Technology Questions

Q:

What is ODBC SQLPASSTHROUGH option?

Answer

We use SQLPASSTHROUGH options when we need applications to access data both in the front-end and back-end data servers with a single connection. SQL statements that cannot be executed in the solidDB front-end server are passed over to the back end. 


SQLPASSTHROUGH mode can be set as per session or per transaction. The connection between the front end and back end is made with a back-end compatible ODBC driver which is loaded dynamically in solidDB server.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2690
Q:

What is the difference between Cursor Stability and Repeatable Read isolation levels?

Answer

CURSOR STABILITY:


- CS is a row level locking


- Acquires an exclusive lock on the row that is to be updated


- When the control is moved to the next updatable row, the lock is released


REPEATABLE READ:


- RR is a page level locking


- Acquires an exclusive lock on the entire page which is the source of row availability


- When the control is moved to the next updatable page the lock is released

Report Error

View answer Workspace Report Error Discuss

0 2690
Q:

What are the privacy and security features being provided by web browsers?

Answer

- Web browser supports HTTP secure method that allows more security for the sites that are involved in day to day basis transaction. 


- Security offers quick and easy way to remove the unwanted material or the things that are stored without permission like cache, cookies and history. 


- Security is being provided by the use of blockers that blocks unwanted access to the websites from the outside. 


- Web browser uses other features like disabling of JavaScript and pop up blockers to block any unwanted scripts or messages to run on the system.


- Web browser also uses the security concerns in regard of blocking the access to the secure sites that provides money transfer facilities, etc.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

3 2689
Q:

What are different ways of Initiating Transaction in CICS?

Answer

The following are the ways of initiating a CICS transaction.


1. By entering Transaction Id


2. By Start command


3. By Return Trans Id (as in pseudo - conversation)


4. By Registering Tran ID in plt so that it will be automaticaly dusring CICS start


5. By ATI (Automatic task initiation)


6.PF & PA keys as defined in PCT

Report Error

View answer Workspace Report Error Discuss

0 2683
Q:

What is Interpreter in Java?

Answer

  • An Interpreter is a program that reads in as input a source program, along with data for the program, and translates the source program step by step.


 


The Java interpreter decodes each lines bytecode and runs a series of machine instructions for that bytecode. The JVM takes the byte code and generates machine code. The byte code is compiled to machine code, and the machine code is executed.

Report Error

View answer Workspace Report Error Discuss

7 2681
Q:

What is the way in which the Asynchronous Transfer Mode works?

Answer

The Asynchronous Transfer Mode or ATM is a connection technology that works by transmitting data into organized 53 bytes (small) packages through a physical environment with a high efficiency. Packing data into small cells reduces transportation delay so the speeds reached by this technology are very high; it can reach even 10 Gb per second.

Report Error

View answer Workspace Report Error Discuss

1 2680
Q:

How do you eliminate duplicate values in DB2 SELECT?

Answer

Use SELECT DISTINCT ..... in DB2 query


 


The DISTINCT keyword can be used to return only distinct (different) values.


Syntax:


     SELECT DISTINCT column1,column2


      FROM table_name;


 

Report Error

View answer Workspace Report Error Discuss

0 2680
Q:

How are documents accessed and manipulated in XML?

Answer

The XML DOM (document object model) is used the access and management of xml. It is a platform that is language neutral and allows a program or a script to dynamically access a document. It also allows the updation of content as well as the structure and style of the document. It is responsible for the defining of the object and properties of all xml elements as well as to define the methods for their access. There are various methods that can be used in xml dom such as:


- getElementsByTagName: used to call a specific user defined tag.


- setAttribute: used to change the value of an existing attribute.


- appendChild: used to add a child node to another node.


 

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

1 2676