Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

What Are The Options For Configuring Storage For Process Engine's Checkpoint Repository ?

Answer»

The options for CONFIGURING storage for process engine's checkpoint repository are:
• Local File
DATABASE. Fault TOLERANT ENGINES can recover from a checkpoint only when database is used.

The options for configuring storage for process engine's checkpoint repository are:
• Local File
• Database. Fault tolerant engines can recover from a checkpoint only when database is used.

2.

Explain The Process Configuration Parameters - Max Jobs, Flow Limit & Activation Limit ?

Answer»

• Max Jobs :
Max Jobs specifies the number of process instances that are kept in memmory. Once this limit is REACHED NEWLY created process instances (subject to flow limit) are paged out to disk.0 specifies no limit and is the default.

• Flow Limit :
Flow Limit specifies the maximum number of running process instances that are spawned before the process starter is SUSPENDED ie it enters a FLOW_CONTROLLED state and does not accept new events. This can be used to control the number of process instances running simultaneously and when the protocol generating the event can STORE the event till it is received, like email servers, JMS, RV etc. 0 specifies no limit and is the default.

• Activation Limit :
Activation limit FLAG specifies that once a process instance is loaded it must be placed in memmory till it completes execution. By default it is enabled.

• Max Jobs :
Max Jobs specifies the number of process instances that are kept in memmory. Once this limit is reached newly created process instances (subject to flow limit) are paged out to disk.0 specifies no limit and is the default.

• Flow Limit :
Flow Limit specifies the maximum number of running process instances that are spawned before the process starter is suspended ie it enters a FLOW_CONTROLLED state and does not accept new events. This can be used to control the number of process instances running simultaneously and when the protocol generating the event can store the event till it is received, like email servers, JMS, RV etc. 0 specifies no limit and is the default.

• Activation Limit :
Activation limit flag specifies that once a process instance is loaded it must be placed in memmory till it completes execution. By default it is enabled.

3.

Where Are The Designer Preferences Stored ?

Answer»

DESIGNER preferences STORED are STORES in a FILE called 'Designer .prefs' in the user home directory.

Designer preferences stored are stores in a file called 'Designer .prefs' in the user home directory.

4.

How Do You Determine If There Are Broken References In The Project?

Answer»

PROJECT -> VALIDATE for DEPLOYMENT

Project -> Validate for deployment

5.

What Are The 4 Main Panels Of The Designer Window ?

Answer»

The 4 main PANELS of the DESIGNER window are
• Project panel
• Palette panel
• Design panel
CONFIGURATION panel.

The 4 main panels of the Designer window are
• Project panel
• Palette panel
• Design panel
• Configuration panel.

6.

What Are The Encodings Supported By Designer ?

Answer»

ENCODINGS SUPPORTED by DESIGNER are
• ISO8859-1(Latin-1)
• UTF-8

Encodings supported by designer are
• ISO8859-1(Latin-1)
• UTF-8

7.

How To Use Legacy .dat File Format With Latest Designer ?

Answer»

Convert .DAT FILE to multi file PROJECT using ADMINISTRATION tab while starting up Designer(Other one being Project tab) and then OPEN the multifile project in the normal way.

Convert .dat file to multi file project using Administration tab while starting up Designer(Other one being Project tab) and then open the multifile project in the normal way.

8.

How To Design A Process Such That Depending On Number Of Records Updated In A Database, 3 Different Sub-processes May Be Called ?

Answer»

Define 3 TRANSITIONS from JDBC update with condition on the no of updates and call appropriate child processes.

Define 3 transitions from JDBC update with condition on the no of updates and call appropriate child processes.

9.

What Are The Mandatory Configuration Parameters For Ftp Connection & Ftp With Firewall ?

Answer»

The mandatory configuration PARAMETERS for FTP Connection
• FTP host
PORT
• Username & Password
If FIREWALL is enabled in ADDITION the proxy host and port are REQUIRED.

The mandatory configuration parameters for FTP Connection
• FTP host
• Port
• Username & Password
If Firewall is enabled in addition the proxy host and port are required.

10.

How Can Unauthorized Users Be Prevented From Triggering A Process ?

Answer»

Unauthorized users be prevented from triggering a PROCESS by giving 'write' ACCESS for the process engine to only SELECTED users. Only users with 'write' access can do ACTIVITIES LIKE deploying applications, starting/stopping process engines etc.

