sies college of commerce and economics, sion e software ... sem v... · c) program evaluation...

30
SIES College of Commerce and Economics, Sion E SOFTWARE PROJECT MANAGEMENT TYBScIT SEM V SAMPLE QUESTIONS 1. Which of the following is not project management goal? a) Keeping overall costs within budget. b) Delivering the software to the customer at the agreed time. c) Maintaining a happy and well-functioning development team. d) Avoiding costumer complaints. 2. _____ provides an overview of all the projects tht an organization is undertaking a) Project Management b) Programme Management c) Scope Management d) Project portfolio management 3. "Supose a software development company has undertaken a project that is expected to cost$1,30,000/- to execute and the expected inflow is $25,000 per quarter for the first year; $30,000 per quarter thereafter. What is the payback period for the project ?" a) 15 Months b) 18 Months c) 24 Months d) 25 Months 4. __________ scope defines the work that needs to be accomplished to deliver an information system with specified feeatures sand functions. a) Product Oriented b) Project Oriented c) Cost Oriented d) code oriented 5. How much week require to develop the sprint ? a) 1 to 3 Weeks b) 2 to 4 Weeks c) 5 to 6 Weeks d) 2 to 5 Weeks 6. Which of the following is not an information domain required for determining function point in FPA ? a) Number of user Input b) Number of user Inquiries c) Number of errors d) Number of external Interfaces 7. Which of the stress management activity will be suggested by Cognitive behavioral approach tomanage stress? a) Rolling head from side to side b) Change in Job role c) Deep Breathing d) Increased social interaction

Upload: others

Post on 24-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

SIES College of Commerce and Economics, Sion E

SOFTWARE PROJECT MANAGEMENT

TYBScIT SEM V

SAMPLE QUESTIONS

1. Which of the following is not project management goal?

a) Keeping overall costs within budget.

b) Delivering the software to the customer at the agreed time.

c) Maintaining a happy and well-functioning development team.

d) Avoiding costumer complaints.

2. _____ provides an overview of all the projects tht an organization is undertaking

a) Project Management

b) Programme Management

c) Scope Management

d) Project portfolio management

3. "Supose a software development company has undertaken a project that is expected to

cost$1,30,000/- to execute and the expected inflow is $25,000 per quarter for the first

year;

$30,000 per quarter thereafter. What is the payback period for the project ?"

a) 15 Months b) 18 Months c) 24 Months d) 25 Months

4. __________ scope defines the work that needs to be accomplished to deliver an

information system with specified feeatures sand functions.

a) Product Oriented

b) Project Oriented

c) Cost Oriented

d) code oriented

5. How much week require to develop the sprint ?

a) 1 to 3 Weeks

b) 2 to 4 Weeks

c) 5 to 6 Weeks

d) 2 to 5 Weeks

6. Which of the following is not an information domain required for determining function

point in FPA ?

a) Number of user Input

b) Number of user Inquiries

c) Number of errors

d) Number of external Interfaces

7. Which of the stress management activity will be suggested by Cognitive behavioral

approach tomanage stress?

a) Rolling head from side to side

b) Change in Job role

c) Deep Breathing

d) Increased social interaction

8. Bidder can make response to___________

a) client

b) supplier

c) invitation to tenders

d) stakeholder

9. In open tendering

a) all tenders must be evaluated in same way

b) all tenders must be evaluated in different way

c) one tenders must be evaluated

d) more than tender must be evaluated

10. End of stage review meeting is asn example of

a) oral formal regular meeting

b) oral formal ad hoc meeting

c) oral informal ad hoc meeting

d) written formal ad hoc meeting

11. Which of the following is NOT a report in which the review data is captured?

a) Review log

b) Review charter

c) Review prepration log

d) Review summary report

12. A resource is any item or person required for the ___________

a) Completion of Project

b) Estimation of Project

c) Execution of Project

d) Termination of Project

13. GANTT Chart is NOT used for

a) Scheduling

b) Staffing Resource

c) Allocation

d) Deciding Priorities

14. Which of the following is NOT an approach to identify Activity

a) Planning Based Approach

b) Product Based Approach

c) Activity Based Approach

d) Hybrid Approach

15. Pessimistic times mean

a) Shortest possible time

b) Longest Possible Time required to perform activity

c) Computational Time

d) Most Likely Times

16. You are working on a package for a set of users. You are positive about getting the

package done but the user starts using an alternative package and no longer needs your

package. After this you will feel that you are wasting your time and you will give up. this

is termed as

a) Zero Expectancy

b) Zero motivation

c) Zero Instrumentality

d) Zero Work

17. PERT stands for

a) Planning Examination Resourcing Technique

b) Project Examination Review Technique

c) Program Evaluation Rejection Technique

d) Program Evaluation Review Technique

18. What is the meaning of Software Scope?

a) It describes the Off-the-shelf component.

