Upwork DOT NET 3.5 USING C# TEST 2016

Hello Freelancer, Welcome to allupworktestanswers.com Here to get the DOT NET 3.5 USING C# TEST of Latest version 2016. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website.
Upwork DOT NET 3.5 USING C# TEST 2016

1. Which of the following are static methods of the System.Reflection Activator class? Answers:
  1. CreateComInstanceFrom<
  2. CreateInstanceFrom
  3. GetInstance
  4. CreateInstance
  5. All of the above
2. Which of the following are true about Extension methods? Answers:
  1. They must be declared static
  2. They can be declared either static or instance members
  3. They must be declared in the same assembly (but may be in different source files)
  4. Extension methods can be used to override existing instance methods
  5. Extension methods with the same signature for the same class may be declared in multiple namespaces without causing compilation errors
3. When using a DataReader to access the results of a Database operation, which of the following are true? Answers:
  1. The DataReader provides a cursor that can be used to move forward and backwards through the result.
  2. The DataReader provides random access capabilities on the result.
  3. The Application code can reference the first row of a multi-row result set faster than it can be by loading it directly into a DataTable
  4. The DataReader can provide the Schema of the result to the application code.
4. Which of the following scenarios are applicable to Window Workflow Foundation? Answers:
  1. Document-centric workflows
  2. Human workflows
  3. User-interface page flows
  4. Builtin support for communications across multiple applications and/or platforms
5. Which of the following are true about using ADO.NET DataSets and DataTables? Answers:
  1. The connection to the database must remain valid for the life of the data objects
  2. All tables in a dataset must come from the same database.
  3. A given instance of a DataTable can be in only one DataSet
  4. Changes made to multiple tables within a DataSet can easily be transferred to a new DataSet which contains only the changes
  5. Content from multiple DataSets can easily be combined into a single DataSet that contains the net result of all changes.
6. Which of the following are true with respect to the standard implementation of Garbage Collection? Answers:
  1. Objects must be set to null in order to be eligible for garbage collection
  2. Unless specific steps are taken, an object may be moved in memory
  3. Objects become eligible for garbage collection as soon as it is impossible for any code to access them
  4. Objects which implement finalizers will always have the finalizer called at some point
7. Which of the following types guarantee atomic reads and writes? Answers:
  1. int
  2. double
  3. string
  4. long
  5. float
8. Which of the following does using Initializer Syntax with a collection as shown below require? CollectionClass numbers = new CollectionClass { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 }; Answers:
  1. The Collection Class must implement System.Collections.Generic.ICollection<T>
  2. The Collection Class must implement System.Collections.Generic.IList<T>
  3. Each of the Items in the Initializer List will be passed to the Add<T>(T item) method
  4. The items in the initializer will be treated as an IEnumerable<T> and passed to the collection constructor+K110
9. Which features that are not supported in the System.TimeZone class does the System.TimeZoneInfo class provide? Answers:
  1. It provides readable names for both regular time and, if appropriate, daylight savings time
  2. It provides a means of enumerating the known time zones that are available on the local system
  3. It provides functionality to create custom time zones
  4. It provides the period the time zone was in effect for. For example: From 1986 to 2006, it was observed from the first Sunday in April to the last Sunday in October, but since 2007, it is being observed from the second Sunday in March to the first Sunday in November
10. Within Windows Workflow Foundation, Compensating Actions are used for: Answers:
  1. provide a means to rollback a failed transaction
  2. provide a means to undo a successfully committed transaction later
  3. provide a means to terminate an in process transaction
  4. achieve load balancing by adapting to the current activity
11. Of which elements does Generics allow parameterization by type?Answers:
  1. Classes
  2. Structs
  3. Methods
  4. Events
  5. Fields
12. Which of the following do the advantages of Lambda Expressions over Anonymous methods include? Answers:
  1. More concise syntax
  2. The types for a Lambda Expression may be omitted
  3. The body of an anonymous method can not be an expression
  4. Lambda Expressions permit deferred type interference, that anonymous methods do not
  5. All of the above
13. In which of the following types of applications can Windows Workflow Foundation be used? Answers:
  1. Console Applications
  2. Windows Forms based Applications
  3. Windows Presentation Foundation based Applications
  4. ASP.NET based applications
  5. All of the above
14. Which of the following items are recommended when using XML comments to generate documentation? Answers:
  1. <exception>
  2. <code>
  3. <summary>
  4. <events>
15. With which class is the task of mapping a specific point in time into units, such as weeks, months, and years accomplished? Answers:
  1. System.DateTime
  2. System.TimeSpan
  3. System.Globalization.Calendar
  4. System.Globalization.CultureInfo
16. Which of the following are true regarding the System.Collections.Generic.HashSet<T> class? Answers:
  1. HashSet is an unordered collection.
  2. HashSet requires that each element be unique a
    s determined by either a supplied EqualityComparer or the default EqualityComparer
  3. Operations on sets (Union, Intersection, etc) always create new result sets
  4. HashSet provides functionality for “conceptual sets” where the rules for membership can be specified without actually creating all of the items.
