You are on page 1of 22

Blockchain - Potentes Nexus(In Block chain)

1.The three concepts used to explain the foundation of blockchain are ________________ .
--->Distributed Network, Cryptography , Public Ledger

2.Consortium blockchain has a predefined set of nodes allowing the users to write the data.
--->true

3.Blockchain which is popularly known as ‘for the people, by the people and of the people” is
___________. --->Public Blockchain

4.Blockchain network would make it impossible to bypass the traditional financial


intermediaries. --->false

5.Encrypted text is also known as ____________. --->Cipher Text

6.The value of cryptocurrency is independent of market conditions. --->false

7.Hash is used to ensure integrity of the data transmitted in the blockchain network. --->true

8.Cryptocurrency is authorized in all countries. --->false

9.In bitcoin mining, the computational power adjusts the difficulty level of mining. --->true

10.The output of hashing is popularly known as _______ . --->Digest

11.Bitcoins can be purchased in exchange of services. --->true

12.Bitcoin is a type of public blockchain. --->true

13.Which of the following platform(s) provides a modular architecture? --->Hyperledger

14.Which platform could gain its best use case from supply chain industry? --->Hyperledger

15.Ether provides greater flexibility than Bitcoin does. --->true

16.Which platform could gain its best use case from financial service industry? --->R3 Corda

17.________ is checked for your previous transactions to determine your wallet balance.
--->Ledger

18.We are authorized to buy cryptocurrency in all countries. --->true

19.A copy of the blockchain is maintained locally in all the user nodes of the network. --->true

20.The first smart contract platform is _______. --->Ethereum

21.The two types of cryptography are ______________. --->Asymmetric and Symmetric


22.Bitcoin is a __ network of nodes. --->P2P

23._______ records all the transactions in a blockchain. --->block

24.Which among the following are the advantages of using bitcoin? --->All the options

25.New bitcoins are released every time a transaction is verified. --->true

26.Who is the founder of Hyperledger fabric? --->Linux Foundation

27.On could be divided down to ____ decimal points? --->8

28.Which among the following is the most flexible cryptocurrency? --->Ether

29.SHA256 is a popular hashing algorithm used in bitcoin encryption. --->true

30.Cyptocurrency is the only use case of blockchain. --->false

31.Where can you buy a cryptocurrency? --->All the option

32.Smart Contracts are reversible. --->false

33.Hyperledger allows us to customize the visibility of a transaction in a blockchain. --->true

34.Coincap is a budding cryptocurrency. --->false

35.In asymmetric key cryptography, the public key is available with ________. --->everyone in
the network

36.Private blockchain is a de-centralized type of blockchain. --->false

37.Block rewards are given for every successful transaction verification in the network. --->true

38.Who is a miner? --->Computers that validate and process blockchain transactions.

39.The __ key(s) plays a significant role in the encryption and decryption of blocks.
--->private(wrong)

40.Which among the following option/options is/are consensus algorithms? --->All

41._____________ is popularly known as DLT with a difference. --->R3 Corda

42.Hash can be used to validate the input. --->true

43.Chose the correct option. --->Hash algorithm takes inputs of any size and produces an output
of a fixed size.

44.The sender and the receiver of a transaction always provide miners with a fee. --->false

45.If authorized, blockchain could replace central banks. --->true


47.Bitcoin network would make it impossible to bypass the traditional financial intermediaries.
--->false

46.Currencies other than bitcoin such as Litecoin and Dash are popularly known as
___________. --->Altcoins

47.Bitcoin is an example of which type of blockchain? --->public

48.Which among the following is the most flexible cryptocurrency? --->Ether

49.Multichain is an example of __________. --->private

50.Computational power adjusts the level of difficulty in mining. --->true

51.The value of coins, such as litecoin and bitcoin, remains the same across all the exchanges
that actively trade them. --->false

52.If authorized, bitcoins can be used to purchase merchandise. --->true

53.Blockchain enables transparency in the trading environment. --->true

54.Blockchain provides visibility to the user, thus imposing a more significant potential for cyber
risk. --->false

Automation Anywhere(in Robotics and automation)


1.You must access to the control room to upload a bot to the control room. --->true

