SIES College of Commerce and Economics, Sion E
SOFTWARE PROJECT MANAGEMENT
TYBScIT SEM V
SAMPLE QUESTIONS
1. Which of the following is not project management goal?
a) Keeping overall costs within budget.
b) Delivering the software to the customer at the agreed time.
c) Maintaining a happy and well-functioning development team.
d) Avoiding costumer complaints.
2. _____ provides an overview of all the projects tht an organization is undertaking
a) Project Management
b) Programme Management
c) Scope Management
d) Project portfolio management
3. "Supose a software development company has undertaken a project that is expected to
cost$1,30,000/- to execute and the expected inflow is $25,000 per quarter for the first
year;
$30,000 per quarter thereafter. What is the payback period for the project ?"
a) 15 Months b) 18 Months c) 24 Months d) 25 Months
4. __________ scope defines the work that needs to be accomplished to deliver an
information system with specified feeatures sand functions.
a) Product Oriented
b) Project Oriented
c) Cost Oriented
d) code oriented
5. How much week require to develop the sprint ?
a) 1 to 3 Weeks
b) 2 to 4 Weeks
c) 5 to 6 Weeks
d) 2 to 5 Weeks
6. Which of the following is not an information domain required for determining function
point in FPA ?
a) Number of user Input
b) Number of user Inquiries
c) Number of errors
d) Number of external Interfaces
7. Which of the stress management activity will be suggested by Cognitive behavioral
approach tomanage stress?
a) Rolling head from side to side
b) Change in Job role
c) Deep Breathing
d) Increased social interaction
8. Bidder can make response to___________
a) client
b) supplier
c) invitation to tenders
d) stakeholder
9. In open tendering
a) all tenders must be evaluated in same way
b) all tenders must be evaluated in different way
c) one tenders must be evaluated
d) more than tender must be evaluated
10. End of stage review meeting is asn example of
a) oral formal regular meeting
b) oral formal ad hoc meeting
c) oral informal ad hoc meeting
d) written formal ad hoc meeting
11. Which of the following is NOT a report in which the review data is captured?
a) Review log
b) Review charter
c) Review prepration log
d) Review summary report
12. A resource is any item or person required for the ___________
a) Completion of Project
b) Estimation of Project
c) Execution of Project
d) Termination of Project
13. GANTT Chart is NOT used for
a) Scheduling
b) Staffing Resource
c) Allocation
d) Deciding Priorities
14. Which of the following is NOT an approach to identify Activity
a) Planning Based Approach
b) Product Based Approach
c) Activity Based Approach
d) Hybrid Approach
15. Pessimistic times mean
a) Shortest possible time
b) Longest Possible Time required to perform activity
c) Computational Time
d) Most Likely Times
16. You are working on a package for a set of users. You are positive about getting the
package done but the user starts using an alternative package and no longer needs your
package. After this you will feel that you are wasting your time and you will give up. this
is termed as
a) Zero Expectancy
b) Zero motivation
c) Zero Instrumentality
d) Zero Work
17. PERT stands for
a) Planning Examination Resourcing Technique
b) Project Examination Review Technique
c) Program Evaluation Rejection Technique
d) Program Evaluation Review Technique
18. What is the meaning of Software Scope?
a) It describes the Off-the-shelf component.
b) It describes the functions and features that are to be delivered to end users.
c) It describes the software risk.
d) It describes the project risk.
19. What are the four framework activities found in Extreme Programming (XP) process
model
a) Analysis,Design ,Coding,Testing
b) Planning ,Analysis,Design ,Coding
c) Planning ,Analysis,Design ,Testing
d) Planning ,Design ,Coding,Testing
20. The members of the group get to know each other and try to set up some ground rules
about behaviours
a) Forming
b) Storming
c) Only B
d) A and B
21. "At which maturity level in CMM ,organization usually practice some basic project
management practices such as planning and tracking cost and budget."
