Interview Questions

Q:

Explain the changing file permission and ownership using PHP's chmod() function.

Answer

Chmod() is used for changing permissions on a file.


Syntax:


Chmod(file, mode)


Mode here specifies the permissions as follows:


The first number is always zero


The second number specifies permissions for the owner


The third number specifies permissions for the owner's user group


The fourth number specifies permissions for everybody else


Possible values (to set multiple permissions, add up the following numbers)


1 = execute permissions


2 = write permissions


4 = read permissions


Example:


// everything for owner, read for owner's group


chmod("test.txt",0740);

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2269
Q:

What is the TTL (Time to Live)? Why is it required?

Answer

TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded. Usually, data packets might not be transmitted to their intended destination within a stipulated period of time. The TTL value is set by a system default value which is an 8-bit binary digit field in the header of the packet. The purpose of TTL is, it would specify certain time limit in seconds, for transmitting the packet header. When the time is exhausted, the packet would be discarded. Each router receives the subtracts count, when the packet is discarded, and when it becomes zero, the router detects the discarded packets and sends a message, Internet Control Message Protocol message back to the originating host.

Report Error

View answer Workspace Report Error Discuss

0 2262
Q:

A database is used to

A) store data B) modify data
C) extract data D) All of the above
 
Answer & Explanation Answer: D) All of the above

Explanation:

A database is used to store, modify, extract and to search for the data within it.

Report Error

View Answer Report Error Discuss

7 2260
Q:

What is the Fail-safe approach?

Answer

- Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed.


- The fail safe approach doesn’t allow an attacker to take the advantage by breaking in the system and crashes out.


- This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack. 


- The system in attacks doesn’t skip the access to the control check or it doesn’t skip serving any document requested. 


- Fail safe approach can force the web server to run of the memory and have a DoS attack.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2259
Q:

What are the features added in iOS 9 ?

Answer

  • Intelligent Search and Siri- Intelligent Search is an excellent mechanism to learn user habits and act on that information- open apps before we need them, make recommendations on places we might like and guide us through our daily lives to make sure we’re where we need to be at the right time.
    Siri is a personal assistant to the users, able to create contextual reminders and search through photos and videos in new ways. Swiping right from the home screen also brings up a new screen that houses “Siri Suggestions,” putting favorite contacts and apps right on your fingertips, along with nearby restaurant and location information and important news.

  • Deeper search capabilities can show results like sports scores, videos, and content from third-party apps, and you can even do simple conversions and calculations using the search tools on your iPhone or iPad.

  • Many of the built-in apps have been updated.
    ✓ Notes includes new checklists and sketching features
    ✓ Maps now offers transit directions
    ✓ Mail allows for file attachments
    ✓ Apple Pay is being improved with the addition of store credit cards and loyalty cards
    ✓ Leading “Passbook” to be renamed to “Wallet” in iOS 9.

  • San Francisco font, wireless CarPlay support

  • An optional iCloud Drive app, built-in two-factor authentication and optional longer passwords for better security.

  • Performance improvements

Report Error

View answer Workspace Report Error Discuss

8 2258
Q:

What is Payroll transaction?

Answer

Payroll Transaction is nothing but the calculation of salary for a month / week / day of an individual / group of employees depends upon the attendance / variable inputs / other benefits / salary component and generate the reports for IT / Statutory / PT payments.

Report Error

View answer Workspace Report Error Discuss

0 2258
Q:

What is the difference between the functions unlink and unset?

Answer

unlink()-deletes the given file from the file system.
unset() -makes a variable undefined.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2257
Q:

Mention the difference between clustered and a non-clustered index?

Answer

- A clustered index is a special type of index that reorders the way records in the table are physically stored. Therefore table can have only one clustered index.


- A non clustered index is a special type of index in which the logical order of the index does not match the physical stored order of the rows on disk. The leaf node of a non clustered index does not consist of the data pages. Instead, the leaf nodes contain index rows.

Report Error

View answer Workspace Report Error Discuss

Subject: SQL

0 2256