Interview Questions

Q:

What is the Fail-safe approach?

Answer

- Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed.


- The fail safe approach doesn’t allow an attacker to take the advantage by breaking in the system and crashes out.


- This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack. 


- The system in attacks doesn’t skip the access to the control check or it doesn’t skip serving any document requested. 


- Fail safe approach can force the web server to run of the memory and have a DoS attack.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2277
Q:

What is the difference between the functions unlink and unset?

Answer

unlink()-deletes the given file from the file system.
unset() -makes a variable undefined.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2275
Q:

What are transaction isolation levels supported by Oracle?

Answer

Oracle supports 3 transaction isolation levels: 


- Read committed (default)


- Serializable transactions


- Read only

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

1 2272
Q:

How can you configure Wi-Fi network and what are Wi-Fi Protocols?

Answer

Basically there are many standards of Wi-Fi in the industry but some popular of them are 802.11a, 802.11b, 802.11g/n. With the support of these Wi-Fi protocols we can communicate/interact among the devices at the speed of 5Ghz to 2.4Ghz dual band communication.

If we have Wi-Fi nic card so firstly we have to install their drivers and after installation if we have Wi-Fi access point then we can see the signal strength in the right corner below just open that and find the access point to connect, if access point is configured with the security, type the key to connect and enjoy the service.

Wi-Fi is technically referred to as the 802.11 protocol. Over time, Wi-Fi has improved, giving rise to different variations of the protocol.

802.11a – This version operates at 54Mbps. It is considered as the favorite wireless LAN protocol for IP telephony.

Report Error

View answer Workspace Report Error Discuss

0 2270
Q:

Difference between Swing and Awt ?

Answer

AWT are heavy-weight componenets. Swings are light-weight components. Hence swing works faster than AWT.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2268
Q:

What is meant by index cardinality?

Answer

The number of distinct values for a column is called index cardinality. DB2's RUNSTATS utility analyzes column value redundancy to determine whether to use a tablespace or index scan to search for data.

Report Error

View answer Workspace Report Error Discuss

0 2267
Q:

Which of the following best describes term life insurance? 

A) The insured pays a premium for a specified number of years. B) The insured is covered during his or her entire lifetime.
C) The insured pays the premium until his or her death. D) The insured can borrow or collect the cash value of the policy.
 
Answer & Explanation Answer: A) The insured pays a premium for a specified number of years.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Accounts Receivable
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO

0 2264
Q:

What is a .htacces file

Answer

 .htaccess is a configuration file running on Apache server.These .htaccess file used to change the functionality and features of apache web  server .

 e.g   .htaccess file used for url rewrite .

         .htaccess file used to make the site password protected.

         .htaccess file can restrict  some ip addresses ,so that on restricted ip adresses  site will not open.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2264