Blockchain - Potentes Nexus(In Block chain)
1.The three concepts used to explain the foundation of blockchain are ________________ .
--->Distributed Network, Cryptography , Public Ledger
2.Consortium blockchain has a predefined set of nodes allowing the users to write the data.
--->true
3.Blockchain which is popularly known as ‘for the people, by the people and of the people” is
___________. --->Public Blockchain
4.Blockchain network would make it impossible to bypass the traditional financial
intermediaries. --->false
5.Encrypted text is also known as ____________. --->Cipher Text
6.The value of cryptocurrency is independent of market conditions. --->false
7.Hash is used to ensure integrity of the data transmitted in the blockchain network. --->true
8.Cryptocurrency is authorized in all countries. --->false
9.In bitcoin mining, the computational power adjusts the difficulty level of mining. --->true
10.The output of hashing is popularly known as _______ . --->Digest
11.Bitcoins can be purchased in exchange of services. --->true
12.Bitcoin is a type of public blockchain. --->true
13.Which of the following platform(s) provides a modular architecture? --->Hyperledger
14.Which platform could gain its best use case from supply chain industry? --->Hyperledger
15.Ether provides greater flexibility than Bitcoin does. --->true
16.Which platform could gain its best use case from financial service industry? --->R3 Corda
17.________ is checked for your previous transactions to determine your wallet balance.
--->Ledger
18.We are authorized to buy cryptocurrency in all countries. --->true
19.A copy of the blockchain is maintained locally in all the user nodes of the network. --->true
20.The first smart contract platform is _______. --->Ethereum
21.The two types of cryptography are ______________. --->Asymmetric and Symmetric
22.Bitcoin is a __ network of nodes. --->P2P
23._______ records all the transactions in a blockchain. --->block
24.Which among the following are the advantages of using bitcoin? --->All the options
25.New bitcoins are released every time a transaction is verified. --->true
26.Who is the founder of Hyperledger fabric? --->Linux Foundation
27.On could be divided down to ____ decimal points? --->8
28.Which among the following is the most flexible cryptocurrency? --->Ether
29.SHA256 is a popular hashing algorithm used in bitcoin encryption. --->true
30.Cyptocurrency is the only use case of blockchain. --->false
31.Where can you buy a cryptocurrency? --->All the option
32.Smart Contracts are reversible. --->false
33.Hyperledger allows us to customize the visibility of a transaction in a blockchain. --->true
34.Coincap is a budding cryptocurrency. --->false
35.In asymmetric key cryptography, the public key is available with ________. --->everyone in
the network
36.Private blockchain is a de-centralized type of blockchain. --->false
37.Block rewards are given for every successful transaction verification in the network. --->true
38.Who is a miner? --->Computers that validate and process blockchain transactions.
39.The __ key(s) plays a significant role in the encryption and decryption of blocks.
--->private(wrong)
40.Which among the following option/options is/are consensus algorithms? --->All
41._____________ is popularly known as DLT with a difference. --->R3 Corda
42.Hash can be used to validate the input. --->true
43.Chose the correct option. --->Hash algorithm takes inputs of any size and produces an output
of a fixed size.
44.The sender and the receiver of a transaction always provide miners with a fee. --->false
45.If authorized, blockchain could replace central banks. --->true
47.Bitcoin network would make it impossible to bypass the traditional financial intermediaries.
