June 12, 2019

Computer Programming - MCQS


Note: We have tried to upload as much as we can, all the question and answers might be shuffled - Please find the answer below each question, some answers might be wrong please review on the last date(some answers might be changed) if you find any wrong answer please comment down below.

Questions:
1.
#include <stdio.h>
int main()
{int x; x = 5;        
                if(x > 5)x -= 5;
                else if(x >= 0)x += 00;
                else if(x)x += 5;
                else x -= 5;
                printf("%d\n",x);
                return 0;
}

Select one:

A. None of the above
B. 10
C. -5
D.  5
E.  6

The correct answer is: 5

2.
What is the output of the following code?
#include "stdio.h"
extern int a=5;
main(){
            void fun();
            printf("\n a=%d",a);
            fun();
            return 0;
            }
void fun()
{
            int a;
            printf(" in fun a=%d",a);
}

Select one:

A. a=0 in fun a=5
B. Error
C. None
D. a=5 in fun a=0

The correct answer is: a=5 in fun a=0

3.
What is the output of following program?
#include <stdio.h>
void abc(int a, int b)
{
            printf("%d%d",++a,++b);
            }
int main()
{
            int a=10;
            abc(++a,a++);
            abc(a++,++a);
            printf("%d",a);
            return 0;
}

Select one:

A. None
B. Error
C. 13 11 14 14 14
D. 13 11 14 15 14 

The correct answer is: 13 11 14 15 14

4.
What should be the output:
void main()
{
    int a = 10/3;
    printf("%d",a);
}

Select one:

A. 0
B. 3.0
C. 3.33
D. 3

The correct answer is:3

5.
#include <stdio.h>
int main()
{
                int i;
                if (printf("0"))
                    i = 3;
                else
                    i = 5;
                printf("%d", i);
                return 0;
}

Select one:

A. Error
B. 3
C. 03
D. None

The correct answer is: 03

6.
#include <stdio.h>
int main()
{
    int i = 0;
    switch (i)
    {
        case '0': printf("Hello");
                break;
        case '1': printf("world");
                break;

 default: printf("Helloworld");
    }
    return 0;
}

Select one:

A. Hello
B. Helloworld
C. None of these
D. world

The correct answer is: Helloworld

7.
What will be output of following program?
#include <stdio.h>
void convention(int,int,int);
int main()
{
    int a=5;   
    convention(a,++a,a++);
    return 0;
}
void  convention(int p,int q,int r)
{
    printf("%d %d %d",p,q,r);
}

Select one:

A. Error
B. None
C. 7 5 5
D. 7 7 5

The correct answer is: 7 7 5

8.#include<stdio.h>
void  main()
{    int a=15;   printf("%x", a);    getchar();  
}
Select one:
A. 15.0
B. 12
C. None of the above
D. f
E. c

The correct answer is: f

9.
What is the correct way to round off x, a float, to an int value?

Select one:
A. y=(int)(x+0.5)
B. y=(int)x+0.5
C. y=int(x+0.5)
D.  y=(int)(int)x+0.5)

The correct answer is: y=(int)(x+0.5)
10.
#include<stdio.h>
int main()
{
      int  i=10;
      printf("i=%d", i);
      {
            int  i=20;
                printf("i=%d", i);
                i++;
                printf("i=%d", i);
 }
      printf("i=%d", i);
      return 0;
}
Select one:
A. 10,10,20,21
B. None
C. Error
D. 10,20,21,10

The correct answer is:  10,20,21,10

June 06, 2019

HTML5 - Digital Skill (TrendNXT L1)


NoteKindly prepare yourself to score good marks in HTML5. This is for TrenDNXT level 1 dumps. There may be some questions which are not listed here. To make sure read the doc very carefully, because questions would be based in the doc itself.

One Line Definitions:

1. Doctype define <!DOCTYPE html>

The <canvas> tag is used to draw graphics, on the fly, via scripting (usually JavaScript). The <canvas> tag is only a container for graphics, you must use a script to actually draw the graphics.

