Windows Programming

11. BITS stands for:

  1. Binary Intelligent Transfer Service
  2. Background Intelligent Transfer Service
  3. Background Integrated Transfer Service
  4. Binary Integrated Text Service

Correct answer: (B)
Background Intelligent Transfer Service

12. Build toolbar contains:

  1. Win32 Debug
  2. Win32 Release
  3. Both a and b
  4. None of these

Correct answer: (C)
Both a and b

13. By which program we can manipulate the access control list:

  1. Xhost
  2. Xhost+hostname
  3. Xhost-hostname
  4. None of these

Correct answer: (A)
Xhost

14. CCmdTarget is derived from:

  1. CObject
  2. CWnd
  3. CWndApp
  4. CView

Correct answer: (A)
CObject

15. CRC stands for:

  1. Cyclic Redundancy Check
  2. Cyclic Random Check
  3. Check Redundancy Cyclic
  4. Check Redundant Cyclic

Correct answer: (A)
Cyclic Redundancy Check

16. CSP contains a key that is stored in….

  1. Web Browser
  2. Text files
  3. Encrypted files
  4. Key Database

Correct answer: (D)
Key Database

17. CSP stands for:

  1. Cryptographic System Provider
  2. Cryptographic Service Providers
  3. Computer Service Provider
  4. Cryptographic Service Protocol

Correct answer: (B)
Cryptographic Service Providers

18. CWnd is derived from:

  1. CObject
  2. CCmdTarget
  3. CWndApp
  4. CView

Correct answer: (B)
CCmdTarget

19. Data integrity is used to access the

  1. Correctness of data
  2. Accuracy of data
  3. Validation of data
  4. All of these

Correct answer: (D)
All of these

20. DNS stands for:

  1. Domain Network System
  2. Domain Name System
  3. Data Name System
  4. Data Name Service

Correct answer: (B)
Domain Name System

Page 2 of 50