Question Bank COM+ and MSMQ

73 348 0
Question Bank COM+ and MSMQ

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

_________ applications were designed using a modular approach.

Question Bank COM+ and MSMQ 1. _________ applications were designed using a modular approach. [0.5] a) Monolithic b) Network 2. _______ refers to the capability of the application to add new features to an existing application [0.5] a) Scalability b) Extensibility 3. In a ______ tier client server architecture, different parts of the architecture can be selectively upgraded without rewriting the entire application [0.5] a) Two b) Three 4. In the current scenario, applications are expected to have the following features (Choose two) [1.0] a) Reliability c) Insecurity b) High network operability d) Scalability 5. Which of the following options are true with respect to monolithic applications? [0.5] a) They are time consuming c) It is an expensive process. b) Sharing of data is possible d) Change was very easy 6. In the Distributed Component approach, the single middle-tier application object has been perceived as several _______ that can communicate with each other [1.0] a) Interfaces c) Context objects b) Components d) Objects 7. The n-tier architecture talks about a logical architecture [0.5] a) True b) False 8. In Two-tier client server architecture, the business logic has to be present on every client. [0.5] a) True b) False 9. The middle tier can be hidden behind the firewall security of the network in the two-tier architecture [0.5] a) True b) False 10. In Two-tier client server architecture, the _______ controls the flow of data between the database and the application. [0.5] a) Client b) Server 11. In Distributed Component Approach, the interaction between components and the environment is carried out through a Context Object. [0.5] a) True b) False 12. Which of the following is true for components in a component based approach? [1.0] a) They behave like a black box hiding the implementation from the outside world. c) They can be used by locating it through its identity. b) They encapsulate the data and methods. d) They are difficult to modify 13. The components in Distributed Component Approach require a __________ to run. [1.0] a) Origin Server c) Content Server b) Application Server d) Gateway Server 14. In n-tier architecture, the factor ‘n’ depends on the number of parts the business logic is divided into. [1.0] a) True b) False 15. In Three-tier architecture ________ logic is shared among clients. [1.0] a) Presentation c) Data b) Business d) Database 16. What are the advantages of two-tier client server architecture from the following? [1.0] a) Server implements the rules for data integrity. c) Implementation of a powerful hardware for the server does not enhance the reliability of the application. b) It prevents different data integrity rules being implemented by different client applications. d) Implementation of a powerful hardware for the server enhances the availability of the application. 17. To support the increase in load, an application needs to be highly ________ along with the additional hardware support. [1.0] a) Available c) Scalable b) Shareable d) Reliable 18. ________ is a process of hiding the details about its operations from other layers. [1.5] a) Persistence c) Polymorphism b) Security d) Encapsulation 19. Which features are necessary for large-scale, enterprise-level and web-based applications? [1.5] a) Data Sharing d) Performance b) Reliability e) All options given c) Security 20. Which of the following is true for n-tier architecture? [1.5] a) Due to division of application logic into multiple parts, scalability is achieved. c) More system resources are not available to the application. b) The parts of the business logic may reside on different systems. d) The middle tier objects are able to communicate with each other. 21. In three-tier architecture, the entire business logic of the application physically resides on ________ [1.5] a) Client and Server c) Two machines b) Single machine d) Client, Server and Backend 22. In n-tier architecture, the number of parts obtained by dividing the business logic are _________ on/of each other. [1.5] a) Independent b) Dependent 23. Which of the following are true for a three-tier client server architecture? [1.5] a) The application tier can be standardized. c) More system resources can be made available. b) Large application may not have the desired scalability level. d) The business logic, or the database type or schema can be changed without causing interruption to the clients. 