crear test y ex├ímenes   Fast quiz maker   creare esami e test online   Criar teste e exames online
Hacer tests y exámenes on-line
 

ver comentarios

Otrosholajhj

adasdhgjhjhg

1 Which collection enforces type safety?

. A. Queue
. B. Hashtable
. C. ArrayList
. D. List<T>
2 You need to trace the execution of an application that contains C# code and Microsoft Visual Basic .NET code. Which tool should you use?

. A. Machine Debug Manager
. B. Remote Debug Monitor
. C. Microsoft Visual Studio
. D. CLR Profiler
3 Which core technology allows interoperability between Microsoft Visual Basic .NET code and C# code?

. A. Microsoft Visual Studio
. B. Windows 7
. C. Microsoft Intermediate Language (MSIL)
. D. Windows Azure
4 What is an advantage of strongly typed code languages like .NET?

. A. Use of efficient type casting.
. B. Use of less memory.
. C. Capturing of errors during compilation.
. D. Improved readability.
5 Why do managed languages use references and not pointers?

. A. Pointer notation requires more characters than reference notation.
. B. Pointers are stored by using a fixed amount of memory.
. C. Pointers are not type-safe.
. D. Null pointers can lead to run-time errors.
6 What is the name of the environment that runs .NET managed code?

. A. Common Language Runtime (CLR)
. B. Component Object Model (COM)
. C. Virtual Private Network (VPN)
. D. Microsoft Intermediate Language (MSIL)
7 You need to suspend the current thread until all Finalize() methods have been processed. Which garbage collection method should you use?

. A. WaitforPendingFinalizers
. B. SuppressFinalize
. C. Collect
. D. Dispose
8 Which feature is automatically handled in managed code but must be explicitly handled in unmanaged code?

. A. Namespaces
. B. Code signing
. C. Memory disposal
. D. Exception handling
9 You want to access a native Win32 function from a .NET application. You import the function. Which two keywords should you use to define the function? (Each correct answer presents part of the solution. Choose two.)

. A. Extern
. B. Static
. C. Private
. D. Public
10 A class named Student is contained inside a namespace named Contoso.Registration. Another class named Student is contained inside a namespace named Contoso.Contacts. You need to use both classes within the same code file. What are two possible ways to

. A. Add the following line of code on the top of the code file, Using Contoso; Refer to the classes by using the Student class wrapped within the regions named Registration and Contacts.
. B. Refer to the classes by using their fully qualified class names, Contoso.Registration.Student and Contoso.Contacts.Student.
. C. Add the following lines of code on the top of the code file. Using Contoso.Contacts; Using Contoso.Registration;Refer to the classes by using the Student class.
. D. Add the following lines of code on the top of the code file. Using RStudent = Contoso.Registration.Student; Using CStudent = Contoso.Contacts.Student; Refer to the classes as RStudent and CStudent.
11 Which describes the effect of applying the protected accessibility modifier to a method?

. A. The method is available to all classes derived from the declaring class.
. B. The method is available only to other methods in the same class.
. C. The method cannot be overridden in child classes.
. D. The method is available only to classes in the same assembly.
12 You want to create a class named ShoppingCart that has a type argument named TItem. The TItem type argument must be a value type. Which code segment should you use to define the ShoppingCart class?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
13 You create a class library named Contoso.Business. The library is used in a Windows application named Contoso.Ui. In which file should you store application configuration settings during deployment?

. A. Web.config
. B. Machine.config
. C. Contoso.Ui.config
. D. Contoso.Business.config
14 Which is the base class of all classes in the .NET Framework?

. A. System.Net
. B. System.Drawing
. C. System.Object
. D. System
15 You want to raise a custom exception. Which keyword should you use?

. A. Finally
. B. Catch
. C. Try
. D. Throw
16 What is the purpose of the app.config file?

. A. To configure the version of .NET targeted by the application.
. B. To load references to third-party libraries used by the application.
. C. To find out the programming language of the application.
. D. To configure the target operating system of the application.
17 What is the characteristic of a delegate?

. A. A type-safe function pointer
. B. An object that raises an event
. C. A tightly coupled event
. D. A property function that includes optional parameters
18 You define a method according to the following code segment. (Line numbers are included for reference only.) Where should you insert code that must be executed, regardless of whether or not an error is thrown?

. A. Between lines 05 and 06
. B. Between lines 08 and 09
. C. Between lines 11 and 12
. D. Between lines 12 and 13
19 You write code that reads a file from the disk. Which exception will catch an error if the file is missing?

. A. InvalidOperationException
. B. FaultException
. C. IOException
. D. ApplicationException
20 Which file contains the required .NET settings for an ASP.NET web application?

. A. Default.aspx
. B. Web.config
. C. Global.asax
. D. Site.master
21 Which two actions should you perform to consume events defined in another class? (Each correct answer presents part of the solution. Choose two.)

. A. Define a method that raises the event.
. B. Set the current class as a sealed class.
. C. Place a reference to the consuming class in the class that raises the event.
. D. Match the signature of the delegate declared for the event.
. E. Define an event handler method.
22 In which folder should you store the web.config file in a .NET web application?

. A. App_Data
. B. App_Code
. C. Root
. D. Bin
23 Which .NET object combines the identity and role of a user?

. A. FormsIdentity
. B. WindowsPrincipal
. C. WindowsIdentity
. D. GenericIdentity
24 Which three policy types are .NET security policy levels? (Choose three.)

. A. Data policy
. B. Machine policy
. C. Application domain policy
. D. Enterprise policy
. E. Network policy
25 You need to find out whether an application has access to delete files from the C:\Logs directory. Which code segment should you use?

. A. var permission = new FileIOPermission(FileIOPermissionAccess.PathDiscovery, "C:\\Logs");
. B. var permission = new FileIOPermission (FileIOPermissionAccess.Read, "C:\\Logs");
. C. var permission = new FileIOPermission(FileIOPermissionAccess.Write, "C:\\Logs");
. D. var permission = new FileIOPermission(FileIOPermissionAccess.Append, "C:\\Logs");
26 Which feature protects computers from running untrusted applications?

. A. Code Access security
. B. Role-based security
. C. Evidence-based security
. D. Cryptography
27 The SecureString class:

. A. Ensures that a password is strong enough.
. B. Protects data from being revealed during garbage collection.
. C. Ensures that memory will always be available for a string.
. D. Remains in memory always.
28 Which two methods can you use to load an assembly? (Each correct answer presents a complete solution. Choose two.)

