Technology Questions

Q:

Define authentication and authorization.

Answer

Authorization: The process of granting access privileges to resources or tasks within an


application.


Authentication: The process of validating the identity of a user.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET
Job Role: Software Architect

0 2311
Q:

What is the information does assembly manifest provide?

Answer

Information provided by Assembly Manifest:



  1.  Assembly Name

  2.  Version Number

  3.  Culture

  4.  Strong name

  5.  List of files inside the assembly

  6.  Reference information

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2310
Q:

Could you explain the areas where tuning of database is required?

Answer

The following are the areas of concern for tuning:


- Memory Usage


- Data Storage


- Data Manipulation


- Physical Storage


- Logic Storage


- Network Traffic


Tuning Memory Usage: In Oracle 10g, we can use the Automatic Workload Repository (AWR) toolset to gather and manage statistical data but in case of Oracle 11g, we can use new initialization parameters such as MEMORY_TARGET to further control the overall memory used by Oracle. It helps us to tune the database automatically when we don’t have time to read the AWR report.


Tuning Data Manipulation: There are two ways to tune Data manipulation in Oracle one way is through Conventional Path mode and second is Direct Path mode.


Tuning Physical Storage: We need to tune the physical storage because it limits the disk in database. This can be done by: Distributing I/O, Striping and Mirroring.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2310
Q:

Is it cost effective to implement a private cloud rather than a public cloud and why?

Answer

It depends on the type of business that demands a cloud setup. Suppose if the subscription on a public cloud for an application that is to be deployed on OS images is proving to be more costly then to buy some new datacenters and maintain them. Then obviously the a private cloud has to be setup instead of a public cloud. This public clouds follow utility billing methodology as electricity bill for example.

Report Error

View answer Workspace Report Error Discuss

Subject: Cloud Computing

0 2303
Q:

What are the different types of diagrams and what do you know about them?

Answer

Use case diagram, activity diagram, Collaboration diagram. 


Use case diagram :


It describes the business environment. Its primary goal is to show the series of events and actions within any given process that will be performed by an actor.  


 


Activity diagram:


The activity diagram is important because it gives an outline of the work flow within the business as well as the activities and action completed. 


For instance with a company, there is likely to be more than one department. In such a case each department, will have different access levels to the system. 


So if there’s a Medical, HR and Accounts team they will only have access to screens that relate to each. 


The activity diagram will highlight the differences within the departments which will be very helpful for developers when they are designing and coding. 


 


Collaboration diagram:


A collaboration diagram, also called a communication diagram or interaction diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML). The concept is more than a decade old although it has been refined as modeling paradigms have evolved. 

Report Error

View answer Workspace Report Error Discuss

0 2303
Q:

What is wrapping?

Answer

Wrapping is also called as packing or boxing.


Storing the data inside the object as private data which can accessed outside the class only by using methods.


 

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2302
Q:

What are constraints? Mention the different types of constraints?

Answer

Constraints enable the RDBMS to enforce the integrity of the database automatically, without the need to create triggers, rule or defaults.


Types of Constraints: NOT NULL, CHEQUE, UNIQUE, PRIMARY KEY, FOREIGN KEY.

Report Error

View answer Workspace Report Error Discuss

Subject: SQL

0 2301
Q:

What is JAR file?

Answer

A JAR file (short for Java Archive) is a ZIP file used to distribute a set of Java classes. It is used to store compiled Java classes and associated metadata that can constitute a program

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2299