--->false
46.Currencies other than bitcoin such as Litecoin and Dash are popularly known as
___________. --->Altcoins
47.Bitcoin is an example of which type of blockchain? --->public
48.Which among the following is the most flexible cryptocurrency? --->Ether
49.Multichain is an example of __________. --->private
50.Computational power adjusts the level of difficulty in mining. --->true
51.The value of coins, such as litecoin and bitcoin, remains the same across all the exchanges
that actively trade them. --->false
52.If authorized, bitcoins can be used to purchase merchandise. --->true
53.Blockchain enables transparency in the trading environment. --->true
54.Blockchain provides visibility to the user, thus imposing a more significant potential for cyber
risk. --->false
Automation Anywhere(in Robotics and automation)
1.You must access to the control room to upload a bot to the control room. --->true
2.Automation Anywhere cannot work with ___________. --->Handwritten documents
3.On which type of clients from control room can you schedule tasks? --->Runtime client
4.Using Email automation command, you can directly receive emails from the server without
having an Email client interface such as Gmail. --->true
5.Automation Anywhere provides inbuilt exception handling capability. --->true
6.Web recorder can also be used to work with windows or desktop applications. --->false
7.Meta bots are utilized in AA as a reusable component and let us work with visual captures and
DLLs. --->true
8.Error handling command allows us to __________. --->All the option
9.Following operations can be done utilizing string operation command? --->All the option
10.Mapping of variables from main task to sub-task can be done using ___________. --->Run
task command
11.Automation Anywhere cannot work with ___________. --->Handwritten documents
12.You can find one image in another image and do left-click, right-click and double-click using
_________. --->image recognition command
13.In Automation anywhere task editor window, we can manually write the lines of code without
using a single AA command. --->false
14.Automation Anywhere offers some special variables that can be utilized inside the loop
command ___________. --->Excel and table column
15.___________ is the command you can utilize to hold the bot execution for a particular period
and then continue. --->delay
16.Automation Anywhere offers us the flexibility to run the task by utilizing Runtime Client,
Development Client, and Control Room. --->false
17.Which system variable is utilized to read the CSV and text files? --->Filedata column
18.PDF integration command cannot be used for ___________. --->converting pdf files to word
document
19.It is optional to offer CSV path for pattern-based data extraction in web recording. --->true
20.Variable type that is not supported by AA is known as __________. --->string
21.Automation Anywhere is compatible with SAP, Oracle, Mainframes, and Java applications.
--->true
22.SQL query option under Database command can be utilized to insert, delete, and update the
SQL table. --->false
23.Which of the following commands is more prescribed while creating a bot? --->insert
keystrokes
24.What is the exact order in Automation Anywhere - Most friendly-Moderate friendly - Least
friendly formats? --->Excel-pdf-power point
25.______ cannot be checked utilizing if condition. --->cpu utilization
26.___________ is not a valid trigger type in Automation Anywhere. --->system logoff
27.Mapping of variables from main task to sub-task can be done using ___________. --->Run
task command
28.Which recorder is least suggested in Automation Anywhere? --->smart recorder
29.By utilizing Smart recorder, you can work with both web and applications --->true
30.AA auto login feature permits us __________. --->AA auto login feature permits us
__________.
Blue Prism(In Robotics and Automation)
1.The reset button in Process Studio must always be pressed ________. --->Before re-running a
Process.
2.In a process, which data item can be used to store the values from Rows and Columns fetched
from .xls file? --->Collection
3.Reusable logic shall be in which layer? --->Object layer
4.What is correct about Object Studio? --->Object Studio does not have a Main Page, but It does
have 2 default page
5.What are all the spy modes in Blue Prism? --->Win 32 Mode, HTML Mode, Active Accessibility
Mode, Region Mode
6.What is the purpose of Action Stage? --->It’s used to call a Business Object page from a
Processes.
7.Which stage enables a Business Object to pause and wait for an application element?
--->wait stage
8.What is True about Wait Stage? --->All the options
9.Which stage is available in Object Studio but not in process studio? --->Wait Stage
10.How do you refer the Collection Fields? Identify the correct option. --->‘Collection Name.Field
Name’
11.What is correct about work Queues in Blue Prism? --->ALL
12.Which of the following statement in incorrect? --->Queued cases can be monitored and
maintained from Control Room
13.Which stage is used in Blue Prism Object Studio to launch an application ____ --->Navigate
14.Application Modelling can be done in which Module of Blue Prism? --->Object Studio
15.Which of the System Manager module of Blue Prism provides the below functionalities?
--->All
16.Which of the following statements is true when employing multiple object in object layer?
--->Reduces the risk to the process layer when a change is made in object layer
17.Exception Bubbling means ___________. --->Exception travel upwards towards the Main
Page of the Process
18.The Stage which can be used to throw can exception in Blue Prism Process is _____________.
--->Exception Stage
19.Which stage enables a Business Object to pause and wait for an application element? --->wait
stage
20.Which part of Blue Prism interacts with the target system (the application a user would use)?