2. New graphic elements: <svg> and <canvas>.

3. New form control attributes: number, date, time, calendar, and range.

4. Canvas  .getContext();

5. Currently, there are 3 supported video formats for the <video> element: MP4, WebM, and Ogg:

6. Currently, there are 3 supported file formats for the <audio> element: MP3, Wav, and Ogg:

7. <datalist> Defines pre-defined options for input controls

8.<keygen> Defines a key-pair generator field (for forms)

9. The <input type="month"> allows the user to select a month and year.

10. <input type="email"> is used for input fields that should contain an e-mail address.

11. <input type="tel"> is used for input fields that should contain a telephone number.

12.  The formaction attribute overrides the action attribute of the <form> element.

13. The formaction attribute is used with type="submit" and type="image".

14. The formenctype attribute overrides the enctype attribute of the <form> element.

15. The formenctype attribute is used with type="submit" and type="image".

16. The formenctype attribute specifies how the form-data should be encoded when submitting it to the server (only for forms with method="post").

17. The formmethod attribute overrides the method attribute of the <form> element.

18. The formmethod attribute can be used with type="submit" and type="image".

19. The formnovalidate attribute overrides the novalidate attribute of the <form> element.

20. The formnovalidate attribute can be used with type="submit".

21. default width of a text field is 20 characters.

22. The <input type="time"> allows the user to select a time (no time zone).

23. <input type="datetime-local"> allows the user to select a date and time (no time zone).

24. HTML5 added several new input types

  • color
  • datetime
  • datetime-local
  • email
  • month
  • number
  • range
  • search
  • tel
  • time
  • url
  • week
25. The <article> element specifies independent, self-contained content.

26. The <figcaption> element defines the caption.

May 07, 2019

SAP - BO(Business Object) Digital Skill (TrendNXT L1)

NoteKindly prepare yourself to score good marks in SAP BO. This is for TrenDNXT level 1 dumps.

1) SAP BO client run on 64 bit only
A. A.SAP BO server run on both 32 and 64 bit
B. B.SAP BO client/server both run on both 32& 64 bit

Ans: Bo server only 64 bit, client on both

2) How to synchronize the data from two different data sources
Ans: Merge Dimension.

3) APS run on
A. Oracle JVM
B. SAP JVM
C. none of the above

Ans: SAP JVM

4) Which is called as Canned report
A. Canned Report- Financial Analysis
B. other option

Ans: Canned reports are predefined reports.

5) Which is called as Crosstab report
Ans: standard report

6) Use of Derived table
Ans: For Complex calculation and functions
                      Or
 A derived table is defined by an SQL query at the universe level that can be used as a logical table in Designer.

7) Use of OpenDocument in webi
A. To open a document from start command line
B. To open two webi report
C. To save the sessions of the report
D. None of the above

Ans: For linking to Webi docs

8) Rank function is not used for the following
A. Retrieve TOP 10 list of customers
B. Retrieve BOTTOM 10 list of customers
C. Retrieve TOP 20% list of customers
D. none of the above

Ans: Retrieve top 20% list of customers.

9) Risk of overloading server, n/w, Client PC avoided by
A. SQL Aggregate
B. Projection Aggregate
C. Cumulative Aggregate
D. All of the above
Ans: SQL Aggregate.

10) which is true
A. Report filter is used to restricting data from data source
B. Query filter is used to restricting data from data source
C. Report filter and query filter is used to filter the data in the data source
D. none of the above

Ans: Query filter is used to restricting data from data source

11) Input, Output Server File Repository maintenance
A. Output Server File Repository maintain the target file instances
B. Input Server File Repository maintain the target file instances
C. Output Server File Repository maintain the target file instances and  input Server File Repository maintain the source files and reports
D. none of the above

Ans: 3rd option

12) which is not true
A. Input control can be applied to a specific section in a report
B. Input control cannot be applied to a specific section in a report
C. Input control can be applied to a column in a report
D. Input control can be applied as a filter

Ans: Input control cannot be applied to a specific section in in a report.

13) UDT can be used only when
A. Linked universe
B. Stored procedures as data source
C. Web Intelligence 3.x and Live office

Ans: All of the above

14) Folders in IDT in designer is
A. Classes
B. Objects
C. Measures
D. None of the above

Ans: Classes

15) Which can be used as an internal function without reusing the query
A. @select
B. @prompt
C. @where
D. none of the above

Ans: @select

16) Union of 2 queries can be done by
A. SET operator
B. Union clause
C. Combine

Ans: Combine query.

