Qtp interview questions

 

Top most important qtp interview questions and answers by Experts:

Here is a list of Top most important qtp interview questions and answers by Experts.If you want to download qtp interview questions pdf free ,you can register with RVH techguru. Our experts prepared these qtp interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in qtp ,Register for qtp online training here.

1) Which environments are supported by QTP?
QTP supports the following environments
• Active X
• Delphi
• Java
• .Net
• Oracle • People Soft
• Power Builder
• SAP
• Siebel
• Stingray • Terminal Emulator
• Visual Basic
• Visual Age
• Web
• Web Services

2) What are the types object Repositories in QTP.
QTP Supports 2 types of Object Repository
1) Shared Object Repository (also called Global)

2) Per-Action Object Repository, (also called Local)
Per-Action Object Repository is used by default. The extension for Per-Action repository is “.mtr” .
Shared Object Repository is preferable while dealing with dynamic objects which are called in multiple tests. The extension is “.tsr”
3) Can we call QTP test from another test using scripting. Suppose there are 4 tests and I want to call these tests in a main script. Is this possible in QTP?
Yes. You can call 4 or even more scripts in your tests.For this, first you will need to make the Actions in the corresponding scripts re-usable.Then from the destination script you can make calls to these re-usable actions.
4) What is action split and the purpose of using this in QTP?
Action split is to divide an existing action into two parts.The purpose is to divide actions based on their functionality to improve code re-use.
5) How will you handle Java tree in QTP ?
Foremost you will select Java Add – In and launch QTP. Next step record operations on the Java Tree. If you face an issue while recording, you can select Tools > Object Identification > Java, tree object and make changes in mandatory and assistive properties to enable identification.
Tip: You can base you answer on similar lines for any other object of any environment. For example : If the question is how will check SAP checkbox , You say , first I will select SAP Add in … and so on.
6) Explain how QTP identifies object ?
QTP identifies any GUI Object based on its corresponding properties. While recording, QTP will identify and store peculiar properties (as defined in the Object Identification settings) in the object repository of the GUI object . At run-time, QTP will compare the stored property values with the on-screen properties, to uniquely identify the GUI object.
7) How many types of recording modes in QTP? Which will be used when ?
QTP supports 3 types of recording modes

1. Normal mode also called Contextual
2. Low-level recording mode
3.Analog mode
Normal Mode: It is the default recording mode and takes full advantage of QTP’s Test Object Model. It recognizes objects regardless of their position on -screen. This is the preferred mode of recoding and is used for most of the automation activities.
Low-level recording mode: This mode records the exact x,y co-ordinates of your mouse operations. It is helpful in testing hashmaps. It is useful for recording objects not identified by normal mode of QTP.
Analog mode: This mode records exact mouse and keyboard “movements” you perform in relation to the screen / application window. This mode is useful for the operation such as drawing a picture, recording signature., drag and drop operations.
8) How will you call from one action to another action ?
We can call an action in 2 ways
1) Call to copy of Action. – In this ,the Action Object Repository , Script and Datable will be copied to the destination Test Script.
2) Call to Existing Action. – In this, Object Repository , Script and Datable will NOT be copied but a call (reference) would be made to the Action in the source script.
9) What are Virtual Objects?
Your application may contain objects that behave like standard objects but are not recognized by QTP. You can define these objects as virtual objects and map them to standard classes, such as a button or a check box. QTP emulates the user’s action on the virtual object during the run session. In the test results, the virtual object is displayed as though it is a standard class object.
For example, suppose you want to record a test on a Web page containing a bitmap that the user clicks. The bitmap contains several different hyperlink areas, and each area opens a different destination page. When you record a test, the Web site matches the coordinates of the click on the bitmap and opens the destination page.
To enable QTP to click at the required coordinates during a run session, you can define a virtual object for an area of the bitmap, which includes those coordinates, and map it to the button class. When you run a test, QTP clicks the bitmap in the area defined as a virtual object so that the Web site opens the correct destination page.
10) How to perform Cross platform testing and Cross browser testing using QTP? Can u explain giving some example?
You will need to create separate Actions which take care of different OS and Browsers
Cross Platform Testing:

Using the Built in Environment Variable you can dig up the OS information.
Eg. Platform = Environment(“OS”). Then based on the Platform you need to call the actions which you recorded on that particular platform.

Cross Browser Testing:

Using this code Eg. Browser(“Core Values”).GetROProperty(“version”) you can extract the Browser and its correspondin version. Ex: Internet Explorer 6 or Netscape 5. Based on this value you call the actions which are relevant to that browser.
11) What is logical name of the object?
Logical name is a name given by QTP while creating an object in the repository to uniquely identify it from other objects in the application. This name would be used by the QTP to map the object name in script with its corresponding description in the object repository. Ex: Browser(“Browser”).Page(“Guru99”) Here Guru99 is the logical name of the object.
12) What is descriptive programming?
Typically ,an object and its properties must be recorded in the Object Repository to enable QTP to perform action s on it.
Using descriptive programming , you do not store the object and its property values in the Object repository but mention the property value pair directly in the script.
The idea behind descriptive programming is not bypass the object repository but help recognize dynamic objects.
13)What are the properties you would use for identifying a browser & page when using descriptive programming ?
You can use the name property
ex: Browser(“name:=”xxx””).page(“name:=”xxxx””)…..

OR

We can also use the property “micClass”.
ex: Browser(“micClass:=browser”).page(“micClass:=page”)….
14)Can we record an application running on a remote machine using QTP ?
Yes .you can record remote application provided you are accessing application through the local browser not via remoter like citrix.
If you are still unable to record it is advisable install QTP and application, on the same machine
15) Explain the keyword CreateObject with an example.
Creates and returns a reference to an Automation object
SYNTAX: CreateObject(servername.typename [, location])
Arguments
servername: Required. The name of the application providing the object.
typename : Required. The type or class of the object to create.
location : Optional. The name of the network server where the object is to be created.

Example : Set IE = CreateObject(“InternetExplorer.Application”)
16) Can you switch between Per-Action and Shared Object Repository ? If yes how ?
Yes .We can switch. Go to Test—>Settings—>Resources. Here you have an option to choose repositories.
17) What is Object Spy ? How to Use it ?
Object Spy helps in determining the run & test time object properties & methods of the application under test.
You can access object spy directly from the toolbar or from the Object Repository Dialog Box.
It is very useful during Descriptive Programming
18) When ordinal identifiers alone can make an object unique then why they are not given top priority? Why it is first mandatory and next assistive. Why we cannot go for ordinal identifiers directly?
Consider the following –
a) If two objects are overlapped on each other than location based object recognition will fail.
b) If only index based recognition is used your script will work but script execution time will increase.
Hence mandatory and assistive properties are used.
19) What is the file extension of the code file in QTP?
Code file extension is script.mts
20) Explain in brief about the QTP Automation Object Model.
QTP Automation Object model deals with Automation of QTP itself. Almost all configuration and functionality provided by QTP is represented by QTP’s Automation Object Model . Almost all dialog boxes in QTP have a corresponding automation object which can set or retrieved using the corresponding properties or methods in the Automation Object Model.QTP Automation Objects can be used along with standard VB programming elements like iterative loops or conditional statements to help you design a script of choice.
21) What is the use of Text output value in QTP?
Text Output values enable you to capture text appearing on the application under test during run-time.
If parameterized, text output values will capture values appearing in each iteration which would be stored in the run-time data table for further analysis.
22) What is Step Generator?
Step Generator enables use to Add Test Steps in your script. Using step generator you can add steps to your script without actually recording it.
23) How to make QTP understand the difference amongst the same type of objects .Suppose there are 5 check boxes in a page and I have to choose the 2nd one, how to do that through script?
You can use ordinal identifiers like index along with a little descriptive programming for object recognition.
24) What is Test Fusion Report ?.
Test Fusion Report , displays all aspects of a test run and is organized in a Tree format.
It gives details of each step executed for all iterations.
It also gives Run-time data table, Screen shots and movie of the test run if opted.
25) How can you handle exceptions in QTP?
In QTP Exceptional handling is done by using
a. Recovery Scenarios.
b. Using “On Error” statement
In Recovery scenario you have to define.
1. Triggered Events.
2. Recovery steps.
3. Post Recovery Test-Run.
At Script Level you can use the On Error Resume Next and On Error Go to 0 statement.
26) What are the types of environment variables in QTP ?
Environment variables in QTP are of three types:
1) Built-in (Read only)
2) User-defined Internal (Read only)
3) User-defined External (Read/Write)
You Set the Environment Variable using the following syntax
Environment.Value( “name”) = “rvhtech”
You can Retrieve the Environment Variable using following syntax
Environment.Value(“name”) — This will retrun name as Guru99
Environment.Value(“OS”) — This will return your system OS
27) What is the Difference between Bitmap Check point & Image Check point?
Bitmap checkpoint does a pixel to pixel comparison of an image or part of an image.
Image checkpoint does do a pixel to pixel comparison but instead compare image properties like alt text , destination url etc.
28) What is the difference between functions and actions in QTP?
Actions have their own Object Repository & Data Table. Actions help make your Test modular and increase reuse. Example: You can divide your script into Actions based on functionality like Login, Logout etc.
Functions is a VB Script programming concept and do not have their own Object Repository or Data Table. Functions help in re-use of your code. Ex: You can create a Function in your script to concatenate two strings.
29) What is keyword view and Expert view in QTP?
Keyword View is an icon based view which shows test steps in tabular format. It also automatically generates documentation for the test steps.
Expert View gives the corresponding VB Script statement for every test step in the Keyword view.
30) Explain QTP Testing process? –
Quick Test testing process consists of 6 main phases:
1) Create your test plan – This is preparatory phase where you identify the exact test steps, test data and expected results for you automated test. You also identify the environment and system configurations required to create and run your QTP Tests.
2) Recording a session on your application – During this phase , you will execute test steps one by one on your AUT ,and QTP will automatically record corresponding VB script statements for each step performed.
3) Enhancing your test – In this stage you will insert checkpoints , output values , parameterization , programming logic like if…else loops to enhance the logic of your test script.
4) Replay & Debug – After enhancements you will replay the script to check whether its working properly and debug if necessary.
5) Run your Tests – In this phase you will perform the actual execution of your Test Script.
6) Analyzing the test results – Once test run is complete, you will analyze the results in the Test Fusion report generated.
7) Reporting defects – Any incidents identified needs to be reported. If you are using Quality Center , defects can be automatically raised for failed tests in QTP.
31) What are the different types of Test Automation Frameworks ?
The types of Automation Frameworks are –
1) Linear Scripting – Record & Playback
2) The Test Library Architecture Framework.
3)The Data-Driven Testing Framework.
4)The Keyword-Driven or Table-Driven Testing Framework.
32) How will you check a web application for broken links using QTP?
You can use the Page Checkpoint which gives a count of valid/invalid links on a page.
33) What is a Run-Time Data Table? Where can I find and view this table?
Data like parameterized output , checkpoint values , output values are stored in the Run-time Table. It is an xls file which is stored in the Test Results Folder. It can also be accessed in the Test Fusion Report.
34) What is the difference between check point and output value.
Check point is a verification point that compares a current value for a specified property with the expected value for that property. Based on this comparison, it will generate a PASS or FAIL status.
An output value is a value captured during the test run and can be stored in a specified location like the Datable or even a variable. Unlike Checkpoints, no PASS/FAIL status is generated.
35) How would you connect to database using vbscript ?
To connect to the database you must know
a) connection string of your server
b) username
c) password
d) DNS name
You can code the database connectivity command directly or you can use the SQL Query tool provided by QTP.
36) What is QTP batch testing tool?
You can use the Batch testing tool to run multiple scripts. Once the scripts are added in the tool , it will automatically open the scripts and start executing them one after the other.
37) What are the drawbacks of QTP?
As of QTP version 10
1) Huge Tests in QTP consume lots of memory and increase CPU utilization.
2) Since QTP stores results in HTML file (and not txt) the result folder sometimes becomes big.
38) What is an Optional Step ?
A step when declared optional is not mandatory to be executed. If the corresponding GUI object is present, QTP performs the operation on it. If the GUI object is not present, QTP bypasses the optional step and proceeds to execute the next step.
39) What is Reporter.ReportEvent ?
Reporter.Reportvent is standard method provided by QTP to send custom messages to the test results window.
Syntax
Reporter.ReportEvent EventStatus, ReportStepName, Details [, ImageFilePath]
where
EventStatus = 0 or micPass
1 or micFail
2 or micDone
3 or micWarning
Results can assume any status like Pass , Fail , Warning etc. You can also send screenshot to the test results window.
40) How will you declare a variable in QTP ?
You declare using a DIM keyword. You assign value to the variable using the SET keyword.
Ex.
Dim temp ‘Will declare the temp variable
Set temp = 20 ‘ Will assign a value 20 to temp.
41) What is GetRoProperty ?
GetRoProperty is a standard method provided by QTP to fetch property values of a run -time object.
42) What is smart Identification?
Typically, if even one of the on-screen object property does not match the recorded object property. The test fails.
In smart identification, QTP does not give an error if the property values do not match, but uses Base filter and Optional Filter properties to uniquely identify an object. In Smart identification, if a property value does not match the script does not fail but it proceeds ahead to compare the next property. Smart identification can be enabled in Object Identification Dialog box.
43) How would you export a Script from one PC to another in QTP ?
We can make use of the “Generate Script” function available in Object Identification, Test Settings and Tools/Options tab to create a zip of the script at the source computer. These zip files then can be imported into QTP at the destination computer.
44) Can launch two instances of QTP on the same machine ?
No. You can work with only single instance of QTP on the same machine. But QTP itself can work on multiple instances of the Application Under Test (AUT). Ex: QTP can handle multiple IE browser windows.
45) Give the syntax to import/export xls into QTP.
DataTable.ImportSheet “..\..\TestData\Input.xls”,1,dtGlobalSheet
DataTable.ExportSheet “..\..\Results\Output.xls”,”Global”
46) What is SetToProperty ?
SetToProperty changes property of an object stored in the Object Repository. However these changes are not permanent.
47) What is the standard timing delay for web based application in QTP ?
The standard delay is 60 seconds. This is can be changed in Test Settigns.
48) What is the Action Conversion Tool ?
It is an in-built tool provided by QTP to convert Actions into Business Process Components.
49) What is the extension for a function library ?
The extension is ‘.QFL’
50) If the Global Data sheet contains no data and the Local Datasheet contains two rows of data, how many times will the test iterate?
The test will iterate only once – global iteration.
51) Explain how to read registry key in UFT ?
The example demonstrated here explains how to read registry key in UFT
‘Create a shell object

Set MyShell= CreateObject (“WScript.Shell”)

Read the value of key from the registry

RegValue =MyShell.RegRead (varpathofkey)

‘in above function we have to pass the path of key in registery’.

e.g. HKCU\software\ie\settings

msgbox RegValue
52) What are the ways in UFT to get system environment variables in UFT?
There are three ways to get system environment variables in UFT
Use the WSH shell object
• Use WMI’s Win32_Environment Class
• Read variables from the registry
Set myShell = CreateObject (“WScript.Shell”)

WScript.Echo myShell.ExpandEnvironmentStrings( “%PATHEXT%” )

myShell=Nothing,
The output will be .BAT;.CMD;.VBS;. VBE;. JS;. JSE
Other user variable, like TEMP, overwrite their system counterpart
Set myShell = CreateObject( “WScript.Shell” )

WScript.Echo myShell.ExpandEnvironmentStrings( “TEMP=%TEMP%” )

myShell=Nothing
The output will be
TEMP:C:\DOCUME~1\You\LOCALS~1\Temp
53) Mention the steps required in UFT to send mail from outlook?
To send mail from outlook in UFT,
Set Outlook = CreateObject (“Outlook.Application”)
Dim Message ‘As Outlook.MailItem
Set Message = Outlook.CreateItem(olMailItem)
With Message
.Subject = Subject
.HTMLBody = TextBody
.Recipients.Add (aTo)
Const olOriginator = 0
.Send
End With
54) Explain how you can fetch data from database in UFT?
To fetch data from database in UFT, you have to follow the code below
Set db= createobject (“ADODB.Connection”)
db.Open “Provider=Microsoft.Jet.OLEDB.4.0;Data Source=G:\guru99\vb6\admission_project.mdb;
Persist Security Info= False”
Set rst=createobject(“ADODB.Recordset”)
rst.Open “select*from Course”, db, 3
id=rst. RecordCount
For i=0 to id-1
Print rst.field (0) & rst.fields (1) & rst.fields (2) & rst.fields (3)
rst.Movenext
Next
55) What are the codes we can use to get files from ftp server in UFT?
To get ftp files from ftp server, you have to use below code
a) put- To store single file on server
b) get- To download single file from ftp server
c) mget- To download multiple files from server
d) mput- To store multiple files on server
e) delete- To delete files on ftp server
MyShell.Run “%comspec% /c FTP -n -s:” & commandstoworkwithftp & ” ” & Site, 0,True
56) In UFT how you can prevent the system from getting locked?
To prevent system getting locked, any of the two ways can be used
• Create a simple vbs file having code to press numlock key and run that vbs file
• Edit one registry key “DisableLockWorkstation =1” to disable locking
57) What is descriptive programming in UFT means?
Descriptive programming includes property name and property value. Whenever UFT is facing difficulty in identifying objects from object repository, and instead the object is directly identified from the script is known as descriptive programming.
58) In UFT explain the difference between qfl and vbs files?
a) qfl is quick test function library file while vbs is Microsoft’s vbscript
b) qfl is a non-executable file while vbs is an executable file
c) To use file in UFT associate qfl file from test setting, while to include vbs file use “execute file statement”
59) What is the code to write data to text file in UFT?
To write data to text file in UFT code is
Content = “rvhtech Rocks”
Set Fo = createobject (“Scripting.FilesystemObject”)
Set f = Fo.openTextFile (“c:\myFile.txt”,8,true) ‘ open in write mode
f.Write (contents)
f.Close
Set f = nothing
60) How to write data to excel file in UFT?
Code to write data to excel file in UFT is
filepath = “C:\Bugs\Reports.xlsx”
Set objExcel = CreateObject(“Excel.Application”)
objExcel.Visible= True
Set Wb= objExcel.Workbooks.Open (filepath)
Wb.worksheets(1).Cells(1,1).Value = “rvhtech” read value from Excel file
61) How to create TSR file in UFT?
TSR means Test Shared Repository, it is created to share object repository.
To create TSR file, follow the steps
• Open object repository
• Go to file menu
• Go to export local objects option and select it
After that, UFT will ask you to store .tsr file. Give the path and save. This will create .tsr file in UFT
62) How to connect to QC in UFT?
To connect with QC, UFT provides the option to connect QC directly from UFT GUI.
a) Go to file menu
b) Select (QC) quality center
c) You will be asked to – Enter QC url
d) Enter user id, password and project
Following above steps will allow you to connect with QC, later on you can execute the tests from QC itself.
63) What are the types of Automation Framework in UFT?
In order to ease the process of test automation using UFT, test automation is designed. There are mainly three types of automation frameworks in UFT
• Keyword Driven Framework: It is used when multiple functionality needs to be tested.
• Data Driven Framework: It is used to test same flow with different test data, test data is given more importance than multiple functionality of application
• Hybrid Framework: It is a combination of data driven framework and keyword.
64) When we should use descriptive programming in UFT ?
Either through object repository or description programming, UFT identifies objects. Descriptive programming is used in following scenarios
a) It is used to remove duplicate objects. Same objects exists in different screens or windows of your application. If you use OR in this case you have to store same object under different object hierarchy in OR. To deal with such situation, descriptive
programming is used
b) It is not appropriate in certain scenarios to store the objects inside OR (Object Repository). Suppose if you want to print 100 links on the page, you should not store all links in OR. Instead you should use Description Programming to access those links.
65) What is “settoproperty” and when to use it in UFT?
Settoproperty stands for set test object property. You can use this property to change the object values at runtime. You can edit the property values during the runtime, but the changes that are made are temporary.
66) How to create an array of dictionary in UFT?
We can create an array of dictionary using syntax
Dim ArrayofDictionary(2)
First element of array
Set ArrayofDictionary(0)= createobject(“scripting.dictionary”)
ArrayofDictionary(0).Add “key1”, “temp1”
ArrayofDictionary(0).Add “key2”, “temp2”
Added keys in first dictionary
Second element of array as dictionary
Set ArrayofDictionary(1)= createobject(“scripting.dictionary”)
ArrayofDictionary(1).Add “key1”, “temp1”
ArrayofDictionary(1).Add “key2”, “temp2”
Added keys in second dictionary…..and so on
67) What is the difference between “Array” and “Dictionary”?
Array Dictionary
• Dynamic array is possible • There is no concept of dynamic dictionary
• Size of array must be set before the use of array • The size of dictionary do not need to be set
• We have to use redim statement before adding extra element into dynamic array • To add extra element there is no need to write any statement. We just use add method
• There is no particular method to release the memory if particular element is not required • Element which is not required any longer can be removed from the dictionary
68) What is round function in UFT?
Round function in UFT is used to round the decimal
For example
Mydecimal = 6.3433333
Roundedvalue= Round(Mydecimal , 3)
Print roundedvalue, it will print 6.343
69) How to find the total number of rows in the webtable in UFT?
There are three ways which we can find the count of rows in the table in UFT
a) Using rowcount property of UFT webtable object
b) Using GetROProperty of UFT
c) Using HTML DOM + UFT
70) How to create excel file in UFT ?
steps will create excel file in UFT,
‘Create a new Microsoft Excel object
Set myExcel = createobject(“excel.application”)
‘To make Excel visible
myExcel.Application.Visible = true
myExcel.Workbooks.Add
MyExcel.worksheets(1).Cells(1,1). Value = “Scenario Id”
MyExcel.worksheets(1).Cells(1,2).Value = “Scenario Name”
MyExcel.worksheets(1).Columns(1).ColumnWidth = 10
MyExcel.worksheets(1).Columns(2).ColumnWidth = 40
MyExcel.worksheets(1).Columns(3).ColumnWidth = 20
MyExcel.worksheets(1).Columns(4).ColumnWidth = 20
MyExcel.SaveAs “c:\guru99.xlsx”
MyExcel.close
objExcel.Quit
blnFlag = False
71) Explain in what ways we can export datatable to excel in UFT?
To export data-table to excel, there are two methods.
a) DataTable.Export (“C:\export.xls”)
b) DataTable.ExportSheet “C:\mysheet.xls” ( If excel file does not exist, new file is created)
73) In datatable sheet in UFT, how to read a value from the cell?
To read a value from the cell, we follow 2 step process
a) We set the row pointer in first step
b) In second step we define the parameter/column name from the sheet to read
Example:
For this example, we have set the row pointer to 2 in transaction sheet
Datatable.GetSheet(“Transactions”).SetCurrentRow(2)
Now, we have to specify that we want to read a value from the module_name column from the transaction sheet
Print datatable.Value (“Module_Name, “Transactions”)
74) What are the loops available in UFT and what they do?
There are 3 loops available in UFT
a) Do…..Loop : Do Loop will run a block of statements repeatedly
b) For…..Next : For Next Loop will execute a series of statements until a specific counter value
c) For……Each : In order to execute a series of statements for each statements for each object in collection “For Each Loop” is used
While….Wend Loop : While Wend Loop is used to execute a series of statements as long as given condition is true
75) What are the types of error need to be handle in UFT?
There are three types of error that one will face in UFT
a) Syntax Errors
b) Logical Errors
c) Runtime Errors

76) What is the difference between exitaction and exititeration?
Exitaction is used when we want to exit from a particular action, while exititeration is used to exit from a particular action iteration of an action.
77) In QTP how you can remove the spaces from string?
You can use replace function to remove spaces from string in QTP
Print replace(“ sdsd sd sd s “, “ “,”””)
Output will be sdsdsdsds
Itrim function can be used if only leading spaces from string needs to be removed
Print Itrim(“ sdsd sd s “) à Output will be “sdsd sd s”
You can use rtrim function to remove trailing spaces from string
Print rtrim(“ sdsd sd s ” ) à Output will be “ sdsd sd s”
78) In QTP how you can get the last character from a string?
Code to get the last character of a string in QTP
print right( “junior,1) ‘ à Output will be “r”
79) How to add synchronisation points in QTP?
There are 4 ways through which we can add synchronisation points in QTP
a) Wait statement : This statement will pause the execution for x seconds until object comes up
b) Wait property : This method will wait until property of object takes particular value
c) Exist statement : This statement will wait until object becomes available
d) Sync method: The code will wait until browser page is completely loaded. For web application testing this method is used.
80) In QTP explain what is crypt object
Crypt object in QTP is used to encrypt a strings.
Syntax
Crypt.Encrypt(“Guru99”)
Example :
In this example, value in pwd variable is encrypted using the Crypt. Encrypt method.
Then this encrypted value is entered into editbox.
pwd= “myvalue”
pwd = Crypt.Encrypt (pwd)
Browser(“myb”).WinEdit (“pwd”). SetSecure pwd
81) Mention what is the difference between Excecute file and loadfunction library ?
In execute file, we can’t debug the statements. With loadfunction library, statements can be debug and can also load multiple library files.
82) Explain how you can find length of array in QTP?
The code to find the length of array in QTP is
print (ubound(arr)+1)
Ubound returns the last index in array- so length of array will be +1. This will be total number of elements in array
83) Mention what are the different types of recording modes in QTP? Which will be used when?
QTP supports 3 types of recording modes
a) Normal mode : It is the default recording mode and used for most of the automation activities. Regardless of their position on screen it recognizes objects.
b) Low level recording mode: It is useful for recording objects not identified by normal mode of QTP. It records the exact x,y coordinates of your mouse operations.
c) Analog mode: This mode is useful for the operation such as recording signature, drawing a picture, drag and drop operation.
84) In what ways you can call from one action to another action?
There are two ways you can call from one action to another action
a) Call to copy of action: In this, the script and data-table, action object repository will be copied to the destination Test Script
b) Call to existing Action: In this, script data-table and object repository are not copied instead a call reference would be made to the action in the source script
85) What is Optional step in QTP ? How you can add optional step in QTP?
When running a test, it test fails in opening a dialog box, QTP does not necessarily abort the test run. It bye passes any step designated “optional” and continues running the test. By default QTP automatically marks as optional steps that open certain dialog boxes. In order to set an optional step in the keyword, right click and select “Optional Step”. The icon for optional step would be added in next step. In the expert view to add optional step, add optional step to the beginning of the VBScript statement.
86) How to define array in QTP?
Array can be defined in 3 ways in QTP
a) Fixed size array in QTP
Dim A (10) – single dimension
Dim MyTable (5,10) – multi-dimension
b) Dynamic array-size not fixed
Dim MyArray()ReDim MyArray(25)
c) Using Array Function in QTP
A= Array (10, 20,30)
B= A(2) ‘ B is now 30
87) How you can write contexts to text file in QTP?
Content = “Guru99”
Set Fo = createobject(“Scripting.FilesystemObject”)
Set f =Fo.openTextFile(“c:\abc.txt”, 8,true)
f.Write (contents)
f.Close
Set f= nothing
88) When ‘option explicit’ keyword is used in QTP?
To specify that all variable must be declared before use in QTP, ‘Option Explicit’ keyword is used.
89) In QTP how you can exit for loop?
You must use “Exit For” statement to exit “for loop” in QTP. “Exit For” statement will get the control out of the “for loop”
For count= 1 to 3
TempNum= mid(Tempstr,count,1)
If isnumeric(TempNum) Then
LenghtNum = LengthNum & TempNum
Else
Exit For
End If
Next
GetStrLenNumber = LengthNum
90) How to find array size in QTP?
Size of an array in QTP will be found by using the following code
Print (ubound(arr)+1)
Ubound returns the last index in array- so size of array will be +1
91) In QTP, explain what is qrs file?
qrs means “Quicktest Recovery Scenario”. By using recovery scenario manager we can handle exceptions in test execution.In QTP using recovery scenario manager we can handle exceptions in test execution. In QTP when you create a recovery scenario, you must save it in .qrs file. qrs file may have any number of scenarios defined in it.
92) What is the significance of “action 0” in QTP?
“Action 0” is created by default when you create a new test in QTP along with action 1. To determine the sequence in which we call other actions 1,2,3 etc. action 0 is used.
93) Explain how you can replace string in QTP?
To replace part of string in QTP we will use the code as shown below
Example,
Str = (rvhtech99)
Suppose if you want to replace “99” with “88” then the code will
print replace(str,“99”, “88”) output will be rvhtech88”
94) What are the various automation frameworks available in QTP?
Various types of automation frameworks available in QTP are
a) Linear Scripting
b) The Test Library Architecture Framework
c) The Data Driven Testing Framework
d) The Keyword Driven or Table Driven Testing Framework
e) The Hybrid Test Automation Framework
95) What is ‘Object Spy’ and what is the function of object spy in QTP?
‘Object Spy’ is a feature in QTP by using which you can view both the test and run time object properties and methods.
96) What is “GetROProperty” and what are the steps involved in using GetROProperty?
“GetROProperty” is an in built method used to retrieve runtime value of an object property.
To use GetRoProperty it involves four steps
a) Record the object on which you want to use the GetROProperty in Object Repository
b) Identify the run time property for the recorded object which could be used
c) To retrieve the identified run time property and store the value in a variable
d) Use this value for further deductions
97) Explain how you can find the absolute value of the number in QTP?
To find out the absolute value of a number a built in function in QTP is available
Example- a= -1
Print abs(a) ‘output will be 1
This code will find the absolute value of a number
98) How you can check if parameter exists in Datatable?
To check whether if parameter exists in data table we will use the code
on error resume next
val=DataTable(“ParamName”, dtGlobalSheet)
if err.number<>0 then
‘Parameter does not exist’
else
‘Parameter exists
end if
99) In QTP explain what is keyword driven automation framework?
In keyword driven automation framework, the focus is mainly on keywords/functions and not the test data. It means the complete focus is on creating functions which maps the functionality of the application.
100) In QTP how you can use Xpath to identify objects?
Xpath can be used to identify only web objects. We can use the following code to identify objects.
Set oPage=Browser(“myGoogle”).Page(“myGoogle”)
oPage.WebEdit(“xpath:=//INPUT[@name=‘nameofeditbox’]”).Set “search term”
‘Enter value in google edit box

 

 

Loadrunner interview questions

 

Top most important Loadrunner interview questions and answers by Experts:

Here is a list of Top most important Loadrunner interview questions and answers by Experts.If you want to download Loadrunner interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Loadrunner interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Loadrunner ,Register for Loadrunner online training here.

 

1. What is the difference between Performance testing and Performance engineering?
 In Performance testing, testing cycle includes requirement gathering, scripting, execution, result sharing and report generation. Performance Engineering is a step ahead of Performance testing where after execution; results are analyzed with the aim to find the performance bottlenecks and the solution is provided to resolve the identified issues.
2. Explain Performance Testing Life Cycle.
Step 1: System Analysis (Identification of critical transaction)
Virtual User Generator
Step 2: Creating Virtual User Scripts (Recording)
Step 3: Defining Users Behavior (Runtime setting)
LoadRunner Controller
Step 4: Creating Load Test Scenarios
Step 5: Running the Load Test Scenarios and Monitoring the Performance
LoadRunner Analysis
Step 6: Analyzing the Results
Refer Performance Testing Tutorial #2 for more details.
3. What is Performance testing?
Performance testing is done to evaluate application`s performance under load and stress conditions. It is generally measured in terms of response time of user’s action on application.
4. What is Load testing?
 Load testing is to determine if an application can work well with the heavy usage resulting from a large number of users using it simultaneously. Load is increased to to simulates the peak load that the servers are going to take during maximum usage periods.
5. What are the different components of LoadRunner?
The major components of LoadRunner are:
VUGen- Records Vuser scripts that emulate the actions of real users.
Controller – Administrative center for creating, maintaining and executing load test scenarios. Assigns scenarios to Vusers and load generators, starts and stops loading tests.
Load Generator – An agent through which we can generate load
Analysis – Provides graphs and reports that summarize the system performance
6. What is the Rendezvous point?
Rendezvous point helps in emulating heavy user load (request) on the server. This instructs Vusers to act simultaneously. When the vuser reaches the Rendezvous point, it waits for all Vusers with Rendezvous point. Once designated numbers of Vusers reaches it, the Vusers are released. Function lr_rendezvous is used to create the Rendezvous point. This can be inserted by:
1. Rendezvous button on the floating Recording toolbar while recording.
2. After recording Rendezvous point is inserted through Insert> Rendezvous.
7. What are the different sections of the script? In what sequence does these section runs?
 LoadRunner script has three sections vuser_init, Action and vuser_end.
vuser_init has requests/actions to login to the application/server.
Action has actual code to test the functionality of the application. This can be played many times in iterations.
Vuser_end has requests/actions to login out the application/server.
The sequence in which these sections get executed is vuser_init is at the very beginning and vuser_end at the very end. Action is executed in between the two.
8. How do you identify which protocol to use for any application?
Previously Performance tester had to depend much on the development team to know about the protocol that application is using to interact with the server. Sometimes, it also used to be speculative.
However, LoadRunner provides a great help in form of Protocol Advisor from version 9.5 onwards. Protocol advisor detects the protocols that application uses and suggest us the possible protocols in which script can be created to simulate the real user.
9. What is correlation? Explain the difference between automatic correlation and manual correlation?
 Correlation is used to handle the dynamic values in a script. The dynamic value could change for each user action (value changes when action is replayed by the same user) or for different users (value changes when action is replayed with different user). In both the cases correlation takes care of these values and prevents them from failing during execution.
Manual Correlation involves identifying the dynamic value, finding the first occurrence of dynamic value, identifying the unique boundaries of capturing the dynamic value, writing correlation function web_reg_save_param before the request having the first occurrence of dynamic value in its response.
Automated correlation works on predefined correlation rules. The script is played back and scanned for auto correlation on failing. Vugen identifies the place wherever the correlation rules work and correlate the value on approval.
Refer this tutorial for more details.
10. How to identify what to correlate and what to parameterize?
 Any value in the script that changes on each iteration or with different user while replaying needs correlation. Any user input while recording should be parametrized.
11. What is parameterization & why is parameterization necessary in the script?
Replacing hard coded values within the script with a parameter is called Parameterization. This helps a single virtual user (vuser) to use different data on each run. This simulates real life usage of application as it avoids server from caching results.
Refer this tutorial for more details.
12. How you identify Performance test use cases of any application?
Test cases/Uses cases for Performance test are almost same as any manual/functional testing test cases where each and every step performed by the user is written. The only difference is that all manual test cases can’t be Performance testing use cases as there are few criteria for the selection as:
I. The user activity should be related to critical and most important functionality of the application.
II. The user activity should be having good amount of database activity such as search, delete or insert.
III. The user activity should be having good user volume. The functionality having less user activity is generally omitted from Performance testing point of view. e.g admin account activity.
Any of the manual test cases that fulfill the above criteria can be used as performance testing use case/test case. If manual test cases are not written step by step , Performance team should create dedicated documents for them.
13. While scripting you created correlation rules for automatic correlation. If you want to share the correlation rules with your team member working on the same application so that he/she can use the same on his workstation, how will you do that?
 Correlation rules can be exported through .cor file and the same file can be imported through VuGen.
14. What are different types of vuser logs which can be used while scripting and execution? What is the difference between these logs? When you disable logging?
There are two types of Vuser logs available –Standard log and Extended log. Logs are key for debugging the script. Once a script is up and running, logging is enabled for errors only. Standard log creates a log of functions and messages sent to the server during script execution whereas Extended log contains additional of warnings and other messages. Logging is used during debugging and disabled while execution. Logging can be enabled for errors in that case.
15. What is Modular approach of scripting?
In Modular approach, a function is created for each request (e.g. login, logout, save, delete, etc.) and these functions are called wherever required. This approach gives more freedom to reuse the request and saves time. With this approach it is recommended to work with web custom request.
16. What are the different types goals in Goal-Oriented Scenario?
LoadRunner has five different types of goals in Goal-Oriented Scenario. These are:
• The number of concurrent Vusers
• The number of hits per second
• The number of transactions per second
• The number of pages per minute
• The transaction response time
17. How is each step validated in the script?
Each step in the script is validated with the content on the returned page. A content check verifies whether specific content is present on the web page or not. There are two types of content check which can be used in LoadRunner:
Text Check- This checks for a text/string on the web page
Image Check- This checks for an image on a web page.

18. How is VuGen script modified after recording?
Once the script is recorded, it can be modified with the following process:
Transaction
Parameterization
Correlation
Variable declarations
Rendezvous Point
Validations/Check point
19. What is Ramp up and Ramp Down?
Ramp up- Rate at which virtual users add to the load test
Ramp Down- Rate at which virtual users exit from the load test.
20. What is the advantage of running the Vuser as thread?
Running vusers as thread helps generate more virtual users from any machine due to small memory print of the vuser running as thread.

21. What is wasted time in VuGen Replay log?
Waste time is never performed by any browser user and just the time spent on the activities which support the test analysis. These activities are related to logging, keeping record and custom analysis.
22. How do you enable text and image checks in VuGen?
 This can be done by using functions web_find (for text check) and web_image_check (for image check) and enabling image and text check from run time setting.
Run Time Setting–>Preference–>Enable the Image and text check box.
23. What is the difference between web_reg_find and web_find?
web_reg_find function is processed before the request sent and is placed before the request in the VuGen script whereas web_find function is processed after the response of the request come and is placed after the request in VuGen script.
24. What are the challenges that you will face to script the step “Select All” and then “Delete” for any mail account?
 In this case the post for “Select All” and “Delete” will change every time depending on the number mails available. For this the recorded request for the two should be replaced with custom request and string building is required to build the post. (Note- This question needs practical knowledge. So please this practically and formulate your answer).
25. What is difference between pacing and think time?
Pacing is wait time between the action iterations whereas think time is wait time between the transactions.
26. What are the number of graphs you can monitor using Controller at a time? What is the max of them?
One, two, four and eight graphs can be seen at a time. The maximum number of graphs can be monitored in at a time is 8.
27. You have an application which shows the exam results of the student. Corresponding to name of each student its mentioned whether he passed or failed the exam with the label of “Pass” and “Fail”. How will you identify the number of passed and failed student in VuGen script?
For this text check is used for the web page for the text “Pass and “Fail”. Through the function web_reg_find, we can capture the number of texts found on the web page with the help of “SaveCount”. SaveCount stored the number of matches found. For example-
1 web_reg_find(“Text=Pass”,
2 “SaveCount=Pass_Student”,
3 LAST);
4 web_reg_find(“Text=Fail”,
5 “SaveCount=Fail_Student”,
6 LAST);
28. During the load test what is the optimum setting for Logs?
For the load test log level is set to minimal. This can be achieved with setting the log level to the standard log and selecting the radio button “Send message only when an error occurs”.
29. How will you handle the situation in scripting where for your mailbox you have to select any one mail randomly to read?
For this we will record the script for reading the first mail. Try to find what is being posted in the request to read the first mail such as mail ids or row no. From the post where a list of mails is reflecting, we will try to capture all the email ids row no with correlation function and keeping Ordinal as All i.e. ORD=All . Replace the requested email id in the read post with any of the randomly selected email id from the list of captured email ids.
Refer this Scripting Tutorial.
30. What is the Think Time? What is the Threshold level for think time and how can be this changed?
Think time is the wait time inserted intentionally between the actions in the script to emulate real user`s wait time while performing activity on the application. The Threshold level for Think time in the level below which recorded think time will be ignored. This can be changed from Recorded options->Script->Generate think time greater than threshold.
31. How is Automated Correlation configured?
Any setting related to Automated Correlation can be done byGeneral Options->Correlation. Correlation rules are set fromRecording options->Correlations.
32. How you decide the number of load generator machine required to run a test?
Number of load generator required totally depends on the protocol used to create the script and configuration of the load generator machine. Each protocol has different memory print and this decides how many virtual users can be generated from the give configuration of the machine (load generator).
33. What are the capabilities exactly you look for while selecting the performance testing tool?
 Performance testing tool should capable of:-
• Testing an application built using multiple technologies and hardware platforms.
• Determine the suitability of a server for testing the application
• Testing an application with load of tens, thousand and even thousands virtual users.
34. How concurrent users are differing from simultaneous users?
 All simultaneous users are concurrent users but vice versa is not true.
All the vusers in the running scenario are Concurrent users as they are using the same application at the same time but may be or may not be doing the same tasks. Simultaneous users perform the same task at the same time. Concurrent users are made Simultaneous users through rendezvous points. Rendezvous points instruct the system to wait till a certain number of vusers arrive so that they all can do a particular task simultaneously.
35. How do you identify which values need to be correlated in the script? Give an example.
This can be done in ways:
a) Record the two scripts with similar steps and compare them using WDiff utility. (See tutorial Correlation).
b) Replay the recorded script and scan for correlation. This gives a list of values that can be correlated.
Session Id is a good example of this. When two scripts are recorded and compared using WDiff utility. Session ids in the two scripts should be different and WDiff highlight these values.
36. How does caching affect performance testing results?
 When data is cached in server`s memory, the server need not fetch the result and no server activity triggered. Test result does not reflect the same performance of real user using the application with different data.
37. How will you stop the execution of script on error?
This can be achieved through lr_abort function. The function instructs the vuser to stop executing Action section and end the execution by executing the vuser_end section. This function is helpful in handling a specific error. This can also be used to handle a situation rather than error where execution is not possible. The function assigned “Stopped” status to the vuser which stopped due to lr_abort function. In Run-Time setting, “Continue on error” should be unchecked.
38. What is load testing?
Load testing is to test that if the application works well with the loads from large number of simultaneous users and transactions. It also used to determine whether it can handle peak usage periods.
39. What is load runner?
Load Runner is a performance testing tool from HP. This tool supports all aspects such as Load, Stress, Endurance, data volume and spike Testing.
40. What are all the components of LoadRunner?
Following are the components of LoadRunner
• The Virtual User Generator
• Controller, and the Agent process
• LoadRunner Analysis and Monitoring
• LoadRunner Books Online
41. What Component of LoadRunner is used to record a script?
The Virtual User Generator (VuGen) component is used to record a script and it enables you to develop Vuser scripts for a variety of application types and communication protocols.
42. What is a rendezvous point?
Rendezvous points are introduced into Vuser scripts to simulate more users on the server. Rendezvous points instruct Vusers to wait during test execution in order to perform the tasks simultaneously.
For example, in a banking application, Rendezvous points are inserted for 100+ multiple users to deposit money simultaneously.
43. What is a scenario?
A scenario is nothing but an event that occurs for each testing session.
For example, a scenario defines
• Number of users
• Action to be performed
• Virtual machines system
44. How can we debug a LoadRunner script?
VuGen contains two options to debug Vuser scripts
• Run Step by Step command and
• Breakpoints.
We can also manually set the message class within your script using the lr_set_debug_message function.
45. How can we perform functional testing under load?
Functionality under load can be tested by running several Vusers concurrently. By increasing the Vusers, it is necessary to determine how much load the server can sustain.
46. What is the relationship between Response Time and Throughput?
The Throughput shows the amount of data in bytes that the Vusers received from the server in a second. When It is compared with transaction response time, throughput and response time get decreased.
The peak throughput and highest response time would occur approximately at the same time.
47. What does vuser_init and vuser_end action contain?
Vuser_init action contains procedures to login to a server and Vuser_end section contains log off procedures.
48. What is the difference between standard log and extended log?
The standard log sends a subset of functions and messages to the output log and subset of functions depends on the Vuser type.
Extended log sends a detailed script execution messages to the output log. It is mainly used during debugging when user needs information about Parameter substitution.
49. What are all the types of Goals in Goal-Oriented Scenario of Load Runner?
Load Runner provides you with five different types of goals:
• Number of concurrent Vusers
• Number of hits per second
• Number of transactions per second
• Number of pages per minute
• Transaction response time
50. What is a function to capture dynamic values in the web vuser script?
Web_reg_save_param is the function that saves dynamic data information to a parameter.
51. What are the Load Runner testing process?
Following are the testing process in LoadRunner:
• Plan load test
• Create Vuser Scripts
• Define Scenario
• Run Scenario
• Analyze results
52. What is remote command launcher?
The remote command launcher enables the controller to start applications in the host machine.
53. How can we develop the database vuser script?
Vuser scripts can be developed either by recording with the load vuser script generator or by using Load runner vuser script template.
54. How do you load a load runner Agent?
While running the scenario, loadrunner controller instructs the remote agent dispatcher to launch loadrunner agent. The controller instructs the loadrunner agent to initialize, run, pause and stop the vusers.
55. What is the difference between hits/second and requests/second?
Hits per second means the number of hits the server receives in one second from the vuser.
Request per second is the number of request the vuser will request from the server.
56. What are the advantages of load runner?
Following are the advantages of Load Runner:
• Reduces human intervention
• Reduces the requirement of the systems
• Helps in the better usage of time and money
• Effective utilization of automation
• Single point execution
57. What is the vuser in the scenario?
The vuser is the virtual users who can simulate the real users. The virtual users who take the place of real users’s operating client software, such as IE sending requests using the HTTP protocol to IIS or Apache web servers.
58. How do we write a user defined function in LoadRunner?
Use should create the external library that contains the function. This library must then be added to the bin directory of VuGen. And then, the user-defined function can be assigned as a parameter.
59. What are the changes that can be made to run-time settings?
There are four run-time settings that can be made:
• Pacing: This contains iteration count.
• Log: Logging can be set to standard or disabled.
• Think Time: Capable of setting think time to be ignored or replayed.
• General: Allows the setting of Vusers for processes or multithreading.
60. How can we find database related issues?
Monitors and the Data Resource Graph can be used to find database related issues. LoadRunner allow the tester to specify the resource that needs to be measured before the controller is run.
61. How many types of graphs are available in LoadRunner?
There are 5 types of graphs:
• Network delay time graph – displays the time that elapses between request and response
• Two transaction response time graphs – one transation response time graph for load and another one for percentile
• Hits/second graph – Shows application traffic volume
• Pages download/second graph – shows the rate at which pages are downloaded per second
62. How can performance bottlenecks can be identified?
Monitors can be used to detect performance bottlenecks. These include network, web server, application server, and database server monitors.
These monitors can be used to locate trouble spots in scenarios that cause increase in response time and throughput, network delays, performance response time, hits/second, etc.
63. What is ramp up and how it can be set?
Ramp up is gradually increasing the load on a server and can be simulated by gradually increasing the number of Vusers. This feature can be found in the Scenario Scheduling Options.
64. How correlation can be performed?
Correlation can be performed in two ways:
• Use the scan function to search for correlations and select a value from the result.
• Record a pair of scripts and then compare them to each other.
65. Where are automatic correlation options set?
The automatic correlation is set in recording options area on the correlation tab. Correlation can be enabled for the full script and rules for correlation can be defined.
Automatic correlation can be performed on a database by viewing the output window, scanning for correlation, and selecting the value that will be used.

 

We will continuously update Loadrunner interview questions and answers in this site with real time scenarios by Loadrunner experts.You can request for Loadrunner interview questions and answers pdf in the Contact us form.

Ios interview questions

 

Top most important ios interview questions and answers by Experts:

Here is a list of Top most important ios interview questions and answers by Experts.If you want to download ios interview questions pdf free ,you can register with RVH techguru. Our experts prepared these ios interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in ios ,Register for ios online training here.

 

1. Where can you test Apple iPhone apps if you don’t have the device?
iOS Simulator can be used to test mobile applications. Xcode tool that comes along with iOS SDK includes Xcode IDE as well as the iOS Simulator. Xcode also includes all required tools and frameworks for building iOS apps. However, it is strongly recommended to test the app on the real device before publishing it.
2. Does iOS support multitasking?
iOS 4 and above supports multi-tasking and allows apps to remain in the background until they are launched again or until they are terminated.
3. Which JSON framework is supported by iOS?
SBJson framework is supported by iOS. It is a JSON parser and generator for Objective-C. SBJson provides flexible APIs and additional control that makes JSON handling easier.
4. What are the tools required to develop iOS applications?
 iOS development requires Intel-based Macintosh computer and iOS SDK.
5. Name the framework that is used to construct application’s user interface for iOS.
The UIKit framework is used to develop application’s user interface for iOS. UIKit framework provides event handling, drawing model, windows, views, and controls specifically designed for a touch screen interface.
6. Name the application thread from where UIKit classes should be used?
UIKit classes should be used only from an application’s main thread. Note: The derived classes of UIResponder and the classes which manipulate application’s user interface should be used from application’s main thread.
7. Which API is used to write test scripts that help in exercising the application’s user interface elements?
UI Automation API is used to automate test procedures. Tests scripts are written in JavaScript to the UI Automation API. This in turn simulates user interaction with the application and returns log information to the host computer.
8. Why an app on iOS device behaves differently when running in foreground than in background?
 An application behaves differently when running in foreground than in background because of the limitation of resources on iOS devices.
9. How can an operating system improve battery life while running an app?
An app is notified whenever the operating system moves the apps between foreground and background. The operating system improves battery life while it bounds what your app can do in the background. This also improves the user experience with foreground app.
10. Which framework delivers event to custom object when app is in foreground?
The UIKit infrastructure takes care of delivering events to custom objects. As an app developer, you have to override methods in the appropriate objects to process those events.
11. When an app is said to be in not running state?
An app is said to be in ‘not running’ state when:
– it is not launched.
– it gets terminated by the system during running.
12. Assume that your app is running in the foreground but is currently not receiving events. In which sate it would be in?
 An app will be in InActive state if it is running in the foreground but is currently not receiving events. An app stays in InActive state only briefly as it transitions to a different state.
13. Give example scenarios when an application goes into InActive state?
An app can get into InActive state when the user locks the screen or the system prompts the user to respond to some event e.g. SMS message, incoming call etc.
14. When an app is said to be in active state?
An app is said to be in active state when it is running in foreground and is receiving events.
15. Name the app sate which it reaches briefly on its way to being suspended.
An app enters background state briefly on its way to being suspended.
16. Assume that an app is not in foreground but is still executing code. In which state will it be in?
Background state.
17. An app is loaded into memory but is not executing any code. In which state will it be in?
An app is said to be in suspended state when it is still in memory but is not executing any code.
18. Assume that system is running low on memory. What can system do for suspended apps?
In case system is running low on memory, the system may purge suspended apps without notice.
19. How can you respond to state transitions on your app?
On state transitions can be responded to state changes in an appropriate way by calling corresponding methods on app’s delegate object.
For example:
applicationDidBecomeActive method can be used to prepare to run as the foreground app.
applicationDidEnterBackground method can be used to execute some code when app is running in the background and may be suspended at any time.
applicationWillEnterForeground method can be used to execute some code when your app is moving out of the background
applicationWillTerminate method is called when your app is being terminated.
20. List down app’s state transitions when it gets launched.
Before the launch of an app, it is said to be in not running state.
When an app is launched, it moves to the active or background state, after transitioning briefly through the inactive state.
21. Who calls the main function of you app during the app launch cycle?
During app launching, the system creates a main thread for the app and calls the app’s main function on that main thread. The Xcode project’s default main function hands over control to the UIKit framework, which takes care of initializing the app before it is run.
22. What is the use of controller object UIApplication?
Controller object UIApplication is used without subclassing to manage the application event loop.
It coordinates other high-level app behaviors.
It works along with the app delegate object which contains app-level logic.

23. Which object is create by UIApplicationMain function at app launch time?
The app delegate object is created by UIApplicationMain function at app launch time. The app delegate object’s main job is to handle state transitions within the app.
24. How is the app delegate is declared by Xcode project templates?
 App delegate is declared as a subclass of UIResponder by Xcode project templates.
25. What happens if IApplication object does not handle an event?
In such case the event will be dispatched to your app delegate for processing.
26. Which app specific objects store the app’s content?
Data model objects are app specific objects and store app’s content. Apps can also use document objects to manage some or all of their data model objects.
27. Are document objects required for an application? What does they offer?
Document objects are not required but are very useful in grouping data that belongs in a single file or file package.
28. Which object manage the presentation of app’s content on the screen?
 View controller objects takes care of the presentation of app’s content on the screen. A view controller is used to manage a single view along with the collection of subviews. It makes its views visible by installing them in the app’s window.
29. Which is the super class of all view controller objects?
UIViewController class. The functionality for loading views, presenting them, rotating them in response to device rotations, and several other standard system behaviors are provided by UIViewController class.
30. What is the purpose of UIWindow object?
The presentation of one or more views on a screen is coordinated by UIWindow object.
31. How do you change the content of your app in order to change the views displayed in the corresponding window?
To change the content of your app, you use a view controller to change the views displayed in the corresponding window. Remember, window itself is never replaced.
32. Define view object.
Views along with controls are used to provide visual representation of the app content. View is an object that draws content in a designated rectangular area and it responds to events within that area.
33. You wish to define your custom view. Which class will be subclassed?
Custom views can be defined by subclassing UIView.
34. Apart from incorporating views and controls, what else an app can incorporate?
Apart from incorporating views and controls, an app can also incorporate Core Animation layers into its view and control hierarchies.
35. What are layer objects and what do they represent?
Layer objects are data objects which represent visual content. Layer objects are used by views to render their content. Custom layer objects can also be added to the interface to implement complex animations and other types of sophisticated visual effects.
36. Enlist the Latest IOS Development Patform?
The recent iOS Development platforms are as follows:
iOS 9.2 beta 2 Build version: 13C5060d
IOS 9.1 Build Version: 13B143
37. Explain Fast Enumeration.
Fast enumeration is a iOS Programming Language feature that enables you to enumerate over the contents of a collection. It will also make your code execute your code faster due to internal implementation which gets reduced message sending overheads and increased pipelining potential.
38. Explain ARC.
ARC represents Automatic Reference Counting. It is a Compiler level feature that simplifies the process of managing the lifetimes of Objects in Objective – C. ARC evaluates the Lifetime requirements of Objects and automatically includes appropriate Methods to be called during Compilation.
39. Explain Mutable and Immutable Types in Objective C Programming Language.
Mutable Types means you can modify the Contents later when you feel the need. However, when an Object is marked as Immutable, it implies that the data cannot be modified later after it has been initialized. Therefore, the stored values are Constant here.
Example:
NSString, NSArray values cannot be altered after initialization.
40. What is Garbage Collection?
Garbage Collection is a Memory Management feature. It manages the allocation and release of the memory to your applications. When the garbage collector performs a collection, it checks for objects in the managed heap that are not executed by the applications.
41. Explain xib.
.xib is a file extension that is associated with Interface Builder files. It is a graphics software that is used to test, develop and design the User Interfaces of different software products. Such extension files also contains development time format files that includes interface files created with the interface builder softwares.
42. Which Programming Languages are used for iOS Development?
The languages used for iOS development are as follows:
1. Objective-C
2. .NET
3. C
4. HTML5
5. JavaScript
6. Swift
49. Explain App ID.
It is primarily used to identify one or more apps from a Unique Development team. It consists of a string divided into two parts. The string includes a Team ID and a Bundle ID Search String with a separator as a period. The Team ID is allocated by Apple and is different for every development team. A Bundle ID Search String is supplied by the App Developer.
50. Explain usage of struct.
struct is a Datatype in C Programming Language that enables encapsulation of other pieces of data into a single cohesive unit. It is similar to an object but in C Programming Language.
51. What is an Object?
Objects are essentially the variables that are of Class types. Objects are basic Run-Time entities in an Object oriented system. They may represent a place, a bank account or a person.
52. Enlist the methods to achieve Concurrency in iOS.
The following listed are the methods to achieve concurrency functionality in iOS:
1. Threads
2. Dispatch Queues
3. Operation Queues
53. What is Cocoa?
Cocoa is an Application Development Environment for Mac OS X Operating System and iOS. It includes Compilations of a Runtime System, Object-Oriented Software Libraries and an Integrated Development Environment.
54. What is a Framework?
It is basically a conceptual structure or a scheme with an intension to support the expansion of the structure into something useful. A Framework is a layered structure indicating what kind of programs can or should be built and how they would interact. Frameworks includes actual programs that mentions programming interfaces and programming tools for working with the frameworks.
55. Explain keywords alloc and new.
The alloc keyword is used to create a New Memory Location in the System. However, it does not initialize it. In case of New keyword, it also helps to create a New Memory Location in the system. However, it can initialize the Contents unlike the alloc keyword.
56. What are Selectors in Objective-C?
A Selector in Objective C can be used to refer the name of a method when it is used in a Source-Code message to an Object. It also refers to the unique identifiers that can replace the Name when the Source Code is being Compiled. All the methods that have the same name have the same selector.
57. Enlist Frameworks for Cocoa.
The Frameworks developed for Cocoa are listed as follows:
1. Foundation
2. Application Kit
58. What is Bundle ID?
The Bundle ID uniquely defines every iOS Application. It is specified in Xcode. It is a Search String which is supplied by the Application Developer to match either the Bundle ID of a Single Application or a Set of Bundle IDs for a Group of Applications.
59. What is a Class?
The entire set of data of an object can be made a user-defined data type using a class. Objects are basically variables of Class type. Once a Class has been defined, it is possible to create multiple Objects of its type. A Class is a collection of Objects of similar type.
60. Explain the difference between Inheritance and Category.
Category enables to add methods only. It does not allow the inclusion of Data Members unlike Inheritance where both the Data and Methods can be added. Category includes Complete Application in its Scope whereas Inheritance’s scope is only within that particular File.
61. Explain App Bundle.
During iOS application development, Xcode packages it as a bundle. A Bundle is a file directory that combines related resources together in one place. It contains the Application Executable File and supports Resource Files such as Localized Content, Image Files and Application Icons.
62. What is Swift?
Swift is a programming language for development of applications for OS X, iOS, watchOS, and tvOS. These applications are developed using C and Objective-C. It does not have the constraints of C Programming. It has features for easier development and provides more flexibility.
63. What is a Protocol in Objective-C Programming Language?
A Protocol is used to define a list of required optional methods that a class needs to implement. If a class adopts a protocol, it must implement all the needed methods in the protocols it adopts. It is identical to an Interface in Java and also to a purely Virtual Class in C++. Cocoa uses protocols to support interprocess communication through Objective-C messages.
64. Explain Formal Protocols.
Formal Protocols enables defining an Interface for a Set of Methods without any implementation. It is useful with DistributedObjects as they allow defining a protocol for communication between objects.
65. What is Polymorphism?
It enables a methods to exhibit different behaviours under different instances. The task of creating a Function or an Operator behave differently in different instances is known as Operator Overloading which is an implementation of Polymorphism.
66. Differentiate between Release and Pool Drain.
The release keyword is used to free a memory location in the system which is not being utilized. The drain keyword is used to release the NSAutoreleasePool.
67. What is a Collection?
A Collection is a Foundation Framework Class that is used to Manage and Store the group of Objects. The primary role of a Collection is to store Objects in the form of either a Set, a Dictionary or an Array.
68. Explain the significance of AutoRelease.
AutoRelease: When you send an Object AutoRelease message, it gets added to the Local AutoRelease Pool. When the AutoRelease Pool gets destroyed, the Object will receive a Release
message. The Garbage Collection functionality will destroy the Object if it has the RetainCount as Zero.
69. What is the First Responder and Responder Chain.
A Responder Chain is a hierarchy of Objects that can respond to the events received. The first object in the ResponderChain is called the First Responder.
70. Explain Web Services?
The Web Services are the Application Components which enables communication using Open Protocols. These Web Services are Self – Describing and Self – Contained. Web Services can be found out by using UDDI. The base for development of Web Services functionality is Extensible Markup Language (XML).

We will continuously update  ios interview questions and answers in this site with real time scenarios by ios experts.You can request for ios interview questions and answers pdf  in the Contact us form.

Devops interview questions

Top most important Devops interview questions and answers by Experts:

Here is a list of Top most important Devops interview questions and answers by Experts.If you want to download Devops interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Devops interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Devops ,Register for Devops online training here.

1. How does HTTP work?
The HTTP protocol works in a client and server model like most other protocols. A web browser using which a request is initiated is called as a client and a web server software which responds to that request is called a server. World Wide Web Consortium and the Internet Engineering Task Force are two important spokes in the standardization of the HTTP protocol. HTTP allows improvement of its request and response with the help of intermediates, for example a gateway, a proxy, or a tunnel. The resources that can be requested using the HTTP protocol, are made available using a certain type of URI (Uniform Resource Identifier) called a URL (Uniform Resource Locator). TCP (Transmission Control Protocol) is used to establish a connection to the application layer port 80 used by HTTP.
2. Explain your understanding and expertise on both the software development side and the technical operations side of an organization you’ve worked for in the past.
DevOps engineers almost always work in a 24/7 business critical online environment. I was adaptable to on-call duties and able to take up real-time, live-system responsibility. I successfully automated processes to support continuous software deployments. I have experience with public/private clouds, tools like Chef or Puppet, scripting and automation with tools like Python and PHP, and a background in Agile.
3. Discuss your experience building bridges between IT Ops, QA and development.
DevOps is all about effective communication and collaboration. I’ve been able to deal with production issues from the development and operations sides, effectively straddling the two worlds. I’m less interested in finding blame or playing the hero than I am with ensuring that all of the moving parts come together.
4. What types of testing are needed?
Software teams will often look for the “fair weather” path to system completion; that is, they start from an assumption that software will usually work and only occasionally fail. I believe to practice defensive programming in a pragmatic way, which often means assuming that the code will fail and planning for those failures. I try to incorporate unit test strategy, use of test harnesses, early load testing; network simulation, A/B and multi-variate testing etc.
5. Give me an example of how you would handle projects?
As a professional with managerial responsibilities, I would demonstrate a clear understanding of DevOps project management tactics and also work with teams to set objectives, streamline workflow, maintain scope, research and introduce new tools or frameworks, translate requirements into workflow and follow up. I would resort to CI, release management and other tools to keep interdisciplinary projects on track.
6. What’s your career objective in your role as a DevOps engineer?
My passion is breaking down the barriers and building and improving processes, so that the engineering and operations teams work better and smarter. That’s why I love DevOps. It’s an opportunity to be involved in the entire delivery system from start to finish.
7. How would you make software deployable?
The ability to script the installation and reconfiguration of software systems is essential towards controlled and automated change. Although there is an increasing trend for new software to enable this, older systems and products suffer from the assumption that changes would be infrequent and minor, and so make automated changes difficult. As a professional who appreciates the need to expose configuration and settings in a manner accessible to automation, I will work with concepts like Inversion of Control (IoC) and Dependency Injection, scripted installation, test harnesses, separation of concerns, command-line tools, and infrastructure as code.
8. What is the one most important thing DevOps helps do?
The most important thing DevOps helps do is to get the changes into production as quickly as possible while minimizing risks in software quality assurance and compliance. That is the primary objective of DevOps. However, there are many other positive side-effects to DevOps. For example, clearer communication and better working relationships between teams which creates a less stressful working environment.
9. Which scripting languages do you think are most important for a DevOps engineer?
As far as scripting languages go, the simpler the better. In fact, the language itself isn’t as important as understanding design patterns and development paradigms such as procedural, object-oriented, or functional programming.
10. How do you expect you would be required to multitask as a DevOps professional?
I believe I’ll be expected to:
1. Focus attention on bridging communication gaps between Development and Operations teams.
2. Understand system design from an architect’s perspective, software development from a developer’s perspective,operations and infrastructure from the perspective of a seasoned Systems Administrator.
3. Execute – to be able to actually do what needs to be done.
11. What testing is necessary to ensure that a new service is ready for production?
DevOps is all about continuous testing throughout the process, starting with development through to production. Everyone shares the testing responsibility. This ensures that developers are delivering code that doesn’t have any errors and is of high quality, and it also helps everyone leverage their time most effectively.
12. What’s a PTR in DNS?
Pointer records are used to map a network interface (IP) to a host name. These are primarily used for reverse DNS. Reverse DNS is setup very similar to how normal (forward) DNS is setup. When you delegate the DNS forward, the owner of the domain tells the registrar to let your domain use specific name servers.
13. Describe two-factor authentication?
Two-factor authentication is a security process in which the user provides two means of identification from separate categories of credentials; one is typically a physical token, such as a card, and the other is typically something memorized, such as a security code.
14. Tell us about the CI tools that you are familiar with?
The premise of CI is to get feedback as early as possible because the earlier you get feedback, the less things cost to fix. Popular open source tools include Hudson, Jenkins, CruiseControl and CruiseControl.NET. Commercial tools include ThoughtWorks’ Go, Urbancode’s Anthill Pro, Jetbrains’ Team City and Microsoft’s Team Foundation Server.
15. What are the advantages of NoSQL database over RDBMS?
The advantages are:
1. Less need for ETL
2. Support for unstructured text
3. Ability to handle change over time
4. Breadth of functionality
5. Ability to scale horizontally
6. Support for multiple data structures
7. Choice of vendors
16. What is an MX record in DNS?
MX records are mail exchange records used for determining the priority of email servers for a domain. The lowest priority email server is the first destination for email. If the lowest priority email server is unavailable, mail will be sent to the higher priority email servers.
17. What is the difference between RAID 0 and RAID 1?
RAID 1 offers redundancy through mirroring, i.e., data is written identically to two drives. RAID 0 offers no redundancy and instead uses striping, i.e., data is split across all the drives. This means RAID 0 offers no fault tolerance; if any of the constituent drives fails, the RAID unit fails.
18. How would you prepare for a migration?
Tips to answer: This question evaluates your experience of real projects with all the awkwardness and complexity they bring. Include terms like cut-over, dress rehearsals, roll-back and roll-forward, DNS solutions, feature toggles, branch by abstraction, and automation in your answer. Developing greenfield systems with little or no existing technology in place is always easier than having to deal with legacy components and configuration. As a candidate if you appreciate that any interesting software system will in effect be under constant migration, you will appear suitable for the role.
19. What’s your systems background?
Tips to answer: Some DevOps jobs require extensive systems knowledge, including server clustering and highly concurrent systems. As a DevOps engineer, you need to analyze system capabilities and implement upgrades for efficiency, scalability and stability, or resilience. It is recommended that you have a solid knowledge of OSes and supporting technologies, like network security, virtual private networks and proxy server configuration.
DevOps relies on virtualization for rapid workload provisioning and allocating compute resources to new VMs to support the next rollout, so it is useful to have in-depth knowledge around popular hypervisors. This should ideally include backup, migration and lifecycle management tactics to protect, optimize and eventually recover computing resources. Some environments may emphasize microservices software development tailored for virtual containers. Operations expertise must include extensive knowledge of systems management tools like Microsoft System Center, Puppet, Nagios and Chef. DevOps jobs with an emphasis on operations require detailed problem-solving, troubleshooting and analytical skills.
20. What DevOp tools have you worked with?
Tips to answer: Software configuration management and build/release (version control) tools, including Apache Subversion, Mercurial, Fossil and others, help document change requests. Developers can more easily follow the company’s best practices and policies while software changes.
Continuous integration (CI) tools such as Rational Build Forge, Jenkins and Semaphore merge all developer copies of the working code into a central version. These tools are important for larger groups where teams of developers work on the same codebase simultaneously. QA experts use code analyzers to test software for bugs, security and performance. If you’ve used HP’s Fortify Static Code Analyzer, talk about how it identified security vulnerabilities in coding languages. Also speak about tools like GrammaTech’s CodeSonar that you used to identify memory leaks, buffer underruns and other defects for C/C++ and Java code. It is essential that you have adequate command of the principal languages like Ruby, C#, .NET, Perl, Python, Java, PHP, Windows PowerShell, and are comfortable with the associated OS environments Windows, Linux and Unix.
21. How much have you interacted with cloud based software development?
Tips to answer: Share your knowledge around use of cloud platforms, provisioning new instances, coding new software iterations with the cloud provider’s APIs or software development kits, configuring clusters to scale computing capacity, managing workload lifecycles and so on. This is the perfect opportunity to discuss container-based cloud instances as an alternative to conventional VMs. Event-based cloud computing, such as AWS Lambda offers another approach to software development, a boon for experienced DevOps candidates. In your interview, mention experience handling big data, which uses highly scalable cloud infrastructures to tackle complex computing tasks.
22. What other tools are you familiar with that might help you in this role?
Tips to answer: DevOps is so diverse and inclusive that it rarely ends with coding, testing and systems. A DevOps project might rely on database platforms like SQL or NoSQL, data structure servers like Redis, or configuration and management issue tracking systems like Redmine. Web applications are popular for modern enterprises, making a background with Web servers, like Microsoft Internet Information Services, Apache Tomcat or other Web servers, beneficial. Make sure to bring across that you are familiar with Agile application lifecycle management techniques and tools.
23. Are you familiar with just Linux or have you worked with Windows environments as well?
Tips to answer: Demonstrate as much as you can, a clear understanding of both the environments including the key tools.
24. How can you reduce load time of a dynamic website?
Tips to answer: Talk about Webpage optimization, cached web pages, quality web hosting , compressed text files, Apache fine tuning.
25. Describe your experience implementing continuous deployment?
Tips to answer: Answer with a comprehensive list of all the tools that you used. Include inferences of the challenges you faced and how you tackled them.
26. How would you ensure traceability?
Tips to answer: This question probes your attitude to metrics, logging, transaction journeys, and reporting. You should be able to identify that metric, monitoring and logging needs to be a core part of the software system, and that without them, the software is essentially not going to be able to appear maintained and diagnosed. Include words like SysLog, Splunk, error tracking, Nagios, SCOM, Avicode in your answer.
27. What was your greatest achievement on a recent project?
Tips to answer: Make sure you demonstrate your perfect understanding of both development and operations. Do not let your answer lean towards one particular skillset ignoring the other. Even if you have worked in an environment wherein you had to work more with one skillset, assure the intervewer that you are agile according to the needs of your organization.
28. What problems did you face and how did you solve them in a way that met the team’s goals?
Tips to answer: This questions aims to find out how much you can handle stress and non-conformity at work. Talk about your leadership skills to handle and motivate the team to solve problems together.Talk about CI, release management and other tools to keep interdisciplinary projects on track.
29. Are you more Dev or Ops?
Tips to answer: This is probably the trickiest question that you might face in the interview. Emphasize the fact that this depends a lot on the job, the company you are working for and the skills of people involved. You really have to be able to alternate between both sides of the fence at any given time. Talk about your experience and demonstrate how you are agile with both.
30. What special training or education did it require for you to become a DevOps engineer?
Tips to answer: DevOps is more of a mind-set or philosophy rather than a skill-set. The typical technical skills associated with DevOps Engineers today is Linux systems administration, scripting, and experience with one of the many continuous integration or configuration management tools like Jenkins and Chef. What it all boils down to is that whatever skill-sets you have, while important, are not as important as having the ability to learn new skills quickly to meet the needs. It’s all about pattern recognition, and having the ability to merge your experiences with current requirements. Proficiency in Windows and Linux systems administration, script development, an understanding of structured programming and object-oriented design, and experience creating and consuming RESTful APIs would take one a long way.
31) Explain what is DevOps?
It is a newly emerging term in IT field, which is nothing but a practice that emphasizes the collaboration and communication of both software developers and other information-technology (IT) professionals. It focuses on delivering software product faster and lowering the failure rate of releases.
32) Mention what are the key aspects or principle behind DevOps?
The key aspects or principle behind DevOps is
• Infrastructure as code
• Continuous deployment
• Automation
• Monitoring
• Security
33) What are the core operations of DevOps with application development and with infrastructure?
The core operations of DevOps with
Application development
• Code building
• Code coverage
• Unit testing
• Packaging
• Deployment
With infrastructure
• Provisioning
• Configuration
• Orchestration
• Deployment
34) Explain how “Infrastructure of code” is processed or executed in AWS?
In AWS,
• The code for infrastructure will be in simple JSON format
• This JSON code will be organized into files called templates
• This templates can be deployed on AWS and then managed as stacks
• Later the CloudFormation service will do the Creating, deleting, updating, etc. operation in the stack
35) Explain which scripting language is most important for a DevOps engineer?
A simpler scripting language will be better for a DevOps engineer. Python seems to be very popular.

36) Explain how DevOps is helpful to developers?
DevOps can be helpful to developers to fix the bug and implement new features quickly. It also helps for clearer communication between the team members.
37) List out some popular tools for DevOps?
Some of the popular tools for DevOps are
• Jenkins
• Nagios
• Monit
• ELK (Elasticsearch, Logstash, Kibana)
• io
• Jenkins
• Docker
• Ansible
• Git
• Collectd/Collectl
38) Mention at what instance have you used the SSH?
I have used SSH to log into a remote machine and work on the command line. Beside this, I have also used it to tunnel into the system in order to facilitate secure encrypted communications between two untrusted hosts over an insecure network.
39) Explain how would you handle revision (version) control?
My approach to handle revision control would be to post the code on SourceForge or GitHub so everyone can view it. Also, I will post the checklist from the last revision to make sure that any unsolved issues are resolved.
40) Mention what are the types of Http requests?
The types of Http requests are
• GET
• HEAD
• PUT
• POST
• PATCH
• DELETE
• TRACE
• CONNECT
• OPTIONS

 

We will continuously update devops interview questions and answers in this site with real time scenarios by devops experts.You can request for devops interview questions and answers pdf in the Contact us form.

 

C interview questions

Top most important C interview questions and answers by Experts:

Here is a list of Top most important C interview questions and answers by Experts.If you want to download C interview questions pdf free ,you can register with RVH techguru. Our experts prepared these C interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in C ,Register for C online training here.

 

1) How do you construct an increment statement or decrement statement in C?
There are actually two ways you can do this. One is to use the increment operator ++ and decrement operator –. For example, the statement “x++” means to increment the value of x by 1. Likewise, the statement “x –” means to decrement the value of x by 1. Another way of writing increment statements is to use the conventional + plus sign or – minus sign. In the case of “x++”, another way to write it is “x = x +1?.

2) Some coders debug their programs by placing comment symbols on some codes instead of deleting it. How does this aid in debugging?
Placing comment symbols /* */ around a code, also referred to as “commenting out”, is a way of isolating some codes that you think maybe causing errors in the program, without deleting the code. The idea is that if the code is in fact correct, you simply remove the comment symbols and continue on. It also saves you time and effort on having to retype the codes if you have deleted it in the first place.

3) What is the equivalent code of the following statement in WHILE LOOP format?
[c]
for (a=1; a<=100; a++)
printf (“%d\n”, a * a);
[/c]
[c]
a=1;
while (a<=100) {
printf (“%d\n”, a * a);
a++;
}
[/c]

4) What is spaghetti programming?
Spaghetti programming refers to codes that tend to get tangled and overlapped throughout the program. This unstructured approach to coding is usually attributed to lack of experience on the part of the programmer. Spaghetti programing makes a program complex and analyzing the codes difficult, and so must be avoided as much as possible.

5) In C programming, how do you insert quote characters (‘ and “) into the output screen?
This is a common problem for beginners because quotes are normally part of a printf statement. To insert the quote character as part of the output, use the format specifiers \’ (for single quote), and \” (for double quote).

6) What is the use of a ‘\0′ character?
It is referred to as a terminating null character, and is used primarily to show the end of a string value.

7) What is the difference between the = symbol and == symbol?
The = symbol is often used in mathematical operations. It is used to assign a value to a given variable. On the other hand, the == symbol, also known as “equal to” or “equivalent to”, is a relational operator that is used to compare two values.

8) Which of the following operators is incorrect and why? ( >=, <=, <>, ==)
<> is incorrect. While this operator is correctly interpreted as “not equal to” in writing conditional statements, it is not the proper operator to be used in C programming. Instead, the operator != must be used to indicate “not equal to” condition.

9) Can the curly brackets { } be used to enclose a single line of code?
While curly brackets are mainly used to group several lines of codes, it will still work without error if you used it for a single line. Some programmers prefer this method as a way of organizing codes to make it look clearer, especially in conditional statements.

10) What are header files and what are its uses in C programming?
Header files are also known as library files. They contain two essential things: the definitions and prototypes of functions being used in a program. Simply put, commands that you use in C programming are actually functions that are defined from within each header files. Each header file contains a set of functions. For example: stdio.h is a header file that contains definition and prototypes of commands like printf and scanf.

11) Can I use “int” data type to store the value 32768? Why?
No. “int” data type is capable of storing values from -32768 to 32767. To store 32768, you can use “long int” instead. You can also use “unsigned int”, assuming you don’t intend to store negative values.

12) Can two or more operators such as \n and \t be combined in a single line of program code
Yes, it’s perfectly valid to combine operators, especially if the need arises. For example: you can have a code like ” printf (“Hello\n\n\’World\’”) ” to output the text “Hello” on the first line and “World” enclosed in single quotes to appear on the next two lines.

13) Why is it that not all header files are declared in every C program?
The choice of declaring a header file at the top of each C program would depend on what commands/functions you will be using in that program. Since each header file contains different function definitions and prototype, you would be using only those header files that would contain the functions you will need. Declaring all header files in every program would only increase the overall file size and load of the program, and is not considered a good programming style.

14) When is the “void” keyword used in a function?
When declaring functions, you will decide whether that function would be returning a value or not. If that function will not return a value, such as when the purpose of a function is to display some outputs on the screen, then “void” is to be placed at the leftmost part of the function header. When a return value is expected after the function execution, the data type of the return value is placed instead of “void”.

15) What are compound statements?
Compound statements are made up of two or more program statements that are executed together. This usually occurs while handling conditions wherein a series of statements are executed when a TRUE or FALSE is evaluated. Compound statements can also be executed within a loop. Curly brackets { } are placed before and after compound statements.

16) Write a loop statement that will show the following output:
1
12
123
1234
12345
[c]
for (a=1; a<=5; i++) {
for (b=1; b<=a; b++)
printf(“%d”,b);
printf(“\n”);
}
[/c]

17) What is wrong in this statement? scanf(“%d”,whatnumber);
An ampersand & symbol must be placed before the variable name whatnumber. Placing & means whatever integer value is entered by the user is stored at the “address” of the variable name. This is a common mistake for programmers, often leading to logical errors.

18) How do you generate random numbers in C?
Random numbers are generated in C using the rand() command. For example: anyNum = rand() will generate any integer number beginning from 0, assuming that anyNum is a variable of type integer.

19) What could possibly be the problem if a valid function name such as tolower() is being reported by the C compiler as undefined?
The most probable reason behind this error is that the header file for that function was not indicated at the top of the program. Header files contain the definition and prototype for functions and commands used in a C program. In the case of “tolower()”, the code “#include ” must be present at the beginning of the program.

20) What does the format %10.2 mean when included in a printf statement?
This format is used for two things: to set the number of spaces allotted for the output number and to set the number of decimal places. The number before the decimal point is for the allotted space, in this case it would allot 10 spaces for the output number. If the number of space occupied by the output number is less than 10, addition space characters will be inserted before the actual output number. The number after the decimal point sets the number of decimal places, in this case, it’s 2 decimal spaces.

21) What is wrong with this statement? myName = “Robin”;
You cannot use the = sign to assign values to a string variable. Instead, use the strcpy function. The correct statement would be: strcpy(myName, “Robin”);

22) How do you determine the length of a string value that was stored in a variable?
To get the length of a string value, use the function strlen(). For example, if you have a variable named FullName, you can get the length of the stored string value by using this statement: I = strlen(FullName); the variable I will now have the character length of the string value.

23) Is it possible to initialize a variable at the time it was declared?
Yes, you don’t have to write a separate assignment statement after the variable declaration, unless you plan to change it later on. For example: char planet[15] = “Earth”; does two things: it declares a string variable named planet, then initializes it with the value “Earth”.

24) What are the different file extensions involved when programming in C?
Source codes in C are saved with .C file extension. Header files or library files have the .H file extension. Every time a program source code is successfully compiled, it creates an .OBJ object file, and an executable .EXE file.

25) What are reserved words?
Reserved words are words that are part of the standard C language library. This means that reserved words have special meaning and therefore cannot be used for purposes other than what it is originally intended for. Examples of reserved words are int, void, and return.

26) What are linked list?
A linked list is composed of nodes that are connected with another. In C programming, linked lists are created using pointers. Using linked lists is one efficient way of utilizing memory for storage.

27) What are binary trees?
Binary trees are actually an extension of the concept of linked lists. A binary tree has two pointers, a left one and a right one. Each side can further branch to form additional nodes, which each node having two pointers as well.

28) Not all reserved words are written in lowercase. TRUE or FALSE?
FALSE. All reserved words must be written in lowercase; otherwise the C compiler would interpret this as unidentified and invalid.

29) What is wrong with this program statement? void = 10;
The word void is a reserved word in C language. You cannot use reserved words as a user-defined variable.

30) Is this program statement valid? INT = 10.50;
Assuming that INT is a variable of type float, this statement is valid. One may think that INT is a reserved word and must not be used for other purposes. However, recall that reserved words are express in lowercase, so the C compiler will not interpret this as a reserved word.

31) What is a newline escape sequence?
A newline escape sequence is represented by the \n character. This is used to insert a new line when displaying data in the output screen. More spaces can be added by inserting more \n characters. For example, \n\n would insert two spaces. A newline escape sequence can be placed before the actual output expression or after.

32) What is output redirection?
It is the process of transferring data to an alternative output source other than the display screen. Output redirection allows a program to have its output saved to a file. For example, if you have a program named COMPUTE, typing this on the command line as COMPUTE >DATA can accept input from the user, perform certain computations, then have the output redirected to a file named DATA, instead of showing it on the screen.

33) What is the difference between functions abs() and fabs()?
These 2 functions basically perform the same action, which is to get the absolute value of the given value. Abs() is used for integer values, while fabs() is used for floating type numbers. Also, the prototype for abs() is under , while fabs() is under .

34) Write a simple code fragment that will check if a number is positive or negative.
[c]
If (num>=0)
printf(“number is positive”);
else
printf (“number is negative”);
[/c]

35) What does the function toupper() do?
It is used to convert any letter to its upper case mode. Toupper() function prototype is declared in . Note that this function will only convert a single character, and not an entire string.

36) Which function in C can be used to append a string to another string?
The strcat function. It takes two parameters, the source string and the string value to be appended to the source string.

37) Dothese two program statements perform the same output? 1) scanf(“%c”, &letter); 2) letter=getchar()
Yes, they both do the exact same thing, which is to accept the next key pressed by the user and assign it to variable named letter.

38) What is the difference between text files and binary files?
Text files contain data that can easily be understood by humans. It includes letters, numbers and other characters. On the other hand, binary files contain 1s and 0s that only computers can interpret.

39) is it possible to create your own header files?
Yes, it is possible to create a customized header file. Just include in it the function prototypes that you want to use in your program, and use the #include directive followed by the name of your header file.

40) What is dynamic data structure?
Dynamic data structure provides a means for storing data more efficiently into memory. Using dynamic memory allocation, your program will access memory spaces as needed. This is in contrast to static data structure, wherein the programmer has to indicate a fix number of memory space to be used in the program.