--->Application Modeller
21.Can we have Resume Stage in Process without Recover Stage? --->False
22.Code Stage in Blue Prism does not allow to write code in which programming language?
--->java
23.How many times a session can run? --->Once
24.Which stage always comes, if we insert Wait Stage in our Object? --->Pause stage
25.Which of the following statements are correct? --->Blue Prism can be configured to handle an
exception and continue processing.
26.Select the incorrect statement. --->One recover Stage can handle all exceptions on a page
27.Session Variables are _______________. --->Both the options
28.Which of the following statements is correct regarding the key field of the Work Queue?
--->The key field value can only be set when the case if first added to the queue.
29.Which is not the valid data type in Blue Prism? --->char
30.Which stage allows to move forward through the rows of a collection? --->loop stage
31.Which type of brackets must be used to include a Data Item in an expression? --->Square
brackets
32.What is true about Global Data Items? --->Global Data Items name and Local Data Items
name cannot share same name
33.To spy the elements in any mode in an application, the keyboard shortcut is _________.
--->CTRL + Left Click
34.What is true about defer items from the Work Queue? --->All the options
35.Identify the two stages that that should always be there in process definition --->Start stage
and End Stage
RPA with Pega
1.Adapters help the users to interact with _______ application(s). --->Target
2.OpenSpan helps in enhancing the ________ platform(s) of Pega. --->BPM and CRM
3.Automation helps to achieve errorless outputs. --->false
4.Which of the following is a property of the web adapter? --->All the options
5.______ help(s) in providing an unique desktop experience to the user. --->RDA
6.Which among the following is a/are Pega differentiator(s)? --->RDA(wrong)
7.To start web interrogation, global web page function should always be kept as default. --->true
8.UWA supports how many browser types? --->2
9._________ is used for querying the data in the table. --->Data cells
10.Libraries are helpful to extend the functionality. --->true
11._________ does not have a counter mechanism. --->list loop
12.In UWA, _______ leaves the open tabs when interrogation is stopped. --->Stop Running
13.By using project to project reference, changes are updated in all the referenced application
projects. --->True
14._________ need(s) minimum code and execute(s) faster than loops. --->Queries
15.How many input parameters are present for a for loop? --->3
16._____ character is used to allow dynamic data in the design block. --->@
17._______ helps in creating dependencies between the projects in the build. --->Project to
project reference
18._________ is used for specifying unique data elements. --->All the options
19.In message manifest, all the messages are stored in the central repository. --->true
20.Which of the following returns message details for message definition?
--->GetMessageDetails
21.________ number of elements are present in the message manifest. --->2
22.JSON serialization allows ___________ as a parameter. --->MessageDetails
23.An activity can start in one framework project and end in another framework project. --->true
24._________ help in identifying the elements across multiple instances. --->Match Rules
25.Log file cleaner helps in removing personal data. --->true
26.With the help of _________, you can easily find where the error has occurred. --->indicator
27._________ is/are the method(s) for activities. --->Cancel and start activities
28.The start method contains ______ methods. --->3
29.__________ components help in connecting one part of automation to another.
--->Label/Jump
30.___________ is defined as an attribute of interrogated control. --->Property
31.To create a window based application, which adapter should be chosen? --->windows
adapter(wrong)
32.In Pega, a solution may contain multiple projects. --->true
33.While editing automation, you can open the playback file. --->false
34.Renaming the interrogated control can be done in _______ tool window. --->Object
Explorer(wrong)
35.__________ does not have any parent case. --->Top-level
36.__________ animates the automation activities in runtime log files. --->Automation playback
37.For loop uses ______ as a counter to iterate through the logic. --->index
38.The dependency between the parent and child steps can be created using _____. --->Wait
step
39.Data can be modified in all child cases. --->true
40.You can start debugging by using the _________ key. --->f5
Microservices Architecture(in Microservices)
1.The decomposition of Microservices is based on two categories, namely ________ --->Business
Opportunity and Technology(wrong) ,,, Technology Capability and Subdomain(wrong)
2.Agile development & deployment is difficult in case of __________________ --->Monolithic
3.Simple to develop, test, deploy and scale represents __________________ --->Monolithic
4.Software built as microservices can, by definition, be broken down into multiple component
services. --->true
5.Microservice is considered as a subset of SOA. --->true
6.Microservice Architecture adapts which of the following concept(s)? --->All the options
7.The client expects a timely response from the service and might even block while it waits. This
represents the _________ client service interaction style. --->Synchronous
8.Which ensures to insulate the applications by acting as a barrier? --->API Gateway
9.Scenarios where the client takes the onus and is responsible for determining the network
locations of the available service instances is _________ --->Client-side discovery
10.The two types of Service Discovery includes Client-side discovery and server-side discovery.