17. Which of the following are true regarding System.Threading.ReaderWriterLockSlim? Answers:
  1. It is optimized for single processor/core operations
  2. It is optimized for usage where writes from multiple sources are common
  3. A thread which has a read lock on a resource may not acquire a write lock on the same resource
  4. By default, a thread which has a read lock on a resource and attempts to get another read lock on the same resource will throw an exception
18. The framework provides three different timer classes. Select the answer that properly matches the class with the listed characteristic. Answers:
  1. System.Threading.Timer Simple timer which requires a delegate to be supplied for execution when the timer expires. execution of the method provided by the delegate will be invoked on a ThreadPool Thread.
  2. System.Timers.Timer: Designed for use with worker threads in a multithreaded environment. Can move among threads to handle the raised Elapsed event May result in more accuracy than System.Windows.Forms.Timer instances.
  3. System.Windows.Forms.Timer Lower Resolution timer which requires a UI message pump on the creating thread.
  4. All of the above
19. Which of the following advantages does System.Collections.IDictionaryEnumerator provide over System.Collections.IEnumerator? Answers:
  1. It adds properties for direct access to both the Key and the Value
  2. It is optimized to handle the structure of a Dictionary.
  3. It provides properties to determine if the Dictionary is enumerated in Key or Value order
  4. It provides reverse lookup methods to distinguish a Key from a specific Value
20. While using the capabilities supplied by the System.Messaging classes, which of the following are true? Answers:
  1. Information must be explicitly converted to/from a byte stream before it uses the MessageQueue class
  2. Invoking the MessageQueue.Send member defaults to using the System.Messaging.XmlMessageFormatter to serialize the object.
  3. Objects must be XMLSerializable in order to be transferred over a MessageQueue instance.
  4. The first entry in a MessageQueue must be removed from the queue before the next entry can be accessed
  5. Entries removed from a MessageQueue within the scope of a transaction, will be pushed back into the front of the queue if the transaction fails.
21. What impact will using implicitly typed local variables as in the following example have? var sample = “Hello World”; Answers:
  1. The actual type is determined at compilation time, and has no impact on the runtime
  2. The actual type is determined at runtime, and late binding takes effect
  3. The actual type is based on the native VARIANT concept, and no binding to a specific type takes place.
  4. “var” itself is a specific type defined by the framework, and no special binding takes place
22. Which of the following are true about System.GC under version 3.5 of the Framework? Answers:
  1. You can request that the garbage collector process a generation if it determines that it is appropriate at specific points in your code
  2. You can control the intrusiveness of the garbage collector (i.e. how often it performs collections) while your program is running
  3. You can control the intrusiveness of the garbage collector (i.e. how often it performs collections) only during application initialization
  4. You should specify LowLatency when using Concurrent Server Garbage Collection to improve memory utilization
23. Which of the following operators can be overloaded? Answers:
  1. Assignment (=)
  2. Conditional (&&,||)
  3. Logical (&,|,^)
  4. Shift (<<, >>)
24. Which of the following does the System.IO.Pipes namespace provide?Answers:
  1. Interprocess communication through anonymous and/or named pipes.
  2. Access to named pipes using System.IO.Stream
  3. Access to system level pipe security implemented as discretionary access control lists (DACL) and/or system access control lists (SACL),
  4. Asynchronous read and write operations
  5. All of the above
25. Which of the following statements do Expression Trees fit best? Answers:
  1. Expression trees are a data structure which can be initially composed using language syntax.
  2. Expression trees are dynamically generated code which is executed to perform the desired function.
  3. Expression trees can only be created from Lambda Expressions
  4. Expression trees can be modified once they are created
  5. All of the Above
26. By which contract are the ws-addressing action and replyaction elements of the soap envelop controllable when Windows Communication Foundation is used? Answers:
  1. ServiceContract
  2. OperationContract
  3. DataContract
  4. MessageContract
27. Which of the following are true when comparing ADO.NET with Microsoft DNA (Distributed interNet Applications)? Answers:
  1. ADO.NET provides significantly better performance.
  2. ADO.NET is better suited for communications between disparate systems/applications.
  3. ADO.NET can eliminate the need for COM components in the communication layer.
  4. DNA makes it easier to communicate across firewalled boundaries.
28. When Deleting a DataRow from the DataRowCollection of a DataTable, you can: Answers:
  1. use the DataRowCollection.Remove method to immediately delete the row.
