This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How Does Rim Determine If An Application Is Suitable For Blackberry App World? |
|
Answer» RIM will review a SUBMITTED APPLICATION for content SUITABILITY and perform technical testing to ensure the application meets the BlackBerry App WORLD Vendor Guidelines. RIM will review a submitted application for content suitability and perform technical testing to ensure the application meets the BlackBerry App World Vendor Guidelines. |
|
| 2. |
Who Can Submit Applications Through The Blackberry App World Vendor Portal? |
|
Answer» Most DEVELOPERS from AROUND the WORLD can submit APPLICATIONS for BlackBerry App World. Most developers from around the world can submit applications for BlackBerry App World. |
|
| 3. |
Is There A Blackberry Forum For End Users And Vendors? |
|
Answer» BLACKBERRY APP WORLD boards for vendors and end users are ACTIVE on the BlackBerry forums. BlackBerry App World boards for vendors and end users are active on the BlackBerry forums. |
|
| 4. |
What Languages Does Blackberry App World Support? |
|
Answer» The BlackBerry APP World client SUPPORTS English, French, Italian, German, Spanish and Brazilian PORTUGUESE. Additional languages will be added in future releases. The BlackBerry App World client supports English, French, Italian, German, Spanish and Brazilian Portuguese. Additional languages will be added in future releases. |
|
| 5. |
Can We Select More Than One Category For My Application? |
|
Answer» You can select only one CATEGORY for your APPLICATION. Category SELECTION will be evaluated for suitability and an ALTERNATE category MAY be suggested for your application. You can select only one category for your application. Category selection will be evaluated for suitability and an alternate category may be suggested for your application. |
|
| 6. |
What Billing Models Are Supported On Blackberry App World? |
|
Answer» BLACKBERRY App World SUPPORTS one-time BILLING at the time of DOWNLOAD, free APPLICATIONS and the sale of digital goods within applications. BlackBerry App World supports one-time billing at the time of download, free applications and the sale of digital goods within applications. |
|
| 7. |
What Are The Requirements For The Icon And Screenshots? |
|
Answer» The FILE submitted for the icon is automatically sized for use in various parts of the BLACKBERRY APP World solution. It’s recommended you provide a 480x480, 300dpi, RGB file in PNG format so the icon retains the BEST possible IMAGE quality when the file is converted. The file submitted for the icon is automatically sized for use in various parts of the BlackBerry App World solution. It’s recommended you provide a 480x480, 300dpi, RGB file in PNG format so the icon retains the best possible image quality when the file is converted. |
|
| 8. |
What Do I Need To Submit An Application? |
|
Answer» You’ll NEED to provide the following information when submitting an APPLICATION:
You’ll need to provide the following information when submitting an application: |
|
| 9. |
How Are Applications Categorized? |
|
Answer» Categories can be SELECTED during the application SUBMISSION process. VENDORS can select one category that applies to an application. All category SELECTIONS will be reviewed and are SUBJECT to change. Categories can be selected during the application submission process. Vendors can select one category that applies to an application. All category selections will be reviewed and are subject to change. |
|
| 10. |
Can We Distribute Applications That Use Cryptographic Apis? |
|
Answer» You can distribute applications that use CRYPTOGRAPHIC APIs provided they adhere to the requirements and restrictions detailed in the BlackBerry App World Vendor Agreement. You can distribute applications that use cryptographic APIs provided they adhere to the requirements and restrictions detailed in the BlackBerry App World Vendor Agreement. |
|
| 11. |
Can We Distribute Blackberry Webworks Applications? |
|
Answer» Yes, BlackBerry WEBWORKS APPLICATIONS can be distributed on BlackBerry APP World. Yes, BlackBerry WebWorks applications can be distributed on BlackBerry App World. |
|
| 12. |
Can We Distribute Themes? |
|
Answer» YES, themes can be distributed on BLACKBERRY APP World. Yes, themes can be distributed on BlackBerry App World. |
|
| 13. |
Can We Distribute My Web Signals Application? |
|
Answer» Yes, it’s possible to promote and distribute WEB signals-based content services, provided you offer a web signal registration APPLICATION to be distributed through BlackBerry App World. Yes, it’s possible to promote and distribute web signals-based content services, provided you offer a web signal registration application to be distributed through BlackBerry App World. |
|
| 14. |
Can We Distribute Web Applications? |
|
Answer» YES, it’s possible to promote and distribute web-based content services for BlackBerry smartphones, provided you offer a web icon APPLICATION to be distributed on BlackBerry APP WORLD. Yes, it’s possible to promote and distribute web-based content services for BlackBerry smartphones, provided you offer a web icon application to be distributed on BlackBerry App World. |