2.Automation Anywhere cannot work with ___________. --->Handwritten documents

3.On which type of clients from control room can you schedule tasks? --->Runtime client

4.Using Email automation command, you can directly receive emails from the server without
having an Email client interface such as Gmail. --->true

5.Automation Anywhere provides inbuilt exception handling capability. --->true

6.Web recorder can also be used to work with windows or desktop applications. --->false

7.Meta bots are utilized in AA as a reusable component and let us work with visual captures and
DLLs. --->true

8.Error handling command allows us to __________. --->All the option

9.Following operations can be done utilizing string operation command? --->All the option

10.Mapping of variables from main task to sub-task can be done using ___________. --->Run
task command

11.Automation Anywhere cannot work with ___________. --->Handwritten documents

12.You can find one image in another image and do left-click, right-click and double-click using
_________. --->image recognition command

13.In Automation anywhere task editor window, we can manually write the lines of code without
using a single AA command. --->false

14.Automation Anywhere offers some special variables that can be utilized inside the loop
command ___________. --->Excel and table column

15.___________ is the command you can utilize to hold the bot execution for a particular period
and then continue. --->delay

16.Automation Anywhere offers us the flexibility to run the task by utilizing Runtime Client,
Development Client, and Control Room. --->false

17.Which system variable is utilized to read the CSV and text files? --->Filedata column

18.PDF integration command cannot be used for ___________. --->converting pdf files to word
document

19.It is optional to offer CSV path for pattern-based data extraction in web recording. --->true

20.Variable type that is not supported by AA is known as __________. --->string

21.Automation Anywhere is compatible with SAP, Oracle, Mainframes, and Java applications.
--->true

22.SQL query option under Database command can be utilized to insert, delete, and update the
SQL table. --->false

23.Which of the following commands is more prescribed while creating a bot? --->insert
keystrokes

24.What is the exact order in Automation Anywhere - Most friendly-Moderate friendly - Least
friendly formats? --->Excel-pdf-power point

25.______ cannot be checked utilizing if condition. --->cpu utilization

26.___________ is not a valid trigger type in Automation Anywhere. --->system logoff

27.Mapping of variables from main task to sub-task can be done using ___________. --->Run
task command

28.Which recorder is least suggested in Automation Anywhere? --->smart recorder


29.By utilizing Smart recorder, you can work with both web and applications --->true

30.AA auto login feature permits us __________. --->AA auto login feature permits us
__________.

Blue Prism(In Robotics and Automation)


1.The reset button in Process Studio must always be pressed ________. --->Before re-running a
Process.

2.In a process, which data item can be used to store the values from Rows and Columns fetched
from .xls file? --->Collection

3.Reusable logic shall be in which layer? --->Object layer

4.What is correct about Object Studio? --->Object Studio does not have a Main Page, but It does
have 2 default page

5.What are all the spy modes in Blue Prism? --->Win 32 Mode, HTML Mode, Active Accessibility
Mode, Region Mode

6.What is the purpose of Action Stage? --->It’s used to call a Business Object page from a
Processes.

7.Which stage enables a Business Object to pause and wait for an application element?

--->wait stage

8.What is True about Wait Stage? --->All the options

9.Which stage is available in Object Studio but not in process studio? --->Wait Stage

10.How do you refer the Collection Fields? Identify the correct option. --->‘Collection Name.Field
Name’

11.What is correct about work Queues in Blue Prism? --->ALL

12.Which of the following statement in incorrect? --->Queued cases can be monitored and
maintained from Control Room

13.Which stage is used in Blue Prism Object Studio to launch an application ____ --->Navigate

14.Application Modelling can be done in which Module of Blue Prism? --->Object Studio

15.Which of the System Manager module of Blue Prism provides the below functionalities?
--->All
16.Which of the following statements is true when employing multiple object in object layer?
--->Reduces the risk to the process layer when a change is made in object layer

17.Exception Bubbling means ___________. --->Exception travel upwards towards the Main
Page of the Process

18.The Stage which can be used to throw can exception in Blue Prism Process is _____________.
--->Exception Stage

19.Which stage enables a Business Object to pause and wait for an application element? --->wait
stage

20.Which part of Blue Prism interacts with the target system (the application a user would use)?
--->Application Modeller

21.Can we have Resume Stage in Process without Recover Stage? --->False

22.Code Stage in Blue Prism does not allow to write code in which programming language?
--->java

23.How many times a session can run? --->Once

24.Which stage always comes, if we insert Wait Stage in our Object? --->Pause stage

25.Which of the following statements are correct? --->Blue Prism can be configured to handle an
exception and continue processing.