  2. use the DataRowCollection.Remove method to mark the row for deletion when DataRow.AcceptChanges is called.
  3. use the DataRow.Delete method to immediately delete the row.
  4. use the DataRow.Delete method to mark the row for deletion when DataRowAcceptChanges is called.
29. Which of the following are required to be true by objects which are going to be used as keys in a System.Collections.HashTable? Answers:
  1. They must handle case-sensitivity identically in both the GetHashCode() and Equals() methods.
  2. Key objects must be immutable for the duration they are used within a HashTable.
  3. Get HashCode() must be overridden to provide the same result, given the same parameters, regardless of reference equalityl unless the HashTable constructor is provided with an IEqualityComparer parameter.
  4. Each Element in a HashTable is stored as a Key/Value pair of the type System.Collections.DictionaryElement
  5. All
    of the above
30. Which of the following are goals of Windows Communication Foundation?Answers:
  1. Bringing various existing communication technologies into a unified environment.
  2. Cross vendor/platform communication.
  3. Support for asynchronous communications.
  4. Support for distributed applications based on technologies such as MSMQ and/or COM+
  5. All of the above
31. Which access limitation is found in a class member declared protected internal? Answers:
  1. Access is limited to the containing class plus any classes derived from the containing class
  2. Access is limited to the current assembly
  3. Access is limited to the containing class plus any classes derived from the containing class that are also in the current assembly
  4. Access is limited to the containing class plus any classes derived from the containing class or any other class in the current assembly
32. When Windows Communication Foundation is used to develop a Web Service, which of the following are supported? Answers:
  1. WS-Addressing
  2. WS-MetadataExchange
  3. WS-Security
  4. WS-Atomic Transaction
  5. All of the above
33. To which contract is the SessionMode property to disallow, require, or permit applied when Windows Communication Foundation is used? Answers:
  1. ServiceContract
  2. OperationContract
  3. DataContract
  4. MessageContract
34. Which of the following is not supported by remoting object types?Answers:
  1. well-known singleton
  2. well-known single call
  3. client activated
  4. context-agile
35. The default number of threads per processor in the System.Threading.ThreadPool class under version 3.5 of the Framework is:Answers:
  1. 1
  2. 25
  3. 250
  4. 100
  5. 500
36. To which of the following can System.IO.IsolatedStorage not be scoped?Answers:
  1. Restricted to a Specific Application
  2. Restricted to a Specific AppDomain
  3. Restricted to a Specific User
  4. Restricted to a specific Physical Media
37. When using an automatic property, which of the following statements is true? Answers:
  1. The compiler generates a backing field that is completely inaccessible from the application code.
  2. The compiler generates a backing field that is a private instance member with a leading underscore that can be programmatically referenced.
  3. The compiler generates a backing field that is accessible via reflection
  4. The compiler generates a code that will store the information separately from the instance to ensure its security.
38. When using an implicitly typed array, which of the following is most appropriate? Answers:
  1. All elements in the initializer list must be of the same type.
  2. All elements in the initializer list must be implicitly convertible to a known type which is the actual type of at least one member in the initializer list
  3. All elements in the initializer list must be implicitly convertible to the common type which is the base type of the items actually in the list
  4. There are no restrictions on the items in the initializer list as the array is not declared to be a specific type.
39. Which of the following characteristics is present in the DateTime type?Answers:
  1. It always references the UTC (GMT) time
  2. It always references the Local time
  3. It contains a member indicating which time zone it refers to
  4. It contains a member indicating whether the time is UTC, Local, or Unspecified
40. Which of the following code samples show a valid static constructor?Answers:
  1. class Sample { public static Sample() { } }
  2. class Sample { static Sample() { } }
  3. class Sample { static Sample(int value) { } }
  4. class Sample { static void Sample() { } }
41. Which of the following are true regarding System.Web.Mail and System.Net.Mail namespaces? Answers:
  1. System.Web.Mail is not supported under version 3.5 of the Framework
  2. System.Web.Mail is deprecated under version 3.5 of the Framework, and it is officially recommended that System.Net.Mail be used.
