Yahoo's C # pen test (the latter part is the second half) _c# tutorial

Source: Internet
Author: User
Tags data structures modifier socket mail account port number
Including question and answer questions and the choice of two parts, 第1-30 problem should not be counted in C # category. It should be considered as a network programmer after the written 31 questions,. Try, how many questions can you answer, could you pass Yahoo's exam?

Question 1. (radio)

In computer network, the index of data transmission reliability is

1. Transmission rate
2. ber
3. Information capacity
4. Frequency band Utilization

Question 2. (radio)

Which of the following statements about a chained storage structure is incorrect?

1. Nodes include pointer fields in addition to their own information, so storage density is less than sequential storage structure
2. Logically adjacent nodes are not physically contiguous
3. Can be calculated directly to determine the first node of the storage address
4. Inserts, deletes the operation to operate conveniently, does not have to move the knot point

Question 3. (radio)

Which of the following is not a basic operation of the stack

1. Delete Stack top element
2. Delete Stack bottom elements
3. Determine whether the stack is empty
4. Put the stack as an empty stack

Question 4. (radio)

The following statement about the generalized table, the correct one is

1. A generalized table is a finite sequence consisting of 0 or more single elements or a child table.
2. A generalized table has at least one element that is a child table
3. The generalized table can not be its own child table
4. The generalized table cannot be empty table

Question 5. (radio)

If the ordinal sequence of a binary tree node is a, B, C, and the sequence is C, B and A, then the symmetric sequence of the two-fork tree node

1. Must be a, B, C
2. Must be a, C, B
3. Must be B, C, A
4. Not sure

Question 6. (radio)

In the virtual-page storage management scenario, which part of the following completes the process of paging the page into memory?

1. Page Break processing
2. Page elimination process
3. Working Set model application
4. Tightening technology use

Question 7. (radio)

In DOS systems, data structures used to record and manage the use of disk data areas

1. Bit chart
2. Free Block table
3. File Allocation table
4. File control block

Question 8. (radio)

A relationship R (S,d,m) is provided with a function dependency set f={s→d,d→m}. The relationship R is at most satisfied

1.1NF
2.2NF
3.3NF
4. BCNF

Question 9. (radio)

In database logic design, when the E-R diagram is converted into relational mode, which one of the following is incorrect?

1. An entity type is converted to a relational pattern
2. A contact type is converted to a relational pattern
3. The primary key of the relational schema converted by the entity type is the primary key of the entity type
4. The properties of the relational schema converted by the contact type are all of the attributes of the entity types associated with the contact type.

Question 10. (radio)

The computer network is classified according to the geographical range covered, and can be divided into wide area network, LAN and

1. TCP/IP network
2. ATM Network
3. ISDN
4. Metropolitan Area Network

Question 11. (radio)

The topological structure of computer network mainly depends on its

1. Resource Subnet
2. FDDI Network
3. Communication subnet
4. Router

Question 12. (radio)

The three elements of network protocol are syntax, semantics and

1. Working principle
2. Timing
3. The process
4. Service Primitives

Question 13. (radio)

In the TCP/IP reference model, the e-mail protocol SMTP relies on the transport layer's

1. UDP protocol
2. IP protocol
3. TCP protocol
4.802.2 protocol

Question 14. (radio)

10base-t Standard in the IEEE802.2 protocol the maximum distance from the NIC to the hub when using the 5-type twisted pair is

1.100m
2.185m
3.300m
4.500m

Question 15. (radio)

The similarities between 100Mbps Fast Ethernet and 10Mbps Ethernet work are mainly

1. Media access Control method
2. Physical layer Protocol
3. Network layer
4. Send Clock cycle

Question 16. (radio)

In the Client/server computing model, the role of middleware middleware is to isolate applications and

1. Structured Query Language SQL
2. Application process
3. The network
4. IP Address

Question 17. (radio)

When a user requests an Internet account from an ISP, the user's e-mail account should include

1. IP Address
2. WWW address
3. User password (Password)
4. Username (user name) and user password (Password)

Question 18. (radio)

Location information in the hyperlinks in www is used

1. Hypertext (hypertext) technology
2. Uniform Resource Locator (URL, uniform Resource Locators)
3. Hypermedia (Hypermedia Technology)
4. Hypertext Markup Language HTML

Question 19. (radio)

The difference between computer network system and distributed system is mainly

1. System Physical Structure
2. System High-level software
3. Transmission Media Type
4. Server type

Question 20. (radio)