26.Select the incorrect statement. --->One recover Stage can handle all exceptions on a page

27.Session Variables are _______________. --->Both the options

28.Which of the following statements is correct regarding the key field of the Work Queue?
--->The key field value can only be set when the case if first added to the queue.

29.Which is not the valid data type in Blue Prism? --->char

30.Which stage allows to move forward through the rows of a collection? --->loop stage

31.Which type of brackets must be used to include a Data Item in an expression? --->Square
brackets

32.What is true about Global Data Items? --->Global Data Items name and Local Data Items
name cannot share same name

33.To spy the elements in any mode in an application, the keyboard shortcut is _________.
--->CTRL + Left Click

34.What is true about defer items from the Work Queue? --->All the options
35.Identify the two stages that that should always be there in process definition --->Start stage
and End Stage

RPA with Pega


1.Adapters help the users to interact with _______ application(s). --->Target

2.OpenSpan helps in enhancing the ________ platform(s) of Pega. --->BPM and CRM

3.Automation helps to achieve errorless outputs. --->false

4.Which of the following is a property of the web adapter? --->All the options

5.______ help(s) in providing an unique desktop experience to the user. --->RDA

6.Which among the following is a/are Pega differentiator(s)? --->RDA(wrong)

7.To start web interrogation, global web page function should always be kept as default. --->true

8.UWA supports how many browser types? --->2

9._________ is used for querying the data in the table. --->Data cells

10.Libraries are helpful to extend the functionality. --->true

11._________ does not have a counter mechanism. --->list loop

12.In UWA, _______ leaves the open tabs when interrogation is stopped. --->Stop Running

13.By using project to project reference, changes are updated in all the referenced application
projects. --->True

14._________ need(s) minimum code and execute(s) faster than loops. --->Queries

15.How many input parameters are present for a for loop? --->3

16._____ character is used to allow dynamic data in the design block. --->@

17._______ helps in creating dependencies between the projects in the build. --->Project to
project reference

18._________ is used for specifying unique data elements. --->All the options

19.In message manifest, all the messages are stored in the central repository. --->true

20.Which of the following returns message details for message definition?


--->GetMessageDetails
21.________ number of elements are present in the message manifest. --->2

22.JSON serialization allows ___________ as a parameter. --->MessageDetails

23.An activity can start in one framework project and end in another framework project. --->true

24._________ help in identifying the elements across multiple instances. --->Match Rules

25.Log file cleaner helps in removing personal data. --->true

26.With the help of _________, you can easily find where the error has occurred. --->indicator

27._________ is/are the method(s) for activities. --->Cancel and start activities

28.The start method contains ______ methods. --->3

29.__________ components help in connecting one part of automation to another.


--->Label/Jump

30.___________ is defined as an attribute of interrogated control. --->Property

31.To create a window based application, which adapter should be chosen? --->windows
adapter(wrong)

32.In Pega, a solution may contain multiple projects. --->true

33.While editing automation, you can open the playback file. --->false

34.Renaming the interrogated control can be done in _______ tool window. --->Object
Explorer(wrong)

35.__________ does not have any parent case. --->Top-level

36.__________ animates the automation activities in runtime log files. --->Automation playback

37.For loop uses ______ as a counter to iterate through the logic. --->index

38.The dependency between the parent and child steps can be created using _____. --->Wait
step

39.Data can be modified in all child cases. --->true

40.You can start debugging by using the _________ key. --->f5

Microservices Architecture(in Microservices)


1.The decomposition of Microservices is based on two categories, namely ________ --->Business
Opportunity and Technology(wrong) ,,, Technology Capability and Subdomain(wrong)

2.Agile development & deployment is difficult in case of __________________ --->Monolithic

3.Simple to develop, test, deploy and scale represents __________________ --->Monolithic