--->true
11.The two components of CQRS include_______________ --->Query and command side
12.Microservices supports different kinds of databases and this is called ____________.
--->Polyglot persistence
13.The transactions that span across multiple services are handled by ___________ --->Event
driven Architecture
14.Which of these is a drawback of Multiple Services per Host pattern? --->Difficult to limit
resource utilization(wrong)
15.Packer.io and Boxful represent ______________ type of pattern. --->Service Instance per Host
16.Service Instance per Host pattern provides ________________ --->ALL the options
17.Caching helps in improving the performance of the system. --->true
18.Microservice Chassis takes care of the following, except ______________ --->Token
generation
19.Which pattern collects and reports all exceptions to a centralized exception tracking service?
--->Exception tracing
20.The following are all caching types, except ___________ --->Local & Remote Cache (wrong)
21._____________ helps to control and limit the number of consecutive request failures that
cross a threshold. --->Circuit breaker
22.Netflix OSS is an example of ____________ --->Client-side discovery
23.IDL stands for ______________________ --->Interface Definition Language
24.Functional Decomposition is an example of ____________ --->Microservices
25.External clients communicate with Microservices using _____________ --->API Gateway
26.Amazon EC2 Container Service is an example of ________________ --->Docker
27.The 3Cs of Microservices include the following, except ______________ --->Control
28.The benefits of Microservices include ___________ --->All the options
29.Microservices-based architecture prefers _______ --->No dependency on any particular DB
30.Microservices-based architecture enforces a Modular structure. --->true
31.__________ is the ability to store something temporarily to reduce the loading times, and I/O
of a system. --->Cache
Ionic Framework(in Modern Web Development)
1. Which of the following files contains all the required JS files for Ionic and Angular?
--->ionic.bundle.min.js
2.Which of the following files has the Ionic styles? --->ionic.css
3.The following are in-built Ionic templates, except __________ --->navigation
4.The following statements are true about Ionic framework, except _____________ --->It is built
on top of Cascading, Scalding, C++ and Node.js
5.Which of the following includes device APIs that allow accessing native device features like
camera or maps? --->Cordova
6.Which of the following classes can be used to group a set of items in a list? --->item-divider
7.Which of the following tags displays a button with rounded corners? --->both the options
8.Which of the following classes can be used to create a button that occupies the entire width of
the screen? --->button-block
9.Cards can contain ____. ---> All the option
10.In a responsive Grid, which class breaks the row of columns when the window size is smaller
than the portrait tablet? --->responsive-md
11.Ionic Grid system is responsive by default. --->true
12.Which of the following components uses "CSS Flexible Box Layout"? --->Grid
13.Which of the following classes define(s) the footer? --->bar-footer
14.Which of the following is a content pane that can go over the user’s main view temporarily?
--->Modal
15.What is the ionic directive that can be used for creating a tab bar? --->ion-tabs
16.Which of the following interaction modes can be enabled by using ionList and ionItem
directives? --->All
17.Which of the following directives can be used to enable the "pull to refresh" functionality?
--->ion-refresher
18.Which of the following components is a multi-page container where each page can be swiped
or dragged between? --->ion-slides
19.CLI is an extension of _________. --->Node.js
20.What is the command for running an app in iOS emulator? --->ionic emulate ios
21.In Ionic CLI, which of the following commands can be used to automatically monitor changes
in the file system? --->ionic serve
22.Components in Ionic by default have both padding of __________ --->10 pixels(wrong)
23.Which of the following is a slide-up pane that lets the user choose from a set of options?
--->Action Sheet
24.Which of the following is the place to check for community contributed Ionic Components?