b) It describes the functions and features that are to be delivered to end users.

c) It describes the software risk.

d) It describes the project risk.

19. What are the four framework activities found in Extreme Programming (XP) process

model

a) Analysis,Design ,Coding,Testing

b) Planning ,Analysis,Design ,Coding

c) Planning ,Analysis,Design ,Testing

d) Planning ,Design ,Coding,Testing

20. The members of the group get to know each other and try to set up some ground rules

about behaviours

a) Forming

b) Storming

c) Only B

d) A and B

21. "At which maturity level in CMM ,organization usually practice some basic project

management practices such as planning and tracking cost and budget."

a) Level 1

b) Level 2

c) Level 3

d) Level 4

22. "Software quality which relates to the ability of the software to be transffered to a

different environment"

a) Portability

b) Functionality

c) Usability

d) Productivity

23. Which one of the following is not an objective of the postimplementation review?

a) To review the qualitative and quantitative data about the project

b) To determine which practices worked well and which did not

c) To fix accountability for performance shortfalls

d) To suggest means to fine-tune various techniques used for project estimations

24. Bidder can make response to

a) Client

b) Supplier

c) Invitation to tenders

d) Stakeholder

25. What is mean by COTS

a) Cost of the software

b) Commercial off the shelf

c) Correct outcome to system

d) Communication of the system

SIES College of Commerce and Economics, Sion East

TYBSc IT Semester V Next Generation Technologies Sample Questions

Sr.

No Question Answer1 Answer2 Answer3 Answer4

1 _____ in big data means not all the data out there is

important. Volume Velocity Variety Veracity

2 To create a colleoction explicitly _______ is used. createCollection MakeCollection makecollection createcollection

3 _____ is example of Graph-based database Neo4J Cassandra RavenDB Redis Server

4

_____ compression is the default used for indexes,

reducing the in-memory footprint of index storage

by around 50% plib zlib Snappy Prefix

5

Which Is false statement.

Shard Early to

Avoid Any Issues

Shard Key Can

Be Updated

Select the

Correct Shard

Key

Shard

Collection Limit

6 _____ are fixed-size circular collections that follow

the insertion order to support high performance for

create, read, and delete operations. Collection

Capped

Collection

Polymorfic

Schema Database

7

Which is a types of index Sparse Dropdup

Unique indexes

in sharded

collections Similar

8 _________ is a cluster management layer somewhat

analogous to Hadoop’s YARN. Mesos spark Tachyon Map reduce

9 _____members are secondary members that

maintain the primary’s data copy but can never

become a primary in case of a failover. Delayed Hidden Priority 1 Priority 0

10 MongoDB uses _____ as its default storage engine. MMAPV1 MMAPV MMPV1 MAPV1

11 ______ is not included in collection namespace Name of collection A delete list Index details Free list

bucket.

12

The HTTP request consists of _______ general

components, each with a particular use for detailing

what resource is required from a server.

1 2 3 4

13 When using monitoring services, _____ should be

watched closely. op counters Shards Data sets Data files

14 Spark RDD methods are implemented by

______________

directed cyclic

graph tree

directed acyclic

graph stacks

15 Which of the following is correct? jQuery is a JSON

Library

jQuery is a

JavaScript

Library

jQuery is a

JSON

jQuery is a VB

script Library

16 What is the correct jQuery code to set the

background color of all p elements to red?