17) Extension Webi document
A. .wid
B. .rep
C. .xls

Ans: .wid

18) IDT can be done on
A. Local
B. shared
C. common
D. both local and shared

Ans: both local and shared.

19) Which is not true about connections

20) What is FAN TRAP?
A. Many to one join
B. one to many join
C. one to one
D. many to many

Ans: The Fan trap occurs when a “one to many” join links a table which is in turn linked by another “one to many” join. (ANS)

21) What is CHASM TRAP?
Ans: Chasm trap occurs when two “many to one” joins converge on a single table.

22) Following option is used synchronize data from two different data sources in webi
Ans: Merge data based on similar dimensions

23) which operation can be used to union of two queries
Ans: union

24) Difference b/w Break and section?

Break: is applied on whole block it gives you row at the bottom of block for subtotal. It breaks a whole report into the smaller groups according to your select column. When you apply a chart on this block it only gives you one chart because it is only single block.

Section: When you apply section on block it divides your report into smaller section and the column which you apply section will come out as a heading out of the block. When you apply chart on this block, every section have an individual chart for its own section.

25) Below tool is not a part of BO 4.0
A. Webi rich client
B. CMC
C. BI Launch pad
D. Desktop intelligence

Ans: remaining option

26) Difference between BO 3.1 & BO 4.0?
Ans:

27) ------------- option is used to eliminate usage SQL in business layer
Ans: Select, where

28) Business Layer query options, provides the facility to select multiple options, such as:
Ans: Query Limits:

a) Limit size of result set to __ rows.
b) Limit execution time to __ minutes
c) Warn if cast estimate exceeds __ minutes

Query Options:
a) Allow use of subqueries
b) Allow use of union, intersect and minus operations
c) Allow complex operands in query panel
d) Multiple SQL statements for each measure

29) UNX file consists of
A. connections
B. data foundation

Ans:all the above

30) What are differences between information design tool (IDT) and universe design tool (UDT)?
Ans:
  • IDT is the new tool introduced in BI 4. Concept is same as UDT, but presentation is different.
  • IDT (New Universe Designer in Business Objects) = combination of Business View Manager + Universe design tool + Data Federator
Differences:
  • IDT is the new tool introduced in BI 4. Concept is same as UDT, but presentation is different.
    • In IDT, they have Data foundation layer (instead of structure pane) and Business Layer (instead of Class n object pane). First of all, a project is created, then a relational or OLAP connection, then data foundation and then business layer. Then the universe is published as .unx
  • We have structure pane and class n object pane in UDT. 
    • UDT it is not possible.
  • They have introduced the concept of ‘views’ in Data Foundation Layer. If you have many tables to be used in the universe, it would be difficult to manage joins and structure. So you can create multiple windows.
    • For ex., one view or window would be related to client and all the related tables. Another window could be related to product and related tables, and another could be related to FACT and the main dimension tables. The master view would be the union of all these views.
  • In UDT, you can add a table any time and then can drag it to object pane to create objects automatically.
    • In IDT, automatic classes and objects are created only once when you create the Business Layer for the first time. After that, if you add any table, you have to create objects based on it manually.
  • Identifying loops and creating contexts is not as clean in IDT as in UDT.
31) What are differences between UNV & UNX?
Ans:

 UNV 
- Supported by Webi ONLY
- Single Data source
 UNX 
- Supported by Webi, Dashboard, Crystal Enterprise & Explorer
- Connect to multiple data sources within ONE UNX

32) 26. detail object...which of the following is true/false

33) why should we disable LOV's(List Of Values) for attribute
A. as users will rarely use it as selection attribute
B. cannot use it as attribute selection
C. Rarely will user use attribute as condition

Ans: don't know (but you can reject above options)

34) Adaptive Processing servers
Ans: It is used for refreshing a report

35) Operator is not a part of combined query in Web Intelligence 4.0 : Difference
36) Adaptive Job Server - To schedule a report
37) Scope of Analysis: Scope of Analysis determines the additional objects to be included in the query so that the data will be available in drill mode. Before you can drill, you must use Scope of Analysis to select the objects to be retrieved in addition to those that were placed in the Result Objects.

