Interview Questions

Q:

Write a program to fix the error being produced by the Infinite file?

Answer

- The infinite file error can be solved when the data will be read continuously from the file. 


- The error can be solved by using the keys that provide only the resources that are required. 


- The following program is as follows:


osw.write ("HTTP/1.0 200 OK\n\n"); 


while (c != -1) { 


sb.append((char)c); 


c = fr.read(); 



osw.write (sb.toString()); 


- This converts the requested file in such a way that if the file exists it shows the messages as ok otherwise it shows an error.


- Limited file access is to be given to the file to remove the error from the infinite file type.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2015
Q:

How does traffic measured in hosting platform?

Answer

- The traffic can be measured using the size of the files that are transferred from one place to another (server-client). 


- It can also be measured by the size of the file that is being requested by the client from the server. 


- The number of visitors arriving on the website also involve in the measurement of the traffic using the web hosting platform. 


- The advertisements of the sites take more bandwidth to allow more number of users to be on the website. 


- More number of users provides higher traffic on the website thus it requires more bandwidth on the web hosting sites.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2015
Q:

How can you have different number of cells for each row of a table?

Answer

By setting the columnSpan property for cells of each row as required.

Report Error

View answer Workspace Report Error Discuss

0 2014
Q:

What is JAR file? what are the main uses of JAR files?

Answer

JAR files are java's version of ZIP files. In fact, JAR uses the ZIP file format.


uses:


- to compress a number of . class files into one file


- to make a java executable JAR file.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2014
Q:

What is the security mechanism used in java?

Answer

Java uses sand box security model.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2013
Q:

What is different among String, StringBuffer, StringBuilder?

Answer

String class objects are immutable objects and they represents strings( sequence of characters)


StringBuffer class objects are mutable objects representing strings and they are Thread safe


StringBuild class objects are also mutable objects representing strings and they are not Thread safe

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2012
Q:

What are Cursors? Explain Types of cursors in PL/SQL

Answer

Cursors help you manipulate the information retrieved by select statements. This can be done by assigning a name to the cursor.


Example:


CURSOR emp_cur 


IS 


SELECT emp_number from employee_tbl where employee_name = name_in;


Types of Cursors:


Implicit cursors- These cursors are not declared by the programmer. They are issued when the SQL statement is executed. The open, close and fetching is done by itself.


Example:


UPDATE employee SET salary = salary * 2.1;


Here, an implicit cursor is issued to identify the set of rows in the table which would be affected by the update.


 


Explicit cursors- These cursors are defined by programmer. They are used in queries that return multiple rows.


Example:


CURSOR emp_cur 


IS 


SELECT emp_number from employee_tbl where employee_name = name_in;

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

1 2012
Q:

Each of the following is a sleep disorder except

A) REM rebound B) Narcolepsy
C) Night terrors D) Insomnia
 
Answer & Explanation Answer: A) REM rebound

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Medical Interview

3 2011