$("p").manipulate("b

ackground-

color","red");

$("p").style("back

ground-

color","red");

$("p").css("backg

round-

color","red");

$("p").layout("b

ackground-

color","red");

17 Which jQuery method is used to perform an

asynchronous HTTP request? jQuery.ajaxSetup() jQuery.ajax()

jQuery.ajaxAsyn

c()

jQuery.ajaxsync

()

18 ___________ is methods that allows you to insert

elements around existing ones wrap() append() after() on()

19 _________ supports an in-memory key-value store SAP HANA TimesTen Redis Oracle

20 ________ is a fault-tolerant, Hadoop-compatible,

memory-centric distributed file system Mesos spark Tachyon Map reduce

21 The ______ event will be dispatched exactly once, or

not at all, during the course of each HTTP request

initiated by the XMLHttpRequest object

load progress loadend start

22 Which of following statement is false about the

space parameter in JSON.stringify() ?

It controls spacing

in the resulting

JSON string

It is an optional

parameter

It removes

whitespace

It is used for

encoding

23 JSONP stands for _____________ JSON with Parsing. JSON with

Padding. JSON with PHP.

JSON with

Process

24 With web storage, web applications can store data

locally within the user's browser. web storage cache object datasets

25 The ________ method of theXMLHttpRequest object

is what prompts the submission of the request progress connect open send

26 The size of the .ns file that is used for storing the

metadata is _____ 8MB 16MB 32MB 64MB

27 In GridFS ____ is used to create file. new_file create new create_file

Sr.

No Questions Option A Option B Option C Option D

1

Which among is

true for Internet of

Things?

Remotely

controllab

le ,Can

anticipate

their

usage,

Can

anticipate

their

usage,

Programm

able

Remotely

controllabl

e

,Programm

able

Only

Remotely

controllable

2

__________is

being used by

Internet of Things Cable Broadband Satellite

Radio

Identification

Technology

3

Which is not the

Design principal of

connected device? Easy

adoption Privacy

Backword

compatibili

ty

Difficulty in

access

4

which of the

following is

example of

affordance

User

required

instructio

ns to use

machine

User can

use

machine by

looking at

it

User

required

pictorial

informatio

n to use

machine

User

required

service

executive to

use the

machine

5

The huge number

of devices

connected to the

Internet of Things

has to

communicate

automatically not

via humans. What

is this called? Skynet Bot to Bot

Machine to

Machine Intercloud

6

what adds

sequence

numbers,acknowle

dgements, and

retransmissions to

IP protocol TCP IP UDP DNS

7

IPv6, which uses

______ addresses.

128 64 32 16

SIES College of Commerce & Economics

Internet of Things Sample Questions

Class : T.Y.B.Sc IT Semester : V

8

The secure

(encrypted) HTTPS

usually runs on

which port port 80

port 934 port 443 port 08

9

Raspberry pi is an

example of------

Microcont

roller Actuator SOC SiC

10

Stripboard is used

in prototyping for---

--- soldering Networking sketching Securing

11

Tapping into the

community deals

with

mass

personaliz

ation

mass

production sketching

finding

resources

available

12

.Lilypad is an

example of ------

board

Raspberry

pi

microcontr

oller Arduino soc

13

Arduino consists of

________microcon

troller CPU Memory

AT mega

328 RISC

14

Due to Trade off in

size versus

manufacturing

complexity, many

chip design are

available in a

number of

different form

factors known as

_________ Pattern System Packages Application

15

_________ is the

smallest and

cheapest of the

team’s boards,

with a form factor

Comparable to

that of a Raspberry

Pi BeagleBo

ne Black Arduino Tiny OS Electric Imp

16

what kind of

process is

3Dprinting ? Equalitive Additive Subtractive Meltative

17

To press or push

out one object

from another

object extrude revolve hole filament

18

This part of the

printer is where

the melted

filament is

extruded onto and

your object

takes shape.

The Print

Head

The

Filament

Roll

The Print

Plate The Nozzle

19

Which of the

following is not a

type HINGES AND

JOINTS used for

prototyping in

IOT?

Lattice (or

Living)

Hinges

Integrated

Elastic

Clips

Bolted

Tenon (or T-

Slot) Joints V-slot joints

20

Renee has started

to compost her

food scraps and

leaves/yard

trimmings. When it

all breaks down

into soil, she'll use

that for her

garden. This is an

example of Reduce Recycle Reuse

Source

reduction

21

EEPROM consist

of____________

cells NAND EXOR NOR AND

22

Memory available

in heap memory

are

in_____________ Chunks Fragments Bundles Isolation

23

___________ is

real time scheduler

in embedded

systems Atomwire AutoCad Autowire Atomthreads

24

In which view you

layout the

component

logically and make

the necessary

connection

without having to

worry about

exactly where they

will sit in Physical

space.