38) Calculation Mode of Rank Functions : Count, Percentage, Cumulative Sum, Cumulative Percentage.

39) What is the prompts order in BO 4.1?
a) As you defined   
b) Ascending to Descending 
c) You can test the order

40) Where are the servers created in BO 4.1?
a) CCM         
B) CMC
c) CMS
d) Both A & B

Ans: Both A & B

41) What is the use of Report Application Servers?
Ans: Viewing in DHTML mode by

42) What is the use of Connection Server?
a) Connect to DB
b) Connect to Wi-Fi 
c) To connect deski Webi 3-Tier

Ans: To connect deski Webi 3-Tier

43) Which Right …???…    Have the high priority?
a) Desired             b) granted     c) not specified

Ans: Desired

44) Where can we create LOV’s in Universe?
Ans: Universe object

45) Use of merged dimensions?
Ans: To merge data from two data providers.
46) Common Dimension Merging

47) Query Scripting  is  used for
Ans: Report Performance

48) Types of filters
Ans: Query filter- Report Filter

49) Where can we enable Query Scripting?
Ans: Query Properties, Report Properties

50) Webi, Deski Reports are running, what will happen when Universe connection is exporting.
Ans: Will not run

51) What is alias?
Ans: Use of a table    b)Use of a view
52) Which can be auto detected in a Universe?
a) Cardinality b) Joins c) All of the above.

Ans: All of the above.

53) Currently Universe is using a DB, if you want to connect to Sybase then what happens?
Ans:  Below could be a checklist for you:

1. Make sure all tables with all used columns (used in report) have been created in new database.
2. Referential Integrity is at place.
3. The database user used to create connection has same privileges which you had in old reporting database.
4. Once new reporting database is ready, refresh universe structure and check if there is any change?
5. You also need to make sure the syntax used in the universe is as per new reporting database. For example: If I am shifting my reporting database from Oracle to Teradata, I will have to replace nvl() function with coalease() function wherever I have used in object definitions.
6. Once done, run integrity check and check if all joins and columns are in place and everything is parsing correctly.
7. You also need to create indexes (if created in old database) as their absence can affect performance issue.
8. Once satisfied with the universe, save it and export to repository.
9. Open any of the associated report and refresh and check if any issues.

54) Which Window Server Management tool is used to move, add, etc?
a) CMC    b) CMS   c) CCM

Ans: CMS

55) What is the Max Context in Universe?
a) 65            b) 150    c) No Restriction          d) 25

Ans: No Restriction

56) Tool to convert BO Deski Reports to Webi Reports?
a) Import Wizard b) Report Conversion Tool c) Report Comparison Tool   d) Business Viewing Tool

Ans: Report Conversion Tool

57) The Input Controls used in WEBI Reports are?
58) What is the Internal Function used in WEBI report ………….?
a) @Select    b) @where    c) @prompt     d) none

59) How can we get the union of two queries?
a) By SET Operator b) By using Combine queries button   c) by using Union of queries d) none

Ans: by using Union of queries

60) Desired   object features?
61) True about Universe object:
a.Designer buids into universe
b.centralised
c.error proof
d. all

62. To limit size of result set to 50000 parameter is used
a.LIMIT
b.SQL
c.CONTROL
d.LINK

63.True about Detail object in BO
a. Detail object attached to dimensions
b. Cannot drill on details nor link on details when linking on multiple data sources.
c.both a&b
d. none

64. Conditions
a. are applied  on query to restrict data from datasource
b.  on report to hide data which is already retrieved from datasource
c. both a&b
d none

65. New SAP BO 4.0 is
a. Parameter & LOV are not connected by default when BO is created
b. Ability to divide one business layer into multiple views
c. One universe access multiple data sources.
d. all

66 what is true
A SAP BO server run on both 32 and 64 bit but SAP BO client run only on 64 bits
b. SAP BO client run on both 32 and 64 bit but SAP BO server run only on 64 bits
c. SAP BO client/server both run on both 32& 64 bit
D. None

Ans: Bo server only 64 bit, client on both

May 02, 2019

Cloud Computing - Mid Sem Solution

Note: We have tried solving the question paper in a very short time span as per our understanding and the study material we had. Feel free to contact us through comment box or through email if you have some descriptive answer.

