Interview Questions

Q:

What is the difference between path and classpath?

Answer

Path contains path of .exe files(commands).


Classpath contains path of packages. packages can be stored in folder or .jar files

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2108
Q:

What is severity and priority of bug? Give some example.

Answer

Priority: concern with application from the business point of view. It answers  How quickly we need to fix the bug? Or How soon the bug should get fixed?


Severity: concern with functionality of application. It deals with the impact of the bug on the application.


 

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2105
Q:

Can HTML 5 get the geographical position of a user?

Answer

- Yes, HTML 5 can get the location of a user with the use of Geolocation API.


- Use getCurrentPosition() method to get the user’s current position.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2105
Q:

Explain about roll area , Dispatcher, ABAP-Processor.

Answer

Dispatcher recieves the request from client and assigns the request to one of the work process.
Roll area: Each workprocess works in a particular memory that memory is known as Role Area, which consists of User context and session data.
ABAP- Processor :is an interpretor which can execute logic

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

0 2104
Q:

How to call argument constructor?

Answer

new ClassName( arg1, arg2, .... argN);


Ex:


Class sample {


   Sample(int a) {


   System.out.println("arg con a =" +a);


   }


}


class Demo {


    Public static void main( String[] args) {


     Sample s1= new Sample(23);


     Sample s2= new Sample(45);


    }


}

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2103
Q:

What are the ways in which attackers can infiltrate the system?

Answer

- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred. 


- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker. 


- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.


- This also authenticates the user for accessing the system and the files on it containing the data. 


- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2103
Q:

What is difference between HTML and HTML5?

Answer

The differences between HTML and HTML5 are:


- Document of HTML is very large as compare to the HTML5.


- Audio and Video tags are not present in HTML whereas HTML5 contains audio and video tags.


- Vector technology is not integral part of HTML whereas HTML5 Vector technology is the integral part of it.


- HTML supported by all old browsers whereas HTML5 is supported by new browser.


- In HTML web sockets are not available whereas in HTML5 Full duplex communication channel is present.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2101
Q:

Define stored procedure. What are its advantages and disadvantages?

Answer

A stored procedure is a segment of declarative SQL statements stored inside the database catalog. A stored procedure can be invoked by triggers, other stored procedures or applications such as Java, C#, PHP, etc.


Advantages 



- Typically stored procedures help increase the performance of the applications. Once created, stored procedures are compiled and stored in the database. However MySQL implements the stored procedures slightly different. MySQL stored procedures are compiled on demand. After compiling a stored procedure, MySQL puts it to a cache. And MySQL maintains its own stored procedure cache for every single connection. If an application uses a stored procedure multiple times in a single connection, the compiled version is used, otherwise the stored procedure works like a query.


- Stored procedures helps reduce the traffic between application and database server because instead of sending multiple lengthy SQL statements, the application has to send only name and parameters of the stored procedure.


- Stored procedures are reusable and transparent to any applications. Stored procedures expose the database interface to all applications so that developers don’t have to develop functions that are already supported in stored procedures.


- Stored procedures are secure. Database administrator can grant appropriate permissions to applications that access stored procedures in the database without giving any permission on the underlying database tables.


Disadvantages


- If you use a lot of stored procedures, the memory usage of every connection that is using those stored procedures will increase substantially. In addition, if you overuse a large number of logical operations inside store procedures, the CPU usage will also increase because database server is not well-designed for logical operations.


- A constructs of stored procedures make it more difficult to develop stored procedures that have complicated business logic.


- It is difficult to debug stored procedures. Only few database management systems allow you to debug stored procedures. Unfortunately, MySQL does not provide facilities for debugging stored procedures.


-It is not easy to develop and maintain stored procedures. Developing and maintaining stored procedures are often required specialized skill set that not all application developers possess. This may lead to problems in both application development and maintenance phases.

Report Error

View answer Workspace Report Error Discuss

0 2099