Aptech Aptitude Test Papers HDSE 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 20

1) To switch from the GUI environment to the shell, console, we need to use the

Ctrl+F1 keys.
a) True
b) False
2) Identify the two components in the architecture of the Apache Web Server.
a) Multi-Processing Module
b) Authentication Module
c) Core Module
d) Authorization Module
3) Which of the following statement regarding making changes in the http.conf file
is true?
a) Apache server must be restarted to implement changes made to the configuration file
b) Apache server must include directives to implement changes made to the configuration file
c) Aptech server must also implement changes in .htaccess file before restarting to implement changes
made to the configuration file.
d) To implement the changes. Apache processes the directives line by line in the http.conf
4) Which statement is used to add a new record in table?
a) Insert
b) Add
c) Record
d) Update
5) The _____________ symbol starts a process in the background.
a) $
b) ^
c) &
d) *
6) Which is the default order of sort in ORDER by clause?
a) Ascending
b) Descending
7) Which of the following utilities is used to render a private key for Apache
server?
a) Mod_ssl
b) Http
c) Crypto-utils
d) Openssl
8) Which of the following commands in entered at the command prompt to start
apache web server?
a) Apachectl –k start
b) Etc/int:d/http start
c) Load Apachectl
d) /usr/local/apache2/bin/Apachectl start
9) The _____________ option of insert command causes insertion of records to be
postponed unless all clients finished reading from the tables.
a) Default
b) Low_priority
c) Ignore
d) Delayed
10) Which of the following types of proxies can be configured on Aptech server?
a) Reverse
b) Forward
c) Backward
d) Filtered
11) Which of the following directives of the mod_alias module transmits an
external redirect to obtain a different URL?
a) RedirectPermanenr
b) RedirectMatch
c) RedirectTemp
d) Redirect
12) Which of the following command is used to configure mod_ssl?
a) ./configure –prefix-ssl
b) ./configure –enable-ssl
c) ./config –prefix-ssl
d) ./config –enable-ssl
13) Which of the following queries will display all the employees whose last end
with? On? String?
a) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
INSERT(EMPLOYEELastName,?2?) LIKE ?on?
b) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
EmployeeLastName LIKE ?on?
c) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
LOCATE(EMPLOYEELastName, 2) = ?on?
d) SELECT Employees, EmployeeFirstName, EmployeeLastName FROM Employees Where
RIGHT(EMPLOYEELastName, 2) = ?on?
14) Which of the following modules displays information related to the activities
and performance of apache web server?
a) Mod_include
b) Mod_userdir
c) Mod_dir
d) Mod_status
15) Which of the following displays the lists of included directories instead of the
actual web pages?
a) DirectorySlash
b) DirectoryIndex
c) Options
d) ScriptsAlias
16) If you want to assign a read permission to file, the octal value that will be
used to assign the ‘read; permission is _________
a) 3
b) 4
c) 1
d) 2
17) Which of the following storage engines is default to handle tables in MYSQL?
a) EXAMPLE
b) innoDB
c) MYISAM
d) BLACKHOLE
18) _____________ is the process of converting data into scrambled code while
deciphering it at the other end.
a) Certificates
b) Digital Signature
c) Cryptography
d) Message digest
19) _____________ exists between a computer and a network and provides
protection to networks against outside attackers.
a) Firewall
b) Proxy
c) Security
d) Protocol
20) _____________ is used to establish a relationship between two tables.
a) Foreign key
b) Composite key
c) Primary key
d) Candidate key
21) A query used inside another select query is known as _____________
a) Subquery
b) Join query
c) Inner query
d) Group query
22) The STRCMP function return -1 if _____________.
a) Str1 < Str2
b) Str1 = Str2
c) Str1 > Str2
d) Str1 <> Str2
23) The _____________ controls the working of the desktop.
a) GNOME
b) KDE
c) Window Manager
d) Editor
24) Which of the following option of the data command displays the time in HH:MM:SS
format?
a) %M
b) %HK
c) %m
d) %T
25) Which of the following commands displays detailed list of files and
directories?
a) Is ?a
b) Is -l
c) Is ?r
d) Is
26) Which of the following command prints only the login name of all the users
currently logged in to the system and the number of users logged in?
a) Is
b) Users
c) Man
d) Who –q
27) The _________ command displays the name of the terminals.
a) Ytt

b) Tty

c) Tyt

d) Try

28) ___________ Command searches a file for a specific pattern.