Unauthorized users be prevented from triggering a process by giving 'write' access for the process engine to only selected users. Only users with 'write' access can do activities like deploying applications, starting/stopping process engines etc.

11.

What Are The Maximum/minimum Of Threads Available For Incoming Http ?

Answer»

The maximum/minimum of THREADS AVAILABLE for INCOMING HTTP : 75/10.

The maximum/minimum of threads available for incoming HTTP : 75/10.

12.

What Is The Purpose Of The Inspector Activity ?

Answer»

The Inspector activity is used to write the output of any or all ACTIVITIES and PROCESS variables to a file and/or stdout. This is particularly useful when DEBUGGING process DEFINITIONS and you wish to see the entire schema instead of mapping SPECIFIC elements to the Write File activity.

The Inspector activity is used to write the output of any or all activities and process variables to a file and/or stdout. This is particularly useful when debugging process definitions and you wish to see the entire schema instead of mapping specific elements to the Write File activity.

13.

What Are The Possible Error Output's Of Read File Activity?

Answer»

Integration can be at different application layers:
• FileNotFoundException :THROWN when yhe file does not exist.
• UnsupportedEncodingException:Thrown when the text file’s ENCODING is not VALID and the content of the file is READ into process data.
• FileIOException :Thrown when an I/O exception occurred when trying to read the file.

Integration can be at different application layers:
• FileNotFoundException :Thrown when yhe file does not exist.
• UnsupportedEncodingException:Thrown when the text file’s encoding is not valid and the content of the file is read into process data.
• FileIOException :Thrown when an I/O exception occurred when trying to read the file.

14.

What Activities Are Supported In Xa Transaction ?

Answer»

The XA Transaction TYPE allows:
• JDBC activities
• ActiveEnterprise ADAPTER activities that use the JMS TRANSPORT
• JMS activities

The XA Transaction type allows:
• JDBC activities
• ActiveEnterprise Adapter activities that use the JMS transport
• JMS activities

15.

What Activities Are Supported In Jta Transaction?

Answer»

The JAVA Transaction API (JTA) UserTransaction TYPE allows:
• JDBC
• JMS
• ActiveEnterprise Adapter (USING JMS TRANSPORTS)
• EJB activities
to participate in TRANSACTIONS.

The Java Transaction API (JTA) UserTransaction type allows:
• JDBC
• JMS
• ActiveEnterprise Adapter (using JMS transports)
• EJB activities
to participate in transactions.

16.

What Are The Different Types Of Transactions Tibco Provides?

Answer»

TIBCO BusinessWorks OFFERS a variety of types of transactions that can be used in different situations. You can use the type of TRANSACTION that suits the needs of your integration project. When you CREATE a transaction group, you must specify the type of transaction. TIBCO BusinessWorks SUPPORTS the following types of transactions:
• JDBC
• Java Transaction API (JTA) UserTransaction
• XA Transaction.

TIBCO BusinessWorks offers a variety of types of transactions that can be used in different situations. You can use the type of transaction that suits the needs of your integration project. When you create a transaction group, you must specify the type of transaction. TIBCO BusinessWorks supports the following types of transactions:
• JDBC
• Java Transaction API (JTA) UserTransaction
• XA Transaction.

17.

What Is Vcrepo.dat?

Answer»

TIBCO Designer creates a file NAMED vcrepo.dat in the project root directory when you FIRST save the project. This file is used to store properties such as display name, TIBCO Rendezvous encoding, and description. This file can be used for IDENTIFICATION in place of the project root directory and can be used as the repository LOCATOR string (repoUrl).

TIBCO Designer creates a file named vcrepo.dat in the project root directory when you first save the project. This file is used to store properties such as display name, TIBCO Rendezvous encoding, and description. This file can be used for identification in place of the project root directory and can be used as the repository locator string (repoUrl).

18.

What Are The Different Modes Of Service Invocation?

Answer»

SERVICES can be invoked in several ways.
• A one-way OPERATION is executed once and does not WAIT for a response.
• A request-response operation is executed once and waits for one response. In a request-response service, COMMUNICATION flows in both directions. The complete interaction consists of two point-to-point messages—a request and a response. The interaction is only considered complete after the response has arrived.
• Publication (NOTIFICATION) means an operation sends information on an as-needed basis, potentially multiple times.
• Subscription means incoming information is processed on an as-needed basis, potentially multiple times.

