Professional Documents
Culture Documents
*****************************************
A Class-----
B Sequence
C Use-case
D Actor
A Association
B Multiplicity------
C Generalization
D Specialization
3. A ______ executes in its own memor space and encapsulates and protects its
internal sturcture
A Property
B Method
C Process-----
D Programs
4. The_______ pattern is used when there must be exactly one instance of a class,
and it must be accessible
to clients from a very known point.
A Singleton------
B Multidimensional
C Process
D Thread
A Activity
B Class
C Object------
D Link
6. Wich of the follwing statements about a good system design are correct?
A 2,3,4
B 1,2,3,4------
C 1,4
D 2,4
7. Which of the following statements about package diagrams are correct? (Choose 3
correct answers)
10. Which of the follwoing functions returns the number of unique values in a
column?
Count(expression)
Cont(Distinct expression)-----
count(*)
count()
12. Which of the follwoing features enables the user to implement business logic
during data processing?
views-----
Triggers
Tables
Stored Procedures
13. Which of the follwoing statements with respect to indexes are true?
indexes are used only with the tables with foreign keys
indexes are used in the WHERE clause of the query
Indexes are used in the WHERE clause of the query-----
If an index key is not spedified, MySQL automatically indexes the primary
key----
17. The runlevel ______ starts the system in full multiuser graphical mode.
0
2
3
5----
18. The ______ command is used to disply the names of users that are presently
logged on the system
whoami----
who
lastlogin
login
19. Which of the follwoing are various commands used in RHEL to manage directories
are files at the command line?
cat---
cd-----
ifconfig
chkconfig
20. Which of the following commands helps users to search their documents?
Is
find----
locate-----
pwd
21. The ______ is responsible for creating and managing the processes.
linux shell
linux bash
linux kernel----
linux command
22. The -___________ command is used to view all the stored commands.
list
less
more
history-------
24. Which of the follwoing directives defines alternative names for the hosts used
in the name-based virtual host?
ServerPath
ServerAlias
ServerName------
NameVirtualHost
25. Which of the follwoing directives can be used to customize the server response
to errors?
ErrorLog
ErrorDocument-----
FormatLog
TransferLog
26. Which of the follwoing ways are used by Apache Web server to authenticate a
HTTP request?
Access Control
Aunthetication----
Authorization
Validation
27. Which of the follwoing modules specifies the proxy or the gateway for Apache
server?
mod_proxy_connect
mod_proxy_http
mod_proxy_ftp
mod_proxy-------
28. _______ exists between a computer and network and provides protection to
networks against outside atteckers
Security
proxy
firewall------
protocal
29. ____ is the process of converting data into scrambled code while deciphering it
at the other end
cryptography------
Digital signautures
Messages digest
certificates
30. ______
31. Which of the following are the disadvantages of screening router architecture?
it is transparent
it is easier to use and less expenisve
it cannot handle all type of traffic---
it possesses limited or no loggin capabilities
32. Whic of the follwing are the disadvantages of screening router architecture?
it is transparent
it is easier to use and less expenisve
it cannot handle all type of traffic------
33. Whic of the follwing options is used to cofigure the firewall in Red Hat
Enterprise Linux?
A. system / control panel/firewall
B-system / Administraiton/firewall------
C-system / control panel/firewall
D-system / control panel/firewall
31. Whic of the following are the disadvantages of screening router architecture?
it is transparent
it is easier to use and less expenisve
it cannot handle all type of traffic---
it possesses limited or no loggin capabilities
it possesses limited or no loggin capabilities