b 4 16â€
|
|
17384
|
The dmesg command
|
|
17385
|
In Swift, a sequence of characters surrounded by double quotes is called a ____.
|
|
17386
|
In Swift, there are three kinds of statements: simple, compiler control,and ____
|
|
17387
|
What Is Bundle In IOS
|
|
17388
|
How do you get help about the command “cp�
|
|
17389
|
Application Running In Foreground But Currently Not Receiving Any Events .what Is The Current State Of Application?
|
|
17390
|
Which Of The Following Declares A Mutable Array In Swift?
|
|
17391
|
Which among the following is used to write small programs to control Unix functionalities?
|
|
17392
|
What are the sizes of (Integer/Long/Pointer) in LP64 programming model?
|
|
17393
|
Which Of The Following Framework Is Not Used In IOS ?
|
|
17394
|
IOS Is A __software.
|
|
17395
|
Which of the following UNIX flavor is from IBM?
|
|
17396
|
Which of the following statement is FALSE ?
|
|
17397
|
Multitasking In IOS Was Introduced In Which Version?
|
|
17398
|
Which of these is not a Unix Flavor?
|
|
17399
|
What Was The Original Name Of IOS?
|
|
17400
|
SVR4 was developed by
|
|
17401
|
For Unwrapping Value Inside Optional What Should We Use?
|
|
17402
|
Syntax of any Unix command is:
|
|
17403
|
Lp0 device file is used to access:
|
|
17404
|
Which Of The Following Is Incorrect Value Type Of The Swift?
|
|
17405
|
SVR4 stands for?SVR4 stands for?
|
|
17406
|
What Is A LLVM ?
|
|
17407
|
Unix is which kind of Operating System?
|
|
17408
|
Meaning Of IOS Is?
|
|
17409
|
Which of the following is considered as the super daemon in Unix?
|
|
17410
|
Which of the following enables multi-tasking in UNIX?
|
|
17411
|
The system calls in UNIX is written using which language
|
|
17412
|
To Initialize Variable With Null Require...
|
|
17413
|
Which of the following is “NOT†a UNIX variant ?
|
|
17414
|
The Most Recent Version Of MacOS Is Based On ... ?
|
|
17415
|
Solaris is the name of a flavor of UNIX from
|
|
17416
|
If You Do Not Want To Mention External Name In Function Call, Then What Should Be Preceded Before The Parameters While Defining The Function?
|
|
17417
|
Applications communicate with kernel by using:
|
|
17418
|
Which Of The Following Is Incorrect Data Type In SWIFT ?
|
|
17419
|
Which among the following interacts directly with system hardware?
|
|
17420
|
We Can Return Multiple Values In Swift From Function By Using?
|
|
17421
|
Under UNIX the key board is the default input device and the monitor is the default output device
|
|
17422
|
First IOS Was Written In
|
|
17423
|
Double Has A Precision Of At Least _ Decimal Digits In Swift.
|
|
17424
|
Single Unix Specification Version 2 provides enhanced support for
|
|
17425
|
To Create Contants In Swift We Use Keyword ...
|
|
17426
|
Which Of The Following IOS Frameworks Is A Commonly Used Third Party Library
|
|
17427
|
ILP32 stands for
|
|
17428
|
Which is the core of the operating system?
|
|
17429
|
wtmp and utmp files contain
|
|
17430
|
To Create Mutable Object __ Is Used
|
|
17431
|
The IDE Used In Swift Is
|
|
17432
|
At start of process execution, STDOUT & STDERR
|
|
17433
|
IOS Stands For?
|
|
17434
|
To increase the response time and throughput, the kernel minimizes the frequency of disk access by keeping a pool of internal data buffer called
|
|
17435
|
When you use one if or else if statement inside another if or else if statement(s) it is called a/an
|
|
17436
|
The following are assignment operators except
|
|
17437
|
Which of the following is a logical operator?
|
|
17438
|
Which of these is not a type of operator?
|
|
17439
|
Size of each entry in inode table?
|
|
17440
|
The value "nil" represents:
|
|
17441
|
Which of the following is not a Linux command
|
|
17442
|
The default value of Umask is
|
|
17443
|
Which data type is an ordered collection of characters?
|
|
17444
|
Which of the following data types is used to represent a 32-bit floating-point number and numbers with smaller decimal points?
|
|
17445
|
The following are basic data types except:
|
|
17446
|
Which of the following keywords are used in statements?
|
|
17447
|
What is current syntax to export the variable in Linux ?
|
|
17448
|
The following are the keywords used in declarations except
|
|
17449
|
Linux command which print script name when running same script?
|
|
17450
|
Syntax to define array in Bash scripting?
|
|
17451
|
Linux command to print PID of current shell?
|
|
17452
|
Linux command to get first line from any file?
|
|
17453
|
How to check if previous command run successful ?
|
|
17454
|
How to calculate number of passed arguments ?
|
|
17455
|
How to pass argument to a script ?
|
|
17456
|
Which of the following command is used to show current working directory?
|
|
17457
|
What CLI stands for in Linux?
|
|
17458
|
State true of false. In Linux everything is a file (devices, directories, peripherals)
|
|
17459
|
Which of the following account is invalid account in Linux
|
|
17460
|
Which of the following File descriptor is used for standard input ie. STDIN
|
|
17461
|
Which command is used to change the ownership of any file
|
|
17462
|
Linux command to get list of hidden files?
|
|
17463
|
What is Samba?
|
|
17464
|
How to list all installed RPM packages
|
|
17465
|
How to change password of any user in Linux
|
|
17466
|
Which file system is the default type in Linux
|
|
17467
|
All users passwords are stored in
|
|
17468
|
Linux has a command to delete the user with its home directory, the command is
|
|
17469
|
What is the name of Linux Kernel file ?
|
|
17470
|
What is Shell in Linux?
|
|
17471
|
vi command to quit without saving changes in case of accident?
|
|
17472
|
Which of the following command is used to delete a lines to general buffer?
|
|
17473
|
Which of the vi command is used to show line no?
|
|
17474
|
Which of the following is not a valid login shell in Linux?
|
|
17475
|
Which of the following command return exit status of last command?
|
|
17476
|
Which of the following command keep a process running even after you exit from your shell?
|
|
17477
|
On success fork returns?
|
|
17478
|
In which of the following state, the process is terminated but the information is still available in the process table?
|
|
17479
|
Which command is used to get the list of users who are currently logged-in?
|
|
17480
|
Which of the following command is used to record session in Linux?
|
|
17481
|
Which of the following Operating System is not type of Linux?
|
|
17482
|
Which command(s) is/are used to get help about any Linux command?
|
|
17483
|
In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?
|
|
17484
|
What is the purpose of the iconv command?
|
|
17485
|
Which command can be used to delete a group from a Linux system?
|
|
17486
|
Which of the following fields are available in both the global /etc/crontab file as well as in user- specific crontab files?
|
|
17487
|
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?
|
|
17488
|
Which of the following Linux command search forward for string?
|
|
17489
|
Which command create file `b`
|
|
17490
|
Which are the four navigation keys in “vi†editor?
|
|
17491
|
System calls are the classical method of enabling user processes to interact with
|
|
17492
|
What is Linux?
|
|
17493
|
The `else` statement is ___
|
|
17494
|
Which of the following asserts that the variables `A`, `B`, and `C` have unequal values?
|
|
17495
|
Which of these could be a correct way to create an instance of Person?
|
|
17496
|
USERNAME and userName
|
|
17497
|
function foo(){ var tmp = ‘one_two_three_four_five’; return tmp.replace(/_/g, ‘+’); } What does foo() return?
|
|
17498
|
How would one declare a string variable?
|
|
17499
|
Which of these operators compares two variables by value AND type?
|
|
17500
|
How is an object property referenced?
|
|
17501
|
The function call Math.ceil(3.5) returns:
|
|
17502
|
Which of the following invokes a user-defined object constructor function?
|
|
17503
|
Which event fires whenever a control loses focus?
|
|
17504
|
How do you write a conditional statement that will *only* execute the contained code if variable x has a value 5 of type *number*?
|
|
17505
|
Which of the following variable types does not exist in JavaScript?
|
|
17506
|
What is the value of x? var a = false; var x = a ? “A†: “Bâ€;
|
|
17507
|
Which of these is not a logical operator?
|
|
17508
|
To what type are values converted internally when evaluating a conditional statement?
|
|
17509
|
Which of these is a correct method to create a new array?
|
|
17510
|
Which is not a primitive data type in JavaScript?
|
|
17511
|
Primitive types are passed by :
|
|
17512
|
What is the result of the following statement: typeof “xâ€;
|
|
17513
|
How do you create an object in JavaScript?
|
|
17514
|
What does the following expression return? 1 + 5 + †bottles of milkâ€;
|
|
17515
|
Which of the following is a requirement for portability testing for the future of a mobile application?
|
|
17516
|
JavaScript is …
|
|
17517
|
If you are testing how much battery is being used by your application, what are you testing?
|
|
17518
|
Your company has created an application for doing crossword puzzles. The target users are in the age class of over 65 years old. There has already been considerable concentration on creating screens that are easy to navigate and intuitive. It is a primary goal that the software be easy to use. Viewability has been implemented with a revolutionary magnification ability based on moving a magnifying glass across the screen. The beta testers have still had problems using the application, particularly when trying to enter the letters into the squares. Given this information, which area should you target for more complete testing?
|
|
17519
|
You have information from production that the previous version of your product has had a high rate of abandonment after the initial download. In fact, it appears people download the application and never use it. Poor performance is thought to be the main problem that is causing people to give up the application. Which of the following aspects of the application should be specifically targeted for testing to help determine if this is really the problem?
|
|
17520
|
What is the primary use of teststorming?
|
|
17521
|
If your application can only be used within a specific country, what feature of the device might be used to supply information that the application can use to make this determination?
|
|
17522
|
Which of the following types of testing might consider the user’s age?
|
|
17523
|
When conducting security testing on a mobile application, which is the correct set of basic areas to cover?
|
|
17524
|
Correctness can be defined as a combination of which two quality characteristics?
|
|
17525
|
In JavaScript, Window.prompt() method return true or false value ?
|
|
17526
|
You are testing a native application for a smart phone. The application allows the user to make grocery lists on the phone and store up to three lists at a time. A list can contain up to 50 items. Which of the following is the minimum set of test conditions to achieve 100% coverage with the boundary value analysis test technique?
|
|
17527
|
What is mean by "this" keyword in javascript?
|
|
17528
|
Choose the client-side JavaScript object:
|
|
17529
|
Which best explains getSelection()?
|
|
17530
|
Scripting language are
|
|
17531
|
Is it possible to nest functions in JavaScript?
|
|
17532
|
The syntax of close method for document object is ______________
|
|
17533
|
You are testing a native application for a smart phone. The application allows the user to make grocery lists on the phone and store up to three lists at a time. A list can contain up to 50 items. Which of the following is the minimum set of test conditions to achieve 100% coverage with the equivalence partitioning test technique?
|
|
17534
|
The syntax of capture events method for document object is ______________
|
|
17535
|
The syntax of a blur method in a button object is ______________
|
|
17536
|
To open a dialog box each time an error occurs, which of the following is added to prefs.js?
|
|
17537
|
If you are testing a mobile banking application, is it important to test the interaction between the software and the device?
|
|
17538
|
To automatically open the console when a JavaScript error occurs which of the following is added to prefs.js?
|
|
17539
|
The JavaScript exception is available to the Java code as an instance of __________
|
|
17540
|
A ________ object is a reference to one of the classes in a Java package, such as netscape.javascript .
|
|
17541
|
_______ class provides an interface for invoking JavaScript methods and examining JavaScript properties.
|
|
17542
|
In a project that is feature-rich but time-poor, which is the most reasonable approach to risk analysis?
|
|
17543
|
When a JavaScript object is sent to Java, the runtime engine creates a Java wrapper of type ___________
|
|
17544
|
In JavaScript, _________ is an object of the target language data type that encloses an object of the source language.
|
|
17545
|
To enable data tainting, the end user sets the _________ environment variable.
|
|
17546
|
____________ is the tainted property of a window object.
|
|
17547
|
Which tag(s) can handle mouse events in Netscape?
|
|
17548
|
. To set up the window to capture all Click events, we use which of the following statement?
|
|
17549
|
Which of the following requirements documents would be the best source to determine normal usage scenarios?
|
|
17550
|
The _______ method of an Array object adds and/or removes elements from an array.
|
|
17551
|
How to create a Date object in JavaScript?
|
|
17552
|
If you are testing a mobile application that is not safety-critical, which lifecycle model is most likely to be used?
|
|
17553
|
Which of the following is the structure of an if statement?
|
|
17554
|
You are testing an application for a smart phone. You have determined that you only need to test one device from the target family of devices because the behavior of all devices in that family will be the same for this application. This is an example of what test design technique?
|
|
17555
|
Using _______ statement is how you test for a specific condition.
|
|
17556
|
JavaScript is interpreted by _________
|
|
17557
|
If an application resides on the mobile device and was written specifically for that device, what type of application is it?
|
|
17558
|
The syntax of Eval is ________________
|
|
17559
|
Which of the following event fires when the form element loses the focus: <button>, <input>, <label>, <select>, <textarea>?
|
|
17560
|
What types of testing are particularly important for mobile applications based on the user’s expectations?
|
|
17561
|
______method evaluates a string of JavaScript code in the context of the specified object.
|
|
17562
|
Which of the following is not considered a JavaScript operator?
|
|
17563
|
Choose the client-side JavaScript object?
|
|
17564
|
Choose the server-side JavaScript object?
|
|
17565
|
Which of the following best describes JavaScript?
|
|
17566
|
JavaScript entities start with _______ and end with _________.
|
|
17567
|
If para1 is the DOM object for a paragraph, what is the correct syntax to change the text within the paragraph?
|
|
17568
|
What does the <noscript> tag do?
|
|
17569
|
Which is the correct way to write a JavaScript array?
|
|
17570
|
Which of the following navigator object properties is the same in both Netscape and IE?
|
|
17571
|
Which types of image maps can be used with JavaScript?
