Technology Questions

Q:

What are the prime responsibilities of Data Integration Administrator?

Answer

- Scheduling and executing the batch jobs.


- Configuring, starting and stopping the real-time services


- Adapters configuration and managing them.


- Repository usage, Job Server configuration.


- Access Server configuration.


- Batch job publishing.


- Real-time services publishing through web services.

Report Error

View answer Workspace Report Error Discuss

0 2659
Q:

Explain how to start and stop the Oracle HTTP Server.

Answer

Oracle HTTP Server is managed by OPMN which stands for Oracle Process Manager and Notification Server. With the use of opmnctl utility we can start, stop and restart Oracle HTTP Server. If we don’t use this utility the configuration management infrastructure cannot detect or communicate with the Oracle HTTP Server processes, and problems may occur.


The startproc command for the case of Windows is: ORACLE_HOME\opmn\bin> opmnctl [verbose] startproc ias-component=HTTP_Server.


To stop Oracle HTTP Server, use the stopproc command: Windows: ORACLE_HOME\opmn\bin> opmnctl [verbose] stopproc ias-component=HTTP_Server.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2658
Q:

What are the basic interfaces of Java Collections Framework ?

Answer

Java Collections Framework provides a well designed set of interfaces and classes that support operations on a collections of objects. The most basic interfaces that reside in the Java Collections Framework are:


Collection, which represents a group of objects known as its elements.


Set, which is a collection that cannot contain duplicate elements.


List, which is an ordered collection and can contain duplicate elements.


Map, which is an object that maps keys to values and cannot contain duplicate keys.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

1 2656
Q:

How can we encrypt the username and password using PHP?

Answer

User names and passwords in PHP can be encrypted using md5 function.


MD5 function calculates the md5 hash of a string. It is basically used for encryption. It is also used for digital signature applications, where a large file must be "compressed" in a secure manner.


Example:


Md5($str);


 


Crypt() function can also be used to encrypt a string,. It used MD5, DES or blow fish algorithms for encryption.


Syntax:


Crypt(str, salt)


Salt is an optional parameter used to increase the number of characters encoded, to make the encoding more secure

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2652
Q:

Can you access non static variable in static context ?

Answer

A static variable in Java belongs to its class and its value remains the same for all its instances. A static variable is initialized when the class is loaded by the JVM. If your code tries to access a non-static variable, without any instance, the compiler will complain, because those variables are not created yet and they are not associated with any instance.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2651
Q:

What is String Args in Java?

Answer

String Args (String []) is an array of parameters of type String.


In Java, 'args' contains the supplied command-line arguments as an array of String objects. In other words, if you run your program as 'java MyProgram Hello World' then 'args' will contain ["Hello", "World"]. When a java class is executed from the console, the main method is what is called.

Report Error

View answer Workspace Report Error Discuss

9 2651
Q:

What File system is supported by Windows XP?

Answer

Windows XP supports four major file systems: FAT12, FAT16, FAT32 and NTFS. This means that Windows XP can be installed on these file systems. The use of NTFS is preferred especially when using a bigger hard drive space.

Report Error

View answer Workspace Report Error Discuss

0 2649
Q:

How to derive test scenarios and use cases? What are the contents and format?

Answer

 Test scenarios are derived from requirement documents. We follow each and every functionality (called business rules) mentioned in the requirement document. One functionality can have multiple business rules. For example, let us say in there is one requirement called “Login”. This “Login” may have various scenarios. For example, one scenario is, enter the right User ID and wrong password. The system should display an error message. Another scenario would be to enter wrong User ID and right Password. The system should display an error message. The third scenario could be to enter the right User Name and right Password. The system should allow the user to get into the system. This is how the test cases are derived from the requirement documents or from the Use Cases.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2648