4.Software built as microservices can, by definition, be broken down into multiple component
services. --->true

5.Microservice is considered as a subset of SOA. --->true

6.Microservice Architecture adapts which of the following concept(s)? --->All the options

7.The client expects a timely response from the service and might even block while it waits. This
represents the _________ client service interaction style. --->Synchronous

8.Which ensures to insulate the applications by acting as a barrier? --->API Gateway

9.Scenarios where the client takes the onus and is responsible for determining the network
locations of the available service instances is _________ --->Client-side discovery

10.The two types of Service Discovery includes Client-side discovery and server-side discovery.
--->true

11.The two components of CQRS include_______________ --->Query and command side

12.Microservices supports different kinds of databases and this is called ____________.


--->Polyglot persistence

13.The transactions that span across multiple services are handled by ___________ --->Event
driven Architecture

14.Which of these is a drawback of Multiple Services per Host pattern? --->Difficult to limit
resource utilization(wrong)

15.Packer.io and Boxful represent ______________ type of pattern. --->Service Instance per Host

16.Service Instance per Host pattern provides ________________ --->ALL the options

17.Caching helps in improving the performance of the system. --->true

18.Microservice Chassis takes care of the following, except ______________ --->Token


generation

19.Which pattern collects and reports all exceptions to a centralized exception tracking service?
--->Exception tracing

20.The following are all caching types, except ___________ --->Local & Remote Cache (wrong)
21._____________ helps to control and limit the number of consecutive request failures that
cross a threshold. --->Circuit breaker

22.Netflix OSS is an example of ____________ --->Client-side discovery

23.IDL stands for ______________________ --->Interface Definition Language

24.Functional Decomposition is an example of ____________ --->Microservices

25.External clients communicate with Microservices using _____________ --->API Gateway

26.Amazon EC2 Container Service is an example of ________________ --->Docker

27.The 3Cs of Microservices include the following, except ______________ --->Control

28.The benefits of Microservices include ___________ --->All the options

29.Microservices-based architecture prefers _______ --->No dependency on any particular DB

30.Microservices-based architecture enforces a Modular structure. --->true

31.__________ is the ability to store something temporarily to reduce the loading times, and I/O
of a system. --->Cache

Ionic Framework(in Modern Web Development)


1. Which of the following files contains all the required JS files for Ionic and Angular?
--->ionic.bundle.min.js

2.Which of the following files has the Ionic styles? --->ionic.css

3.The following are in-built Ionic templates, except __________ --->navigation

4.The following statements are true about Ionic framework, except _____________ --->It is built
on top of Cascading, Scalding, C++ and Node.js

5.Which of the following includes device APIs that allow accessing native device features like
camera or maps? --->Cordova

6.Which of the following classes can be used to group a set of items in a list? --->item-divider

7.Which of the following tags displays a button with rounded corners? --->both the options

8.Which of the following classes can be used to create a button that occupies the entire width of
the screen? --->button-block

9.Cards can contain ____. ---> All the option


10.In a responsive Grid, which class breaks the row of columns when the window size is smaller
than the portrait tablet? --->responsive-md

11.Ionic Grid system is responsive by default. --->true

12.Which of the following components uses "CSS Flexible Box Layout"? --->Grid

13.Which of the following classes define(s) the footer? --->bar-footer

14.Which of the following is a content pane that can go over the user’s main view temporarily?
--->Modal

15.What is the ionic directive that can be used for creating a tab bar? --->ion-tabs

16.Which of the following interaction modes can be enabled by using ionList and ionItem
directives? --->All

17.Which of the following directives can be used to enable the "pull to refresh" functionality?
--->ion-refresher

18.Which of the following components is a multi-page container where each page can be swiped
or dragged between? --->ion-slides

19.CLI is an extension of _________. --->Node.js

20.What is the command for running an app in iOS emulator? --->ionic emulate ios

21.In Ionic CLI, which of the following commands can be used to automatically monitor changes
in the file system? --->ionic serve

22.Components in Ionic by default have both padding of __________ --->10 pixels(wrong)

23.Which of the following is a slide-up pane that lets the user choose from a set of options?
--->Action Sheet