a) Pattern
b) Grep –n
c) Is –a
d) Cat c
29) Ps – a command is to
a) Lists additional information such as process status, user id, process id, etc about the process
b) Lists basic details about the process such as process id, terminal, process status, process
time, and process command
c) List all processes
d) List all the process and the respective environment in which these processes are running
30) Which of the following are dynamic modules in apache?
a) Mod_actions
b) Mod_dev
c) Mod_perl
d) All of the above
31) Which of the following commands will display the indexes created on
employee table of the payroll database?
a) SHOW INDEX FROM Employee FROM Payroll
b) SHOW INDEXES FROM Payroll.Employee
c) SHOW INDEX FROM Employee IN Payroll
d) SHOW INDEX FROM Payroll.Employee
32) This is referred to as root in Linux
a) Master user
b) Superuser
c) Normal user
d) None of them
33) Which of the following ways below is correct way to get the current date?
a) SELECT CURRENTTIME();
b) SELECT CUR_TIME();
c) SELECT CURDATE();
d) SELECT SYSDATE();
34) Which of the following option of the uname command prints all the basic
information available from the system?
a) –v
b) –r
c) –p
d) –a
35) Which of the following protocols runs above TCP/IP and below higher-level
Protocols?
a) SMTP
b) HTTP
c) SSL
d) FTP
36) A query used inside another select query is known as ______________.
a) Subquery
b) Join query
c) Inner query
d) Group query
37) The ______________ in Linux is an interactive spell checker.
a) Spellcheck
b) Spell
c) aspell
d) None of the above
38) Which of the following command removes a job from print.
a) Rm
b) Iprm
c) Ipq
d) Ipr
39) ________________ Command is used to count no. of lines in a file.
a) Wc -1
b) Count
c) Wordcount –l
d) Length
40) The ________________ command accesses the network configuration window at the spell
prompt.
a) System-config
b) System-network-config
c) System-config-network
d) System-config-networkwindow
41) PHPMyAdmin is an administrative interface for MYSQL databases
a) True
b) False
42) The location where the received mail message are storage is _____________.
a) /var/mqueue
b) /var/log
c) /etc/mail
d) /var/spool/mail
e) Mail
43) The username and uid are stored in the ________ file.
a) /etc/data
b) /etc/password
c) /etc/username
d) /etc/uid
44) Which of the following keys is used to auto-complete the command name or
file name on the command line?
a) TAB
b) CTRL
c) ALT
d) ESC
45) Which of the following defines the types of the data that will be stored in
column of tables?
a) Privileges
b) Variables
c) Data type
d) Constraint
46) Which of the following vi editor content of the file to disk and quits the
editors?
a) :w!

b) :ql

c) :wq!

