Technology Questions

Q:

What is the differnce among public, protected and package access data?

Answer

If we are not using packages and if we are not using inheritance then there is no difference among public, protected and package access data.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 1998
Q:

What is FDM?

Answer

FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted.

Report Error

View answer Workspace Report Error Discuss

0 1997
Q:

Explain how to limit the rows that are retrieved by a query.

Answer

The number of rows returned by a select query can be restricted by the LIMIT clause.
Example:
SELECT * from employee
LIMIT 20

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 1996
Q:

What are some of the common tools that a business Analyst uses?

Answer

The common tools that can be used by a business analyst are MS Visio, MS word, MS Excel, Power point, Quality center/test director MS Project. There may be tools that are client specific also, but these will be supplied the client. 

Report Error

View answer Workspace Report Error Discuss

0 1993
Q:

How to set breakpoints?

Answer

Setting up the break points:



  1.  Go to the line where you need to mark the breakpoint.

  2.  Click with mouse on left corner margin of that line.

  3.  Another way is to press F9

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 1992
Q:

What does cache and no cache options mean while creating a sequence?

Answer

The CACHE option means how many sequences will be stored in memory for access by the application objects. The performance is faster. However in case of the database is down the data is memory is lost for the sequence.


The NO CACHE option means values are not stored in memory. So there might be some performance issue. 

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 1992
Q:

How many interactive reports did you write?

Answer

In an Interactive Report, user can define maximum 20 secondary lists.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP

0 1991
Q:

What are the different types of system calls?

Answer

The main types of system calls are as follows:


Process Control: These types of system calls are used to control the processes. Some examples are end, abort, load, execute, create process, terminate process etc.


File Management: These types of system calls are used to manage files. Some examples are Create file, delete file, open, close, read, write etc.


Device Management: These types of system calls are used to manage devices. Some examples are Request device, release device, read, write, get device attributes etc.


Information Maintenance: These types of system calls are used to set system data and get process information. Some examples are time, OS parameters, id, time used etc.


Communications: These types of system calls are used to establish a connection. Some examples are send message, received messages, terminate etc

Report Error

View answer Workspace Report Error Discuss

0 1991