Unix and Windows Programming

Description: Windows and web application Unix/Linux and WindowsProgrammingProgramming
Number of Questions: 15
Created by:
Tags: Windows and web application Unix/Linux and Windows Programming
Attempted 0/15 Correct 0 Score 0

Which of the following provides a mechanism for programs to communicate over the Internet using SOAP?

  1. Windows form

  2. Web form

  3. Web service

  4. Program

  5. Process


Correct Option: C
Explanation:

It provides a mechanism for programs to communicate over the internet using SOAP.

Which of the following provides the per written code in the form of classes that are available to all of the .Net programming languages?

  1. .Net FCL

  2. Common language runtime

  3. Windows forms

  4. Web forms

  5. Garbage collection


Correct Option: A
Explanation:

It providesthe  per written code in the form of classes that are available to all of the .Net programming languages.

Which of the following provides the ability to navigate through an OidCollection object?

  1. OidCollection

  2. OidEnumerator

  3. Oid

  4. ProtectedData

  5. ProtectedMemory


Correct Option: B
Explanation:

It provides the ability to navigate through an OidCollection object.

Which of the following corresponds to a Jet native or external database or a direct ODBC connection?

  1. Data access object

  2. DBEngine

  3. WorkSpace object

  4. Database object

  5. Field object


Correct Option: D
Explanation:

It corresponds to a Jet native or external database or a direct ODBC connection.

Which of the following options is the term for the one that holds information describing the objects?

  1. Group

  2. WorkSpace Object

  3. Container Object

  4. Property Object

  5. FocusEvent object


Correct Option: C
Explanation:

It holds information describing the objects.

Which of the following is/are helpful to anyone interested in building a profiler to examine managed applications?

  1. Garbage Collection

  2. Stack walk

  3. Web forms

  4. Window forms

  5. Processes


Correct Option: B
Explanation:

This concept is helpful to anyone interested in building a profiler to examine managed applications.

Which of the following represents the base class, from where the implementation of the Rijndael symmetric encryption algorithm must inherit?

  1. Rijndael

  2. RijndaelManaged

  3. Protected data

  4. Protected memory

  5. Oid


Correct Option: A
Explanation:

It represents the base class, from which the implementation of the Rijndael symmetric encryption algorithm must inherit.

Which of the following is used to define and enforce database security?

  1. Group

  2. User object

  3. Field object

  4. Parameter object

  5. Property object


Correct Option: B
Explanation:

It is used to define and enforce database security.

Which of the following performs a cryptographic transformation of data using Rijndael algorithm?

  1. RijndaelManaged

  2. Protected data

  3. RijndaelManaged transform

  4. ProtectedMemory

  5. OidCollection


Correct Option: C
Explanation:

It performs a cryptographic transformation of data using Rijndael algorithm.

Which of the following decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data?

  1. RSA

  2. RSAOAPEKey ExchangeDeformatter

  3. RSAOAEPKey ExchangeFormatter

  4. OidCollection

  5. Protected data


Correct Option: B
Explanation:

It decrypts Optimal Asymmetric Encryption Padding key exchange data.

Which of the following represents an abstract class, from where the implementation of the MD160 hash algorithm inherits?

  1. RIPEMD160

  2. RIPEMD160Managed

  3. RijndaelManaged

  4. ProtectedData

  5. Oid


Correct Option: A
Explanation:

It represents the abstract class from where the implementation of the MD160 hash algorithm inherits.

Which of the following is the environment used for running the .Net applications that have been compiled to MSIL?

  1. CTS

  2. Execution support

  3. Garbage collector

  4. Web form

  5. CLR


Correct Option: E
Explanation:

It is an environment used for running the .Net applications that have been compiled to a MSIL.

Which of the following is a list of the pending method calls at the point, where the exception was detected?

  1. StackTrace

  2. HelpLink

  3. Message

  4. Source

  5. XmlException


Correct Option: A
Explanation:

It is a list of the pending method calls at the point at which the exception was detected.

Which of the following performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the CSP?

  1. RSA

  2. RSACryptoService Provider

  3. RijadaelManaged

  4. Oid

  5. Protected memory


Correct Option: B
Explanation:

It performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the CSP.

Which of the following returns the EXCEPTION object reference to a nested exception?

  1. DataException

  2. XmlException

  3. InnerExecption

  4. Message

  5. Source


Correct Option: C
Explanation:

It returns the exception object reference to a nested exception.

- Hide questions