The main goal of Frame Relay system design is to interconnect multiple

1. Wide Area Network
2. Telephone network
3. Local Area Network
4.0) Atim Net

Question 21. (radio)

The ATM network adopts the data of fixed long mansion, and the length of the signal is

1.1024B
2.53B
3.128B
4.64B

Question 22. (radio)

Hosts in the TCP/IP Reference Model-the network layer corresponds to the

1. Network layer
2. Physical Layer
3. Data Link Layer
4. Physical layer and Data link layer

Question 23. (radio)

The most prominent advantages of computer networks are:

1. High computational Accuracy
2. Large Memory capacity
3. Fast operation speed
4. Networking computers can share resources with each other

Question 24. (radio)

The computer network divides into the local area network, the metropolitan area net and the WAN, its classification basis is:

1. Media used for data transmission
2. Range of functions of the network
3. Control mode of the network
4. Topological structure of the network

Question 25. (radio)

In order to find a linear table with a length of 10 and a row, how many times does it need to be compared when looking for unsuccessful?

1.5
2.2
3.4
4.1

Question 26. (radio)

The higher the degree of cohesion in the module, the more the components of the module are combined with each other.

1. Loose
2. Close
3. Inability to judge
4. The same

Question 27. (radio)

The output of software requirements analysis phase is mainly

1. Demand specification
2. Development plan
3. Feasibility report
4. Design Manual

Question 28. (radio)

The following options are not the responsibility of the project manager?

1. Demand Analysis
2. The plan
3. Planning and Tracking
4. Quality Management

Question 29. (radio)

When is the unit test usually performed?

1. After the completion of the code
2. Before system test
3. After the test case writing is completed
4. After integration test

Question 30. (Multiple selection)

What is the role of configuration management as follows?

1. Version Management
2. Change Management
3. Demand management
4. Test Management

Question 31. (radio)

Based on the knowledge of thread safety, the following code is analyzed to see if i>10 will cause deadlocks when the test method is called?

public void Test (int i)
{
Lock (This)
{
if (i>10)
{
i--;
Test (i);
}
}
}

1. Will lock the dead
2. Will not lock the dead

Question 32. (radio)

The following description of the error is ()

1. Supports abstract classes in C + + and does not support abstract classes in C #.
2. C + + can declare a member of a class in a header file and define a member of a class in a CPP file, there is no header file in C # and a member of the class is declared and defined at the same place.
3. In C #, you can use the new modifier modifier explicitly to hide the members inherited from the base class.
4. A virtual function in C # to redefine a base class in a derived class must be preceded by a override.

Question 33. (radio)

Int[][] myarray3=new int[3][]{new int[3]{5,6,2},new int[5]{6,9,7,8,3},new int[2]{3,2}}; The value of myarray3[2][2] is ().

1.9
2.2
3.6
4. Cross-border

Question 34. (radio)

The general step in using sockets for network communication Programming in C # is to establish the socket listening, (), and to receive and send data using the socket.

1. Establish socket connection
2. Get the port number;
3. Obtain IP address;
4. Obtain the host name;

Question 35. (radio)

If you set Treeview1=new TreeView (), TreeNode node=new TreeNode ("root node"), TREEVIEW1.NODES.ADD (node) Returns a value of type ().

1. TreeNode;
2. int;
3. String;
4. TreeView;

Question 36. (radio)

Declares a delegate public delegate int mycallback (int x); The prototype of the callback method that is generated with the delegate should be

1. void mycallback (int x)
2. int receive (int num)
3. String receive (int x)
4. The uncertain

Question 37. (radio)

A description of the code-behind file in asp.net is correct

1. The logic of a Web Forms page's program is composed of code that is created to interact with the form. The programming logic is unique to a file that is different from the user interface. The file is said to be a "code-behind" file, and if created in C #, the file
2. The code-behind files for all Web Forms pages in the project are compiled into. exe files
3. The code-behind files for all Web Forms pages in the project are compiled into a project dynamic link library (. dll) file
4. None of the above is correct

Question 38. (radio)

What compiler switch creates an XML file to the XML comments in the "a assembly?