Q1. Answer the following questions in brief                                   
A. What are the two ways by which public cloud helps the customers to reduce their IT costs?
Answer:
  1. Flexible billing models enable customers to pay only for what they use.
  2. It reduces the capital expenditures required for setting up the infrastructure.
 Practice Question - What are the components of a cloud computing environment?
 Answer: client, application, platform, infrastructure, server

B. What are the two limitations of SKI Virtualization?
Answer:
  1. It is not possible, for instance, to run different versions or even different patch levels of a particular operating system on the same machine. 
  2. Whatever versions exist in the host, that same software will be provided in the guest. SKI also sacrifices the security and reliability provided by other virtualization  methods. 
C. A company interested in cloud computing is looking for a service provider who offers a set of basic services such as virtual server provisioning and on-demand storage that can be combined into a platform for deploying and running customized applications. What type of cloud computing model fits these requirements?
Answer: Infrastructure as a Service.

D. How can a software development company leverage the PaaS cloud computing delivery model?
Answer:

Q2. Answer the following questions appropriately.
A. What is 3 - 4 - 5 rule of cloud computing?
Answer: This 3 - 4 - 5 rule stands for:

3 cloud service models
4 deployment models
5 essential characteristics of cloud computing infrastructure

RULE 3 - Cloud service models:
IaaS (Infrastructure as a Service):
The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.
The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls)

PaaS (Platform as a Service):
The capability provided to the consumer is to deploy onto the cloud infrastructure consumer created or acquired applications created using programming languages and tools supported by the provider.
The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations

SaaS(Software as a Service):
The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., webbased email).
The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings

RULE 4 - Deployment models:
Private Cloud (Single Org)
The cloud infrastructure is operated solely for a single organization. It may be managed by the
organization or a third party, and may exist on-premises or off-premises, Also called as “Enterprise Cloud”

Community Cloud (Multiple Org)
The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance considerations).
It may be managed by the organizations or a third party and may exist on-premises or off premises.

Public Cloud (For Public)
The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services, Also called as “Internet Cloud”

Hybrid Cloud
The cloud infrastructure is a composition of two or more clouds (private, community, or public)
Leasing public cloud services when private cloud capacity is insufficient, Also called as “Mixed Cloud”

RULE 5 - Characteristics:
On-demand self-service:
Users can provision servers and networks with little human intervention.

Broad network access:
Any computing capabilities are available over the network. Many different devices are allowed access through standardized mechanisms.

Resource pooling:
Multiple users can access clouds that serve other consumers according to demand.
Cloud services need to share resources between users and clients in order to reduce costs.

Elasticity:
Provisioning is rapid and scales out or in based on need.

Metered or measured service:
One of the compelling business use cases for cloud computing is the ability to "pay as you go“, where the consumer pays only for the resources that are actually used by his applications.

April 26, 2019

Software Architectures - MCQS


Note: We have tried uploading as much as we can, there may be 4 to 6 questions which you wouldn't find it here but surely we will upload it soon. So stay tuned. At last, Thanks to Pintu one of our pro-active user who helped in this a lot. 

Question
“Partitioning of data would benefit performance” belongs to
Select one:
a. All of the given choices
b. Resource Mgmt of performance
c. Co-ordination model of performance
d. Data Model of performance

The correct answer is: Data Model of performance

Question
Which of the following is not related to Resource Mgmt of Performance
Select one:
a. Maintaining multiple copies of key data would benefit performance
b. System elements that need to be aware of, and manage, time and other performance-critical resources
c. Process/thread models
d. Prioritization of resources

The correct answer is: Prioritization of resources

Question
Information hiding methods is one of the
Select one:
a. Availability tactic
b. Reliability tactic
c. Usability tactic
d. Modifiabilty tactic

The correct answer is: Modifiabilty tactic

Question
Utility tree is to represeting
Select one:
a. Architecturally significant requirement (ASR)
b. Functional requirement
c. Stakeholders requirement
d. Business requirement

The correct answer is: Architecturally significant requirement (ASR)

Question
Which requirements can affect binding time decisions out of the following mentioned?
Select one:
a. Configurations
b. Portability
c. Regional distinctions
d. All of the choices given

The correct answer is: All of the choices given

Question
One of the statements given below is not true with respect to stakeholders' priorities. Which one?
Select one:
Database Designer: Information security issues?
Users/Customers: How easy it is to use?
Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?
Application Development team: How do I plan for division of work?

