Interview Questions

Q:

What was the process of QA testing in your company where you worked for the last time?

Answer

The QA testing process that was followed in my last company where I worked was like this: First of all the Business Requirement Document was prepared as per the client’s requirement (with the muck-up screen shots). Then on the basis of the requirement document, Test Strategy, Test Plans and Test Cases were written in sequential order. Once the Build is made and deployed to the different testing environments where different types of testing were performed to check whether there are any defects.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2402
Q:

What is Data Integration?

Answer

- The process of combining data from different resources.


- The combined data is provided to the users with unified view.


- Information from different enterprise domains are integrated – known as Enterprise Information Integration.


- Useful for merging information from different technologies among enterprises.


- The sub areas of data integration are 


1. Data Warehousing.


2. Data Migration.


3. Master Data Management.

Report Error

View answer Workspace Report Error Discuss

0 2401
Q:

What are the differences between GET and POST methods in form submitting?

Answer

On the server side, the main difference between GET and POST is where the submitted is stored. The $_GET array stores data submitted by the GET method. The $_POST array stores data submitted by the POST method.

On the browser side, the difference is that data submitted by the GET method will be displayed in the browser’s address field. Data submitted by the POST method will not be displayed anywhere on the browser.

GET method is mostly used for submitting a small amount and less sensitive data.
POST method is mostly used for submitting a large amount or sensitive data.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2401
Q:

what is the use of virtual destructor in c++?

Answer

A destructor is automatically called when the object is destroyed. A virtual destructor in C++ is used primarily to prevent resource leaks by performing a clean-up of the object.

Report Error

View answer Workspace Report Error Discuss

Subject: C++

0 2398
Q:

Could you explain the areas where tuning of database is required?

Answer

The following are the areas of concern for tuning:


- Memory Usage


- Data Storage


- Data Manipulation


- Physical Storage


- Logic Storage


- Network Traffic


Tuning Memory Usage: In Oracle 10g, we can use the Automatic Workload Repository (AWR) toolset to gather and manage statistical data but in case of Oracle 11g, we can use new initialization parameters such as MEMORY_TARGET to further control the overall memory used by Oracle. It helps us to tune the database automatically when we don’t have time to read the AWR report.


Tuning Data Manipulation: There are two ways to tune Data manipulation in Oracle one way is through Conventional Path mode and second is Direct Path mode.


Tuning Physical Storage: We need to tune the physical storage because it limits the disk in database. This can be done by: Distributing I/O, Striping and Mirroring.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2395
Q:

Why we use array_flip

Answer

array_flip exchange the keys with their associated values in array ie. Keys becomes values and values becomes keys.

<?php
$arrayName    = array("course1"=>"php","course2"=>"html");
$new_array    = array_flip($arrayName);
print_r($new_array);
?>

OUTPUT :

Array
(
[php]     => course1
[html]    => course2
)

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2395
Q:

What is the information does assembly manifest provide?

Answer

Information provided by Assembly Manifest:



  1.  Assembly Name

  2.  Version Number

  3.  Culture

  4.  Strong name

  5.  List of files inside the assembly

  6.  Reference information

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2394
Q:

What are constraints? Mention the different types of constraints?

Answer

Constraints enable the RDBMS to enforce the integrity of the database automatically, without the need to create triggers, rule or defaults.


Types of Constraints: NOT NULL, CHEQUE, UNIQUE, PRIMARY KEY, FOREIGN KEY.

Report Error

View answer Workspace Report Error Discuss

Subject: SQL

0 2393