50 TOP Real Time Web Development multiple choice questions and answers PDF

Read the most frequently asked 50 top Web Development multiple choice questions and answers PDF for freshers and experienced

Web Development Objective type Questions and Answers List


<a href=
Web Development” width=”300″ height=”214″ class=”size-medium wp-image-2962″ /> Web Development

1. You work as a Web developer for xyzcompany.com. You need to implement a page event that fires after the event-handling process.
Which page event should you use?
A. The Load Complete event would be raised.
B. The Trace.axd event would be raised.
C. The On End event would be raised.
D. The Init Complete event would be raised.
Answer: A

2. You work for a Web solution development company named xyzcompany.com. You need to identify the usable modes of an application pool. Which of the modes should you identify? (Choose two)
A. Application Pools provides SQL Server mode.
B. Application Pools provides Classic mode.
C. Application Pools provides SQL Server mode.
D. Application Pools provides State Server mode.
E. Application Pools provides Integrated mode.
Answer: B,E

3. Which of the following statements regarding the utilization of client-side scripting are TRUE?
A. Client-side scripting refers to scripts executed on the Web browser instead of the Web server.
B. Client-side scripting refers to scripts executed on the server on behalf of the client.
C. Client-side scripting refers to scripts executed on the SQL Server by the Web Server.
D. Client-side scripting refers to scripts executed on the Web server by the Client Server.
Answer: A

4. You work for a Web solution development company named xyzcompany.com. You need to identify the internal, external style sheet part utilized for retrieving element sets of a document.
Which of the options below may be utilized to locate elements?
A. You should consider utilization of the DataBinder class.
B. You should consider utilization of a Selector.
C. You should consider utilization of a DataReader.
D. You should consider utilization of the Java Virtual Machine
Answer: B

5. You work for a Web solution development company named xyzcompany.com. You need to identify the methodology utilized to for specification of values and properties bound to controls for using custom values for update, delete and insertion of data.
Which features should be considered for the application?
A. You should consider utilization of Data binding syntax.
B. You should consider utilization of a Selector.
C. You should consider utilization of an IFrame.
D. You should consider utilization of the DataBinder class.
Answer: A

6. You work for a Web solution development company named xyzcompany.com. You need to identify the state utilized by applications when Web Servers are utilized to store information the website visitor views.
Which state would be utilized server-side?
A. You should consider utilization of the Application state.
B. You should consider utilization of the DataReader object.
C. You should consider utilization of the DataBinder class.
D. You should consider utilization of the System state.
Answer: A

7. You work for a Web solution development company named xyzcompany.com. You need to identify the lightweight object utilized by developers for allowing read-only access to information the website visitor accesses.
Which of the lightweight objects listed below should be utilized by the application?
A. You should consider utilization of the view state and Frames.
B. You should consider utilization of the Data Binder class
C. You should consider utilization of the Template Control class.
D. You should consider utilization of the Data Reader.
Answer: D

8. You work for a Web solution development company named xyzcompany.com. You need to identify the source which allows Web applications to share programming logic and abilities when using the Internet. Which of the options should be utilized?
A. The Microsoft Management Console (MMC)’s Computer Management snap-in.
B. The Microsoft Management Console (MMC)’s Services snap-in.
C. The Web service.
D. The Microsoft Management Console (MMC)’s Disk Management snap-in.
Answer: C

9. You work for a Web solution development company named xyzcompany.com. You need to identify the methodology utilized by a Web browser when cookies are read and information is retrieved.
Which of the methods should be considered?
A. You should consider utilization of Global. sax file.
B. You should consider utilization of the services snap-in of Microsoft Management Console (MMC).
C. You should consider utilization of IIS met abase settings.
D. You should consider utilization of the Request object.
Answer: D

10. Which of the following statements regarding the advantages gained by utilizing Windows authentication are TRUE?
A. Windows authentication can be utilized with IIS authentication which does not require extra developer effort for writing code and the credentials are never passed over the wire of the connection.
B. Utilization of Windows authentication passes the credentials over the connection utilized.
C. Utilization of Windows authentication allows utilization of the HttpContext Response object.
D. Utilization of Windows authentication allows utilization of the HttpContext Request object.
Answer: A