a) Level 1
b) Level 2
c) Level 3
d) Level 4
22. "Software quality which relates to the ability of the software to be transffered to a
different environment"
a) Portability
b) Functionality
c) Usability
d) Productivity
23. Which one of the following is not an objective of the postimplementation review?
a) To review the qualitative and quantitative data about the project
b) To determine which practices worked well and which did not
c) To fix accountability for performance shortfalls
d) To suggest means to fine-tune various techniques used for project estimations
24. Bidder can make response to
a) Client
b) Supplier
c) Invitation to tenders
d) Stakeholder
25. What is mean by COTS
a) Cost of the software
b) Commercial off the shelf
c) Correct outcome to system
d) Communication of the system
SIES College of Commerce and Economics, Sion East
TYBSc IT Semester V Next Generation Technologies Sample Questions
Sr.
No Question Answer1 Answer2 Answer3 Answer4
1 _____ in big data means not all the data out there is
important. Volume Velocity Variety Veracity
2 To create a colleoction explicitly _______ is used. createCollection MakeCollection makecollection createcollection
3 _____ is example of Graph-based database Neo4J Cassandra RavenDB Redis Server
4
_____ compression is the default used for indexes,
reducing the in-memory footprint of index storage
by around 50% plib zlib Snappy Prefix
5
Which Is false statement.
Shard Early to
Avoid Any Issues
Shard Key Can
Be Updated
Select the
Correct Shard
Key
Shard
Collection Limit
6 _____ are fixed-size circular collections that follow
the insertion order to support high performance for
create, read, and delete operations. Collection
Capped
Collection
Polymorfic
Schema Database
7
Which is a types of index Sparse Dropdup
Unique indexes
in sharded
collections Similar
8 _________ is a cluster management layer somewhat
analogous to Hadoop’s YARN. Mesos spark Tachyon Map reduce
9 _____members are secondary members that
maintain the primary’s data copy but can never
become a primary in case of a failover. Delayed Hidden Priority 1 Priority 0
10 MongoDB uses _____ as its default storage engine. MMAPV1 MMAPV MMPV1 MAPV1
11 ______ is not included in collection namespace Name of collection A delete list Index details Free list
bucket.
12
The HTTP request consists of _______ general
components, each with a particular use for detailing
what resource is required from a server.
1 2 3 4
13 When using monitoring services, _____ should be
watched closely. op counters Shards Data sets Data files
14 Spark RDD methods are implemented by
______________
directed cyclic
graph tree
directed acyclic
graph stacks
15 Which of the following is correct? jQuery is a JSON
Library
jQuery is a
JavaScript
Library
jQuery is a
JSON
jQuery is a VB
script Library
16 What is the correct jQuery code to set the
background color of all p elements to red?
$("p").manipulate("b
ackground-
color","red");
$("p").style("back
ground-
color","red");
$("p").css("backg
round-
color","red");
$("p").layout("b
ackground-
color","red");
17 Which jQuery method is used to perform an
asynchronous HTTP request? jQuery.ajaxSetup() jQuery.ajax()
jQuery.ajaxAsyn
c()
jQuery.ajaxsync
()
18 ___________ is methods that allows you to insert
elements around existing ones wrap() append() after() on()
19 _________ supports an in-memory key-value store SAP HANA TimesTen Redis Oracle
20 ________ is a fault-tolerant, Hadoop-compatible,
memory-centric distributed file system Mesos spark Tachyon Map reduce
21 The ______ event will be dispatched exactly once, or
not at all, during the course of each HTTP request
initiated by the XMLHttpRequest object
load progress loadend start
22 Which of following statement is false about the
space parameter in JSON.stringify() ?
It controls spacing
in the resulting
JSON string
It is an optional
parameter
It removes
whitespace
It is used for
encoding
23 JSONP stands for _____________ JSON with Parsing. JSON with
Padding. JSON with PHP.
JSON with
Process
24 With web storage, web applications can store data
locally within the user's browser. web storage cache object datasets
25 The ________ method of theXMLHttpRequest object
is what prompts the submission of the request progress connect open send
26 The size of the .ns file that is used for storing the
metadata is _____ 8MB 16MB 32MB 64MB
27 In GridFS ____ is used to create file. new_file create new create_file
Sr.
