Solved MCQs of Visual Basic.Net set-1

0
1. Which of the following Loop structure does not supported by VB.Net?
A. Do ................ Loop
B) For ................... Next
C) Do ................ While
D) For Each ............ While

2. The _____ model does not offer a model for source code reuse.
A. COM+
B. DCOM
C. COM
D. .Net

3. _____ allow custom items of information about a program element to be stored with an assembly's metadata.
A. Properties
B. Attributes
C. Methods
D. Classes

4. The corresponding .Net FCL type for Short is ___________.
A. System.Int32
B. System.Int64
C. System.Int16
D. System.Object

5. The member "clear" of the Array class that sets a range of array elements to zero, false or null reference is a _____________ method.
A. Shared
B. Method
C. Class
D. Object

6. The ___________ method converts an OLE automation date value to a DateTime Instance.
A. Today
B. TimeOfDay
C. Now
D. FromOADate

7. The function procedures are ___________ by default.
A. public
B. private
C. protected
D. inherited

8. Every optional argument in the procedure definition must specify a _________ value which must be a constant expression.
A. constant
B. default
C. integer
D. character

9. Type casting in VB.Net is implemented by means of ____________ statement.
A. Type()
B. TypeDef()
C. Btype()
D. Ctype()

10. State whether the statement true or false.
i) Function procedures are public by default.
ii) Function procedure return values whereas sub procedures cannot return a value to the calling procedure.
A. True, True
B. True, False
C) False, True
D) False, False
                                    Answers:

What are the technical limitations of twitter accounts?

0

Technical limitations of Twitter

In order to provide the Twitter service and the ability to communicate and stay connected with others, there are some limitations on the type of content that can be published with Twitter. These limitations comply with legal requirements and technical limitations.Twitter has created some technical limitations for their users to reduce downtime and error pages. Currently the twitter has the following technical limitations.



  1. You can send direct messages up to 250 per day.
  2. You can send up to 1,000 tweets per day. The daily tweet limit further broken down into smaller limits for semi-hourly intervals.
  3. You can change your account email four per hours.
  4. You can follow others up to 1,000 per day. But you should not follow other aggressively.
  5. There are limitations on account also once an account is following 2,000 other users, additional follow attempts are limited by account specific ratios. These limits include actions from all devices, including web, mobile, phone, API, etc. API requests from all third-party applications are tracked against the hourly API limit.

You may also wanted to view the following related posts

How to prevent your twitter account from being suspended?

0

Twitter
Twitter Trying and making an effort to shield its users from spam and abuse. Technical abuse and user abuse isn't tolerated on Twitter.com, and can lead to permanent suspension. So you should know how to prevent your twitter account from being suspended.

     I have written here some important tips you should not do for preventing your twitter account from being suspended.
  1. You should not create serial accounts for disruptive or abusive purposes, or with overlapping use cases. Mass account creation may result in suspension of all related accounts.

  2. You should not create accounts for the purpose of preventing others from using those account names.
  3. You should not buy or sell Twitter usernames.
  4. You should not publish or link to malicious content intended to damage or disrupt another user’s browser or computer or to compromise a user’s privacy.
  5. You should not follow a large amount of users in a short amount of time.
  6. You should not follow and unfollow people in a short time period, particularly by automated means.
  7. You should have a small number of followers compared to the amount of people you are following.
  8. Your update should not consist of only links; you should also have personal updates.
  9. You should not post duplicate content over multiple accounts or multiple duplicate updates on one account.
  10. You should not post multiple unrelated updates to a topic using #.
  11. You should not send large numbers of duplicate @replies or mentions.
  12. You should not add a large number of unrelated users to lists in an attempt to spam a service or link.
  13. You should not repeatedly post other users' Tweets as your own.
  14. You should not create or purchase accounts in order to gain followers.
  15. You should not use obscene or pornographic images in your profile photo, header photo, or user background.

You may also wanted to view the following related posts


MCQ of Database Management System(DBMS) with answer set-7

0

1. Processed data is called ………………..

A) Raw data

B) Information

C) Useful data

D) Source


2. …………….. is a utility to capture a continuous record of server activity and provide auditing capability.

A) SQL server Profile

B) SQL server service manager

C) SQL server setup

D) SQL server wizard.


3. Data items grouped together for storage purposes are called a

A) record

B) title

C) list

D) string


4. …………. contains data assisting day to day activities of the organization.

A) Control database

B) Operational database

C) Strategic database

D) Sequential database


5. ………………… approach reduces time and effort required for design and lesser risk in database management.

A) Single global database

B) Top-down approach

C) Multiple databases

D) None of the above


6. HSAM stands for ……….

A) Hierarchic Sequential Access Method

B) Hierarchic Standard Access Method

C) Hierarchic Sequential and Method

D) Hierarchic Standard and Method


7. SQL server stores index information in the ………… system table

A) syst indexes

B) system indexes

C) sysind

D) sys indexes


8. The one guideline to be followed while designing the database is

A) A database design may be ambiguous.

B) Unrelated data should be in the same table so that updating the data will be easy.

C) It should avoid/reduce the redundancy.

D) An entity should not have attributes.