|
| 15. |
Which Os Versions Does Blackberry App World Support? |
|
Answer» BlackBerry App World WORKS with BlackBerry smartphones RUNNING OS version 4.5.0 or HIGHER. BlackBerry App World works with BlackBerry smartphones running OS version 4.5.0 or higher. |
|
| 16. |
What Is Router? Explain Components Of Routers. |
|
Answer» The way SWITCHES connect multiple computers, a router connects multiple networks. Routers COMPRISE of data consisting of LARGE tables of networks and addresses. Routers use ALGORITHMS to determine the shortest route to an address in a network. The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses. Routers use algorithms to determine the shortest route to an address in a network. |
|
| 17. |
What Are Switches? Explain The Concepts Of Layer-3 Switches? |
Answer»
|
|
| 18. |
What Is 'gateway Of Last Resort'? |
|
Answer» A Gateway of Last RESORT or Default gateway is a route used by the router when no other known route exists to transmit the IP PACKET Known routes are present in the routing table. HENCE, any route not known by the routing table is forwarded to the default route. Each router which RECEIVES this packet will TREAT the packet the same way, if the route is known, packet will be forwarded to the known route. A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet Known routes are present in the routing table. Hence, any route not known by the routing table is forwarded to the default route. Each router which receives this packet will treat the packet the same way, if the route is known, packet will be forwarded to the known route. |
|
| 19. |
Explain Circuit Level Gateway? |
|
Answer» A circuit LEVEL gateway is used to find if a SESSION in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer. They protect the information of the private network they protect. Circuit level GATEWAYS do not filter PACKETS. A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer. They protect the information of the private network they protect. Circuit level gateways do not filter packets. |
|
| 20. |
What Is An Application Gateway? |
|
Answer» An APPLICATION GATEWAY is an application program that runs on a FIREWALL between two networks. An application gateway is used for establishing connection between client program and destination service. The client negotiates with the gateway to communicate with the service of destination. Here, gateway can be called as a proxy. Hence, two connections are made. One between client and proxy; other, between proxy and destination service. Connections TAKE place behind the firewall. An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service. The client negotiates with the gateway to communicate with the service of destination. Here, gateway can be called as a proxy. Hence, two connections are made. One between client and proxy; other, between proxy and destination service. Connections take place behind the firewall. |
|
| 21. |
Explain Ip Datagram, Fragmentation And Mtu? |
|
Answer» IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an ORDER. The order is specific which helps to decode and read the stream easily. IP datagram has fields like Version, header length, Type of service, Total length, checksum, flag, protocol, Time to live, Identification, source and destination ip address, padding, OPTIONS and payload. IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily. IP datagram has fields like Version, header length, Type of service, Total length, checksum, flag, protocol, Time to live, Identification, source and destination ip address, padding, options and payload. |
|
| 22. |
What Is Ip Spoofing And How Can It Be Prevented? |
|
Answer» IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the MESSAGE is COMING from a trusted host. This is done by FORGING the header so it contains a different address and make it appear that the PACKET was sent by a different machine. IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. This is done by forging the header so it contains a different address and make it appear that the packet was sent by a different machine. |
|
| 23. |
What Is Ppp Protocol? Explain Ppp Packet Format.? |
|
Answer» Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host. PPP also PROVIDES authentication. PPP operates by sending Request packets and waiting for Acknowledge packets that accept, reject or try to change the request. The protocol is also used to NEGOTIATE on NETWORK address or compression options between the nodes. Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host. PPP also provides authentication. PPP operates by sending Request packets and waiting for Acknowledge packets that accept, reject or try to change the request. The protocol is also used to negotiate on network address or compression options between the nodes. |
|
| 24. |
Explain How Nat Works? |
|