No Questions Option A Option B Option C Option D
1
Which among is
true for Internet of
Things?
Remotely
controllab
le ,Can
anticipate
their
usage,
Can
anticipate
their
usage,
Programm
able
Remotely
controllabl
e
,Programm
able
Only
Remotely
controllable
2
__________is
being used by
Internet of Things Cable Broadband Satellite
Radio
Identification
Technology
3
Which is not the
Design principal of
connected device? Easy
adoption Privacy
Backword
compatibili
ty
Difficulty in
access
4
which of the
following is
example of
affordance
User
required
instructio
ns to use
machine
User can
use
machine by
looking at
it
User
required
pictorial
informatio
n to use
machine
User
required
service
executive to
use the
machine
5
The huge number
of devices
connected to the
Internet of Things
has to
communicate
automatically not
via humans. What
is this called? Skynet Bot to Bot
Machine to
Machine Intercloud
6
what adds
sequence
numbers,acknowle
dgements, and
retransmissions to
IP protocol TCP IP UDP DNS
7
IPv6, which uses
______ addresses.
128 64 32 16
SIES College of Commerce & Economics
Internet of Things Sample Questions
Class : T.Y.B.Sc IT Semester : V
8
The secure
(encrypted) HTTPS
usually runs on
which port port 80
port 934 port 443 port 08
9
Raspberry pi is an
example of------
Microcont
roller Actuator SOC SiC
10
Stripboard is used
in prototyping for---
--- soldering Networking sketching Securing
11
Tapping into the
community deals
with
mass
personaliz
ation
mass
production sketching
finding
resources
available
12
.Lilypad is an
example of ------
board
Raspberry
pi
microcontr
oller Arduino soc
13
Arduino consists of
________microcon
troller CPU Memory
AT mega
328 RISC
14
Due to Trade off in
size versus
manufacturing
complexity, many
chip design are
available in a
number of
different form
factors known as
_________ Pattern System Packages Application
15
_________ is the
smallest and
cheapest of the
team’s boards,
with a form factor
Comparable to
that of a Raspberry
Pi BeagleBo
ne Black Arduino Tiny OS Electric Imp
16
what kind of
process is
3Dprinting ? Equalitive Additive Subtractive Meltative
17
To press or push
out one object
from another
object extrude revolve hole filament
18
This part of the
printer is where
the melted
filament is
extruded onto and
your object
takes shape.
The Print
Head
The
Filament
Roll
The Print
Plate The Nozzle
19
Which of the
following is not a
type HINGES AND
JOINTS used for
prototyping in
IOT?
Lattice (or
Living)
Hinges
Integrated
Elastic
Clips
Bolted
Tenon (or T-
Slot) Joints V-slot joints
20
Renee has started
to compost her
food scraps and
leaves/yard
trimmings. When it
all breaks down
into soil, she'll use
that for her
garden. This is an
example of Reduce Recycle Reuse
Source
reduction
21
EEPROM consist
of____________
cells NAND EXOR NOR AND
22
Memory available
in heap memory
are
in_____________ Chunks Fragments Bundles Isolation
23
___________ is
real time scheduler
in embedded
systems Atomwire AutoCad Autowire Atomthreads
24
In which view you
layout the
component
logically and make
the necessary
connection
without having to
worry about
exactly where they
will sit in Physical
space.
Hardware
view
Random
view Static view
Schematic
view
25
In a process known
as________, you
can even share
parts of different
colours on the
same mould.
Singlshot
moulding
Doublesho
tmoulding
Multishot
moulding
Tripleshotmo
ulding
Sr. No. Question Answer1 Answer2 Answer3 Answer41 Most of the functionality of the .NET framework classes
resides in the namespace called ________.
Data Service System Drawing
2 Which method of an Array creates a duplicate copy? Copy() CopyTo() Clone() Sort()
3 Which method returns the size of a data type in C#? sizeof typeof &</a> *
4 Array of Arrays is known as ___________. Two dimentional Array Jagged Arrays One dimentional Array Three dimentional
array
5 Which keyword implies that only one instance of the
member exists for a class?
private public protected static
6 Which is a function pointer that allows you to invoke a
procedure indirectly?
