Technology Questions

Q:

What is security/penetration testing?

Answer

Security/penetration testing is testing how well the system is protected against unauthorized internal or external access, or willful damage. This type of testing usually requires sophisticated testing techniques.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 3457
Q:

Explain how to handle exceptional conditions in CICS?

Answer

An abnormal situation during execution of a CICS command is called an exceptional condition:


1. Handle Condition Command: It is used to transfer control to the procedure label specified if the exceptional condition specified occurs.


2. Ignore Condition Command: It causes no action to be taken if the condition specified occurs in the program. That is control will be returned to the next instruction following the command which encountered the exceptional condition.


3. No Handle Option: This option can be specified in any CICS command and it will cause no action to be taken for any exceptional condition occurring during execution of this command.


4. RESP Option: This option can be specified in any CICS command. If the RESP option is specified in a command, CICS places a response code at a completion of the command. The application program can check this code, then proceed to the next processing.

Report Error

View answer Workspace Report Error Discuss

0 3455
Q:

What is ALV programming in ABAP? When is this grid used in ABAP?

Answer

ALV is Application List viewer. Sap provides a set of ALV (ABAP LIST VIEWER) function modules which can be put into use to embellish the output of a report. This set of ALV functions is used to enhance the readability and functionality of any report output. Cases arise in sap when the output of a report contains columns extending more than 255 characters in length. In such cases, this set of ALV functions can help choose selected columns and arrange the different columns from a report output and also save different variants for report display. This is a very efficient tool for dynamically sorting and arranging the columns from a report output. The report output can contain up to 90 columns in the display with the wide array of display options.

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

2 3449
Q:

Which among the following command is used to implement view state

A) _VIEWSTATE B) VIEW_STATE
C) VIEWSTATE_ D) None
 
Answer & Explanation Answer: A) _VIEWSTATE

Explanation:

_VIEWSTATE is the command used to implement view state

Report Error

View Answer Report Error Discuss

Filed Under: .NET
Job Role: Software Architect

0 3446
Q:

Which API is used to write test scripts that help in exercising the application's user interface elements?

Answer

 UI Automation API is used to automate test procedures. Tests scripts are written in JavaScript to the UI Automation API.  This in turn simulates user interaction with the application and returns log information to the host computer.

Report Error

View answer Workspace Report Error Discuss

1 3441
Q:

What is usage of Sequence Number in Relaible Transmission?

Answer

The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to the data frame to hold the sequence number of that frame. Since we want to minimize the frame size, the smallest range that provides unambiguous communication. The sequence numbers can wrap around.

Report Error

View answer Workspace Report Error Discuss

0 3437
Q:

What is a shared pool?

Answer

Shared pool in oracle contains cache information that collects, parses, interprets and executes SQL statements that goes against database. This shared pool acts like a buffer for these SQL statements.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 3430
Q:

What is Pipelining ?

Answer

In networking and in other areas, a task is often begun before the previous task has ended. This is known as pipelining.


 

Report Error

View answer Workspace Report Error Discuss

0 3428