C# Mult Choice
Which of the following statements is correct about the .NET Framework? A. .NET Framework uses DCOM for achieving language interoperability. B. .NET Framework is built on the DCOM technology. C. .NET Framework uses DCOM for making transition between managed and unmanaged code. D. .NET Framework uses DCOM for creating unmanaged applications. E. .NET Framework uses COM+ services while creating Distributed Applications
.NET Framework uses DCOM for making transition between managed and unmanaged code.
Which of the following components of the .NET framework provide an extensible set of classes that can be used by any .NET compliant programming language? A. .NET class libraries B. Common Language Runtime C. Common Language Infrastructure D. Component Object Model E. Common Type System
A. .NET class libraries
Which of the following utilities can be used to compile managed assemblies into processor-specific native code? A. gacutil B. ngen C. sn D. dumpbin E. ildasm
B. ngen
Which of the following statements correctly define .NET Framework? A. It is an environment for developing, building, deploying and executing Desktop Applications, Web Applications and Web Services. B. It is an environment for developing, building, deploying and executing only Web Applications. C. It is an environment for developing, building, deploying and executing Distributed Applications. D. It is an environment for developing, building, deploying and executing Web Services. E. It is an environment for development and execution of Windows applications.
It is an environment for developing, building, deploying and executing Desktop Applications, Web Applications and Web Services.
Which of the following constitutes the .NET Framework? - ASP.NET Applications - CLR - Framework Class Library - WinForm Applications - Windows Services
-CLR -Framework Class Library
Which of the following security features can .NET applications avail? - PIN Security - Code Access Security - Role Based Security - Authentication Security - Biorhythm Security
-Code Access Security -Role Based Security
Which of the following jobs are NOT performed by Garbage Collector? - Freeing memory on the stack. - Avoiding memory leaks. - Freeing memory occupied by unreferenced objects. - Closing unclosed database collections. - Closing unclosed files.
-Freeing memory on the stack -Closing unclosed database collections. -Closing unclosed files.
Which of the following statements are correct about a .NET Assembly? - It is the smallest deployable unit. - Each assembly has only one entry point - Main(), WinMain() or DLLMain(). - An assembly can be a Shared assembly or a Private assembly. - An assembly can contain only code and data. - An assembly is always in the form of an EXE file.
-It is the smallest deployable unit. -Each assembly has only one entry point - Main(), WinMain() or DLLMain(). -An assembly can be a Shared assembly or a Private assembly.
Which of the following are NOT true about .NET Framework? - It provides a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely. - It provides a code-execution environment that minimizes software deployment and versioning conflicts. - It provides a code-execution environment that promotes safe execution of code, including code created by an unknown or semi-trusted third party. - It provides different programming models for Windows-based applications and Web-based applications. - It provides an event driven programming model for building Windows Device Drivers.
-It provides a code-execution environment that promotes safe execution of code, including code created by an unknown or semi-trusted third party. -It provides different programming models for Windows-based applications and Web-based applications.
Which of the following statements are TRUE about the .NET CLR? - It provides a language-neutral development & execution environment. - It ensures that an application would not be able to access memory that it is not authorized to access. - It provides services to run "managed" applications. - The resources are garbage collected. - It provides services to run "unmanaged" applications.
-It provides a language-neutral development & execution environment. -It ensures that an application would not be able to access memory that it is not authorized to access. -It provides services to run "managed" applications. -The resources are garbage collected.
Which of the following are valid .NET CLR JIT performance counters? - Total memory used for JIT compilation - Average memory used for JIT compilation - Number of methods that failed to compile with the standard JIT - Percentage of processor time spent performing JIT compilation - Percentage of memory currently dedicated for JIT compilation
-Number of methods that failed to compile with the standard JIT -Percentage of processor time spent performing JIT compilation
Which of the following is the root of the .NET type hierarchy? A. System.Object B. System.Type C. System.Base D. System.Parent E. System.Root
A. System.Object
Which of the following benefits do we get on running managed code under CLR? - Type safety of the code running under CLR is assured. - It is ensured that an application would not access the memory that it is not authorized to access. - It launches separate process for every application running under it. - The resources are Garbage collected.
All of the above - Type safety of the code running under CLR is assured. - It is ensured that an application would not access the memory that it is not authorized to access. - It launches separate process for every application running under it. - The resources are Garbage collected.
Which of the following jobs are done by Common Language Runtime? - It provides core services such as memory management, thread management, and remoting. - It enforces strict type safety. - It provides Code Access Security. - It provides Garbage Collection Services.
All of the above - It provides core services such as memory management, thread management, and remoting. - It enforces strict type safety. - It provides Code Access Security. - It provides Garbage Collection Services.
Which of the following .NET components can be used to remove unused references from the managed heap? A. Common Language Infrastructure B. CLR C. Garbage Collector D. Class Loader E. CTS
C. Garbage Collector
Code that targets the Common Language Runtime is known as A. Unmanaged B. Distributed C. Legacy D. Managed Code E. Native Code
D. Managed Code
Which of the following statements is correct about Managed Code? A. Managed code is the code that is compiled by the JIT compilers. B. Managed code is the code where resources are Garbage Collected. C. Managed code is the code that runs on top of Windows. D. Managed code is the code that is written to target the services of the CLR. E. Managed code is the code that can run on top of Linux.
D. Managed code is the code that is written to target the services of the CLR.
Which of the following assemblies can be stored in Global Assembly Cache? A. Private Assemblies B. Friend Assemblies C. Shared Assemblies D. Public Assemblies E. Protected Assemblies
Shared Assemblies