d) :wq

47) The output of floor(9.85) would be_____________


a) 10
b) 8
c) 9
d) Null
48) PHP is an Open-source language.
a) True
b) False
49) Which of the following method requires authentication and authorization with
a username and a password?
a) Digest
b) Basic
c) Digital Signing
d) Client verity
50) Which of the following statement id true about the different folders used in
Linux?
a) /proc directory is not physically present on disk. It is a real time, memory resident file system that
tracks the processes running on your machine and the status of the system resources.
b) All of the above.
c) /bin directory contains the entire configuration file for the system.
d) /mont directory usually contains mount points or sub-directories where you mount your floppy and
your CD
51) _______________ is required to execute Perl and PHP Script on the Apache
Web Server.
a) Prefork
b) Worker module
c) CGI Daemon
d) Threaded multi-processing module
52) Which of the following command is used to compare the contents of two
files?
a) Compare
b) Cmp
c) Diff
d) Comp
53) _________________ is the default window manager for KDE
a) Kwin
b) Metacity
c) Twm
d) Mwm
54) What is location of a default configuration file of the samba Server?
a) /home/samba/smb.conf
b) /etc/samba/smb.conf
c) /samba/etc/smb.conf
d) /smb.conf
55) Which of the following modules specifies the proxy or the gate way for
Apache Server?
a) Mod_proxy_ftp
b) Mod_proxy
c) Mod_proxy_connect
d) Mod_proxy_http
56) Which command is used to display the details of all the files in directory
a) Touch
b) Tree
c) Cat
d) Is –l
57) USAGE is used when a user created without any privileges.
a) True
b) False
58) Which of the following command displays the content of a files on screen or
stores it in another files?
a) View
b) Display
c) Cat
d) Touch
59) Which of the following directives defines the e-mail address that is included
in every error message sent from the server?
a) ServerAdmin
b) ErrorDocument
c) ServerRoot
d) DocumentRoot
60) ______________ is the process of structuring the data in a table to minimize
duplication and inconsistency.
a) Indexes
b) Normalization
c) Views
d) E –R Diagram
1. ___________ is phrase for complications that arise while working dynamic link library
[1.0]
a. DLL hell
b. DLL API
c. DLL HLL
d. DLL Error
2. C# programming language provides the users with an altogether separate namespace
called ___________ for file and stream handling? [1.0]
a. System.UI
b. System.API
c. System.IO
d. System.InputOutput
3. The statics methods of the_ _______ class do a security check on all methods? [1.0]
a. File
b. FileInfo
c. Directory
d. DirectoryInfo
4. If a part of code is accessed by the multiple of threads at the same time it is known as
a__________ section [1.0]
a. Critical
b. immutable
c. mutable
d. thread-safe
5. The____________ property of Thread class defines the state of a thread during it
execution [1.0]
a. Threadexcute
b. Thread
c. Threadstatus
d. ThreadState
6. A newly created thread originated from the __________ state and remain in that state
until the __________ method is invoked [1.0]
a. Running, Start
b. WaitSleepJoin, Join
c. Start, Join
d. Unstarted, Start
7. A _________ object can be requested by both, the COM and .NET clients, at the same time
[1.0]
a. managed
b. reference
c. runtime
d. unmanaged
8. _________ is the tool using which assemblies can be deployed, uninstalled, manipulated
and viewed.
a. gacutil.exe
b. gac.exe
c. assemblytool.exe
d. deploy.exe
9. Which one of the following statements is not a restriction for declaring conditional
methods?
a. This method must be an implementation of an interface method
10. Can you identify the correct order of steps to create to resource file?
a. Move to a drive on the system where the .txt file is present
b. Type Reagan filename.txt
c. Open Visual studio 2005 command prompt
d. Create text file with required date and save it in the local system
i. a.1, 2, 3, 4
ii. b. 2, 4, 1, 3
iii. c. 3, 1, 4, 2
v. 4, 3, 1, 2

11. Which of the following statements about the methods of File are correct?
a. The Create method is used to create a file in the specified class
b. The Delete method is used to delete a file in the specified class
c. The GetAttributes method is used to get the file attributes of the file
d. The GetCreationTime method is used to verify whethera file with the specified name exists in the specified path

12. Can you identify the correct order of steps to use components directly from .NET
a. Select the component from the list
b. Click the COM tab in the Add Reference dialog box
c. Add a reference to the project using project “Add Reference”
d. Click OK to create RCWs for the selected type library object

i. 1, 2, 3, 4
ii. 2, 3, 4, 1
ii. 3, 2, 1, 4
iv. 4, 3, 2, 1

13. Can you identify the two ways by which managed code can directly unmanaged
code? [1.5]
a. Call a function exported directly from a DLL
b. Call interface exported directly from a DLL
c. Call a function on a COM object
d. Call an interface method on a COM object

