You are on page 1of 5

An insight to object analysis and design A043

*****************************************

1. An insight to object analysis and design

The _________ diagram is a general-purpose entity for organizing classes

A Class-----
B Sequence
C Use-case
D Actor

2. _______ defines the number of objects participate in a relationship.

A Association
B Multiplicity------
C Generalization
D Specialization

3. A ______ executes in its own memor space and encapsulates and protects its
internal sturcture

A Property
B Method
C Process-----
D Programs

4. The_______ pattern is used when there must be exactly one instance of a class,
and it must be accessible
to clients from a very known point.

A Singleton------
B Multidimensional
C Process
D Thread

5. The _______ diagram shows a complete or partial view of the structure of an


modeled system at a specific time.

A Activity
B Class
C Object------
D Link

6. Wich of the follwing statements about a good system design are correct?

1 Results in precise spedifications


2 Is simple and easy to understand
3 Is unabigous
4 Shows comprehensive subsystems

A 2,3,4
B 1,2,3,4------
C 1,4
D 2,4
7. Which of the following statements about package diagrams are correct? (Choose 3
correct answers)

1 it depicts a high-level overview of the requrements-----


2 it depicts a high-level overview of the architecture and design----
3 it is used to draw activities of the processes
4 it can be used to logically modularize a complex diagram------

8. Which of the follwing statements about the interactions overview diagram is


true?

1 The interaction overview diagram describes the interactions where messages


and life tiem are hidden
2 Focus of interation overview diagram is not on the overview of flow of
control of the intaractions
3 The notation for interaction overview diagram is same for activitiy diagram

9. Which of the follwing statements are true about the subsystem?

1 subsystems are smaller systems within a large system-------


2 A subystem realizes one or more interfaces, which defines the behaviour it
can perfom
3 It may be represente as UML packeage or a set of operations

10. Which of the follwoing functions returns the number of unique values in a
column?
Count(expression)
Cont(Distinct expression)-----
count(*)
count()

11. Which of the follwoing is not an aggregate function?


Group_concat
sum
truncate-----

12. Which of the follwoing features enables the user to implement business logic
during data processing?
views-----
Triggers
Tables
Stored Procedures

13. Which of the follwoing statements with respect to indexes are true?
indexes are used only with the tables with foreign keys
indexes are used in the WHERE clause of the query
Indexes are used in the WHERE clause of the query-----
If an index key is not spedified, MySQL automatically indexes the primary
key----

14. Linux is primarily derived from the ______ operating system.


UNIX------
MS-DOS
Solaris
Windows

15. Linux is ______ by design


non-modular
modular-----
Singular
Plural

16. Linux uses ______ to ensure security in a multiuser environment.


MAC ------
BAC
DAC
FTC

17. The runlevel ______ starts the system in full multiuser graphical mode.
0
2
3
5----

18. The ______ command is used to disply the names of users that are presently
logged on the system
whoami----
who
lastlogin
login

19. Which of the follwoing are various commands used in RHEL to manage directories
are files at the command line?
cat---
cd-----
ifconfig
chkconfig

20. Which of the following commands helps users to search their documents?
Is
find----
locate-----
pwd

21. The ______ is responsible for creating and managing the processes.
linux shell
linux bash
linux kernel----
linux command

22. The -___________ command is used to view all the stored commands.
list
less
more
history-------

23. Which of the follwing modules handles the file-based cache?


mod_mem_cache
mod_cache------
mod_disk_cache
mod_proxy

24. Which of the follwoing directives defines alternative names for the hosts used
in the name-based virtual host?
ServerPath
ServerAlias
ServerName------
NameVirtualHost

25. Which of the follwoing directives can be used to customize the server response
to errors?
ErrorLog
ErrorDocument-----
FormatLog
TransferLog

26. Which of the follwoing ways are used by Apache Web server to authenticate a
HTTP request?
Access Control
Aunthetication----
Authorization
Validation

27. Which of the follwoing modules specifies the proxy or the gateway for Apache
server?
mod_proxy_connect
mod_proxy_http
mod_proxy_ftp
mod_proxy-------

28. _______ exists between a computer and network and provides protection to
networks against outside atteckers
Security
proxy
firewall------
protocal

29. ____ is the process of converting data into scrambled code while deciphering it
at the other end
cryptography------
Digital signautures
Messages digest
certificates

30. ______

SI No. Left Column SI NO. Right column


Correct Answer for column A
A1 %t B1 specifies the request line recieved from the client
0 B1 0B2 0B3 0B4
A2 %u B2 specifies the request line of the request
0 B1 0B2 0B3 0B4
A3 %b B3 specifies the remote user in authenticated requests
0 B1 0B2 0B3 0B4
A4 %r B4 specifies the data returned to the client excluding HTTP
headers 0 B1 0B2 0B3 0B4

31. Which of the following are the disadvantages of screening router architecture?
it is transparent
it is easier to use and less expenisve
it cannot handle all type of traffic---
it possesses limited or no loggin capabilities
32. Whic of the follwing are the disadvantages of screening router architecture?
it is transparent
it is easier to use and less expenisve
it cannot handle all type of traffic------

33. Whic of the follwing options is used to cofigure the firewall in Red Hat
Enterprise Linux?
A. system / control panel/firewall
B-system / Administraiton/firewall------
C-system / control panel/firewall
D-system / control panel/firewall

31. Whic of the following are the disadvantages of screening router architecture?
it is transparent
it is easier to use and less expenisve
it cannot handle all type of traffic---
it possesses limited or no loggin capabilities
it possesses limited or no loggin capabilities

You might also like