1. Back To Blog

C# Interview questions asked in Mumbai based IT company.

  1. Which of the following are used for an HTML5 document
  2. PICK THE CORRECT CHOICES

  3. Which of the following are special kinds of tables that hold detailed information about other tables, fields, indexes, relationships, and other features of the DBMS?
  4. PICK THE CORRECT CHOICES

    • Queries
    • Catalog
    • System Tables
    • Forms
    • Schedules
       
  5. Characteristics of a service-oriented architecture (SOA)-based system
  6. What are the most important characteristics of a system that uses service-oriented architecture(SOA)?(select all that apply)

    PICK THE CORRECT CHOICES

    • Performance of the entity classes
    • Loose coupling
    • XML web services
    • Stateful session handling in a load-balanced cluster
    • Well-defined contracts between message producers and consumers
       
  7. Which of the following are types of NoSQL databases? (select all that apply)
  8. PICK THE CORRECT CHOICES

    • Key value store
    • Tree store
    • Structural store
    • Hierarchical store
    • Document store
       
  9. Which of the following are situations suitable for the use of EDA instead of SOA?
  10. PICK THE CORRECT CHOICES

    • Vertical interaction between the layers of functional breakdown.
    • Horizontal communication between tiers in a process chain.
    • Functional request reply communication; the requester waits for a response.
    • Processes that cross recognizable functional organization borders.
    • Transactional processes that require commit and roll back.
       
  11. What of the following can be considered Drawbacks of using micro service architecture against ordinary monolithic style?
  12. PICK THE CORRECT CHOICES

    • Code duplication
    • Highly coupled services
    • Change cycles are tied together
    • Expensive communication channels
    • Hard to scale
       
  13. Which of the following are the main purposes of relational database design?
  14. PICK THE CORRECT CHOICES

    • To maintain data integrity
    • To divide the base data into logical units called tables
    • To avoid redundancy
    • To provide quick query analysis and transparency
       
  15. Which of the following properties do not apply to a database system which allows partial completion of the operations from a transaction?
  16. PICK ONE OF THE CHOICES

    • durability
    • consistency
    • isolation
    • atomicity
       
  17. Consider the following guidelines when designing for exception management, except which one?
  18. PICK ONE OF THE CHOICES

    • Design a global error handler to catch unhandled exceptions.
    • Design your application to recover to a known good state after an exception occurs.
    • Always use exceptions to control logic flow.

    Design an appropriate logging and notification strategy that does not reveal sensitive information for critical errors and exceptions.
     

  19. Tables EMPLOYEES has 5 rows. Consider the following sequence of SQL statements :-
  20. SQL> CREATE TABLE myTable SELECT AS (SELECT * FROM EMPLOYEE);

    SQL> INSERT INTO myTable SELECT * FROM myTable;

    SQL> INSERT INTO myTable SELECT * FROM myTable;

    SQL> INSERT INTO myTable SELECT * FROM myTable;

    SQL> INSERT INTO myTable SELECT * FROM myTable;

    If the SQL statement SELECT COUNT (*) FROM myTable; is executed after executing all the statements listed above, what will it print?

    PICK ONE OF THE CHOICES

    • 80
    • 25
    • 20
    • 5
    • Not sure on the above question the first create syntax will give error and the other will not work. Recheck the question.
       
  21. Let's consider that we have a REST web service for handling interview questions deployed at http://interview-questions.com. What HTTP method should this web service support in order to allow clients to create new questions at a particular location (e.g. at http://interview-questions.com/question/1)?
  22. PICK ONE OF THE CHOICES

    • PUT
    • POST
    • GET
    • PATCH
       
  23. In order to respect ISP, one of the SOLID principles, we should:
  24. PICK ONE OF THE CHOICES

    • always use interfaces, not concrete classes
    • not force the client to depend on methods it does not need
    • use rich, general interfaces that have many methods
    • use decoupled components will well-defined interfaces
       
  25. Difference between cluster computing and cloud computing?
  26. PICK ONE OF THE CHOICES

    • In cloud, computers work together but in cluster, computers work independently.
    • In cloud, resources are treated independently but in cluster, the resources are treated as one system.
    • In cloud, resources are virtualized but in cluster, resources are running physically on a computer system.
    • In cloud, resources are not as reliable as in cluster because cluster has redundant nodes for high availability.
       