|
|
17572
|
What is the correct syntax for referring to an external script called " abc.js"?
|
|
17573
|
Inside which HTML element do we put the JavaScript?
|
|
17574
|
Which of the following way can be used to indicate the LANGUAGE attribute?
|
|
17575
|
What is the correct JavaScript syntax to write "Hello World"?
|
|
17576
|
Which of the following attribute can hold the JavaScript version?
|
|
17577
|
How does JavaScript store dates in a date object?
|
|
17578
|
______ tag is an extension to HTML that can enclose any number of JavaScript statements.
|
|
17579
|
Which of the following is not a valid JavaScript variable name?
|
|
17580
|
Which of the following are capabilities of functions in JavaScript?
|
|
17581
|
Which of the following can't be done with client-side JavaScript?
|
|
17582
|
_____ JavaScript statements embedded in an HTML page can respond to user events such as mouse-clicks, form input, and page navigation.
|
|
17583
|
What are variables used for in JavaScript Programs?
|
|
17584
|
__________ JavaScript is also called server-side JavaScript.
|
|
17585
|
______ JavaScript is also called client-side JavaScript.
|
|
17586
|
When a user views a page containing a JavaScript program, which machine actually executes the script?
|
|
17587
|
Why so JavaScript and Java have similar name?
|
|
17588
|
Which CSS has highest priority?
|
|
17589
|
What is default value of position property?
|
|
17590
|
Browser Object Model(BOM) allows JavaScript to “talk to†the browser
|
|
17591
|
Triple equal sign === checks for equal value and equal type. State true or false
|
|
17592
|
Which property controls scrolling of an image in background?
|
|
17593
|
Which of the following tag is used to draw graphics on the fly in Javascript?
|
|
17594
|
Which event occurs when the value of an element has been changed?
|
|
17595
|
Which attribute specifies the stack order of an element?
|
|
17596
|
What if you use parseInt() to convert a string containing decimal value?
|
|
17597
|
Which of the following is not a built-in String method in Javascript?
|
|
17598
|
setInterval method calls a function repeatedly at a set time interval. State true or false
|
|
17599
|
The shift method the first element of an array and returns the removed value. State true or false
|
|
17600
|
Which of the following method checks if its argument is not a number?
|
|
17601
|
Which one of the following is not a popup box in JavaScript?
|
|
17602
|
When the user is working with timing events in Javascript, select the event that would cancel the setTimeout()
|
|
17603
|
The event specific to keyboard is
|
|
17604
|
To create an image rollover which events need to be used
|
|
17605
|
If an exception is thrown, the statements in the finally block execute even if no catch block handles the exception. State true or false
|
|
17606
|
Does JavaScript allow exception handling
|
|
17607
|
In JavaScript, data stored in an array always have to be the same data type State True or False
|
|
17608
|
In JavaScript, Arrays are data type. State True or False
|
|
17609
|
Choose the method which Joins all elements of an array into a string
|
|
17610
|
______ attribute used in <table> element sets the width, in pixels, between the edge of a cell and its content
|
|
17611
|
JavaScript is a case-sensitive language
|
|
17612
|
______ element in HTML5 is used to indicate that text has been added to the document.?
|
|
17613
|
We can use the === (equality) operator to compare a variable with a string, Can we use it to compare two numbers?
|
|
17614
|
A prompt box asks the user for some information and provides a response field for the answer
|
|
17615
|
Javascript string using double quotes is exactly the same as a string using single quotes
|
|
17616
|
Which one is standard way to show popup in Java Script?
|
|
17617
|
Choose the correct HTML element to define important text?
|
|
17618
|
Which HTML element is used to display a scalar measurement within a range?
|
|
17619
|
Which tag is used to specify a list of prefined options for input controls?
|
|
17620
|
Which tag is used to create clickable link?
|
|
17621
|
A ___________ consist of a property and a value,
|
|
17622
|
What does the ID selector do?
|
|
17623
|
In what form are style rules presented?
|
|
17624
|
Which values for font-family property is valid?
|
|
17625
|
Which property applies a color to text?
|
|
17626
|
What is the correct CSS syntax to make all paragraph (p) elements bold?
|
|
17627
|
What is the default margin of the body element?
|
|
17628
|
Where in HTML document is the conventionally correct place to put reference to an external style sheet?
|
|
17629
|
Which is the correct syntax to set the unordered-list item marker to a square.
|
|
17630
|
What is the correct representation to change the color of h2 element?
|
|
17631
|
If "padding: 10px 5px 20px 0px" is given. What does this represent?
|
|
17632
|
How do we add a comment in CSS file?
|
|
17633
|
Which of the following is the correct HTML element to define emphasized text?
|
|
17634
|
Select the correct among the following for linking an external style sheet.
|
|
17635
|
Which of the following is the correct CSS syntax?
|
|
17636
|
Which HTML tag is used for internal style sheet?
|
|
17637
|
Which one of the following is the correct way of adding Inline styles.
|
|
17638
|
Using padding clears the area outside:
|
|
17639
|
Which among the following is a correct way to open a Hyperlink in new tab?
|
|
17640
|
Which HTML element is used for Important text?
|
|
17641
|
How many different styling techniques are used in CSS?
|
|
17642
|
What is the full form of CSS?
|
|
17643
|
Which among the following is the correct way in HTML to insert an image?
|
|
17644
|
Which of the following elements can be used in HTML to create a table?
|
|
17645
|
Which tag is used to add an header in HTML5 table?
|
|
17646
|
Which tag is used for creating a drop-down selection list?
|
|
17647
|
Which among the following is correct HTML code for making a checkbox?
|
|
17648
|
Which of the following is the correct way to add background color in HTML?
|
|
17649
|
Which of the following attributes is used to open an hyperlink in new tab?
|
|
17650
|
Which of the following tags is used to add a line-break in HTML?
|
|
17651
|
Which of the following tags is used to make a portion of text italic in HTML?
|
|
17652
|
What is the purpose of using div tags in HTML?
|
|
17653
|
Which of the following is the correct way of creating an hyperlink in HTML?
|
|
17654
|
Which of the following attributes is used to add link to any element?
|
|
17655
|
How many attributes are there in HTML5?
|
|
17656
|
How many heading tags are there in HTML5?
|
|
17657
|
What is the font-size of the h1 heading tag?
|
|
17658
|
Which of the following characters indicate closing of a tag?
|
|
17659
|
Which of the following HTML element is used for creating an unordered list?
|
|
17660
|
Which of the following HTML Elements is used for making any text bold ?
|
|
17661
|
How is document type initialized in HTML5.?
|
|
17662
|
Which of the following method is used to query documents in collections?
|
|
17663
|
Command to check existence of collection is _____________
|
|
17664
|
Which of the following also returns a list of databases?
|
|
17665
|
Which of the following operation is used to switch to new database mydb?
|
|
17666
|
___________ command display the list of databases.
|
|
17667
|
After starting the mongo shell, your session will use the ________ database by default.
|
|
17668
|
mongo looks for a database server listening on port 27017 on the ________ interface.
|
|
17669
|
__________ is a part of the standard MongoDB distribution and provides a full JavaScript environment.
|
|
17670
|
____________ utility makes it possible to manipulate files stored in your MongoDB instance in GridFS objects from the command line.
