1.
What is the command to make a private check out of a file?
Explanation
The command "adl_mk_priv" is used to make a private check out of a file. This command allows the user to check out a file and keep it private, preventing others from accessing or modifying it.
2.
What is the command to list the frameworks in the current SCM Workspace?
Explanation
The command "adl_ls_fw" is used to list the frameworks in the current SCM Workspace.
3.
What is the command to rename a file in a WS?
Correct Answer
B. Adl_mv
Explanation
The correct answer is adl_mv. This command is used to rename a file in a WS (Workspace). It allows the user to change the name of a file without altering its contents or location.
4.
What is the command to remove the changes done in a file in the current workspace and the current image?
Correct Answer
A. Adl_forget_chg
Explanation
The command "adl_forget_chg" is used to remove the changes made to a file in the current workspace and the current image. This command allows the user to discard any modifications made to a file and revert it back to its original state.
5.
What is the command to type to get help for a particular adele command?
Correct Answer(s)
B. "adele_command" -help
C. "adele_command" -h
D. "adele_command" -?
Explanation
The correct answer is "adele_command" -help,"adele_command" -h,"adele_command" -?. These are the correct commands to type in order to get help for a particular adele command.
6.
Incident portal belongs to
Correct Answer
A. Software Change section
Explanation
The incident portal belongs to the Software Change section because it is used to track and manage incidents related to software changes. This section is responsible for implementing and managing changes to software systems, including addressing any issues or incidents that arise during the change process. The incident portal provides a centralized platform for reporting and resolving incidents, ensuring that all necessary information is captured and that appropriate actions are taken to address the incident in a timely manner.
7.
IR use case related to data corruption, should be flagged as
Correct Answer
C. MAND
Explanation
In this context, "MAND" stands for mandatory. The question states that an IR (incident response) use case related to data corruption should be flagged as "MAND". This means that it is necessary or obligatory to flag such cases as mandatory. This flagging would likely indicate that immediate attention and action are required in response to data corruption incidents.
8.
MAND Flag should be set on the defect if
Correct Answer(s)
C. No acceptable by-pass exists from the customer standpoint
D. High Risk of Critsit generation from the customer
Explanation
If no acceptable bypass exists from the customer standpoint, it means that there is no alternative solution or workaround that the customer can use to mitigate the issue caused by the defect. This indicates that the defect is significant and cannot be easily resolved or ignored. Additionally, the statement "High Risk of Critsit generation from the customer" suggests that the defect has the potential to cause critical system failures or disruptions, further emphasizing the importance of addressing it.
9.
Core Dump applies to ...
Correct Answer
A. Severity 1 and 2 defects only
Explanation
Core Dump applies to Severity 1 and 2 defects only. A core dump is a file that contains the memory image of a program when it crashes or terminates abnormally. It is generated when a program encounters a critical error or bug, typically in the form of a segmentation fault or illegal instruction. Severity 1 and 2 defects are the most critical and impactful issues that can cause system crashes or data corruption. Therefore, core dumps are usually generated for these high-severity defects to aid in debugging and troubleshooting.
10.
IR is promoted as DUP when
Correct Answer
A. Master IR is closed
Explanation
When the Master IR is closed, it means that the Infrared (IR) signal is not being transmitted or received. In this case, IR is promoted as DUP, which could mean that an alternative method or technology is being used for data transmission or communication. The exact reason or context for this promotion is not provided in the question, so it is open to interpretation.
11.
What is wrong about IdentityCard
Correct Answer
D. None of these
Explanation
The given answer states that none of the options are wrong about IdentityCard. This implies that there is nothing wrong with IdentityCard being a directory or being inside a framework, and it is not mandatory in all frameworks. Therefore, the answer suggests that IdentityCard is acceptable in its current state and does not have any issues.
12.
What is the command for checking source code for bad coding practices which can lead to bugs, build break on different platforms
Correct Answer
mkCheckSource/mkscc
Explanation
The command "mkCheckSource/mkscc" is used to check the source code for bad coding practices that can lead to bugs and build breaks on different platforms. This command is likely a part of a software development tool or framework that offers static code analysis to identify potential issues in the codebase. Running this command helps ensure code quality and maintainability by catching common coding mistakes and practices that can introduce bugs or cause build failures on different platforms.
13.
Where do the headers available for particular framework only are defined ?
Correct Answer
C. Private Interfaces
Explanation
Private interfaces are where the headers available for a particular framework are defined. These interfaces are only accessible within the framework itself and are not exposed to external code. They provide a way for the framework to define its internal functionality and communicate with its components without exposing them to the outside world. Therefore, private interfaces are the correct place for defining headers specific to a particular framework.
14.
What is the command creates one or many file(s) in the current workspace and the current image
Correct Answer
adl_mk_elem
Explanation
The command "adl_mk_elem" creates one or many file(s) in the current workspace and the current image.
15.
Where are module level Prerequisites defined
Correct Answer
B. Imakefile.mk
Explanation
The correct answer is "Imakefile.mk". In a software development project, module level prerequisites are typically defined in a makefile, which is a file that specifies the build process for the software. The makefile contains instructions on how to compile, link, and build the project, including any dependencies or prerequisites that need to be satisfied before the module can be built. Therefore, the makefile is the most appropriate place to define module level prerequisites.
16.
DSx R&D authoring tool security is based on:
Correct Answer
B. People and Organization (P&O) and R&D roles
Explanation
The correct answer is "People and Organization (P&O) and R&D roles". This is because the security of the DSx R&D authoring tool is dependent on the people and organization involved, as well as the specific roles within the R&D process. The individuals and teams responsible for using and maintaining the tool play a crucial role in ensuring its security.
17.
Change management is designed as a maintenance management tool for :
Correct Answer
C. All products, developed by DS
Explanation
Change management is a maintenance management tool that is designed to be used for all products developed by DS. This means that DS has developed a comprehensive change management system that can be applied to any product they have created. This suggests that DS values the importance of managing changes effectively and efficiently across all their products, regardless of whether they are V6 or V5 versions.
18.
Defect that breaks customer production process are flagged as
Correct Answer
A. CRITSIT
Explanation
Defects that break the customer's production process are flagged as CRITSIT. This flag indicates that the defect is critical and requires immediate attention and resolution. It signifies that the defect has a severe impact on the customer's operations and needs to be fixed urgently to avoid any further disruption or negative consequences.
19.
Defect doesn’t prevent the users from using the product, but use is restricted then severity of defect is
Correct Answer
B. Severity 2
Explanation
If a defect does not prevent users from using the product but restricts their use, it can be categorized as Severity 2. This means that while the defect may not completely hinder the functionality of the product, it still significantly impacts the user experience and limits their ability to fully utilize the product's features. Severity 2 defects are important to address as they can cause inconvenience or frustration for users, but they are not critical enough to completely halt the use of the product.
20.
What is the full form of pHD
Correct Answer(s)
A. Product Highlight Design
B. Product Highlight Document