WPF.Net Online Test 1, Dot Net Question and Answers, .NET Quiz
WPF.Net Online Test 1, Dot Net Question and Answers, .NET Quiz
Finish Quiz
0 of 20 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
Information
WPF.Net Online Test 1, Dot Net Question and Answers, .NET Quiz. Practice Online FOR Dot Net Test and find out how much you score before you appear for your next Dot Net interview and written test. Free WPF .Net Quiz, Online WPF .Net. WPF .Net Online Test-1 Question and Answers. WPF WPF Dot Net Test 1 Free Mock Test. WPF .Net Online Test-1 Question and Answers in PDF. The WPF .Net online mock test paper is free for all students. WPF .Net Online Test is very useful for exam preparation and getting for Rank. WPF .Net Online Test-1 Question and Answers in English. WPF .Net Online Test for topic via String Handling Mode. Here we are providing WPF .Net Online Test in English Now Test your self for “WPF .Net Online Test in English” Exam by using below quiz…
This paper has 20 questions.
Time allowed is 25 minutes.
The WPF .Net Online Test is Very helpful for all students. Now Scroll down below n click on “Start Quiz” or “Start Test” and Test yourself.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 20 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Answered
- Review
-
Question 1 of 20
1. Question
Which one is Server type state management?
Correct
Session State and Application State is Server type state management, as the requests goes to server every time when it is post-back or load. The values are stored in server, so the process is secure.
Incorrect
Session State and Application State is Server type state management, as the requests goes to server every time when it is post-back or load. The values are stored in server, so the process is secure.
-
Question 2 of 20
2. Question
Which one is Client type state management?
Correct
View State is client type state management. It keeps the information in the client and when we want to use the data after the post-back, we can use the value of viewstate. Actually through postback the browser communicates through the server, while communicating to the server we can keep the value in state.
Incorrect
View State is client type state management. It keeps the information in the client and when we want to use the data after the post-back, we can use the value of viewstate. Actually through postback the browser communicates through the server, while communicating to the server we can keep the value in state.
-
Question 3 of 20
3. Question
Extension when LINQ to SQL is used in C#?
Correct
The DBML file contains the C# source code which allow us to write the LINQ Queries to SQL .dbml file will be added under App_Code folder.
Incorrect
The DBML file contains the C# source code which allow us to write the LINQ Queries to SQL .dbml file will be added under App_Code folder.
-
Question 4 of 20
4. Question
What will be the output of
DECLARE @string VARCHAR(20) = ‘Hello how r u?’
SELECT STUFF(REPLICATE(‘,’ + LEFT(@string,10),LEN(LEFT(@string,10)) –
LEN(REPLACE(LEFT(@string,10), ‘o’, ”))),1,1,”)Correct
[CODE]SELECT LEFT(@string,10) [/CODE] returns [B]Hello how [/B] [CODE]SELECT LEN(LEFT(@string,10)) – LEN(REPLACE(LEFT(@string,10), ‘o’, ”))[/CODE] returns [CODE]2[/CODE] We are now replicating the word [B]Hello how [/B] [B]2 times[/B] by using [CODE]SELECT REPLICATE(‘,’ + LEFT(@string,10),LEN(LEFT(@string,10)) – LEN(REPLACE(LEFT(@string,10), ‘o’, ”))) [/CODE] which returns [B],Hello how ,Hello how [/B] The stuff function removes the leading[B] ,[/B] [CODE]SELECT STUFF(REPLICATE(‘,’ + LEFT(@string,10),LEN(LEFT(@string,10)) – LEN(REPLACE(LEFT(@string,10), ‘o’, ”))),1,1,”)[/CODE] resulting [B]Hello how ,Hello how [/B]
Incorrect
[CODE]SELECT LEFT(@string,10) [/CODE] returns [B]Hello how [/B] [CODE]SELECT LEN(LEFT(@string,10)) – LEN(REPLACE(LEFT(@string,10), ‘o’, ”))[/CODE] returns [CODE]2[/CODE] We are now replicating the word [B]Hello how [/B] [B]2 times[/B] by using [CODE]SELECT REPLICATE(‘,’ + LEFT(@string,10),LEN(LEFT(@string,10)) – LEN(REPLACE(LEFT(@string,10), ‘o’, ”))) [/CODE] which returns [B],Hello how ,Hello how [/B] The stuff function removes the leading[B] ,[/B] [CODE]SELECT STUFF(REPLICATE(‘,’ + LEFT(@string,10),LEN(LEFT(@string,10)) – LEN(REPLACE(LEFT(@string,10), ‘o’, ”))),1,1,”)[/CODE] resulting [B]Hello how ,Hello how [/B]
-
Question 5 of 20
5. Question
What will be the output of the below TSQL Script?