24.Which of the following is the place to check for community contributed Ionic Components?
--->Ionic Market

25.Which of the following directives can help in using Ionic custom Scroll View, or the built-in
overflow scrolling of the browser? --->ion-content

26.Which of the following CSS components are best to create a News App that displays a picture
and a caption with short description? --->cards

27.Which of the following offers AngularJS wrappers for the most popular Cordova plugins?
--->ngCordova

28.Which CSS component is ideal for creating top navigation for a mobile app? --->tabs
Caching Techniques(in Microservices)
1.A cache is a ______________. --->Small and fast memory

2.Which type of caching can be used to cache the contest registration page in a website, to
reduce the time taken to serve the page for the users? --->Application Cache

3.In which type of cache does the application directly interacts with database for data that is not
available in the cache? --->Cache-aside

4.In which type of cache does the application treats cache as the main data store, reads data
from it and writes data to it? (I) Read Through/Write Through Cache (II) Cache-aside --->I

5.Line size in a cache is recommended to be a power of 2. --->true

6.Which of the following Cache Eviction techniques consider Locality? --->Least Recently Used

7.When a computer processor does not get a data item that it requires in the cache, it is known
as _________. --->Cache Hit

8.Which type of cache is recommended to store user preferences for an application with several
100s of concurrent users? --->On Demand Cache

9..A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight
32-bit words. How many bits are required for block offset, assuming a 32-bit address? --->5

10.Which of the following is true about a well-designed cache? --->Hit Rate > Miss Rate

11.Which Caching Topology is recommended for a read intensive distributed application?


--->Replicated

12.Which type of cache reference locality aims at designing cache to store the entire block near
the Recently Referenced Data? (I) Temporal Locality (II) Spatial Locality --->II

13.The Caching Technique where the cache is populated the first time a particular piece of data
is requested is called _________. --->Lazy Loading

14.A web page displays ten items per page and has pagination enabled. What would be the
recommended way to enable efficient paging? --->Use Spatial Cache

15.Which type of cache reference locality aims at designing cache to store Recently Referenced
Data assuming that the same data will be requested frequently? --->Temporal Locality

16.Cache Performance or Average Memory Access Time (AMAT) depends on which of the
following? --->All the options

17.While using a Write Back cache, which of the following policies needs to be abided? --->Write
Allocate

18.Which would be the best place to cache DNS data? --->Proxy

19.For a cache look up to be a Hit, which of the following must be true? --->Tag==Block Number
and Valid Bit = 1

DevOps Culture(in Digital Foundation)


1.Understanding what we are deploying and how we are deploying comes under which practice
of DevOps? --->Configuration Management

2.____________ is the primary measure of progress according to Agile Manifesto. --->Working


Software

3.DevOps encompasses culture and collaboration. --->true

4.Which of the following is a value of DevOps? --->DevOps goals span the entire delivery pipeline

5.DevOps is the union of ___________, ____________ and _________ to enable continuous


delivery of value to end users. --->People, Processes and Products

6.The following are benefits of automation in DevOps, except it _________ --->Implants Manual
Errors

7.What is the desire in the organization to push things to production termed as? --->Live Site
Culture

8.Minimizing conflicts when merging code should be one of your goals while performing
branching. --->true

9.During the Continuous Integration process, unit tests are executed during the build. --->true

10._____________ ensures that the code deployed to the production environment is not
necessarily released to all end users. --->Feature Flag

11.Continuous Delivery encourages configuration as code. --->true

12._____________ is a software engineering approach in which teams produce software in short


cycles, ensuring that the software can be reliably released at any time. --->Continuous Delivery

13.Continuous Delivery focuses on manual delivery pipeline. --->false


14.It is acceptable if all the environments are not consistent in a DevOps lifecycle. --->false

15.______________ testing tests components together in scenarios. --->Integration

16.In Manual Integration testing, Human Intelligence is waged against the application. --->true

17._____________ is the automated system used for continuous integration (Build Code, Create
Packages and Run Code). --->Buil pipeline

18.DevOps is people following a _________ enabled by products to deliver value to the end
users. --->Process

19.Improving the quality and performance of the applications is a major driver for switching to
DevOps. --->true

