1. Explain what is port? what is HTTP port, FTP port, Telnet port and others?

ports are like different gates of the building. Each gate is having its own function.

HTTP Port .... it will allow only HTTP people... It communicates in HTTP protocol.. any request with http:// .... HTTP.. is Hyper Text Transfer Protocol

FTP Port : File Transfer Protocol.... used to upload and download files..... used to update websites from the local machine... it requires FTP host name, username and password.. and on the host machine FTP services should be enabled.

Telnet port: telenetting with other computer in hybrid environment... from thin client to server..

2. Explain how Search engines work?

Indexing. Searching. Web search engines work by storing information about many web pages, which they retrieve from the HTML markup of the pages. These pages are retrieved by a Web crawler (sometimes also known as a spider) - an automated Web crawler which follows every link on the site.

3. What is the client business process in electronic industry (in mySAP CRM)?

Can any one say how to see how many Business Partners (External List Management) I have created in last week or so. I want to see specific details like date, time and number of Business Partners i have created in past.

4. How to remove a column from table?

You can remove a column but first of all you should see that column doest have any values and it should not be a primary key

ALTER TABLE DROP COLUMN

5. Tell me what is the difference between Client response time and Server response time?

The major difference between the response time between a client & server is of - response time.
Usually client response time is lesser in comparison to the server response time.

6. Tell me what are things that a Business Analyst needs to consider while doing production support?

Please share your views.

7. Which technology is better for a real time financial application?

My application scenario is to get data from various servers across the network and display that data in segregated format using a very user friendly GUI.

The application is a financial application of real time importance.

Please if any one can give their inputs on which technology will be better for developing this application (JAVA or .NET).

The application should give:
- high performance (less turn-around time or faster output
- Less Memory Requirements

8. Explain in type2 dimension/flag current mapping there are three data flows i.e
1. data flow for new rows
2 .data flow for changed row
3. data flow for updated changed row
whats the difference between last two data flow?

When we are working with FLAG we can use only 2 filter transformations
also but at the initial stage it will be better to go with 3 filters. Where we
are using the FIRST Filter to insert the records for first
time, In second Filter we are inserting the records but these records are with
updated information and in third filter we are updating the records with
surrogate key. This third filter records will be updated with our changed
FLAG value 'ZERO'. Because we are identifying the current records with FLAG
values 'ONE'.

9. Explain the term "non volatile memory" states?

1. that memory is retained in the memory unit for some time even
after power failure to the memory unit
2. that memory is lost by power failure but regained as soon as
power is restored
3. that memory is retained in the memory unit at higher temperature
4. that memory is retained in the memory unit for years after power
failure to the memory unit

10. What is the main difference between portability and Platform independent?

I agree it is correct to say that Java is platform independent, but it is due to the Java Virtual Machine. Java programs are only intermediately compiled, which allows adaptation to the given environment it needs to run in later.

An example of a portability issue is the creation of Unix. The first version was not portable. It was specific only to that computer's architecture. Unix became portable when it was rewritten in C. The new version written in C was portable because C served as a "translator", if you will, between what underlying architecture or devices were physically in the computer and what unix wanted them to do.

Download Interview PDF

11. How to count number of HTML pages in a website

you can write a simple ASP program to run against the root directory of the website. Here are some links which can help you in that direction

http://www.microsoft.com/technet/scriptcenter/resources/qanda/sept06/hey0907.mspx

12. Explain how do we solve conflict scenario with business clients? explain?

I would like to slightly repharce this quesion as, How can we handle indifference of opinion in the requirements?

Usually when we interact with the client as a representative of our organnization, one important this we need to follow is setting the right expectation even before we start gathering the requirements. When i say setting the right expectations, it means, making the client aware of your organizatations resource availability, technology areas, domain expertise, able to handle changes,etc.

And as the saying goes, "Talk to Resolve" most of the clients are open to discssion in the current industry trend, so sit and negotiate with your client and make him understand your organization capabilites.

The other way of resolving confilt is, implementing a strong change management process with in the software development life cycle.