Hardware

view

Random

view Static view

Schematic

view

25

In a process known

as________, you

can even share

parts of different

colours on the

same mould.

Singlshot

moulding

Doublesho

tmoulding

Multishot

moulding

Tripleshotmo

ulding

Sr. No. Question Answer1 Answer2 Answer3 Answer41 Most of the functionality of the .NET framework classes

resides in the namespace called ________.

Data Service System Drawing

2 Which method of an Array creates a duplicate copy? Copy() CopyTo() Clone() Sort()

3 Which method returns the size of a data type in C#? sizeof typeof &</a> *

4 Array of Arrays is known as ___________. Two dimentional Array Jagged Arrays One dimentional Array Three dimentional

array

5 Which keyword implies that only one instance of the

member exists for a class?

private public protected static

6 Which is a function pointer that allows you to invoke a

procedure indirectly?

Delegate Partial class Sealed class Private class

7 Which type of parameters do not change the original

value?

Value parameters Reference

parameters

Out parameters In parameters

8 Object is an example of which data type? Reference Value Location Address

9 Which is not an attribute of Page Directive? CodeFile Language AutoEventWireup Interface

10 Which is the configuration file for your ASP.NET

application?

web.config web.cs web.aspx.cs global.asax

11 Arnage ASP.NET Page Life Cycle Events in order PreLoad,Load,PreInit,In

it,PreRender,Render,U

nload

PreInit,Init,PreLoad,

Load,PreRender,Re

nder,Unload

PreRender,Render, PreRender,Render,U

nload,

PreLoad,Load,PreInit

,Init

12 The AdRotator stores its list of image files in

____________ file.

HTML PHP Java XML

13 Which of the following is the property of Range

Validator control?

MaximumValue ValueToCampare ControlToCompare Operator

SIES College of Commerce and Economics, Sion East

TYBSc IT Semester V Advanced Web Programming Sample Questions

14 Master pages are used by other pages are known as ASP pages Content Pages Oter Master Pages Static Pages

15 Which of these keywords must be used to monitor

exceptions?

try catch finally else

16 The _______ is the portion of the URL after the

question mark.

string URL encoding query string app string

17 __________ can split a single class into more than one

C# source code (.cs) file

Delegate Sealed class Private class

18 Which is not ADO.NET object? connection command datareader table

19 Which property of GridView is used to find out what

item is currently selected the GridView?

SelectedValue property SelectedItem

property

SelectedIndex

property

SelectedItemIndex

property

20 Which of the following is not SQL aggregate fucntion? avg sum mul count

21 This is an example of <%# expression_goes_here%>

_____________.

Single-Value Data

Binding

Simple Data Binding Repeated va;ue Data

Binding

Synchronous Data

Binding

22 when one UpdatePanel triggers an

update_________the UpdatePanel regions will be

refreshed.

Some All Not all Only two

23 __________ defines the rules to which a specific XML

document should conform.

XSLT XML Schema XML Document XSL

24 What does * indicate in <allow user=* /> ? Permit All users Permit All

anonymous users

Deny All users Deny All anonymous

users

25 __________is a collection of files that define the looks

of a page

Style CSS Theme Skin

SIES College of Commerce & Economics

Linux System Administration ,TYBScIT , Sem V, Sample Questions for

practice

Page 1

1. Which of these commands could you use to show one page of output at a

time?

a. less

b. sed

c. pause

d. grep

2. Which of the following commands can be used to change default

permissions for files and directories at the time of creation

a. Chmod

b. Chown

c. Umask

d. Chgrp

3. Which command is used to bring the background process to foreground?

a. fg

b. bg

c. background

d. foreground

4. How many extended partitions can exist on one drive?

a. 1

b. 2

c. 4

d. 16

5. For you to create a swap partition by using fdisk, what must the partition's

system ID type be?