41) The % symbol has a special use in a printf statement. How would you place this character as part of the output on the screen?
You can do this by using %% in the printf statement. For example, you can write printf(“10%%”) to have the output appear as 10% on the screen.

42) What are the advantages and disadvantages of a heap?
Storing data on the heap is slower than it would take when using the stack. However, the main advantage of using the heap is its flexibility. That’s because memory in this structure can be allocated and remove in any particular order. Slowness in the heap can be compensated if an algorithm was well designed and implemented.
43) What will be the output of printf(“%d”)?
The ideal form of printf is printf(“%d”,x); where x is an integer variable. Executing this statement will print the value of x. But here, there is no variable is provided after %d so compiler will show garbage value. The reason is a bit tricky.
When access specifiers are used in printf function, the compiler internally uses those specifiers to access the arguments in the argument stack. In ideal scenario compiler determines the variable offset based on the format specifiers provided. If we write printf(“%d”, x) then compiler first accesses the first specifier which is %d and depending on the that the offset of variable x in the memory is calculated. But the printf function takes variable arguments.
The first argument which contains strings to be printed or format specifiers is mandatory. Other than that, the arguments are optional.So, in case of only %d used without any variable in printf, the compiler may generate warning but will not cause any error. In this case, the correct offset based on %d is calculated by compiler but as the actual data variable is not present in that calculated location of memory, the printf will fetch integer size value and print whatever is there (which is garbage value to us).
44) What is the return values of printf and scanf?
The printf function upon successful return, returns the number of characters printed in output device. So, printf(“A”) will return 1. The scanf function returns the number of input items successfully matched and assigned, which can be fewer than the format specifiers provided. It can also return zero in case of early matching failure.
45) How to free a block of memory previously allocated without using free?
If the pointer holding that memory address is passed to realloc with size argument as zero (like realloc(ptr, 0)) the the memory will be released.
46) How can you print a string containing ‘%’ in printf?
There are no escape sequence provided for ‘%’ in C. To print ‘%’ one should use ‘%%’, like –
printf(“He got 90%% marks in math”);
47) What is use of %n in printf()?
According to man page “the number of characters written so far is stored into the integer. indicated by the int * (or variant) pointer argument.“. Meaning if we use it in printf, it will get the number of characters already written until %n is encountered and this number will stored in the variable provided. The variable must be an integer pointer.
#include<stdio.h>
main()
{
int c;
printf(“Hello%n world “,&c);
printf(“%d”, c);
}
Above program will print ‘Hello world 5 “ as Hello is 5 letter.
48) Swap two variables without using any control statement ?
We can swap variable using 2 methods. First method is as given below
#include <stdio.h>
main()
{
int a = 6;
int b = 10;
a = a + b;
b = a – b;
a = a – b;
printf(“a: %d, b: %d\n”, a, b);
}
Second method to swap variables is given below
#include <stdio.h>
main()
{
int a = 6;
int b = 10;
a ^= b;
b ^= a;
a ^= b;
printf(“a: %d, b: %d\n”, a, b);
}
49) How to call a function before main()?
To call a function pragma startup directive should be used. Pragma startup can be used like this –
#pragma startup fun
void fun()
{
printf(“In fun\n”);
}
main()
{
printf(“In main\n”);
}
The output of the above program will be –
In fun
In main
But this pragma directive is compiler dependent. Gcc does not support this. So, it will ignore the startup directive and will produce no error. But the output in that case will be –
In main
50) What is rvalue and lvalue?
You can think lvalue as a left side operant in an assignment and rvalue is the right. Also, you can remember lavlue as location. So, the lvalue means a location where you can store any value. Say, for statement i = 20, the value 20 is to be stored in the location or address of the variable i. 20 here is rvalue. Then the 20 = I, statement is not valid. It will result in compilation error “lvalue required” as 20 does not represent any location.
51) Which is better #define or enum?
• Enum values can be automatically generated by compiler if we let it. But all the define values are to be mentioned specifically.
• Macro is preprocessor, so unlike enum which is a compile time entity, source code has no idea about these macros. So, the enum is better if we use a debugger to debug the code.
• If we use enum values in a switch and the default case is missing, some compiler will give a warning.
• Enum always makes identifiers of type int. But the macro let us choose between different integral types.
• Macro does not specifically maintain scope restriction unlike enum. For example –
#include <stdio.h>
main()
{
{
#define A 10
printf(“first A: %d\n”, A);
}
{
printf(“second A: %d\n”, A);
}
}
Above program will print –
first A: 10
second A: 10
52) What is the difference between const char* p and char const* p?
In const char* p, the character pointed by pointer variable p is constant. This value can not be changed but we can initialize p with other memory location. It means the character pointed by p is constant but not p. In char const* p, the pointer p is constant not the character referenced by it. So we can’t assign p with other location but we can change the value of the character pointed by p.
53) What is the point of using malloc(0)?
According to C standard, “ If the size of the space requested is zero, the behavior is implementation defined: either a null pointer is returned, or the behavior is as if the size were some nonzero value, except that the returned pointer shall not be used to access an object”. But there is a benefit of this. The pointer return after malloc(0) will be valid pointer and can be deallocated using free() and it will not crash the program.
54) What is function pointer?
Function pointer, as the name suggests, points to a function. We can declare a function pointer and point to a function. After that using that function pointer we can call that function. Let’s say, we have a function Hello which has definition like this –
void Hello(int)
The pointer to that function will look like –
void (*ptr)(int);
Here, ptr is a function pointer that can point to function with no return type and one integer argument. After declaration, we can point to function Hello like this –
void (*ptr)(int) = NULL;
ptr = Hello;
After that we can call that function like this –
(*ptr)(30);
55) Declare a function pointer that points to a function which returns a function pointer ?
To understand this concept, let us look at the following example.
#include<stdio.h>
void Hello();
typedef void (*FP)();

FP fun(int);

main()
{
FP (*ptr)(int) = NULL;
FP p;
ptr = fun;
p = (*fun)(30);
(*p)();
}

void Hello()
{
printf(“Hello\n”);
}

FP fun(int a)
{
FP p = Hello;
printf(“Number is : %d\n”, a);
return p;
}
In this program, we have a function Hello with no return type and no argument. The function fun takes an integer argument and returns a function pointer that can point to Hello(). First we have typdef the function pointer which can point to a function with no return type and argument with identifier FP. That way it will be easier to define the required function pointer. If we avoid typedef the required function pointer (ptr) will look like this –
void (*(*ptr)())(int)
56) What is indirection?
In C when we use variable name to access the value it is direct access. If we use pointer to get the variable value, it is indirection.
57) Can math operations be performed on a void pointer?
No. Pointer addition and subtraction means advancing the pointer by a number of elements. But in case of a void pointer, we don’t know fpr sure what it’s pointing to, so we don’t know the size of what it’s pointing to. That is why pointer arithmetic can not be used on void pointers.

 

 

C++ interview questions

Top most important C++ interview questions and answers by Experts

Here is a list of Top most important C++ interview questions and answers by Experts.If you want to download C++ interview questions pdf free ,you can register with RVH techguru. Our experts prepared these C++ interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in C++ ,Register for C++ online training here.

 

1.What is Boyce Codd Normal form? 
A relation schema R is in BCNF with respect to a set F of functional dependencies if for all functional dependencies in F+ of the form a-> , where a and b is a subset of R, at least one of the following holds:
* a- > b is a trivial functional dependency (b is a subset of a)
* a is a superkey for schema R

2.What is virtual class and friend class? 
Friend classes are used when two or more classes are designed to work together and need access to each other’s implementation in ways that the rest of the world shouldn’t be allowed to have. In other words, they help keep private things private. For instance, it may be desirable for class DatabaseCursor to have more privilege to the internals of class Database than main() has.

3.What is the word you will use when defining a function in base class to allow this function to be a polimorphic function? 
virtual 

4.What do you mean by binding of data and functions? 
Encapsulation.

5.What are 2 ways of exporting a function from a DLL?
1.Taking a reference to the function from the DLL instance.

2. Using the DLL ’s Type Library

6.What is the difference between an object and a class? 
Classes and objects are separate but related concepts. Every object belongs to a class and every class contains one or more related objects.
– A Class is static. All of the attributes of a class are fixed before, during, and after the execution of a program. The attributes of a class don’t change.
– The class to which an object belongs is also (usually) static. If a particular object belongs to a certain class at the time that it is created then it almost certainly will still belong to that class right up until the time that it is destroyed.
– An Object on the other hand has a limited lifespan. Objects are created and eventually destroyed. Also during that lifetime, the attributes of the object may undergo significant change.

7.Suppose that data is an array of 1000 integers. Write a single function call that will sort the 100 elements data [222] through data [321]. 
quicksort ((data + 222), 100); 

8.What is a class? 
Class is a user-defined data type in C++. It can be created to solve a particular kind of problem. After creation the user need not know the specifics of the working of a class.

9.What is friend function? 
As the name suggests, the function acts as a friend to a class. As a friend of a class, it can access its private and protected members. A friend function is not a member of the class. But it must be listed in the class definition.

10.Which recursive sorting technique always makes recursive calls to sort subarrays that are about half size of the original array? 
Mergesort always makes recursive calls to sort subarrays that are about half size of the original array, resulting in O(n log n) time.

11.What is abstraction? 
Abstraction is of the process of hiding unwanted details from the user.

12.What are virtual functions? 
A virtual function allows derived classes to replace the implementation provided by the base class. The compiler makes sure the replacement is always called whenever the object in question is actually of the derived class, even if the object is accessed by a base pointer rather than a derived pointer. This allows algorithms in the base class to be replaced in the derived class, even if users don’t know about the derived class.

13.What is the difference between an external iterator and an internal iterator? Describe an advantage of an external iterator. 
An internal iterator is implemented with member functions of the class that has items to step through. .An external iterator is implemented as a separate class that can be “attach” to the object that has items to step through. .An external iterator has the advantage that many difference iterators can be active simultaneously on the same object. 

14.What is a scope resolution operator? 
A scope resolution operator (::), can be used to define the member functions of a class outside the class.

15.What do you mean by pure virtual functions? 
A pure virtual member function is a member function that the base class forces derived classes to provide. Normally these member functions have no implementation. Pure virtual functions are equated to zero.
class Shape { public: virtual void draw() = 0; };

16.What is polymorphism? Explain with an example? 
“Poly” means “many” and “morph” means “form”. Polymorphism is the ability of an object (or reference) to assume (be replaced by) or become many different forms of object.
Example: function overloading, function overriding, virtual functions. Another example can be a plus ‘+’ sign, used for adding two integers or for using it to concatenate two strings.

17.What’s the output of the following program? Why?
#include <stdio.h>

main()
{
typedef union
{
int a;
char b[10];
float c;
}
Union;

Union x,y = {100};
x.a = 50;
strcpy(x.b,\”hello\”);
x.c = 21.50;

printf(\”Union x : %d %s %f \n\”,x.a,x.b,x.c );
printf(\”Union y :%d %s%f \n\”,y.a,y.b,y.c);
}

Given inputs X, Y, Z and operations | and & (meaning bitwise OR and AND, respectively)
What is output equal to in 
output = (X & Y) | (X & Z) | (Y & Z)

18.Why are arrays usually processed with for loop? 
The real power of arrays comes from their facility of using an index variable to traverse the array, accessing each element with the same expression a[i]. All the is needed to make this work is a iterated statement in which the variable i serves as a counter, incrementing from 0 to a.length -1. That is exactly what a loop does.

19.What is an HTML tag? 
Answer: An HTML tag is a syntactical construct in the HTML language that abbreviates specific instructions to be executed when the HTML script is loaded into a Web browser. It is like a method in Java, a function in C++, a procedure in Pascal, or a subroutine in FORTRAN.

20.Explain which of the following declarations will compile and what will be constant – a pointer or the value pointed at: * const char * 
* char const *
* char * const 

Note: Ask the candidate whether the first declaration is pointing to a string or a single character. Both explanations are correct, but if he says that it’s a single character pointer, ask why a whole string is initialized as char* in C++. If he says this is a string declaration, ask him to declare a pointer to a single character. Competent candidates should not have problems pointing out why const char* can be both a character and a string declaration, incompetent ones will come up with invalid reasons.

21.You’re given a simple code for the class Bank Customer. Write the following functions: 
* Copy constructor
* = operator overload
* == operator overload
* + operator overload (customers’ balances should be added up, as an example of joint account between husband and wife) 

Note:Anyone confusing assignment and equality operators should be dismissed from the interview. The applicant might make a mistake of passing by value, not by reference. The candidate might also want to return a pointer, not a new object, from the addition operator. Slightly hint that you’d like the value to be changed outside the function, too, in the first case. Ask him whether the statement customer3 = customer1 + customer2 would work in the second case.

22.What problems might the following macro bring to the application? 
#define sq(x) x*x

23.Anything wrong with this code?
T *p = new T[10]; 
delete p; 

Everything is correct, Only the first element of the array will be deleted”, The entire array will be deleted, but only the first element destructor will be called.

24.Anything wrong with this code?
T *p = 0;
delete p; 

Yes, the program will crash in an attempt to delete a null pointer.

25.How do you decide which integer type to use? 
It depends on our requirement. When we are required an integer to be stored in 1 byte (means less than or equal to 255) we use short int, for 2 bytes we use int, for 8 bytes we use long int. 

A char is for 1-byte integers, a short is for 2-byte integers, an int is generally a 2-byte or 4-byte integer (though not necessarily), a long is a 4-byte integer, and a long long is a 8-byte integer.

26.What does extern mean in a function declaration?
Using extern in a function declaration we can make a function such that it can used outside the file in which it is defined. 

An extern variable, function definition, or declaration also makes the described variable or function usable by the succeeding part of the current source file. This declaration does not replace the definition. The declaration is used to describe the variable that is externally defined. 

If a declaration for an identifier already exists at file scope, any extern declaration of the same identifier found within a block refers to that same object. If no other declaration for the identifier exists at file scope, the identifier has external linkage.

27.What can I safely assume about the initial values of variables which are not explicitly initialized? 
It depends on complier which may assign any garbage value to a variable if it is not initialized.

28.What is the difference between char a[] = “string”; and char *p = “string”;? 
In the first case 6 bytes are allocated to the variable a which is fixed, where as in the second case if *p is assigned to some other value the allocate memory can change.

29.What’s the auto keyword good for? 
Answer1
Not much. It declares an object with automatic storage duration. Which means the object will be destroyed at the end of the objects scope. All variables in functions that are not declared as static and not dynamically allocated have automatic storage duration by default. 

For example
int main()
{
int a; //this is the same as writing “auto int a;”

Answer2
Local variables occur within a scope; they are “local” to a function. They are often called automatic variables because they automatically come into being when the scope is entered and automatically go away when the scope closes. The keyword auto makes this explicit, but local variables default to auto auto auto auto so it is never necessary to declare something as an auto auto auto auto.

30.What is indirection?
In C when we use variable name to access the value it is direct access. If we use pointer to get the variable value, it is indirection.

31.What is the difference between char a[] = “string”; and char *p = “string”; ? 
Answer1
a[] = “string”;
char *p = “string”;

The difference is this:
p is pointing to a constant string, you can never safely say
p[3]=’x’;
however you can always say a[3]=’x’;

char a[]=”string”; – character array initialization.
char *p=”string” ; – non-const pointer to a const-string.( this is permitted only in the case of char pointer in C++ to preserve backward compatibility with C.) 

Answer2
a[] = “string”;
char *p = “string”;

a[] will have 7 bytes. However, p is only 4 bytes. P is pointing to an adress is either BSS or the data section (depending on which compiler — GNU for the former and CC for the latter). 

Answer3
char a[] = “string”;
char *p = “string”;

for char a[]…….using the array notation 7 bytes of storage in the static memory block are taken up, one for each character and one for the terminating nul character. 

But, in the pointer notation char *p………….the same 7 bytes required, plus N bytes to store the pointer variable “p” (where N depends on the system but is usually a minimum of 2 bytes and can be 4 or more)……

32.How do I declare an array of N pointers to functions returning pointers to functions returning pointers to characters? 
Answer1
If you want the code to be even slightly readable, you will use typedefs. 
typedef char* (*functiontype_one)(void);
typedef functiontype_one (*functiontype_two)(void);
functiontype_two myarray[N]; //assuming N is a const integral 

Answer2
char* (* (*a[N])())()
Here a is that array. And according to question no function will not take any parameter value.

33.What does extern mean in a function declaration? 
It tells the compiler that a variable or a function exists, even if the compiler hasn’t yet seen it in the file currently being compiled. This variable or function may be defined in another file or further down in the current file.

34.How do I initialize a pointer to a function?
This is the way to initialize a pointer to a function

void fun(int a)
{

}

void main()
{
void (*fp)(int);
fp=fun;
fp(1);

}

35.How do you link a C++ program to C functions? 
By using the extern “C” linkage specification around the C function declarations.

36.Explain the scope resolution operator. 
It permits a program to reference an identifier in the global scope that has been hidden by another identifier with the same name in the local scope.

37.What are the differences between a C++ struct and C++ class? 
The default member and base-class access specifier are different.

38.How many ways are there to initialize an int with a constant? 
Two. 
There are two formats for initializers in C++ as shown in the example that follows. The first format uses the traditional C notation. The second format uses constructor notation. 
int foo = 123;
int bar (123);

39.How does throwing and catching exceptions differ from using setjmp and longjmp? 
The throw operation calls the destructors for automatic objects instantiated since entry to the try block.

40,What is a default constructor? 
Default constructor WITH arguments class B { public: B (int m = 0) : n (m) {} int n; }; int main(int argc, char *argv[]) { B b; return 0; }

41.What is a conversion constructor? 
A constructor that accepts one argument of a different type.

42.What is the difference between a copy constructor and an overloaded assignment operator? 
A copy constructor constructs a new object by using the content of the argument object. An overloaded assignment operator assigns the contents of an existing object to another existing object of the same class.

43.When should you use multiple inheritance? 
There are three acceptable answers: “Never,” “Rarely,” and “When the problem domain cannot be accurately modeled any other way.”

44.Explain the ISA and HASA class relationships. How would you implement each in a class design? 
A specialized class “is” a specialization of another class and, therefore, has the ISA relationship with the other class. An Employee ISA Person. This relationship is best implemented with inheritance. Employee is derived from Person. A class may have an instance of another class. For example, an employee “has” a salary, therefore the Employee class has the HASA relationship with the Salary class. This relationship is best implemented by embedding an object of the Salary class in the Employee class.

45.When is a template a better solution than a base class? 
When you are designing a generic class to contain or otherwise manage objects of other types, when the format and behavior of those other types are unimportant to their containment or management, and particularly when those other types are unknown (thus, the generosity) to the designer of the container or manager class.

46.What is a mutable member? 
One that can be modified by the class even when the object of the class or the member function doing the modification is const.

47.What is an explicit constructor? 
A conversion constructor declared with the explicit keyword. The compiler does not use an explicit constructor to implement an implied conversion of types. It’s purpose is reserved explicitly for construction.

48.What is the Standard Template Library (STL)?
A library of container templates approved by the ANSI committee for inclusion in the standard C++ specification. 

A programmer who then launches into a discussion of the generic programming model, iterators, allocators, algorithms, and such, has a higher than average understanding of the new technology that STL brings to C++ programming.

49.Describe run-time type identification.
The ability to determine at run time the type of an object by using the typeid operator or the dynamic_cast operator.

50.What problem does the namespace feature solve? 
Multiple providers of libraries might use common global identifiers causing a name collision when an application tries to link with two or more such libraries. The namespace feature surrounds a library’s external declarations with a unique namespace that eliminates the potential for those collisions. 
This solution assumes that two library vendors don’t use the same namespace identifier, of course.

51.Are there any new intrinsic (built-in) data types? 
Yes. The ANSI committee added the bool intrinsic type and its true and false value keywords.

52.Will the following program execute?
void main()
{
void *vptr = (void *) malloc(sizeof(void));
vptr++;
}

Answer1
It will throw an error, as arithmetic operations cannot be performed on void pointers. 

Answer2
It will not build as sizeof cannot be applied to void* ( error “Unknown size” ) 

Answer3
How can it execute if it won’t even compile? It needs to be int main, not void main. Also, cannot increment a void *. 

Answer4
According to gcc compiler it won’t show any error, simply it executes. but in general we can’t do arthematic operation on void, and gives size of void as 1 

Answer5
The program compiles in GNU C while giving a warning for “void main”. The program runs without a crash. sizeof(void) is “1? hence when vptr++, the address is incremented by 1. 

Answer6
Regarding arguments about GCC, be aware that this is a C++ question, not C. So gcc will compile and execute, g++ cannot. g++ complains that the return type cannot be void and the argument of sizeof() cannot be void. It also reports that ISO C++ forbids incrementing a pointer of type ‘void*’. 

Answer7
in C++
voidp.c: In function `int main()’:
voidp.c:4: error: invalid application of `sizeof’ to a void type
voidp.c:4: error: `malloc’ undeclared (first use this function)
voidp.c:4: error: (Each undeclared identifier is reported only once for each function it appears in.)
voidp.c:6: error: ISO C++ forbids incrementing a pointer of type `void*’

But in c, it work without problems

53.void main()
{
char *cptr = 0?2000;
long *lptr = 0?2000;
cptr++;
lptr++;
printf(” %x %x”, cptr, lptr);
}

Will it execute or not?

Answer1
For Q2: As above, won’t compile because main must return int. Also, 0×2000 cannot be implicitly converted to a pointer (I assume you meant 0×2000 and not 0?2000.) 

Answer2
Not Excute.
Compile with VC7 results following errors:
error C2440: ‘initializing’ : cannot convert from ‘int’ to ‘char *’
error C2440: ‘initializing’ : cannot convert from ‘int’ to ‘long *’

Not Excute if it is C++, but Excute in C.
The printout:
2001 2004 

Answer3
In C++
[$]> g++ point.c
point.c: In function `int main()’:
point.c:4: error: invalid conversion from `int’ to `char*’
point.c:5: error: invalid conversion from `int’ to `long int*’ 

in C
———————————–
[$] etc > gcc point.c
point.c: In function `main’:
point.c:4: warning: initialization makes pointer from integer without a cast
point.c:5: warning: initialization makes pointer from integer without a cast
[$] etc > ./a.exe
2001 2004

54.What is the difference between Mutex and Binary semaphore?
semaphore is used to synchronize processes. where as mutex is used to provide synchronization between threads running in the same process. 

55.In C++, what is the difference between method overloading and method overriding? 
Overloading a method (or function) in C++ is the ability for functions of the same name to be defined as long as these methods have different signatures (different set of parameters). Method overriding is the ability of the inherited class rewriting the virtual method of the base class.

56.What methods can be overridden in Java? 
In C++ terminology, all public methods in Java are virtual. Therefore, all Java methods can be overwritten in subclasses except those that are declared final, static, and private.

57.What are the defining traits of an object-oriented language? 
The defining traits of an object-oriented langauge are:
* encapsulation
* inheritance
* polymorphism

58.Write a program that ask for user input from 5 to 9 then calculate the average 
int main()
{
int MAX=4;
int total =0;
int average=0;
int numb;
cout<<“Please enter your input from 5 to 9”;
cin>>numb;
if((numb <5)&&(numb>9))
cout<<“please re type your input”;
else
for(i=0;i<=MAX; i++)
{
total = total + numb;
average= total /MAX;
}
cout<<“The average number is”<<average<<endl;

return 0;
}

59.Assignment Operator – What is the diffrence between a “assignment operator” and a “copy constructor”? 
Answer1. 
In assignment operator, you are assigning a value to an existing object. But in copy constructor, you are creating a new object and then assigning a value to that object. For example: 
complex c1,c2;
c1=c2; //this is assignment
complex c3=c2; //copy constructor

Answer2. 
A copy constructor is used to initialize a newly declared variable from an existing variable. This makes a deep copy like assignment, but it is somewhat simpler: 

There is no need to test to see if it is being initialized from itself. 
There is no need to clean up (eg, delete) an existing value (there is none). 
A reference to itself is not returned.

60.RTTI – What is RTTI? 
Answer1. 
RTTI stands for “Run Time Type Identification”. In an inheritance hierarchy, we can find out the exact type of the objet of which it is member. It can be done by using: 

1) dynamic id operator 
2) typecast operator 

Answer2. 
RTTI is defined as follows: Run Time Type Information, a facility that allows an object to be queried at runtime to determine its type. One of the fundamental principles of object technology is polymorphism, which is the ability of an object to dynamically change at runtime.

61.STL Containers – What are the types of STL containers? 
There are 3 types of STL containers: 

1. Adaptive containers like queue, stack 
2. Associative containers like set, map 
3. Sequence containers like vector, deque

62.What is the need for a Virtual Destructor ? 
Destructors are declared as virtual because if do not declare it as virtual the base class destructor will be called before the derived class destructor and that will lead to memory leak because derived class’s objects will not get freed.Destructors are declared virtual so as to bind objects to the methods at runtime so that appropriate destructor is called.

63.What is “mutable”?
Answer1. 

“mutable” is a C++ keyword. When we declare const, none of its data members can change. When we want one of its members to change, we declare it as mutable. 

Answer2. 
A “mutable” keyword is useful when we want to force a “logical const” data member to have its value modified. A logical const can happen when we declare a data member as non-const, but we have a const member function attempting to modify that data member. For example: 
class Dummy {
public:
bool isValid() const;
private:
mutable int size_ = 0;
mutable bool validStatus_ = FALSE; 
// logical const issue resolved
};

bool Dummy::isValid() const 
// data members become bitwise const
{
if (size > 10) {
validStatus_ = TRUE; // fine to assign
size = 0; // fine to assign
}
}

Answer2. 
“mutable” keyword in C++ is used to specify that the member may be updated or modified even if it is member of constant object. Example: 
class Animal {
private:
string name;
string food;
mutable int age;
public:
void set_age(int a);
};

void main() {
const Animal Tiger(’Fulffy’,’antelope’,1);
Tiger.set_age(2); 
// the age can be changed since its mutable
}

64.Differences of C and C++
Could you write a small program that will compile in C but not in C++ ? 

In C, if you can a const variable e.g. 
const int i = 2; 
you can use this variable in other module as follows 
extern const int i; 
C compiler will not complain. 

But for C++ compiler u must write 
extern const int i = 2; 
else error would be generated.

65.Bitwise Operations – Given inputs X, Y, Z and operations | and & (meaning bitwise OR and AND, respectively), what is output equal to in? 
output = (X & Y) | (X & Z) | (Y & Z);

66.What is a modifier? 
A modifier, also called a modifying function is a member function that changes the value of  at least one data member. In other words, an operation that modifies the state of an object. Modifiers are also known as ‘mutators’. Example: The function mod is a modifier in the following code snippet:

class test
{
int x,y;
public:
test()
{
x=0; y=0;
}
void mod()
{
x=10;
y=15;
}
};

67.What is an accessor? 
An accessor is a class operation that does not modify the state of an object. The accessor functions need to be declared as const operations

68.Differentiate between a template class and class template.
Template class: A generic definition or a parameterized class not instantiated until the client provides the needed information. It’s jargon for plain templates. Class template: A class template specifies how individual classes can be constructed much like the way a class specifies how individual objects can be constructed. It’s jargon for plain classes.

69.When does a name clash occur? 
A name clash occurs when a name is defined in more than one place. For example., two different class libraries could give two different classes the same name. If you try to use many class libraries at the same time, there is a fair chance that you will be unable to compile or link the program because of name clashes.

70.Define namespace. 
It is a feature in C++ to minimize name collisions in the global name space. This namespace keyword assigns a distinct name to a library that allows other libraries to use the same identifier names without creating any name collisions. Furthermore, the compiler uses the namespace signature for differentiating the definitions.

71.What is the use of ‘using’ declaration. ?
A using declaration makes it possible to use a name from a namespace without the scope operator.

72.What is an Iterator class ? 
A class that is used to traverse through the objects maintained by a container class. There are five categories of iterators: input iterators, output iterators, forward iterators, bidirectional iterators, random access. An iterator is an entity that gives access to the contents of a container object without violating encapsulation constraints. Access to the contents is granted on a one-at-a-time basis in order. The order can be storage order (as in lists and queues) or some arbitrary order (as in array indices) or according to some ordering relation (as in an ordered binary tree). The iterator is a construct, which provides an interface that, when called, yields either the next element in the container, or some value denoting the fact that there are no more elements to examine. Iterators hide the details of access to and update of the elements of a container class.
The simplest and safest iterators are those that permit read-only access to the contents of a container class. 

73.What is an incomplete type? 
Incomplete types refers to pointers in which there is non availability of the implementation of the referenced location or it points to some location whose value is not available for modification. 

int *i=0x400 // i points to address 400
*i=0; //set the value of memory location pointed by i. 

Incomplete types are otherwise called uninitialized pointers.

74.What is a dangling pointer? 
A dangling pointer arises when you use the address of an object after
its lifetime is over. This may occur in situations like returning
addresses of the automatic variables from a function or using the
address of the memory block after it is freed. The following
code snippet shows this:

class Sample
{
public:
int *ptr;
Sample(int i)
{
ptr = new int(i);
}

~Sample()
{
delete ptr;
}
void PrintVal()
{
cout << “The value is ” << *ptr;
}
};

void SomeFunc(Sample x)
{
cout << “Say i am in someFunc ” << endl;
}

int main()
{
Sample s1 = 10;
SomeFunc(s1);
s1.PrintVal();
}

In the above example when PrintVal() function is
called it is called by the pointer that has been freed by the
destructor in SomeFunc.

75.Differentiate between the message and method.
Message:

* Objects communicate by sending messages to each other.
* A message is sent to invoke a method.

Method
* Provides response to a message.
* It is an implementation of an operation.

76.What is an adaptor class or Wrapper class? 
A class that has no functionality of its own. Its member functions hide the use of a third party software component or an object with the non-compatible interface or a non-object-oriented implementation.

77.What is a Null object? 
It is an object of some class whose purpose is to indicate that a real object of that class does not exist. One common use for a null object is a return value from a member function that is supposed to return an object with some specified properties but cannot find such an object. 

78.What is class invariant? 
A class invariant is a condition that defines all valid states for an object. It is a logical condition to ensure the correct working of a class. Class invariants must hold when an object is created, and they must be preserved under all operations of the class. In particular all class invariants are both preconditions and post-conditions for all operations or member functions of the class.

79.What do you mean by Stack unwinding? 
It is a process during exception handling when the destructor is called for all local objects between the place where the exception was thrown and where it is caught.

80.Define precondition and post-condition to a member function. 
Precondition: A precondition is a condition that must be true on entry to a member function. A class is used correctly if preconditions are never false. An operation is not responsible for doing anything sensible if its precondition fails to hold. For example, the interface invariants of stack class say nothing about pushing yet another element on a stack that is already full. We say that isful() is a precondition of the push operation. Post-condition: A post-condition is a condition that must be true on exit from a member function if the precondition was valid on entry to that function. A class is implemented correctly if post-conditions are never false. For example, after pushing an element on the stack, we know that isempty() must necessarily hold. This is a post-condition of the push operation.

81.What are the conditions that have to be met for a condition to be an invariant of the class? 
* The condition should hold at the end of every constructor.
* The condition should hold at the end of every mutator (non-const) operation.

82.What are proxy objects? 
Objects that stand for other objects are called proxy objects or surrogates. 
template <class t=””>
class Array2D
{
public:
class Array1D
{
public:
T& operator[] (int index);
const T& operator[] (int index)const;
};

Array1D operator[] (int index);
const Array1D operator[] (int index) const;
};

The following then becomes legal:

Array2D<float>data(10,20);
cout<<data[3][6]; // fine

Here data[3] yields an Array1D object and the operator [] invocation on that object yields the float in position(3,6) of the original two dimensional array. Clients of the Array2D class need not be aware of the presence of the Array1D class. Objects of this latter class stand for one-dimensional array objects that, conceptually, do not exist for clients of Array2D. Such clients program as if they were using real, live, two-dimensional arrays. Each Array1D object stands for a one-dimensional array that is absent from a conceptual model used by the clients of Array2D. In the above example, Array1D is a proxy class. Its instances stand for one-dimensional arrays that, conceptually, do not exist.

83.Name some pure object oriented languages. 
Smalltalk, Java, Eiffel, Sather. 

84.What is an orthogonal base class? 
If two base classes have no overlapping methods or data they are said to be independent of, or orthogonal to each other. Orthogonal in the sense means that two classes operate in different dimensions and do not interfere with each other in any way. The same derived class may inherit such classes with no difficulty.

85.What is a node class?
A node class is a class that,

* relies on the base class for services and implementation,
* provides a wider interface to the users than its base class,
* relies primarily on virtual functions in its public interface
* depends on all its direct and indirect base class
* can be understood only in the context of the base class
* can be used as base for further derivation
* can be used to create objects.
A node class is a class that has added new services or functionality beyond the services inherited from its base class.

86.What is a container class? What are the types of container classes? 
A container class is a class that is used to hold objects in memory or external storage. A container class acts as a generic holder. A container class has a predefined behavior and a well-known interface. A container class is a supporting class whose purpose is to hide the topology used for maintaining the list of objects in memory. When a container class contains a group of mixed objects, the container is called a heterogeneous container; when the container is holding a group of objects that are all the same, the container is called a homogeneous container.

87.How do you write a function that can reverse a linked-list? 
Answer1:

void reverselist(void)
{
if(head==0)
return;
if(head-<next==0)
return;
if(head-<next==tail)
{
head-<next = 0;
tail-<next = head;
}
else
{
node* pre = head;
node* cur = head-<next;
node* curnext = cur-<next;
head-<next = 0;
cur-<next = head;

for(; curnext!=0; )
{
cur-<next = pre;
pre = cur;
cur = curnext;
curnext = curnext-<next;
}

curnext-<next = cur;
}
}

Answer2:

node* reverselist(node* head)
{
if(0==head || 0==head->next) 
//if head->next ==0 should return head instead of 0;
return 0;

{
node* prev = head;
node* curr = head->next;
node* next = curr->next;

for(; next!=0; )
{
curr->next = prev;
prev = curr;
curr = next;
next = next->next;
}
curr->next = prev;

head->next = 0;
head = curr;
}

return head;
}

88.What is polymorphism? 
Polymorphism is the idea that a base class can be inherited by several classes. A base class pointer can point to its child class and a base class array can store different child class objects.

89.How do you find out if a linked-list has an end? (i.e. the list is not a cycle) 
You can find out by using 2 pointers. One of them goes 2 nodes each time. The second one goes at 1 nodes each time. If there is a cycle, the one that goes 2 nodes each time will eventually meet the one that goes slower. If that is the case, then you will know the linked-list is a cycle.

90.How can you tell what shell you are running on UNIX system?
You can do the Echo $RANDOM. It will return a undefined variable if you are from the C-Shell, just a return prompt if you are from the Bourne shell, and a 5 digit random numbers if you are from the Korn shell. You could also do a ps -l and look for the shell with the highest PID.

91.What is Boyce Codd Normal form? 
A relation schema R is in BCNF with respect to a set F of functional dependencies if for all functional dependencies in F+ of the form a->b, where a and b is a subset of R, at least one of the following holds: 

* a->b is a trivial functional dependency (b is a subset of a)
* a is a superkey for schema R

92.What is pure virtual function? 
A class is made abstract by declaring one or more of its virtual functions to be pure. A pure virtual function is one with an initializer of = 0 in its declaration 

93.Write a Struct Time where integer m, h, s are its members 
struct Time
{
int m;
int h;
int s;
};

94.How do you traverse a Btree in Backward in-order? 
Process the node in the right subtree
Process the root
Process the node in the left subtree

95.What is the two main roles of Operating System? 
As a resource manager
As a virtual machine

96.In the derived class, which data member of the base class are visible? 
In the public and protected sections.

97.Could you tell something about the Unix System Kernel? 
The kernel is the heart of the UNIX openrating system, it’s reponsible for controlling the computer’s resouces and scheduling user jobs so that each one gets its fair share of resources.

98.What are each of the standard files and what are they normally associated with? 
They are the standard input file, the standard output file and the standard error file. The first is usually associated with the keyboard, the second and third are usually associated with the terminal screen.

 

Business analyst interview questions

Top most important Business analyst interview questions and answers by Experts

Here is a list of Top most important Business analyst interview questions and answers by Experts.If you want to download Business analyst interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Business analyst interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Business Analyst,Register for Business Analyst online training here.

 

1) What is a flowchart and why it is important?
Flowchart shows complete flow of system through symbols and diagrams. It is important, because it makes the system easy to understand for developers and all concerned people.
2) Define Use Case Model?
Use case model shows sequence of events and stream of actions regarding any process performed by an actor.
3) What does UML stand for?
It stands for Unified Modeling Language.
4) Do you think Activity Diagram is important and how?
As the name implies, activity diagram is all about system activities. Main purpose of activity diagram is to show various activities taking place in an organization in different departments.
5) Can you name the two types of diagrams heavily used in your field?
The two diagrams are Use Case Diagram and Collaboration Diagram
6) Do you know what is meant by an alternate flow in a use case?
It is the alternative solution or activity in a use case that should be followed in case of any failure in the system.
7) What are exceptions?
These are the unexpected situations or results in an application.
8) What are extends?
Extends are actions that must take place in a use case.
9) Name the two documents related to a use case?
The two documents are FRD (Functional Requirement Document) and SDD (System Design Document).
10) What is the difference between Business Analyst and Business Analysis?
Business Analysis is the process performed by the Business Analyst.
11) As a business analyst, what tools, you think are more helpful?
There are many but I mostly use, Rational Tools, MS Visio, MS Word, MS Excel, Power Point, MS Project.
12) In your previous experience, what kind of documents you have created?
I have worked on, Functional Specification Documents, Technical Specification Documents, Business Requirements Documents, Use Case Diagram etc.
13) What INVEST stands for?
INVEST means Independent, Negotiable, Valuable, Estimable, Sized Appropriately, Testable. It can assist project managers and technical team to deliver quality products/services.
14) Define SaaS?
SaaS means Software as a Service. It is related to cloud computing. It is different from other software as you don’t need this type of software to be installed on your machine. All you need is an Internet connection and a Web Browser to use it.
15) What steps are required to develop a product from an idea?

You have to perform, Market Analysis, Competitor Analysis, SWOT Analysis, Personas, Strategic Vision and Feature Set, Prioritize Features, Use Cases, SDLC, Storyboards, Test Cases, Monitoring, Scalability.
16) What do you think is better, the Waterfall Model or Spiral Model?
It all depends on the type and scope of the project. Also a life cycle model is selected on the basis of organizational culture and various other scenarios to develop the system.
17) How can you explain the user centered design methodology?
It all depends on the end users. In such scenario, we develop the system with a user’s point of view. Who are the end users, what they require etc. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users.
18) How do you define Personas?
Personas are used instead of real users that assist developers and technical team to judge the user behavior in different scenarios, more clearly. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users.
19) Define Application Usability?
Application usability is actually the quality of the system that makes the system useful for its end users. System’s usability is good if it is capable of achieving users’ goals. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users.
20) Explain in your words, what is database transaction?
When we perform any activity in a database, such as addition, deletion, modification, searching etc. is said to be a database transaction.
21) Define OLTP Systems?
OLPT stands for On-Line Transaction Processing; such systems are capable to perform database transactions and are meant to provide good speed for database transactions. These systems are mainly used for data entry and retrieving data from the database.
22) Do you have any idea about Pugh Matrix?
Pugh Matrix is used to decide about the most optimal and alternate solutions. This technique is now a standard part of Six Sigma technique. It is also known as problem or design matrix.
23) What FMEA stands for?
It means Failure Mode and Effects Analysis. It is a failure analysis, that is used mainly in product development, system engineering and operations management. This analysis is performed to figure out various failure modes and their severity in any system.
24) What is a 100-point method?
This method is used to assign priority to different steps in a process. Each group member is supposed to assign points to different steps. In the end all the points for each step are calculated. The step having the highest points has the highest priority.
25) Do you know what 8-omega is?
It is a business framework that is mainly being adopted by firms and organizations for the betterment of their business. Its key factors are Strategy, People, Process, Technology.
26) Can you define mis-use case?
It is a term derived from use-case. Unlike use case, a mis-use case is something that shows -what kind of malicious activities can be performed by an actor that may result in system failure.
27) What is SQUARE stands for?
SQUARE stands for Security Quality Requirements Engineering. It is one of the software engineering steps that mainly focus on documenting the security requirements of the system.
28) What is Pareto Analysis?
It is a decision making technique, also known as 80/20 rule. It is used for quality control and defect resolution. It explains few factors that can be responsible for big problems. It is named as 80/20 rule, because as per this rule, 80 % effects in the system, arises from 20 % causes.
29) Do you have any idea about Agile Manifesto?
Agile Manifesto is a guide for software developers about the development principles to ensure iterative solutions.
30) What BPMN stands for?
It is Business Process Model and Notation. It is a graphical representation of business processes.
31) Define BPMN Gateway?
BPMN Gateway is a processing modeling component that is used to control flow of interaction, sequence of processes.
32) Name the five basic elements’ categories in BPMN?
They are Flow Objects, Data, Connecting Objects, Swimlanes and Artifacts.
33) Have you ever used Kano Analysis in your previous jobs and how do you define it?
Yes, I have used Kano Analysis in one of my previous jobs. Kano Analysis is used to analyze a system in terms of its requirements to identify its impact on customers’ satisfaction.
34) How many key areas are there in a Kano Analysis?
They are three in number, namely as Unexpected Delighters, Performance Attributes and Must Have Attributes.
35) Define Pair-Choice Technique?
The pair-Choice Technique is used to give priority to various items in a process. It is mainly used when distinctive stakeholders are involved in the project. This technique asks from the group to compare each item with the other and select the one having highest priority.
36) Do you have suggestions to make an effective use-case model?
Yes, I would suggest making two separate diagrams. One serves as a use-case and the other serves as an actor diagram. So that we can highlight all the possible activities in a use case & in actor diagram and then we can merge both the diagrams to get an effective use-case diagram.
37) How many types of actor can be there in a Use-Case?
There are primary and secondary actors. Primary actors start the process and secondary actors assist them. Moreover, actors can be of four types such as Human, System, Hardware and Timer.
38) Define BCG Matrix?
The Boston Consulting Group (BCG) matrix is developed to analyze several of business processes and new product offerings from companies. It is a useful tool that can be used in portfolio analysis, strategic management, product management, and brand marketing.
39) How can you differentiate between pool and swimlane?
A swimlane is related to group activities on an activity diagram while a pool is dedicated activity to a single person.
40) Differentiate between Fish Model and V Model?
Fish model is comparatively very costly and time consuming, while, V model requires less time and cost. Moreover, Fish model is used when there were no ambiguities in the customers’ requirements. Otherwise, other model is preferred.
41) How do you manage frequently changing customers’ requirements while developing any system?
As a business analyst, I would develop a document stating clearly that no change will be accepted after a certain period of time and get it signed by the user.
42) Define Use Case points?
Use Case points are used to evaluate the cost of work done to develop the system.
43) What does PEST stand for?
It means Political, Economic, Social, and Technological. It is used to analyze business environment, in which it has to be operated.
44) Name the four key phases of business development?
They are Forming, Storming, Norming, and Performing.
45) Define Benchmarking?
Benchmarking is about measuring performance of an organization to compete in the industry. In this process a company may measure its policies, performance, rules and other measures.
46) What do we mean by SWEBOK?
It means Software Engineering Body of Knowledge.
47) What do you know about GAP Analysis?
It is a process of comparing and determining the difference between two things or processes.
48) Define Agile?
Agile is basically a technique that uses several light-weight methodologies such as Rapid Application Development (RAD), Extreme Programming (XP) and SCRUM. All these methodologies focus on the development of iterative solutions.
49) Define Scrum Method?
It is one of the agile methods, used to develop iterative information systems. In this method a small team works on the assigned tasks for a time period of 30 days usually.
50) What does JAD stand for?
It means Joint Application Development.
51) What do you see as the key skills of a business analyst?
There are several skills required to be a successful Business Analyst. They are not just linited to your work. These skills even include your personal qualities and approach towards your clients. Some of the key skills expected from any Business Analyst are:
• Customer Service skills
• Strategic thinking approach
• Good communication skills
• Collaborating with other employees and colleagues
• Analytical skills
• Leadership skills
• Customer oriented
• Ability to drive and adapt to the changes.
52) What is a use case model?
A business analysis presentation of the steps involved in defining the interactions between a user (actor) and a system (computer system) is termed as use case model. It gives details on the interactions and sets the expectations of how the user will work within the system. The use case model consist of 2 main elements:
• Use case diagram – It is a graphical representation that details which actors can operate which use cases
• Use case description – It is a detailed textual step by step presentation of interactions and dialogue between the actor and the system.
53) What is an activity diagram and why is it significant?
An activity diagram is a simple and intuitive type of a flow chart which enables analysts to present a robust and easy visual of the workflow of a business use case. The objective of activity diagram is to show various activities taking place in an organization in different departments. Different departments in any organization like HR, Accounts, Sales, etc. have access to the screens that relate to their fields but activity diagrams highlight the differences in the departments which help the developers when they code and design. The important elements in Activity diagram are initial nodes, control flows, activities, decisions, guard conditions, a fork and join and end nodes.
54) Define SaaS?
SaaS stands for Software as a Service. It is related to cloud computing. It is an online software for which you just need an internet connection and a web browser. Unlike other softwares, you need not have to install it on your machine. SaaS is a software delivery model in which the software, and usually the data, are hosted “in the cloud”.
55) What is a BCG Matrix?
To evaluate and analyze the business units and product offerings of corporations, the Boston Consulting Group developed the BCG Matrix in 1986. Companies use this simple 2 x 2 matrix as an analytical tool in portfolio analysis, strategic management, product management, and brand marketing.

Question Marks: These are the business having low market share in a fast growing market. As the market growth is strong, there is a potential for Question Marks to grow. They require large amounts of capital to gain in market share.
Stars: These businesses enjoy large market share in fast growing market. Stars boast a prominent market position for the time. They require investment of resources to maintain or increase their market share if the market continues to grow.
Dogs: These businesses have a low market share in a slow growing and mature market. They are small projects with small amount of capital allocated to support them. They barely make enough to sustain themselves and are the weakest of situations.
Cash Cows: These businesses enjoy a relatively high market share with a low market growth. It represents the already matured market and the business is well established and positioned in the market. These businesses generate revenue which is in excess of what is required for sustenance.
56) What is PEST analysis and what is its importance?
PEST basically stands for Political, Economic, Social and Technological. PEST analysis is used to assess the above four external factors in relation to your business situation. It is beneficial for your business as them help in understanding how these 4 factors will affect your business in the long term. A detailed understanding of PEST analysis can be obtained from our blog.
57) What do you know about GAP Analysis and what is its importance?
GAP analysis is the process of comparing the current state and the proposed state of any business and its functionalities. It comes under the Enterprise Analysis which is a knowledge area of a business Analyst. It helps in determining what steps need to be taken to meet the proposed state requirements for the business. In simple language it can be defined as a gap between 2 questions – ‘Where we are?’ and ‘Where we want to be?’
This analysis can be conducted for:
• How the Current business process activities and steps are vs how will be the future business process activities and steps.
• How the data that a system provides to an interface is now vs how the data needs to be provided in the future
• How well a business meets certain goals and metrics now versus the targeted goals and metrics in the future.
58) What is UML modeling?
UML is Unified Modeling Language. UML is the standard that the industry uses for visualizing, documenting and constructing various components of a system. It is a modeling standard used primarily for software development, but can also be used for other conceptual models such as describing job roles, business processes and organizational functions. For Business Analysts UML is being able to represent requirements with use cases, class diagram and state diagrams. For Business Analysts, the important part of understanding UML is in understanding the diagram tools and when and how to use them best.
59) What is the importance of a flow chart?
A flow chart is a tool that provides a graphical representation of a process. This chart will make a system easy to understand for everyone that is involved with the project that is underway. If you have a massive and complex project with many entities, data, data sources, data destinations and processes involved, a data flow chart is one of the most effective ways of making sense of all that data. The flowchart mostly concerns itself with the flow of data through the system. It is popularly used in Structured Systems Analysis and Design.

 

Microstrategy interview questions

 Top most important Microstrategy interview questions and answers by Experts:

Here is a list of Top most important Microstrategy interview questions and answers by Experts.If you want to download Microstrategy interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Microstrategy interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Microstrategy ,Register for Microstrategy online training here.

 

1) What are different types of metrics available in microstrategy?
Level Metric: Level metric defined the level at which the metric aggregates. By default it is the report level. This is a bit huge concept and more information could be found in the manuals.

Transformation Metric: Transformation applied to a metric. Transformation is a schema object which is used in a metric for time based analysis (Example: Year-over-Year, Month-to-Date, Year-to-Date, etc.). There are two types of transformation – table based and expression based.

Pass through Metrics: Metric created using pass through functions (example: ApplySimple). Pass through functions are executed at the database level.

Adaptive Metric: A metric defined on a fact which is mapped to two columns in two tables (detail and aggregate) with different functions applied on both the colu mns. This is achieved with pass through functions (ApplySimple and ApplyAgg).

Non-aggregate metric: By default metrics aggregate to a higher level based on the attributes on a report, the default aggregate function is “sum”. This aggregation can be set to none, so that the metric does not aggregate to any level.

Smart Metric: When a compound metric is defined with other metric objects using arithmetic operatic (like sum(M1/M2)) the sub total of the metric can be calculated in multiple ways. Case where they are calculated row by row are smart metric. Example: In the above example, if the total are calculated using the mentioned expression, it is defined as smart metric – “Sum (M1) / Sum (M2)”

Derived Metric: A metric created within a report (local to that report) using the report objects of the same report. Derived metric are OLAP services and are calculated on the I-Server and do not reflect in the SQL. Example: If a report has two metrics, M1 and M2. A derived metric can be defined as M1+M2 or M1/M2 and so on.

Embedded Metric: Embedded metrics are objects whose definitions and object IDs are unique to and exist only in the context of the MicroStrategy Report in which they reside. An embedded metric will have a different object ID than that from which it originated. As its name implies, an embedded metric does not exist outside the report object. In other words, that particular object’s definition and ID do not exist independently in the metadata object info and object definition tables and, therefore, cannot be used in other reports. Instead, the report definition contains an “embedded objects” folder as part of its definition (not a freestanding folder), and the embedded metric exist only in this folder. This is not an Derived metric. Embedded metrics are created when there exists a prompted filter in a conditional metric and where the report is saved after answering those prompts. The metric will have same definition as that of original metric but its ID will be different than that of the original metric. Hence any changes made to the original metric will not be reflected to the report. You need to remove the embedded metric and add again the original metric  1. What is MicroStrategy Intelligence Server™?MicroStrategy Intelligence Server is the industry’s most advanced, secure and scalable business intelligence server.

2) What does MicroStrategy Intelligence Server allow users to do?
MicroStrategy Intelligence Server provides reporting and OLAP analysis for the whole enterprise. All business users can obtain scorecards and dashboards, operational reports, queries and OLAP and predictive analyses without learning any programming or database syntax.

3) What are the benefits of using MicroStrategy Intelligence Server?
MicroStrategy Intelligence Server provides one centralzed architecture for all users’ monitoring, reporting and analysis requirements. MicroStrategy Intelligence Server also provides scalability to analyze any amount of data, support for any number of users and a 24 X 7 operating environment, with robust security.

4) Does MicroStrategy Intelligence Server run on Windows®, UNIX®, or Linux®?
 MicroStrategy Intelligence Server is certified on Windows, UNIX, and Linux operating systems. MicroStrategy Intelligence Server has been designed to be a completely open architecture built on industry standards and compiled to run on multiple operating systems.

5) How do you ensure simultaneous releases across multiple operating systems?
 MicroStrategy Intelligence Server is engineered to be platform-independent on a single code base and is simply compiled appropriately for each certified operating system. As a result, MicroStrategy can release Intelligence Server on all certified operating systems at the same time with the same features.

6) Does MicroStrategy Intelligence Server run on 32-bit and 64-bit systems?
 Yes. MicroStrategy Intelligence Server provides an industry first — a common code base architecture for all supported 32- and 64-bit operating systems. This single code base ensures that the latest functionality is always available on all these operating systems at the same time.

7) What are the advantages of running a BI server on a 64-bit operating system?
 A BI application can access much greater memory resources when running on a 64-bit systems than it could on a 32-bit system. More addressable memory results in more BI applications, more sophisticated applications, more reports, larger reports, better performance and more users — all with fewer servers. Organizations can combine MicroStrategy’s industry leading scalability with the advantages of 64-bit UNIX to deploy the richest BI applications, with the highest performance and the most users.

8) Do users need to learn any programming languages or database syntax to run business queries?
No, business users can run any query without learning any programming languages or database syntax. MicroStrategy Intelligence Server automatically and appropriately processes all business questions by accessing a report cache or Intelligent Cube, or by generating dynamic SQL or MDX that is optimized to each data source platform.

9) Can I deploy a single BI application in multiple languages?
 Yes. Every component of a BI application can be translated and presented in multiple languages, including all MicroStrategy user interfaces, metadata objects such as the names of reports and documents, and data within a data warehouse.

10) Can I access multiple data sources transparently from a single data model?
Yes. MicroStrategy MultiSource Option is a new and fully integrated add-on component of MicroStrategy Intelligence Server. It allows users to seamlessly report, analyze, and monitor data across multiple sources through a single business model.

11)  What is a cache?
 A cache contains the properties and data of a report once a report has been run. Caches can be stored in memory and/or on disk. When users ask for a report that is cached, the Intelligence Server will retrieve the data from disk or memory instead of running a query on the data source. Cache creation and usage securely leverages other users’ work, increases query performance and reduces the workload on the data warehouse.

12) What are Intelligent Cubes?
Intelligent Cubes are in-memory caches stored by the Intelligence Server. While accessing an Intelligent Cube, users can easily add or remove report objects (such as attributes and metrics), add new metric calculations and filter their view of the data — all in an ad hoc fashion with speed-of-thought response times. Data stored outside an Intelligent Cube is automatically accessed using the ROLAP engine when drilling to more details.

13) Can MicroStrategy Intelligence Server access any amount of data?
Yes. MicroStrategy Intelligence Server can scale to any amount of data by leveraging your database’s strengths. Using Very Large Database (VLDB) drivers, MicroStrategy Intelligence Server automatically tunes its operations to leverage the unique strengths of your database software and hardware.

14) Can MicroStrategy Intelligence Server scale easily and cost effectively based on my growing needs?
Yes. MicroStrategy Intelligence Server provides out-of-the-box clustering capabilities that allow corporations to leverage their initial investments and gradually scale as more users and data are added to the system, or when different styles of BI are required.

15) Can my users perform on-demand analysis without any downtime?
Yes. MicroStrategy Intelligence Server provides complete fault tolerance and fail-over support to maximize the uptime of your application.

16) Will my users get the performance they need?
 Yes. MicroStrategy Intelligence Server maximizes system performance at all layers of your system. Intelligence Server:

· Leverages the unique strengths of each database software and hardware using VLDB drivers.

· Uses four levels of report and dataset caching to optimize performance for documents, reports, analyses and prompt lists.

· Increases analytic performance with its Intelligent Cubes. Users or administrators can schedule creation or refreshing of    Intelligent Cubes during low usage time periods.

· Minimizes network traffic by sending users only the result sets they want to view.

17) What types of analysis does MicroStrategy Intelligence Server support?
MicroStrategy Intelligence Server users can easily perform simple to sophisticated analysis such as basic performance indicators, market basket, churn, retention and decile analysis. Users can make use of a complete library of statistical, mathematical, financial and OLAP functions. Other types of analysis include hypothesis testing, regressions, neural networks, decision tress, clustering and bond calculations.

18) Can I use my homegrown functions or integrate with existing third-party statistical and data mining software?
Yes. MicroStrategy Intelligence Server allows enterprises to integrate their homegrown functions as well as third-party software using an advanced plug-and-play architecture. Predictive Models created by third-party data mining software can also be imported using PMML (Predictive Markup Language).

19) What type of security does MicroStrategy Intelligence Server provide?
 MicroStrategy Intelligence Server provides a highly robust security model at four different layers in your system:

1.User level – Login and ID authentication ensure users have authorization to access the     MicroStrategy system.

2.  Application level – Access control lists and user privileges ensure proper access to MicroStrategy objects and functionality.

3. Data transmission level – Encryption and dual firewall configuration ensure safe transmission of data.

4. Data level – Security filters ensure users access only the data they have authorization to view.

20) Can users access MicroStrategy Intelligence Server using LDAP, data source or Windows authentication?
 Yes. MicroStrategy Intelligence Server integrates with LDAP and Windows security systems. Users will only need to login with their LDAP or Windows login to access MicroStrategy projects through Intelligence Server.

21) Can my administrator easily maintain and manage MicroStrategy Intelligence Server?
Yes. MicroStrategy Intelligence Server’s centralized architecture provides one console from which all maintenance and administration can be performed. In addition, a standardized data dictionary for enterprise reporting and OLAP analysis is stored in a metadata repository and enables reusable reporting objects and business rules.

22) Does MicroStrategy have Windows- or UNIX-based administration tools?
MicroStrategy has both Windows- and UNIX-based administration tools. UNIX and Linux administration is provided through a Java-based Control Center. Both the Windows administration tools and the Java-based Control Center provide local or remote administration and monitoring of all Intelligence Servers in the BI implementations.

23) What are the supported languages for MicroStrategy Intelligence Server?
MicroStrategy Intelligence Server is available in English (US and UK), French, German, Spanish, Italian, Portuguese (Brazilian), Swedish, Chinese (Simplified and Traditional), Korean and Japanese.

24) Does MicroStrategy Intelligence Server integrate with other system management software?
 Yes. MicroStrategy Intelligence Server integrates with other system management software. In fact, all inner statistics of Intelligence Server are published to Performance Monitor and diagnostic logs. As a result, third-party system management software such as IBM® Tivoli® or CA’s Unicenter® can remotely monitor these statistics.

25) Does MicroStrategy Intelligence Server support scheduling? 
Yes, MicroStrategy Intelligence Server supports time-based and event-based schedules. These schedules automatically trigger report execution and place a notification message in the user’s History folder upon completion.

26) Why is MicroStrategy Intelligence Server better than competitor’s products?
MicroStrategy Intelligence Server wins over its competitors because it solves all issues that corporations face when implementing a query, reporting and analysis solution. MicroStrategy Intelligence Server provides the solutions required for a successful enterprise business intelligence system: full range of analysis, support for any number of users, support for any amount of data, iron-clad security, world-class reliability, easy administration and maintenance, and high performance.

27) How long does it take to deploy MicroStrategy Intelligence Server?
 MicroStrategy Intelligence Server installs in minutes and automatically presents a configuration wizard to connect to the database. Within an hour, the installation and setup can be completed.

28) Can Intelligence Server integrate with my existing data structure?
Yes. MicroStrategy Intelligence Server easily integrates with your existing data structure with its support for the major types of schemas like Star, Snowflake, Hybrid, Denormalized, Normalized and Aggregated Schema. MicroStrategy Intelligence Server also integrates with SAP® BW InfoCubes and QueryCubes.

29) How does Intelligence Server integrate with the rest of the MicroStrategy platform?
MicroStrategy Intelligence Server is the analytical server that processes all requests from all MicroStrategy end users. Intelligence Server is the central product that links all MicroStrategy components to the data warehouse.

30) What data sources does MicroStrategy Intelligence Server support?
 MicroStrategy Intelligence Server can access data in all major databases including Oracle®, IBM DB2®, Microsoft® SQL Server, Microsoft Access®, Microsoft Excel®, Teradata®, Sybase®, Red Brick®, Informix®, HP NeoView, HP NonStop SQL/MP, Netezza®, MySQL, PostgreSQL, Greenplum, Kognito, Vertica, Aster nCluster, text files, and other ANSI-92 compatible relational databases. It can also access multidimensional data sources such as SAP BW, Hyperion Essbase, and Microsoft Analysis Services. Additionally, Intelligence Server can access data from EII sources including Composite, Oracle Transparent Gateways, IBM WebSphere Information Integrator, and MetaMatrix.

31) To save time, can many reports be run at the same time and at the user level?
 Yes. MicroStrategy Intelligence Server can execute multiple reports simultaneously. When report results are ready they are saved in a personal History folder.

32) Does MicroStrategy Intelligence Server support XML? 
Yes. MicroStrategy Intelligence Server uses XML to transfer data. This enables organizations to present information from Intelligence Server to end users through multiple mediums including the Web, email and web services.

33) How can I create statements, report books, or dashboard books in MicroStrategy?
 Users have the ability to maintain separate documents and combine them into a single, finalized document (report book, statement, or dashboard book). The individual documents can be maintained by different users and they can have the following unique qualities:

·  Page groupings
·  Layout
·  Page Orientation
·  Vertical or horizontal repeating sections
·  Conditional formatting
·  Pagination
·  Datasets

Enabling users to group together multiple documents into one makes it significantly easier to develop and maintain individual pieces of the unified document.

34) What OLAP capabilities do I have within a MicroStrategy Report Services document?
 Users have the ability to drill within the document, drill anywhere, or disable drilling. Drilling capabilities can be applied to a grid or graph, enabling users to perform an investigative analysis directly on a dashboard, scorecard, or enterprise report. Users can drill out of the dashboard to investigate across the data warehouse or multiple data sources and generate new information-rich reports.Using the multi-select feature, business users can dynamically select any group of elements and create derived element groups on the fly. Elements can be removed or added dynamically and users can create their own calculations between various groups or individual items.

35) I want only one version of the dashboard to view in Flash and DHTML (AJAX), but I have Flash-advanced visualizations in the dashboard. How can I design this dashboard for DHTML? 
Only one design of the dashboard is required. Flash-advanced visualizations have flash plug-ins that are maintained within the container of the advanced visualization. Flash-advanced visualizations can be rendered in both Flash and DHTML, and the same controls are made available to users, enabling a seamless integration between Flash and DHTML design.

36) How can users design dashboards quickly and without programming experience or training?
 MicroStrategy offers out-of-the box templates that provide a great starting point for dashboard designers. Each template contains a series of containers, or panel stacks, that enable users to quickly add components to each panel stack, such as: text boxes, shapes, reports, grids, graphs, panel stacks, HTML containers, selectors, and widgets. Also, pre-formatted customized templates can be created to place the design experience in the hands of end-users. These pre-formatted templates can include the corporate logo and color layout. Users can simply drag, drop, and select dashboard components to quickly design a dashboard in the matter of minutes.

37) Are there any special requirements needed to move objects across projects? 

Yes. In order to perform cross-project operations, the projects involved must originate from the same source project. In other words, the projects can only be related by the duplication of a single project. This ensures that the projects have a similar set of schema and application objects, and that the object ID’s in the two projects are the same. MicroStrategy Object Manager uses the object and version ID’s across the projects to perform comparisons.MicroStrategy Object Manager prevents the user from attempting operations across unrelated projects.

38) How does MicroStrategy Object Manager determine if two projects are related? 
MicroStrategy Object Manager compares the Schema ID’s of the two projects. Duplicated projects have different Project ID’s, but their Schema ID’s are the same.
39) What is the Conflict Resolution Window? 

The Conflict Resolution window provides the user with a means to decide how to handle object conflicts between the source project and the destination project. In addition, the Conflict Resolution window displays the object name in the original project, the object name in the destination project and the type of conflict. Users may also specify a new name for the object depending on the action chosen
40) How does MicroStrategy Object Manager determine if two objects in different projects are the same? 
To determine if two objects are the same, MicroStrategy Object Manager compares their Object ID’s. If these ID’s are the same, MicroStrategy Object Manager then compares the Version ID’s. If the Version ID’s are the same, the Conflict Resolution grid lists the conflict as ‘Exists Identically.’ If the Version ID’s are different, the Conflict Resolution grid lists the conflict as ‘Exists Differently.’
41) How can the user determine the Object ID of an object? 

To view the Object ID of an object, right-mouse click on the object and select ‘Properties.’ The Object ID and Version ID are listed on the ‘General’ tab.
42) Why does MicroStrategy Object Manager search for object dependencies? 
MicroStrategy Object Manager makes a list of all object dependencies before copying an object to prevent metadata inconsistency. The time required for dependency checking varies based on a customer’s metadata size and schema complexity. For large metadata and complex schemas, gathering all the dependencies may take a long time.
43) Can schema objects be copied across projects with MicroStrategy Object Manager? 

Yes, schema objects can be copied across projects using MicroStrategy Object Manager. MicroStrategy Object Manager moves objects seamlessly between similar projects such as from a development project version to a production project version where the warehouses are the same in terms of views, prefixes, and warehouse structure. However, subtle changes in the warehouse that relate to prefixes, views, or table structure cannot be tracked by MicroStrategy Object Manager. For situations where the projects’ warehouse structures or setups are dissimilar, users may be required to make further edits of the objects to ensure full integration into the destination project. These edits may include hierarchical relationship changes or modifications to the prefixes.
44) How does MicroStrategy Object Manager integrate with the MicroStrategy Product Suite security model? 

Security in MicroStrategy Object Manager is based on the MicroStrategy 7.x Product Suite security model. All activities that can be performed in MicroStrategy Object Manager are governed by privileges and access control lists. For example, if a user is not allowed to access a certain folder in MicroStrategy Agent, they will not be able to access the folder in MicroStrategy Object Manager.
45) Is it possible to use MicroStrategy Object Manager while other users are making changes in MicroStrategy Agent? 
Using MicroStrategy Object Manager to copy/move objects around is not recommended while other user sessions are making changes using MicroStrategy Agent, as it could lead to metadata inconsistency. Project and schema locking prevent multiple users sessions from manipulating the schema at the same time. This prevents metadata inconsistency from occurring.
46) What are the tracing options available in MicroStrategy Object Manager? 

Tracing is available under the Tools/Diagnostics menu. These tracing options apply to every MicroStrategy product installed on the machine.To see the SQL that has been executed against the metadata, go to the Advanced tab and turn on ‘SQL Tracing’ under the DSS MDServer key.Function level tracing can be accomplished by going to the Advanced tab and turning on ‘Function Level Tracing’ under the DSS ObjectManager key.
47) Where are dependent objects copied if they do not already exist in the destination project? 

If the location exists in the destination project, the dependent object is copied to that location. If the location does not exist in the destination project, a new folder entitled ‘Dependencies’ is created and the object is copied to that folder.
48) What happens if the owner of an object does not exist in the destination project? 

If the owner of the source object does not exist in the destination project, the user login for the destination project takes ownership of the object when it is copied or replaced.
49) Where can users find more information on MicroStrategy Object Manager? 
Further information can be found in the release notes, as well as in MicroStrategy Object Manager’s online help.
50) Does MicroStrategy Web support clustering via Cisco Local Router or any other third-party clustering software?
MicroStrategy Web relies on third-party web-clustering software to provide clustering functionality. MicroStrategy Web is designed to be stateless so that each individual MicroStrategy Web node can function without the knowledge of the existence of other nodes. Therefore, any third-party software used to cluster web servers can be used.
51) What information is shared by the application across MicroStrategy Web nodes?
MicroStrategy Web is designed to be as stateless as possible. Therefore, no information is shared by the MicroStrategy Web application across cluster nodes. All state information for running jobs is pushed to the client browser.When a report is submitted by a MicroStrategy Web user, the user will receive a wait page in the client browser. This wait page will poll the MicroStrategy Web Server periodically for the status of the report. This polling is performed as new http requests. This http request will contain all state information, including encrypted login information and MicroStrategy Intelligence Server connection information.

52) Is MicroStrategy Web “cluster-aware”?
The MicroStrategy Web application is designed so that each MicroStrategy Web cluster node does not need to know that it is a member of a cluster. MicroStrategy Web is designed to be stateless, so that each client http request can be processed individually without having to persist information within the MicroStrategy Web application. Therefore, third-party Web-server clustering software can be used to cluster together multiple web servers running MicroStrategy Web.

53) Should MicroStrategy Web be specifically configured to access a MicroStrategy Intelligence Server cluster?
No. When the administrator configures MicroStrategy Web to access a particular MicroStrategy Intelligence Server, the MicroStrategy Web application will automatically detect that the MicroStrategy Intelligence Server is a member of a cluster. Once this detection is made, MicroStrategy Web will automatically add all the other members of the same cluster into the pool of available MicroStrategy Intelligence Servers.

54) What information is shared by the application across MicroStrategy Intelligence Server nodes?
Report caches are shared in a cluster and Object caches on each MicroStrategy Intelligence Server node are synchronized.

55) Is a copy of each report cache retained in each MicroStrategy Intelligence Server node?

No. Each MicroStrategy Intelligence Server retains a lookup table with information about the existence and location of report caches. When a cluster node creates a report cache, information about the location of the new cache is shared with the other cluster nodes. Each cluster node then updates its own lookup table with the location of the new cache.

56) If a MicroStrategy Intelligence Server node crashes, will report caches be lost?
Although report caches will not be lost, access to report caches may be affected, depending on the way in which the report cache is configured.If a separate file server is used as a common report cache repository for all MicroStrategy Intelligence Server cluster nodes, then the loss of a cluster node will not affect access to the report cache by other nodes.If the cluster is configured such that each node locally hosts the report cache created by that node, then those report caches residing in the lost node will naturally be inaccessible. If any report cached in that lost node is requested, then another node within the cluster will re-run and re-cache the report. When the cluster node is recovered and rejoined into the cluster, all report caches in that cluster node will be made available again to the rest of the cluster.
57) If a MicroStrategy Intelligence Server node is removed from a cluster manually, will report caches be lost?
If an administrator removes a cluster node from a cluster, then all report caches that had been created by that cluster node will be inaccessible by the rest of the cluster, whether or not a separate file server is used as a common report cache. This behavior is by design.

58) How does MicroStrategy Intelligence Server 7.0 clustering enable cache sharing?
Each node in a MicroStrategy Intelligence Server 7.0 cluster maintains indices of the caches available on the different nodes. When a report is submitted, these indices will be searched and once an existing cache is found (in any nodes), the cached results will be retrieved directly from cache locations in either the local or remote machine.

59) What methods can be used to guarantee availability of the MicroStrategy Intelligence Server report cache?
To prevent the loss of a MicroStrategy Intelligence Server cluster node from affecting report cache availability, the cluster can be configured such that a separate file server is used as a common report cache repository. In order to maintain cache availability, this separate file server can be configured for failover with third-party clustering software.

60) If a report cache is created by a MicroStrategy Intelligence Server cluster node, will that report cache be seen in the Cache Monitor of another cluster node?
No. Although the new report cache will be available for use by other cluster nodes, the cache will not appear in the Cache Monitor of other cluster nodes. In order to see all report caches within a cluster, the administrator will need to create a separate data source within Desktop for each cluster node. Then, the report caches within each node can be administered separately, using the same instance of the MicroStrategy Desktop application.

61) If objects are created, modified or deleted, will the change be reflected across all MicroStrategy Intelligence Server cluster nodes?
Yes. Object caches are synchronized across all cluster nodes. If any change affecting the Metadata is made by one cluster node, then the cluster node broadcasts the change to the other cluster nodes. The other cluster nodes will then update their local object caches.
NOTE: Client-side object caches will not be automatically be refreshed. In MicroStrategy Desktop, for example, a user may have to explicitly click on ‘Refresh’ to see an object change be reflected in the client application.

62) Should all MicroStrategy Intelligence Server cluster nodes be configured identically?
Technically, MicroStrategy Intelligence Servers in a cluster do not have to be configured identically. The only technical requirements are that all MicroStrategy Intelligence Servers point to the same metadata and that all MicroStrategy Intelligence Servers have the same projects registered and in the same state (i.e., if Node A has Project A in a ‘Loaded’ state, then Node B must also have Project A in a ‘Loaded’ state.).However, in order to ease administration and to reduce the risk of unbalanced load across cluster nodes, it is recommended that all nodes use the same MicroStrategy Intelligence Server definition and that each machine shows identical characteristics (i.e., equal RAM, hard disk space, CPU).

63) Is it possible for different nodes of a MicroStrategy Intelligence Server cluster to run against different metadata repositories?
No, all the nodes in the same cluster must run against the same metadata.
64) Is it possible for different nodes of a MicroStrategy Intelligence Server cluster to run with different configuration settings under the same metadata repository?

Yes this is possible, using caution because users can configure different nodes at different settings. For example, differences in memory allocation for the cache, time out settings, etc can result in uneven performance across cluster nodes.
65) What communication protocol does MicroStrategy Intelligence Server use for intracluster communication?
MicroStrategy Intelligence Server 7.0 and MicroStrategy Intelligence Server 7.0 SP1 use TCP/IP when communicating between clusters. MicroStrategy Intelligence Server 7.1 will provide the option of using TCP/IP or UDP/IP (Universal Datagram Protocol). In 7.2, UDP support was removed as packet loss affects cluster synchronization.

66) If a MicroStrategy Intelligence Server cluster node is rebooted, will the node rejoin the cluster automatically?
Whenever a MicroStrategy Intelligence Server cluster node is stopped in any way besides explicitly shutting down the MicroStrategy Intelligence Server service, the node will automatically rejoin the cluster when the MicroStrategy Intelligence Server service is restarted. So, if the node crashes, then the node will rejoin the cluster automatically upon startup.

67) Does MicroStrategy Intelligence Server support clustering via Microsoft Cluster Server or any other third-party clustering software?
Microsoft Cluster Server (MSCS) can be used for failover of MicroStrategy Intelligence Server. However, MSCS and other third-party clustering software will not provide the load-balancing and some of the failover capabilities of MicroStrategy Intelligence Server’s native clustering solution.

68) Is it possible to run multiple instances of MicroStrategy Intelligence Server on the same Microsoft Windows NT machine?
MicroStrategy 7.0 does not support running multiple instances of MicroStrategy Intelligence Server on the same Microsoft Windows NT machine. This is because MicroStrategy Intelligence Server can support running multiple projects with different prioritization and configuration settings on one server. This functionality was not available in MicroStrategy DSS Server 5.x and thus, required running multiple instances of MicroStrategy Intelligence Server to accomplish the same functionality.

69) What is the maximum number of nodes that can be supported in a MicroStrategy Intelligence Server 7.0 cluster?
There is no technical hard limit on the maximum number of cluster nodes that can be supported by MicroStrategy Intelligence Server 7.0. However, when the number of nodes increases, there is increasing overhead put on the system by the clustering software. So, there will be practical limits related to the hardware configuration of the users’ system.

70) What is metadata?
Metadata is repository which stores microstrategy objects definitions and information about the data warehouse structure and content.Metadata is used by the intelligence server to evaluate the most efficient data retrieval  scenario to guarantee optimal query performance.Explain 2-tier and 3-tier Architecture in MSTR.

71) What is ScanMD and MD Doctor?
Scan MD is the tool to recover from logical inconsistencies where MD Doctor fixes physical errors, When working with Microstrategy there is a chance for the metadata to become corrupt.  There are 2 types of errors; Physical or Logical.When working with Microstrategy there is a chance for the metadata to become corrupt.  There are 2 types of errors; Physical or Logical.ScanMD is used to recover from Logical discrepancies, where as MD Doctor is used for Physical discrepancies. Why these discrepancies creep????? Like any software application, there are bugs in MicroStrategy, dandling code (a situation never programmed), etc. such a thing is the main reason behind discrepancies.
Logical discrepancies: Using desktop you can create/delete several objects. Sometime deletion of the objects doesn’t get reflected in metadata and they get deleted in metadata but still available in front-end. Now such a mis-match in case of schema objects is simply killing, because it won’t let you update schema at all. . Using ScanMD is not an JImagine not having ability to update schema easy task. ScanMD shows 95% for false errors as discrepancies. Engine team of MicroStrategy, Inc. needs to update the tool. For one error, you may have to go through 100+ errors. You can verify the error easily by having project opened side by side. NEVER EVER FIX A FALSE ERROR.
Physical discrepancies: There are not just 10 DSS tables that make metadata, there are several more database objects that are created for metadata; e.g., triggers, views. If any of these objects are messed up, you have a physical discrepancy in your project. 

What is clustering and types of clustering?
cluster is a group of two or more I-servers connected to each other in such a way that they behave like a single I-server.Each machine in the cluster is called a node.Each machine in the cluster runs the same service as other machines in the cluster hence any machine can stand the failure of other machine and take over the tasks of the failed machine.

 

 

Cognos TM1 interview questions

Top most important Cognos TM1 interview questions and answers by Experts:

Here is a list of Top most important Cognos TM1 interview questions and answers by Experts.If you want to download Cognos TM1 interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Cognos TM1 interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Cognos TM1,Register for Cognos TM1 online training here.

 

1. What are the basic features of Cognos TM1?

  • Real-time, interactive multidimensional database also with write-back functionality
    • 64-bit, in memory OLAP server capable of concentrate huge volumes of data
    • Enterprise level planning and analysis capabilities
    • Guided modeling environment to facilitate planning, analysis and forecasting
    • Rapid development of flexible models, including profitability models, without batch processing
    • Integrates with IBM Cognos Business Intelligence, to establish a single view of performance

2.How do you use TM1 cubes in Framework Manager?

TM1 v10.1 has the interoperability function configured to allow packages to be published from TM1.

3.How many types of viewers available in TM1?

There are 3 types of viewers in TM1.
1) Cube Viewer
2) Web Sheet Viewer
3) Navigation Viewer.

4. How to run Turbo Integrator Process from Command Line?

To initiate the TI process TM1RunTI is a command line interface tool.

5. Name the function which is used to serialize the TI process?

Synchronized () function can is used to serialize TI process so they can be processed sequentially.

6. What are the functions required to be called for enabling or disabling the bulk load of mode?

EnableBulkLoadMode() = Enable
DisableBulkLoadMode() = Disable.

7. Define Data Tab?

Series of statements that manipulates values for each record in data source.

8. Define TM1 package connector?

TM1 package connector helps to import data from packages/dimensions and custom queries.

9. What is Epilog Tab?

Series of statements that is to be executed after the data source is processed.

10. What is the limit of string length in Turbo Integrator?

The limit of string length in Turbo Integrator is 8000 single byte character. If the length will become more 8000 bytes then it gets truncated.

11. What is the meaning of Ending Bulk Load mode?

All the system and User threads will be resumed and user logins will also be allowed.

12. How we can generate cubes in Cognos?

Power Play Transformer contains dimension, measure, model and cube. There are different ways to generate a cube.
Steps to be followed:
• Just right click on cube name and build.
• We can write script in UNIX. Using that we can easily generate the cube.

13. How can you access TM1 web form portlet?

There is a option to integrate TM1 viewers in cognos Portlets.

14. What are different windows in portlet?

There are 3 type of viewers available in TM1.

-Cube Viewer

-Web Sheet Viewer

-Navigation Viewer.

15. What are the basic features of Cognos TM1?

-Real-time, interactive multidimensional database also with write-back functionality.

-64-bit, in memory OLAP server capable of concentrate huge volumes of data.

-Enterprise level planning and analysis capabilities.

-Guided modeling environment to facilitate planning, analysis and forecasting.

-Rapid development of flexible models, including profitability models, without batch processing.

-Integrates with IBM Cognos Business Intelligence, to establish a single view of performance.

16. Name the data sources which are available with TI?

Data Sources available with TI are:
• SAP via RFC
• IBM Cognos Packages
• Microsoft Analysis Services
• Relational databases using ODBC Connectivity
• Comma delimited text files including ACII files
• Other Cubes and Views

17. Define Sparse Cube?

It’s a cube in which number of populated cells as a percentage of total cells is too low.

18. Define Query Subject?

A Query Subject is a collection of Query Items. Generally query items have a defined relationship. It is primarily a database table upon which query action takes place.

19. What is Sparse Cube?

A cube in which number of populated cells as a percentage of total cells is too low

20. What is Chore Commit property?

  • It allows you to specify if the processes in chores will be committed as a single transaction or either as multiple transaction
    • In a single commit mode all processes are committed as a single transaction. It is default by nature.
    • In multiple commit modes any processes that need to be committed do so as they are processed.
    • It is possible to change chore property only when chore is INACTIVE.

21. Define snapshot?

Snapshot is nothing it’s only a copy of data, whenever we create any snapshot it only copy the exact data that is related to the particular report. It is used to compare reports.
For ex: we want to compare the report of this month with previous month.

22. Differentiate between view and materialized view?

Views
It contains query whenever execute views it has read from base tableMaterialized View
M views loading or replicated takes place only once which gives you better query performance.

23. Define Bulk Load mode?

  • It enables TM1 to run in a special optimized Single-user mode. This mode has a capacity to maximize the performance for dedicated tasks during the time when there is no load on server or at night time.
    • It doesn’t display a message to end-user to alert them. No new connections can be created.

24. What actually happens when Bulk Load mode starts?

  • All the scheduled chores will be deactivated
    • All the processing by other threads will be paused
    • Running chores and any of the existing user threads will be suspended
    • TM1 Top connections and all the system-specific threads will be suspended

25. Define Drill Through?

By using Drill-through reporting you can link from one report to another. There are number of ways to Drill Through:
Drill Through id developed with two reports• Parent Report
• Child Report

25.What is the difference between list and crosstab?

List
• List report show the data in row and column(detail information of report).
• List can be converted to Cross tab
Crosstab
• Crosstab report show the data in grids, dimensions in row and column and measures in cells or in intersection point.
• Crosstab can’t be converted to list. There is no direct option available in Report Studio to convert the cross tab to list.

26. Give the options which are available after importing data using TI?

  • Create Cube and populate data
    • Create and Update dimensions
    • Re-create Cube. It destroys the existing cube definitions and overwrites it

27. Define Prolog tab?

Procedure is executed before the data source for the TI is opened.  TI directly goes to Epilog if the data source for the process is none and if there is no data source then Metadata and data tabs are ignored.

28. Define Metadata?

Series of statements that update or create cubes, dimensions and other metadata structures during the processing

29. What is the cube size?

2.0 GB. It depends as per your project requirements.

30. What kind of system requirement is needed to run TM1 for a small installation?

The minimum requirement to run the sample TM1 servers provided will be:
• Disk Space: Minimum 500 MB
• Memory: Minimum 2 GB RAM
• Processor: Pentium 4 or higher
• OS: Windows 2003(x86, x64), Windows 2008(x86, x64), Windows 7(x86, x64), Linux

31.How many users can open or connect to one of the TM1 web application concurrently?

Using the distributed approach of TM1 10 they have done testing in thousands of users.

32.Define FEEDERS?

It creates a placeholder on the cells so that the cells will not be skipped during the consolidation.

33.What is the way of writing a FEEDER Statement when feeding one cube from another?

