Interview Questions

Q:

What are the privacy and security features being provided by web browsers?

Answer

- Web browser supports HTTP secure method that allows more security for the sites that are involved in day to day basis transaction. 


- Security offers quick and easy way to remove the unwanted material or the things that are stored without permission like cache, cookies and history. 


- Security is being provided by the use of blockers that blocks unwanted access to the websites from the outside. 


- Web browser uses other features like disabling of JavaScript and pop up blockers to block any unwanted scripts or messages to run on the system.


- Web browser also uses the security concerns in regard of blocking the access to the secure sites that provides money transfer facilities, etc.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

3 2753
Q:

What are the core directives of AngularJS?

Answer

Following are the 3 core directives of AngularJS.



  1. ng-app : This directive defines and links an AngularJS application to HTML.

  2. ng-model : This directive binds the values of AngularJS application data to HTML input controls.

  3. ng-bind : This directive binds the AngularJS Application data to HTML tags.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

1 2751
Q:

What are different ways of Initiating Transaction in CICS?

Answer

The following are the ways of initiating a CICS transaction.


1. By entering Transaction Id


2. By Start command


3. By Return Trans Id (as in pseudo - conversation)


4. By Registering Tran ID in plt so that it will be automaticaly dusring CICS start


5. By ATI (Automatic task initiation)


6.PF & PA keys as defined in PCT

Report Error

View answer Workspace Report Error Discuss

0 2751
Q:

How do you eliminate duplicate values in DB2 SELECT?

Answer

Use SELECT DISTINCT ..... in DB2 query


 


The DISTINCT keyword can be used to return only distinct (different) values.


Syntax:


     SELECT DISTINCT column1,column2


      FROM table_name;


 

Report Error

View answer Workspace Report Error Discuss

0 2749
Q:

Which of the following are acceptable names of an ABAP program?

A. ZQSDABAP
B. YMYFIRSTABAPPROGRAM
C. Z”MyFirst ABAP PROGRAM
D. Z==FIRSTABAPPROGRAM
E. THISISMYFIRSTABAPPROGRAMME

Answer

Answer: A, B, E

The name of an ABAP program can be between 1 and 30 characters long.

The following symbols and signs must not be used in program names:
Period (.), comma (,), space ( ), parentheses (), apostrophe (‘), inverted commas ("), equals sign (=), asterisk
(*), accented characters or German umlauts (à, é, ø, ä, ß, and so on), percentage signs (%), or underscores (_).

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

0 2749
Q:

What is the difference between Cursor Stability and Repeatable Read isolation levels?

Answer

CURSOR STABILITY:


- CS is a row level locking


- Acquires an exclusive lock on the row that is to be updated


- When the control is moved to the next updatable row, the lock is released


REPEATABLE READ:


- RR is a page level locking


- Acquires an exclusive lock on the entire page which is the source of row availability


- When the control is moved to the next updatable page the lock is released

Report Error

View answer Workspace Report Error Discuss

0 2748
Q:

What is Interpreter in Java?

Answer

  • An Interpreter is a program that reads in as input a source program, along with data for the program, and translates the source program step by step.


 


The Java interpreter decodes each lines bytecode and runs a series of machine instructions for that bytecode. The JVM takes the byte code and generates machine code. The byte code is compiled to machine code, and the machine code is executed.

Report Error

View answer Workspace Report Error Discuss

7 2747
Q:

What is the difference between a Hub and a Switch?

Answer

Hub is device to connect two devices, switch is a network bridge which processes and routes data approirately over network layer of OSI Reference model

Report Error

View answer Workspace Report Error Discuss

0 2747