Professional Documents
Culture Documents
mapped I/O, because objects in such applications must be placed at specific addresses or in
memory allocated by special routines.
6. What is the easiest sorting method to use?
The answer is the standard library function qsort(). Its the easiest sort by far for several reasons:
It is already written.
It is already debugged.
It has been optimized as much as possible (usually).
Void qsort(void *buf, size_t num, size_t size, int (*comp)(const void *ele1, const void *ele2));
7. What is a node class?
A node class is a class that, relies on the base class for services and implementation, provides a
wider interface to users than its base class, relies primarily on virtual functions in its public
interface depends on all its direct and indirect base class can be understood only in the context of
the base class can be used as base for further derivation
Can be used to create objects. A node class is a class that has added new services or functionality
beyond the services inherited from its base class
8. What is the quickest sorting method to use?
The answer depends on what you mean by quickest. For most sorting problems, it just doesnt
matter how quick the sort is because it is done infrequently or other operations take significantly
more time anyway. Even in cases in which sorting speed is of the essence, there is no one
answer. It depends on not only the size and nature of the data, but also the likely order. No
algorithm is best in all cases. There are three sorting methods in this authors toolbox that are all
very fast and that are useful in different situations. Those methods are quick sort, merge sort, and
radix sort.
The Quick Sort
The quick sort algorithm is of the divide and conquer type. That means it works by reducing a
sorting problem into several easier sorting problems and solving each of them. A dividing value
is chosen from the input data, and the data is partitioned into three sets: elements that belong
before the dividing value, the value itself, and elements that come after the dividing value. The
partitioning is performed by exchanging elements that are in the first set but belong in the third
with elements that are in the third set but belong in the first Elements that are equal to the
dividing element can be put in any of the three sets the algorithm will still work properly.
The Merge Sort
The merge sort is a divide and conquer sort as well. It works by considering the data to be sorted
as a sequence of already-sorted lists (in the worst case, each list is one element long). Adjacent
sorted lists are merged into larger sorted lists until there is a single sorted list containing all the
elements. The merge sort is good at sorting lists and other data structures that are not in arrays,
and it can be used to sort things that dont fit into memory. It also can be implemented as a stable
sort.
The Radix Sort
The radix sort takes a list of integers and puts each element on a smaller list, depending on the
value of its least significant byte. Then the small lists are concatenated, and the process is
repeated for each more significant byte until the list is sorted. The radix sort is simpler to
implement on fixed-length data such as ints.
9.How can I search for data in a linked list?
Unfortunately, the only way to search a linked list is with a linear search, because the only way a
linked lists members can be accessed is sequentially. Sometimes it is quicker to take the data
from a linked list and store it in a different data structure so that searches can be more efficient.
The major difference is that all declarations inside a structure are by default public. Class: Class
is a successor of Structure. By default all the members inside the class are private.
8 What is virtual class and friend ?
Ans: Friend classes are used when two or more classes are designed to work together and need
access to each others implementation in ways that the rest of the world shouldnt be allowed to
have. In other words, they help keep private things private. For instance, it may be desirable for
class Database Cursor to have more privilege to the internals of class Database than main() has.
9 What is polymorphism? Explain with an example?
Ans:Poly means many and morph means form. Polymorphism is the ability of an object
(or reference) to assume (be replaced by) or become many different forms of object. Example:
function overloading, function overriding, virtual functions. Another example can be a plus +
sign, used for adding two integers or for using it to concatenate two strings.
10 What is public, protected, private?
Ans:Public, protected and private are three access specifiers in C++.
Public data members and member functions are accessible outside the class.
Protected data members and member functions are only available to derived classes.
Private data members and member functions cant be accessed outside the class. However
there is an exception can be using friend classes.
11 What is RTTI?
Ans: Runtime type identification (RTTI) lets you find the dynamic type of an object when you
have only a pointer or a reference to the base type. RTTI is the official way in standard C++ to
discover the type of an object and to convert the type of a pointer or reference (that is, dynamic
typing). The need came from practical experience with C++. RTTI replaces many homegrown
versions with a solid, consistent approach.
12 What is friend function?
Ans: As the name suggests, the function acts as a friend to a class. As a friend of a class, it can
access its private and protected members. A friend function is not a member of the class. But it
must be listed in the class definition.
13 What is function overloading and operator overloading?
Ans: Function overloading: C++ enables several functions of the same name to be defined, as
long as these functions have different sets of parameters (at least as far as their types are
concerned). This capability is called function overloading. When an overloaded function is
called, the C++ compiler selects the proper function by examining the number, types and order of
the arguments in the call. Function overloading is commonly used to create several functions of
the same name that perform similar tasks but on different data types. Operator overloading
allows existing C++ operators to be redefined so that they work on objects of user-defined
classes. Overloaded operators are syntactic sugar for equivalent function calls. They form a
pleasant facade that doesnt add anything fundamental to the language (but they can improve
understandability and reduce maintenance costs).
14 What is namespace?
Ans: Namespaces allow us to group a set of global classes, objects and/or functions under a
name. To say it somehow, they serve to split the global scope in sub-scopes known as
namespaces. The form to use namespaces is: namespace identifier { namespace-body } Where
identifier is any valid identifier and namespace-body is the set of classes, objects and functions
that are included within the namespace.
For example:
namespace general { int a, b; } In this case, a and b are normal variables integrated within the
general namespace. In order to access to these variables from outside the namespace we have to
use the scope operator.
For example: to access the previous variables we would have to put: generals general::b The
functionality of namespaces is specially useful in case that there is a possibility that a global
object or function can have the same name than another one, causing a redefinition error.
15 What do you mean by inline function?
Ans:The idea behind inline functions is to insert the code of a called function at the point where
the function is called. If done carefully, this can improve the applications performance in
exchange for increased compile time and possibly (but not always) an increase in the size of the
generated binary executables.
16 What do you mean by pure virtual functions?
Ans:Answer A pure virtual member function is a member function that the base class forces
derived classes to provide. Normally these member functions have no implementation. Pure
virtual functions are equated to zero. class Shape { public: virtual void draw() = 0;
};
17 What is a scope resolution operator?
Ans: A scope resolution operator (::), can be used to define the member functions of a class
outside the class.
18 Difference between realloc() and free()?
Ans: The free subroutine frees a block of memory previously allocated by the malloc subroutine.
Undefined results occur if the Pointer parameter is not a valid pointer. If the Pointer parameter is
a null value, no action will occur. The realloc subroutine changes the size of the block of memory
pointed to by the Pointer parameter to the number of bytes specified by the Size parameter and
returns a new pointer to the block. The pointer specified by the Pointer parameter must have been
created with the malloc, calloc, or realloc subroutines and not been deal located with the free or
realloc subroutines. Undefined results occur if the Pointer parameter is not a valid pointer.
19 What are virtual functions?
Ans: A virtual function allows derived classes to replace the implementation provided by the
base class. The compiler makes sure the replacement is always called whenever the object in
question is actually of the derived class, even if the object is accessed by a base pointer rather
than a derived pointer. This allows algorithms in the base class to be replaced in the derived
class, even if users dont know about the derived class.
20 Explain kill() and its possible return values?
Ans:There are four possible results from this call: kill() returns 0. This implies that a process
exists with the given PID, and the system would allow you to send signals to it. It is systemdependent whether the process could be a zombie. kill() returns -1, errno == ESRCH either no
process exists with the given PID, or security enhancements are causing the system to deny its
existence. (On some systems, the process could be a zombie.) kill() returns -1, errno ==
EPERM the system would not allow you to kill the specified process. This means that either the
process exists (again, it could be a zombie) or draconian security enhancements are present (e.g.
your process is not allowed to send signals to *anybody*). kill() returns -1, with some other
value of errno you are in trouble! The most-used technique is to assume that success or failure
with EPERM implies that the process exists, and any other error implies that it doesnt. An
alternative exists, if you are writing specifically for a system (or all those systems) that provide a
/proc filesystem: checking for the existence of /proc/PID may work.
C Interview Questions
1 what is the difference between a while statement and a do statement?
Ans: A while statement checks at the beginning of a loop to see whether the next loop iteration
should occur. A do statement checks at the end of a loop to see whether the next iteration of a
loop should occur. The do statement will always execute the body of a loop at least once.
2 what is the difference between a break statement and a continue statement?
Ans: A break statement results in the termination of the statement to which it applies (switch, for,
do, or while). A continue statement is used to end the current loop iteration and return control to
the loop statement.
3 what does break and continue statements do?
Ans: Continue statement continues the current loop (if label not specified) in a new iteration
whereas break statement exits the current loop.
4 how can you tell what shell you are running on unix system?
Ans: You can do the Echo $RANDOM. It will return a undefined variable if you are from the CShell, just a return prompt if you are from the Bourne shell, and a 5 digit random numbers if you
are from the Korn shell. You could also do a ps -l and look for the shell with the highest PID.
5 what is the difference between a pointer and a reference?
Ans: You can do the Echo $RANDOM. It will return a undefined variable if you are from the CShell, just a return prompt if you are from the Bourne shell, and a 5 digit random numbers if you
are from the Korn shell. You could also do a ps -l and look for the shell with the highest PID.
6 How do you print an address?
Ans: The safest way is to use printf() (or fprintf() or sprintf()) with the %P specification. That
prints a void pointer (void*). Different compilers might print. a pointer with different formats.
Your compiler will pick a format thats right for your environment. If you have some other kind
of pointer (not a void*) and you want to be very safe, cast the pointer to a void*: printf( %Pn,
(void*) buffer ).
7 Can math operations be performed on a void pointer?
Ans: No. Pointer addition and subtraction are based on advancing the pointer by a number of
elements. By definition, if you have a void pointer, you dont know what its pointing to, so you
dont know the size of what its pointing to. If you want pointer arithmetic to work on raw
addresses, use character pointers.
8 How can you determine the size of an allocated portion of memory?
Ans: You cant, really. free() can , but theres no way for your program to know the trick free()
uses. Even if you disassemble the library and discover the trick, theres no guarantee the trick
wont change with the next release of the compiler.
9 what is a null pointer?
Ans: There is times when its necessary to have a pointer that doesnt point to anything. The
macro NULL, defined in , has a value thats guaranteed to be different from any valid pointer.
NULL is a literal zero, possibly cast to void* or char*. Some people, notably C++ programmers,
prefer to use 0 rather than NULL.
The null pointer is used in three ways:
1) To stop indirection in a recursive data structure
2) As an error value
3) As a sentinel value.
10 Is NULL always defined as 0?
Ans: NULL is defined as either 0 or (void*)0. These values are almost identical; either a literal
zero or a void pointer is converted automatically to any kind of pointer, asNecessary, whenever a
pointer is needed (although the compiler cant always tell when a pointer is needed).
11 Difference between arrays and pointers?
Ans: Pointers are used to manipulate data using the address. Pointers use * operator to access the
data pointed to by them.
Arrays use subscripted variables to access and manipulate data. Array variables can be
Equivalently written using pointer expression.
12 Are pointers integers?
Ans: pointers are not integers. A pointer is an address. It is merely a positive number and not an
integer.
13 How are pointer variables?
Ans: Pointer variable are initialized by one of the following two ways
Static memory allocation
Dynamic memory allocation.
14 What are the advantages of the pointer?
Ans: Debugging is easier
It is easier to understand the logic involved in the program
Testing is easier
Recursive call is possible
Irrelevant details in the user point of view are hidden in functions
Functions are helpful in generalizing the Program
15 What is a pointer value and Address?
Ans: A pointer value is a data object that refers to a memory location. Each memory location is
numbered in the memory. The number attached to a memory location is called the address of the
location.
16 What is a pointer variable?
Ans: A pointer variable is a variable that may contain the address of another variable or any valid
address in the memory.
17 What is static memory allocation and dynamic memory allocation?
Ans: Static memory allocation: The compiler allocates the required memory space for a declared
variable. By using the address of operator, the reserved address is obtained and this address may
be assigned to a pointer variable. Since most of the declared variable
Have static memory, this way of assigning pointer value to a pointer variable is known as static
memory allocation. Memory is assigned during compilation time.
Dynamic memory allocation: It uses functions such as malloc ( ) or calloc ( ) to get memory
dynamically. If these functions are used to get memory dynamically and the values returned by
these functions are assigned to pointer variables, such assignments are known as dynamic
memory allocation. Memory is assigned during run time.