Answer» Network Address Translation TRANSLATES and IP address used in a network to another IP address known within another network. A NAT table is MAINTAINED for global to local and local to mapping of IP’s. NAT can be statically defined or dynamically TRANSLATE from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to INITIATE any connection to hosts on the other SIDE of the router. Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s. NAT can be statically defined or dynamically translate from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to initiate any connection to hosts on the other side of the router. |
|
| 25. |
Explain The Concept Of Dhcp? |
|
Answer» Dynamic Host Configuration Protocol is USED assigning IP addresses to computers in a NETWORK. The IP addresses are assigned dynamically. Certainly, USING DHCP, the computer will have a different IP ADDRESS every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for sometime. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator. Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically. Certainly, using DHCP, the computer will have a different IP address every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for sometime. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator. |
|
| 26. |
Explain Rsvp. How Does It Work? |
|
Answer» Resource RESERVATION protocol is used to reserve resources across a network. It is used for REQUESTING a specific Quality of SERVICE (QoS) from the network. This is done by carrying the request (that needs a reservation of the resource) of the host throughout the network. It visits each node in the network. RSVP used two local modules for reservation of resources. ADMISSION control module confirms if there are sufficient available resources while POLICY module checks for the permission of making a reservation. RSVP offers scalability. On a successful completion of both checks RSVP uses the packet classifier and packet scheduler for the desired Qos requested. Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. This is done by carrying the request (that needs a reservation of the resource) of the host throughout the network. It visits each node in the network. RSVP used two local modules for reservation of resources. Admission control module confirms if there are sufficient available resources while policy module checks for the permission of making a reservation. RSVP offers scalability. On a successful completion of both checks RSVP uses the packet classifier and packet scheduler for the desired Qos requested. |
|
| 27. |
What Are Ping And Tracert? |
|
Answer» Ping and tracert are the commands used to send information to some remote COMPUTERS to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping COMMAND is written as ping ip_address Tracert is called as TRACE ROUTE. It is used to track or trace the path the packet TAKES from the computer where the command is given until the destination. In windows ping command is written as tracert ip_address Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as tracert ip_address |
|
| 28. |
What Is The Use Of Igmp Protocol? |
|
Answer» INTERNET Group Management Protocol: It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which MULTICAST GROUPS. The mechanism also allow a host to inform its local router, that it wants to RECEIVE messages. Internet Group Management Protocol: It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages. |
|
| 29. |
Explain The Use Of Internet Control Message Protocol (icmp)? |
|
Answer» Internet Control Message PROTOCOL is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked COMPUTERS, for the purpose of sending error messages, for example, a requested SERVICE is unavailable or the host could not be REACHED. It is not directed by the network applications. ICMPs are utilized by ROUTERS, hosts for communicating the updates or error information to other routers. Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers, for the purpose of sending error messages, for example, a requested service is unavailable or the host could not be reached. It is not directed by the network applications. ICMPs are utilized by routers, hosts for communicating the updates or error information to other routers. |
|
| 30. |
What Is The Domain Name System (dns)? What Are The Advantages Of It? |
|
Answer» A hierarchial naming system for computer systems, services or for that matter any resource participating in the INTERNET. Various information with domain names is assigned to each of the participants. DNS translates the names of domain into meaningful to humans into binary IDENTIFIERS that are ASSOCIATED with the equipment of network to locate and address these DEVICES. A hierarchial naming system for computer systems, services or for that matter any resource participating in the internet. Various information with domain names is assigned to each of the participants. DNS translates the names of domain into meaningful to humans into binary identifiers that are associated with the equipment of network to locate and address these devices. |
|
| 31. |
Explain About The Cpu Used In Blackberry Technology? |
|
Answer» Early BLACKBERRY DEVICES used Intel-80386 processors but Intel XScale 624 MHz CPUs are used in the latest BlackBerry 9000 series. Early BlackBerry devices used Intel-80386 processors but Intel XScale 624 MHz CPUs are used in the latest BlackBerry 9000 series. |
|
| 32. |
Explain About The Applications That Can Be Used With Iphone? |