20.What is the metric used to measure how quickly we are deploying? --->Mean time to
recover(wrong)

21.What is the desire in the organization to push things to production termed as? --->Live Site
Culture

22.Product Management is one of the 7 DevOps practices. --->false

23.The following are types of monitoring, except ___________ --->program

24.It is acceptable if all the environments are not consistent in a DevOps lifecycle. --->false

Cloud Foundry(in Cloud Computing)


1._______ performs start and stop actions of an application locally in the application virtual
machine (VM). --->Diego Cell

2.______ stores longer-lived control data like component IP addresses and distributed locks.
--->Consul

3._________ directs incoming traffic to the Cloud Foundry. --->Router

4.With Platform as a Service, your infrastructure management responsibilities are greatly


reduced. --->true

5.Cloud Foundry is a ________ type of distributed services. --->Platform as a service

6.Command to list the services available to the targeted organization is ____________. --->cf
marketplace

7.Default space for PWS is____. --->development


8.Services that are selected from the marketplace catalog are known as ______. --->Managed
services

9.____ are defined as the unit of deployment in Cloud Foundry. --->Application

10.______ is the dependancy of an external appllication. --->Organization(wrong)

11.Which of the following option is used to specify push timeout in seconds? ---> -t

12.______ is a blob of metadata or a file containing metadata of a group of accompanying files.


--->Buildpacks(wrong)

13.CF_STAGING_TIMEOUT and CF_STARTUP_TIMEOUT commands are used to control stagging


and start up. --->true

14.Issue in Cloud Foundry can be _____. --->All the options

15.Which of the following command lists all the applications within a space? --->cf apps

16.What is organization in Cloud Foundry? --->A resource restriction for spaces.

17._________________ allows cloud controller to locate instances on separate zones to boost


redundancy. --->Availability Zones

18.App-Direct is ______________ provider of services. --->Commercial

19.Blobstore is a repository for the large binary file that contains _____. --->All the options

20.Command to login to Cloud Foundry is _____. --->cf login

21.Manifest files have the extension as _______. --->.XML

22.Cloud Native applications should ____________ to access local file system. --->Attempt

23.What are services in Cloud Foundry? --->Any type of add-on that can be provisioned along
side your apps.

24.Cf push command has a primary function to ____. --->Deploy application

25.Features of a Cloud Foundry Service are/is ____. --->All the option

26._______________ provides RestFul interface to domain objects. --->Cloud Controller

27.What are the two predefined environment-variables available to any application?


--->VCAP_USER and VCAP_APPLICATION

28.What is the purpose of –n option under cf push command? --->To specify the name of the
app as it appears in Cloud Foundry
29.______________ defines how to get to an application. --->Route

30.PWS has the below default app domain as_______. --->cfapps.io

31.Select the ports supported by Cloud Foundry. --->80, 443, 4443

32.What does PCF stand for____. --->Pivotal Cloud Foundry

33.Cloud Controller is responsible for the below____. --->All the options

34.Which option can be used to see the current organization and space? --->cf target

35.RTR section in the log indicates log entries for____. --->Router

36.What are three activities involved in deploying an application to Cloud Foundry? --->deploy,
push, upload

37.The URL of an application is ________________. --->Domain

38.What is the deployment blueprint for an application? --->Manifest

39.CF Router provides _______________. --->Automatic load balancing

40._____________ allows CF to support multiple language and development environments.


--->Buildpacks

41.___________________ can be used as a tool for persistent session management.


--->___________________ can be used as a tool for persistent session management.

42.Primarily Cloud Foundry is written in _____.-->All

43.What can you do if your application uses a language or framework that Cloud Foundry
buildpacks do not support? Choose all the correct options. --->all

44.Why should one go for Cloud Foundry? Select all the applicable options. --->All

45.Market place services are ___________. Choose the correct option. --->CF Managed

46.____ restricts the availability of resources to an organization. --->Quotas

47.Services should be treated as_____________. --->Manifests

48.Select all the languages for which Build Packs are available. --->Ruby and java

49.What is the route that is set for the application and deployed using the command? --->cf push
spring-music

50.What is meant by routes in Cloud Foundry? --->A resource that define routes to apps.
51.Select the valid log manager____. --->Splunk(wrong)