18 What is the purpose of main ( )
Ans: The function main ( ) invokes other functions within it. It is the first function to
Be called when the program starts execution.
It is the starting function
It returns an int value to the environment that called the program
Recursive call is allowed for main ( ) also.
It is a user-defined function
Program execution ends when the closing brace of the function main ( ) is reached.
It has two arguments 1) argument count and 2) argument vector (represents strings passed).
Any user-defined name can also be used as parameters for main ( ) instead of argc and argv
19 What is the purpose of realloc ( )?
Ans: The function realloc (ptr, n) uses two arguments. the first argument ptr is a pointer to a
block of memory for which the size is to be altered. The second argument n specifies the new
size. The size may be increased or decreased. If n is greater than the old size and
If sufficient space is not available subsequent to the old region, the function realloc ( )
may create a new region and all the old data are moved to the new region.
20 What are the advantages of auto variables?
Ans: 1) The same auto variable name can be used in different blocks
2) There is no side effect by changing the values in the blocks
< > this is open tag and </ > this is closed tag
1. Head tag contains only titles of the website, documents, pages etc
2. What we want as output we need to write in body tag.
EXAMPLE 2 :
<html>
<head>
<title>SRIHITHA TECHNOLOGIES</TITLE>
<style type=text/css>
<!
.style1 {color: #FF0000}
>
</style>
</head>
<body>
<h1 align=center :=" red=">SRIHITHA TECHNOLOGIES</h1>
<b><u><ol type = a> OFFERED COURSES </u></b>
<h3>
<li>SEO</li>
<li>PHP</li>
<li>JAVA</li>
<li>WEB DESIGNING</li>
<li>C,C++</li>
</h3>
</body>
<html>
*another important thing is that we have to save the file as name.html.
How to start an html program:
First we have to start our internet browser . Select Openin the File menu of your browser.
A dialog box is opened.select file and locate the HTML file (name.html) just you created,
select it
And open. Now you see an address in the dialog box like C:\Mycomputer\name.html. then the
browser will display the page
Explanation for example 2:
The first tag in our HTML document is <html>. This tag tells to our browser that this
is the start of an HTML document.
The last tag in our closed HTML document(</html>). This tag is for END symble.
Some more HTML TAGS
1. <h1>and</h1>, from h1 to h6
Hear h1 tag is header tag and h6 tag is lower tag
2.<b>and</b>
<b> is used for bold the document
3.<u>and</u>
<u> is for under line the document
4.<i>and</i>
<i> is for italic
5.<ol>and</ol>
<ol> is called order list
6.<ul>and</ul>
<ul> is called unorderlist
7.<p>and</p>
It is used for to start a paragraph
8.<br>
It is used for to break aline
9.<li>and</li>
This is called list
Note: <br> tag has no closing tag
a parent who has a collection of children, should you ask the parent for its list of children, or ask
the children who the parents are?
10.What are the benefits does Hibernate Template provide?
The benefits of Hibernate Template are :
* Hibernate Template, a Spring Template class simplifies interactions with Hibernate Session.
* Common functions are simplified to single method calls.
* Sessions are automatically closed.
* Exceptions are automatically caught and converted to runtime exceptions.
pages can also be reloaded individually. Users may perceive the application to be faster or more
responsive, even if the application has not changed on the server side. The use of Ajax can
reduce connections to the server, since scripts and style sheets only have to be requested once.
Disadvantages of Ajax.
Pages dynamically created using successive Ajax requests do not automatically register
themselves with the browsers history engine, so clicking the browsers back button may not
return the user to an earlier state of the Ajax-enabled page, but may instead return them to the
last full page visited before it.
Workarounds include the use of invisible IFrames to trigger changes in the browsers history and
changing the anchor portion of the URL (following a #) when AJAX is run and monitoring it for
changes.
Dynamic web page updates also make it difficult for a user to bookmark a particular state of the
application. Solutions to this problem exist, many of which use the URL fragment identifier (the
portion of a URL after the #) to keep track of, and allow users to return to, the application in a
given state.
Because most web crawlers do not execute JavaScript code, web applications should provide an
alternative means of accessing the content that would normally be retrieved with Ajax, to allow
search engines to index it.
Any user whose browser does not support Ajax or JavaScript, or simply has JavaScript disabled,
will not be able to use its functionality. Similarly, devices such as mobile phones, PDAs, and
screen readers may not have support for JavaScript or the XMLHttp Request object. Also, screen
readers that are able to use Ajax may still not be able to properly read the dynamically generated
content.
The only way to let the user carry out functionality is to fall back to non-JavaScript. This can be
achieved by making sure links and forms can be resolved properly and rely not solely on Ajax. In
JavaScript, form submission could then be halted with return false.
The same origin policy prevents Ajax from being used across domains, although the W3C has a
draft that would enable this functionality.
The lack of a standards body behind Ajax means there is no widely adopted best practice to test
Ajax applications. Testing tools for Ajax often do not understand Ajax event models, data
models, and protocols. Opens up another attack vector for malicious code that web developers
might not fully test for.
Tips on Interview gives many advices to Accounting Professionals, the following are the sample
questions Accounting Professionals need to prepare before attending for Interview.
Questing asked in Interview for Accounting professionals
1.What was the size of the company you were working for?
2.What was your Title in the company?
3.What type of environment suits you best and explain the reason?
4.What is your educational Back Ground?
5.How large was the accounting Group?
6.What product or service did your company provide or Produce?
7.Tell me a situation where you made Mistake in Accounting?
Accounting Professionals are asked many other questions based on Job Clarification. Accounting
professional based on the role or position of job applied they are asked questions covering topics
on Accounts Payable , Payroll, Accounts Receivable or Billing , Bank Account Reconciliation,
Questing on Cost, Audit, Financial Analysis and Tax.
Below Mentioned or some of the sample interview questions for accounting professionals.
1. Do you prepare journal Entries?
2. How is the posting done manually or computerized?
3. What is the total dollar volume of your company Invoices?
4. How many invoices do you match, batch or code per week and per month?
5. What is your responsibility with the companies expense account?
6. How do you handle Discrepancies?
Interview Questions on Payroll
1. How is payroll produced? Do they produce in house or outside service?
2. How many people are working in the payroll department and where does your position fall in
terms of hierarchy?
3. How many employees did you produce Payroll?
4. How do your company pay employees? salary or Hourly?
5. Did you deal with Union or nonunion Payroll?
6. Do you have exposure to payroll Taxes?
7. How does the payroll information get to the financial statements?
Interview Questions on Accounts Receivable/ Billing
1. How complex was the billing process?
2. How many accounts do you work on per week/ month and what is the cash volume?
3. How frequently did your company bill your clients?
4. Explain collection Process of your company?
5. Do you have experience working with lock Box?
6. Do you revive Aging Reports?
Financial Analysis
1. Please explain the type of analysis you perform in your company?
2. What is your role with the corporate budget? What is the total volume on that budget?
3. What type of work do you do with the profit and loss and/or balance sheet?
4. How much short or long term planning have you done?
5. What supervisory role do you play, in your company? Explain if any?
6. When your auditors come to your office how do you assist the auditors?
7. Explain any Financial Modeling? Have you developed any type of financial Modeling?
8. In what way did you utilize the accounting package and what type of ad hoc reporting did you
perform?
9. What types of special projects did you handle in your company?
10. What is your role or interaction with executive management?
Interview Questions on Tax
1. Explain your Experience on Taxing for corporate, partnership, personal, expatriate, property,
sales, payroll, estate, trust, etc
2. What Tax software do you Know?
3. Have you any exposure to bankruptcy Filing?
4. What certifications do you have to practice in the tax field?
5. Have you been involved in any type of management or tax training?
Interview Questions asked for Accounting Manager/ Controller
1. How large was the department that you were responsible for?
2. What was the timing of your monthly close?
3. How consistent and up to date were the monthly account reconciliations and back
reconciliations?
4. What accounting system did you utilize? What did you like about it?
5. Have you ever been involved in a computer conversion?
6. Explain the duties that you handle on a day to day basis?
7. What is your interface with the budget?
8. What is your responsibility with risk management?
9. How much money have you saved your company and how did you do this?
Interview Questions asked for VP Finance/ CFO
Candidates attending for VP Finance /CFO role should be able to answer many of the above
mentioned questions as well as questions such as
1. What could your organization have done to improve operationally?
2. How was the cash flow? Line of Credit? Factoring?
Preparing well for these above mentioned questions helps any accounting Professional to be
Successful in interview. Also read many other Interview tips mentioned in Tips on Interview.
center employers be certain that youve spent sufficient time preparing it for view, then go over it
again. Check for proper grammar and correct spelling
Emphasize your areas of expertise in Help Desk, customer service, customer relation ship
management (CRM), telesales or telemarketing. Candidate attending for call center jobs should
be willing to work in shifts (24/ 7), including weekends and Holidays if the business needs that
level of coverage.
Once selected for call center job companies provide you training and reference materials to
ensure that you have an understanding of companies business, product or service.
Hacking
When computers or network resources are unauthorized used then we call it as Hacking. Hacking
is an act of penetrating computer systems to gain knowledge about the system and how it works.
Different HACKING programs can do different amounts of damages to our computer system this
depends upon what backdoor programs are hiding in our personal computer. The most prominent
definition of hacking is the act of gaining access without legal authorization to a computer or
computer network .Earlier hacker is considered as a gifted programmer but now days it has many
negative implications. When hacking is done by a request and under contract between an ethical
hacker and an organization it is ok or accepted, here ethical hacker has authorization to probe the
target.
The main reason for hacking is due to poor configuration or web servers, disabled security
controls , poorly chosen or default passwords and unpatched or old softwares, Number of gifted
hackers in the world is very small, but there are many problems with hacking now a days.
Technically hacker is someone who is enthusiastic about computer programming and many
things relating to the technical workings of a computer. A hacker first attacks an easy target, and
then uses it to hide his or her traces for launching attacks at more secure sites.
Hackers can see everything we are doing, and can access any file on our disk. Hackers can write
New files, Delete files, Edit files, and do practically anything to a file that could be done to a file.
A hacker could install several programs on to our system without our knowledge. Such programs
could also be used to steal personal information such as email or system passwords and credit
card information. West German hacker (Pengo) exploited the fact that many systems came with
default usernames and passwords which some buyers neglected to change. He succeeded by
persistence.
However, most people understand a hacker as a cracker, cracking software, tries billions of
passwords to find the correct one for accessing a computer; Crackers are programmers who try to
gain unauthorized access to computers. This is normally done through the use of a backdoor
program installed on a computer machine; a lot of crackers also try to gain access to resources
through the use of password. Another method of hacking is to email someone a program that
either automatically runs, or that runs when they click on an attachment
1) Regardless of the data source it provides common data model this feature makes analysis of
data much easier.
2) Inconsistency is identified during the loading process.
3) In case there is a crash of the database, database programmer can feel comfortable because it
is stored in the data ware housing.4) It is very efficient and will not slow down the operational
system.
12) What do you think about the future of data ware housing?
Data ware housing will be used by organizations to analyze their huge pool of data.With the
development of various data ware house appliances performance of data ware housing
applications can be improved. There would be many more apps working in accordance with the
Gartner Group report which makes it much user friendly and reliable.
13) State two major differences between a data ware house and operational data ware
house?
There exist two major differences they are: 1) It integrates information from a pre existing source database
2) It is used for analysis usually for OLAP where huge amounts of data occur frequently.
5) Explain about the integrated data ware house stage?
At this stage data ware house gets updated every time a transaction occurs. The transactions
performed during this time are passed back to the operational systems which records the
transactions.
6)These are some of the questions make sure that you learn many more questions.
Subscript refers to the array occurrence while index is the displacement (in no of bytes) from the
beginning of the array. An index can only be modified using PERFORM, SEARCH & SET.
4. What is binary search?
Search on a sorted array. Compare the item to be searched with the item at the center. If it
matches, fine else repeat the process with the left half or the right half depending on where the
item lies.
5. How do you sort in a COBOL program? Give sort file definition, sort statement syntax
and meaning?
Syntax:
SORT file-1 ON ASCENDING/DESCENDING KEY key.
USING file-2
GIVING file-3.
USING can be substituted by INPUT PROCEDURE IS para-1 THRU para-2
GIVING can be substituted by OUTPUT PROCEDURE IS para-1 THRU para-2.
file-1 is the sort workfile and must be described using SD entry in FILE SECTION.
file-2 is the input file for the SORT and must be described using an FD entry in FILE SECTION
and SELECT clause in FILE CONTROL.
file-3 is the outfile from the SORT and must be described using an FD entry in FILE SECTION
and SELECT clause in FILE CONTROL.
file-1, file-2 & file-3 should not be opened explicitly.