  • Calculation statement always resides in the target cube, but the FEEDER statement should reside in the source cube.
    • The Feeder is basically the inverse of the calculation statement in the Target Cube that requires the feeder.

34. What are the steps to troubleshoot the FEEDERS?

  • Use Rules Tracer will be used to assist in the development and debugging of rules.
  • The functionality of Rule Tracer is available in Cube Viewer

35. How does Rules Tracer help us?

  • It traces FEEDERS; it ensures that selected leaf cells are feeding rules-calculated cells properly or not.
    • It checks FEEDERS, ensures that the children of selected consolidated cells are fed properly or not. Check Feeders options is available from consolidated cells and it’s not available from leaf node.

36. Define the logic behind the Sparsity in cubes?

The more dimensions a cube has, the greater will be the degree of sparsity.

37. Define Over Feeding?

Over Feeding means defining feeders for consolidated cells. (Feeding a consolidated cell automatically feeds all children of the consolidation.)

38. Define Under Feeding?

Under Feeding means failing to the feed cells that contain rules-derived values. This always results in incorrect values and must be avoided at all costs.

39. What is the role of SKIPCHECK in TM1?

SKIPCHECK forces TM1 to use the Sparse Consolidation algorithm in all the cases.

40. What is the role of transformer?

It is used for building the Cubes (Multidimensional Structure used for OLAP processing).

41. Name the components of report studio?

  • Insertable Objects pane
  • Properties pane
  • Explorer bar
  •  Report Viewer

42. Name the components of Report Net?

  • Framework manager
  • Cognos connection
  • Query Studio
  • Report Studio

43. Name the prompt which are available in Cognos?

  • Value prompt
  • Text Prompt
  • Date prompt
  • Time prompt
  • Date and time prompt

44. Define Cognos Connection?

It is a Web portal for Cognos 8 and a component which interacts with the Content Store. It is a frontend to publish, find, manage, organize, and view organization’s business intelligence data.

45. Define Cognos Reporting tool?

It’s a reporting tool from IBM which helps in reporting and analysis of various data from a data warehouse.

46. Define Junk Dimension?

It is also called as garbage dimension. A junk dimension is a convenient grouping of typically low-cardinality flags and indicators.

47. Define is catalog and types of catalogs in Cognos?

Catalog is a file containing the information (Database tables) that Impromptu users need to create reports. Types of catalogs are:
• Personal
• Distributed
• Shared
• Secured

48. What are the flaws of Chore Start Time?

TM1 executes chores in GMT standards. It doesn’t have any auto mechanism to accommodate DayLight Saving. Its Chores Scheduled time should be edited when DayLight time begins and ends.

49. Name the different procedures within TI?

  • Defining Data Source
  • Setting Variables
  • Mapping Data
  • Editing Advanced Scripting
  • Scheduling the completed Process.

50. Name the window by which you can create your own custom scripts?

You can create your own custom scripts using Advanced Window

51. How you can enable Bulk Load Mode in TI?

  • In Prolog or Epilog section of TI, Bulk Load mode can be enabled.
    • It always recommended that Bulk Load Mode should be enabled in Prolog section.

52. Name the sub-tabs which are in advance tab of TI

The sub-tabs which are in advance tab of TI are:
• Prolog
• Metadata
• Data
• Epilog

53. Differentiate between Power play transformer and power play reports?

Power play transformer
It is an ‘MOLAP’ tool using which one can create multi dimensional structure called “CUBE”.Power play reports
Power play for reports is used to generate report from the cube. Only one report can be generated from one cube. If you want ‘n’ reports you must create ‘n’ cubes.

54. What are the different windows in Turbo Integrator?

There are different tabs available in Turbo Integrator

-Data source

-Variable

-Maps

-Advanced

-Schedule

55. What is the use of advanced window in Turbo Integrator?

Using the Advanced window you can create your own custom scripts.

56. What is TM1 Workflow. How do you create a process in that?

Workflow is helping for Wide deployment, Collaborative decision making, Continuous and real-time review and refinement and Monitoring of Key Performance Indicators

To create the work.

-Need to define the Views that you need to deploy to the  end users for Decision making.(Its basically Input View)

-You need to define Approval Hierarchy

-Need to deploy

-Security Assignments

57. What are the data sources available with TI?

-Comma delimited text files including ASCII files

-Relational databases using ODBC Connectivity

-Other Cubes and Views

-Microsoft Analysis Services

-SAP via RFC

-IBM Cognos Packages

58. Where is Portlet used?

Portlets are used in Cognos.

59. How do you use TM1 cubes in Framework Manager?

TM1 v10.1 has the interoperability function configured to allow packages to be published from TM1.

How to run Turbo Integrator Process from Command Line?

To initiate the TI process TM1RunTI is a command line interface tool.

60. Define Data Tab?

Series of statements that manipulates values for each record in data source.

61. What are sub-tabs in advance tab of TI?

-Prolog

-Metadata

-Data

-Epilog

62. What is the logic of Sparsity in cubes?

On average, the more dimensions a cube has, the greater the degree of sparsity.

63. What is Overfeeding

Defining feeders for for consolidated cells. (Feeding a consolidated cell automatically feeds all children of the consolidation.)

64. What is Under Feeding?

Failing to feed cells that contain rules-derived values. This always results in incorrect values and must be avoided at all costs.

65. How does SKIPCHECK helps TM1?

SKIPCHECK forces TM1 to use the Sparse Consolidation algorithm in all cases.

66. What are FEEDERS?

It creates a placeholder on cells so that cells will not be skipped during the consolidation

67. What is FEEDSTRING?

-If rule defines string values for any cells, then FEEDSTRINGS must be inserted as the first line of rule.

-FEEDSTRINGS declaration ensures that cells containing rules-derived strings are fed.

-Every calculation statement in a rule should have a corresponding feeder statement.

68. What are simple FEEDERS?

FEEDERS that are applied to calculation within one dimension of one cube.

69. Define TM1 package connector?

TM1 package connector helps to import data from packages/dimensions and custom queries.

70. What is Epilog Tab?

Series of statements that is to be executed after the data source is processed.

71. Name the function which is used to serialize the TI process?

Synchronized () function can is used to serialize TI process so they can be processed sequentially.

72. What are the functions required to be called for enabling or disabling the bulk load of mode?

-EnableBulkLoad Mode() = Enable

-Disable Bulk Load Mode() = Disable.

73. What is the limit of string length in Turbo Integrator?

The limit of string length in Turbo Integrator is 8000 single byte character. If the length will become more 8000 bytes then it gets truncated.

74. What are the flaws of Chore Start Time?

TM1 executes chores in GMT standards. It doesn’t have any auto mechanism to accommodate DayLight Saving. Its Chores Scheduled time should be edited when DayLight time begins and ends.

75. Name the different procedures within TI?

-Defining Data Source

-Setting Variables

-Mapping Data

-Editing Advanced Scripting

-Scheduling the completed Process.

76. How you can enable Bulk Load Mode in TI?

In Prolog or Epilog section of TI, Bulk Load mode can be enabled.

It always recommended that Bulk Load Mode should be enabled in Prolog section.

How we can generate cubes in Cognos?Powerplay Transformer contains dimension, measure, model and cube.

There are different ways to generate a cube.

Steps to be followed:

-Just right click on cube name and build.

-We can write script in UNIX. Using that we can easily generate the cube.

77. Name the data sources which are available with TI?

Data Sources available with TI are:

-SAP via RFC

-IBM Cognos Packages

-Microsoft Analysis Services

-Relational databases using ODBC Connectivity

-Comma delimited text files including ASCII files

-Other Cubes and Views

78. What kind of system requirement is needed to run TM1 for a small installation?

The minimum requirement to run the sample TM1 servers provided will be:

-Disk Space: Minimum 500 MB

-Memory: Minimum 2 GB RAM

-Processor: Pentium 4 or higher

-OS: Windows 2003(x86, x64), Windows 2008(x86, x64), Windows 7(x86, x64), Linux

79. Define snapshot?

Snapshot is nothing it’s only a copy of data, whenever we create any snapshot it only copy the exact data that is related to the particular report. It is used to compare reports.
For ex: we want to compare the report of this month with previous month.

80. Define Bulk Load mode?

-It enables TM1 to run in a special optimized Single-user mode. This mode has a capacity to maximize the performance for dedicated tasks during the time when there is no load on server or at night time.

-It doesn’t display a message to end-user to alert them. No new connections can be created.

81. How is the FEEDER Statement written when feeding one cube from another?

-Calculation statement resides in the target cube, but the FEEDER statement should reside in the source cube.

-The Feeder is basically the inverse of the calculation statement in the Target Cube that requires the feeder.

82. How to Troubleshoot the FEEDERS?

-Use Rules Tracer to assist in the development and debugging of rules.

-Rules Tracer functionality is available in Cube Viewer

83. How does Rules Tracer help?

-It traces FEEDERS, it ensures that selected leaf cells are feeding rules-calculated cells properly

-It checks FEEDERS, ensures that the children of selected consolidated cells are fed properly. Check Feeders options is available from consolidated cells and its not available from leaf node

84. What actually happens when Bulk Load mode starts?

-All the scheduled chores will be deactivated

-All the processing by other threads will be paused

-Running chores and any of the existing user threads will be suspended

-TM1 Top connections and all the system-specific threads will be suspended

85. Define Drill Through?

By using Drill-through reporting you can link from one report to another.

There are number of ways to Drill Through:

Drill Through is developed with two reports

-Parent Report

-Child Report

86. What is the difference between list and crosstab?

List

-List report show the data in row and column(detail information of report).

-List can be converted to Crosstab

Crosstab

-Crosstab report show the data in grids, dimensions in row and column and measures in cells or in intersection point.

-Crosstab can’t be converted to list. There is no direct option available in Report Studio to convert the cross tab to list.

87. Give the options which are available after importing data using TI?

Create Cube and populate data.

Create and Update dimensions.

Re-create Cube. It destroys the existing cube definitions and overwrites it.

88. Define Prolog tab?

Procedure is executed before the data source for the TI is opened. TI directly goes to Epilog if the data source for the process is none and if there is no data source then Metadata and data tabs are ignored.

89. What is the cube size?

2.0 GB. It depends as per your project requirements.

90. What are the steps to troubleshoot the FEEDERS?

-Use Rules Tracer will be used to assist in the development and debugging of rules.

-The functionality of Rule Tracer is available in Cube Viewer

91. Define the logic behind the Sparsity in cubes?

The more dimensions a cube has, the greater will be the degree of sparsity.

92. Name the components of report studio?

-Insertable Objects pane

-Properties pane

-Explorer bar

-Report Viewer

93. Name the components of Reportnet?• Framework manager?

-Cognos connection

-Query Studio

-Report Studio

94. Define Cognos Connection?

It is a Web portal for Cognos 8 and a component which interacts with the Content Store. It is a frontend to publish, find, manage, organize, and view organization’s business intelligence data.

95. Define Cognos Reporting tool?

It’s a reporting tool from IBM which helps in reporting and analysis of various data from a data warehouse.

96. Define is catalog and types of catalogs in Cognos?

Catalog is a file containing the information (Database tables) that Impromptu users need to create reports. Types of catalogs are:

-Personal

-Distributed

-Shared

-Secured

97. Define Query Subject?

A Query Subject is a collection of Query Items. Generally query items have a defined relationship. It is primarily a database table upon which query action takes place.

 

 

Sharepoint Interview Questions

Top most important Sharepoint interview questions and answers by Experts:

Here is a list of Top most important Sharepoint interview questions and answers by Experts.If you want to download Sharepoint interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Sharepoint interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Sharepoint ,Register for Sharepoint online training here.

 

1) What is the difference between method activity and event activity in WF ?

A method activity is one that performs an action, such as creating or updating a task. An event activity is one that runs in response to an action occurring.

2) What does SPWeb.EnsureUser method do?

Checks whether the specified login name belongs to a valid user of the Web site, and if the login name does not already exist, adds it to the Web site. e.g SPUser usr = myWeb.EnsureUser(“mmangaldas”);

3) While creating a Webpart, which is the ideal location to Initialize my new controls ?

Override the CreateChildControls method to include your new controls. To make sure that the new controls are initialized.. call ‘EnsureChildControls’ in the webparts Render method. You can control the exact Rendering of your controls by calling the .Render method in the webparts Render method.

4) How to query from multiple lists ?

Use SPSiteDataQuery to fetch data from multiple lists. more details..

5) How Does SharePoint work?

The browser sends a DAV packet to IIS asking to perform a document check in. PKMDASL.DLL, an ISAPI DLL, parses the packet and sees that it has the proprietary INVOKE command. Because of the existence of this command, the packet is passed off to msdmserv.exe, who in turn processes the packet and uses EXOLEDB to access the WSS, perform the operation and send the results back to the user in the form of XML

6) What is the difference between Syncronous & Asyncronous events?

Syncronous calls ending with ‘ing’ E.g. ItemDeleting Event Handler code execute BEFORE action is committed WSS waits for code to return Option to cancel and return error code
Asyncronous calls ending with ‘ed’ E.g. ItemDeleted Event Handler code executes AFTER action is committed WSS does not wait for code to return Executed in its own Worker thread.

7) What is ServerUpdate() ?

Any changes in the list, i.e. new addition or modification of an item.. the operation is complete by calling the Update method.But if a List is set to maintain versions .. and you are editing an item, but don’t want to save it as a new version, then use the SystemUpdate method instead and pass in ‘false’ as the parameter.

8) What is query.ViewAttributes OR How can you force SPQuery to return results from all the folders of the list?

If you use SPQuery on any SPlist .. it will bring back results from the current folder only. If you want to get results from all the folders in the list.. then you need to specify the scope of the query by the use of ViewAttributes..
e.g. query.ViewAttributes = “Scope=\”Recursive\””;

9) What are the two base classes a WebPart you are going to use within SharePoint 2007 can inherit from?

There are two base classes that a WebPart which is going to be consumed by SharePoint can inherit from, either the SharePoint WebPart Base class or the ASP.NET 2.0 WebPart base class. When inheriting from the SharePoint WebPart Base class your derived WebPart class will inherit from Microsoft.SharePoint.WebPartPages.WebPart. When inheriting from the ASP.NET 2.0 WebPart base class your derived WebPart class will inherit from System.Web.UI.WebControls.WebParts.WebPart. It is considered good practice to use the ASP.NET WebPart base class since the old base class is meant for backwards compatibility with previous version of SharePoint, however there are four exception when it is better to leverage functionality from the SharePoint WebPart base class:

Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure

10) What are the differences between the two base classes and what are the inherit benefits of using one over another?

The difference is the Microsoft.SharePoint.WebPartPages.WebPart base class is meant for backward compatibility with previous versions of SharePoint. The benefit of using the SharePoint WebPart base class is it supported:

Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure

ASP.NET 2.0 WebParts are generally considered better to use because SharePoint is built upon the ASP.NET 2.0 web architecture. Inheriting from the ASP.NET 2.0 base class offers you features that inherit to ASP.NET 2.0, such as embedding resources as opposed to use ClassResources for deployment of said types.

11) What is the GAC?

The GAC stands for the global assembly cache. It is the machine wide code cache which will give custom binaries place into the full trust code group for SharePoint. Certain SharePoint assets, such as Feature Receivers need full trust to run correctly, and therefore are put into the GAC. You should always try to avoid deployment to the GAC as much as possible since it will possibly allow development code to do more than it was intended to do.

12) What is strong naming (signing) a WebPart assembly file mean?

Signing an assembly with a strong name (a.k.a strong naming) uses a cryptographic key pair that gives a unique identity to a component that is being built. This identity can then be referred throughout the rest of the environment. In order to installassemblies into the GAC, they must be strongly named. After signing, the binary will have a public key token identifier which can be use to register the component in various other places on the server.

13) What are safe controls, and what type of information, is placed in that element in a SharePoint web.config file?

When you deploy a WebPart to SharePoint, you must first make it as a safe control to use within SharePoint in the web.config file. Entries made in the safe controls element of SharePoint are encountered by the SharePointHandler object and will be loaded in the SharePoint environment properly, those not will not be loaded and will throw an error.

In the generic safe control entry (this is general, there could be more), there is generally the Assembly name, the namespace, the public key token numeric, the typename, and the safe declaration (whether it is safe or not). There are other optional elements.

14) What is the CreateChildControls() method? How can you use it to do something simple like displaying a Label control?

The CreateChildControls method in WebParts is used to notify the WebPart that there are children controls that should be output for rendering. Basically, it will add any child ASP.NET controls that are called instantiating each control with its relevant properties set, wire any relevant event handlers to the control, etc. Then the add method of the control class will add the control to the controls collection. In the relevant WebPart render method, the EnsureChildControls method can be called (or set to false if no child controls should be called) to ensure that the CreateChildControls method is run. When using CreateChildControls it implies that your WebPart contains a composition of child controls.

In order to create something like a label control in Create, you would create a new label control using the new keyword, set the various properties of the control like Visible=True and ForeColor = Color.Red, and then use Controls.Add(myLabelControl) to add the control to the controls collection. Then you can declare EnsureChildControls in the Render method of the WebPart.

15) What does the RenderContents method do in an ASP.NET 2.0 WebPart?

The render contents method will render the WebPart content to the writer, usually an HtmlTextWriter since WebParts will output to an HTML stream. RenderContents is used to tell how the controls that are going to be displayed in the WebPart should be rendered on the page.

*** Side Question: I got asked what the difference between CreateChildControls and the RenderContents method. The CreateChildControls method is used to add controls to the WebPart, and the RenderContents method is used to tell the page framework how to render the control into HTML to display on a page.

16) What is the WebPartManager sealed class? What is its purpose?

The WebPartManager sealed class is responsible for managing everything occurring on a WebPart page, such as the WebParts (controls), events, and misc. functionality that will occur in WebPartZones. For example, the WebPartManager is responsible for the functionality that is provided when you are working with moving a WebPart from WebPartZone to WebPartZone. It is known as the “the central class of the Web Part Control Set.”

*** Side Question: I got asked how many WebPartManager controls should be on a page. In order to have WebParts on a page there has to be just one WebPartManager control to manage all the WebParts on the page.

17) What is a SPSite and SPWeb object, and what is the difference between each of the objects?

The SPSite object represents a collection of sites (site collection [a top level sites and all its subsites]). The SPWeb object represents an instance SharePoint Web, and SPWeb object contains things like the actual content. A SPSite object contains the various subsites and the information regarding them.

18) How would you go about getting a reference to a site?

oSPSite = new  SPSite(“http:/server”);
oSPWeb = oSPSite.OpenWeb();

19) What does a SPWebApplication object represent?

The SPWebApplication objects represents a SharePoint Web Application, which essentially is an IIS virtual server. Using the class you can instigate high level operations, such as getting all the features of an entire Web Application instance, or doing high level creation operations like creating new Web Applications through code.

20) Would you use SPWebApplication to get information like the SMTP address of the SharePoint site?

Yes, since this is a Web Application level setting. You would iterate through each SPWebApplication in the SPWebApplication collection, and then use the appropriate property calls (OutboundMailServiceInstance) in order to return settings regarding the mail service such as the SMTP address.

Side Question: I got asked if there are other ways to send emails from SharePoint. The answer is yes, there is. You can use the SendMail method from the SPutility class to send simple emails, however it is not as robust as using the System.Net.Mail functionality since it doesn’t allow things like setting priorities on the email.

21) How do you connect (reference) to a SharePoint list, and how do you insert a new List Item?

[csharp]
using(SPSite mySite = new SPSite(“yourserver”))
{
using(SPWeb myWeb = mySite.OpenWeb())
{
SPList interviewList = myWeb.Lists[“listtoinsert”];
SPListItem newItem = interviewList.Items.Add();
newItem[“interview”] = “interview”;
newItem.Update();
}
}
[/csharp]

22) How would you loop using SPList through all SharePont List items, assuming you know the name (in a string value) of the list you want to iterate through, and already have all the site code written?

SPList interviewList = myWeb.Lists[“listtoiterate”];
foreach (SPListItem interview  in interviewList)
{
// Do Something
}

23) How do you return SharePoint List items using SharePoint web services?

In order to retrieve list items from a SharePoint list through Web Services, you should use the lists.asmx web service by establishing a web reference in Visual Studio. The lists.asmx exposes the GetListItems method, which will allow the return of the full content of the list in an XML node. It will take parameters like the GUID of the name of the list you are querying against, the GUID of the view you are going to query, etc.

Side Question: I got asked how I built queries with the lists.asmx web service. In order to build queries with this service, one of the parameters that the GetListItems method exposes is the option to build a CAML query. There are other ways to do this as well, but that was how I answered it.

24) What is the difference between an Internet and an intranet site?

An internet site is a normal site that anyone on the internet can access (e.g., www.msn.com, www.microsoft.com, etc.). You can set up a site for your company that can be accessed by anyone without any user name and password.

An intranet (or internal network), though hosted on the Web, can only be accessed by people who are members of the network. They need to have a login and password that was assigned to them when they were added to the site by the site administrator

25) What are the various kinds of roles the users can have?

A user can be assigned one of the following roles
Reader – Has read-only access to the Web site.
Contributor – Can add content to existing document libraries and lists.
Web Designer – Can create lists and document libraries and customize pages in the Web site.
Administrator – Has full control of the Web site.

26) How customizable is the user-to-user access?

User permissions apply to an entire Web, not to documents themselves. However, you can have additional sub webs that can optionally have their own permissions. Each user can be given any of four default roles. Additional roles can be defined by the administrator.

27) Can each user have access to their own calendar?

Yes there are two ways to do this,
by creating a calendar for each user, or
by creating a calendar with a view for each user

28) Can SharePoint be linked to a SQL database?

This is possible via a custom application, but it not natively supported by SharePoint or SQL Server.

29) What does partial trust mean the Web Part developer?

If an assembly is installed into the BIN directory, the code must be ensured that provides error handling in the event that required permissions are not available. Otherwise, unhandled security exceptions may cause the Web Part to fail and may affect page rendering on the page where the Web Part appears

30) When retrieving List items using SharePoint Web Services, how do you specify explicit credentials to be passed to access the list items?

In order to specify explicit credentials with a Web Service, you generally instantiate the web service, and then using the credentials properties of the Web Service object you use the System.Net.NetworkCredential class to specify the username, password, and domain that you wish to pass when making the web service call and operations.

*** Side Question: I got asked when you should state the credentials in code. You must state the credentials you are going to pass to the web service before you call any of the methods of the web service, otherwise the call will fail.

31) What is CAML, and why would you use it?

CAML stands for Collaborative Application Markup Language. CAML is an XML based language which provides data constructs that build up the SharePoint fields, view, and is used for table definition during site provisioning. CAML is responsible for rending data and the resulting HTML that is output to the user in SharePoint. CAML can be used for a variety of circumstances, overall is used to query, build and customize SharePoint based sites. A general use would be building a CAML query in a SharePoint WebPart in order to retrieve values from a SharePoint list.

32) What is impersonation, and when would you use impersonation?

Impersonation can basically provide the functionality of executing something in the context of a different identity, for example assigning an account to users with anonymous access. You would use impersonation in order to access resources on behalf of the user with a different account, that normally, that wouldn’t be able to access or execute something.

33) What is the IDesignTimeHtmlProvider interface, and when can you use it in WebParts?

The IDesignTimeHtmlProvider interface uses the function GetDesignTimeHtml() which can contain your relevant render methods. It was helpful to use in 2003 since it allowed your WebPart to have a preview while a page was edited in FrontPage with the Webpart on it, because the GetDesignTimeHtml() method contains the HTML for the designer to render.

34) What are WebPart properties, and what are some of the attributes you see when declaring WebPart properties in code?

WebPart properties are just like ASP.NET control properties, they are used to interact with and specify attributes that should be applied to a WebPart by a user. Some of the attributes you see with ASP.NET 2.0 properties are WebDescription, WebDisplayName, Category, Personalizable, and WebBrowsable. Although most of these properties come from the System.Web.UI.WebControls.WebParts class, ones like Category come out of System.ComponentModel namespace.

35) Why are properties important in WebPart development, and how have you exploited them in past development projects? What must each custom property have?

Properties are important because WebParts allow levels of personalization for each user. WebPart properties make it possible for a user to interact, adjust, and increase overall experience value with the programmatic assets that you develop without having the need to use an external editor or right any code. A very simple example of exploiting a property would be something like allowing the user to change the text on the WebPart design interface so that they can display whatever string of text they desire.

Each custom property that you have must have the appropriate get and set accessor methods.

36) What are ClassResources? How do you reference and deploy resources with an ASP.NET 2.0 WebPart?

ClassResources are used when inheriting from the SharePoint.WebPart.WebPartPages.WebPart base class, and are defined in the SharePoint solution file as things that should be stored in the wpresources directory on the server. It is a helpful directory to use in order to deploy custom images. In ASP.NET 2.0, typically things such as images are referenced by embedding them as resources within an assembly. The good part about ClassResources is they can help to eliminate recompiles to change small interface adjustments or alterations to external JavaScript files.

37) What is a SharePoint Solution File? How does it differ from WebPart .cab files in legacy development? What does it contain?

A SharePoint solution file is essentially a .cabinet file with all a developers ustom componets suffixed with a .wsp extension that aids in deployment. The big difference with SharePoint solution files is is that a solution:

allows deployment to all WFE’s in a farm is highly manageable from the interface allowing deployment, retraction, and versioning

38) What is a .ddf file and what does it have to do with SharePoint Solution creation?

A .ddf file is a data directive file and is used when building the SharePoint solution bundle specifying the source files and their destination locations. The important thing for someone to understand is that the .ddf file will be passed as a parameter to the MAKECAB utility to orchestrate construction of the SharePoint solution file.

39) What file does a SharePoint solution package use to orchestrate (describe) its packaged contents?

The solution Manifest.XML file.

40) What deployment mechanism can you use to instigate Code Access Security attributes for your WebParts?

SharePoint solution files can add in order to handle code access security deployment issues. This is done in the element in the SharePoint solution manifest.XML, which makes it easier to get assemblies the appropriate permissions in order to operate in the bin directory of the web application.

41) What is a SharePoint Feature? What files are used to define a feature?

A SharePoint Feature is a functional component that can be activated and deactivate at various scopes throughout a SharePoint instances, such as at the farm, site collection, web, etc. Features have their own receiver architecture, which allow you to trap events such as when a feature is installing, uninstalling, activated, or deactivated. They are helpful because they allow ease of upgrades and versioning.

The two files that are used to define a feature are the feature.xml and manifest file. The feature XML file defines the actual feature and will make SharePoint aware of the installed feature. The manifest file contains details about the feature such as functionality.

Side Question: I got asked how the introduction of features has changed the concept of site definitions. SharePoint features are important when understanding the architecture of site definitions, since the ONET.XML file has been vastly truncated since it has several feature stapled on it.

42) What types of SharePoint assets can be deployed with a SharePoint feature?

Features can do a lot. For example, you could deploy

Simple site customizations
Custom site navigation
WebParts
pages
list types
list instances
event handlers
workflows
custom actions

43) What are event receivers?

Event receivers are classes that inherit from the SpItemEventReciever or SPListEventReciever base class (both of which derive out of the abstract base class SPEventRecieverBase), and provide the option of responding to events as they occur within SharePoint, such as adding an item or deleting an item.

44) When would you use an event receiver?

Since event receivers respond to events, you could use a receiver for something as simple as canceling an action, such as deleting a document library by using the Cancel property. This would essentially prevent users from deleting any documents if you wanted to maintain retention of stored data.

45) What base class do event receivers inherit from?

Event receivers either inherit from the SPListEventReciever base class or the SPItemEventReciever base class, both which derive from the abstract base class SPEventReceiverBase.

 

46) How could you append a string to the title of a site when it is provisioned?

In the OnActivated event:

SPWeb site = siteCollection.RootWeb;

site.Title += “interview”;

site.Update();

47) Can an event receiver be deployed through a SharePoint feature?      

Yes.

48) What is a content type?

A content type is an information blueprint basically that can be re-used throughout a SharePoint environment for defining things like metadata and associated behaviors. It is basically an extension of a SharePoint list, however makes it portable for use throughout an instance regardless of where the instantiation occurs, ergo has location independence. Multiple content types can exist in one document library assuming that the appropriate document library settings are enabled. The content type will contain things like the metadata, listform pages, workflows, templates (if a document content type), and associated custom written functionality.

49) Can a content type have receivers associated with it?

Yes, a content type can have an event receiver associated with it, either inheriting from the SPListEventReciever base class for list level events, or inheriting from the SPItemEventReciever base class. Whenever the content type is instantiated, it will be subject to the event receivers that are associated with it.

50) What two files are typically (this is kept generally) included when developing a content type, and what is the purpose of each?

There is generally the main content type file that holds things like the content type ID, name, group, description, and version. There is also the ContentType.Fields file which contains the fields to include in the content type that has the ID, Type, Name, DisplayName, StaticName, Hidden, Required, and Sealed elements. They are related by the FieldRefs element in the main content type file.

51) What is an ancestral type and what does it have to do with content types?

An ancestral type is the base type that the content type is deriving from, such as Document (0×0101). The ancestral type will define the metadata fields that are included with the custom content type.

52) Can a list definition be derived from a custom content type?

Yes, a list definition can derive from a content type which can be seen in the schema.XML of the list definition in the element.

 

53) What is a Field Control?

Field controls are simple ASP.NET 2.0 server controls that provide the basic field functionality of SharePoint. They provide basic general functionality such as displaying or editing list data as it appears on SharePoint list pages.

54) What base class do custom Field Controls inherit from?

This varies. Generally, custom field controls inherit from the Microsoft.SharePoint.WebControls.BaseFieldControl namespace, but you can inherit from the default field controls.

55) How does one deploy new SharePoint site definitions so that they are made aware to the SharePoint system?

The best way to deploy site definitions in the SharePoint 2007 framework is to use a SharePoint solution file, so that the new sitedefinition is automatically populated to all WFE’s in the SharePoint farm.

56) What is an ancestral type and what does it have to do with content types?

An ancestral type is the base type that the content type is deriving from, such as Document (0×0101). The ancestral type will define the metadata fields that are included with the custom content type.

57) Can a list definition be derived from a custom content type?

Yes, a list definition can derive from a content type which can be seen in the schema.XML of the list definition in the element.

58) When creating a list definition, how can you create an instance of the list?

You can create a new instance of a list by creating an instance.XML file

59) What is a Field Control?

Field controls are simple ASP.NET 2.0 server controls that provide the basic field functionality of SharePoint. They provide basic general functionality such as displaying or editing list data as it appears on SharePoint list pages.

60) What base class do custom Field Controls inherit from?

This varies. Generally, custom field controls inherit from the Microsoft.SharePoint.WebControls.BaseFieldControl namespace, but you can inherit from the default field controls.

61) Can multiple SharePoint installs point to the same DB?

Multiple SharePoint installs can use the same database server. Not literally the same database on that server. That server must be SQL Server 2000 or SQL Server 2005. It cannot be Oracle or another vendor.

62) How to create links to the mapped network drives?

Creating links to mapped drives in WSS v3 or MOSS 2007 can be done via the new content type for .lnk files.

63) What does AllowUnsafeUpdates do ?
If your code modifies Windows SharePoint Services data in some way, you may need to allow unsafe updates on the Web site, without requiring a security validation. You can do by setting the AllowUnsafeUpdates property.

64) What does RunWithElevatedPrivileges do?
There are certain object model calls model that require site-administration privileges. To bypass access-denied error, we use RunWithElevatedPrivileges property when request is initiated by a nonprivileged user. We can successfully make calls into the object model by calling the RunWithElevatedPrivileges method provided by the SPSecurity class.

65)  What does SPWeb.EnsureUser method do?
Checks whether the specified login name belongs to a valid user of the Web site, and if the login name does not already exist, adds it to the Web site.

e.g SPUser usr = myWeb.EnsureUser(“hitenders”);

66) What is a SPSite and SPWeb object, and what is the difference between each of the objects?
The SPSite object represents a collection of sites (site collection [a top level site and all its subsites]). The SPWeb object represents an instance SharePoint Web, and SPWeb object contains things like the actual content. A SPSite object contains the various subsites and the information regarding them.

67) What does a SPWebApplication object represent?
The SPWebApplication objects represents a SharePoint Web Application, which essentially is an IIS virtual server. Using the class you can instigate high level operations, such as getting all the features of an entire Web Application instance, or doing high level creation operations like creating new Web Applications through code.

68) Would you use SPWebApplication to get information like the SMTP address of the SharePoint site?
Yes, since this is a Web Application level setting. You would iterate through each SPWebApplication in the SPWebApplication collection, and then use the appropriate property calls (OutboundMailServiceInstance) in order to return settings regarding the mail service such as the SMTP address.

69) How do you return SharePoint List items using SharePoint web services?
In order to retrieve list items from a SharePoint list through Web Services, you should use the lists.asmx web service by establishing a web reference in Visual Studio. The lists.asmx exposes the GetListItems method, which will allow the return of the full content of the list in an XML node. It will take parameters like the GUID of the name of the list you are querying against, the GUID of the view you are going to query, etc.
Side Question: I got asked how I built queries with the lists.asmx web service. In order to build queries with this service, one of the parameters that the GetListItems method exposes is the option to build a CAML query. There are other ways to do this as well, but that was how I answered it.

70) When retrieving List items using SharePoint Web Services, how do you specify explicit credentials to be passed to access the list items?
In order to specify explicit credentials with a Web Service, you generally instantiate the web service, and then using the credentials properties of the Web Service object you use the System.Net.NetworkCredential class to specify the username, password, and domain that you wish to pass when making the web service call and operations.

71) What is CAML, and why would you use it?
CAML stands for Collaborative Application Markup Language. CAML is an XML based language which provides data constructs that build up the SharePoint fields, view, and is used for table definition during site provisioning. CAML is responsible for rending data and the resulting HTML that is output to the user in SharePoint. CAML can be used for a variety of circumstances, overall is used to query, build and customize SharePoint based sites. A general use would be building a CAML query in a SharePoint WebPart in order to retrieve values from a SharePoint list.

72) What is impersonation, and when would you use impersonation?
Impersonation can basically provide the functionality of executing something in the context of a different identity, for example assigning an account to users with anonymous access. You would use impersonation in order to access resources on behalf of the user with a different account, that normally, that wouldn’t be able to access or execute something.

73) What are WebPart properties, and what are some of the attributes you see when declaring WebPart properties in code?
WebPart properties are just like ASP.NET control properties, they are used to interact with and specify attributes that should be applied to a WebPart by a user. Some of the attributes you see with ASP.NET 2.0 properties are WebDescription, WebDisplayName, Category, Personalizable, and WebBrowsable. Although most of these properties come from the System.Web.UI.WebControls.WebParts class, ones like Category come out of System.ComponentModel namespace.

74) Why are properties important in WebPart development, and how have you exploited them in past development projects? What must each custom property have?
Properties are important because WebParts allow levels of personalization for each user. WebPart properties make it possible for a user to interact, adjust, and increase overall experience value with the programmatic assets that you develop without having the need to use an external editor or right any code. A very simple example of exploiting a property would be something like allowing the user to change the text on the WebPart design interface so that they can display whatever string of text they desire.

Each custom property that you have must have the appropriate get and set accessor methods.

75) What are ClassResources? How do you reference and deploy resources with an ASP.NET 2.0 WebPart?
ClassResources are used when inheriting from the SharePoint.WebPart.WebPartPages.WebPart base class, and are defined in the SharePoint solution file as things that should be stored in the wpresources directory on the server. It is a helpful directory to use in order to deploy custom images. In ASP.NET 2.0, typically things such as images are referenced by embedding them as resources within an assembly. The good part about ClassResources is they can help to eliminate recompiles to change small interface adjustments or alterations to external JavaScript files.

76) What is a SharePoint Solution File? How does it differ from WebPart .cab files in legacy development? What does it contain?
A SharePoint solution file is essentially a .cabinet file with all a developers ustom componets suffixed with a .wsp extension that aids in deployment. The big difference with SharePoint solution files is is that a solution:

allows deployment to all WFE’s in a farm
is highly manageable from the interface allowing deployment, retraction, and versioning
Can package all types of assets like site definitions, feature definitions (and associated components), Webparts, etc.
Can provide Code Access Security provisioning to avoid GAC deployments
And much more..

77) What is a .ddf file and what does it have to do with SharePoint Solution creation?
A .ddf file is a data directive file and is used when building the SharePoint solution bundle specifying the source files and their destination locations. The important thing for someone to understand is that the .ddf file will be passed as a parameter to the MAKECAB utility to orchestrate construction of the SharePoint solution file.

78) What file does a SharePoint solution package use to orchestrate (describe) its packaged contents?
The solution Manifest.XML file.

79) What deployment mechanism can you use to instigate Code Access Security attributes for your WebParts?
SharePoint solution files can add in order to handle code access security deployment issues. This is done in the element in the SharePoint solution manifest.XML, which makes it easier to get assemblies the appropriate permissions in order to operate in the bin directory of the web application.

80) What are event receivers?
Event receivers are classes that inherit from the SpItemEventReciever or SPListEventReciever base class (both of which derive out of the abstract base class SPEventRecieverBase), and provide the option of responding to events as they occur within SharePoint, such as adding an item or deleting an item.

81) When would you use an event receiver?
Since event receivers respond to events, you could use a receiver for something as simple as canceling an action, such as deleting a document library by using the Cancel property. This would essentially prevent users from deleting any documents if you wanted to maintain retention of stored data.

82) What base class do event receivers inherit from?
Event receivers either inherit from the SPListEventReciever base class or the SPItemEventReciever base class, both which derive from the abstract base class SPEventReceiverBase.

83) If I wanted to not allow people to delete documents from a document library, how would I go about it?
You would on the ItemDeleting event set: properties.Cancel= true.

84) What is the difference between an asynchronous and synchronous event receivers?
An asynchronous event occurs after an action has taken place, and a synchronous event occurs before an action has take place. Forexample, an asynchronous event is ItemAdded, and its sister synchronous event is ItemAddin.

85) What does AllowUnsafeUpdates do ?

If your code modifies Windows SharePoint Services data in some way, you may need to allow unsafe updates on the Web site, without requiring a security validation. You can do by setting the

AllowUnsafeUpdates property. C#: using(SPSite mySite = new SPSite(“yourserver”))
{
using(SPWeb myWeb = mySite.OpenWeb())
{
myWeb.AllowUnsafeUpdates = true;
SPList interviewList = myWeb.Lists[“listtoinsert”];
SPListItem newItem = interviewList.Items.Add();
newItem[“interview”] = “interview”;
newItem.Update();
}
}

86) What does RunWithElevatedPrivileges do?

Assume that you have a Web Part in which you want to display information obtained through the Windows SharePoint Services object model, such as the name of the current site collection owner, usage statistics, or auditing information. These are examples of calls into the object model that require site-administration privileges. Your Web Part experiences an access-denied error if it attempts to obtain this information when the current user is not a site administrator. The request is initiated by a nonprivileged user. you can still successfully make these calls into the object model by calling the RunWithElevatedPrivileges method provided by the SPSecurity class. C#:

SPSite siteColl = SPContext.Current.Site;
SPWeb site = SPContext.Current.Web;
SPSecurity.RunWithElevatedPrivileges(delegate()
{
using (SPSite ElevatedsiteColl = new SPSite(siteColl.ID))
{
using (SPWeb ElevatedSite = ElevatedsiteColl.OpenWeb(site.ID))
{
string SiteCollectionOwner = ElevatedsiteColl.Owner.Name;
string Visits = ElevatedsiteColl.Usage.Visits.ToString();
string RootAuditEntries = ElevatedSite.RootFolder.Audit.GetEntries().Count.ToString();
}
}
});

87) What is a SharePoint Feature? What files are used to define a feature?

A SharePoint Feature is a functional component that can be activated and deactivate at various scopes throughout a SharePoint instances:
Scopes include:
Farm, WebApplication, Site (site collection), Web (site)

Features have their own receiver architecture, which allow you to trap events such as when a feature is:
installing, uninstalling, activated, deactivated

The element types that can be defined by a feature include:
menu commands, link commands, page templates, page instances,list definitions,
list instances,event handlers,workflows

The two files that are used to define a feature are:
feature.xml, manifest file(elements.xml)

The feature XML file defines the actual feature and will make SharePoint aware of the installed feature. The manifest file contains details about the feature such as functionality.

Common stsadm commands associated with feature are

stsadm -o installfeature
stsadm -o uninstallfeature
stsadm -o activatefeature
stsadm -o deactivatefeature.

88) What are content types ?

A content type is a flexible and reusable WSS type definition that defines the columns and behavior for an item in a list or a document in a document library.
For example,
-you can create a content type for a customer presentation document with a unique set of columns, an event handler, and its own document template.
-You can create a second content type for a customer proposal document with a different set of columns, a workflow, and a different document template.
Then you can attach both the contenttypes to a document library, which allows you to capture metadata based on the contenttype selected during creation of the document.
Content type can be created by the following
from the rootweb of a site collection, go to Site Action > Site Settings > Galleries > Site content types
using a feature

89) Workflow can be applied to what all elements of SharePoint ?

While workflow associations are often created directly on lists and document libraries, a workflow association can also be created on a content type that exists within the Content Type Gallery for the current site or content types defined within a list.
In short, it can be applied …
At the level of a list (or document library)
At the level of a content type defined at site scope
At the level of a site ( Sharepoint 2010 )

90) What are the ways to initiate the workflow ?

Automatic (on item added or item deleted)
Manual (standard WSS UI interface)
Manual (Custom UI Interface)
Programatically through custom code

91) What are the types of input forms that can be created for a workflow ?

You can create four different types of input forms including an association form, an initiation form, a modification form, and a task edit form. Note that these forms are optional when you create a workflow template.

92) What are ways to create input forms for workflow ?

Two different approaches can be used to develop custom input forms for a WSS workflow template.
You can create your forms by using custom application pages, which are standard .aspx pages deployed to run out of the _layouts directory. ( disadv: lot of code required when compared to Infopath approach)
using Microsoft Office InfoPath 2007 (disadv: picks up a dependenct on MOSS, i.e. it cannot run in a standalone WSS environment).

93) What is the relationship between Microsoft SharePoint Portal Server and Microsoft Windows Services?
Microsoft SharePoint Products and Technologies (including SharePoint Portal Server and Windows SharePoint Services) deliver highly scalable collaboration solutions with flexible deployment and management tools. Windows SharePoint Services provides sites for team collaboration, while Share Point Portal Server connects these sites, people, and business processes-facilitating knowledge sharing and smart organizations. SharePoint Portal Server also extends the capabilities of Windows SharePoint Services by providing organizational and management tools for SharePoint sites, and by enabling teams to publish information to the entire organization.

94) What is a SharePoint Feature? What files are used to define a feature?
A SharePoint Feature is a functional component that can be activated and deactivate at various scopes throughout a SharePoint instances, scope of which are defined as
1. Farm level 2. Web Application level 3. Site level 4. Web level
Features have their own receiver architecture, which allow you to trap events such as when a feature is
Installing, Uninstalling, Activated, or Deactivated.

The element types that can be defined by a feature include
menu commands, link commands, page templates, page instances, list definitions, list instances,
event handlers, and workflows.

The two files that are used to define a feature are the feature.xml and manifest file(elements.xml). The feature XML file defines the actual feature and will make SharePoint aware of the installed feature. The manifest file contains details about the feature such as functionality.

95) Workflow can be applied to what all elements of SharePoint ?
Workflow associations are often created directly on lists and libraries, a workflow association can also be created on a content type that exists within the Content Type Gallery for the current site or content types defined within a list. In short, it can be applied …
At the level of a list/library
At the level of a content type defined at site scope
At the level of a content type defined at list scope

96) What are the types of input forms that can be created for a workflow ?
You can create four different types of input forms including
1. An association form
2. An initiation form
3. A modification form
4. A task edit form.

Note that these forms are optional when you create a workflow template.

97) What are ways to create input forms for workflow ?
Two
1. You can create your forms by using custom application pages, which are standard .aspx pages deployed to run out of the _layouts directory. ( disadv: lot of code required when compared to Infopath approach)
2. Using Microsoft Office InfoPath 2007 (disadv: picks up a dependenct on MOSS, i.e. it cannot run in a standalone WSS environment)

98) What is the difference between method activity and event activity in WorkFlow ?
A method activity is one that performs an action, such as creating or updating a task. An event activity is one that runs in response to an action occurring.

99) What are content types?
A content type is a flexible and reusable WSS type definition (or we can a template) that defines the columns and behavior for an item in a list or a document in a document library. For example, you can create a content type for a leave approval document with a unique set of columns, an event handler, and its own document template and attach it with a document library/libraries.
100) Can a content type have receivers associated with it?
Yes, a content type can have an event receiver associated with it, either inheriting from the SPListEventReciever base class for list level events, or inheriting from the SPItemEventReciever base class. Whenever the content type is instantiated, it will be subject to the event receivers that are associated with it.

101) What two files are typically (this is kept generally) included when developing a content type, and what is the purpose of each?
There is generally the main content type file that holds things like the content type ID, name, group, description, and version. There is also the ContentType.Fields file which contains the fields to include in the content type that has the ID, Type, Name, DisplayName, StaticName, Hidden, Required, and Sealed elements. They are related by the FieldRefs element in the main content type file.

102) What is an ancestral type and what does it have to do with content types?
An ancestral type is the base type that the content type is deriving from, such as Document (0×0101). The ancestral type will define the metadata fields that are included with the custom content type.

103) Can a list definition be derived from a custom content type?
Yes, a list definition can derive from a content type which can be seen in the schema.XML of the list definition in the element.

104) When creating a list definition, how can you create an instance of the list?
You can create a new instance of a list by creating an instance.XML file

105) What is a Field Control?
Field controls are simple ASP.NET 2.0 server controls that provide the basic field functionality of SharePoint. They provide basic general functionality such as displaying or editing list data as it appears on SharePoint list pages.

106) What base class do custom Field Controls inherit from?
This varies. Generally, custom field controls inherit from the Microsoft.SharePoint.WebControls.BaseFieldControl namespace, but you can inherit from the default field controls.

107) Can multiple SharePoint installs point to the same DB?
Multiple SharePoint installs can use the same database server. Not literally the same database on that server. That server must be SQL Server 2000 or SQL Server 2005. It cannot be Oracle or another vendor.

108) How to create links to the mapped network drives?
Creating links to mapped drives in WSS v3 or MOSS 2007 can be done via
the new content type for .lnk files.

109) While creating a Web part, which is the ideal location to Initialize my new controls?
Override the CreateChildControls method to include your new controls. You can control the exact rendering of your controls by calling the .Render method in the web parts Render method.

110) What are the two base classes a WebPart you are going to use within SharePoint 2007 can inherit from?
There are two base classes that a WebPart which is going to be consumed by SharePoint can inherit from, either the
SharePoint WebPart Base class
or the
ASP.NET 2.0 WebPart base class.
When inheriting from the SharePoint WebPart Base class your derived WebPart class will inherit from Microsoft.SharePoint.WebPartPages.WebPart. When inheriting from the ASP.NET 2.0 WebPart base class your derived WebPart class will inherit from System.Web.UI.WebControls.WebParts.WebPart. It is considered good practice to use the ASP.NET WebPart base class since the old base class is meant for backwards compatibility with previous version of SharePoint, however there are four exception when it is better to leverage functionality from the SharePoint WebPart base class:
Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure

111) What are the differences between the two base classes and what are the inherit benefits of using one over another?
The difference is the Microsoft.SharePoint.WebPartPages.WebPart base class is meant for backward compatibility with previous versions of SharePoint. The benefit of using the SharePoint WebPart base class is it supported:
Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure
ASP.NET 2.0 WebParts are generally considered better to use because SharePoint is built upon the ASP.NET 2.0 web architecture. Inheriting from the ASP.NET 2.0 base class offers you features that inherit to ASP.NET 2.0, such as embedding resources as opposed to use ClassResources for deployment of said types.

112) What is the WebPartManager sealed class? What is its purpose?
The WebPartManager sealed class is responsible for managing everything occurring on a WebPart page, such as the WebParts (controls), events, and misc. functionality that will occur in WebPartZones. For example, the WebPartManager is responsible for the functionality that is provided when you are working with moving a WebPart from WebPartZone to WebPartZone. It is known as the “the central class of the Web Part Control Set”.

 

 

Salesforce Interview Questions

Top most important Salesforce interview questions and answers by Experts:

Here is a list of Top most important Salesforce interview questions and answers by Experts.If you want to download Salesforce interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Salesforce interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Salesforce ,Register for Salesforce online training here.

 

1) For which criteria in workflow “time dependent workflow action” cannot be created?
Created, and every time it’s edited

2) What is the advantage of using custom settings?
You dont have to query in apex (fire select query) to retrieve the data stored in custom settings.

3) What are the different workflow actions available in workflows?
     1. Field update

     2. Email alert

     3. send Outbound messages

     4. Create new task

4) What is whoid and whatid in activities?
    Whoid is the id of either contact or Lead. Whatid is the id of the related to record in   activity record(standard or custom object)

5) What is the difference between a standard controller and custom controller
Standard controller inherits all the standard object properties, standard button functionalities can be directly used. Custom controller defines custom functionalities, a standard controller can be extended to develop custom functionalities using keyword “extenssions”

6) Can you have more than one extenssions associated with a single page?
     Yes we can have more than extenssions.

7) If page is having multiple extenssions and if two extenssions have methods of same name.Then which method out of these two will be called upon calling from vf page ?
  The one which is present in the controller defined on the left side will be called.

8) What are governer limits ?
Governer limits are the limits imposed by salesforce so as to avoid monopoly by orgs in using salesforce shared resources.

9)how can we implement pagination in visualforce ?
Use standardset controllers for implementing pagination.

10) What is the difference between force.com and salesforce.com

Force.com is paas(platform as a service) and salesforce.com is Saas(software as a service)

11) What is a externalid in salesforce

It is a field which can be used to store a value that is used as a refernce for that record in other system. For example if you have a record in system ‘xyz’ where it is referenced by some value then that value can be used as external id in salesforce for that record. External id can be used for upsert operation in data loader

12) What happens upon lead conversion ?

When lead is converted a contact, account and optionally an opportunity is created.

13) What are different ways of deployment in salesforce ?

 Change sets, eclipse and ANT

14) How can you override a list button with a visuaflorce page?

Visualforce page should be a list controller that is it should have “recordsetVar” attribute defined in page tag.

15) Is it possible to bypass Grant Access Using Hierarchies in case of standard objects ?

 No. This is default and cannot be changed.

16) How can you call a controller method from java script ?

Use action function component to call controller method from java script.

17) How can you call a visualforce page from a controller method?

 Use pagereference object for calling a visualforce page from controller method

18) How can you sort a select SOQl query ?

Use order by clause in select query for sorting a list of records

19) How much code coverage is needed for deployment?

Each trigger should have minimum of 1%. Class can have 0%. But, the total code covergae of 75%.

20) Can ‘set’ store duplicate values in it?

No. Set only stores unique values. List can have duplicate values in it.

21) Can two users have same profiles?

Yes

22) How can you refresh a particular section of a  visualforce page?

This can be done using reRender attribute

23) How can you create a many to many relationship in salesforce

This can be done by creating junction object between the two objects.

24) What happens to detail record when a master record is deleted?

Detail record gets deleted.

25) What happens to child record when a parent record is deleted(look up relationship)?

Child record remains undeleted

26) How to get current logged in users id in apex ?

Use Userinfo.getuserid() to get the current logged in user’s id in apex.

27) How to convert a csv file  browsed in visualforce page into a string.

Use csvfilecontents.tostring(). method to convert blob to string

28) How many records can a select query return ?
 As of now it can return upto 50000 records.

29) How many records can a sosl query return ?

As of now it can return upto 2000 records

30)How to fire dynamic query in soql?

Using database.query
Example: List<account> accList = Database.query(‘select name from account’);

31) What is a bucket field in reports?

This field is used for custom grouping of values in a field. This can be used in summarising the report.

32) What are dynamic dashboards ?

Dashboards which run for logged in user are dynamic dashboards

33) Can the dynamic dashboards be scheduled?

No they cannot be scheduled.

34) How can you use custom label; in visualforc page?
Use this syntex for accessing custom albel in visualforce page – {!$Label.Samplelabel}

35) What are the types of custom settings in salesforce?
List type and Heirarchy type

36) What are the different types of collections in apex?
Ans: There are three types of collections in apex language

1. Set
2. List
3. Map

37) What are maps in apex?

Map has keys and values. A key points to a single value. Map can be used to store realationship between two entities. Keys in map are unique. Values can be duplicated.

38) What are the different types of object relations in salesforce ?

1. One to many
2. Many to many
3. Master detail

39) Can you have roll up summary fields in case of parent child relationship?
No. These are present only in case of master details relationship.

40) Can you see a lead which is converted in saleforce UI

The detail record is not seen. But a page, wherein it shows the links for formed account, contact and opportunity.

41) What is the difference between action function and action support ?

Action functions can call controller method from java script, action support adds support to other components.

42) What is action poller in visualforce ?

Action poller sends AJAX request with a specified time interval.

43) What are the different types of reports available in salesforce?

1. tabular report
2. Summary Report
3. Matrix Report
4. Joined Report

44) How many active assignments rule can you have in lead/Case?

You can have only one active assignment rule at a time

45) How do we access static resource in visualforce?

Use this syntex for accessing static resource {!$Resource.Testresourcename}

46) How to embed a visaulflow in a visualforce page ?

Use this syntex to embed flow in vf page : <flow:interview />

47) How to enable inline editing in visauflorce page ?

You can enable inline editing in visualforce page by using <apex:inlineEditSupport> component.

48) What is trigger.new in trigger ?

Trigger.new is a list of records that are in the context of trigger or becuase of these records(modification,Creation, deletion) the trigger has been called

49) How do we bulkify the trigger ?

Bulkfification requires iterating over all the records in trigger context
for example : for(account ac: trigger.new){
// your logic here
}

50) How can we get the old value in trigger ?
Use trigger.old map for getting previous values of fields.

51) Can we modify records directly in trigger.new ?

Trigger.new is a read only list, but field values can be changed in case of before trigger

52) What does the error “list has no rows for assignment” mean?

It means the list you are trying to access has no values in it.

53) Why should we not write select query within for loop?

Writing select query within for loop may hit the governer limit of 100 select queries.

54) What should we do to avoid view state error in visualforce page?

Clear unused collections, define variable as transient.

55) What is a sandbox org?

It is the exact copy of your production org.

56) What is sosl?

Select query that can return records of multiple objects as list of lists

57) How many records a select query soql can return?

As of now the limit is 50000

58) What is the full form of AJAX?

It stands for assynchronous java and XML

59) Why do we need to write test classes?

Salesforce does not allow deployment in production if the test coverage is less than 75%

60) How can you show a custom error message in trigger?
This can be done using addError() method in trigger

61) What is the use of future annotation?

Future method starts execution when Salesforce has resources available.That is for asynchronous execution.

62) How to identify if a class is a test class?

Test class always begins with @isTest

63) How to convert a blob variable into a string?

Use to String to convert blob into string.

64) What are the different methods of batch apex class?
Start method, execute method and finish method

65) What is’ with sharing’ in apex class code?
When you use ‘with sharing’, user’s permissions and field-level security are respected. In case of ‘without sharing’ code runs in system mode.

66) How many records can a sosl return ?

It can return 2000 records as of now as per governers limit

67) Can you use dml statement in visualforce compoenent controller ?

To use dml in visualforce component you have to declare allowdml=true in visualforce component otherwise you will get an exception
“DML is currently not allowed”

68) Can you write sosl in trigger>?

Earlier this was not allowed but now sosl are allowed in triggers.

69) Which are the different access modifiers in apex?

1. Private

2. Public

3. Protected

4.Global are the four access modifiers allowed in apex

70) Can you change the master of a detail record in salesforce ?

Yes provided you have ticked marked “Allow reparenting” in field setting otherwise the field is read only and master cannot be changed.

71) How can you lock records in apex?

Use For update in query to lock the record. For example: [select id,name from contact limit 10 For update];

72) IS there any limit on the number of items that can be stored in apex collections?

There is ni such limit but we need to consider heap size limit 6mb (6 MB as of now)

73) How can you monitor future actions of time based workflow?

setup –> administration set up –> monitoring –> time based workflow

74) What is visaulforce component ?

It is a piece of code that can be reused. It can be encapsulated in other visualforce pages.

75) Ho can you display the status of an AJAX update request in a visualforce page ?

To display AJAX request status we can use <apex:actionstatus> component.

76) How can you access custom label in apex:

Example –> string custLabelstr = System.Label.LabelNamehere

77) How can you get all the keys of a map variable ?
 USe method keyset() for this

78) What are the different types of sandboxes in salesforce ?
Developer, Developer Pro, Partial Data and Full are the 4 types of sandboxes in salesforce.

79) With what frequency can you refresh a full copy sandbox?

Full copy sandbox can be refreshed every 29 days from production.

80) How can you make fields required on a visualforce page?

mark required = true as done in the example below:
<apex:inputfield value=”{!account.Description}” required=”true”/>

81) What is minimum coverage for every trigger for deployment?

Every trigger should have a minimum coverage of 1%. Total coverage should be 75%

82) What is minimum coverage for every class for deployment?

There is no such requirement. A class can have 0% but the total coverage should be >75%

83) How can you implement custom functionality for a standardcontroller visualforce page?

This can be done by associating a controller class with that standard controller using “Extenssions”

84) How can you get the current record id in a visualforce page ?

Use ApexPages.CurrentPage().getparameters().get(‘id’) to get the current record id in visaulforce page.

85) Can a user change his own profile in salesforce ?

No, a user cannot change change his own profile !!

86) Can a user change his own role?

Yes this can be done !!

87) Reset security token option is unavailabel in set up. What could be the reason?

If in the profile setting “login ip ranges” have been set up then the option of “reset security token” is uanvailbale.

88) How can you skip record type selection page(and take up default record type) while creating new record of a aprticular object ?

Just tickmark against the object by navigating to following :
set up –> my personal information — > Record type selection –> check against the required object

89) What are the different data types that a standard field record name can have?

Record name field can have either of the two data types : Auto Number or Text data type

Example = Set<id> idSet = mapname.keyset();

90) How can you compare values of a picklist field in validation rule?

For comparing picklist value use ispickval
ISPICKVAL(picklist_field, text_to_compare)

91) Can you edit a apex trigger/apex class in production environment ?

No apex trigger /class cannot be edited in production.

92) Can you edit a visuaflorce apge in production environment ?

Yes this can be done.

93)How can you deliver a visualforce page in excel form ?
Use contentType=”application/vnd.ms-excel#Contacts.xls” in page component of visualforce page

94) What is trigger.new?

It is a list of records in current context in a trigger.

95) What does it mean when you get the error “too many soql queries 101 salesforce”

 It means you are hitting the limit of 100 soql queries as per governers limit

96) How can you create a input field for date on a visualforce page ?

 To create a input date field on vf page you will have to bind it with a existing date field on any object.

97) How can you convert a text to upper string ?

stringname.toUppercase();

98) How can you convert a integer into a string ?

string.valueof(integerName);

99) What are the different types of email templates that can be created in salesforce?

Test, HTML (using Letterhead), Custom (without using Letterhead) and Visualforce.

100) How can you display different picklist values for picklist fields in different page layouts?

This can be done using record types.

 

 

CCNA Interview Questions

Top most important CCNA interview questions and answers by Experts:

Here is a list of Top most important CCNA interview questions and answers by Experts.If you want to download CCNA interview questions pdf free ,you can register with RVH techguru. Our experts prepared these CCNA interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in CCNA ,Register for CCNA online training here.

 

1) What is Routing?

Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.

2) What is the purpose of the Data Link?

The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.

3) What is the key advantage of using switches?

When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.

4) When does network congestion occur?

Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.

5) What is a Window in networking terms?

A Window refers to the number of segments that is allowed to be sent from source to destination before an acknowledgement is sent back.

6) Does a bridge divide a network into smaller segments?

Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network.

7) Which LAN switching method is used in CISCO Catalyst 5000?

This model uses the Store-and-forward switching method. It stores the entire frame to its buffers and performs a crc check before deciding whether or not to forward that data frame.

8 ) What is the role of the LLC sublayer?

The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction.

9) How does RIP differ from IGRP?

RIP relies on the number of hops in order to determine the best route to a network. On the other hand, IGRP takes consideration many factors before it decides the best route to take, such as bandwidth, reliability, MTU and hop count.

10) What are the different memories used in a CISCO router?

– NVRAM stores the startup configuration file
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.

11) What is BootP?

BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as the IP address of the server PC.

12) What is the function of the Application Layer in networking?

The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchonizes applications on the server and client.

13) Differentiate User Mode from Privileged Mode

User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.

14) What is 100BaseFX?

This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed.

15) Differentiate full-duplex from half-duplex.

In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.

16) What is MTU?

MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out onto the data line without the need to fragment it.

17) How does cut-through LAN switching work?

In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out again and forward it to the next network segment after reading the destination address.

18) What is latency?

Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.

19) Utilizing RIP, what is the limit when it comes to number of hops?

The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered unreachable.

20) What is a Frame Relay?

Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical Layers.

21) How do you find valid hosts in a subnet?

The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets.

22) What is DLCI?

DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order to uniquely identify each virtual circuit that exists on the network.

23) Briefly explain the conversion steps in data encapsulation.

From a data transmitter’s point of reference, data from the end user is converted to segments. Segments are then passed on to the other layers and converted into packets or datagrams. These packets are then converted into frames before passing on to the network interface. Finally, frames are converted to bits prior to actual data transmission.

24) What are the different types of passwords used in securing a CISCO router?

There are actually five types of passwords that can be used. These are enable secret, enable, virtual terminal, console, and auxiliary.

25) Why is network segmentation a good idea when managing a large network?

For a network administration, segmenting a network would help ease network traffic and ensures that high bandwidth is made available at all times for all users. This translates to better performance especially for a growing network.

26) What are the things that can be accessed in a CISCO router’s identifying information?

The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed configurations that refer to the router ports.

27) Differentiate Logical Topology from Physical Topology

Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual layout of the network medium.

28) What causes a triggered update to reset the router hold-down timer?

This may happen when the hold-down timer has already expired, or when the router received a processing task that incidentally was proportional to the number of links in the inter-network.

29) In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?

  1. erase running-config
    B. erase startup-config
    C. erase nvram
    D. delete nvram
    Correct Answer: B. erase startup-config

30) Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?

Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit

Correct Answer: (config-if)# dialer-group 1

31) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?

  1. The highest IP address of any physical interface.
    B. The lowest IP address of any logical interface.
    C. The middle IP address of any logical interface..
    D. The lowest IP address of any physical interface.
    E. The highest IP address of any interface.
    F. The highest IP address of any logical interface.
    G. The lowest IP address of any interface.

Correct Answer: A. The highest IP address of any physical interface.

 

32) Mention what is the difference between the switch, hub, and router?

 

 

Hub Switch Router
Hub has single broadcast domain and collision domain. Anything comes in one port is sent out to the others.  It is a device that filters and forwards packets between LAN segments. Switches have single broadcast domain and multiple collision domains. It supports any packet protocol, as such it operates at the data link layer 2 and layer 3  Router is a device which transmits data packets along networks.

 

33) Mention what is the size of IP address?

Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

34) Mention what does data packets consist of?

A data packet consists of sender’s information, recipient’s information, and the data contained.  It also has the numeric identification number that defines the packet number and order.  When data is send across the network, that information is segmented into data packets.  In short, data packets carry the information and routing configuration for your transferred message.

35) Mention what is DHCP?

DHCP stands for Dynamic Host Configuration Protocol.  DHCP assigns an IP address automatically to a given workstation client.  You can also make static IPS for machines like printers, servers, routers and scanners.

36) Mention what is BOOTP?

BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server.

37) Explain why is UDP lease favored when compared to TCP?

It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and acknowledgments

38) Mention what is the difference between dynamic IP and static IP addressing?

Dynamically IP addresses are provided by DHCP server and static IP address are given manually.

39) Mention what are the ranges for the private IPS?

Ranges for private IPS are

  • Class A: 10.0.0.0 – 10.0.0.255
  • Class B: 172.16.0.0 – 172.31.0.0
  • Class C: 192.168.0.0 – 192.168.0.255

40) In how many ways you can access router?

You can access it in three ways

  • Telnet (IP)
  • AUX (Telephone)
  • Console (Cable)

41) Explain what is EIGRP?

EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco Systems.  It is availed on a router to share routes with other routers within the same autonomous system. Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the router and the amount of data that needs to be transferred.

42) Mention what is the matric of EIGRP protocol?

EIGRP protocol consists of

  • Bandwidth
  • Load
  • Delay
  • Reliability
  • MTU
  • Maximum Transmission Unit

43) Mention what does the clock rate do?

Clockrate enables the routers or DCE equipment to communicate properly.

44) Mention what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

Erase startup- coding is the command you must use if you want to delete the configuration data that is stored in the NVRAM

45) Mention what is the difference between TCP and UDP?

 TCP and UDP both are protocols for sending files across computer network 

TCP (Transmission Control Protocol)               UDP (User Datagram Protocol)
TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part.  While transferring a message, there is no corruption while transferring a message  UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage
The message will deliver in the order it is sent  The message you sent may not be in the same order
Data in TCP is read as a stream, where one packet ends, and another begins  Packets are transmitted individually and are guaranteed to be whole if they arrive
Example of TCP includes World Wide Web, file transfer protocol, e-mail,  Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),

46) Explain the difference between half-duplex and full-duplex?

Full duplex means that the communication can occur in both directions at the same time, while half duplex means that the communication can occur in one direction at time.

 47) Mention the conversion steps of data encapsulation?

Conversion steps of data encapsulation includes

Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted into Data

  • Layer Four (Transport): Data is converted into small segments
  • Layer Five (Network): Data converted into packets or datagrams and Network header is added
  • Layer Six (Data Link): Datagrams or packets are built into frames
  • Layer Seven (Physical): Frames are converted into bits

48) What command do we give if router IOS is stucked?

Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.

 49) Explain what is route poisoning?

Route poisoning is a technique of preventing a network from transmitting packets through a route that has become invalid.

50) What route entry will be assigned to dead or invalid route in case of RIP?

In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it unreachable.

51) How do you configure a Cisco router to route IPX?

The initial thing to do is to enable IPX routing by using the “ipx routing” command. Each interface that is used in the IPX network is then configured with a network number and encapsulation method.

52) What are the different IPX access lists?

There are two access lists: Standard and Extended. Standard Access List can only filter the source or destination IP address. An Extended Access List uses the source and destination IP addresses, port, socket and protocol when filtering a network.

53) Explain the benefits of VLANs.

VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others. This is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location.

54) What is subnetting?

Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.

55) What are the advantages of a layered model in the networking industry?

A layered network offers many advantages. It allows administrators to make changes in one layer without the need to make changes in the other layers. Specialization is encouraged, allowing the network industry to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.

56) Why is UDP lease favored when compared to TCP?

It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and acknowledgements.

57) What are some standards supported by the Presentation layer?

Presentation layer supports many standards, which ensures that data is presented correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.

58) What’s the simplest way to remotely configure a router?

In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.

59) What does the show protocol display?

– routed protocols that is configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface

60) How do you depict an IP address?

It can be done in three possible ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1

61) How do you go to privileged mode? How do you switch back to user mode?

To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user mode, enter the command “disable”

62) What is HDLC?

HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.

63) How are internetworks created?

Internetworks are created when networks are connected using routers. Specifically, the network administrator assigns a logical address to every network that connects to the router.

64) What is Bandwidth?

Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and is measured in Kbps.

65) How does Hold-downs work?

Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer.

66) What are packets?

Packets are the results of data encapsulation. These are data that has been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.

67) What are segments?

Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer.

68) Give some benefits of LAN switching.

– allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration

69) What is Route Poisoning?

Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.

 

Bigdata Interview Questions

Top most important Bigdata interview questions and answers by Experts:

Here is a list of Top most important Bigdata interview questions and answers by Experts.If you want to download Bigdata interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Bigdata interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Bigdata ,Register for Bigdata online training here.
1) What is Big Data?
Big data is data that exceeds the processing capacity of traditional database systems. The data is too big, moves too fast, or doesn’t fit the strictures of your database architectures. To gain value from this data, you must choose an alternative way to process it.

Name any org. who is generating Big Data?
Facebook,Google

2) What is NoSQL?
NoSQL is a whole new way of thinking about a database. NoSQL is not a relational database. The reality is that a relational database model may not be the best solution for all situations. The easiest way to think of NoSQL, is that of a database which does not adhering to the traditional relational database management system (RDMS) structure. Sometimes you will also see it revered to as ‘not only SQL’.

3) We have already SQL then Why NoSQL?
NoSQL is high performance with high availability, and offers rich query language and easy scalability.
NoSQL is gaining momentum, and is supported by Hadoop, MongoDB and others. The NoSQL Database site is a good reference for someone looking for more information.

4) What is Hadoop and where did Hadoop come from?
By Mike Olson: The underlying technology was invented by Google back in their earlier days so they could usefully index all the rich textural and structural information they were collecting, and then present meaningful and actionable results to users. There was nothing on the market that would let them do that, so they built their own platform. Google’s innovations were incorporated into Nutch, an open source project, and Hadoop was later spun-off from that. Yahoo has played a key role developing Hadoop for enterprise applications.

5) What problems can Hadoop solve?
By Mike Olson: The Hadoop platform was designed to solve problems where you have a lot of data — perhaps a mixture of complex and structured data — and it doesn’t fit nicely into tables. It’s for situations where you want to run analytics that are deep and computationally extensive, like clustering and targeting. That’s exactly what Google was doing when it was indexing the web and examining user behavior to improve performance algorithms.

6) What is the Difference between Hadoop and Apache Hadoop?
There is no diff, Hadoop, formally called Apache Hadoop, is an Apache Software Foundation project.

7) What is the difference between SQL and NoSQL?

Is NoSQL follow relational DB model?
No

8) Why would NoSQL be better than using a SQL Database? And how much better is it?
It would be better when your site needs to scale so massively that the best RDBMS running on the best hardware you can afford and optimized as much as possible simply can’t keep up with the load. How much better it is depends on the specific use case (lots of update activity combined with lots of joins is very hard on “traditional” RDBMSs) – could well be a factor of 1000 in extreme cases.

9) Name the modes in which Hadoop can run?
Hadoop can be run in one of three modes:
i. Standalone (or local) mode
ii. Pseudo-distributed mode
iii. Fully distributed mode

10) What do you understand by Standalone (or local) mode?
There are no daemons running and everything runs in a single JVM. Standalone mode is suitable for running MapReduce programs during development, since it is easy to test and debug them.

11) What is Pseudo-distributed mode?
The Hadoop daemons run on the local machine, thus simulating a cluster on a small scale.

12) What does /var/hadoop/pids do?
It stores the PID.

13) What is the full form of HDFS?
Hadoop Distributed File System

14) What is the idea behind HDFS?
HDFS is built around the idea that the most efficient approach to storing data for processing is to optimize it for write once, and read many approach.

15) Where does HDFS fail?
Cannot support large number of small files as the file system metadata increases with every new file, and hence it is not able to scale to billions of files. This file system metadata is loaded into memory and since memory is limited, so is the number of files supported.

16) What are the ways of backing up the filesystem metadata?
There are 2 ways of backing up the filesystem metadata which maps different filenames with their data stored as different blocks on various data nodes:
Writing the filesystem metadata persistently onto a local disk as well as on a remote NFS mount.
Running a secondary namenode.

17) What is Namenode in Hadoop?
Namenode is the node which stores the filesystem metadata i.e. which file maps to what block locations and which blocks are stored on which datanode.

18) What is DataNode in Hadoop?
Namenode is the node which stores the filesystem metadata i.e. which file maps to what block locations and which blocks are stored on which datanode.

19) What is Secondary NameNode?
The Secondary NameNode (SNN) is an assistant daemon for monitoring the state of the cluster HDFS, Like the NameNode, Each cluster has one SNN, and it typically resides on its own machine as well.

20) What is JobTracker in Hadoop?
The JobTracker is the service within Hadoop that farms out MapReduce tasks to specific nodes in the cluster, ideally the nodes that have the data, or at least are in the same rack.

21) What are the functions of JobTracker in Hadoop?
Once you submit your code to your cluster, the JobTracker determines the execution plan by determining which files to process, assigns nodes to different tasks, and monitors all tasks as they are running.
If a task fail, the JobTracker will automatically relaunch the task, possibly on a different node, up to a predefined limit of retries.
There is only one JobTracker daemon per Hadoop cluster. It is typically run on a server as a master node of the cluster.

22) What is MapReduce in Hadoop?
Hadoop MapReduce (Hadoop Map/Reduce) is a software framework for distributed processing of large data sets on compute clusters of commodity hardware. It is a sub-project of the Apache Hadoop project. The framework takes care of scheduling tasks, monitoring them and re-executing any failed tasks.

23) What are the Hadoop configuration files?
1. hdfs-site.xml
2. core-site.xml
3. mapred-site.xml

24) Name the most common Input Formats defined in Hadoop? Which one is default?

The two most common Input Formats defined in Hadoop are:

  • TextInputFormat
  • KeyValueInputF5ormat
  • SequenceFileInputFormat

TextInputFormat is the Hadoop default.

25) What is the difference between TextInputFormat and KeyValueInputFormat class?

TextInputFormat: It reads lines of text files and provides the offset of the line as key to the Mapper and actual line as Value to the mapper.

KeyValueInputFormat: Reads text file and parses lines into key, Val pairs. Everything up to the first tab character is sent as key to the Mapper and the remainder of the line is sent as value to the mapper.

26) What is InputSplit in Hadoop?

When a Hadoop job is run, it splits input files into chunks and assign each split to a mapper to process. This is called InputSplit.

27) How is the splitting of file invoked in Hadoop framework?

It is invoked by the Hadoop framework by running getInputSplit()method of the Input format class (like FileInputFormat) defined by the user.

28) Consider case scenario: In M/R system, – HDFS block size is 64 MB

– Input format is FileInputFormat

–We have 3 files of size 64K, 65Mb and 127Mb

29) How many input splits will be made by Hadoop framework?

Hadoop will make 5 splits as follows:

– 1 split for 64K files

– 2 splits for 65MB files

– 2 splits for 127MB files

30) What is the purpose of RecordReader in Hadoop?

The InputSplit has defined a slice of work1, but does not describe how to access it. The RecordReader class actually loads the data from its source and converts it into (key, value) pairs suitable for reading by the Mapper. The RecordReader instance is defined by the Input Format.

31) After the Map phase finishes, the Hadoop framework does “Partitioning, Shuffle and sort”. Explain what happens in this phase?

Partitioning: It is the process of determining which reducer instance will receive which intermediate keys and values. Each mapper must determine for all of its output (key, value) pairs which reducer will receive them. It is necessary that for any key, regardless of which mapper instance generated it, the destination partition is the same.

Shuffle: After the first map tasks have completed, the nodes may still be performing several more map tasks each. But they also begin exchanging the intermediate outputs from the map tasks to where they are required by the reducers. This process of moving map outputs to the reducers is known as shuffling.

Sort: Each reduce task is responsible for reducing the values associated with several intermediate keys. The set of intermediate keys on a single node is automatically sorted by Hadoop before they are presented to the Reducer.

32) If no custom partitioner is defined in Hadoop then how is data partitioned before it is sent to the reducer?

The default partitioner computes a hash value for the key and assigns the partition based on this result.

33)  What is a Combiner?

The Combiner is a ‘mini-reduce’ process which operates only on data generated by a mapper. The Combiner will receive as input all data emitted by the Mapper instances on a given node. The output from the Combiner is then sent to the Reducers, instead of the output from the Mappers.

34) What is JobTracker?

JobTracker is the service within Hadoop that runs MapReduce jobs on the cluster.

35) What are some typical functions of Job Tracker?

The following are some typical tasks of JobTracker:-

– Accepts jobs from clients

– It talks to the NameNode to determine the location of the data.

– It locates TaskTracker nodes with available slots at or near the data.

– It submits the work to the chosen TaskTracker nodes and monitors progress of each task by receiving heartbeat signals from Task tracker.

36) What is TaskTracker?

TaskTracker is a node in the cluster that accepts tasks like MapReduce and Shuffle operations – from a JobTracker.

37) What is the relationship between Jobs and Tasks in Hadoop?

One job is broken down into one or many tasks in Hadoop.

38) Suppose Hadoop spawned 100 tasks for a job and one of the task failed. What will Hadoop do?

It will restart the task again on some other TaskTracker and only if the task fails more than four (default setting and can be changed) times will it kill the job.

39) Hadoop achieves parallelism by dividing the tasks across many nodes, it is possible for a few slow nodes to rate-limit the rest of the program and slow down the program. What mechanism Hadoop provides to combat this?

Speculative Execution.

40) How does speculative execution work in Hadoop?

JobTracker makes different TaskTrackers pr2ocess same input. When tasks complete, they announce this fact to the JobTracker. Whichever copy of a task finishes first becomes the definitive copy. If other copies were executing speculatively, Hadoop tells the TaskTrackers to abandon the tasks and discard their outputs. The Reducers then receive their inputs from whichever Mapper completed successfully, first.

41) Using command line in Linux, how will you

– See all jobs running in the Hadoop cluster

– Kill a job?

Hadoop job – list

Hadoop job – kill jobID

42)  What is Hadoop Streaming?

Streaming is a generic API that allows programs written in virtually any language to be used as Hadoop Mapper and Reducer implementations.

43) What is the characteristic of streaming API that makes it flexible run MapReduce jobs in languages like Perl, Ruby, Awk etc.?

Hadoop Streaming allows to use arbitrary programs for the Mapper and Reducer phases of a MapReduce job by having both Mappers and Reducers receive their input on stdin and emit output (key, value) pairs on stdout.

44) What is Distributed Cache in Hadoop?

Distributed Cache is a facility provided by the MapReduce framework to cache files (text, archives, jars and so on) needed by applications during execution of the job. The framework will copy the necessary files to the slave node before any tasks for the job are executed on that node.

45) What is the benefit of Distributed cache? Why can we just have the file in HDFS and have the application read it?

This is because distributed cache is much faster. It copies the file to all trackers at the start of the job. Now if the task tracker runs 10 or 100 Mappers or Reducer, it will use the same copy of distributed cache. On the other hand, if you put code in file to read it from HDFS in the MR Job then every Mapper will try to access it from HDFS hence if a TaskTracker run 100 map jobs then it will try to read this file 100 times from HDFS. Also HDFS is not very efficient when used like this.

46) What mechanism does Hadoop framework provide to synchronise changes made in Distribution Cache during runtime of the application?

This is a tricky question. There is no such mechanism. Distributed Cache by design is read only during the time of Job execution.1

47) Have you ever used Counters in Hadoop. Give us an example scenario?

Anybody who claims to have worked on a Hadoop project is expected to use counters.

48) Is it possible to provide multiple input to Hadoop? If yes then how can you give multiple directories as input to the Hadoop job?

Yes, the input format class provides methods to add multiple directories as input to a Hadoop job.

49) Is it possible to have Hadoop job output in multiple directories? If yes, how?

Yes, by using Multiple Outputs class.

50) What will a Hadoop job do if you try to run it with an output directory that is already present? Will it

– Overwrite it

– Warn you and continue

– Throw an exception and exit

The Hadoop job will throw an exception and exit.

51) How can you set an arbitrary number of mappers to be created for a job in Hadoop?

You cannot set it.

52) How can you set an arbitrary number of Reducers to be created for a job in Hadoop?

You can either do it programmatically by using method setNumReduceTasks in the Jobconf Class or set it up as a configuration setting.

53) How will you write a custom partitioner for a Hadoop job?

To have Hadoop use a custom partitioner you will have to do minimum the following three:

– Create a new class that extends Partitioner Class

– Override method getPartition

– In the wrapper that runs the Mapreduce, either

– Add the custom partitioner to the job programmatically using method set Partitioner Class or – add the custom partitioner to the job as a config file (if your wrapper reads from config file or oozie)

54)  How did you debug your Hadoop code?

There can be several ways of doing this but most common ways are:-

– By using counters.

– The web interface provided by Hadoop framework.

55) How will you add/delete a Node to the existing cluster?
Add: Add the host name/Ip address in dfs.hosts/slaves file and refresh the cluster with $hadoop dfsamin -refreshNodes
Delete: Add the hostname/Ip address to dfs.hosts.exclude/remove the entry from slaves file and refresh the cluster with $hadoop dfsamin -refreshNodes

56) What is SSH? What is the use of it In Hadoop?
Secure Shell.
57) How will you setup Password-less SSH?
Search in this sitess
58) How will you format the HDFS? How frequently it will be done?
$hadoop namnode -format.
Note: Format had to be done only once that to during initial cluster setup.

59) Do you know about cron jobs? How will you Setup?
 In Ubuntu, go to the terminal and type:
$ crontab -e

this will open our personal crontab (cron configuration file), the first line in that file explains it all, In every line we can define one command to run, and the format is quite simple. So the structure is:

minute hour day-of-month month day-of-week command

For all the numbers you can use lists eg, 5,34,55 in the first field will mean run at 5 past 34 past and 55 past what ever hour is defined.

60) What is the role of /etc/hosts file in setting up of HDFS cluster?
For hostname to Ip address maping
61) What is dfsadmin command in Hadoop?
Via HDFS web UI, we can see no of decommissioned nodes and we need to rebalance the cluster now

62) What is the impact if namenode fails and what are the necessary action items now?
 Entire hdfs will be down and we need to restart the namenode after copying fsimage and edits from secondaryNN
63) What is Log4j?
Logging Framework
64) How do we set logging level for hadoop daemons/commands?
In log4j.properties or in hadoop-env.sh file, hadoop.root.logger=INFO,console (WARN,DRFA)
Is there any impact on mapreduce jobs if there is no mapred-site.xml file created in HADOOP_HOME/conf directory but all

65) the necessary properties are difined in yarn-site.xml?
No
66) How does Hadoop’s CLASSPATH plays vital role in starting or stopping in hadoop daemons.
Classpath will contain list of directories containing jar files required to start/stop daemons for example HADOOP_HOME/share/hadoop/common/lib contains all the common utility jar files.