11. You work for a Web solution development company named xyzcompany.com. You need to identify the file type utilized for configuration settings of deployed ASP.NET applications.
Which file type should be used?
A. The settings are stored in XML files.
B. The settings are stored in Shtml files.
C. The settings are stored in the Hosts file.
D. The settings are stored in the .aspx file.
Answer: A

12. You need to implement an authentication method for the xyzcompany.com website that uses tickets to track a logged in visitor’s activity on the website.
Which of the authentication methods should be utilized?
A. You should consider utilization of Forms authentication.
B. You should consider utilization of Kerberos authentication.
C. You should consider utilization of the EAP protocol.
D. You should consider utilization of Integrated Windows authentication.
Answer: A

13. You work for a Web solution development company named xyzcompany.com. You need to develop a strategy to facilitate the creation of Common Language Runtime (CLR) programmed user-defined functions for Web applications.
Which deployment methodology should be considered?

A. You should consider utilization of the DataBinder class.
B. You should consider utilization of an Assembly.
C. You should consider utilization of a DataReader.
D. You should consider utilizing the TemplateControl class.
Answer: B

14. You work for a Web solution development company named xyzcompany.com. xyzcompany.com recently instructed you to develop an ASP.NET Web application which runs on a Network Load Balancing (NLB) cluster and utilizes .NET framework.
During the course of bug testing you discover certain configuration settings applied causes unexpected termination of the application. You are required to determine which settings fire the unexpected termination of the application.
Which of the administrative actions should be taken?

A. You should consider utilization of SqlDataSources.
B. You should consider utilizing Language Integrated Queries.
C. You should consider utilization of Web controls.
D. You should consider utilizing
Answer: D

15. Which of the following statements regarding the utilization of client-side and server-side scripting operations are TRUE? (Choose ALL that apply)

A. Imagemap is utilized to invoke a cgi.bin program for server side scripts but clients don’t need the cgi.bin to function.
Additionally client-side scripts can be blocked by users but not server-side scripts.
B. Client-side scripts are computer browser specific.
C. Server side scripts are browser type specific to certain clients.
D. P
H. is utilized as a server side script and ActionScript is utilized client-side.
Answer: A,D

16. You work for a Web solution development company named xyzcompany.com. You need to identify the methodology utilized by developers for error handling events in applications.
Which administrative action should be taken?

A. You should consider utilization of a Exception handler.
B. You should consider utilizing a Data Reader.
C. You should consider utilization of the Data Binder class.
D. You should consider utilization of the Windows Event Viewer Error log.
Answer: A

17. You work for a Web solution development company named xyzcompany.com. You need to determine which page class element is utilized to determine if pages are loaded first or in response when the Page class is processed.
Which Page class property or event is responsible?

A. You should consider utilization of the IsPostBack property.
B. You should consider utilization of the LoadComplete event.
C. You should consider utilization of the PreLoad event.
D. You should consider utilization of the OnLoad event.
Answer: A

18. You work for a Web solution development company named xyzcompany.com. You need to identify the control which serves as a base class for events common to controls in the System.Web.UI.WebControls namespace.
Which control should be utilized?

A. You should consider utilization of the Web controls class.
B. You should consider utilization of the DataBinder class.
C. You should consider utilization of the TemplateControl class.
D. You should consider utilization of the DataReader object.
Answer: A

19. You work for a Web solution development company named xyzcompany.com. You need to identify the error message received below with the appropriate HTTP status code:
“Request URL Too Long” client error”
Which of the error codes below would be raised ?

A. You should consider utilizing HTTP status code 203 in the application.
B. You should consider utilizing HTTP status code 505 in the application.
C. You should consider utilizing HTTP status code 509 in the application.
D. You should consider utilizing HTTP status code 414 in the application.
Answer: D

20. You work for a Web solution development company named xyzcompany.com. You need to determine which attribute of the img HTML element would be utilized if strict XHTML compliance is essential.
Which attributes of the img tag should be utilized?