As your question was very subjective, i could answer you at an 10,000 ft level. If you have any further questions,please let us share and discuss.

13. How do u go about gathering the requirements?

Requirement gathering is an art rather than a science. First it depends upon at what level you are talking about. Generally speaking, requirements gathering follows Top-Down Approach. It also depends upon your level in the SDLC cycle. There are different ways of gathering requirements. Generally accepted methods are:
1. Intereviewing Techniques.
2. Case Study methods.
3. Joint Application Development Method.
4. Application Explorer method.
5. Brain Stroming approach,etc.

There are also different tools used for requirement gathering like, UML, Rational Rose, Microsoft Visio, Recruitment Matrix,etc.

14. Suppose if GET method is less secure than POST method then why they introduced GET method.and well use only POST method alone. Wats the need for GET here?

Using GET method form data is appended to URL while using POST method it is transferred in the message body.
GET method is intended for information retrieval. It should be used to retrieve information that do not change state of server.
For functions such as login, POST method is preferable due to security reasons.

15. How do i put a background on a website using css coding?

If you want to put background color you can use background-color property of CSS in body tag
If you want to put background image you can use background-image property of CSS in body tag

16. When the variables are pushed into the stack, which method is used to retrieve them from it?

A. pop
B. pull
C. remove
D. none of these.

A.pop method is used for retrieving variables from stack

17. Explain what is the difference between cognos reportnet 1.1 and 1.1mr1,mr2.
what is the latest version cognos reportnet?

MR stands for maintenance release it is like the project version no in a company that u follow,and latest version in cognos is 8

18. Suppose I want to change the way my operating system looks I am having windows XP can i change the Caption of the START menu with my name?

Please share your views.

19. Explain what are similarities between c and c++?

Please share your answers.

20. Can you say the difference between the application working in c and .net with regard to operating system?

Please share your answers.

21. I have got Abi installed on my local comp, i know that GDE goes to co>op through the repository.

i want to use the repository to chicken and checkout.
any steps to connect from GDE to repository will be greatly appreciated?

We can connect GDE to EME(Repository) inorder to have checkin and checkout.A file with extension .aip will give sufficeient infto connect to EME

22. How is the Mainframe now?

Please share your views.

23. Explain what are the data trap and reporting trap also cardinality?

Please share your views.

24. Where can we find information about IEBGENDER?

Please share your views.

25. How to write a library function to import tabbed data from a text file into data table? Can someone please give the vb-script function?

Please share your experience.

Download Interview PDF

26. Explain difference between Conditions and Filter in a Designer?

Please share your experience.

27. Tell me what is canned and dashboard report? How many types of reports r there? Whats the difference between canned and dashboard report?

Please share your experience.

28. Can you pl list the reporting tools used in data warehouse?

Please share your views.

29. I want to run UNIX script from windows batch file that will connect automatically to UNIX with username and password. Can anybody help me how I can write the script file?

If you are looking at connecting to a *nix machine from windows then you can very well use a windows batch file. The latest windows scripting package provides pretty powerful tools similar to *nix scripting.Or you can try installing Cygwin which will provide the windows port of *nix tools that are usually used in *nix scripts.But if you are running it from windows then the best one would be to write a windows batch file.

30. What is swapping?

Swapping is to chance the value to each other in c++#include#includevoid main(){Int a,b;cout<<"Enter the value of a ::::"<>a;cout<<"Enter the value of b ::::"<>b;a=a+b;b=a-b;a=a-b;cout<

31. Tell me how to establish the connection from BO 6.5 supervisor to MSSQLServer 2000?

Please share your answers.

32. Suppose I want to use a Ms c++ version 1.0 dll component at my java Application project and I dont know that it is possible or not ? and Is it Necessary that I change my C component dll according to that my java application can run in every OS like Linux?

Please share your answers.

33. What is paging?

Pageing is a memory Management technique which allows users program memory to be non continus, the technique is used to remove the problem of external fragmentation.In this technique entire user Memory is divided into fixed size page frames, a Page Map table is used to map the user process pages to physical memory page.

34. What is forking technique and How it can be used in the Win32?

Please share your answers.

