Interview Questions

Q:

What is the meaning of VSAM RETURN-CODE 28?

Answer

Out of space condition is raised.

Report Error

View answer Workspace Report Error Discuss

1 6334
Q:

Which of these class have only one field 'TYPE' ?

A) Run time B) Process
C) Void D) System
 
Answer & Explanation Answer: C) Void

Explanation:

The Void class has one field, TYPE, which holds a reference to the Class object for the type void.

Report Error

View Answer Report Error Discuss

Filed Under: Java
Job Role: Analyst , IT Trainer

6 6293
Q:

What is QUIESCE?

Answer

A QUIESCE flushes all DB2 buffers on to the disk. This gives a correct snapshot of the database and should be used before and after any IMAGECOPY to maintain consistency.

Report Error

View answer Workspace Report Error Discuss

0 6281
Q:

What are the Web Form Events available in ASP.NET?

Answer

Page_Init


Page_Load


Page_PreRender


Page_Unload


Page_Disposed


Page_Error


Page_AbortTransaction


Page_CommitTransaction 


Page_DataBinding

Report Error

View answer Workspace Report Error Discuss

Subject: .NET
Job Role: Software Architect

1 6279
Q:

Which of the following is the oldest Joint Stock Bank of India  ?

A) Patiala Bank B) Punjab National Bank
C) Bank of India D) Allahabad Bank
 
Answer & Explanation Answer: D) Allahabad Bank

Explanation:

Oldest Joint Stock bank of India was Bank of Upper India that was established in 1863. But this bank failed in 1913. India's Oldest Joint Stock Bank which is still working is Allahabad Bank. It is also known as India's oldest public sector bank.

Report Error

View Answer Report Error Discuss

Filed Under: Bank Interview
Exam Prep: Bank Exams , CAT
Job Role: Bank Clerk , Bank PO

2 6273
Q:

What is the differences between ABAP and OOABAP. In which situation we use OOABAP?

Answer

OOABAP is used to develop BSP/PCUI applications and also anthing involved object oriented like BADIs, SmartForms..etc.where as ABAP is used to develop traditional programs in R/3.

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

2 6273
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

1 6241
Q:

What of the following describes protected access specifier?

A) The variable is visible only outside inside the block B) The variable is visible everywhere
C) The variable is visible to its block and to it’s derived class D) None of these
 
Answer & Explanation Answer: C) The variable is visible to its block and to it’s derived class

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: C++

2 6237