DECLARE @t TABLE(Chars VARCHAR(20))
INSERT INTO @T SELECT ‘D’ UNION ALL SELECT ‘N’ UNION ALL SELECT ‘F’SELECT Chars Data
FROM @T
FOR XML PATH(”)Correct
The FOR XML Path transforms the rows to columns but returns the result in XML format XML_F52E2B61-18A1-11d1-B105-00805F49916B —————————————————— DNF
Incorrect
The FOR XML Path transforms the rows to columns but returns the result in XML format XML_F52E2B61-18A1-11d1-B105-00805F49916B —————————————————— DNF
-
Question 6 of 20
6. Question
What will be the output of the below TSQL Script?
DECLARE @String VARCHAR(MAX)
SET @String = ‘DNF’;WITH numberCTE AS
(
SELECT 1 AS Rn
UNION ALL
SELECT Rn+1 FROM numberCTE WHERE RnCorrect
String DNF will be split into individual characters like D N F row wise. The numberCTE generates the sequential numbers based on the length of the string. It will be 3 here. The substring function [CODE]SUBSTRING(@String,rn,1)[/CODE] will accept the numbers one by one and will return individual characters based on the Rn value. final output [CODE]Characters ————- D N F[/CODE]
Incorrect
String DNF will be split into individual characters like D N F row wise. The numberCTE generates the sequential numbers based on the length of the string. It will be 3 here. The substring function [CODE]SUBSTRING(@String,rn,1)[/CODE] will accept the numbers one by one and will return individual characters based on the Rn value. final output [CODE]Characters ————- D N F[/CODE]
-
Question 7 of 20
7. Question
What will be the output of the following?
DECLARE @String VARCHAR(MAX)
DECLARE @Noise TABLE(Noise VARCHAR(100),ReplaceChars VARCHAR(10))
SET @String = ‘hello! DNF.!’INSERT INTO @Noise(Noise,ReplaceChars)
SELECT ‘!’,SPACE(1) UNION ALL SELECT ‘@’,SPACE(1) UNION ALL
SELECT ‘#’,SPACE(1) UNION ALL SELECT ‘$’,SPACE(1) UNION ALL
SELECT ‘%’,SPACE(1) UNION ALL SELECT ‘^’,SPACE(1) UNION ALL
SELECT ‘&’,SPACE(1) UNION ALL SELECT ‘*’,SPACE(1) UNION ALL
SELECT ‘(‘,SPACE(1) UNION ALL SELECT ‘)’,SPACE(1) UNION ALL
SELECT ‘{‘,SPACE(1) UNION ALL SELECT ‘}’,SPACE(1) UNION ALL
SELECT ‘‘,SPACE(1) UNION ALL
SELECT ‘:’,SPACE(1)SELECT @String = REPLACE(@String, Noise, ReplaceChars) FROM @Noise
SELECT @String DataCorrect
The code removes the special characters (in this case !) and returns the string. The Replace function does the special character removal operation.
Incorrect
The code removes the special characters (in this case !) and returns the string. The Replace function does the special character removal operation.
-
Question 8 of 20
8. Question
What will be the output of the below TSQL Script?
DECLARE @Data VARCHAR(MAX)
SET @Data = ‘hello!DNF.’;WITH numberCTE AS
(
SELECT 1 AS Rn
UNION ALL
SELECT Rn+1 FROM numberCTE WHERE RnCorrect
Length of data is 10 [CODE]DECLARE @Data VARCHAR(MAX) SET @Data = ‘hello!DNF.’ SELECT LEN(@Data) /* 10 */[/CODE] The Recursive CTE generates numbers between 1 to 10
Incorrect
Length of data is 10 [CODE]DECLARE @Data VARCHAR(MAX) SET @Data = ‘hello!DNF.’ SELECT LEN(@Data) /* 10 */[/CODE] The Recursive CTE generates numbers between 1 to 10
-
Question 9 of 20
9. Question
What will the output of this code
class DNF
{
public static void Main()
{
System.Console.WriteLine(“Hello DNF members”);
}
}interface itfunda
{
int a;
}Correct
Incorrect
-
Question 10 of 20
10. Question
Which command of AZCopy will help us to upload multiple files into blob storage
Correct
The answer is [CODE]AzCopy /Source:
Incorrect
The answer is [CODE]AzCopy /Source:
-
Question 11 of 20
11. Question
We need to upload a video file into Azure Storage. Which among the below Azure tool utility will help us?
