Aptech Aptitude Test Papers HDSE 1
Aptech Aptitude Test Papers HDSE 1
Aptech Aptitude Test Papers HDSE 1
Ctrl+F1 keys.
a) True
b) False
2) Identify the two components in the architecture of the Apache Web Server.
a) Multi-Processing Module
b) Authentication Module
c) Core Module
d) Authorization Module
3) Which of the following statement regarding making changes in the http.conf file
is true?
a) Apache server must be restarted to implement changes made to the configuration file
b) Apache server must include directives to implement changes made to the configuration file
c) Aptech server must also implement changes in .htaccess file before restarting to implement changes
made to the configuration file.
d) To implement the changes. Apache processes the directives line by line in the http.conf
4) Which statement is used to add a new record in table?
a) Insert
b) Add
c) Record
d) Update
5) The _____________ symbol starts a process in the background.
a) $
b) ^
c) &
d) *
6) Which is the default order of sort in ORDER by clause?
a) Ascending
b) Descending
7) Which of the following utilities is used to render a private key for Apache
server?
a) Mod_ssl
b) Http
c) Crypto-utils
d) Openssl
8) Which of the following commands in entered at the command prompt to start
apache web server?
a) Apachectl –k start
b) Etc/int:d/http start
c) Load Apachectl
d) /usr/local/apache2/bin/Apachectl start
9) The _____________ option of insert command causes insertion of records to be
postponed unless all clients finished reading from the tables.
a) Default
b) Low_priority
c) Ignore
d) Delayed
10) Which of the following types of proxies can be configured on Aptech server?
a) Reverse
b) Forward
c) Backward
d) Filtered
11) Which of the following directives of the mod_alias module transmits an
external redirect to obtain a different URL?
a) RedirectPermanenr
b) RedirectMatch
c) RedirectTemp
d) Redirect
12) Which of the following command is used to configure mod_ssl?
a) ./configure –prefix-ssl
b) ./configure –enable-ssl
c) ./config –prefix-ssl
d) ./config –enable-ssl
13) Which of the following queries will display all the employees whose last end
with? On? String?
a) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
INSERT(EMPLOYEELastName,?2?) LIKE ?on?
b) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
EmployeeLastName LIKE ?on?
c) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
LOCATE(EMPLOYEELastName, 2) = ?on?
d) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
RIGHT(EMPLOYEELastName, 2) = ?on?
14) Which of the following modules displays information related to the activities
and performance of apache web server?
a) Mod_include
b) Mod_userdir
c) Mod_dir
d) Mod_status
15) Which of the following displays the lists of included directories instead of the
actual web pages?
a) DirectorySlash
b) DirectoryIndex
c) Options
d) ScriptsAlias
16) If you want to assign a read permission to file, the octal value that will be
used to assign the ‘read; permission is _________
a) 3
b) 4
c) 1
d) 2
17) Which of the following storage engines is default to handle tables in MYSQL?
a) EXAMPLE
b) innoDB
c) MYISAM
d) BLACKHOLE
18) _____________ is the process of converting data into scrambled code while
deciphering it at the other end.
a) Certificates
b) Digital Signature
c) Cryptography
d) Message digest
19) _____________ exists between a computer and a network and provides
protection to networks against outside attackers.
a) Firewall
b) Proxy
c) Security
d) Protocol
20) _____________ is used to establish a relationship between two tables.
a) Foreign key
b) Composite key
c) Primary key
d) Candidate key
21) A query used inside another select query is known as _____________
a) Subquery
b) Join query
c) Inner query
d) Group query
22) The STRCMP function return -1 if _____________.
a) Str1 < Str2
b) Str1 = Str2
c) Str1 > Str2
d) Str1 <> Str2
23) The _____________ controls the working of the desktop.
a) GNOME
b) KDE
c) Window Manager
d) Editor
24) Which of the following option of the data command displays the time in HH:MM:SS
format?
a) %M
b) %HK
c) %m
d) %T
25) Which of the following commands displays detailed list of files and
directories?
