Thursday, June 15, 2017

Up work DOT NET FUNDAMENTALS TEST 2018

Hello Freelancer, Get the DOT NET FUNDAMENTALS TEST of Latest version 2018. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website.

1. Which of the following are included in a Static assembly?
Answers:
  1. Modules
  2. Type metadata
  3. MSIL code
  4. Assembly manifest
2. Which of the following are the main goals behind ADO .NET?
Answers:
  1. To provide seamless support for XML
  2. To support COM directly
  3. To provide an expandable and scalable data access architecture for the revolutionary n-tier programming model
  4. To extend the current capabilities of ADO
3. Application domains are created by:
Answers:
  1. Windows shell
  2. ASP.Net
  3. IE
  4. None of the above
4. Which of the following are correct about delegates?
Answers:
  1. A delegate is an object that refers to a subroutine, function or other method
  2. A delegate variable acts as a pointer to a subroutine or function
  3. A delegate can not hold the address of a class’s shared method
  4. Delegate variables are sometimes called type-safe function pointers
5. Which of the following protocols can be used for .Net Remoting?
Answers:
  1. TCP
  2. HTTP
  3. SMTP
  4. All of the above
6. Which of the following is correct for value and reference types in .NET?
Answers:
  1. Value types directly contain their data
  2. Reference types store a reference to the value’s memory address
  3. Value types can be built-in but can’t be user-defined
  4. All of the above
7. Which of these are runtime hosts in .Net Framework?
Answers:
  1. CLR
  2. IE
  3. IIS
  4. ASP.NET
8. Which of the following run In-Process?
Answers:
  1. EXE file
  2. Resx file
  3. DLL file
  4. OCX file
9. A manifest includes the following data about the assembly
Answers:
  1. File list
  2. None
  3. Referenced assemblies
  4. MSIL information
10. The Process of automatic memory management involves the following tasks:
Answers:
  1. Allocating memory
  2. Registering memory
  3. Implementing finalizers
  4. Using destroy
11. A standard Windows PE file is divided into a number of sections. Which of the following are not valid native image sections?
Answers:
  1. .textdata
  2. .data
  3. .rpdata
  4. .rsrc
12. Which of the following statements is true?
Answers:
  1. You can access managed data from managed code
  2. You can access managed data from managed and unmanaged code
  3. Managed code can access both managed and unmanaged data
  4. Managed code cannot access both managed and unmanaged data
13. Which of the following methods are used to stop a thread?
Answers:
  1. Thread.Interrupt()
  2. Thread.Suspend()
  3. Thread.Sleep()
  4. Thread.Abort()
14. ___________ class grants the permission to manipulate files located in the code assemblies, to code assemblies that match the membership condition.
Answers:
  1. FileCodeGroup
  2. FirstMatchCodeGroup
  3. CodeFileGroup
  4. CodeGroup
15. Which of the following statements is correct with regard to .NET framework managed web pages?
Answers:
  1. They interact directly with the runtime
  2. They do not execute in the native code language
  3. They are interpreted and scripted
  4. All of the above
16. Which of the following protocols can be used for ASP.Net Web Services?
Answers:
  1. TCP
  2. HTTP
  3. SMTP
  4. All of the above
17. When are AssemblyHash values used?
Answers:
  1. They are used throughout the common language runtime to detect a change in assembly contents
  2. They are used in the Common type system for type safety
  3. They are used to change the metadata information in assemblies
18. In.NET generics, the type parameter:
Answers:
  1. Needs to be constrained in container classes
  2. Needs to be constrained in all the classes
  3. Cannot be constrained in container classes
  4. Cannot be constrained in any class
19. How many classes can a single .NET DLL contain?
Answers:
  1. 10
  2. 20
  3. Unlimited
  4. 5
20. Where is the Shared assembly generally stored?
Answers:
  1. Application’s directory
  2. Global assembly cache
  3. C drive
  4. None of the above
21. Which of the following is not correct with regard to shared assembly?
Answers:
  1. Its version can be controlled by the author only
  2. It can be shared by many applications
  3. It must get registered with the machine registry
  4. It is installed in the global assembly cache
22. Which Portable Executable (PE) file does not contain the assembly manifest?
Answers:
  1. Executable
  2. DLL
  3. Module
  4. ALL
23. In .NET framework, what are the options available for packaging?
Answers:
  1. CAB
  2. EXE
  3. MSI
  4. All of the above
24. Which of the following are public methods of System.Object?
Answers:
  1. GetHashCode()
  2. GetType()
  3. Equals()
  4. All of the above
25. Which of the following helps expose COM components to the .NET framework?
Answers:
  1. RCW
  2. CCA
  3. CWA
  4. CCW
26. Which of the following tools can be used to get the metadata information about the assembly and view IL code?
Answers:
  1. soapsuds.exe
  2. lldasm.exe
  3. al.exe
  4. PerfMon.exe
  5. SN.exe
27. Which of the following tools assists Assembly Signing?
Answers:
  1. CASPol.exe
  2. PerfMon.exe
  3. SN.exe
  4. soapsuds.exe
28. In which file can you define the “Process Model” attribute?
Answers:
  1. Web.config
  2. Machine.config
  3. In both files
  4. In neither file
29. C# has a keyword called int. Which .NET type does this map to?
Answers:
  1. System.Int16
  2. System.Int32
  3. System.Int64
  4. System.Int128
30. Which of the options is being referred to in the following statement:
“All incoming requests are processed by a single server object”
Answers:
  1. SingleCall
  2. Client-activated object
  3. Singleton
  4. None of these
31. A user application-domain can be created:
Answers:
  1. Automatically
  2. By using a static method “CreateAppDomain”
  3. By using a static method “CreateDomain”
  4. By using a non static method “CreateAppDomain”
32. The global assembly cache:
Answers:
  1. Can store two dll files with the same name
  2. Can store two dll files with the same name, but different version
  3. Can store two dll files with the same name and same version
  4. Can not store dll files with the same name
33. What does Managed Data refer to?
Answers:
  1. The data stored by CLR
  2. The data allocated by CLR GC
  3. The data de-allocated by CLR GC
  4. The data allocated and de-allocated by CLR GC
34. Which tool can you use to register managed types with the Windows registry?
Answers:
  1. SN.exe
  2. Regasm.exe
  3. lldasm.exe
  4. none
35. Which of the following files is used to implement application and session level events?
Answers:
  1. Global.asax
  2. Web.config
  3. Machine.config
  4. None of the above
36. Which of these classes are used for loading an assembly into an application domain?
Answers:
  1. System.Configuration.Assemblies
  2. system.componentModel
  3. System.Resources
  4. System.AppDomain
37. Which of the following tools can be used to modify and grant permissions to code groups?
Answers:
  1. Soapsuds.exe
  2. Lldasm.exe
  3. CASPol.exe
  4. PerfMon.exe
  5. SN.exe
38. Which of the following does not use metadata?
Answers:
  1. CLR
  2. CTS
  3. JIT compilers
  4. Class loader
  5. None of the above
39. Which of the following functionalities does System.Diagnostics class provide?
Answers:
  1. Reflection
  2. Trace
  3. Manage code
  4. Remoting
40. An application can have any number of modules and files. Which of the following is used to link them together into a single assembly?
Answers:
  1. al.exe
  2. ac.exe
  3. bl.exe
  4. ad.exe
41. What is the command “caspol -lg” used for?
Answers:
  1. To see the private assemblies
  2. To see the assemblies in GAC
  3. To see the code groups defined on your system
  4. To see the metadata information
42. Which of the following is a must for a private assembly?
Answers:
  1. Cryptographically strong name
  2. Unique name
  3. Cryptographically Light name
  4. Global assembly cache
43. Code Manager is a the part of:
Answers:
  1. CTS
  2. CLI
  3. CLS
  4. CLR
44. Why doesn’t .Net runtime offer deterministic destruction?
Answers:
  1. Due to CTS
  2. Due to Finalize class
  3. Due to garbage collection algorithm
  4. Due to the JIT
45. Consider the following two statements and choose the most appropriate option:
Statement 1: Value types are allocated on a stack
Statement 2: Reference types are allocated on a managed CLR Heap
Answers:
  1. Statement 1 is true and statement 2 is false
  2. Statement 2 is true and statement 1 is false
  3. Both statements 1 and 2 are true
  4. Both statements 1 and 2 are false
46. Which of the following is used to notify all waiting threads of a change in the object’s state?
Answers:
  1. The system.Threading.Monitor.ReferenceEquals method
  2. The system.Threading.Monitor.Enter method
  3. The system.Threading.Monitor.PulseAll method
  4. The system.Threading.Monitor.TryEnter method
47. Which of the following manages the code during execution?
Answers:
  1. Coding Manager
  2. JIT
  3. COde Manager
  4. Coder Manager
48. Which type of parameter is passed in subroutines by default?
Answers:
  1. ByRef
  2. ByVal
49. Which of the following is not a member of the Exception class?
Answers:
  1. StackTraceID
  2. Message
  3. InnerException
  4. TargetSite
50. Which transport protocol is used to call a Web Service?
Answers:
  1. SOAP
  2. HTTP
  3. SMTP
  4. ALL
51. How many application domains can exist inside a Win32 process?
Answers:
  1. 1
  2. 2
  3. Any number
  4. 4
52. Which of the following helps Assemblies become self describing?:
Answers:
  1. JIT
  2. Manifest
  3. CTS
  4. Application Domain
53. How will you use the thread pool?
Answers:
  1. By calling the ThreadPool.UserQueueWorkItem() method directly
  2. By passing an instance of WaitCallback delegate to the ThreadPool.QueueUserWorkItem() method
  3. By passing an instance of WaitCallback delegate to the ThreadPool.UserQueueWorkItem() method
  4. By passing an instance of StayCallback delegate to the ThreadPool.QueueUserWorkItem() method
54. The runtime is started automatically by ______________ when the .exe is run.
Answers:
  1. mscore.dll
  2. mscoree.dll
  3. mscor.dll
  4. mscoren.dll
55. Because .NET treats all languages as equal, a class written in C# should be equivalent to a class written in VB.NET, and an interface defined in Managed C++ should be exactly the same as one that is specified in Managed COBOL. Languages must agree on the meanings of these concepts before they can integrate with one another.
Which of the following provides the specifications for this?
Answers:
  1. CLS
  2. CTS
  3. MSIL
  4. CLI
56. .Net assembly stores both data and IL code. A tool is available along with the .NET framework to view within the PE. Which of the following is that tool?
Answers:
  1. ildasm.exe
  2. disasm.exe
  3. deassmbler.exe
  4. deasm.exe
57. Which of the following services are provided by CLR?
Answers:
  1. Application memory isolation
  2. Code Management
  3. Verification of type safety
  4. Conversion of IL to native code
  5. All of the above
58. Which of these files is used for debugging an application?
Answers:
  1. demo.dll
  2. demo.pdb
  3. demo.res
  4. Any of these can be used
59. Compilers of CLS compliant language generate:
Answers:
  1. MSIL code and Metadata
  2. MSIL code
  3. Metadata
  4. Machine code
60. Which of these is used to allow managed code to interoperate with unmanaged code?
Answers:
  1. COM
  2. COM Marshaler
  3. XML
  4. SOAP
61. Which of the following statements is correct.
(a)A Try block must include Catch or Finally sections.
(b)Using an empty Finally section is illegal.
Answers:
  1. Only (a) is true
  2. Only (b) is true
  3. Both (a) and (b) are false
  4. Both (a) and (b) are true
62. The _________________ methods are primarily meant for COM Interoperability use.
Answers:
  1. System.AppDomain.ApplyPolicy
  2. System.AppDomain.CreateComInstanceFrom
  3. System.AppDomain.Load
  4. System.AppDomain.GetAssemblies
63. How does CLR allow multiple applications to be run in a single process?
Answers:
  1. By running them in a special application domain
  2. By making sub process for each process
  3. By loading them in separate application domains
  4. None of the above
64. _____________ helped overcome the DLL conflict (faced by the versions prior to .NET).
Answers:
  1. Strong-named assemblies
  2. Version-aware code storage
  3. Components executing in isolation
  4. All of the above
65. __________ is used to generate the assembly from modules.
Answers:
  1. soapsuds.exe
  2. lldasm.exe
  3. al.exe
  4. PerfMon.exe
  5. SN.exe
66. Which of the following is used as a Serializer for the web services?
Answers:
  1. XmlSerializer
  2. SoapSerializer
  3. BinaryFormatter
  4. SoapFormatter
67. The IL to native code compilation is done by:
Answers:
  1. Code Manager
  2. CTS
  3. JIT
  4. CLS
68. ____ is a subset of the CTS.
Answers:
  1. CLI
  2. cLS
  3. CLR
  4. None of these
69. Which of the following is valid and is included in the type definition?
Answers:
  1. Any attribute that is defined in the type
  2. The name of the type
  3. The visibility of the type
  4. The base types of the type
  5. All of the above
  6. None of the above
70. Which of the following statements is correct?
Answers:
  1. For in-process communication between contexts within a single application domain, Serialization is used as an interception mechanism.
  2. For in-process communication between contexts within a single application domain, Marshaling is used as an interception mechanism.
  3. For in-process communication between contexts within a single application domain, Proxies are used as an interception mechanism.
  4. All of the above
71. Which of the following are used in combination to create the identity of an assembly?
Answers:
  1. Assembly name
  2. Version
  3. Culture
  4. Public key
  5. All of the above
72. Which of these Assemblies is used for doing Localization?
Answers:
  1. Private
  2. Public
  3. Satellite
  4. Both Public and Private
73. Which of the following is not a feature of .NET 2.0?
Answers:
  1. Partial classes
  2. Generics
  3. Multiple Inheritance
  4. Partial Methods
74. ___________ namespace is not defined in the base class library.
Answers:
  1. System
  2. System.CodeDom
  3. System.IO
  4. System.Threading
  5. System.Text
75. Since .NET assemblies contain IL code, your proprietary algorithms can be seen by anyone. Which of the following tools protects your intellectual properties?
Answers:
  1. Obfuscator
  2. Befprotector
  3. Obadministrator
  4. Befmanager
76. For MSIL code to be executed in PE file, it is necessary to have:
Answers:
  1. Assembly manifest
  2. Modules
  3. Files
  4. Types
77. __________ assembly can be used to deploy language-specific resources for an application.
Answers:
  1. Shared
  2. Private
  3. Satellite
  4. Public
78. Which of the following can you use to resolve assemblies, types, and resources?
Answers:
  1. System.AppDomain.CreateDomain
  2. System.AppDomainSetup.ApplicationBase
  3. System.AppDomainSetup.CreateComInstanceFrom
  4. System.AppDomain.ApplyPolicy
79. .NET components are accessed from COM via a?
Answers:
  1. RCW
  2. CCA
  3. CWA
  4. CCW
80. How will you prevent concurrent access to your data?
Answers:
  1. By using System.Threading.ThreadStart
  2. By using System.Threading.Monitor.Enter/Exit methods
  3. By using System.Threading.Monitor.start/End methods
  4. By using System.Threading.ThreadEnter
81. Which of the following is correct for CTS?
Answers:
  1. It establishes a framework that helps enable cross-language integration, type safety, and high performance code execution
  2. It provides an object-oriented model that supports the complete implementation of many programming languages
  3. It defines rules that languages must follow, which helps ensure that objects written in different languages can interact with each other
  4. All of the above
82. Delay signing allows a shared assembly to be signed with:
Answers:
  1. Private key at the initial stage
  2. Private and Public key at the initial stage
  3. Private key at a later stage
  4. Public key at a later stage
83. What happens when enough memory is not available to be allocated to an object?
Answers:
  1. MemoryFull exception is thrown
  2. Garbage collector is automatically run to free up memory
  3. OutOfMemory exception is thrown
  4. The .Net worker process is restarted
84. You can create the remote application domain using:
Answers:
  1. AppDomain.BuldDomain
  2. AppDomain.MakeDomain
  3. AppDomain.CreateDomain
  4. AppDomain.GenerateDomain
85. Which base class do all web forms inherit from?
Answers:
  1. System.Web.UI.Page
  2. System.Web.UI.HtmlControls
  3. System.Web.UI.WebControls
  4. None of the above
86. Where is the application domain created?
Answers:
  1. Outside a Process
  2. Inside a Process
  3. Can be created in both the places
  4. None of the above
87. Microsoft .NET supports value types for performance reasons, but everything in .NET is ultimately an object. Value types are allocated on the stack by default, but they can always be converted into a heap-based, reference-type object.
What is this conversion called?
Answers:
  1. Conving
  2. Boxing
  3. TypeModification
  4. None of the above
88. A hashtable is serialized by using:
Answers:
  1. XmlSerializer or SoapFormatter
  2. XmlSerializer
  3. SoapFormatter
  4. XmlSerializer and SoapFormatter
89. The .NET framework comes with a few CLR hosts. Which of the following is a CLR host?
Answers:
  1. ASP.NET
  2. IE
  3. Shell Executables
  4. All of the above
90. Which of the following code is not ‘managed’ by default in .NET framework?
Answers:
  1. Visual Basic
  2. C#
  3. C++
  4. Jscript
91. .NET provides a distributed process framework. Which of the following technologies are used for similar function?
Answers:
  1. Java Remote Method Invocation
  2. Microsoft Distributed Component Object Model
  3. Common Object Request Broker Architecture
  4. Remote Procedure Calls
92. Which of the following is used to do garbage collection?
Answers:
  1. gc.Collect
  2. gc.KeepAlive
  3. gc.SuppressFinalize
93. How many bits does the int datatype use in .NET?
Answers:
  1. 16 bits
  2. 32 bits
  3. 64 bits
  4. None of the above
94. Which of the following tools can be used to configure assemblies located in the GAC?
Answers:
  1. Soapsuds.exe
  2. Lldasm.exe
  3. CASPol.exe
  4. Mscorcfg.msc
  5. SN.exe
95. You assigned the version number – 5.3.1.0 to your assembly.
The four digits stand for:
Answers:
  1. Revision, Built, Major Version, and Minor version
  2. Revision, Built, Minor Version, and Major version
  3. Built, Major version, Minor Version, and Revision
  4. Major version, Minor Version, Built, and Revision
96. Which of the following is not correct about parameter arrays?
Answers:
  1. A subroutine can have any numbers of parameter arrays
  2. A parameter array must come last in the parameter list
  3. All parameter lists are declared as ByVal
  4. Parameter array values are implicitly optional
97. Which of the following is incorrect about Structures?
Answers:
  1. Structures are value types
  2. A structure can provide a constructor
  3. Structures can implement inheritance
  4. Structures support events
98. Which of the following is not a valid inheritance_mode?
Answers:
  1. Overloads
  2. Overrides
  3. Overridable
  4. MustOverridable
  5. None of the above
99. In .NET framework, Reflection is used to:
Answers:
  1. Create metadata of the modules/assemblies
  2. Get metadata of the modules/assemblies
  3. Reengineer the corrupted assemblies
  4. Destroy the corrupted assemblies
100. Xcopy method is not sufficient for deployment:
Answers:
  1. When application relies on shared assemblies
  2. When application is downloaded on demand
  3. When the number of assemblies is too large
  4. None of the above
101. Dot Net Framework consists of :
Answers:
  1. Common language runtime
  2. Set of class libraries
  3. Common language runtime and set of class libraries
  4. Common language runtime, set of class Libraries, and ADO.NET
102. Which of the following statements is not correct with regard to .NET assemblies?
Answers:
  1. Static assemblies can include classes, JPEG files, resource files etc.
  2. Static assemblies are stored on disk in PE files.
  3. The .NET Framework can create dynamic assemblies
  4. Dynamic assemblies are automatically saved to disk before execution
103. Which of the following statements is correct with regard to Windows process memory allocation?
Answers:
  1. Each process (instance of an application) gets its own RAM and prevents the OS from crashing when the process crashes
  2. RAM is shared between the processes and saves OS crash with the process crash
  3. Each process gets its own RAM and causes OS to crash with the process crash
  4. RAM is shared between the processes and causes OS to crash with the process crash
104. The code written to target common language runtime services is called :
Answers:
  1. Generated Code
  2. Managed Code
  3. Unmanaged Code
  4. CLR Code
  5. Service Code
105. Which of the following should you use to serialize instances of a class?
Answers:
  1. XMlSerializer
  2. It depends on the situtaion
  3. SoapFormatter
  4. BinaryFormatter
106. What are the core components of .NET framework data provider model?
Answers:
  1. DataAdapter and DataReader
  2. Connection and Command
  3. DataAdapter, Connection, and Command
  4. DataAdapter , DataReader, Connection, and Command
107. Which of the following can not be used with files?
Answers:
  1. FileClose
  2. FileInput
  3. LineInput
  4. LOF
  5. PrintLine
108. ____________ class defines the set of information that constitutes input to security policy decisions in System.Security.Policy namespace.
Answers:
  1. FileCodeGroup
  2. ApplicationTrust
  3. Evidence
  4. PolicyLevel
  5. PolicyStatement


Finally, no more words require about the DOT NET FUNDAMENTALS TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box. Thanks for Being with us.

No comments:

Post a Comment