14. The ____________ class presents an attributes and its value in DTD while the
____________ class defines a reader that provides forward-only access to XML data.
a. XmlAttribute, XmlReader
b. XmlDocument, XmlWriter
c. XmlReader, XmlAttribute
d. XmlWriter, XmlDocument
15. Can you identify the correct of steps to create a multi-file assembly using .NET?
a. Create a source code
b. Save and compile the source code into .net module
c. Use csc to assemble the modules and main resource file into a single assembly
d. Create a main source file
i. 1, 2, 3, 4
ii. 1, 2, 4, 3
ii. 1, 4, 3, 2
iv. 4, 1, 3, 2
16. Can you identify the correct of steps to add a resource file to a project? [1.5]
a. Open Visual Studio 2005 IDE
b. Create a project and right click on a project name
c. Select a resource file, click Add and then set the Build Action property of the resource file to Embedded
Resource
d. Select Add from the menu and then Existing item option
i. 1, 2, 3, 4
i. 1, 2, 4, 3
iii. 1, 4, 3, 2
iv. 4, 1, 3, 2
17. The C# ___________attribute allows you to control whether a method should be
called.
a. built-in
b. custom
c. Conditional
d. DLLimport
18. The C#____________ attribute allows you to invoke unmanaged code in a C
program.
a. built-in
b. custom
c. Conditional
d. DLLimport
19. _________is used only to generate and register a type library with COM.
a. Regasm.exe
b. Regsm.exe
c. TLbexp.exe
d. TLbimp.exe

20. The two important methods in Memberinfo class are ___________ .


a. GetAttributes() and GetType()
b. GetCustomAttributes() and GetType()
c. Get() and GetType()
d. CustomAttributes() and GetType()
21. Which of the following statements about System.IO namespace class are incorrect?
a. The BinaryReader class reads primitive data types as binary values in a specific encoding
b. The DirectoryInfo Class provides methods for creating, moving and enumerating through directories and
sub-directories
c. The File class contains methods that are common to file and directory manipulation.
d. The Stream represents a writer that can write a sequence of characters.

22. Can you identify the correct order of steps followed when Invoke calls an unmanaged
function?
a. The address of the function is located.
b. The function arguments are pushed onto the stack.
c. The DLL containing the function is located.
d. The DLL is loaded into the memory.
i. 1,2,3,4
ii. 1,3,2,4
iii. 3,2,1,4
v. 3,4,1,2
23. Which one of the following correctly represents the four parts contained in an
assembly?
a. Assembly Name, Type Metadata, MSIL Code and Resources.
b. Assembly Metadata, Type Metadata, MSIL Code and Resources
c. Class Name, Type Metadata, MSIL Code and Resources.
d. Type Metadata, MSIL Code, EXE files and Resources.
24. _________can be implied simply as a collection of information existing in binary form
in a Portable Executable file or a .NET assembly.
a. Assembly Metadata
b. Type Metadata
c. MSIL Code
d. Resources.
25. The______ class in the System.IO namespace contains methods that are common to
file and directory manipulation.
a. FileSystemInfo
b. DirectoryInfo
c. FileInfo
d. Stream
26. The___ method of File class is used when you want to delete a file.
a. Delete() with the path of the file specified as a parameter
b. Remove
c. Delete() without any parameters.
d. Erase
27. Can you rearrange the steps to simulate the process the compiler uses to determine
how to apply the attribute?
a. Checks for a named parameter.
b. Sets the field or property to a named parameter value.
c. Searches for the attribute class.
d. Checks for a constructor in the attribute
e. Creates an instance of the object.
f. Checks the scope of the attribute.