The correct answer is: Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?

Question
Decomposition,Uses,Layered and class are keywords used in
Select one:
a. Module structure
b. Allocation structure
c. Structure of structure
d. Component and connector structure

The correct answer is: Module structure

Question
Identification of potential quality attributes from business goals is the measure step of
Select one:
a. ASR
b. QAW
c. PALM
d. Utility Tree

The correct answer is: PALM

Question
Methods to improve Usability include (Pick the wrong answer)
Select one:
a. Intuitive UI
b. Undo / redo feature
c. Displaying status
d. Asking user to enter name twice

The correct answer is: Asking user to enter name twice

Question
One of the statements given below is not true with respect to stakeholders' priorities. Which one?
Select one:
a. Database Designer: Information security issues?
b. Application Development team: How do I plan for division of work?
c. Users/Customers: How easy it is to use?
d. Release &amp; Configuration Manager: How do I replace of a subsystem with minimal impact ?

The correct answer is: Release &amp; Configuration Manager: How do I replace of a subsystem with minimal impact ?

Question
Architecture of software is based on?

Select one:
A. Requirements
B. Design
C. Design and requirements
D. neither Design nor requirements

The correct answer is: Requirements

Question
Architectural pattern that best fits online flight booking application is

Select one:
A. Distributed Architecture
B. Model View Controller Architecture
C. Layer Architecture
D. Service Oriented Architecture

The correct answer is: Model View Controller Architecture

Question
Which of the following represents a Hierarchical organization?

Select one:
Client-Server
Deployment
Layered Structure
Decomposition

The correct answer is: Layered Structure

Question
Example(s) of Interchangeable software components

Select one:
A. All of these
B. Commercial off-the-shelf components
C. publicly available apps
D. open source software

The correct answer is: All of these

Question
Ability to “continuously provide”  service without failure means

Select one:
Performance
Usability
Reliability
Availability

The correct answer is: Reliability

Question
Which of the following does not appear on a diagram describing the WIndows Architecture?

Select one:
User Mode
SQLite
Kernel Mode
DLLs

The correct answer is: SQLite

Question
Deployment, implementation and work assignmnet are the keywords used in
Select one:
a. Component and connector structure
b. Structure of structure
c. Module structure
d. Allocation structure

The correct answer is: Allocation structure

Question
How is the system to relate to non-software structures in its environment such as CPU
Select one:
a. Component and connector structure
b. Structure of structure
c. Module structure
d. Allocation structure

The correct answer is: Allocation structure

Question
Learnability feature of usability attribute provides
Select one:
a. User familiarity to the system
b. Confidence to the user
c. Minimizing the impact of error
d. Adopt user need

The correct answer is: User familiarity to the system



Question
Why is software architecture called vehicle for stakeholder communication?
Select one:
a. Architecture provides a common language in which different concerns can be expressed
b. Architecture is more of technical in nature and not meant for all stakeholders
c. Both a and b
d. Each stakeholder of a software system is concerned with different characteristics of the system affected by architecture

The correct answer is: Both a and b

Question
Which software structure of module structure is useful for "implementing systems on top of 'virtual machine' portability?
Select one:
a. Class
b. Layered
c. Uses
d. Decomposition

The correct answer is: Layered

Question
Record and Playback is a

Select one:
Strategy for one of the testabilty tactics
New feature in modern music web apps
Performance enhancing tactics
Methodology to ensure the security feature of the system

Question
QAW(Quality Attribute Workshop)  is focused on:

Select one:
Reference model level concerns
System level concerns
None of the above
Component level concerns

The correct answer is: System level concerns

Question
---------------- pattern facilitates accessing shared resources and services for large numbers of distributed distributed clients.

Select one:
A. Web server
B. Client server
C. Data server
D. Proxy server

The correct answer is: Client server

Question
How do developing organizations influence by architects?