67) What is the default logging level in hadoop?
hadoop.root.logger=INFO,console.
68) What is the ‘hadoop.tmp.dir’ configuration parameter default to ?
It is user.name. We need a directory that a user can write and also not to interfere with other users. If we didn’t include the username, then different users would share the same tmp directory. This can cause authorization problems, if folks’ default umask doesn’t permit write by others. It can also result in folks stomping on each other, when they’re, e.g., playing with HDFS and re-format their filesystem.
69) How do we verify the status and health of the cluster?
If there is no configuration error at client machine or namenode machine, a common cause for this is the Hadoop service isn’t running. If there is problem with Check that there isn’t an entry for our hostname mapped to 127.0.0.1 or 127.0.1.1 in /etc/hosts.
70) How do we set a configuration property to be unique/constant across the cluster nodes and no slave nodes should override this?
We can achive this by defining this property in core/hdfs/mapred/yarn-site.xml file on namenode with final tag as shown below.
<name>mapreduce.task.io.sort.mb</name>

<value>512</value>

<final>true</final>

71) Does the name-node stay in safe mode till all under-replicated files are fully replicated?
No. The name-node waits until all or majority of data-nodes report their blocks. But name-node will stay in safe mode until a specific percentage of blocks of the system is minimally replicated. minimally replicated is not fully replicated.

 

 

Web Design Interview questions

Top most important Web Design interview questions and answers by Experts:

Here is a list of Top most important Web Design interview questions and answers by Experts.If you want to download Web Design interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Web Design interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Web Design ,Register for Web Design online training here.

 

1) What do you mean by CSS File? What is the use of this file ?
     CSS stands for “Cascading Style Sheets”, and are used to control and manage font styles, font sizes, and web site colour        combinations that are used in a web page. In order to retain continuity of “look and feel” throughout a website, all pages within a website will often refer to a single CSS file. The CSS file is typically contained in a separate file from the website, and the various web pages retrieve the CSS file each time a web page is displayed. CSS files make global appearance changes easy — a single change in a CSS file will mean that any pages using that CSS file will automatically display the change
2) How do I make a Image as a background on my web pages?
     Point the body background to the name of your image you wish to use as the background as shown below. This body line should be the first line after your
< / head> tag.
< body background=”picture.gif” >
You can also have the background image fixed, so it does not move when using the scroll bar in the browser. To do this add the BGPROPERTIES tag as shown below.
< body background=”picture.gif” bgproperties=”fixed” >
3) How to add scrolling text to my page?
     Keep in mind not all browsers support scrolling text. however to do this add a tag similar to the below example. < marquee >THIS WOULD SCROLL< /marquee> The above example would create the below scrolling text. If your browser supports scrolling text the below example should be scrolling. More examples can be found on our main HTML page that lists most of the HTML commands.
4) How do I make it so that someone can mail me by just clicking on text with subject?
     Use the mailto command in your A HREF link tag as shown below.
< A HREF=”mailto:support@computerhope.com?Subject=Enquiry” “>Click here to mail Computer Hope< / A> .
5) How do I align pictures so that one may be higher or lower than the other?
     Use the align statement in your IMG SRC tag as shown below. < IMG SRC=”http://www.computerhope.com/chguy.gif” align=top > Also, instead of align=top you can do align=middle, and align=bottom. .
6) What is external Style Sheet? How to link?
     External Style Sheet is a template/document/file containing style information which can be linked with any number of HTML documents. This is a very convenient way of formatting the entire site as well as restyling it by editing just one file. The file is linked with HTML documents via the LINK element inside the HEAD element. Files containing style information must have extension .css, e.g. style.css.
< HEAD > < LINK REL=STYLESHEET HREF=”style.css” TYPE=”text/css”> < / HEAD>
7) Is CSS case sensitive?
     Cascading Style Sheets (CSS) is not case sensitive. However, font families, URLs to images, and other direct references with the style sheet may be. The trick is that if you write a document using an XML declaration and an XHTML doctype, then the CSS class names will be case sensitive for some browsers. It is a good idea to avoid naming classes where the only difference is the case, for example: div.myclass { …} div.myClass { … } If the DOCTYPE or XML declaration is ever removed from your pages, even by mistake, the last instance of the style will be used, regardless of case.
8) What are the five possible values for “position”?
      Values for position: static, relative, absolute, fixed, inherit
9) What are JavaScript types?
      Number, String, Boolean, Function, Object, Null, Undefined.
10) What does is NaN function do?
       Return true if the argument is not a number.
11) How do you convert numbers between different bases in JavaScript?
       Use the parseInt() function, that takes a string as the first parameter, and the base as a second parameter. So to convert hexadecimal 3F to decimal, use parseInt (“3F”, 16);
12) What is negative infinity?
        It’s a number in JavaScript, derived by dividing negative number by zero.
13) What does “1”+2+4 evaluate to?
        Since 1 is a string, everything is a string, so the result is 124.
14) What is the difference between an alert box and a confirmation box?
        An alert box displays only one button which is the OK button whereas the Confirm box displays two buttons namely OK and cancel.
15) What is a prompt box?
        A prompt box allows the user to enter input by providing a text box.

16) Have you learned something new or interesting lately?
        Make sure you know all the relevant news and blogs. You should be reading them regardless, but doing so on a daily basis during your job search is important. Be ready to talk casually and fluently about the latest web trends.
17) Why did you get into coding, programming, etc.?
       “Because I can make good $,” “I don’t like to dress up or shave,” and “because I loved the movie Hackers,” are not good enough answers. Well… a comment about Hackers might fly but make sure you have a real backstory that describes your “Aha!” moment.
18) What is your preferred development environment?
        This is your chance to talk shop and demonstrate some industry knowledge. Be prepared to talk about your favorite editor, browser, plug-ins, operating system, and other tools. Freshen up on your lingo.
19) What is the coolest thing you ever coded? Do you have any personal projects you are working on?
       These two questions are interchangeable. Any developer worth his weight had to practice somewhere or on something before they landed their first gig. If not, how did you get this interview anyway?! Review your past experiences, and even if they were boring to you, figure out a new frame of reference that demonstrates passion and a zest for learning.
20) How do you optimize a website’s assets?
        There are a number of answers to this question: File concatenation, file compression, CDN Hosting, offloading assets, re-organizing and refining code, etc. Have a few ready.
21) What are three ways to reduce page load time?
        Again there are many answers here: Reduce image sizes, remove unnecessary widgets, HTTP compression, put CSS at the top and script references at the bottom or in external files, reduce lookups, minimize redirects, caching, etc.
22) What kind of things must you be wary of when design or developing for multilingual sites?
         Another problem with many solutions: setting the default language, using Unicode encoding, using the ‘lang’ attribute, being aware of standard font sizes and text direction, and language word length (may affect layout).
23) What is HTML?
         HTML stands for HyperText Markup Language. It is the dominant markup language for creating websites and anything that can be viewed in a web browser. If you want to get some extra bonus points, you can learn the history of HTML and throw in some obscure facts.
24) What is the difference between HTML elements and tags?
        HTML elements communicate to the browser how to render text. When surrounded by angular brackets <> they form HTML tags. For the most part, tags come in pairs and surround text.
25) What is “Semantic HTML?”
        Semantic HTML is a coding style where the tags embody what the text is meant to convey. In Semantic HTML, tags like <b></b> for bold, and <i></i> for italic should not be used, reason being they just represent formatting, and provide no indication of meaning or structure. The semantically correct thing to do is use <strong></strong> and <em></em>. These tags will have the same bold and italic effects, while demonstrating meaning and structure (emphasis in this case).
26) What does DOCTYPE mean?
        The term DOCTYPE tells the browser which type of HTML is used on a webpage. In turn, the browsers use DOCTYPE to determine how to render a page. Failing to use DOCTYPE or using a wrong DOCTYPE may load your page in Quirks Mode. See example:
<!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.01 Transitional//EN” “http://www.w3.org/TR/html4/loose.dtd”>.
27) What’s the difference between standards mode and quirks mode?
        Quirks Mode is a default compatibility mode and may be different from browser to browser, which may result to a lack of consistency in appearance from browser to browser.
28) What are the limitations when serving XHTML pages?
        Perhaps the biggest issue is the poor browser support XHTML currently enjoys. Internet Explorer and a number of other user agents cannot parse XHTML as XML. Thus, it is not the extensible language it was promised to be. There are many other issues. Take your pick.

29) How many HTML tags are should be used for the most simple of web pages?
        8 total. 4 pairs of tags.
<HTML>
<HEAD>
<TITLE>Simplest page ever!</TITLE>
</HEAD>
<BODY>
Doesn’t get simpler than this.
</BODY>
</HTML>
30) How do you make comments without text being picked up by the browser?
         Comments are used to explain and clarify code or to prevent code from being recognized by the browser. Comments start with “*<!–” and end with ” –>“.
<!– Insert comment here. –>
31)  What is the difference between linking to an image, a website, and an email address?
         To link an image, use <img> tags. You need specify the image in quotes using the source attribute, src in the opening tag. For hyperlinking, the anchor tag, <a>, is used and the link is specified in the href attribute. Text to be hyperlinked should be placed between the anchor tags. Little known fact: href stands for “hypertext reference.” When linking to an email, the href specification will be “mailto:send@here.com.” See examples below:
<img src=”HTMLrocks.jpg”></img>
<a href=”skilprelaunch2.wpengine.com”>Skilledup</a>
<a href=”brad@skilledup.com”>Email Me</a>
32) My hyperlink or image is not displaying correctly, what is wrong with it?
        It could be any number of things, but the most common mistakes are leaving out a tag bracket or quote missing for href, src, or alt text may be the issue. You should also verify the link itself.
33) What is the syntax difference between a bulleted list and numbered list?
         Bulleted lists use the <ul> tag, which stands for “unordered,” whereas <ol> is used to create an ordered list.
34) What is the difference between <div> and <frame>?
         A <div> is a generic container element for grouping and styling, whereas a<frame> creates divisions within a web page and should be used within the <frameset> tag. The use of <frame> and <frameset> are no longer popular and are now being replaced with the more flexible <iframe>, which has become popular for embedding foreign elements (ie. Youtube videos) into a page.
35) What is the difference between the application model of HTML and HTML5?
         Trick question, there is no difference. HTML5 is a continuum of HTML and just a souped up version of the original HTML. There has been no major paradigm shift.
36) what’s the real difference between HTML and HTML5?
        There are many. From a broader perspective, HTML was a simple language for laying out text and images on a webpage, whereas HTML5 can be viewed as an application development platform that does what HTML does that and more, including better support for audio, video, and interactive graphics. It has a number of new elements, supports offline data storage for applications, and has more robust exchange protocols. Thus, proprietary plug-in technologies like Adobe Flash, Microsoft Silverlight, Apache Pivot, and Sun JavaFX are no longer needed, because browsers can now process these elements without additional requirements.
37) What is the new DOCTYPE?
        Instead of typing out a ridiculously long DOCTYPE statement to tell the browser how to render your webpage, this long line of code has been truncated to <!doctype html>.
38) What are some new HTML5 markup elements?
        There are several: <article>, <aside>, <bdi>, <command>, <details>, <figure>, <figcaption>, <summary>, <header>, <footer>, <hgroup>, <mark>, <meter>, <nav>, <progress>, <ruby>, <rt>, <section>, <time>, and <wpr>.

39) What are the new media-related elements in HTML5?

         HTML5 has strong support for media. There are now special <audio> and <video> tags. There are additional A/V support tags as well: <embed> is a container for 3rd party applications. <track> is for adding text tracks to media. <source> is useful for A/V media from multiple sources.
40) What are the new image elements in HTML5?
Canvas and WebGL. <Canvas> is a new element that acts as a container for graphical elements like images and graphics. Coupled with JavaScript, it supports 2D graphics. WebGL stands for Web Graphics Language, a free cross-platform API that is used for generating 3D graphics in web browsers.
41) What is the difference between SVG and <Canvas>?
       <Canvas> is an element that manipulates two-dimensional (2D) pixels while Scalable Vector Graphics works in 2D and three-dimensional (3D) vectors. Essentially, <Canvas> is to SVG as Photoshop is to Illustrator.
42) What are some new input attributes in HTML5?
        There are many new form elements including: datalist, datetime, output, keygen, date, month, week, time, number, range, email, and url.
43) What are data- attributes good for?
        The HTML5 data- attribute is a new addition that assigns custom data to an element. It was built to store sensitive or private data that is exclusive to a page or application, for which there are no other matching attributes or elements.
44) What is the difference between HTML5 interaction in Sencha and Twitter/Bootstrap?
        Sencha and Twitter/Bootstrap are both HTML development frameworks that integrate HTML5, CSS3, and JavaScript. The major difference is that in Sencha, the three languages are all comingled together in code, whereas in Bootstrap, HTML and CSS and decoupled.
45) What purpose do Work Workers serve and what are some of their benefits?
        Web Workers are background scripts that do not interfere with the user interface or user interactions on a webpage, allowing HTML to render uninterrupted while JavaScript works in the background.
46) Describe the difference between cookies, sessionStorage, and localStorage.
        Cookies are small text files that websites place in a browser for tracking or login purposes. Meanwhile, localStorage and sessionStorage are new objects, both of which are storage specifications but vary in scope and duration. Of the two, localStorage is permanent and website-specific whereas sessionStorage only lasts as long as the duration of the longest open tab.
47) What are some of the major new API’s that come standard with HTML5?
        To name a few: Media API, Text Track API, Application Cache API, User Interaction, Data Transfer API, Command API, Constraint Validation API, and the History API.
48) What is the difference in caching between HTML5 and the old HTML?
        An important feature of HTML5 is the Application Cache. It creates an offline version of a web application. and stores website files such as HTML files, CSS, images, and JavaScript, locally. It is a feature that speeds up site performance.

49) What elements have disappeared?
As mentioned above, <frame> and <frameset> have been eliminated. Other elements that are no longer supported include: <noframe>, <applet>, <bigcenter> and<basefront>.

 

Testing Tools Interview Questions

Top most important Testing tools interview questions and answers by Experts:

Here is a list of Top most important Testing tools interview questions and answers by Experts.If you want to download Testing tools interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Testing tools interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Testing tools ,Register for Testing tools online training here.

 

1) What is Test Bed?
An execution environment configured for testing. May consist of specific hardware, OS, network topology, configuration of the product under test, other application or system software, etc. The Test Plan for a project should enumerated the test beds(s) to be used.

2) What is Test Case?
Test Case is a commonly used term for a specific test. This is usually the smallest unit of testing. A Test Case will consist of information such as requirements testing, test steps, verification steps, prerequisites, outputs, test environment, etc. A set of inputs, execution preconditions, and expected outcomes developed for a particular objective, such as to exercise a particular program path or to verify compliance with a specific requirement. Test Driven Development? Testing methodology associated with Agile Programming in which every chunk of code is covered by unit tests, which must all pass all the time, in an effort to eliminate unit-level and regression bugs during development. Practitioners of TDD write a lot of tests, i.e. an equal number of lines of test code to the size of the production code.

3) What is Test Driver?
A program or test tool used to execute a tests. Also known as a Test Harness.

4) What is Test Environment?
The hardware and software environment in which tests will be run, and any other software with which the software under test interacts when under test including stubs and test drivers.

5) What is Test First Design?
Test-first design is one of the mandatory practices of Extreme Programming (XP).It requires that programmers do not write any production code until they have first written a unit test.

6) What is Test Harness?
A program or test tool used to execute a tests. Also known as a Test Driver.

7) What is Test Plan?
A document describing the scope, approach, resources, and schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks, who will do each task, and any risks requiring contingency planning.

8) What is Test Procedure?
A document providing detailed instructions for the execution of one or more test cases.

9) What is Test Script?
Commonly used to refer to the instructions for a particular test that will be carried out by an automated test tool.

10) What is Test Specification?
A document specifying the test approach for a software feature or combination or features and the inputs, predicted results and execution conditions for the associated tests.

11) What is Test Suite?
A collection of tests used to validate the behavior of a product. The scope of a Test Suite varies from organization to organization. There may be several Test Suites for a particular product for example. In most cases however a Test Suite is a high level concept, grouping together hundreds or thousands of tests related by what they are intended to test.

12) What is Test Tools?
Computer programs used in the testing of a system, a component of the system, or its documentation.

13) What is Thread Testing?
A variation of top-down testing where the progressive integration of components follows the implementation of subsets of the requirements, as opposed to the integration of components by successively lower levels.

14) What is Top Down Testing?
An approach to integration testing where the component at the top of the component hierarchy is tested first, with lower level components being simulated by stubs. Tested components are then used to test lower level components. The process is repeated until the lowest level components have been tested.

15) What is Total Quality Management?
A company commitment to develop a process that achieves high quality product and customer satisfaction.

16) What is Traceability Matrix?
A document showing the relationship between Test Requirements and Test Cases.

17) What is Usability Testing?
Testing the ease with which users can learn and use a product.

18) What is Use Case?
The specification of tests that are conducted from the end-user perspective. Use cases tend to focus on operating software as an end-user would conduct their day-to-day activities.

19) What is Unit Testing?
Testing of individual software components.

20) What is Validation?
The process of evaluating software at the end of the software development process to ensure compliance with software requirements. The techniques for validation is testing, inspection and reviewing.

21) What is Verification?
The process of determining whether of not the products of a given phase of the software development cycle meet the implementation steps and can be traced to the incoming objectives established during the previous phase. The techniques for verification are testing, inspection and reviewing.

22) What is White Box Testing?
Testing based on an analysis of internal workings and structure of a piece of software. Includes techniques such as Branch Testing and Path Testing. Also known as Structural Testing and Glass Box Testing. Contrast with Black Box Testing. White box testing is used to test the internal logic of the code for ex checking whether the path has been executed once, checking whether the branches has been executed atleast once …..Used to check the structure of the code.

23)What is Workflow Testing?
Scripted end-to-end testing which duplicates specific workflows which are expected to be utilized by the end-user.

24) What’s the difference between load and stress testing ?
One of the most common, but unfortunate misuse of terminology is treating “load testing” and “stress testing” as synonymous. The consequence of this ignorant semantic abuse is usually that the system is neither properly “load tested” nor subjected to a meaningful stress test. Stress testing is subjecting a system to an unreasonable load while denying it the resources (e.g., RAM, disc, mips, interrupts, etc.) needed to process that load. The idea is to stress a system to the breaking point in order to find bugs that will make that break potentially harmful. The system is not expected to process the overload without adequate resources, but to behave (e.g., fail) in a decent manner (e.g., not corrupting or losing data). Bugs and failure modes discovered under stress testing may or may not be repaired depending on the application, the failure mode, consequences, etc. The load (incoming transaction stream) in stress testing is often deliberately distorted so as to force the system into resource depletion. Load testing is subjecting a system to a statistically representative (usually) load. The two main reasons for using such loads is in support of software reliability testing and in performance testing. The term ‘load testing’ by itself is too vague and imprecise to warrant use. For example, do you mean representative load,’ ‘overload,’ ‘high load,’ etc. In performance testing, load is varied from a minimum (zero) to the maximum level the system can sustain without running out of resources or having, transactions >suffer (application-specific) excessive delay. A third use of the term is as a test whose objective is to determine the maximum sustainable load the system can handle. In this usage, ‘load testing’ is merely testing at the highest transaction arrival rate in performance testing.

25)What’s the difference between QA and testing?
QA is more a preventive thing, ensuring quality in the company and therefore the product rather than just testing the product for software bugs? TESTING means ‘quality control’ QUALITY CONTROL measures the quality of a product QUALITY ASSURANCE measures the quality of processes used to create a quality product.

26) What is the best tester to developer ratio?
Reported tester: developer ratios range from 10:1 to 1:10. There’s no simple answer. It depends on so many things, Amount of reused code, number and type of interfaces, platform, quality goals, etc. It also can depend on the development model. The more specs, the less testers. The roles can play a big part also. Does QA own beta? Do you include process auditors or planning activities? These figures can all vary very widely depending on how you define ‘tester’ and ‘developer’. In some organizations, a ‘tester’ is anyone who happens to be testing software at the time — such as their own. In other organizations, a ‘tester’ is only a member of an independent test group. It is better to ask about the test labor content than it is to ask about the tester/developer ratio. The test labor content, across most applications is generally accepted as 50%, when people do honest accounting. For life-critical software, this can go up to 80%.

27)How can new Software QA processes be introduced in an existing organization?
– A lot depends on the size of the organization and the risks involved. For large organizations with high-risk (in terms of lives or property) projects, serious management buy-in is required and a formalized QA process is necessary. – Where the risk is lower, management and organizational buy-in and QA implementation may be a slower, step-at-a-time process. QA processes should be balanced with productivity so as to keep bureaucracy from getting out of hand. – For small groups or projects, a more ad-hoc process may be appropriate, depending on the type of customers and projects. A lot will depend on team leads or managers, feedback to developers, and ensuring adequate communications among customers, managers, developers, and testers. – In all cases the most value for effort will be in requirements management processes, with a goal of clear, complete, testable requirement specifications or expectations.

28) What are 5 common problems in the software development process?
1. poor requirements – if requirements are unclear, incomplete, too general, or not testable, there will be problems. 2. unrealistic schedule – if too much work is crammed in too little time, problems are inevitable. 3. inadequate testing – no one will know whether or not the program is any good until the customer complains or systems crash. 4. features – requests to pile on new features after development is underway; extremely common. 5. miscommunication – if developers don’t know what’s needed or customer’s have erroneous expectations, problems are guaranteed.

29)What are 5 common solutions to software development problems?
1. solid requirements – clear, complete, detailed, cohesive, attainable, testable requirements that are agreed to by all players. Use prototypes to help nail down requirements. 2. realistic schedules – allow adequate time for planning, design, testing, bug fixing, re-testing, changes, and documentation; personnel should be able to complete the project without burning out. 3. adequate testing – start testing early on, re-test after fixes or changes, plan for adequate time for testing and bug-fixing. 4. stick to initial requirements as much as possible – be prepared to defend against changes and additions once development has begun, and be prepared to explain consequences. If changes are necessary, they should be adequately reflected in related schedule changes. If possible, use rapid prototyping during the design phase so that customers can see what to expect. This will provide them a higher comfort level with their requirements decisions and minimize changes later on. 5. communication – require walkthroughs and inspections when appropriate; make extensive use of group communication tools – e-mail, groupware, networked bug-tracking tools and change management tools, intranet capabilities, etc.; insure that documentation is available and up-to-date – preferably electronic, not paper; promote teamwork and cooperation; use prototypes early on so that customers’ expectations are clarified.

30) What is ‘good code’?
‘Good code’ is code that works, is bug free, and is readable and maintainable. Some organizations have coding ‘standards’ that all developers are supposed to adhere to, but everyone has different ideas about what’s best, or what is too many or too few rules. There are also various theories and metrics, such as McCabe Complexity metrics. It should be kept in mind that excessive use of standards and rules can stifle productivity and creativity. ‘Peer reviews’, ‘buddy checks’ code analysis tools, etc. can be used to check for problems and enforce standards. For C and C++ coding, here are some typical ideas to consider in setting rules/standards; these may or may not apply to a particular situation: – minimize or eliminate use of global variables. – use descriptive function and method names – use both upper and lower case, avoid abbreviations, use as many characters as necessary to be adequately descriptive (use of more than 20 characters is not out of line); be consistent in naming conventions. – use descriptive variable names – use both upper and lower case, avoid abbreviations, use as many characters as necessary to be adequately descriptive (use of more than 20 characters is not out of line); be consistent in naming conventions. – function and method sizes should be minimized; less than 100 lines of code is good, less than 50 lines is preferable. – function descriptions should be clearly spelled out in comments preceding a function’s code.- organize code for readability. – use whitespace generously – vertically and horizontally – each line of code should contain 70 characters max. – one code statement per line. – coding style should be consistent throughout a program (eg, use of brackets, indentations, naming conventions, etc.) – in adding comments, err on the side of too many rather than too few comments; a common rule of thumb is that there should be at least as many lines of comments (including header blocks) as lines of code. – no matter how small, an application should include documentation of the overall program function and flow (even a few paragraphs is better than nothing); or if possible a separate flow chart and detailed program documentation. – make extensive use of error handling procedures and status and error logging. – for C++, to minimize complexity and increase maintainability, avoid too many levels of inheritance in class hierarchies (relative to the size and complexity of the application). Minimize use of multiple inheritance, and minimize use of operator overloading (note that the Java programming language eliminates multiple inheritance and operator overloading.) – for C++, keep class methods small, less than 50 lines of code per method is preferable. – for C++, make liberal use of exception handlers

31) What is ‘good design’?
‘Design’ could refer to many things, but often refers to ‘functional design’ or ‘internal design’. Good internal design is indicated by software code whose overall structure is clear, understandable, easily modifiable, and maintainable; is robust with sufficient error-handling and status logging capability; and works correctly when implemented. Good functional design is indicated by an application whose functionality can be traced back to customer and end-user requirements. For programs that have a user interface, it’s often a good idea to assume that the end user will have little computer knowledge and may not read a user manual or even the on-line help; some common rules-of-thumb include: – the program should act in a way that least surprises the user – it should always be evident to the user what can be done next and how to exit – the program shouldn’t let the users do something stupid without warning them.

32) What makes a good test engineer?
A good test engineer has a ‘test to break’ attitude, an ability to take the point of view of the customer, a strong desire for quality, and an attention to detail. Tact and diplomacy are useful in maintaining a cooperative relationship with developers, and an ability to communicate with both technical (developers) and non-technical (customers, management) people is useful. Previous software development experience can be helpful as it provides a deeper understanding of the software development process, gives the tester an appreciation for the developers’ point of view, and reduce the learning curve in automated test tool programming. Judgment skills are needed to assess high-risk areas of an application on which to focus testing efforts when time is limited.
33) What is Acceptance Testing?
Testing conducted to enable a user/customer to determine whether to accept a software product. Normally performed to validate the software meets a set of agreed acceptance criteria.

34) What is Accessibility Testing?
Verifying a product is accessible to the people having disabilities (deaf, blind, mentally disabled etc.).

35) What is Ad Hoc Testing?
A testing phase where the tester tries to ‘break’ the system by randomly trying the system’s functionality. Can include negative testing as well. See also Monkey Testing.

36) What is Agile Testing?
Testing practice for projects using agile methodologies, treating development as the customer of testing and emphasizing a test-first design paradigm. See also Test Driven Development.

37) What is Application Binary Interface (ABI)?
A specification defining requirements for portability of applications in binary forms across different system platforms and environments.

38) What is Application Programming Interface (API)?
A formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services.

39) What is Automated Software Quality (ASQ)?
The use of software tools, such as automated testing tools, to improve software quality.

40) What is Automated Testing?
Testing employing software tools which execute tests without manual intervention. Can be applied in GUI, performance, API, etc. testing. The use of software to control the execution of tests, the comparison of actual outcomes to predicted outcomes, the setting up of test preconditions, and other test control and test reporting functions.

41) What is Backus-Naur Form?
A metalanguage used to formally describe the syntax of a language.

42) What is Basic Block?
A sequence of one or more consecutive, executable statements containing no branches.

43) What is Basis Path Testing?
A white box test case design technique that uses the algorithmic flow of the program to design tests.

44) What is Basis Set?
The set of tests derived using basis path testing.

45) What is Baseline?
The point at which some deliverable produced during the software engineering process is put under formal change control.

46) What you will do during the first day of job?
What would you like to do five years from now?

47) What is Beta Testing?
Testing of a release of a software product conducted by customers.

48) What is Binary Portability Testing?
Testing an executable application for portability across system platforms and environments, usually for conformation to an ABI specification.

49) What is Black Box Testing?
Testing based on an analysis of the specification of a piece of software without reference to its internal workings. The goal is to test how well the component conforms to the published requirements for the component.

50) What is Bottom Up Testing?
An approach to integration testing where the lowest level components are tested first, then used to facilitate the testing of higher level components. The process is repeated until the component at the top of the hierarchy is tested.

51) What is Boundary Testing?
Test which focus on the boundary or limit conditions of the software being tested. (Some of these tests are stress tests).

52) What is Bug?
A fault in a program which causes the program to perform in an unintended or unanticipated manner.

53) What is Defect?
If software misses some feature or function from what is there in requirement it is called as defect.

54) What is Boundary Value Analysis?
BVA is similar to Equivalence Partitioning but focuses on “corner cases” or values that are usually out of range as defined by the specification. his means that if a function expects all values in range of negative 100 to positive 1000, test inputs would include negative 101 and positive 1001.

55) What is Branch Testing?
Testing in which all branches in the program source code are tested at least once.

56)  What is Breadth Testing?
A test suite that exercises the full functionality of a product but does not test features in detail.

57) What is CAST?
Computer Aided Software Testing.

58) What is Capture/Replay Tool?
A test tool that records test input as it is sent to the software under test. The input cases stored can then be used to reproduce the test at a later time. Most commonly applied to GUI test tools.

59) What is CMM?
The Capability Maturity Model for Software (CMM or SW-CMM) is a model for judging the maturity of the software processes of an organization and for identifying the key practices that are required to increase the maturity of these processes.

60) What is Cause Effect Graph?
A graphical representation of inputs and the associated outputs effects which can be used to design test cases.

61) What is Code Complete?
Phase of development where functionality is implemented in entirety; bug fixes are all that are left. All functions found in the Functional Specifications have been implemented.

62) What is Code Coverage?
An analysis method that determines which parts of the software have been executed (covered) by the test case suite and which parts have not been executed and therefore may require additional attention.

63) What is Code Inspection?
A formal testing technique where the programmer reviews source code with a group who ask questions analyzing the program logic, analyzing the code with respect to a checklist of historically common programming errors, and analyzing its compliance with coding standards.

64) What is Code Walkthrough?
A formal testing technique where source code is traced by a group with a small set of test cases, while the state of program variables is manually monitored, to analyze the programmer’s logic and assumptions.

65) What is Coding?
The generation of source code.

66) What is Compatibility Testing?
Testing whether software is compatible with other elements of a system with which it should operate, e.g. browsers, Operating Systems, or hardware.

67) What is Component?
A minimal software item for which a separate specification is available.

68) What is Component Testing?
Testing of individual software components (Unit Testing).

69) What is Concurrency Testing?
Multi-user testing geared towards determining the effects of accessing the same application code, module or database records. Identifies and measures the level of locking, deadlocking and use of single-threaded code and locking semaphores.

70)What is Conformance Testing?
The process of testing that an implementation conforms to the specification on which it is based. Usually applied to testing conformance to a formal standard.

71) What is Context Driven Testing?
The context-driven school of software testing is flavor of Agile Testing that advocates continuous and creative evaluation of testing opportunities in light of the potential information revealed and the value of that information to the organization right now.

72) What is Conversion Testing?
Testing of programs or procedures used to convert data from existing systems for use in replacement systems.

73) What is Cyclomatic Complexity?
A measure of the logical complexity of an algorithm, used in white-box testing.

74) What is Data Dictionary?
A database that contains definitions of all data items defined during analysis.

75) What is Data Flow Diagram?
A modeling notation that represents a functional decomposition of a system.

76) What is Data Driven Testing?
Testing in which the action of a test case is parameterized by externally defined data values, maintained as a file or spreadsheet. A common technique in Automated Testing.

77) What is Debugging?
The process of finding and removing the causes of software failures.

78) What is Defect?
Nonconformance to requirements or functional / program specification

79) What is Dependency Testing?
Examines an application’s requirements for pre-existing software, initial states and configuration in order to maintain proper functionality.

80) What is Depth Testing?
A test that exercises a feature of a product in full detail.

81)What is Dynamic Testing?
Testing software through executing it. See also Static Testing.

82) What is Emulator?
A device, computer program, or system that accepts the same inputs and produces the same outputs as a given system.

83) What is Endurance Testing?
Checks for memory leaks or other problems that may occur with prolonged execution.

84) What is End-to-End testing?
Testing a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.

85) What is Equivalence Class?
A portion of a component’s input or output domains for which the component’s behaviour is assumed to be the same from the component’s specification.

86) What is Equivalence Partitioning?
A test case design technique for a component in which test cases are designed to execute representatives from equivalence classes.

87) What is Exhaustive Testing?
Testing which covers all combinations of input values and preconditions for an element of the software under test.

88) What is Functional Decomposition?
A technique used during planning, analysis and design; creates a functional hierarchy for the software.

89)  What is Functional Specification?
A document that describes in detail the characteristics of the product with regard to its intended features.

90) What is Functional Testing?
Testing the features and operational behavior of a product to ensure they correspond to its specifications. Testing that ignores the internal mechanism of a system or component and focuses solely on the outputs generated in response to selected inputs and execution conditions. or Black Box Testing.

91) What is Glass Box Testing?
A synonym for White Box Testing.

92) What is Gorilla Testing?
Testing one particular module, functionality heavily.

93) What is Gray Box Testing?
A combination of Black Box and White Box testing methodologies? testing a piece of software against its specification but using some knowledge of its internal workings.

94) What is High Order Tests?
Black-box tests conducted once the software has been integrated.

95) What is Independent Test Group (ITG)?
A group of people whose primary responsibility is software testing,

96) What is Inspection?
A group review quality improvement process for written material. It consists of two aspects; product (document itself) improvement and process improvement (of both document production and inspection).

97) What is Integration Testing?
Testing of combined parts of an application to determine if they function together correctly. Usually performed after unit and functional testing. This type of testing is especially relevant to client/server and distributed systems.

98) What is Installation Testing?
Confirms that the application under test recovers from expected or unexpected events without loss of data or functionality. Events can include shortage of disk space, unexpected loss of communication, or power out conditions.

99) What is Load Testing?
See Performance Testing.

100) What is Localization Testing?
This term refers to making software specifically designed for a specific locality.

101) What is Loop Testing?
A white box testing technique that exercises program loops.

102) What is Metric?
A standard of measurement. Software metrics are the statistics describing the structure or content of a program. A metric should be a real objective measurement of something such as number of bugs per lines of code.

103) What is Monkey Testing?
Testing a system or an Application on the fly, i.e just few tests here and there to ensure the system or an application does not crash out.

104) What is Negative Testing?
Testing aimed at showing software does not work. Also known as “test to fail”. See also Positive Testing.

105) What is Path Testing?
Testing in which all paths in the program source code are tested at least once.

106) What is Performance Testing?
Testing conducted to evaluate the compliance of a system or component with specified performance requirements. Often this is performed using an automated test tool to simulate large number of users. Also know as “Load Testing”.

107) What is Positive Testing?
Testing aimed at showing software works. Also known as “test to pass”. See also Negative Testing.

108) What is Quality Assurance?
All those planned or systematic actions necessary to provide adequate confidence that a product or service is of the type and quality needed and expected by the customer.

QTP & QC Interview Questions

 

Top most important QTP & QC interview questions and answers by Experts:

Here is a list of Top most important QTP & QC interview questions and answers by Experts.If you want to download QTP & QC interview questions pdf free ,you can register with RVH techguru. Our experts prepared these QTP & QC interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in QTP & QC ,Register for QTP & QC online training here.

 

Manual Testing Interview Questions

Top most important Manual Testing interview questions and answers by Experts:

Here is a list of Top most important Manual Testing interview questions and answers by Experts.If you want to download Manual Testing interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Manual Testing interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Manual Testing ,Register for Manual Testing online training here.

1) What is Test Harness?
A test harness is a collection of software and test data required to test the application by running it in different testing condition like stress, load, data- driven, and monitoring its behavior and outputs. Test Harness contains two main parts:

– Test execution engine
– Test script repository

Automation testing is the use of a tool to control the execution of tests and compare the actual results with the expected results. It also involves the setting up of test pre-conditions.
2) Explain Statement coverage.
Statement Coverage is a metric used in White Box Testing. Statement coverage is used to ensure that all the statement in the program code is executed at least once. The advantages of Statement Coverage are:

– Verifies that written code is correct.
– Measures the quality of code written.
– Determine the control flow of the program.
– To Calculate Statement Coverage:
– Statement Coverage = Statements Tested / Total No. of Statements.

3) What are the types of testing?
There are two types of testing:

– Static testing: Static testing is a technique used in the earlier phase of the development life cycle. The code error detection and execution of program is not concern in this type of testing. Also known as non-execution technique. The Verification of the product is performed in this testing technique like Code Reviews, Inspections, Walkthroughs are mostly done in this stage of testing.

– Dynamic testing: Dynamic Testing is concern with the execution of the software. This technique is used to test the dynamic behavior of the code. Most of the bugs are identified using this technique. These are the Validation activities. It uses different methodologies to perform testing like Unit Tests, Integration Tests, System Tests and Acceptance Testing, etc.

4) Explain User acceptance testing.
User Acceptance Testing (UAT) is performed by the end users on the applications before accepting the application.

Alpha testing: is performed by the IN-House developers. After alpha testing the software is handed for the Beta testing phase, for additional testing in an environment that is similar to the client environment.

Beta testing: is performed by the end user. So that they can make sure that the product is bug free or working as per the requirement. IN-house developers and software QA team perform alpha testing. The public, a few select prospective customers or the general public performs beta testing.

Gamma Testing: Gamma Testing is done when the software is ready for release with specified requirements. This testing is done directly by skipping all the in-house testing activities.

5) What should be done after a bug is found?
After finding the bug the first step is bug to be locked in bug report. Then this bug needs to be communicated and assigned to developers that can fix it. After the bug is fixes by the developer, fixes should be re-tested, and determinations made regarding requirements for regression testing to check that fixes didn’t create problems elsewhere.

6) What if the software is so buggy it can’t really be tested at all?
In this situation is for the testers to go through the process of reporting of bugs with the focus being on critical bugs. Since this type of problem can severely affect schedules, and indicates deeper problems in the software development process project managers should be notified, and provided with some documentation.

7) What are the types of maintenance?
There are four types of maintenance. They are:

– Corrective Maintenance
– Adaptive Maintenance
– Perfective Maintenance
– Preventive Maintenance

8) What are the advantages of waterfall model?
The advantages of the waterfall model are:

– Simple to implement and required fewer amounts of resources.
– After every phase output is generate.
– Help in methods of analysis, design, coding, testing and maintenance.
– Preferred in projects where quality is more important than schedule and cost.
– Systematic and sequential model.
– Proper documentation of the project.

9) What is Rapid Application Development model (RAD)?
The RAD model Rapid Application development (RAD) is incremental software development process models that focus on the development of the project in very short time. It is enhanced version of Waterfall model. It is proposed when requirements and solutions can be made independently system or software components, which is developed by different teams. After these smaller system components are developed, they are integrated to produce the large software system solution.

10) What are the advantages of black box testing?
The advantages of this type of testing include:

– Developer and tester are independent of each other.
– The tester does not need knowledge of any programming languages.
– The test is done from the point-of-view of the user.
– Test cases can be designed when specifications are complete.
– Testing helps to identify issues related to functional specifications.

11) What is software review?
A software review can be defined as a filter for the software engineering process. The purpose of any review is to discover errors in the analysis, design, and coding, testing and implementation phases of the software development cycle. The other purpose of a review is to see whether procedures are applied uniformly and in a manageable manner. It is used to check the process followed to develop the software is right.

12) What is reverse engineering?
By analyzing a final product the process of recreating a design is known as reverse engineering. Reverse engineering is the process followed in order to find difficult, unknown, and hidden information about a software system. It is important when software products lack proper documentation, and are highly unstructured, or their structure has degraded through a series of maintenance efforts. Maintenance activities cannot be performed without a complete understanding of the software system.

13) What is data flow diagram?
The Data Flow Diagram gives us information of the flow of data within the application.

– The DFD can be used to analyze the design of the application.
– It is a graphical representation of the structure of the data.
– A developer draws context level DFD first showing interaction between the different components of the application.
– DFD help in developing the software by clarifying the requirements and major functionalities.
– DFDs show the flow of data through a system.
– It is an important modeling tool that allows us to picture a system as a network of functional processes.

14) What is exploratory testing?
Exploratory testing: means testing an application without a test plan and test script. In exploring testing test explore the application on the basis on his knowledge. The tester has no knowledge about the application previously. He explores the application like an end user and try to use it. While using the application his main motive is to find the bugs which are in the application.

15) What is compatibility testing?
Compatibility testing is a type of testing used to find out the compatibility between the application and platform on which application works, web browsers, hardware, operating systems etc. Good software must be compatible with different hardware, web browser and database.

16) What is SRS and BRS document?
Software Requirements Specification (SRS) is documented form of the requirement of the customer. It consists of all requirement of the customer regarding that software to be developed. The SRS document work as agreement between the company and the customer consisting of all functional and non functional requirements.

Business Requirement Specification (BRS) are the requirements as described by the business people. The business tells “what” they want for the application to do. In simple word BRS contain the functional requirement of the application.

17) Can you explain V model in manual testing?
V model: it is enhanced version of waterfall model where each level of the development lifecycle is verified before moving to next level. In this testing starts at the very beginning. By testing we mean verification by means of reviews and inspections, static testing. Each level of the development life – cycle has a corresponding test plan. A test plan is developed to prepare for the testing of the products of that phase. Be developing the test plans, we can also define the expected results for testing of the products for that level as well as defining the entry and exit criteria for each level.

18) What is Concurrency Testing?
Concurrency Testing is used to know the effects of using the software by different users at the same time. In this type of testing we have multiple users performing the exact same requests at the same time. It helps in identifying and measuring the problems in Response time, levels of locking and deadlocking in the application. For this we use Load runner to create VUGen (Virtual User Generator) is used to add the number of concurrent users and perform operation on the application on the same time.

19) What is an inspection in software testing?
An inspection is more formalized than a walkt hrough. Inspection technique involves 3 to 8 team member consisting of a moderator, reader, and a recorder to take notes. The subject of the inspection is typically a document such as a requirements or a test plan, and the purpose is to find problems and see what is missing, most problems will be found during this preparation. The result of the inspection meeting should be a written report. It is one of the most cost effective methods of ensuring quality.
A Form has four mandatory fields to be entered before you Submit.

20) How many numbers of test cases are required to verify this? And what are they?
Five test cases are required to test:

1. Enter the data in all the mandatory fields and submit, should not display error message.
2. Enter data in any two mandatory fields and summit, should issue an error message.
3. Do not enter in any of the fields should issue an error message.
4. If the fields accept only number, enter numbers in the fields and submit, should not issue an error message, try to enter only in two fields should issue an error message, and enter alphabets in two fields and number in other two fields it should issue an error message.
5. If the fields do not accept special characters, then enter the characters and submit it.

21) What is Cyclomatic Complexity?
Cyclomatic complexity is used to measure the complexity of the software using the control flow graph of the software. It is a graphical representation, consisting of following:

NODE: statement of the program is taken as node of the graph.

Edges: the flow of command is denoted by edges. Edges are used to connect two node , this show flow of control from one node to other node in the program.

Using this node and edges we calculate the complexity of the program.
This determines the minimum number of inputs you need to test always to execute the program.

22) What is baseline testing?
Baseline testing is the process of running a set of tests to capture performance information. Baseline testing use the information collected to made the changes in the application to improve performance and capabilities of the application. Baseline compares present performance of application with its own previous performance.

23) What is benchmark testing?
Benchmarking testing is the process of comparing application performance with respect to industry standard which is given by some other organization. Benchmark informs us where our application stands with respect to others. Benchmark compares our application performance with other company’s application’s performance.

24) What is verification and validation?
Verification: process of evaluating work-products of a development phase to determine whether they meet the specified requirements for that phase.

Validation: process of evaluating software during or at the end of the development process to determine whether it specified requirements.

Difference between Verification and Validation:

– Verification is Static Testing where as Validations is Dynamic Testing.
– Verification takes place before validation.
– Verification evaluates plans, document, requirements and specification, where as Validation evaluates product.
– Verification inputs are checklist, issues list, walkthroughs and inspection ,where as in Validation testing of actual product.
– Verification output is set of document, plans, specification and requirement documents where as in Validation actual product is output.

25) Explain Branch Coverage and Decision Coverage.
– Branch Coverage is testing performed in order to ensure that every branch of the software is executed atleast. To perform the Branch coverage testing we take the help of the Control Flow Graph.

– Decision coverage testing ensures that every decision taking statement is executed atleast once.

– Both decision and branch coverage testing is done to ensure the tester that no branch and decision taking statement, will not lead to failure of the software.

– To Calculate Branch Coverage:
Branch Coverage = Tested Decision Outcomes / Total Decision Outcomes.

26) What is difference between Retesting and Regression testing?
The differences between Retesting and Regression testing are below:

– Retesting is done to verify defect fix previous in now working correctly where as regression is perform to check if the defect fix have not impacted other functionality that was working fine before doing changes in the code.

– Retesting is specific and is performed on the bug which is fixed where as in regression is not be always specific to any defect fix it is performed when any bug is fixed.

– Retesting concern with executing those test cases that are failed earlier where as regression concern with executing test cases that was passed in earlier builds.

– Retesting has higher priority over regression.

27) What is Mutation testing & when can it be done?
Mutation testing is a performed to find out the defect in the program. It is performed to find put bugs in specific module or component of the application. Mutation testing is based on two assumptions:

Competent programmer hypothesis: according this hypothesis we suppose that program write the correct code of the program.
Coupling effect: according to this effect collection of different set of test data can also find large and complex bugs.
In this testing we insert few bugs into program to examine the optimal test inputs.

28) What is severity and priority of bug? Give some example.
Priority: concern with application from the business point of view.

It answers:

29) How quickly we need to fix the bug? Or how soon the bug should get fixed?
Severity: concern with functionality of application.

30) How much the bug is affecting the functionality of the application?

Ex.

1. High Priority and Low Severity:
If a company logo is not properly displayed on their website.

2. High Priority and High Severity:
Suppose you are doing online shopping and filled payment information, but after submitting the form, you get a message like “Order has been cancelled.”

3. Low Priority and High Severity:
If we have a typical scenario in which the application get crashed, but that scenario exists rarely.

4. Low Priority and Low Severity:
There is a mistake like “You have registered success” instead of successfully, success is written.

31) Explain bug leakage and bug release.
Bug Leakage: When customer or end user discovered a bug which can be detected by the testing team. Or when a bug is detected which can be detected in previous build then this is called as Bug Leakage.

Bug release: is when a build is handed to testing team with knowing that defect is present in the release. The priority and severity of bug is low. It is done when customer want the application on the time. Customer can tolerate the bug in the released then the delay in getting the application and the cost involved in removing that bug. These bugs are mentioned in the Release Notes handed to client for the future improvement chances.

32) What is alpha and beta testing?
Alpha testing: is performed by the IN-House developers. After alpha testing the software is handed over to software QA team, for additional testing in an environment that is similar to the client environment.

Beta testing: beta testing becomes active. It is performed by end user. So that they can make sure that the product is bug free or working as per the requirement. IN-house developers and software QA team perform alpha testing. The public, a few select prospective customers or the general public performs beta testing.

33) What is Monkey testing?
Monkey testing is a type of Black Box Testing used mostly at the Unit Level. In this tester enter the data in any format and check the software is not crashing. In this testing we use Smart monkey and Dumb monkey.

Smart monkeys are used for load and stress testing, they will help in finding the bugs. They are very expensive to develop.

Dumb monkey, are important for basic testing. They help in finding those bugs which are having high severity. Dumb monkey are less expensive as compare to Smart monkeys.

Example: In phone number filed Symbols are entered.

34) What is test driver and test stub?
– The Stub is called from the software component to be tested. It is used in top down approach.
– The driver calls a component to be tested. It is used in bottom up approach.
– Both test stub and test driver are dummy software components.

We need test stub and test driver because of following reason:

– Suppose we want to test the interface between modules A and B and we have developed only module A. So we cannot test module A but if a dummy module is prepare, using that we can test module A.

– Now module B cannot send or receive data from module A directly so, in these cases we have to transfer data from one module to another module by some external features. This external feature used is called Driver.

35) What is random testing?
When tester performs testing of application by using random input from the input domain of the system, this is Random Testing.

Random testing involve following procedures:

– Selection of input domain.
– Randomly selecting any input from input domain.
– Using these test input testing of application is performed.
– The results are compared to the system specification. The test is a failure if any input leads to incorrect results, otherwise it is a success.

37) What is Agile Testing?
Agile Testing means to quickly validation of the client requirements and make the application of good quality user interface. When the build is released to the testing team, testing of the application is started to find the bugs. As a Tester, we need to focus on the customer or end user requirements. We put the efforts to deliver the quality product in spite of short time frame which will further help in reducing the cost of development and test feedbacks will be implemented in the code which will avoid the defects coming from the end user.
Describe Use Case Testing.
Use Case: A use case is a description of the process which is performed by the end user for a particular task. Use case contains a sequence of step which is performed by the end user to complete a specific task or a step by step process that describe how the application and end user interact with each other. Use case is written by the user point of view.

Use case Testing: the use case testing uses this use case to evaluate the application. So that, the tester can examines all the functionalities of the application. Use case testing cover whole application,

38) What is the purpose of test strategy?
We need Test Strategy for the following reasons:

1. To have a signed, sealed, and delivered document, where the document contains details about the testing methodology, test plan, and test cases.
2. Test strategy document tells us how the software product will be tested.
3. Test strategy document helps to review the test plan with the project team members.
4. It describes the roles, responsibilities and the resources required for the test and schedule.
5. When we create a test strategy document, we have to put into writing any testing issues requiring resolution.

The test strategy is decided first, before lower level decisions are made on the test plan, test design, and other testing issues.
Explain bug life cycle.
Bug Life Cycle:

– When a tester finds a bug .The bug is assigned with NEW or OPEN status,

– The bug is assigned to development project manager who will analyze the bug .He will check whether it is a valid defect. If not valid bug is rejected then status is REJECTED.

– If not, next the defect is checked whether it is in scope. When bug is not part of the current release .Such defects are POSTPONED

– Now, Tester checks whether a similar defect was raised earlier. If yes defect is assigned a status DUPLICATE

– When bug is assigned to developer. During this stage bug is assigned a status IN-PROGRESS

– Once code is fixed. Defect is assigned a status FIXED

– Next the tester will re-test the code. In case the test case passes the defect is CLOSED

– If the test case fails again the bug is RE-OPENED and assigned to the developer. That’s all to Bug Life Cycle.

39) What is Error guessing and Error seeding?
Error Guessing is a test case design technique where the tester has to guess what faults might occur and to design the tests to represent them.

Error Seeding is the process of adding known faults intentionally in a program for the reason of monitoring the rate of detection & removal and also to estimate the number of faults remaining in the program.
Explain Compatibility testing with an example.
Compatibility testing is to evaluate the application compatibility with the computing environment like Operating System, Database, Browser compatibility, backwards compatibility, computing capacity of the Hardware Platform and compatibility of the Peripherals. Example, If Compatibility testing is done on a Game application, before installing a game on a computer, its compatibility is checked with the computer specification that whether it is compatible with the computer having that much of specification or not.

Business Objects Interview Questions

Top most important Business Objects interview questions and answers by Experts:

Here is a list of Top most important Business Objects interview questions and answers by Experts.If you want to download Business Objects interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Business Objects interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Business Objects ,Register for Business Objects online training here.

 

1) What is business objects? 
Business objects provides a set of tools for building data warehouses very efficiently. Business objects is an integrated query, reporting and analysis solution for business professionals that allow them to access the data in their corporate databases directly from their desktop and present and analyze this information in a business objects document. 

2) What is Designer? 
Designer is the Business objects product that is intended to develop the universes. These universe is the semantic layer of the database structure that isolates from technical issues of the database structure. 

3) How many modes are there in BO & Designer?  
There are two modes are there in BO and Designer are : 
Enterprise Mode
Workgroup Mode
4) What are the different types of data providers supported by BO? 
Queries on Universe 

Stored procedure
Free hand SQL
Text files or Spread sheets
VBA Procedures
OLAP servers
SAP 

5) What are the different multidimensional analysis methods available in Business Objects? 
  There are two multidimensional analysis methods available in BO, they are : 

Slice and Dice
Drill Down

6) What are the different @ Functions? 
@Aggregate_Aware 

@Prompt 
@Script 
@Select 
@Variable 
@Where 

7) What is the difference between @Prompt and @Script? 
The @Prompt function lets you create an interactive object. In the Query Panel, this type of object causes a message to appear. This message prompts the end user to enter a specific value.

This function recovers the results of Visual Basic for Applications macro (VBA macro). 

8) What is a context? 
A context is a rule by which determines which of two paths can be chosen when more than one path is possible in the database. 

9) What are the disadvantage of using contexts? 
The disadvantage of using context is that you expose the business objects end user to the database structure. They are forced to decide which context they want to use to run their query. The role of the universe is to shield end users from the database structure, so they do not have to make such decisions. 

10) What is BO? 
BO is an excellent tool for generation of reports, carrying out detailed analysis, graphical presentation of the results and generation of alerts. 

11) What are data integration tools? 
Data integration tools are used to extract data from existing databases, carry out the necessary transformations and load the data into the target database using a GUI. 

12) What are the components of data integrator? 
Data Integrator has four components are : 

Graphical designer : GUI to build and test ETL jobs for data cleansing, validation and auditing. 
Data integration server : to integrate data from different source databases.
Metadata repository : to keep source and target metadata as well as transformation rules.
Administrator : A web based tool can be used to start, stop, schedule and monitor ETL jobs. The ETL jobs can be in batch mode or real time mode.

13) What is a Business Objects Repository? 
The Business Objects repository is a centralized set of relational data structures stored on a database. This relational device enables Business objects and Web intelligence users to share resources in a controlled and secured environment.  
  
14) What are the types of business objects repository domain? 
The repository is made up of three domains are: 
The security domain
The universe domain
The document domain

15) What is BI platform? 
This platform provides a set of common services to deploy, use and manage the tools and applications. These services are security, broadcasting, collaboration, metadata and developer services.

16) What is BCA? 
BCA is a software product for the users of WEBI and BO to process and distribute documents automatically at the scheduled dates and time. 

17) What are the features in BCA? 
Automated document scheduling and publishing

On the server side, CORBA–enabled features such as load balancing and server optimization using caches
Tracing BROADCAST AGENT activity
Access and security

18) What is a chasm trap? 
Many to one joins from two fact tables converge on a single lookup table. This type of join convergence is called a Chasm trap.  

19) What is a fan trap? 
A one to many join links a table which is in turn linked by a one to many join. This type of fanning out of one to many joins is called a Fan trap. 

20) What is a Loop?  
In a relational database, a loop occurs when joins form multiple paths between lookup tables. if a query includes more than one path, the information returned can be incorrect. The rows that are returned are an intersection of the results for each path, so fewer rows are returned than expected. 

21) What is universe? 
A universe is a set of classes and objects intended for a specific application or group of users. 
22) What are the types of OLAP? 
ROLAP (Relational OLAP) 
MOLAP (Multidimensional OLAP) 
HOLAP (Hybrid OLAP)

23) What are the different schemas supported by BO Designer? 
Star Schema 

Snowflake Schema 
Multistar Schema 
Normalized production Schema 
Data warehouse with aggregates

24) What is the repository?  
The repository is the database in which the information about the users and data is present. It is created and maintained by the general supervisor. It is used to share resources of business objects. 

25) What are the types of repository domains?  
There are three types of repository domains 

Universe domain : It holds all the exported universes and there may be more than one universe domain in the repository.
Document domain : It holds all exported documents, templates, scripts, and lists of values.
Security domain : secured connections are stored in this. 

26) How is a fan trap solved? 
A Fan trap is solved in the following way : 

Creating an Alias and applying Aggregate Aware function.
Using Multiple SQL statements for each Measure.

27) What is user objects?  
User objects are end–user personal objects that are not shared with other end-users. This is because the user objects are stored locally in a specific user object definition file. If an end-user tries to refresh or edit query that contains another user’s user object, the user object is automatically removed from the query and report. A user object is stored inside the Universe folder. 

28) What are the various Business Objects products? 
User Module

Designer
Supervisor
Auditor
Set Analyzer
Info View (Web Intelligence)
Business Objects Software Development Kit (SDK)
Broadcast Agent

29) What are strategies?  
A strategy is a script that automatically extracts structural information from a database or flat file.  
30) What are the different types of Strategies? 
In Designer we can specify two types of strategies :
Built in strategies
External strategies

31) What are the types of users in Business Objects? 
General Supervisor

Supervisor
Designer 
Supervisor Designer
End User
Versatile User

32) What is Web Intelligence?  
Web Intelligence is a decision support solution designed to meet critical query, reporting and analysis needs over the World Wide Web and has features very similar to Business Objects.  

33) What are master/detail reports? 
Master/detail reports enable you to split large blocks of data into sections. This type of presentation allows you to avoid repeating values and also to display subtotals.  

34) What are calculation contexts? 
By default, BUSINESS OBJECTS determines the result of a measure based on the dimension or dimensions in the part of the report in which the measure is inserted. These sets of dimensions are called calculation contexts. Calculation contexts are dynamic in BUSINESS OBJECTS.  

35) What is Dimension? 
It is a structural attribute of a cube, which is used for multidimensional analysis.  

36) What is supervisor? 
Supervisor is the product is used to set up and maintain a secure environment for Business Objects products. 

37) What are the types of dimensions?  
There are four types of dimensions are : 

Informational Dimension 
Structural Dimension
Categorical Dimension
Partitioning Dimension 

38) What is a Data Provider? 
The data source (Query) is called as the data provider.  

39) What are the tasks of the universe designer? 
The responsibilities that universe designer has

Designing, Creating and maintaining the Universe 
Distributing the Created Universes

40) What are different types of parsing? 
There are two types of parsing are : 
Quick parsing
Thorough parsing

41) What is the use of Check integrity? 
Check Integrity can detect :

Invalid syntax in the SQL definition of an object, condition, or join.
Loops
Isolated tables
Isolated joins
Loops within contexts
Missing or incorrect cardinalities

42) What are the user profiles in Supervisor? 
SUPERVISOR offers several standard profiles for the various types of users of Business Objects products. 
General Supervisor 
Supervisor 
Designer
Supervisor-Designer 
User
Versatile 

43) What is a LOV? 
A list of values is a file that contains the data values associated with an object. Lists of values can reveal information about the contents of a database. 

44) What is a category in supervisor? 
A category is a keyword or phrase end-users can assign to documents when they send them to users, groups, or BROADCAST AGENT.  

45) What are the disadvantages of using a Alias? 
When we create Alias, it creates a new/extra table and this increases the number of tables in the universe, and this can be a problem, if performance is a issue 

46) What are the types of connection available in Designer? 
The database connection is categorized into three types : 

Personal 
Shared 
Ssecured 

47) Explain personal, shared and secured? 
Personal : The user and the universes, which are created using the personal connection belongs to that computer and can be accessed from that computer only, create it.

Shared : In shared type of connection we can use the common resources such as universes and documents. This can be used by several users. The parameters are stored locally in locdata folder with name sdac.lsi or sdac.ssi. This shared type of connection is used to setup in testing environment before publishing them.
Secured : In secured type of connection we can centralize and control access to secure the data. The secured connections are stored in security domain and are distributed to all the designers and supervisors who have the appropriate privileges. 

48) When do u use a Context? 
When you have dimension objects in one or both fact tables, you should always use a context. 

49) What is symbolic objects? 
Objects whose values are text are referred to as Symbolic objects.  

50) What is data mining? 
Data Mining is the analysis of data and use of software techniques for extracting hidden, comprehensible, and useful information from databases. 

51) When do u use Multiple Universes? 
You can use multiple universes to solve a Chasm trap in a WEBINTELLIGENCE universe when Multiple SQL for Measures cannot be used as there are dimension objects defined for one or both of the fact tables. 

52) What are the different methods by which we can link the universes? 
There are three approaches available for linking universes : 

The kernel approach 
The master approach 
The component approach 

53) Explain kernel approach, master approach and component approach? 
Kernel Approach : With the kernel approach, one universe contains the core components. These are the components common in all universes. The derived universes that you create from this kernel universe contain these core components as well as their own specific components.

Master Approach : In this approach, one master universe holds all possible components. In the universes derived from this master, certain components are hidden; in other words, the components visible in the derived universes are a subset of the master universe.
Component Approach : It involves merging two or more universes into one universe.

54) What is a report bursting? 
Report bursting allows you to maintain the version documents based on the user profiles. 
Post Your Answers Your Name Your Email-ID 
  
55) What is aggregate awareness? 
Aggregate awareness is a feature of DESIGNER that makes use of aggregate tables in a database. These are tables that contain pre-calculated data. The purpose of these tables is to enhance the performance of SQL transactions; they are thus used to speed up the execution of queries. 

56) What is metadata? 
Metadata is defined as the data about data. Metadata describes the entity and attributes description. 

57) What is a Batch? 
Batches provide a way to group sessions for either serial or parallel execution by the Informatica Server.  

58) Define Cubes? 
A cube consists of a set of ordered dimensions and measures. A cube may have one or several dimensions. 

59) What is surrogate key? 
A system generated artificial primary key that is not derived from any data in the database. It is similar to the object identifier in an object oriented system. 

60) What is slice and dice? 
An operation that allows one to select a portion of the data of a fact on the basis of specified values in one or several dimensions. 

61) What are the benefits of linked universe? 
A dynamic link may considerably reduce development and maintenance time. When you modify a component in the kernel universe, DESIGNER propagates the change to the same component in all the derived universes.
Instead of re–creating common components each time you create a new universe, you can centralize such components in a kernel universe, and then include them in all new universes.
Linked universes facilitate specialization. Development can be split between database administrators who set up a basic kernel universe, and the more specialized designers who create more functional universes based on their specific field.

Can Dimension and Measure objects both be used for Drill down analysis? 
NO, Measure object cannot be used in Drill down analysis. 

62) What is drill down? 
The drill down operation performs the operation opposite to the roll–up operation, i.e., it moves from a more general level to a detailed level in a hierarchy, thus presenting more detailed measures.  

63) What is drill across? 
The drill across operation executes queries involving more than one cube. 

64) What is drill through? 
The drill through operation allows one to move from data at the bottom level in a cube to data in the operational systems from which the cube was derived. 

65) What is the default qualification of a object? 
By default, DESIGNER automatically assigns a dimension qualification to an object you create. 

66) What are Lookup and Fact Tables? 
A lookup (Dimension) table contains information about the entities. In general the Dimension and details objects are derived from lookup tables. A fact table contains the statistical information about transactions. 

67) What is slice? 
The slice operation performs a selection on one dimension of a cube,resulting in a subcube. 

68) What is roll up? 
The roll up operation transforms detailed measures into summarized ones. This is done when on moves up in a hierarchy or reduces a dimension. 

69) What is materialized view? 
A view which is physically stored in a database. Materialized views allow query performance to be enhanced by precalculating costly operations. 

70) What are the main components of the Designer Interface? 
The main components that interact in the designing of universe are 

Table browser : The table browser is used to choose the tables and columns.
The Structure pane : The Structure pane refers the database structure of the universe.
The Universe pane : The Universe pane refers the components in which it is going to use in BO or WEBI documents. 

71) Does Cardinality have any effect on the generation of the query? 
Cardinality has no effect in the generation of SQL. Its sole purpose is to provide enough information to DESIGNER so that it can detect and resolve loops. 

72) What are new in BO 5.1? 
Save business objects documents in Adobe Portable Document Format (PDF).

Add hyperlinks to reports such as mail addresses and web site addresses. These hyperlinks are maintained when you save the report in HTML or PDF.
Zero Administration : Only the business objects client software installed on the windows pc; all middleware is stored and administered on the web intelligence web server and the server side processing is handled by the web intelligence system.

73) What is a class? 
A class is a collection of objects with in a universe. A class can further divided into subclasses. Using this classes and subclasses we can define the hierarchy. 

74) What is Drill up/down/by/through? 
Drill mode allows you to analyze data from different angles and on different levels of detail. 

Drill down displays next level of detail in hierarchy.
Drill up goes back up through the hierarchy to display data on less detailed levels. 
By using Drill by option you can move to another hierarchy to analyze other data that belongs to a different hierarchy.
Drill Through – If the lowest level of detail you need is not currently available in the report, you can drill through to the database directly from drill mode and get the data you need. You do not have to edit the query in the Query Panel.

75) What are the ways by which you can distribute the Universe? 
There are two ways to distribute a universe: through the repository or through the file system . 

76) What are enterprise and workgroup modes? 
Enterprise mode means that you are working in an environment with a repository. Workgroup mode means that you are working without a repository. The mode in which you save your universe determines whether other designers are able to access them. By default, a universe is saved in the mode in which you are already working. For example, if you launched a session in enterprise mode, any universe you save is automatically in that mode.  

77) What is a macro? 
A macro is a series of commands and functions that are stored in a Visual Basic for Applications module and can be run whenever you need to perform the task. If you perform a task repeatedly, you can automate the task with a macro. You create macros using the Visual Basic Editor. 

78) Is a default lov assigned to a Measure object? 
No default list of values is assigned to measure objects. 

79) What is aggregate aware? 
Aggregate awareness is a feature of DESIGNER that makes use of aggregate tables in a database. These are tables that contain precalculated data. The purpose of these tables is to enhance the performance of SQL transactions; they are thus used to speed up the execution of queries. 

80) What is the syntax of a Aggregate Aware function? 
The syntax of the @Aggregate_Aware function is as follows : @Aggregate_Aware(sum(agg_table_1), … sum(agg_table_n)) where agg_table_1 is the table with the highest level of aggregation, and agg_table_n the table with the lowest level. 

81) Is Universe MOLAP or OLAP? 
MOLAP – Multidimensional Online Analytical Processing.  

82) What is intelligent binning? 
A powerful BUSINESSMINER feature which automatically and intelligently divides numeric values into “bins” based on the range, values and distribution of the data. 

83) What is an add-in? 
Add-ins are programs that add optional commands and features to BUSINESS OBJECTS. Add-ins are usually created by those responsible in your company for adding customized features to BUSINESS OBJECTS. All you probably need to do is install and uninstall add-ins that are sent to you. 

84) Can a Universe have more than one fact Table? 
Yes. Typically a universe can have more than one fact table and numerous aggregated tables. 

85) What is the difference between built in strategies and external strategies? 
Built in Strategies : Designer provides a number of default strategies which we can use. These are strategies for extracting joins, detecting cardinalities, and creating default classes and objects. Options for indicating default strategies are located in the Database tab of the Options dialog box.

External Strategies : We can also create our own strategies. Such strategies are referred to as external strategies. With an external strategy, we can specify the exact way that objects and joins are to be extracted from the database structure. The strategy we use, for example, can be a script generated from a CASE Access tool. An external strategy is specific to one RDBMS.

86) Is Universe MOLAP or OLAP? 
MOLAP – Multidimensional Online Analytical Processing.  

87) What is intelligent binning? 
A powerful BUSINESSMINER feature which automatically and intelligently divides numeric values into “bins” based on the range, values and distribution of the data.
88) What is an add-in? 
Add-ins are programs that add optional commands and features to BUSINESS OBJECTS. Add-ins are usually created by those responsible in your company for adding customized features to BUSINESS OBJECTS. All you probably need to do is install and uninstall add-ins that are sent to you. 

89) Can a Universe have more than one fact Table? 
Yes. Typically a universe can have more than one fact table and numerous aggregated tables. 

90) What are the different schemas supported by BO Designer? 
Star Schema 

Snowflake Schema 
Multistar Schema 
Normalized production Schema 
Data warehouse with aggregates 

91) What is a join? 
Join combines columns and data from two or more tables. Join is the relation that occurs between the two tables that helps to combine into one table. The purpose of join is that to restrict the Cartesian product.  

92) How many types of join are available? 
Designer supports the following types of joins : 

equi joins
outer joins
theta joins
shortcut joins

93) What is theta join? 
A join is a relational operation that causes two or more tables with a common domain to be combined into a single table. The purpose of joins is to restrict the result set of a query run against multiple tables. 
How do you determine that you are working on the latest edition of the Universe? 
Each time you export a universe to a universe domain, DESIGNER increments the revision number of the universe. In this way, you can determine which is the latest version of the universe. 

94) What are the resources that are managed by supervisor? 
Business objects products 

Universes
Documents
Repository domains
Stored Procedure

95) What are linked universe? 
Linked universes are universes that share common components such as parameters, classes, objects, or joins. Among linked universes, one universe is said to be the kernel or master universe while the others are the derived universes. 

96) What are two modes for importing users & groups from supervisor? 
Batch Mode : The purpose of batch mode is to automate user and group import operations with no intervention from the interface.
Interactive Mode : Dialog boxes will appear as the file is imported to allow you to confirm the information. This is the default mode.

97) What is the difference between rolap and molap? 
ROLAP (Relational OLAP) : Users see their data organized in cubes and dimensions but the data is really stored in RDBMS. The performance is slow. A storage mode that uses tables in a relational database to store multidimensional structures.

MOLAP (Multidimensional OLAP) : Users see their data organized in cubes and dimensions but the data is really stored in MDBMS. Query performance is fast.  
What types of tables? 
BUSINESSOBJECTS has three types of table. It has two basic table types that display data in a list and crosstabs, which are a special kind of table that allows you to summarize data.
Tables
Crosstab tables
Free Standing Cells

 

Oracle Interview Questions

Top most important Oracle interview questions and answers by Experts:

Here is a list of Top most important Oracle interview questions and answers by Experts.If you want to download Oracle interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Oracle interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Oracle ,Register for Oracle online training here.

1) What are cursor attributes?
-%ROWCOUNT

-%NOTFOUND
-%FOUND
-%ISOPEN

There is a % sign in one field of a column. What will be the query to find it?
” Should be used before ‘%’.

2) What is ON DELETE CASCADE ?
When ON DELETE CASCADE is specified ORACLE maintains referential integrity by automatically removing dependent foreign key values if a referenced primary or unique key value is removed.

3) What is the fastest way of accessing a row in a table ?
Using ROWID.CONSTRAINTS

4) What is difference between TRUNCATE & DELETE ?
TRUNCATE commits after deleting entire table i.e., can not be rolled back. Database triggers do not fire on TRUNCATEDELETE allows the filtered deletion. Deleted records can be rolled back or committed. Database triggers fire on DELETE.

5) What is a transaction ?
Transaction is logical unit between two commits and commit and rollback.

6) What are the advantages of VIEW ?
To protect some of the columns of a table from other users.To hide complexity of a query.To hide complexity of calculations.

7) How will you a activate/deactivate integrity constraints ?
The integrity constraints can be enabled or disabled by ALTER TABLE ENABLE constraint/DISABLE constraint.

8) Where the integrity constraints are stored in Data Dictionary ?
The integrity constraints are stored in USER_CONSTRAINTS.

9) What is the Subquery ?
Sub query is a query whose return values are used in filtering conditions of the main query.

10) How to access the current value and next value from a sequence ? Is it possible to access the current value in a session before accessing next value ?
Sequence name CURRVAL, Sequence name NEXTVAL.It is not possible. Only if you access next value in the session, current value can be accessed.

11) What are the usage of SAVEPOINTS ?value in a session before accessing next value ?
SAVEPOINTS are used to subdivide a transaction into smaller parts. It enables rolling back part of a transaction. Maximum of five save points are allowed.

12) What is ROWID ?in a session before accessing next value ?
ROWID is a pseudo column attached to each row of a table. It is 18 character long, blockno, rownumber are the components of ROWID.

13) Explain Connect by Prior ?in a session before accessing next value ?
Retrieves rows in hierarchical order.e.g. select empno, ename from emp where.

14) How many LONG columns are allowed in a table ? Is it possible to use LONG columns in WHERE clause or ORDER BY ?
Only one LONG columns is allowed. It is not possible to use LONG column in WHERE or ORDER BY clause.

15) What is Referential Integrity ?
Maintaining data integrity through a set of rules that restrict the values of one or more columns of the tables based on the values of primary key or unique key of the referenced table.

16) What is a join ? Explain the different types of joins ?
Join is a query which retrieves related columns or rows from multiple tables.Self Join – Joining the table with itself.Equi Join – Joining two tables by equating two common columns.Non-Equi Join – Joining two tables by equating two common columns.Outer Join – Joining two tables in such a way that query can also retrieve rows that do not have corresponding join value in the other table.

17) If an unique key constraint on DATE column is created, will it validate the rows that are inserted with SYSDATE ?
It won’t, Because SYSDATE format contains time attached with it.

18) What are Procedure, functions and Packages ?
Procedures and functions consist of set of PL/SQL statements that are grouped together as a unit to solve a specific problem or perform set of related tasks.

Procedures do not Return values while Functions return one One Value Packages :: Packages Provide a method of encapsulating and storing related procedures, functions, variables and other Package Contents

19) What are Database Triggers and Stored Procedures
Database Triggers :: Database Triggers are Procedures that are automatically executed as a result of insert in, update to, or delete from table.
Database triggers have the values old and new to denote the old value in the table before it is deleted and the new indicated the new value that will be used. DT are useful for implementing complex business rules which cannot be enforced using the integrity rules.We can have the trigger as Before trigger or After Trigger and at Statement or Row level. e.g:: operations insert,update ,delete 3 before ,after 3*2 A total of 6 combinatons
At statment level(once for the trigger) or row level( for every execution ) 6 * 2 A total of 12. Thus a total of 12 combinations are there and the restriction of usage of 12 triggers has been lifted from Oracle 7.3 Onwards.
Stored Procedures :: Stored Procedures are Procedures that are stored in Compiled form in the database.The advantage of using the stored procedures is that many users can use the same procedure in compiled and ready to use format.

20) How many Integrity Rules are there and what are they
There are Three Integrity Rules. They are as follows ::

a) Entity Integrity Rule :: The Entity Integrity Rule enforces that the Primary key cannot be Null
b) Foreign Key Integrity Rule :: The FKIR denotes that the relationship between the foreign key and the primary key has to be enforced.When there is data in Child Tables the Master tables cannot be deleted.
c) Business Integrity Rules :: The Third Intigrity rule is about the complex business processes which cannot be implemented by the above 2 rules.

21) What are the Various Master and Detail Relation ships.
The various Master and Detail Relationship are
a) NonIsolated :: The Master cannot be deleted when a child is existing
b) Isolated :: The Master can be deleted when the child is existing
c) Cascading :: The child gets deleted when the Master is deleted.

22) What are the Various Block Coordination Properties
The various Block Coordination Properties are
a) Immediate Default Setting. The Detail records are shown when the Master Record are shown.
b) Differed with Auto Query Oracle Forms defer fetching the detail records until the operator navigates to the detail block.
c) Differed with No Auto Query The operator must navigate to the detail block and explicitly execute a query

23) What are the Different Optimization Techniques
The Various Optimisation techniques are

a) Execute Plan :: we can see the plan of the query and change it accordingly based on the indexes
b) Optimizer_hint ::
set_item_property(‘DeptBlock’,OPTIMIZER_HINT,’FIRST_ROWS’);
Select /*+ First_Rows */ Deptno,Dname,Loc,Rowid from dept
where (Deptno > 25)
c) Optimize_Sql ::
By setting the Optimize_Sql = No, Oracle Forms assigns a single cursor for all SQL statements.This slow downs the processing because for evertime the SQL must be parsed whenver they are executed.
f45run module = my_firstform userid = scott/tiger optimize_sql = No
d) Optimize_Tp ::
By setting the Optimize_Tp= No, Oracle Forms assigns seperate cursor only for each query SELECT statement. All other SQL statements reuse the cursor.
f45run module = my_firstform userid = scott/tiger optimize_Tp = No

24) How does one change an Oracle user’s password?(for DBA)
Issue the following SQL command:
ALTER USER <username> IDENTIFIED BY <new_password>;

From Oracle8 you can just type “password” from SQL*Plus, or if you need to change another user’s password, type “password user_name”. Look at this example:
SQL> password
Changing password for SCOTT
Old password:
New password:
Retype new password:

25) How does one create and drop database users?
Look at these examples:
CREATE USER scott
IDENTIFIED BY tiger — Assign password
DEFAULT TABLESACE tools — Assign space for table and index segments
TEMPORARY TABLESPACE temp; — Assign sort space
DROP USER scott CASCADE; — Remove user
After creating a new user, assign the required privileges:
GRANT CONNECT, RESOURCE TO scott;
GRANT DBA TO scott; — Make user a DB Administrator
Remember to give the user some space quota on its tablespaces:
ALTER USER scott QUOTA UNLIMITED ON tools;

26) How does one enforce strict password control? (for DBA)
By default Oracle’s security is not extremely good. For example, Oracle will allow users to choose single character passwords and passwords that match their names and userids. Also, passwords don’t ever expire. This means that one can hack an account for years without ever locking the user.

From Oracle8 one can manage passwords through profiles. Some of the things that one can restrict:
. FAILED_LOGIN_ATTEMPTS – failed login attempts before the account is locked
. PASSWORD_LIFE_TIME – limits the number of days the same password can be used for authentication
. PASSWORD_REUSE_TIME – number of days before a password can be reused
. PASSWORD_REUSE_MAX – number of password changes required before the current password can be reused
. PASSWORD_LOCK_TIME – number of days an account will be locked after maximum failed login attempts
. PASSWORD_GRACE_TIME – number of days after the grace period begins during which a warning is issued and login is allowed
. PASSWORD_VERIFY_FUNCTION – password complexity verification script
Look at this simple example:
CREATE PROFILE my_profile LIMIT
PASSWORD_LIFE_TIME 30;
ALTER USER scott PROFILE my_profile;

27) How does one switch to another user in Oracle? (for DBA)
Users normally use the “connect” statement to connect from one database user to another. However, DBAs can switch from one user to another without a password. Of course it is not advisable to bridge Oracle’s security, but look at this example: SQL> select password from dba_users where username=’SCOTT’;

PASSWORD
F894844C34402B67
SQL> alter user scott identified by lion;
User altered.

SQL> connect scott/lion
Connected.

REM Do whatever you like…
SQL> connect system/manager
Connected.

SQL> alter user scott identified by values ‘F894844C34402B67’;
User altered.
SQL> connect scott/tiger
Connected.
Note: Also see the su.sql script in the Useful Scripts and Sample Programs Page.

28) What are snap shots and views
Snapshots are mirror or replicas of tables. Views are built using the columns from one or more tables. The Single Table View can be updated but the view with multi table cannot be updated

29) What are the OOPS concepts in Oracle.
Oracle does implement the OOPS concepts. The best example is the Property Classes. We can categorize the properties by setting the visual attributes and then attach the property classes for the objects. OOPS supports the concepts of objects and classes and we can consider the property classes as classes and the items as objects

30) What is the difference between candidate key, unique key and primary key
Candidate keys are the columns in the table that could be the primary keys and the primary key is the key that has been selected to identify the rows. Unique key is also useful for identifying the distinct rows in the table.)

31) What is concurrency
Concurrency is allowing simultaneous access of same data by different users. Locks useful for accesing the database are

a) Exclusive
The exclusive lock is useful for locking the row when an insert,update or delete is being done.This lock should not be applied when we do only select from the row.
b) Share lock
We can do the table as Share_Lock as many share_locks can be put on the same resource.

Previleges and Grants
Previleges are the right to execute a particulare type of SQL statements. e.g :: Right to Connect, Right to create, Right to resource Grants are given to the objects so that the object might be accessed accordingly.The grant has to be given by the owner of the object

Table Space,Data Files,Parameter File, Control Files
Table Space :: The table space is useful for storing the data in the database.When a database is created two table spaces are created.
a) System Table space :: This data file stores all the tables related to the system and dba tables
b) User Table space :: This data file stores all the user related tables
We should have seperate table spaces for storing the tables and indexes so that the access is fast.
Data Files :: Every Oracle Data Base has one or more physical data files.They store the data for the database.Every datafile is associated with only one database.Once the Data file is created the size cannot change.To increase the size of the database to store more data we have to add data file.
Parameter Files :: Parameter file is needed to start an instance.A parameter file contains the list of instance configuration parameters e.g.::
db_block_buffers = 500
db_name = ORA7
db_domain = u.s.acme lang
Control Files :: Control files record the physical structure of the data files and redo log files
They contain the Db name, name and location of dbs, data files ,redo log files and time stamp.

Physical Storage of the Data
The finest level of granularity of the data base are the data blocks.
Data Block :: One Data Block correspond to specific number of physical database space
Extent :: Extent is the number of specific number of contigious data blocks.
Segments :: Set of Extents allocated for Extents. There are three types of Segments
a) Data Segment :: Non Clustered Table has data segment data of every table is stored in cluster data segment
b) Index Segment :: Each Index has index segment that stores data
c) Roll Back Segment :: Temporarily store ‘undo’ information

32) What are the Pct Free and Pct Used
Pct Free is used to denote the percentage of the free space that is to be left when creating a table. Similarly Pct Used is used to denote the percentage of the used space that is to be used when creating a table

eg.:: Pctfree 20, Pctused 40

33) What is Row Chaining
The data of a row in a table may not be able to fit the same data block.Data for row is stored in a chain of data blocks .

34) What is a 2 Phase Commit
Two Phase commit is used in distributed data base systems. This is useful to maintain the integrity of the database so that all the users see the same values. It contains DML statements or Remote Procedural calls that reference a remote object. There are basically 2 phases in a 2 phase commit.
a) Prepare Phase :: Global coordinator asks participants to prepare
b) Commit Phase :: Commit all participants to coordinator to Prepared, Read only or abort Reply

35) What is the difference between deleting and truncating of tables
Deleting a table will not remove the rows from the table but entry is there in the database dictionary and it can be retrieved But truncating a table deletes it completely and it cannot be retrieved.

36) What are mutating tables
When a table is in state of transition it is said to be mutating. eg :: If a row has been deleted then the table is said to be mutating and no operations can be done on the table except select.

37) What are Codd Rules
Codd Rules describe the ideal nature of a RDBMS. No RDBMS satisfies all the 12 codd rules and Oracle Satisfies 11 of the 12 rules and is the only Rdbms to satisfy the maximum number of rules.

38) What is Normalisation
Normalisation is the process of organising the tables to remove the redundancy.There are mainly 5 Normalisation rules.

a) 1 Normal Form :: A table is said to be in 1st Normal Form when the attributes are atomic
b) 2 Normal Form :: A table is said to be in 2nd Normal Form when all the candidate keys are dependant on the primary key
c) 3rd Normal Form :: A table is said to be third Normal form when it is not dependant transitively

39) What are the different types of PL/SQL program units that can be defined and stored in ORACLE database ?
Procedures and Functions,Packages and Database Triggers.

40) What are the advantages of having a Package ?
Increased functionality (for example,global package variables can be declared and used by any proecdure in the package) and performance (for example all objects of the package are parsed compiled, and loaded into memory once)

41) What are the uses of Database Trigger ?
Database triggers can be used to automatic data generation, audit data modifications, enforce complex Integrity constraints, and customize complex security authorizations.

42) What is a Procedure ?
A Procedure consist of a set of SQL and PL/SQL statements that are grouped together as a unit to solve a specific problem or perform a set of related tasks.

43) What is a Package ?
A Package is a collection of related procedures, functions, variables and other package constructs together as a unit in the database.

44) What is difference between Procedures and Functions ?
A Function returns a value to the caller where as a Procedure does not.

45) What is Database Trigger ?
A Database Trigger is procedure (set of SQL and PL/SQL statements) that is automatically executed as a result of an insert in, update to, or delete from a table.