INPUT PROCEDURE is executed before the sort and records must be RELEASEd to the sort
work file from the input procedure.
OUTPUT PROCEDURE is executed after all records have been sorted. Records from the sort
work file must be RETURNed one at a time to the output procedure.
6. What is the use of EVALUATE statement?
Evaluate is like a case statement and can be used to replace nested Ifs. The difference between
EVALUATE and case is that no break is required for EVALUATE i.e. control comes out of the
EVALUATE as soon as one match is made.
> Decisions
Management information systems do not have to be computerized, but with todays large,
multinational corporations, computerization is a must for a business to be successful. MIS
(Management information system) provides several benefits to any Organization; it helps in
providing quick access to relevant data and documents efficient co-ordination between various
departments in an organization, use of less labour, management of day to day activities
effectively and efficiently and Closer contact with the rest of the world .With the introduction of
the Internet and the World Wide Web, students are able to access information faster and more
efficiently using modern Computer Systems. Presently any organization or individual can
quickly access, save and print information from any location. One can access internet from
Cyber Cafes, schools, mobile phones, at home and even at modern libraries through internet
service providers and telecommunication links which helps to make decisions faster.
MIS (Management information system) can be classified as performing three main
functions:
1. MIS helps to generate reports like financial statements, inventory status reports, or
performance reports needed for routine or nonroutine purposes.
2. MIS Helps to answer what-if questions asked by management. For example, questions such as
If company changes credit term for customers what would happen to cash flow? Can be
answered by MIS.
3. MIS helps to support decision making, this type of MIS is appropriately called Decision
Support System (DSS). DSS attempts to integrate the decision maker, the data base, and the
quantitative models being used.
MIS (Management Information System) usually relies on a well-developed data management
system, including a data base for helping management reach accurate and rapid organizational
decisions. MIS personnel must be technically qualified to work with computer hardware,
software, and computer information systems. So MIS used in right proper way will help in
running successful business.
Multimedia and the Internet require a completely new approach to writing. The style of writing
that is appropriate for the on-line world is highly optimized and designed to be able to be
quickly scanned by readers. A good web site must be made with a specific purpose in mind and a
web site with good interactivity and new technology can also be useful for attracting visitors.
The web site must be attractive and innovative in its design, function in terms of its purpose,
easy to navigate, frequently updated and fast to download. When users view a page, they can
only view one web page at a time. As a result, multimedia users must create a mental model of
information structure.
Until Mid-90 due to expensive hardware multimedia usage is limited. With increases in Hard
Ware performance and decreases in price, multimedia is widely used now a days. Almost all PCs
now a days are capable of displaying video, though the resolution available depends on the
power of the computers video adapter and CPU. Multimedia can arguably be distinguished from
traditional motion pictures or movies both by the scale of the production. Multimedia is usually
smaller and less expensive and by the possibility of audience interactivity or involvement (in
which case, it is usually called interactive multimedia.
Multimedia presentations are possible in many contexts, including the Web, CD-ROMs, and live
theater. Since any Web site can be viewed as a multimedia presentation, however, any tool that
helps develop a site in multimedia form can be classed as multimedia software and the cost can
be less than for standard video productions. For multimedia Web sites, popular multimedia sound
or sound and motion video or animation players include QuickTime, MPEG, and Shockwave.
3 What is CLR?
Ans: The CLS is simply a specification that defines the rules to support language integrationin
such a way that programs written in any language, yet can interoperate with one another, taking
full advantage of inheritance, polymorphism, exceptions, and other features. These rules and the
specification are documented in the ECMA proposed standard document, Partition I
Architecture.
4 Is .NET a runtime service or a development platform?
Ans: Its both and actually a lot more. Microsoft .NET includes a new way of delivering software
and services to businesses and consumers. A part of Microsoft.NET is the .NET Frameworks.
The .NET frameworks SDK consists of two parts: the .NET common language runtime and
the .NET class library. In addition, the SDK also includes command-line compilers for C#, C++,
JScript, and VB. You use these compilers to build applications and components. These
components require the runtime to execute so this is a development platform.
5 What is MSIL, IL?
Ans: When compiling to managed code, the compiler translates your source code intoMicrosoft
intermediate language (MSIL),which is a CPU-independent set of instructions that can be
efficiently converted to native code. MSIL includes instructions for loading, storing, initializing,
and calling methods on objects, as well as instructions for arithmetic and logical operations,
control flow, direct memory access, exception handling, and other operations. Microsoft
intermediate language (MSIL) is a language used as the output of a number of compilers and as
the input to a just-in-time (JIT) compiler. The common language runtime includes a JIT compiler
for converting MSIL to native code.
6 Can I write IL programs directly?
Ans: Assembly MyAssembly {}
.class MyApp {
.method static void Main() {
.entrypoint
ldstr Hello, IL!
call void System.Console::WriteLine(class System.Object)
ret
}
}.
7 What is CTS?
Ans: The common type system defines how types are declared, used, and managed in theruntime,
and is also an important part of the runtimes support for cross-language integration.The common
type system supports two general categories of types,eachofwhich isfurther divided into
subcategories:
Value types
Value types directly contain their data, and instances of value types are either allocated on the
stack or allocated inline in a structure. Value types can be built-in (implemented by the runtime),
user-defined, or enumerations.
Reference types
Reference types store a reference to the values memory address, and are allocated on the heap.
Reference types can be self-describing types, pointer types, or interface types. The type of a
reference type can be determined from values of self-describing types. Self-describing types are
further split into arrays and class types. The class types are user-defined classes, boxed value
types, and delegates.
8 What is JIT (just in time)? how it works?
Ans: Before Microsoft intermediate language (MSIL) can be executed, it must beconverted by
a .NET Framework just-in-time (JIT) compiler to native code, which is CPU-specific code that
runs on the same computer architecture as the JIT compiler.
Rather than using time and memory to convert all the MSIL in a portable executable (PE) file to
native code, it converts the MSIL as it is needed during execution and stores the resulting native
code so that it is accessible for subsequent calls.The runtime supplies another mode of
compilation called install-time code generation.The install-time code generation mode converts
MSIL to native code just as the regular JIT compiler does, but it converts larger units of code at
a time, storing the resulting native code for use when the assembly is subsequently loaded and
executed.
As part of compiling MSIL to native code, code must pass a verification process unless an
administrator has established a security policy that allows code to bypass verification.
Verification examines MSIL and metadata to find out whether the code can be determined to be
type safe, which means that it is known to access only the memory locations it is authorized to
access.
9 What is strong name?
Ans: A name that consists of an assemblys identityits simple text name, version number,and
culture information (if provided)strengthened by a public key and a digital signature generated
over the assembly.
10 What is portable executable (PE)?
Ans: The file format defining the structure that all executable files (EXE) and Dynamic
LinkLibraries (DLL) must use to allow them to be loaded and executed by Windows. PE
isderived from the Microsoft Common Object File Format (COFF). The EXE and DLL
filescreated using the .NET Framework obey the PE/COFF formats and also add
additionalheader and data sections to the files that are only used by the CLR. The
specificationfor the PE/COFF file formats is available.
Ans: The cursor position is maintained when the page gets refreshed due to the server side
validation and the page gets refreshed.
18 What is view state?
Ans: The web is stateless. But in ASP.NET, the state of a page is maintained in the in the page
itself automatically. How? The values are encrypted and saved in hidden controls. this is done
automatically by the ASP.NET. This can be switched off / on for a single control.
19 How do you validate the controls in an ASP .NET page?
Ans: Using special validation controls that are meant for this. We have Range Validator, Email
Validator.
20 Can the validation be done in the server side? Or this can be done only in the Client
side?
Ans: Client side is done by default. Server side validation is also possible. We can switch off the
client side and server side can be done.
4.How will you add a new column to a List Of Values ( LOV ) in Oracle Applications
Framework? Can this be done without customization?
Yes, this can be done without customization, i.e. by using OA Framework Extension coupled
with Personalization. Implement the following Steps :a) Extend the VO ( View Object ), to implement the new SQL required to support the LOV.
b) Substitute the base VO, by using jpximport [ similar to as explained in Link ]
c) Personalize the LOV Region, by clicking on Add New Item. While adding the new Item, you
will cross reference the newly added column to VO.
5.You have written a piece of code in POR_CUSTOM_PKG for Oracle Procurement, but
its not taking any effect? What may be the reason?
Depending upon which procedure in POR_CUSTOM_PKG has been programmed, one or more
of the below profile options must be set to Yes.
POR: Enable Req Header Customization
POR: Enable Requisition Line Customization
POR: Enable Req Distribution Customization
6.In OA Framework, once your application has been extended by substitutions, is it
possible to revert back to remove those substitutions?
Yes, by setting profile option Disable Self-Service Personal% to yes, keeping in mind that all
your personalizations will get disabled by this profile option. This profile is also very useful
when debugging your OA Framework based application in the event of some error. By disabling
the personalization via profile, you can isolate the error, i.e. is being caused by your
extension/substitution code or by Oracles standard functionality.
7.How do you setup a context sensitive flexfield?
Note: I will publish a white paper to sho step by step approach. But for the purpose of your
interview, a brief explanation isa)Create a reference field, b) Use that reference field in
Context Field section of DFF Segment screen c) For each possible value of the context field,
you will need to create one record in section Context Field Value ( beneath the global data
elements).
8.Give me one example of securing attributes in i Procurement?
You can define Realm to bundle suppliers into a Category. Such realm can then be assigned to
the User using Define User Screen. Security Attribute ICX_POR_REALM_ID can be used. By
doing so, the user will only be made visible those Punchout suppliers that belong to the realm
against their securing attributes.
9.How does substitution work in OA Framework? What are the benefits of using
Substitution in OA Framework?
Based on the user that has logged into OA Framework, MDS defines the context of the logged in
user. Based upon this logged in context, all applicable personalization are applied by MDS.
Given that substitutions are loaded as site level personalizations, MDS applies the substituted
BC4J objects along with the Personalizations. The above listed steps occur as soon as Root
Application module has been loaded.
The benefit of using Substitution is to extend the OA Framework without customization of the
underlying code. This is of great help during Upgrades. Entity Objects and Validation Objects
can be substituted. I think Root AMs cant be substituted given that substitution kicks off after
Root AM gets loaded.
10.Does oracle support partitioning of tables in Oracle Apps?
Yes, Oracle does support partitioning of tables in Oracle Applications. There are several
implementations that partition on GL_BALANCES. However your client must buy licenses to if
they desire to partition tables. To avoid the cost of licensing you may suggest the clients may
decide to permanently close their older GL Periods, such that historical records can be archived.
11.This is a very tough one, almost impossible to answer, but yet I will ask. Which Form in
Oracle Applications has most number of Form Functions?
Run Reports. And why not, the Form Function for this screen has a parameter to which we
pass name of the Request Group, hence securing the list of Concurrent Programs that are
visible in Run Request Form. Just so that you know, there are over 600 form functions for
Run Reports
12.Can you list any one single limitation of Forms Personalization feature that was
delivered with 11.5.10?
You can not implement interactive messages, i.e. a message will give multiple options for
Response. The best you can get from Forms Personalization to do is popup up Message with OK
option.
13.Does Oracle 10g support rule based optimization?
The official stance is that RBO is no longer supported by 10g.
An object is a combination of messages and data. Objects can receive and send messages and use
messages to interact with each other. The messages contain information that is to be passed to the
recipient object.
2. Explain about the Design Phase?
In the design phase, the developers of the system document their understanding of the system.
Design generates the blue print of the system that is to be implemented. The first step in creating
an object oriented design is the identification of classes and their relationships.
3. Explain about parametric polymorphism?
Parametric polymorphism is supported by many object oriented languages and they are very
important for object oriented techniques. In parametric polymorphism code is written without
any specification for the type of data present. Hence it can be used any number of times.
4. Explain about multiple inheritance?
Inheritance involves inheriting characteristics from its parents also they can have their own
characteristics. In multiple inheritances a class can have characteristics from multiple parents or
classes. A sub class can have characteristics from multiple parents and still can have its own
characteristics.
5. Explain the mechanism of composition?
Composition helps to simplify a complex problem into an easier problem. It makes different
classes and objects to interact with each other thus making the problem to be solved
automatically. It interacts with the problem by making different classes and objects to send a
message to each other.
6. Explain about overriding polymorphism?
Overriding polymorphism is known to occur when a data type can perform different functions.
For example an addition operator can perform different functions such as addition, float addition
etc. Overriding polymorphism is generally used in complex projects where the use of a
parameter is more.
7. Explain about inheritance?
Inheritance revolves around the concept of inheriting knowledge and class attributes from the
parent class. In general sense a sub class tries to acquire characteristics from a parent class and
they can also have their own characteristics. Inheritance forms an important concept in object
oriented programming.
8. Explain the rationale behind Object Oriented concepts?
Object oriented concepts form the base of all modern programming languages. Understanding
the basic concepts of object-orientation helps a developer to use various modern day
programming languages, more effectively.
9.Explain about instance in object oriented programming?
Every class and an object have an instance. Instance of a particular object is created at runtime.
Values defined for a particular object define its State. Instance of an object explains the relation
ship between different elements.
10) Explain about encapsulation?
Encapsulation passes the message without revealing the exact functional details of the class. It
allows only the relevant information to the user without revealing the functional mechanism
through which a particular class had functioned.
11) Explain about polymorphism?
Polymorphism helps a sub class to behave like a parent class. When an object belonging to
different data types respond to methods which have a same name, the only condition being that
those methods should perform different function.
12) Explain about object oriented databases?
Object oriented databases are very popular such as relational database management systems.
Object oriented databases systems use specific structure through which they extract data and they
combine the data for a specific output. These DBMS use object oriented languages to make the
process easier.
13) What are all the languages which support OOP?
There are several programming languages which are implementing OOP because of its close
proximity to solve real life problems. Languages such as Python, Ruby, Ruby on rails, Perl, PHP,
Cold fusion, etc use OOP. Still many languages prefer to use DOM based languages due to the
ease in coding.
14) Explain the implementation phase with respect to OOP?
The design phase is followed by OOP, which is the implementation phase. OOP provides
specifications for writing programs in a programming language. During the implementation
phase, programming is done as per the requirements gathered during the analysis and design
phases.
15) Explain about Object oriented programming?
No. The web server that was delivered on the Tuxedo CD has absolutely nothing to do with Web
Logic. Web Logic is a web application server that is designed for large-scale production
websites. The HTTP server on the Tuxedo CD was only there to provide a mechanism for
launching the graphical Tuxedo administration console if the Tuxedo administrator didnt already
have a web server in place. It was never intended for large-scale, production website use only for
a system administrator or two.
5. Is web server load balancing supported with People Tools 8.4?
Customers can set up clusters of BEA Web Logic or IBM Web Sphere servers to do web server
load balancing. In such scenarios, if an instance is down, requests are automatically routed to
another instance. For more information on high availability and clustering with Web Logic, Web
Sphere and other web servers.
6. Will the PeopleSoft Internet Architecture, now that it embeds BEA Web Logic and IBM
Web Sphere, work with my other corporate web servers and tools?
One of the core values of the People Tools development group is investment protection. The
time, money and resources that you may have already invested in licensing another web server,
training developers and administrators, building and deploying other web applications will not be
compromised by this decision. How is this accomplished?
7. IBM how should Web Application Servers be used with People Tools 8.1x and People
Tools 8.4?
The PeopleSoft Internet Architecture uses a web application server and an HTTP server. People
Tools 8.12 and above include both BEA Web Logic and Apache with Jserv. With People Tools
8.4, both BEA Web Logic and IBM Web Sphere are bundled. Apache with Jserv is no longer a
supported web application server combination. Customers can choose which web application
server to run during installation time. In a mixed People Tools 8.1 xs and 8.4 environments, each
People Tools installation should have their own chain of web application server and application
server, PeopleSoft Proprietary and Confidential Page 5and these can be on the same machine.
For example, a People Tools 8.1xinstallation using Apache and Jserv could reside on the same
machine as a People Tools 8.4 installation using IBM Web Sphere. Care should be taken to
ensure that unique port numbers are assigned to each server chain.
8. How does the PeopleSoft Enterprise Portal work with 8.1x and 8.4 applications?
There are several scenarios that may exist when customers use the PeopleSoft Enterprise Portal
with a mixture of 8.1x and 8.4 applications. Specific information on the use of the PeopleSoft
Enterprise Portal in a blended environment will be available in a forthcoming white paper, which
will be available on Customer Connection. In general, the recommendation is to use the
PeopleSoft Enterprise Portal 8.4with 8.1x and 8.4 applications, rather than an older version.
9. For the server layer on the web server, what version of the Java Servlet API are the PIA
Java Serves coded to with People Tools 8.4?
The PIA Java servlets in People Tools 8.4 are coded to JavaSofts Java Servlet API 2.0 and are
fully compatible with Servlet API 2.2. It should be noted that the PeopleSoft Internet
Architecture is supported only on the BEA Web Logic and Web Sphere servlet engines.
10. Are there advantages or disadvantages to using BEA Web Logic over IBM Web Sphere
or vice versa?
No. Both products are certified with PIA as of version 8.4 and work equally well. By offering
both BEA Web Logic and IBM Web Sphere, we give our customers more choices and flexibility
to run PeopleSoft in their preferred environment.
11. Does Application Messaging work between 8.1xand 8.4 applications?
Application Messaging is used by PeopleSoft applications to communicate with one another.
This is true not just for 8.1x and 8.4 applications, but also between an 8.1x and an 8.4
application. For example, the HRMS 8.3 applications, which are based on People Tools 8.15, can
communicate with Financials 8.4applications, which are based on People Tools 8.4, using
Application Messaging. If specific issues materialize relating to the Application Messages
published by certain applications, these new messages will be made available to customers.
12. Both BEA Web Logic and IBM Web Sphere have the ability to plug into many different
web servers. Does PeopleSoft support the web servers that they plug into?
BEA and IBM provide plug-ins for many of the leading web servers. This allows the customer to
use their own HTTP web server and Web Logic or Web Sphere Java servlet engine. PeopleSoft
uses this plug-in capability to support IIS. We have no reason to believe that there will be any
issues with other web servers that Web Logic or Web Sphere are able to work with through their
plug-in architecture, but PeopleSoft GSC will not support these other web servers with People
Tools 8.4
PHP Faqs
PHP (hyper text Preprocessor) is a computer scripting language. Designed for producing
dynamic web pages, with syntax from C, Java and Perl, PHP code is embedded within HTML
pages for server side execution it has evolved to include a command line interface capability and
can be used in standalone graphical applications. PHP was originally created by Rasmus Lerdorf
in 1995; the main implementation of PHP is now produced by The PHP Group and serves as the
de facto standard for PHP as there is no formal specification. Released under the PHP License,
the Free Software Foundation considers it to be free software. PHP is a widely used generalpurpose scripting language that is especially suited for web development, taking PHP code as its
input and creating web pages as output.
It can be deployed on most web servers and on almost every operating system and platform free
of charge. From this you can create more complex loops and functions to make your page
generate more specialized data. PHP is installed on more than 25 million websites and 1 million
web
servers.
1. What is a PHP File?
Ans:
PHP
files
may
contain
text,
HTML
PHP
files
are
returned
to
the
browser
PHP files have a file extension of .php, .php3, or .phtml.
tags
as
and
plain
scripts.
HTML.
VBScript interpreters are available for various Unix based systems and Windows. However,
finding a COM object that will send e-mail on a Unix system is nearly impossible and very
expensive. This leads to the conclusion that ASP is only really at home in a Microsoft
environment. It has its fair share of security flaws, but when used by professional VB
programmers, I have seen ASP provide some immensely powerful interfaces. PHP on the other
hand can be seen to provide the best results in the form of stability and speed on Unix based
systems.
PHP is Open Source software, which is great as it means that code, manual, updates and support
are all free. Although the ASP script engine comes included with IIS and PWS and minimal
support is available free, running Microsoft operating systems at a commercial level is always
going to be costly.
A lack of high profile sites using PHP makes it a bit harder to prove its robustness and gain
acceptance from non-programming colleagues (e.g. management), but for a programmer the
portability and stability of PHP is beneficial.
5 What is caching?
Ans: Meta tags are easy to use, but arent very effective. Thats because theyre usually only
honored by browser caches (which actually read the HTML), not proxy caches (which almost
never read the HTML in the document).
If a page is changed nearly every day, it will hardly be a problem in practical terms. And in
any case, its something to be handled at the server level, by making the server send some useful
expiration information, using whatever needs to be done on a specific server. Telling that a page
expired twenty years ago is hardly a good idea if you can expect its lifetime to be a day or more,
or at least several hours. Defeating proxy caching brutally wouldnt be a good idea (and meta
tags wont do that, so the errors in a sense cancel out each other, so to say This has to be at the
beginning of the file, with nothing before (e.g. no blank). This is a brute force variation, some
adjustments are useful. (Server supporting PHP is recommended)Meta-tags wont work with
proxies. Proxies dont work on the HTML-layer but HTTP. Things depend on proxy settings
also.The Pragma header is generally ineffective because its meaning is not standardized and few
caches honor it. Using <meta http-equiv=> elements in HTML documents is also generally
ineffective; some browsers may honor such markup, but other caches ignore it completely.
Web Design Group Thats because the no-cache pragma is supposed to be part of a HTTP
*request*. And *this* has been standardized since way back.
SAP QUESTIONS
1. What is ERP?
Ans: ERP stands for Enterprise Resource Planning it is all with techniques and concepts
for an integrated business, which results effectively in the use of management resources,
efficiency of an enterprise. It has been targeted for various businesses and has been
integrating information across the company from manufacturing to small shops using ERP
software.
2. What does SAP stand for?
Ans: SAP stands for Systems Applications and Products in Data Processing; it was
started by five former IBM employees in Mannheim, Germany, states which is the worlds
largest inter-enterprise software company in the year 1972. The original name of SAP in
German is Systeme Anwendungen Produkte.
3. What is IDES?
Ans: IDES stands for International Demonstration and Education System. It was only a
demo system with all applications in order to learn faster and implementation.
4. What is SAP R/3 and what are application, database and presentation servers?
Ans: SAP R/3 is a third generation system with highly integrated software modules that
perform the business function based on multinational leading practice. The application,
database and presentation servers are located at different system in R/3 system. Coming to
the application layer of an R/3 System is made up of the application servers and the
message server, it runs on application server, as well it communicates each other with
presentation components, database using the message server. The complete data is stored in
Centralized Server and that server is called as database server.
5. What is a Client?
Ans: Abstract class is a class designed with implementation gaps for subclasses to fill in and
is deliberately incomplete.
6. What is Customization and Configuration?
Ans: The process of mapping SAP system to the business process by customizing or
adapting the system to the business requirement. This process is known as Customization.
Configuring the system in order to meet the needs of a business by using the existing data.
7. Some Important Transactions Codes of SAP?
Ans:
SPRO DEFINE ITEM CATEGORY
MM01 CREATE MATERIAL
MM02 MODIFY MATERIAL
the whitepaper The IBM Web Sphere 8.1x Early Adopter Program. Are there additional license
requirements for IBM Web Sphere
2. Are disconnected mobile applications supported in People Tools 8.1x?
No. The PeopleSoft Mobile Agent architecture, which is used to support disconnected mobile
applications, is only available in People Tools 8.4. The PeopleSoft Mobile Agent is dependent
upon certain core technologies that were specifically developed for People Tools 8.4.
3. Why did PeopleSoft bundle IBM Web Sphere Advanced Single Server Edition rather
than Advanced Edition?
The Advanced Single Server Edition (AEs) of Web Sphere provides the same core J2EE and Web
Services programming model as the Advanced Edition (AE) with simplified administration. In
the AE version Web Sphere uses DB2 or other standard database to keep the configuration and
runtime information to support very large farm of Web Sphere servers. However, it is one more
database to install, administer and maintain. The AEs version does not use the database and uses
file based configuration in a way that is similar to BEA Web Logic. PeopleSoft and IBM Web
Sphere architects determined that AEs version would satisfy the deployment requirements of
PeopleSoft customers and would make it easy for owning and administering PeopleSoft
Applications based on Web Sphere.
3. Why did PeopleSoft bundle IBM Web Sphere Advanced Single Server Edition rather
than Advanced Edition?
The Advanced Single Server Edition (AEs) of Web Sphere provides the same core J2EE and Web
Services programming model as the Advanced Edition (AE) with simplified administration. In
the AE version Web Sphere uses DB2 or other standard database to keep the configuration and
runtime information to support very large farm of Web Sphere servers. However, it is one more
database to install, administer and maintain. The AEs version does not use the database and uses
file based configuration in a way that is similar to BEA Web Logic. PeopleSoft and IBM Web
Sphere architects determined that AEs version would satisfy the deployment requirements of
PeopleSoft customers and would make it easy for owning and administering PeopleSoft
Applications based on Web Sphere.
4. Is BEA Web Logic the same thing as the web server that was previously on the Tuxedo
CD?
No. The web server that was delivered on the Tuxedo CD has absolutely nothing to do with Web
Logic. Web Logic is a web application server that is designed for large-scale production
websites. The HTTP server on the Tuxedo CD was only there to provide a mechanism for
launching the graphical Tuxedo administration console if the Tuxedo administrator didnt already
have a web server in place. It was never intended for large-scale, production website use only for
a system administrator or two.
5. Is web server load balancing supported with People Tools 8.4?
Customers can set up clusters of BEA Web Logic or IBM Web Sphere servers to do web server
load balancing. In such scenarios, if an instance is down, requests are automatically routed to
another instance. For more information on high availability and clustering with Web Logic, Web
Sphere and other web servers.
6. Will the PeopleSoft Internet Architecture, now that it embeds BEA Web Logic and IBM
Web Sphere, work with my other corporate web servers and tools?
One of the core values of the People Tools development group is investment protection. The
time, money and resources that you may have already invested in licensing another web server,
training developers and administrators, building and deploying other web applications will not be
compromised by this decision. How is this accomplished?
7. IBM how should Web Application Servers be used with People Tools 8.1x and People
Tools 8.4?
The PeopleSoft Internet Architecture uses a web application server and an HTTP server. People
Tools 8.12 and above include both BEA Web Logic and Apache with Jserv. With People Tools
8.4, both BEA Web Logic and IBM Web Sphere are bundled. Apache with Jserv is no longer a
supported web application server combination. Customers can choose which web application
server to run during installation time. In a mixed People Tools 8.1 xs and 8.4 environments, each
People Tools installation should have their own chain of web application server and application
server, PeopleSoft Proprietary and Confidential Page 5and these can be on the same machine.
For example, a People Tools 8.1xinstallation using Apache and Jserv could reside on the same
machine as a People Tools 8.4 installation using IBM Web Sphere. Care should be taken to
ensure that unique port numbers are assigned to each server chain.
8. How does the PeopleSoft Enterprise Portal work with 8.1x and 8.4 applications?
There are several scenarios that may exist when customers use the PeopleSoft Enterprise Portal
with a mixture of 8.1x and 8.4 applications. Specific information on the use of the PeopleSoft
Enterprise Portal in a blended environment will be available in a forthcoming white paper, which
will be available on Customer Connection. In general, the recommendation is to use the
PeopleSoft Enterprise Portal 8.4with 8.1x and 8.4 applications, rather than an older version.
9. For the server layer on the web server, what version of the Java Servlet API are the PIA
Java Serves coded to with People Tools 8.4?
The PIA Java servlets in People Tools 8.4 are coded to JavaSofts Java Servlet API 2.0 and are
fully compatible with Servlet API 2.2. It should be noted that the PeopleSoft Internet
Architecture is supported only on the BEA Web Logic and Web Sphere servlet engines.
10. Are there advantages or disadvantages to using BEA Web Logic over IBM Web Sphere
or vice versa?
No. Both products are certified with PIA as of version 8.4 and work equally well. By offering
both BEA Web Logic and IBM Web Sphere, we give our customers more choices and flexibility
to run PeopleSoft in their preferred environment.
11. Does Application Messaging work between 8.1xand 8.4 applications?
Application Messaging is used by PeopleSoft applications to communicate with one another.
This is true not just for 8.1x and 8.4 applications, but also between an 8.1x and an 8.4
application. For example, the HRMS 8.3 applications, which are based on People Tools 8.15, can
communicate with Financials 8.4applications, which are based on People Tools 8.4, using
Application Messaging. If specific issues materialize relating to the Application Messages
published by certain applications, these new messages will be made available to customers.
12. Both BEA Web Logic and IBM Web Sphere have the ability to plug into many different
web servers. Does PeopleSoft support the web servers that they plug into?
BEA and IBM provide plug-ins for many of the leading web servers. This allows the customer to
use their own HTTP web server and Web Logic or Web Sphere Java servlet engine. PeopleSoft
uses this plug-in capability to support IIS. We have no reason to believe that there will be any
issues with other web servers that Web Logic or Web Sphere are able to work with through their
plug-in architecture, but PeopleSoft GSC will not support these other web servers with People
Tools 8.4
* Bean Factory is able to create associations between collaborating objects as they are
instantiated. This removes the burden of configuration from bean itself and the beans client.
* Bean Factory also takes part in the life cycle of a bean, making calls to custom initialization
and destruction methods.
5. How many modules are there in spring? What are they?
Spring comprises of seven modules. They are..
The core container:
The core container provides the essential functionality of the spring framework. A primary
component of the core container is the Bean Factory, an implementation of the Factory pattern.
The Bean Factory applies the Inversion of Control (IOC) pattern to separate an applications
configuration and dependency specification from the actual application code.
Spring context:
The spring context is a configuration file that provides context information to the Spring
framework. The spring context includes enterprise services such as JNDI, EJB, e-mail,
internalization, validation, and scheduling functionality.
Spring AOP:
The Spring AOP module integrates aspect-oriented programming functionality directly into the
spring framework, through its configuration management feature. As a result you can easily
AOP-enable any object managed by the spring framework. The Spring AOP module provides
transaction management services for objects in any pring-based application. With Spring AOP
you can incorporate declarative transaction management into your applications without relying
on EJB components.
Spring DAO:
The Spring JDBC DAO abstraction layer offers a meaningful exception hierarchy for managing
the exception handling and error messages thrown by different database vendors. The exception
hierarchy simplifies error handling and greatly reduces the amount of exception code you need to
write, such as opening and closing connections.
Spring DAOs JDBC-oriented exceptions comply to its generic DAO exception hierarchy.
Spring ORM:
The spring framework plugs into several ORM frameworks to provide its Object Relational tool,
including JDO, Hibernate, and iBatis SQL Maps. All of these comply to springs generic
transaction and DAO exception hierarchies.
*Make your application more testable by not requiring any singletons or JNDI lookup
mechanisms in your unit test cases. IOC containers make unit testing and switching
implementations very easy by manually allowing you to inject your own objects into the object
under test.
*Loose coupling is promoted with minimal effort and least intrusive mechanism. The factory
design pattern is more intrusive because components or services need to be requested explicitly
whereas in IOC the dependency is injected into requesting piece of code. Also some containers
promote the design to interfaces not to implementations design concept by encouraging managed
objects to implement a well-defined service interface of your own.
*IOC containers support eager instantiation and lazy loading of services. Containers also provide
support for instantiation of managed objects, cyclical dependencies, life cycles management, and
dependency resolution between managed objects etc.
9. What are the advantages of spring framework?
The advantages of spring are as follows:
* Spring has layered architecture. Use what you need and leave you dont need now.
* Spring Enables POJO Programming. There is no behind the scene magic here. POJO
programming enables continuous integration and testability.
* Dependency Injection and Inversion of Control Simplifies JDBC
* Open source and no vendor lock-in.
10. What are the types of Dependency Injection Spring supports?
Setter Injection:
Setter-based DI is realized by calling setter methods on your beans after invoking a no-argument
constructor or no-argument static factory method to instantiate your bean.
language for modifications, changes, updating, etc to the database. Databases can also be
accessible remotely with the help of Call level interface.
2. Explain about Call level interface present in SQL?
In depth explanation of this interface is present in ISO/IEC 9075-3:2003. This extension defines
components which can be used to execute SQL statements written in other programming
languages. This extension is defined in such a way that the statements and procedure calls from
SQL be different from the applications source code.
3 Explain about the object language bindings extension?
This extension is very useful if you are planning to use SQL in Java. This extension defines the
syntax and procedure to follow for SQL embedded in Java. It also makes sure of the syntax and
procedures to follow which ensures the portability of SQL embedded Java in binary applications.
4. Explain about SQL related to RDBMS?
SQL is known as structured query language. It is especially designed to retrieve and store
information of data in relational database management systems. It creates, modifies and makes
the data base object user access the control system. It is primarily specialized software for
RDBMS.
5. Explain about the original design and basics which gave life to SQL?
SQL was originally designed to be a declarative and data manipulation language. Additions to
the language occurred because of addition of new features from vendors such as constructs, data
types, extensions and control flow statements. Important extensions were added to SQL. Cross
platform compatibility has been the main issue for SQL.
6. Explain about XML related specifications?
XML is a very powerful DOM language. Often this language is used with many databases
applications as a front end, SQL acts as a backend to support the Database queries. This
specification has several extensions which defines routines, functions, data type mappings,
storage, etc.
7. State the several languages into which SQL is divided into?
SQL is divided into several sub divisions such as
Statements
Queries
Expressions
Predicates
Clauses
White space
Statement terminator
8. Explain about the information and definition schemas?
This information and definition schema helps the user by giving necessary information about the
tools and functions of SQL. It describes several tools and extensions some of them are object
identifier, security, features provided by DBMS, authorization, values, sizing items, etc. This is
defined by ISO specification.
9. Explain the where clause?
Where clause has a comparison predicate which restricts the number of rows as per the user
generated query. This clause should be applied before the GROUP BY clause. This clause
functions with the help of comparison predicate, when a comparison predicate does not evaluate
a result to be true, all rows from the end result are deleted.
10. Explain about predicates and statements?
Statements have a prolonged effect on the functioning and behavior of the data, care should be
taken before defining a statement to the data. It may control transactions, query, sessions,
connections and program flow Predicates specified conditions which can be evaluated to three
valued logic. Boolean truth values can limit the effect of the statements, program functioning,
queries, etc.
11 Explain about data retrieval?
Data retrieval syntax is often used in combination with data projection. This mechanism is used
when there is a need for calculated result. This is used when there is a special need for calculated
data and not the verbatim data, which is different from the way it was stored in the database.
12. Explain the ORDER BY clause?
Orderby clause identifies the columns which are used to sort the data and the order in which they
should be sorted out. SQL query needs to specify orderly clause of they want the data to be
returned in a defined manner of rows and columns.
13. Explain about the MERGE field?
MERGE is used when you need to combine more than one table for a user generated query. This
field can be aptly said as a combination of INSERT and UPDATE elements. This field is also
given a different name (upsert) in some versions of SQL.
Web Sphere
IBM WebSphere is an application server. IBM WebSPhere is the the leading software for ebusiness on demand providing comprehensive e-business leadership. WebSphere is architected to
enable you to build business-critical applications for the web. WebSphere includes a wide range
of products that help you to develop and serve the Web applications. They are designed to make
it easier for the clients to build, Deploy and Manage dynamic web sites more productively.
WebSphere provides solutions for connecting people, systems, and applications with internal and
external resources. WebSphere is based on infrastructure middleware service designed for ebusiness.It delivers a proven, secure and reliable software portfolio that can provide an excellent
return on investment.
WebSphere is developed based on JAVA/J2EE technologies. So it can support Java/J2EE
applications. IBM WebSphere Administration has the responsibility to define the Environment
for an application and Configuring the Servers, machines and Data Base. It has the responsibility
to deploy and manage the application. It has the responsibility to support the application and
monitoring the performance of the application and servers and improve the performance of the
application servers. If any issues come solving that issues.
Before application servers we have the web servers like apache, sun one, I planet, IIS etc. Web
Servers have the web container will provide the runtime environment to the Web applications
nothing but will execute only Servlets and JSPs and It will generate static web pages.
When you are using the web servers can only server static content. When you are using web
servers we can only fetch the data from the Data Base, but we cant update the data to the Data
Base. If you want to interact with Data Base you need to write set of lines of code in java. Web
servers will not provides the service like JDBC, JMS, and Security. Web servers does not give
support to the EJBs. The Web servers will not give the transaction support also. Web server can
also process the requests coming from the HTTP only. Web servers will not give the full support
the J2EE.