24. The synonym for middle tier, in a three-tier client server architecture is _________ tier. [1.5] a) Data c) Server b) Client d) Application 25. Statement 1: The presentation logic and the business logic are not bundled together. Statement 2: New functionalities can be easily added in a two-tier client server architecture [1.5] a) Statement 1 is true. c) Both statements are true. b) Statement 2 is false. d) Both statements are false. 26. Which of the following are true for a two-tier client server architecture? [2.0] a) There is a no distinction between data and the application. c) The client machine is responsible for processing data. b) The presentation logic and the business logic are clubbed together as a client application d) The client holds the database. 27. Application architectures are part of __________ of the OSI model. [2.0] a) Layer 2 c) Layer 4 b) Layer 3 d) Layer 7 28. Two-tiered systems can only access one database system at a time. Other database systems, mainframe applications, or other resources must be accessed through gateways. [2.0] a) True b) False 29. Which of the following are true in case of two-tiered architecture? [2.0] a) Databases must not maintain connections with each active client. c) None of the options given b) It is difficult to reuse two- tiered application logic broadly, because applications are tightly bound to specific database systems and table formats. d) Databases must maintain connections with each active client. 30. Busy web sites typically employ two or more _______ in a load- balancing scheme. [2.0] a) Clients c) Data sources b) Web servers d) Data Servers 31. VB (Visual Basic) from Microsoft is one of the tools that competes with a n-tier development. [2.0] a) True b) False 32. Which of the following is true for Data Access tier? [2.0] a) It lies between Business tier and Data tier. c) It is used to provide interfaces to the database. b) It lies between presentation and Data tier d) It is used to handle data input/output. 33. In a _______ tiered architecture, contention can occur in the database as many clients try to work on the same data concurrently. [2.0] a) One c) Three b) Two d) Layered 34. _______ computing is where remote servers and clients cooperate over the Internet to perform tasks. [2.0] a) ClientCentric c) Netcentric b) ServerCentric d) DataCentric 35. Which one of the following is true in case of a three-tier architecture? [2.0] a) Thin client, Fat server c) Fat client b) Fat client, Thin server d) Thin server 36. Statement1: Two-tiered security focuses on granting or denying users access to data. Statement 2: Three-tiered security focuses on granting or denying access on a component-by-component basis [2.0] a) Statement 1 is true. c) Both statements are true. b) Statement 2 is false. d) Both statements are false. 37. ______ is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. [0.5] a) COM c) MOC b) OCM d) DCOM 38. COM is not a ________ but a set of specifications. [0.5] a) Distributed Technology b) Programming Language 39. Interfaces are immutable. [0.5] a) True b) False 40. Different classes can implement the interfaces differently. [0.5] a) True b) False 41. COM uses ________ to identify a component. [0.5] a) Decimal Numbers b) Hexadecimal Numbers 42. Components can implement Multiple interfaces. [0.5] a) True b) False 43. _________ is a variation of Remote Procedure Call (RPC) enabling communication between two processes on the same machine. [0.5] a) PLC b) LPC 44. RPC enables applications residing on different machines to communicate with each other using a variety of network transport techniques. [0.5] a) True b) False 45. The ________ function decides whether the component supports a particular type of interface. [0.5] a) QueryInterface() b) AddRef() 46. GUID stands for Globally Unique Identifiers. [0.5] a) True b) False 47. A GUID is a _______ value. [0.5] a) 256-bit c) 64-bit b) 128-bit d) 32-bit 48. S_OK and E_UNEXPECTED are some of the values of HRESULT. [0.5] a) True b) False 49. COM architecture supports distributed objects, which enable the method of ______ balancing. [1.0] a) Scale b) Load 50. Open Software Foundation defines ________ as a 128-bit number to identify the remote systems in a distributed computing environment’s remote procedure call. [1.0] a) UUID b) GUID 51. In Remote Process Server technique, the overheads in communicating with the remote components are not high. [1.0] a) True b) False 52. In COM, the status of an operation is notified through the return value of the function in a format known as HRESULT. [1.0] a) True b) False 53. By providing binary standard for interoperability, COM enables applications developed by multiple developers and vendors to communicate with each other. [1.0] a) True b) False 54. Which of the following are the advantages of using interfaces with COM components? [1.0] a) Language dependence for developing the componentt c) Hidden internal implementation of the component. b) Reusable application architecture d) Language independence for developing the component 55. Which of the following are true in relation with IUnknown interface? [1.0] a) According to COM specifications, it is mandatory that every COM component must support it. d) All the functions defined in this interface are pure virtual functions. b) It is available by default for all windows based systems. e) All of the above c) It helps the client application to [...]