. A. GetLoadedModules()
. B. LoadModule(String, ByteQ)
. C. LoadFrom(String)
. D. Load(String)
29 What is the purpose of strong naming?

. A. To assign a globally unique key to the assembly.
. B. To ensure that only one version of an assembly is stored in a directory at any point in time.
. C. To manage the references of the file list in an assembly's manifest.
. D. To impose restrictions on how different data types are defined within an assembly.
30 Which standard allows data types to be interchanged among all Common Language Infrastructure (CLI) programming languages?

. A. Common Intermediate Language System (CILS)
. B. Virtual Execution System (VES)
. C. Common Type System (CTS)
. D. Microsoft Intermediate Language (MSIL)
31 You need to retrieve an assembly's Version property. Which class should you use?

. A. AssemblyName
. B. MemberInfo
. C. Assembly
. D. OperatingSystem
32 You have created a program that writes status updates into a file. You want to modify the file.

. You need to ensure that other users can view the file while it is being modified. Which permission should you use to open the file?
. A. FileAccess.Write
. B. FileShare.Inheritable
. C. FileShare.Read
. D. FileShare.None
. E. FileAccess.Read
33 Which two classes in the .NET Framework allow you to delete a file? (Each correct answer presents a complete solution. Choose two.)

. A. System.IO.FileInfo
. B. System.IO.FileStream
. C. System.IO.Stream
. D. System.IO.Path
. E. System.IO.File
34 You want to substitute values in a string that is displayed on the console. Which code fragment will display "Hello, World"?

. A. Console.WriteLine("Hello, {0}", "World");
. B. Console.WriteLine("Hello, (0)", "World");
. C. Console.WriteLine("Hello, <0>", "World");
. D. Console.WriteLine("Hello, [0]", "World");
35 Where are the command line arguments stored for a console application?

. A. In a value-type parameter that is passed to the Main method.
. B. In the Console.In property.
. C. In a string array parameter that is passed to the Main method.
. D. In the Console.Read() method.
36 You create a class that uses unmanaged resources. You need to ensure that users of the class can explicitly release resources when the instance of the class is no longer required. Which two actions should you perform? (Each correct answer presents part

. A. Use a class destructor that is called from within the Dispose method.
. B. Implement the IDisposable interface.
. C. Inherit from the WeakReference class.
. D. Use a class destructor that calls the Kill method.
37 Value type variables are stored in the:

. A. Code segment
. B. Heap
. C. Stack
. D. Text segment
38 Managed code manages:

. A. Database connections.
. B. Memory.
. C. Processor optimization.
. D. Source code,
39 What does the .NET Framework use to pass data between managed and unmanaged code?

. A. Marshaling
. B. Simple Object Access Protocol (SOAP)
. C. Deserialization
. D. File Transfer Protocol (FTP)
40 Which should you use to call a class written in C# from a program written in Microsoft Visual Basic .NET?

. A. The Visual Basic .NET syntax
. B. The Windows Communication Foundation (WCF) API
. C. A Component Object Model (COM) interface
. D. The C# syntax
41 Type-safe code accesses only the memory locations:

. A. It is authorized to access.
. B. Of objects on the heap.
. C. Of objects that are static or shared.
. D. Of objects on the stack.
42 A type-safe language prevents:

. A. Access to arbitrary memory locations.
. B. Memory leaks.
. C. Null reference exceptions.
. D. Division by zero exceptions.
43 How does managed .NET code use an unmanaged COM object?

. A. The CLR creates a runtime callable wrapper (RCW) that acts as a proxy for the unmanaged object.
. B. The CLR uses events to create asynchronous calls to unmanaged code.
. C. The CLR runs managed code and unmanaged code in separate threads.
. D. The CLR uses shared assemblies to communicate between managed code and unmanaged code.
44 Type-safe code prevents:

. A. Unauthorized memory access.
. B. Slow performance.
. C. Namespace conflicts.
. D. Format exceptions.
45 You need to encrypt data by using a public key and a private key. Which .NET class should you use?

. A. DESCryptoServiceProvider
. B. RijndaelManaged
. C. DSACryptoServiceProvider
. D. TripleDESCryptoServiceProvider
46 You want to enable access to files and folders by using the .NET Framework. Which security class should you use?

. A. UPermission
. B. FileIOPermission
. C. PrincipaIPermission
. D. SecurityPermission
47 Which security policy level applies to all managed code on the computer?

. A. Machine
. B. User
. C. Enterprise
. D. Application domain
48 You need to create an access rule that allows a user named UserA in MyDomain to read the contents of the Log.txt file. Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
49 Your application requests FileIOPermission to open a file. The permission is denied. Which type of exception will be thrown?

. A. IOException
. B. SecurityException
. C. ArgumentException
. D. VerificationException
50 An event declaration is shown in the following code segment. Public event NewProduccEventHandlerNewProduct; What is NewProductEventHandler in the event declaration?

. A. A built-in data type for handling events.
. B. An enumeration that defines the type of the NewProduct variable.
. C. The name of the delegate that will dispatch the event.
. D. The name of the class method that will catch the event.
51 Which two types of actions can trigger an event? (Each correct answer presents a complete solution. Choose two.)

. A. User intervention, such as a mouse click.
. B. Some other program logic, such as a call to the program module.
. C. Declaring the signature of the delegate.
. D. Adding a delegate keyword.
52 You need to handle only SqlException exceptions. You also need to ensure that any other exception flows back to the calling code. Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
53 You write a method named DoWork. You need to log all exceptions that occur inside DoWork. You also need to ensure that all exceptions are raised to the calling code. Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
54 Connection strings in the web.config file are:

. A. Automatically encrypted when the project is published.
. B. Automatically encrypted by the web server.
. C. Stored in binary format.
. D. Stored in clear text unless they are encrypted.
55 In which file does a .NET Windows application store information that has been customized for a particular instance of the application?

. A. App.config
. B. User.config
. C. Machine.config
. D. Web.config
56 You need to force the position of the cursor on the screen at (15, 10). Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
57 You create a program that writes a status message to a file every 10 seconds. You need to ensure that all data is written to the file before the file is closed. When should you call the Flush() method?

. A. Before writing the entry
. B. When opening the file
. C. Before opening the file
. D. After writing the entry
58 You want to insert a new line on the console. Which three code fragments will display "Hello" followed by a new line? (Each correct answer presents a complete solution. Choose three.)

. A. Console.Write("Hello\t") ;
. B. Console.Write("Hello\n");
. C. Console.Error.Write("Hello\t");
. D. Console.Error.WriteLine ("Hello") ;
. E. Console.WriteLine("Hello");
59 Which method will be called when a FileStream is collected by the garbage collector?

. A. Unlock
. B. Flush
. C. Finalize
. D. EndWrite
60 You create a class that does not explicitly inherit from any base class. Which is the implied base type of the class?

. A. Type
. B. Void
. C. Object
. D. TypedReference
61 You create an ArrayList object. You need to ensure that only objects of the System.DateTime type can be added to the collection. What should you do?

. A. Use a Hashtable collection.
. B. Use the ToString() method on objects that you add to the ArrayList.
. C. Use a List<T> collection.
. D. Restrict the ArrayList variable to a capacity of 16 items.
62 Which code segment prevents the class named Final from being inherited?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
63 You use code from different companies. You need to avoid naming conflicts within your code. What should you do?

. A. Use global variables to reference each of the classes.
. B. Define each class as private.
. C. Deploy the classes as two separate files.
. D. Define the classes inside unique namespaces.
64 You need to create a DLL that contains classes that can be reused in other projects. Which type of Microsoft Visual Studio project should you use?

. A. Class Library
. B. Web Application
. C. Console Application
. D. Windows Service
65 You need to be able to install and uninstall an assembly from the Global Assembly Cache (GAC). Which tool should you use?

. A. Ngen.exe
. B. Resgen.exe
. C. GacUtil.exe
. D. Sn.exe
66 Common Intermediate Language (CIL) is converted into executable code by using:

. A. Microsoft Visual Studio.
. B. Interactive debugger.
. C. Just-in-Time (JIT) compiler.
. D. Intermediate Language Disassembler (ILDASM.exe).
67 When you delay sign a .NET assembly, the assembly will include:

. A. Both public key and private key.
. B. Only the public key.
. C. Only the private key
. D. Neither the public key nor the private key.
68 Which two actions are performed by the .NET Version class? (Choose two.)

. A. Returns the version number of the web browser
. B. Provides the base class for value types.
. C. Returns the version number of an assembly.
. D. Returns the version number of the Common Language Runtime.
69 Which class should you use to perform a search of an XML document?

. A. XmlElement
. B. XPathDocument
. C. XmlNode
. D. XmlReader
70 You load an XML document named doc1 that has an attribute named EmployeeId. Which code fragment will set the value of EmployeeId to A23?

. A. Doc1.CreateAttribute("EmployeeId", "A23");
. B. Doc1.DocumentElement.SetAttribute("Employeeld","A23");
. C. Doc1.CreateNode("EmployeeId", "A23", "");
. D. Doc1.CreateElement("Employeeld","A23");
71 You create a custom exception class named MyCustomException that is derived from ApplicationException. Which code segment should you use to raise MyCustomException?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
72 Custom event delegates are used to:

. A. Raise one or more custom events
. B. Handle errors generated in a try block.
. C. Route events to one or more event handlers.
. D. Process mouse clicks or keyboard input.
73 An event is a/an:

. A. Structure used to store output data.
. B. Message sent by an object to signal the occurrence of an action.
. C. Occurrence of a program at a specific time.
. D. Object that responds to a message.
74 You want to encrypt the connection string stored in the web.config file. Which tool should you use?

. A. ASP.NET IIS Registration Tool (RegIIS.exe)
. B. Intermediate Language Disassembler (ILDASM.exe)
. C. Web Site Administration Tool
. D. Dotfuscator Software Services
75 Which namespace should you reference while using the StreamWriter class?

. A. System.Text
. B. System.Drawing
. C. System.IO
. D. System.Printing
76 You want to use a collection to store Order items. The collection must be thread-safe and must provide access to the items in a last-in-first-out sequence. Which type of collection should you use?

. A. LinkedList
. B. ConcurrentQueue
. C. ConcurrentStack
. D. NameValueCollection
77 You want to create a method that can accept any data type as arguments. Which feature of .NET languages allows you to create one method that will accept different data types on each call to the method?

. A. Delegates
. B. Named Parameters
. C. Overriding
. D. Generics
78 A base class named MasterData is defined according to the following code segment.Which code segment should you use to define a method named LoadData that overrides the method in the MasterData class?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
79 A .NET application requires:

. A. Windows System Registry.
. B. Common Language Runtime.
. C. COM libraries.
. D. Web services.
80 You create an unmanaged object and use the object. You no longer need the object. What should you do?

. A. Set the value of the variable to null.
. B. Cache the variable's value in a static variable.
. C. Dispose the object to release memory.
. D. Cast the object to its base type.
81 You need to force an immediate garbage collection of all unused memory. Which method should you use?

. A. WaitForFullGCComplete
. B. SuppressFinalize
. C. CollectionCount
. D. Collect
82 Where is dynamic memory allocated?

. A. Text segment
. B. Code segment
. C. Stack
. D. Heap
83 You need to configure security policy for the following policy levels:Which .NET tool should you use?

. A. Policy Migration
. B. Code Access Security Policy
. C. Microsoft Intermediate Language Assembler
. D. Permissions View
84 In the Common Language Runtime (CLR), what information is used to make decisions on security policy?

. A. Code group
. B. Evidence
. C. Cryptography
. D. Permissions
85 Which named permission set allows common Language Runtime (CLR) to run code but disallows the use of protected resources from the computer?

. A. FullTrust
. B. Execution
. C. Everything
. D. Nothing
86 Which two goals can you achieve by using cryptography? (Choose two.)

. A. Prevent data from being modified.
. B. Find out which users can access data.
. C. Ensure that data originates from a particular party.
. D. Ensure that data arrives at its destination.
87 Which part of the .NET Framework verifies that code is type-safe?

. A. Microsoft Intermediate Language (MSIL) compiler
. B. Common Type System (CTS)
. C. Just-in-Time (JIT) compiler
. D. Base Class Library (BCL)
88 Which two tasks does the interoperability of the .NET language allow you to perform? (Choose two.)

. A. Use classes written in C# from Microsoft Visual Basic .NET code.
. B. Write a method by using identical syntax of both C# and Microsoft Visual Basic .NET.
. C. Create methods written in both C# and Microsoft Visual Basic .NET in the same class.
. D. Use classes written in Microsoft Visual Basic .NET from C# code.
. E. Convert C# code to Microsoft Visual Basic .NET or convert Visual Basic .NET code to C#.
89 Type-safe programming languages require that:

. A. Data conversions that might be unsafe are done explicitly.
. B. All data conversions are done implicitly.
. C. Data conversions that might be unsafe are done implicitly.
. D. All data conversions are done explicitly.
90 Which feature is available in both Microsoft Visual Basic .NET and C#f?

. A. Static classes
. B. Use of code that is not case-sensitive
. C. Use of code that is not type-safe
. D. Named and optional arguments in methods
91 Which three characteristics define the identity of an assembly? (Each correct answer presents part of the solution. Choose three.)

. A. Simple text name
. B. File size
. C. File creation date
. D. Culture information
. E. Version number
92 .NET managed code compiles into:

. A. Assembly language.
. B. Common Intermediate Language (CIL).
. C. Extensible Application Markup Language (XAML).
. D. Machine code.
93 Which format is the correct version for a .NET application?

. A. minor.major.revision.build
. B. build.revision.minor.major
. C. major.minor.build.revision
. D. revision.build.major.minor
94 Which two elements are included in a .NET assembly? (Choose two.)

. A. Microsoft Intermediate Language (MSIL) code
. B. Extensible Markup Language (XML) code
. C. Extensible Application Markup Language (XAML) code
. D. Type metadata
. E. Declared variable types
95 Which configuration file is automatically created by .NET when the file is needed by the application for the first time?

. A. Web.config
. B. App.config
. C. Machine.config
. D. User.config
96 What data is stored on the heap?

. A. Objects that contain non-value data types
. B. Built-in, intrinsic value types
. C. Values of parameters in methods
. D. References to objects
97 In .NET, the automatic memory management system enables:

. A. Garbage collection.
. B. Synchronization.
. C. Smart caching.
. D. Managed code.
99 You need to ensure that your console application can process each key as it is pressed. Which method should you use?

. A. Console.OpenStandardlnput
. B. Console.ReadKey
. C. Console.Read
. D. Console.ReadLine
100 You want to write log files to a user's My Documents folder. Which class should you use to locate the My Documents folder?

. A. Directory
. B. Path
. C. Environment
. D. File
101 You create an XML document that has an XmlNode named node1. Which code fragment will read the XML contained in node1 and its subnodes?

. A. Node1.ToString ();
. B. Node1.OuterXml;
. C. Node1.InnerXml;
. D. Node1.InnerXext;
. E. Node1.Value;
102 You need to find out whether the active Windows user of an application is a member of the Administrators group. Which permission class should you use?

. A. SecurityPermission
. B. PrincipalPermission
. C. PublisherIdentityPermission
. D. EnvironmentPermission
103 Which application domain host manages security for web applications?

. A. Browser
. B. Custom-designed
. C. Server
. D. Shell
104 Which tool should you use to view the minimal, optional, and refused permission sets requested by an assembly?

. A. Assembly Registration
. B. Permission Verify
. C. Migration Policy
. D. Permissions View
105 The Common Language Specification (CLS) standard:

. A. Defines a common development environment for writing applications.
. B. Allows code written for a desktop application to run as a web application.
. C. Allows code written in different languages to interact.
. D. Defines a common syntax for all programming languages.
106 Which three actions can you perform by using the Strong Name tool? (Choose three.)

. A. Create a key pair for an assembly.
. B. Compile the assembly for the first time.
. C. Encrypt an assembly.
. D. Re-sign a previously signed assembly.
. E. Extract the public key from an assembly.
107 Which should you use to ensure that code can be used by several applications?

. A. Private Assembly
. B. Group Policy
. C. Shared Assembly
. D. Public Policy
108 Which is the build number of a Version object instantiated by using the following code fragment? Version v = new Version (2, 4, 6, 8);

. A. 2
. B. 4
. C. 6
. D. 8
109 You want to debug a class library project that will be used by an application named MyApplication.exe. MyApplication.exe is not part of your Microsoft Visual Studio project and is not running currently. You want MyApplication.exe to start automaticall

. A. Set the project's Start Action setting to Start external program and select MyApplication.exe.
. B. Set the command line arguments to debug:MyApplication.exe.
. C. Set the command line arguments to start:MyApplication.exe. D. Set the project's Start Action setting to Start project.
110 Which code segment is an example of implicit boxing?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
111 Which describes an interface?

. A. Allows managed code to access unmanaged code.
. B. Contains code that implements properties, methods, and events.
. C. A template that defines a set of properties, methods, and events.
. D. Can be changed after it has been published.
112 Which type of casting enforces type safety?

. A. Reinterpret
. B. Implicit static
. C. Explicit static
. D. Explicit dynamic
113 A type-safe language prevents:

. A. Memory leaks.
. B. Access to arbitrary memory locations.
. C. Division by zero exceptions.
. D. Null reference exceptions.
114 Regarding C# code and Microsoft Visual Basic .NET code, language parity refers to the:

. A. Parts of the language where the syntax is identical.
. B. Functionality that is common in both languages even if the syntax is different.
. C. Fact that both languages are compiled as Microsoft Intermediate Language (MSIL).
. D. Ability of the two languages to interoperate.
115 Which describes the characteristic of the interoperability of the .NET Framework?

. A. Allows consistent communication between a desktop application and a mobile application.
. B. Allows consistent communication between a desktop application and a web application.
. C. Handles exceptions consistently across languages.
. D. Uses the same code syntax.
116 You need to find out whether an application has access to delete files from the C:\Logs directory. Which code segment should you use?

. A. Dim permission As New FileIOPermission(FileIOPermissionAccess.Write, "C:\\Logs")
. B. Dim permission A3 New FileIOPermission(FileIOPermissionAccess.PathDiscovery,"C:\\Logs")
. C. Dim permission As New FileIOPermission(FiieIOPermissionAccess.Read, "C:\\Logs")
. D. Dim permission As New FileIOPermission(FileIOPermissionAccess.Append, "C:\\Logs")
117 Which three policy types are .NET security policy levels? (Choose three.)

. A. Enterprise policy
. B. Data policy
. C. Network policy
. D. Machine policy
. E. Application domain policy
118 Which .NET object combines the identity and role of a user?

. A. WindowsPrincipal
. B. FormsIdentity
. C. WindowsIdentity
. D. GenericIdentity
119 The SecureString class:

. A. Ensures that a password is strong enough.
. B. Remains in memory always.
. C. Ensures that memory will always be available for a string.
. D. Protects data from being revealed during garbage collection.
120 Which feature protects computers from running untrusted applications?

. A. Evidence-based security
. B. Role-based security
. C. Cryptography
. D. Code Access security
121 Which feature is automatically handled in managed code but must be explicitly handled in unmanaged code?

. A. Memory disposal
. B. Code signing
. C. Namespaces
. D. Exception handling
122 You need to suspend the current thread until all Finalize() methods have been processed. Which garbage collection method should you use?

. A. Dispose
. B. WaitforPendingFinalizers
. C. SuppressFinalize
. D. Collect
123 What is the name of the environment that runs .NET managed code?

. A. Common Language Runtime (CLR)
. B. Component Object Model (COM)
. C. Virtual Private Network (VPN)
. D. Microsoft Intermediate Language (MSIL)
124 You want to access a native Win32 function from a .NET application. You import the function. Which two keywords should you use to define the function? (Each correct answer presents part of the solution. Choose two.)

. A. Declare
. B. Private
. C. Public
. D. Lib
125 What is the purpose of the app.config file?

. A. To configure the version of .NET targeted by the application.
. B. To load references to third-party libraries used by the application.
. C. To configure the target operating system of the application.
. D. To find out the programming language of the application.
126 What is the characteristic of a delegate?

. A. A tightly coupled event
. B. An object that raises an event
. C. A type-safe function pointer
. D. A property function that includes optional parameters
127 Which two actions should you perform to consume events defined in another class? (Each correct answer presents part of the solution. Choose two.)

. A. Define a method that raises the event.
. B. Place a reference to the consuming class in the class that raises the event.
. C. Define an event handler method
. D. Match the signature of the delegate declared for the event.
. E. Set the current class as a sealed class.
128 You write code that reads a file from the disk. Which exception will catch an error if the file is missing?

. A. IOException
. B. FaultException
. C. ApplicationException
. D. InvalidOperationException
129 In which folder should you store the web.config file in a .NET web application?

. A. App_Data
. B. Bin
. C. App_Code
. D. Root
130 Which file contains the required .NET settings for an ASP.NET web application?

. A. Global.asax
. B. Default.aspx
. C. Site.master
. D. Web.config
131 You want to raise a custom exception. Which keyword should you use?

. A. Throw
. B. Catch
. C. Finally
. D. Try
132 You define a method according to the following code segment. (Line numbers are included for reference only.) Where should you insert code that must be executed, regardless of whether or not an error is thrown?

. A. Between lines 03 and 04
. B. Between lines 04 and 05
. C. Between lines 05 and 06
. D. Between lines 06 and 07
133 You have created a program that writes status updates into a file. You want to modify the file. You need to ensure that other users can view the file while it is being modified. Which permission should you use to open the file?

. A. FileShare.None
. B. FileAccess.Read
. C. FileAccess.Write
. D. FileShare.Read
. E. FileShare.Inheritable
134 Where are the command line arguments stored for a console application?

. A. In a value-type parameter that is passed to the Main method.
. B. In the Console.In property.
. C. In a string array parameter that is passed to the Main method.
. D. In the Console.Read() method.
135 Which two classes in the .NET Framework allow you to delete a file? (Each correct answer presents a complete solution. Choose two.)

. A. System.IO.FileStream
. B. System.IO.File
. C. System.IO.Stream
. D. System.IO.FileInfo
. E. System.IO.Path
136 You want to substitute values in a string that is displayed on the console. Which code fragment will display "Hello, World"?

. A. Console.WriteLine("Hello, [0]", "World")
. B. Console.WriteLir.e ("Hello, {0}", "World")
. C. Console.WriteLine("Hello, (0)", "World")
. D. Console.WriteLine("Hello, <0>", "World")
137 A class named Student is contained inside a namespace named Contoso.Registration. Another class named Student is contained inside a namespace named Contoso.Contacts. You need to use both classes within the same code file. What are two possible ways to

. A. Add the following lines of code on the top of the code file. Imports RStudent = Contoso.Registration.StudentImports CStudent = Contoso.Contacts.Student Refer to the classes as RStudent and CStudent.
. B. Refer to the classes by using their fully qualified class names, Contoso.Registration.Student and Contoso.Contacts.Student.
. C. Add the following lines of code on the top of the code file. Imports Contoso.Contacts Imports Contoso.Registration Refer to the classes by using the Student class.
. D. Add the following line of code on the top of the code file. Imports Contoso Refer to the classes by using the Student class wrapped within the regions named Registration and Contacts.
138 You want to create a class named ShoppingCart that has a type argument named TItem. The TItem type argument must be a value type. Which code segment should you use to define the ShoppingCart class?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
139 Which is the base class of all classes in the .NET Framework?

. A. System.Net
. B. System.Drawing
. C. System
. D. System.Object
140 You create a class library named Contoso.Business. The library is used in a Windows application named Contoso.Ui.In which file should you store application configuration settings during deployment?

. A. Machine.config
. B. Web.config
. C. Contoso.Ui.config
. D. Contoso.Business.config
141 Which describes the effect of applying the protected accessibility modifier to a method?

. A. The method is available only to other methods in the same class.
. B. The method is available only to classes in the same assembly.
. C. The method cannot be overridden in child classes.
. D. The method is available to all classes derived from the declaring class.
142 What is the purpose of strong naming?

. A. To ensure that only one version of an assembly is stored in a directory at any point in time.
. B. To manage the references of the file list in an assembly's manifest.
. C. To assign a globally unique key to the assembly.
. D. To impose restrictions on how different data types are defined within an assembly.
143 Which standard allows data types to be interchanged among all Common Language Infrastructure (CLI) programming languages?

. A. Virtual Execution System (VES)
. B. Common Type System (CTS)
. C. Microsoft Intermediate Language (MSIL)
. D. Common Intermediate Language System (CILS)
144 Which two methods can you use to load an assembly? (Each correct answer presents a complete solution. Choose two.)

. A. Load(String)
. B. LoadModule(String, Byte())
. C. GetLoadedModules()
. D. LoadFrom(String)
145 You need to retrieve an assembly's Version property. Which class should you use?

. A. Assembly
. B. AssemblyName
. C. OperatingSystem
. D. MemberInfo
146 Why do managed languages use references and not pointers?

. A. Pointer notation requires more characters than reference notation.
. B. Null pointers can lead to run-time errors.
. C. Pointers are not type-safe.
. D. Pointers are stored by using a fixed amount of memory.
147 You need to trace the execution of an application that contains C# code and Microsoft Visual Basic .NET code. Which tool should you use?

. A. CLR Profiler
. B. Remote Debug Monitor
. C. Machine Debug Manager
. D. Microsoft Visual Studio
148 What is an advantage of strongly typed code languages like .NET?

. A. Use of less memory.
. B. Improved readability.
. C. Use of efficient type casting.
. D. Capturing of errors during compilation.
149 Which core technology allows interoperability between Microsoft Visual Basic .NET code and C# code?

. A. Windows Azure
. B. Microsoft Visual Studio
. C. Windows 7
. D. Microsoft Intermediate Language (MSIL)
150 Which collection enforces type safety?

. A. List<T>
. B. ArrayList
. C. Queue
. D. Hashtable
151 You create a class that uses unmanaged resources. You need to ensure that users of the class can explicitly release resources when the instance of the class is no longer required. Which two actions should you perform? (Each correct answer presents par

. A. Implement the IDisposable interface.
. B. Use a class destructor that is called from within the Dispose method.
. C. Use a class destructor that calls the Kill method.
. D. Inherit from the WeakReference class.
152 Value type variables are stored in the:

. A. Heap
. B. Text segment
. C. Code segment
. D. Stack
153 Managed code manages:

. A. Processor optimization
. B. Database connections
. C. Source code
. D. Memory
154 What does the .NET Framework use to pass data between managed and unmanaged code?

. A. Deserialization
. B. Marshaling
. C. Simple Object Access Protocol (SOAP)
. D. File Transfer Protocol (FTP)
155 Common Intermediate Language (CIL) is converted into executable code by using:

. A. Intermediate Language Disassembler (ILDASM.exe).
. B. Interactive debugger.
. C. Microsoft Visual Studio.
. D. Just-in-Time (JIT) compiler.
156 When you delay sign a .NET assembly, the assembly will include:

. A. Both public key and private key.
. B. Only the private key
. C. Neither the public key nor the private key.
. D. Only the public key.
157 You need to be able to install and uninstall an assembly from the Global Assembly Cache (GAC). Which tool should you use?

. A. Resgen.exe
. B. Sn.exe
. C. Ngen.exe
. D. GacUtil.exe
158 Which two types of actions can trigger an event? (Each correct answer presents a complete solution. Choose two.)

. A. Declaring the signature of the delegate.
. B. Some other program logic, such as a call to the program module.
. C. Adding a delegate keyword.
. D. User intervention, such as a mouse click.
159 You need to handle only SqlException exceptions. You also need to ensure that any other exception flows back to the calling code. Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
160 You write a method named DoWork. You need to log all exceptions that occur inside DoWork. You also need to ensure that all exceptions are raised to the calling code. Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
161 An event declaration is shown in the following code segment. Public Event NewProduct As NewProductEventHandler What is NewProductEventHandler in the event declaration?

. A. An enumeration that defines the type of the NewProduct variable.
. B. A built-in data type for handling events.
. C. The name of the delegate that will dispatch the event.
. D. The name of the class method that will catch the event.
162 In which file does a .NET Windows application store information that has been customized for a particular instance of the application?

. A. Web.config
. B. User.config
. C. Machine.config
. D. App.config
163 Connection strings in the web.config file are:

. A. Stored in binary format.
. B. Automatically encrypted by the web server.
. C. Stored in clear text unless they are encrypted.
. D. Automatically encrypted when the project is published.
164 You need to encrypt data by using a public key and a private key. Which .NET class should you use?

. A. DSACryptoServiceProvider
. B. RijndaelManaged
. C. TripleDESCryptoServiceProvider
. D. DESCryptoServiceProvider
165 You need to create an access rule that allows a user named UserA in MyDomain to read the contents of the Log.txt file. Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
166 Which security policy level applies to all managed code on the computer?

. A. User
. B. Application domain
. C. Enterprise
. D. Machine
167 You want to enable access to files and folders by using the .NET Framework. Which security class should you use?

. A. SecurityPermission
. B. PrincipaIPermission
. C. FileIOPermission
. D. UIPermission
168 Your application requests FileIOPermission to open a file. The permission is denied. Which type of exception will be thrown?

. A. IOException
. B. VerificationException
. C. ArgumentException
. D. SecurityException
169 You use code from different companies. You need to avoid naming conflicts within your code. What should you do?

. A. Use global variables to reference each of the classes.
. B. Define the classes inside unique namespaces.
. C. Define each class as private.
. D. Deploy the classes as two separate files.
170 Which code segment prevents the class named Final from being inherited?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
171 You create a class that does not explicitly inherit from any base class. Which is the implied base type of the class?

. A. Void
. B. Type
. C. Object
. D. TypedReference
172 You create an ArrayList object. You need to ensure that only objects of the System.DateTime type can be added to the collection. What should you do?

. A. Restrict the ArrayList variable to a capacity of 16 items.
. B. Use a Hashtable collection.
. C. Use a List(Of T) collection.
. D. Use the ToString() method on objects that you add to the ArrayList.
173 You need to create a DLL that contains classes that can be reused in other projects. Which type of Microsoft Visual Studio project should you use?

. A. Class Library
. B. Web Application
. C. Console Application
. D. Windows Service
174 Which method will be called when a FileStream is collected by the garbage collector?

. A. EndWrite
. B. Finalize
. C. Unlock
. D. Flush
175 You want to insert a new line on the console. Which three code fragments will display "Hello" followed by a new line? (Each correct answer presents a complete solution. Choose three.)

. A. Console.Write("Hello\n")
. B. Console.Error.Write("Hello\t")
. C. Console.WriteLine("Hello")
. D. Console.Write("Hello\t")
. E. Console.Error.WriteLine("Hello")
176 You create a program that writes a status message to a file every 10 seconds. You need to ensure that all data is written to the file before the file is closed. When should you call the Flush() method?

. A. Before opening the file
. B. Before writing the entry
. C. After writing the entry
. D. When opening the file
177 You need to force the position of the cursor on the screen at (15, 10). Which code segment should you use?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
178 Which should you use to call a class written in C# from a program written in Microsoft Visual Basic .NET?

. A. The Visual Basic .NET syntax
. B. A Component Object Model (COM) interface
. C. The Windows Communication Foundation (WCF) API
. D. The C# syntax
179 Type-safe code prevents:

. A. Slow performance.
. B. Namespace conflicts.
. C. Format exceptions.
. D. Unauthorized memory access.
180 How does managed .NET code use an unmanaged COM object?

. A. The CLR creates a runtime callable wrapper (RCW) that acts as a proxy for the unmanaged object.
. B. The CLR uses shared assemblies to communicate between managed code and unmanaged code.
. C. The CLR uses events to create asynchronous calls to unmanaged code.
. D. The CLR runs managed code and unmanaged code in separate threads.
181 Type-safe code accesses only the memory locations:

. A. Of objects on the stack.
. B. Of objects that are static or shared.
. C. Of objects on the heap.
. D. It is authorized to access.
182 In the Common Language Runtime (CLR), what information is used to make decisions on security policy?

. A. Evidence
. B. Cryptography
. C. Code group
. D. Permissions
183 Which named permission set allows Common Language Runtime (CLR) to run code but disallows the use of protected resources from the computer?

. A. Execution
. B. FullTrust
. C. Everything
. D. Nothing
184 You need to configure security policy for the following policy levels: Which .NET tool should you use?

. A. Microsoft Intermediate Language Assembler
. B. Permissions View
. C. Policy Migration
. D. Code Access Security Policy
185 Which two goals can you achieve by using cryptography? (Choose two.)

. A. Prevent data from being modified.
. B. Ensure that data originates from a particular party.
. C. Ensure that data arrives at its destination.
. D. Find out which users can access data.
186 Which class should you use to perform a search of an XML document?

. A. XmlNode
. B. XPathDocument
. C. XmlElement
. D. XmlReader
187 You load an XML document named doc1 that has an attribute named EmployeeId. Which code fragment will set the value of EmployeeId to A23?

. A. Doc1.DocumentEIement.SetAttribute("EmployeeId","A23")
. B. Doc1.CreateElement ("EmployeeId", "A23")
. C. Doc1.CreateNode("EmployeeId", "A23", "")
. D. Doc1.CreateActribute("EmpIoyeeId", "A23")
188 Which two elements are included in a .NET assembly? (Choose two.)

. A. Type metadata
. B. Extensible Markup Language (XML) code
. C. Declared variable types
. D. Extensible Application Markup Language (XAML) code
. E. Microsoft Intermediate Language (MSIL) code
189 Which format is the correct version for a .NET application?

. A. minor.major.revision.build
. B. major.minor.build.revision
. C. revision.build.major.minor
. D. build.revision.minor.major
190 .NET managed code compiles into:

. A. Common Intermediate Language (CIL).
. B. Assembly language.
. C. Machine code.
. D. Extensible Application Markup Language (XAML).
191 Which three characteristics define the identity of an assembly? (Each correct answer presents part of the solution. Choose three.)

. A. File size
. B. Simple text name
. C. Version number
. D. File creation date
. E. Culture information
192 You want to encrypt the connection string stored in the web.config file. Which tool should you use?

. A. Dotfuscator Software Services
. B. Web Site Administration Tool
. C. ASP.NET IIS Registration Tool (RegIIS.exe)
. D. Intermediate Language Disassembler (ILDASM.exe)
193 An event is a/an:

. A. Message sent by an object to signal the occurrence of an action.
. B. Occurrence of a program at a specific time.
. C. Structure used to store output data.
. D. Object that responds to a message.
194 You create a custom exception class named MyCustomException that is derived from ApplicationException.Which code segment should you use to raise MyCustomException?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
195 Custom event delegates are used to:

. A. Raise one or more custom events
. B. Route events to one or more event handlers.
. C. Process mouse clicks or keyboard input.
. D. Handle errors generated in a try block.
196 Where is dynamic memory allocated?

. A. Code segment
. B. Stack
. C. Heap
. D. Text segment
197 A .NET application requires:

. A. Windows System Registry.
. B. Common Language Runtime.
. C. COM libraries.
. D. Web services.
198 You create an unmanaged object and use the object. You no longer need the object. What should you do?

. A. Set the value of the variable to null.
. B. Cache the variable's value in a static variable.
. C. Cast the object to its base type.
. D. Dispose the object to release memory.
199 You need to force an immediate garbage collection of all unused memory. Which method should you use?

. A. WaitForFullGCComplete
. B. Collect
. C. SuppressFinalize
. D. CollectionCount
200 Type-safe programming languages require that:

. A. All data conversions are done implicitly.
. B. All data conversions are done explicitly.
. C. Data conversions that might be unsafe are done explicitly.
. D. Data conversions that might be unsafe are done implicitly.
201 Which collection enforces type safety?

. A. List<T>
. B. Hashtable
. C. Queue
. D. ArrayList
202 Which part of the .NET Framework verifies that code is type-safe?

. A. Microsoft Intermediate Language (MSIL) compiler
. B. Just-in-Time (JIT) compiler
. C. Base Class Library (BCL)
. D. Common Type System (CTS)
203 Which feature is available in both Microsoft Visual Basic .NET and C#?

. A. Static classes
. B. Named and optional arguments in methods
. C. Use of code that is not case-sensitive
. D. Use of code that is not type-safe
204 Which two tasks does the interoperability of the .NET language allow you to perform? (Choose two.)

. A. Convert C# code to Microsoft Visual Basic .NET or convert Visual Basic .NET code to C#.
. B. Create methods written in both C# and Microsoft Visual Basic .NET in the same class.
. C. Use classes written in Microsoft Visual Basic .NET from C# code.
. D. Use classes written in C# from Microsoft Visual Basic .NET code.
. E. Write a method by using identical syntax of both C# and Microsoft Visual Basic.NET.
205 You want to use a collection to store Order items. The collection must be thread-safe and must provide access to the items in a last-in-first-out sequence. Which type of collection should you use?

. A. ConcurrentStack
. B. ConcurrentQueue
. C. NameValueCollection
. D. LinkedList
206 Which namespace should you reference while using the StreamWHter class?

. A. System.IO
. B. System.Drawing
. C. System.Printing
. D. System.Text
207 You want to create a method that can accept any data type as arguments. Which feature of .NET languages allows you to create one method that will accept different data types on each call to the method?

. A. Overriding
. B. Delegates
. C. Generics
. D. Named Parameters
208 A base class named MasterData is defined according to the following code segment. Which code segment should you use to define a method named LoadData that overrides the method in the MasterData class?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
209 Which describes an interface?

. A. Contains code that implements properties, methods, and events.
. B. Allows managed code to access unmanaged code.
. C. Can be changed after it has been published.
. D. A template that defines a set of properties, methods, and events.
210 You want to debug a class library project that will be used by an application named MyApplication.exe. MyApplication.exe is not part of your Microsoft Visual Studio project and is not running currently. You want MyApplication.exe to start automaticall

. A. Set the project's Start Action setting to Start project.
. B. Set the command line arguments to start:MyApplication.exe.
. C. Set the project's Start Action setting to Start external program and select MyApplication.exe.
. D. Set the command line arguments to debug:MyApplication.exe.
211 Which code segment is an example of implicit boxing?

. A. Option A
. B. Option B
. C. Option C
. D. Option D
212 Which configuration file is automatically created by .NET when the file is needed by the application for the first time?

. A. App.config
. B. User.config
. C. Web.config
. D. Machine.config
213 Which two actions are performed by the .NET Version class? (Choose two.)

. A. Returns the version number of the web browser
. B. Provides the base class for value types.
. C. Returns the version number of an assembly.
. D. Returns the version number of the Common Language Runtime.
215 What data is stored on the heap?

. A. Built-in, intrinsic value types
. B. References to objects
. C. Values of parameters in methods
. D. Objects that contain non-value data types
216 In .NET, the automatic memory management system enables:

. A. Synchronization.
. B. Managed code.
. C. Smart caching.
. D. Garbage collection.
217 You create an XML document that has an XmlNode named node1. Which code fragment will read the XML contained in node1 and its subnodes?

. A. Node1.InnerText
. B. Node1.CuterXml
. C. Node1.Value
. D. Node1.ToString ()
. E. Node1.InnerXml
218 You need to ensure that your console application can process each key as it is pressed. Which method should you use?

. A. Console.OpenStandardlnput
. B. Console.ReadLine
. C. Console.Read
. D. Console.ReadKey
219 You want to write log files to a user's My Documents folder. Which class should you use to locate the My Documents folder?

. A. Path
. B. File
. C. Directory
. D. Environment
220 Which two classes in the .NET Framework can you use to open a file? (Each correct answer presents a complete solution. Choose two.)

. A. System.IO.FileInfo
. B. System.IO.File
. C. System.IO.Path
. D. System.IO.Stream
221 Which application domain host manages security for web applications?

. A. Browser
. B. Custom-designed
. C. Server
. D. Shell
222 Which tool should you use to view the minimal, optional, and refused permission sets requested by an assembly?

. A. Permissions View
. B. Migration Policy
. C. Permission Verify
. D. Assembly Registration
223 You need to find out whether the active Windows user of an application is a member of the Administrators group. Which permission class should you use?

. A. PublisherIdentityPermission
. B. PrincipalPermission
. C. SecurityPermission
. D. EnvironmentPermission
224 Which is the build number of a Version object instantiated by using the following code fragment? Dim v As New Version (2, 4, 6, 8)

. A. 2
. B. 4
. C. 6
. D. 8
225 Which should you use to ensure that code can be used by several applications?

. A. Public Policy
. B. Private Assembly
. C. Shared Assembly
. D. Group Policy
226 Which three actions can you perform by using the Strong Name tool? (Choose three.)

. A. Compile the assembly for the first time.
. B. Extract the public key from an assembly.
. C. Re-sign a previously signed assembly.
. D. Create a key pair for an assembly.
. E. Encrypt an assembly.
227 The Common Language Specification (CLS) standard:

. A. Defines a common development environment for writing applications.
. B. Allows code written in different languages to interact.
. C. Defines a common syntax for all programming languages.
. D. Allows code written for a desktop application to run as a web application.
228 Regarding C# code and Microsoft Visual Basic .NET code, language parity refers to the:

. A. Fact that both languages are compiled as Microsoft Intermediate Language (MSIL).
. B. Parts of the language where the syntax is identical.
. C. Functionality that is common in both languages even if the syntax is different.
. D. Ability of the two languages to interoperate.
229 Which type of casting enforces type safety?

. A. Reinterpret
. B. Explicit static
. C. Implicit static
. D. Explicit dynamic
230 Which describes the characteristic of the interoperability of the .NET Framework?

. A. Allows consistent communication between a desktop application and a web application.
. B. Uses the same code syntax.
. C. Allows consistent communication between a desktop application and a mobile application.
. D. Handles exceptions consistently across languages.

Historia de las computadoras ,Es un test para evaluar conocimientos a cerca de la historia de las computadoras. Tags:historia ,informatica. Preguntas:8
¿Sobrevivirias en un mundo pos-apocalíptico? ,contesta con sinceridad y ve el resultado de tus decisiones. Categorías:armas ,supervivencia ,zombies ,decisiones. Preguntas:10
Ejercicio Final Psicología Educativa ,Este ejercicio final valora lo que aprendimos sobre estrategias de aprendizaje.. Tags:estrategias ,aprendizaje ,enseñanza. Preguntas:12
satisfaccion ,como ven la escuela los alumnos. Categorías:satisfaccion. Preguntas:7
Z-Post! ,Todo sobre Z-Post!. Tags:z-post.net. Preguntas:13
cuanto sabes de casi angeles? ,pruevalo y descubriras cuanto sabes de casi angeles. Categorías:casi ,angeles ,2008. Preguntas:8
PREFERENCIAS DEL SAN MARTINENSE ,Este es una prueba que permite medir el grado de preferencia del poblador san martinense y foráneo que visitó y/o visitará nuestra querida región, que se muestra al mundo con sus costumbres y tradiciones, música, comida,. Tags:cuestionario ,banco ,de ,preguntas ,preferencias ,san ,martin ,region ,comida ,danzas ,costumbres ,tradicion ,turista ,turistico ,catratas ,lagos ,lagunas ,rios ,deporte ,naturaleza ,fauna ,flora ,alegria ,fiesta ,san ,juan ,. Preguntas:10
economia ,Economia 1. Categorías:123. Preguntas:20
Prevención de desastres ,De forma divertida, aprende que hacer en caso de emergencia en la institucion . Tags:Que ,hacer ,en ,caso ,de ,desastres. Preguntas:10
Prevención de Desastres ,De forma divertida, aprende que hacer y como comportarse en caso de algún desastre al interior de una institución . Categorías:Que ,hacer ,en ,caso ,de ,desastres. Preguntas:10
derecho ambiental trabajo practo 1 ,trabajo practico 1. Tags:evaluacion. Preguntas:19
radioaficionado ,radioaficonado. Categorías:adioaficonao. Preguntas:10

Crea tu propio test gratis




Comentarios

Hacertests.com no se hace responsable del contenido publicados por los usuarios
Usamos cookies para personalizar los anuncios e analizamos Tráfico para mejorar nuestros contenidos.Compartimos esta información con google analytics, adsense y google+. Nuestra web y Google usa dicha información para dar mejores servicios Ok   Usos de cookies google