A. You should consider utilization of the class attribute.
B. You should consider utilization of the size attribute.
C. You should consider utilization of the alt attribute.
D. You should consider utilization of the src and img id attributes.
Answer: C
21. You work for a Web solution development company named xyzcompany.com. You need to identify the files which should be utilized for system wide computer and Web settings helping reduction of compilation modifications.
Which of the configuration files should be utilized? (Choose two)

A. You should consider utilization of the App.config file.
B. You should consider utilization of the Web.config file.
C. You should consider utilization of the Machine.config file.
D. You should consider utilization of the Common.config file.
E. You should consider utilization of the PolicyCache.config file.
Answer: B,C

22. You work for a Web solution development company named xyzcompany.com. You need to identify the file responsible for maintaining configuration settings of a personal computer.
Which of the configuration controls files would be utilized?

A. You should consider utilization of the App.config file.
B. You should consider utilization of the Web.config file.
C. You should consider utilization of the Machine.config file.
D. You should consider utilization of the Common.config file.
E. You should consider utilization of the PolicyCache.config file.
Answer: C

23. How would you enable debugging diagnostics and tracing on a Web application.
Which administrative action or actions enables tracing? (Choose TWO.)

A. You should consider modification of the Web.config file or create a new file in the root utilizing XML code if no Web.config file exists.You should additionally set the envled attribute to true in the trace element.
B. You should consider the addition of a trace element as a child of the system.web element after which a trace element Page Output attribute is set to true.
C. You should consider making changes to the HOSTS file of network users.
D. You should consider creating a file in the root folder utilizing XML code to implement tracing.
Answer: A,B

24. You work as an ADO.NET Application developer for an Information Technology firm named IT Consulting. You are required to implement a solution for nested components to enable website visitors to utilize scripts and services.
Which of the controls listed below can be utilized?

A. You should consider utilization of ScriptManager.Services.
B. You should consider utilization of ScriptManager.ScriptMode.
C. You should consider utilization of ScriptManager.Scripts.
D. You should consider utilization of the ScriptManagerProxy.
Answer: D

25. You work for a Web solution development company named xyzcompany.com. You need to implement a method that allows for the reutilization of existing connections to database sources upon connection requests.
Which of the processes listed below should be considered for utilization?

A. You should consider utilization of Windows Installer Patches.
B. You should consider utilization of Application pooling.
C. You should consider utilization of a Windows Installer packages.
D. You should consider utilization of Connection pooling.
Answer: D

26. You need to implement a data class solution for retrieval of information from data sources and resolving of modifications to information contained in Data Set to data source.
Which class should be utilized?

A. You should consider utilization of the Data Binder class.
B. You should consider utilization of the Web controls class.
C. You should consider utilization of the Template Control class.
D. You should consider utilization of the Data Adapter class.
Answer: D

27. Which of the configuration files are utilized by developers when programming computer specific Web settings as remoting channels and assembly bindings of ASP.NET applications?
Which configuration file should be utilized?

A. You should consider utilization of the App.config file.
B. You should consider utilization of the Global.asax file.
C. You should consider utilization of the Trace.asmx file.
D. You should consider utilization of the Machine.config file.
Answer: D

28. You work for a Web solution development company named xyzcompany.com. You need to identify the Microsoft Windows feature extension modules of Microsoft products which utilize Apache HTTP Server.
Which of the features listed below would be utilized?

A. You should consider configuration of BLOB cache.
B. You should consider utilization of a Windows Installer patches.
C. You should consider utilization of DataBinding.
D. You should consider utilization of Microsoft Internet Information Services (IIS).
Answer: D

29. You work for a Web solution development company named xyzcompany.com. xyzcompany.com hires new trainees who requested you determine which location contains reference files, schemas and discovery documents utilized by Web application.
Which of the folders listed contains the information?

A. The App_WebReferences folder.
B. The C:\Windows\Syswow64 folder.
C. The C:\Windows\System32 folder.
D. The C:\Windows\Inf folder.
Answer: A

30. You work as an ADO.NET Application developer for xyzcompany.com. xyzcompany.com wants you to identify the in-memory cache data source used for relation to other objects of the Web application.
Which of the classes listed below should be utilized?

