Technology Questions

Q:

Specify the CICS command used to read a VSAM record starting with prefix F. Code all the relevant options?

Answer

EXEC CICS READ


DATASET('FILENAME')


INTO(data-area)


RIDFLD(data-area)


KEYLENGTH(1)


GENERIC


LENGTH(WK-LEN)


END-EXEC.

Report Error

View answer Workspace Report Error Discuss

0 2247
Q:

What are the usages of the Command object in ADO.NET?

Answer

The following are the usages of the Command object in AD0.NET:

The Command object in AD0.NET executes a command against the database and retrieves a DataReader or DataSet object.

  =>  It also executes the INSERT, UPDATE, or DELETE command against the database.
  =>  All the command objects are derived from the DbCommand class.
  =>  The command object is represented by two classes: SqlCommand and OleDbCommand.
  =>  The Command object provides three methods to execute commands on the database:
  =>  The ExecuteNonQuery() method executes the commands and does not return any value.
  =>  The ExecuteScalar() method returns a single value from a database query.
  =>  The ExecuteReader() method returns a result set by using the DataReader object.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2245
Q:

Explain why workflows are based on Extensible Models.

Answer

Workflows serve the purpose of automating business processes. Now, since each type of business has a wide range of problems; therefore, a workflow platform needs to be extensible. WF provides you with a set of base activities, such as IfElse, Code, and Delay, to build a workflow. You can extend these activities or build new activities to meet your requirements. Besides activities, you can also extend services, such as tracking, management, and persistence, provided by the runtime engine.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2245
Q:

What is the meaning of ABAP editor integrated with ABAP data dictionary?

Answer

ABAP Editor: Tool in the ABAP Workbench in which you enter the source code of ABAP programs and check their syntax. You can also navigate from the ABAP Editor to the other tools in the ABAP Workbench.

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

0 2244
Q:

What is a synonym? What are its various types?

Answer

A synonym can be called as an alias for a table, view, sequence or program unit. It is basically of two types:
- Private - Only the owner can access it.
- Public - Can be accessed by any database user.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2244
Q:

What is unwrapping?

Answer

Unwrapping is also called as unpacking or unboxing.


Getting the private data stored in the object by using methods is called unpacking or unwrapping.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2243
Q:

What is Shallow and deep cloning in Java?

Answer

Cloning refers to creating duplicate copies of objects in java.


Shallow Cloning: Shallow cloning is a bitwise copy of an object. New object is created which is an exact copy that of the original one. In case any objects are referring the fields of these objects, just the references are copied.


Deep Cloning: In deep cloning, complete duplicate copy of the original copy is created. Deep cloning creates not only the primitive values of the original objects but also copies all its sub objects as well.


Clonable interface is used to perform cloning in java.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2240
Q:

How does Microsoft classify security threats to its software?

Answer

Microsoft classifies such threats into 4 indicators, which are low, moderate, important, and critical. Such indicators are available as reference under the Microsoft bulletin.

Report Error

View answer Workspace Report Error Discuss

0 2239