Ds Process Qna [dev]

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Anoopkr
A
Anoopkr
Community Contributor
Quizzes Created: 2 | Total Attempts: 254
Questions: 20 | Attempts: 117

SettingsSettingsSettings
Ds Process Qna [dev] - Quiz

.


Questions and Answers
  • 1. 

    What is the command to make a private check out of a file?

    Explanation
    The command "adl_mk_priv" is used to make a private check out of a file. This command allows the user to check out a file and keep it private, preventing others from accessing or modifying it.

    Rate this question:

  • 2. 

    What is the command to list the frameworks in the current SCM Workspace?

    Explanation
    The command "adl_ls_fw" is used to list the frameworks in the current SCM Workspace.

    Rate this question:

  • 3. 

    What is the command to rename a file in a WS?

    • A.

      Adl_rn_elem

    • B.

      Adl_mv

    • C.

      Adl_ren_elem

    • D.

      Adl_chg_elem

    Correct Answer
    B. Adl_mv
    Explanation
    The correct answer is adl_mv. This command is used to rename a file in a WS (Workspace). It allows the user to change the name of a file without altering its contents or location.

    Rate this question:

  • 4. 

    What is the command to remove the changes done in a file in the current workspace and the current image?

    • A.

      Adl_forget_chg

    • B.

      Adl_forget_elem

    • C.

      Adl_rm_chg

    • D.

      None of the above

    Correct Answer
    A. Adl_forget_chg
    Explanation
    The command "adl_forget_chg" is used to remove the changes made to a file in the current workspace and the current image. This command allows the user to discard any modifications made to a file and revert it back to its original state.

    Rate this question:

  • 5. 

    What is the command to type to get help for a particular adele command?

    • A.

      "adele_command" --help

    • B.

      "adele_command" -help

    • C.

      "adele_command" -h

    • D.

      "adele_command" -?

    Correct Answer(s)
    B. "adele_command" -help
    C. "adele_command" -h
    D. "adele_command" -?
    Explanation
    The correct answer is "adele_command" -help,"adele_command" -h,"adele_command" -?. These are the correct commands to type in order to get help for a particular adele command.

    Rate this question:

  • 6. 

    Incident portal belongs to  

    • A.

      Software Change section

    • B.

      Software Planning section

    • C.

      Software Design section

    • D.

      Software Quality section

    Correct Answer
    A. Software Change section
    Explanation
    The incident portal belongs to the Software Change section because it is used to track and manage incidents related to software changes. This section is responsible for implementing and managing changes to software systems, including addressing any issues or incidents that arise during the change process. The incident portal provides a centralized platform for reporting and resolving incidents, ensuring that all necessary information is captured and that appropriate actions are taken to address the incident in a timely manner.

    Rate this question:

  • 7. 

    IR use case related to data corruption, should be flagged as  

    • A.

      CD

    • B.

      HMA

    • C.

      MAND

    • D.

      MUST

    Correct Answer
    C. MAND
    Explanation
    In this context, "MAND" stands for mandatory. The question states that an IR (incident response) use case related to data corruption should be flagged as "MAND". This means that it is necessary or obligatory to flag such cases as mandatory. This flagging would likely indicate that immediate attention and action are required in response to data corruption incidents.

    Rate this question:

  • 8. 

    MAND Flag should be set on the defect if  

    • A.

      Acceptable but costly by pass exists from the customer standpoint

    • B.

      Risk of Critsit generation from the customer

    • C.

      No acceptable by-pass exists from the customer standpoint

    • D.

      High Risk of Critsit generation from the customer

    Correct Answer(s)
    C. No acceptable by-pass exists from the customer standpoint
    D. High Risk of Critsit generation from the customer
    Explanation
    If no acceptable bypass exists from the customer standpoint, it means that there is no alternative solution or workaround that the customer can use to mitigate the issue caused by the defect. This indicates that the defect is significant and cannot be easily resolved or ignored. Additionally, the statement "High Risk of Critsit generation from the customer" suggests that the defect has the potential to cause critical system failures or disruptions, further emphasizing the importance of addressing it.

    Rate this question:

  • 9. 

    Core Dump applies to ...

    • A.

      Severity 1 and 2 defects only

    • B.

      Severity 1 defects only

    • C.

      Severity 1 and MAND defects only

    • D.

      Severity 2 defects only

    Correct Answer
    A. Severity 1 and 2 defects only
    Explanation
    Core Dump applies to Severity 1 and 2 defects only. A core dump is a file that contains the memory image of a program when it crashes or terminates abnormally. It is generated when a program encounters a critical error or bug, typically in the form of a segmentation fault or illegal instruction. Severity 1 and 2 defects are the most critical and impactful issues that can cause system crashes or data corruption. Therefore, core dumps are usually generated for these high-severity defects to aid in debugging and troubleshooting.

    Rate this question:

  • 10. 

    IR is promoted as DUP when

    • A.

      Master IR is closed

    • B.

      Master IR is opened

    • C.

      All of the above

    Correct Answer
    A. Master IR is closed
    Explanation
    When the Master IR is closed, it means that the Infrared (IR) signal is not being transmitted or received. In this case, IR is promoted as DUP, which could mean that an alternative method or technology is being used for data transmission or communication. The exact reason or context for this promotion is not provided in the question, so it is open to interpretation.

    Rate this question:

  • 11. 

    What is wrong about IdentityCard

    • A.

      IdentityCard is a directory

    • B.

      IdentityCard is inside a framework

    • C.

      It is mandatory in all frameworks

    • D.

      None of these

    • E.

      All of the 3 options

    Correct Answer
    D. None of these
    Explanation
    The given answer states that none of the options are wrong about IdentityCard. This implies that there is nothing wrong with IdentityCard being a directory or being inside a framework, and it is not mandatory in all frameworks. Therefore, the answer suggests that IdentityCard is acceptable in its current state and does not have any issues.

    Rate this question:

  • 12. 

    What is the command for checking source code for bad coding practices which can lead to bugs, build break on different platforms

    Correct Answer
    mkCheckSource/mkscc
    Explanation
    The command "mkCheckSource/mkscc" is used to check the source code for bad coding practices that can lead to bugs and build breaks on different platforms. This command is likely a part of a software development tool or framework that offers static code analysis to identify potential issues in the codebase. Running this command helps ensure code quality and maintainability by catching common coding mistakes and practices that can introduce bugs or cause build failures on different platforms.

    Rate this question:

  • 13. 

    Where do the headers available for particular framework only are defined ?

    • A.

      Public Interfaces

    • B.

      Protected Interfaces

    • C.

      Private Interfaces

    • D.

      None of these

    Correct Answer
    C. Private Interfaces
    Explanation
    Private interfaces are where the headers available for a particular framework are defined. These interfaces are only accessible within the framework itself and are not exposed to external code. They provide a way for the framework to define its internal functionality and communicate with its components without exposing them to the outside world. Therefore, private interfaces are the correct place for defining headers specific to a particular framework.

    Rate this question:

  • 14. 

    What is the command creates one or many file(s)  in the current workspace and the current image

    Correct Answer
    adl_mk_elem
    Explanation
    The command "adl_mk_elem" creates one or many file(s) in the current workspace and the current image.

    Rate this question:

  • 15. 

    Where are module level Prerequisites  defined

    • A.

      IdentityCard.xml

    • B.

      Imakefile.mk

    • C.

      LocalInterfaces

    • D.

      None of the above

    Correct Answer
    B. Imakefile.mk
    Explanation
    The correct answer is "Imakefile.mk". In a software development project, module level prerequisites are typically defined in a makefile, which is a file that specifies the build process for the software. The makefile contains instructions on how to compile, link, and build the project, including any dependencies or prerequisites that need to be satisfied before the module can be built. Therefore, the makefile is the most appropriate place to define module level prerequisites.

    Rate this question:

  • 16. 

    DSx R&D authoring tool security is based on:

    • A.

      Macro-processes DEFINE, IMPLEMENT and SUPPORT

    • B.

      People and Organization (P&O) and R&D roles

    • C.

      Release time frame

    • D.

      All of the above

    Correct Answer
    B. People and Organization (P&O) and R&D roles
    Explanation
    The correct answer is "People and Organization (P&O) and R&D roles". This is because the security of the DSx R&D authoring tool is dependent on the people and organization involved, as well as the specific roles within the R&D process. The individuals and teams responsible for using and maintaining the tool play a crucial role in ensuring its security.

    Rate this question:

  • 17. 

    Change management is designed as a maintenance management tool for :

    • A.

      V6 products, developed by DS

    • B.

      V5 & V6 products, developed by DS

    • C.

      All products, developed by DS

    • D.

      None of the options

    Correct Answer
    C. All products, developed by DS
    Explanation
    Change management is a maintenance management tool that is designed to be used for all products developed by DS. This means that DS has developed a comprehensive change management system that can be applied to any product they have created. This suggests that DS values the importance of managing changes effectively and efficiently across all their products, regardless of whether they are V6 or V5 versions.

    Rate this question:

  • 18. 

    Defect that breaks customer production process are flagged as

    • A.

      CRITSIT

    • B.

      MUSTFIX

    • C.

      HF

    • D.

      MAND

    Correct Answer
    A. CRITSIT
    Explanation
    Defects that break the customer's production process are flagged as CRITSIT. This flag indicates that the defect is critical and requires immediate attention and resolution. It signifies that the defect has a severe impact on the customer's operations and needs to be fixed urgently to avoid any further disruption or negative consequences.

    Rate this question:

  • 19. 

    Defect doesn’t prevent the users from using the product, but use is restricted then severity of defect is 

    • A.

      Severity 1

    • B.

      Severity 2

    • C.

      Severity 3

    • D.

      None of these

    Correct Answer
    B. Severity 2
    Explanation
    If a defect does not prevent users from using the product but restricts their use, it can be categorized as Severity 2. This means that while the defect may not completely hinder the functionality of the product, it still significantly impacts the user experience and limits their ability to fully utilize the product's features. Severity 2 defects are important to address as they can cause inconvenience or frustration for users, but they are not critical enough to completely halt the use of the product.

    Rate this question:

  • 20. 

    What is the full form of PHD

    • A.

      Product Highlight Design

    • B.

      Product Highlight Document

    • C.

      Product Highlevel Document

    • D.

      Project Highlight Design

    Correct Answer(s)
    A. Product Highlight Design
    B. Product Highlight Document

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 09, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 20, 2016
    Quiz Created by
    Anoopkr
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.