A. You should consider utilization of the Template Control class.
B. You should consider utilization of the Dataset class.
C. You should consider utilization of the Web Controls class.
D. You should consider utilization of the Data Template class.
Answer: B
31. You work for a Web solution development company named xyzcompany.com. xyzcompany.com wants you to implement a ClickOnce deployment strategy selecting the proper media to utilize.
Which of the options below should be considered for use when deploying the application?

A. You should consider publishing the application to a network share.
B. You should consider storing the application on a removable USB disk drive.
C. You should consider publishing the application to a Web share.
D. You should consider utilizing a CD to install, Web or network share to start the application or installation of the application via Web server or network share.
Answer: D

32. Which of the following statements regarding the utilization of control state client-based methodologies are TRUE?

A. Control state client-based techniques cannot be disabled.
B. Control state client-based techniques are the most secure.
C. Control state client-based techniques require no authentication.
D. Control state client-based techniques can be disabled like the view state.
Answer: A

33. You work for a Web solution development company named xyzcompany.com. xyzcompany.com needs you to develop an application which utilizes ASP.NET web controls for connections to data sources.
Which of the options below should be utilized?
A. You should consider utilization of the DataAdapters.
B. You should consider utilization of the Web controls class.
C. You should consider utilization of the DataBinding class.
D. You should consider utilization of the TemplateControl class.
Answer: C

34. You work for a Web solution development company named xyzcompany.com. xyzcompany.com wants you to develop a ScriptManager solution for retrieving the ScriptReferenceCollection object rendered to the website visitor.
Which ScriptManager properties should be utilized?
A. The ScriptManager.Scripts property would be utilized.
B. The ScriptManager.Events property would be utilized.
C. The ScriptManager.Handler property would be utilized.
D. The ScriptManager.Solution property would be utilized.
Answer: A

35. You work for a Web solution development company named xyzcompany.com. You need to identify the event which is fired after website visitors perform Click, Textbox and dropdown box actions.
Which of the events listed below would be fired?
A. You should consider utilization of the PageOutput attribute with OnEnd in the application.
B. You should consider utilization of a DataBinding class with PreRender in the application.
C. You should consider utilization of a DataReader with the Activated event.
D. You should consider utilization of the Control event.
Answer: D

36. You work for a Web solution development company named xyzcompany.com. xyzcompany.com wants you to create an application which allows tracking a website visitor’s interactive web session.
Which of the tracking elements should be utilized by the application?
A. You should consider utilization of the enabled element.
B. You should consider utilization of the disabled element.
C. You should consider utilization of the DomainOnly element.
D. You should consider utilization of the readToDiagnosticsTrace element.
Answer: A

37. You work for a Web solution development company named xyzcompany.com. You need to implement a method that is utilized for connections between business logic and user interface of a Web application.
Which of the following can be utilized?
A. You should consider utilization of Data binding.
B. You should consider utilization of the TemplateControl class.
C. You should consider utilization of the connection pool.
D. You should consider utilization of the application pool.
Answer: A

38. You work for a Web solution development company named xyzcompany.com. You need to identify the error message received below with the appropriate HTTP status code:
“Non-Authoritative Information”
Which of the HTTP status codes should be utilized when representing “Non-Authoritative Information” message?
A. You should consider utilization of HTTP error code 404.
B. You should consider utilization of HTTP status code 203.
C. You should consider utilization of HTTP error code 503.
D. You should consider utilization of HTTP error code 400.
Answer: B

39. You work as an ADO.NET Application developer for xyzcompany.com. xyzcompany.com wants you to determine the methodology utilized for allowing limited user interaction to website visitors.
Which of the HTML elements should be utilized?
A. You should consider utilization of Web controls.
B. You should consider utilization of the ObjectDataSource.
C. You should consider utilization of WebParts with a DataAdapter.
D. You should consider utilization of HTML controls.
Answer: D

40. You work for a Web solution development company named xyzcompany.com. xyzcompany.com plans development of an application which passes information to data bound controls.
Which of the classes listed below is used as a business object?
A. You should consider utilization of the TemplateControl class.
B. You should consider utilization of the DataReader class.
C. You should consider utilization of the DataBinder class.
D. You should consider utilization of the ObjectDataSource class.
Answer: D