Delegate Partial class Sealed class Private class
7 Which type of parameters do not change the original
value?
Value parameters Reference
parameters
Out parameters In parameters
8 Object is an example of which data type? Reference Value Location Address
9 Which is not an attribute of Page Directive? CodeFile Language AutoEventWireup Interface
10 Which is the configuration file for your ASP.NET
application?
web.config web.cs web.aspx.cs global.asax
11 Arnage ASP.NET Page Life Cycle Events in order PreLoad,Load,PreInit,In
it,PreRender,Render,U
nload
PreInit,Init,PreLoad,
Load,PreRender,Re
nder,Unload
PreRender,Render, PreRender,Render,U
nload,
PreLoad,Load,PreInit
,Init
12 The AdRotator stores its list of image files in
____________ file.
HTML PHP Java XML
13 Which of the following is the property of Range
Validator control?
MaximumValue ValueToCampare ControlToCompare Operator
SIES College of Commerce and Economics, Sion East
TYBSc IT Semester V Advanced Web Programming Sample Questions
14 Master pages are used by other pages are known as ASP pages Content Pages Oter Master Pages Static Pages
15 Which of these keywords must be used to monitor
exceptions?
try catch finally else
16 The _______ is the portion of the URL after the
question mark.
string URL encoding query string app string
17 __________ can split a single class into more than one
C# source code (.cs) file
Delegate Sealed class Private class
18 Which is not ADO.NET object? connection command datareader table
19 Which property of GridView is used to find out what
item is currently selected the GridView?
SelectedValue property SelectedItem
property
SelectedIndex
property
SelectedItemIndex
property
20 Which of the following is not SQL aggregate fucntion? avg sum mul count
21 This is an example of <%# expression_goes_here%>
_____________.
Single-Value Data
Binding
Simple Data Binding Repeated va;ue Data
Binding
Synchronous Data
Binding
22 when one UpdatePanel triggers an
update_________the UpdatePanel regions will be
refreshed.
Some All Not all Only two
23 __________ defines the rules to which a specific XML
document should conform.
XSLT XML Schema XML Document XSL
24 What does * indicate in <allow user=* /> ? Permit All users Permit All
anonymous users
Deny All users Deny All anonymous
users
25 __________is a collection of files that define the looks
of a page
Style CSS Theme Skin
SIES College of Commerce & Economics
Linux System Administration ,TYBScIT , Sem V, Sample Questions for
practice
Page 1
1. Which of these commands could you use to show one page of output at a
time?
a. less
b. sed
c. pause
d. grep
2. Which of the following commands can be used to change default
permissions for files and directories at the time of creation
a. Chmod
b. Chown
c. Umask
d. Chgrp
3. Which command is used to bring the background process to foreground?
a. fg
b. bg
c. background
d. foreground
4. How many extended partitions can exist on one drive?
a. 1
b. 2
c. 4
d. 16
5. For you to create a swap partition by using fdisk, what must the partition's
system ID type be?
a. 83
b. 82
c. 8e
d. 05
6. Which of the following tool is used to partition your hard drive?
a. mkfs
b. fdisk
c. fsck
d. mount
SIES College of Commerce & Economics
Linux System Administration ,TYBScIT , Sem V, Sample Questions for
practice
Page 2
7. Which value is used to represent the sticky bit
a. 1
b. 2
c. 3
d. 4
8. All device files are stored in which directory?
a. /etc
b. /bin
c. /usr
d. /dev
9. __________ is used to show and manipulate the IP addresses of network
Address
a. ifconfig
b. ip link show
c. ip addr
d. ip route
10. An administrator wants to change the range of UID’s that are available
when creating new users. Which file should be modified to accomplish
this?