9. Which of the following is not a logical database structure?

A) Chain

B) Network

C) Tree

D) Relational


10. ……………. is a preferred method for enforcing data integrity

A) Constraints

B) Stored procedure

C) Triggers

D) Cursors


Answers:

1. B) Information
2. B) SQL server service manager
3. A) record
4. B) Operational database
5. C) Multiple databases
6. A) Hierarchic Sequential Access Method
7. D) sys indexes
8. C) It should avoid/reduce the redundancy.
9. A) Chain
10. A) Constraints



List of bad ways for building backlinks

0
List of bad ways for building backlinks
Since they are fastest ways for making huge amount of backlinks for their websites or blogs, some link building methods which you are using currently for promoting your website to increase the PageRank and Traffic may harm your website or blog instead of getting high PR and Traffic. I have presented here some bad ways of building backlinks which may get your site banned, penalized, and filtered from major search engine or both. 

1. Submitting your site to 100's of paid directories which send no traffic and sell off topic. 

2. As a new member, asking same questions at many forums on the same day.

3. Asking and answering the questions by making different accounts form same IP address. 

4. Signing up blogs with spammy keywords to comment on blogs. 

5. Using automated bots for blog commenting. 

6. Making unnecessary and unrelated links while commenting others blog. 

7. Sending huge link exchange emails which look like an automated bot sent them. 

8. Signing up for profiles on forums you never intended coming again there. 

9. Exchanging links on huge amount sites and placing their unrelated links on your site.

You may also wanted to view the following related posts

List of good ways of building quality backlinks

0
 It is well known fact that quality backlinks helps to increase the page ranks as well as increase the traffic for any websites or blogs. But creating quality backlinks is not easy tasks for anyone who doesn't have good knowledge about that. I have listed here some good ways to get quality backlinks for your site of blog.                                                                                 
  1. Create twitter account, facebook page and pages on the top Social Networking Site for your site.
  2. Submit your site to Dmoz and other directories that allows free submissions.
  3. Ask questions or answer questions on Yahoo Answers and provide links to suitable topics.
  4. Ask questions or answer questions of Google Groups and provide links to suitable topics.
  5. Submit article at article sites like EzineArticles, GoArticles, iSnare etc. The great thing about good article sites is that their article pages actually rank highly and send highly qualified traffic.
  6. Submit a story to Digg that links to an article on your site.
  7. Publish RSS feed and your content is useful and regularly updated.
  8. Create a profile for forums and give profile link and submit links by giving your answer on suitable topics.
  9. Link to other blogs from your blog. Many bloggers also track who is linking to them or where their traffic comes from, so linking to them is an easy to get noticed and they also links to you.
  10. Comment on other blogs. If your comments are useful and relevant they can drive the direct traffic.
  11. Technorati tag pages rank well in Yahoo and MSN. Even if your blog is fairly new you can have your posts featured on the Technorati tag pages by tagging your posts with relevant tags.
  12. Depending on your sites category and offer, submit your link to classified service.
  13. Backlink on .edu and .gov sites much valuable than others, so try to list your site on your local government business directory. There are so many wordpress blogs of .edu and .gov, post relevant comments on them.
  14. Exchange links to related sites on a small scale that will send you traffic.
  15. Create and release open source site design templates for Content Management System(CMS) like Wordpress, blogger with designed by link on the footer.
If you know some other than listed above you are welcomed to post that on the comment session. 

You may also wanted to view the following related posts


Solved MCQ for Computer Officer Exam part-1

0

1. Firewalls are used to protect against.
A) Unauthorized Attacks
B) External resources
C) Data Driven Attacks
D) Fire Attacks

2. A gigabyte represents
A) 1 billion bytes
B) 1000 kilobytes
C) 230 bytes
D) 1024 bytes

3. Personal computers use number of chips mounted on a main circuit board. What is the common name for such boards?
A) Daughter board
B) Mother board
C) Father board
D) Bread board

4.  In analog computer
A) Input is first converted to digital form
B) Input is never converted to digital form
C) Output is displayed in digital form
D) All of the above

5. Computer follows a simple principle called GIGO which means.
A) Garbage input good output
B) Garbage in garbage out
C) Great instructions great output
D) Good input good output

6. A data Structure where elements can be added or removed at either end but not in the middle.
A) Linked list
B) Stacks
C) Queues
D) Deque

7. Which of the following sorting algorithm is of divide and conquer type?
A) Bubble sort
B) Insertion sort
C) Quick sort
D) None of the above

8. A variable P is called pointer if
A) P contains the address of an element in DATA
B) P points to the address of first element in DATA
C) P can store only memory addresses
D) P contain the DATA and the address of DATA

9. Binary search algorithm cannot be applied to
A) Sorted linked list
B) Sorted binary trees
C) Sorted linear array
D) Pointer array

10. The time factor when determining the efficiency of algorithm is measured by
A) Counting microsecond's
B) Counting the number of key operations
C) Counting the number of statements                
D) Counting the kilobytes of algorithm
  
Answers:
1.       A) Unauthorized Attacks
2.       A) 1 billion bytes
3.       B) Mother board
4.       B) Input .... digital form
5.       B) Garbage in gar.. out
6.       D) Deque
7.       C) Quick sort
8.       A) P contains.addr .. DATA
9.       D) Pointer array
10.   A) Counting microsecond's

You may also wanted to view the following related posts

For other more Multiple Choice Questions (MCQs): Click Here

يتم التشغيل بواسطة Blogger.