|
Answer» Technology, Entertainment and Design(TED): Allows to watch and listen to world’s most FASCINATING people have to say, all on the iPhone. Technology, Entertainment and Design(TED): Allows to watch and listen to world’s most fascinating people have to say, all on the iPhone. |
|
| 33. |
Describe The Functionality Of Accelerometer Of An Iphone? |
|
Answer» iPhone RESPONDS to motion USING a built-in accelerometer. The accelerometer detects the MOVEMENT and changes the display ACCORDINGLY, at the time of rotating iPhone from PORTRAIT to landscape. iPhone responds to motion using a built-in accelerometer. The accelerometer detects the movement and changes the display accordingly, at the time of rotating iPhone from portrait to landscape. |
|
| 34. |
What Are The Location Services? |
Answer»
|
|
| 35. |
What Are Sensors In Iphone? |
|
Answer» The proximity sensor IMMEDIATELY TURNS off the display when the IPHONE is lifted to ear. With this sensor the power is saved and accidental DIALING is prevented. The display is automatically brightens the iPhone by the ambient light sensor when the SUNLIGHT or bright rooms and dims in darker places. The proximity sensor immediately turns off the display when the iPhone is lifted to ear. With this sensor the power is saved and accidental dialing is prevented. The display is automatically brightens the iPhone by the ambient light sensor when the sunlight or bright rooms and dims in darker places. |
|
| 36. |
What Is Iphone Reference Library? |
| Answer» | |
| 37. |
What Is Iphone Architecture? |
| Answer» | |
| 38. |
What Is Iphone Sdk? |
|
Answer» iPhone SDK is available with tools and interfaces needed for developing, installing and running custom native applications. Native applications are built using the iPhone OS system frameworks and Objective-C language and run directly on iPhone OS. Native applications are INSTALLED PHYSICALLY on a DEVICE and can run in presence or absence of network connection. iPhone SDK is available with tools and interfaces needed for developing, installing and running custom native applications. Native applications are built using the iPhone OS system frameworks and Objective-C language and run directly on iPhone OS. Native applications are installed physically on a device and can run in presence or absence of network connection. |
|
| 39. |
What Is Iphone Os? |
|
Answer» iPhone OS runs on iPhone and IPOD TOUCH devices. Hardware devices are managed by iPhone OS and provides the technologies needed for implementing NATIVE applications on the phone. The OS ships with several system applications such as MAIL, Safari, Phone, which provide standard services to the user. iPhone OS runs on iPhone and iPod touch devices. Hardware devices are managed by iPhone OS and provides the technologies needed for implementing native applications on the phone. The OS ships with several system applications such as Mail, Safari, Phone, which provide standard services to the user. |
|
| 40. |
What Are The Features Of Iphone 3gs? |
|
Answer» Video: Videos can be edited, shared. High quality VGA video can be shot in portrait or landscape. 3 Megapixel Camera: Still photos with greater quality can be taken Voice control: It recognizes the names in contacts and recognizes the music on IPOD. COMPASS: iPhone 3GS has built-in digital compass, used to point the way. Internet Tethering: Internet surfing can be DONE from anywhere. A 3G connection can be shared on Iphone with MAC notebook or laptop. Video: Videos can be edited, shared. High quality VGA video can be shot in portrait or landscape. 3 Megapixel Camera: Still photos with greater quality can be taken Voice control: It recognizes the names in contacts and recognizes the music on iPod. Compass: iPhone 3GS has built-in digital compass, used to point the way. Internet Tethering: Internet surfing can be done from anywhere. A 3G connection can be shared on Iphone with Mac notebook or laptop. |
|
| 41. |
What Is Iphone? |
Answer»
|
|
| 42. |
What Are The Features Of Blackberry Storm2? |
|
Answer» The BlackBerry Storm2 has the following features:
The BlackBerry Storm2 has the following features: |
|
| 43. |
What Are The Advantages Of Blackberry Technology? |
|
Answer» 1. Email: BlackBerry provides email accessing facility with its wireless extension. Normal email activities can be performed without hassles. It remains continuously connected to the wireless network which enables the user to access email. The mail will appear on the device without retrieving it. 2. Phone: The BlackBerry hand held has all the features of a mobile. In addition it has digital walkie-talkie, SIP based IP telephony and also provides headsets with comfort, clarity and convenience. 3. Wireless Internet: The hand held phone have special features which enables to browse the internet by clicking and scroll track wheel for NAVIGATING the pages and types the URLs by USING QWERTY keyboards. 4. Tethered Modem: Some of the BlackBerry hand held devices are available with features like speedy wireless SERVICES with fast email and browsing experiences. This device ACTS as a tethered modem without carrying a wireless PC CARD. 5. Organizer: The mobile is provided with functionality regarding day to day activities. 