Technology Questions

Q:

In a single virtual machine, the Java programming language passes arguments by

A) Refference B) Value
C) Both A and B D) None
 
Answer & Explanation Answer: B) Value

Explanation:

In single virtual machine,JVM passes arguments only by value.

Report Error

View Answer Report Error Discuss

Filed Under: Java

0 2320
Q:

What is the difference between creating String as new() and literal ?

Answer

When we create string with new() Operator, it’s created in heap and not added into string pool while String created using literal are created in String pool itself which exists in PermGen area of heap.



String s = new String("Test");

does not put the object in String pool , we need to call String.intern() method which is used to put them into String pool explicitly. its only when you create String object as String literal e.g. String s = "Test" Java automatically put that into String pool.

Report Error

View answer Workspace Report Error Discuss

1 2319
Q:

What is the purpose of web browser?

Answer

- Web browser is used to run the software application that allows retrieving, presenting and traversing the information from one place to another. 


- Web browser provides the resources using the WWW (World Wide Web) this can be identified by URI (Uniform Resource Identifier).


- Web browser fetches the data like web page, image, video or other piece of content from the server and displays it accordingly. 


- Web browser uses hyperlinks to display the resources and allow the users to navigate their browsers according to the resources. 


- Web browser defines the application software that is designed for the user to access and retrieve the documents using the Internet.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2318
Q:

List the advantages of inheritance

Answer

- Inheritence permits code reusability. 


- Reusability saves time in program development. 


- It encourages the reuse of proven and debugged high-quality software which reduces the problems after a system becomes functional.

Report Error

View answer Workspace Report Error Discuss

Subject: C++

0 2318
Q:

What is Constructors and Destructors?

Answer

CONSTRUCTOR : PHP allows developers to declare constructor methods for classes. Classes which have a constructor method call this method on each newly-created object, so it is suitable for any initialization that the object may need before it is used.

DESTRUCTORS : PHP 5 introduces a destructor concept similar to that of other object-oriented languages, such as C++. The destructor method will be called as soon as all references to a particular object are removed or when the object is explicitly destroyed or in any order in shutdown sequence.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2318
Q:

What are the prime responsibilities of Data Integration Administrator?

Answer

- Scheduling and executing the batch jobs.


- Configuring, starting and stopping the real-time services


- Adapters configuration and managing them.


- Repository usage, Job Server configuration.


- Access Server configuration.


- Batch job publishing.


- Real-time services publishing through web services.

Report Error

View answer Workspace Report Error Discuss

0 2317
Q:

Name some of the common tables in CICS and their usage?

Answer

PCT (Program Control Table) - Defines each transaction containing a list of valid transaction identifiers (transid) where each transaction is paired with its matching program.


PPT (Program Processing Table) - Contains a list of valid program names and maps and whether a current version is in the CICS region or needs to be brought in as a new copy.


FCT (File Control Table) - Contains a list of files known to CICS, the dataset name and status (closed/open, enable/disabled)


TCT (Terminal Control Table)- A list of the terminals known to CICS.

Report Error

View answer Workspace Report Error Discuss

0 2316
Q:

Can a class be declared as protected?

Answer A class can't be declared as protected. only methods can be declared as protected.
Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2316