Dot Net Services
Description: Windows application using dot net technology Programming ConceptsProgrammingProgramming | |
Number of Questions: 25 | |
Created by: Sundari Chatterjee | |
Tags: Windows application using dot net technology Programming Concepts Programming |
Programming languages on the .Net framework compile into an intermediate language known as ________________.
In which of the following assembly manifest content information, information is used by the runtime to map a type reference to the file that contains its declaration and implementation?
Which of the following technologies is a software development technology that focuses on building applications in a very short amount of time?
Which of the following encryption-decryption classes of .Net technology encapsulates optional configuration parameters for the user interface that CNG displays when you access a protected key?
Which of the following encryption-decryption classes of .Net technology represents the abstract base class from which all implementations of asymmetric signature deformatters derive?
Which of the encryption-decryption classes of .Net technology encapuslates the name of an encryption algorithm collection?
Which of the following encryption-decryption classes of the .Net technology represents a set of AsnEncodedData object?
Which of the following assembly manifest content's information represents a list of assemblies that are statically referenced by the assembly?
By using which of the following access modifiers, the variables will retain their values, even after the procedure in which these variables are declared?
Which of the following encryption-decryption classes of .Net technologies encapsulates the name of a key storage provider used with cryptography next generation objects?
Which of the following components of .Net architecture provides the appearance of a virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program?
Which of the following encryption-decryption classes of .Net technology performs a cryptographic transformation of data?
By using which of the following access modifiers, the variables are accessible only from within their own class or from a class derived from that class?
Which of the following properties uses an implicit parameter called value whose type is the type of the property?
Which of the following encryption-decryption classes of .Net technology represents the abstract base class from which all implementations of the advanced encryption standard must inherit?
Which of the following encryption-decryption classes of .Net technology contains a type and a collection of values associated with that type?
Which of the following encryption-decryption classes of .Net technology represents the base class from which all asymmetric key exchange formatters derive?
Which of the following encryption-decryption classes of .Net technology defines a wrapper object to access the CSP implementation of the digital signature algorithm?
By using which of the following access modifiers, the variables can be used by code in the same assembly as well as by code in derived classes?
By using which of the following statements, control is passed to the statement that follows the terminated statement?
Which of the following encryption-decryption classes represents the base class for the data encryption standard algorithm from which all data encryption standard implementations must derive?
Which of the following encryption-decryption classes verifies a digital signature algorithm PKCS#1 version 1.5 signature?
By using which of the following access modifiers, the variables are accessible from within the program that contains their declaration as well as from anywhere else in the same assembly?
Which of the following encryption-decryption classes of .Net technology provides enumeration functionality for the CryptographicAttibuteObjectCollection collection?
Which of the following is used to declare a reference type that can be used to encapsulate a named or an anonymous method?