i. 1,2,3,4,5,6,7
ii. 2,4,5,6,7,1,3
ii. 3,6,4,5,1,2,7
iv. 7,6,3,4,5,1,2
28. The____ class provides static methods for the creation, copying, deletion, moving and
opening of files.
a. BinaryReader
b. BinaryWriter
c. File
d. FileInfo
29. Which of the following xpath node type each XML document has a single document
node located at the root of the xpath tree?
a. Document nodes
b. Element nodes
c. Attribute nodes
d. None of the above
30. Which of the following node type contain information about tha name and value of
the node as well as parent node?
a. Comment node
b. Text node
c. Namespace node
d. Document nodes
31. The.NET frame work provide the xslcompiled transform class for loading XML
document, compiling style sheet performing transformation by executing XSL style
sheet, and generating output?
a. True
b. False
32. Which of the following isolation level have phantom and pessimistic concurrency
control?
a. Read uncommitted
b. Repeatable read
c. Serializable
d. None of the above
33. CLR integration enables you to create which if the following types of managed object
in any NET frame work language?
a. Stored procedure
b. Triggers
c. User define type /function
d. Aggregates
i. 1,2,3
ii. 2,3,4
iii. 1,2,4
v. 1,2,3,4
34. Which of the following are the benefit of creating managed code object?
a. Enhanced programing model
b. Enhanced safety and security
c. Common development environment
d. Performance and scalability
i. 1,2,3
ii. 2,3,4
iii. 1,2,4