a. 83

b. 82

c. 8e

d. 05

6. Which of the following tool is used to partition your hard drive?

a. mkfs

b. fdisk

c. fsck

d. mount

SIES College of Commerce & Economics

Linux System Administration ,TYBScIT , Sem V, Sample Questions for

practice

Page 2

7. Which value is used to represent the sticky bit

a. 1

b. 2

c. 3

d. 4

8. All device files are stored in which directory?

a. /etc

b. /bin

c. /usr

d. /dev

9. __________ is used to show and manipulate the IP addresses of network

Address

a. ifconfig

b. ip link show

c. ip addr

d. ip route

10. An administrator wants to change the range of UID’s that are available

when creating new users. Which file should be modified to accomplish

this?

a. /etc/security/useradd

b. /etc/defaults/useradd

c. /etc/useradd.conf

d. /etc/login.defs

11. What command is used with vi editor to delete a single character?

a. x

b. y

c. a

d. z

12. What command is used to display the characteristics of a process?

a. au

b. ps

c. du

SIES College of Commerce & Economics

Linux System Administration ,TYBScIT , Sem V, Sample Questions for

practice

Page 3

d. pid

13. Which command is used to list all the files including hidden files in your

current directory

a. ls -l

b. ls -t

c. ls -a

d. ls –i

14. The command to add an ACL to give read and execute permission to

group sales on the /data directory

a. setfacl –m g:sales:rw /data

b. getfacl –m g:sales:rx /data

c. setfacl –m g:sales:rx /data

d. setfacl g:sales:rx /data

15. Which directory contains configuration files in Linux?

a. /etc/

b. /bin/

c. /dev/

d. /root/

16. Which of the following examples shows correct syntax if you want to use a

repository that is in the local directory /repo?

a. [myrepo]

name=myrepo

baseurl=dir://repo

gpgcheck=0

b. [myrepo]

name=myrepo

baseurl=file://repo

gpgcheck=0

c. [myrepo]

name=myrepo

url=file:///repo

gpgcheck=1

d. [myrepo]

SIES College of Commerce & Economics

Linux System Administration ,TYBScIT , Sem V, Sample Questions for

practice

Page 4

name=myrepo

baseurl=file:///repo

gpgcheck=0

17. Which of the following shows the correct syntax for setting the default route

from the command line

a. ip route default 10.0.0.1

b. ip route add default 10.0.0.1

c. ip route add default via 10.0.0.1

d. ip route via 10.0.0.1

18. What is the name of the file you can use to set properties for the ssh client?

a. /etc/ssh.conf

b. /etc/sshd.conf

c. /etc/ssh/ssh_config

d. /etc/ssh/ssh_conf

19 How do you delete your crontab entry?

a. Crontab -d

b. Crontab -e

c. Crontab -r

d. Del –crontab

20. How would you turn on the sticky bit on the directory /tmp?

a. Chmod u+s /tmp

b. Chmod +st /tmp

c. Chmod a+s /tmp

d. Chmod o+t /tmp

21. Which signal number corresponds with the SIGKILL signal?

a. 1

b. 19

c. 9

d. 18

22. Which of the following can be used to set the immutable attribute on a file?

a. Chmod +i

b. Immut +a

SIES College of Commerce & Economics

Linux System Administration ,TYBScIT , Sem V, Sample Questions for

practice

Page 5

c. Attrib +i

d. Chattr +i

23. ________need to install for Apache web server.

a. Postfix

b. CGI

c. DSO

d.httpd

24. What is the basic function of the nslookup program?

a. To look up only IP addresses in the DNS database

b. to probe the DNS database for various types of information

c. To look up only domain names in the DNS database

d. To look up only SOA records from a company’s database

25. Which of the following operators are used for logical execution?

a. ||

b. &&

c. %%

d. && and ||

SIES College of Commerce and Economics, Sion East

TYBSc IT Semester V Network Security Sample Questions

Sr No Question Option A Option B Option C Option D

1

Often ______ and attack used to mean same thing Virus Treat Firewall Threat

2

_________ type of attack attempt to learn or make use

of information from the system but does not affect

system resources

Active Passive Simple Complex

3

Which amongst given options is passive type of attack masquerade of

one entity as

some other

replay

previous

messages

modify messages

in transit

obtain

message

contents

4

Fabrication is ____________ Attack on

Integrity

Attack on

Authenticity

Attack on

Availability

Attack on

Confidentiality

5

_________ replicates itself, with no destructive action Trojan Horse Worm Virus Firewall

6

DNS stands for Domain Name

Server

Discrete Name

Service

Domain Name

System

Domain Name

Service

7 diffusion is usually obtained by ________ substitution transposition multiplication division

