Technology Questions

Q:

What are the tasks of a Business Analyst in Software Development Life Cycle?

Answer

Generally a business analyst covers several stages in Software Development Life Cycle.


Like:  Client Consulting, Client Requirement Study, Planning for business needs, Business Requirement Documenting, Work on functional requirement, Prepare test data with inputs from end users, Document use case scenarios, Help Testing team with test plan and testing, Help end users with user acceptance testing UAT, Go live and post production support tasks.

Report Error

View answer Workspace Report Error Discuss

5 2017
Q:

What is the difference between a constructor and a method?

Answer

A constructor is a member function of a class that is used to create objects of that class. It has the same name as the class itself, has no return type, and is invoked using the new operator. We cannot invoke a constructor directly.


 


A method is an ordinary member function of a class. It has its own name, a return type (which may be void), and is invoked using the dot operator.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2015
Q:

How does Microsoft classify security threats to its software?

Answer

Microsoft classifies such threats into 4 indicators, which are low, moderate, important, and critical. Such indicators are available as reference under the Microsoft bulletin.

Report Error

View answer Workspace Report Error Discuss

0 2013
Q:

Which package is imported by default?

Answer java.lang package is imported by default even without a package declaration.
Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2013
Q:

Explain the changing file permission and ownership using PHP's chmod() function.

Answer

Chmod() is used for changing permissions on a file.


Syntax:


Chmod(file, mode)


Mode here specifies the permissions as follows:


The first number is always zero


The second number specifies permissions for the owner


The third number specifies permissions for the owner's user group


The fourth number specifies permissions for everybody else


Possible values (to set multiple permissions, add up the following numbers)


1 = execute permissions


2 = write permissions


4 = read permissions


Example:


// everything for owner, read for owner's group


chmod("test.txt",0740);

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2010
Q:

What is Spring IoC container ?

Answer

The Spring IoC is responsible for creating the objects,managing them (with dependency injection (DI)), wiring them together, configuring them, as also managing their complete lifecycle.

Report Error

View answer Workspace Report Error Discuss

Subject: Java Exam Prep: Bank Exams
Job Role: Analyst , Project Manager , Software Architect

3 2010
Q:

How can you configure Wi-Fi network and what are Wi-Fi Protocols?

Answer

Basically there are many standards of Wi-Fi in the industry but some popular of them are 802.11a, 802.11b, 802.11g/n. With the support of these Wi-Fi protocols we can communicate/interact among the devices at the speed of 5Ghz to 2.4Ghz dual band communication.

If we have Wi-Fi nic card so firstly we have to install their drivers and after installation if we have Wi-Fi access point then we can see the signal strength in the right corner below just open that and find the access point to connect, if access point is configured with the security, type the key to connect and enjoy the service.

Wi-Fi is technically referred to as the 802.11 protocol. Over time, Wi-Fi has improved, giving rise to different variations of the protocol.

802.11a – This version operates at 54Mbps. It is considered as the favorite wireless LAN protocol for IP telephony.

Report Error

View answer Workspace Report Error Discuss

0 2009
Q:

What is DHCP scope?

Answer

A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.

Report Error

View answer Workspace Report Error Discuss

0 2009