a) Is ?a
b) Is -l
c) Is ?r
d) Is
26) Which of the following command prints only the login name of all the users
currently logged in to the system and the number of users logged in?
a) Is
b) Users
c) Man
d) Who –q
27) The _________ command displays the name of the terminals.
a) Ytt
b) Tty
c) Tyt
d) Try
b) :ql
c) :wq!
d) :wq
11. Which of the following statements about the methods of File are correct?
a. The Create method is used to create a file in the specified class
b. The Delete method is used to delete a file in the specified class
c. The GetAttributes method is used to get the file attributes of the file
d. The GetCreationTime method is used to verify whethera file with the specified name exists in the specified path
12. Can you identify the correct order of steps to use components directly from .NET
a. Select the component from the list
b. Click the COM tab in the Add Reference dialog box
c. Add a reference to the project using project “Add Reference”
d. Click OK to create RCWs for the selected type library object
i. 1, 2, 3, 4
ii. 2, 3, 4, 1
ii. 3, 2, 1, 4
iv. 4, 3, 2, 1
13. Can you identify the two ways by which managed code can directly unmanaged
code? [1.5]
a. Call a function exported directly from a DLL
b. Call interface exported directly from a DLL
c. Call a function on a COM object
d. Call an interface method on a COM object
14. The ____________ class presents an attributes and its value in DTD while the
____________ class defines a reader that provides forward-only access to XML data.
a. XmlAttribute, XmlReader
b. XmlDocument, XmlWriter
c. XmlReader, XmlAttribute
d. XmlWriter, XmlDocument
15. Can you identify the correct of steps to create a multi-file assembly using .NET?
a. Create a source code
b. Save and compile the source code into .net module
c. Use csc to assemble the modules and main resource file into a single assembly
d. Create a main source file
i. 1, 2, 3, 4
ii. 1, 2, 4, 3
ii. 1, 4, 3, 2
iv. 4, 1, 3, 2
16. Can you identify the correct of steps to add a resource file to a project? [1.5]
a. Open Visual Studio 2005 IDE
b. Create a project and right click on a project name
c. Select a resource file, click Add and then set the Build Action property of the resource file to Embedded
Resource
d. Select Add from the menu and then Existing item option
i. 1, 2, 3, 4
i. 1, 2, 4, 3
iii. 1, 4, 3, 2
iv. 4, 1, 3, 2
17. The C# ___________attribute allows you to control whether a method should be
called.
a. built-in
b. custom
c. Conditional
d. DLLimport
18. The C#____________ attribute allows you to invoke unmanaged code in a C
program.
a. built-in
b. custom
c. Conditional
d. DLLimport
19. _________is used only to generate and register a type library with COM.
a. Regasm.exe
b. Regsm.exe
c. TLbexp.exe
d. TLbimp.exe
22. Can you identify the correct order of steps followed when Invoke calls an unmanaged
function?
a. The address of the function is located.
b. The function arguments are pushed onto the stack.
c. The DLL containing the function is located.
d. The DLL is loaded into the memory.
i. 1,2,3,4
ii. 1,3,2,4
iii. 3,2,1,4
v. 3,4,1,2
23. Which one of the following correctly represents the four parts contained in an
assembly?
a. Assembly Name, Type Metadata, MSIL Code and Resources.
b. Assembly Metadata, Type Metadata, MSIL Code and Resources
c. Class Name, Type Metadata, MSIL Code and Resources.
d. Type Metadata, MSIL Code, EXE files and Resources.
24. _________can be implied simply as a collection of information existing in binary form
in a Portable Executable file or a .NET assembly.
a. Assembly Metadata
b. Type Metadata
c. MSIL Code
d. Resources.
