Software Architect Questions


Q:

What is the difference between _construct() and _destruct() methods in php?

Answer

These two methods are bulid-in methods  in php. with  construct() we can overwride the parent class method. The inverse of the __construct() PHP capacity while making another class, is the __destruct() technique. The __destruct() technique will consequently keep running, after you've completed with the PHP class.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP
Job Role: Software Architect

1 3317
Q:

Digitized information can be used by computers.

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:

TRUE. The computers and electronic devices use digitized information which is easily understood by them.


 


Digitization is the process of converting analog signals or information of any form into a digital format that can be understood by computer systems or electronic devices. The term is used when converting information, like text, images or voices, and sounds, into binary code.

Report Error

View Answer Workspace Report Error Discuss

6 3283
Q:

Which among the following is used to send data from one page to another with the URL but you can send limited size of data with the URL

A) Cookies B) View state
C) Querystring D) None
 
Answer & Explanation Answer: C) Querystring

Explanation:

Querystring is used to send data from one page to another with URL.But it can store only some minimum amount of data.Most browsers allow a limit of 255 characters on URL length

Report Error

View Answer Report Error Discuss

Filed Under: .NET
Job Role: Software Architect

0 3265
Q:

Difference between Candidate key and Primary key?

Answer

Candidate Key – A Candidate Key can be any column or a combination of columns that can qualify as unique key in database. There can be multiple Candidate Keys in one table. Each Candidate Key can qualify as Primary Key. 


Primary Key – A Primary Key is a column or a combination of columns that uniquely identify a record. Only one Candidate Key can be Primary Key.






        • One needs to be very careful in selecting the Primary Key as an incorrect selection can adversely impact the database architect and future normalization. For a Candidate Key to qualify as a Primary Key, it should be Non-NULL and unique in any domain.




Report Error

View answer Workspace Report Error Discuss

6 3262
Q:

Which among the following command is used to implement view state

A) _VIEWSTATE B) VIEW_STATE
C) VIEWSTATE_ D) None
 
Answer & Explanation Answer: A) _VIEWSTATE

Explanation:

_VIEWSTATE is the command used to implement view state

Report Error

View Answer Report Error Discuss

Filed Under: .NET
Job Role: Software Architect

0 3230
Q:

Configuration management is not concerned with

A) maintaining versions of software B) controlling documentation changes
C) controlling changes to the source code D) choice of hardware configuration for an application
 
Answer & Explanation Answer: D) choice of hardware configuration for an application

Explanation:

Configuration management is not concerned with the choice of the hardware configuration for an application.

 

Configuration management is concerned with the development of procedures and standards for cost-effective managing and controlling charges in an evolving s/w system.

It includes

1)software versions maintenance

2)controlling changes in documentation

3)controlling changes to the source code

4) management activities

Report Error

View Answer Report Error Discuss

1 3096
Q:

Which Word Does Not Belong with the Others

A) VDU B) Speakers
C) Plotter D) Joystick
 
Answer & Explanation Answer: D) Joystick

Explanation:

Here Joystick is the word doesn't belong with the others.

Because Except Joystick all others are Output Devices whereas Joystick is Input Device.

VDU - Visual Display Unit - Monitor to display

Speakers - Output sound

Plotter - used to produce single or multiple colored images.

Report Error

View Answer Report Error Discuss

49 3049
Q:

How are ip addresses available to the internet classified?

A) Static B) Public
C) Private D) None of the above
 
Answer & Explanation Answer: B) Public

Explanation:

An IP address (internet protocol address) is a numerical representation that uniquely identifies a specific interface on the network. Addresses in IPv4 are 32-bits long. This allows for a maximum of 4,294,967,296 (2^32) unique addresses. Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2^128) unique addresses.

 

IP addresses available to the internet are classified as Public.

Report Error

View Answer Report Error Discuss

2 3034