a. /etc/security/useradd
b. /etc/defaults/useradd
c. /etc/useradd.conf
d. /etc/login.defs
11. What command is used with vi editor to delete a single character?
a. x
b. y
c. a
d. z
12. What command is used to display the characteristics of a process?
a. au
b. ps
c. du
SIES College of Commerce & Economics
Linux System Administration ,TYBScIT , Sem V, Sample Questions for
practice
Page 3
d. pid
13. Which command is used to list all the files including hidden files in your
current directory
a. ls -l
b. ls -t
c. ls -a
d. ls –i
14. The command to add an ACL to give read and execute permission to
group sales on the /data directory
a. setfacl –m g:sales:rw /data
b. getfacl –m g:sales:rx /data
c. setfacl –m g:sales:rx /data
d. setfacl g:sales:rx /data
15. Which directory contains configuration files in Linux?
a. /etc/
b. /bin/
c. /dev/
d. /root/
16. Which of the following examples shows correct syntax if you want to use a
repository that is in the local directory /repo?
a. [myrepo]
name=myrepo
baseurl=dir://repo
gpgcheck=0
b. [myrepo]
name=myrepo
baseurl=file://repo
gpgcheck=0
c. [myrepo]
name=myrepo
url=file:///repo
gpgcheck=1
d. [myrepo]
SIES College of Commerce & Economics
Linux System Administration ,TYBScIT , Sem V, Sample Questions for
practice
Page 4
name=myrepo
baseurl=file:///repo
gpgcheck=0
17. Which of the following shows the correct syntax for setting the default route
from the command line
a. ip route default 10.0.0.1
b. ip route add default 10.0.0.1
c. ip route add default via 10.0.0.1
d. ip route via 10.0.0.1
18. What is the name of the file you can use to set properties for the ssh client?
a. /etc/ssh.conf
b. /etc/sshd.conf
c. /etc/ssh/ssh_config
d. /etc/ssh/ssh_conf
19 How do you delete your crontab entry?
a. Crontab -d
b. Crontab -e
c. Crontab -r
d. Del –crontab
20. How would you turn on the sticky bit on the directory /tmp?
a. Chmod u+s /tmp
b. Chmod +st /tmp
c. Chmod a+s /tmp
d. Chmod o+t /tmp
21. Which signal number corresponds with the SIGKILL signal?
a. 1
b. 19
c. 9
d. 18
22. Which of the following can be used to set the immutable attribute on a file?
a. Chmod +i
b. Immut +a
SIES College of Commerce & Economics
Linux System Administration ,TYBScIT , Sem V, Sample Questions for
practice
Page 5
c. Attrib +i
d. Chattr +i
23. ________need to install for Apache web server.
a. Postfix
b. CGI
c. DSO
d.httpd
24. What is the basic function of the nslookup program?
a. To look up only IP addresses in the DNS database
b. to probe the DNS database for various types of information
c. To look up only domain names in the DNS database
d. To look up only SOA records from a company’s database
25. Which of the following operators are used for logical execution?
a. ||
b. &&
c. %%
d. && and ||
SIES College of Commerce and Economics, Sion East
TYBSc IT Semester V Network Security Sample Questions
Sr No Question Option A Option B Option C Option D
1
Often ______ and attack used to mean same thing Virus Treat Firewall Threat
2
_________ type of attack attempt to learn or make use
of information from the system but does not affect
system resources
Active Passive Simple Complex
3
Which amongst given options is passive type of attack masquerade of
one entity as
some other
replay
previous
messages
modify messages
in transit
obtain
message
contents
4
Fabrication is ____________ Attack on
Integrity
Attack on
Authenticity
Attack on
Availability
Attack on
Confidentiality
5
_________ replicates itself, with no destructive action Trojan Horse Worm Virus Firewall
6
DNS stands for Domain Name
Server
Discrete Name
Service
Domain Name
System
Domain Name
Service
7 diffusion is usually obtained by ________ substitution transposition multiplication division
8
OFB stands for ___________ Online
FeedBack
Online
Feedback
Book
Option FeedBack Output
FeedBack
9
Size of plain text accepted for one round in DES is
_______
128 bits 32 bits 16 bits 64 bits
10 For 12 rounds in AES, key size should be ______ 128 bits 192 bits 256 bits 64 bits
11 Euclidean Algorithm is based on concept of ______ LCM GCD Substraction Addition
12
SHA stands for ________ Secret Hash
Algorithm
Secure Hash
Analysis
Secure Hash
Algorithm
Secret Hash
Analysis
13
Which is NOT the step of certificate creation? Key generation Encryption Verification Certificate
Creation
14
In _____ model of certificate chaining, sender sends all
certificates till root to the receiver
Get Pull Post Push
15
TLS stands for Transfer Layer
Service
Transfer Layer
Security
Transmit Layer
Security
Transport
Layer Security
16
In Dual Signature, Payment Information(PI) is for Merchant Bank Certifying
Authority
Acquirer
17
_______ is a communication protocol for wireless
mobile devices to have access to Internet.