46) Can the default values be assigned to actual parameters?
Yes

 
47) Can a primary key contain more than one columns?
Yes

48) What is an UTL_FILE.What are different procedures and functions associated with it?
UTL_FILE is a package that adds the ability to read and write to operating system files. Procedures associated with it are FCLOSE, FCLOSE_ALL and 5 procedures to output data to a file PUT, PUT_LINE, NEW_LINE, PUTF, FFLUSH.PUT, FFLUSH.PUT_LINE,FFLUSH.NEW_LINE. Functions associated with it are FOPEN, ISOPEN.

49) What are ORACLE PRECOMPILERS?
Using ORACLE PRECOMPILERS, SQL statements and PL/SQL blocks can be contained inside 3GL programs written in C,C++,COBOL,PASCAL, FORTRAN,PL/1 AND ADA. The Precompilers are known as Pro*C,Pro*Cobol,… This form of PL/SQL is known as embedded pl/sql,the language in which pl/sql is embedded is known as the host language. The prcompiler translates the embedded SQL and pl/sql statements into calls to the precompiler runtime library. The output must be compiled and linked with this library to creator an executable.

50) Differentiate between TRUNCATE and DELETE?
TRUNCATE deletes much faster than DELETE
TRUNCATE
DELETE
It is a DDL statement
It is a DML statement
It is a one way trip, cannot ROLLBACK
One can Rollback
Doesn’t have selective features (where clause)
Has
Doesn’t fire database triggers
Does
It requires disabling of referential constraints.

51) What is difference between a formal and an actual parameter?
The variables declared in the procedure and which are passed, as arguments are called actual, the parameters in the procedure declaration. Actual parameters contain the values that are passed to a procedure and receive results. Formal parameters are the placeholders for the values of actual parameters

52) What should be the return type for a cursor variable. Can we use a scalar data type as return type?
The return type for a cursor must be a record type.It can be declared explicitly as a user-defined or %ROWTYPE can be used. eg TYPE t_studentsref IS REF CURSOR RETURN students%ROWTYPE

53) What are different Oracle database objects?
-TABLES
-VIEWS
-INDEXES
-SYNONYMS
-SEQUENCES
-TABLESPACES etc
 
54) What is difference between SUBSTR and INSTR?
SUBSTR returns a specified portion of a string eg SUBSTR(‘BCDEF’,4) output BCDE INSTR provides character position in which a pattern is found in a string. eg INSTR(‘ABC-DC-F’,’-‘,2) output 7 (2nd occurence of ‘-‘)

55) Display the number value in Words?
SQL> select sal, (to_char(to_date(sal,’j’), ‘jsp’))
from emp;
the output like,
SAL (TO_CHAR(TO_DATE(SAL,’J’),’JSP’))
——— —————————————-
800 eight hundred
1600 one thousand six hundred
1250 one thousand two hundred fifty
If you want to add some text like, Rs. Three Thousand only.
SQL> select sal “Salary “,
(‘ Rs. ‘|| (to_char(to_date(sal,’j’), ‘Jsp’))|| ‘ only.’))
“Sal in Words” from emp
/
Salary Sal in Words
——- ———————————————–
800 Rs. Eight Hundred only.
1600 Rs. One Thousand Six Hundred only.
1250 Rs. One Thousand Two Hundred Fifty only.

56) What is difference between SQL and SQL*PLUS?
SQL*PLUS is a command line tool where as SQL and PL/SQL language interface and reporting tool. Its a command line tool that allows user to type SQL commands to be executed directly against an Oracle database. SQL is a language used to query the relational database(DML,DCL,DDL). SQL*PLUS commands are used to format query result, Set options, Edit SQL commands and PL/SQL.

57) What are various joins used while writing SUBQUERIES?
Self join-Its a join foreign key of a table references the same table. Outer Join–Its a join condition used where One can query all the rows of one of the tables in the join condition even though they don’t satisfy the join condition.

Equi-join–Its a join condition that retrieves rows from one or more tables in which one or more columns in one table are equal to one or more columns in the second table.

58) What a SELECT FOR UPDATE cursor represent.?
SELECT……FROM……FOR……UPDATE[OF column-reference][NOWAIT]

The processing done in a fetch loop modifies the rows that have been retrieved by the cursor. A convenient way of modifying the rows is done by a method with two parts: the FOR UPDATE clause in the cursor declaration, WHERE CURRENT OF CLAUSE in an UPDATE or declaration statement.

59) What are various privileges that a user can grant to another user?
-SELECT
-CONNECT
-RESOURCES

60) Display the records between two range?
select rownum, empno, ename from emp where rowid in (select rowid from emp where rownum <=&upto minus select rowid from emp where rownum<&Start);

minvalue.sql Select the Nth lowest value from a table?
select level, min(‘col_name’) from my_table where level = ‘&n’ connect by prior (‘col_name’) < ‘col_name’)
group by level;
Example:
Given a table called emp with the following columns:
— id number
— name varchar2(20)
— sal number

— For the second lowest salary:
— select level, min(sal) from emp
— where level=2
— connect by prior sal < sal
— group by level

61) What is difference between Rename and Alias?
Rename is a permanent name given to a table or column whereas Alias is a temporary name given to a table or column which do not exist once the SQL statement is executed.

62) Difference between an implicit & an explicit cursor.?
only one row. However,queries that return more than one row you must declare an explicit cursor or use a cursor FOR loop. Explicit cursor is a cursor in which the cursor name is explicitly assigned to a SELECT statement via the CURSOR…IS statement. An implicit cursor is used for all SQL statements Declare, Open, Fetch, Close. An explicit cursors are used to process multirow SELECT statements An implicit cursor is used to process INSERT, UPDATE, DELETE and single row SELECT. .INTO statements.

63) What is a OUTER JOIN?
Outer Join–Its a join condition used where you can query all the rows of one of the tables in the join condition even though they don?t satisfy the join condition.

64) What is a cursor?
Oracle uses work area to execute SQL statements and store processing information PL/SQL construct called a cursor lets you name a work area and access its stored information A cursor is a mechanism used to fetch more than one row in a Pl/SQl block.

65) What is the purpose of a cluster?
Oracle does not allow a user to specifically locate tables, since that is a part of the function of the RDBMS. However, for the purpose of increasing performance, oracle allows a developer to create a CLUSTER. A CLUSTER provides a means for storing data from different tables together for faster retrieval than if the table placement were left to the RDBMS.

 
66) What is OCI. What are its uses?
Oracle Call Interface is a method of accesing database from a 3GL program. Uses–No precompiler is required,PL/SQL blocks are executed like other DML statements.

The OCI library provides
–functions to parse SQL statemets
–bind input variables
–bind output variables
–execute statements
–fetch the results

67) How you open and close a cursor variable. Why it is required?
OPEN cursor variable FOR SELECT…Statement

CLOSE cursor variable In order to associate a cursor variable with a particular SELECT statement OPEN syntax is used. In order to free the resources used for the query CLOSE statement is used.
 
68) Display Odd/ Even number of records?
Odd number of records:

select * from emp where (rowid,1) in (select rowid, mod(rownum,2) from emp);
Output:-
1
3
5
Even number of records:
select * from emp where (rowid,0) in (select rowid, mod(rownum,2) from emp)
Output:-
2
4
6

69) What are various constraints used in SQL?
-NULL

-NOT NULL
-CHECK
-DEFAULT

70) Can cursor variables be stored in PL/SQL tables. If yes how. If not why?
No, a cursor variable points a row which cannot be stored in a two-dimensional PL/SQL table.

71) Difference between NO DATA FOUND and %NOTFOUND?
NO DATA FOUND is an exception raised only for the SELECT….INTO statements when the where clause of the querydoes not match any rows. When the where clause of the explicit cursor does not match any rows the %NOTFOUND attribute is set to TRUE instead.

72) Can you use a commit statement within a database trigger?
No

73) What WHERE CURRENT OF clause does in a cursor?
LOOP

SELECT num_credits INTO v_numcredits FROM classes
WHERE dept=123 and course=101;
UPDATE students
FHKO;;;;;;;;;SET current_credits=current_credits+v_numcredits
WHERE CURRENT OF X;

74) There is a string 120000 12 0 .125 , how you will find the position of the decimal place?
INSTR(‘120000 12 0 .125′,1,’.’)

output 13

75) What are different modes of parameters used in functions and procedures?
-IN -OUT -INOUT

76) How you were passing cursor variables in PL/SQL 2.2?
In PL/SQL 2.2 cursor variables cannot be declared in a package.This is because the storage for a cursor variable has to be allocated using Pro*C or OCI with version 2.2, the only means of passing a cursor variable to a PL/SQL block is via bind variable or a procedure parameter.

77) When do you use WHERE clause and when do you use HAVING clause?
HAVING clause is used when you want to specify a condition for a group function and it is written after GROUP BY clause. The WHERE clause is used when you want to specify a condition for columns, single row functions except group functions and it is written before GROUP BY clause if it is used.

78) Difference between procedure and function.?
Functions are named PL/SQL blocks that return a value and can be called with arguments procedure a named block that can be called with parameter. A procedure all is a PL/SQL statement by itself, while a Function call is called as part of an expression.

79) Which is more faster – IN or EXISTS?
EXISTS is more faster than IN because EXISTS returns a Boolean value whereas IN returns a value.

80) What is syntax for dropping a procedure and a function .Are these operations possible?
Drop Procedure procedure_name

Drop Function function_name

81) How will you delete duplicating rows from a base table?
delete from table_name where rowid not in (select max(rowid) from table group by duplicate_values_field_name); or delete duplicate_values_field_name dv from table_name ta where rowid <(select min(rowid) from table_name tb where ta.dv=tb.dv);

82) Difference between database triggers and form triggers?
-Data base trigger(DBT) fires when a DML operation is performed on a data base table. Form trigger(FT) Fires when user presses a key or navigates between fields on the screen
-Can be row level or statement level No distinction between row level and statement level.
-Can manipulate data stored in Oracle tables via SQL Can manipulate data in Oracle tables as well as variables in forms.
-Can be fired from any session executing the triggering DML statements. Can be fired only from the form that define the trigger.
-Can cause other database triggers to fire. Can cause other database triggers to fire, but not other form triggers.

83) What is a cursor for loop?
Cursor For Loop is a loop where oracle implicitly declares a loop variable, the loop index that of the same record type as the cursor’s record.

84) How you will avoid duplicating records in a query?
By using DISTINCT

85) What is a view ?
A view is stored procedure based on one or more tables, it?s a virtual table.

86) What is difference between UNIQUE and PRIMARY KEY constraints?
A table can have only one PRIMARY KEY whereas there can be any number of UNIQUE keys. The columns that compose PK are automatically define NOT NULL, whereas a column that compose a UNIQUE is not automatically defined to be mandatory must also specify the column is NOT NULL.

87) What is use of a cursor variable? How it is defined?
A cursor variable is associated with different statements at run time, which can hold different values at run time. Static cursors can only be associated with one run time query. A cursor variable is reference type (like a pointer in C).
Declaring a cursor variable:
TYPE type_name IS REF CURSOR RETURN return_type type_name is the name of the reference type,return_type is a record type indicating the types of the select list that will eventually be returned by the cursor variable.

88) How do you find the numbert of rows in a Table ?
A bad answer is count them (SELECT COUNT(*) FROM table_name)
A good answer is :-
‘By generating SQL to ANALYZE TABLE table_name COUNT STATISTICS by querying Oracle System Catalogues (e.g. USER_TABLES or ALL_TABLES).
The best answer is to refer to the utility which Oracle released which makes it unnecessary to do ANALYZE TABLE for each Table individually.
 

89) What is the maximum buffer size that can be specified using the DBMS_OUTPUT.ENABLE function?
1,000,00

 

 

Teradata Interview Questions

Top most important Teradata interview questions and answers by Experts:

Here is a list of Top most important Teradata interview questions and answers by Experts.If you want to download Teradata interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Teradata interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Teradata ,Register for Teradata online training here.

 

1) What is meant by a Parsing Engine?

PE happens to be a kind Vproc. Its primary function is to take SQL requests and deliver responses in SQL. It consists of a wide array of software components that are used to break SQL into various steps and then send those steps to AMPs.

2) What do you mean by parsing?

Parsing is a process concerned with analysis of symbols of string that are either in computer language or in natural language.

3) What are the functions of a Parser?

A Parser: –

  • Checks semantics errors
  • Checks syntactical errors
  • Checks object existence

4) What is meant by a dispatcher?

Dispatcher takes a whole collection of requests and then keeps them stored in a queue. The same queue is being kept throughout the process in order to deliver multiple sets of responses.

5) How many sessions of MAX is PE capable of handling at a particular time?

PE can handle a total of 120 sessions at a particular point of time.

6) Explain BYNET.

BYNET basically serves as a medium of communication between the components. It is primarily responsible for sending messages and also responsible for performing merging, as well as sorting operations.

7) What is meant by a Clique?

A Clique is basically known to be an assortment of nodes that is being shared amongst common disk drives. Presence of Clique is immensely important since it helps in avoiding node failures.

8) What happens when a node suffers a downfall?

Whenever there is a downfall in the performance level of a node, all the corresponding Vprocs immediately migrate to a new node from the fail node in order to get all the data back from common drives.

9) List out all forms of LOCKS that are available in Teradata.

There are basically four types of LOCKS that fall under Teradata. These are: –

  • Read Lock
  • Access Lock
  • Exclusive Lock
  • Write Lock

10) What is the particular designated level at which a LOCK is liable to be applied in Teradata?

  • Table Level – All the rows that are present inside a table will certainly be locked.
  • Database Level Lock – All the objects that are present inside the database will be locked.
  • Row Hash Level Lock – Only those rows will be locked which are corresponding to the particular row.

11) In the Primary Index, what is the score of AMPs that are actively involved?

Only one AMP is actively involved in a Primary Index.

12) In Teradata, what is the significance of UPSERT command?

UPSERT basically stands for Update Else Insert. This option is available only in Teradata.

13) Highlight the advantages of PPI(Partition Primary Index).

PPI is basically used for Range-based or Category-based data storage purposes. When it comes to Range queries, there is no need of Full table scan utilization as it straightaway moves to the consequent partition thus skipping all the other partitions.

14) Give the sizes of SMALLINT, BYTEINT and INTEGER.

SMALLINT – 2 Bytes – 16 Bites -> -32768 to 32767

BYTEINT – 1 Bytes – 8 Bits -> -128 to 127

INTEGER – 4 Bytes – 32 Bits -> -2,147,483,648 to 2,147,483,647

15) What is meant by a Least Cost Plan?

A Least Cost Plan basically executes in less time across the shortest path.

16) Highlight the points of differences between the database and user in Teradata.

  • A database is basically passive, whereas a user is active.
  • A database primarily stores all the objects of database, whereas a user can store any object whether that is a macro, table, view, etc.
  • Database does not has password while the user has to enter password.

17) Highlight the differences between Primary Key and Primary Index.

  • Primary index is quite mandatory, whereas Primary Key is optional.
  • Primary Index has a limit of 64 tables/columns, whereas Primary Key does not have any limit.
  • Primary Index allows duplicates and nulls, whereas Primary Key doesn’t.
  • Primary Index is a physical mechanism, whereas Primary Key is purely logical mechanism.

18) Explain how spool space is used.

Spool space in Teradata is basically used for running queries. Out of the total space that is available in Teradata, 20% of the space is basically allocated to spool space.

19) Highlight the need for Performance Tuning.

Performance tuning in Teradata is basically done to identify all the bottlenecks and then resolve them.

20) Comment whether bottleneck is an error or not.

Technically, bottleneck is not a form of error, but it certainly causes a certain amount of delay in the system.

21) How can bottlenecks be identified?

There are basically four ways of identifying a bottleneck. These are: –

  • Teradata Visual Explain
  • Explain Request Modifier
  • Teradata Manager
  • Performance Monitor

22) What is meant by a Highest Cost Plan?

As per Highest Cost Plan, the time taken to execute the process is more, and it takes the longest path available.

23) Highlight all the modes that are present under Confidence Level.

Low, No, High and Join are the four modes that are present under Confidence Level.

24) Name the five phases that come under MultiLoad Utility.

Preliminary Phase, DML Phase, Data Acquisition Phase, Application Phase and End Phase.

25) Highlight the limitations of TPUMP Utility.

Following are the limitations of TPUMP utility: –

  • We cannot use SELECT statement.
  • Data Files cannot be concatenated.
  • Aggregate and Exponential operators are not supported.
  • Arithmetic functions cannot be supported.

26) In BTEQ, how are the session-mode parameters being set?

.set session transaction BTET -> Teradata transaction mode

.set session transaction ANSI -> ANSI mode

These commands will work only when they are entered before logging into the session.

27) How do you define Teradata? Give some of the primary characteristics of the same.

Teradata is basically an RDMS which is used to drive the Datamart, Datawarehouse, OLAP, OLTP, as well as DSS Appliances of the company. Some of the primary characteristics of Teradata are given below.

  • Is capable of running on Single-nodes, as well as multi-nodes.
  • Parallelism is built into the system.
  • Very much compatible with the standards of ANSI.
  • Tends to act in the same way as a server.
  • It is an Open System that basically executes for UNIX MR-RAS, Suse Linux ETC, WIN2K, etc.

28) What are the newly developed features of Teradata?

Some of the newly developed features of Teradata are: –

  • Automated temporal analytics
  • Extension in the compression capabilities which allows flexible compression of data about 20 times more data than the previous version.
  • Customer associated innovation like tetradata viewpoint.

29) Highlight a few of the important components of Teradata.

Some of the important components of Teradata are: –

  • Bynet
  • Access Module Processor (AMP)
  • Parsing Engine (PE)
  • Virtual Disk (vDisk)
  • Virtual Storage System (VSS)

30) Mention the procedure via which, we can run Teradata jobs in a UNIX environment.

All you have to do is perform execution in UNIX in the way as mentioned below.

$Sh > BTEQ < [Script Path] > [Logfile Path]
or
$Sh > BTEQ < [Script Path] TEE [Logfile Path]

31) In Teradata, how do we Generate Sequence?

In Teradata, we Generate Sequence by making use of Identity Column

32) During the Display time, how is the sequence generated by Teradata?

All you have to do is use CSUM.

33) A certain load is being imposed on the table and that too, every hour. The traffic in the morning is relatively low, and that of the night is very high. As per this situation, which is the most advisable utility and how is that utility supposed to be loaded?

The most suggestible utility here has to be Tpump. By making use of packet size decreasing or increasing, the traffic can be easily handled.

34) If Fast Load Script fails and only the error tables are made available to you, then how will you restart?

There are basically two ways of restarting in this case.

  • Making the old file to run– Make sure that you do not completely drop the error tables. Instead, try to rectify the errors that are present in the script or the file and then execute again.
  • Running a new file– In this process, the script is executed simply using end loading and beginning statements. This will help in removing the lock that has been put up on the target table and might also remove the given record from the fast-log table. Once this is done, you are free to run the whole script once again.

35) Mention a few of the ETL tools that come under Teradata.

Some of the ETL tools which are commonly used in Teradata are DataStage, Informatica, SSIS, etc.

36) Highlight a few of the advantages that ETL tools have over TD.

Some of the advantages that ETL tools have over TD are: –

  • Multiple heterogeneous destinations, as well as sources can be operated.
  • Debugging process is much easier with the help of ETL tools owing to full-fledged GUI support.
  • Components of ETL tools can be easily reused, and as a result, if there is an update to the main server, then all the corresponding applications connected to the server are updated automatically.
  • De-pivoting and pivoting can be easily done using ETL tools.

37) What is the meaning of Caching in Teradata?

Caching is considered as an added advantage of using Teradata as it primarily works with the source which stays in the same order i.e. does not change on a frequent basis. At times, Cache is usually shared amongst applications.

38) How can we check the version of Teradata that we are using currently?

Just give the command .SHOW VERSION.

39) Give a justifiable reason why Multi-load supports NUSI instead of USI.

The index sub-table row happens to be on the same Amp in the same way as the data row in NUSI. Thus, each Amp is operated separately and in a parallel manner.

40) How is MLOAD Client System restarted after execution?

The script has to be submitted manually so that it can easily load the data from the checkpoint that comes last.

41) How is MLOAD Teradata Server restarted after execution?

The process is basically carried out from the last known checkpoint, and once the data has been carried out after execution of MLOAD script, the server is restarted.

42) What is meant by a node?

A node basically is termed as an assortment of components of hardware and software. Usually a server is referred to as a node.

43) Let us say there is a file that consists of 100 records out of which we need to skip the first and the last 20 records. What will the code snippet?

We need to use BTEQ Utility in order to do this task. Skip 20, as well as Repeat 60 will be used in the script.

44) Explain PDE.

PDE basically stands for Parallel Data Extension. PDE basically happens to be an interface layer of software present above the operation system and gives the database a chance to operate in a parallel milieu.

45) What is TPD?

TPD basically stands for Trusted Parallel Database, and it basically works under PDE. Teradata happens to be a database that primarily works under PDE. This is the reason why Teradata is usually referred to as Trusted Parallel or Pure Parallel database.

46) What is meant by a Channel Driver?

A channel driver is software that acts as a medium of communication between PEs and all the applications that are running on channels which are attached to the clients.

47) What is meant by Teradata Gateway?

Just like channel driver, Teradata Gateway acts as a medium of communication between the Parse Engine and applications that are attached to network clients. Only one Gateway is assigned per node.

48) What is meant by a Virtual Disk?

Virtual Disk is basically a compilation of a whole array of cylinders which are physical disks. It is sometimes referred to as disk Array.

49) Explain the meaning of Amp?

Amp basically stands for Access Module Processor and happens to be a processor working virtually and is basically used for managing a single portion of the database. This particular portion of database cannot be shared by any other Amp. Thus, this form of architecture is commonly referred to as shared-nothing architecture.

50) What does Amp contain and what are all the operations that it performs?

Amp basically consists of a Database Manager Subsystem and is capable of performing the operations mentioned below.

  • Performing DML
  • Performing DDL
  • Implementing Aggregations and Joins.
  • Releasing and applying locks, etc.

51) What is meant by a Parsing Engine?

PE happens to be a kind Vproc. Its primary function is to take SQL requests and deliver responses in SQL. It consists of a wide array of software components that are used to break SQL into various steps and then send those steps to AMPs.

 

 

Oracle DBA Interview Questions

Top most important Oracle DBA interview questions and answers by Experts:

Here is a list of Top most important Oracle DBA interview questions and answers by Experts.If you want to download Oracle DBA interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Oracle DBA interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Oracle DBA ,Register for Oracle DBA online training here.

 

 

1) How would you determine the time zone under which a database was operating?
select DBTIMEZONE from dual;
2) Explain the use of setting GLOBAL_NAMES equal to TRUE.
Setting GLOBAL_NAMES dictates how you might connect to a database. This variable is either TRUE or FALSE and if it is set to TRUE it enforces database links to have the same name as the remote database to which they are linking.
3) What command would you use to encrypt a PL/SQL application?
WRAP
4) Explain the difference between a FUNCTION, PROCEDURE and PACKAGE.
A function and procedure are the same in that they are intended to be a collection of PL/SQL code that carries a single task. While a procedure does not have to return any values to the calling application, a function will return a single value. A package on the other hand is a collection of functions and procedures that are grouped together based on their commonality to a business function or application.
5) Explain the use of table functions.
Table functions are designed to return a set of rows through PL/SQL logic but are intended to be used as a normal table or view in a SQL statement. They are also used to pipeline information in an ETL process.
6) Name three advisory statistics you can collect.
Buffer Cache Advice, Segment Level Statistics, & Timed Statistics
7) Where in the Oracle directory tree structure are audit traces placed?
In unix $ORACLE_HOME/rdbms/audit, in Windows the event viewer
8) Explain materialized views and how they are used.
Materialized views are objects that are reduced sets of information that have been summarized, grouped, or aggregated from base tables. They are typically used in data warehouse or decision support systems.
9)When a user process fails, what background process cleans up after it?
PMON
10) What background process refreshes materialized views?
The Job Queue Processes.
11) How would you determine what sessions are connected and what resources they are waiting for?
Use of V$SESSION and V$SESSION_WAIT
12) Describe what redo logs are.
Redo logs are logical and physical structures that are designed to hold all the changes made to a database and are intended to aid in the recovery of a database.
13) How would you force a log switch?
ALTER SYSTEM SWITCH LOGFILE;
14) Give two methods you could use to determine what DDL changes have been made.
You could use Logminer or Streams
15) What does coalescing a tablespace do?
Coalescing is only valid for dictionary-managed tablespaces and de-fragments space by combining neighboring free extents into large single extents.
16) What is the difference between a TEMPORARY tablespace and a PERMANENT tablespace?
A temporary tablespace is used for temporary objects such as sort structures while permanent tablespaces are used to store those objects meant to be used as the true objects of the database.
17) Name a tablespace automatically created when you create a database.
The SYSTEM tablespace.
18) When creating a user, what permissions must you grant to allow them to connect to the database?
Grant the CONNECT to the user.
19) How do you add a data file to a tablespace?
ALTER TABLESPACE <tablespace_name> ADD DATAFILE <datafile_name> SIZE <size>
20) How do you resize a data file?
ALTER DATABASE DATAFILE <datafile_name> RESIZE <new_size>;
21) What view would you use to look at the size of a data file?
DBA_DATA_FILES
22)  What view would you use to determine free space in a tablespace?
DBA_FREE_SPACE
23) How would you determine who has added a row to a table?
Turn on fine grain auditing for the table.
24) How can you rebuild an index?
ALTER INDEX <index_name> REBUILD;
25) Explain what partitioning is and what its benefit is.
Partitioning is a method of taking large tables and indexes and splitting them into smaller, more manageable pieces.
26) You have just compiled a PL/SQL package but got errors, how would you view the errors?
SHOW ERRORS
27)  How can you gather statistics on a table?
The ANALYZE command.
28) How can you enable a trace for a session?
Use the DBMS_SESSION.SET_SQL_TRACE or
Use ALTER SESSION SET SQL_TRACE = TRUE;
29) What is the difference between the SQL*Loader and IMPORT utilities?
These two Oracle utilities are used for loading data into the database. The difference is that the import utility relies on the data being produced by another Oracle utility EXPORT while the SQL*Loader utility allows data to be loaded that has been produced by other utilities from different data sources just so long as it conforms to ASCII formatted or delimited files.
30) Name two files used for network connection to a database.
TNSNAMES.ORA and SQLNET.ORA
Technical – UNIX
Every DBA should know something about the operating system that the database will be running on. The questions here are related to UNIX but you should equally be able to answer questions related to common Windows environments.
31) How do you list the files in an UNIX directory while also showing hidden files?
ls -ltra
32) How do you execute a UNIX command in the background?
Use the “&”
33) What UNIX command will control the default file permissions when files are created?
Umask
34) Explain the read, write, and execute permissions on a UNIX directory.
Read allows you to see and list the directory contents.
Write allows you to create, edit and delete files and subdirectories in the directory.
Execute gives you the previous read/write permissions plus allows you to change into the directory and execute programs or shells from the directory.
35) The difference between a soft link and a hard link?
A symbolic (soft) linked file and the targeted file can be located on the same or different file system while for a hard link they must be located on the same file system.
36) Give the command to display space usage on the UNIX file system.
df -lk
37) Explain iostat, vmstat and netstat.
Iostat reports on terminal, disk and tape I/O activity.
Vmstat reports on virtual memory statistics for processes, disk, tape and CPU activity.
Netstat reports on the contents of network data structures.
38) How would you change all occurrences of a value using VI?
Use :%s/<old>/<new>/g
39) Give two UNIX kernel parameters that effect an Oracle install
SHMMAX & SHMMNI
40) Briefly, how do you install Oracle software on UNIX.
Basically, set up disks, kernel parameters, and run orainst.

41) What is Secure External password Store (SEPS)?

Through the use of SEPS you can store password credentials for connecting to database by using a client side oracle wallet, this wallet stores signing credentials. This feature introduced since oracle 10g. Thus the application code, scheduled job, scripts no longer needed embedded username and passwords. This reduces risk because the passwords are no longer exposed and password management policies are more easily enforced without changing application code whenever username and password change.

42) Differentiate DB file sequential read wait/DB File Scattered Read?

Sequential read associated with index read where as scattered read has to do with full table scan. The sequential read, reads block into contiguous memory and DB scattered read gets from multiple block and scattered them into buffer cache. 

43) I install oracle 10g on windows 7 successfully. I found every thing working fine except the toad is giving “cannot load oci.dll” error. Is this compatibility issue?

Read the toad user guide. You will get important information related to compatibility issue. In fact toad works with both 32 bit and 64 bit oracle server where as toad only work with 32 bit client. If you need 64 bit client for other applications, you can install both 32 bit and 64 bit client on a single machine and just tell the toad to use the 32 bit client.

44) How to re-organize schema?

We can use dbms_redefinition package for online re-organization of schema objects. Otherwise using import/export and data pump utility you can recreate or re-organize your schema

45) How can you control number of datafiles in oracle database?

The db_files parameter is a “soft limit ” parameter that controls the maximum number of physical OS files that can map to an Oracle instance. The maxdatafiles parameter is a different – “hard limit” parameter. When issuing a “create database” command, the value specified for maxdatafiles is stored in Oracle control files and default value is 32. The maximum number of database files can be set with the init parameter db_files.

Regardless of the setting of this parameter, maximum per database: 65533 (May be less on some operating systems), Maximum number of datafiles per tablespace: OS dependent = usually 1022

You can also by Limited size of database blocks and by the DB_FILES initialization parameter for a particular instance. Bigfile tablespaces can contain only one file, but that file can have up to 4G blocks.

46) What is Latches and why they are used in oracle?

A latch is a serialization mechanism. It is used to gain access to shared data structure in order to latches the structure that will prevent others from modifying it while you are modifying it.

47) Why it is not necessary to take UNDO backup?

In fact it is not necessary to take UNDO tablespace backup either with COLD or HOT backup scripts but many of DBA include UNDO tablespace in their backup script.

You know when you do some transactions; redo entries will be generated and accepted! Just like that other tablespace whenever any change happens to UNDO tablespace or UNDO segments oracle will generate redo entries. So even you not backed up the UNDO tablespace, you have the redo entries through which you can recover or rollback the transactions.

48) What should be effect on DB performance if virtual memory used to store SGA parameter?

For optimal performance in most systems, the entire SGA should fit in real memory. If it does not, and if virtual memory is used to store parts of it, then overall database system performance can decrease dramatically. The reason for this is that portions of the SGA are paged (written to and read from disk) by the operating system

49) What is the role of lock_sga parameter?

The LOCK_SGA parameter, when set to TRUE, locks the entire SGA into physical memory. This parameter cannot be used with automatic memory management or automatic shared memory management.

50) What is CSSCAN?

CSSCAN (Database Character Set Scanner) is a SCAN tool that allows us to see the impact of a database character set change or assist us to correct an incorrect database nls_characterset setup. This helps us to determine the best approach for converting the database characterset.

 

 

 

J2EE Interview Questions

Top most important J2EE interview questions and answers by Experts:

Here is a list of Top most important J2EE interview questions and answers by Experts.If you want to download J2EE interview questions pdf free ,you can register with RVH techguru. Our experts prepared these J2EE interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in J2EE ,Register for J2EE online training here.

 

1.What is J2EE?
J2EE is an environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitier, web-based applications.

2.What is the J2EE module? 
A J2EE module consists of one or more J2EE components for the same container type and one component deployment descriptor of that type.

3.What are the components of J2EE application? 
A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and communicates with other components. The J2EE specification defines the following J2EE components: 
   Application clients and applets are client components. 
   Java Servlet and JavaServer PagesTM (JSPTM) technology components are web components.
   Enterprise JavaBeansTM (EJBTM) components (enterprise beans) are business components.
   Resource adapter components provided by EIS and tool vendors.

4.What are the four types of J2EE modules? 
1. Application client module
2. Web module 
3. Enterprise JavaBeans module 
4. Resource adapter module

5.What does application client module contain? 
The application client module contains:
–class files, 
–an application client deployment descriptor.
Application client modules are packaged as JAR files with a .jar extension.

6.What does web module contain? 
The web module contains:
–JSP files,
–class files for servlets,
–GIF and HTML files, and 
–a Web deployment descriptor. 
Web modules are packaged as JAR files with a .war (Web ARchive) extension.

7.What are the differences between Ear, Jar and War files? Under what circumstances should we use each one?

There are no structural differences between the files; they are all archived using zip-jar compression. However, they are intended for different purposes.
–Jar files (files with a .jar extension) are intended to hold generic libraries of Java classes, resources, auxiliary files, etc.
–War files (files with a .war extension) are intended to contain complete Web applications. In this context, a Web application is defined as a single group of files, classes, resources, .jar files that can be packaged and accessed as one servlet context. 
–Ear files (files with a .ear extension) are intended to contain complete enterprise applications. In this context, an enterprise application is defined as a collection of .jar files, resources, classes, and multiple Web applications. 
Each type of file (.jar, .war, .ear) is processed uniquely by application servers, servlet containers, EJB containers, etc.

8.What is the difference between Session bean and Entity bean ? 
The Session bean and Entity bean are two main parts of EJB container. 
Session Bean
–represents a workflow on behalf of a client
–one-to-one logical mapping to a client.
–created and destroyed by a client 
–not permanent objects
–lives its EJB container(generally) does not survive system shut down
–two types: stateless and stateful beans
Entity Bean
–represents persistent data and behavior of this data
–can be shared among multiple clients 
–persists across multiple invocations 
–findable permanent objects
–outlives its EJB container, survives system shutdown 
–two types: container managed persistence(CMP) and bean managed persistence(BMP)

9.What is “applet”  ?
A J2EE component that typically executes in a Web browser but can execute in a variety of other applications or devices that support the applet programming model.

10.What is “applet container”  ?
A container that includes support for the applet programming model.

11.What is “application assembler” ?
A person who combines J2EE components and modules into deployable application units.

12.What is “application client” ?
A first-tier J2EE client component that executes in its own Java virtual machine. Application clients have access to some J2EE platform APIs.

13.What is “application client container” ?
A container that supports application client components.

14.What is “application client module” ?
A software unit that consists of one or more classes and an application client deployment descriptor.

15.What is “application component provider” ?
A vendor that provides the Java classes that implement components’ methods, JSP page definitions, and any required deployment descriptors.

16.What is “application configuration resource file” ?
An XML file used to configure resources for a Java Server Faces application, to define navigation rules for the application, and to register converters, Validator, listeners, renders, and components with the application.

17.What is “archiving” ?
The process of saving the state of an object and restoring it.

18.What is “asant” ?
A Java-based build tool that can be extended using Java classes. The configuration files are XML-based, calling out a target tree where various tasks get executed.

19.What is “attribute”?
A qualifier on an XML tag that provides additional information.

20.What is authentication ? 
The process that verifies the identity of a user, device, or other entity in a computer system, usually as a prerequisite to allowing access to resources in a system. The Java servlet specification requires three types of authentication-basic, form-based, and mutual-and supports digest authentication.

21.What is authorization ? 
The process by which access to a method or resource is determined. Authorization depends on the determination of whether the principal associated with a request through authentication is in a given security role. A security role is a logical grouping of users defined by the person who assembles the application. A deployer maps security roles to security identities. Security identities may be principals or groups in the operational environment.

22.What is authorization constraint ?
An authorization rule that determines who is permitted to access a Web resource collection.

23.What is B2B ?
B2B stands for Business-to-business.

24.What is backing bean ?
A JavaBeans component that corresponds to a JSP page that includes JavaServer Faces components. The backing bean defines properties for the components on the page and methods that perform processing for the component. This processing includes event handling, validation, and processing associated with navigation.

25.What is basic authentication ?
An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web application’s built-in authentication mechanism.

26.What is bean-managed persistence ?
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean.

27.What is bean-managed transaction ?
A transaction whose boundaries are defined by an enterprise bean.

28.What is binding (XML) ?
Generating the code needed to process a well-defined portion of XML data.

29.What is binding (JavaServer Faces technology) ?
Wiring UI components to back-end data sources such as backing bean properties.

30.What is build file ?
The XML file that contains one or more asant targets. A target is a set of tasks you want to be executed. When starting asant, you can select which targets you want to have executed. When no target is given, the project’s default target is executed.

31.What is business logic ?
The code that implements the functionality of an application. In the Enterprise JavaBeans architecture, this logic is implemented by the methods of an enterprise bean.

32.What is business method ?
A method of an enterprise bean that implements the business logic or rules of an application.

33.What is callback methods ?
Component methods called by the container to notify the component of important events in its life cycle.

34.What is caller ?
Same as caller principal.

35.What is caller principal ?
The principal that identifies the invoker of the enterprise bean method.

36.What is cascade delete ?
A deletion that triggers another deletion. A cascade delete can be specified for an entity bean that has container-managed persistence.

37.What is CDATA ?
A predefined XML tag for character data that means “don’t interpret these characters,” as opposed to parsed character data (PCDATA), in which the normal rules of XML syntax apply. CDATA sections are typically used to show examples of XML syntax.

38.What is certificate authority ?
A trusted organization that issues public key certificates and provides identification to the bearer.

39.What is client-certificate authentication ?
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.

40.What is comment ?
In an XML document, text that is ignored unless the parser is specifically told to recognize it.

41.What is commit ?
The point in a transaction when all updates to any resources involved in the transaction are made permanent.

42.What is component contract ?
The contract between a J2EE component and its container. The contract includes life-cycle management of the component, a context interface that the instance uses to obtain various information and services from its container, and a list of services that every container must provide for its components.

43.What is component-managed sign-on ?
A mechanism whereby security information needed for signing on to a resource is provided by an application component.

44.What is connector ?
A standard extension mechanism for containers that provides connectivity to enterprise information systems. A connector is specific to an enterprise information system and consists of a resource adapter and application development tools for enterprise information system connectivity. The resource adapter is plugged in to a container through its support for system-level contracts defined in the Connector architecture.

45.What is container-managed persistence ?
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean’s container.

46.What is container-managed sign-on ?
The mechanism whereby security information needed for signing on to a resource is supplied by the container.

47.What is container-managed transaction ?
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.

48.What is content ?
In an XML document, the part that occurs after the prolog, including the root element and everything it contains.

49.What is context attribute ?
An object bound into the context associated with a servlet.

50.What is context root ?
A name that gets mapped to the document root of a Web application.

51.What is conversational state ?
The field values of a session bean plus the transitive closure of the objects reachable from the bean’s fields. The transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is, the fields that would be stored by serializing the bean instance.

52.What is CORBA ?
Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.

53.What is create method ?
A method defined in the Interview Questions – Home interface and invoked by a client to create an enterprise bean.

54.What is credentials ?
The information describing the security attributes of a principal.

55.What is CSS ?
Cascading style sheet. A stylesheet used with HTML and XML documents to add a style to all elements marked with a particular tag, for the direction of browsers or other presentation mechanisms.

56.What is CTS ?
Compatibility test suite. A suite of compatibility tests for verifying that a J2EE product complies with the J2EE platform specification.

57.What is data ?
The contents of an element in an XML stream, generally used when the element does not contain any subelements. When it does, the term content is generally used. When the only text in an XML structure is contained in simple elements and when elements that have subelements have little or no data mixed in, then that structure is often thought of as XML data, as opposed to an XML document.

58.What is DDP ?
Document-driven programming. The use of XML to define applications.

59.What is declaration ?
The very first thing in an XML document, which declares it as XML. The minimal declaration is . The declaration is part of the document prolog.

60.What is declarative security ?
Mechanisms used in an application that are expressed in a declarative syntax in a deployment descriptor.

61.What is delegation ?
An act whereby one principal authorizes another principal to use its identity or privileges with some restrictions.

62.What is deployer ?
A person who installs J2EE modules and applications into an operational environment.

63.What is deployment ?
The process whereby software is installed into an operational environment.

64.What is deployment descriptor ?
An XML file provided with each module and J2EE application that describes how they should be deployed. The deployment descriptor directs a deployment tool to deploy a module or application with specific container options and describes specific configuration requirements that a deployer must resolve.

65.What is destination ?
A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system, publish/subscribe messaging system.

66.What is digest authentication ?
An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation of the HTTP request message and the client’s password. The digest is typically much smaller than the HTTP request and doesn’t contain the password. 

67.What is distributed application ?
An application made up of distinct components running in separate runtime environments, usually on different platforms connected via a network. Typical distributed applications are two-tier (client-server), three-tier (client-middleware-server), and multitier (client-multiple middleware-multiple servers).

68.What is document ?
In general, an XML structure in which one or more elements contains text intermixed with subelements.

69.What is Document Object Model ?
An API for accessing and manipulating XML documents as tree structures. DOM provides platform-neutral, language-neutral interfaces that enables programs and scripts to dynamically access and modify content and structure in XML documents. 

70.What is document root ?
The top-level directory of a WAR. The document root is where JSP pages, client-side classes and archives, and static Web resources are stored.

71.What is DTD ?
Document type definition. An optional part of the XML document prolog, as specified by the XML standard. The DTD specifies constraints on the valid tags and tag sequences that can be in the document. The DTD has a number of shortcomings, however, and this has led to various schema proposals. For example, the DTD entry says that the XML element called username contains parsed character data-that is, text alone, with no other structural elements under it. The DTD includes both the local subset, defined in the current file, and the external subset, which consists of the definitions contained in external DTD files that are referenced in the local subset using a parameter entity.

72.What is durable subscription ?
In a JMS publish/subscribe messaging system, a subscription that continues to exist whether or not there is a current active subscriber object. If there is no active subscriber, the JMS provider retains the subscription’s messages until they are received by the subscription or until they expire.

73.What is EAR file ?
Enterprise Archive file. A JAR archive that contains a J2EE application.

74.What is ebXML ?
Electronic Business XML. A group of specifications designed to enable enterprises to conduct business through the exchange of XML-based messages. It is sponsored by OASIS and the United Nations Centre for the Facilitation of Procedures and Practices in Administration, Commerce and Transport (U.N./CEFACT).

75. What is EJB ?
Enterprise JavaBeans.

76.What is EJB container ?
A container that implements the EJB component contract of the J2EE architecture. This contract specifies a runtime environment for enterprise beans that includes security, concurrency, life-cycle management, transactions, deployment, naming, and other services. An EJB container is provided by an EJB or J2EE server.

77.What is EJB container provider ?
A vendor that supplies an EJB container.

78.What is EJB context ?
A vendor that supplies an EJB container. An object that allows an enterprise bean to invoke services provided by the container and to obtain the information about the caller of a client-invoked method

79.What is EJB Home object ?
An object that provides the life-cycle operations (create, remove, find) for an enterprise bean. The class for the EJB Home object is generated by the container’s deployment tools. The EJB Home object implements the enterprise bean’s Home interface. The client references an EJB Home object to perform life-cycle operations on an EJB object. The client uses JNDI to locate an EJB Home object.

80.What is EJB JAR file ?
A JAR archive that contains an EJB module.

81.What is EJB module ?
A deployable unit that consists of one or more enterprise beans and an EJB deployment descriptor.

82.What is EJB object ?
An object whose class implements the enterprise bean’s remote interface. A client never references an enterprise bean instance directly; a client always references an EJB object. The class of an EJB object is generated by a container’s deployment tools.

83.What is EJB server ?
Software that provides services to an EJB container. For example, an EJB container typically relies on a transaction manager that is part of the EJB server to perform the two-phase commit across all the participating resource managers. The J2EE architecture assumes that an EJB container is hosted by an EJB server from the same vendor, so it does not specify the contract between these two entities. An EJB server can host one or more EJB containers.

84.What is EJB server provider ?
A vendor that supplies an EJB server.

85.What is element ?
A unit of XML data, delimited by tags. An XML element can enclose other elements.

86.What is empty tag ?
A tag that does not enclose any content.

87.What is enterprise bean ?
A J2EE component that implements a business task or business entity and is hosted by an EJB container; either an entity bean, a session bean, or a message-driven bean.

88.What is enterprise bean provider ?
An application developer who produces enterprise bean classes, remote and Interview Questions – Home interfaces, and deployment descriptor files, and packages them in an EJB JAR file.

89.What is enterprise information system ?
The applications that constitute an enterprise’s existing system for handling companywide information. These applications provide an information infrastructure for an enterprise. An enterprise information system offers a well-defined set of services to its clients. These services are exposed to clients as local or remote interfaces or both. Examples of enterprise information systems include enterprise resource planning systems, mainframe transaction processing systems, and legacy database systems.

90.What is enterprise information system resource ?
An entity that provides enterprise information system-specific functionality to its clients. Examples are a record or set of records in a database system, a business object in an enterprise resource planning system, and a transaction program in a transaction processing system.

91.What is Enterprise JavaBeans (EJB) ?
A component architecture for the development and deployment of object-oriented, distributed, enterprise-level applications. Applications written using the Enterprise JavaBeans architecture are scalable, transactional, and secure.

92.What is Enterprise JavaBeans Query Language (EJB QL) ?
Defines the queries for the finder and select methods of an entity bean having container-managed persistence. A subset of SQL92, EJB QL has extensions that allow navigation over the relationships defined in an entity bean’s abstract schema.

93.What is an entity ?
A distinct, individual item that can be included in an XML document by referencing it. Such an entity reference can name an entity as small as a character (for example, <, which references the less-than symbol or left angle bracket, <). An entity reference can also reference an entire document, an external entity, or a collection of DTD definitions.

94.What is entity bean ?
An enterprise bean that represents persistent data maintained in a database. An entity bean can manage its own persistence or can delegate this function to its container. An entity bean is identified by a primary key. If the container in which an entity bean is hosted crashes, the entity bean, its primary key, and any remote references survive the crash.

95.What is entity reference ?
A reference to an entity that is substituted for the reference when the XML document is parsed. It can reference a predefined entity such as < or reference one that is defined in the DTD. In the XML data, the reference could be to an entity that is defined in the local subset of the DTD or to an external XML file (an external entity). The DTD can also carve out a segment of DTD specifications and give it a name so that it can be reused (included) at multiple points in the DTD by defining a parameter entity.

96.What is error ?
A SAX parsing error is generally a validation error; in other words, it occurs when an XML document is not valid, although it can also occur if the declaration specifies an XML version that the parser cannot handle. See also fatal error, warning. 

97.What is Extensible Markup Language ?
XML.

98.What is external entity ?
An entity that exists as an external XML file, which is included in the XML document using an entity reference.

99.What is external subset ?
That part of a DTD that is defined by references to external DTD files.

100.What is fatal error ?
A fatal error occurs in the SAX parser when a document is not well formed or otherwise cannot be processed. See also error, warning.

101.What is filter ?
An object that can transform the header or content (or both) of a request or response. Filters differ from Web components in that they usually do not themselves create responses but rather modify or adapt the requests for a resource, and modify or adapt responses from a resource. A filter should not have any dependencies on a Web resource for which it is acting as a filter so that it can be composable with more than one type of Web resource.

102.What is filter chain ?
A concatenation of XSLT transformations in which the output of one transformation becomes the input of the next.

103.What is finder method ?
A method defined in the Interview Questions – Home interface and invoked by a client to locate an entity bean.

104.What is form-based authentication ?
An authentication mechanism in which a Web container provides an application-specific form for logging in. This form of authentication uses Base64 encoding and can expose user names and passwords

105.What is general entity ?
An entity that is referenced as part of an XML document’s content, as distinct from a parameter entity, which is referenced in the DTD. A general entity can be a parsed entity or an unparsed entity.

106.What is group ?
An authenticated set of users classified by common traits such as job title or customer profile. Groups are also associated with a set of roles, and every user that is a member of a group inherits all the roles assigned to that group.

107.What is handle ?
An object that identifies an enterprise bean. A client can serialize the handle and then later deserialize it to obtain a reference to the enterprise bean.

108.What is Interview Questions – Home handle ?
An object that can be used to obtain a reference to the Interview Questions – Home interface. A Interview Questions – Home handle can be serialized and written to stable storage and de-serialized to obtain the reference.

109.What is Interview Questions – Home interface ?
One of two interfaces for an enterprise bean. The Interview Questions – Home interface defines zero or more methods for managing an enterprise bean. The Interview Questions – Home interface of a session bean defines create and remove methods, whereas the Interview Questions – Home interface of an entity bean defines create, finder, and remove methods.

110.What is HTML ?
Hypertext Markup Language. A markup language for hypertext documents on the Internet. HTML enables the embedding of images, sounds, video streams, form fields, references to other objects with URLs, and basic text formatting.

111.What is HTTP ?
Hypertext Transfer Protocol. The Internet protocol used to retrieve hypertext objects from remote hosts. HTTP messages consist of requests from client to server and responses from server to client.

112.What is HTTPS ?
HTTP layered over the SSL protocol.

113.What is IDL ?
Interface Definition Language. A language used to define interfaces to remote CORBA objects. The interfaces are independent of operating systems and programming languages.

114.What is IIOP ?
Internet Inter-ORB Protocol. A protocol used for communication between CORBA object request brokers.

115.What is impersonation ?
An act whereby one entity assumes the identity and privileges of another entity without restrictions and without any indication visible to the recipients of the impersonator’s calls that delegation has taken place. Impersonation is a case of simple delegation.

116.What is initialization parameter ?
A parameter that initializes the context associated with a servlet.

117.What is ISO 3166 ?
The international standard for country codes maintained by the International Organization for Standardization (ISO).

118.What is ISV ?
Independent software vendor.

119.What is J2EE ?
Java 2 Platform, Enterprise Edition.

120.What is J2EE application ?
Any deployable unit of J2EE functionality. This can be a single J2EE module or a group of modules packaged into an EAR file along with a J2EE application deployment descriptor. J2EE applications are typically engineered to be distributed across multiple computing tiers.

121.What is J2EE component ?
A self-contained functional software unit supported by a container and configurable at deployment time. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java servlet and JavaServer Pages (JSP) technology components are Web components that run on the server. Enterprise JavaBeans (EJB) components (enterprise beans) are business components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and “standard” Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server or client container.

122.What is J2EE module ?
A software unit that consists of one or more J2EE components of the same container type and one deployment descriptor of that type. There are four types of modules: EJB, Web, application client, and resource adapter. Modules can be deployed as stand-alone units or can be assembled into a J2EE application.

123.What is J2EE product ?
An implementation that conforms to the J2EE platform specification.

124.What is J2EE product provider ?
A vendor that supplies a J2EE product.

125.What is J2EE server ?
The runtime portion of a J2EE product. A J2EE server provides EJB or Web containers or both.

126.What is J2ME ?
Abbreviate of Java 2 Platform, Micro Edition.

127.What is J2SE ?
Abbreviate of Java 2 Platform, Standard Edition.

128.What is JAR ?
Java archive. A platform-independent file format that permits many files to be aggregated into one file.

129.What is Java 2 Platform, Enterprise Edition (J2EE) ?
An environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, Web-based applications.

130.What is Java 2 Platform, Micro Edition (J2ME) ?
A highly optimized Java runtime environment targeting a wide range of consumer products, including pagers, cellular phones, screen phones, digital set-top boxes, and car navigation systems.

131.What is Java 2 Platform, Standard Edition (J2SE) ?
The core Java technology platform.

132.What is Java API for XML Processing (JAXP) ?
An API for processing XML documents. JAXP leverages the parser standards SAX and DOM so that you can choose to parse your data as a stream of events or to build a tree-structured representation of it. JAXP supports the XSLT standard, giving you control over the presentation of the data and enabling you to convert the data to other XML documents or to other formats, such as HTML. JAXP provides namespace support, allowing you to work with schema that might otherwise have naming conflicts.

133.What is Java API for XML Registries (JAXR) ?
An API for accessing various kinds of XML registries.

134.What is Java API for XML-based RPC (JAX-RPC) ?
An API for building Web services and clients that use remote procedure calls and XML.  

135.What is Java IDL ?
A technology that provides CORBA interoperability and connectivity capabilities for the J2EE platform. These capabilities enable J2EE applications to invoke operations on remote network services using the Object Management Group IDL and IIOP.

136.What is Java Message Service (JMS) ?
An API for invoking operations on enterprise messaging systems.

137.What is Java Naming and Directory Interface (JNDI) ?
An API that provides naming and directory functionality.

138.What is Java Secure Socket Extension (JSSE) ?
A set of packages that enable secure Internet communications.

139.What is Java Transaction API (JTA) ?
An API that allows applications and J2EE servers to access transactions.

140.What is Java Transaction Service (JTS) ?
Specifies the implementation of a transaction manager that supports JTA and implements the Java mapping of the Object Management Group Object Transaction Service 1.1 specification at the level below the API.

141.What is JavaBeans component ?
A Java class that can be manipulated by tools and composed into applications. A JavaBeans component must adhere to certain property and event interface conventions. 

142.What is JavaMail ?
An API for sending and receiving email.

143.What is JavaServer Faces Technology ?
A framework for building server-side user interfaces for Web applications written in the Java programming language.

144.What is JavaServer Faces conversion model ?
A mechanism for converting between string-based markup generated by JavaServer Faces UI components and server-side Java objects.

145.What is JavaServer Faces event and listener model ?
A mechanism for determining how events emitted by JavaServer Faces UI components are handled. This model is based on the JavaBeans component event and listener model.

146.What is JavaServer Faces expression language ?
A simple expression language used by a JavaServer Faces UI component tag attributes to bind the associated component to a bean property or to bind the associated component’s value to a method or an external data source, such as a bean property. Unlike JSP EL expressions, JavaServer Faces EL expressions are evaluated by the JavaServer Faces implementation rather than by the Web container.

147.What is JavaServer Faces navigation model ?
A mechanism for defining the sequence in which pages in a JavaServer Faces application are displayed.

148.What is JavaServer Faces UI component ?
A user interface control that outputs data to a client or allows a user to input data to a JavaServer Faces application.

149.What is JavaServer Faces UI component class ?
A JavaServer Faces class that defines the behavior and properties of a JavaServer Faces UI component.

150.What is JavaServer Faces validation model ?
A mechanism for validating the data a user inputs to a JavaServer Faces UI component.

151.What is JavaServer Pages (JSP) ?
An extensible Web technology that uses static data, JSP elements, and server-side Java objects to generate dynamic content for a client. Typically the static data is HTML or XML elements, and in many cases the client is a Web browser.

152.What is JavaServer Pages Standard Tag Library (JSTL) ?
A tag library that encapsulates core functionality common to many JSP applications. JSTL has support for common, structural tasks such as iteration and conditionals, tags for manipulating XML documents, internationalization and locale-specific formatting tags, SQL tags, and functions.

153.What is JAXR client ?
A client program that uses the JAXR API to access a business registry via a JAXR provider.

154.What is JAXR provider ?
An implementation of the JAXR API that provides access to a specific registry provider or to a class of registry providers that are based on a common specification.

155.What is JDBC ?
An JDBC for database-independent connectivity between the J2EE platform and a wide range of data sources.

156.What is JMS ?
Java Message Service.

157.What is JMS administered object ?
A preconfigured JMS object (a resource manager connection factory or a destination) created by an administrator for the use of JMS clients and placed in a JNDI namespace.

158.What is JMS application ?
One or more JMS clients that exchange messages.

159.What is JMS client ?
A Java language program that sends or receives messages.

160.What is JMS provider ?
A messaging system that implements the Java Message Service as well as other administrative and control functionality needed in a full-featured messaging product.

161.What is JMS session ?
A single-threaded context for sending and receiving JMS messages. A JMS session can be nontransacted, locally transacted, or participating in a distributed transaction.

162.What is JNDI ?
Abbreviate of Java Naming and Directory Interface.

163.What is JSP ?
Abbreviate of JavaServer Pages.

164.What is JSP action ?
A JSP element that can act on implicit objects and other server-side objects or can define new scripting variables. Actions follow the XML syntax for elements, with a start tag, a body, and an end tag; if the body is empty it can also use the empty tag syntax. The tag must use a prefix. There are standard and custom actions.

165.What is JSP container ?
A container that provides the same services as a servlet container and an engine that interprets and processes JSP pages into a servlet.

166.What is JSP container, distributed ?
A JSP container that can run a Web application that is tagged as distributable and is spread across multiple Java virtual machines that might be running on different hosts.

167.What is JSP custom action ?
A user-defined action described in a portable manner by a tag library descriptor and imported into a JSP page by a taglib directive. Custom actions are used to encapsulate recurring tasks in writing JSP pages.

168.What is JSP custom tag ?
A tag that references a JSP custom action.

169.What is JSP declaration ?
A JSP scripting element that declares methods, variables, or both in a JSP page.

170.What is JSP directive ?
A JSP element that gives an instruction to the JSP container and is interpreted at translation time.

171.What is JSP document ?
A JSP page written in XML syntax and subject to the constraints of XML documents. 

172.What is JSP element ?
A portion of a JSP page that is recognized by a JSP translator. An element can be a directive, an action, or a scripting element.

173.What is JSP expression ?
A scripting element that contains a valid scripting language expression that is evaluated, converted to a String, and placed into the implicit out object.

174.What is JSP expression language ?
A language used to write expressions that access the properties of JavaBeans components. EL expressions can be used in static text and in any standard or custom tag attribute that can accept an expression.

175.What is JSP page ?
A text-based document containing static text and JSP elements that describes how to process a request to create a response. A JSP page is translated into and handles requests as a servlet.

176.What is JSP scripting element ?
A JSP declaration, scriptlet, or expression whose syntax is defined by the JSP specification and whose content is written according to the scripting language used in the JSP page. The JSP specification describes the syntax and semantics for the case where the language page attribute is “java”.

177.What is JSP scriptlet ?
A JSP scripting element containing any code fragment that is valid in the scripting language used in the JSP page. The JSP specification describes what is a valid scriptlet for the case where the language page attribute is “java”.

178.What is JSP standard action ?
An action that is defined in the JSP specification and is always available to a JSP page.

179.What is JSP tag file ?
A source file containing a reusable fragment of JSP code that is translated into a tag handler when a JSP page is translated into a servlet.

180.What is JSP tag handler ?
A Java programming language object that implements the behavior of a custom tag.

181.What is JSP tag library ?
A collection of custom tags described via a tag library descriptor and Java classes. 

182.What is JSTL ?
Abbreviate of JavaServer Pages Standard Tag Library.

183.What is JTA ?
Abbreviate of Java Transaction API.

184.What is JTS ?
Abbreviate of Java Transaction Service.

185.What is keystore ?
A file containing the keys and certificates used for authentication

186.What is life cycle (J2EE component) ?
The framework events of a J2EE component’s existence. Each type of component has defining events that mark its transition into states in which it has varying availability for use. For example, a servlet is created and has its init method called by its container before invocation of its service method by clients or other servlets that require its functionality. After the call of its init method, it has the data and readiness for its intended use. The servlet’s destroy method is called by its container before the ending of its existence so that processing associated with winding up can be done and resources can be released. The init and destroy methods in this example are callback methods. Similar considerations apply to the life cycle of all J2EE component types: enterprise beans, Web components (servlets or JSP pages), applets, and application clients.

187.What is life cycle (JavaServer Faces) ?
A set of phases during which a request for a page is received, a UI component tree representing the page is processed, and a response is produced. During the phases of the life cycle: The local data of the components is updated with the values contained in the request parameters. Events generated by the components are processed. Validators and converters registered on the components are processed. The components’ local data is updated to back-end objects. The response is rendered to the client while the component state of the response is saved on the server for future requests.

188.What is local subset ?
That part of the DTD that is defined within the current XML file.

189.What is managed bean creation facility ?
A mechanism for defining the characteristics of JavaBeans components used in a JavaServer Faces application.

190.What is message ?
In the Java Message Service, an asynchronous request, report, or event that is created, sent, and consumed by an enterprise application and not by a human. It contains vital information needed to coordinate enterprise applications, in the form of precisely formatted data that describes specific business actions.

191.What is message consumer ?
An object created by a JMS session that is used for receiving messages sent to a destination.

192.What is message-driven bean ?
An enterprise bean that is an asynchronous message consumer. A message-driven bean has no state for a specific client, but its instance variables can contain state across the handling of client messages, including an open database connection and an object reference to an EJB object. A client accesses a message-driven bean by sending messages to the destination for which the bean is a message listener.

193.What is message producer ?
An object created by a JMS session that is used for sending messages to a destination.

194.What is mixed-content model ?
A DTD specification that defines an element as containing a mixture of text and one more other elements. The specification must start with #PCDATA, followed by diverse elements, and must end with the “zero-or-more” asterisk symbol (*).

195.What is method-binding expression ?
A Java Server Faces EL expression that refers to a method of a backing bean. This method performs either event handling, validation, or navigation processing for the UI component whose tag uses the method-binding expression.

196.What is method permission ?
An authorization rule that determines who is permitted to execute one or more enterprise bean methods.

197.What is mutual authentication ?
An authentication mechanism employed by two parties for the purpose of proving each other’s identity to one another.

198.What is namespace ?
A standard that lets you specify a unique label for the set of element names defined by a DTD. A document using that DTD can be included in any other document without having a conflict between element names. The elements defined in your DTD are then uniquely identified so that, for example, the parser can tell when an element should be interpreted according to your DTD rather than using the definition for an element in a different DTD.

199.What is naming context ?
A set of associations between unique, atomic, people-friendly identifiers and objects.

200.What is naming environment ?
A mechanism that allows a component to be customized without the need to access or change the component’s source code. A container implements the component’s naming environment and provides it to the component as a JNDI naming context. Each component names and accesses its environment entries using the java:comp/env JNDI context. The environment entries are declaratively specified in the component’s deployment descriptor.

201.What is normalization ?
The process of removing redundancy by modularizing, as with subroutines, and of removing superfluous differences by reducing them to a common denominator. For example, line endings from different systems are normalized by reducing them to a single new line, and multiple whitespace characters are normalized to one space.

202.What is North American Industry Classification System (NAICS) ?
A system for classifying business establishments based on the processes they use to produce goods or services.

203.What is notation ?
A mechanism for defining a data format for a non-XML document referenced as an unparsed entity. This is a holdover from SGML. A newer standard is to use MIME data types and namespaces to prevent naming conflicts.

204.What is OASIS ?
Organization for the Advancement of Structured Information Standards. A consortium that drives the development, convergence, and adoption of e-business standards.

205.What is OMG ?
Object Management Group. A consortium that produces and maintains computer industry specifications for interoperable enterprise applications.

206.What is one-way messaging ?
A method of transmitting messages without having to block until a response is received.

207.What is ORB ?
Object request broker. A library that enables CORBA objects to locate and communicate with one another.

208.What is OS principal ?
A principal native to the operating system on which the J2EE platform is executing.

209.What is OTS ?
Object Transaction Service. A definition of the interfaces that permit CORBA objects to participate in transactions

210.What is parameter entity ?
An entity that consists of DTD specifications, as distinct from a general entity. A parameter entity defined in the DTD can then be referenced at other points, thereby eliminating the need to recode the definition at each location it is used.

211.What is parsed entity ?
A general entity that contains XML and therefore is parsed when inserted into the XML document, as opposed to an unparsed entity.

212.What is parser ?
A module that reads in XML data from an input source and breaks it into chunks so that your program knows when it is working with a tag, an attribute, or element data. A nonvalidating parser ensures that the XML data is well formed but does not verify that it is valid. See also validating parser.

213.What is passivation ?
The process of transferring an enterprise bean from memory to secondary storage. See activation.

214.What is persistence ?
The protocol for transferring the state of an entity bean between its instance variables and an underlying database.

215.What is persistent field ?
A virtual field of an entity bean that has container-managed persistence; it is stored in a database.

216.What is POA ?
Portable Object Adapter. A CORBA standard for building server-side applications that are portable across heterogeneous ORBs.

217.What is point-to-point messaging system ?
A messaging system built on the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queues established to hold their messages.

218.What is primary key ?
An object that uniquely identifies an entity bean within a home.

219.What is principal ?
The identity assigned to a user as a result of authentication.

220.What is privilege ?
A security attribute that does not have the property of uniqueness and that can be shared by many principals.

221.What is processing instruction ?
Information contained in an XML structure that is intended to be interpreted by a specific application.

222.What is programmatic security ?
Security decisions that are made by security-aware applications. Programmatic security is useful when declarative security alone is not sufficient to express the security model of an application.

223.What is prolog ?
The part of an XML document that precedes the XML data. The prolog includes the declaration and an optional DTD.

224.What is public key certificate ?
Used in client-certificate authentication to enable the server, and optionally the client, to authenticate each other. The public key certificate is the digital equivalent of a passport. It is issued by a trusted organization, called a certificate authority, and provides identification for the bearer.

225.What is publish/subscribe messaging system ?
A messaging system in which clients address messages to a specific node in a content hierarchy, called a topic. Publishers and subscribers are generally anonymous and can dynamically publish or subscribe to the content hierarchy. The system takes care of distributing the messages arriving from a node’s multiple publishers to its multiple subscribers.

226.What is query string ?
A component of an HTTP request URL that contains a set of parameters and values that affect the handling of the request.

227.What is queue ?
A messaging system built on the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queues established to hold their messages.

228.What is RAR ?
Resource Adapter Archive. A JAR archive that contains a resource adapter module.

229.What is RDF ?
Resource Description Framework. A standard for defining the kind of data that an XML file contains. Such information can help ensure semantic integrity-for example-by helping to make sure that a date is treated as a date rather than simply as text.

230.What is RDF schema ?
A standard for specifying consistency rules that apply to the specifications contained in an RDF.

231.What is realm ?
See security policy domain. Also, a string, passed as part of an HTTP request during basic authentication, that defines a protection space. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme or authorization database or both. In the J2EE server authentication service, a realm is a complete database of roles, users, and groups that identify valid users of a Web application or a set of Web applications.

232.What is reentrant entity bean ?
An entity bean that can handle multiple simultaneous, interleaved, or nested invocations that will not interfere with each other.

233.What is reference ?
A reference to an entity that is substituted for the reference when the XML document is parsed. It can reference a predefined entity such as < or reference one that is defined in the DTD. In the XML data, the reference could be to an entity that is defined in the local subset of the DTD or to an external XML file (an external entity). The DTD can also carve out a segment of DTD specifications and give it a name so that it can be reused (included) at multiple points in the DTD by defining a parameter entity.

234.What is registry ?
An infrastructure that enables the building, deployment, and discovery of Web services. It is a neutral third party that facilitates dynamic and loosely coupled business-to-business (B2B) interactions.

235.What is registry provider ?
An implementation of a business registry that conforms to a specification for XML registries (for example, ebXML or UDDI).

236.What is relationship field ?
A virtual field of an entity bean having container-managed persistence; it identifies a related entity bean.

237.What is remote interface ?
One of two interfaces for an enterprise bean. The remote interface defines the business methods callable by a client.

238.What is remove method ?
Method defined in the Home interface and invoked by a client to destroy an enterprise bean.

239.What is render kit ?
A set of renderers that render output to a particular client. The JavaServer Faces implementation provides a standard HTML render kit, which is composed of renderers that can render HMTL markup.

240.What is renderer ?
A Java class that can render the output for a set of JavaServer Faces UI components.

241.What is resource adapter ?
A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system. A resource adapter typically is specific to an enterprise information system. It is available as a library and is used within the address space of the server or client using it. A resource adapter plugs in to a container. The application components deployed on the container then use the client API (exposed by the adapter) or tool-generated high-level abstractions to access the underlying enterprise information system. The resource adapter and EJB container collaborate to provide the underlying mechanisms-transactions, security, and connection pooling-for connectivity to the enterprise information system.

242.What is resource adapter module ?
A deployable unit that contains all Java interfaces, classes, and native libraries, implementing a resource adapter along with the resource adapter deployment descriptor.

243.What is resource manager ?
Provides access to a set of shared resources. A resource manager participates in transactions that are externally controlled and coordinated by a transaction manager. A resource manager typically is in a different address space or on a different machine from the clients that access it. Note: An enterprise information system is referred to as a resource manager when it is mentioned in the context of resource and transaction management.

244.What is resource manager connection ?
An object that represents a session with a resource manager.

245.What is resource manager connection factory ?
An object used for creating a resource manager connection.

246.What is RMI ?
Remote Method Invocation. A technology that allows an object running in one Java virtual machine to invoke methods on an object running in a different Java virtual machine.

247.What is RMI-IIOP ?
A version of RMI implemented to use the CORBA IIOP protocol. RMI over IIOP provides interoperability with CORBA objects implemented in any language if all the remote interfaces are originally defined as RMI interfaces.

248.What is role (development) ?
The function performed by a party in the development and deployment phases of an application developed using J2EE technology. The roles are application component provider, application assembler, deployer, J2EE product provider, EJB container provider, EJB server provider, Web container provider, Web server provider, tool provider, and system administrator.

249.What is role mapping ?
The process of associating the groups or principals (or both), recognized by the container with security roles specified in the deployment descriptor. Security roles must be mapped by the deployer before a component is installed in the server.

250.What is role (security) ?
An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn’t care who you are, only that you have the right key.

251.What is rollback ?
The point in a transaction when all updates to any resources involved in the transaction are reversed.

252.What is root ?
The outermost element in an XML document. The element that contains all other elements.

253.What is SAX ?
Abbreviation of Simple API for XML.

254.What is Simple API for XML ?
An event-driven interface in which the parser invokes one of several methods supplied by the caller when a parsing event occurs. Events include recognizing an XML tag, finding an error, encountering a reference to an external entity, or processing a DTD specification.

255.What is schema ?
A database-inspired method for specifying constraints on XML documents using an XML-based language. Schemas address deficiencies in DTDs, such as the inability to put constraints on the kinds of data that can occur in a particular field. Because schemas are founded on XML, they are hierarchical. Thus it is easier to create an unambiguous specification, and it is possible to determine the scope over which a comment is meant to apply.

256.What is Secure Socket Layer (SSL) ?
A technology that allows Web browsers and Web servers to communicate over a secured connection.

257.What is security attributes ?
A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol or by a J2EE product provider or both. 

258.What is security constraint ?
A declarative way to annotate the intended protection of Web content. A security constraint consists of a Web resource collection, an authorization constraint, and a user data constraint.

259.What is security context ?
An object that encapsulates the shared state information regarding security between two entities.

260.What is security permission ?
A mechanism defined by J2SE, and used by the J2EE platform to express the programming restrictions imposed on application component developers.

261.What is security permission set ?
The minimum set of security permissions that a J2EE product provider must provide for the execution of each component type.

262.What is security policy domain ?
A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.

263.What is security role ?
An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn’t care who you are, only that you have the right key.

264.What is security technology domain ?
A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.

265.What is security view ?
The set of security roles defined by the application assembler.

266.What is server certificate ?
Used with the HTTPS protocol to authenticate Web applications. The certificate can be self-signed or approved by a certificate authority (CA). The HTTPS service of the Sun Java System Application Server Platform Edition 8 will not run unless a server certificate has been installed.

267.What is server principal ?
The OS principal that the server is executing as.

268.What is service element ?
A representation of the combination of one or more Connector components that share a single engine component for processing incoming requests.

269.What is service endpoint interface ?
A Java interface that declares the methods that a client can invoke on a Web service.

270.What is servlet ?
A Java program that extends the functionality of a Web server, generating dynamic content and interacting with Web applications using a request-response paradigm.

271.What is servlet container ?
A container that provides the network services over which requests and responses are sent, decodes requests, and formats responses. All servlet containers must support HTTP as a protocol for requests and responses but can also support additional request-response protocols, such as HTTPS.

272.What is servlet container, distributed ?
A servlet container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.

273.What is servlet context ?
An object that contains a servlet’s view of the Web application within which the servlet is running. Using the context, a servlet can log events, obtain URL references to resources, and set and store attributes that other servlets in the context can use. 

274.What is servlet mapping ?
Defines an association between a URL pattern and a servlet. The mapping is used to map requests to servlets.

275.What is session ?
An object used by a servlet to track a user’s interaction with a Web application across multiple HTTP requests.

276.What is session bean ?
An enterprise bean that is created by a client and that usually exists only for the duration of a single client-server session. A session bean performs operations, such as calculations or database access, for the client. Although a session bean can be transactional, it is not recoverable should a system crash occur. Session bean objects either can be stateless or can maintain conversational state across methods and transactions. If a session bean maintains state, then the EJB container manages this state if the object must be removed from memory. However, the session bean object itself must manage its own persistent data.

277.What is SGML ?
Standard Generalized Markup Language. The parent of both HTML and XML. Although HTML shares SGML’s propensity for embedding presentation information in the markup, XML is a standard that allows information content to be totally separated from the mechanisms for rendering that content.

278.What is SOAP ?
Simple Object Access Protocol. A lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. It defines, using XML technologies, an extensible messaging framework containing a message construct that can be exchanged over a variety of underlying protocols.

279.What is SOAP with Attachments API for Java (SAAJ) ?
The basic package for SOAP messaging, SAAJ contains the API for creating and populating a SOAP message.

280.What is SQL ?
Structured Query Language. The standardized relational database language for defining database objects and manipulating data.

281.What is SQL/J ?
A set of standards that includes specifications for embedding SQL statements in methods in the Java programming language and specifications for calling Java static methods as SQL stored procedures and user-defined functions. An SQL checker can detect errors in static SQL statements at program development time, rather than at execution time as with a JDBC driver.

282.What is SSL ?
Secure Socket Layer. A security protocol that provides privacy over the Internet. The protocol allows client-server applications to communicate in a way that cannot be eavesdropped upon or tampered with. Servers are always authenticated, and clients are optionally authenticated.

283.What is stateful session bean ?
A session bean with a conversational state.

284.What is stateless session bean ?
A session bean with no conversational state. All instances of a stateless session bean are identical.

285.What is system administrator ?
The person responsible for configuring and administering the enterprise’s computers, networks, and software systems.

286.What is tag ?
In XML documents, a piece of text that describes a unit of data or an element. The tag is distinguishable as markup, as opposed to data, because it is surrounded by angle brackets (< and >). To treat such markup syntax as data, you use an entity reference or a CDATA section.

287.What is template ?
A set of formatting instructions that apply to the nodes selected by an XPath expression.

288.What is tool provider ?
An organization or software vendor that provides tools used for the development, packaging, and deployment of J2EE applications.

289.What is transaction attribute ?
A value specified in an enterprise bean’s deployment descriptor that is used by the EJB container to control the transaction scope when the enterprise bean’s methods are invoked. A transaction attribute can have the following values: Required, RequiresNew, Supports, NotSupported, Mandatory, or Never.

290.What is transaction ?
An atomic unit of work that modifies data. A transaction encloses one or more program statements, all of which either complete or roll back. Transactions enable multiple users to access the same data concurrently.

291.What is transaction isolation level ?
What is transaction isolation level The degree to which the intermediate state of the data being modified by a transaction is visible to other concurrent transactions and data being modified by other transactions is visible to it.

292.What is transaction manager ?
Provides the services and management functions required to support transaction demarcation, transactional resource management, synchronization, and transaction context propagation.

293.What is Unicode ?
A standard defined by the Unicode Consortium that uses a 16-bit code page that maps digits to characters in languages around the world. Because 16 bits covers 32,768 codes, Unicode is large enough to include all the world’s languages, with the exception of ideographic languages that have a different character for every concept, such as Chinese.

294.What is Universal Description, Discovery and Integration (UDDI) project ?
An industry initiative to create a platform-independent, open framework for describing services, discovering businesses, and integrating business services using the Internet, as well as a registry. It is being developed by a vendor consortium.

295.What is Universal Standard Products and Services Classification (UNSPSC) ?
A schema that classifies and identifies commodities. It is used in sell-side and buy-side catalogs and as a standardized account code in analyzing expenditure.

296.What is unparsed entity ?
A general entity that contains something other than XML. By its nature, an unparsed entity contains binary data.

297.What is URI ?
Uniform resource identifier. A globally unique identifier for an abstract or physical resource. A URL is a kind of URI that specifies the retrieval protocol (http or https for Web applications) and physical location of a resource (host name and host-relative path). A URN is another type of URI.

298.What is URL ?
Uniform resource locator. A standard for writing a textual reference to an arbitrary piece of data in the World Wide Web. A URL looks like this: protocol://host/local info where protocol specifies a protocol for fetching the object (such as http or ftp), host specifies the Internet name of the targeted host, and local info is a string (often a file name) passed to the protocol handler on the remote host.

299.What is URL path ?
The part of a URL passed by an HTTP request to invoke a servlet. A URL path consists of the context path + servlet path + path info, where Context path is the path prefix associated with a servlet context of which the servlet is a part. If this context is the default context rooted at the base of the Web server’s URL namespace, the path prefix will be an empty string. Otherwise, the path prefix starts with a / character but does not end with a / character. Servlet path is the path section that directly corresponds to the mapping that activated this request. This path starts with a / character. Path info is the part of the request path that is not part of the context path or the servlet path

300.What is URN ?
Uniform resource name. A unique identifier that identifies an entity but doesn’t tell where it is located. A system can use a URN to look up an entity locally before trying to find it on the Web. It also allows the Web location to change, while still allowing the entity to be found.

301.What is user data constraint ?
Indicates how data between a client and a Web container should be protected. The protection can be the prevention of tampering with the data or prevention of eavesdropping on the data.

302.What is user (security) ?
An individual (or application program) identity that has been authenticated. A user can have a set of roles associated with that identity, which entitles the user to access all resources protected by those roles.

303.What is validating parser ?
A parser that ensures that an XML document is valid in addition to being well formed. See also parser.

304.What is value-binding expression ?
A JavaServer Faces EL expression that refers to a property of a backing bean. A component tag uses this expression to bind the associated component’s value or the component instance to the bean property. If the component tag refers to the property via its value attribute, then the component’s value is bound to the property. If the component tag refers to the property via its binding attribute then the component itself is bound to the property.

305.What is virtual host ?
Multiple hosts plus domain names mapped to a single IP address.

306.What is W3C ?
World Wide Web Consortium. The international body that governs Internet standards. Its Web site is http://www.w3.org/.

307.What is WAR file ?
Web application archive file. A JAR archive that contains a Web module.

308.What is warning ?
A SAX parser warning is generated when the document’s DTD contains duplicate definitions and in similar situations that are not necessarily an error but which the document author might like to know about, because they could be. See also fatal error, error.

309.What is Web application ?
An application written for the Internet, including those built with Java technologies such as JavaServer Pages and servlets, as well as those built with non-Java technologies such as CGI and Perl.

310.What is Web application, distributable ?
A Web application that uses J2EE technology written so that it can be deployed in a Web container distributed across multiple Java virtual machines running on the same host or different hosts. The deployment descriptor for such an application uses the distributable element.

311.What is Web component ?
A component that provides services in response to requests; either a servlet or a JSP page.

312.What is Web container ?
A container that implements the Web component contract of the J2EE architecture. This contract specifies a runtime environment for Web components that includes security, concurrency, life-cycle management, transaction, deployment, and other services. A Web container provides the same services as a JSP container as well as a federated view of the J2EE platform APIs. A Web container is provided by a Web or J2EE server.

313.What is Web container, distributed ?
A Web container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.

314.What is Web container provider ?
A vendor that supplies a Web container.

315.What is Web module ?
A deployable unit that consists of one or more Web components, other resources, and a Web application deployment descriptor contained in a hierarchy of directories and files in a standard Web application format.

316.What is Web resource ?
A static or dynamic object contained in a Web application that can be referenced by a URL. 

317.What is Web resource collection ?
A list of URL patterns and HTTP methods that describe a set of Web resources to be protected.

318.What is Web server ?
Software that provides services to access the Internet, an intranet, or an extranet. A Web server hosts Web sites, provides support for HTTP and other protocols, and executes server-side programs (such as CGI scripts or servlets) that perform certain functions. In the J2EE architecture, a Web server provides services to a Web container. For example, a Web container typically relies on a Web server to provide HTTP message handling. The J2EE architecture assumes that a Web container is hosted by a Web server from the same vendor, so it does not specify the contract between these two entities. A Web server can host one or more Web containers. 

319.What is Web server provider ?
A vendor that supplies a Web server.

320.What is Web service ?
An application that exists in a distributed environment, such as the Internet. A Web service accepts a request, performs its function based on the request, and returns a response. The request and the response can be part of the same operation, or they can occur separately, in which case the consumer does not need to wait for a response. Both the request and the response usually take the form of XML, a portable data-interchange format, and are delivered over a wire protocol, such as HTTP.

321.What is well-formed ?
An XML document that is syntactically correct. It does not have any angle brackets that are not part of tags, all tags have an ending tag or are themselves self-ending, and all tags are fully nested. Knowing that a document is well formed makes it possible to process it. However, a well-formed document may not be valid. To determine that, you need a validating parser and a DTD.

322.What is Xalan ?
An interpreting version of XSLT.

323.What is XHTML ?
An XML look-alike for HTML defined by one of several XHTML DTDs. To use XHTML for everything would of course defeat the purpose of XML, because the idea of XML is to identify information content, and not just to tell how to display it. You can reference it in a DTD, which allows you to say, for example, that the text in an element can contain < em > and < b > tags rather than being limited to plain text.

324.What is XLink ?
The part of the XLL specification that is concerned with specifying links between documents.

325.What is XLL ?
The XML Link Language specification, consisting of XLink and XPointer.

326.What is XML ?
Extensible Markup Language. A markup language that allows you to define the tags (markup) needed to identify the content, data, and text in XML documents. It differs from HTML, the markup language most often used to present information on the Internet. HTML has fixed tags that deal mainly with style or presentation. An XML document must undergo a transformation into a language with style tags under the control of a style sheet before it can be presented by a browser or other presentation mechanism. Two types of style sheets used with XML are CSS and XSL. Typically, XML is transformed into HTML for presentation. Although tags can be defined as needed in the generation of an XML document, a document type definition (DTD) can be used to define the elements allowed in a particular type of document. A document can be compared by using the rules in the DTD to determine its validity and to locate particular elements in the document. A Web services application’s J2EE deployment descriptors are expressed in XML with schemas defining allowed elements. Programs for processing XML documents use SAX or DOM APIs.

327.What is XML registry ?
An infrastructure that enables the building, deployment, and discovery of Web services. It is a neutral third party that facilitates dynamic and loosely coupled business-to-business (B2B) interactions.

328.What is XML Schema ?
The W3C specification for defining the structure, content, and semantics of XML documents.

329.What is XPath ?
An addressing mechanism for identifying the parts of an XML document.

330.What is XPointer ?
The part of the XLL specification that is concerned with identifying sections of documents so that they can be referenced in links or included in other documents.

331.What is XSL-FO ?
A subcomponent of XSL used for describing font sizes, page layouts, and how information flows from one page to another.

332.What is component (JavaServer Faces technology) ?
A user interface control that outputs data to a client or allows a user to input data to a JavaServer Faces application.

 

 

Qlikview Interview Questions

Top most important Qlikview interview questions and answers by Experts:

Here is a list of Top most important Qlikview interview questions and answers by Experts.If you want to download Qlikview interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Qlikview interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Qlikview ,Register for Qlikview online training here.