|
|
17671
|
Which of the following is a utility to check disk I/O performance independently of MongoDB?
|
|
17672
|
_________ is a diagnostic tool for inspecting BSON files.
|
|
17673
|
__________ is the primary daemon process for the MongoDB system
|
|
17674
|
__________ sends all diagnostic logging information to a log file instead of to standard output or to the host’s syslog system.
|
|
17675
|
___________ is a routing service for MongoDB shard configurations that processes queries from the application layer.
|
|
17676
|
To backup all the databases in a cluster via mongodump, you should have the ___________ role.
|
|
17677
|
____________ does not dump the content of the local database.
|
|
17678
|
Can I play audios in HTML?
|
|
17679
|
Sometimes mongod.exe is visible on public networks without running in _________ Mode with the auth setting.
|
|
17680
|
<meta> tag cannot be defined in the <head> tag.
|
|
17681
|
MongoDB is installed unattended on Windows from the command line using ____________
|
|
17682
|
___________ allows you to scale your cluster linearly by adding more machines.
|
|
17683
|
While searching on the Internet, you decide to check in more than one search engine because?
|
|
17684
|
User account running mongod has _______ permissions for the directory.
|
|
17685
|
Which of the following file is not a MongoDB configuration file?
|
|
17686
|
ASCII stands for______
|
|
17687
|
The MongoDB process listens on port _________ by default.
|
|
17688
|
The MongoDB instance stores its _________ files in /var/lib/mongo by default.
|
|
17689
|
For frames in HTML, how do you specify the rest of the screen?
|
|
17690
|
What are meta tags used for?
|
|
17691
|
To install the latest stable version of MongoDB on SUSE, issue ______________
|
|
17692
|
When creating a Web document, what format is used to express an image's height and width?
|
|
17693
|
How can we resize the image?
|
|
17694
|
What are <div> tags used for?
|
|
17695
|
____________ package contains the mongo shell.
|
|
17696
|
mongod process is stopped by issuing which of the following command?
|
|
17697
|
Command to install the latest stable version of MongoDB Enterprise in Ubuntu is ______________
|
|
17698
|
Is width=â€100†and width=â€100%†the same?
|
|
17699
|
Which of the following is the Ubuntu package management tool?
|
|
17700
|
MongoDB only provides Enterprise packages for Ubuntu ________ LTS.
|
|
17701
|
The href attribute in the link tag specifies the:
|
|
17702
|
Which of the following is not a part of mongodb-enterprise-tools?
|
|
17703
|
______ package contains the mongod daemon and associated configuration and init scripts.
|
|
17704
|
Which of the following is a metapackage for enterprise?
|
|
17705
|
Text/Html is called the __________ of the page
|
|
17706
|
_____________ is a native OS-X-application for MongoDB management.
|
|
17707
|
Which of the following tool can be used to reload a database dump?
|
|
17708
|
Which of the following is used for creating a binary export of the contents of a Mongo database?
|
|
17709
|
What is mean by DTD ?
|
|
17710
|
__________ is a command-line utility to import content from a JSON, CSV, or TSV.
|
|
17711
|
___________ manipulate files stored in your MongoDB instance in GridFS.
|
|
17712
|
Point out the wrong statement.
|
|
17713
|
DOM stands for
|
|
17714
|
Which of the following network analyzer fully supports MongoDB?
|
|
17715
|
Which of the following is simplest tool for installation of MongoDB?
|
|
17716
|
Which of the following is used increase the col width?
|
|
17717
|
Which of the following provides low-level tracing/sniffing view into database activity?
|
|
17718
|
Which of the following is used increase the row height?
|
|
17719
|
mongosniff requires the ___________ network library and is only available for Unix-like systems.
|
|
17720
|
Which of the following tool is similar to the UNIX/Linux top utility?
|
|
17721
|
mongostat tool is similar to the UNIX/Linux _________ utility.
|
|
17722
|
Caption Tag in HTML ?
|
|
17723
|
___________ is a command-line tool that displays a summary list of status statistics for a currently running MongoDB instance.
|
|
17724
|
___________ provides statistics on the per-collection level.
|
|
17725
|
Which of the following is valid colour code ?
|
|
17726
|
Which of the following is web-based client software for MongoDB?
|
|
17727
|
Administrative information in MongoDB can also be accessed through _____________
|
|
17728
|
Which of the following attributes comes in handy when borders have to be put between groups of columns instead of every column?
|
|
17729
|
What is the interactive shell for MongoDB called?
|
|
17730
|
HTML Code written in MAC can be browsed in a PC with Window 7 installed , User will be able to see same design that was designed on the MAC Pc.
|
|
17731
|
Who was the primary author of HTML?
|
|
17732
|
HTML program is saved using _________ extension.
|
|
17733
|
HTML stands for ________.
|
|
17734
|
Opening Tag of HTML Tag is called as ________.
|
|
17735
|
What is the difference between XML and HTML?
|
|
17736
|
NoSQL databases is used mainly for handling large volumes of ______________ data.
|
|
17737
|
________ stores are used to store information about networks, such as social connections.
|
|
17738
|
Which of the following are the simplest NoSQL databases?
|
|
17739
|
Most NoSQL databases support automatic __________ meaning that you get high availability and disaster recovery.
|
|
17740
|
How to you modify a border image using CSS3?
|
|
17741
|
“Sharding†a database across many server instances can be achieved with _______________
|
|
17742
|
Which of the following is a wide-column store?
|
|
17743
|
Which of the following is a NoSQL Database Type?
|
|
17744
|
Point out the correct statement.
|
|
17745
|
Which of the following is not a NoSQL database?
|
|
17746
|
How to rotate objects using CSS3?
|
|
17747
|
MongoDB uses a ____________ lock that allows concurrent read access to a database but exclusive write access to a single write operation.
|
|
17748
|
MongoDB supports fixed-size collections called ____________ collections.
|
|
17749
|
Has CSS3 been fully supported by all browsers?
|
|
17750
|
_____________ can be used for batch processing of data and aggregation operations.
|
|
17751
|
MongoDB can be used as a ____________ taking advantage of load balancing and data replication features over multiple machines for storing files.
|
|
17752
|
MongoDB scales horizontally using _________ for load balancing purpose.
|
|
17753
|
___________ replicas maintain a copy of the data on the primary using built-in replication.
|
|
17754
|
MongoDB provides high ____________ with replica sets.
|
|
17755
|
With ________ MongoDB supports a complete backup solution and full deployment monitoring.
|
|
17756
|
Dynamic schema in MongoDB makes ____________ easier for applications.
|
|
17757
|
How do four values work on border-radius
|
|
17758
|
MongoDB is a _________ database that provides high performance, high availability, and easy scalability.
|
|
17759
|
MongoDB has been adopted as ________ software by a number of major websites and services.
|
|
17760
|
Initial release of MongoDB was in the year?
|
|
17761
|
Point out the wrong statement.
|
|
17762
|
Can you have multiple box-shadows?
|
|
17763
|
MongoDB Queries can return specific fields of documents which also include user-defined __________ functions.