PGP WAP PEM MIME
18
What is NOT true about a firewall? It cannot protect
from attacks
bypassing it
It cannot
protect against
internal
threats
It cannot protect
against transfer
of all virus
infected
programs or files
It cannot allow
only
authorized
traffic
19
In _______ attack, attacker sets a route other than
default to bypass security measures
IP address
spoofing
source routing
attacks
tiny fragment
attacks
DoS attack
20
Security Associations (SA) is A one way
relationship
between
employee and
customer
A two way
relationship
between
employee and
customer
A two way
relationship
between a sender
and a receiver
A one way
relationship
between a
sender and a
receiver
21
VPN stands for Virtual Private
Network
Virus Private
Network
Virtual Process
Network
Virus Process
Network
22 ________ are used to decoy systems to lure attackers moneypots honeypots treasurepots jackpots
23 Time based tokens use _____ to generate random day time location coordinates
numbers
24
fingerprint, voice, pattern of lines are examples of
_______
Time based
tokens
Authentication
tokens
Biometric
authentication
password
25
PKI stands for Public-Key
Infrastructure
Post Key
Infrastructure
Private-Key
Infrastructure
Public-Key
Instance
Sr. No Questions Option A Option B Option C Option D
1
system
administrator'
s
responsibilities
might include:
Backing
up and
restoring
files.
Monitorin
g and
tuning
performa
nce.
Configuring
a secure
system.
Solving
staff
problems.
2
______
performs
diagnostics on
hardware,
checks
installed
components &
system RAM. OS BIOS RAM ROM
3
1st sector of
drive has area
called ______
which holds
the program
used for
loading OS. OS RAM MBR ROM
4
______ Main
function is to
prepare
system
memory for
use Kernel RAM GRUB ROM
5
______
manages
remaining
steps of
booting ROM MBR RAM init
6
______ refers
to a
family of
protocols used
for computer
communicatio
ns. OS Kernel TCP/IP DHCP
SIES College of Commerce & Economics
Linux Administration Sample Questions
Class : T.Y.B.Sc IT Semester : V
7
Network Layer
addresses are
IP addresses
that have
been assigned
to the device. TRUE FALSE
8
____
addresses
used in TCP/IP
networks are 4
bytes long IPV4 IPV6 IPV8 IPV2
9
Class A
addresses
always have
the farthest
left bit of the
farthest left
byte a zero TRUE FALSE
10
DHCP server is
controlled by
the
configuration
file
______ etc.conf conf
/etc/dhcpd.
conf c/conf
11
To see
whether
_____ is
installed on
your system,
type the
following at a
terminal
window:
rpm –qa|grep
samba samba ntp dhcp ftp
12
The first
section of the
smb.conf file is
the _____
section. static global dynamic simple
13
________ sets
the system
date and time
via NTP ntpsim ntpq ntpdc ntpdate
14
_______ sync
to primary
servers, and
clients sync to
secondary or
tertiary
servers.
