C# Interview questions asked in Mumbai based IT company.
- By Shiv Prasad Koirala in C#
- Sep 28th, 2017
- 1323
- 0
- Which of the following are used for an HTML5 document
- <!DOCTYPE html>>
- <!DOCTYPE html5>
- <!DOCTYPE html5 PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html5/strict.dtd">
- <!DOCTYPE html5 PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
- Which of the following are special kinds of tables that hold detailed information about other tables, fields, indexes, relationships, and other features of the DBMS?
- Queries
- Catalog
- System Tables
- Forms
- Schedules
- Characteristics of a service-oriented architecture (SOA)-based system
- Performance of the entity classes
- Loose coupling
- XML web services
- Stateful session handling in a load-balanced cluster
- Well-defined contracts between message producers and consumers
- Which of the following are types of NoSQL databases? (select all that apply)
- Key value store
- Tree store
- Structural store
- Hierarchical store
- Document store
- Which of the following are situations suitable for the use of EDA instead of SOA?
- Vertical interaction between the layers of functional breakdown.
- Horizontal communication between tiers in a process chain.
- Functional request reply communication; the requester waits for a response.
- Processes that cross recognizable functional organization borders.
- Transactional processes that require commit and roll back.
- What of the following can be considered Drawbacks of using micro service architecture against ordinary monolithic style?
- Code duplication
- Highly coupled services
- Change cycles are tied together
- Expensive communication channels
- Hard to scale
- Which of the following are the main purposes of relational database design?
- To maintain data integrity
- To divide the base data into logical units called tables
- To avoid redundancy
- To provide quick query analysis and transparency
- Which of the following properties do not apply to a database system which allows partial completion of the operations from a transaction?
- durability
- consistency
- isolation
- atomicity
- Consider the following guidelines when designing for exception management, except which one?
- Design a global error handler to catch unhandled exceptions.
- Design your application to recover to a known good state after an exception occurs.
- Always use exceptions to control logic flow.
- Tables EMPLOYEES has 5 rows. Consider the following sequence of SQL statements :-
- 80
- 25
- 20
- 5
- Not sure on the above question the first create syntax will give error and the other will not work. Recheck the question.
- Let's consider that we have a REST web service for handling interview questions deployed at http://interview-questions.com. What HTTP method should this web service support in order to allow clients to create new questions at a particular location (e.g. at http://interview-questions.com/question/1)?
- PUT
- POST
- GET
- PATCH
- In order to respect ISP, one of the SOLID principles, we should:
- always use interfaces, not concrete classes
- not force the client to depend on methods it does not need
- use rich, general interfaces that have many methods
- use decoupled components will well-defined interfaces
- Difference between cluster computing and cloud computing?
- In cloud, computers work together but in cluster, computers work independently.
- In cloud, resources are treated independently but in cluster, the resources are treated as one system.
- In cloud, resources are virtualized but in cluster, resources are running physically on a computer system.
- In cloud, resources are not as reliable as in cluster because cluster has redundant nodes for high availability.
- Which of the following correctly describe the protocols usually involved in an email exchange?
- SMTP or POP3 are used for receiving messaged and IMAP is used for sending messages.
- SMTP is used for sending messages and IMAP or POP3 are used for receiving messages.
- SMTP is used for receiving messages and IMAP or POP3 are used for sending messages.
- The receival and sending of messages use the same protocols and the protocol used can be SMTP, IMAP or POP3.
- Your company has two hosting environments. One LAN where intranet corporate applications are hosted. Another DMZ environment where internet applications for the customers are hosted. One of the application X in the DMZ needs to access a content directory Y in the LAN. Which of the following methods are the safest to do so.
- Open specific ports betwen the LAN's Y server and DMZ's X server.
- Apply bandwith limitations between the application X and the directory Y.
- Use an SSL connection from the application X to the content directory Y.
- Use in the application X, a security account having read-only access to specific Y data.
- 1 and 3
- 2, 3 and 4
- 1, 3 and 4
- 1 and 4
- How does JSONP work?
- It makes server response text act like an injected <script> element
- It sends an HTTP "Access-Control-Allow-Origin" header to the server that asks for permission to make a cross-origin request
- It encodes server responses in a special data type that is ignored by the browser's JavaScript parser
- None of the above
- Which one of the following is not a design pattern used in communication.
- Active Object
- Entity Translator
- Active Record
- Reliable Sessions
- What of the following is an example of a hash collision?
- Two different hash functions produce the same address for a given key: h1( key ) = h2( key )
- A hash function produces the same address for two different keys: h( key1 ) = h( key2 ) where key1 =\= key2
- Two different hash functions produce the same address for two different keys: h1( key1 ) = h2( key2 ) where key1 =\= key2
- A hash function produces the same address for two different keys with different lengths: h( key1 ) = h( key2 ) where length(key1) =\= length (key2)
- A hash function produces the same address for two keys of the same length: h( key1 ) = h( key2 ) where length(key1) = length(key2).
- Which one of the following is a cryptographic protocol used to secure HTTP connection?
- Stream control transmission protocol
- Transport layer security (TLS)
- Explicit congestion notification (ECN)
- Resource reservation protocol
- What is the purpose of XMLHttpRequest?
- Multiple loading
- Load content by loading new document
- Load content without loading new document
- None of the mentioned
- Which of the following pattern refers to creating duplicate object while keeping performance in mind?
- Builder Pattern
- Filter Pattern
- Bridge Pattern
- Prototype Pattern
- Which of the following is true for MVC architecture?
- View should contain the logic related to user Interface and client side validations, controller should contain the logic required to return right view and all the business logic should be contained in the Model.
- View should contain the logic related to user Interface, controller should contain the flow control and business logic of the application while model should contain database access logic.
- View should contain the logic related to user Interface, controller should contain the logic required to return right view and all the application business logic, validation logic, and database access logic should be contained in the Model.
- View should contain the logic related to user Interface and client side validations, controller should contain the logic required to return right view and all the application business logic, validation logic, and database access logic should be contained in the Model.
- Which of the following properties is usually an advantage of relational databases over NoSQL ones?
- a. availability
- partition tolerance
- consistency
- speed
PICK THE CORRECT CHOICES
PICK THE CORRECT CHOICES
What are the most important characteristics of a system that uses service-oriented architecture(SOA)?(select all that apply)
PICK THE CORRECT CHOICES
PICK THE CORRECT CHOICES
PICK THE CORRECT CHOICES
PICK THE CORRECT CHOICES
PICK THE CORRECT CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
Design an appropriate logging and notification strategy that does not reveal sensitive information for critical errors and exceptions.
SQL> CREATE TABLE myTable SELECT AS (SELECT * FROM EMPLOYEE);
SQL> INSERT INTO myTable SELECT * FROM myTable;
SQL> INSERT INTO myTable SELECT * FROM myTable;
SQL> INSERT INTO myTable SELECT * FROM myTable;
SQL> INSERT INTO myTable SELECT * FROM myTable;
If the SQL statement SELECT COUNT (*) FROM myTable; is executed after executing all the statements listed above, what will it print?
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
PICK ONE OF THE CHOICES
Select the best answer:
PICK ONE OF THE CHOICES
Shiv Prasad Koirala
Visit us @ www.questpond.com or call us at 022-66752917... read more