v. 1,2,3,4

1. Which of the following attribute is used to define types or members of types that should no
longer be used?
a. Conditional
b. Optional
c. Obsolete
d. Win32 apl
2. ______________ Assemblies are used for storing localized data.
a. Local
b. Satellite
c. Reflection
3. Which of the following is the ability to discover the composition of a type at runtime?
a. Local
b. Satellite
c. Reflection
4. Which of the following method of the textwriter class release any system resources that are
consumed by the object?
a. Dispose
b. Close
c. Flush
d. File
5. Which of the following method of the textwriter class closes the textwriter and release the
system resources?
a. Dispose
b. Close
c. Flush
d. File
6. The timer class is available in which of the following namespace?
a. System
b. System threading
c. Thread
d. System thread
7. Which of the following class allow the user to split a single class into multiple source
code .cs file?
a. Generics
b. Iterators
c. Partial
d. Anonymous
8. The ______________________ is the server management console that is used for opening
data connections logging on to server and exploring database and system services?
a. Toolbox window
b. Solution explorer
c. Server explorer
d. Visual studio 2005
9. Which of the following data types range is _128 to127?
a. Sbyte
b. Ushort
c. Unit
d. All of the above
10. The output methods, console .read and console .readline are used to display the
output on the console?
a. True
b. False
11. Which of the following are the types of boxing?
a. Implicit boxing
b. Explicate boxing
c. Custom boxing
d. All of the above
12. The.net framework platform is based on which of the following basic technologies?
a. Extensible markup language
b. Msil code
c. The suite of internet protocols
d. All of the above
13. Which of the following are the key feature of xml?
a. It separated actual data from presentation
b. It provide a away for data to be distributed to a variety of devices
c. It lock information to prevent editing
d. All of the above
14. Which of the following is correct about assemblies?
a. It is a logical collection of all files governed by a manaifest
b. It a minimum unit of deployment
c. It’s a manimum unit of security
i. 1,2
ii. 2,3
iii. 1,3
v. 1,2,3
15. Which of the following charateristics of a transction make sure that the entire
sequence of the action must be either completed or aborted?
a. atoimicity
b. consistency
c. isolation
d. durability
16. The row updating events of the data adapter occur during ___________ method
before the command to update a row is executed against the data source?
a. Updata
b. Create
c. Destroy
d. Row data
17. The isolution level property of the transactionoption structure is used to change the
default isolation level?
a. TRUE
b. FALSE
18. ______________property of the sqlbulk copy column mapping class retrieves the
integer value of the source column index.
a. Source column
b. Sourse ordinal
c. Destination column
d. Destination ordinal
19. Mars enable multiple active result sets to exist at the same time in a given connection?
a. True
b. False
20. Which of the following class of the system net. Mail. Name space is not used
commonly?
a. Alternate view
b. Smtpfailed recipient exception
c. Smtppermission
d. None of the above
21. Which of the following method sends a message and a does not block the calling
thread?
a. Send asyne()
b. Sendasyne cancel()
c. Send thread()
d. None of the above
22. WHICH of the following is not a property of the web header collection class?
a. Allkeys
b. Count
c. Item
d. None of the above
23. Which of the following class of the system.security .principle namespace specific the
generic user?
a. Generic identity
b. Generic principle
c. Generic user
d. All of the above
24. The system.security.principle. Namespace provide classes and interfaces to
implement role based security?
a. True
b. False
25. A channel is an object that enables communication between a client and a remotes
object across application domains?
a. True
b. False
26. Which of the following control acts as a container control in which child controls are
added are a dynamically repositioned to flow in a particular direction?
a. Flowlayoutpanel
b. Tablelayoutpanel
c. Marslayoutpanel
d. Dynamiclayoutpanel
27. Which of the following methods of web header collection class retrieves the name of
the header at a particular position in the collection?
a. Getkey()
b. Getheader()
c. Remove()
d. All of the above
28. System.net.sockets namespace contain the necessary classed for effective
communication between the two points?
a. True
b. False
29. __________Methods is used to send mails asynchronously?
a. Sendasyne()
b. Sendsyne()
c. Asynesend()
d. Synesend()
30. Which of the following classes provide implementati0on for representing a window
user account?
a. Window identity
b. Windows principle
c. Window user
d. All of the above
31. TCP and HTTP channels are commonly used for creating communication channels in
a remoting system and NET provides relevant classes to create and work with 6these
channel?
a. True
b. False
32. Which of the following property of the controls class return false it the current
thread is the one that create the control and so special invoke is required to use the
control?
a. Invokerequired
b. Parent control
c. Special invoke
d. None of the above
33. Which of the following property of table layout panel specifies or retrieves the control
border that are docked to the table layout panel control and detetrmines how the control
resized in the table layout panel control?
a. Controls
b. Dock
c. Border style
d. All of the above
34. Which of the following technologies support distributed application development?
a. XML Web services
b. Remoting
c. CLR
i. 1,2
ii. 2,3
iii. 1,3
iv. 1,2,3
35. Which of the following are the features of the remoting?
a. Flexibility
b. Fidelity
c. Administration
d. Error free
i. 1,2,3
ii. 2,3,4
iii. 1,3,4
iv. 1,2,3,4
36. Which of the following are the TCP channel classes?
a. Tcp server channel
b. Tcp client channel
c. Tcp channel
i. 1,2
i. 2,3
iii. 1,3
iv. 1,2,3
37. Which of the following are the runtime security policy?
a. Increase assembly trust
b. Adjust zone security
c. Evaluate assembly
d. Create deployment package
i. 1,2,3
ii. 2,3,4
iii. 1,2,4
v. 1,2,3,4
38. ____________ Isolation level is used if an application does not absolute accuracy of
data and if the application needs to complete database operation as quickly as possible?
a. Read uncommitted
b. Read committed with locking
c. Read committed with snapshots
d. Repeatable read
39. _____________ Isolation level is used if an application requires absolute accuracy for
long_running multiple –statement transaction but does not plan to modify the data?
a. Snapshot
b. Read committed with locking
c. Serializable
d. Repeatable read
40. Which of the following objects can be stored in a database it typically contain textual
information such as comma_seprated text or XML documents?
a. Binary large object
b. Character large objects
c. Large value data object
d. All of the above

You might also like