8

OFB stands for ___________ Online

FeedBack

Online

Feedback

Book

Option FeedBack Output

FeedBack

9

Size of plain text accepted for one round in DES is

_______

128 bits 32 bits 16 bits 64 bits

10 For 12 rounds in AES, key size should be ______ 128 bits 192 bits 256 bits 64 bits

11 Euclidean Algorithm is based on concept of ______ LCM GCD Substraction Addition

12

SHA stands for ________ Secret Hash

Algorithm

Secure Hash

Analysis

Secure Hash

Algorithm

Secret Hash

Analysis

13

Which is NOT the step of certificate creation? Key generation Encryption Verification Certificate

Creation

14

In _____ model of certificate chaining, sender sends all

certificates till root to the receiver

Get Pull Post Push

15

TLS stands for Transfer Layer

Service

Transfer Layer

Security

Transmit Layer

Security

Transport

Layer Security

16

In Dual Signature, Payment Information(PI) is for Merchant Bank Certifying

Authority

Acquirer

17

_______ is a communication protocol for wireless

mobile devices to have access to Internet.

PGP WAP PEM MIME

18

What is NOT true about a firewall? It cannot protect

from attacks

bypassing it

It cannot

protect against

internal

threats

It cannot protect

against transfer

of all virus

infected

programs or files

It cannot allow

only

authorized

traffic

19

In _______ attack, attacker sets a route other than

default to bypass security measures

IP address

spoofing

source routing

attacks

tiny fragment

attacks

DoS attack

20

Security Associations (SA) is A one way

relationship

between

employee and

customer

A two way

relationship

between

employee and

customer

A two way

relationship

between a sender

and a receiver

A one way

relationship

between a

sender and a

receiver

21

VPN stands for Virtual Private

Network

Virus Private

Network

Virtual Process

Network

Virus Process

Network

22 ________ are used to decoy systems to lure attackers moneypots honeypots treasurepots jackpots

23 Time based tokens use _____ to generate random day time location coordinates

numbers

24

fingerprint, voice, pattern of lines are examples of

_______

Time based

tokens

Authentication

tokens

Biometric

authentication

password

25

PKI stands for Public-Key

Infrastructure

Post Key

Infrastructure

Private-Key

Infrastructure

Public-Key

Instance

Sr. No Questions Option A Option B Option C Option D

1

system

administrator'

s

responsibilities

might include:

Backing

up and

restoring

files.

Monitorin

g and

tuning

performa

nce.

Configuring

a secure

system.

Solving

staff

problems.

2

______

performs

diagnostics on

hardware,

checks

installed

components &

system RAM. OS BIOS RAM ROM

3

1st sector of

drive has area

called ______

which holds

the program

used for

loading OS. OS RAM MBR ROM

4

______ Main

function is to

prepare

system

memory for

use Kernel RAM GRUB ROM

5

______

manages

remaining

steps of

booting ROM MBR RAM init

6

______ refers

to a

family of

protocols used

for computer

communicatio

ns. OS Kernel TCP/IP DHCP

SIES College of Commerce & Economics

Linux Administration Sample Questions

Class : T.Y.B.Sc IT Semester : V

7

Network Layer

addresses are

IP addresses

that have

been assigned

to the device. TRUE FALSE

8

____

addresses

used in TCP/IP

networks are 4

bytes long IPV4 IPV6 IPV8 IPV2

9

Class A

addresses

always have

the farthest

left bit of the

farthest left

byte a zero TRUE FALSE

10

DHCP server is

controlled by

the

configuration

file

______ etc.conf conf

/etc/dhcpd.

conf c/conf

11

To see

whether

_____ is

installed on

your system,

type the

following at a

terminal

window:

rpm –qa|grep

samba samba ntp dhcp ftp

12

The first

section of the

smb.conf file is

the _____

section. static global dynamic simple

13

________ sets

the system

date and time

via NTP ntpsim ntpq ntpdc ntpdate

14

_______ sync

to primary

servers, and

clients sync to

secondary or

tertiary

servers.