1./text
2./doc
3./xml
4./help

Question 39. (radio)

The following code implements what pattern is in design mode

public class A {
Private A instance;
Private A () {
}

public static A Instance {
Get
{
if (A = = null)
A = new A ();
return instance;
}
}
}

1. Factory
2. Abstract Factory
3. Singleton
4. Builder

Question 40. (radio)

Class Class1
{
public static int Count = 0;
Static Class1 ()
{
count++;
}
Public Class1 ()
{
count++;
}
}
Class1 O1 = new Class1 ();
Class1 O2 = new Class1 ();

What's the value of the Class1.count, please? ( )

1.1
2.2
3.3
4.4

Question 41. (radio)

Abstract class BaseClass
{
public virtual void MethodA ()
{
Console.WriteLine ("BaseClass");
}
public virtual void MethodB ()
{
}
}
Class Class1:baseclass
{
public void MethodA ()
{
Console.WriteLine ("Class1");
}
public override void MethodB ()
{
}
}
Class Class2:class1
{
New public void MethodB ()
{
}
}
Class MainClass
{
public static void Main (string[] args)
{
Class2 o = new Class2 ();
O.methoda ();
}
}

May I ask, this program output result is:

1. BaseClass
2. Bassclass Class1
3. Class1
4. Class1 Bassclass

Question 42. (radio)

public static void Main (string[] args)
{
int i = 2000;
Object o = i;
i = 2001;
int j = (int) o;
Console.WriteLine ("I={0},o={1}, J={2}", i,o,j);
}

1. i=2001,o=2000,j=2000
2. i=2001,o=2001,,j=2001
3. i=2000,o=2001,,j=2000
4. i=2001,o=2000,j=2001

Question 43. (Multiple selection)

You are creating a asp.net application to run a Web site within the Allwin company that contains 50 pages. You want to configure the application so that it can display a custom error page to the user when an HTTP code error occurs. You want to spend the smallest amount of time accomplishing these goals, what should you do? (Multiple selection)

1. Create a Application_Error procedure in the Global.asax file of this application to handle asp.net code errors.
2. Create a applicationerror section in the Web.config file of this application to handle asp.net code errors.
3. Create a customerrors event in the Global.asax file of this application to handle HTTP errors.
4. Create a customerrors section in the Web.config file of this application to handle HTTP errors.

Question 44. (radio)

The results of the following programs are:

Public abstract class A
{
Public A ()
{
Console.WriteLine (' A ');
}
public virtual void Fun ()
{
Console.WriteLine ("A.fun ()");
}
}

public class B:a
{
Public B ()
{
Console.WriteLine (' B ');
}

Public new void Fun ()
{
Console.WriteLine ("B.fun ()");
}

public static void Main ()
{
A A = new B ();
A.fun ();
}
}

1. A B A.fun ()
2. A B B.fun ()
3. B A A.fun ()
4. B A B.fun ()

Question 45. (radio)

Which of these string definitions'll prevent escaping on backslashes in c#?*

1. String s = # "n Test string";
2. String s = "' n Test string";
3. String s = @ "n Test string";
4. String s = "n Test string";

Question 46. (radio)

Which of the following operations can you/not perform on a ado.net DataSet?

1. A DataSet can is synchronised with a RecordSet.
2. A DataSet can is synchronised with the database.
3. A DataSet can is converted to XML.
4. Can infer the schema from a DataSet

Question 47. (radio)

In Object oriented programming, how would do you describe encapsulation?

1. The conversion of one type of object to another.
2. The runtime resolution of method calls.
3. The exposition of data.
4. The separation of interface and implementation.

Question 48. (radio)

How do does assembly versioning in. NET prevent DLL Hell?

1. The runtime checks to the "only one version of" A assembly is on the machine in any one time.
2.. NET allows assemblies to specify the name and the version of any assemblies they to run.
3. The compiler offers compile time checking for backward compatibility.
4. It doesn ' t.

Question 49. (radio)

Three commonly used string-null method:

1:bool IsEmpty = (str. Length = = 0);
2:bool IsEmpty = (str = = String.Empty);
3:bool IsEmpty = (str = "");

Which is the quickest way?

1.1
2.2
3.3

Question 50. (radio)

public sealed class SampleSingleton1
{
private int m_counter = 0;
Private SampleSingleton1 ()
{
Console.WriteLine ("" Initializes SampleSingleton1. "");
}

public static readonly SampleSingleton1 Singleton = new SampleSingleton1 ();

public void Counter ()
{
M_counter + +;
}
}

Which of the above code implements the pattern in design mode?

1. Prototype
2. Abstract Factory
3. Single key
4. Generator
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.