Services can be invoked in several ways.
• A one-way operation is executed once and does not wait for a response.
• A request-response operation is executed once and waits for one response. In a request-response service, communication flows in both directions. The complete interaction consists of two point-to-point messages—a request and a response. The interaction is only considered complete after the response has arrived.
• Publication (notification) means an operation sends information on an as-needed basis, potentially multiple times.
• Subscription means incoming information is processed on an as-needed basis, potentially multiple times.

19.

What Are The Revision Control System Options Available In Tibco Designer?

Answer»

• File SHARING
• VSS
PERFORCE
XML CANON
• ClearCase
• iPlanet
CVS
• PVCS

• File sharing
• VSS
• Perforce
• XML Canon
• ClearCase
• iPlanet
• CVS
• PVCS

20.

What Is The Role Of Tra?

Answer»

TRA stands for TIBCO Runtime Agent.
The TRA has two main functions:
• Supplies an agent that is running in the background on each MACHINE.
1. The agent is responsible for starting and stopping processes that run on a machine according to the deployment information.
2. The agent monitors the machine. That information is then visible via TIBCO Administrator.
• Supplies the run-time ENVIRONMENT, that is, all shared LIBRARIES including third-party libraries.

TRA stands for TIBCO Runtime Agent.
The TRA has two main functions:
• Supplies an agent that is running in the background on each machine.
1. The agent is responsible for starting and stopping processes that run on a machine according to the deployment information.
2. The agent monitors the machine. That information is then visible via TIBCO Administrator.
• Supplies the run-time environment, that is, all shared libraries including third-party libraries.

21.

If You Have Installed A Particular Version Of Tibco Software E.g. Tibco Bw X.y.z, What Are X, Y And Z Number Stands For?

Answer»

Integration can be at different application layers:
• X:PATCH
• Y:MAJOR
Z:Minor

Integration can be at different application layers:
• X:Patch
• Y:Major
• Z:Minor

22.

What Are The Modes Of Tibco Bw Installations ?

Answer»

GUI MODE
CONSOLE mode
SILENT mode

• GUI mode
• Console mode
• Silent mode

23.

What Are The Tibco Bw Activities That Can Participate In Transactions?

Answer»

There are some SPECIFIC TIBCO BW activities are SUPPORTED in transaction not all.
JDBC activities
EJB activities
• JMS activities
• ActiveEnterprise Adapter activities that use JMS transports
• TIBCO iProcess BusinessWorks Connector activities.

There are some specific TIBCO BW activities are supported in transaction not all.
• JDBC activities
• EJB activities
• JMS activities
• ActiveEnterprise Adapter activities that use JMS transports
• TIBCO iProcess BusinessWorks Connector activities.

24.

What Are The Different Modes Of Service Invocation In Tibco?

Answer»

SERVICES can be invoked in several WAYS.
• A one-way operation is executed once and does not wait for a response.
• A request-response oriented operation, in which CLIENT NEEDS to wait the response. In a request-response SERVICE,communication flows in both directions.

Services can be invoked in several ways.
• A one-way operation is executed once and does not wait for a response.
• A request-response oriented operation, in which client needs to wait the response. In a request-response service,communication flows in both directions.

25.

What Is Tibco?

Answer»

TIBCO is an organization which provides INTERGRATION software to software INDUSTRY.

Tibco is an organization which provides Intergration software to software industry.

26.

What Is Custom Defined Function?

Answer»

Essbase calculation functions that you develop in the JAVA PROGRAMMING language and then add to the STANDARD Essbase calculation scripting language by means of MaxL.

Essbase calculation functions that you develop in the Java programming language and then add to the standard Essbase calculation scripting language by means of MaxL.

27.

What Is Data File Cache?

Answer»

A buffer in MEMORY that HOLDS compressed data (.PAG) files.

A buffer in memory that holds compressed data (.PAG) files.

28.

What Are The File Extensions For An Outline, Rule File And A Calc Script.

Answer»

OTL, .RUL and .CSC

OTL, .RUL and .CSC

29.

How Does Attribute Dim Impact Report Performance?

Answer»

They highly impact the report PERFORMANCE as the attributes are calculated DYNAMICALLY when referenced in the report. For very large number of ATT dim displayed in the report, the performance could DRASTICALLY REDUCE.