  3. System.Web.Mail is the preferred solution when using IIS hosted applications
  4. There are no functional differences; the items were moved to a new namespace to reflect their applicability in a better way
42. In which of the following ways do structs differ from classes? Answers:
  1. Structs can not implement interfaces
  2. Structs cannot inherit from a base struct
  3. Structs cannot have events interfaces
  4. Structs cannot have virtual methods
43. To which of the following do automatic properties refer? Answers:
  1. You declare (explicitly or implicitly) the accessibility of the property and get and set accessors but do not provide any implementation or backing field
  2. You attribute a member field so that the compiler will generate get and set accessors
  3. The compiler creates properties for your class based on class level attributes
  4. They are properties which are automatically invoked as part of the object construction process
44. Given the code below, which of the following items will cause a compilation error? static void F1(params int [] y) { } static void Sample() { int [] j = new Int32[3]; List k = new List(); // ANSWER GOES HERE } Answers:
  1. F1(j);
  2. F1(k);
  3. F1(1, 2, 3);
  4. F1(new [] {1,2,3})
  5. None of the above
45. Which of the following are true about Nullable types? Answers:
  1. A Nullable type is a reference type.
  2. A Nullable type is a structure.
  3. An implicit conversion exists from any non-nullable value type to a nullable form of that type.
  4. An implicit conversion exists from any nullable value type to a non-nullable form of that type.
  5. A predefined conversion from the nullable type S? to the nullable type T? exists if there is a predefined conversion from the non-nullable type S to the non-nullable type T
46. For which of the following scenarios does Reflection.Emit provide support? Answers:
  1. Defining methods dynamically.
  2. Defining types dynamically
  3. Defining assemblies dynamically
  4. Defining Instances dynamically
  5. Exporting an executable code to a disk based assembly
47. Which of the following are true about System.Security.Cryptography under version 3.5 of the framework Answers:
  1. None of the implementations are FIPS-certified
  2. Support is provided for the “Suite B” set of cryptographic algorithms as specified by the National Security Agency (NSA) .
  3. Cryptography Next Generation (CNG) classes are supported on XP and Vista systems
  4. The System.Security.Cryptography.AesManaged class allows custom block size, iteration counts and feedback modes to support any the Rijndael based encryption.
48. Custom non-fatal exceptions should be derived from: Answers:
  1. ApplicationException
  2. DataMisalignedException
  3. ExecutionEngineException
  4. SystemException
49. class Sample { public Sample(int x) { } } In the above code, which of the following other class constructors can directly access the provided constructor? Answers:
  1. public Sample() : this(1) { }
  2. public Sample() : Sample(1) {}
  3. Both of the above
  4. One class constructor can not directly access another constructor
50. Which of the following are characteristics of the System.Threading.Timer class? Answers:
  1. The method provided by the TimerCallback delegate will always be invoked on the thread which created the timer.
  2. The thread which creates the timer must have a message processing loop (i.e. be considered a UI thread)
  3. The class contains protection to prevent reentrancy to the method provided by the TimerCallback delegate
  4. You can receive notification of an instance being Disposed by calling an overload of the Dispose method.
51. Which of the following is not an unboxing conversion? Answers:
  1. void Sample1(object o) { int i = (int)o; }
  2. void Sample1(ValueType vt) { int i = (int)vt; }
  3. enum E { Hello, World} void Sample1(System.Enum et) { E e = (E) et; }
  4. interface I { int Value { get; set; } } void Sample1(I vt) { int i = vt.Value; }
  5. class C { public int Value { get; set; } } void Sample1(C vt) { int i = vt.Value; }
52. Which of the following regarding the System.DateTimeOffset structure are true? Answers:
  1. It provides an exact point in time relative to the UTC time zone
  2. It combines a DateTime structure with a TimeZone structure
  3. It provides arithmetical operations using values with different offsets from the UTC
  4. It can be used to determine the specific TimeZone for a local time
53. Determining the availability of sufficient memory for an operation can be accomplished by: Answers:
  1. There is no supported application level means to determine if a specific amount of memory is available.
  2. using static methods of System.Runtime.MemoryFailPoint and checking the return value
  3. creating an instance of System.Runtime.MemoryFailPoint and monitoring for an InsufficientMemoryException
  4. creating an instance of System.Runtime.MemoryFailPoint and monitoring for an OutOfMemoryException
54. When using version 3.5 of the framework in applications which emit a dynamic code, which of the following are true? Answers:
  1. A Partial trust code can not emit and execute a code
  2. The generated code has no more permissions than the assembly which emitted it.
  3. It can be executed by calling System.Reflection.Emit.DynamicMethod( string name, Type returnType, Type[] parameterTypes ) without any special permissions
  4. None of the above
55. Which of the following characteristics are found in a query expression?Answers:
  1. It must begin with a from clause
  2. It must begin with a select clause
  3. It can end with a group clause
  4. An orderby clause may optionally follow a select clause
56. When using the Demand method of System.Security.IPermission, which of the following will occur? Answers:
  1. The permissions of the code which invoked the Demand method will be evaluated.
  2. For permissions which do a stack walk, an exception will occur only if NONE of the calling codes has the required permission
  3. For permissions which do a stack walk, an exception will occur if ANY of the calling codes does not have the required permission
  4. The permission levels of individual stack frames are always checked regardless of the permission type.
57. Which of the following characteristics do classes in the System.Drawing namespace such as Brush,Font,Pen, and Icon share? Answers:
  1. They encapsulate native resource and must be properly Disposed to prevent potential exhausting of resources.
  2. They are all MarshalByRef derived classes, but functionality across AppDomains has specific limitations.
  3. You can inherit from these classes to provide enhanced or customized functionality
  4. They are Value Type objects.
58. Which of the following are true regarding event declaration in the code below? class Sample { event MyEventHandlerType MyEvent; } Answers:
  1. MyEventHandlerType must be derived from System.EventHandler or System.EventHandler<TEventArgs>
  2. MyEventHandlerType must take two parameters, the first of the type Object, and the second of a class derived from System.EventArgs
  3. MyEventHandlerType may have a non-void return type
  4. If MyEventHandlerType is a generic type, event declaration must use a specialization of that type.
  5. MyEventHandlerType cannot be declared static
59. Which of the following statements apply to developing .NET code, using .NET utilities that are available with the SDK or Visual Studio? Answers:
  1. Developers can create assemblies directly from the MSIL Source Code.
  2. Developers can examine PE header information in an assembly.
  3. Developers can generate XML Schemas from class definitions contained within an assembly.
  4. Developers can strip all meta-data from managed assemblies.
  5. Developers can split an assembly into multiple assemblies.
60. Which of the following is true about C# generics? Answers:
  1. C# allows non-type template parameters
  2. C# supports explicit specialization
  3. C# allows the type parameter to be used as the base class for the generic type
  4. C# allows a generic type parameter itself to be a generic
  5. C# enforces that all codes are valid for all types of parameters
61. The output generated by the fo
llowing code will be:
 string t = “This Is a Test”; t.Replace(“T”, “?”);Console.WriteLine(t); Answers:
  1. ?his Is a ?est
  2. ?his Is a ?es?
  3. This Is a Test
  4. ?his Is a Test
62. Which of the following are true about anonymous types? Answers:
  1. They can be derived from any reference type.
  2. Two anonymous types with the same named parameters in the same order declared in different classes have the same type.
  3. Anonymous types can have methods
  4. All properties of an anonymous type are read/write
63. Which of the following are true regarding multiple versions of an assembly? Answers:
  1. When multiple versions of an assembly are available on the search path (AKA private assemblies), the runtime will use the first matching assembly with a version number equal to or higher than the assembly version that was originally linked against.
  2. When assemblies are resolving in the GAC (AKA shared assemblies), both the originator and the version are considered in determining the appropriate assembly.
  3. Configuration files can be used to override the version specified at build time.
  4. Strong Names are not required to utilize .NET’s versioning capabilities
64. Which of the following are true about declarative attributes? Answers:
  1. They must be inherited from the System.Attribute.
  2. Attributes are instantiated at the same time as instances of the class to which they are applied.
  3. Attribute classes may be restricted to be applied only to application element types.
  4. By default, a given attribute may be applied multiple times to the same application element.
65. Which of the following statements are applicable to LINQ to SQL?Answers:
  1. It is an O/RM (object relational mapping) implementation.
  2. It is a set of enhancements to the DataSet and DataTable classes.
  3. It requires the use of the SQLServer as the database
  4. Because LINQ is based on Queries, it can not be used to modify the data in the database.
  5. None of the above
66. When Implementing System.EnterpriseServices.ServicedComponent derived classes, which of the following statements are true? Answers:
  1. Enabling object pooling requires an attribute on the class and the enabling of pooling in the COM+ catalog.
  2. Methods can be configured to automatically mark a transaction as complete by the use of attributes.
  3. You can configure authentication using the AuthenticationOption when the ActivationMode is set to Library.
  4. You can control the lifecycle policy of an individual instance using the SetLifetimeService method.


Finally no more words require about the DOT NET 3.5 USING C# TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box.  Thank you very mutch for being with us.

1 comments: