Interview Questions

Q:

When does the SQL statement gets executed when you use cursor in the application programming?

Answer

SQL statement gets executed when we open cursor


 

Report Error

View answer Workspace Report Error Discuss

0 1782
Q:

What is local class?

Answer

Local class is class defined inside method


EX;


class A { // top level class


  public static void main(string[] args) {


   class B { // local class


   }


}


}

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 1782
Q:

what are the types of standard SAP Internal Tables?

Answer

1)standered table


2)index table


3)hashed table


4)sorted table

Report Error

View answer Workspace Report Error Discuss

Subject: SAP

0 1781
Q:

Assume that your app is running in the foreground but is currently not receiving events. In which sate it would be in?

Answer

An app will be in InActive state if it is running in the foreground but is currently not receiving events. An app stays in InActive state only briefly as it transitions to a different state.

Report Error

View answer Workspace Report Error Discuss

0 1780
Q:

In a DB2-CICS program which acts as co-ordinator and which is the participant?

Answer

DB2 acts as the participant and CICS acts as a co-ordinator


 

Report Error

View answer Workspace Report Error Discuss

0 1780
Q:

What did you enjoy most and least in your last retailing job?

Answer

i enjoy the most learning new things like staff management,motivation,management,smart working etc. i enjoy the least free timing during my job.

Report Error

View answer Workspace Report Error Discuss

Subject: Retail

0 1779
Q:

What are the ways in which attackers can infiltrate the system?

Answer

- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred. 


- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker. 


- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.


- This also authenticates the user for accessing the system and the files on it containing the data. 


- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1779
Q:

What is the Set interface ?

Answer

- The Set interface provides methods for accessing the elements of a finite mathematical set


- Sets do not allow duplicate elements


- Contains no methods other than those inherited from Collection


- It adds the restriction that duplicate elements are prohibited


- Two Set objects are equal if they contain the same elements

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 1777