They highly impact the report performance as the attributes are calculated dynamically when referenced in the report. For very large number of att dim displayed in the report, the performance could drastically reduce.

30.

How Can We Display Uda's In Reports? How Do They Impact Report Report Performance?

Answer»

UDA's values are never DISPLAYED in the reports and hence do not IMPACT REPORT performance.

UDA's values are never displayed in the reports and hence do not impact report performance.

31.

What Is Tb First And Tb Last?

Answer»

TB First: in the Sample.Basic database, the accounts member Opening Inventory is tagged as TB First. Opening Inventory CONSOLIDATES the value of the first month in each QUARTER and USES that value for that month’s parent. For example, the value for Qtr1 is the same as the value for Jan.

TB Last: in the Sample.Basic database, the accounts member Ending Inventory is tagged as TB Last. Ending Inventory consolidates the value for the last month in each quarter and uses that value for that month’s parent. For example, the value for Qtr1 is the same as the value for MAR.

TB First: in the Sample.Basic database, the accounts member Opening Inventory is tagged as TB First. Opening Inventory consolidates the value of the first month in each quarter and uses that value for that month’s parent. For example, the value for Qtr1 is the same as the value for Jan.

TB Last: in the Sample.Basic database, the accounts member Ending Inventory is tagged as TB Last. Ending Inventory consolidates the value for the last month in each quarter and uses that value for that month’s parent. For example, the value for Qtr1 is the same as the value for Mar.

32.

What Are Filters?

Answer»

A METHOD of controlling access to DATABASE cells in ESSBASE. A filter is the most detailed level of security, allowing you to define VARYING access levels different users can have to individual database VALUES.

A method of controlling access to database cells in essbase. A filter is the most detailed level of security, allowing you to define varying access levels different users can have to individual database values.

33.

What Are Different Types Of Attributes?

Answer»

Essbase supports two different types of attributes.
1. USER-DEFINED attributes
2. Simple attributes
User-Defined attributes: The attributes that are defined by the user.
Simple attributes: Essbase supports some attributes, they are: Boolean, date, NUMBER, and STRING.

Essbase supports two different types of attributes.
1. User-Defined attributes
2. Simple attributes
User-Defined attributes: The attributes that are defined by the user.
Simple attributes: Essbase supports some attributes, they are: Boolean, date, number, and string.

34.

How Does Attribute Dimensions And Uda's Impact Batch Calculation Performance?

Answer»

UDA's- No Impact as they do not PERFORM any INHERENT calculations.
Attribute dim- No Impact as they perform only DYNAMIC calculations.

UDA's- No Impact as they do not perform any inherent calculations.
Attribute dim- No Impact as they perform only dynamic calculations.

35.

What Is The Difference Between Uda's And Attribute Dimensions?

Answer»

ATTRIBUTE dimensions PROVIDES more FLEXIBILITY than UDA's. Attribute calculations dimensions which include five members with the DEFAULT names sum, count, min, max and avg are automatically created for the attribute dimensions and are calculate dynamically.

Attribute dimensions provides more flexibility than UDA's. Attribute calculations dimensions which include five members with the default names sum, count, min, max and avg are automatically created for the attribute dimensions and are calculate dynamically.

36.

Why Do Objects Gets Locked And When Does This Happens?

Answer»

Objects gets LOCKED to PREVENT users to make simultaneous and conflicting CHANGES to ESSBASE database objects. By default whenever an OBJECT is accessed through Aministrative services console or Excel spreadsheet add-in, it gets locked.

Objects gets locked to prevent users to make simultaneous and conflicting changes to Essbase database objects. By default whenever an object is accessed through Aministrative services console or Excel spreadsheet add-in, it gets locked.

37.

What Are Attributes?

Answer»

A classification of a member in a dimension. You can select and group members based on their ASSOCIATED attributes. You can also specify an ATTRIBUTE when you perform calculations and use calculation functions. Eg: The database in Sample Basic which has product dimension has some attributes like SIZE, package type, and FLAVOR. We can add these attributes to the dimensions where we can RETRIEVE the data like for example to retrieve “coke with 8 Oz with bottles”, this is useful for generating reports.

A classification of a member in a dimension. You can select and group members based on their associated attributes. You can also specify an attribute when you perform calculations and use calculation functions. Eg: The database in Sample Basic which has product dimension has some attributes like size, package type, and flavor. We can add these attributes to the dimensions where we can retrieve the data like for example to retrieve “coke with 8 Oz with bottles”, this is useful for generating reports.

