Interview Questions

Q:

What is the procedure to configure the web browser to accept or reject cookies?

Answer

- The web browser visits a website using the HTTP and then it keeps the track of the identity of the user visiting the web page.


- The cookies of HTTP get stored with the personal information of the user and it doesn’t accept the information. 


- Users accept the cookies as by rejecting all the cookies will load the web page in longer time and it will not be desired by the users. 


- Even if the cookie is being rejected a session cookie is being kept for use as it is the provision given to the web browser to use it. 


- The cookies gets stored temporary basis depending on the user of accepting or rejecting it and it basically saves the session so that the duration of the page load can be reduced.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1890
Q:

What is the impact of declaring a method as final?

Answer

A method declared as final can't be overridden. A sub-class can't have the same method signature with a different implementation.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 1890
Q:

How did you hear about the position?

Answer

Another seemingly safe interview question, this is certainly a good opportunity to stand out and put your passion for and connection to the organization. For example, if you found out about the gig through a professional contact or friend, name drop that person, then share why you were so excited about it. If you hear  the company through an article or event, share that. Even if you found the listing through a random job board, share what, particularly, caught your eye about the position.

Report Error

View answer Workspace Report Error Discuss

Subject: About Yourself

8 1888
Q:

Would you lie for the company ?

Answer

This is one of the trickiest questions in the world of interviewing, as it pits two morals against each other − Loyalty verses Honesty.


In such cases, try to give an answer that’s as diplomatic as possible, like − I will never do anything that could cast a shadow on the company’s image and reputation. I will always consult with my seniors before taking a decision, so that they can guide me with their expertise and level of experience.

Report Error

View answer Workspace Report Error Discuss

3 1887
Q:

What documents should be delivered by a Business Analyst should deliver?

Answer

The documents that a business analyst should deliver are functional specification documents, technical specification documents, Requirements traceability, BRD (business requirements document), Use case diagrams and Business flow documents.

Report Error

View answer Workspace Report Error Discuss

0 1886
Q:

How to Accessing Elements using javascript?

Answer

The elements of JavaScript are accessed by their names. By default the browser is accessed by the element ‘windows’ and the page by ‘document’. The corresponding element has user defined names for forms and its elements. For example


var pwd = windows.document.frmLogin.password.value;


assigns the value of the password field of the form fromLogin in the current document, where password is the name of the element and frmLogin is the name of the form. Like wise any form element is accessed.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1886
Q:

What is an ABAP/4 Query?

Answer

ABAP/4 Query is a powerful tool to generate simple reports without any coding. ABAP/4 Query can generate the following 3 simple reports: Basic List: It is the simple reports. Statistics: Reports with statistical functions like Average, Percentages. Ranked Lists: For analytical reports. - For creating a ABAP/4 Query, programmer has to create user group and a functional group. Functional group can be created using with or without logical database table. Finally, assign user group to functional group. Finally, create a query on the functional group generated.

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

0 1886
Q:

What are the security measures that are taken to make Android secure?

Answer

Android uses many security measures to keep them away from the hackers. They have designed by making changes to the devices or installing a software service on the mobile. Android application uses sandbox that is very popular and allow limited access to the information that is very private and sensitive for the user. It allows the permissions to be set for the use of the information. The security measures that are provided by android is the use of the encryption of the messages that allow user to remain without worry about there phone security. They also consists of user terms and agreements that also taken care of. Most of the time android doesn't allow other applications to run on their system but it can be done by using different resources that are available on-line. As, android is open source it is not fully secure but lots of security issues are being solved for make it more popular and bug free.

Report Error

View answer Workspace Report Error Discuss

0 1882