basic

servers

primary

servers

Secondary

servers

software

servers

15

NTP uses

encryption

method called

_______ syskey autokey statickey dynamickey

16

Telnet is a

protocol and

application

that enables

someone to

have access to

a virtual

terminal on

a remote host. TRUE FALSE

17

___ is an

unencrypted

file transfer

program that

is similar to

RCP. sync ftp rsync dns

18

The rsync

server listens

on port 873. TRUE FALSE

19

Three files

required for

DNS

configuration

are

named.co

nf named.ca

named.loca

l named.d

20

rlogin is a

remote login

program that

connects your

terminal to a

remote

machine’s

terminal. TRUE FALSE

21

The default

FTP server

daemon on

RHEL systems

is vsftpd, the

Very Secure

FTP Daemon. TRUE FALSE

22

______

permits

annonymous

uploads

anon_upl

oad_enab

le = yes

anon_upl

oad_enab

le = no

write_enab

le = yes

write_ena

ble = no

23

Apache is

easily

extensible

using Dynamic

Shared

Objects

(DSOs), more

commonly

known as

modules. TRUE FALSE

24

The useradd

command

creates new

user accounts

and, when

invoked with

the -D option,

modifies the

default values

applied to new

accounts. TRUE FALSE

25

RPM can work

with ____ and

source

packages. binary secondary hex octal

Sr. No. Question Answer1 Answer2 Answer3 Answer4

1 What does AWT Stand for? Abstract Windowing

Toolkit

Absolute

Windowing Toolkit

Applet Window

Toolkit

Appearance

Window Toolkit

2  Which method is used to register a keyboard event

listener?

KeyListener() addKeyListener() KeyListener() KeyboardListener()

3  Which of these events is generated when a button is

clicked? 

WindowEvent KeyEvent ActionEvent ItemEvent

4 Which layout manager is used to arrage components in

specified rows and columns?

GridLayout BoderLayout FlowLayout CardLayout

5 What does setMaximum (int Max) method do? Sets the scrollbar's

value

Returns maximum

value of the

scrollbar

Returns the

minimum value

Sets maximum

value of the

scrollbar

6 Using which class, we can divide frame window in 2

parts?

JSplitPane JScrollPane JMenu JContentPane

7 ___________ constructor is used create a radio button

with the specified text and selected status.

JRadioButton() JRadioButton(String

s)

JRadioButton(String

s, boolean selected,

int value)

JRadioButton(String

s, boolean selected)

8 What is use of JPopupMenu (String label) Constructor? Constructs a

JPopupMenu with the

specified title.

Constructs a

JPopupMenu

without the

specified title.

Constructs a

JPopupMenu with

the specified

submenus.

Constructs a

JPopupMenu

without the

specified

submenus.

SIES College of Commerce and Economics, Sion East

TYBSc IT Semester V Advanced Java Sample Questions

9 Arrange the Servlet Lifecycle phases in order 1) Servlet instance is

created.

2) init method is

invoked.

3) service method is

invoked.

4) destroy method is

invoked.

5) Servlet class is

loaded.

1) Servlet class is

loaded.

2) Servlet instance

is created.

3) init method is

invoked.

4) service method is

invoked.

5) destroy method

is invoked.

1) Servlet instance is

created.

2) Servlet class is

loaded.

3) init method is

invoked.

4) service method is

invoked.

5) destroy method is

invoked.

1) init method is

invoked

2) Servlet instance

is created.

3).Servlet class is

loaded.

4) service method is

invoked.

5) destroy method

is invoked.

10 Which interface is used to send the request to another

resource?

Servlet RequestDispatcher HttpServlet ServletConfig

11 An object of _______________ interface can be used to

get configuration information from web.xml file.

HttpServlet ServletConfig Servlet RequestDispatcher

12 ______________ means a particular interval of time Session Application Cookie State

13  What is an abbrevation of JSP? Java Server Pages. Java Service Pages Java Server Process Java Server

Programs

14 Which attribute of JSP page handles exceptions ? ErrorPage Attribute IsErrorPage

Attribute

Bug attribute IsBug attribute

15 Which package contains the JDBC classes? java.jdbc java.jdbc.sql javax.sql  java.rdb

16  How do we execute a stored procedure in the database? by calling method

executeProcedure() on

a Statement object

by calling method

execute() on a

StoredProcedure

object

by calling method

execute() on a

CallableStatement

object

by calling method

run() on a

ProcedureComman

d object

17 Which element describes a specific combination of

conditions that must match, for this case to be executed?