38.

Suppose We Have Assigned Generation 2 And Generation 4 As Of Now And Think Of Adding Generation 3 Later Some Time. Can We Build The Dimension.

Answer»

No. If GEN 2 and gen 4 exists, we must ASSIGN gen 3.

No. If gen 2 and gen 4 exists, we must assign gen 3.

39.

What Are The Different Types Of Log Files?

Answer»

So many log files are there in essbase, but the IMPORTANT log files are
1. Application log
2. Essbase.log
3. Configtool.log
4. eas_install.log
5. essbaseserver-install.log

So many log files are there in essbase, but the important log files are
1. Application log
2. Essbase.log
3. Configtool.log
4. eas_install.log
5. essbaseserver-install.log

40.

Why Top-down Calculation Less Efficient Than A Bottom-up Calculation?being Less Efficient, Why Do We Use Them?

Answer»

In the process it CALCULATES more BLOCKS than is NECESSARY. Sometimes it is necessary to perform top-down calculation to GET the CORRECT calculation reset.

In the process it calculates more blocks than is necessary. Sometimes it is necessary to perform top-down calculation to get the correct calculation reset.

41.

A Customer Wants To Run Two Instances Of An Essbase Server On A Same Machine To Have Both Test Environment And Development Environment On The Same Server. Can He Do That?

Answer»

YES. We can have multiple INSTANCES of an Essbase server on a SINGLE MACHINE and there will be different sets of WINDOWS services for all these instances.

Yes. We can have multiple instances of an Essbase server on a single machine and there will be different sets of windows services for all these instances.

42.

What Is The Role Of Provider Services.

Answer»

To COMMUNICATE between ESSBASE and MICROSOFT OFFICE TOOLS.

To communicate between Essbase and Microsoft office tools.

43.

Dynamic Calc Decreases The Retreival Time And Increases Batch Database Calculation Time. How True Is The Statement?

Answer»

The STATEMENT should be just opposite. As DYNAMIC CALC members are calculated when requested, the RETREIVAL TIME should increase.

The statement should be just opposite. As dynamic calc members are calculated when requested, the retreival time should increase.

44.

What Are The Types Of Partitioning Options Available In Essbase?

Answer»

1. REPLICATED partition. 2. TRANSPARENT partition 3. Linked partition.

1. Replicated partition. 2. Transparent partition 3. Linked partition.

45.

We Have Created An Application As Unicode Mode. Can We Change It Later To Non-unicode Mode.

Answer»

No

No

46.

How Is Data Stored In The Essbase Database?

Answer»

Essbase is an FILE based database where the data is stored in PAG FILES of 2 GB each and GROWS SEQUENTIALLY.

Essbase is an file based database where the data is stored in PAG files of 2 GB each and grows sequentially.

47.

Can We Have Multiple Databases In One Single Application?

Answer»

YES. But only one database per APPLICATION is RECOMMENDED.
Depend on which database that you are GOING to create. For Example: If you are creating ASO then we can’t create more that 1 db per application. If you are creating BSO then you can create more than 1 db per application.

Yes. But only one database per application is recommended.
Depend on which database that you are going to create. For Example: If you are creating ASO then we can’t create more that 1 db per application. If you are creating BSO then you can create more than 1 db per application.

48.

What Are The Three Options Specified In Username And Password Management Under Security Tab In Essbase Server Proprties.

Answer»

1. LOGIN attempts allowed before username is disabled.
2. NUMBER of inactive days before username is diabled.
3. Number of days before USER MUST change password.

1. Login attempts allowed before username is disabled.
2. Number of inactive days before username is diabled.
3. Number of days before user must change password.

49.

What Is Block Locking System?

Answer»

ANALYTIC services(or Essbase Services) LOCKS the block and all other blocks which contain the childs of that block while CALCULATING this block is block LOCKING system.

Analytic services(or Essbase Services) locks the block and all other blocks which contain the childs of that block while calculating this block is block locking system.

50.

What Are The Specified Roles Other Than Aministrator To View Sessions, Disconnect Sessions Or Kill Users Requests For A Particular Application?

Answer»

You should have the ROLE of APPLICATION MANAGER for the SPECIFIED application.

You should have the role of Application manager for the specified application.