Yahoo company C # pen question, how much can you answer?

Source: Internet
Author: User
Tags mail account
Yahoo company C # pen questions, including Q & A and multiple choice questions. Give it a try. How many questions can you answer? Can you pass the Yahoo test?

  Question 1. (single choice)

In computer networks, the indicators that characterize the reliability of data transmission are

1. Transfer Rate

2. Error Rate

3. Information Capacity

4. bandwidth utilization

  Question 2. (single choice)

Which of the following statements about the chain storage structure is incorrect?

1. Besides its own information, the node also includes pointer fields. Therefore, the storage density is less than the sequential storage structure.

2. Logically adjacent nodes do not need to be adjacent physically

3. You can determine the storage address of the I-th node through computation.

4. Easy operation of insert and delete operations without moving nodes

  Question 3. (single choice)

Which of the following is NOT the basic operation of the stack?

1. Delete the top element of the stack.

2. Delete the elements at the bottom of the stack.

3. Check whether the stack is empty.

4. Empty Stack

  Question 4. (single choice)

Which of the following statements about generalized tables is true?

1. A generalized table is a finite sequence composed of 0 or more single elements or sub-tables.

2. At least one element of a generalized table is a sub-table.

3. Generalized tables cannot be their own subtables.

4. The generalized table cannot be empty.

  Question 5. (single choice)

If the first sequence of a binary tree node is A, B, C, and then C, B, And A, then the symmetric sequence of the Binary Tree node is

1. It must be A, B, and C.

2. It must be a, c, and B.

3. B, c, and

4. uncertain

  Question 6. (single choice)

In the virtual page-based storage management solution, which part of the following completes page transfer to memory?

1. Handling of page missing interruptions

2. Page elimination process

3. Work set model application

4. Tightening Technology Utilization

  Question 7. (single choice)

The data structure used in the DOS system to record and manage disk data zone usage

1. Bit chart

2. Idle block table

3. File Allocation Table

4. File Control Block

  Question 8. (single choice)

There is a link R (S, D, m), and its function dependency set f = {S → D, D → m }. Then the relational R satisfies at most

1. 1nf

2. 2nf

3. 3nf

4. bcnf

  Question 9. (single choice)

Which of the following is incorrect when a E-R diagram is converted to a relational pattern in a logical database design?

1. convert an object type to a relational mode

2. convert a contact type to a link mode.

3. The primary key of the relational mode converted from the object type is the primary key of the object type.

4. The properties of the link mode converted from the contact type are all the attributes of various object types related to the contact type.

  Question 10. (single choice)

Computer Networks are classified according to the geographical coverage, which can be divided into wide area networks, local area networks, and

1. TCP/IP network

2. ATM Network

3. ISDN

4. Man

  Question 11. (single choice)

The computer network topology mainly depends on its

1. Resource Subnet

2. FDDI network

3. Communication Subnet

4. vro

  Question 12. (single choice)

The three elements of network protocols are syntax, semantics, and

1. Working Principle

2. Timing

3. Process

4. Service primitives

  Question 13. (single choice)

In the TCP/IP reference model, the email protocol SMTP depends on the transport layer

1. UDP protocol

2. IP protocol

3. TCP protocol

4. 802.2 Protocol

  Question 14. (single choice)

The 10base-t standard in IEEE 802.2 Protocol specifies that the maximum distance from the NIC to the hub is 1. 100 m when Category 5 twisted pair wires are used.

2. 185 m

3. 300 m

4. 500 m

  Question 15. (single choice)

The working principles of 100 Mbps Fast Ethernet and 10 Mbps Ethernet are similar in that

1. Media Access Control Method

2. Physical Layer Protocol

3. Network Layer

4. Sending clock cycle

  Question 16. (single choice)

In the client/server computing mode, middleware isolates applications from

1. Structured Query Language SQL

2. Application Process

3. Network

4. IP Address

  Question 17. (single choice)

When a user applies for an Internet account from the ISP, the user's e-mail account should include

1. IP Address

2. www address

3. User Password)

4. user name and password)

  Question 18. (single choice)

Which of the following statements is used to locate the location of the information in the WWW hyperlink?