Select one:
A. Long term business
B. All of the mentioned
C. Organization structure
D. Immediate business

The correct answer is: All of the mentioned

Question
----------------- pattern suggests a solution in which components interact with via announced messages or events.

Select one:
A. Newspaper
B. Bookkeeper
C. Librarian
D. Publish Subscribe

The correct answer is: Publish Subscribe

Question
------------- pattern set a system of “equal” distributed computational entities connected to each other via a common protocol to self organize and achieve high availability and implacability.

Select one:
A. Agents
B. ATM
C. Bots
D. P2P

The correct answer is: P2P

Question
What are the concerns raised for the scenario selection procedure?

Select one:
A. How would we know if the vendor representatives were being factual?
B. Both these
C. None
D. Does the locality of change necessarily yield higher cost?

The correct answer is: How would we know if the vendor representatives were being factual?

Question
The module B expects A to write the count of total transactions handled at a particular memory location. The dependency of B on A is of

Select one:
A. Data semantics dependency
B. Location dependency
C. Data type dependency
D. Sequence dependency

The correct answer is: Data semantics dependency

Question
Which of the following can be included under observable measure?

Select one:
A. How easy it is to integrate?
B. How well the systems during execution satisfy its behavioral requirements?
C. How easy it is to test and modify?
D. All of the mentioned

The correct answer is: How well the systems during execution satisfy its behavioral requirements?

Question
The important categorie(s) of architecture structure is / are

Select one:
A. All of these mentioned
B. Allocation
C. Component and Connector
D. Module

The correct answer is: All of these mentioned

Question
In ----------------- pattern interaction, persistent data is exchanged between multiple data accessors and at least one shared data store.

Select one:
A. Shared Data
B. NDF
C. DBMS
D. Shared Object

The correct answer is:  Shared Data

Question
What is the main goal for the choice of scenarios?

Select one:
A. They should reflect the important quality requirements
B. There be a sufficient number to reflect the views of all the stakeholders
C. Both mentioned
D. None mentioned

The correct answer is: There be a sufficient number to reflect the views of all the stakeholders

Question
Which of the following is not a performance tactic?

Select one:
A. Resource Demand
B. Resource Management
C. Resource Monitor
D. Resource Arbitration

The correct answer is: Resource Monitor

Question
There are several modules that calls a service provided by A. What is the implicit dependency on A?

Select one:
A. Quality of service provided by A
B. Semantics of the result generated by A
C. the fact that A shares the same memory location of these calling modules
D. The assumption that A exists when calling the service of A
The assumption that A exists when calling the service of A

The correct answer is: The assumption that A exists when calling the service of A

Question
An on-line tax-filing application uploads the form-16 document from the employer and it fills the tax return form of an employee once she logs into the system. The file-tax-return button submits the return form and also deducts additional tax amount from her registered credit card. From quality attribute perspective, this application improves

Select one:
A. interoperability
B. performance
C. usability
D. availability

The correct answer is: usability

Question
Architecture based process includes which of the following

Select one:
A. Creating the business case for the system
B. Analyzing or valuating the architecture
C. Understanding the requirements
D. All of these mentioned

The correct answer is: All of these mentioned

Question
Adding an intermediate component between two interacting modules in an application will improve:

Select one:
A. Security of the System
B. Reliability of the System
C. Availability of the System
D. Modifiability of the System

The correct answer is: Modifiability of the System

Question
What is architectural style?

Select one:
A. Architectural style is a description of component types
B. It is a pattern of run-time control
C. All of these mentioned
D. It is set of constraints on architecture

The correct answer is: All of these mentioned

Question
What would happen if different organization were given same set of requirements?

Select one:
A. It will produce same architecture
B. It may or may not produce same architecture
C. None of the mentioned
D. It will produce different architecture

The correct answer is: None of the mentioned

Question
Availability ensures

Select one:
A. Attainment of reliability
B. All of these mentioned
C. Availability ensures
D. Minimize service outage time by fault reduction

The correct answer is: All of these mentioned

Question
------------- pattern splits system into a number of computationally independent execution structures to achieve optimized usage of resources.