25. The______ class in the System.IO namespace contains methods that are common to
file and directory manipulation.
a. FileSystemInfo
b. DirectoryInfo
c. FileInfo
d. Stream
26. The___ method of File class is used when you want to delete a file.
a. Delete() with the path of the file specified as a parameter
b. Remove
c. Delete() without any parameters.
d. Erase
27. Can you rearrange the steps to simulate the process the compiler uses to determine
how to apply the attribute?
a. Checks for a named parameter.
b. Sets the field or property to a named parameter value.
c. Searches for the attribute class.
d. Checks for a constructor in the attribute
e. Creates an instance of the object.
f. Checks the scope of the attribute.
i. 1,2,3,4,5,6,7
ii. 2,4,5,6,7,1,3
ii. 3,6,4,5,1,2,7
iv. 7,6,3,4,5,1,2
28. The____ class provides static methods for the creation, copying, deletion, moving and
opening of files.
a. BinaryReader
b. BinaryWriter
c. File
d. FileInfo
29. Which of the following xpath node type each XML document has a single document
node located at the root of the xpath tree?
a. Document nodes
b. Element nodes
c. Attribute nodes
d. None of the above
30. Which of the following node type contain information about tha name and value of
the node as well as parent node?
a. Comment node
b. Text node
c. Namespace node
d. Document nodes
31. The.NET frame work provide the xslcompiled transform class for loading XML
document, compiling style sheet performing transformation by executing XSL style
sheet, and generating output?
a. True
b. False
32. Which of the following isolation level have phantom and pessimistic concurrency
control?
a. Read uncommitted
b. Repeatable read
c. Serializable
d. None of the above
33. CLR integration enables you to create which if the following types of managed object
in any NET frame work language?
a. Stored procedure
b. Triggers
c. User define type /function
d. Aggregates
i. 1,2,3
ii. 2,3,4
iii. 1,2,4
v. 1,2,3,4
34. Which of the following are the benefit of creating managed code object?
a. Enhanced programing model
b. Enhanced safety and security
c. Common development environment
d. Performance and scalability
i. 1,2,3
ii. 2,3,4
iii. 1,2,4
v. 1,2,3,4
1. Which of the following attribute is used to define types or members of types that should no
longer be used?
a. Conditional
b. Optional
c. Obsolete
d. Win32 apl
2. ______________ Assemblies are used for storing localized data.
a. Local
b. Satellite
c. Reflection
3. Which of the following is the ability to discover the composition of a type at runtime?
a. Local
b. Satellite
c. Reflection
4. Which of the following method of the textwriter class release any system resources that are
consumed by the object?
a. Dispose
b. Close
c. Flush
d. File
5. Which of the following method of the textwriter class closes the textwriter and release the
system resources?
a. Dispose
b. Close
c. Flush
d. File
6. The timer class is available in which of the following namespace?
a. System
b. System threading
c. Thread
d. System thread
7. Which of the following class allow the user to split a single class into multiple source
code .cs file?
a. Generics
b. Iterators
c. Partial
d. Anonymous
8. The ______________________ is the server management console that is used for opening
data connections logging on to server and exploring database and system services?
a. Toolbox window
b. Solution explorer
c. Server explorer
d. Visual studio 2005
9. Which of the following data types range is _128 to127?
a. Sbyte
b. Ushort
c. Unit
d. All of the above
10. The output methods, console .read and console .readline are used to display the
output on the console?
a. True
b. False
11. Which of the following are the types of boxing?
a. Implicit boxing
b. Explicate boxing
c. Custom boxing
d. All of the above
12. The.net framework platform is based on which of the following basic technologies?
a. Extensible markup language
b. Msil code
c. The suite of internet protocols
d. All of the above
13. Which of the following are the key feature of xml?
a. It separated actual data from presentation
b. It provide a away for data to be distributed to a variety of devices
c. It lock information to prevent editing
d. All of the above
14. Which of the following is correct about assemblies?
a. It is a logical collection of all files governed by a manaifest
b. It a minimum unit of deployment
c. It’s a manimum unit of security
i. 1,2
ii. 2,3
iii. 1,3
v. 1,2,3
15. Which of the following charateristics of a transction make sure that the entire
sequence of the action must be either completed or aborted?
a. atoimicity
b. consistency
c. isolation
d. durability
16. The row updating events of the data adapter occur during ___________ method
before the command to update a row is executed against the data source?