 

1)Optimized and unoptimized QVD Load Situations?

Loading the data without performing any transformations is unoptimized load. Loading the data with some transformations is Optimized load. Ex : Load * from tab1 where Year = 2014;

2) Explain 3 tier architecture implementation while deploying QlikView application?

In First Tier: Data is loaded from the Database and stored in QVDs.

In Second Tier: Data is loaded from QVDs and tranform the data based on business needs.

In Third Tier: Using the Binary load the Qlikview file created in Tier II is loaded in to the Qlikview file and all chart objects are created in this Tier.

3) Briefly explain how does QlikView storage the data internally?

data is binary format

4)What are the restrictions of Binary Load?

Binary load should be used only once in qvw application and it should be the first line in script editor page.

5) How are NULLS implemented in QlikView?

The way in which QlikView’s associative engine works means Nulls don’t really exist in the data it holds, a Null is simply an absence of a data item.For example if a field value is missing we can’t make selection on empty list box. We can replace these null values with our required values(NA,0, etc) .

6) How do you optimize QlikView Application? (What tools are used and where do you start?

For Optimization we can optimized the QVD which is used in the QVW files in the backend. For QVW optimization i believe not use any tools we can manually remove unwanted fields form data model or comment it, remove most complex logics from the load script or create it with the simple way because it will take long time for loading. If using large data base file try to create the incremental load for the QVD or load latest data only.

7) What is the difference between Subset ratio & Information Density?

Information Density: is the number of records that have values (i.e. not NULL) in this field as compared to the total number of records in the table.

SubSet Ratio:Subset ratio, which shows the percentage of all distinct values for a field in the table compared to all the distinct values for that field in the entire data model.

8) What is the difference between ODBC, OLE DB & JDBC?

JDBC is Java Data Base Connectivity .
ODBC is Open Data Base Connectivity .
Differences :
ODBC is from Microsoft .
JDBC is standard java interface to communicate with a database.
Both are used to connect with the database.
ODBC can’t be directly used with Java because it uses a C interface.
ODBC makes use of pointers which have been removed totally from java.
ODBC mixes simple and advanced features together and has complex options for simple queries.But JDBC is simple which allows advanced capabilities when required.

JDBC drivers are written in java and JDBC code is automatically installable, secure, and portable on all platforms.

JDBC API is a Java Interface and is built on ODBC.
JDBC retains some of the basic feature of ODBC.

9) What is the use of Crosstable prefix in QlikView Load Script?

Incremental load is a very common task in relation to data bases. It is defined as loading nothing but new or changed records from the database. All other data should already be available, in one way or another. With QVD Files it is possible to perform incremental load in most cases. The basic process is described below:

Load the new data from Database table (a slow process, but loading a limited number of records).

Load the old data from QVD file (loading many records, but a much faster process).

Create a new QVD file.

Repeat the procedure for every table loaded.

The following basic cases can be identified:

1) Case 1: Append Only (typically log files)

2) Case 2: Insert Only (No Update or Delete)

3) Case 3: Insert and Update (No Delete)

4) Case 4: Insert, Update and Delete

10) What is Mapping Load & ApplyMap() ?

Mapping Load: The mapping prefix is used on a load or select statement to create a mapping table, these tables are different from other tables. They will be stored in separate area of memory and used as mapping tables during script execution. After execution they will automatically drop.

Ex. Mapping (Load Statement/Select Statement)

Apply Map: used for mapping data from one source to another at load time.

Ex. Applymap(‘Mapname’, expr,[default expr])

11) Synthetic Keys in QlikView and how & when to avoid them?

In two or more tables more than one common field is there synthetics keys will be formed: we can remove in the following ways 1.commenting 2.rename 3.join 4.Qulify 5.linktable 6.concatenation

12) Explain QlikView Resident Load?

Resident Load:- It’s a part of loading data into qlikview application.
It means, loading data (one or more fields) from a table (which is already loaded into qlikview application).

Syntax:- Load
Field_1
Field_2

Resident <Table_Name>;

13) What is initial load and incremental load?

Initial load means, when ever the target table is empty on that time we load from starting year data to up to this day data we are loading into the target like facts or dataware house or datamarts.This is initial loading.

Incremental loading means just coming data that means today data that data load into target table this is called as incremental loading(already previous data is loading into targets then just now coming data is loading into target table that means updated data)it takes loading time is 3 to 4 hours.

Another difference that the initial load jobs were set to first truncate the tables and then do a complete load and the incremental load was set to insert new rows and update existing rows for DIMENSION Tables. Facts jobs were same (truncate and complete load).

14) What is Incremental Load in qlikview?

Incremental load is a very common task in relation to data bases. It is defined as loading nothing but new or changed records from the database. All other data should already be available, in one way or another. With QVD Files it is possible to perform incremental load in most cases. The basic process is described below:

Load the new data from Database table (a slow process, but loading a limited number of records).

Load the old data from QVD file (loading many records, but a much faster process).

Create a new QVD file.

Repeat the procedure for every table loaded.

The following basic cases can be identified:

1) Case 1: Append Only (typically log files)

2) Case 2: Insert Only (No Update or Delete)

3) Case 3: Insert and Update (No Delete)

4) Case 4: Insert, Update and Delete

15) Explain Aggr Function?

Think of the aggr() function as making a temporary table. For instance, let’s say we have this real table of data:

Customer, Value
A, 20
A, 30
B, 10
B, 15
C, 40

Now, as a nonsense requirement, let’s say that we’re looking for maximum value by customer, and then the minimum of THAT value across customers. Our max value by customer is A=30, B=15, C=40. Our min of those is 15. Note how we built a temporary table with three rows while calculating it. Aggr() is one way to build this temporary table. Our dimension is Customer, and our expression is max(Value). We could build this as a real chart, but instead we want to use it in an expression without doing so. The general format for aggr() is this:

aggr(expression, dimensions)

So in our case:

aggr(max(Value),Customer)

We’re trying to extract the minimum from that temporary table, that list of values, so we just enclose it in min():

min(aggr(max(Value),Customer))

16) What is the use of FirstSortValue in QlikView?

SET or a LET statement is often used To define the variable. The SET statement is used when you want a variable to hold the string or numeric value that is to the right of the Equal (=) sign.

The LET statement is used when you need to evaluate what is to the right of the Equal sign

e.g

set myVar=52 the result is “52″

Let myVar=5*2 the result is “10″

17) Explain Qlikview architecture?

QlikView deployments have three main infrastructure components:

1.QlikView Developer : Is a Windows-based desktop tool that is used by designers and developers to create

1) a data extract and transformation model and

2) to create the graphical user interface (or presentation layer).

2.QlikView Server (QVS) : Handles the communication between clients and the QlikView applications. It loads QlikView applications into memory and calculates and presents user selections in real time.

3.QlikView Publisher: Loads data from different data sources (oledb/odbc, xml, xls), reduces the QlikView application and distributes to a QVS.

Because QlikView Server and Publisher have different roles and handle CPU and memory differently it’s considered a best practice to separate these two components on different servers.

18) Set analysis in qlikview ?

Used for set of groups .. mostly used in arrgeted function like sum (year) used sales of current year VS last year.

19) What is Synthetic key and how to avoid it in QlikView?

It is undesirable to have multiple common keys across multiple tables in a QlikView data structure. This may cause QlikView to use complex keys (a.k.a. synthetic keys) to generate the connections in the data structure. Synthetic keys are generally resource heavy and may slow down calculations and, in extreme cases, overload anapplication. They also make a document harder to understand and maintain. Thereare some cases where synthetic keys cannot be avoided (e.g. Interval Match tables),but, in general, synthetic keys should always be eliminated, if possible.

comment the fileds in load script
rename the fileds in load script
rename the fileds using UNQUALIFY operator;
20) Difference between keep and joins ?

Left Keep and Left join gives the same output. The only difference is that Left Keep keeps the Table separate in Data Model, whereas Left join merges the Tables that are joined.

21) Difference between Straight table and pivot table ?

Pivot Table –

1) A pivot table is better at grouping: you can easily see which group a specific row belongs to, and a group can have a subtotal.

2) You can also display a pivot table like a cross table (one or several horizontal dimensions).

3) But when you sort a pivot table, you have to sort it first according to the first dimension, then according to the next, etc.

You cannot sort it any way you want.

Straight Table-

A straight table is better at sorting than a pivot table: you can sort it according to any column.

But it is not so good at grouping. Subtotals are not possible, for instance.

22) Which graph will you used for two years difference sale ?

BAR Graph

23) What is Incremental Load in qlikview?

As BI apps are expected to deal with larger and larger amounts of data the amount of time that it takes to retrieve that data becomes a serious issue. This could be due to shear volume of data or the need for frequent refreshes. Either way, you do not want to be pulling all of the data all of the time. What you want to be able to do is just pull the data that has changed, append to that the data that you stored away previously and then get back to the business of analyzing. This will reduce load on the source database, the network infrastructure and your QlikView server.

24) Whta is Inline memory in QlikView ?

Create table or add field to table .

25) what is Set and let in QlikView and difference between it?

SET or a LET statement is often usedTo define the variable. The SET statement is used when you want a variableto hold the string or numeric value that is to the right of the Equal (=) sign.

The LET statement is used when you need to evaluate what is to the right of the Equal sign

e.g

set myVar=5*2 the result is “5*2″

Let myVar=5*2 the result is “10″

26) Explain QlikView Resident Load?

Create a new logical table in QlikView, based on a previously loaded (resident) table.

27) What is Apply Map (Mapping Tables)?

Sometimes you need to add an extra field to a table to use a combination of fields

from different tables, or you want to add a field to clean up the data structure. Qlik- View has an effective way to add single fields to a table called mapping tables. syntax — mapping ( load statement | select statement )

applymap( ‘mapname’, expr, [ , defaultexpr ] )

28) What is Dimensions ( What is difference between Expression and Dimension)?

Each data warehouse consists of dimensions and measures. Dimensions allow data analysis from various perspectives. For example, time dimension could show you the breakdown of sales by year, quarter, month, day and hour. Product dimension could help you see which products bring in the most revenue. Supplier dimension could help you choose those business partners who always deliver their goods on time. Customer dimension could help you pick the strategic set of consumers to whom you’d like to extend your very special offers.

29) Explain about Normalized Data?

Well Structured Form of Data, which doesnt have any repetition or redundancy of data. Its a kind of Relational data. Its mainly used in OLTP kind of stuffs Denormalized Data – Its a whole bunch of data without any relationship among themselves, with redundancy of data. Its mainly used in OLAP kind of stuffs.

30) What Is Star Sechma ?

A star schema is the simplest form of dimensional model, in which data is organized into facts and dimensions. A fact is an event that is counted or measured, such as a sale or login. A dimension contains reference information about the fact, such as date, product, or customer. A star schema is diagramed by surrounding each fact table with its associated dimensions table. The output diagram resembles a star.

Star Schema Definition : A means of aggregating data based on a set of known dimensions. It stores data multidimensionality in a two dimensional Relational Database Management System (RDBMS), such as Oracle.

31) What is Snowflaking Schema ?

Snowflake Schema: An extension of the star schema by means of applying additional dimensions to the Dimensions of a star schema in a relational environment. Snowflaking is a form of dimensional modeling; dimensions are stored in multiple relational dimension tables. A snowflake schema is a variation of the star schema. Snowflaking is used to improve the performance of specific queries. The schema is diagramed with each fact surrounded by its associated dimensions as in a star schema, and those dimensions are further related to other dimensions, branching out into a snowflake pattern.

32) What is Central Link Table?

In the event of multiple fact tables QlikView In-Memory Technology allows us to create a central link table that only contains the existing data combinations. Instead of Joining the tables the event dimensions can be merged (CONCATENATED) in to one central Link table. This link table can then be linked back to the event measures one side and the dimension tables on the other.

33) What is binary load ?

Binary load is loading data from another QV file. For example, you have application A.qvw. You can create another application B.qvw with script binary A.qvw. binary file where:

file ::= [ path ] filename

Examples:

Binary customer.qvw;

Binary c:\qv\customer.qvw;

The path is the path to the file, either absolute, or relative to the .qvw file containing this script line.

34) What is Container ?

A container object can be used to hold multiple charts. You can use a container object to put multiple charts in the same box. All charts will appear in the same window but only one chart will appear active at a given time. You can click the chart title to switch or toggle between charts. A word of advice: Use containers with caution. They form linked objects and might affect the properties of all linked objects.

 

 

Core Java Interview Questions

Top most important Core Java interview questions and answers by Experts:

Here is a list of Top most important Core Java interview questions and answers by Experts.If you want to download Core Java interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Core Java interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Core Java ,Register for Core Java online training here.

 

1. What is Java technology ?
Java is a programming language, application development and deployment environment. Java programming language is similar to C++ syntax. Java development environment provides tools – Compiler, Interpreter, Packaging Tool etc.

2. What are the objectives of Java Technology ?
Simple: The language syntax is based on the familiar programming language ‘C++’. Though the syntax of ‘C++ was adopted, some features which were troublesome were avoided making the Java programming simple.
Object oriented: The object oriented features of Java are comparable to C++. One major difference between Java and C++ lies in multiple inheritance. Object oriented design is a technique that focuses design on data (i.e.objects) and on the interfaces to it.
Architectural Neutral: The Java compiler generates an intermediate byte code which does not depend on any architecture of a computer i.e., whether it is an IBM PC, a Macintosh, or a Solaris system. So the Java programs can be used on any machine irrespective of its architecture and hence the Java program is Architectural Neutral.
Portable type: The size of data types are always same irrespective of the system architecture. That is an int in Java is always 32 bit unlike in C/C++ where the size may be 16-bit or 32-bit depending on the compiler and machine. Hence when ported on different machines, there does not occur any change in the values the data types can hold. And also Java has libraries that enables to port its application on any systems like UNIX, Windows and the Macintosh systems.
Distributed: Java’s networking capabilities are both strong and easy to use. Java applications are capable of accessing objects across the net, via URLs as easy as a local file system.
Secure: Since Java is mostly used in network environment, a lot of emphasis has been placed on security to enable construction of virus free and tamper free systems.
Smaller code: The Java compiler generates an intermediate byte code to make it architecture neutral. Though Java interpreter is needed to run the byte code, it is one copy per machine and not per program.
Multithreaded: Multithreading is the ability for one program to do more than one task at once. Compared to other languages it is easy to implement multithreading in Java.
Interpreted: The Java Interpreter can execute Java byte code, directly on any machine to which the interpreter has been ported. Interpreted code is slower than compiled code.
High performance: The byte codes can be translated at run time into machine code for the particular CPU on which the application is running.

Applet programming: is one of the important features which has attracted the users of the Internet. Applets are Java programs that are typically loaded from the Internet by a browser.
3. What are the Major Features of Java Technology Architecture ?
• Java Run Time Environment
• Java Virtual Machine
• Just in Time Compiler
• Java Tools
• Garbage Collector
4. What is Java Virtual Machine (JVM) ?
A self-contained operating environment that behaves as if it is a separate computer. For example, Java applets run in a Java virtual machine (VM) that has no access to the host operating system.
Java Compilers compile JAVA source code into byte code. Java Virtual Machine(JVM) interpreters Java byte code and send necessary commands to underlying hardware or Just in time compiled to native machine code and execute it directly on the underlying hardware . Most JVM’s use Just in time compilation which provides execution speeds near to C or C++ application. Most widely used JVM is Oracle Corporations HotSpot, which is written in the C++ programming language.
5. What are the advantages of JVM?

This design has two advantages:
• System Independence: A Java application will run the same in any Java VM, regardless of the hardware and software underlying the system.
• Security: Because the VM has no contact with the operating system, there is little possibility of a Java program damaging other files or applications.
6. What are classpath variables?
Classpath is an environment variable that tells the Java Virtual Machine where to look for user-defined classes and packages in Java programs. The Classpath is the connection between the Java runtime and the filesystem. It defines where the compiler and interpreter look for .class files to load. The basic idea is that the file system hierarchy mirrors the Java package hierarchy, and the Classpath specifies which directories in the filesystem serve as roots for the Java package hierarchy.
7. What is Java Run Time Environment ?
Java Virtual Machine (JVM) along with Java Class Libraries which implement the Java application programming interface (API) form the Java Runtime Environment (JRE).
8. What are the steps involved in Java Application Execution ?
• Compiling Java Source Files into *.class file. (Byte Code)
• Loading class file into Java Run Time (JRE) using class loader
• Use Bytecode verifier to check for byte code specification
• Use Just In time Code Generator or Interpreter for byte code execution
9. What is Just in Time Compiler ?
Just in time Compiler (JIT) compiles JAVA byte code to native machine code and execute it directly on the underlying hardware. Just in time compilation which provides application execution speeds near to C or C++ application.
10. What is Java Development Kit (JDK) ?
Java Development Kit (JDK) is a super set of the JRE, which contains Java Run-time Environment (JRE) , Compilers and debuggers required to develop applets and applications.
11. What is Garbage Collector ?
For executing programs, application are allocated memory at runtime. After execution of programs, unused memory need to be allocated. Allocation and deallocation of memory is done by programmers developing application using C, C++ programming language . Java internally uses garbage collector to deallocate unused memory which make the life of programmer easy.
12. What is class loader ?
Class loader is used to load all the classes required execute the application into Java Virtual Machine (JVM). After the class is loaded memory required for the application is determined.
13. What is byte code verifier ?
Byte code verifier checks for illegal code like forges pointers, violated access rights on objects etc. in complied byte code.
14. What are the java verifications done by byte code verifier ?
1. Check whether classes follow JVM specification for classes
2. Check for stack overflows
3. Check for access restriction violations
4. Illegal data conversions
15. What is Java API?

An application programming interface (API) is a library of functions that Java provides for programmers for common tasks like file transfer, networking, and data structures.
16. Give Some examples of Java API.
• Java.applet – Applet class
• Java.awt – Windows, buttons, mouse, etc.
• Java.awt.image – image processing
• Java.awt.peer – GUI toolkit
• Java.io – System.out.print
• Java.lang – length method for arrays; exceptions
• Java.net – sockets
• Java.util – System.getProperty
17. What is an applet?

An applet is a small Java program that runs within a web page on your browser. Unlike a traditional desktop application, an applet is severely limited as to what it can perform on your desktop.
• Applet read and write files.
• Applet integrates with desktop services (e.g., e-mail).
• It is connected to other servers.
• It is also built with security in mind.
• If the user allows, an applet can be given more authority.
18. What is a class?

A class is a blueprint or prototype that defines the variables and the methods common to all objects of a certain kind.
19. What is an object?

An object is a software construct that encapsulates data, along with the ability to use or modify that data, into a software entity. An object is a self-contained entity which has its own private collection of properties (ie. data) and methods (i.e. operations) that encapsulate functionality into a reusable and dynamically loaded structure.
20. What an object contains?

An object has – State and Behavior
21. What is object oriented program?
An Object-Oriented Program consists of a group of cooperating objects, exchanging messages, for the purpose of achieving a common objective.
22. What are the benefits of OOPS?
• Real-world programming
• Reusability of code
• Modularity of code
• Resilience to change
• Information hiding
23. What are the features of OOPS?
• Encapsulation
• Abstraction
• Inheritance
• Polymorphism

24. What is encapsulation?
Encapsulation is the ability of an object to place a boundary around its properties (i.e. data) and methods (i.e. operations). Grady Booch, defined the encapsulation feature as:
“Encapsulation is the process of hiding all of the details of an object that do not contribute to its essential characteristics.”
25. What is abstraction?
An Abstraction denotes the essential characteristics of an object that distinguishes it from all other kinds of objects and thus provides crisply defined conceptual boundaries, relative to the perspective of the viewer.
26. What is the difference between encapsulation and abstraction?
Encapsulation hides the irrelevant details of an object and Abstraction makes only the relevant details of an object visible.
27. What is inheritance?

Inheritance is the capability of a class to use the properties and methods of another class while adding its own functionality. It enables you to add new features and functionality to an existing class without modifying the existing class.
28. What is superclass and subclass?
• A superclass or parent class is the one from which another class inherits attributes and behavior.
• A subclass or child class is a class that inherits attributes and behavior from a superclass.

29. What is JIT compiler?

Just-In-Time(JIT) compiler:It is used to improve the performance. JIT compiles parts of the byte code that have similar functionality at the same time, and hence reduces the amount of time needed for compilation.Here the term “compiler” refers to a translator from the instruction set of a Java virtual machine (JVM) to the instruction set of a specific CPU.
30. What are the types of inheritance?
• Single inheritance
• Multiple inheritance

31.What is platform?

A platform is basically the hardware or software environment in which a program runs. There are two types of platforms software-based and hardware-based. Java provides software-based platform.

32. What is classloader?

The classloader is a subsystem of JVM that is used to load classes and interfaces.There are many types of classloaders e.g. Bootstrap classloader, Extension classloader, System classloader, Plugin classloader etc.

33. What is polymorphism?
Derived from two Latin words – Poly, which means many, and morph, which means forms.
• It is the capability of an action or method to do different things based on the object that it is acting upon.
• In object-oriented programming, polymorphism refers to a programming language’s ability to process objects differently depending on their data type or class.
34. Describe method overloading with example?
Java allows to define several methods with same name within a class. Methods are identified with the parameters set based on:
• the number of parameters
• types of parameters and
• order of parameters.
Compiler selects the proper method. This is called as Method overloading. Method overloading is used perform same task with different available data. For Example:
int sum(int a,int b) { return a+b;}
int sum(int a,int b,int c) { return a+b+c;}
float sum(float a, float b, float c) { return a+b+c;}
35. How to identify starting method of a program ?
Method starting with following code
public static void main (String args[])
{
}

36. How do we access data members of a class in java?
Dot Operator(.) is used to access the data members of a class outside the class by specifying the data member name or the method name.

37. What is “this” reference in java?

“this” is a reference to the current object. “this” is used to refer to the current object when it has to be passed as a parameter to a method.
otherobj1.anymethod(this);
refer to the current object when it has to be returned in a method. Refer the instance variables if parameter names are same as instance variables to avoid ambiguity.
public void method1(String name){
this.name=name;
}
The this keyword included with parenthesis i.e. this() with or without parameters is used to call another constructer. The default construct for the Car class can be redefined as below
public Car(){
this(“NoBrand”,””NoColor”,4,0);
}
The this() can be called only from a constructor and must be the first statement in the constructor
38. What are the uses of Java packages?
“A package is a namespace that organizes the a set of related classes and interfaces. It also defines the scope of a class. An application consists of thousands of classes and interfaces, and therefore, it is very important to organize them logically into packages. By definition, package is a grouping of related types providing access protection and name space management.” Packages enable you to organize the class files provided by Java.
39. What is the significance of import keyword?

The classes in the packages are to be included into the applications as required. The classes of a package are included using import keyword. The import keyword followed by fully qualified class name is to be placed before the application class definition.
import classname ;
// Class Definition.
Ex: import Java.util.Date;
import Java.io.*;
// Class Definition
above indicates to import all the classes in a package.
All the classes in Java.lang package are included implicitly.
40. What is user defined package in java?
When you write a Java program, you create many classes. You can organize these classes by creating your own packages. The packages that you create are called user-defined packages. A user-defined package contains one or more classes that can be imported in a Java program.
package land.vehicle;
public class Car
{
String brand;
String color;
int wheels;
}
41. How to compile a Java Source file ?
From command prompt, Go to location in which Java file is located. Enter command “javac” followed by Java source file name. For example, To compile person class, type command “javac Person.java” . Class files will be generated in the same location
42. How to compile all the files in a Folder?
javac *.java”
43. How to place compiled Java file in a different location ?
To compile Java classes and place all the file in a different location use command “javac -d ../Java/All/*.java”
44. How to run a compiled Java file ?
Go to location in which Java file is located from command prompt. Enter command “java” followed by class name . For example to execute Employee class, type command “java Employee”
45. Why Information hiding is used and how Information hiding is implemented in Java ?
In order to avoid direct access of an attribute in a class, attributes are defined as private and use getter and setter to restrict the access of attributes in a class. Example class is given below
public class Person {
private String FirstName;

public String getFirstName()
{
return FirstName;
}
public void setFirstName(String FirstName)
{
this.FirstName = FirstName;
}
}
46. What is a Constructor ?
A constructor is a special method that initializes the instance variables. The method is called automatically when an object of that class is created. A constructor method has the same name as the that of the class.
A constructor always returns objects of the class type hence there is no return type specified in its definition. A constructor is most often defined with the accessibility modifier “public” so that every program can create an instance but is not mandatory. A constructor is provided to initialize the instance variables in the class when it is called.
If no constructor is provided, a default constructor is used to create instances of the class. A default Constructor initializes the instance variables with default values of the data types. If at least one constructor is provided , default constructor is not provided by JVM. A class can have multiple constructors.
class Car {
String brand;
String color;
int wheels;
int speed;
int gear;
public Car() {
brand=“NoBrand”;
color=“NoColor”;
wheels=4;
speed=80;
}

public Car(String b, String c, int w, int s, int g)
{
brand=b;
color=c;
wheels=w;
speed=s;
}

void accelerate(){}
void brake(){}
void changeGear(){}
}
47. What is access modifier and what are its types?
An attribute that determines whether or not a class member is accessible in an expression or declaration. Different types of access modifiers are:
• Public – Members are accessible to the class and to other classes.
• Private – Members are accessible only to the class.
• Protected – Members are accessible only to the class and its subclass(es).
• Default – Members are accessible only to the class and other classes within that package. This is the default access specifier.

48. What is final keyword?
A final data members cannot be modified. A final method cannot be overridden in the subclass. A class declared as final cannot be inherited .
49. What is static keyword?
Static keyword is used to define data members and methods that belongs to a class and not to any specific instance of a class. Static Methods and data members can be called without instancing the class.A static member exists when no objects of that class exist.
50. What is abstract keyword?
Abstract keyword is used to declare class that provides common behavior across a set of subclasses. Abstract class provides a common root for a group of classes. An abstract keyword with a method does not have any definition.
51. What is synchronized keyword?

It controls the access to a block in a multithreaded environment.
52. What is native keyword?

Native keyword is used only with methods. It signals the compiler that the method has been coded in a language other than Java. It indicates that method lies outside the Java Runtime Environment.
53. What is a transient variable?

A transient variable is a variable that may not be serialized.i.e JVM understands that the indicated variable is not part of the persistent state of the object. For example
class A implements Serializable {
transient int i; // will not persist
int j; // will persist
}
Here, if an object of type A is written to a persistent storage area, the contents of i would not be saved, but the contents of j would.
54. What is sctrictfp keyword?
strictfp can be used to modify a class or a method, but never a variable. Marking a class as strictfp means that any method code in the class will conform to the IEEE 754 standard rules for floating points. Without that modifier floating points used in the methods might behave in a platform-dependent way.
If not at class class level , strictfp behavior can be applied at method level, by declaring a method as strictfp. Usage of strictfp is required when floating point values should be consistent across multiple platforms.
55. Explain method overriding with an example?
Method overriding is defined as creating a non-static method in the subclass that has the same return type and signature as a method defined in the superclass. Signature of a method includes name of method and number, sequence, type of arguments.
public class Person {
private String name;
private String ssn;
public void setName(String name) {
this.name = name;
}

public String getName() {
return name; }

public String getId() {
return ssn;}
getId method is overridden in subclass:
public class Employee extends Person
{
private String empId;

public void setId(String empId)
{
this.empId=empId;
}

public String getId() {
return empId;
}
}
56. What is the use of super keyword. Give an example?

It allows you to access methods and properties of the parent class.
public class Person {
private String name;

public Person(String name) {
this.name = name; }

public String getName() {
return name;
} }

public class Employee extends Person {
private String empID;

public Employee(String name) {
super(name); // Calls Person constructor
}
public void setID(String empID){
this.empID=empID;
}
public String getID(){
return empID;
}
}
57. What is an interface?
A programmer’s tool for specifying certain behaviors that an object must have in order to be useful for some particular task.Interface is a conceptual entity. It can contain only constants (final variables) and non-implemented methods (Non – implemented methods are also known as abstract methods).
For example, you might specify Driver interface as part of a Vehicle object hierarchy. A human can be a Driver, but so can a Robot.
58. What is an abstract class?
• An Abstract class is a conceptual class.
• An Abstract class cannot be instantiated – objects cannot be created.
• Abstract classes provides a common root for a group of classes, nicely tied together in a package.
• When we define a class to be “final”, it cannot be extended. In certain situation, we want properties of classes to be always extended and used. Such classes are called Abstract Classes.

59. What are the properties of abstract class?
• A class with one or more abstract methods is automatically abstract and it cannot be instantiated.
• A class declared abstract, even with no abstract methods can not be instantiated.
• A subclass of an abstract class can be instantiated if it overrides all abstract methods by implementation them.
• A subclass that does not implement all of the superclass abstract methods is itself abstract; and it cannot be instantiated.
• We cannot declare abstract constructors or abstract static methods.

60. What is object class in java?
Every class that we create extends the class Object by default. That is the Object class is at the highest of the hierarchy. This facilitates to pass an object of any class to be passed as an argument to methods.
61. What are the methods of object class?
The methods in this class are:
• equals(Object ref) – returns if both objects are equal
• finalize( ) – method called when an object’s memory is destroyed
• getClass( ) – returns class to which the object belongs
• hashCode( ) – returns the hashcode of the class
• notify( ) – method to give message to a synchronized methods
• notifyAll( ) – method to give message to all synchronized methods
• toString() – return the string equivalent of the object name
• wait() – suspends a thread for a while
• wait(…) – suspends a thread for specified time in seconds
62. What does java.util package provides?
The java.util package provides various utility classes and interfaces that support date and calendar operations, String manipulations and Collections manipulations.
63. How do we convert object to string?
Any Java reference type or primitive that appears where a String is expected will be converted into a string.
System.out.println(“1 + 2 = ” + (1 + 2));
For an reference type (object) this is done by inserting code to call String toString() on the reference.
All reference types inherit this method from java.lang.Object and override this method to produce a string that represents the data in a form suitable for printing.
To provide this service for Java’s primitive types, the compiler must wrap the type in a so-called wrapper class, and call the wrapper class’s toString method.
String arg1 = new Integer(1 + 2).toString();
For user defined classes they will inherit the standard Object.toString() which produces something like “ClassName@123456” (where the number is the hashcode representation of the object). To have something meaningful the classes have to provide a method with the signature public String toString().
public class Car() {

String toString()
{
return brand + ” : ” + color + ” : ”+wheels+” : “+ speed;
}
}
64. How can we convert string to object?
Many data type wrapper classes provide the valueOf(String s) method which converts the given string into a numeric value. The syntax is straightforward. It requires using the static Integer.valueOf(String s) and intValue() methods from the java.lang.Integer class.
To convert the String “22” into the int 22 you would write
int i = Integer.valueOf(“22”).intValue();
Doubles, floats and longs are converted similarly. To convert a String like “22” into the long value 22 you would write
long l = Long.valueOf(“22”).longValue();
To convert “22.5” into a float or a double you would write:
double x = Double.valueOf(“22.5”).doubleValue(); float y = Float.valueOf(“22.5”).floatValue();
If the passed value is non-numeric like “Four” it will throw a NumberFormatException.
65. What is Regular expression?
Regular expressions are a way to describe a set of strings based on common characteristics shared by each string in the set. They can be used to search, edit, or manipulate text and data.
The regular expression syntax supported by the java.util.regex API
66. What does rejex package consists of?
The java.util.regex package primarily consists of three classes: Pattern, Matcher, and PatternSyntaxException. A Pattern object is a compiled representation of a regular expression. The Pattern class provides no public constructors.
To create a pattern, you must first invoke one of its public static compile methods, which will then return a Pattern object. These methods accept a regular expression as the first argument; the first few lessons of this trail will teach you the required syntax.
A Matcher object is the engine that interprets the pattern and performs match operations against an input string. Like the Pattern class, Matcher defines no public constructors. You obtain a Matcher object by invoking the matcher method on a Pattern object. A PatternSyntaxException object is an unchecked exception that indicates a syntax error in a regular expression pattern.
67. What is StringBuffer class is used for?
• It is used for creating and manipulating dynamic string data i.e., modifiable Strings.
• It can store characters based on capacity. Capacity expands dynamically to handle additional characters. It cannot use operators + and += for string concatenation.
• It has fewer utility methods (e.g. substring, trim, ….)
68. What is the difference between StringBuffer and StringBuilder class?
StringBuffer class is not threadsafe whereas StringBuilder class is threadsafe. That means the methods of StringBuilder class are synchronized.
69. What is matcher in regex package?

A matcher is created from a pattern by invoking the pattern’s matcher method. Once created, a matcher can be used to perform three different kinds of match operations:
• The matches method attempts to match the entire input sequence against the pattern.
• The looking at method attempts to match the input sequence, starting at the beginning, against the pattern.
• The find method scans the input sequence looking for the next subsequence that matches the pattern

70. How to add comments in Java File ?
Comments can be inserted in 3 ways as shown below

// Comment Type1

/* Multi Line Comments
* Comment Line 2 */

/* Documentation Comment
* Comment Line 2 */

This comment will be added in the automatic document generation
71. What are the limitations of array?
Arrays do not grow while applications demand. It has inadequate support for inserting, deleting, sorting, and searching operations.
72. What is collection framework?
Collections Framework provides a unified system for organizing and handling collections and is based on four elements:
• Interfaces that characterize common collection types
• Abstract Classes which can be used as a starting point for custom collections and which are extended by the JDK implementation classes.
• Classes which provide implementations of the Interfaces.
• Algorithms that provide behaviors commonly required when using collections i.e. search, sort, iterate, etc.
Another item in collections framework is the Iterator interface. An iterator gives you a general-purpose, standardized way of accessing the elements within a collection, one at a time.
73. What is set interface about?
Mathematically a set is a collection of non-duplicate elements.The Set interface is used to represent a collection which does not contain duplicate elements. The Set interface extends the Collection interface. It stipulates that an instance of Set contains no duplicate elements.
The classes that implement Set must ensure that no duplicate elements can be added to the set. That is no two elements e1 and e2 can be in the set such that e1.equals(e2) is true.
74. What is HashSet, LinkedHashSet and TreeSet?
The Java platform contains three general-purpose Set implementations: HashSet, TreeSet, and LinkedHashSet.
• HashSet: This is an unsorted, unordered Set. This may be chosen when order of the elements are not important .
• LinkedHashSet: This is ordered. The elements are linked to one another (Double-Linked). This will maintain the list in the order in which they were inserted.
• TreeSet: This is a sorted set. The elements in this will be in ascending order in the natural order. You can also define a custom order by means of a Comparator passed as a parameter to the constructor.
75. Which one to choose and when among HashSet, LinkedHashSet and TreeSet?
• HashSet is a good choice for representing sets if you don’t care about element ordering. But if ordering is important, then LinkedHashSet or TreeSet are better choices. However, LinkedHashSet or TreeSet come with an additional speed and space cost.
• Iteration over a LinkedHashSet is generally faster than iteration over a HashSet.
• Tree-based data structures get slower as the number of elements get larger
• HashSet and LinkedHashSet do not represent their elements in sorted order
• Since TreeSet keeps its elements sorted, it can offer other features such as the first and last methods,i.e the lowest and highest elements in a set, respectively.

76. What is Enumeration interface?
The Enumeration interface defines a way to traverse all the members of a collection of objects. The hasMoreElements() method checks to see if there are more elements and returns a boolean.

If there are more elements, nextElement() will return the next element as an Object. If there are no more elements when nextElement() is called, the runtime NoSuchElementException will be thrown.
77. Explain Iterator interface?
Iterator is a special object to provide a way to access the elements of a collection sequentially. Iterator implements one of two interfaces: Iterator or ListIterator. An Iterator is similar to the Enumeration interface, Iterators differ from enumerations in two ways:
Iterators allow the caller to remove elements from the underlying collection during the iteration with well-defined semantics.
Method names have been improved.
boolean hasNext() Returns true if the iteration has more elements. Object next() Returns the next element in the iteration. void remove() Removes from the underlying collection the last element returned by the iterator (optional operation).
78. What is SortedSet interface?
SortedSet is a subinterface of Set, which guarantees that the elements in the set are sorted. TreeSet is a concrete class that implements the SortedSet interface. You can use an iterator to traverse the elements in the sorted order.
79. How elements can be sorted in java collections?

The elements can be sorted in two ways. One way is to use the Comparable interface. Objects can be compared using by the compareTo() method. This approach is referred to as a natural order.
The other way is to specify a comparator for the elements in the set if the class for the elements does not implement the Comparable interface, or you don’t want to use the compareTo() method in the class that implements the Comparable interface. This approach is referred to as order by comparator
80. What is a list interface?
• A list allows duplicate elements in a collection where duplicate elements are to be stored in a collection, list can be used. A list also allows to specify where the element is to be stored. The user can access the element by index.
• The List interface allows to create a list of elements.The List interface extends the Collection interface.
81. Compare ArrayList vs LinkedList?
• ArrayList provides support random access through an index without inserting or removing elements from any place other than an end.
• LinkedList provides support for random access through an index with inserting and deletion elements from any place .
• If your application does not require insertion or deletion of elements, the Array is the most efficient data structure.
82. What is a vector class?
The Vector class implements a growable array of objects. Like an array, it contains components that can be accessed using an integer index. However, the size of a Vector can grow or shrink as needed to accommodate adding and removing items after the Vector has been created.
83. What is a Stack class?

The Stack class represents a last-in-first-out (LIFO) stack of objects. The elements are accessed only from the top of the stack. You can retrieve, insert, or remove an element from the top of the stack.
84. What is a Map interface?
A Map is a storage that maps keys to values. There cannot be duplicate keys in a Map and each key maps to at most one value. The Map interface is not an extension of Collection interface. Instead the interface starts of it’s own interface hierarchy. for maintaining key-value associations. The interface describes a mapping from keys to values, without duplicate keys, by definition. The Map interface maps keys to the elements. The keys are like indexes. In List, the indexes are integer. In Map, the keys can be any objects.
85. Describe about HashMap and TreeMap?

The HashMap and TreeMap classes are two concrete implementations of the Map interface. Both will require key &value. Keys must be unique. The HashMap class is efficient for locating a value, inserting a mapping, and deleting a mapping. The TreeMap class, implementing SortedMap, is efficient for traversing the keys in a sorted order.
HashMap allows null as both keys and values.TreeMap is slower than HashMap. TreeMap allows us to specify an optional Comparator object during its creation. This comparator decides the order by which the keys need to be sorted.
86. What is the purpose of Collections class in util package?
The Collections class contains various static methods for operating on collections and maps, for creating synchronized collection classes, and for creating read-only collection classes.
87. How do we order/sort objects in collections?

To provide for ordering/sorting of the objects Java API provides two interfaces Comparable and Comparator
• Comparable interface is in java.lang
• Comparator interface is in java.util
88. When to use Comparable and Comparator in code?
The Comparable interface is simpler and less work
• Your class implements Comparable
• You provide a public int compareTo(Object o) method
• Use no argument in your TreeSet or TreeMap constructor
• You will use the same comparison method every time
The Comparator interface is more flexible but slightly more work
• Create as many different classes that implement Comparator as you like
• You can sort the TreeSet or TreeMap differently with each
• Construct TreeSet or TreeMap using the comparator you want
• For example, sort Students by score or by name
Suppose you have students sorted by score, in a TreeSet you call studentsByScore. Now you want to sort them again, this time by name
Comparator<Student> myStudentNameComparator = new MyStudentNameComparator();
TreeSet studentsByName = new TreeSet(myStudentNameComparator);
studentsByName.addAll(studentsByScore);
89. What are the new features added in Java 1.5?
Generic classes
• New approach to loops – Enhanced for loop
• Static imports
• Arrays, string builder, queues and overriding return type
Annotation
• Output formatting – format() and printf()
• Autoboxing of primitive types
• Enumerated types
• Variable length of arguments

90. What is Generic classes?

Similar in usage to C++ templates, but do not generate code for each implementation. It ensure stored/retrieved type of objects.Check done at compile-time – avoid nasty casting surprises during runtime. Generics are removed from compiled classes. Java 5 is upwardly compatible with Java 1.4, so old programs must continue to work. It can be used in legacy code to check for place where incorrect type is inserted
91. What is the big advantage of Generics?
Big advantage: collections are now type safe. For example, you can create a Stack that holds only Strings as follows:
Stack<String> names = new Stack<String>();
You can write methods that require a type-safe collection as follows:
void printNames(Stack<String> names) {
String nextName = names.pop(); // no casting needed!
names.push(“Hello”); // works just the same as before
names.push(Color.RED); // compile-time error!
92. What is StringBuilder class?
It is an improvement upon StringBuffer. It allows quicker concatenation of strings. It is not safe for use by multiple threads at the same time since the methods are not synchronized.
Why use it?
Creating new Strings in a loop can be inefficient because of the number new objects that are created and discarded.
StringBuilder.append(<type> <value>)
StringBuilder.insert(<type> <value>)
93. What is Queue interface?
• It extends Collection interface. It is designed for holding elements prior to processing. It is typically ordered in a FIFO manner.
• Main Methods are – remove() and pull(). Both return the head of the queue. When empty, the remove() method throws an exception while poll() returns null.
94. Describe covariant return types with an example?
It allows the user to have a method in inherited class with same signature as in parent’s class but differing only in return types. It makes programs more readable and solves casting problem.
class Shape
{
public Shape transform(int x, int y)
}
class Rectangle extends Shape
{
public Rectangle transform(int x, int y)
}
95. What is boxing and unboxing ?
Converting a primitive data type to its corresponding wrapper class object is called boxing or autoboxing. Example of boxing,
int i = 0;
Integer O = new Integer(i);
Unboxing is the exact opposite of boxing where wrapper class object is converted into primitive data type. Example of unboxing,
i = O.intValue();
96. How autoboxing was done before java 5 and in java 5 version?
Before 5.0
ArrayList<Integer> list = new ArrayList<Integer>();list.add(0, new Integer(42)); int total = (list.get(0)).intValue();
From 5.0 version:
ArrayList<Integer> list = new ArrayList<Integer>();list.add(0, 42);int total = list.get(0);
97. How java distinguishes between primitive types and objects?
Java distinguishes between primitive types and Objects.
• Primitive types, i.e., int, double, are compact, support arithmetic operators.
• Object classes (Integer, Double) have more methods: Integer.toString()
You need a “wrapper” to use Object methods:
Integer ii = new Integer( i );
ii.hashCode()
Similarly, you need to “unwrap” an Object to use primitive operation
int j = ii.intValue() * 7;
Java 1.5 makes this automatic:
ArrayList<Integer> list = new ArrayList<Integer>();
list.add(0, 42);
int total = list.get(0);
98. What is Enum?

An enumeration, or “enum,” is simply a set of constants to represent various values. Here’s the old way of doing it:
public final int SPRING = 0;
public final int SUMMER = 1;
public final int FALL = 2;
public final int WINTER = 3;
This is a nuisance, and is error prone as well. Here’s the new way of doing it,
enum Season { winter, spring, summer, fall }
Enums are classes, extends java.lang.Enum.Enums are final, can’t be subclassed. Only one Constructor and is protected. It implement java.lang.Comparable: compareTo() and implements Serializable.
99. What is an exception?
An exception can be defined as an abnormal event that occurs during program execution and disrupts the normal flow of instructions.
100. What are the uses of exceptions?
• Consistent error reporting style.
• Easy to pass errors up the stack.
• Pinpoint errors better in stack trace.
• As long as you “fail fast” and throw as soon as you find a problem.
• Wrap useful information up in your exception classes, use that information later when handling the exception.
• Exceptions don’t always have to be errors, maybe your program can cope with the exception and keep going!
• Separating error handling code from Regular code

Adv Java Interview Questions

Top most important Adv Java interview questions and answers by Experts:

Here is a list of Top most important Adv Java interview questions and answers by Experts.If you want to download Adv Java interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Adv Java interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Adv Java ,Register for Adv Java online training here.

1) Explain run time polymorphism in Java ?
Polymorphism can be explained as an object’s ability to adapt to the program’s context and take multiple forms. The method overriding is an example of run time polymorphism. You can have a method in a subclass, which overrides the method in its super classes with the same name and signature. At run time, Java virtual machine determines the appropriate method to be called.
2) What are the rules (method access permission and exception) that needs to be followed, during method overloading and overriding ?

During method Overloading, method name should remain same. But method signature can vary. Components of signature that can vary are
• Number of arguments
• Datatype of arguments
• Order of arguments
During method Overriding, make sure that the method is not throwing checked exceptions that are new or higher than those declared by the overridden method.But we can’t override Static and Final methods.

3) What is the difference between an Interface and abstract class?
Abstract Interface
Supports Single inheritance Supports Multiple inheritance
Supports abstract and Non-abstract methods Allows only abstract methods
Supports Non-static and non-final variables also. Variables must be static and final(implicitly)
Supports non public member Only public members are allowed
Using extends keyword Using implements keyword
It can invoke if main exists Pure abstract
Faster Flexible
4) Explain the difference between compile time and run time polymorphism in Java ?
Compile time Polymorphism Run time Polymorphism
Method are called at compile time Method are called at run time
Ex: Overloading Ex: Overriding
5) What is the difference between Overloading and Overriding ?
Overloading Overriding
Methods are overloaded during compile time Method overriding takes place during runtime
All the overloaded methods should be placed in the same class We can override methods in sub class
We can overload static methods Static methods can’t be overridden
Methods are bonded together using static binding. Overridden method are bonded via dynamic bonding based upon actual Object.
To overload a method, method signature needs to be changed There is no need to change the signature
Private and final method can be overloaded. Private and final method can’t be overridden
Method is relatively fast. Method is relatively slow.
6) What is the difference between class and object ?
Class Object
Template/Blue print of an object. It is an instance of a class. Object have states and behaviors.
A logical construct. A Physical reality.

7) What are the major object oriented concepts in Java ?
Abstraction
It denotes the critical properties of an object which differentiate from other object and thus provide crisply defined conceptual boundaries relative to the perspective viewer.

Encapsulation
Encapsulation can be explained as a mechanism which binds the code and the data it manipulates. It also keeps them safe from external intervention and misuse.

Inheritance:
One object inherits the properties and methods of another Object.

Polymorphism
It is an ability of an object to take on many forms. Ex: Compile time polymorphism – method over loading. Run time polymorphism – method overriding

8) Why Java is not supporting multiple inheritance ?

Main features of java are very Simple. if multiple inheritance is supported, it creates ambiguity around Diamond problem and it does complicate the design and creates problem during casting, chaining etc. So Java will support multi-inheritance via single inheritance with interfaces to overcome above issues.

9) What is meant by final keyword in Java ?
• If final variable is used in front of variable, we can’t change the value.
• If the variable is used in front of method, it can’t be overridden.
• If it is used in front of Class, class can’t be extended by any other class.

10) What is meant by static keyword in Java ?

A static is a member of a class that’s not associated with instance. So static members can be accessed without creating an instance of a class.
11) What is meant by JVM ?
JVM(Java Virtual Machine) is a run time environment for the compiled java class files. Main function of JVM is to convert byte code(.class file) to machine code and send appropriate commands to underlying machine for execution.
12) Can abstract class implements another interface ?
Yes. It’s just a special case of implementation by which subclasses are forced to implement the methods.
13) Can abstract class extend another abstract class?
Yes. It is perfectly valid for an abstract class to extend another abstract class.
14) Can a interface extend another interface?
Yes. An interface can extend another interface in Java.
15) What Is Stack?
• Each Java thread have a private JVM stack, created along with thread.
• Stack stores frames. Frames are used for storing data (Variable and Object Data as well as partial results) and to perform operations such as
o Dynamic linking
o Dispatch exceptions when error occurs
o Return values when methods are invoked. Since the stack can’t be accessed directly, it push and pop frames.
• It is not mandatory that the Java virtual machine stack had to be continuous.
• JVM throws StackOverflowError, if any computation inside a thread needs larger JVM stack than allocated .

16) What Is Heap?
• When JVM starts, heap is created
• Heap is the runtime data area of the JVM
• It is shared by all the threads inside the JVM
• It allocates memory for all class instances and arrays
• Heap storage for objects is reclaimed by garbage collector when it is not used.
• JVM throws OutOfMemoryError, If a computation needs more heap than what can be supplied by the automatic storage management system.

17) Can you explain about Upcasting and Downcasting in Java ?
• Upcasting : Casting a Sub class to Super class. Upcasting is called as widening.
• Downcasting : Casting a Super class to Sub class. Downcasting is called as narrowing.

18) Can you explain about Implicit and Explicit type casting ?

Implicit casting (widening conversion) :

When JVM encounters a data type of lower size which occupies less memory, it is assigned to a data type of higher size implicitly by the JVM. This is also known as automatic type conversion. For Example
int i = 1; // 4 bytes
double d = i; // 8 bytes

Explicit casting:

When a data type of higher size which occupies more memory, needs to be assigned to a data type of lower size, it is called explicit casting. This type of casting won’t be done implicitly by the JVM. This casting operation should be performed by the programmer. For example
double d = 1.0;
int i = (int) d;

19) Can you explain about markable interface in Java ?
Interfaces with no methods are known as Marker interface. Some of the markable interfaces are
java.lang.Cloneable
java.io.Serializable
java.util.EventListener
20) Can you explain about reflection in Java ?

If a programmer wants to access entities or invoke methods in a program dynamically, i.e. if the programmer is unaware of the methods and variables that needs to be invoked at runtime but unaware of it while coding, we can use reflection. For example
Method method = ABC.getClass().getMethod(“doSomething”, null);
method.invoke(ABC, null);
21) Can you explain about java.lang.class ?

When JVM creates an instance of a class, it creates an object “java.lang.Class object” which describes the type of the object. This class object is shared by all the objects of a class. If you want to access the class object of an instance, use getClass() method of the object. This method is inherited from java.lang.Object
Ex: Created two instances class called Programmer
Programmer A = new Programmer();
Programmer B = new Programmer();
// For check Instances
if(A.getClass() == B.getClass())
{
System.out.println(“A and B are instances of same class”);
}else{
System.out.println(“A and B are instances of different class”);
}

22) Can you explain about Singleton class in Java ?

Singleton class is used to control no of object created for a class, limiting the number to one. But if the situation changes in future, it allows to create more objects without affecting existing clients.
23) Can you explain about Static class in Java ?

A class can be made static provided that the class is a nested class. A nested class is class which is defined inside a class. But top class can’t me made static. Example :
public class Test
{
static class StaticInnerClass
{
public static void innerMethod()
{ System.out.println(“Static Inner Class!”); }
}
public static void main(String args[])
{
Test.StaticInnerClass.innerMethod();
}
}

24) Can you explain about volatile Keywords in Java ?
• Volatile keyword is used to indicate the threads using a common variable that, the variable which is declared as Volatile can be updated by multiple threads. So threads should not cache the threads locally and in turn should get the value for the variable from main memory.
• If a variable is declared as volatile, it won’t be serialized.

25) What are the advantages of organizing classes and interfaces into a package ?
• Determination of a category of a file is simplified.
• Name space collision is avoided.
• Access restriction can be applied with the use of packages.
• Packages provide reusability of code

26) Can you explain about Java naming convention ?

Common Naming conventions as below :
• package names always start with lowercase characters. Ex: java.util
• Class names always begin with a capital letter and followed next word start with a capital letter. Ex: GregorianCalendar
• Java Naming convention specifies that instances and other variables must start with lowercase followed next word should be capital letter. Ex : MyClass myClass = new MyClass();
• Constant variables are declared using “static final” modifiers. And such variables must contain only UpperCase charachters and multiple words must be seperated using ‘_’. Ex: static final char END_OF_FILE = ‘e’;
• Methods in Java also follow the same like Objects and variables. For example
void myMethod(){
String strVal = “ABCD”;
}
27) How to call a garbage collector in java?
System.gc() or Runtime.getRuntime().gc().

28) What are the new features available in Java 1.7 ?
• Strings in switch Statement
• Type Inference for Generic Instance Creation
• Multiple Exception Handling
• Support for Dynamic Languages
• Try with Resources
• Java nio Package
• Binary Literals, underscore in literals
• Diamond Syntax
• Automatic null Handling

29) What are the advantage of Inheritance in Java ?
• Re-usability : Inheritance helps derived class to use methods of base class without rewriting them
• Extensibility : Extending the base class logic as per business logic of the derived class
• Data hiding : Allows base class to keep some private data which can’t be altered by the derived class
30) Why String is immutable in Java ?
 String is a special type of immutable class. Immutable class is a class which once created, it’s contents can not be changed. Immutable objects are the objects whose state can’t be changed once constructed.
 
31) Can you explain about information hiding in Java ?

Information hiding helps objects to hide critical information from other other objects accessing it. It effectively decouples the method being invoked from the internal workings of a function. By doing so, object can change the hidden portions of the function without changing the calling code. Encapsulation is a common technique programmers use to implement information hiding.
32) Can you explain about encapsulation in Java ?

Encapsulation helps java to bind code and data it manipulates, restrict outside interference and misuse of data. It also hides irrelevant details of an object.
33) Can you explain about the access modifier in Java ?

Access modifiers specifies the access levels of a variable or method. Java access modifiers are public, private, protected, default modifier (Default access modifier).
Access Modifiers Same Class Same Package Subclass Other packages
public Yes Yes Yes Yes
protected Yes Yes Yes No
default Yes Yes No No
private Yes No No No

34) What is the difference between super() and this() in Java ?
If you want to access methods of the base class from derived class “super” keyword is used. To access methods of the same class “this” keyword is used.

35) Can you explain about the constructor in Java ?
• Java constructors are special methods that are called when an object is instantiated.
• When objects are instantiated, arguments passed to the constructor will initialized the variables in an object.
• Name of the constructor should be same as the name of the Class. It can’t have any return type.
• A class can have multiple constructors. Calling a constructor from another constructor in the same class is called Constructor chaining.
• All classes have a default empty constructor.

36) Can constructor take parameters ?

Yes. Constructor can take arguments.

37) Can you explain about the default constructor in Java ?

When a constructor is not specified explicitly, java compiler automatically creates a “Default Constructor”. When we creates and object instance, default constructor initialize variables with it’s default values.

38) What are the common reasons to define a default constructor ?
• To construct an object with default values.
• To initialize an object that doesn’t need parameters in that initialization process.
• To redefine the scope of the constructor. By making the default constructor private, Java prevents everyone other than the class from constructing an object.

39) Can you explain about native method in Java ?
• Native is non access modifier. It can be applied only to method.
• It indicates the Platform-Dependent implementation of method or code.

40) Can you explain about strictfp keyword in Java ?
If we want floating point values to be consistent across platforms, then we need to use “strictfp”as per IEEE 754 standard. When a program runs on multiple platforms, precision of floating point differ which in turn given different results. strictfp helps to enforce the precision across all platforms. For example
Class Level – public strictfp class StrictFpModifierExample{}
Method Level – public strictfp void example() {}

41) Can you explain about String pool ?

String Pool is a pool of strings stored in Java heap memory. String objects can be created either by new operator or by specifying the values in double quotes.
Case 1 : When a new string is created using double quotes, JVM searches string pool for the string with the same value. if it finds a string which matches the values, it will return the reference of the string. Else it will create a new string in the pool and returns that reference.
String s1 = “Cat”;
String s2 = “Cat”;
if(s1 == s2) System.out.println(“equal”); //Prints equal.
Case 2 : When new operator is used to create a string, String class will be forced to create a new String object. To put the newly created string into the pool or assign it to another string, use intern().
String n1 = new String(“ABCD”);
String n2 = new String(“ABCD”);
if(n1 == n2) System.out.println(“equal”); //No output.

42) Differences between String, StringBuffer and StringBuilder in Java ?

String StringBuffer StringBuilder
Immutable Mutable mutable
String operations such as append would be less efficient String operations such as append would be more efficient, String operations such as append would be more efficient
– synchronized Not synchronized.
– versions 1.4 or below you’ll have to use StringBuffer. StringBuilder was introduced in Java 1.5

43) What are the advantage of using unicode characters ?
• Much larger number of characters or group of characters
• Contains some non western European characters
• Supported by all modern technologies
• Enhance integration opportunities
• Easy conversion from legacy code pages

44) Can you explain about literals in Java ?

Literals are used to represent a fixed value in source code. Literals don’t require computation. For Example, we will have a look at using literals to assign a value to an int variable.
int Days = 7;
45) Is it possible to override an overloaded method in Java ?
Yes. We can override an overloaded method if that method in not a static or final.

46) What is the maximum size of an int ?

-(2 power 31) to (2 power 31-1) or -2,147,483,648 to 2,147,483,647

47) Can you explain about autoboxing and unboxing in Java ?

When primitive data types are automatically converted into it’s wrapper type, it is called boxing. The opposite operation of converting wrapper class objects to it’s primitive type is known as unboxing.
ArrayList<Integer> list = new ArrayList<Integer>();
list.add(1); //autoboxing – primitive to object
int number = list.get(0); // unboxing

48) How to change the heap size of a JVM ?

The old generation’s default heap size can be overridden by using the -Xms and -Xmx switches to specify the initial and maximum sizes respectively:
Format – java -Xms <initial size> -Xmx <maximum size> program
Example – java -Xms64m -Xmx128m Myprogram
49) Is it possible to have multiple public classes in Java ?
As per java language specification, there can be only one public class in a file (.java) and file name should be same as public class name. If you want another class accessible in other places, you may create a separate java file.
50) What are Variable Arguments or varargs?
Variable Arguments allow calling a method with different number of parameters. Consider the example method sum below. This sum method can be called with 1 int parameter or 2 int parameters or more int parameters.
//int(type) followed … (three dot’s) is syntax of a variable argument.
public int sum(int… numbers) {
//inside the method a variable argument is similar to an array.
//number can be treated as if it is declared as int[] numbers;
int sum = 0;
for (int number: numbers) {
sum += number;
}
return sum;
}

public static void main(String[] args) {
VariableArgumentExamples example = new VariableArgumentExamples();
//3 Arguments
System.out.println(example.sum(1, 4, 5));//10
//4 Arguments
System.out.println(example.sum(1, 4, 5, 20));//30
//0 Arguments
System.out.println(example.sum());//0
}
51) What are Asserts used for?
Assertions are introduced in Java 1.4. They enable you to validate assumptions. If an assert fails (i.e. returns false), AssertionError is thrown (if assertions are enabled). Basic assert is shown in the example below
private int computerSimpleInterest(int principal,float interest,int years){
assert(principal>0);
return 100;
}
52) When should Asserts be used?
Assertions should not be used to validate input data to a public method or command line argument. IllegalArgumentException would be a better option. In public method, only use assertions to check for cases which are never supposed to happen.
53) What is Garbage Collection?
Garbage Collection is a name given to automatic memory management in Java. Aim of Garbage Collection is to Keep as much of heap available (free) for the program as possible. JVM removes objects on the heap which no longer have references from the heap.
54) Can you explain Garbage Collection with an example?
Let’s say the below method is called from a function.
void method(){
Calendar calendar = new GregorianCalendar(2000,10,30);
System.out.println(calendar);
}
An object of the class GregorianCalendar is created on the heap by the first line of the function with one reference variable calendar.
After the function ends execution, the reference variable calendar is no longer valid. Hence, there are no references to the object created in the method.
JVM recognizes this and removes the object from the heap. This is called Garbage Collection.
55) When is Garbage Collection run?
Garbage Collection runs at the whims and fancies of the JVM (it isn’t as bad as that). Possible situations when Garbage Collection might run are
• when available memory on the heap is low
• when cpu is free
56) What are best practices on Garbage Collection?
Programmatically, we can request (remember it’s just a request – Not an order) JVM to run Garbage Collection by calling System.gc() method.
JVM might throw an OutOfMemoryException when memory is full and no objects on the heap are eligible for garbage collection.
finalize() method on the objected is run before the object is removed from the heap from the garbage collector. We recommend not to write any code in finalize();
57) What are Initialization Blocks?
Initialization Blocks – Code which runs when an object is created or a class is loaded
There are two types of Initialization Blocks
Static Initializer: Code that runs when a class is loaded.
Instance Initializer: Code that runs when a new object is created.
58) What is a Static Initializer?
Look at the example below:Code within static{ and } is called a static initializer. This is run only when class is first loaded. Only static variables can be accessed in a static initializer. Even though three instances are created static initializer is run only once.
public class InitializerExamples {
static int count;
int i;

static{
//This is a static initializers. Run only when Class is first loaded.
//Only static variables can be accessed
System.out.println(“Static Initializer”);
//i = 6;//COMPILER ERROR
System.out.println(“Count when Static Initializer is run is ” + count);
}

public static void main(String[] args) {
InitializerExamples example = new InitializerExamples();
InitializerExamples example2 = new InitializerExamples();
InitializerExamples example3 = new InitializerExamples();
}
}
Example Output
Static Initializer
Count when Static Initializer is run is 0
59) What is an Instance Initializer Block?
Let’s look at an example : Code within instance initializer is run every time an instance of the class is created.
public class InitializerExamples {
static int count;
int i;
{
//This is an instance initializers. Run every time an object is created.
//static and instance variables can be accessed
System.out.println(“Instance Initializer”);
i = 6;
count = count + 1;
System.out.println(“Count when Instance Initializer is run is ” + count);
}

public static void main(String[] args) {
InitializerExamples example = new InitializerExamples();
InitializerExamples example1 = new InitializerExamples();
InitializerExamples example2 = new InitializerExamples();
}

}
Example Output

Instance Initializer
Count when Instance Initializer is run is 1
Instance Initializer
Count when Instance Initializer is run is 2
Instance Initializer
Count when Instance Initializer is run is 3

60) What are Regular Expressions?
Regular Expressions make parsing, scanning and splitting a string very easy. We will first look at how you can evaluate a regular expressions in Java – using Patter, Matcher and Scanner classes. We will then look into how to write a regular expression.
61) What is Tokenizing?
Tokenizing means splitting a string into several sub strings based on delimiters. For example, delimiter ; splits the string ac;bd;def;e into four sub strings ac, bd, def and e.
Delimiter can in itself be any of the regular expression(s) we looked at earlier.
String.split(regex) function takes regex as an argument.
62) Can you give an example of Tokenizing?
private static void tokenize(String string,String regex) {
String[] tokens = string.split(regex);
System.out.println(Arrays.toString(tokens));
}

tokenize(“ac;bd;def;e”,”;”);//[ac, bd, def, e]

63) How can you Tokenize using Scanner Class?
private static void tokenizeUsingScanner(String string,String regex) {
Scanner scanner = new Scanner(string);
scanner.useDelimiter(regex);
List<String> matches = new ArrayList<String>();
while(scanner.hasNext()){
matches.add(scanner.next());
}
System.out.println(matches);
}

tokenizeUsingScanner(“ac;bd;def;e”,”;”);//[ac, bd, def, e]
64) How do you add hours to a date object?
Lets now look at adding a few hours to a date object. All date manipulation to date needs to be done by adding milliseconds to the date. For example, if we want to add 6 hour, we convert 6 hours into millseconds. 6 hours = 6 * 60 * 60 * 1000 milliseconds. Below examples shows specific code.
Date date = new Date();

//Increase time by 6 hrs
date.setTime(date.getTime() + 6 * 60 * 60 * 1000);
System.out.println(date);

//Decrease time by 6 hrs
date = new Date();
date.setTime(date.getTime() – 6 * 60 * 60 * 1000);
System.out.println(date);

SQL Server DBA Interview Questions

Top most important SQL Server DBA interview questions and answers by Experts:

Here is a list of Top most important SQL Server DBA interview questions and answers by Experts.If you want to download SQL Server DBA interview questions pdf free ,you can register with RVH techguru. Our experts prepared these SQL Server DBA interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in SQL Server DBA ,Register for SQL Server DBA online training here.
1.What purpose does the model database serve?
The model database, as its name implies, serves as the model (or template) for all databases created on the same instance. If the model database is modified, all subsequent databases created on that instance will pick up those changes, but earlier created databases will not. Note that TEMPDB is also created from model every time SQL Server starts up.
2.How do you trace the traffic hitting a SQL Server?
SQL profiler is the SQL Server utility you can use to trace the traffic on the SQL Server instance. Traces can be filtered to narrow down the transactions that are captured and reducing the overhead incurred for the trace. The trace files can be searched, saved off, and even replayed to facilitate troubleshooting.
3.What types of replication are supported in SQL Server?
SQL Server has three types of replication: Snapshot, Merge, and Transaction. Snapshot replication creates a snapshot of the data (point-in-time picture of the data) to deliver to the subscribers. This is a good type to use when the data changes infrequently, there is a small amount of data to replicate, or large changes occur over a small period of time.
Merge replication uses a snapshot to seed the replication. Changes on both sides of the publication are tracked so the subscriber can synchronize with the publisher when connected. A typical use for this type of replication is in a client and server scenario. A server would act as a central repository and multiple clients would independently update their copies of the data until connected. At which time, they would all send up their modifications to the central store.
Transaction replication also begins with a snapshot only this time changes are tracked as transactions (as the name implies). Changes are replicated from publisher to subscriber the same as they occurred on the publisher, in the same order as they occurred, and in near real time. This type of replication is useful when the subscriber needs to know every change that occurred to the data (not point-in-time), when the change volume is high, and when the subscriber needs near real-time access to the changes.
4.Why would you use SQL Agent?
SQL Agent is the job scheduling mechanism in SQL Server. Jobs can be scheduled to run at a set time or when a specific event occurs. Jobs can also be executed on demand. SQL Agent is most often used to schedule administrative jobs such as backups.
5.What happens on checkpoint?
Checkpoints, whether scheduled or manually executed, cause the transaction log to be truncated up to the beginning of the oldest open transaction (the active portion of the log). That is, the dirty pages from the buffer cache are written to disk. Storing committed transactions in the cache provides a performance gain for SQL Server. However, you do not want the transaction log to get too big because it might consume too many resources and, should your database fail, take too long to process to recover the database.
One important thing to note here is that SQL Server can only truncate up to the oldest open transaction. Therefore, if you are not seeing the expected relief from a checkpoint, it could very well be that someone forgot to commit or rollback their transaction. It is very important to finalize all transactions as soon as possible.
6.What is DBCC?
DBCC statements are Database Console Commands and come in four flavors: Maintenance, Informational, Validation, and Miscellaneous. Maintenance commands are those commands that allow the DBA to perform maintenance activities on the database such as shrinking a file. Informational commands provide feedback regarding the database such as providing information about the procedure cache. Validation commands include commands that validate the database such as the ever-popular CHECKDB. Finally, miscellaneous commands are those that obviously don’t fit in the other three categories. This includes statements like DBCC HELP, which provides the syntax for a given DBCC command.
7.How can you control the amount of free space in your index pages?
You can set the fill factor on your indexes. This tells SQL Server how much free space to leave in the index pages when re-indexing. The performance benefit here is fewer page splits (where SQL Server has to copy rows from one index page to another to make room for an inserted row) because there is room for growth built in to the index.
8.Why would you call Update Statistics?
Update Statistics is used to force a recalculation of query optimization statistics for a table or indexed view. Query optimization statistics are automatically recomputed, but in some cases, a query may benefit from updating those statistics more frequently. Beware though that re-computing the query statistics causes queries to be recompiled. This may or may not negate all performance gains you might have achieved by calling update statistics. In fact, it could have a negative impact on performance depending on the characteristics of the system.
9.What is a correlated sub-query?
A correlated sub-query is a nested query that is linked to the outer query. For instance, say I wanted to find all the employees who have not entered their time for the week. I could query the Employee table to get their first and last name, but I need to look at the TimeEntry table to see if they’ve entered their time or not. I can’t do a straight join here because I’m looking for the absence of time data, so I’ll do a correlated sub-query similar to this:
SELECT FirstName, LastName
FROM EMPLOYEE e
WHERE NOT EXISTS (SELECT 1 FROM TimeEntry te
WHERE te.EmpID = e.EmpID
AND te.WeekID = 35)
Notice that the inner query relates to the outer query on the employee ID, thus making it a correlated sub-query. The inner query will be evaluated once per outer query row.
10.What authentication modes does SQL Server support?
SQL Server supports Windows Authentication and mixed-mode. Mixed-mode allows you to use both Windows Authentication and SQL Server Authentication to log into your SQL Server. It’s important to note that if you use Windows Authentication, you will not be able to log in as sa.
11.Explain about your SQL Server DBA Experience?
This is a generic question often asked by many interviewers. Explain what are the different SQL Server Versions you have worked on, what kind of administration of those instances has been done by you. Your role and responsibilities carried out in your earlier projects that would be of significance to the potential employer. This is the answer that lets the interviewer know how suitable are you for the position to which you are being interviewed.
22.What are the different SQL Server Versions you have worked on?
The answer would be depending on the versions you have worked on, I would say I have experience working in SQL Server 7, SQL Server 2000, 2005 and 2008. If you have worked only the some version be honest in saying that, remember, no one would be working on all versions, it varies from individual to individual.[sociallocker]
23.What are the different types of Indexes available in SQL Server?
The simplest answer to this is “Clustered and Non-Clustered Indexes”. There are other types of Indexes what can be mentioned such as Unique, XML, Spatial and Filtered Indexes. More on these Indexes later.
24.What is the difference between Clustered and Non-Clustered Index?
 In a clustered index, the leaf level pages are the actual data pages of the table. When a clustered index is created on a table, the data pages are arranged accordingly based on the clustered index key. There can only be one Clustered index on a table.
In a Non-Clustered index, the leaf level pages does not contain data pages instead it contains pointers to the data pages. There can multiple non-clustered indexes on a single table.
25.What are the new features in SQL Server 2005 when compared to SQL Server 2000?
There are quite a lot of changes and enhancements in SQL Server 2005. Few of them are listed here :
Database Partitioning
Dynamic Management Views
System Catalog Views
Resource Database
Database Snapshots
SQL Server Integration Services
Support for Analysis Services on a a Failover Cluster.
Profiler being able to trace the MDX queries of the Analysis Server.
Peer-toPeer Replication
Database Mirroring
26.What are the High-Availability solutions in SQL Server and differentiate them briefly?
Failover Clustering, Database Mirroring, Log Shipping and Replication are the High-Availability features available in SQL Server. I would recommend reading this blog of mine which explains the differences between these 4 features. Comparing the High Availability Features in SQL Server 2005
27.How do you troubleshoot errors in a SQL Server Agent Job?
Inside SSMS, in Object explorer under SQL Server Agent look for Job Activity Monitor. The job activity monitor displays the current status of all the jobs on the instance. Choose the particular job which failed, right click and choose view history from the drop down menu. The execution history of the job is displayed and you may choose the execution time (if the job failed multiple times during the same day). There would information such as the time it took to execute that Job and details about the error occurred.
28.What is the default Port No on which SQL Server listens?
 433
29.How many files can a Database contain in SQL Server?How many types of data files exists in SQL Server? How many of those files can exist for a single database?
A Database can contain a maximum of 32,767 files.
There are Primarily 2 types of data files Primary data file and Secondary data file(s)
There can be only one Primary data file and multiple secondary data files as long as the total # of files is less than 32,767 files.
30.What is DCL?
DCL stands for Data Control Language.
31.What are the commands used in DCL?
GRANT, DENY and REVOKE.
32.What is Fill Factor?
Fill Factor is a setting that is applicable to Indexes in SQL Server. The fill factor value determines how much data is written to an index page when it is created / rebuilt.
33.What is the default fill factor value?
By default the fill factor value is set to 0.
34.Where do you find the default Index fill factor and how to change it?
The easiest way to find and change the default fill factor value is from Management Studio, right-click the SQL Server and choose properties. In the Server Properties, choose Database Settings, you should see the default fill factor value in the top section. You can change to a desired value there and click OK to save the changes.
The other option of viewing and changing this value is using sp_configure.
35.What is a system database and what is a user database?
 System databases are the default databases that are installed when the SQL Server is installed. Basically there are 4 system databases: Master, MSDB, TempDB and Model. It is highly recommended that these databases are not modified or altered for smooth functioning of the SQL System.
A user database is a database that we create to store data and start working with the data.
36.What are the recovery models for a database?
 There are 3 recovery models available for a database. Full, Bulk-Logged and Simple are the three recovery models available.
37.What is the importance of a recovery model?
Primarily, recovery model is chosen keeping in view the amount of data loss one can afford to. If one expects to have minimal or no data loss, choosing the Full recovery model is a good choice. Depending on the recovery model of a database, the behavior of database log file changes. I would recommend you read more material on log backups and log file behavior and so on to understand in depth.
38.What is Replication?
Replication is a feature in SQL Server that helps us publish database objects and data and copy (replicate) it to one or more destinations. It is often considered as one of the High-Availability options. One of the advantages with Replication is that it can be configured on databases which are in simple recovery model.
39.What the different types of Replication and why are they used?
There are basically 3 types of replication: Snapshot, Transactional and Merge Replication. The type of Replication you choose, depends on the requirements and/or the goals one is trying to achieve. For example Snapshot Replication is useful only when the data inside the tables does not change frequently and the amount of data is not too large, such as a monthly summary table or a product list table etc. Transactional Replication would useful when maintaining a copy of a transactional table such as sales [/sociallocker]

40.What is a Database?
A Database Administrator needs to know what a database is before they can administer it, right? At its most basic, a database is a collection of tables, structured in such a way that it can be navigated like you would any sort of table. If you remember in math class, you may have had a number of tables that allowed you to quickly find a value if you multiplied an x and y value together — or in this case, what it would be if you were looking for a particular row and column value.
41.What is a query?
A query in normal terms is a question, simple enough. It is the statement that is talking to the database in order to Create, Read, Update or Delete (CRUD) data. While many times a query is an actual question asking for an answer, it can also be the statement to modify, insert, or remove data in the database as well.
45.What is SQL?
Structured Query Language is the basic way of asking a database server to talk to you. Whether that is in the context of asking it a question, giving it answers to questions it is asking you, or updating answers that have already been stored in the database. The art of asking the right question is critical to getting back the right data you need, which is incredibly valuable when dealing with databases, as it is very easy to receive far more data than you know what to do with, or nothing at all.
46.What does ‘SELECT’ do?
SELECT in the terms of an SQL query triggers a question to the database. It looks across the specified table(s), finds the data you are looking for and then presents it to the user for consideration. Depending on the query, this can be an awful lot of data, so again, asking the right question is critical.
47.What is a primary key?
A primary key is usually used as the index for a particular table — a value that the table can depend upon to be a reliable unique value in every row. When trying to pull data for a particular row, the primary key will normally be used to pull that information, usually a numeric value. For example, if you are trying to pull up data on a specific person, and that database is using their unencrypted ssn as the primary key (naughty), then that could be used in the query to identify that particular row since there could be other people present in the database with that specific name or other identifying characteristics.
48.What is a Database Management System?
A Database Management System, or DBMS, is essentially the application that handles the heavy lifting between you (the user), and the raw data. The database itself is just that — the database; it cannot alter its own data any more than the average person can re-arrange their genetic code. The DBMS is what you are talking to when you are asking the questions. It is what looks at your question, thinks about it for a while, goes to the database, picks up the data, hands it back to you, and asks you to come again.
49.What is the difference between a Navigational database and a Relational database?
The best way to describe a Navigational DBMS is through that of a tree. Each value was associated with another through the use of a parent, most of the time with no other direct way to access the data. Relational Databases on the other hand use values common to multiple tables to establish a unique key — making sure that they are talking on the same page so that there are many, many ways to get to the same place. To put it another way, if you were trying to get from point A to point B, a navigational database would have one specific path to get there — via a freeway. A relational database on the other hand would have options for taking the freeway, a back road, a boat, a plane, a bus and sometimes a rocket — provided that each of those methods were set up correctly to talk to each other. Most modern databases use the relational database model.
50.Why do most database types not talk to each other?
In a word: money. In three words: a lotttta money. Different database vendors spend a huge amount of research time trying to find ways to give them a leg up on the competition; whether that may be by performance, storage capacity, longevity, reliability, scalability, the list goes on and on. As a result, trying to be compatible and backwards engineer every single feature of a particular database type is difficult in the extreme before you even get to the patent violations. Most databases can be simplified down to filetypes like .csv files, which can be used to transport basic data from vendor to vendor. That being said however, there would be a lot lost in translation without help from higher up.
51.What is a Frontend?
For those that don’t want to see row upon row upon row of data in front of them until they go cross-eyed, a frontend is essential. In essence a management program, a frontend allows admins to be able to view and modify high level database functions without the need to use the command line for every single thing. This can be extremely useful not only for efficiency, but also for safety, as it can prevent accidental data modification. It can also allow users that are more used to a GUI application most of the utility that the CLI permits.
52.What is a ‘join’?
Well when two tables love each other very much…not that much happens actually. However when you need to search across multiple tables simultaneously, a join can help make that happen. For example, if you were searching for information on a particular product and one table has the description while the other has pricing information, you can use a join to search across both tables simultaneously using a single query.
53.What is a foreign key?
When using a join or other type of query that goes across multiple tables, it can sometimes be difficult to make sure they are talking on the same page. A primary key can help with this, but sometimes this is impractical, and thus you need a secondary value that is consistent across multiple tables. For example, say that in a series of tables for product listings you have your primary key assigned to an auto-increment ID based on when the product was entered (a typical setup), and then none of these rows are able to line up with their counterparts in other tables. So if you have one table for product listings, another for price information, another for reviews, etc. — this could be a fairly major problem. However, if you know for a certainty that your part numbers for these products are going to be unique values, you can use that as a foreign key and suddenly everything lines up all nice and neat. This is possible since it exists in more than one table, and since is being referenced from outside its own table; it is designated ‘foreign’. This does not mean it still could not be the primary key for that particular table as well, it just means it has a reference that can be looked to from another point of view.
54.What is SQL Injection?
Also known as asking a question and getting the answer you want, rather than the answer they want to give you (anybody that has tried to navigate certain nameless support phones knows that this isn’t necessarily a bad thing); however in the context of a database application, this can be “a very bad thing”™. For instance, say that you are on an online banking website. You’re at the login screen, and it is waiting for you to enter your login and password so it can display your particular financial information. But what if you want to see the listing of everybody else that banks at this particular location? Depending on how the bank’s site is hardened against such an attack, you could get their personal information, current balances, PIN numbers, or even worse, enter your own data directly into the database — able to create new accounts, set up transaction history, active balances, the list goes on and on.
55.What is input sterilization?
One of the main answers to SQL Injection, input sterilization allows the database to selectively ignore data coming in from an input field and strip out non-required data. For example, if a field is expecting only a numeric value, there is no need for letters or symbols to be present in the user input. Therefore, these values can be safely ignored but still keep the functionality of the form intact. While not an end-all beat-all, it goes a long way to helping mitigate attacks on this vector.
SQL Vs NoSQL
NoSQL (Also called Not Only SQL), is a different form of database than the standard relational type. While it can use a lot of the same kinds of query language, it doesn’t necessarily use the same type of table structure that standard relational databases use, and thus in some cases can be more efficient. That efficiency depends greatly on its application however, and many times you will see NoSQL used in Big Data crunching and analysis applications that require real-time feedback.
56.What is a ‘Flat File’?
A flatfile is a catch-all term used for concepts like Comma Separated Values (.csv). While there are a lot of different ways to create such a file, they all share ideas that they can be created and manipulated easily and without necessarily requiring a standard database application. These can also be used to transfer data from system to system due to their lightweight status. In some cases, these have been replaced by XML files, however XML can when compared to certain kinds of flatfiles, be very large.
57.I have a database that was built in MySQL, and I need the data to be moved over to Microsoft SQL Server. How would I do this?
The easy answer would be to contact Microsoft Tech Support and bring your checkbook. A more difficult answer would be to bring it down to a .csv file and then import it into SQL Server, but without a specialty conversion utility you may lose some program-specific specific tricks, thus requiring some rebuilding once the conversion is complete. This is not saying that this would work in all cases, but it is at least an option.
58.What is the difference between ‘=’ and ‘LIKE’?
When crafting a query, or using programming to display data in certain ways depending on the values being returned, you may want to think that these can be used interchangeably. There is one big difference, however: equal means equal. The value being returned must match the value it is being compared to 100%. LIKE, however, can be used with a number of different wildcard mechanics, allowing you to be a bit more flexible in your rules.
59.What is a Null Value?
A Null Value is an absence of data. This one is a bit misleading sometimes, because depending on who you ask, it can be considered many possible things. “Null equals 0”- Not in this context, because 0 is a value. “Null equals Empty” — closer, but again sometimes an empty value can still be considered a value depending on how the field is structured. If a column allows for null values, and no value is submitted, then it allows it to be Null.
60.What does ‘INSERT’ do?
INSERT submits data into a database as a new row, usually through the use of a form. While forms can take many…forms…, the most common uses are through either a dedicated application or through the use of an HTML form. Clicking on the ‘submit’ button will trigger the built in form reaction to scan the form for particular fields, making sure the required ones are entered correctly, make sure the user isn’t being naughty in what they are trying to enter, then submit the data to the database.
61.What does ‘DROP’ do?
DROP removes a table from a database or a database from a server. A very dangerous command indeed, it is only to be used in situations that absolutely require it, as unless you have a backup of it handy, there is no coming back from this.
62.What is the difference between T-SQL and PL/SQL?
T-SQL or Transact-SQL is Microsoft’s version of SQL. The main additions Microsoft made to the main branch of SQL involve the addition of procedures or routines — scripts essentially — that can be run under certain criteria. PL/SQL, on the other hand, is Oracle’s version of SQL, and conceptually the two are very similar. However, because of the nature in how they were developed, trying to move data from one to the other involves quite a bit of work. The main differences deal with how they multi-task and how they lock elements when they are in use.
63.What does ‘UPDATE’ do?
UPDATE allows values to be modified where they meet specific criteria. For example, say that you were on Amazon and were about to move. As a result, you would want to adjust your mailing address so that you actually got your stuff. You would therefore go into your settings and it would show you your current address. Modifying this address and then submitting the form would update your address based on your particular user profile. If it updated anybody else’s address to match that would be a serious problem — at least for the person doing the paying.
64.Why do database servers benefit from a lot of memory, and why do 64-bit operating systems help in this regard?
Database servers like to cache as much data as possible when they are reading it a lot. Storing this information in active memory is a lot faster than trying to find it again from the hard disk or other media. Therefore more memory = faster response time = better performance. The problem is that for most operating systems the maximum amount of memory that can be used by a 32-bit OS is 4 gigabytes. While in years past this would have been an inconceivable number, today it is a drop in the bucket. 64-bit operating systems resolve this issue by being able to handle memory to 192 gigabytes currently for Windows, while Linux can theoretically go much higher at present, and these numbers will only climb higher and higher.
65.Why is it a bad idea to run a test on a live database?
On a test database, it’s relatively easy to keep the performance variables to a minimum. On a live database however, it needs to be functioning for all users all the time. Running untested code on a production database can not only reduce performance, but also create unforeseen instability in the server itself — potentially causing crashes and data corruption.
66.Why is it difficult to use standard file by file backup methods on an active database server?
This problem is twofold. First, many database servers place locks on database files that are currently in use. Most backup programs that try to do a file-by-file backup will therefore be unable to create a copy of this file, as they cannot get exclusive permissions to it. Second, while some database servers have only a single file to backup a database, others have multiple files that can be stored in different locations across possibly multiple physical hard disks. The problem can be resolved in one of two potential ways. First, using the backup method within the database server itself. Some programs such as Microsoft SQL Server allow you to create a scheduled backup directly within the server application to a location of your choosing. Others require you to use a scheduled task or another on-demand type of backup solution. The second would be to use a backup application that can talk directly to the database server, allowing the database to be backed up using a different technique.
67.When would you use an offline backup method versus an online backup?
If the above methods are unavailable when trying to create a backup solution, another potential method is temporarily taking down the database or database server in order to create a file-by-file backup. The problem with this method is that if the server goes down incorrectly, the backups could be flagged as bad and thus unusable. Periodically testing your backups to make sure they are working properly is strongly recommended, regardless of what method you use to create them.
68.What is Replication?
Database replication allows for real-time automated backups between multiple database servers. This allows for the creation of either a fall-over server, or warm backup for use in case the main server goes down.
Is data in databases encrypted by default?
While most database servers support some form of encryption out of the box, it is not enabled by default due to performance hits and security concerns.
69.How would you store files within a database?
Two common ways to store files for use by a database are either within the operating system’s file system, or within a field of the table itself. Uploading and storing the files outside of the database makes for faster creation of the application, and can be more efficient if the file sizes are larger, but can potentially cause security issues if the files are not secured correctly. On the other hand, the files can also be stored directly within the database using a BLOB-type field. A BLOB is a Binary Large Object, essentially an empty area where a file can be uploaded to but not exceed a specified limit. Like int in the example above, blob has a number of different potential sizes, depending on the type used. Bear in mind there are other methods for storing and accessing files in a database server, these two are merely the most common.
70.When would you use ‘char’ versus ‘varchar’?
This is a bit of a difficult question, mostly because it depends so much on what your application is. For example, if you have a form field that can be nearly any length and changes every single time, then varchar is a much more practical choice, since it gives you much more flexibility. If however you have a field where every value is going to be exactly the same length, then you can get more efficient performance out of a char. Again, it depends on exactly what your application is, and how you plan to cook it — seasoning as you see fit.
71.What is XML?
Extensible Markup Language (XML) is a fast way to display data that not only conforms to a structure that can be read by machines, but is also easily understandable by humans. Because they can be dynamically and manually generated in many different ways, they are easy to produce and map to; and because they retain the same structure despite the data being updated, they can be relied upon for automatic functions such as RSS aggregation.
72.What shows that a database server is running?
<Insert joke about needing to catch it here/> Database servers run as services or daemons, most times in the background without the necessity to see that they are running in order to interact with them. When things go sideways however, being able to verify that the service is in fact up and running can be an excellent place to start troubleshooting. Checking under the services area of your particular operating system, whether that be by GUI or by CLI, can show you that the service is started or not, thus allowing you either to start or restart it as need be.
73.What is WYSIWYG?
What You See Is What You Get. A mouthful of an acronym, it allows for the creation of an application that is consistent regardless of how it is viewed — whether on the design screen, being viewed in a browser or being printed. Creating an interface to a database that is not only functional but also looks nice is a trick in itself, and can take a lot of work to get it just right.
74.Why is it frowned upon to use ‘SELECT * ..’ in a large database?
Picture it like a group of people in line for a bathroom, and every single person that was going in there was going to use the toilet, change their clothes, take a shower, iron their jacket, take another shower, etc. There is only so much area that can be used efficiently before you start to get a queue, slowing down the whole operation that can eventually cause the entire thing to collapse under lack of toilet paper. You can quickly get back more than you can use or understand, so optimization is key when creating queries and asking only what you need to get the question answered.
75.How would you get the quantity of results from a query?
COUNT() is the main supported way to be able to get the number of returned results from a query. While there are many other options such as mysql_num_rows, these are considered obsolete and are being removed.
76.What is a Database Schema?
If you’ve ever seen one of those Visio diagrams with 40 different tables with lines connecting particular columns on one with those on another, that’s a database schema. Essentially a two-dimensional representation of how each table talks to other ones, it is the way to view the design of a database as a single entity and not as a jumble of different tables.
77.What are Nested Queries?
A query within a query, this particular method can be tremendously difficult to troubleshoot and even harder to manage without a lot of overhead. In most cases, a nested query can be replaced with a JOIN, allowing for much more efficient use of resources.
78.What is ODBC?
Open Database Connectivity is a way to make different kinds of frontends talk to different data sources (DSNs) such as Databases. The specifics available depend on the type of application being used, the driver being used and the backend to which it is being applied.
79.For Oracle systems, what is OFA?
Optimal Flexible Architecture (OFA) is the recommended layout for installing and configuring an Oracle database.
80.For Oracle systems, what is error “ORA-01034”?
The full error is “ORA-01034: ORACLE not available”. While there are many potential causes, the most common is that the service is just not running. The resolution is to start the service, then see if the error comes back.
81.What is Normalization?
When most people first start working with databases, the first instinct is to create massive tables for storing data — one place, one query — keeps things simple. However, as they grow to unmanageable levels, it is a good idea to look into Database Normalization. This idea allows for data to be split off into smaller more efficient tables that (hopefully) reduce the amount of duplicate data. In this way, smaller queries can be run on individual tables instead of having everybody always talking to one big one — thus improving performance.
82.For Microsoft SQL Server, what is a DMV?
Dynamic Management Views are functions built into Microsoft SQL Server that allow for troubleshooting, diagnostics and server health monitoring.
83.What are the default ports for MySQL, SQL Server and Oracle, and can/should this be changed?
The default port for MySQL is 3306, and can be changed in Windows as noted in this article or in *nix as noted in this article. The default port for Microsoft SQL Server is 1433, and can be changed as noted in this article. The default port for Oracle is 1521, and can be changed as noted in this article. Depending on your security stance, changing the port that your database server uses can be a good way to lower your profile and reduce the amount of unauthorized access attempts against the server.
84.For Microsoft SQL Server, What is Log Shipping?
A form of backup on Microsoft SQL Server, Log Shipping is similar to replication and allows for rapid failover if the main server goes down. One thing to bear in mind, however, is that a log shipping based failover must be activated manually; it will not switch over automatically.
85.For Microsoft SQL Server, what is DBCC?
Database Console Commands (DBCC) are a series of utilities for SQL Server designed for maintenance and reporting. A full list of the commands can be found here.
86.What is Cloud Computing?
Cloud Computing is usually a catch all term for data being stored “over there”. Placing high-requirement applications onto dedicated hosting services can be beneficial depending on the application, however it can also cause catastrophic security problems and availability issues. It is therefore highly recommended to keep important data in-house, and only outsource in situations that it cannot be avoided. Cloud Computing, Big Data and Data Mining are many times talked about in the same sentence since processing power required for one usually means the others become viable either as a requirement or a side effect.