Correct
AzCopy is a Windows command-line utility designed for copying data to and from Microsoft Azure storage (e.g.Blob, File, and Table) using commands. AzCopy /Source:D:\BlobSource /Dest:
/DestKey: /Pattern:”*.mp4″ /destType:blob Incorrect
AzCopy is a Windows command-line utility designed for copying data to and from Microsoft Azure storage (e.g.Blob, File, and Table) using commands. AzCopy /Source:D:\BlobSource /Dest:
/DestKey: /Pattern:”*.mp4″ /destType:blob -
Question 12 of 20
12. Question
Identify the storage type for JSON in Azure
Correct
Azure Blob storage is a service that stores unstructured data e.g. Text file, Images, CSV, Excel, JSON etc. It is also known as object storage.
Incorrect
Azure Blob storage is a service that stores unstructured data e.g. Text file, Images, CSV, Excel, JSON etc. It is also known as object storage.
-
Question 13 of 20
13. Question
Passing a variable as a out parameter you need to
Correct
The argument can be passed without assigning any value to it. An argument that is passed using an out keyword must be initialized in the called method before it returns back to calling method.
Incorrect
The argument can be passed without assigning any value to it. An argument that is passed using an out keyword must be initialized in the called method before it returns back to calling method.
-
Question 14 of 20
14. Question
Passing a variable as a ref parameter you need to.
Correct
When the value of parameter is changed in called method it get reflected in calling method also.
Incorrect
When the value of parameter is changed in called method it get reflected in calling method also.
-
Question 15 of 20
15. Question
Which function implements IF..THEN ELSE logic?
Correct
DECODE – This will create IF THEN ELSE logic. INITCAP – will be like Captilaize the first Letter of each word (Camel Case). REPLACE – will replace instead of one word or string to another. IFELSE – No keyword exists like that.
Incorrect
DECODE – This will create IF THEN ELSE logic. INITCAP – will be like Captilaize the first Letter of each word (Camel Case). REPLACE – will replace instead of one word or string to another. IFELSE – No keyword exists like that.
-
Question 16 of 20
16. Question
Which date components does the CURRENT_TIMESTAMP function display?
Correct
The CURRENT_TIMESTAMP function returns the session date, session time, and session time zone offset.
Incorrect
The CURRENT_TIMESTAMP function returns the session date, session time, and session time zone offset.
-
Question 17 of 20
17. Question
What is the value for SIGN(NVL(-16,0))?
Correct
Here Let see how we calculate these values. Consider we have the following : SIGN(ABS(NVL(-75,0))) Just like mathematics we should take it from the inner brackets. So first step will be, NVL(-75,0) = -75 Now, next bracket ABS(-75) = 75 //ABS always take positive Finally SIGN(75) = 1 If SIGN(>1) = 1, SIGN(
Incorrect
Here Let see how we calculate these values. Consider we have the following : SIGN(ABS(NVL(-75,0))) Just like mathematics we should take it from the inner brackets. So first step will be, NVL(-75,0) = -75 Now, next bracket ABS(-75) = 75 //ABS always take positive Finally SIGN(75) = 1 If SIGN(>1) = 1, SIGN(
-
Question 18 of 20
18. Question
ORACLE maintains referential integrity by automatically removing dependent foreign key values if a referenced primary or unique key value is removed. Which is called as?
Correct
[B]Delete Cascade[/B] which drops the Foreign or Reference Key when the Primary Key deleted.
Incorrect
[B]Delete Cascade[/B] which drops the Foreign or Reference Key when the Primary Key deleted.
-
Question 19 of 20
19. Question
What are the various credential types used along with OAuth 2.0?
Correct
There are three types of credentials available to use along with OAuth 2.0, such as Bearer Token, MAC token, SAML. Examples: 1. Authorization: Bearer
2. Authorization: MAC id=”h480djs93hd8″, ts=”1336363200″, nonce=”dj83hs9s”, mac=”xxxxxxxxxxxxxxxxxxxxxxxxxx” 3. Security Assertion Markup Language (SAML) is a XML-based framework to exchange security related information between Service Consumer, Identity Provider and Service Provider. .. Incorrect
There are three types of credentials available to use along with OAuth 2.0, such as Bearer Token, MAC token, SAML. Examples: 1. Authorization: Bearer
2. Authorization: MAC id=”h480djs93hd8″, ts=”1336363200″, nonce=”dj83hs9s”, mac=”xxxxxxxxxxxxxxxxxxxxxxxxxx” 3. Security Assertion Markup Language (SAML) is a XML-based framework to exchange security related information between Service Consumer, Identity Provider and Service Provider. .. -
Question 20 of 20
20. Question
What is the Maximum Number of triggers can be applied in a Table?
Correct
We can apply at max of 12 triggers in a table.
Incorrect
We can apply at max of 12 triggers in a table.