<navigation-rule> <from-view-id> <navigation-case> <from-outcome>

18 ______________ is a configuration file of JSF. faces-context.xml faces-develop.xml faces-config.xml face-context.xml

19 In MVC architecture, ________________ is responsible

for displaying all or a portion of the data to the user.

Model View Controller Compiler

20 What does EJB stand for? Enterprise Java Bits Entity Java Beans Enterprise Java

Beans

Entity Java Bits

21 Which is not the feature of EJB? Focus only on business

logic

Fast building of

applications

Reusable

Components.

GUI Designing

22 ______________ is an persistent framework and Object-

Relational Mapping (ORM) solution for JAVA.

Hibernate Struts JSP Servlet

23 _______________ object creates SessionFactory. Session Configuration Transaction Query

24 POJO acronyms of _______________. Plain Old Java Object Plain Original

Java Object

Pure Original

Java Object

Pure Old Java

Object

25 Which is the configuration file of struts? struts.cofig.xml struts.xml config.xml struts.config

Sr. No. Question Answer1 Answer2 Answer3 Answer41 Most of the functionality of the .NET framework classes

resides in the namespace called ________.

Data Service System Drawing

2 Which method of an Array creates a duplicate copy? Copy() CopyTo() Clone() Sort()

3 Which method returns the size of a data type in C#? sizeof typeof &</a> *

4 Array of Arrays is known as ___________. Two dimentional Array Jagged Arrays One dimentional Array Three dimentional

array

5 Which keyword implies that only one instance of the

member exists for a class?

private public protected static

6 Which is a function pointer that allows you to invoke a

procedure indirectly?

Delegate Partial class Sealed class Private class

7 Which type of parameters do not change the original

value?

Value parameters Reference

parameters

Out parameters In parameters

8 Object is an example of which data type? Reference Value Location Address

9 Which is not an attribute of Page Directive? CodeFile Language AutoEventWireup Interface

10 Which is the configuration file for your ASP.NET

application?

web.config web.cs web.aspx.cs global.asax

11 Arnage ASP.NET Page Life Cycle Events in order PreLoad,Load,PreInit,In

it,PreRender,Render,U

nload

PreInit,Init,PreLoad,

Load,PreRender,Re

nder,Unload

PreRender,Render, PreRender,Render,U

nload,

PreLoad,Load,PreInit

,Init

12 The AdRotator stores its list of image files in

____________ file.

HTML PHP Java XML

13 Which of the following is the property of Range

Validator control?

MaximumValue ValueToCampare ControlToCompare Operator

SIES College of Commerce and Economics, Sion East

TYBSc IT Semester V Old ASP.NET with C# Sample Questions

14 Master pages are used by other pages are known as ASP pages Content Pages Oter Master Pages Static Pages

15 Which of these keywords must be used to monitor

exceptions?

try catch finally else

16 The _______ is the portion of the URL after the

question mark.

string URL encoding query string app string

17 __________ can split a single class into more than one

C# source code (.cs) file

Delegate Sealed class Private class

18 Which is not ADO.NET object? connection command datareader table

19 Which property of GridView is used to find out what

item is currently selected the GridView?

SelectedValue property SelectedItem

property

SelectedIndex

property

SelectedItemIndex

property

20 Which of the following is not SQL aggregate fucntion? avg sum mul count

21 This is an example of <%# expression_goes_here%>

_____________.

Single-Value Data

Binding

Simple Data Binding Repeated va;ue Data

Binding

Synchronous Data

Binding

22 when one UpdatePanel triggers an

update_________the UpdatePanel regions will be

refreshed.

Some All Not all Only two

23 __________ defines the rules to which a specific XML

document should conform.

XSLT XML Schema XML Document XSL

24 What does * indicate in <allow user=* /> ? Permit All users Permit All

anonymous users

Deny All users Deny All anonymous

users

25 __________is a collection of files that define the looks

of a page

Style CSS Theme Skin