Technology Questions

Q:

Differentiate between localStorage and sessionStorage objects.

Answer

- localStorage object stores the data without an expiry date while sessionStorage object stores the data only for one session. 


- With localStorage object, data will not be deleted when the browser window is closed while the data is deleted when the browser window closes with sessionStorage objects.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2588
Q:

What are the different types of components involved in URI?

Answer

URI is known as Uniform Resource Identifier as it identifies the resources requested by clients and fetches them from the server. 


The components that are used in URI are as follows:


- http: is the first thing that is used in a URL and it is used to tell what kind of resource that needs to be retrieved over the server.


 This includes the server details and it is itself a protocol known as Hypertext Transfer Protocol (HTTP) that is used to fetch the information. 


- Web browsers sometimes use the secure protocol that is represented using HTTPs used in case of secure transaction over the internet. 


- FTP: is also a protocol that is known as File Transfer Protocol that allows the transfer from a file from local computer to server

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2587
Q:

What does a VLAN do?

A) Breaks up broadcast domains in a layer 2 switch internetwork B) Provides multiple broadcast domains within a single collision domain
C) Provides multiple collision domains on one switch port D) Acts as the fastest port to all servers
 
Answer & Explanation Answer: A) Breaks up broadcast domains in a layer 2 switch internetwork

Explanation:

virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). LAN is the abbreviation for local area network and in this context, virtual refers to a physical object recreated and altered by additional logic.

VLANs work by applying tags to network packets and handling these tags in networking systems – creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

Report Error

View Answer Report Error Discuss

0 2587
Q:

What is the maximum size of a file that can be uploaded using PHP and how can we change this?

Answer

By default the maximum size is 2MB. and we can change the following
setup at php.iniupload_max_filesize = 2M

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2587
Q:

What are the ways of preserving data on a Web Form in ASP.NET?

Answer

These objects provide two levels of scope:


Application State


Data stored in the application object can be shared by all the sessions of the application.


Application object stores data in the key value pair.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET
Job Role: Software Architect

0 2586
Q:

What is Dimensional Modeling?

Answer

Dimensional modeling is often used in Data warehousing. In simpler words it is a rational or consistent design technique used to build a data warehouse. DM uses facts and dimensions of a warehouse for its design. A snow and star flake schema represent data modeling.

Report Error

View answer Workspace Report Error Discuss

0 2582
Q:

How to derive test scenarios and use cases? What are the contents and format?

Answer

 Test scenarios are derived from requirement documents. We follow each and every functionality (called business rules) mentioned in the requirement document. One functionality can have multiple business rules. For example, let us say in there is one requirement called “Login”. This “Login” may have various scenarios. For example, one scenario is, enter the right User ID and wrong password. The system should display an error message. Another scenario would be to enter wrong User ID and right Password. The system should display an error message. The third scenario could be to enter the right User Name and right Password. The system should allow the user to get into the system. This is how the test cases are derived from the requirement documents or from the Use Cases.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2580
Q:

What is the difference between TCP and UDP?

Answer

TCP-Transmission Control Protocol


UDP- user Datagram protocol


UDP is user assisted program and converts the application into the encapsulated form and makes it end point for data to send and then TCP helps in transmission or broadcast!

Report Error

View answer Workspace Report Error Discuss

0 2579