a. Updata
b. Create
c. Destroy
d. Row data
17. The isolution level property of the transactionoption structure is used to change the
default isolation level?
a. TRUE
b. FALSE
18. ______________property of the sqlbulk copy column mapping class retrieves the
integer value of the source column index.
a. Source column
b. Sourse ordinal
c. Destination column
d. Destination ordinal
19. Mars enable multiple active result sets to exist at the same time in a given connection?
a. True
b. False
20. Which of the following class of the system net. Mail. Name space is not used
commonly?
a. Alternate view
b. Smtpfailed recipient exception
c. Smtppermission
d. None of the above
21. Which of the following method sends a message and a does not block the calling
thread?
a. Send asyne()
b. Sendasyne cancel()
c. Send thread()
d. None of the above
22. WHICH of the following is not a property of the web header collection class?
a. Allkeys
b. Count
c. Item
d. None of the above
23. Which of the following class of the system.security .principle namespace specific the
generic user?
a. Generic identity
b. Generic principle
c. Generic user
d. All of the above
24. The system.security.principle. Namespace provide classes and interfaces to
implement role based security?
a. True
b. False
25. A channel is an object that enables communication between a client and a remotes
object across application domains?
a. True
b. False
26. Which of the following control acts as a container control in which child controls are
added are a dynamically repositioned to flow in a particular direction?
a. Flowlayoutpanel
b. Tablelayoutpanel
c. Marslayoutpanel
d. Dynamiclayoutpanel
27. Which of the following methods of web header collection class retrieves the name of
the header at a particular position in the collection?
a. Getkey()
b. Getheader()
c. Remove()
d. All of the above
28. System.net.sockets namespace contain the necessary classed for effective
communication between the two points?
a. True
b. False
29. __________Methods is used to send mails asynchronously?
a. Sendasyne()
b. Sendsyne()
c. Asynesend()
d. Synesend()
30. Which of the following classes provide implementati0on for representing a window
user account?
a. Window identity
b. Windows principle
c. Window user
d. All of the above
31. TCP and HTTP channels are commonly used for creating communication channels in
a remoting system and NET provides relevant classes to create and work with 6these
channel?
a. True
b. False
32. Which of the following property of the controls class return false it the current
thread is the one that create the control and so special invoke is required to use the
control?
a. Invokerequired
b. Parent control
c. Special invoke
d. None of the above
33. Which of the following property of table layout panel specifies or retrieves the control
border that are docked to the table layout panel control and detetrmines how the control
resized in the table layout panel control?
a. Controls
b. Dock
c. Border style
d. All of the above
34. Which of the following technologies support distributed application development?
a. XML Web services
b. Remoting
c. CLR
i. 1,2
ii. 2,3
iii. 1,3
iv. 1,2,3
35. Which of the following are the features of the remoting?
a. Flexibility
b. Fidelity
c. Administration
d. Error free
i. 1,2,3
ii. 2,3,4
iii. 1,3,4
iv. 1,2,3,4
36. Which of the following are the TCP channel classes?
a. Tcp server channel
b. Tcp client channel
c. Tcp channel
i. 1,2
i. 2,3
iii. 1,3
iv. 1,2,3
37. Which of the following are the runtime security policy?
a. Increase assembly trust
b. Adjust zone security
c. Evaluate assembly
d. Create deployment package
i. 1,2,3
ii. 2,3,4
iii. 1,2,4
v. 1,2,3,4
38. ____________ Isolation level is used if an application does not absolute accuracy of
data and if the application needs to complete database operation as quickly as possible?
a. Read uncommitted
b. Read committed with locking
c. Read committed with snapshots
d. Repeatable read
39. _____________ Isolation level is used if an application requires absolute accuracy for
long_running multiple –statement transaction but does not plan to modify the data?
a. Snapshot
b. Read committed with locking
c. Serializable
d. Repeatable read
40. Which of the following objects can be stored in a database it typically contain textual
information such as comma_seprated text or XML documents?
a. Binary large object
b. Character large objects
c. Large value data object
d. All of the above