Sunday, 25 March 2012

Test No : 04 -Remoting ,Webservices

.Net Framework and C# Basics - Test No : 01 

 Test Number:2 Topics :Assembly, Event, Delegates_exceptions

.NET Remoting is a technology for communication between different____________.
a) Assemblies
b) Applications
c) Threads
d) Application Domains

You can use some helper classes from the ___________ namespace that make it easier to deal with
 protocols, IP addresses, and port numbers.
a) System.Web.services
b) System.Sockets
c) System.Net
d) System.Web

An object that should be called remotely from a different system must be derived from
a)RemotingServices
b)MarshalByRefObject.
c)Remoting.Proxies.RealProxy
d)Remote Object

For the client, the ---------------------------- looks like the remote object.
a) transparent proxy
b) Real Proxy
c) transparent proxy and Real Proxy

With _________ you have a tight coupling between client and server, because the
same object types are shared.
a) XML webservices
b) windows service
c) .net remoting
d) All of the above

_____________is connection oriented,reliable protocol
a) TCP
b) IP
c) UDP
________class is used to create client which can connect to server
a)TcpClient
b)TcpClientListner
c)TcpServer

__is connectionless,unreliable protocol which has port number in the header information
a) TCP
b) IP
c) UDP
TcpListner class constructor takes _________ and ________as arguments
a)IPAddress and port Number
b)ServerName and port Number
c)IPAddress and serverName

.NET Remoting is designed for .NET applications on both sides. If you want to have interoperability, use ________ instead.
a) Webservices
b) windows service
c) net remoting
d) All of the above

You can use.NET Remoting for building a ______________.
a)  console,  Windows application
b) Windows Service
c) a COM+ component
d) All of the above

_________extends the CLR object functionality across the network,which deals with activation,
distributed identities, lifetimes, and call contexts.
a) Webservices
b) windows service
c) Net remoting
d) website

The Invoke() method  uses the ------------------to pass the message to the channel.
a) message sink
b) transparent proxy
c) Formatter

__________can be used for accessing objects in another application domain also can always be
 used whether the two objects live inside a single process, in separate processes, or on separate systems.
a) Webservice
b) Website
c) .net remoting
d) Windows service

The _________ is a representative of the remote object in the client process, used by the client
 application to call methods.
a) remote application
b) remote assembly
c) proxy
d) object

When the client calls a method in the proxy, the proxy sends a message into the channel that is
 passed on to the_________.
a) remote application
b) remote assembly
c) proxy
d) remote object

With .NET_________is the new safety boundary inside a process, because the MSIL code is
type-safe and verifiable.
a) Assemblies
b) Applications
c) Threads
d) Application Domains

Objects inside the same application domain can interact directly, a________is needed to access
objects in a different application domain.
a) remote application
b) remote assembly
c) proxy
d) interoperatibilty


___________are sent into the channel they are created for communication between the client and
 the server. These hold the information about the remote object, the method name called,
and all of the arguments.
a) Messages
b) Objects
c) Methods
d) None of the above

The formatter defines how messages are transferred into the channel. .NET 2.0 has __________ formatters.
a) Soap
b) Binary
c) Custom (our own format)
d) All of the above

A formatter provider is used to associate a formatter with  ________. By creating a channel,
 you can specify the formatter provider to be used, and this in turn defines the formatter that
 is used to transfer the data.
a) Object
b) Channel
c) Domain
d) formatter

A _________ is an interceptor object. Interceptors are used on both the client and the server.
a) MessageSink
b) formatter
c) formatter provider
d) proxy

Two types of proxies are ______ and _______proxy.
a) actual and temporary
b) real and temporary
c) real and transparent
d) actual and transparent

The client can use ________ to create a remote object on the server or to get a proxy of a
server-activated object.
a) formatter provider
b) Message Sink
c) Activator
d) Deactivator

The channel receives the formatted messages from the client and uses the formatter to
 unmarshal the SOAP or binary data into messages. Then the channel calls ________ sinks.
a) Envoy sinks
b) Server-context sinks
c) Security sinks
d) None of the above
A __________ is a boundary containing a collection of objects.
a) Sink
b) Activater
c) Context
d) Domain
A remote object has ___________,because of this, a reference to the object can be passed to
other clients, and they will still access the same object.
a) common Identity
b) same identity
c) distributed identity
d) None of the above

Clients can use and create a remote Activator class. You can get a proxy to a server-activated
 or well- known remote object by using the _________ method.
a) GetClient()
b) GetObject()
c) CreateInstance()
d) GetRefrence()


Using______ you can send messages across the network,also you get platform independence.
a) XML webservices
b) windows service
c) net remoting
d) All of the above

The transparent proxy looks like the ________, it implements all public methods of the remote
 object.These methods just call the Invoke() method of the RealProxy, where a message
 containing the method to call is passed. The real proxy sends the message to the channel
with the help of message sinks.
a) remote application
b) remote assembly
c) proxy
d) remote object

__________ classes are serialized through the channel. Classes that should be marshaled
must be marked with the [Serializable] attribute.
a) Marshal-by-value classes
b) Marshal-by-reference
c) Not-remotable
d) None of the above

With .NET 2.0 you get HTTP, TCP, and IPC channels represented by the classes ________ respectively
a) HttpChannel
b) TcpChannel
c) IpcChannel
d) All of the above

___________classes do have a remote identity. The objects are not passed across the wire,
 but a proxy is returned instead.
a) Marshal-by-value classes
b) Marshal-by-reference
c) Not-remotable
d) None of the above

The ____________ method returns a proxy to a client-activated remote object.
a) GetClient()
b) GetObject()
c) CreateInstance()
d) GetRefrence()
A _________ is an interceptor for a method call. With a message sink, method calls can be intercepted
a) MessageSink
b) formatter
c) formatter provider
d) proxy

No comments :