|
|
17764
|
Which of the following format is supported by MongoDB?
|
|
17765
|
What are the first three values of text-shadow in order?
|
|
17766
|
Point out the correct statement.
|
|
17767
|
Which of the following language is MongoDB written in?
|
|
17768
|
What does the a stand for in RGBa?
|
|
17769
|
Which prefix do you need to get CSS3 properties to work on older Mozilla Firefox browsers?
|
|
17770
|
If you put a value of 0 for a Border-Radius what will happen?.
|
|
17771
|
Box-Shadow is a property that allows developers to apply a....
|
|
17772
|
__________ is a property that allows developers to add rounded corners on the design elements.
|
|
17773
|
What does RGBa mean?
|
|
17774
|
True or False. In vertical offsets for box shadows, the (-1) means that the box-shadow will be below the box?
|
|
17775
|
Does the box-shadow support all browsers ?
|
|
17776
|
Look at the code. What piece of code is missing when make a text shadow? #basicTextShadow p{ text-shadow: 1px 1px 3px; }
|
|
17777
|
How to create transition effects using CSS3?
|
|
17778
|
____________________sorting is not supported by MongoDB.
|
|
17779
|
The application, that communicates with application MongoDB by way of a client library, is called _________________
|
|
17780
|
How to re-size/scale objects using CSS3?
|
|
17781
|
which field is always the first field in the document.?
|
|
17782
|
Howmany byte counter in BSON is starting with a random value ?
|
|
17783
|
How to rotate objects using CSS3?
|
|
17784
|
In which format MongoDB represents document structure?
|
|
17785
|
Which of these are valid CSS3 transformation statements.
|
|
17786
|
Is MongoDB better than other SQL databases?
|
|
17787
|
Which of the following is correct option ?
|
|
17788
|
How to force a word wrap using CSS3?
|
|
17789
|
Which is not a supported index type in MongoDB?
|
|
17790
|
A collection in MongoDB is a group of ......................
|
|
17791
|
How to add text shadow using CSS3?
|
|
17792
|
How to resize a background image using CSS3?
|
|
17793
|
How to you modify a border image using CSS3?
|
|
17794
|
How do you add shadow to elements in CSS3?
|
|
17795
|
Hidden member is used to support dedicated functions, such as backup or reporting.
|
|
17796
|
How can you created rounded corners using CSS3?
|
|
17797
|
Which statements is correct about mongoose in MongoDB ?
|
|
17798
|
What is the good alternatives to MongoDB?
|
|
17799
|
The concatenation of the collection name and database name is called a -
|
|
17800
|
what is MongoDB?
|
|
17801
|
Does MongoDB supports query joins between collections ?
|
|
17802
|
in how much time the MongDB writes are written to the journal?
|
|
17803
|
A collection and a document in MongoDB is equivalent to............. concepts respectively.
|
|
17804
|
In which year the MongoDB was Initial release?
|
|
17805
|
Which of the foliowing is wrong statement -
|
|
17806
|
The MongoDB is written in .................... language.
|
|
17807
|
______________ rolls back all transactions that were incomplete at the time of crash.
|
|
17808
|
__________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.
|
|
17809
|
___________ determines which transactions to undo, which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.
|
|
17810
|
The __________________ contains a list of pages that have been updated in the database buffer.
|
|
17811
|
There are special redo-only log records generated during transaction rollback, called _________ in ARIES.
|
|
17812
|
Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the _______ field of the page.
|
|
17813
|
__________ scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.
|
|
17814
|
______________ is used to minimize unnecessary redos during recovery.
|
|
17815
|
ARIES uses a ___________ to identify log records, and stores it in database pages.
|
|
17816
|
If ___________ are not obtained in undo operation it will cause problem in undo-phase.
|
|
17817
|
For correct behaviour during recovery, undo and redo operation must be
|
|
17818
|
Shadow paging has
|
|
17819
|
Immediate database modification technique uses
|
|
17820
|
An operation is said to be __________ if executing it several times in a row gives the same result as executing it once.
|
|
17821
|
To perform logical redo or undo, the database state on disk must be operation ___________ that is, it should not have partial effects of any operation.
|
|
17822
|
Redo operations are performed exclusively using
|
|
17823
|
Which of the following is used for undo operations alone?
|
|
17824
|
Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called
|
|
17825
|
Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.
|
|
17826
|
If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is
|
|
17827
|
A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is
|
|
17828
|
A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is
|
|
17829
|
A _______________ configuration can make takeover by the backup site almost instantaneous.
|
|
17830
|
The time to process the remote backup can be reduced by
|
|
17831
|
The simplest way of transferring control is for the old primary to receive __________ from the old backup site.
|
|
17832
|
When the __________ the backup site takes over processing and becomes the primary.
|
|
17833
|
The backup is taken by
|
|
17834
|
Remote backup system must be _________ with the primary site.
|
|
17835
|
The remote backup site is sometimes also called the
|
|
17836
|
How can you find rows that do not match some specified condition?
|
|
17837
|
The EXISTS keyword will be true if:
|
|
17838
|
Which of the following is not an aggregate function?
|
|
17839
|
Subqueries cannot:
|
|
17840
|
In the query given above which one of the following is a temporary relation?
|
|
17841
|
Which of the following creates a temporary relation for the query on which it is defined?
|
|
17842
|
The ________ keyword is used to access attributes of preceding tables or subqueries in the from clause.
|
|
17843
|
Aggregate functions can be used in the select list or the_______clause of a select statement or subquery. They cannot be used in a ______ clause.
|
|
17844
|
SQL applies predicates in the _______ clause after groups have been formed, so aggregate functions may be used.
|
|
17845
|
We can test for the nonexistence of tuples in a subquery by using the _____ construct.
|
|
17846
|
The phrase “greater than at least one†is represented in SQL by _____
|
|
17847
|
The ____ connective tests for set membership, where the set is a collection of values produced by a select clause. The ____ connective tests for the absence of set membership.
|
|
17848
|
A Boolean data type that can take values true, false, and________
|
|
17849
|
All aggregate functions except _____ ignore null values in their input collection.
|
|
17850
|
The result of _____unknown is unknown.
|
|
17851
|
The primary key must be
|
|
17852
|
Using the ______ clause retains only one copy of such identical tuples.
|
|
17853
|
In an employee table to include the attributes whose value always have some value which of the following constraint must be used?
|
|
17854
|
The predicate in a where clause can involve Boolean operations such as and. The result of true and unknown is_______ false and unknown is _____ while unknown and unknown is _____
|
|
17855
|
If the attribute phone number is included in the relation all the values need not be entered into the phone number column. This type of entry is given as
|
|
17856
|
A _____ indicates an absent value that may exist but be unknown or that may not exist at all.
|
|
17857
|
The _____________ is essentially used to search for patterns in target string.
|
|
17858
|
_________ joins are SQL server default
|
|
17859
|
_____ clause is an additional filter that is applied to the result.
|
|
17860
|
The number of attributes in relation is called as its
|
|
17861
|
If we want to retain all duplicates, we must write ________ in place of union.
|
|
17862
|
The union operation automatically __________ unlike the select clause.