1. Hyper Text Technology

2. Uniform Resource Locator (URL, Uniform Resource Locators)

3. hypermedia)

4. html

  Question 19. (single choice)

The main difference between a computer network system and a distributed system is

1. Physical System Structure

2. system high-level software

3. transmission media type

4. Server Type

  Question 20. (single choice)

The main purpose of the frame relay system design is to interconnect multiple

1. Wan

2. Telephone Network

3. Lan

4. 0) ATIM Network

  Question 21. (single choice)

The ATM network transmits data using fixed chunks. The cell length is

1. 1024b

2. 53B

3. 128b

4. 64b

  Question 22. (single choice)The host-network layer in the TCP/IP reference model corresponds to

1. Network Layer

2. Physical Layer

3. Data Link Layer

4. Physical Layer and data link layer

Question 23. (single choice)

The most prominent advantages of computer networks are:

1. High computing accuracy

2. Large Memory Capacity

3. fast operation

4. connected computers can share resources with each other

Question 24. (single choice)

Computer Networks are divided into LAN, man and WAN based on:

1. Media used for data transmission

2. Network Scope

3. Network Control Mode

4. Network Topology

Question 25. (single choice)

Returns the number of times a linear table with a 10-length sorted order cannot be searched?

1. 5

2. 2

3. 4

4. 1

Question 26. (single choice)

The higher the module cohesion, the more components in the module are combined.

1. Loose

2. closeness

3. Unable to judge

4. Same

Question 27. (single choice)

The output in the software requirement analysis stage is mainly

1. Requirement Specification

2. Development Plan

3. Feasibility Report

4. Design Specification

Question 28. (single choice)

Which of the following options is not the responsibility of the Project Manager?

1. Requirement Analysis

2. Plan

3. Plan tracking

4. Quality Management

Question 29. (single choice)

When is unit testing generally performed?

1. After encoding is complete

2. Before the system test

3. After the test case is compiled

4. After Integration Testing

Question 30. (multiple options)

What are the functions of Configuration Management?

1. Version Management

2. Change management

3. Demand Management

4. Test Management

  Question 31. (single choice)

Based on the knowledge of thread security, analyze the following code. Will a deadlock occur when I> 10 is used to call the test method?

Public void test (int I)

{

Lock (this)

{

If (I> 10)

{

I --;

Test (I );

}

}

}

1. will be locked

2. Will not be locked

  Question 32. (single choice)

Which of the following statements is false ()

1. abstract classes are supported in C ++ but not in C.

2. In C ++, class members can be declared in header files and class members can be defined in CPP files. in C #, there is no header file and class members can be declared and defined at the same place.

3. in C #, you can use the new modifier to explicitly hide the members inherited from the base class.

4. in C #, override must be added before the virtual functions of the base class to be redefined in the derived class.

  Question 33. (single choice)

Int [] [] myarray3 = new int [3] [] {New int [3] {5, 6, 2}, new int [5] {6, 9, 7, 8, 3 }, new int [2] {3, 2 }}; the value of myarray3 [2] [2] is ().

1. 9

2. 2

3.6

4. Crossing the border

  Question 34. (single choice)

The general steps for network communication programming using socket in C # are: Establish socket listening, (), and use socket to receive and send data.

1. Establish a socket connection

2. Obtain the port number;

3. Obtain the IP address;

4. Obtain the host name;

  Question 35. (single choice)

If treeview1 = new Treeview () and treenode node = new treenode ("Root Node") are set, treeview1.nodes. Add (node) returns a value of the () type.

1. treenode;

2. Int;

3. String;

4. Treeview;

  Question 36. (single choice)

Declare a delegate Public Delegate int mycallback (int x); then the prototype of the callback method generated by the delegate should be

1. Void mycallback (int x)

2. Int receive (INT num)

3. String receive (int x)

4. uncertain

  Question 37. (single choice)

Which of the following statements about the hidden code files in ASP. NET is true?

1. The program logic of the web form page consists of Code. The Code is created to interact with the form. The programming logic is unique in a file that is different from the user interface. This file is called a "code hidden" file. If it is created in C #,

2. The code hidden files of all web forms pages in the project are compiled into. EXE files.

3. The code hidden files of all web forms pages in the project are compiled into the dynamic link library (. dll) file of the project.

4. None of the above are correct.

  Question 38. (single choice)

What compiler switch creates an XML file from the XML comments in the files in an assembly?

1./Text

2./doc

3./XML

4./help

  Question 39. (single choice)

The following code implements the mode in the design mode.