--->Ionic Market
25.Which of the following directives can help in using Ionic custom Scroll View, or the built-in
overflow scrolling of the browser? --->ion-content
26.Which of the following CSS components are best to create a News App that displays a picture
and a caption with short description? --->cards
27.Which of the following offers AngularJS wrappers for the most popular Cordova plugins?
--->ngCordova
28.Which CSS component is ideal for creating top navigation for a mobile app? --->tabs
Caching Techniques(in Microservices)
1.A cache is a ______________. --->Small and fast memory
2.Which type of caching can be used to cache the contest registration page in a website, to
reduce the time taken to serve the page for the users? --->Application Cache
3.In which type of cache does the application directly interacts with database for data that is not
available in the cache? --->Cache-aside
4.In which type of cache does the application treats cache as the main data store, reads data
from it and writes data to it? (I) Read Through/Write Through Cache (II) Cache-aside --->I
5.Line size in a cache is recommended to be a power of 2. --->true
6.Which of the following Cache Eviction techniques consider Locality? --->Least Recently Used
7.When a computer processor does not get a data item that it requires in the cache, it is known
as _________. --->Cache Hit
8.Which type of cache is recommended to store user preferences for an application with several
100s of concurrent users? --->On Demand Cache
9..A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight
32-bit words. How many bits are required for block offset, assuming a 32-bit address? --->5
10.Which of the following is true about a well-designed cache? --->Hit Rate > Miss Rate
11.Which Caching Topology is recommended for a read intensive distributed application?
--->Replicated
12.Which type of cache reference locality aims at designing cache to store the entire block near
the Recently Referenced Data? (I) Temporal Locality (II) Spatial Locality --->II
13.The Caching Technique where the cache is populated the first time a particular piece of data
is requested is called _________. --->Lazy Loading
14.A web page displays ten items per page and has pagination enabled. What would be the
recommended way to enable efficient paging? --->Use Spatial Cache
15.Which type of cache reference locality aims at designing cache to store Recently Referenced
Data assuming that the same data will be requested frequently? --->Temporal Locality
16.Cache Performance or Average Memory Access Time (AMAT) depends on which of the
following? --->All the options
17.While using a Write Back cache, which of the following policies needs to be abided? --->Write
Allocate
18.Which would be the best place to cache DNS data? --->Proxy
19.For a cache look up to be a Hit, which of the following must be true? --->Tag==Block Number
and Valid Bit = 1
DevOps Culture(in Digital Foundation)
1.Understanding what we are deploying and how we are deploying comes under which practice
of DevOps? --->Configuration Management
2.____________ is the primary measure of progress according to Agile Manifesto. --->Working
Software
3.DevOps encompasses culture and collaboration. --->true
4.Which of the following is a value of DevOps? --->DevOps goals span the entire delivery pipeline
5.DevOps is the union of ___________, ____________ and _________ to enable continuous
delivery of value to end users. --->People, Processes and Products
6.The following are benefits of automation in DevOps, except it _________ --->Implants Manual
Errors
7.What is the desire in the organization to push things to production termed as? --->Live Site
Culture
8.Minimizing conflicts when merging code should be one of your goals while performing
branching. --->true
9.During the Continuous Integration process, unit tests are executed during the build. --->true
10._____________ ensures that the code deployed to the production environment is not
necessarily released to all end users. --->Feature Flag
11.Continuous Delivery encourages configuration as code. --->true
12._____________ is a software engineering approach in which teams produce software in short
cycles, ensuring that the software can be reliably released at any time. --->Continuous Delivery
13.Continuous Delivery focuses on manual delivery pipeline. --->false
14.It is acceptable if all the environments are not consistent in a DevOps lifecycle. --->false
15.______________ testing tests components together in scenarios. --->Integration
16.In Manual Integration testing, Human Intelligence is waged against the application. --->true
17._____________ is the automated system used for continuous integration (Build Code, Create
Packages and Run Code). --->Buil pipeline
18.DevOps is people following a _________ enabled by products to deliver value to the end
users. --->Process
19.Improving the quality and performance of the applications is a major driver for switching to
DevOps. --->true
20.What is the metric used to measure how quickly we are deploying? --->Mean time to
recover(wrong)
21.What is the desire in the organization to push things to production termed as? --->Live Site
Culture
22.Product Management is one of the 7 DevOps practices. --->false
23.The following are types of monitoring, except ___________ --->program
24.It is acceptable if all the environments are not consistent in a DevOps lifecycle. --->false
Cloud Foundry(in Cloud Computing)
1._______ performs start and stop actions of an application locally in the application virtual
machine (VM). --->Diego Cell
2.______ stores longer-lived control data like component IP addresses and distributed locks.
