Technology Questions

Q:

Differentiate different types of Doctypes from one another.

Answer

Doctype helps the web browser to correctly render the web pages. There are different types of Doctype that are available and they are as follows:


=> Strict Doctype: it consists of all the HTML elements and it is also known as DTD (Document type definition) but it doesn't include the presentational and deprecated elements i.e. font, center, etc. Framesets related elements are also not allowed in this. For example:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"


"https://www.w3.org/TR/html4/strict.dtd">


=> Transitional Doctype: it consists of all the HTML elements and attributes. It is also known as DTD (Document type definition). It includes the presentational and deprecated elements i.e. font, center, etc. Framesets related elements are also not allowed in this. For example:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"https://www.w3.org/TR/html4/loose.dtd">


=> Frameset Doctype: it consists of all the HTML elements and attributes. It is also known as DTD (Document type definition). It includes the presentational and deprecated elements i.e. font, center, etc. Framesets related elements are also allowed in this. For example:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN"


"https://www.w3.org/TR/html4/frameset.dtd">

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2321
Q:

What is COPY PENDING status?

Answer

- A status occurs when image copy on a table needs to be taken


- The table is available only for queries and can not be updated


- COPY PENDING status can be removed by taking away the image copy or by using REPAIR utility

Report Error

View answer Workspace Report Error Discuss

0 2321
Q:

Describe Use Case Testing.

Answer

Use Case: A use case is a description of the process which is performed by the end user for a particular task. Use case contains a sequence of step which is performed by the end user to complete a specific task or a step by step process that describe how the application and end user interact with each other. Use case is written by the user point of view.


Use case Testing: the use case testing uses this use case to evaluate the application. So that, the tester can examines all the functionalities of the application. Use case testing cover whole application, tester performs this testing in step by step process to complete one task

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2320
Q:

What is difference between MyISAM and InnoDB storage engines in mysql.

Answer

1 : InnoDB provides us row level locking while MyISAM provides us table level locking.

2 : InnoDB offers foreign key constraints wheres in MyISAM does not have foreign key constraints.

3 : InnoDB does not have full text search wheres MyISAM provides us full text search.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2317
Q:

Explain marquee tag.

Answer

Marquee tag: Marquee tag is used when we want that some text or content move in the web page whether horizontally or vertically. 


Syntax of Marquee tag: <marquee>content you want to move</marquee>


Attribute of Marquee tag are: bgcolor, direction, height, width, vspace etc.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2316
Q:

What is the Fail-safe approach?

Answer

- Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed.


- The fail safe approach doesn’t allow an attacker to take the advantage by breaking in the system and crashes out.


- This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack. 


- The system in attacks doesn’t skip the access to the control check or it doesn’t skip serving any document requested. 


- Fail safe approach can force the web server to run of the memory and have a DoS attack.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2315
Q:

What are transaction isolation levels supported by Oracle?

Answer

Oracle supports 3 transaction isolation levels: 


- Read committed (default)


- Serializable transactions


- Read only

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

1 2315
Q:

How can you configure Wi-Fi network and what are Wi-Fi Protocols?

Answer

Basically there are many standards of Wi-Fi in the industry but some popular of them are 802.11a, 802.11b, 802.11g/n. With the support of these Wi-Fi protocols we can communicate/interact among the devices at the speed of 5Ghz to 2.4Ghz dual band communication.

If we have Wi-Fi nic card so firstly we have to install their drivers and after installation if we have Wi-Fi access point then we can see the signal strength in the right corner below just open that and find the access point to connect, if access point is configured with the security, type the key to connect and enjoy the service.

Wi-Fi is technically referred to as the 802.11 protocol. Over time, Wi-Fi has improved, giving rise to different variations of the protocol.

802.11a – This version operates at 54Mbps. It is considered as the favorite wireless LAN protocol for IP telephony.

Report Error

View answer Workspace Report Error Discuss

0 2313