... between classes b) It is a named collection of d) All of the above other namespaces 75 and are the two ways of packaging [2.0] components in COM a) Hierarchical and Physical c) Global and Local b) Hierarchical and Logical 76 d) Logical and Physical Statement 1: In COM, all communication between clients and objects [2.0] occurs over methods defined on interfaces Statement 2: Methods are implemented... 2000 is a c) LCB is the feature of COM+ mail server, integrated with that allows the scaling of [1.5] Microsoft Active Directory and IIS that supports only HTML documents and no MIME content type b) SQL Server 2000 is RDBMS provided Microsoft COM+ components multiple servers over an d) Internet Security and by Acceleration Server 2000 has a functionality of firewall and acts as a datacaching server 154... access to services, objects and servers in a platform- [0.5] independent manner a) True b) False 137 Internet Security is a firewall used to protect LAN users from [0.5] unauthorized intrusion through Internet connection a) True b) False 138 Statement 1: COM provides distribution capabilities to COM [1.0] components Statement 2: COM+ integrates COM / DCOM and MTS into one package and also provides services... Statement 2 is false d) Both statements are false 119 Statement 1: The regedt32.exe editor provides the capability to view [2.0] and modify the registry permissions that allow and deny read-write access to different users and user groups Statement 2: The user interface for regedt32.exe and regedit.exe editor is the same a) Statement 1 is true c) Both statements are true b) Statement 2 is false d) Both statements... False The _ file contains the GUID definitions of interfaces, [0.5] components and type libraries a) 92 b) HKEY_CLASSES_ROOT key holds the information about all the [0.5] registered components and file associations a) True 91 b) name.H The _ file contains the proxy/stub source that is used in local [0.5] process and remote components a) 90 False EDIT.EXE utility displays the windows registry contents... system resources by encapsulating the life-cycle management of the object internally 62 Which are the standard interfaces to be implemented by COM that are [1.5] associated with the standard Ids and provide certain standard functionalities shared by most of the components developed by various component authors? a) IUnknown b) IUndispatch 63 c) IKnown d) IDispatch Which of the following are the advantages... the object and client applications were written in different programming languages b) It is a binary file that stores d) All of the above information about a COM or DCOM object's properties and methods in a form that is accessible to other applications at runtime 123 Which of the following is true regarding IDL file? a) It is a file that contains d) In it, the interface header interface and type library... protocol SOAP stands for Simplified Object Access Protocol a) True [0.5] b) [0.5] False 128 With Windows DNA, XML is the data interoperability solution [0.5] a) True b) False 129 clients connect through a COM-CORBA bridge a) RMI b) CORBA 130 ASP can make use of scripting languages like _ and VBScript a) Java b) [0.5] [0.5] JavaScript 131 In Microsoft terms, a NET component that utilizes COM+ services... are easy 67 Which of the following is true for COM components in relation with EXE and DLL formats? a) The executable codes for the d) EXE and DLL are the file COM objects are placed in extensions provided for the the EXE format or the DLL files under Windows format operating system to identify them as executables and dynamic link libraries respectively b) The DLLs or EXEs act as a e) All of the above... regarding middle-tier in the DNA [1.0] architecture? a) It is the business logic built c) The COM+ components in it using COM+ components, must be written using only which have no visual one language representation 143 Statement 1: Any COM-enabled client can use existing COM [1.0] components, once they are configured and deployed to make its capabilities available through the operating system Statement 2: . Question Bank COM+ and MSMQ 1. _________ applications were designed using. Which are the standard interfaces to be implemented by COM that are associated with the standard Ids and provide certain standard functionalities

Ngày đăng: 09/04/2013, 09:10

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan