|
Question 1. Consider the following program code: @array - ( "Y", "W", "X"); @array = sort (@array); unshift(@array, "Z"); print($array[0]); What is the output of this code? A. W B. X C. Y D. Z Answer: D Question 2. Consider the following program code: $i – "15"; LOOP: for(; $i < 25; $i++) { if ($i % 2) { next LOOP; } print("$i "); } What is the result of executing this program code? A. The code will output the following: 15 2 4 6 8 10 12 14 16 18 20 22 24 B. The code will output the following: 15 17 19 21 23 25 C. The code will fail at line 2 because $i is not initialized. D. The code will output the following: 16 18 20 22 24 Answer: D Question 3. Which of the following choices demonstrates the correct syntax to pass the argument $arg2 to the subroutine get pass? A. get pass($arg2); B. call &get pass($arg2); C. sub &get pass($arg2); D. call get pass($arg2); Answer: A Question 4. Consider the following program code: @array - ("ALPHA", "beta", "GaMmA"); @array = sort (@array); print ("@array"); What is the output of this code? A. beta GaMmA ALPHA B. ALPHA GaMmA beta C. ALPHA beta GaMmA D. beta ALPHA GaMmA Answer: B Question 5. Consider the following package definition: package Convert; Which one of the following statements should immediately follow the given package definition to create a valid module? A. 1; B. use; C. sub; D. module Convert Answer: A Question 6. Consider the program code: $string - "BOBBY"; $string =~ s/^BO[^0][^0][^0]/ROBERT/; $string =~ s/^\w{2,}B(.*)/G$1RUDE/; $string =~ s/^[R|B]0(.*)/$1/; $string -~ s/^....$/JOHN/; print $string; A. The code will output the following: BOBBY B. The code will output the following: GERTRUDE C. The code will output the following: JOHN D. The code will output the following: ROBERT Answer: B Question 7. Which one of the following statements will add the symbol table for a package into the including package's symbol table? A. include Package; B. require Exporter; C. require Package; D. export Package; Answer: B Question 8. Consider the following code: %chars = ("a", "100", "b", "90", "c", "80"); Which one of the following choices will reverse the key/value pairing of the code? A. reverse(%chars); B. &chars = reverse(%chars); C. reverse(%chars) = &chars; D. invert/%chars); Answer: B Question 9. Consider the following command: per1 runme.pl arg1 arg2 arg3 Given this command issued on the command line, what is the value of @ARGV? A. arg1 B. runme.pl C. arg1 arg2 arg3 D. 2 Answer: C Question 10. The file handle INPUT is associated with the file represented by $file. Which statement will close the file handle INPUT? A. close (INPUT, $file); B. close INPUT; C. INPUT(close, $file); D. close(INPUT); Answer: D Question 11. Given the following statement: for ($count-0; $count < 5; $count++) {print $count "} What will be the output from the given statement? A. 1 2 3 4 5 B. 5 10 15 20 25 C. 1 2 3 4 D. 0 1 2 3 4 Answer: D Question 12. Consider the following program code: $var - 10; package Alpha; $var - 20; { package Beta; $var = 30; } package Gamma; $var = 40; { print $var; } What is the output of this code? A. 10 B. 20 C. 30 D. 40 Answer: D Question 13. Consider that a file named test.txt contains this line of text: One line of test text. What is the output of the following lines of code? $file = "test.txt"; open (OUT, "<$file") || (die "cannot open $file: $!"); seek(OUT, 15, 0); read(OUT, $buffer, 5); print $buffer . "\n"; print tell(OUT); A. t text 20 B. t tex 19 C. t text 19 D. t tex 20 Answer: D Question 14. Consider the following code: %hashA - ("alpha", "beta", "gamma", "albpa"); %hashA = reverse(%hashA); print $hashA{"alpha"}; What is the result of executing this code? A. The code outputs the following: alpha B. The code outputs the following: beta C. The code outputs the following: gamma D. The code fails at line 3. Answer: D Question 15. Consider the following command: perl1 runme.pl arg1 arg2 arg3 Given this command issued on the command line, what is the value of $#ARGV? A. 0 B. 1 C. 2 D. 3 Answer: C Question 16. Consider the following code: $_ - "New York"; @array2 = split(//); What is the value of $array2[0] after this code is executed? A. "" B. "New" C. "NewYork" D. "N" Answer: B Question 17. Consider the following program code: $y – "1"; $x = "2"; $z = "3"; do { print ("$y "); } while ($y eq "2"); do { print ("$x "); } until ($x eq "2"); print ("$z "); What is the result of executing this program code? A. The code will output the following: 1 2 3 B. The code will output the following: 3 C. The code will output the following: 3 2 D. The code will output the following: 3 2 1 Answer: A Question 18. Consider the following program code: %hash = ("small" -> "Boz", "medium" => "16oz", "large" => "32oz"); @keys = sort(keys(%hash)); for ($i = 0; $i < 3; $i++) { print("$hash{$keys[$i]}\n"); } What is the result of executing this program code? A. The code will fail at line 1 because a hash cannot contain both numeric and string data. B. The code will execute without error but will output nothing. C. The will output the following: 32oz 16oz 8oz D. The code will output the following: large medium small Answer: C Question 19. Which of the following choices demonstrates the correct syntax to pass a reference to a subroutine? A. \@array4; B. @array4($ref); C. get pass(\@array4); D. get pass{@array4}; Answer: C Question 20. Consider the following program code: $x – 0; $y = 5; do { print ("$x $y "); ) while (++$x < 5 && ++$y < 10); print ("$x $y "); What is the result of executing this program code? A. The code will output the following: 1 6 2 7 3 8 4 8 5 10 6 11 B. The code will output the following: 0 5 1 6 2 7 3 8 4 9 4 9 C. The code will output the following: 0 5 1 6 2 7 3 8 4 9 5 10 D. The code will output the following: 0 5 1 6 2 7 3 8 4 9 5 9 Answer: D
|
Question 1. How frequently should an LFSCAN be run on a system that is converted out to a relational database? A. Once a Month B. Once Every 6 Months C. Once a Week D. Never Answer: D Question 2. Where would you find information on how to scale an environment for 450 concurrent users on Oracle using HP-UX? A. In the knowledge Base in the Basic Server Sizing Worksheet B. In the document database conversion and RDBMS support C. On the Web Site in the compatibility matrix D. In the document Installation Guide for HP-UX Answer: A Question 3. Which field of the link record must match with the input of the field on the form in order to perform a fill action? A. Target table B. Source Field C. Source table D. Target Field Answer: B Question 4. Where do you globally restrict the maximum number of logins that each user is allowed? A. Contact record B. Operator record C. System Information Definition D. Sc.ini file Answer: C Question 5. Which method can be used to limit the records returned on a query at the database layer? A. Stored Query B. Append Query on a profile C. Inboxes D. Mandanten Security Answer: D Question 6. Which two variables are invalid? (Choose two.) A. $Second Wind B. $SecondWind C. $2ndWind D. $Wind2 E. $Second Wind Answer: C, E Question 7. What are the steps needed to adjust the shared_memory value in the sc.ini file? A. Modify the parameter in the sc.ini file then save B. Stop all clients, stop the server, modify the parameter, save, reboot the system, then restart the server C. Stop all clients, stop the server, modify the parameter, save then restart the server D. Stop all clients,, modify the parameter in the sc.ini file then save Answer: C Question 8. Which factor affects the key selected for a query in P4? A. A sort order is specified B. Record list is enabled C. The partial.key capability word D. The query is performed in the background Answer: A Question 9. Which two types of unloads are valid? (Choose two.) A. Dbdict B. Binary C. Formatted text D. List E. Ascii Answer: B, C Question 10. What feature allows you schedule the removal of unwanted data from the system? A. Scheduled Delete B. Purge/Archive C. Data Vault D. Scheduled Maintenance Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.