Interview Questions

Q:

How does Microsoft classify security threats to its software?

Answer

Microsoft classifies such threats into 4 indicators, which are low, moderate, important, and critical. Such indicators are available as reference under the Microsoft bulletin.

Report Error

View answer Workspace Report Error Discuss

0 2014
Q:

Which package is imported by default?

Answer java.lang package is imported by default even without a package declaration.
Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2014
Q:

How can you configure Wi-Fi network and what are Wi-Fi Protocols?

Answer

Basically there are many standards of Wi-Fi in the industry but some popular of them are 802.11a, 802.11b, 802.11g/n. With the support of these Wi-Fi protocols we can communicate/interact among the devices at the speed of 5Ghz to 2.4Ghz dual band communication.

If we have Wi-Fi nic card so firstly we have to install their drivers and after installation if we have Wi-Fi access point then we can see the signal strength in the right corner below just open that and find the access point to connect, if access point is configured with the security, type the key to connect and enjoy the service.

Wi-Fi is technically referred to as the 802.11 protocol. Over time, Wi-Fi has improved, giving rise to different variations of the protocol.

802.11a – This version operates at 54Mbps. It is considered as the favorite wireless LAN protocol for IP telephony.

Report Error

View answer Workspace Report Error Discuss

0 2012
Q:

What is DHCP scope?

Answer

A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.

Report Error

View answer Workspace Report Error Discuss

0 2011
Q:

Explain the changing file permission and ownership using PHP's chmod() function.

Answer

Chmod() is used for changing permissions on a file.


Syntax:


Chmod(file, mode)


Mode here specifies the permissions as follows:


The first number is always zero


The second number specifies permissions for the owner


The third number specifies permissions for the owner's user group


The fourth number specifies permissions for everybody else


Possible values (to set multiple permissions, add up the following numbers)


1 = execute permissions


2 = write permissions


4 = read permissions


Example:


// everything for owner, read for owner's group


chmod("test.txt",0740);

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2011
Q:

How does an application run in isolation from other applications?

Answer

Each application gets its own Linux user ID and virtual machine which means that the application code runs in isolation from other applications.

Report Error

View answer Workspace Report Error Discuss

0 2006
Q:

What qualities does a person need to be successful in the field of advertising?

Answer

The following are the qualities required to be successful in the field of advertising:


 - Creativity
 - Strategic focus
 - Knowledge and expertise in the field of advertising
 - Holding a relevant qualification in the field of advertising
 - Market research orientation
 - People skills etc.

Report Error

View answer Workspace Report Error Discuss

3 2004
Q:

What does coalescing a tablespace do?

Answer

Coalescing is only valid for dictionary-managed tablespaces and de-fragments space by combining neighboring free extents into large single extents.

Report Error

View answer Workspace Report Error Discuss

1 1998