Ds Process Qna [dev]

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Anoopkr
A
Anoopkr
Community Contributor
Quizzes Created: 2 | Total Attempts: 256
| Attempts: 118 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. What is the command to make a private check out of a file?

Explanation

The command "adl_mk_priv" is used to make a private check out of a file. This command allows the user to check out a file and keep it private, preventing others from accessing or modifying it.

Submit
Please wait...
About This Quiz
Ds Process Qna [dev] - Quiz

The DS Process QnA [Dev] quiz assesses knowledge of specific command line tools used in software development environments. It covers commands for file operations, workspace management, and help... see moresystems within a version control context, essential for efficient software change management. see less

2. What is the command to list the frameworks in the current SCM Workspace?

Explanation

The command "adl_ls_fw" is used to list the frameworks in the current SCM Workspace.

Submit
3. What is the command creates one or many file(s)  in the current workspace and the current image

Explanation

The command "adl_mk_elem" creates one or many file(s) in the current workspace and the current image.

Submit
4.
where are module level Prerequisites  defined

Explanation

The correct answer is "Imakefile.mk". In a software development project, module level prerequisites are typically defined in a makefile, which is a file that specifies the build process for the software. The makefile contains instructions on how to compile, link, and build the project, including any dependencies or prerequisites that need to be satisfied before the module can be built. Therefore, the makefile is the most appropriate place to define module level prerequisites.

Submit
5. What is the command to remove the changes done in a file in the current workspace and the current image?

Explanation

The command "adl_forget_chg" is used to remove the changes made to a file in the current workspace and the current image. This command allows the user to discard any modifications made to a file and revert it back to its original state.

Submit
6. What is the command to rename a file in a WS?

Explanation

The correct answer is adl_mv. This command is used to rename a file in a WS (Workspace). It allows the user to change the name of a file without altering its contents or location.

Submit
7. Defect that breaks customer production process are flagged as

Explanation

Defects that break the customer's production process are flagged as CRITSIT. This flag indicates that the defect is critical and requires immediate attention and resolution. It signifies that the defect has a severe impact on the customer's operations and needs to be fixed urgently to avoid any further disruption or negative consequences.

Submit
8. Change management is designed as a maintenance management tool for :

Explanation

Change management is a maintenance management tool that is designed to be used for all products developed by DS. This means that DS has developed a comprehensive change management system that can be applied to any product they have created. This suggests that DS values the importance of managing changes effectively and efficiently across all their products, regardless of whether they are V6 or V5 versions.

Submit
9.
IR is promoted as DUP when

Explanation

When the Master IR is closed, it means that the Infrared (IR) signal is not being transmitted or received. In this case, IR is promoted as DUP, which could mean that an alternative method or technology is being used for data transmission or communication. The exact reason or context for this promotion is not provided in the question, so it is open to interpretation.

Submit
10.
What is wrong about IdentityCard

Explanation

The given answer states that none of the options are wrong about IdentityCard. This implies that there is nothing wrong with IdentityCard being a directory or being inside a framework, and it is not mandatory in all frameworks. Therefore, the answer suggests that IdentityCard is acceptable in its current state and does not have any issues.

Submit
11. Defect doesn't prevent the users from using the product, but use is restricted then severity of defect is 

Explanation

If a defect does not prevent users from using the product but restricts their use, it can be categorized as Severity 2. This means that while the defect may not completely hinder the functionality of the product, it still significantly impacts the user experience and limits their ability to fully utilize the product's features. Severity 2 defects are important to address as they can cause inconvenience or frustration for users, but they are not critical enough to completely halt the use of the product.

Submit
12.
Where do the headers available for particular framework only are defined ?

Explanation

Private interfaces are where the headers available for a particular framework are defined. These interfaces are only accessible within the framework itself and are not exposed to external code. They provide a way for the framework to define its internal functionality and communicate with its components without exposing them to the outside world. Therefore, private interfaces are the correct place for defining headers specific to a particular framework.

Submit
13.
Incident portal belongs to  

Explanation

The incident portal belongs to the Software Change section because it is used to track and manage incidents related to software changes. This section is responsible for implementing and managing changes to software systems, including addressing any issues or incidents that arise during the change process. The incident portal provides a centralized platform for reporting and resolving incidents, ensuring that all necessary information is captured and that appropriate actions are taken to address the incident in a timely manner.

Submit
14.
Core Dump applies to ...

Explanation

Core Dump applies to Severity 1 and 2 defects only. A core dump is a file that contains the memory image of a program when it crashes or terminates abnormally. It is generated when a program encounters a critical error or bug, typically in the form of a segmentation fault or illegal instruction. Severity 1 and 2 defects are the most critical and impactful issues that can cause system crashes or data corruption. Therefore, core dumps are usually generated for these high-severity defects to aid in debugging and troubleshooting.

Submit
15. DSx R&D authoring tool security is based on:

Explanation

The correct answer is "People and Organization (P&O) and R&D roles". This is because the security of the DSx R&D authoring tool is dependent on the people and organization involved, as well as the specific roles within the R&D process. The individuals and teams responsible for using and maintaining the tool play a crucial role in ensuring its security.

Submit
16.
IR use case related to data corruption, should be flagged as  

Explanation

In this context, "MAND" stands for mandatory. The question states that an IR (incident response) use case related to data corruption should be flagged as "MAND". This means that it is necessary or obligatory to flag such cases as mandatory. This flagging would likely indicate that immediate attention and action are required in response to data corruption incidents.

Submit
17. What is the command to type to get help for a particular adele command?

Explanation

The correct answer is "adele_command" -help,"adele_command" -h,"adele_command" -?. These are the correct commands to type in order to get help for a particular adele command.

Submit
18.
MAND Flag should be set on the defect if  

Explanation

If no acceptable bypass exists from the customer standpoint, it means that there is no alternative solution or workaround that the customer can use to mitigate the issue caused by the defect. This indicates that the defect is significant and cannot be easily resolved or ignored. Additionally, the statement "High Risk of Critsit generation from the customer" suggests that the defect has the potential to cause critical system failures or disruptions, further emphasizing the importance of addressing it.

Submit
19. What is the full form of PHD

Explanation

not-available-via-ai

Submit
20.
What is the command for checking source code for bad coding practices which can lead to bugs, build break on different platforms

Explanation

The command "mkCheckSource/mkscc" is used to check the source code for bad coding practices that can lead to bugs and build breaks on different platforms. This command is likely a part of a software development tool or framework that offers static code analysis to identify potential issues in the codebase. Running this command helps ensure code quality and maintainability by catching common coding mistakes and practices that can introduce bugs or cause build failures on different platforms.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 9, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 09, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 20, 2016
    Quiz Created by
    Anoopkr
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the command to make a private check out of a file?
What is the command to list the frameworks in the current SCM...
What is the command creates one or many file(s)  in the current...
Where are module level Prerequisites  defined
What is the command to remove the changes done in a file in the...
What is the command to rename a file in a WS?
Defect that breaks customer production process are flagged as
Change management is designed as a maintenance management tool for :
IR is promoted as DUP when
What is wrong about IdentityCard
Defect doesn't prevent the users from using the product, but use is...
Where do the headers available for particular framework only are...
Incident portal belongs to  
Core Dump applies to ...
DSx R&D authoring tool security is based on:
IR use case related to data corruption, should be flagged as  
What is the command to type to get help for a particular adele...
MAND Flag should be set on the defect if  
What is the full form of PHD
What is the command for checking source code for bad coding practices...
Alert!

Advertisement