Select one:
A. Layers
B. Multi tier
C. Agent
D. Broker

The correct answer is: Multi tier

Question
In a GUI application, when a user presses a button an action event is generated. What is action event in a general quality scenario?

Select one:
A. Artifact
B. Stimulus
C. Response
D. Source

The correct answer is: Stimulus

Question
------------------ pattern is a tactic to achieve highly efficient processing of enormous volumes of data at petabyte scale.

Select one:
A. Map Reduce
B. Supercomputer
C. Shift Reduce
D. Goggle

The correct answer is: Map Reduce

Question
------------------------ is a tactic to achieve Security.

Select one:
A. Maintain Audit Trail
B. License Key
C. Discover
D. copyright

The correct answer is: Maintain Audit Trail

Question
There is a monitor that records the status of the system during runtime. This is an example of

Select one:
A. Modifiability of the System
B. Availability of the System
C. Security of the System
D. Reliability of the System

The correct answer is: Security of the System

Question
--------------- pattern helps to achieve separation of concerns such that modules of system may be independently developed and maintained.

Select one:
A. SOA
B. Microkernel
C. Layered
D. MVC

The correct answer is: Layered

Question
The architects are influenced by which of the following factors?

Select one:
A. Background and experience of the architects
B. Customers and end users
C. Developing organization
D. All of these mentioned Correct

The correct answer is: All of these mentioned

Question
-------------- pattern describes a collection of distributed components that provide and/or consume the services.

Select one:
A. SOA
B. Client server
C. P2P
D. Broker

The correct answer is: SOA

Question
Source of stimulus can be

Select one:
A. Any actuator
B. Stimulus
C. None of these mentioned
D. Environment

The correct answer is: Any actuator

Question
----------------- pattern is characterized by successive transformation of streams of data using generic, loosely coupled components.

Select one:
A. Blackboard
B. Pipes and filters
C. Classroom
D. Abstraction

The correct answer is: Pipes and filters

Question
Which of the following is the main goal for the choice of scenarios?

Select one:
A. They should reflect the important quality requirements
B. Both
C. None of these
D. There be a sufficient number to reflect the views of all the stakeholders

The correct answer is: Both

Question
The incorrect method for structural design is?

Select one:
A. More procedural approach
B. Handling of larger and more complex products
C. Transition of problem models to solution models
D. Designing Object oriented systems

The correct answer is: Handling of larger and more complex products

Question
The proto scenarios recorded on flip charts as phrases as which of the following?

Select one:
A. WWW client access
B. Double number of user
C. All of these mentioned
D. Degraded Operation

The correct answer is: All of these mentioned

Question
Denial of Service attack affects the __________ of the system.

Select one:
A. All of these
B. Usability
C. Availability
D. Security

The correct answer is: Availability

Question
Tactics which ensures interoperability includes

Select one:
A. Orchestrate and Tailor interface
B. Both of these
C. None of these
D. Discover service and Tailor interface

The correct answer is: Both of these

Question
To capture data store and access to data from the store by various components you use

Select one:
A. Module dependency structure
B. component and hardware dependency
C. component connector structure
D. work-allocation of modules

The correct answer is: component connector structure

Question
--------------- pattern defines a runtime component that mediates the communication between a number of clients and servers.

Select one:
A. Proxy
B. Middleware
C. Broker
D. Load balancer

The correct answer is: Broker

Question
---------------- pattern separates out presentation from functionality of the system.

Select one:
A. Maps
B. UI/UX
C. MVC
D. Controller

The correct answer is: MVC

Question
Authorizing the user is a __________

Select one:
A. Usability tactic
B. Security tactic
C. Availability tactic
D. Performance tactic

The correct answer is: Security tactic

Question
Which of the following is the incorrect sequence Summary Steps for scenario selection process?

Select one:
A. Method presentation
B. Refinement and selection
C. Participant buy-in and expression of concerns and issues
D. All of these mentioned

The correct answer is: Participant buy-in and expression of concerns and issues

Question
Which among the following are true with regards to the architecture business cycle?

Select one:
A. All of these mentioned
B. None of these mentioned
C. The architecture affects the structure of developing organizations
D. The architecture can affect the enterprise goals of the developing organizations

The correct answer is: The architecture affects the structure of developing organizations