InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is The Difference Between Client Response Time And Server Response Time? |
| Answer» | |
| 2. |
What Is The Difference Between Last Two Data Flow? |
|
Answer» When we are working with FLAG we can use only 2 filter transformations also but at the initial stage it will be better to go with 3 filters. Where we are using the FIRST Filter to insert the records for first TIME, In second Filter we are INSERTING the records but these records are with updated INFORMATION and in THIRD filter we are updating the records with surrogate key. This third filter records will be updated with our changed FLAG value 'ZERO'. Because we are identifying the current records with FLAG VALUES 'ONE'. When we are working with FLAG we can use only 2 filter transformations also but at the initial stage it will be better to go with 3 filters. Where we are using the FIRST Filter to insert the records for first time, In second Filter we are inserting the records but these records are with updated information and in third filter we are updating the records with surrogate key. This third filter records will be updated with our changed FLAG value 'ZERO'. Because we are identifying the current records with FLAG values 'ONE'. |
|
| 3. |
How Do U Go About Gathering The Requirements? |
|
Answer» REQUIREMENT gathering is an ART rather than a science. FIRST it depends upon at what level you are talking about. Generally speaking, requirements gathering follows Top-Down Approach. It also depends upon your level in the SDLC cycle. There are different ways of gathering requirements. Generally accepted METHODS are:
There are also different tools used for requirement gathering like, UML, RATIONAL Rose, Microsoft Visio, Recruitment Matrix,etc. Requirement gathering is an art rather than a science. First it depends upon at what level you are talking about. Generally speaking, requirements gathering follows Top-Down Approach. It also depends upon your level in the SDLC cycle. There are different ways of gathering requirements. Generally accepted methods are: There are also different tools used for requirement gathering like, UML, Rational Rose, Microsoft Visio, Recruitment Matrix,etc. |
|
| 4. |
I Have Got Abi Installed On My Local Comp, I Know That Gde Goes To Co>op Through The Repository.i Want To Use The Repository To Chicken And Checkout. Any Steps To Connect From Gde To Repository Will Be Greatly Appreciated? |
|
Answer» We can connect GDE to EME(Repository) INORDER to have checkin and checkout.A file with extension .AIP will GIVE sufficeient infto connect to EME We can connect GDE to EME(Repository) inorder to have checkin and checkout.A file with extension .aip will give sufficeient infto connect to EME |
|
| 5. |
What Is The Scope Of Information Technology? |
|
Answer» The scope of the information TECHNOLOGY will be live forever, bcaz, there is a NEED for air to live , v need a automation to servive so IT is forever no PROBS. The scope of the information technology will be live forever, bcaz, there is a need for air to live , v need a automation to servive so IT is forever no probs. |
|
| 6. |
What Are The Various Cause & Effect Signals Of The 8085 Microprocessor? |
|
Answer» Interrupts. Interrupts. |
|
| 7. |
How To Get The Prime Number Rows From Table I.e. Like 1,3,5,7,11? |
|
Answer» There is no SPECIFIC FORMULA to FIND PRIME NUMBERS. There is no specific formula to find prime numbers. |
|
| 8. |
What Is The Difference Between Connecting To Rdbms Using Odbc And Native Drivers? |
|
Answer» ODBC is an open STANDARD for software providers to follow when creating an intermidate layer between the database and the application using the database. Having "open STANDARDS" usually means that different applications can write their code the same way no matter which database they are using, as long as that database comes with an ODBC driver.In contrast, native drivers are built with one specific database in mind. Thus, applications written to use the native driver will only work with one PARTICULAR database. You will lose flexibility in your code's ability to switch database vendors, but you might gain performance enhancements DUE to the fact that the driver is custom made for the database and MAY be able to take advantage of an "insider's view" of the database software. ODBC is an open standard for software providers to follow when creating an intermidate layer between the database and the application using the database. Having "open standards" usually means that different applications can write their code the same way no matter which database they are using, as long as that database comes with an ODBC driver.In contrast, native drivers are built with one specific database in mind. Thus, applications written to use the native driver will only work with one particular database. You will lose flexibility in your code's ability to switch database vendors, but you might gain performance enhancements due to the fact that the driver is custom made for the database and may be able to take advantage of an "insider's view" of the database software. |
|
| 9. |
What Are Application Clusters In Crm? |
|
Answer» CRM application cluster is a software that ranges in size and complexity making it POSSIBLE for an ORGANIZATION to select the type of software needed the most. It consists of how a customer is related to sales,MARKETING and fulfillment,customer service and SUPPORT,retention and loyalty program and contact and ACCOUNT management. CRM application cluster is a software that ranges in size and complexity making it possible for an organization to select the type of software needed the most. It consists of how a customer is related to sales,marketing and fulfillment,customer service and support,retention and loyalty program and contact and account management. |
|
| 10. |
Planning To Start A Career As A Manual Tester ,is Taking A Course Compulsory Or Can I Get The Subject By Referring Through Information On Internet?,does Manual Testers Use Any Tools In Real Time? |
|