While coming to the Application Server (WebSphere, WebLogic, OracleAppServer), Any
Application Server have an embedded web server (Web container), which give support to the
Web applications. In Addition to that Application server have an EJB container, will provide the
runtime environment to the EJBs. Application server will provide the services like JDBC to
interact with Data Base, with out writing set of lines of code to interact with Data Base and JMS
service to process message oriented requests and It will provide the security also. Application
server will have support for transactions. It can process the requests coming from HTTP, TCP/IP,
FTP, UDP etc.
T3 provides a framework for Web Logic Server messages that support for enhancements. These
enhancements include abbreviations and features, such as object replacement, that work in the
context of Web Logic Server clusters and HTTP and other product tunneling. T3 predates Java
Object Serialization and RMI, while closely tracking and leveraging these specifications. T3 is a
superset of Java Object. Serialization or RMI; anything you can do in Java Object Serialization
and RMI can be done over T3. T3 is mandated between Web Logic Servers and between
programmatic clients and a Web Logic Server cluster. HTTP and IIOP are optional protocols that
can be used to communicate between other processes and Web Logic Server. It depends on what
you want to do. For example, when you want to communicate between a browser and Web Logic
Server-use HTTP, or an ORB and Web Logic Server-IIOP.
11How does a server know when another server is unavailable?
Web Logic Server uses two mechanisms to determine if a given server instance is unavailable.
Each Web Logic Server instance in a cluster uses multicast to broadcast regular heartbeat
messages that advertise its availability. By monitoring heartbeat messages, server instances in a
cluster determine when a server instance has failed. The other server instances will drop a server
instance from the cluster, if they do not receive three consecutive heartbeats from that server
instance
Web Logic Server also monitors socket errors to determine the availability of a server instance.
For example, if server instance A has an open socket to server instance B, and the socket
unexpectedly closes, server A assumes that server B is offline.
12.How many Web Logic Servers can I have on a multi-cpu machine?
There are many possible configurations and each has its own advantages and disadvantages.
BEA Web Logic Server has no built-in limit for the number of server instances that can reside in
a cluster. Large, multi-processor servers such as Sun Microsystems, Inc. Sun Enterprise 10000,
therefore, can host very large clusters or multiple clusters.
In most cases, Web Logic Server clusters scale best when deployed with one Web Logic Server
instance for every two CPUs. However, as with all capacity planning, you should test the actual
deployment with your target web applications to determine the optimal number and distribution
of server instances.
information in a more accurate,flexible, and adaptable way. XML is actually a meta language,
language for describing
other language, which lets you design your own markup languages for limitless different types of
documents.
It is extensible because it is not a fixed format like HTML (which is a single, predefined markup
language). It is classified as an extensible language because it allows its users to define their own
elements.
Primary purpose of XML is to help information systems share structured data, particularly via
the Internet. XML is used both to encode documents and to serialize data.
XML started as a simplified subset of the Standard Generalized Markup Language (SGML), and
is designed to be relatively human-legible. By adding semantic constraints, application languages
can be implemented in XML. These include XHTML, RSS, MathML, GraphML, Scalable
Vector Graphics, MusicXML, and thousands of others. Moreover, XML is sometimes used as the
specification language for such application languages.In the latter context, it is comparable with
other text-based serialization languages such as JSON and YAML.
There are literally thousands of applications that can benefit from XML technologies. For
instance XML allows content management systems to store documents independently of their
format thereby reducing data redundancy. Another answer relates to B2B exchanges or supply
chain management systems. In these instances, XML provides a mechanism for multiple
companies to exchange data according to an agreed upon set of rules. A third common response
involves wireless applications that require WML to render data on hand held devices.
Although XML does not require data to be validated against a DTD, many of the benefits of
using the technology are derived from being able to validate XML documents against business or
technical architecture rules. Polling for the list of DTDs that developers have worked with
provides insight to their general exposure to the technology. The ideal candidate will have
knowledge of several of the commonly used DTDs such as FpML, ebML, DocBook, HRML and
RDF, as well as experience designing a custom DTD for a particular project where no standard
existed.
1) Explain what is a Markup Language ?
A markup language is a set of words and symbols for describing the identity of pieces of a
document (for example this is a paragraph, this is a heading, this is a list, this is the caption
of this figure,
etc). Programs can use this with a style sheet to create output for screen, print, audio, video,
Braille, etc.
2.) Differences between XML and HTML.
Answer -Its amazing how many developers claim to be proficient programming with XML, yet
do not understand the basic differences between XML and HTML. Anyone with a fundamental
grasp of XML should be able describe some of the main differences outlined in the table below:
Differences Between XML and HTML
XML
User definable tags
Content driven
End tags required for well formed documents
Quotes required around attributes values
Slash required in empty tags
HTML
Defined set of tags designed for web display
Format driven
End tags not required
Quotes not required
Slash not required
3) DOM and how does it relate to XML?
The Document Object Model (DOM) is an interface specification maintained by the W3C. DOM
Workgroup that defines application independent mechanism to access, parse or update XML
data. It simple terms it is hierarchical model that allows developers to easily manipulate XML
documents. Any developer that has worked extensively with XML should be able to discuss the
concept and use of DOM objects freely. Additionally, it is not unreasonable to expect advanced
candidates to thoroughly understand its internal workings and be able to explain how DOM
differs from event based interface specifications such as SAX.
4) What is SOAP and how does it relate to XML?
OAP consists of three components: an envelope, a set of encoding rules, and a convention for
representing remote procedure calls. The Simple Object Access Protocol (SOAP) uses XML to
define a protocol for the exchange of information in distributed computing environments. Unless
experience with SOAP is a direct requirement for the open position, knowing the specifics of the
protocol or how it can be used in conjunction with HTTP is not as important as identifying it as a
natural application of XML.
Unchecked Exceptions are those which occur at runtime and need not be explicitly handled.
Runtime Exception and its subclasses, Error and its subclasses fall under unchecked exceptions.
7 what are User defined Exceptions?
Ans: Apart from the exceptions already defined in Java package libraries, user can define his
own exception classes by extending Exception class.
8 what is the importance of finally block in exception handling?
Ans: Finally block will be executed whether or not an exception is thrown. If an exception is
thrown, the finally block will execute even if no catch statement match the exception. Any time a
method is about to return to the caller from inside try/catch block, via an uncaught exception or
an explicit return statement, the finally block will be executed. Finally is used to free up
resources like database connections, IO handles, etc.
9 Can a catch block exist without a try block?
Ans: No. A catch block should always go with a try block.
10 Can a finally block exist with a try block but without a catch?
Ans: Yes. The following are the combinations try/catch or try/catch/finally or try/finally.
11 what will happen to the Exception object after exception handling?
Ans: Exception object will be garbage collected.
12 The subclass exception should precede the base class exception when used within the
catch clause. True/False?
Ans: True.
13 Exceptions can be caught or rethrown to a calling method. True/False?
Ans: True.
14 The statements following the throw keyword in a program are not executed. True/False?
Ans: True.
15 How does finally block differ from finalize () method?
Ans: Finally block will be executed whether or not an exception is thrown. So it is used to free
resoources. Finalize () is a protected method in the Object class which is called by the JVM just
before an object is garbage collected.
Ans: The preferred size of a component is the minimum component size that will allow the
component to display normally
9 which containers use a Flow Layout as their default layout?
Ans: The Panel and Applet classes use the Flow Layout as their default layout
10 what is the immediate super class of the Applet class?
Ans: Panel
11 Name three Component subclasses that support painting?
Ans: The Canvas, Frame, Panel, and Applet classes support painting
12 what is the immediate super class of the Dialog class?
Ans: Window
13 what is clipping?
Ans: Clipping is the process of confining paint operations to a limited area or shape.
14 what is the difference between a Menu Item and a Check box MenuItem?
Ans: The Checkbox Menu Item class extends the MenuItem class to support a menu item that
may be checked or unchecked.
15 what class is the top of the AWT event hierarchy?
Ans: The java.awt.AWTEvent class is the highest-level class in the AWT event-class hierarchy
16 In which package are most of the AWT events that support the event-delegation model
defined?
Ans: Most of the AWT-related events of the event-delegation model are defined in the
java.awt.event package. The AWTEvent class is defined in the java.awt package.
17 which class is the immediate super class of the Menu Component class?
Ans: Object
18 which containers may have a Menu Bar?
Ans: Frame
19 what is the relationship between the Canvas class and the Graphics class?
Ans: A Canvas object provides access to a Graphics object via its paint () method.
20 How are the elements of a Border Layout organized?
Ans: The elements of a Border Layout are organized at the borders (North, South, East, and
West) and the center of a container.
Ans: finalize () method is called by the GC just before releasing the objects memory. It is
normally advised to release resources held by the object in finalize () method.
9 Can an object be resurrected after it is marked for garbage collection?
Ans: Yes. It can be done in finalize () method of the object but it is not advisable to do so.
10 Will the finalize () method run on the resurrected object?
Ans: No. finalize () method will run only once for an object. The resurrected objects will not be
cleared till the JVM cease to exist.
11 GC is single threaded or multi threaded?
Ans: Garbage Collection is multi threaded from JDK1.3 onwards.
12 what are the good programming practices for better memory management?
Ans: a. We shouldnt declare unwanted variables and objects.
b. We should avoid declaring variables or instantiating objects inside loops.
c. When an object is not required, its reference should be nullified.
d. We should minimize the usage of String object and SOPs.
13 When is the Exception object in the Exception block eligible for GC?
Ans: Immediately after Exception block is executed.
14 When are the local variables eligible for GC?
Ans: Immediately after methods execution is completed.
15 If an object reference is set to null, Will GC immediately free the memory held by that
object?
Ans: No. It will be garbage collected only in the next GC cycle.
b. It cannot ordinarily read or write files on the host thats executing it.
c. It cannot make network connections except to the host that it came from.
d.
It
cannot
start
any
program
on
the
host
thats
executing
it.
e. It cannot read certain system properties.
9 Can a applet invoke public methods of another applet on the same page?
Ans: Yes. Its possible.
10 what are untrusted applets?
Ans: By default, all downloaded applets are untrusted. Untrusted Applets are those applets which
cannot access or exceute local system files.
11 How to let a downloaded applet to read a file in the local system?
Ans: To allow any files in the directory /home/user1 to be read by applets loaded into the applet
viewer,
add
the
following
line
to
your
<user
home
directory>/.hot
java/properties
file.
acl.read=/home/user1
you
can
specify
one
file
to
be
read:
acl.read=/home/user1/somedir/somefile
12 How to let a downloaded applet to write to a file in the local system?
Ans: You can allow applets to write to your /tmp directory by setting the acl.write
property
in
your
<user
home
directory>/.hotjava/properties
file:
acl.write=/tmp
You can allow applets to write to a particular file by naming it explicitly:
acl.write=/home/user1/somedir/somefile
13 How do I hide system properties that applets are allowed to read?
Ans: To hide the name of the operating system that you are using, add the following line to your
<user
home
directory>/.hotjava/properties
file:
os.name=null
14 How can I allow applets to read system properties that they arent allowed to read?
Ans: To allow applets to record your user name, add the following line to your <user home
directory>/.hotjava/properties
file:
user.name.applet=true
15 How can an applet open a network connection to a computer on the internet?
Ans: Applets are not allowed to open network connections to any computer, except for the host
that provided the .class files. This is either the host where the html page came from, or the host
specified in the codebase parameter in the applet tag, with codebase taking precedence.
16 Can an applet start another program on the client?
Ans: No, applets loaded over the net are not allowed to start programs on the client. That is, an
applet that you visit cant start some rogue process on your PC. In UNIX terminology, applets
are not allowed to exec or fork processes. In particular, this means that applets cant invoke some
program to list the contents of your file system, and it means that applets cant invoke System.
exit () in an attempt to kill your web browser. Applets are also not allowed to manipulate threads
outside the applets own thread group.
17 what is the difference between applets loaded over the net and applets loaded via the file
system?
Ans: There are two different ways that applets are loaded by a Java system. The way an applet
enters the system affects what it is allowed to do. If an applet is loaded over the net, then it is
loaded by the applet class loader, and is subject to the restrictions enforced by the applet security
manager. If an applet resides on the clients local disk, and in a directory that is on the clients
CLASSPATH, then it is loaded by the
file
system
loader.