35. Explain can you deploy Mercury QuickTest Professional on Mercury Managed Service?

Yes. Mercury Managed Services can provide you the benefits of fast time to value, on-going mentoring and lower total cost of ownership for Mercury QuickTest Professional as long as you are also utilizing Mercury Managed Services for Quality Center.

36. Tell me what is the scope of Information Technology?

The scope of the information technology will be live forever, bcaz, there is a need for air to live , v need a automation to servive so IT is forever no probs. I think so...

37. Explain what are dangling pointers,virtual constructors and virtual destructors?

char *str=new str;char *str1=new str1;strcpy(str,str1);delete str;at this time str will act as dangling pointer because when str1 is copied to str ,then it will create the deep copy,so when when we will delete that one then still thare is existing of its instance.That is called dangling pointer

38. What is data modelling?

Data Modelling is designing of the data content and structure of the database.

The data model documents the structure of and interrelationships between the data - it is presented as a combination of simple diagrams and written definitions and is independent of any DBMS software or hardware considerations.

39. What are the various cause & effect signals of the 8085 microprocessor?

interrupts

40. Can you explain about Parallel Extender (PX)?

Please share your answers.

Download Interview PDF

41. How java soft implemented vector as synchronized?

Please share your answers.

42. Explain how to get the prime number rows from table i.e. like
1,3,5,7,11?

There is no specific formula to find prime numbers.

43. Explain virtual function?

virtual functions are the functions by which we can implement the concept of polymorphism ,ie one name with several distinct forms.a f'n preceded by a virtual keyword makes a function virtual means the compiler turns on the mechanism to perform late binding or dynamic binding.more of all,the same function name can be used to perform different tasks .

44. Tell me what is the difference between connecting to RDBMS using ODBC and native drivers?

ODBC is an open standard for software providers to follow when creating an intermidate layer between the database and the application using the database. Having "open standards" usually means that different applications can write their code the same way no matter which database they are using, as long as that database comes with an ODBC driver.In contrast, native drivers are built with one specific database in mind. Thus, applications written to use the native driver will only work with one particular database. You will lose flexibility in your code's ability to switch database vendors, but you might gain performance enhancements due to the fact that the driver is custom made for the database and may be able to take advantage of an "insider's view" of the database software.

45. Computer Programming Conceptual Interview Questions:

Does Data warehouse have to be a relational database?

Are Data warehouse queries ‘unpredictable'?

Why would Data warehouse have ‘few concurrent users'?

What is the maximum number of concurrent users, have you dealt with in a real life OLTP system?

You have mentioned one way of dealing with slowly changing dimensions. Are they any other ways?

Consider common dimensions – Customer, Product, Time etc. Think about how could they change with time?

Are Cognos Finance and Cognos Consolidation Data warehouse products?

What is Cognos Contributor?

What are the popular products used for Forecasting?

Name different analytical analysis that may be done in Finance Domain.

What is GAAP?

How does SOX act impact Finance and Accounting Function?

What are other major US Compliance acts? Which industries do they apply to?

What are major ways to improve performance of an application?

What are the issues arise when u have a table having large volume of insert/modify transactions? How to solve them?

What is Archiving and Purging? Why is it important?

How to make Transactions and Reporting co-exist in an OLTP Application?

What kind of Query Optimizer does Oracle 10g use? What was used in earlier versions?

What is Explain Plan command? What is its use?

What are the common precautions you take to ensure acceptable performance of a web java application?

46. Tell me what are Application Clusters in CRM?

CRM application cluster is a software that ranges in size and complexity making it possible for an organization to select the type of software needed the most. It consists of how a customer is related to sales,marketing and fulfillment,customer service and support,retention and loyalty program and contact and account management.

47. What kind of useful task does stacks support?

Stack supports four major computing areas,they are 1.expression evaluation 2.subroutine return address storage 3.dynamically allocated local variable storage and 4.subroutine parameter passing.

