Technology Questions

Q:

Explain why workflows are based on Extensible Models.

Answer

Workflows serve the purpose of automating business processes. Now, since each type of business has a wide range of problems; therefore, a workflow platform needs to be extensible. WF provides you with a set of base activities, such as IfElse, Code, and Delay, to build a workflow. You can extend these activities or build new activities to meet your requirements. Besides activities, you can also extend services, such as tracking, management, and persistence, provided by the runtime engine.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2265
Q:

What are new Media Elements in HTML5?

Answer

Following are the New Media Elements are present in HTML5:


<audio> tag: for playing audio.


<video> tag: for playing video.


<source> tag: For media resources for media elements.


<embed> tag: For embedded content


<track> tag: For text tracks used in media players

Report Error

View answer Workspace Report Error Discuss

3 2265
Q:

How does Microsoft classify security threats to its software?

Answer

Microsoft classifies such threats into 4 indicators, which are low, moderate, important, and critical. Such indicators are available as reference under the Microsoft bulletin.

Report Error

View answer Workspace Report Error Discuss

0 2264
Q:

What is a synonym? What are its various types?

Answer

A synonym can be called as an alias for a table, view, sequence or program unit. It is basically of two types:
- Private - Only the owner can access it.
- Public - Can be accessed by any database user.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2263
Q:

What is unwrapping?

Answer

Unwrapping is also called as unpacking or unboxing.


Getting the private data stored in the object by using methods is called unpacking or unwrapping.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2262
Q:

What is Shallow and deep cloning in Java?

Answer

Cloning refers to creating duplicate copies of objects in java.


Shallow Cloning: Shallow cloning is a bitwise copy of an object. New object is created which is an exact copy that of the original one. In case any objects are referring the fields of these objects, just the references are copied.


Deep Cloning: In deep cloning, complete duplicate copy of the original copy is created. Deep cloning creates not only the primitive values of the original objects but also copies all its sub objects as well.


Clonable interface is used to perform cloning in java.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2261
Q:

What are the different JDBC drivers available ?

Answer

There are mainly four type of JDBC drivers available. They are:

Type 1 : JDBC-ODBC Bridge Driver - A JDBC-ODBC bridge provides JDBC API access via one or more ODBC drivers. Note that some ODBC native code and in many cases native database client code must be loaded on each client machine that uses this type of driver. Hence, this kind of driver is generally most appropriate when automatic installation and downloading of a Java technology application is not important. For information on the JDBC-ODBC bridge driver provided by Sun.

Type 2: Native API Partly Java Driver- A native-API partly Java technology-enabled driver converts JDBC calls into calls on the client API for Oracle, Sybase, Informix, DB2, or other DBMS. Note that, like the bridge driver, this style of driver requires that some binary code be loaded on each client machine.

Type 3: Network protocol Driver- A net-protocol fully Java technology-enabled driver translates JDBC API calls into a DBMS-independent net protocol which is then translated to a DBMS protocol by a server. This net server middleware is able to connect all of its Java technology-based clients to many different databases. The specific protocol used depends on the vendor. In general, this is the most flexible JDBC API alternative. It is likely that all vendors of this solution will provide products suitable for Intranet use. In order for these products to also support Internet access they must handle the additional requirements for security, access through firewalls, etc., that the Web imposes. Several vendors are adding JDBC technology-based drivers to their existing database middleware products.

Type 4: JDBC Net pure Java Driver - A native-protocol fully Java technology-enabled driver converts JDBC technology calls into the network protocol used by DBMSs directly. This allows a direct call from the client machine to the DBMS server and is a practical solution for Intranet access. Since many of these protocols are proprietary the database vendors themselves will be the primary source for this style of driver. Several database vendors have these in progress.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2256
Q:

How do you change the session time-out value?

Answer

The session time-out value is specified in the web.config file within sessionstate element.You can change the session time-out setting by changing value of timeout attribute of sessionstate element in web.config file.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET
Job Role: Software Architect

0 2255