Technology Questions

Q:

What is the DNS forwarder?

Answer

DNS servers often must communicate with DNS servers outside of the local network. A forwarder is an entry that is used when a DNS server receives DNS queries that it cannot resolve locally. It then forwards those requests to external DNS servers for resolution.

Report Error

View answer Workspace Report Error Discuss

0 2138
Q:

How to call argument constructor?

Answer

new ClassName( arg1, arg2, .... argN);


Ex:


Class sample {


   Sample(int a) {


   System.out.println("arg con a =" +a);


   }


}


class Demo {


    Public static void main( String[] args) {


     Sample s1= new Sample(23);


     Sample s2= new Sample(45);


    }


}

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2138
Q:

Which of the following topologies has the highest reliability?

A) Mesh B) Ring
C) Bus D) Star
 
Answer & Explanation Answer: A) Mesh

Explanation:

In the mesh topology, each computer is connected to the other with a separate physical link in a network. It is most reliable topology as the network does not get down in case one of the nodes is failed.

Report Error

View Answer Report Error Discuss

1 2137
Q:

What is the difference between path and classpath?

Answer

Path contains path of .exe files(commands).


Classpath contains path of packages. packages can be stored in folder or .jar files

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2137
Q:

In a database table, the category of information is called

A) Record B) Field
C) Tuple D) None of the above
 
Answer & Explanation Answer: B) Field

Explanation:

In a database table, the category of information is called Field.

Report Error

View Answer Report Error Discuss

2 2135
Q:

What are the ways in which attackers can infiltrate the system?

Answer

- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred. 


- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker. 


- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.


- This also authenticates the user for accessing the system and the files on it containing the data. 


- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2130
Q:

What is local class?

Answer

Local class is class defined inside method


EX;


class A { // top level class


  public static void main(string[] args) {


   class B { // local class


   }


}


}

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2130
Q:

Explain how to create users through SQL PLUS.

Answer

We need to first login to the data base as: SQLPLUS followed by user_name/password. Then we need to execute the following query:


CREATE USER user_name IDENTIFIED BY abcd; in this query a user_name suggest the user that is created which has a password abcd which is required for login in database.

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2125