48. Planning to start a career as a manual tester ,is taking a course compulsory or can I get the subject by referring through information on internet?,Does manual testers use any tools in real time

Not necessary that you have to take any course provided if you are not fresher. Suppose if you are working in any company as design engineer, then as you have the domain knowledge working as end user. Then you can definitely use this knowledge to test the software and find bugs. And regarding processes and tools used every company has different strategy which can be managed or learn once you get into that company.

49. The basic elements of a picture in volume graphics
is

1. pixel
2. volsel
3. voxel
4. either pixel or voxel

The basic elements of a picture in volume graphics is voxel.

50. What is the part of compiler that keeps track of names and their attributes?
A) Compile Table
B) Symbol Table
C) Table
D) Logical Table

symbol table

51. Define raster and vector data. Explain what is the difference between raster and vector data?

Raster data is a set of horizontal lines composed of individual pixels, used to form an image on a CRT or other screen.Raster data makes use of matrix of square areas to define where features are located. These squares are typically of uniform size, and their size determines the detail that can be maintained in the dataset.Raster data represent square areas, they describe interiors rather than boundaries. Vector data use X and Y coordinates to define the locations of points, lines, and areas (polygons) that correspond to map features, vector data tend to define centers and edges of features.They are excellent for capturing and storing spatial details

52. A Two-dimensional array X (7,9) is stored linearly column-wise in a computers memory. Each element requires 8 bytes for storage of the value. If the first byte address of X (1,1) is 3000, what would be the last byte address of X (2,3)?

use the formulae

X(i,j)=Base+w[n(i-1)+(j-1)]

where m=7 ,n =9 ,i=2 ,j=3

hence 3000+8*[9(2-1)+(3-1)]

=3000+8*(9+2)

=3000+8*11=3088

53. What is the basic difference between Iterative and Spiral testing?

Please share your answers.

54. In LoadRunner, Controller is installed on one machine and Load generator is installed on another machine, how load controller is connected to Load generator?

Please share your views.

55. How do you divide the test cases suite based on the component or functionality?

Please share your answers.

Download Interview PDF

56. How to test 1000 test cases manually in all the browsers and in different version of the browsers?

Please share your experience.

57. What is meant by inspection and who will lead the inspection and roles involved in Inspection?

Review if more formal than walkthrough .Walkthrough is done with a purpose of gain understanding of system and learning.

58. What is the Dif between Review and Walkthrough? On Testing Perspective ,who will do review and walkthrough? Clarify with an real example?

In laymans term walk-through is nothing but running thru the requirements while review is making an analysis of the progress and if the case may be a change has to be recommended

59. Tell me how to execute 13,000 test cases in a faster way in manual testing?

Cannot execute 13,000 FTS faster. First need to analyse the severity and priority of the functionality wise and then the selected test alone have to execute

60. Write a C program to reverse the string without using strrev() function?

#include <stdio.h>
#include <conio.h>
#include <string.h>

void main()
{
char *str;
int i,len;

//not using any temp variable and assume we can use only string array and length

printf("Enter String : ");
scanf("%s",str);
len=strlen(str)-1;
for(i=0;i<strlen(str)/2;i++)
{
str[i]+=str[len];
str[len]=str[i]-str[len];
str[i]=str[i]-str[len--];
}
printf("Reverse String is : %s",str);
getch();
}

61. Explain difference between computer architecture, structure, and organization?

Please share your experience.

62. Tell me can we execute any simple program without installing any Operating system?

No! we can not run any simple program with out using any interface such as operatin systen or System software. but in some cases like Machine level languge or firmware run without any software because it directlly communicate with hardware and makes the hardware active so other program can run using his platform.

63. Explain what is actually meant for BUFFER? how does it work?

Buffer is something that is used to hold the data temporarly.
Ex-
If we are watching any thing online,then buffering of data takes place i.e for sometime data get stored in buffer then processed.

64. A function is running, it has its own stack pointer, memory area now it invokes another function from this point what changes will be in its memory area and what other changes in data segment, stack segment, heap segment. I want a complete picture of memory architecture?

There will be a lot of changes in fact. First of all, all the variables the function was suing needs to be pushed into the stack. (we need all these variables when we return from the other function). The Program counter will be pushed to stack too... (When the "return" of second function occurs we should know where to 'return' to)These are the basics which are bound to happen when a function calls another.