Public Class {

Private a instance;

Private (){

}

Public static a instance {

Get

{

If (A = NULL)

A = new ();

Return instance;

}

}

}

1. Factory

2. Abstract Factory

3. Singleton

4. Builder

  Question 40. (single choice)

Class class1

{

Public static int COUNT = 0;

Static class1 ()

{

Count ++;

}

Public class1 ()

{

Count ++;

}

}

Class1 O1 = new class1 ();

Class1 O2 = new class1 ();

What is the value of class1.count? ()

1. 1

2. 2

3. 3

4. 4Question 41. (single choice)

Abstract class baseclass

{

Public Virtual void methoda ()

{

Console. writeline ("baseclass ");

}

Public Virtual void methodb ()

{

}

}

Class class1: baseclass

{

Public void methoda ()

{

Console. writeline ("class1 ");

}

Public override void methodb ()

{

}

}

Class class2: class1

{

New public void methodb ()

{

}

}

Class mainclass

{

Public static void main (string [] ARGs)

{

Class2 o = new class2 ();

O. methoda ();

}

}

The output result of this program is:

1. baseclass

2. bassclass class1

3. class1

4. class1 bassclass

  Question 42. (single choice)

Public static void main (string [] ARGs)

{

Int I = 2000;

Object o = I;

I = 2001;

Int J = (INT) O;

Console. writeline ("I = {0}, O = {1}, j = {2}", I, O, J );

}

1. I = 2001, O = 2000, j = 2000

2. I = 2001, O = 2001, j = 2001

3. I = 2000, O = 2001, j = 2000

4. I = 2001, O = 2000, j = 2001

  Question 43. (multiple choice)

You need to create an ASP. NET application to run the internal web site of allwin, which contains 50 pages. You want to configure this application so that when an HTTP code error occurs, it can display a custom error page to the user. What do you do if you want to accomplish these goals at the minimum cost? (Multiple options)

1. Create an application_error process in the global. asax file of the application to handle ASP. NET code errors.

2. Create an applicationerror section in the web. config file of the application to handle ASP. NET code errors.

3. Create a customerrors event in the global. asax file of the application to handle HTTP errors.

4. Create a mermerrors section in the web. config file of the application to handle HTTP errors.

  Question 44. (single choice)

The running result of the following program is:

Public abstract class

{

Public ()

{

Console. writeline ('A ');

}

Public Virtual void fun ()

{

Console. writeline ("A. Fun ()");

}

}

Public Class B:

{

Public B ()

{

Console. writeline ('B ');

}

Public new void fun ()

{

Console. writeline ("B. Fun ()");

}

Public static void main ()

{

A A = new B ();

A. Fun ();

}

}

1. a B A. Fun ()

2. a B. Fun ()

3. B A. Fun ()

4. B a B. Fun ()

  Question 45. (single choice)

Which of these string definitions will prevent escaping on backslashes in C #? *

1. String S = # "N test string ";

2. String S = "'n' test string ";

3. String S = @ "n test string ";

4. String S = "n test string ";

  Question 46. (single choice)

Which of the following operations can you not perform on An ADO. Net dataset?

1. a dataset can be synchronised with A recordset.

2. a dataset can be synchronised with the database.

3. a dataset can be converted to XML.

4. You can infer the schema from a dataset

  Question 47. (single choice)

In Object Oriented Programming, how wocould you describe encapsulation?

1. The conversion of one type of object to another.

2. The runtime resolution of method CILS.

3. the exposition of data.

4. The separation of interface and implementation.

  Question 48. (single choice)

How does Assembly versioning in. Net prevent DLL hell?

1. The runtime checks to see that only one version of an assembly is on the machine at any one time.

2.. Net allows assemblies to specify the name and the version of any assemblies they need to run.

3. the compiler offers compile time checking for backward compatibility.

4. It doesn' t.

  Question 49. (single choice)

Three common methods for determining null strings:

1: bool isempty = (Str. Length = 0 );

2: bool isempty = (STR = string. Empty );

3: bool isempty = (STR = "");

Which method is the fastest?

1. 1

2. 2

3. 3

  Question 50. (single choice)

Public sealed class samplesingleton1

{

Private int m_counter = 0;

Private samplesingleton1 ()

{

Console. writeline ("" initialize samplesingleton1. "");

}

Public static readonly samplesingleton1 Singleton = new samplesingleton1 ();

Public void counter ()

{

M_counter ++;

}

}

The above code implements which mode is used in the design mode?

1. Prototype

2. Abstract Factory

3. Single Key

4. Generator

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.