--->Consul
3._________ directs incoming traffic to the Cloud Foundry. --->Router
4.With Platform as a Service, your infrastructure management responsibilities are greatly
reduced. --->true
5.Cloud Foundry is a ________ type of distributed services. --->Platform as a service
6.Command to list the services available to the targeted organization is ____________. --->cf
marketplace
7.Default space for PWS is____. --->development
8.Services that are selected from the marketplace catalog are known as ______. --->Managed
services
9.____ are defined as the unit of deployment in Cloud Foundry. --->Application
10.______ is the dependancy of an external appllication. --->Organization(wrong)
11.Which of the following option is used to specify push timeout in seconds? ---> -t
12.______ is a blob of metadata or a file containing metadata of a group of accompanying files.
--->Buildpacks(wrong)
13.CF_STAGING_TIMEOUT and CF_STARTUP_TIMEOUT commands are used to control stagging
and start up. --->true
14.Issue in Cloud Foundry can be _____. --->All the options
15.Which of the following command lists all the applications within a space? --->cf apps
16.What is organization in Cloud Foundry? --->A resource restriction for spaces.
17._________________ allows cloud controller to locate instances on separate zones to boost
redundancy. --->Availability Zones
18.App-Direct is ______________ provider of services. --->Commercial
19.Blobstore is a repository for the large binary file that contains _____. --->All the options
20.Command to login to Cloud Foundry is _____. --->cf login
21.Manifest files have the extension as _______. --->.XML
22.Cloud Native applications should ____________ to access local file system. --->Attempt
23.What are services in Cloud Foundry? --->Any type of add-on that can be provisioned along
side your apps.
24.Cf push command has a primary function to ____. --->Deploy application
25.Features of a Cloud Foundry Service are/is ____. --->All the option
26._______________ provides RestFul interface to domain objects. --->Cloud Controller
27.What are the two predefined environment-variables available to any application?
--->VCAP_USER and VCAP_APPLICATION
28.What is the purpose of –n option under cf push command? --->To specify the name of the
app as it appears in Cloud Foundry
29.______________ defines how to get to an application. --->Route
30.PWS has the below default app domain as_______. --->cfapps.io
31.Select the ports supported by Cloud Foundry. --->80, 443, 4443
32.What does PCF stand for____. --->Pivotal Cloud Foundry
33.Cloud Controller is responsible for the below____. --->All the options
34.Which option can be used to see the current organization and space? --->cf target
35.RTR section in the log indicates log entries for____. --->Router
36.What are three activities involved in deploying an application to Cloud Foundry? --->deploy,
push, upload
37.The URL of an application is ________________. --->Domain
38.What is the deployment blueprint for an application? --->Manifest
39.CF Router provides _______________. --->Automatic load balancing
40._____________ allows CF to support multiple language and development environments.
--->Buildpacks
41.___________________ can be used as a tool for persistent session management.
--->___________________ can be used as a tool for persistent session management.
42.Primarily Cloud Foundry is written in _____.-->All
43.What can you do if your application uses a language or framework that Cloud Foundry
buildpacks do not support? Choose all the correct options. --->all
44.Why should one go for Cloud Foundry? Select all the applicable options. --->All
45.Market place services are ___________. Choose the correct option. --->CF Managed
46.____ restricts the availability of resources to an organization. --->Quotas
47.Services should be treated as_____________. --->Manifests
48.Select all the languages for which Build Packs are available. --->Ruby and java
49.What is the route that is set for the application and deployed using the command? --->cf push
spring-music
50.What is meant by routes in Cloud Foundry? --->A resource that define routes to apps.