|
|
17863
|
The intersection operator is used to get the _____ tuples.
|
|
17864
|
The union operation is represented by
|
|
17865
|
_____ operator is used for appending two strings.
|
|
17866
|
In SQL the spaces at the end of the string are removed by _______ function.
|
|
17867
|
’_ _ _ ’ matches any string of ______ three characters. ’_ _ _ %’ matches any string of at ______ three characters.
|
|
17868
|
In the given query which of the keyword has to be inserted?
|
|
17869
|
Which of the following statements contains an error?
|
|
17870
|
Which of the following fields are displayed as output?
|
|
17871
|
This Query can be replaced by which one of the following?
|
|
17872
|
The ________ clause is used to list the attributes desired in the result of a query.
|
|
17873
|
The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predicate.
|
|
17874
|
Here which of the following displays the unique values of the column?
|
|
17875
|
Updates that violate __________ are disallowed.
|
|
17876
|
This command performs which of the following action?
|
|
17877
|
To remove a relation from an SQL database, we use the ______ command.
|
|
17878
|
An attribute A of datatype varchar(20) has the value “Aviâ€. The attribute B of datatype char(20) has value â€Reedâ€. Here attribute A has ____ spaces and attribute B has ____ spaces.
|
|
17879
|
The basic data type char(n) is a _____ length character string and varchar(n) is _____ length character.
|
|
17880
|
What type of statement is this?
|
|
17881
|
Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database?
|
|
17882
|
Which one of the following is used to define the structure of the relation, deleting relations and relating schemas?
|
|
17883
|
The _________ provides a set of operations that take one or more relations as input and return a relation as an output.
|
|
17884
|
A ________ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys.
|
|
17885
|
The _______ operator takes the results of two queries and returns only rows that appear in both result sets.
|
|
17886
|
The most commonly used operation in relational algebra for projecting a set of tuple from a relation is
|
|
17887
|
The _______operation performs a set union of two “similarly structured†tables
|
|
17888
|
The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match.
|
|
17889
|
The_____ operation allows the combining of two relations by merging pairs of tuples, one from each relation, into a single tuple.
|
|
17890
|
Which one of the following is a procedural language?
|
|
17891
|
Student(ID, name, dept name, tot_cred) In this query which attributes form the primary key?
|
|
17892
|
Using which language can a user request information from a database?
|
|
17893
|
A _________ integrity constraint requires that the values appearing in specified attributes of any tuple in the referencing relation also appear in specified attributes of at least one tuple in the referenced relation.
|
|
17894
|
The ______ is the one in which the primary key of one relation is used as a normal attribute in another relation.
|
|
17895
|
The relation with the attribute which is the primary key is referenced in another relation. The relation which has the attribute as a primary key is called
|
|
17896
|
An attribute in a relation is a foreign key if the _______ key from one relation is used as an attribute in that relation.
|
|
17897
|
Which one of the following cannot be taken as a primary key?
|
|
17898
|
Which one of the following attribute can be taken as a primary key?
|
|
17899
|
A _____ is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.
|
|
17900
|
The subset of a super key is a candidate key under what condition?
|
|
17901
|
Consider attributes ID, CITY and NAME. Which one of this can be considered as a super key?
|
|
17902
|
Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?
|
|
17903
|
The tuples of the relations can be of ________ order.
|
|
17904
|
A domain is atomic if elements of the domain are considered to be ____________ units.
|
|
17905
|
Department (dept name, building, budget) and Employee (employee_id, name, dept name, salary) Here the dept_name attribute appears in both the relations. Here using common attributes in relation schema is one way of relating ___________ relations.
|
|
17906
|
Course(course_id,sec_id,semester) Here the course_id,sec_id and semester are __________ and course is a _________
|
|
17907
|
For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.
|
|
17908
|
The term attribute refers to a ___________ of a table.
|
|
17909
|
The term _______ is used to refer to a row.
|
|
17910
|
A ________ in a table represents a relationship among a set of values.
|
|
17911
|
A relational database consists of a collection of
|
|
17912
|
Which one of the following statement is not correct for Digital signature?
|
|
17913
|
The convenient place to store contact information for quick retrieval is
|
|
17914
|
Messenger Mailbox is present in
|
|
17915
|
The E-mail component of Internet Explorer is called
|
|
17916
|
SMTP stands for
|
|
17917
|
The program supplied by VSNL when you ask for Internet connection for the e-mail access is
|
|
17918
|
E-mail address is made up of
|
|
17919
|
A popular application of computer networking is the world wide web of newsgroup called
|
|
17920
|
A simple protocol used for fetching e-mail from a mailbox is
|
|
17921
|
SMTP is a simple
|
|
17922
|
Most new readers present newsgroups articles in
|
|
17923
|
What is Usenet?
|
|
17924
|
IRC stands for
|
|
17925
|
Telnet is no versatile that you can establish Telnet session on one of the following types of communication:
|
|
17926
|
The Unix command tty (option) that displays the pathname of your terminals and prints synchronous line number of the device is given by the option:
|
|
17927
|
Name the software which comes with a basic telnet client package:
|
|
17928
|
To use Telnet and the host’s resources, you will need to know
|
|
17929
|
The Telnet protocol assumes that each end of the connection – the client and the server – is
|
|
17930
|
File to the Web site is transferred by using:
|
|
17931
|
The Internet standard is
|
|
17932
|
FTP is used for
|
|
17933
|
The Internet Protocol (IP)
|
|
17934
|
World Wide Web pages can be described as multimedia pages. This means that the pages may contain
|
|
17935
|
A host on the Internet finds another host by its
|
|
17936
|
For a small Web site, one needs to buy space from the
|
|
17937
|
Which of the following topology is least affected by addition/removal of a node?
|
|
17938
|
The network where all the nodes are around a central server is a
|
|
17939
|
Cell based architecture is known as
|
|
17940
|
Main protocol used in Internet
|
|
17941
|
Which of the following topology share a single channel on which all station can receive and transmit?
|
|
17942
|
Which of the following networking solution is suitable for networking in a building?
|
|
17943
|
Computers on the Internet owned and operated by education institution form part of the
|
|
17944
|
A small network making up the Internet and also having a small numbers of computers within it is called
|
|
17945
|
The ground station in VSAT communication is called
|
|
17946
|
In reality, Internet Protocol recognizes only
|
|
17947
|
In MODEMS
|
|
17948
|
Internet is governed by
|
|
17949
|
Web site is a collection of
|
|
17950
|
If a class(has one virtual function) has 5 Objects then how many Vtable it will have?
|
|
17951
|
Is it mandatory to override virtual function in Derived class?
|
|
17952
|
Can we call virtual function using object?
|
|
17953
|
Can we have pure Virtual Destructor?
|
|
17954
|
Can we have Virtual Destructor ?
|
|
17955
|
What is dangling pointer?
|
|
17956
|
How many Access specifier are there in C++?
|
|
17957
|
Can this pointer point to another class?
|
|
17958
|
What is VTable?
|
|
17959
|
Can we overload Constructor?
|
|
17960
|
Can we reinitialize reference variable?
|
|
17961
|
Can we create Nested classes in C++?
|
|
17962
|
Can we create pointer to Abstract class?