52.Select the invalid commands from below. --->cf stage

53.Cloud Foundry is ____________ agnostic. --->Support(wrong)

54.What is the command to check the version? --->cf --version

55.As per 12 Factor, each component in the codebase should be an APP. --->true

56.Redis is ___________ in memory database. --->Persistent

57.Application deployments are directed by _____. --->cloud controller

58.What is the command to see the logs of the application deployed to cloud foundry? --->cf logs

59.Select the responsibilities of a Service Broker --->All the options

60.____ streams application logs to developers. --->App Log Aggregator

Bitbucket(in DevOps)
1.Which stage of artifact denotes that the files are added to the index but not in Git Database?
--->staged

2.Which stage of artifact denotes that the files are stored in Git Database? --->Committed

3.Bitbucket is a web based version control. --->true

4.Which version control system allows every developer to have a complete codebase along with
the history? --->Distributed Version Control System

5.Does Bitbucket allow the user to restrict the other users from using his/her repository? --->yes

6.Bitbucket __________ automation of CI/CD pipeline --->allow

7.Which language template(s) is/are supported by Bitbucket Pipeline? --->All

8.The logical unit in Mercurial which has a group of files that are modified. --->ChangeSet

9.Bitbucket does not support IP Whitelisting. --->false

10.Version Control System helps in tracking __________ of the files. --->All

11.Bitbucket Server is provided with built-in Apache Maven. --->true

12.Bitbucket provides __________ private repositories. --->free


13.Mercurial command to view the repository history. --->hg log

14.Which of the following IDE’s has the Bitbucket feature integrated within? --->All

15.Bitbucket caters __________ private repositories. --->Response time

16.Bitbucket is integrated with __________. --->All

17.Which among the following is /are feature(s) of Bitbucket? --->true

18.Bitbucket provides __________ --->Private and Public Repository

19.Bitbucket server is a a Combination of Git and Web Interface developed in __________.


--->Java

React Native(in Mobility & Wearables)


1.The chief difference between React Native and React is ________. --->ReactJS is a Library
whereas React Native is a framework.

2.React Native does not have third-party plugin compatibility. --->false

3.It is mandatory to install Android Studio or Xcode for developing a React Native mobile
application. --->false

4.JSX is JavaScript with a syntax extension which allows a mixture between _______________
and ___________. --->JavaScript and XML tags

5._______________ are the building blocks for a React Native application. --->Component

6.AppRegistry is the JavaScript exit point to run all React Native apps. --->false

7.Please select the one which is not a React Native UI Component. --->Switch

8.Which method is called when a component is being removed from the DOM?
--->componentWillUnmount()

9.With React Native, you just style your application using _______________. --->CSS(wrong)
,,,javascript

10.How to create a new React Native project? --->$ react-native init

11..apk extension is the application file for Android whereas_______________ extension is the
application file for iOS. --->.IPA

12.The _______________ file defines some metadata for your project and, most importantly,
declares React-Native as a dependency of your project. --->package.json

13.By writing CSS in JavaScript, you are isolating styles from _______________. --->global
namespac

14.In Reactive forms, the HTML of the forms are automatically created. --->false

15._______________ captures user touch events. --->TouchableHighlight

16.To build an iOS app, you need a Mac OS, and to build an Android app you need
____________. --->Any

17.Live Reloading and Hot Loading is present in React Native Developer Tools. --->true

18.Which method retrieves automatic updates about the current location of the device?
--->Geolocation.watchPosition()

19._______________ architectural pattern causes unidirectional data flow. --->flex

20.For networking needs, React Native framework provides the fetch API. --->true

21.Which of the following option is not a React Native API? --->modal

22.React Native is like other Hybrid Apps that are actually slower than Native mobile apps.
--->true ,,, false

23.React Native is known as ‘learn once, write anywhere’. --->true

24.Which command do you have to run for installing React Native? --->npm install -g react-
native-cli

25.How do you create a new React Native project? --->$ react-native init

26.What type of data does a ListView take? --->array(wrong)

27.React Native supports DOM and Virtual DOM concept. --->false

28.In React Native, Geolocation API is available through the _______________ global, so you do
not need to import it. --->navigator.geolocation