51.Select the valid log manager____. --->Splunk(wrong)
52.Select the invalid commands from below. --->cf stage
53.Cloud Foundry is ____________ agnostic. --->Support(wrong)
54.What is the command to check the version? --->cf --version
55.As per 12 Factor, each component in the codebase should be an APP. --->true
56.Redis is ___________ in memory database. --->Persistent
57.Application deployments are directed by _____. --->cloud controller
58.What is the command to see the logs of the application deployed to cloud foundry? --->cf logs
59.Select the responsibilities of a Service Broker --->All the options
60.____ streams application logs to developers. --->App Log Aggregator
Bitbucket(in DevOps)
1.Which stage of artifact denotes that the files are added to the index but not in Git Database?
--->staged
2.Which stage of artifact denotes that the files are stored in Git Database? --->Committed
3.Bitbucket is a web based version control. --->true
4.Which version control system allows every developer to have a complete codebase along with
the history? --->Distributed Version Control System
5.Does Bitbucket allow the user to restrict the other users from using his/her repository? --->yes
6.Bitbucket __________ automation of CI/CD pipeline --->allow
7.Which language template(s) is/are supported by Bitbucket Pipeline? --->All
8.The logical unit in Mercurial which has a group of files that are modified. --->ChangeSet
9.Bitbucket does not support IP Whitelisting. --->false
10.Version Control System helps in tracking __________ of the files. --->All
11.Bitbucket Server is provided with built-in Apache Maven. --->true
12.Bitbucket provides __________ private repositories. --->free
13.Mercurial command to view the repository history. --->hg log
14.Which of the following IDE’s has the Bitbucket feature integrated within? --->All
15.Bitbucket caters __________ private repositories. --->Response time
16.Bitbucket is integrated with __________. --->All
17.Which among the following is /are feature(s) of Bitbucket? --->true
18.Bitbucket provides __________ --->Private and Public Repository
19.Bitbucket server is a a Combination of Git and Web Interface developed in __________.
--->Java
React Native(in Mobility & Wearables)
1.The chief difference between React Native and React is ________. --->ReactJS is a Library
whereas React Native is a framework.
2.React Native does not have third-party plugin compatibility. --->false
3.It is mandatory to install Android Studio or Xcode for developing a React Native mobile
application. --->false
4.JSX is JavaScript with a syntax extension which allows a mixture between _______________
and ___________. --->JavaScript and XML tags
5._______________ are the building blocks for a React Native application. --->Component
6.AppRegistry is the JavaScript exit point to run all React Native apps. --->false
7.Please select the one which is not a React Native UI Component. --->Switch
8.Which method is called when a component is being removed from the DOM?
--->componentWillUnmount()
9.With React Native, you just style your application using _______________. --->CSS(wrong)
,,,javascript
10.How to create a new React Native project? --->$ react-native init
11..apk extension is the application file for Android whereas_______________ extension is the
application file for iOS. --->.IPA
12.The _______________ file defines some metadata for your project and, most importantly,
declares React-Native as a dependency of your project. --->package.json
13.By writing CSS in JavaScript, you are isolating styles from _______________. --->global
namespac
14.In Reactive forms, the HTML of the forms are automatically created. --->false
15._______________ captures user touch events. --->TouchableHighlight
16.To build an iOS app, you need a Mac OS, and to build an Android app you need
____________. --->Any
17.Live Reloading and Hot Loading is present in React Native Developer Tools. --->true
18.Which method retrieves automatic updates about the current location of the device?
--->Geolocation.watchPosition()
19._______________ architectural pattern causes unidirectional data flow. --->flex
20.For networking needs, React Native framework provides the fetch API. --->true
21.Which of the following option is not a React Native API? --->modal
22.React Native is like other Hybrid Apps that are actually slower than Native mobile apps.
--->true ,,, false
23.React Native is known as ‘learn once, write anywhere’. --->true
24.Which command do you have to run for installing React Native? --->npm install -g react-
native-cli
25.How do you create a new React Native project? --->$ react-native init
26.What type of data does a ListView take? --->array(wrong)
27.React Native supports DOM and Virtual DOM concept. --->false
28.In React Native, Geolocation API is available through the _______________ global, so you do
not need to import it. --->navigator.geolocation
29.One of the benefits of React Native vs. Native Development is that React Native has the live
reload ability. --->true
30.You can use any CSS in the styles of the React Native StyleSheet object. --->true
31.FormsModule is imported from @angular/_______ in Model Driven Form. --->form(wrong)
32.Which Objective C file can be used to switch the React Native bundle location in bundle.cc?