|
|
17963
|
Can we reference a pointer
|
|
17964
|
Can we have Constructor in Abstract class?
|
|
17965
|
Is there any difference in below two statements?
|
|
17966
|
Can we create object of Abstract class?
|
|
17967
|
How to stop Name Mangling in C++?
|
|
17968
|
Is it good idea to return an address or a reference of a local variable?
|
|
17969
|
Is const better than #define?
|
|
17970
|
Which of the following is Memory Leak detection tool?
|
|
17971
|
Exceptions are Caught at ?
|
|
17972
|
Can we create array of reference?
|
|
17973
|
When can we have two classes with same name?
|
|
17974
|
Can we create our own workspace?
|
|
17975
|
Can we assign null to void pointer?
|
|
17976
|
Can a class contain another class in it ?
|
|
17977
|
What is the size of empty class?
|
|
17978
|
What is abstract class?
|
|
17979
|
How many object can be created of a Class in C++?
|
|
17980
|
When Virtual Table is created?
|
|
17981
|
C++ is superset of which langauge?
|
|
17982
|
What is size of void in C++?
|
|
17983
|
What should be the output?
|
|
17984
|
Can any function call itself?
|
|
17985
|
What is size of void in bytes?
|
|
17986
|
Can a Structure contain pointer to itself?
|
|
17987
|
Can a for loop contain another for loop?
|
|
17988
|
What is the full form of oop
|
|
17989
|
What is the value of a in below program?
|
|
17990
|
Which operator has highest precedence?
|
|
17991
|
Which operator has highest precedence in * / % ?
|
|
17992
|
How to access and edit data in data file handling using structures
|
|
17993
|
What is output of below program?
|
|
17994
|
How many times CppBuzz.com is printed?
|
|
17995
|
Can we overload functions in C++?
|
|
17996
|
What is currect syntax of for loop?
|
|
17997
|
Can we typecast void * into int *?
|
|
17998
|
What should be the output of below program?
|
|
17999
|
Which operator has more precedance in below list?
|
|
18000
|
Which operator can not be overloaded?
|
|
18001
|
What is size of int data type in cpp?
|
|
18002
|
What following operator is called ?:
|
|
18003
|
What is the output of below program?
|
|
18004
|
How many loops are there in C++ 98?
|
|
18005
|
Voice mail, E-mail, Online service, the Internet and the WWW are all example of
|
|
18006
|
The first page that you normally view at a Website is its
|
|
18007
|
TCP is a commonly used protocol at
|
|
18008
|
Which of the following protocols is used for WWW ?
|
|
18009
|
The first network that planted the seeds of Internet was
|
|
18010
|
The communication protocol used by Internet is
|
|
18011
|
A user can get files from another computer on the Internet by using
|
|
18012
|
The server on the Internet is also known as a
|
|
18013
|
The process of keeping addresses in memory for future use is called
|
|
18014
|
The equipment needed to allow home computers to connect to the Internet is called a
|
|
18015
|
A computer on internet are identified by
|
|
18016
|
Moving from one website to another is called
|
|
18017
|
Full form of HTML is
|
|
18018
|
What is the full form of WWW in web address ?
|
|
18019
|
Internet explorer falls under
|
|
18020
|
Verification of a login name and password is known as
|
|
18021
|
Which one of the following is not a search engine?
|
|
18022
|
A Web site's front page /main page is called
|
|
18023
|
In internet terminology IP means
|
|
18024
|
The process of transferring files from a computer on the Internet to your computer is called
|
|
18025
|
The computer jargon - WWWW, stands for
|
|
18026
|
HTML is used to create
|
|
18027
|
Which of the following is a correct format of Email address?
|
|
18028
|
The Internet was originally a project of which agency?
|
|
18029
|
Free of cost repair of software bug available at Internet is called
|
|
18030
|
Which of the following layer in Web Service Protocol Stack is responsible for centralizing services into a common registry and providing easy publish/find functionality?
|
|
18031
|
Which of the following component of Web service describes interfaces to web services?
|
|
18032
|
Which of the following is correct about SOAP?
|
|
18033
|
How response is sent in XML-RPC?
|
|
18034
|
What SOAP stands for?
|
|
18035
|
Which of the following layer in Web Service Protocol Stack is responsible for encoding messages in a common XML format so that messages can be understood at either end?
|
|
18036
|
What HTTP stands for?
|
|
18037
|
Which of the following role of web service architecture implements the service and makes it available on the Internet?
|
|
18038
|
_________ is a directory for storing information about web services.
|
|
18039
|
SOAP is a W3C standard ! (True / False)
|
|
18040
|
SOAP is a format for sending messages and is also called as __________.
|
|
18041
|
SOAP is platform ___________.
|
|
18042
|
SOAP is a _________.
|
|
18043
|
SOAP is an _________ to let applications exchange information over HTTP.
|
|
18044
|
Web Services is used to -
|
|
18045
|
Web services use ________ to code and to decode data.
|
|
18046
|
Web-applications were developed in order to interact _____________ .
|
|
18047
|
Long form of SOAP is ______________.
|
|
18048
|
UDDI Stands for ______________________.
|
|
18049
|
WSDL Stands for ______________________.
|
|
18050
|
Which of the following is considered as Web Service Platform Elements ?
|
|
18051
|
__________ is the basis for Web services.
|
|
18052
|
Web services can be discovered using ________.
|
|
18053
|
Web services are self-contained and self-describing ! (True / False)
|
|
18054
|
Web services communicate using __________.
|
|
18055
|
The basic Web Services platform is combination of _____ and _______.
|
|
18056
|
Web Services are _______________.
|
|
18057
|
_______________ is used to convert your application into Web-Application.
|
|
18058
|
For implementation of web services, widely used approaches are of type
|
|
18059
|
Simpler approach of implementing a web service is named as
|
|
18060
|
Factory to use our Spring bean as the implementation
|
|
18061
|
The standard for deploying web services on the Java EE platform as of Java EE 1.4
|
|
18062
|
A more complex approach for web service implementation, is referred to as
|
|
18063
|
XML digital signatures provide
|
|
18064
|
Which of the following style(s) is/are Strictly WS-I compliant?
|
|
18065
|
Web services can be discovered using ________
|
|
18066
|
Which of the following is correct about Service Description layer in Web Service Protocol Stack?
|
|
18067
|
The basic Web Services platform is combination of _____ and _______
|
|
18068
|
n contrast, the contract-first approach encourages you to think of the service contract first in terms of
|
|
18069
|
_______ is used to convert your application into Web-Application.
|
|
18070
|
_______ is used to convert your application into Web-Application.
|
|
18071
|
How deep learning models are built on Keras
|
|
18072
|
Which tool is a deep learning wrapper on TensorFlow
|
|
18073
|
Can we use GPU for faster computations in TensorFlow
|
|
18074
|
C=-tf.reduce_sum(Y*tf.log(out))
|
|
18075
|
out=tf.sigmoid(tf.add(tf.matmul(X,W), b))
|
|
18076
|
How do you feed external data into placeholders?
|
|
18077
|
How do we perform caculations in TensorFlow?
|
|
18078
|
Why Tensorflow uses computational graphs?