6. SMS: Blackberry devices support the facility of sending and receiving text messages. 7. Instant Messaging: This feature helps the user for contacting people once they are connected to the wireless network. 8. Corporate Data Access: Business goals can be achieved with access to the corporate data, by using wireless connectivity technology. 9. Paging: Some of the BlackBerry models provide paging services to the BlackBerry users who do not have an email account. 1. Email: BlackBerry provides email accessing facility with its wireless extension. Normal email activities can be performed without hassles. It remains continuously connected to the wireless network which enables the user to access email. The mail will appear on the device without retrieving it. 2. Phone: The BlackBerry hand held has all the features of a mobile. In addition it has digital walkie-talkie, SIP based IP telephony and also provides headsets with comfort, clarity and convenience. 3. Wireless Internet: The hand held phone have special features which enables to browse the internet by clicking and scroll track wheel for navigating the pages and types the URLs by using QWERTY keyboards. 4. Tethered Modem: Some of the BlackBerry hand held devices are available with features like speedy wireless services with fast email and browsing experiences. This device acts as a tethered modem without carrying a wireless PC card. 5. Organizer: The mobile is provided with functionality regarding day to day activities. 6. SMS: Blackberry devices support the facility of sending and receiving text messages. 7. Instant Messaging: This feature helps the user for contacting people once they are connected to the wireless network. 8. Corporate Data Access: Business goals can be achieved with access to the corporate data, by using wireless connectivity technology. 9. Paging: Some of the BlackBerry models provide paging services to the BlackBerry users who do not have an email account. |
|
| 44. |
What Are The Benefits For Organizations And It Departments By Using Blackberry? |
|
Answer» Benefits for organizations Benefits for IT Benefits for organizations Benefits for IT |
|
| 45. |
What Are The Features Of Blackberry? |
Answer»
|
|
| 46. |
Explain How Synchronization Takes Place With Blackberry Technology? |
|
Answer» The handheld device is used as a network device, which always connected to the data account of the user via redirector software. The software is installed on the BLACKBERRY Enterprise Server. The communication between the software, BE Server and the hand held device’s software is always a two-way street. BES immediately updates the mobile device or the email or the calendar account, whenever a CHANGE in email account occurs.The PUSH technology of BlackBerry keeps the device instantly in “synch” without any EFFORT by the user. The handheld device is used as a network device, which always connected to the data account of the user via redirector software. The software is installed on the BlackBerry Enterprise Server. The communication between the software, BE Server and the hand held device’s software is always a two-way street. BES immediately updates the mobile device or the email or the calendar account, whenever a change in email account occurs.The push technology of BlackBerry keeps the device instantly in “synch” without any effort by the user. |
|
| 47. |
Explain About Blackberry Internet Service? |
|
Answer» The primary alternative to BlackBerry Enterprise Server is BlackBerry Internet Service. The development of this service is aimed at the average consumer rather than for the BUSINESS consumer. POP3 and IMAP integration are allowed by these services for the personal user. It allows upto 10 e-mail ACCOUNTS could be ACCESSED including popular emails Gmail, Hotmail, Yahoo and AOL. MySpace, Facebook and MSN can also be accessed by using special bundles. Latest BlackBerry DEVICES are using proprietary BlackBerry Messenger for sending and receiving instant messages through BlackBerry PIN or barcode scan. This is a BlackBerry Alliance program for the partners who work under contract with RIM for creating new BlackBerry applications. The primary alternative to BlackBerry Enterprise Server is BlackBerry Internet Service. The development of this service is aimed at the average consumer rather than for the business consumer. POP3 and IMAP integration are allowed by these services for the personal user. It allows upto 10 e-mail accounts could be accessed including popular emails Gmail, Hotmail, Yahoo and AOL. MySpace, Facebook and MSN can also be accessed by using special bundles. Latest BlackBerry devices are using proprietary BlackBerry Messenger for sending and receiving instant messages through BlackBerry PIN or barcode scan. This is a BlackBerry Alliance program for the partners who work under contract with RIM for creating new BlackBerry applications. |
|
| 48. |
Explain About Blackberry Enterprise Server? |
Answer»
|
|
| 49. |
Explain About Blackberry Operating System? |
Answer»
|
|
| 50. |
What Is Blackberry Technology? |
Answer»
|
|