 

 

SSIS SSRS SSAS Interview Questions

Top most important SSIS SSRS SSAS interview questions and answers by Experts:

Here is a list of Top most important SSIS SSRS SSAS interview questions and answers by Experts.If you want to download SSIS SSRS SSAS interview questions pdf free ,you can register with RVH techguru. Our experts prepared these SSIS SSRS SSAS interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in SSIS SSRS SSAS ,Register for SSIS SSRS SSAS online training here.

 

1.What do we mean by dataflow in SSIS?
Data flow is nothing but the flow of data from the corresponding sources to the referred destinations. In this process, the data transformations make changes to the data to make it ready for the data warehouse.
2•What is a breakpoint in SSIS? How is it setup? How do you disable it?
A breakpoint is a stopping point in the code. The breakpoint can give the Developer\DBA an
opportunity to review the status of the data, variables and the overall status of the SSIS package.
10 unique conditions exist for each breakpoint.
Breakpoints are setup in BIDS. In BIDS, navigate to the control flow interface. Right click on the
object where you want to set the breakpoint and select the ‘Edit Breakpoints…’ option.
3•Can you name 5 or more of the native SSIS connection managers?
1) OLEDB connection – Used to connect to any data source requiring an OLEDB connection (i.e.,
SQL Server 2000)
2) Flat file connection – Used to make a connection to a single file in the File System. Required for reading information from a File System flat file
3) ADO.Net connection – Uses the .Net Provider to make a connection to SQL Server 2005 or other
connection exposed through managed code (like C#) in a custom task
4) Analysis Services connection – Used to make a connection to an Analysis Services database or project. Required for the Analysis Services DDL Task and Analysis Services Processing Task
5) File connection – Used to reference a file or folder. The options are to either use or create a file or folder
6) Excel
4• What is the use of Bulk Insert Task in SSIS?
Bulk Insert Task is used to upload large amount of data from flat files into Sql Server. It supports only OLE DB connections for destination database.
5• What is Conditional Split transformation in SSIS?
This is just like IF condition which checks for the given condition and based on the condition evaluation, the output will be sent to the appropriate OUTPUT path. It has ONE input and MANY outputs. Conditional Split transformation is used to send paths to different outputs based on some conditions. For example, we can organize the transform for the students in a class who have marks greater than 40 to one path and the students who score less than 40 to another path.
6• How do you eliminate quotes from being uploaded from a flat file to SQL Server?
This can be done using TEXT QUALIFIER property. In the SSIS package on the Flat File Connection Manager Editor, enter quotes into the Text qualifier field then preview the data to ensure the quotes are not included.
7• Can you explain how to setup a checkpoint file in SSIS?
The following items need to be configured on the properties tab for SSIS package:
CheckpointFileName – Specify the full path to the Checkpoint file that the package uses to save the value of package variables and log completed tasks. Rather than using a hard-coded path as shown above, it’s a good idea to use an expression that concatenates a path defined in a package variable and the package name.
CheckpointUsage – Determines if/how checkpoints are used. Choose from these options: Never(default), IfExists, or Always. Never indicates that you are not using Checkpoints. IfExists is the typical setting and implements the restart at the point of failure behavior. If a Checkpoint file is found it is used to restore package variable values and restart at the point of failure. If a Checkpoint file is not found the package starts execution with the first task. The Always choice raises an error if the Checkpoint file does not exist.
SaveCheckpoints – Choose from these options: True or False (default). You must select True to implement the Checkpoint behavior.
8• What are the different values you can set for CheckpointUsage property ?
There are three values, which describe how a checkpoint file is used during package execution:
1) Never: The package will not use a checkpoint file and therefore will never restart.
2) If Exists: If a checkpoint file exists in the place you specified for the CheckpointFilename property, then it will be used, and the package will restart according to the checkpoints written.
3) Always: The package will always use a checkpoint file to restart, and if one does not exist, the package will fail.
9• What is the ONLY Property you need to set on TASKS in order to configure CHECKPOINTS to RESTART package from failure?
The one property you have to set on the task is FailPackageOnFailure. This must be set for each task or container that you want to be the point for a checkpoint and restart. If you do not set this property to true and the task fails, no file will be written, and the next time you invoke the package, it will start from the beginning again.
10• Where can we set the CHECKPOINTS, in DataFlow or ControlFlow ?
Checkpoints only happen at the Control Flow; it is not possible to checkpoint transformations or restart inside a Data Flow. The Data Flow Task can be a checkpoint, but it is treated as any other task.
11• Can you explain different options for dynamic configurations in SSIS?
1) XML file
2) custom variables
3) Database per environment with the variables
4) Use a centralized database with all variables
12• What is the use of Percentage Sampling transformation in SSIS?
Percentage Sampling transformation is generally used for data mining. This transformation builds a random sample of set of output rows by choosing specified percentage of input rows. For example if the input has 1000 rows and if I specify 10 as percentage sample then the transformation returns 10% of the RANDOM records from the input data.
13• What is the use of Term Extraction transformation in SSIS?
Term Extraction transformation is used to extract nouns or noun phrases or both noun and noun phrases only from English text. It extracts terms from text in a transformation input column and then writes the terms to a transformation output column. It can be also used to find out the content of a dataset.
14• What is Data Viewer and what are the different types of Data Viewers in SSIS?
A Data Viewer allows viewing data at a point of time at runtime. If data viewer is placed before and after the Aggregate transform, we can see data flowing to the transformation at the runtime and how it looks like after the transformation occurred. The different types of data viewers are:
1. Grid
2. Histogram
3. Scatter Plot
4. Column Chart.
15• What is Ignore Failure option in SSIS?
In Ignore Failure option, the error will be ignored and the data row will be directed to continue on the next transformation. Let’s say you have some JUNK data(wrong type of data or JUNK data) flowing from source, then using this option in SSIS we can REDIRECT the junk data records to another transformation instead of FAILING the package. This helps to MOVE only valid data to destination and JUNK can be captured into separate file.
16• Which are the different types of Control Flow components in SSIS?
The different types of Control Flow components are: Data Flow Tasks, SQL Server Tasks, Data Preparation Tasks, Work flow Tasks, Scripting Tasks, Analysis Services Tasks, Maintenance Tasks, Containers.
17• What are containers? What are the different types of containers in SSIS?
Containers are objects that provide structures to packages and extra functionality to tasks. There are four types of containers in SSIS, they are: Foreach Loop Container, For Loop Container, Sequence Container and Task Host Container.
18• What are the different types of Data flow components in SSIS?
There are 3 data flow components in SSIS.
1. Sources
2. Transformations
3. Destinations
19• What are the different types of data sources available in SSIS?
There are 7 types of data sources provided by SSIS: a.) Data Reader source b.) Excel source c.) Flat file source d.) OLEDB source e.) Raw file source f.) XML source g.) Script component
20• What is SSIS Designer?
It is a graphical tool for creating packages. It has 4 tabs: Control Flow, Data Flow, Event Handlers and Package Explorer.
21• What is Control Flow tab?
It is the tab in SSIS designer where various Tasks can be arranged and configured. This is the tab where we provide and control the program flow of the project.
22• What is Data Flow tab?
This is the tab where we do all the work related to ETL job. It is the tab in SSIS Designer where we can extract data from sources, transform the data and then load them into destinations.
23• What is the function of control flow tab in SSIS?
On the control flow tab, the tasks including dataflow task, containers and precedence constraints that connect containers and tasks can be arranged and configured.
24• What is the function of Event handlers tab in SSIS?
On the Event handlers tab, workflows can be configured to respond to package events.
For example, we can configure Work Flow when ANY task Failes or Stops or Starts ..
25• What is the function of Package explorer tab in SSIS?
This tab provides an explorer view of the package. You can see what is happening in the package. The Package is a container at the top of the hierarchy.
26• What is Solution Explorer?
It is a place in SSIS Designer where all the projects, Data Sources, Data Source Views and other miscellaneous files can be viewed and accessed for modification.
27• How do we convert data type in SSIS?
The Data Conversion Transformation in SSIS converts the data type of an input column to a different data type.
28• How are variables useful in ssis package?
Variables can provide communication among objects in the package. Variables can provide communication between parent and child packages. Variables can also be used in expressions and scripts. This helps in providing dynamic values to tasks.
29• Explain Aggregate Transformation in SSIS?
It aggregates data, similar you do in applying TSQL functions like Group By, Min, Max, Avg, and Count. For example you get total quantity and Total line item for each product in Aggregate Transformation Editor. First you determine input columns, then output column name in Output Alias table in datagrid, and also operations for each Output Alias in Operation columns of the same datagrid. Some of operation functions listed below :
• Group By
• Average
• Count
• Count Distinct : count distinct and non null column value
• Min, Max, Sum
In Advanced tab, you can do some optimization here, such as setting up Key Scale option (low, medium, high), Count Distinct scale option (low, medium, high), Auto Extend factor and Warn On Division By Zero. If you check Warn On Division By Zero, the component will give warning instead of error. Key Scale option will optimize transformation cache to certain number of key threshold. If you set it low, optimization will target to 500,000 keys written to cache, medium can handle up to 5 million keys, and high can handle up to 25 million keys, or you can specify particular number of keys here. Default value is unspecified. Similar to number of keys for Count Distinct scale option. It is used to optimize number of distinct value written to memory, default value is unspecified. Auto Extend Factor is used when you want some portion of memory is used for this component. Default value is 25% of memory.
30• Explain Audit Transformation ?
It allows you to add auditing information as required in auditing world specified by HIPPA and Sarbanes-Oxley (SOX). Auditing options that you can add to transformed data through this transformation are :
1. Execution of Instance GUID : ID of execution instance of the package
2. PackageID : ID of the package
3. PackageName
4. VersionID : GUID version of the package
5. Execution StartTime
6. MachineName
7. UserName
8. TaskName
9. TaskID : uniqueidentifier type of the data flow task that contains audit transformation.
31• Explain Character Map Transformation?
It transforms some character. It gives options whether output result will override the existing column or add to new column. If you define it as new column, specify new column name. Operations available here are:
1. Uppercase
2. Lowercase
3. Byte reversal : such as from 0×1234 to 0×4321
4. Full width
5. Half width
6. Hiragana/katakana/traditional Chinese/simplified Chinese
7. Linguistic casing
32• Explain Conditional split Transformation ?
It functions as if…then…else construct. It enables send input data to a satisfied conditional branch. For example you want to split product quantity between less than 500 and greater or equal to 500. You can give the conditional a name that easily identifies its purpose. Else section will be covered in Default Output Column name.
After you configure the component, it connect to subsequent transformation/destination, when connected, it pops up dialog box to let you choose which conditional options will apply to the destination transformation/destination.
33• Explain Copy column Transformation?
This component simply copies a column to another new column. Just like ALIAS Column in T-Sql.
34• Explain Data conversion Transformation?
This component does conversion data type, similar to TSQL function CAST or CONVERT. If you wish to convery the data from one type to another then this is the best bet. But please make sure that you have COMPATABLE data in the column.
35• Explain Data Mining query Transformation?
This component does prediction on the data or fills gap on it. Some good scenarios uses this component is:
1. Take some input columns as number of children, domestic income, and marital income to predict whether someone owns a house or not.
2. Take prediction what a customer would buy based analysis buying pattern on their shopping cart.
3. Filling blank data or default values when customer doesn’t fill some items in the questionnaire.
36• Explain Derived column Transformation?
Derived column creates new column or put manipulation of several columns into new column. You can directly copy existing or create a new column using more than one column also.
37• Explain Merge Transformation?
Merge transformation merges two paths into single path. It is useful when you want to break out data into path that handles errors after the errors are handled, the data are merge back into downstream or you want to merge 2 data sources. It is similar with Union All transformation, but Merge has some restrictions :
1. Data should be in sorted order
2. Data type , data length and other meta data attribute must be similar before merged.
38• Explain Merge Join Transformation?
Merge Join transformation will merge output from 2 inputs and doing INNER or OUTER join on the data. But if you the data come from 1 OLEDB data source, it is better you join through SQL query rather than using Merge Join transformation. Merge Join is intended to join 2 different data source.
39• Explain Multicast Transformation?
This transformation sends output to multiple output paths with no conditional as Conditional Split does. Takes ONE Input and makes the COPY of data and passes the same data through many outputs. In simple Give one input and take many outputs of the same data.
40• Explain Percentage and row sampling Transformations?
This transformation will take data from source and randomly sampling data. It gives you 2 outputs. First is selected data and second one is unselected data. It is used in situation where you train data mining model. These two are used to take the SAMPLE of data from the input data.
41• Explain Sort Transformation?
This component will sort data, similar in TSQL command ORDER BY. Some transformations need sorted data.
42• Explain Union all Transformation?
It works in opposite way to Merge transformation. It can take output from more than 2 input paths and combines into single output path.
43• What r the possible locations to save SSIS package?
You can save a package wherever you want.
SQL Server
Package Store
File System
44• What is a package?
A discrete executable unit of work composed of a collection of control flow and other objects, including data sources, transformations, process sequence, and rules, errors and event handling, and data destinations.
45• What is a workflow in SSIS?
A workflow is a set of instructions on how to execute tasks.
(It is a set of instructions on how to execute tasks such as sessions, emails and shell commands. a workflow is created form work flow mgr.
46• What is the diff between control flow Items and data flow Items?
The control flow is the highest level control process. It allows you to manage the run-time process activities of data flow and other processes within a package.
When we want to extract, transform and load data within a package. You add an SSIS dataflow task to the package control flow.
47• What are the main component of SSIS(project-architecture)?
SSIS archItecture has 4 main components
1.ssis service
2.ssis runtime engine & runtime executables
3.ssis dataflow engine & dataflow components
4.ssis clients
48• Different components in SSIS package?
Control flow
Data flow
Event handler
Package explorer
49• What are Connection Managers?
It is a bridge b/w package object and physical data. It provides logical representation of a connection at design time the properties of the connection mgr describes the physical connection that integration services creates when the package is run.
50• What is environment variable in SSIS?
An environment variable configuration sets a package property equal to the value in an environment variable.
Environmental configurations are useful for configuring properties that are dependent on the computer that is executing the package.
51• How to provide securIty to packages?
We can provide security in two ways
1. Package encryption
2. Password protection.
52• What are Precedence constraints?
Constraints that link executable, container, and tasks wIthin the package control flow and specify condItion that determine the sequence and condItions for determine whether executable run.
53• What is Design time Deployment in SSIS ?
When you run a package from with in BIDS,it is built and temporarily deployed to the folder. By default the package will be deployed to the BIN folder in the Package’s Project folder and you can configure for custom folder for deployment. When the Package’s execution is completed and stopped in BIDS,the deployed package will be deleted and this is called as Design Time Deployment.

54. Explain architecture of SSIS?
SSIS architecture consists of four key parts:
a) Integration Services service: monitors running Integration Services packages and manages the storage of packages.
b) Integration Services object model: includes managed API for accessing Integration Services tools, command-line utilities, and custom applications.
c) Integration Services runtime and run-time executables: it saves the layout of packages, runs packages, and provides support for logging, breakpoints, configuration, connections, and transactions. The Integration Services run-time executables are the package, containers, tasks, and event handlers that Integration Services includes, and custom tasks.
d) Data flow engine: provides the in-memory buffers that move data from source to destination.
55.How would you do Logging in SSIS?
Logging Configuration provides an inbuilt feature which can log the detail of various events like onError, onWarning etc to the various options say a flat file, SqlServer table, XML or SQL Profiler.

56. How would you do Error Handling?
A SSIS package could mainly have two types of errors
a) Procedure Error: Can be handled in Control flow through the precedence control and redirecting the execution flow.
b) Data Error: is handled in DATA FLOW TASK buy redirecting the data flow using Error Output of a component.

57. How to pass property value at Run time? How do you implement Package Configuration?
A property value like connection string for a Connection Manager can be passed to the pkg using package configurations.Package Configuration provides different options like XML File, Environment Variables, SQL Server Table, Registry Value or Parent package variable.

58. How would you deploy a SSIS Package on production?
A) Through Manifest
1. Create deployment utility by setting its propery as true .
2. It will be created in the bin folder of the solution as soon as package is build.
3. Copy all the files in the utility and use manifest file to deply it on the Prod.
B) Using DtsExec.exe utility
C)Import Package directly in MSDB from SSMS by logging in Integration Services.

59. Difference between DTS and SSIS?
Every thing except both are product of Microsoft.

60. What is Execution Tree?

Execution trees demonstrate how package uses buffers and threads. At run time, the data flow engine breaks down Data Flow task operations into execution trees. These execution trees specify how buffers and threads are allocated in the package. Each tree creates a new buffer and may execute on a different thread. When a new buffer is created such as when a partially blocking or blocking transformation is added to the pipeline, additional memory is required to handle the data transformation and each new tree may also give you an additional worker thread.

61. Difference between Unionall and Merge Join?

a) Merge transformation can accept only two inputs whereas Union all can take more than two inputs

b) Data has to be sorted before Merge Transformation whereas Union all doesn’t have any condition like that.

62. May get question regarding what X transformation do?

Lookup, fuzzy lookup, fuzzy grouping transformation are my favorites.
For you.

63.How would you restart package from previous failure point?What are Checkpoints and how can we implement in SSIS?
When a package is configured to use checkpoints, information about package execution is written to a checkpoint file. When the failed package is rerun, the checkpoint file is used to restart the package from the point of failure. If the package runs successfully, the checkpoint file is deleted, and then re-created the next time that the package is run.

64. Where are SSIS package stored in the SQL Server?
MSDB.sysdtspackages90 stores the actual content and ssydtscategories, sysdtslog90, sysdtspackagefolders90, sysdtspackagelog, sysdtssteplog, and sysdtstasklog do the supporting roles.

65.How would you schedule a SSIS packages?
Using SQL Server Agent. Read about Scheduling a job on Sql server Agent

66. Difference between asynchronous and synchronous transformations?
Asynchronous transformation have different Input and Output buffers and it is up to the component designer in an Async component to provide a column structure to the output buffer and hook up the data from the input.

67. How to achieve parallelism in SSIS?
Parallelism is achieved using MaxConcurrentExecutable property of the package. Its default is -1 and is calculated as number of processors + 2.

-More questions added-Sept 2011
68. How do you do incremental load?
Fastest way to do incremental load is by using Timestamp column in source table and then storing last ETL timestamp, In ETL process pick all the rows having Timestamp greater than the stored Timestamp so as to pick only new and updated records

69. How to handle Late Arriving Dimension or Early Arriving Facts.

Late arriving dimensions sometime get unavoidable ‘coz delay or error in Dimension ETL or may be due to logic of ETL. To handle Late Arriving facts, we can create dummy Dimension with natural/business key and keep rest of the attributes as null or default. And as soon as Actual dimension arrives, the dummy dimension is updated with Type 1 change. These are also known as Inferred Dimensions.

70. WHAT is SQL Server Reporting Services(SSRS)?
SQL Server Reporting Services is a server-based reporting platform that you can use to create and manage tabular, matrix, graphical, and free-form reports that contain data from relational and multidimensional data sources. The reports that you create can be viewed and managed over a World Wide Web-based connection
71. What are the three stages of Enterprise Reporting Life Cycle ?
a. Authoring
b. Management
c. Access and Delivery

72. What are the components included in SSRS?
1. A Complete set of Tools that can be used to create, manage and view reports
2. A Report Server component that hosts and processes reports in a variety of formats. Output formats include HTML, PDF, TIFF, Excel, CSV, and more.
3.An API that allows developers to integrate or extend data and report processing in custom applications, or create custom tools to build and manage reports.

73. What is the benefit of using embedded code in a report?
1. Reuseability of Code: function created in embedded code to perform a logic can be then used in multiple expressions
2. Centralized code: helps in better manageability of code.
74. Which programming language can be used to code embedded functions in SSRS?
Visual Basic .NET Code.

75. Important terms used in the reporting services?

1. Report definition: The blueprint for a report before the report is processed or rendered. A report definition contains information about the query and layout for the report.

2. Report snapshot: A report that contains data captured at a specific point in time. A report snapshot is actually a report definition that contains a dataset instead of query instructions.

3. Rendered report: A fully processed report that contains both data and layout information, in a format suitable for viewing (such as HTML).

4. Parameterized report: A published report that accepts input values through parameters.

5. Shared data source: A predefined, standalone item that contains data source connection information.

6. Shared schedule: A predefined, standalone item that contains schedule information.

7. Report-specific data source: Data source information that is defined within a report definition.

8. Report model: A semantic description of business data, used for ac hoc reports created in Report Builder.

9. Linked report: A report that derives its definition through a link to another report.

10. Report server administrator: This term is used in the documentation to describe a user with elevated privileges who can access all settings and content of a report server. If you are using the default roles, a report server administrator is typically a user who is assigned to both the Content Manager role and the System Administrator role. Local administrators can have elevated permission even if role assignments are not defined for them.

11. Folder hierarchy: A bounded namespace that uniquely identifies all reports, folders, report models, shared data source items, and resources that are stored in and managed by a report server.
12. Report Server: Describes the Report Server component, which provides data and report processing, and report delivery. The Report Server component includes several subcomponents that perform specific functions.

13. Report Manager: Describes the Web application tool used to access and manage the contents of a report server database.

14. Report Builder: Report authoring tool used to create ad hoc reports.

15. Report Designer: Report creation tool included with Reporting Services.

16. Model Designer: Report model creation tool used to build models for ad hoc reporting.

17. Report Server Command Prompt Utilities: Command line utilities that you can use to administer a report server.
a) RsConfig.exe, b) RsKeymgmt.exe, c) Rs.exe

76. what are the Command Line Utilities available In Reporting Services?
• Rsconfig Utility (Rsconfig.exe): encrypts and stores connection and account values in the RSReportServer.config file. Encrypted values include report server database connection information and account values used for unattended report processing
• RsKeymgmt Utility: Extracts, restores, creates, and deletes the symmetric key used to protect sensitive report server data against unauthorized access
• RS Utility: this utility is mainly used to automate report server deployment and administration tasks.Processes script you provide in an input file.

77. What is difference between Tablular and Matrix report?

Tablular report: A tabular report is the most basic type of report. Each column corresponds to a column selected from the database.

Matrix report: A matrix (cross-product) report is a cross-tabulation of four groups of data:
a. One group of data is displayed across the page.
b. One group of data is displayed down the page.
c. One group of data is the cross-product, which determines all possible locations where the across and down data relate and places a cell in those locations.
d. One group of data is displayed as the “filler” of the cells.
Martix reports can be considered more of a Pivot table.

78. How to create Drill-through reports?
Using Navigation property of a cell and setting child report and its parameters in it.

79. How to create Drill-Down reports?
To cut the story short:
– By grouping data on required fields
-Then toggle visibility based on the grouped filed

80. What is Query parameter in SSRS?
Query parameters is mentioned in the query of the datasources that are to be included into the SQL script’s WHERE clause of the SQL that can accept parameters. Query parameters begin with the symbol @.The name should not contain spaces and can not begin with numeral. For clarity, we use only letters.
81. What are the Reporting Service Components in SSRS?
Report Designer: A place where we can create report. Report Server: Provides services for implementation and delivery of reports. Report Manager: A Web-based administration tool for managing the Report Server.
82. What is a matrix in SSRS?
 A matrix is a data region linked to a report set. Matrix allows us to create crosstab reports with the report variables displaying on rows and columns. It allows us to drag and drop fields into it.
83. What are sub reports and how to create them?
A sub report is like any other reports which can be called in main report and can be generate through main report. Parameters can be passed from main report to sub report and basis of that report can be generated.
84. What is the report model project?
Report model project is for creating Adhoc reporting. You can create the adhoc reports through report builder. Report model project can be created on bids or report server. This model can have simple view. And using
85. What is report server project?
Report Server Project contains the RDL file and it need to be deployed on report server to view the report files to application and user. It a solution where we design our reports. You can add it by going into BIDS clicking on new item and then selecting reports server project. Once the solution is created you can start creating reports.
86. What is the report builder?
Report builder is used to create small reports and it a define interface. You can’t change the report interface in report builder it pre designed. You can just drag columns in the report. Report builder creates reports on database objects available with report model project.
87.In which SQL Server version report builder introduced?
Report builder introduced in SQL Server 2005. While creating or deploying report model project on report server you can get error or it might not get created. For this you need to check whether the service pack 22 is installed or not.

88. How to deploy the Report?
Report can be deployed in three ways.
1. Using visual studio: In visual studio you can directly deploy the report through solution explorer by providing the report server URL in project properties at Target Server URL. This will deploy entire project or single report as per you selection.
2. Using report server: Can directly go to the report server and deploy the report by browsing the report from the disk location on server.
3. Creating the utility: SQL server provides the utility using that which can be used to create a customize utility for your report deployment in bulk.
89. What is RS.exe utility?
Rs.exe utility is used for deploying the report on report server. It comes with the report server and can be customize accordingly.
90. What is the name of reporting services config file and what’s it’s used for?
Reporting service config file is used for report configuration details. It contains the report format and also the report import types. Report service config reside at ISS.
91.What are the three different part of RDL file explain them?
In visual studio RDL files has three parts.
1. Data: It contains the dataset on which we write the query. Data set is connected with data source.
2. Design: In design you can design report. Can create tables and matrix reports. Drag columns values from source.
3. Preview: to check the preview after the report run.
92. Which language rdl files made of?
RDL files are written in XML.
93.What is the chart in report?
 Chart reports are for graphical representation. You can get pie charts columns harts and various other options. 3d charts are also available in reporting services.
94. What is Data Set in report?
Data set are the set of data which we want to show in report. Data creates on data source. Data source is the source of data from where we are getting this data i.e. database server and database name connection string.
95. What are the different types of data sources in SSRS?
SSRS use different data source. Some of them are listed below.
1. Microsoft SQL Server
2. OLEDB
3. Oracle
4. ODBC
5. SQL Server Analysis Service
6. Report Server Model
7. SAP Net weaver BI
8. Hyperion
9. Teradata
10. XML
96. What is the web service used for reporting services?
Reporting Service Web Service used in SSRS. By accessing this web service you can access all report server component and also get the report deployed on report server.
97. How to add the custom code in Report?
To add the custom codes in report go to report tab on top then properties and there you will find the options for custom code.
98. What is a cache in SSRS?
Report server can lay up a copy of processed report in a memory and return the copy when a user opens the report. This server memory is known as cache and the process is called caching.

 

 

ASP .NET Interview Questions

Top most important ASP.Net interview questions and answers by Experts:

Here is a list of Top most important ASP.Net interview questions and answers by Experts.If you want to download ASP.Net interview questions pdf free ,you can register with RVH techguru. Our experts prepared these ASP.Net interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in ASP.Net ,Register for ASP.Net online training here.

 
1. What is ASP?
Active Server Pages (ASP), also known as Classic ASP, is a Microsoft’s server-side technology, which helps in creating dynamic and user-friendly Web pages. It uses different scripting languages to create dynamic Web pages, which can be run on any type of browser. The Web pages are built by using either VBScript or JavaScript and these Web pages have access to the same services as Windows application, including ADO (ActiveX Data Objects) for database access, SMTP (Simple Mail Transfer Protocol) for e-mail, and the entire COM (Component Object Model) structure used in the Windows environment. ASP is implemented through a dynamic-link library (asp.dll) that is called by the IIS server when a Web page is requested from the server.
2. What is ASP.NET?
ASP.NET is a specification developed by Microsoft to create dynamic Web applications, Web sites, and Web services. It is a part of .NET Framework. You can create ASP.NET applications in most of the .NET compatible languages, such as Visual Basic, C#, and J#. The ASP.NET compiles the Web pages and provides much better performance than scripting languages, such as VBScript. The Web Forms support to create powerful forms-based Web pages. You can use ASP.NET Web server controls to create interactive Web applications. With the help of Web server controls, you can easily create a Web application.
3. What is the basic difference between ASP and ASP.NET?
The basic difference between ASP and ASP.NET is that ASP is interpreted; whereas, ASP.NET is compiled. This implies that since ASP uses VBScript; therefore, when an ASP page is executed, it is interpreted. On the other hand, ASP.NET uses .NET languages, such as C# and VB.NET, which are compiled to Microsoft Intermediate Language (MSIL).
4. In which event are the controls fully loaded?
Page load event guarantees that all controls are fully loaded. Controls are also accessed in Page_Init events but you will see that view state is not fully loaded during this event
5. How can we identify that the Page is Post Back?
Page object has an “IsPostBack” property, which can be checked to know that is the page posted back.
6. What is the lifespan for items stored in ViewState?
The items stored in ViewState live until the lifetime of the current page expires including the postbacks to the same page.
7. How information about the user’s locale can be accessed?
The information regarding a user’s locale can be accessed by using the System.Web.UI.Page.Culture property.
8. What is the difference between SQL notification and SQL invalidation?
The SQL cache notification generates notifications when the data of a database changes, on which your cache item depends. The SQL cache invalidation makes a cached item invalid when the data stored in a SQL server database changes.
9. Which is the parent class of the Web server control?
The System.Web.UI.Control class is the parent class for all Web server controls.
10. Can you set which type of comparison you want to perform by the CompareValidator control?
Yes, by setting the Operator property of the CompareValidator control.
11. What is the behavior of a Web browser when it receives an invalid element?
The behavior of a Web browser when it receives an invalid element depends on the browser that you use to browse your application. Most of the browsers ignore the invalid element; whereas, some of them display the invalid elements on the page.
12. What are the advantages of the code-behind feature?
The code-behind feature of ASP.NET offers a number of advantages:
• Makes code easy to understand and debug by separating application logic from HTML tags
• Provides the isolation of effort between graphic designers and software engineers
• Removes the problems of browser incompatibility by providing code files to exist on the Web server and supporting Web pages to be compiled on demand.
13. How do you sign out from forms authentication?
• The FormsAuthentication.Signout() method is used to sign out from the forms authentication.
14. What is AutoPostBack?
• If you want a control to postback automatically when an event is raised, you need to set the AutoPostBack property of the control to True.
15. What is the function of the ViewState property?
• The ASP.NET 4.0 introduced a new property called ViewStateMode for the Control class. Now you can enable the view state to an individual control even if the view state for an ASP.NET page is disabled.
16. Why do you use the App_Code folder in ASP.NET?
• The App_Code folder is automatically present in the project. It stores the files, such as classes, typed data set, text files, and reports. If this folder is not available in the application, you can add this folder. One of the important features of the App_Code folder is that only one dll is created for the complete folder, irrespective of how many files it contains.
17. Define a multilingual Web site.
• A multilingual Web site serves content in a number of languages. It contains multiple copies for its content and other resources, such as date and time, in different languages.
18. What is an ASP.NET Web Form?
• ASP.NET Web forms are designed to use controls and features that are almost as powerful as the ones used with Windows forms, and so they are called as Web forms. The Web form uses a server-side object model that allows you to create functional controls, which are executed on the server and are rendered as HTML on the client. The attribute,runat=”server”, associated with a server control indicates that the Web form must be processed on the server.
19. What is the difference between a default skin and a named skin?
The default skin is applied to all the Web server controls in a Web form, which are of similar type, and it does not provide a Skin ID attribute. The named skin provides a Skin ID attribute and users have to set the Skin ID property to apply it.
20. What is IIS? Why is it used?
Internet Information Services (IIS) is created by Microsoft to provide Internet-based services to ASP.NET Web applications. It makes your computer to work as a Web server and provides the functionality to develop and deploy Web applications on the server. IIS handles the request and response cycle on the Web server. It also offers the services of SMTP and FrontPage server extensions. The SMTP is used to send emails and use FrontPage server extensions to get the dynamic features of IIS, such as form handler.
21. What is Query String? What are its advantages and limitations?
The Query String helps in sending the page information to the server.

The Query String has the following advantages:
• Every browser works with Query Strings.
• It does not require server resources and so does not exert any kind of burden on the server.

The following are the limitations of Query String:
• Information must be within the limit because URL does not support many characters.
• Information is clearly visible to the user, which leads to security threats.
22. What is actually returned from server to the browser when a browser requests an .aspx file and the file is displayed?
When a browser requests an .aspx file then the server returns a response, which is rendered into a HTML string.
23. How can you display all validation messages in one control?
The ValidationSummary control displays all validation messages in one control.
24. Which two new properties are added in ASP.NET 4.0 Page class?
The two new properties added in the Page class are MetaKeyword and MetaDescription.
25. What is tracing? Where is it used?
Tracing displays the details about how the code was executed. It refers to collecting information about the application while it is running. Tracing information can help you to troubleshoot an application. It enables you to record information in various log files about the errors that might occur at run time. You can analyze these log files to find the cause of the errors.

In .NET, we have objects called Trace Listeners. A listener is an object that gets the trace output and stores it to different places, such as a window, a file on your locale drive, or a SQL Server.

The System.Diagnostics namespace contains the predefined interfaces, classes, and structures that are used for tracing. It supplies two classes, Trace and Debug, which allow you to write errors and logs related to the application execution. Trace listeners are objects that collect the output of tracing processes.
26. What is the difference between authentication and authorization?
Authentication verifies the identity of a user and authorization is a process where you can check whether or not the identity has access rights to the system. In other words, you can say that authentication is a procedure of getting some credentials from the users and verify the user’s identity against those credentials. Authorization is a procedure of granting access of particular resources to an authenticated user. You should note that authentication always takes place before authorization.
27. How can you register a custom server control to a Web page?
You can register a custom server control to a Web page using the @Register directive.
28. Which ASP.NET objects encapsulate the state of the client and the browser?
The Session object encapsulates the state of the client and browser.
29. Differentiate globalization and localization.
The globalization is a technique to identify the specific part of a Web application that is different for different languages and make separate that portion from the core of the Web application. The localization is a procedure of configuring a Web application to be supported for a specific language or locale.

30. What is ViewState?
The ViewState is a feature used by ASP.NET Web page to store the value of a page and its controls just before posting the page. Once the page is posted, the first task by the page processing is to restore the ViewState to get the values of the controls.
31. Which method is used to force all the validation controls to run?
The Page.Validate() method is used to force all the validation controls to run and to perform validation.
32. Which method has been introduced in ASP.NET 4.0 to redirect a page permanently?
The RedirectPermanent() method added in ASP.NET 4.0 to redirect a page permanently. The following code snippet is an example of the RedirectPermanent() method:

RedirectPermanent(“/path/Aboutus.aspx”);
33. How can you send an email message from an ASP.NET Web page?
You can use the System.Net.Mail.MailMessage and the System.Net.Mail.SmtpMail classes to send an email in your Web pages. In order to send an email through your mail server, you need to create an object of theSmtpClient class and set the server name, port, and credentials.
34. What is the difference between the Response.Write() and Response.Output.Write() methods?
The Response.Write() method allows you to write the normal output; whereas, the Response.Output.Write()method allows you to write the formatted output.
35. What does the Orientation property do in a Menu control?
Orientation property of the Menu control sets the horizontal or vertical display of a menu on a Web page. By default, the orientation is vertical.
36. Differentiate between client-side and server-side validations in Web pages.
Client-side validations take place at the client end with the help of JavaScript and VBScript before the Web page is sent to the server. On the other hand, server-side validations take place at the server end.
37. How does a content page differ from a master page?
A content page does not have complete HTML source code; whereas a master page has complete HTML source code inside its source file.
38. Suppose you want an ASP.NET function (client side) executed on the MouseOver event of a button. Where do you add an event handler?
The event handler is added to the Add() method of the Attributes property.
39. What is the default timeout for a Cookie?
The default time duration for a Cookie is 30 minutes.
40. What are HTTP handlers in ASP.NET?
HTTP handlers, as the name suggests, are used to handle user requests for Web application resources. They are the backbone of the request-response model of Web applications. There is a specific event handler to handle the request for each user request type and send back the corresponding response object.

Each user requests to the IIS Web server flows through the HTTP pipeline, which refers to a series of components (HTTP modules and HTTP handlers) to process the request. HTTP modules act as filters to process the request as it passes through the HTTP pipeline. The request, after passing through the HTTP modules, is assigned to an HTTP handler that determines the response of the server to the user request. The response then passes through the HTTP modules once again and is then sent back to the user.

You can define HTTP handlers in the <httpHandlers> element of a configuration file. The <add> element tag is used to add new handlers and the <remove> element tag is used to remove existing handlers. To create an HTTP handler, you need to define a class that implements the IHttpHandler interface.
41. What are the events that happen when a client requests an ASP.NET page from IIS server?
The following events happen when a client requests an ASP.NET page from the IIS server:
1. User requests for an application resource.
2. The integrated request-processing pipeline receives the first user request.
3. Response objects are created for each user request.
4. An object of the HttpApplication class is created and allocated to the Request object.
5. The HttpApplication class processes the user request.
42. Explain file-based dependency and key-based dependency.
In file-based dependency, you have to depend on a file that is saved in a disk. In key-based dependency, you have to depend on another cached item.
43. How can you implement the postback property of an ASP.NET control?
You need to set the AutoPostBack property to True to implement the PostBack property of controls.
44. Explain how Cookies work. Give an example of Cookie abuse.
The server tells the browser to put some files in a cookie, and the client then sends all the cookies for the domain in each request. An example of cookie abuse is large cookies affecting the network traffic.

45. Explain login controls.
Login controls are built-in controls in ASP.Net for providing a login solution to ASP.NET application. The login controls use the membership system to authenticate a user credentials for a Web site.

There are many controls in login controls.
• ChangePassword control – Allows users to change their password.
• CreateUserWizard control – Provides an interface to the user to register for that Web site.
• Login control – Provides an interface for user authentication. It consists of a set of controls, such asTextBox, Label, Button, CheckBox, HyperLink.
• LoginView control – Displays appropriate information to different users according to the user’s status.
• LoginStatus control – Shows a login link to users, who are not authenticated and logout link, who are authenticated
• LoginName control – Displays a user name, if the user logs in.
• PasswordRecovery control – Allows users to get back the password through an e-mail, if they forget.
46. What is the use of PlaceHolder control? Can we see it at runtime?
The PlaceHolder control acts as a container for those controls that are dynamically generated at runtime. We cannot see it at runtime because it does not produce any visible output. It used only as a container.
47. What setting must be added in the configuration file to deny a particular user from accessing the secured resources?
To deny a particular user form accessing the secured resources, the web.config file must contain the following code:

<authorization >
<deny users=”username” />
</authorization>
48. What are the event handlers that can be included in the Global.asax file?
The Global.asax file contains some of the following important event handlers:
• Application_Error
• Application_Start
• Application_End
• Session_Start
• Session_End
49. What is the difference between page-level caching and fragment caching?
In the page-level caching, an entire Web page is cached; whereas, in the fragment caching, a part of the Web page, such as a user control added to the Web page, is cached.

50. Make a list of all templates of the Repeater control.
The Repeater control contains the following templates:
• ItemTemplate
• AlternatingltemTemplate
• SeparatorTemplate
• HeaderTemplate
• FooterTemplate
51. Describe the complete lifecycle of a Web page.
When we execute a Web page, it passes from the following stages, which are collectively known as Web page lifecycle:
• Page request – During this stage, ASP.NET makes sure the page either parsed or compiled and a cached version of the page can be sent in response
• Start – During this stage sets the Request and Response page properties and the page check the page request is either a postback or a new request
• Page Initialization – During this stage, the page initialize and the control’s Unique Id property are set
• Load – During this stage, if the request is postback, the control properties are loaded without loading the view state and control state otherwise loads the view state
• Validation – During this stage, the controls are validated
• Postback event handling – During this stage, if the request is a postback, handles the event
• Rendering – During this stage, the page invokes the Render method to each control for return the output
• Unload – During this stage, when the page is completely rendered and sent to the client, the page is unloaded.
52. How can you assign page specific attributes in an ASP.NET application?
The @Page directive is responsible for this.
53. Which method is used to post a Web page to another Web page?
The Respose.Redirect method is used to post a page to another page, as shown in the following code snippet:Response.Redirect(“DestinationPageName.aspx”);
54. What is a Cookie? Where is it used in ASP.NET?
Cookie is a lightweight executable program, which the server posts to client machines. Cookies store the identity of a user at the first visit of the Web site and validate them later on the next visits for their authenticity. The values of a cookie can be transferred between the user’s request and the server’s response.
55. What are Custom User Controls in ASP.NET?
The custom user controls are the controls that are defined by developers. These controls are a mixture of custom behavior and predefined behavior. These controls work similar to other Web server controls.
56. What does the .WebPart file do?
The .WebPart file explains the settings of a Web Parts control that can be included to a specified zone on a Web page.
57. How can you enable impersonation in the web.config file?
To enable impersonation in the web.confing file, you need to include the <identity> element in the web.configfile and set the impersonate attribute to true as shown in the following code snippet:
<identity impersonate = “true” />
58. How can you identify that the page is PostBack?
The Page object uses the IsPostBack property to check whether the page is posted back or not. If the page is postback, this property is set to true.
59. In which database is the information, such as membership, role management, profile, and Web parts personalization, stored?
The aspnetdb database stores all information.
60. What is State Management? How many ways are there to maintain a state in .NET?
State management is used to store information requests. The state management is used to trace the information or data that affect the state of the applications.

There are two ways to maintain a state in .NET, Client-Based state management and Server-Based state management.

The following techniques can be used to implement the Client-Based state management:
• View State
• Hidden Fields
• Cookies
• Query Strings
• Control State

The following techniques can be used to implement Server-Based state management:
• Application State
• Session State
• Profile Properties
67. Where should the data validations be performed-at the client side or at the server side and why?
• Data validations should be done primarily at the client side and the server-side validation should be avoided because it makes server task overloaded. If the client-side validation is not available, you can use server-side validation. When a user sends a request to the server, the validation controls are invoked to check the user input one by one.
68. Why do we need nested master pages in a Web site?
• When we have several hierarchical levels in a Web site, then we use nested master pages in the Web site.
69. How can you dynamically add user controls to a page?
• User controls can be dynamically loaded by adding a Web User Control page in the application and adding the control on this page.
70. What is the appSettings Section in the web.config file?
• The web.config file sets the configuration for a Web project. The appSettings block in configuration file sets the user-defined values for the whole application.

For example, in the following code snippet, the specified ConnectionString section is used throughout the project for database connection:

<configuration>
<appSettings>
<add key=”ConnectionString” value=”server=indiabixserver; pwd=dbpassword; database=indiabix” />
</appSettings>

71. What type of code, client-side or server-side, is found in a code-behind file of a Web page?
• A code-behind file contains the server-side code, which means that the code contained in a code-behind file is executed at the server.
72. To which class a Web form belongs to in the .NET Framework class hierarchy?
• A Web form belongs to the System.Web.UI.Page class.
73. What does the “EnableViewState” property do? Why do we want it On or Off?
The EnableViewState property enables the ViewState property on the page. It is set to On to allow the page to save the users input between postback requests of a Web page; that is, between the Request and correspondingResponse objects. When this property is set to Off, the page does not store the users input during postback.
74. Which event determines that all the controls are completely loaded into memory?
The Page_Load event determines that all the controls on the page are fully loaded. You can also access the controls in the Page_Init event; however, the ViewState property does not load completely during this event.
75. What is the function of the CustomValidator control?
It provides the customize validation code to perform both client-side and server-side validation.
76. What is Role-based security?
In the Role-based security, you can assign a role to every user and grant the privilege according to that role. A role is a group of principal that restricts a user’s privileges. Therefore, all the organization and applications use role-based security model to determine whether a user has enough privileges to perform a requested task.
77. Which data type does the RangeValidator control support?
The data types supported by the RangeValidator control are Integer, Double, String, Currency, and Date.
78. What are the HTML server controls in ASP.NET?
HTML server controls are similar to the standard HTML elements, which are normally used in HTML pages. They expose properties and events that can be used programmatically. To make these controls programmatically accessible, you need to specify that the HTML controls act as a server control by adding the runat=”server” attribute.
79. Why a SiteMapPath control is referred to as breadcrumb or eyebrow navigation control?
The SiteMapPath control displays a hierarchical path to the root Web page of the Web site. Therefore, it is known as the breadcrumb or eyebrow navigation control.
80. Where is the ViewState information stored?
The ViewState information is stored in the HTML hidden fields.
81. Which namespaces are necessary to create a localized application?
The System.Globalization and System.Resources namespaces are essential to develop a localized application.
82. What is the difference between an HtmlInputCheckBox control and an HtmlInputRadioButton control?
You can select more than one HtmlInputCheckBox control from a group of HtmlInputCheckBox controls; whereas, you can select only a single HtmllnputRadioButton control from a group of HtmlInputRadioButtoncontrols.
83. What is the difference between HTML and Web server controls?
HTML controls are client-side controls; therefore, all the validations for HTML controls are performed at the client side. On the other hand, Web server controls are server-side controls; therefore, all the validations for Web server controls are performed at the server side.
84. Explain the AdRotator Control.
The AdRotator is an ASP.NET control that is used to provide advertisements to Web pages. The AdRotator control associates with one or many advertisements, which randomly displays one by one at a time when the Web page is refreshed. The AdRotator control advertisements are associated with links; therefore, when you click on an advertisement, it redirects you to other pages.

The AdRotator control is associated with a data source, which is normally an xml file or a database table. A data source contains all the information, such as advertisement graphics reference, link, and alternate text. Therefore, when you use the AdRotator control, you should first create a data source and then associate it with theAdRotator control.
85. What do you understand by the culture?
The culture denotes a combination of a language and optionally a region or a country. The contents of a Web page of a multilingual Web site are changed according to the culture defined in the operating system of the user accessing the Web page.
86. What is the difference between absolute expiration and sliding-time expiration?
The absolute expiration expires a cached item after the provided expiration time. The sliding time does not expire the cached items because it increments the specified time.
87. What is the code-behind feature in ASP.NET?
The code-behind feature of ASP.NET enables you to divide an ASP.NET page into two files – one consisting of the presentation data, and the second, which is also called the code-behind file, consisting of all the business logic. The presentation data contains the interface elements, such as HTML controls and Web server controls, and the code-behind contains the event-handling process to handle the events that are fired by these controls. The file that contains the presentation data has the .aspx extension. The code behind file has either the .cs extension (if you are using the programming language C#) or the .vb (if you are using the programming language Visual Basic .NET) extension.
88. How can you check if all the validation controls on a Web page are valid and proper?
You can determine that all the validation controls on a Web page are properly working by writing code in the source file of the Web page using a scripting language, such as VBScript or JavaScript. To do this task, you have to loop across validators collection of pages and check the IsValid property of each validation control on the Web page to check whether or not the validation test is successful.
89. Explain the validation controls. How many validation controls in ASP.NET 4.0?
Validation controls are responsible to validate the data of an input control. Whenever you provide any input to an application, it performs the validation and displays an error message to user, in case the validation fails.

ASP.NET 4.0 contains the following six types of validation controls:
• CompareValidator – Performs a comparison between the values contained in two controls.
• CustomValidator – Writes your own method to perform extra validation.
• RangeValidator- Checks value according to the range of value.
• RegularExpressionValidator – Ensures that input is according to the specified pattern or not.
• RequiredFieldValidator – Checks either a control is empty or not.
• ValidationSummary – Displays a summary of all validation error in a central location.
90. What is difference between a Label control and a Literal control?
The Label control’s final html code has an HTML tag; whereas, the Literal control’s final html code contains only text, which is not surrounded by any HTML tag.
91. How many types of Cookies are available in ASP.NET?
There are two types of Cookies available in ASP.NET:
• Session Cookie – Resides on the client machine for a single session until the user does not log out.
• Persistent Cookie – Resides on a user’s machine for a period specified for its expiry, such as 10 days, one month, and never.The user can set this period manually.
92. What is the use of the Global.asax file?
The Global.asax file executes application-level events and sets application-level variables.
93. What are the Culture and UICulture values?
The Culture value determines the functions, such as Date and Currency, which are used to format data and numbers in a Web page. The UICulture value determines the resources, such as strings or images, which are loaded for a Web page in a Web application.
94. What is the difference between ASP session and ASP.NET session?
ASP does not support cookie-less sessions; whereas, ASP.NET does. In addition, the ASP.NET session can span across multiple servers.
95. Which control will you use to ensure that the values in two different controls match?
You should use the CompareValidator control to ensure that the values in two different controls match.
96. What is the difference between a page theme and a global theme?
A page theme is stored inside a subfolder of the App_Themes folder of a project and applied to individual Web pages of that project. Global themes are stored inside the Themes folder on a Web server and apply to all the Web applications on the Web server.
97. What do you mean by a neutral culture?
When you specify a language but do not specify the associated country through a culture, the culture is called as a neutral culture.

98. What is the use of the <sessionState> tag in the web.config file?
The <sessionState> tag is used to configure the session state features. To change the default timeout, which is 20 minutes, you have to add the following code snippet to the web.config file of an application: <sessionState timeout=”40″/>
99. Can you post and access view state in another application?
Yes, you can post and access a view state in other applications. However, while posting a view state in another application, the PreviousPage property returns null.
100. Which method do you use to kill explicitly a users session?
The Session.Abandon() method kills the user session explicitly.
101. Which class is inherited when an ASP.NET server control is added to a Web form?
The System.Web.UI.WebControls class is inherited when an ASP.NET server control is added to a Web form.
102. What events are fired when a page loads?
The following events fire when a page loads:
• Init() – Fires when the page is initializing.
• LoadViewState() – Fires when the view state is loading.
• LoadPostData() – Fires when the postback data is processing.
• Load() – Fires when the page is loading.
• PreRender() – Fires at the brief moment before the page is displayed to the user as HTML.
• Unload() – Fires when the page is destroying the instances of server controls.
103. Write three common properties of all validation controls.
Three common properties of validation controls are as follows:
• ControlToValidate – Provides a control to validate
• ErrorMessage – Displays an error message
• IsValid – Specifies if the control’s validation has succeeded or not
• Text – Displays a text for validation control before validation
104. What are navigation controls? How many navigation controls are there in ASP.NET 4.0?
Navigation controls help you to navigate in a Web application easily. These controls store all the links in a hierarchical or drop-down structure; thereby facilitating easy navigation in a Web application.

There are three navigation controls in ASP.Net 4.0.
• SiteMapPath
• Menu
• TreeView
105. What happens if an ASP.NET server control with event-handling routines is missing from its definition?
The compilation of the application fails.
106. What are server-side comments?
Server-side comments are included in an ASP.NET page for the purpose of documentations as shown in the following code snippet:

<%–This is an example of server-side comments –%>

The server-side comments begin with <%– and end with –%>.
107. How can we provide the WebParts control functionality to a server control?
We can provide the WebParts controls functionality to a server control by setting the CreateWebPart property ofWebPartManger.
108. How do you prevent a validation control from validating data at the client end?
You can prohibit a validation control to validate data at the client side by setting the EnableClientScript property to False.
109. What is cross-page posting in ASP.NET?
The Server.Transfer() method is used to post data from one page to another. In this case, the URL remains the same. However, in cross page posting, data is collected from different Web pages and is displayed on a single page. To do so, you need to set the PostBackUrl property of the control, which specifies the target page. In the target page, you can access the PreviousPage property. For this, you need to use the @PreviousPageType directive. You can access the controls of previous page by using the FindControl() method.
110. Which ASP.NET configuration options are supported in the ASP.NET implementation on the shared Web hosting platform?
There are many ASP.NET configuration choices, which are not able to configure at the site, application, or child directory level on the shared hosting environment. Some options can produce security, performance, and stability problem to the server and therefore cannot be changed.

The following settings are the only ones that can be changed in the web.config file(s) of your Web site:
• browserCaps
• clientTarget
• pages
• customErrors
• globalization
• authorization
• authentication
• webControls
• webServices
111. Explain the Application and Session objects in ASP.NET.
Application state is used to store data corresponding to all the variables of an ASP.NET Web application. The data in an application state is stored once and read several times. Application state uses the HttpApplicationState class to store and share the data throughout the application. You can access the information stored in an application state by using the HttpApplication class property. Data stored in the application state is accessible to all the pages of the application and is the same for all the users accessing the application. The HttpApplicationState class provides a lock method, which you can use to ensure that only one user is able to access and modify the data of an application at any instant of time.

Each client accessing a Web application maintains a distinct session with the Web server, and there is also some specific information associated with each of these sessions. Session state is defined in the <sessionState> element of the web.config file. It also stores the data specific to a user session in session variables. Different session variables are created for each user session. In addition, session variables can be accessed from any page of the application. When a user accesses a page, a session ID for the user is created. The session ID is transferred between the server and the client over the HTTP protocol using cookies.
112. How will you differentiate a submaster page from a top-level master page?
Similar to a content page, a submaster page also does not have complete HTML source code; whereas, a top-level master page has complete HTML source code inside its source file.
113. What are Web server controls in ASP.NET?
The ASP.NET Web server controls are objects on the ASP.NET pages that run when the Web page is requested. Many Web server controls, such as button and text box, are similar to the HTML controls. In addition to the HTML controls, there are many controls, which include complex behavior, such as the controls used to connect to data sources and display data.
114. What is the difference between a HyperLink control and a LinkButton control?
A HyperLink control does not have the Click and Command events; whereas, the LinkButton control has these events, which can be handled in the code-behind file of the Web page.
115. What are the various ways of authentication techniques in ASP.NET?
There are various techniques in ASP.NET to authenticate a user. You can use one of the following ways of authentication to select a built-in authentication provider:
• Windows Authentication – This mode works as the default authentication technique. It can work with any form of Microsoft Internet Information Services (IIS) authentication, such as Basic, Integrated Windows authentication (NTLM/Kerberos), Digest, and certificates. The syntax of Windows authentication mode is given as follows: <authentication mode=”windows” />
• Forms Authentication – You can specify this mode as a default authentication mode by using the following code snippet: <authentication mode=”Forms”/>
• Passport – This mode works with Microsoft Passport authentication, as shown in the following code snippet:<authentication mode = “Passport”/>
116. What are the different ways to send data across pages in ASP.NET?
The following two ways are used to send data across pages in ASP.NET:
• Session
• Public properties
117. What does the WebpartListUserControlPath property of a DeclarativeCatalogPart control do?
The WebpartListUserControlPath property sets the route of the user defined control to aDeclarativeCatalogPart control.
118. What do you mean by the Web Part controls in ASP.NET?
The Web Part controls are the integrated controls, which are used to create a Web site. These controls allow the users to change the content, outlook, and state of Web pages in a Web browser.
119. What type of the CatalogPart control enables users to restore the Web Parts that have been removed earlier by the user?
The PageCatalogPart control.
120. What is the use of web.config? What is the difference between machine.config and web.config?
ASP.NET configuration files are XML-based text files for application-level settings and are saved with the name web.config. These files are present in multiple directories on an ASP.NET Web application server. The web.config file sets the configuration settings to the directory it is placed in and to all the virtual sub folders under it. The settings in sub directories can optionally override or change the settings specified in the base directory.

The difference between the web.config and machine.config files is given as follows:
• <WinDir>\Microsoft.NET\Framework\<version>\config\machine.config provides default configuration settings for the entire machine. ASP.NET configures IIS to prohibit the browser directly from accessing the web.config files to make sure that their values cannot be public. Attempts to access those files cause ASP.NET to return the 403: Access Forbidden error.
• ASP.NET uses these web.config configuration files at runtime to compute hierarchically a sole collection of settings for every URL target request. These settings compute only once and cached across further requests. ASP.NET automatically checks for changing file settings and do not validate the cache if any of the configuration changes made.

121. Explain the concept of states in ASP.NET.
State is quite an innovative concept in Web development because it eliminates the drawback of losing state data due to reloading of a Web page. By using states in a Web application, you can preserve the state of the application either at the server or client end. The state of a Web application helps you to store the runtime changes that have been made to the Web application. For example, as already described earlier, a change in the data source of the Web application might be initiated by a user when he/she selects and saves some products in the shopping cart.

If you are not using states, these changes are discarded and are not saved. You may think that the whole concept of storing states is optional. However, under certain circumstances, using states with applications is imperative. For example, it is necessary to store states for Web applications, such as an e-commerce shopping site or an Intranet site of a company, to keep track of the requests of the users for the items they have selected on the shopping site or the days requested for vacation on the Intranet site.
122. Can we validate a DropDownList by RequiredFieldValidator?
Yes, we can validate a DropDownList by RequiredFieldValidator. To perform this validation, we have to set theInitialValue property of RequiredFieldValidator control.
123. List the features of the Chart control.
The following are the features of the Chart control:
• Bounds a chart with any data source.
• Simple manipulation of chart data, such as copying, merging, grouping, sorting, searching, and filtering.
• Support many statistical and financial formulas for data analysis.
• Provide advanced chart outlook, such as 2-D, 3-D, lighting, and perspective.
• Support events and customizations.
• Includes interactivity with Microsoft AJAX.
• Supports AJAX Content Delivery Network (CDN).

 

 

Cognos Interview Questions

Top most important Cognos interview questions and answers by Experts:

Here is a list of Top most important Cognos interview questions and answers by Experts.If you want to download Cognos interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Cognos interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Cognos ,Register for Cognos online training here.

 

 

1)  What is a Data Warehouse?

  A Data Warehouse is a collection of data marts representing historical data from different operation data sources (OLTP). The data from these OLTP are structured and optimized for querying and analysis in a Data Warehouse.

2) Define Cognos Report Net?

Cognos Report Net is the web-based, dynamic, business intelligence reporting solution from Cognos.

3) What are the tiers of the Report Net Architecture?

The Report Net architecture can be separated into three tiers:

* Web server

* Applications

* Data 

4) Define Business Intelligence

 Business Intelligence is a broad category of application programs and technology used for query, Reporting and analyzing the business multi dimensionally.

5) What is a Data Mart?

 A Data Mart is a subset of a data warehouse that can provide data for reporting and analysis.

6) What is HPQS ?

 Data Marts are sometimes also called as HPQS (Higher Performance Query Structure).

7) What is multi dimension analysis?

It is a technique to modify the data so that the data can be view at the different levels of details.

8) What are the responsibilities of Cognos Administrator?

 A Cognos Administrator is assigned with following responsibilities.

  1. Installations and configurations in distributed network environment.
  2. Creating the Repository (Content Store). 3. Perform back up and recovery of Meta Data.4. Developing the user Administration.5. Tuning the servers.6. Deployment.

9) Responsibility of Cognos Architect?

An Architect is responsible for designing the interface by fulfilling the user requirements. Once the interface has been designed it should be rigorously tested before distributing to the end user population.

10) Roles of the Application Developer?

 Design the Reports according to the Report requirement templates.

 Testing the each report with the following types of tests.

  1. Unit Testing b. System Testing c. Performance Testing

11) What is OLAP?

 OLAP stands for Online Analytical Processing. It uses database tables (Fact and Dimension tables) to enable multidimensional viewing, analysis and querying of large amount of data.

12) What are the types of OLAPs?

  1. DOLAP:-The OLAP tool which works with desktop databases are called as DOLAP

Ex:- FoxPro, Clipper, Dbase, Paradox.

  1. ROLAP:-The OLAP tool, which works with Relational databases, are called as ROLAP.

Ex:-Oracle, SQL Server, Tera Data, DB2.

  1. MOLAP: – The OLAP  tool, which works with Multidimensional databases, are called as MOLAP.

Ex:- ESSBASE, Power Cube

  1. HOLAP:- The OLAP tool which works with Relational databases and Multidimensional database, are called as MOLAP.

Ex:- Cognos, Business Objects.

13) What is OLTP?

OLTP stands for Online Transaction Processing. Except data warehouse databases the other databases are OLTPs. These OLTP databases are designed for recording the daily operations and transactions of a business.

14) What is an Interface?

An Interface is a gateway between the user and database.

An Interface contains a logical pointers which pointes to data in the Data Warehouse.

An Interface is isolates the complexity and diversity if data bases.

A good OLAP Interface writes an efficient SQL read on accurate data from database.

An Interface needs to be designed by fulfilling the report requirement.

15) What is the role of a Data Warehouse in creating the Interface?

Data Warehouse acts as Source to the Interface.

16) What are the types of components installed while loading the Cognos Report Net Software?

When we install  the Cognos Report Net Software there are two types of components get installed :-

  1. Windows based components. 2. Web based components.

17) Define Windows based components?

 A Framework manager is windows based modelling tool used for creating a project (interface).

18) Define Web based Components?

 The following are the web based components.

  1. Cognos connection  B. Query Studio C. Report Studio D. Analysis Studio

19) Components of Report Net:

  1. Framework  manager.2. Cognos connection 3. Query Studio 4. Report Studio 5.Transformer 6. Analysis Studio

20) What are the phases of the Cognos Report Net Workflow?

Plan, Manage, Model, Author, Consume.

21) What are the advanced features of Report Net?

The Cognos Report Net has multilingual database accessibility.

The parameter maps are key value phase, which are used for working with local Language that the default value is ‘EN’.

22) What is Framework manager?

 Frame Work Manager is windows based metadata development or metadata modelling tool for Cognos Report Net.

23) Why we need Framework manager?

 To create the interface known as Project.

 To create model the metadata derived from one or more data sources

24) How a project appears in a Framework manager?

A frame work manager project appears as a folder that contains a project file (.cpf) and the specific XML files that define the project.

25) What are the Building Blocks in Frame Work Manager?

The Query subjects are called Building Blocks in Framework Manager.

26) What are phases the workflow process consists in Framework Manager?

The workflow process consists of the following phases:

* Design and create project > * Prepare Metadata >* Prepare the Business View

* Create and Manger Packages >* Set Security > * Publish >* Manage the Project

27) How you set the security Framework manager?

 To set the security you have to set as:* Define access to packages. >* Create security filters > * Define access to objects >* Define package administration access

28) Define Name Space?

In security, a collection of user accounts and user groups from an authentication provider. A  Name Space is a container, which holds the Query Subjects.A Name Space uniquely represents the Query Subjects.

29) Can you delete Cognos namespace?

No, we cannot delete Cognos namespace

30) What is the Cognos Namespace? And what it contains?

The Cognos namespace is the ReportNet built-in namespace

It contains Cognos objects:

Groups , Roles, Sources, Distribution lists, Contacts

31) What are the Groups and Roles?

 Groups and roles represent collections of users that perform similar tasks.

32) What is Folder?

A Folder is used to organize the Query Subjects.

33) Define Relationship?

 A Relationship is a connection that explains how the data in one Query Subject relates to data in other Query Subjects.

34) What is a Package?

A container for models, reports, and so on. Modellers create packages in Framework Manager to publish models to the ReportNet server.

35) What is Physical layer?

The Physical layer provides the physical query layer and is made up primarily of data source and stored procedure query subjects. It acts as the foundation for the presentation layer.

36) What is Presentation layer?

 The Presentation layer makes it easier for report authors to find and understand their data. The Presentation layer is made up primarily of model query subjects that you create.

37) Define function set:

 A function set is a collection of vendor specific database.

 The Expression editor lists the function sets for all available vendors. However, you can restrict the function sets, so that it lists only the vendors that you want to use in your project.

38) What is a Metadata?

 Data about data is called as Metadata. The Metadata contains the definition of a data.

39) What is a Project?

 When we work with a framework manager you work in a project.

 Project is a set of metadata organized for Report Authors according to the Business rules and Model.

 A Project created appears as folder, which contains following files.

  1. Project Name .CPF (Cognos Project File) > b. Model .XML > c. Preferences .XML
  2. Custom data .XML >The files in the folder are unique to that Project.

40) Define Publish?

To transfer all or part of a Framework Manager model to the ReportNet server, so that report authors can use it.

41) What a Project contains?

  1. A Model > B. Namespaces > C. Data sources > D. Parameter maps > E. Packages
  2. Folders > G. Query Subject > H. Query Item >I. Relation ship

42) What is a Model?

 A model in Frame work manager is a business presentation of the structure of the data from one or more databases. Or A model is a set of related query subjects and other objects.

43) What are Dimensions?

Dimensions are categories by which summarized data can be viewed.

44) What are Confirmed Dimensions?

The Dimensions which are reusable and fixed in nature.

45) What are Fact Tables?

A Fact Table is a table that contains summarized numerical (facts)  and historical data. This Fact Table has a foreign key – primary key relation with a dimension table.

46) What are the types of Facts?

 The types of Facts are:

  1. Additive Facts:- A Fact which can be summed up for any of the dimension available in the Fact Table.
  2. Semi-Additive Facts:- A Fact which can be summed up to a few dimensions and not for all dimensions and not for all dimensions available in the Fact Table.
  3.   Non-Additive Fact:- a fact which cannot be summed up for any of the dimensions available in the Fact Table.

47) Define Query?

 A description of the data to be retrieved from a database.

48) Explain about Data Source Query Subject?

Data Source query subjects contain SQL statements the directly reference data in a single data source. Frame work manager automatically creates a data source query subject for each table and view that you import into model.

49) When the default data source query subject is created?

 During the initial metadata import operation, a default data source query subject is created for each object you select (for example table) and creates the default relationships between query subjects for you automatically.

50) How can you edit the data source query subject?

i. Apply or embed a filter > ii. Apply or embed a calculation > iii. Insert a MacroInsert a data source reference. > v. Change the SQL type. > vi. Change how SQL is generated. >These all are we can find it in “Edit definition window”.

51) What are the types of SQL?

 SQL is the industry language for creating, updating and querying relational data base management system. Types of SQL.

  1. Cognos SQL 2. Native SQL 3. Pass-through SQL.

52) Define Cognos SQL?

 By default Cognos FM uses Cognos SQL to create and edit Query subjects.

 Advantages:

  1. Can contain metadata from multiple data sources. 2. Have fewer database restrictions 3. Interact more effectively with Cognos applications.

Disadvantages:

 You can not enter nonstandard SQL.

53) Define Native SQL?

 Native SQL is the SQL, the data source uses, such as Oracle SQL, but you cannot uses Native SQL in a query subject that references more than one data source in the project.

 Advantages:

  1. Performance is optimized across all related query subjects.
  2. You can use SQL that is specific to your database.

Disadvantages:

  1. You cannot use SQL that the data source does not support for sub queries.
  2. The query subject may not work on different database type.

54) Define Pass-Through SQL?

 Pass-Through SQL lets you use native SQL without any of the restrictions the data source imposes on sub queries.

 Advantages:

  1. You can enter any SQL supported by the database.

Disadvantages:

  1. There is no opportunity for Frame work manager to automatically optimize performance. The SQL may not work on a different data source.

55) What are Query Processing Types?

There are two types of query processing.

  1. Limited Local: The database server does as much of the SQL processing and Execution as possible. However, some reports or report sections use local SQL processing.
  2. Database only: The database server does all the SQL processing and execution with the exception of tasks not supported by the database. An error appears if any reports of report sections require local SQL processing.

56) What is Query Subject?

 A Query Subject maps to the table in the database.

 A Query Subject uses an SQL to retrieve the data from the data source.

 A Query Subject is also known as Business View.

57) What are the types of Query subjects?

  1. Default data source query subjects 2. Model Query Subjects
  2. Stored Query subjects

58) What is a Query Item?

 A query Item maps to columns to the database table. A Query Subject contains Query Items.

59) How can you restrict the tables retrieved by a query?

 By setting governors we can restrict the tables.

60) What is meant by Governors?

To apply privileges and restrictions for a user class. Governor settings are used to set restrictions on queries by user class, such as

  1. Sorting on non-indexed columns 2. Outer joins 3. Suppress duplicates 4. Cross-product queries 5. Retrieval of large text items 6. Number of records 7. Number of tables 8. Query execution time

61) What is a User Class?

A defined group of users with the same data access needs, privileges and restrictions.

62) What is Scrubbing at Project level?

According to the report requirements derive the new Items with the help of existing Query Items. This process is known as Scrubbing at Project level.

63) How can you add the calculated data to a report?

  1. Summarize existing detail values predefined summary functions (such as sum, avg)
  2. Create new report items using data from existing report items.
  3. Use model calculations provided in the package.

64) What are the sources to create new Query subjects?

 A new Query Subject can be created from the following sources.

  1. Model (Query subjects & Query Items) 2. Data Sources (Tables and Columns)
  2. Stored Procedure.

65) What is Multi Database Access in Cognos Report Net?

 In Cognos Report Net a Project can be created from multiple databases. The databases can be either homogenous or hydrogenous.

66) What are Parameter Maps?

 A Parameter Map is a key value pair used in creation of conditional Query Subjects.

 A Parameter map sub situates the values at the query at runtime.

67) What is the default formats of reports?

HTML, PDF, CSV, and XML.

68) What are the different ways to modify multi lingual metadata?

  1. Macro :- To modify dynamically
  2. Directly

69) What is a Macro?

A Macro is a runtime object, which uses the parameter maps and session parameters in developing the conditional query subjects.

70) What is usage property? And what are different setting to set usage property?

It identifies the intended use for the data represented by each query item.

It determines the aggregation rules of query items and calculations.

The different usage property settings are:

* Identifies * Fact * Attribute * Unknown

71) What are the types of filters in Framework manager?

In framework manager we can create two types of filters.

  1. Model filters 2. Query filters.

72) Define Model Filter?

 A filter is a condition used to restrict the data displayed in the Report.

 Model filter are reusable.

73) Define Data restriction?

A filter is a condition, which restricts the amount of data displayed in the report.

74) What is condition?

An expression that yields a Boolean value. Conditions are used in query expressions, query filters, and Boolean report variables that can be used for conditional formatting, styles, data sources, layouts and blocks.

75) Types of Conditions?

Conditions are of 2 types:

  1. Static Condition: – Condition doesn’t change whenever you run the report.
  2. Dynamic Condition: -A condition can be kept on change whenever you run the report.

76) What are the types of filters in Report Studio?

 In the report studio we can find two types of filters.

  1. Tabular Filters:- These filters are two types
  2. Summary Filters b. Detailed Filters
  3. Grouped Filter

77) What is a Loop?

A Loop is a closed path which is resulted due to joints.

A Loop causes performance degradation of query execution and wrong data will be displayed in the report.

A Loop can be resolved by creating the short cuts (Alias).

78) What is Alias Table?

An alternative name for a table generally used in self joins

79) What are the uses of Alias Table?

The uses of Alias Table are :1. To resolve the Loops. 2. To create self-joins with in a table. 3. To Provide alternate join structure.

80) What is Associated Data Item?

A Data Item linked to the group data item. Associated data item suppress duplicate data values but do not generate a control break. The associated column displays only one data values for the group with which it is associated.

81) What is Automatic Association?

The group association of a newly created summary. The location of the group where you create the summary determines its automatic association.

82) What is an Ambiguous Relationship?

An ambiguous relationship is where there are multiple relationship paths between one or more query subjects leaving multiple options for how to write a query.

83) What is a Join and types of Joins?

 A Join identifies the columns from one table that are used to link to another table.

 A Join is commonly formed by a foreign key definition within the database.

Types of Joins :- 1. Equi-joins 2. Non equi-joins 3. Outer joins

84) What is a dimension?

A broad grouping of descriptive data about a major aspect of a business, such as products, dates, or markets. Each dimension includes different levels of members in one or more hierarchies, and an optional set of calculated members.

85) What is a Confirmed Dimension?

If a Dimension is connected to multiple fact tables then it is called as Confirmed Dimension.

86) What is a Junk Dimension?

A randomly used dimension is Junk Dimension.

87) Define Surrogate Key?

It has system-generated artificial primary key values, which allows to maintain historical records in the Data Warehouse more effectively.

88) What are the User Interface Components?

* Cognos Connection * Report Studio * Query Studio * Frame work manager

* Cognos configuration

 89) What is significance of Framework Manager in Cognos Reporting?

 Framework Manager is a metadata modelling tool. A model is a business presentation of the information in one or more data sources. When you add security and multilingual capabilities to this business presentation, one model can serve the reporting, ad hoc querying, and analysis needs of many groups of users

90) What is loop in framework manager?

Loop is closed path in IN FRAME WORK MANAGER DUE TO JOINS report net it called as ambiguous relationship. That means a query subject contains multiple paths to retrieve the data. It is an exception to resolve to create a shortcut on that query subject otherwise it displays wrong results in reports and performance is degrades. An undefined join between two tables is known as loop. To resolve loop delete the joins, if these joins are necessary then we have to create shortcuts nothing but alias tables. Place the joins in alias tables.

91) What are the filters in Framework Manager and Report Studio?

Filters in framework manager are

  1. Standalone filters 2. Embedded filters

Report studio Filters are

  1. Detail filters 2. Summary filters.

92) How to import two data sources into Framework Manager?

We can import two data sources to FM  in the Run Metadata  Wizard.

Go to Run Metadata Wizard–>Select another database ( e.g. suppose SQL Server is choosed in prior attempt, then u can choose Oracle as new datasource).Then import it

93) How to perform single sign on in Cognos by using URL?

In Cognos configuration under authentication allow anonymous access should be false. In cgi-bin properties (under iis) the enable anonymous access should be false.

94) What is usage property? Where do we set usage property?

1.The Usage Property identifies the use for the data represented by query item.

It determines the aggregation rules of query items and calculations.
The different usage property settings are Identifier, Fact, Attribute, Unknown

  1. To set the usage property: Click the query item u want to set the usage property for Then click the properties icon on the tool bar or you can see the properties pane on the right side of the browser. Go to “USAGE” tab and click “CLICK TO EDIT” option. And select the appropriate.

95) What is the use of prompts in Framework Manager?

Use of Prompt in Framework Manager:

Filter on query subject – to restrict the rows that are returned by filtering out the unwanted data by creating one or more embedded filters for query subject.

Prompt in filter with usage set to always – user need to supply a value to filter.

96) Where exactly determinants are used in cognos framework manager?

A query subject that behaves as a dimension has multiple levels of granularity and will be joined on different sets of keys to fact data.

97) How would you structure your Framework Manager Model?

A model is normally structured into two layers/views. Database/ Physical view and Business/ Presentation view. These can be implemented using Namespaces.

You import the metadata into Physical layer from DB using data source connection. You will use Import Metadata Wizard. You will change the Query Subjects & Query Items, create relationships (joins) and other activities here.

In the Presentation layer, you create Query Subjects taking input from the existing Physical layer. You change the names of the Query Items and other cosmetic modifications. You can choose only the Presentation layer while creating the Packages and apply appropriate security settings.

98) How to provide security in frame work manager for a query subject?

 Procedure for providing security for query subject in frame work manager is:

Select querysubject -> in properties pane select ->security filters (click on edit)a specify data security wizard appears->click on add groups -> cognosnamesspace(select users and groups wizard opens)

99) How can we generate the cubes in framework manager?

You can create the IQD file from framework manager.

This IQD file will be used by Transformer to create the cube.

100) How to generate IQD file from framework manager?

Create a Query Subject, from the properties pane select externalise, there we have 4 options in that select IQD.

101) What are the components of Report Net?

Framework manager ,Cognos connection, Query Studio, Report Studio

102) What is difference between content store and content manager?

A content store is a data base which stores the meta data of the reports.
But where as a content manager is a service which is available in dispatcher. which it manages the security.

103) What is OLAP?

OLAP stands for On Line Analytical Processing, a series of protocols used mainly for business reporting.

104) What are components of report studio?

Insert table Objects pane > Properties pane > Explorer bar >Report Viewer

105) What is Snap Shot?

snapshot is a static data source it is a picture of report once u created a snapshot report u can’t add a data item.

106) How do you define a cube?

Its a multidimensional view of dimension and measures. It is used to analyze the data in various aspects, which is called slicing and dicing.

107) What is the Difference between Power Play transformer and power play reports?

Power play transformer’ is an ‘MOLAP’ tool using which one can create multi dimensional structure called “CUBE”.
Power play for reports is used to generate report from the cube. Only one report can be generated from one cube. If u want ‘n’ reports u must create ‘n’ cubes.