65. Explain how to write a class in c++ using only one object?

class singleten{ static int count; singleten() { if (count==1) { exit(0); } count++; }}singleten::count =0;void main(){singleten s1;singleten s2;}program is terminated as soon as second object is created.

66. How to remove sections in report in reportnet?

Remove Sections

To remove a section, do the following:

Steps

1. Delete the section header.

2. From the View menu, click Page Structure.

3. Expand Page Body until you see the data container in which you added the section.

The data container is nested in the List object that is created when you add a section.

4. Drag the data container to Page Body.

The data container appears as a node of Page Body.

5. Delete the List object.

In the Query Explorer, the query that is created when you add a section is also deleted.

6. From the View menu, click Page Design.

7. In the Insertable Objects pane, click the Query Items tab.

8. Drag the query item that was used as a section header back into the data container.

67. What is virtual Memory under Linux?

Linux supports virtual memory, that is, using a disk as an extension of RAM so that the effective size of usable memory grows correspondingly. The kernel will write the contents of a currently unused block of memory to the hard disk so that the memory can be used for another purpose. When the original contents are needed again, they are read back into memory. This is all made completely transparent to the user; programs running under Linux only see the larger amount of memory available and don't notice that parts of them reside on the disk from time to time. Of course, reading and writing the hard disk is slower (on the order of a thousand times slower) than using real memory, so the programs don't run as fast. The part of the hard disk that is used as virtual memory is called the swap space

68. Explain what are the differences between Desktop and Enterprise Application?

Desktop application runs on a single machine. It could be a part of network. But Application and database resides on same machine. And only one user can access it at a time.Enterprise application is generally a multi-tier application. Many a concurrent users can access data and application at a time.

69. Tell me how can we check out the files from cvs?

In GUI mode i.e winCVS, On menubar,there is checkout option.In that u can click and select the module that you want to check out.

In UNIX mode,you have to execute the following comand

>CVS checkout -r

70. Explain what is the OSI Model?

OSI is Open System Interface Model. It is a concept which is used to make data transfer in steps. There are 7 layers and each layer interact with its counterpart. earlier a product made by any abc co was able to communicate with the same company product. to communicate with different co's products it was created. as it's name shows "OPEN System Interface"

Download Interview PDF

71. How to Hide a text in Cognos Reportnet?

yes, we can hide by 2 possible options. 1. make the box type none to the text2. Use boolean ...ThanksDhana.

72. Why dont we give a & before reading a string in C language?
scanf("%s",str); why is it not scanf("%s",&str);

We don't give an & before reading a string. This is so because a string is a character array. For an array, be it integer or character or any other array, declared as int a[10] or char str[20], the name 'a' or 'str' stores the base address of the array, that is the address of the memory location where the array is starting. The scanf statement requires the address of the location to store the value input by the user. Since str already stores the address of the memory location we do not need to add the & before it.

73. Give the complete difference between database, relational database and object database?

A database is an organized collection of information. It is structured so you can jump to the information by using a key, and find related infromation by navigating a path. A sequential (flat) file is not considered a database.

A relational database contains one-to-many relationships.

A networked database contains one-to-many and many-to-many relationships.

74. Write a similar function to printf()?

Please share your experience.

75. Explain how to get 1,4,7,10.....rows from a table?

Please share your answers.

76. How to make virtual host with apache2triad?

Please share your answers.

77. What is How chat server works?

throgh a socket programming bidirectional commumication.

78. What is multitasking?

Two or more process run concurrently called MultiTasking. There are two types of multitasking. 1) Process-based 2) Thread-based.

Process-based multitasking allows your computer to run two or more programs concurrently. Thread-based multitasing means single program can perform two or more task simultaneously.