41. Which of the following statements regarding the utilization of usage of an MSI deployment are TRUE?
A. MSI deployments are performed via a Web share.
B. MSI deployments are performed via a network share.
C. MSI deployments are published to both Web shares and a network shares.
D. MSI deployments create a Microsoft Installer package with instructions and data required to install the application.
Answer: D

42. You work as a Web developer for a company named World Wide Confederated Web (WWCW). World Wide Confederated Web (WWCW) wants you to develop an application which utilizes programmed code used for handling of exceptions which occur.
Which of the files below would be utilized?
A. The server would utilize the Common.config file.
B. The server would utilize the Machine.config file.
C. The server would utilize the Web.config file.
D. The server would utilize the Global.asax file.
Answer: D

43. Which of the following statements regarding the utilization of HTML and XML are TRUE?
A. XML is not as secure but supports transporting data and HTML is secure and additionally supports displaying data.
B. XML is utilizes for web display format and HTML is utilized for displaying.
C. XML is secure and supports displaying data and HTML is unsecure and additionally does not support transporting data.
D. HTML defines the Web display format trough tags but XML defines the semantic information through tags.
Answer: D

44. You work for a Web solution development company named xyzcompany.com. You need to implement an application which can be used to force website visitor’s web pages to prevent XMTL compliance.
Which of the methods should you utilize?
A. You should consider utilizing a table for a page layout.
B. You should consider utilization of Web controls in the application.
C. You should consider utilization of Data Relation controls in the application.
D. You should consider utilization of LinqDataSources.
Answer: A

45. You work for a Web solution development company named xyzcompany.com. xyzcompany.com recently developed a Web application which has access to the Microsoft SQL Server database via Dataset control using .NET Framework 3.5 and ADO.NET. You need to implement a solution for retrieving the rows updated or refreshed when employees add information to the Dataset.
Which administrative action should be taken?
A. You should consider utilization of methods in the Data Binder class.
B. You should consider utilization of the Fill method of the Data Adapter class.
C. You should consider utilization of Data binding syntax.
D. You should consider utilization of Template Control class.
Answer: B

46. You work for a Web solution development company named xyzcompany.com. You need to determine which feature allows web applications with cached database connections to reuse the existing connections.
Which of the features should be considered?
A. You should consider utilization of a Connection pool.
B. You should consider utilization of an Application pool.
C. You should consider configuration of BLOB cache.
D. You should consider utilization of Connection objects and Microsoft Internet Information Services (IIS).
Answer: A

47. Which of the following statements regarding the utilization of application pools for Web applications are TRUE?
A. The usage of application pools put an excess amount of strain on the system RAM slowing other services.
B. The usage of application pools put an excess amount of strain on the CPU’s of the multicore servers.
C. The usage of application pools allows developers to decrease availability as well as the reliability.
D. The usage of application pools allows for improved security with improved performance of applications on the server.
Answer: D

48. You work for a Web solution development company named xyzcompany.com. xyzcompany.com wants you to implement system wide web and computer settings changes on a specific client computer in the organization.
Which of the files should you modify?
A. You should consider making changes to the Machine.config file.
B. You should consider making changes to the PolicyCache.config file.
C. You should consider making changes to the Common.config file
D. You should consider making changes to the App.config file.
Answer: A

49. You work for a Web solution development company named xyzcompany.com. You need to determine which feature to utilize for controlling the way information is displayed on web age visited by visitors.
Which of the features should be utilized?
A. The application would utilize connection pools.
B. An application pool would be utilized.
C. The application would utilize CSS style sheets.
D. The application would utilize a combination of XML and HTML.
Answer: C

50. You work for a Web solution development company named xyzcompany.com. xyzcompany.com wants you to develop a Web application which has controls that utilizes custom validation code within the Web application.
Which of the methods below should be utilized?
A. The application would be in an application pool utilizing comparison validators.
B. The application should be configured to utilize CustomValidator controls.
C. The application would utilize a connection pool with validation summaries.
D. The application should be configured to be used with BLOB cache.
Answer: B

Leave a Reply

Your email address will not be published. Required fields are marked *