The
most
important
differences
are
:
a. applets loaded via the file system are allowed to read and write files
b. applets loaded via the file system are allowed to load libraries on the client
c. applets loaded via the file system are allowed to exec processes
d. applets loaded via the file system are allowed to exit the virtual machine
e. applets loaded via the file system are not passed through the byte code verifier
18 Whats the applet class loader, and what does it provide?
Ans: Applets loaded over the net are loaded by the applet class loader. For
example, the applet viewers applet class loader is implemented by the class
sun.applet.AppletClassLoader.The class loader enforces the Java name space hierarchy. The class
loader guarantees that a unique namespace exists for classes that come from the local file system,
and that a unique namespace exists for each network source. When a browser loads an applet
over the net, that applets classes are placed in a private namespace associated with the applets
origin. Thus, applets loaded from different network sources are partitioned from each other. Also,
classes loaded by the class loader are passed through the verifier. The verifier checks that the
class file conforms to the Java language specification it doesnt assume that the class file was
produced by a friendly or trusted compiler. On the contrary, it checks the class files for
purposeful violations of the language type rules and name space restrictions. The verifier ensures
that:
a.
There
are
no
stack
overflows
or
underflows.
b.
All
register
accesses
and
stores
are
valid.
c.
The
parameters
to
all
byte
code
instructions
are
correct.
d.
There
is
no
illegal
data
conversion.
e. The verifier accomplishes that by doing a data-flow analysis of the byte code instruction
stream, along with checking the class file format, object signatures, and special analysis of
finally clauses that are used for Java exception handling.
19 whats the applet security manager, and what does it provide?
Ans: The applet security manager is the Java mechanism for enforcing the applet restrictions
described above. The applet viewers applet security manager is implemented by
sun.applet.AppletSecurity.A browser may only have one security manager. The security manager
is established at startup, and it cannot thereafter be replaced, overloaded, overridden, or
extended.
Applets
cannot
create
or
reference
their
own
security
manager.
20 If other languages are compiled to Java byte codes, how does that affect the applet
security model?
Ans: The verifier is independent of Suns reference implementation of the Java compiler and the
high-level specification of the Java language. It verifies byte codes generated by other Java
compilers. It also verifies byte codes generated by compiling other languages into the byte code
format. Byte codes imported over the net that pass the verifier can be trusted to run on the Java
virtual machine. In order to pass the verifier, byte codes have to conform to the strict typing, the
object signatures, the class file format, and the predictability of the runtime stack that are all
defined by the Java language implementation.
Ans: == is used to check whether the references are of the same object.
.equals () is used to check whether the contents of the objects are the same.
But with respect to strings, object refernce with same content
will refer to the same object.
String str1=Hello;
String str2=Hello;
(str1==str2) and str1.equals(str2) both will be true.
If you take the same example with Stringbuffer, the results would be different.
Stringbuffer str1=Hello;
Stringbuffer str2=Hello;
str1.equals(str2) will be true.
str1==str2 will be false.
5 Is String a Wrapper Class or not?
Ans: No. String is not a Wrapper class
6 How will you find length of a String object?
Ans: Using length () method of String class.
7 How many objects are in the memory after the exection of following code segment?
Ans: String str1 = ABC;
String str2 = XYZ;
String str1 = str1 + str2;
There are 3 Objects.
8 what is the difference between an object and object reference?
Ans: An object is an instance of a class. Object reference is a pointer to the object. There can be
many refernces to the same object.
9 what will trim () method of String class do?
Ans: The trim () eliminate spaces from both the ends of a string. ***
10 what is the use of java.lang.Class class?
Ans: The java.lang.Class class is used to represent the classes and interfaces that are loaded by a
java program.
11 what is the possible runtime exception thrown by substring () method?
Ans: ArrayIndexOutOfBoundsException.
12 what is the difference between String and String Buffer?
Ans: Objects of String class is immutable and objects of String Buffer class is
mutable moreover String Buffer is faster in concatenation.
13 what is the use of Math class?
Ans: Math class provides methods for mathematical functions.
14 Can you instantiate Math class?
Ans: No. It cannot be instantiated. The class is final and its constructor is private. But all the
methods are static, so we can use them without instantiating the Math class.
15 what will Math. abs () do?
Ans: It simply returns the absolute value of the value supplied to the method, i.e. gives you the
same value. If you supply negative value it simply removes the sign.
16 what will Math. ceil () do?
Ans: This method returns always double, which is not less than the supplied value. It returns
next available whole number
17 what will Math. floor () do?
Ans: This method returns always double, which is not greater than the supplied value.
18 what will Math. ax () do?
Ans: The max () method returns greater value out of the supplied values.
19 what will Math. in() do?
Ans: The min () method returns smaller value out of the supplied values.
20 what will Math. Random () do?
Ans: The random () method returns random number between 0.0 and 1.0. It always returns
double.
1 what is a Servlet?
Ans: A Servlet is a server side java program which processes client requests and generates dynamic web content.
2 Explain the architechture of a Servlet?
Ans: The javax.servlet.Servlet interface is the core abstraction which has to be implemented by all servlets either
directly or indirectly. Servlet run on a server side JVM ie the servlet container. Most servlets implement the interface
by extending either javax.servlet.GenericServlet or javax.servlet.http.HTTPServlet.A single servlet object serves
multiple requests using multithreading.
3 what is the difference between an Applet and a Servlet?
Ans: An Applet is a client side java program that runs within a Web browser on the client machine whereas a servlet
is a server side component which runs on the web server. An applet can use the user interface classes like AWT or
Swing while the servlet does not have a user interface. Servlet waits for clients HTTP requests from a browser and
generates a response that is displayed in the browser.
4 what is the difference between GenericServlet and HTTP Servlet?
Ans: GenericServlet is a generalised and protocol independent servlet which defined in javax.servlet package.
Servlets extending GenericServlet should override service () method. Javax.servlet.http.HTTPServlet extends
GenericServlet. HTTPServlet is http protocol specific ie it services only those requests thats coming through http. A
subclass of HttpServlet must override at least one method of doGet (), doPost (), doPut(), do Delete (), init (),
destroy () or getServletInfo ().
5 Explain life cycle of a Servlet?
Ans: On clients initial request, Servlet Engine loads the servlet and invokes the init () methods to initialize the
servlet. The servlet object then handles subsequent client requests by invoking the service () method. The server
removes the servlet by calling destry () method.
6 what is the difference between doGet () and doPost ()?
Ans: doGET Method: Using get method we can able to pass 2K data from HTML All data we are passing to Server
will be displayed in URL (request string).DoPOST Method: In this method we does not have any size limitation. All
data passed to server will be hidden; User cannot able to see this info on the browser.
7 what is the difference between ServletConfig and ServletContext?
Ans: ServletConfig is a servlet configuration object used by a servlet container to pass information to a servlet
during initialization. All of its initialization parameters can only be set in deployment descriptor. The ServletConfig
parameters are specified for a particular servlet and are unknown to other servlets.The ServletContext object is
contained within the ServletConfig object, which the Web server provides the servlet when the servlet is initialized.
ServletContext is an interface which defines a set of methods which the servlet uses to interact with its servlet
container. ServletContext is common to all servlets within the same web application. Hence, servlets use
ServletContext to share context information.
8 what is the difference between using get Session (true) and get Session (false) methods?
Ans: get Session (true) method will check whether already a session exists for the user. If a session is existing, it will
return the same session object, Otherwise it will create a new session object and return that object.
Get Session (false) method will check for the existence of a session. If a session exists, then it
will return the reference of that session object, if not, it will return null.
9 what is meant by a Web Application?
Ans: A Web Application is a collection of servlets and content installed under a specific subset of the servers URL
namespace such as /catalog and possibly installed via a .war file.
10 what is a Server Side Include?
Ans: Server Side Include is a Web page with an embedded servlet tag. When the Web page is accessed by a browser,
the web server pre-processes the Web page by replacing the servlet tag in the web page with the hyper text generated
by that servlet.
11 what is Servlet Chaining?
Ans: Servlet Chaining is a method where the output of one servlet is piped into a second servlet. The output of the
second servlet could be piped into a third servlet, and so on. The last servlet in the chain returns the output to the
Web browser.
12 How do you find out what client machine is making a request to your servlet?
Ans: The ServletRequest class has functions for finding out the IP address or host name of the client machine.
GetRemoteAddr () gets the IP address of the client machine and getRemoteHost () gets the host name of the client
machine.
13 what is the structure of the HTTP response?
Ans: The response can have 3 parts:
1) Status Code describes the status of the response. For example, it could indicate that the request was successful,
or that the request failed because the resource was not available. If your servlet does not return a status code, the
success status code,HttpServletResponse.SC_OK, is returned by default.
2) HTTP Headers contains more information about the response. For example, the header could specify the
method used to compress the response body.
3) Body contents of the response. The body could contain HTML code, an image, etc
14 what is a cookie?
Ans: A cookie is a bit of information that the Web server sends to the browser which then saves the cookie to a file.
The browser sends the cookie back to the same server in every request that it makes. Cookies are often used to keep
track of sessions.
15 which code line must be set before any of the lines that use the Print Writer?
Ans: setContentType () method must be set
16 Which protocol will be used by browser and servlet to communicate?
Ans: HTTP
17 Can we use the constructor, instead of init(), to initialize servlet?
Ans: Yes, of course you can use the constructor instead of init(). Theres nothing to stop you. But you shouldnt. The
original reason for init() was that ancient versions of
Java couldnt dynamically invoke constructors with arguments, so there was no way to give the constructur a
ServletConfig. That no longer applies, but servlet containers still will only call your no-arg constructor. So you
wont have access to a ServletConfig or ServletContext.
18 How can a servlet refresh automatically if some new data has entered the database?
Ans: You can use a client-side Refresh or Server Push
19 what is the Max amount of information that can be saved in a Session Object?
Ans: As such there is no limit on the amount of information that can be saved in a Session Object. Only the RAM
available on the server machine is the limitation. The only limit is the Session ID length (Identifier), which should
not exceed more than 4K. If the data to be store is very huge, then its preferred to save it to a temporary file onto
hard disk, rather than saving it in session. Internally if the amount of data being saved in Session exceeds the
predefined limit, most of the servers write it to a temporary cache on hard disk.
20 what is HTTP Tunneling?
Ans: HTTP tunneling is used to encapsulate other protocols within the HTTP or HTTPS protocols. Normally the
intra-network of an organization is blocked by a firewall and the network is exposed to the outer world only through
a specific web server port that listens for only HTTP requests. To use any other protocol, that by passes the firewall,
the protocol is embedded in HTTP and sent as Http Request. The masking of other protocol requests as http requests
is HTTP Tunneling.
response sent to the client is a combination of template data and dynamically-generated data. In
this situation, it is much easier to work with JSP pages than to do everything with servlets.
4 How are the JSP requests handled?
Ans: The following sequence of events happens on arrival of jsp request:
a. Browser requests a page with .jsp file extension in web server.
b. Web server reads the request.
c. Using jsp compiler, webserver converts the jsp into a servlet class that implement the
javax.servletjsp.jsp page interface. The jsp file compiles only when the page is first requested or
when the jsp file has been changed.
e. The response is sent to the client by the generated servlet.
5 what are the advantages of JSP?
Ans: The following are the advantages of using JSP:
a. JSP pages easily combine static templates, including HTML or XML fragments, with code that
generates dynamic content.
b. JSP pages are compiled dynamically into servlets when requested, so page authors can easily
make updates to presentation code. JSP pages can also be precompiled if desired.
c. JSP tags for invoking JavaBeans components manage these components completely, shielding
the page author from the complexity of application logic.
d. Developers can offer customized JSP tag libraries that page authors access using an XML-like
syntax.
e. Web authors can change and edit the fixed template portions of pages without affecting the
application logic. Similarly, developers can make logic changes at the component level without
editing the individual pages that use the logic.
6 How is a JSP page invoked and compiled?
Ans: Pages built using JSP technology are typically implemented using a translation phase that is
performed once, the first time the page is called. The page is compiled into a Java Servlet class
and remains in server memory, so subsequent calls to the page have very fast response times.
7 what are Directives?
Ans: Directives are instructions that are processed by the JSP engine when the page is compiled
to a servlet. Directives are used to set page-level instructions, insert data from external files, and
specify custom tag libraries.
8 what are the different types of directives available in JSP?
Ans: The following are the different types of directives:
a. include directive : used to include a file and merges the content of the file with the current
page
b. page directive : used to define page specific attributes like scripting language, error page,
buffer, thread safety, etc
c. taglib : used to declare a custom tag library which is used in the page.
9 what are JSP actions?