|
|
18079
|
Can we have multidimentional tensors
|
|
18080
|
Which tool is NOT Suited for building ANN models
|
|
18081
|
What is the meaning of model=sequentil() in Keras?
|
|
18082
|
Kears is a deep learning framework on which tool
|
|
18083
|
How can we improve the calculation speed in TensorFlow, without losing accuracy?
|
|
18084
|
tf.reduce_sum(tf.square(out-Y))
|
|
18085
|
out=tf.add(tf.matmul(X,W), b)
|
|
18086
|
What does feed_dict do?
|
|
18087
|
In TensorFlow, what is the used of a session?
|
|
18088
|
How calculations work in TensorFlow
|
|
18089
|
A tensor is similar to
|
|
18090
|
Which tool is best suited for solving Deep Learning problems
|
|
18091
|
Which of following functions should not be used at the output layer to classify an image?
|
|
18092
|
If it is wished to predict the probabilities of n classes (p1, p2..pk) such that sum equals to unity, which of the following can be used as an activation function?
|
|
18093
|
The nodes in the i/p layer is 10 and that in the hidden layer is 5. The max connections from the i/p layer to the hidden layer are?
|
|
18094
|
From the following choices where can deep learning be used?
|
|
18095
|
While creating the Bayesian network, the relation between a node and its predecessor is?
|
|
18096
|
In the full joint probability distribution, how can the entries be calculated?
|
|
18097
|
The network that involves feedback links from o/p to i/p and hidden layers is called as
|
|
18098
|
Fill in the blank with the correct choice from the options given. Neural Networks are complex functions with many parameters.
|
|
18099
|
The number of 3-D image processing techniques that are present in image perception?
|
|
18100
|
What kind of signal is used in speech recognition?
|
|
18101
|
Plasticity in neural networks is?
|
|
18102
|
If degree 4 polynomial is fitted in linear regression, what will happen?
|
|
18103
|
Which of the following statement is correct in regard to outliers in Linear regression?
|
|
18104
|
Which of the following is accurate with respect to Normal Equation?
|
|
18105
|
Which of the following evaluation metrics can be used to evaluate a model while modeling a continuous output variable?
|
|
18106
|
In backpropagation rule, how can the learning be stopped?
|
|
18107
|
A format will modify both the stored value and the displayed value.
|
|
18108
|
What are the general limitations of back propagation rule?
|
|
18109
|
Considering backpropagation, which of the following options is true?
|
|
18110
|
What of the following is accurate in regard to backpropagation algorithm?
|
|
18111
|
What results in minimization of errors among the favored & real outputs?
|
|
18112
|
Delta learning is of the unsupervised kind?
|
|
18113
|
What changed into the second stage in perceptron version known as?
|
|
18114
|
False minima may be reduced through deterministic updates?
|
|
18115
|
For practical implementation what type of approximation is used on Boltzmann law?
|
|
18116
|
Which of the following option is true about the ok-NN set of rules?
|
|
18117
|
Which of the following distance metric cannot be utilized in k-NN?
|
|
18118
|
k-NN set of rules does more computation on check time rather than train time.
|
|
18119
|
Which of the subsequent is a way regularly utilized in TensorFlow and system learning?
|
|
18120
|
Although system getting to know is an interesting concept, there are restrained business programs wherein it's miles beneficial.
|
|
18121
|
NumPy is imported as?
|
|
18122
|
TensorFlow is imported as?
|
|
18123
|
Growth in length of a convolutional kernel might always boom the performance of a convolutional community.
|
|
18124
|
The trouble you are trying to remedy has a small amount of records. Luckily, you have a pre-educated neural community that turned into educated on a similar problem. Which of the following methodologies could you choose to utilize this pre-skilled community?
|
|
18125
|
What are the elements to choose the intensity of the neural network?
|
|
18126
|
For a photo reputation problem (spotting a cat in a photograph), which architecture of neural network might be higher suited to remedy the trouble?
|
|
18127
|
For a category task, in place of random weight initializations in a neural network, we set all the weights to zero. Which of the subsequent statements is authentic?
|
|
18128
|
Which gradient approach is finer whilst the facts is too massive to address in RAM simultaneously?
|
|
18129
|
While pooling layer is introduced in a convolutional neural network, translation in-variance is preserved. Genuine or fake?
|
|
18130
|
Assume a convolutional neural community is educated on ImageNet dataset (item reputation dataset). This skilled model is then given a totally white image as an enter. The output probabilities for this enter might be same for all lessons. Real or false?
|
|
18131
|
What if we use a gaining knowledge of fee that’s too huge?
|
|
18132
|
Which of the subsequent assertion is the high-quality description of early stopping?
|
|
18133
|
What's a lifeless unit in a neural community?
|
|
18134
|
A numeric variable can shop numeric values with a maximum of eight digits.
|
|
18135
|
Y = ax^2 + bx + c (polynomial equation of degree 2)Can this equation be represented via a neural network of a single hidden layer with linear threshold?
|
|
18136
|
In a neural network, which of the subsequent strategies is used to deal with overfitting in TensorFlow?
|
|
18137
|
14 The variety of neurons inside the output layer must in shape the wide variety of instructions (in which the variety of lessons is extra than 2) in a supervised studying project in TensorFlow. Real or false?
|
|
18138
|
As opposed to trying to acquire absolute 0 error, we set a metric called Bayes blunders that's the error we hope to achieve. What may be the cause for the use of Bayes blunders in TensorFlow?
|
|
18139
|
Batch Normalization is useful due to the fact?
|
|
18140
|
Wherein neural internet architecture, does weight sharing occur in TensorFlow?
|
|
18141
|
Can a neural network model the characteristic (y=1/x) in TensorFlow?
|
|
18142
|
Suppose that you have to limit the value feature via converting the parameters. Which of the subsequent approach could be used for this in TensorFlow?
|
|
18143
|
What's the series of the following duties in a perceptron in tensorflow?
|
|
18144
|
In case you growth the range of hidden layers in a Multi-Layer Perceptron, the category errors of check facts always decreases in TensorFlow. Authentic or fake?
|
|
18145
|
Which of the following is authentic approximately model capability (in which version capacity method the potential of the neural community to approximate complex capabilities) in TensorFlow?
|
|
18146
|
Which of the following techniques perform comparable operations as the dropout in a neural community in TensorFlow?
|
|
18147
|
“Convolutional Neural Networks can carry out various forms of transformation (rotations or scaling) in an enterâ€. Is the assertion correct true or false in TensorFlow?
|
|
18148
|
What are the stairs for the usage of a gradient descent algorithm in TensorFlow?
|
|
18149
|
In TensorFlow, knowing the weight and bias of each neuron is the maximum crucial step. If you could by some means get the best fee of weight and bias for each neuron, you may approximate any characteristic. What will be the first-class way to technique this?
|
|
18150
|
Which of the subsequent declaration(s) effectively represents an actual neuron in TensorFlow?
|
|
18151
|
Which of the subsequent declaration(s) effectively represents an actual neuron in TensorFlow?
|
|
18152
|
Which of the subsequent declaration(s) effectively represents an actual neuron in TensorFlow?
|