79. How to implement "Queue" functionality by using "2 Stacks"?

1. Take 2 empty stacks.
2. Fill the 1st stack with some items (eg: input 100, 101, 102, 103)
3. Now read the items from 1st stack in LIFO order and write to 2nd stack.
(By this the 2nd stack will get the items in the order .. 103, 102, 101, 100)
4. Now read the items from 2nd stack in LIFO order i.e. the output will be
100, 101, 102, 103.
(this is the queue order FIFO with respect to the actual items entered in 1st
stack.)

80. In Unix/COBOL environment, how to get the program-id of a COBOL program when the same program is running?

Please share your answers.

81. What is a Lowest level computer language?

8085 Assembly language is widely known as the lowest level language!!!

82. Give one real time application where static variables are used?

Thinks of a situation where you need to do some work just once in a function irrespective of how many times that function is invoked then u can have a static variable which will keep a track of it. eg int main () { static int once = 0; if (!once) { once++; /*code need to be executed once*/ } /*reset of the code*/ }

83. Write an O(log2(N)) algorithm to find X^N?

int computeXn(int x, int n)

{

if(n == 2)

{

return x*x;

}

else if(n % 2 == 0)

{

int y = computeXn(x, n/2);

return y*y;

}

else if(n % 2 == 1)

{

int y = computeXn(x, n/2);

return y*y*x;

}

}

84. What is the Hierarchy levels in data warehousing concepts level?

In-accurate data is often termed as dirty data and has been characterized as missing data, wrong data and compound data with different representations.

Ex. :- customer dimension in which the same person can appear multiple times probably not with exactly the same spellings or other attributes.

85. What is balance dimension?

nothing but type 2 dimension

Download Interview PDF

86. What is dirty dimension?

If a Record occurs more than one time in a table by the difference of a non-key attribute then such a dimension is called Dirty Dimemsion.

87. Explain CDROM access is random or semi random or sequential?

CDROM access is sequential..
Magnetic sequential access memory is typically used for secondary storage in general-purpose computers due to their higher density at lower cost compared to RAM, as well as resistance to wear and non-volatility. Examples of SAM devices still in use include hard disks, CD-ROMs and magnetic tapes. Historically, drum memory has also been used.

88. What are the advantages & disadvantages of vertical cluster & horizontal cluster? Which is the best? Why?

In horizontally clustered environment, cluster-enabled application is deployed on multiple physical machines. Each machine is available for requests. Horizontal clusters offers protection over hardware failure, increases efficiency, provides load balancing and process failover. However, since there are many number of physical machines involved the installation and maintenance cost increases proportionally.

In Vertical clustering, multiple application server instances are hosted on the same physical machine. This type of clustering provides increased efficiency, load balancing and process failover. However, if hardware fails then there may not be ready alternative.

89. How to increase transfer rate of an hard disk?

See if any among these helps to increase Hard disk transfer rate...

- Try using RAID setup
- In Device Manager under ATA/ATAPI Controllers verify if the hard disk is running in UDMA mode.
- Update motherboard chipset drivers
- Under Properties of the drive, Hardware Tab -> Properties of the hard disk:
Enable write caching
Enable advanced performance

90. How to print "hello world" in c without using semicolon?

main()
{
clrscr();
if(printf("Hello Tarun Goyal"))
{}
getch();
}

91. Explain what is the difference between Process and thread with real time examples?

1.Threads share the address space of the process that created it; processes have their own address.

2.Threads have direct access to the data segment of its process; processes have their own copy of the data segment of the parent process.

3.Threads can directly communicate with other threads of its process; processes must use interprocess communication to communicate with sibling processes.

4.Threads have almost no overhead; processes have considerable overhead.

5.New threads are easily created; new processes require duplication of the parent process.

6.Threads can exercise considerable control over threads of the same process; processes can only exercise control over child processes.

7.Changes to the main thread (cancellation, priority change, etc.) may affect the behavior of the other threads of the process; changes to the parent process does not affect child processes.

92. Define ROM image and explain each section of a ROM image in an exemplary system?

A ROM image captures the data from a read-only memory chip, such as hardware firmware, video and arcade game boards, etc. It is often used for emulation.

93. How to delete a entire linked list?

You delete a linked list by iterating through the list and deleting the nodes one by one.
Begin at the head
Get address of first node
Get address of next node
Delete first node
Do not to access next of the current node after deleting the current node.
Move next node to first node
Repeat

If the list is empty, the head pointer will be NULL.

94. Explain how to calculate response time in Client-Server technology?

This can be done by measureing the time taken by the first byte to reach the client (TTFB) and the time taken by the last byte of the response to reach the client (TTLB) by using various network bandwidths between the client and the server.

95. Do you know hows do electrons travel through a lightning bolt?

Generally, lightning is negatively charged. During thunderstorms. The Earths is recharged and its surface becomes good conductor of electricity. The Earth is charged negatively and the atmosphere is charged positively. Electrons flow upwards from the entire surface of the Earth. Thunderstorms help transfer the negative charges back to Earth.

96. What is race around condition?

A race around condition is a fault in the process or a system where the output or the result of the process is critically and unexpectedly dependent on the timing of other events. Race condition especially occurs in multithreaded or in distributed systems.

97. Explain what are mutants and explain mutation testing?

A mutated program is called Mutant and Mutation testing is based up on seeding the Implementation with a Fault by applying mutation Operator and determining whether Testing Identify this fault is called Mutation testing

98. Tell me why constructors does not supports visual functions?

Constructor does not support virtual functions because we need an object to invoke a virtual method in the first place and more over constructors are used to initializing objects,which is a static type.Virtual functions are invoked on the dynamic type of the object,hence the object may not be properly initialized when a constructor call is made.Since the derived part of the object would not be initialized during the execution of base class constructor,hence calling any virtual method from base class constructor does not work well.

99. What is multithreading?

Multithreading is the ability of a program or an operating system process to manage its use by more than one user at a time and to even manage multiple requests by the same user without having to have multiple copies of the programming running in the computer. Central processing units have hardware support to efficiently execute multiple threads. These are distinguished from multiprocessing systems (such as multi-core systems) in that the threads have to share the resources of a single core: the computing units, the CPU caches and the translation lookaside buffer (TLB).

100. Tell me what is the difference between UNIX password and windows password?

WINDOWS the password lost then no way to login but it's not the case in UNIX,we can enter.

Download Interview PDF

101. How to read a file from NT script, pass what is read into variables.
how to do error checking etc?

Please share your experience.

102. Tell me what is ISO of Testing?

Please share your views.

103. How to decide which requirements will come under feature requirements and which will come under use case requirements in Rational Requisite Pro?

Please share your answers.

104. Explain what is the use of == and equals() method?

The == operator compare whether two object references are refer to the same instance or not.

The equals() method compare the characters(contents) of two String object.

example:

String a="Hai";
String b="Hai";
String c=new String("Hai");
System.out.println(a==b); //True
System.out.println(a==c); //False
System.out.println(a.equals(b)); //True
System.out.println(a.equals(c)); //True

105. Tell me why does sizeof() say as operator?

Please share your answers.

106. How to download the whole website not internet example some small data related websites?

by using any website copier software.

107. Explain the difference between update, verify and debug mode?

These definitions are for winrunner Run modes

Verify: When ever we want to check the behavior of an application and to save the result we use verify run mode

update: When ever we want to create a new expected results for GUi checkpoints and Bitmap checkpoint we use update run mode

Debug: When ever we want to run a script after update without any errors in syntax we use Debug run mode

108. How to delete the Legder A/c in Tally 7.2 of any person existing in my Accounts Books say for eg. from 1998. And now i dont need this Ledger A/c?

Please share your views.

109. What is the difference between Rational Robot and QTP. Which is effective in web testing?

Please share your experience.

110. How to schedule graphs in Ab initio using unix?

Please share your answers.

111. Can you split the following code?
char far*scr=(char far*) 0xB8000000L?

Please share your answers.

112. Tell me what is the difference between collision domain and broad cast domain?

A collision domain is a logical area in a computer network where data packets can "collide" with one another, in particular in the Ethernet networking protocol. The more collisions in a network the less efficient it is.

A broadcast domain is a logical area in a computer network where any computer connected to the computer network can directly transmit to any other in the domain without having to go through a routing device.