Answer» Not NECESSARY that you have to take any course provided if you are not FRESHER. SUPPOSE if you are WORKING in any company as DESIGN engineer, then as you have the domain knowledge working as end user. Then you can definitely use this knowledge to test the software and find bugs. And regarding processes and tools used every company has different strategy which can be managed or learn once you get into that company. Not necessary that you have to take any course provided if you are not fresher. Suppose if you are working in any company as design engineer, then as you have the domain knowledge working as end user. Then you can definitely use this knowledge to test the software and find bugs. And regarding processes and tools used every company has different strategy which can be managed or learn once you get into that company. |
|
| 11. |
A Two-dimensional Array X (7,9) Is Stored Linearly Column-wise In A Computers Memory. Each Element Requires 8 Bytes For Storage Of The Value. If The First Byte Address Of X (1,1) Is 3000, What Would Be The Last Byte Address Of X (2,3)? |
|
Answer»
X(i,J)=Base+w[n(i-1)+(j-1)] use the formulae X(i,j)=Base+w[n(i-1)+(j-1)] |
|
| 12. |
What Is The Dif Between Review And Walkthrough? On Testing Perspective ,who Will Do Review And Walkthrough? Clarify With An Real Example? |
|
Answer» In laymans term walk-through is nothing but RUNNING THRU the requirements while review is MAKING an analysis of the progress and if the case may be a CHANGE has to be RECOMMENDED In laymans term walk-through is nothing but running thru the requirements while review is making an analysis of the progress and if the case may be a change has to be recommended |
|
| 13. |
Write A C Program To Reverse The String Without Using Strrev() Function? |
|
Answer» #include <stdio.h> #include <stdio.h> |
|
| 14. |
Why Dont We Give A & Before Reading A String In C Language? Scanf("%s",str); Why Is It Not Scanf("%s",&str); |
|
Answer» We don't GIVE an & before READING a string. This is so because a string is a character array. For an array, be it integer or character or any other array, declared as int a[10] or char str[20], the name 'a' or 'str' stores the base address of the array, that is the address of the memory location where the array is starting. The scanf statement requires the address of the location to store the VALUE input by the user. Since str already stores the address of the memory location we do not need to add the & before it. We don't give an & before reading a string. This is so because a string is a character array. For an array, be it integer or character or any other array, declared as int a[10] or char str[20], the name 'a' or 'str' stores the base address of the array, that is the address of the memory location where the array is starting. The scanf statement requires the address of the location to store the value input by the user. Since str already stores the address of the memory location we do not need to add the & before it. |
|
| 15. |
Write An O(log2(n)) Algorithm To Find X^n? |
|
Answer» INT computeXn(int X, int N)
int computeXn(int x, int n)
|
|
| 16. |
How To Print "hello World" In C Without Using Semicolon? |
|
Answer» main() main() |
|
| 17. |
How To Calculate Response Time In Client-server Technology? |
|
Answer» This can be done by measureing the TIME taken by the FIRST byte to reach the CLIENT (TTFB) and the time taken by the last byte of the response to reach the client (TTLB) by using various NETWORK bandwidths between the client and the server. This can be done by measureing the time taken by the first byte to reach the client (TTFB) and the time taken by the last byte of the response to reach the client (TTLB) by using various network bandwidths between the client and the server. |
|
| 18. |
Why Constructors Does Not Supports Visual Functions? |
|
Answer» Constructor does not support virtual FUNCTIONS because we need an OBJECT to invoke a virtual method in the first place and more over CONSTRUCTORS are used to initializing objects,which is a static type.Virtual functions are invoked on the dynamic type of the object,hence the object may not be PROPERLY initialized when a constructor call is made.Since the derived PART of the object would not be initialized during the execution of base class constructor,hence calling any virtual method from base class constructor does not work well. Constructor does not support virtual functions because we need an object to invoke a virtual method in the first place and more over constructors are used to initializing objects,which is a static type.Virtual functions are invoked on the dynamic type of the object,hence the object may not be properly initialized when a constructor call is made.Since the derived part of the object would not be initialized during the execution of base class constructor,hence calling any virtual method from base class constructor does not work well. |
|
| 19. |
What Is The Difference Between Unix Password And Windows Password? |
|
Answer» WINDOWS the PASSWORD lost then no way to login but it's not the case in UNIX,we can ENTER. WINDOWS the password lost then no way to login but it's not the case in UNIX,we can enter. |
|
| 20. |
Explain What Is The Use Of == And Equals() Method? |
|
Answer» The == operator COMPARE WHETHER two object references are refer to the same INSTANCE or not.The equals() METHOD compare the characters(contents) of two String object. String a="Hai"; The == operator compare whether two object references are refer to the same instance or not.The equals() method compare the characters(contents) of two String object. Example: String a="Hai"; |
|
| 21. |
What Is The Difference Between Collision Domain And Broad Cast Domain? |
|
Answer» A collision domain is a logical area in a COMPUTER network where data packets can "collide" with one another, in particular in the Ethernet networking PROTOCOL. The more collisions in a network the less efficient it is. A broadcast domain is a logical area in a computer network where any computer connected to the computer network can DIRECTLY transmit to any other in the domain WITHOUT having to go through a ROUTING device. A collision domain is a logical area in a computer network where data packets can "collide" with one another, in particular in the Ethernet networking protocol. The more collisions in a network the less efficient it is. A broadcast domain is a logical area in a computer network where any computer connected to the computer network can directly transmit to any other in the domain without having to go through a routing device. |
|