29.One of the benefits of React Native vs. Native Development is that React Native has the live
reload ability. --->true

30.You can use any CSS in the styles of the React Native StyleSheet object. --->true

31.FormsModule is imported from @angular/_______ in Model Driven Form. --->form(wrong)

32.Which Objective C file can be used to switch the React Native bundle location in bundle.cc?
--->AppDelegate.m
Redis(in Microservices)
1.Which configuration setting specifies the file to which the RDB snapshot dump is saved?
--->dbfilename

2.When using Pipelining, will the additional memory used be high? --->very less(wrong)

3.redis.conf is configured for changing ____________ to connect to the Redis server. --->port

4.Redis provides multi-state architecture during replication, where every instance can both read
and write. --->false

5.The _________ command is used to remove the expiration from a key. --->Persist

6.Which of the following does the Redis Hashes store --->Key value pair

7._______ sets the key to expire within the given number of seconds. --->EXPIRE

8._______ returns an array of values. --->HGET

9.Which of the following commands returns the remaining time for the key to expire? --->TTL

10._____________ is a type of lock that allows you to limit the number of processes that can
concurrently access a resource to some fixed number. --->Optimistic locking(wrong)

11.In a Redis transaction, we can use ________ command to enter into the transaction and
queue the transaction commands instead of executing them. --->Multi

12.Which among the following factors helps in calculating the number of shards in Redis?
--->Number of keys in a single shard

13.Which of the following commands is used to post the message to the channel? --->PUBLISH

14.Which is the short structure that Redis provides for the compact representation of Sets?
--->inset

15._________ is required in the distributed backend systems where cache state needs to be
maintained uniformly across the systems. --->Centralized cache

16._________ is an implementation of partitioning where you can send your query to a random
instance, and the instance will forward your query to the right node. --->Query routing

17.Consider an example where a range of users from 0 to 10000 goes to a Redis instance R0, and
another range of users 10001 to 20000 goes to R1. This is _________ partitioning. --->

Range partitioning
18.Which among the following is a benefit of Pipelining? --->speed

19.The configuration setting in redis.conf that could be configured to the number of samples of
keys to be checked, to evict keys with the oldest access time is ________ --->maxmemory-policy

20._________ is the technique of breaking down data into multiple parts. --->Sharding

21.In a key-value pair, _________ is represented by a string. --->Value(wrong)

22. is used for failover process when a master is not working, promoting the slave to master.
--->Quorum(wrong)

23.The ____________ command is used to set a lock in string dataset. --->SET

24.In-Memory database stores data in the memory. --->true

25._________ is the memory policy that returns errors when the memory limit is reached, and
the client is trying to execute commands that result in higher memory usage. --->noeviction

26.____________ command provides a check-and-set behavior to Redis commands. --->WATCH

27._________ is the configuration setting that tells the maximum number of items allowed in a
Hash table for ziplist encoding. --->hash-max-ziplist-entries

28.Redis string cannot hold any value beyond a certain length. What is it? --->512MB

29._________ refers to an undesirable state when a system attempts to perform two or more
operations, which should, otherwise, be done in a proper sequence to be executed correctly.
--->Race condition

30.In Redis context, senders are named as _________ and receivers are named as Subscribers.
--->Publishers

31.How many commands can be sent to a server in pipelining? --->single

32.____________ is the number of sentinels that need to agree to the fact that the master is not
reachable and make a failover procedure promoting the slave to the master. --->Quorum

33.Redis provides the output of all commands in ____________. --->A single step

34.Which is the mechanism to enforce limits on the access of a resource when multiple threads
are executed? --->locking

35.____________ is the memory eviction policy where keys are evicted by removing the less
recently used keys first but only among keys that have an 'expire' field set, to make space for the
newly added data. --->Volatile-lru

36.The persistent server should be the _________ once the whole environment is started.
--->Master server

37.Twemproxy is a proxy developed at Twitter for Redis protocol for automatic partitioning
among multiple Redis instances and optional ejection of the node if it is not available. --->true

38._________ is/are used to store, retrieve and update data. --->Commands

39.The environment continues to work even if a slave fails. --->True

You might also like