Technology Questions

Q:

What are the usages of the Command object in ADO.NET?

Answer

The following are the usages of the Command object in AD0.NET:

The Command object in AD0.NET executes a command against the database and retrieves a DataReader or DataSet object.

  =>  It also executes the INSERT, UPDATE, or DELETE command against the database.
  =>  All the command objects are derived from the DbCommand class.
  =>  The command object is represented by two classes: SqlCommand and OleDbCommand.
  =>  The Command object provides three methods to execute commands on the database:
  =>  The ExecuteNonQuery() method executes the commands and does not return any value.
  =>  The ExecuteScalar() method returns a single value from a database query.
  =>  The ExecuteReader() method returns a result set by using the DataReader object.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2122
Q:

Explain why workflows are based on Extensible Models.

Answer

Workflows serve the purpose of automating business processes. Now, since each type of business has a wide range of problems; therefore, a workflow platform needs to be extensible. WF provides you with a set of base activities, such as IfElse, Code, and Delay, to build a workflow. You can extend these activities or build new activities to meet your requirements. Besides activities, you can also extend services, such as tracking, management, and persistence, provided by the runtime engine.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2122
Q:

Explain the difference between value types and reference types

Answer

Value type :


 



  • Stores the data

  • The value of value types is stored on the managed stack

  • They are lighter objects 

  • One variable can have only one value


Reference Type :



  • Stores the reference to the data

  • A reference type is allocated on the heap

  • They are heavier objects

  • Several variables can reference the same data


 

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2121
Q:

How does an application run in isolation from other applications?

Answer

Each application gets its own Linux user ID and virtual machine which means that the application code runs in isolation from other applications.

Report Error

View answer Workspace Report Error Discuss

0 2121
Q:

Explain the changing file permission and ownership using PHP's chmod() function.

Answer

Chmod() is used for changing permissions on a file.


Syntax:


Chmod(file, mode)


Mode here specifies the permissions as follows:


The first number is always zero


The second number specifies permissions for the owner


The third number specifies permissions for the owner's user group


The fourth number specifies permissions for everybody else


Possible values (to set multiple permissions, add up the following numbers)


1 = execute permissions


2 = write permissions


4 = read permissions


Example:


// everything for owner, read for owner's group


chmod("test.txt",0740);

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2120
Q:

What is a PeopleSoft database?

Answer

Peoplesoft Database is similar to other database which is used to store data. Peoplesoft database stores data in a table format for system PeopleTools and Application tables. This is independent of the process you use to retrieve that data from PeopleSoft. Inside PeopleSoft database, only three types of tables reside inside the schema: System Catalog tables, PeopleTools tables, and Application data tables. Two of these table types, System Catalog and PeopleTools tables, can be referred to as metadata tables; users make use of Application data tables to store the data they need for their processes.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2114
Q:

What does a VLAN do?

A) Breaks up broadcast domains in a layer 2 switch internetwork B) Provides multiple broadcast domains within a single collision domain
C) Provides multiple collision domains on one switch port D) Acts as the fastest port to all servers
 
Answer & Explanation Answer: A) Breaks up broadcast domains in a layer 2 switch internetwork

Explanation:

virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). LAN is the abbreviation for local area network and in this context, virtual refers to a physical object recreated and altered by additional logic.

VLANs work by applying tags to network packets and handling these tags in networking systems – creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

Report Error

View Answer Report Error Discuss

0 2113
Q:

Specify the CICS command used to read a VSAM record starting with prefix F. Code all the relevant options?

Answer

EXEC CICS READ


DATASET('FILENAME')


INTO(data-area)


RIDFLD(data-area)


KEYLENGTH(1)


GENERIC


LENGTH(WK-LEN)


END-EXEC.

Report Error

View answer Workspace Report Error Discuss

0 2110