basic
servers
primary
servers
Secondary
servers
software
servers
15
NTP uses
encryption
method called
_______ syskey autokey statickey dynamickey
16
Telnet is a
protocol and
application
that enables
someone to
have access to
a virtual
terminal on
a remote host. TRUE FALSE
17
___ is an
unencrypted
file transfer
program that
is similar to
RCP. sync ftp rsync dns
18
The rsync
server listens
on port 873. TRUE FALSE
19
Three files
required for
DNS
configuration
are
named.co
nf named.ca
named.loca
l named.d
20
rlogin is a
remote login
program that
connects your
terminal to a
remote
machine’s
terminal. TRUE FALSE
21
The default
FTP server
daemon on
RHEL systems
is vsftpd, the
Very Secure
FTP Daemon. TRUE FALSE
22
______
permits
annonymous
uploads
anon_upl
oad_enab
le = yes
anon_upl
oad_enab
le = no
write_enab
le = yes
write_ena
ble = no
23
Apache is
easily
extensible
using Dynamic
Shared
Objects
(DSOs), more
commonly
known as
modules. TRUE FALSE
24
The useradd
command
creates new
user accounts
and, when
invoked with
the -D option,
modifies the
default values
applied to new
accounts. TRUE FALSE
25
RPM can work
with ____ and
source
packages. binary secondary hex octal
Sr. No. Question Answer1 Answer2 Answer3 Answer4
1 What does AWT Stand for? Abstract Windowing
Toolkit
Absolute
Windowing Toolkit
Applet Window
Toolkit
Appearance
Window Toolkit
2 Which method is used to register a keyboard event
listener?
KeyListener() addKeyListener() KeyListener() KeyboardListener()
3 Which of these events is generated when a button is
clicked?
WindowEvent KeyEvent ActionEvent ItemEvent
4 Which layout manager is used to arrage components in
specified rows and columns?
GridLayout BoderLayout FlowLayout CardLayout
5 What does setMaximum (int Max) method do? Sets the scrollbar's
value
Returns maximum
value of the
scrollbar
Returns the
minimum value
Sets maximum
value of the
scrollbar
6 Using which class, we can divide frame window in 2
parts?
JSplitPane JScrollPane JMenu JContentPane
7 ___________ constructor is used create a radio button
with the specified text and selected status.
JRadioButton() JRadioButton(String
s)
JRadioButton(String
s, boolean selected,
int value)
JRadioButton(String
s, boolean selected)
8 What is use of JPopupMenu (String label) Constructor? Constructs a
JPopupMenu with the
specified title.
Constructs a
JPopupMenu
without the
specified title.
Constructs a
JPopupMenu with
the specified
submenus.
Constructs a
JPopupMenu
without the
specified
submenus.
SIES College of Commerce and Economics, Sion East
TYBSc IT Semester V Advanced Java Sample Questions
9 Arrange the Servlet Lifecycle phases in order 1) Servlet instance is
created.
2) init method is
invoked.
3) service method is
invoked.
4) destroy method is
invoked.
5) Servlet class is
loaded.
1) Servlet class is
loaded.
2) Servlet instance
is created.
3) init method is
invoked.
4) service method is
invoked.
5) destroy method
is invoked.
1) Servlet instance is
created.
2) Servlet class is
loaded.
3) init method is
invoked.
4) service method is
invoked.
5) destroy method is
invoked.
1) init method is
invoked
2) Servlet instance
is created.
3).Servlet class is
loaded.
4) service method is
invoked.
5) destroy method
is invoked.
10 Which interface is used to send the request to another
resource?
Servlet RequestDispatcher HttpServlet ServletConfig
11 An object of _______________ interface can be used to
get configuration information from web.xml file.
HttpServlet ServletConfig Servlet RequestDispatcher
12 ______________ means a particular interval of time Session Application Cookie State
13 What is an abbrevation of JSP? Java Server Pages. Java Service Pages Java Server Process Java Server
Programs
14 Which attribute of JSP page handles exceptions ? ErrorPage Attribute IsErrorPage
Attribute
Bug attribute IsBug attribute
15 Which package contains the JDBC classes? java.jdbc java.jdbc.sql javax.sql java.rdb
16 How do we execute a stored procedure in the database? by calling method
executeProcedure() on
a Statement object
by calling method
execute() on a
StoredProcedure
object
by calling method
execute() on a
CallableStatement
object
by calling method
run() on a
ProcedureComman
d object
17 Which element describes a specific combination of
conditions that must match, for this case to be executed?