Ans: JSP actions are executed when a JSP page is requested. Actions are inserted in the jsp page
using XML syntax to control the behavior of the servlet engine. Using action, we can
dynamically insert a file, reuse bean components, forward the user to another page, or generate
HTML for the Java plugin. Some of the available actions are as follows:
<jsp: include> include a file at the time the page is requested.
<jsp: useBean> find or instantiate a JavaBean.
<jsp: setProperty> set the property of a JavaBean.
<jsp: getProperty> insert the property of a JavaBean into the output.
<jsp: forward> forward the requester to a new page.
<jsp: plugin> generate browser-specific code that makes an OBJECT or EMBED tag for the
Java plugin.
10 what are Script lets?
Ans: Script lets are blocks of programming language code (usually java) embedded within a JSP
page. Scriptlet code is inserted into the servlet generated from the page. Scriptlet code is defined
between <% and %>
11 what are Decalarations?
Ans: Declarations are similar to variable declarations in Java. Variables are defined for
subsequent use in expressions or script lets.
12 How to declare instance or global variables in jsp?
Ans: Instance variables should be declared inside the declaration part. The variables declared
with JSP declaration element will be shared by all requests to the jsp page.
13 what are Expressions?
Ans: Expressions are variables or constants that are inserted into the data returned by the web
server.
14 what is meant by implicit objects? And what are they?
Ans: Implicit objects are those objects which are available by default. These objects are instances
of classes defined by the JSP specification. These objects could be used within the jsp page
without being declared.
language. JSP is portable to other operating systems and non-Microsoft Web servers whereas it is
not possible with ASP
20 Cant JavaScript be used to generate dynamic content rather than JSP?
Ans: JavaScript can be used to generate dynamic content on the client browser. But it can handle
only handles situations where the dynamic information is based on the clients environment. It
will not able to harness server side information directly.
7 How many java files should a developer code to develop a session bean?
Ans: 3 java files has to be provided by the developer. They are:
1) an Home Interface
2) a Remote Interface
3) And a Session Bean implementation class.
8 Explain the role of Home Interface.?
Ans: Home interface contains factory methods for locating, creating and removing instances of
EJBs.
9 Explain the role of Remote Interface.?
Ans: Remote interface defines the business methods callable by a client. All methods defined in
the remote interface must throw Remote Exception.
10 what is the need for a separate Home interface and Remote Interface. Cant they be
defined in one interface?
Ans: EJB doesnt allow the client to directly communicate with an enterprise bean. The client
has to use home and remote interfaces for any communication with the bean.The Home Interface
is for communicating with the container for beans life cycle operations like creating, locating,
removing one or more beans. While the remote interface is used for remotely accessing the
business methods.
11 what are callback methods?
Ans: Callback methods are beans methods, which are called by the container. These are called to
notify the bean, of its life cycle events.
12 How will you make a session bean as stateful or stateless?
Ans: We have to specify the it in the deployment descriptor (ejb-jar.xml) using <session-type>
tag.
13 what is meant by Activation?
Ans: The process of transferring an enterprise bean from secondary storage to memory.
14 what is meant by Passivation?
Ans: The process of transferring an enterprise bean from memory to secondary storage.
15 hat is a re-entrant Entity Bean?
Ans: An re-entrant Entity Bean is one that can handle multiple simultaneous,
interleaved, or nested invocations which will not interfere with each other.
16 Why are ejbActivate () and ejbPassivate () included for stateless session bean even
though they are never required as it is a no conversational bean?
Ans: To have a consistent interface, so that there is no different interface that you need to
implement for Stateful Session Bean and Stateless Session Bean. Both Stateless and Stateful
Session Bean implement javax.ejb.SessionBean and this would not be possible if stateless
session bean is to remove ejbActivate and ejbPassivate from the interface.
17 what is an EJB Context?
Ans: EJBContext is an object that allows an enterprise bean to invoke services provided by the
container and to obtain the information about the caller of a client-invoked method.
18 Explain the role of EJB Container?
Ans: EJB Container implements the EJB component contract of the J2EE architecture. It
provides a runtime environment for enterprise beans that includes security, concurrency, life
cycle management, transactions, deployment, naming, and other services. An EJB Container is
provided by an EJB Server.
19 what are Entity Beans?
Ans: Entity Bean is an enterprise bean that represents persistent data maintained in a atabase. An
entity bean can manage its own persistence or can delegate this function to its container. An
entity bean is identified by a primary key. If the container in which an entity bean is hosted
crashes, the entity bean, its primary key, and any remote references survive the crash.
20 what is a Primary Key?
Ans: Primary Key is an object that uniquely identifies an entity bean within a home.
1 what is messaging?
Ans: Messaging is a method of communication between software components or applications.
2 what is JMS?
Ans: Java Message Service is a Java API that allows applications to create, send, receive, and
read messages.
3 Is JMS a specification or a product?
Ans: JMS is a specification.
4 what are the features of JMS?
Ans: The following are the important features of JMS:
a. Asynchronous Processing.
b. Store and forwarding.
c. Guaranteed delivery.
d. Provides location transparency.
e. Service based Architecture.
5 what are two messaging models or messaging domains?
Ans: a. Point-to-Point Messaging domain.
b. Publish/Subscribe Messaging domain
6 Explain Point-to-Point Messaging model.?
Ans: A point-to-point (PTP) product or application is built around the concept of message
queues, senders, and receivers. Each message is addressed to a specific queue, and receiving
clients extract messages from the queue(s) established to hold their messages. Queues retain all
messages sent to them until the messages are consumed or until the messages expire.
Point-to-Point Messaging has the following characteristics:
a. Each Message has only one consumer.
b. The receiver can fetch the message whether or not it was running when the client sent the
message.
c. The receiver acknowledges the successful processing of a message.
7Explain Pub/Sub Messaging model.?
Ans: In a publish/subscribe (pub/sub) product or application; clients address messages to a topic.
Publishers and subscribers are generally anonymous and may dynamically publish or subscribe
to the content hierarchy. The system takes care of distributing the messages arriving from a
topics multiple publishers to its multiple subscribers. Topics retain messages only as long as it
takes to distribute them to current subscribers.
Pub/sub messaging has the following characteristics:
a. Each message may have multiple consumers.
b. Publishers and subscribers have a timing dependency. A client that subscribes to a topic can
consume only messages published after the client has created a subscription, and the subscriber
must continue to be active in order for it to consume messages.
8 what are the two types of Message Consumption?
Ans: a. Synchronous Consumption: A subscriber or a receiver explicitly fetches the message
from the destination by calling the receive method. The receive method can block until a
message arrives or can time out if a message does not arrive within a specified time limit.
b. Asynchronous Consumption: A client can register a message listener with a consumer. A
message listener is similar to an event listener. Whenever a message arrives at the destination, the
JMS provider delivers the message by calling the listeners on Message method, which acts on
the contents of the message.
9 what is a connection factory?
Ans: A connection factory is the object a client uses to create a connection with a provider. A
connection factory encapsulates a set of connection configuration arameters that has been
defined by an administrator. Each connection factory is an instance of either the
QueueConnectionFactory or the TopicConnectionFactory interface.
10 what is a destination?
Ans: A destination is the object a client uses to specify the target of messages it produces and the
source of messages it consumes. In the PTP messaging domain, destinations are called queues
and in the pub/sub messaging domain, destinations are called topics.
11 what is a message listener?
Ans: A message listener is an object that acts as an asynchronous event handler for messages.
This object implements the Message Listener interface, which contains one method, on Message.
In the on Message method, you define the actions to be taken when a message arrives.
12 what is a message selector?
Ans: Message selector filters the messages received by the consumer based on criteria. Message
selectors assign the work of filtering messages to the JMS provider rather than to the application.
A message selector is a String that contains an expression. The syntax of the expression is based
on a subset of the SQL92 conditional expression syntax. The message consumer then receives
only messages whose headers and properties match the selector.
13 Can a message selector select messages on the basis of the content of the message body?
Ans: No. The message selection is only based on message header and message
properties.
14 what are the parts of a JMS message?
Ans: A JMS message has three parts:
a. header
b. Properties (optional)
c. body (optional)
15 what is a message header?
Ans: A JMS message header contains a number of predefined fields that contain values that both
clients and providers use to identify and to route messages. Each header field has associated
setter and getter methods, which are documented in the description of the Message interface.
16 what are message properties?
Ans: Message properties are additional user defined properties other than those that are defined
in the header.
17 what is the root exception of JMS?
Ans: JMSException is the root class for exceptions thrown by JMS API methods.
18 Name few subclasses of JMS Exception?
Ans: a. Message Format Exception
b. Message EOF Exception
c. Invalid Client ID Exception
d. Invalid Destination Exception
e. Invalid Selector Exception
19 what is a Message?
Ans: A message is a package of business data that is sent from one application to another over
the network. The message should be self-describing in that it should contain all the necessary
context to allow the recipients to carry out their work independently.
20 How many types are there and what are they?
Ans: There are 5 types of Messages. They are:
a. Text Message : A java.lang.String object (for example, the contents of an Extensible Markup
Language file).
b. Map Message: A set of name/value pairs, with names as String objects and values as primitive
types in the Java programming language. The entries can be accessed sequentially by enumerator
or randomly by name. The order of the entries is undefined.
c. Bytes Message: A stream of uninterrupted bytes. This message type is for literally encoding a
body to match an existing message format.
d. Stream Message: A stream of primitive values in the Java programming language, filled and
read sequentially.
e. Object Message: A Serializable object in the Java programming language.
modify a shared object while another thread is in the process of using or updating that objects
value. This often leads to significant errors.
6 Can a lock be acquired on a class?
Ans: Yes, a lock can be acquired on a class. This lock is acquired on the classs Class object.
7 Whats new with the stop (), suspend () and resume () methods in JDK 1.2?
Ans: The stop (), suspend () and resume () methods have been deprecated in JDK 1.2.
8 Is null a keyword?
Ans: The null value is not a keyword.
9 What is the preferred size of a component?
Ans: The preferred size of a component is the minimum component size that will allow the
component to display normally.
10 What method is used to specify a containers layout?
Ans: The set Layout () method is used to specify a containers layout.
11 Which containers use a Flow Layout as their default layout?
Ans: The Panel and Applet classes use the Flow Layout as their default layout.
12 What state does a thread enter when it terminates its processing?
Ans: When a thread terminates its processing, it enters the dead state.
13 What is the Collections API?
Ans: The Collections API is a set of classes and interfaces that support operations on collections
of objects.
14 Which characters may be used as the second character of an identifier, but not as the
first character of an identifier?
Ans: The digits 0 through 9 may not be used as the first character of an identifier but they may be
used after the first character of an identifier.
15 What is the List interface?
Ans: The List interface provides support for ordered collections of objects.
SPORTS QUIZ
1. Who won ICC Award for womens player of the year 2009?
Diana Eduljee
Clare Taylor
Shanta Rangaswami
Anjum Chopra
Mitchell Johnson
Eoin Morgan
3. Who won ICC Award for ODI player of the year 2009?
Andrew Flintoff
Virender Sehwag
Sachin Tendulkar
4. Who won ICC Award for T20 international performance of the year 2009?
Tilakaratne Dilshan
Andrew Strauss
Christopher Gayle
Yuvraj Singh
5. Who won ICC Award for emerging player of the year 2009?
Brett Lee
Peter Siddle
James Anderson
Paul Collingwood
6. Who was named by ICC as captain of the World ODI team of the year 2009 and captain
of the World Test team of the year 2009?
Ricky Ponting
Anil Kumble
Daniel Vettori
David Shepherd
Aleem Dar
8. Who won ICC Award for Test player of the year 2009?
Stephen Fleming
Gautam Gambhir
Younis Khan
Rahul Dravid
New Zealand
West Indies
10. Who won ICC Award for associate and affiliate player of the year 2009?
Shane Watson
Jesse Ryder
Luke Wright
William Porterfield
10
Ireland
Poland
Italy
Germany
4. By how many goals Pakistan defeated Japan in a league match in Hockey World Cup
2006?
2-0
2-1
3-1
4-0
5. With which team Indias match ended in a 1-1 draw in Hockey World Cup 2006?
Mozambique
Cuba
Angloa
South Africa
South Africa
South Korea
Malaysia
Pakistan
17 September 2006
24 June 2006
9. By how many goals Germany defeated India in a league match in Hockey World Cup
2006?
6-4
1-0
3-2
4-2
Vienna
Rotterdam