  27. Which of the following correctly describe the protocols usually involved in an email exchange?
  28. PICK ONE OF THE CHOICES

    • SMTP or POP3 are used for receiving messaged and IMAP is used for sending messages.
    • SMTP is used for sending messages and IMAP or POP3 are used for receiving messages.
    • SMTP is used for receiving messages and IMAP or POP3 are used for sending messages.
    • The receival and sending of messages use the same protocols and the protocol used can be SMTP, IMAP or POP3.
       
  29. Your company has two hosting environments. One LAN where intranet corporate applications are hosted. Another DMZ environment where internet applications for the customers are hosted. One of the application X in the DMZ needs to access a content directory Y in the LAN. Which of the following methods are the safest to do so.
    1. Open specific ports betwen the LAN's Y server and DMZ's X server.
    2. Apply bandwith limitations between the application X and the directory Y.
    3. Use an SSL connection from the application X to the content directory Y.
    4. Use in the application X, a security account having read-only access to specific Y data.

    PICK ONE OF THE CHOICES

    • 1 and 3
    • 2, 3 and 4
    • 1, 3 and 4
    • 1 and 4
       
  30. How does JSONP work?
  31. PICK ONE OF THE CHOICES

    • It makes server response text act like an injected <script> element
    • It sends an HTTP "Access-Control-Allow-Origin" header to the server that asks for permission to make a cross-origin request
    • It encodes server responses in a special data type that is ignored by the browser's JavaScript parser
    • None of the above
       
  32. Which one of the following is not a design pattern used in communication.
  33. PICK ONE OF THE CHOICES

    • Active Object
    • Entity Translator
    • Active Record
    • Reliable Sessions
       
  34. What of the following is an example of a hash collision?
  35. PICK ONE OF THE CHOICES

    • Two different hash functions produce the same address for a given key: h1( key ) = h2( key )
    • A hash function produces the same address for two different keys: h( key1 ) = h( key2 ) where key1 =\= key2
    • Two different hash functions produce the same address for two different keys: h1( key1 ) = h2( key2 ) where key1 =\= key2
    • A hash function produces the same address for two different keys with different lengths: h( key1 ) = h( key2 ) where length(key1) =\= length (key2)
    • A hash function produces the same address for two keys of the same length: h( key1 ) = h( key2 ) where length(key1) = length(key2).
       
  36. Which one of the following is a cryptographic protocol used to secure HTTP connection?
  37. PICK ONE OF THE CHOICES

    • Stream control transmission protocol
    • Transport layer security (TLS)
    • Explicit congestion notification (ECN)
    • Resource reservation protocol
       
  38. What is the purpose of XMLHttpRequest?
  39. PICK ONE OF THE CHOICES

    • Multiple loading
    • Load content by loading new document
    • Load content without loading new document
    • None of the mentioned
       
  40. Which of the following pattern refers to creating duplicate object while keeping performance in mind?
  41. PICK ONE OF THE CHOICES

    • Builder Pattern
    • Filter Pattern
    • Bridge Pattern
    • Prototype Pattern
       
  42. Which of the following is true for MVC architecture?
  43. Select the best answer:

    PICK ONE OF THE CHOICES

    • View should contain the logic related to user Interface and client side validations, controller should contain the logic required to return right view and all the business logic should be contained in the Model.
    • View should contain the logic related to user Interface, controller should contain the flow control and business logic of the application while model should contain database access logic.
    • View should contain the logic related to user Interface, controller should contain the logic required to return right view and all the application business logic, validation logic, and database access logic should be contained in the Model.
    • View should contain the logic related to user Interface and client side validations, controller should contain the logic required to return right view and all the application business logic, validation logic, and database access logic should be contained in the Model.
       
  44. Which of the following properties is usually an advantage of relational databases over NoSQL ones?
    • a. availability
    • partition tolerance
    • consistency
    • speed

Shiv Prasad Koirala

Visit us @ www.questpond.com or call us at 022-66752917... read more

We are on Social