(Object Obj1, Object Obj2) " Defines: A
(Object Obj1, Object Obj2) " Defines: A
(Object Obj1, Object Obj2) " Defines: A
a. True
b. False
Ans: b
26. What is the result of the code below
struct MyStruct
{
int x = 20;
int y = 20;
}
Console.WriteLine("The sum is", x+y);
a. 40
b. 0
c. Throws an error message
d. Returns garbage value
Ans: c
28. A Virtual Modifier is used to declare a method whose implementation can
be changed in a derived class by
a. Overloading Member
b. Overriding Member
c. Shadowing Member
d. Cannot be changed
Ans: b
29. The technique of accessing the metadata of the assemblies is called
a. Shadowing
b. Reflection
c. Refraction
d. Repitition
Ans: b
30. The Assemblies which contain only culture information which are used to
get language specific resources for an application are called
a. Private assemblies
b. Shared assemblies
c. Satellite assemblies
d. Global assemblies
Ans: c
31. Private assembly must have a strong name to get identified.
a. True
b. False
Ans: b
32. What is the result of the below code
Byte value1=10;
Byte value2=23;
Byte total;
Total = value1+value2;
Console.Writeline(Total);
a. 33
b. 0
c. Throws an error message
d. Garbage value
Ans: b
34. Which of the following method locates the first occurrence of a given
substring or character in the string
a. Compare
b. CompareOrdinal
c. IndexOf
d. Substring
Ans: c
35. Shared assembly is found either in the same directory as the application,
or within one of its subdirectories.
a. True
b. False
Ans: b
36. The Strong Name of the Shared assembly does not contain
Ans: c
37. The Syntax for creating a Strong Name is
a. sn -k mykey.snk
b. sn k mykey.sn
c. sn mykey –k.snk
d. sn mykey.snk –k
Ans: a
Ans: b
39. Publisher Policy files are applied to
a. Private Assemblies
b. Delegates
c. Interfaces
d. Shared Assemblies
Ans: d
40. The ability to read, write, create or delete registry keys and values is
controlled by which of the following policies
a. SecurityPermission
b. RegistryPermission
c. DnsPermission
d. DirectoryServicesPermission
Ans : b
41. Which of the following access modifiers can be accessed by any code in the
same assembly , but not from another assembly
a. Protected Internal
b. Private
c. Protected
d. Internal
Ans: d
42. Which of the following access modifiers can be accessed by any code in the
same assembly , or by any derived class in another assembly
a. Protected Internal
b. Private
c. Protected
d. Internal
Ans : a