0

platforms and products Online Quiz - 74

Description: platforms and products Online Quiz - 74
Number of Questions: 20
Created by:
Tags: platforms and products
Attempted 0/20 Correct 0 Score 0

Silverlight enables you to customize controls in several ways. Select the option that is not applicable to control customization in Silverlight.

  1. ContentTemplate

  2. Styles

  3. CSS

  4. ControlTemplate


Correct Option: C
  1. It is a cross-browser, cross-platform technology

  2. It runs on Microsoft Windows, Apple Mac OS X and Linux

  3. Streams audio/audio and scales video quality from mobile devices to 720p HDTV video modes

  4. Supports Web browsers, including Internet Explorer, Mozilla Firefox, Safari


Correct Option: B

Which of the following is not installed by Silverlight 3 Tools for Visual Studio 2008

  1. Silverlight SDK

  2. XAMLPad

  3. Silverlight developer runtime

  4. Silverlight Tools


Correct Option: B

Which of the following is not a Silverlight tool?

  1. XamlPadX

  2. Visual C# 2008 Expression Edition

  3. Expression Blend

  4. Visual Web Developer 2008 Express Edition


Correct Option: B

Following Silverlight code will work. My button content

  1. True

  2. False


Correct Option: B

Pick the odd man out from different types of Brushes available in Silverlight to paint a surafce.

  1. LinearGradientBrush

  2. VideoBrush

  3. ImageBrush

  4. RadialGradientBrush


Correct Option: B

Which of the following is used for enabling cross-domain connectivity for Silverlight applications to access network resources?

  1. crossdomain.xml

  2. Web.config

  3. App.xaml

  4. clientaccesspolicy.xml


Correct Option: D

Which of the following is not installed by Silverlight 3 Tools for Visual Studio 2008?

  1. Silverlight SDK

  2. XAMLPad

  3. Silverlight developer runtime

  4. Silverlight Tools


Correct Option: B
  1. Deep Zoom uses multi-resolution images to achieve a high frame-rate and fast open experience for images

  2. On the initial load, Deep Zoom takes a bit more time to load image data for large images

  3. Deep Zoom uses spring animations, which gives users the impression of a smooth movement (pan or zoom) around image

  4. A Deep Zoom image is typically composed of 256x256 size tiles of JPEG or PNG images at different resolutions that make up an image pyramid


Correct Option: B
  1. .xap file is a Silverlight-based application package (.xap) that is generated when the Silverlight project is built

  2. .xap file is encrypted for security and we can not view its contents

  3. .xap file includes AppManifest.xaml, compiled output assembly of the Silverlight project (.dll) and any other resource files referred by the Silverlight application

  4. Web pages like .aspx files and .html files use the Silverlight components by loading the .xap files using the tag in the HTML or by using tag in the ASP.NET pages


Correct Option: B

Which of the following is not true about Isolated storage in Silverlight?

  1. In Silverlight, all I/O operations are restricted to isolated storage and Silverlight applications have no direct access to the file system on client computer

  2. You can use isolated storage in Silverlight to store application settings, which are per-application, per-computer, and per-user settings

  3. Any kind of data can be saved in the isolated store

  4. The default space allocated for isolated storage in 1 MB which can not be increased further


Correct Option: D

Which of the following statements is not correct about security in Silverlight?

  1. Silverlight applications operate within a security boundary that is called a sandbox

  2. The Silverlight application runs in the same security context that of the HTML page that hosts the Silverlight plug-in

  3. Silverlight applications cannot access the file system and other system resources

  4. Silverlight code has three security levels: Transparent, SafeCritical and Critical


Correct Option: B

AI Explanation

To answer this question, let's go through each option to understand why it is correct or incorrect:

Option A) Silverlight applications operate within a security boundary that is called a sandbox - This option is correct. Silverlight applications are executed within a sandbox that restricts their access to system resources and limits their capabilities.

Option B) The Silverlight application runs in the same security context as the HTML page that hosts the Silverlight plug-in - This option is incorrect. The Silverlight application runs in a separate security context from the HTML page that hosts it. This separation ensures that the Silverlight application's actions are controlled and isolated from the hosting web page.

Option C) Silverlight applications cannot access the file system and other system resources - This option is correct. By default, Silverlight applications are not allowed to access the file system or other system resources directly. They can only access resources through specific APIs provided by the Silverlight framework.

Option D) Silverlight code has three security levels: Transparent, SafeCritical, and Critical - This option is correct. Silverlight code is categorized into three security levels: Transparent, SafeCritical, and Critical. These levels determine the permissions and access capabilities of the code within the Silverlight application.

The correct answer is B. This option is incorrect because the Silverlight application runs in a separate security context from the HTML page that hosts it.

  1. Professional Virtual Configuration Server

  2. Professional Virtual Configuration System

  3. Polytron Version Configuration System

  4. Polytron Version Control System

  5. Pioneer Version compact system

  6. Pioneer vitrual configuration system


Correct Option: D

KeyChange() is generated from stage

  1. Sort

  2. Change Apply

  3. Change Capture

  4. Transformer


Correct Option: A

Project can be added through

  1. Administrator

  2. Web console

  3. Directly creating a folder under projects default location

  4. Director


Correct Option: A,C
  1. Director

  2. Administrator

  3. Web Console

  4. While Installing


Correct Option: C

In which stage, constraint name = linkname.constraint name

  1. Filter

  2. Modify

  3. Transformer

  4. Aggregator


Correct Option: C

If any value is coming as null and is rejected in a sequential file for which NullFieldValue is not assigned then job will abort

  1. True

  2. False


Correct Option: B

Which stages support reject links

  1. Dataset

  2. Sequential file

  3. Filter

  4. Oracle Enterprise Stage

  5. Transformer

  6. Modify


Correct Option: B,C,D,E
- Hide questions