<navigation-rule> <from-view-id> <navigation-case> <from-outcome>
18 ______________ is a configuration file of JSF. faces-context.xml faces-develop.xml faces-config.xml face-context.xml
19 In MVC architecture, ________________ is responsible
for displaying all or a portion of the data to the user.
Model View Controller Compiler
20 What does EJB stand for? Enterprise Java Bits Entity Java Beans Enterprise Java
Beans
Entity Java Bits
21 Which is not the feature of EJB? Focus only on business
logic
Fast building of
applications
Reusable
Components.
GUI Designing
22 ______________ is an persistent framework and Object-
Relational Mapping (ORM) solution for JAVA.
Hibernate Struts JSP Servlet
23 _______________ object creates SessionFactory. Session Configuration Transaction Query
24 POJO acronyms of _______________. Plain Old Java Object Plain Original
Java Object
Pure Original
Java Object
Pure Old Java
Object
25 Which is the configuration file of struts? struts.cofig.xml struts.xml config.xml struts.config
Sr. No. Question Answer1 Answer2 Answer3 Answer41 Most of the functionality of the .NET framework classes
resides in the namespace called ________.
Data Service System Drawing
2 Which method of an Array creates a duplicate copy? Copy() CopyTo() Clone() Sort()
3 Which method returns the size of a data type in C#? sizeof typeof &</a> *
4 Array of Arrays is known as ___________. Two dimentional Array Jagged Arrays One dimentional Array Three dimentional
array
5 Which keyword implies that only one instance of the
member exists for a class?
private public protected static
6 Which is a function pointer that allows you to invoke a
procedure indirectly?
Delegate Partial class Sealed class Private class
7 Which type of parameters do not change the original
value?
Value parameters Reference
parameters
Out parameters In parameters
8 Object is an example of which data type? Reference Value Location Address
9 Which is not an attribute of Page Directive? CodeFile Language AutoEventWireup Interface
10 Which is the configuration file for your ASP.NET
application?
web.config web.cs web.aspx.cs global.asax
11 Arnage ASP.NET Page Life Cycle Events in order PreLoad,Load,PreInit,In
it,PreRender,Render,U
nload
PreInit,Init,PreLoad,
Load,PreRender,Re
nder,Unload
PreRender,Render, PreRender,Render,U
nload,
PreLoad,Load,PreInit
,Init
12 The AdRotator stores its list of image files in
____________ file.
HTML PHP Java XML
13 Which of the following is the property of Range
Validator control?
MaximumValue ValueToCampare ControlToCompare Operator
SIES College of Commerce and Economics, Sion East
TYBSc IT Semester V Old ASP.NET with C# Sample Questions
14 Master pages are used by other pages are known as ASP pages Content Pages Oter Master Pages Static Pages
15 Which of these keywords must be used to monitor
exceptions?
try catch finally else
16 The _______ is the portion of the URL after the
question mark.
string URL encoding query string app string
17 __________ can split a single class into more than one
C# source code (.cs) file
Delegate Sealed class Private class
18 Which is not ADO.NET object? connection command datareader table
19 Which property of GridView is used to find out what
item is currently selected the GridView?
SelectedValue property SelectedItem
property
SelectedIndex
property
SelectedItemIndex
property
20 Which of the following is not SQL aggregate fucntion? avg sum mul count
21 This is an example of <%# expression_goes_here%>
_____________.
Single-Value Data
Binding
Simple Data Binding Repeated va;ue Data
Binding
Synchronous Data
Binding
22 when one UpdatePanel triggers an
update_________the UpdatePanel regions will be
refreshed.
Some All Not all Only two
23 __________ defines the rules to which a specific XML
document should conform.
XSLT XML Schema XML Document XSL
24 What does * indicate in <allow user=* /> ? Permit All users Permit All
anonymous users
Deny All users Deny All anonymous
users
25 __________is a collection of files that define the looks
of a page
Style CSS Theme Skin