--->AppDelegate.m
Redis(in Microservices)
1.Which configuration setting specifies the file to which the RDB snapshot dump is saved?
--->dbfilename
2.When using Pipelining, will the additional memory used be high? --->very less(wrong)
3.redis.conf is configured for changing ____________ to connect to the Redis server. --->port
4.Redis provides multi-state architecture during replication, where every instance can both read
and write. --->false
5.The _________ command is used to remove the expiration from a key. --->Persist
6.Which of the following does the Redis Hashes store --->Key value pair
7._______ sets the key to expire within the given number of seconds. --->EXPIRE
8._______ returns an array of values. --->HGET
9.Which of the following commands returns the remaining time for the key to expire? --->TTL
10._____________ is a type of lock that allows you to limit the number of processes that can
concurrently access a resource to some fixed number. --->Optimistic locking(wrong)
11.In a Redis transaction, we can use ________ command to enter into the transaction and
queue the transaction commands instead of executing them. --->Multi
12.Which among the following factors helps in calculating the number of shards in Redis?
--->Number of keys in a single shard
13.Which of the following commands is used to post the message to the channel? --->PUBLISH
14.Which is the short structure that Redis provides for the compact representation of Sets?
--->inset
15._________ is required in the distributed backend systems where cache state needs to be
maintained uniformly across the systems. --->Centralized cache
16._________ is an implementation of partitioning where you can send your query to a random
instance, and the instance will forward your query to the right node. --->Query routing
17.Consider an example where a range of users from 0 to 10000 goes to a Redis instance R0, and
another range of users 10001 to 20000 goes to R1. This is _________ partitioning. --->
Range partitioning
18.Which among the following is a benefit of Pipelining? --->speed
19.The configuration setting in redis.conf that could be configured to the number of samples of
keys to be checked, to evict keys with the oldest access time is ________ --->maxmemory-policy
20._________ is the technique of breaking down data into multiple parts. --->Sharding
21.In a key-value pair, _________ is represented by a string. --->Value(wrong)
22. is used for failover process when a master is not working, promoting the slave to master.
--->Quorum(wrong)
23.The ____________ command is used to set a lock in string dataset. --->SET
24.In-Memory database stores data in the memory. --->true
25._________ is the memory policy that returns errors when the memory limit is reached, and
the client is trying to execute commands that result in higher memory usage. --->noeviction
26.____________ command provides a check-and-set behavior to Redis commands. --->WATCH
27._________ is the configuration setting that tells the maximum number of items allowed in a
Hash table for ziplist encoding. --->hash-max-ziplist-entries
28.Redis string cannot hold any value beyond a certain length. What is it? --->512MB
29._________ refers to an undesirable state when a system attempts to perform two or more
operations, which should, otherwise, be done in a proper sequence to be executed correctly.
--->Race condition
30.In Redis context, senders are named as _________ and receivers are named as Subscribers.
--->Publishers
31.How many commands can be sent to a server in pipelining? --->single
32.____________ is the number of sentinels that need to agree to the fact that the master is not
reachable and make a failover procedure promoting the slave to the master. --->Quorum
33.Redis provides the output of all commands in ____________. --->A single step
34.Which is the mechanism to enforce limits on the access of a resource when multiple threads
are executed? --->locking
35.____________ is the memory eviction policy where keys are evicted by removing the less
recently used keys first but only among keys that have an 'expire' field set, to make space for the
newly added data. --->Volatile-lru
36.The persistent server should be the _________ once the whole environment is started.
--->Master server
37.Twemproxy is a proxy developed at Twitter for Redis protocol for automatic partitioning
among multiple Redis instances and optional ejection of the node if it is not available. --->true
38._________ is/are used to store, retrieve and update data. --->Commands
39.The environment continues to work even if a slave fails. --->True