108) What is cube size?

2.0 GBit depends on our project requirements.

109) What is meant by Junk Dimension?

The Junk Dimension also called as garbage dimension. 
A junk dimension is a convenient grouping of typically low-cardinality flags and indicators.

110) What is transformer?

Transformer is used for building the Cubes (Multidimensional Structure used for OLAP

111) What is catalogue and types of catalogues in cagonos?

A catalogue is a file containing the information (Database tables) that Impromptu users need to create reports. > personal > distributed > hared > secured

112) What is Cardinality?

Relationships exist between two query subjects. The cardinality of a relationship is the number of related rows for each of the two query subjects. The rows are related by the expression of the relationship; this expression usually refers to the primary and foreign keys of the underlying tables.

113) How to join multiple db in catalogue?

Multiple database could not be connected in a single catalogue. So that we use hot file for this purpose.

114) How to generate cubes in cognos?

Power Play Transformer contain dimension,measure,model and cube. we can generate cube different way. > Just right click on cube name and build.
we can write script in Unix. using that we can generate cube.

115) What is snapshot?

A Snapshot is the copy of data, when we create a snapshot it copies the exact data that’s related to the at particular report, we use snapshot when ever we want to compare reports.(Example :we want to compare this months report with previous months).

116) Define data stores in Cognos?

Data sources, also known as query databases, are relational databases, dimensional cubes, files, or other physical data stores that can be accessed through IBM Cognos8. Application Tier Components use data source connections to access data sources.

117) What is metric store database?

A metric store database is a special case of a query database. A metric store database is used to store the information associated with metrics that appear in scorecards, including targets performance metrics , thresholds , membership in scorecards
links to related reports

118) What is difference between view and materialized view?

Views contains query whenever execute views it has read from base table Where as M views loading or replicated takes place only once which gives you better query performance.

119) What is difference between data mart and data warehouse?

A data mart designed for a particular line of business, such as sales, marketing, or finance.

Where as data warehouse is enterprise-wide/organizational

The data flow of data warehouse depending on the approach.

120) What is DTM?

DTM transform data received from reader buffer and its moves transformation to transformation on row by row basis and it uses transformation caches when necessary.

121) What are the different uses of a repository manager?

Repository manager used to create repository which contains metadata the informatica uses to transform data from source to target. And also it use to create informatica user’s and folders and copy, backup and restore the repository.

122) What is a folder?

Folder contains repository objects such as sources, targets, mappings, transformation which are helps logically organize our data warehouse.

123) Explain Informatica Architecture?

Informatica consist of client and server. Client tools such as Repository manager, Designer, Server manager. Repository data base contains metadata it read by informatica server used read data from source, transforming and loading into target.

124) How do you call a store procedure within a transformation?

In the expression transformation create new out port in the expression write :sp.stored procedure name(arguments).

125) What is difference between Informatica power mart and power centre?

Using power centre we can create global repository

Power mart used to create local repository

Global repository configure multiple server to balance session load

Local repository configure only single server

126) What are the batches and it’s details?

Sequential(Run the sessions one by one

Concurrent (Run the sessions simultaneously)

127) What is main difference mapplets and mapping?

Reuse the transformation in several mappings, where as mapping not like that.
If any changes made in mapplets it automatically inherited in all other instance mapplets.

128) What is bitmap index?

A bitmap for each key value replaces a list of row ids. Bitmap index more efficient for data warehousing because low cardinality, low updates, very efficient for where class.

129) Why need staging area database for DWH?

Staging area needs to clean operational data before loading into data warehouse.
Cleaning in the sense your merging data which comes from different source.

130) What is slowly changing dimension?

Dimension attribute values may change constantly over the time. (Say for example customer dimension has customer_id,name, and address) customer address may change over time.

131) What is difference between primary key and unique key constraints?

Primary key maintains uniqueness and not null values Where as unique constrains maintain unique values and null values.

132) What are the types of index?

Bitmap index ,B-tree index, Function based index ,reverse key and composite index. We used Bitmap index in our project for better performance.

133) What are the different uses of a repository manager?

Repository manager used to create repository which contains metadata the informatica uses to transform data from source to target. And also it use to create informatica user’s and folders and copy, backup and restore the repository.

134) What are shortcuts? Where it can be used? What are the advantages?

There are 2 shortcuts(Local and global) Local used in local repository and global used in global repository. The advantage is reuse an object without creating multiple objects. Say for example a source definition want to use in 10 mappings in 10 different folder without creating 10 multiple source you create 10 shortcuts.

 

 

.NET Interview Questions

Top most important .Net interview questions and answers by Experts:

Here is a list of Top most important .Net interview questions and answers by Experts.If you want to download .Net interview questions pdf free ,you can register with RVH techguru. Our experts prepared these .Net interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in .Net ,Register for .Net online training here.

 

 

1) What are the advantages of .Net?
• Good Design
• Object-Oriented Programming – Using C# and .NET which are based on object-oriented Concepts.
• Language Independence – All the languages which are supported by .Net (VB.NET, C#, J#, and managed C++) are compiled into common Intermediate Language (IL). So IL makes sure that languages are interoperable.
• Efficient Data Access – ADO.NET provides fast and efficient way to access RDBMS, file system etc.
• Code Sharing – To share code between applications, a new concept called assembly is introduced. Assemblies supports versioning.
• Improved Security
• Support Dynamic Web Pages – Using ASP.NET
• Support for Web Services

2) What is .Net Framework ?
The .NET framework is a programming framework from Microsoft. Developers can use .Net Framework to develop applications, install and run the application on Windows operating systems.
3) What is MS-IL (Microsoft Intermediate Language) ?
When a program is complied in .Net, the source code will be converted into an intermediate language called Microsoft Intermediate Language (MS-IL). This is done by Just-In time Compiler (JIT). The dot net framework is built in such a way that the code is Just-In time complied, which means that it get complied when it is called rather than compiling entire code at the start up. A portion of the code will get complied only once and it will exist till the application exit. This will have a significant improvement in performance since the entire section of the code won’t get executed in most cases.
4) What is Common Language Runtime (CLR) ?
Common Language Runtime or CLR is the run-time execution environment of .Net Framework. Converting MS-IL into platform or OS specific code is done by the CLR. Currently, .Net programs will run only on windows.

5) What is Common Type System (CTS) ?
.Net uses Common Type System (CTS) for Language Interoperability. CTS defines the predefined data types that are available in IL, so that all languages that target the .NET framework will produce the compiled code that is ultimately based on these types. CTS ensures that a data type defined in a VB.net will be understood by C#. For example, VB.Net uses “Integer” to define the data type Integer. C# uses “int” to define the data type Integer. When VB.Net code is compiled, it will convert the Integer to Int32. Since C# refers Int to Int32, VB.Net code will be understood by C#.
6) What is Common Language Specification (CLS) ?
Common Language Specification (CLS) is used for Language Interoperability in tandem with CTS to ensure the interoperability of the languages. CLS defines a set of minimum standards that all compilers targeting dot net must support. For example, VB.Net is not case sensitive. So attribute “EmployeeName” and “employeename” is considered same. But C# is case sensitive. So for language interoperability, C# doesn’t allow two variables which differ only in case.
7) What is Garbage Collector ?
Garbage Collector is used in dot net Framework for memory management. While running an application, applications make a request for memory for its internal use. Framework allocates memory from the heap. Once the process is completed, allocated memory needs to be reclaimed for future use. The process of reclaiming unused memory is taken care by the Garbage Collector.
8) How to invoke garbage collector programmatically ?
To call garbage collector from a program, use code “ GC.Collect(); “
9) What is a Managed Code ?
Managed code is code that can be executed and managed by .NET Framework Common Language Runtime. All codes based on the intermediate language(EL) executes as managed code.
10) What is an Assembly ?
Assemblies are self-describing logical unit which consists of one or more files targeted at dot net. An assembly can be stored across single file such as a single DLL or EXE that includes metadata, or it can be stored in multiple files. For example, resource files like meta data, DLL’s, and an EXE. Assemblies support versioning.
11) What is Assembly Manifest ?
Part of the assembly which contains assembly meta data that describes the assembly itself is known as manifest. Assembly manifest contains Assembly Name, Version Number, Culture, Strong name, List of files inside the assembly and Reference information.
12) What are the different types of Assembly ?
The two types of Assemblies are Shared and Private.

13) What is a Private Assembly ?
Private Assemblies are intended to be used by the program for which it is made for. Reason behind this is that, the application will only load private assemblies that are located in the same folder or in the sub folder of the main executable.
14) What is Shared Assembly ?
Shared Assemblies contain Common Libraries which are intended to be used by multiple applications. While making shared assemblies, name collisions and overwriting existing assemblies need to be taken care. Name Collisions can be taken care by strong name. Global assembly cache can be used to avoid assembly overwriting.

15) How to view Assembly information ?
By using Ildasm.exe, which is an MSIL Disassembler one can view attributes, references to other modules and assemblies.

16) Where is the assembly version information stored ?
In the Manifest.
17) What is NameSpace ?
A namespace is a logical grouping of related classes and types. Every class should have a NameSpace.
18) What is the Difference between NameSpace and Assembly ?
Namespace:
• Forms the logical boundary for a Group of classes.
• It is a Collection of names where each name is Unique.
• The namespace must be specified in Project Properties.
Assembly:
• Assemblies are Self-Describing
• It is an Output Unit. It is a unit of deployment and is used for versioning. Assemblies contain MSIL code.
19) What is Global Assembly Cache (GAC) ?
While using shared assemblies, to avoid Assembly being overwritten by a different version of the same assembly, shared assemblies are placed in a special directory subtree of the file system known as the global assembly cache (GAC). Placing shared assemblies can only be done by a special .Net Utilities.
20) Explain the concept of strong names ?
While using shared assemblies, in order to avoid name collisions strong names are used. Strong Names are based on private key cryptography, ie. private assemblies are simply given the same name as their main file name.

21) How to add and remove a assembly from GAC?
To install assembly in Cache, use Gacutil. To run Gacutil, goto “Visual Studio Command Prompt” and type “gacutil -i <assembly_name>”, where (assembly_name) is the DLL name of the project. To uninstall assembly, type gacutil –u <assembly name> in Visual Studio Command Prompt.

22) What is Reflection?
Reflection is used to dynamically load a class, create object and invoke methods at runtime. It can also be used to read its own meta data to find assemblies, modules and type information at runtime.

23) What is Delay signing ?
To create a strong named assembly and to make sure that this assembly can used by someone else, we partially build this assembly by providing a Public Key. We write this Public Key in the AssemblyInfo.vb OR .cs file. We also add an attribute by the name <Assembly:AssemblyDelaySignAttribute(true)> to the assembly info file. This makes it sure that when we build the assembly, it would be containing the information only about the public key before we deliver it to our clients. This is a partial strong named assembly that we have created, and hence it is called Delayed Assembly.

24) What are the different type of JIT’s ?
Different Types of JIT are
1) Pre-JIT – Complies complete source code into native code at the time of deployment.
2) Econo-JIT – Complies methods that are called at runtime.
3) Normal-JIT – Complies methods that are called at runtime and get stored in cache. Next time when the same method is called, it will be taken from cache.
25) What are Value types and Reference types ?
There are two types of data types in .Net, Value types and Reference types. Value types are stored in stack part of the memory. Reference type are stored in managed heap. Let have a look at the example for better understanding.
Int iCount = 0; \\ Value Type
int NewiCount = iCount; \\ Reference Type

26) Explain the concept of Boxing and Unboxing ?
Converting a value type to reference type is called Boxing. Converting a reference type to value type is called Unboxing.
27) What’s the difference between System exceptions and Application exceptions?
System exceptions are common exceptions thrown by the CLR of .Net Framework. Application exceptions can be user defined exceptions thrown by the application.
28) What is CODE Access security?
CODE Access security is a security model that let us grant or deny execution permissions to an assembly according to its “properties,” called evidence, such as its strong name or publisher

29) What is a satellite assembly?
A satellite assembly are used when multilingual (UI) application are created. Satellite assembly is a compiled library that contains localized resources which provides us with the capability of designing and deploying solutions to multiple cultures, rather than hard coding texts, bitmaps etc

30) How to prevent my .NET DLL to be decompiled ?
We can prevent .NET DLL to be decompiled upto an extent by Obfuscate Source code, asymmetric encryption and encrypted w32 wrapper application.

31) What is Native Image Generator (Ngen.exe) ?
Ngen.exe creates compiled processor-specific machine code called native images which are files and installs them into the native image cache on the local computer. The runtime will use native images from the cache rather than using the JIT compiler to compile the original assembly.

32) What is Code Document Object Model (CodeDom) ?
Code Document Object Model are code generators which are used to minimize repetitive coding tasks, and to minimize the number of human-generated source code lines.
33) What is the difference between custom controls and user controls?
Custom controls are basically compiled code i.e. DLLs. These can be easily added to toolbox, so it can be easily used across multiple projects using drag and drop approach. These controls are comparatively hard to create.
But User Controls (.ascx) are just like pages (.aspx). These are comparatively easy to create but tightly couple with respect to User Interface and code. In order to use across multiple projects, we need to copy and paste to the other project as well.
34) What are the different types of Validation controls in ASP.NET?
In order to validate user input, ASP.NET provides validation server controls. All validation controls inherits from BaseValidator class which contains the common validation properties and methods like ControlToValidate,Enabled, IsValid, EnableClientScript, ValidationGroup,Validate() etc.
ASP.NET provides a range of validation controls:
• RequiredFieldValidator validates compulsory/required input.
• RangeValidator validates the range. Validates that input falls between the given range values.
• CompareValidator validates or compares the input of a control with another control value or with a fixed value.
• RegularExpressionValidator validates input value against a defined regular expression pattern.
• CustomValidator allows to customize the validation logic with respect to our application logic.
• ValidationSummary displays all errors on page collectively.
35) What are the types of Authentication in ASP.NET?
There are three types of authentication available in ASP.NET:
• Windows Authentication: This authentication method uses built-in windows security features to authenticate user.
• Forms Authentication: authenticate against a customized list of users or users in a database.
• Passport Authentication: validates against Microsoft Passport service which is basically a centralized authentication service.

36) What are the benefits of .NET Framework?
.NET Framework offers many benefits to application developers. Some of these benefits are as follows:
Consistent programming model —.NET Framework provides a consistent object-oriented programming model across various languages. You on we this model to create programs for performing different tasks, such as connecting to and retrieving data from databases and reading from and writing to files.
Language interoperability —Language interoperability is a feature that enables a piece of code written in one language to be used in another language. This facilities the reuse of code and therefore improves the efficiency of the development process.
Automatic management of resources —Wink developing .NET. applications, you may use various resources, such as files, memory, and database connecters. With MET Framework, you do not need to manually free these resources when they are no longer required.
Ease of deployment- .NET framework makes the deployment of applications easier. To install an application that is not based on NET Framework you need to copy It and its components on target computers. However, with MET Framework, you can quickly Install or deploy the applications such that Installation of new applications or components does not affect the existing applications.
37) Mention the core components of .NET Framework.
The two core components of .NET Framework are:
Common Language Runtime
.NET Framework Class Library.[sociallocker]
38) Briefly describe MSIL.
.NET Framework is shipped with compilers of all Programming languages to develop Programs. There are separate compilers for the Visual Basic, CS, and Visual C++ programming Languages in .NET Framework Each .NET compiler produces an intermediate aide after Compiling the source code. The Intermediate code is common for all languages and Is understandable only to NET environment. This intermediate code IS known as MSIL. MSIL file Is an executable file that can be transferred across various machines.
39) Briefly describe the roles of CLR in .NET Framework.
CLR provides an environment to execute MET applications on target machines.
CLR-is also a common runtime environment for all MET code irrespective of their programming language, because the compilers of MET Framework convert every source code into a common language known as MSIL .
CLR also provides various services to execute processes, such as memory management service and security services..CLR performs various tasks to manage the execution process of MET applications. The responsibilities of as are listed below:
Automatic memory management–CLR invokes venous built-in functions of MET Framework to allocate and de-allocate the memory of MET objects. Therefore, programmers need not write the code to explicitly allocate and de-allocate memory to programs.
Garbage Collection —Garbage collection Is the major role of CUR, with prevents memory leaks during execution of programs. The Garbage collector of CLR automatically determines the best time to free the memory, which is reserved by an object for execution.
Code Access Security —Code Access Security (CAS) model is used in MET Framework to impose restrictions and security during execution of programs. CLR uses security objects to manage access to code during execution of MET applications. as allows an executing code to perform only those tasks for which it has permission.
40) What is the role of the /IT complier In .NET Framework?
The MT complier is an important element of as, with loads 14.511 on target machine for execution. The MSIL is stored in MET assemblies after the developer has compiled the code written in any .NET. compliant programming language, such as Visual Basic and C#.
41) What is CTS?
CTS is the component of CUL through which WET Framework provides support for multiple languages because it contains a type system that is common across ate languages. Two CIS-compliant languages do not require type conversion when calling the cede written in one language from within the code written in another language. CTS provides a base set of data types for al the languages supported by.NET Framework. This means that the size of integer and long variables is the Same across ah .NET compliant programming languages. However, each language uses aliases for the base data types provided by CTS. For example, CTS uses the data type system. Int32 to represent a 4 byte integer value; however, Visual Basic uses the alias Integer for the same, whereas Cl uses the alias int. This is done for the sake of clarity and simplicity.
42) What Is CLS?
Common Language Specification (CLS) is a set of basic rules, which enables interoperability between two .NET-complaint languages. CIS is a subset of CTS; therefore, the languages supported by CLS can use each other’s c lass libraries similar to their own. Application programming interfaces (APIS), which we designed by following the rules defined In CLS, can be used by W .NET-compliant languages.
43) What Is managed code?
 Managed code is the code that Is executed directly by the CLR. The applications created by using managed code automatically have CLR services such as type Checking, security, and automatic garbage collection. These services Help provide platform and language independence for managed code applications. The CLR compiles the source code to MSIL, not machine code. This MSIL along with the metadata that describes the attributes, classes and methods of the code resides an assembly.
44)  What is an assembly?
An assembly is the primary building block of .NET Framework applications. In .NET, every application is compiled into an assembly, which refers to a portable executable (PE) file. The PE file can be either a dynamic Link library of an executable (.exe file).that contains the MSIL code of the compiled application. In addition to the MS11, an assembly also contains the files and resources necessary for the application, assembly metadata, and’ type metadata. An assembly stores the information about itself such as the name, version number of the assembly, and security information, which Is called metadata. Ibis also o ceded the assembly metadata. The type metadata is the information about the types (classes, structures, interfaces, and enumerations) required for the assembly.
45) Explain the different types of assemblies.
Assemblies are of two types, private and shared assemblies. A private assembly is used by the clients of the same application directory structure as the assembly. A shared assembly is stored in the global assembly cache (GAC), which is a repository of assemblies maintained by the runtime. A Shared assembly can be referenced by more than one application.
46) Can one DLL file contains the compiled code of more than one .NET language?
No, a DLL file can contain the complied code of only one programming language.
47) What Is the maximum number of classes that can be contained In one DLL file?
There is no limit to the number of classes that can be curtained In a DLL file.
48) Explain the differences between managed and unmanaged code?
Managed code is the code that is executed chatty by the QR Instead of the operating system. Unmanaged code is the code that is executed directly by the operating system outside the OR environment. In managed code, since the execution of the code Is governed by CLR, the runtime provides different services such as garbage collection, type checking, exception handling, and safety and support These sat help provide uniformly in platform and language-Independent behavior of managed code applications. In unmanaged code, the allocation of memory, type safety, and security is required to be taken are of by the developer. If the unmanaged code is not Properly handles, may result In memory leak. Examples of unmanaged code are ActiveX components and Wm32 AM that execute beyond the scope of native CLR.
49) Mention the execution process for managed code.
A piece of managed code is executed as follows:
1. Chasing a language compiler
2. Compiling the code to MSIL
3. Compiling MSIL to native code
I. Creating the code
50) Difference between int and int32?
Both are the same. system. int32 is a .NET class and int is an alias name for System. Int32.
51) What is side-by-side execution? Can two applications, one using a private assembly and other using a shared assembly, be stated as side-by-side executables?
Side-by-side execution Is the ability to run multiple versions of an application or component on the same computer. You can have multiple versions of the CLR and multiple versions of applications and components Mat use a version of the runtime on the same computer at the same time. As versioning is only applied to shared assemblies and not to private assemblies, two applications, one using a private assembly and other using a shared assembly, cannot be stated as side-by-side executables.

52) Why Is string called Immutable data type?
A sting represents text and stores a sequential collection of characters in the memory. A string object is said to be immutable (read only), because a value once assigned to a string object cannot be changed after the acting object has been created. When the value In the string object is modified, a new string object is created with a new value assigned to the string object therefore, keeping the old string In memory for garbage collector to be disposed.
53) What is code access security?
Code access security (CAS) is part of the .NET security mode that determines whether or not a piece of code is allowed to run and what resources it can use while running.
54) What are the advantages of ASP.NET MVC?
1. Extensive support for TDD. With asp.net MVC, views can also be very easily unit tested.
2. Complex applications can be easily managed
3. Separation of concerns. Different aspects of the application can be divided into Model, View and Controller.
4. ASP.NET MVC views are light weight, as they donot use viewstate. [/sociallocker]

 

 

Datastage Interview Questions

Top most important Datastage interview questions and answers by Experts:

Here is a list of Top most important Datastage interview questions and answers by Experts.If you want to download Datastage interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Datastage interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Datastage ,Register for Datastage online training here.

 

1) Define Data Stage?

A data stage is basically a tool that is used to design, develop and execute various applications to fill multiple tables in data warehouse or data marts. It is a program for Windows servers that extracts data from databases and change them into data warehouses. It has become an essential part of IBM WebSphere Data Integration suite.

2) Explain how a source file is populated?

We can populate a source file in many ways such as by creating a SQL query in Oracle, or  by using row generator extract tool etc.

3) Name the command line functions to import and export the DS jobs?

To import the DS jobs, dsimport.exe is used and to export the DS jobs, dsexport.exe is used.

4) What is the difference between Datastage 7.5 and 7.0?

In Datastage 7.5 many new stages are added for more robustness and smooth performance, such as Procedure Stage, Command Stage, Generate Report etc.

5) In Datastage, how you can fix the truncated data error?

The truncated data error can be fixed by using ENVIRONMENT VARIABLE ‘ IMPORT_REJECT_STRING_FIELD_OVERRUN’.

6) Define Merge?

Merge means to join two or more tables. The two tables are joined on the basis of Primary key columns in both the tables.

7) Differentiate between data file and descriptor file?

As the name implies, data files contains the data and the descriptor file contains the description/information about the data in the data files.

8) Differentiate between datastage and informatica?

In datastage, there is a concept of partition, parallelism for node configuration. While, there is no concept of partition and parallelism in informatica for node configuration. Also, Informatica is more scalable than Datastage. Datastage is more user-friendly as compared to Informatica.

9) Define Routines and their types?

Routines are basically collection of functions that is defined by DS manager. It can be called via transformer stage. There are three types of routines such as, parallel routines, main frame routines and server routines.

10) How can you write parallel routines in datastage PX?

We can write parallel routines in C or C++ compiler. Such routines are also created in DS manager and can be called from transformer stage.

11) What is the method of removing duplicates, without the remove duplicate stage?

Duplicates can be removed by using Sort stage. We can use the option, as allow duplicate = false.

12) What steps should be taken to improve Datastage jobs?

In order to improve performance of Datastage jobs, we have to first establish the baselines. Secondly, we should not use only one flow for performance testing. Thirdly, we should work in increment. Then, we should evaluate data skews. Then we should isolate and solve the problems, one by one. After that, we should distribute the file systems to remove bottlenecks, if any. Also, we should not include RDBMS in start of testing phase. Last but not the least, we should understand and assess the available tuning knobs.

13) Differentiate between Join, Merge and Lookup stage?

All the three concepts are different from each other in the way they use the memory storage, compare input requirements and how they treat various records. Join and Merge needs less memory as compared to the Lookup stage.

14) Explain Quality stage?

Quality stage is also known as Integrity stage. It assists in integrating different types of data from various sources.

15) Define Job control?

Job control can be best performed by using Job Control Language (JCL). This tool is used to execute multiple jobs simultaneously, without using any kind of loop.

16) Differentiate between Symmetric Multiprocessing and Massive Parallel Processing?

In Symmetric Multiprocessing, the hardware resources are shared by processor. The processor has one operating system and it communicates through shared memory. While in Massive Parallel processing, the processor access the hardware resources exclusively. This type of processing is also known as Shared Nothing, since nothing is shared in this. It is faster than the Symmetric Multiprocessing.

17) What are the steps required to kill the job in Datastage?

To kill the job in Datasatge, we have to kill the respective processing ID.

18) Differentiate between validated and Compiled in the Datastage?

In Datastage, validating a job means, executing a job. While validating, the Datastage engine verifies whether all the required properties are provided or not. In other case, while compiling a job, the Datastage engine verifies that whether all the given properties are valid or not.

19) How to manage date conversion in Datastage?

We can use date conversion function for this purpose i.e. Oconv(Iconv(Filedname,”Existing Date Format”),”Another Date Format”).

20) Why do we use exception activity in Datastage?

All the stages after the exception activity in Datastage are executed in case of any unknown error occurs while executing the job sequencer.

21) How a routine is called in Datastage job?

In Datastage, routines are of two types i.e. Before Sub Routines and After Sub Routines. We can call a routine from the transformer stage in Datastage.

22) Differentiate between Operational Datastage (ODS) and Data warehouse?

We can say, ODS is a mini data warehouse. An ODS doesn’t contain information for more than 1 year while a data warehouse contains detailed information regarding the entire business.

23) NLS stands for what in Datastage?

NLS means National Language Support. It can be used to incorporate other languages such as French, German, and Spanish etc. in the data, required for processing by data warehouse. These languages have same scripts as English language.

24) Can you explain how could anyone drop the index before loading the data in target in Datastage?

In Datastage, we can drop the index before loading the data in target by using the Direct Load functionality of SQL Loaded Utility.

25) Does Datastage support  slowly changing dimensions ?

Yes. Version 8.5 + supports this feature

26) How can one find bugs in job sequence?

We can find bugs in job sequence by using DataStage Director.

27) How complex jobs are implemented in Datstage to improve performance?

In order to improve performance in Datastage, it is recommended, not to use more than 20 stages in every job. If you need to use more than 20 stages then it is better to use another job for those stages.

28) Name the third party tools that can be used in Datastage?

The third party tools that can be used in Datastage, are Autosys, TNG and Event Co-ordinator. I have worked with these tools and possess hands on experience of working with these third party tools.

29) Define Project in Datastage?

Whenever we launch the Datastage client, we are asked to connect to a Datastage project. A Datastage project contains Datastage jobs, built-in components and Datastage Designer or User-Defined components.

30) How many types of hash files are there?

There are two types of hash files in DataStage i.e. Static Hash File and Dynamic Hash File. The static hash file is used when limited amount of data is to be loaded in the target database. The dynamic hash file is used when we don’t know the amount of data from the source file.

31) Define Meta Stage?

In Datastage, MetaStage is used to save metadata that is helpful for data lineage and data analysis.

32) Have you have ever worked in UNIX environment and why it is useful in Datastage?

Yes, I have worked in UNIX environment. This knowledge is useful in Datastage because sometimes one has to write UNIX programs such as batch programs to invoke batch processing etc.

33) Differentiate between Datastage and Datastage TX?

Datastage is a tool from ETL (Extract, Transform and Load) and Datastage TX is a tool from EAI (Enterprise Application Integration).

34) What is size of a transaction and an array means in a Datastage?

Transaction size means the number of row written before committing the records in a table. An array size means the number of rows written/read to or from the table respectively.

35) How many types of views are there in a Datastage Director?

There are three types of views in a Datastage Director i.e. Job View, Log View and Status View.

36) Why we use surrogate key?

In Datastage, we use Surrogate Key instead of unique key. Surrogate key is mostly used for retrieving data faster. It uses Index to perform the retrieval operation.

37) How rejected rows are managed in Datastage?

In the Datastage, the rejected rows are managed through constraints in transformer. We can either place the rejected rows in the properties of a transformer or we can create a temporary storage for rejected rows with the help of REJECTED command.

38) Differentiate between ODBC and DRS stage?

DRS stage is faster than the ODBC stage because it uses native databases for connectivity.

39) Define Orabulk and BCP stages?

Orabulk stage is used to load large amount of data in one target table of Oracle database. The BCP stage is used to load large amount of data in one target table of Microsoft SQL Server.

40) Define DS Designer?

The DS Designer is used to design work area and add various links to it.

41) Why do we use Link Partitioner and Link Collector in Datastage?

In Datastage, Link Partitioner is used to divide data into different parts through certain partitioning methods. Link Collector is used to gather data from various partitions/segments to a single data and save it in the target table.

42) Define APT_CONFIG in Datastage?

It is the environment variable that is used to identify the *.apt file in Datastage. It is also used to store the node information, disk storage information and scratch information.

43) Name the different types of Lookups in Datastage?

There are two types of Lookups in Datastage i.e. Normal lkp and Sparse lkp. In Normal lkp, the data is saved in the memory first and then the lookup is performed. In Sparse lkp, the data is directly saved in the database. Therefore, the Sparse lkp is faster than the Normal lkp.

44) How a server job can be converted to a parallel job?

We can convert a server job in to a parallel job by using IPC stage and Link Collector.

45) Define Repository tables in Datastage?

In Datastage, the Repository is another name for a data warehouse. It can be centralized as well as distributed.

46) Define OConv () and IConv () functions in Datastage?

In Datastage, OConv () and IConv() functions are used to convert formats from one format to another i.e. conversions of roman numbers, time, date, radix, numeral ASCII etc. IConv () is basically used to convert formats for system to understand. While, OConv () is used to convert formats for users to understand.

47) Explain Usage Analysis in Datastage?

In Datastage, Usage Analysis is performed within few clicks. Launch Datastage Manager and right click the job. Then, select Usage Analysis and that’s it.

48) How do you find the number of rows in a sequential file?

To find rows in sequential file, we can use the System variable @INROWNUM.

49) Differentiate between Hash file and Sequential file?

The only difference between the Hash file and Sequential file is that the Hash file saves data on hash algorithm and on a hash key value, while sequential file doesn’t have any key value to save the data. Basis on this hash key feature, searching in Hash file is faster than in sequential file.

50) How to clean the Datastage repository?

We can clean the Datastage repository by using the Clean Up Resources functionality in the Datastage Manager.

SAP BI Interview Questions

Top most important SAP BI interview questions and answers by Experts:

Here is a list of Top most important SAP BI interview questions and answers by Experts.If you want to download SAP BI interview questions pdf free ,you can register with RVH techguru. Our experts prepared these SAP BI interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in SAP BI ,Register for SAP BI online training here.
1) What is SAP BW/BI? What is the purpose of SAP BW/BI?

SAP BW/BI stands for Business Information Warehouse, also known as business intelligence. For any business, data reporting, analyses and interpretation of business data is very crucial for running business smoothly and making decision. SAP BW/BI manage the data and enables to react quickly and in line with the market. It enables the user to analyze data from operative SAP applications as well as from other business.

2) In SAP/BI what are the main areas and activities?

a) Data Warehouse: Integrating, collecting and managing entire company’s data.
b) Analyzing and Planning: Using the data stored in data warehouse
c) Reporting: BI provides the tools for reporting in web-browser, excel etc.
d) Broad cast publishing: To send the information to the employees using email, fax etc.
e) Performance: Performance of the company
f) Security: Securing the access like using SAP logon tickets from portal
3) What is data Integrity?

Data integrity is to eliminate duplicate entries in the database.

4) What is table partition?

Table partition is done to manage the huge data to improve the efficiency of the applications. The partition is based on 0CALMONTH and 0FISCPER. There are two type of partitioning that is done

a) Database partitioning
b) Logical partitioning
5) What is data flow in BW/BI?

Data flows from a transactional system to the analytical system (BW). DS ( Data Service) on the transactional system needs to be replicated on BW side and attached to infosource and update rules respectively.

6) What is ODS (Operational Data Store)?

‘Operational Data Store’ or ‘ODS’ is used for detailed storage of data. It is a BW architectural component that appears between PSA ( Persistent Staging Area) and infocubes, it allows BEX (Business Explorer) reporting. It is primarily used for detail reporting rather than dimensional analysis, and it is not based on the star schema. ODS (Operational Data Store) objects do not aggregate data as infocubes do. To load the data into an IDS object, new records are inserted, existing records are updated, or old records are deleted as specified by RECORDMODE value.

7) What is an ‘Infocube’?

‘Infocube’ is structured as the star schema and it is a data storage area. To create an infocube, you require 1 ‘fact table’ surrounded by 4 dimensions. The ‘fact table’ is surrounded by different dim table, which are linked with DIM’ ids. And as per the data, you will have aggregated data in the cubes.

8) How many tables does info cube contain?

Info cubes contain two tables, E table and F (fact table).

9) Mention what are the maximum number of dimensions in info cubes?

In info cubes, there are 16 dimensions ( 3 sap defined and 1 customer defined)

10) What is the difference between ODS and Info-cubes?

The difference between ODS and Info-cubes are

a) ODS has a key while Info-cubes does not have any key
b) ODS contains detailed level data while Info-cube contains refined data
c) Info-cube follows Star Schema (16 dimensions) while ODS is a flat file structure
d) There can be two or more ODS under a cube, so cube can contain combined data or data that is derived from other fields in the ODS
11) What is the dimension in BW? How would you optimize the dimensions?

A dimension in BW is a collection of reference information about a measurable event in data warehousing. In this context, events are known as “facts”. For example, a customer dimension’s attributes could include first and last name, gender, birth date etc. To optimize the dimensions, do not add most dynamic characteristics into the same dimension and make the dimension smaller. Also, define as many dimensions as possible, and the dimension should not exceed 20% of the fact table size.

12) What are info objects?

Characteristics and key figures will be called as info objects. ‘Info-objects’ are similar to fields of the source system, data based on which we organize data in different info provider in BW.

13) What is modelling?

Designing of data base is done by using modelling. The design of DB (Data Base) depends on the schema, and schema is defined as the representation of tables and their relationship.

14) What is extended star schema?

Star Schema comprises of Fact tables and Dimension Tables, while the table that consists the Master data are kept in separate tables. These separate tables for Master data are referred as Extended Star Schema.

15) What are the extractors and mention their types?

To extract data from the system program is used which is known as Extractor. The types of extractors in BW are:

a) Application Specific: BW content FI, HR, CO, SAP CRM, LO cockpit
b) Customer-Generated Extractors: LIS, FI-SL, CO-PA
c) Cross Application (Generic Extractors) : DB View,Infoset, Function Module
16) What is a ‘Fact Table’?

Fact table is the collection of facts and relations that mean foreign keys with the dimension. Actually fact table holds transactional data.

17) What are the data types for the characteristics info object?

There are 4 types

a) CHAR
b) NUMC
c) DATS
d) TIMS
18) What is the use of the process chain?

The use of the process chain is to automate the data load process. It automates the process like Data load, Indices creation, Deletion, Cube compression etc. Process chains are only to load your data’s.

19) What are the transaction codes or T-codes for Info-objects?

The T-codes for Info-Cubes are

a) LISTCUBE: List viewer for InfoCubes
b) LISTSCHEMA: Show InfoCube schema
c) RSDCUBE, RSDCUBED, RSDCUBEM: Start InfoCube editing
20) What is the maximum number of key figures and characteristics?

The maximum number of key figures is 233 and characteristics are 248.

21) How can you convert an info package group into the process chain?

You can convert package group into a process chain by double clicking on the info package group, then you have to click on the ‘ Process Chain Maint ’ button where you have to type the name and description, this will insert individual info packages automatically.

22) Can an Info-object be an Info-provider?

Yes, info-object can be an info-provider. In order to do this, you have to right click on the Info Area and select “ Insert characteristics as data target”.

23) What is multi-provider in SAP BI ? What are the features of Multiproviders?

Multi-provider is a type of info-provider that contains data from a number of info-providers and makes it available for reporting purposes.

a) Multi-provider does not contain any data.
b) The data comes entirely from the info providers on which it is based.
c) The info-providers are connected to one another by union operations.
d) Info-providers and Multi-providers are the objects or views relevant for reporting.
e) A multi-provider allows you to run reports using several info-providers that are, it is used for creating reports for one or more than one info-provider at a time.
24) What is Conversion Routine?

Conversion routine is used to convert data types from internal format to external format or display format.

25) Explain the difference between the Start routine and Conversion routine?

In the ‘start routine’, you can modify the data packages, when data is loading. While conversion of routine, usually refers to routines bound to info objects for conversion of internal and display format.

26) How to un-lock objects in Transport Organizer?

To unlock the objects in transport organizer, go to SE03à Request TaskàUnlock objects. When you enter your request and select unlock and execute, it will unlock the request.

27) What is update or transfer routine?

The update routine is used to define Global Data and Global Checks. They are defined as the object level. It is like the Start Routine.

28) What are the types of Multi-providers?

The types of Multi-providers are

a) Homogeneous Multiproviders: It consists of technically identical info-providers, such as infocubes with exactly the same characteristics and key figures.
b) Heterogeneous Multiproviders: These info-providers only have a certain number of characteristics and key figures. It can be used for the modelling of scenarios by dividing them into sub-scenarios. Each sub-scenario is represented by its own info-provider.
29) What are the transaction codes for process chain?

a) RSPC: Process Chain Maintenance
b) RSPC1: Process Chain Display
c) RSPCM: Monitor daily process chains
d) RZ20: To see log for process chains
30) Explain what is the T.code for Data Archival and what is the advantage?

SARA is the T.code,and its advantage is minimizes space, query performance and load performance.

31) What is BEx Map in SAP BI?

BEx Map is BW’s Geographical Information System (GIS). BEx Map is one of the characteristics for SAP BI, and it gives the geographical information like customer, customer sales region and country.

32) What is B/W statistics and how it is used?

The sets of cubes delivered by SAP are used to measure performance for query, loading data etc. B/W statistics as the name suggests is useful in showing data about the costs associated with the B/W queries, OLAP, aggregative data etc. It is useful to measure the performance of how quickly the queries are calculated or how quickly the data is loaded into BW.

33) What is the data target administration task?

Data target administration task includes

a) Delete Index
b) Generate Index
c) Construct database statistics
d) Complete deletion of data target
e) Compression of the info-cube etc.
34) What are the options when defining aggregates?

a) *- Groups according to characteristics
b) H- Hierarchy
c) F-Fixed Value
d) Blank-None
35) What do you mean by the term ‘slowly changing dimension’?

Dimensions that changes with time are called slowly changing dimensions.

36) Explain how you can create a connection with LIS Info Structures?

To create a connection with LIS info-structure, LBW0 connects LIS info-structures to BW.

37) What are the delta options available when load from flat file?

Three options are available for delta management with flat files

1) Full upload

2) New status for changed records

3) Additive delta

38) What are the steps within SAP BI to create classes for BW?

To create classes or nodes for BW you have to follow the following steps,

a) Click on post-processing of data sources
b) Execute/Click on IMG activity
c) Select BW or any desired node
d) Click on context menu
e) Press F6 or select “Create node”
After following these steps, a new dialog box will appear, where you can insert your node or class for BW.

39) What is data ware-housing hierarchy?

To define data aggregation hierarchy can be used. It is a logical structure that use ordered levels as a means of organizing data. For instance, by using time dimension hierarchy, it is possible to aggregate data from the month level to the quarter level to the year level.

40) How will you debug errors with SAP GUI ?

To debug errors in SAP GUI you have to follow the path

a) Run Bexanalyzer
b) Business Explorer menu item
c) Installation check
This will show an excel sheet with start button, on clicking on it, it will verify the GUI installation and if there is any error you can fix it or either re-install it.

 

SAP FICO Interview Questions

Top most important SAP FICO interview questions and answers by Experts:

Here is a list of Top most important SAP FICO interview questions and answers by Experts.If you want to download SAP FICO interview questions pdf free ,you can register with RVH techguru. Our experts prepared these SAP FICO interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in SAP FICO ,Register for SAP FICO online training here.
1) Tell me about FI Organizational structure?

 Client | Operating Concern |Controlling area1 Controlling Area 2 | Co. Code 1 Co. Code 2| Bus area 1 Bus area2 Bus Area3 Bus Area 4

2) How many Normal and Special periods will be there in fiscal year, why do u use special periods?

12 Normal posting period and 4 special periods are in the fiscal year which can be used for posting tax and audit adjustments to a closed fiscal year.

3)Where do you open and close periods?

PPV is used to open and close the periods based on a/c types considering GL Accounts. Tr.Code. OB52.
Read More About SAP Fico Tutorials
4)What do you enter in Company code Global settings?

4 digit Alphanumeric key.
Name of the company
City
Country
Currency
Language
Address

5)What is document type, and what does it control? Examples.

Document type is nothing vouchers containing line items. Several business transac! tions can be identified within a particular document type.
It controls the document number ranges.
It controls the Header part of document
IT controls the line item level of the document
Helps filing of physical document

6) What is posting key and what does it control?

These are special classification keys. Two character numerical key it controls the entry of line items.
Posting key determines Account type, Debit/credit posting, Field status of transaction.

7) What is field status group, what does it control?

FSG is mandatory field in ! GL Creation. You use this field to define which fields are displayed when you post business transactions to a G/L account.

A field may have one of the following statuses.
– Suppressed
– Display
– Optional
– Required
Study More About SAP Material Management
8) What is chart of account and how many charts of accounts can be assigned to a company?

 Chart of account is a list of all G/L accounts used by one or several company codes.
For each G/L account, the chart of accounts contains the account number, account name, and the information that controls how an account functions and how a G/L account is created in a Company code.

You have to assign a chart of accounts to each company code. This chart of accounts is the Operating chart of accounts and is used for the daily postings in this company code.

You have the following options when using multiple company codes. You can use the same chart of accounts for all company codes

If the company codes all have the same requirements for the chart of accounts set up, assign all of the individual company codes to the same chart of accounts. This could be the case if all company codes are in the same country.

In addition to the operating chart of accounts, you can use two additional charts of accounts If the individual company codes need different charts of accounts, you can assign up to two charts of accounts in addition to the operating chart of accounts. This could be the case if company codes lie in multiple countries.
The use of different charts of accounts has no effect on the balance sheet and profit and loss statement. When creating the balance sheet or the profit and loss statement, you can choose whether to balance the co! mpany codes which use different charts of accounts together or separately.

9) What does definition of a chart of account contains?

Chart of account key
Name
Maintenance language
Length of the GL Account Number
Controlling Integration
Group chart of accounts (Consolidation)
Block Indicator

10) Can one COA be assigned to several companies?

Yes. One COA can be assigned to several companies.

11) What is account group and what does it control?

Account group determines which fields you can configure on the G/L master record. It is necessary to have at least two one for B/S and another one for P&L a/c.
It controls the Number ranges of GL A/C.

The status of fields of the master record of GL belongs to company code area.

12) What is reconciliation account; can you directly enter documents in that a/c?

When you p! ost items to a subsidiary ledger, the system automatically posts the same data to the general ledger. Each subsidiary ledger has one or more reconciliation accounts in the general ledger.
We can’t use reconciliation account for direct postings.
Get More Ideas about SAP Transaction Codes
13) How do you control field status of GL master records and from where do you control!

Field status variant is maintained all FSGs.

14) What are the segments of GL master record?
COA Segment
A/C group
Nature of account
Short text
GL a/c long text
Trading partner
Group Account Number
Company code segment
Account currency
Tax
Reconciliation a/c for a/c type
OIM,LID,FSG.
15) What does Field status group assigned to a GL master record controls?

It controls the account assignments that are made to the account. Specifically the field status group controls whether postings to cost centers, internal orders, profitability segments and so on are required, not allowed (suppressed), or optional.

16) What is Country and operational chart of account? Why do you use group chart of account?

Operational chart of account – Day to day activities It is mandatory.
Country COA – It’s used for legal specific requirement of each country. It’s additional and optional.Group COA used for consolidation of Company codes. This is for group consolidation purpose.

17) What are all the segments in a Customer/Vendor master record?

Segments in Customer Segments in Vendor
General Data segment General data segment
Company code segment Company code segment
Sales area segment Purchasing organization Segment

18) What is open line item management? What do you mean by clearing open line items?

Open item management is further reconciliation function. OIM allows you to display the open and cleared items and amounts in an account. OIM should be used if an offsetting entry is made for every line item posted in the account. The a/c is reconciled and cleared against another account. Ex. Salary clearing account and GR/IR Clearing account.

19) What is residual payment and part payment?

Residual payment it clears original invoice with incoming amount and create new line item for remaining outstanding amount.
Partial payment it leaves the original invoice amount and creates new
line item for incoming amount.

20) What is internal and external number ranges?

Internal Number Ranges: Doc. No will be provided by the system automatical! ly in serial order allotting the next available progressive number. The number must be in numerical.

External Number ranges: Doc. No will be given manually by the end user. System will not lock no automatically in this case. User can pick the number randomly. Number may be an alpha numeric.

21) How can be or in what way baseline date is important in Automatic Payment Program run?

The Baseline date is used to calculate the due date by taking into account the payment terms. On the APP, the baseline date helps to pick the relevant invoices for payment. During the APP run when invoices are pulled into the run, the system checks the ‘Next Payment Date’ before picking the invoices to be paid.

22) Please tell me the procurement cycle how it works?

Procurement cycle – a sales order is placed on a requirement made by a customer, after which it is passed on to create a purchase order (this could either happen based on the requirements on the SO, or a planned SO). the value flow gets passed on to FI at the time of goods movement. In the case of SD(Sales and Distribution), the impact on FI happens only at the time of billing.

23) Difference between Depreciation ,Accumulated Depreciation and APC?
What is APC?

Depreciation – a decrease in the value of an asset due to wear and tear
Accumulated Depreciation – the total amount of depreciation calculated on a particular asset.
APC – refers to Asset transactions other than depreciation

24) What is GR/IR?What journal entries we should pass for this?

The GR/IR – the goods receipt/Invoice Receipt account is used to post to whenever goods that are not yet invoiced have been received or when invoices arrive b4 the the delivery of goods.
During the time between the invoice being created and delivery of goods, there can be a timing difference, in order to accommodate this timing difference, a GR/IR account is maintained temporarily to record the flow .

25) What are the accounting entries take place in MM and SD?

Value from MM to FI is defined in OBYC…. on the material master the flow of values are assigned on the Costing, acctg, etc tabs where the system helps to post the necessary stock values into the appropriate GL accounts. helps to determine, the GL accounts updated when there is a movement of goods.
SD-FI – VKOA

26) Can we assign one Controlling area to two different Company Codes (but the company codes having different fiscal years/different currencies

Company code should have same financial year, may have different currencies.
You can assign 2 or more company codes to one controlling area as long as the chart of accounts are same. Furthermore, if you have different fiscal year variant in the company code, then make sure that the number of period remain the same.

27) While posting transaction, can we give cost centre / production order at time.

Yes it is posiiable , but in such situation cost centre will be real and production order is stastical.
If you assign both cost center and Prd Order then since Prod. Order are real co object, Cost center entry would be statistical.

28)  Which Master data uploads will be done?

The question is not very clear. If you are talking about CO Master data. Then Cost center need to be uploaded. You can use Data Transfer Workbench or write abap for it.
29) Can we run Payment Programe giving ( Hdfc vendor detailes ) City bank in Payment run programe?

Yes can be possible , this can resolved through ranking order and bank optimization in FBZP.
You use use further selection in proposal paramater, if you would like to filter the open item based on the city

30) What does document header control?

Field status.

31)  After entering a document can you delete the entry? Can you change the document? Which fields’ can/not is changed?

Document header cannont be changed, after posting the document you cannot change. only if you want to change the document the reseversal entry.

32) What is a special GL transaction?

The transaction other than A/P and A/R is called the special g/l transaction for ex: Bills of exchange, Interest payable , aqusition

33) How do you reverse cleared documents?

By doing reversal posting.

34)What is base line date? Why is that used? Can this be changed?

For paymentterms it is used. base line date is the due date.

35) How many statistical objects can be selected in when you post an FI document? Where CCtr, PCtr, OM are active?

Implementation exp.:

Brief about the project you did: w.r.t. the main activity of the client, How many plants they had, What modules were implemented, Who were the implementers, What’s the implementation team size, How many were in your module team, What’s your role in the project with respect to the activities you partook in the project, The Enterprise Structure with regard to the no. of Company Codes, any Business Areas or Profit Centers defined, Cost Centers defined, What’s the period of the project, When did they Go-Live?, Any issues you’d solved during ‘Support’ phase?

36)What is APC?
APC stands for Acquisition and Production costs. Acquisition means any asset which you may acquire/ purchase externally. It includes invoice price and other related exp. Associated with it like customs, octroi, freight which you add and arrive at total cost of acquisition for capitalisation of the asset.For ex Say a computer. The total cost which you incurr for the acquisition of the computer including installation will be your APC
Production cost means any asset which is created internally within the organisation. This is normally created by means of AUC and you go on adding cost to the AUC as and when you incurr exp. for the same.For ex. say addition to the office building. Therefore APC incudes any external acquisition or internal construction of exp. which needs to be capitalised.
Implementation exp.:
Brief about the project you did: w.r.t. the main activity of the client, How many plants they had, What modules were implemented, Who were the implementers, What’s the implementation team size, How many were in your module team, What’s your role in the project with respect to the activities you partook in the project, The Enterprise Structure with regard to the no. of Company Codes, any Business Areas or Profit Centers defined, Cost Centers defined, What’s the period of the project, When did they Go-Live?, Any issues you’d solved during ‘Support’ phase?
37.What is a breakpoint ?
Breakpoint is used to help the user scrutinize how the system behaves at a certain point in the ABAP code. At that point the system goes into debug mode. This breakpoint is useful in investigating how routines and requirements function. By accessing the routine source code and setting a breakpoint at its execution point, a user can follow the routine through each step.

37)What is a CATT ?

CATT means Computer Aided Test Tool. It is SAP’s tool for processing transactions automatically.CATT is used in bringing in data, such as a mass maintenance of the material master in EXCEL, from an application to modify master data.
38)What is a user exit ?

User exit is a point in an SAP program at which a customer’s own program can be called. User exits allow developers to access program components and data objects in the standard system. There are two types of user exits –
user exits that use includes (customer enhancements that are called from the program)
and user exits that use tables, which are used and managed directly via customizing.

39)What is a client ?

Client in a SAP work environment is the highest organizational structure. Many clients can be found in each system. QA (quality analysis) and Development are clients in Training and Production system.

40)What is an authorization ?

Authorization gives an SAP user permission to perform a given set of transactions.

41)Who is a user ?

Anyone who is given access to the SAP system by the system (basis) administrator is known as a user.

42)What is a variant ?

When executing a program, different selection parameters may be used. These selection parameters are stored in the SAP system as variants.

43) What is a SQL trace ?

SQL trace records all open, prepare, fetch, execute and actual SQL statements and the duration time for each step in a procedure.

44)What is master data ?

Master data is used in an SAP system to represent the basic components of a procedure and to ensure data integrity throughout the SAP business process. This gaurantees that one common record is accessed for different procedures. Example – a customer master record may be referenced by more than one functional module : FI (financial) and SD (sales and distribution).

45)What is the IMG ?
IMG is Implementation Guide that SAP system developers use to customize the client they are working in.
46)What is ASAP ?

ASAP is Accelerated SAP, a project management software tool that is used on SAP implementations to guide the project through different phases. ASAP can take a project from the designing of the “blueprint” through to “going live”. Accelerated SAP is SAP’s total process-oriented solution for accelerated implementation and continuous optimization of R/3.

47)What are the core modules of SAP ?

The core functional modules in SAP R/3 are Financial Accounting (FI) usually in combination with Controlling (CO) or Treasury (TR) – Human Resources (HR), and logistic modules : Sales and Distribution (SD), Materials Management (MM), Quality Management (QM), Plant Maintenance (PM), and Production Planning (PP).

48)What is the ABAP Workbench?

ABAP Workbench is SAP’s graphical programming environment. It is used to write ABAP code, design screens, create user interfaces, obtain database information, debug and test applications for effeciency.

49)In the SD document, what are the three levels of a sales document?

Each sales document comprises of three main levels and each level is represented by a table that holds the data for that level. Data for the header level is stored in table VBAK, data for the item levels is stored in table VBAP, and data for the schedule line level is stored in table VBEP.

50)What is a user profile?
User profile is a set of authorizations that enable user access to certain parts of the SAP system.

51)What is a sales area ?
Sales area is a segment that combines the sales organization, the distribution channel, and the sales division.

52)What is a logical database ?
Logical database is an ABAP program that combines the contents of database tables. It is linked to an ABAP report program as one of the program attributes. It supplies the report program with a set of hierarchically structured table entires derived from different database tables. This saves the developer from having to program the data retrieval.

53)What is a requirement ?
Requirement is a portion of code that is used to determine if a function or formula should be executed.

54)What is an ABAP Query ?
ABAP Query is a reporting tool that uses a logical database (LDB), individual table, or combined tables to form a report.

55)What is a functional area ?
Functional area is assigned to the query. It is the representation of a logical database or tables with their respective table joins. This defines which tables and fields the query can reference.

56)What is a batch input ?
Batch input facility in SAP is a convenient tool for capturing data into SAP or updating large amounts of information in SAP transactions. The simplest way to utilize batch input is by : 1) Record the batch input for the transaction used to enter the data in SAP; 2) Then export the batch input recording to a text file. From the recording, you know what data is required. Create a spreadsheet or word processor document containing all the data to be captured or changed. Then mail merge the exported text file with the data in a word processing program. Finally, import the merged file, upload the file into SAP, and execute the batch input in SAP.

57)What is LIS ?
LIS is Logistics Information System. LIS consists of following information systems –
Sales Information System
Purchasing Information System
Inventory Controlling
Shop Floor Information System
Plant Maintenance Information System
Quality Management Information System
These information systems can be used to plan, control, and monitor business events at different stages in the decision-making process. They are flexible tools for collecting, aggregating, and analyzing data from the operative applications.

58)What is OSS ?
OSS is an Online Service System which can be used to access information about a module in a given release. OSS is a database of notes on known issues and their remedies. Any user with a logon name and password can access this information. OSS can be used to obtain quick responses from the SAP help desk representatives, administration and registration of new users.

59)What is an SAP GUI ?
GUI means Graphical User Interface. It is responsible for the graphical layout of the SAP software. GUIs in SAP R/3 differ from version to version of SAP
FICO Questions
Courtsey of ZZ:

60)What is a tax jurisdiction code and where it is set up?

Tax Jurisdiction codes are used in conjunction with tax codes to further specify the taxes applied to a purchase. This is recommended for implementations crossing multiple tax jurisdictions. Tax Jurisdiction codes are tied to customer/vendor master records. Using tax jurisdiction codes allows the user of fewer tax codes and easier tax determination by deriving tax information from the master record. This minimizes the burden of determining the appropriate tax information on a purchase order or invoice for a PO creator or Accounts Payable Clerk.

61)Can the taxes on parked document be calculated?
Yes/No

62)What are the criteria considered by SAP when archiving a document?

The longest of Minimum days in the system, Life by Document Type and Life by account determines the life of any document before it is archived(These are to be configured).

63) Once a change is made to the coding block, it is permanent and can not be deleted.
True/False

64. Explain the two steps of adding a field to a Coding Block.

Light Mode: Only the absolute minimum amount of information required to create a field is entered. Expert Mode: More detailed data dictionary and table information to be entered to create a new field. This is more complex. After a field is been entered a subscreen is generated to build the particular posting screen and to position the new field.

65) Describe how cost center accounting differs from financial accounting?

CO is for internal reporting where FI is more for external legal reporting. CO relates more to indirect and overhead costs, which don’t affect G/L. These costs hit the G/L once, after that all the allocations are behind the scenes.

66) Describe the possible options for a controlling area – company code relationship Put emphasis on the option you have in terms of different currencies.

A controlling area can encompass one or more company codes. These company codes may have different currencies, but they must use the same chart of accounts. The controlling area is assigned a currency, but can also support multiple company code currencies. If all the companies have the same currency, then the object currency is freely definable (if currency type 10 is used). If the company codes do not have the same currency, then the object currency inherits the currency of the company code.
67) Discuss the cross-company controlling?

Cross-company-code controlling enables cross-company transfers and reports to be made in CO, but increases the organizational overhead at the cost center. In cross-company-code accounting involving different currencies, the CO account assignment object (e.g. cost center) inherits its currency from the company code.

68) What are the three types of currencies used in cross-company-code accounting and what conversion rates are used?

Each CO document is updated in three currencies. In cross-company-code accounting with different currencies, these are designated the document currency, the company code currency and the controlling area currency. Conversions in CO use the average exchange rate (M).

69) Define the types of master data that exist in cost center accounting?

Cost center – units of a company that incur costs
Cost element – define types of costs
Activity type – units of measure for allocating activities
Statistical key figures – allocation basis for distribution and assessment

70) Define the relationship between the chart of accounts and cost elements in cost center accounting.

The chart of accounts contains all G/L accounts for financial accounting and all primary cost elements for cost accounting. Secondary cost elements are not contained on the chart of accounts.

71) What is the difference between primary and secondary cost elements?

Primary cost elements are costs that originate outside of the company (posted to G/L). Secondary cost elements are costs resulting from the internal exchange of activities, and do not exist in the G/L. They exist solely within Controlling.
Get more idea on SAP HANA

72) Is it possible to plan on cost centers in more than one plan version – elaborate youranswer?

Yes, when planning for cost centers, changes can be made to all plan versions This includes copying these planning versions, to create separate scenarios with When calling up the planning screen you will be asked to enter the plan version number.

73) Discuss how distribution for cost center allocation is used in the system.

Primary postings are pooled in a cost center and allocated out at the end of the period specified by user. Original cost elements are retained, and line items are produced for sender and receiver. Receiver line items contain information about the sending cost center.

74) Discuss how assessment for cost center allocation is used in the system.

Designed for cost center settlement, primary and secondary postings are allocated at the end of period according to a user defined key. The original cost elements are totaled and posted to a secondary cost element (assessment cost element). Line items for sender and receiver are provided, with receiver cost center getting information on sender cost center. Assessments can include all or a portion of costs from the sending cost center.

75) Distinguish between the two cost allocation techniques: assessment and distribution.

In a distribution, all receiving cost objects are debited with a portion of an original cost element that had been posted to a sending cost center. This portion is determined as part of configuration. In assessment, a secondary assessment cost element is used. Within the sending cost center, all costs to be allocated are totaled and the sender is credited with this assessment cost element while all receivers are debited with a portion of assessment costs. This could be all costs or a portion of the costs (both primary and secondary that had been originally posted to the sending cost center).

76) What is the difference between direct and indirect activity allocation?

With direct activity allocation an individual activity confirmation takes place. Thus the activities are directly allocated to the cost centers.
The purpose of indirect activity allocation is to automatically allocate planned and actual activities. There are two kinds of indirect activity allocation.

77) What are the two allocation categories for indirect activity allocation?

Activity volume known: The planned and actual activity volume is known. The total actual volume is manually entered for the sender and allocated to the receiver cost centers (or orders) based upon some planned/actual quantity/ statistic.

Activity volume not known: This uses management units to provide an actual activity quantity to the sender cost center using statistical key figures so that the system can calculate an operating rate for the target cost calculation.

78) What is actual cost splitting and its purpose?

Actual costs can only be posted to cost centers within cost center accounting. Therefore, in order to compare target versus actual costs on activity types and to display variances for each activity type, it is necessary to split (apportion) the actual costs to each activity type.
79) What are the two stages which splitting actual costs based on the activity type occurs?

The actual costs are split in two stages (1st stage is not necessary in planning):

1) In the first stage, the actual cost are apportioned by cost element to the activity type based on the target costs or target quantities. If no costs exist for a cost element, the target cost of the cost element group is used as the first splitting step.

2) In the second stage, the remaining costs on the cost center level are apportioned to the activity types according to the splitting rules (user defined). If the splitting rules are not defined, the actual costs are split based on the equivalence numbers for the activity type.
80) What is a statistical order? Why would you use one?

A statistical order collects costs for informational purposes and does not settle costs against another object. You would use this to track costs in a separate fashion without double counting them. An example would be one car in a fleet of cars. Typically, a statistical order could collect data that also was posted to a cost center.

81) In what two ways can an internal order be processed?

An order can be processed individually or with collective processing. An example of this is that it is possible to call all orders which have already been released but not yet have a settlement rule. Users can enter recipient cost centers in the list screen or alternatively, they can reach the entry of the distribution rule via the Settlement rule function. (This is not the same as choosing an order group.)

82) Describe briefly the collective automatic processing of internal orders.

This allows you to select a group of orders so that you can change them all quickly and accurately. Manual collective processing requires the use of a list variant and allows changes to be made to the order master data. Automatic collective processing is used to release orders or settle them. This changes the status of an order, not the master data.

83) What is a selection variant and what is it used for within CO?

A selection variant is SAP or user-defined to select orders. The variant chosen determines which master data fields are offered for selection of collective processing, whether a status profile can be used, whether a selection rule can be used and what default values will appear in the fields.
84) What is a list variant?

A list variant defines which master data fields can be maintained for collective processing.

85)What options do you have for additional account assignments within a CO posting and when would you get a statistical posting?

There can be two additional account assignments excluding business areas and profit centers. These can be chosen from an order, project, or profitability segment. If the order or other object is not marked for statistical postings, the profit center is always statistical.

86) What are the different commitment types the system can record for an internal order? For which type do you have to perform a manual reduction?

Purchase Requisition
Purchase Order
The availability control allows you to warn a user if/when budget is exceeded. You set tolerances for these availability controls.
Funds Reservations must be manually reduced by the user.

87) What can an order be settled to?
1) External receivers – G/L Account, asset.
2) Internal receivers – cost center, order, project, network, profitability segment

88) What is hierarchical settlement?

The settlement hierarchy is used to ensure that settlement of orders is occurring in the right sequence. An example would be if order A is settled to order B and this is settled to order C, then you want to make sure that order B is not settled before A, otherwise you will not be able to settle order A to order B because it will be closed.
The hierarchy is setup in the settlement parameters, and each order can be given a number from 0 to 999 allowing up to 1000 orders in the hierarchy. The orders are settled in descending order – highest number first.

89) What is the reconciliation ledger?

The Reconciliation Ledger is a Standard Ledger configured and delivered by SAP. The data model and functionality defined for specific business requirements are available. It is primarily an information source.

90) What is a Reconciliation posting?

A reconciliation posting is used to transfer costs to financial accounting which were made across company code or business area boundaries in controlling. This allows for more freedom with CO postings, and the ability to reconcile back to FI.

91)What are the 3 levels that a customer master record can be maintained at? Why do these three levels exist? Give an example of the information stored on these levels.

Client, company code, and sales (if maintained centrally). Exists so that you can tailor the customization at each level. Adds more flexibility to the structure of a master record. For example, if you have one customer named ABC Co., you define it once for your client Pepsi Co. That customer exists in two companies of the client, Taco Bell and Frito Lay. However, in Taco Bell the customer has different dunning areas, banks, payment terms than in Frito Lay. This is an example of how all information is the same for ABC at the client level, but different at the company code level. Of course, Sales information would be different in each company code as well.

92)What are the 3 levels that a vendor master record can be maintained at? Why do these three levels exist? Give an example of the information stored on these levels.

See the example given above. Exists so that you can tailor the customization at each level. Adds more flexibility to the structure of a master record. In the above example, if ABC Co, is a vendor in the companies Taco Bell and Frito Lay, under the client Pepsi Co, and the payment terms, payment methods are different at the company level. Of course, purchasing information would be different in each company code as well.

93)What are the two purposes of the customer/vendor Account Group? Give an example of how the Account Group is used.

1) Establishes number range of the customer/vendor master records – a number range is assigned to an account group. This adds flexibility, you are able to keep similar accounts numbered distinctly. For example customers are 1-100,000, vendors might be 200,000 – 300,000. One-time customers might be 400,000-500,000.

2) Establishes the screen layout for customer/vendor master records. All fields at the client and company code level for customer/vendor master records can be designated either suppressed, optional, required or mandatory. For example, some vendors may not use dunning areas, so you would establish a separate account group for those vendors, where the dunning fields are suppressed.

94.What are screen layout link rules? Why are screen Layout link rules used for customer/vendor master records? Why are they used for line items?

Since the same information can be designated required, optional, mandatory, suppressed in 3 different places, the link rules determine which designation rules out over another. These 3 places are at the account group level, company code level, and the activity/transaction level.

For line items, the same information can be designated required, optional, mandatory, suppressed in 2 different places. The link rules determine which designation rules out over another. These 2 places are at the posting key level, and the field status group of the G/L master record.

T or F. Account Groups are mandatory when creating a sub-ledger account.

True. Account Groups are always mandatory when creating customer/vendor master records.

T or F. Number ranges may overlap for sub-ledger accounts.

True. When setting up number ranges for account groups of customer/vendor master records, you cannot create one that overlaps with an existing number range.
Define bank directory, house bank, bank account, bank ID, bank key, and account ID. Describe the relationship between all of these and G/L accounts. Draw a picture if necessary.

The bank directory is the repository in SAP that contains all of the banks. It can be downloaded into the system or manually keyed in. In order to establish house banks, which are banks in which your company does business, the bank must first exist in the bank directory. The house bank is named with a bank ID, and has a distinctive or unique, universally recognized bank key.

All of the accounts in a house bank are referred to as bank accounts and are named with an account ID. Each bank account must contain a respective G/L account. Each G/L account must contain the house bank and account ID. This allows SAP to maintain the bank books accurately. For example, when you are running the payment program, you specify the bank accounts that you are paying out of. When a payment is made, it is accurately reflected in the corresponding G/L account.

95)What are payment terms? Why are they used? How are they define in SAP?

Payment terms define how you deal with a customer/vendor in terms of payment. For a customer, it defines when a customer must pay you, in order to receive discounts. For a vendor, it defines when you must pay the vendor in order to receive discounts.

The terms can be set up with 3 terms, which are usually cash discount term 1, cash discount term 2, and due date for net payment.

96)What is the document principle in SAP?

Every transaction in SAP creates a document. This is a means of documenting all transactions, being able to trace your actions in the system.

97)What are the two pieces of a document? What must all line items consist of ?

Header and line items. All line items must at least consist of a posting key, account and amount.

98)What do document types control? What is their function?

Document types:

1) distinguish between the types of business transactions – you specify the type. Ie. Is it a general ledger accounting document, customer payment, etc.
2) controls which account types may be posted to – you specify the account types that may be posted to. Ie. Some document types are only for asset accounts. Some are only for vendor accounts, etc.
3) assigns the document number – each document type is assigned a number range
4) and is used as a sort criteria – by all of the above, you are grouping the documents or sorting them accordingly.

Define posting periods, fiscal year variants, company codes and the relation between each. Draw a picture if necessary.
Posting periods define which periods are open for posting documents, and also which accounts are open for posting within these periods.
Fiscal year variant define what your posting periods are, in relation to the calendar year. For example, if your fiscal year runs from July to June, you need to define, through a fiscal year variant, how that relates to the calendar year, so that SAP can interpret your fiscal year.
Fiscal year variants and posting periods are assigned to a company code.

99)What is a posting key? What does it control?

Posting keys determines how line items are entered. They control:
1) debit or credit entry?
2) what account type – posting keys are designated for specific account types
3) field status – how are the line items going to look if you use this posting key??
4) other properties – is it a sales related transaction? is a special g/l transaction? what is
the reversal posting key?

100)What are automatic line items? How are they configured in the system? Give some examples of automatic line items.

There are certain activities defined at the Chart of Account level in FI that create automatic line items. Examples include discount expenses, revenue from over/under payment, taxes. There is a 3-character system-specific code in SAP that corresponds with each of these activities, and usually you must specify a G/L account to correspond with these. This determines which G/L account is hit when the automatic line item is generated.

Define composite profile, profile, authorization, value, field, authorization object, and object class. Describe the relationship between each, draw a picture if necessary.

Composite profile is assigned to a user and contains one or several profiles. The profiles contain the authorizations or allowed activities that a person may perform on an object, for a particular value. Similar authorizations can be grouped in to object classes – such as an SD object class, and FI object class.

101)What are employee tolerances? Why do they exist? Give an example.

They control the maximum amount that employees are allowed to post. All control the maximum payment difference that employees are allowed to post. This is a control or authorization mechanism. An example would be, you wouldn’t want a brand new clerk to be able to post more than $100,000 and wouldn’t want them to post an incoming payment that was 10% less than the total. All users must be allocated to an employee tolerance group in order to post.

102)What are customer/vendor tolerances. Why do they exist? Give an example.

They control the maximum payment difference allowed for customers/vendors, specify how to post residual items from payment difference, and contain details of clearing procedures. An example would be: Customer One can post a 5% difference b/c they’ve been a customer longer and are more credible. Customer Two can only post a 1% difference b/c they are a new customer and haven’t established credibility.

103)Define sort key, allocation field. Describe the relationship between the two.

Line items are displayed in the order designated by the allocation field. The allocation field is populated by the sort key. The sort key specifies the fields that the line items are sorted by.

104)Why would a project team want to configure its own line item layout? Why would a project team want to configure its own fast entry structure?

Some fields are more relevant for some customers than others. For instance, maybe the value date or dunning areas are not important for a group of Accounting clerks to see. So a line item layout would be made that did not include these fields. Also, it may be typical that clerks always retrieve line items according to the posting date. This would be a necessary field located in the line item layout.
In the same concept

105)What is credit management? Why is it used in SAP?

The SAP functionality that allows you to maintain credit for customers on various levels, based on the customer’s creditworthiness. Basically credit checks can be performed for customers throughout the sales cycle. Credit management is hugely integrated with SD.

106) How is FI credit management integrated with SD?

You can set up risk categories, automatic credit checking, and update groups to check invoices as they proceed throughout the sales cycle.

107)What is a Credit Control Area? Where does it fall in the organizational structure?

Credit Control Area is the highest hierarchial level in Credit Management. It falls below the client level, above companies. You create credit control areas and assign companies to them. Each company can only be assigned to one credit control area. Obviously, customers can span Credit Control Areas since the same customer can exist in more than one company code.

108)What are the levels of configuring credit management for a customer?

First, a credit limit can be assigned to a credit control area. Then, any customer assigned to that credit control area, will have that limit. On the next level, specifications can be made for each customer individually. For each customer, you specify the maximum limits across all credit control areas and per credit control areas. Then on the lowest level, you specify the current limit across all credit control areas and the current limit per credit control area.

109)T or F The credit for a customer can be checked at various points along the sales cycle?
True.

110)What is a payment advice? Why would one be used? Give some examples of payment advices.

A payment advice contains information about an incoming payment, such as amount, payment date, reasons for underpayment, and document number. It is used for the automatic search and matching of open items during the clearing process. Instead of matching an incoming payment against the open items manually, the clerk only needs to enter the payment advice in order to clear.

111)What is a reason code? Why would a reason code be used? Give an example.

The reason code specifies the reasons for over or under payment. It also determines if the difference will be written off to a G/L account. An example would be a reason code set up for damaged goods. If a business decision is made to write off damaged goods to a G/L account then all payment advices with that reason code specified will cause differences to be written off to the G/L account.

112)T or F The FI module does not currently support Lockbox functionality.
False.

113)What is dunning and why is it used?

Dunning is a process whereby customer and vendors can be sent late notices for overdue amounts.
What are the 4 necessary inputs for running the dunning program? Define each and give examples of the data in each.
Data in master records – such as address and payment terms
Basic parameters – dunning procedure such as texts, levels, charges, interest
On-line parameters – such as company code, range of customers/vendors
OI – payment terms, baseline date in open items

114)Why are separate dunning levels supported by SAP? What is the purpose of the levels?

Because you may want to specify amounts, charges, texts depending on the number of days an amount is outstanding. For example, you would want to send a firmer letter to customer when they become more overdue.

115)T or F You may not change the dunning letters that are shipped with SAP.

False. They can be edited with SAPSCRIPT.
Why would you use Dunning Areas? Give examples.

Dunning areas are used when you want run different procedures for different groups of customer/vendors. For example, you would send a different letter to your more reliable customers, than for brand new customers b/c the reliable letter may be more friendly. Also, you may send a differently worded letter for your plastics buyers than your electronics buyers.

116)What does the payment program do?

Payment program is the procedure whereby payments are made to customer/vendors for outstanding amounts. The procedure automatically clears outstanding items and updates the corresponding bank accounts to reflect outgoing payments. They system evaluates all open items based on payment terms and days outstanding to decide if the item is due.

117)What are the 4 necessary inputs for running the payment program? Define each and give examples of the data in each.

1)Master Records – includes payment methods, house bank
2)Configuration – payment procedure includes banks, payment methods in co. code, payment methods in country, specifications for sending and paying co. codes
3)On-line parameters – things you specify when running the program like the company code, the payment method
4)OI -open items. The payment method in the open item, the payment terms. The amounts.

118)What are the 3 levels that the payment program in configured at? Give examples of the data that is configured on each level?

Company Code – specify your paying and sending company codes
Bank – specify your house banks, bank accounts you are paying or receiving money from.
Also configure the balances in the accounts, and their rank order per payment method
Payment Methods – must specify payment methods for in the country and in the company code.

T or F The payment method must be configured for a country before it can be configured for a paying company?
True.

Describe how SAP decides which open items must be paid by the payment program.
First, you specify whether you want to always maximize your cash discounts, or always minimize. Then each open item is looked at individually by the system. In particular, the payment terms are evaluated. If you are always maximizing, the program looks at the first payment tier, if the payment program will not be run again in time to get the maximum discount then the amount if paid. If the payment program will be run again before the first payment tier expires, then the amount will be paid at the next run.
If you specify to always minimize the discount, the amount will only be paid when the program will not be run again before the net amount is due (the third payment tier).

SAP ABAP Interview Questions

Top most important SAP ABAP interview questions and answers by Experts:

Here is a list of Top most important SAP ABAP interview questions and answers by Experts.If you want to download SAP ABAP interview questions pdf free ,you can register with RVH techguru. Our experts prepared these SAP ABAP interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in SAP ABAP ,Register for SAP ABAP online training here.

 

1.What is an ABAP?
ABAP (Advanced Business Application Programming) is a high level programming language created by the German software company SAP. It is currently positioned as the language for programming SAP’s Web Application Server, part of its NetWeaver platform for building business applications. Its syntax is somewhat similar to COBOL.

2.What is an ABAP data dictionary?
ABAP 4 data dictionary describes the logical structures of the objects used in application development and shows how they are mapped to the underlying relational database in tables/views.

3.What are domains and data element?
Domains:Domain is the central object for describing the technical characteristics of an attribute of an business objects. It describes the value range of the field. Data Element: It is used to describe the semantic definition of the table fields like description the field. Data element describes how a field can be displayed to end-user.

4.What is foreign key relationship?
A relationship which can be defined between tables and must be explicitly defined at field level. Foreign keys are used to ensure the consistency of data. Data entered should be checked against existing data to ensure that there are now contradiction. While defining foreign key relationship cardinality has to be specified. Cardinality mentions how many dependent records or how referenced records are possible.

5.Describe data classes.
Master data: It is the data which is seldom changed. Transaction data: It is the data which is often changed. Organization data: It is a customizing data which is entered in the system when the system is configured and is then rarely changed. System data:It is the data which R/3 system needs for itself.

6.What are indexes?
Indexes are described as a copy of a database table reduced to specific fields. This data exists in sorted form. This sorting form ease fast access to the field of the tables. In order that other fields are also read, a pointer to the associated record of the actual table are included in the index. The indexes are activated along with the table and are created automatically with it in the database.

7.Difference between transparent tables and pooled tables.

Transparent tables: Transparent tables in the dictionary has a one-to-one relation with the table in database. Its structure corresponds to single database field. Table in the database has the same name as in the dictionary. Transparent table holds application data. Pooled tables. Pooled tables in the dictionary has a many-to-one relation with the table in database. Table in the database has the different name as in the dictionary. Pooled table are stored in table pool at the database level.

8.What is an ABAP/4 Query?
ABAP/4 Query is a powerful tool to generate simple reports without any coding. ABAP/4 Query can generate the following 3 simple reports: Basic List: It is the simple reports. Statistics: Reports with statistical functions like Average, Percentages. Ranked Lists: For analytical reports. – For creating a ABAP/4 Query, programmer has to create user group and a functional group. Functional group can be created using with or without logical database table. Finally, assign user group to functional group. Finally, create a query on the functional group generated.

9.What is BDC programming?
Transferring of large/external/legacy data into SAP system using Batch Input programming. Batch input is a automatic procedure referred to as BDC(Batch Data Communications). The central component of the transfer is a queue file which receives the data vie a batch input programs and groups associated data into “sessions”.

10.What are the functional modules used in sequence in BDC?
These are the 3 functional modules which are used in a sequence to perform a data transfer successfully using BDC programming: BDC_OPEN_GROUP – Parameters like Name of the client, sessions and user name are specified in this functional modules. BDC_INSERT – It is used to insert the data for one transaction into a session. BDC_CLOSE_GROUP – This is used to close the batch input session.

11.What are internal tables?
Internal tables are a standard data type object which exists only during the runtime of the program. They are used to perform table calculations on subsets of database tables and for re-organizing the contents of database tables according to users need.

12.What is ITS?
What are the merits of ITS?- ITS is a Internet Transaction Server. ITS forms an interface between HTTP server and R/3 system, which converts screen provided data by the R/3 system into HTML documents and vice-versa. Merits of ITS: A complete web transaction can be developed and tested in R/3 system. All transaction components, including those used by the ITS outside the R/3 system at runtime, can be stored in the R/3 system. The advantage of automatic language processing in the R/3 system can be utilized to language-dependent HTML documents at runtime.

13.What is DynPro?
DynPro is a Dynamic Programming which is a combination of screen and the associated flow logic Screen is also called as DynPro.

14.What are screen painter and menu painter?
Screen painter: Screen painter is a tool to design and maintain screen and its elements. It allows user to create GUI screens for the transactions. Attributes, layout, filed attributes and flow logic are the elements of Screen painter. Menu painter: Menu painter is a tool to design the interface components. Status, menu bars, menu lists, F-key settings, functions and titles are the components of Menu painters. Screen painter and menu painter both are the graphical interface of an ABAP/4 applications.

15.What are the components of SAP scripts?
SAP scripts is a word processing tool of SAP which has the following components: Standard text. It is like a standard normal documents. Layout sets. – Layout set consists of the following components: Windows and pages, Paragraph formats, Character formats. Creating forms in the R/3 system. Every layout set consists of Header, paragraph, and character string. ABAP/4 program.

16.What is ALV programming in ABAP? When is this grid used in ABAP?
ALV is Application List viewer. Sap provides a set of ALV (ABAP LIST VIEWER) function modules which can be put into use to embellish the output of a report. This set of ALV functions is used to enhance the readability and functionality of any report output. Cases arise in sap when the output of a report contains columns extending more than 255 characters in length. In such cases, this set of ALV functions can help choose selected columns and arrange the different columns from a report output and also save different variants for report display. This is a very efficient tool for dynamically sorting and arranging the columns from a report output. The report output can contain up to 90 columns in the display with the wide array of display options.

17.What are the events in ABAP/4 language?

Initialization, At selection-screen, Start-of-selection, end-of-selection, top-of-page, end-of-page, At line-selection, At user-command, At PF, Get, At New, At LAST, AT END, AT FIRST.

18.What is CTS and what do you know about it?
The Change and Transport System (CTS) is a tool that helps you to organize development projects in the ABAP Workbench and in Customizing, and then transport the changes between the SAP Systems and clients in your system landscape. This documentation provides you with an overview of how to manage changes with the CTS and essential information on setting up your system and client landscape and deciding on a transport strategy. Read and follow this documentation when planning your development project.

19.What are logical databases? What are the advantages/ dis-advantages of logical databases?
To read data from a database tables we use logical database. A logical database provides read-only access to a group of related tables to an ABAP/4 program. Advantages: i)check functions which check that user input is complete, correct,and plausible. ii)Meaningful data selection. iii)central authorization checks for database accesses. iv)good read access performance while retaining the hierarchical data view determined by the application logic. dis advantages: i)If you donot specify a logical database in the program attributes,the GET events never occur. ii)There is no ENDGET command,so the code block associated with an event ends with the next event statement (such as another GET or an END-OF-SELECTION).

20.What is a batch input session?
BATCH INPUT SESSION is an intermediate step between internal table and database table. Data along with the action is stored in session ie data for screen fields, to which screen it is passed, program name behind it, and how next screen is processed.

21.How to upload data using CATT ?
These are the steps to be followed to Upload data through CATT: Creation of the CATT test case & recording the sample data input. Download of the source file template. Modification of the source file. Upload of the data from the source file.

22.What is Smart Forms?
Smart Forms allows you to create forms using a graphical design tool with robust functionality, color, and more. Additionally, all new forms developed at SAP will be created with the new Smart Form solution.

23.How can I make a differentiation between dependent and independent data?
Client dependent or independent transfer requirements include client specific or cross client objects in the change requests. Workbench objects like SAPscripts are client specific, some entries in customizing are client independent. If you display the object list for one change request, and then for each object the object attributes, you will find the flag client specific. If one object in the task list has this flag on, then that transport will be client dependent.

24.What is the difference between macro and subroutine?
Macros can only be used in the program the are defined in and only after the definition are expanded at compilation / generation. Subroutines (FORM) can be called from both the program the are defined in and other programs . A MACRO is more or less an abbreviation for some lines of code that are used more than once or twice. A FORM is a local subroutine (which can be called external). A FUNCTION is (more or less) a subroutine that is called external. Since debugging a MACRO is not really possible, prevent the use of them (I’ve never used them, but seen them in action). If the subroutine is used only local (called internal) use a FORM. If the subroutine is called external (used by more than one program) use a FUNCTION.

25.What is the differences between structure and table in data dictionary in ABAP?
Structure and table both are 2/2 matrices but there are many differences between table and structure.

1. Table can store the data physically but a structure dose not store.
2. Table can have primary key but a structure dose not have.
3. Table can have the technical attribute but a structure dose not have.

structure doesn’t contain technical attributes.
structure doesn’t contain primary key.
structure doesn’t stores underline database level.

26.What is the difference between collect and sum?
SUM.
When processing an internal table in a block starting with LOOP and concluded by ENDLOOP , SUM calculates the control totals of all fields of type I , F and P (see also ABAP/4 number types ) and places them in the LOOP output area (header line of the internal table or an explicitly specified work area).

When you use SUM in a LOOP with an explicitly specified output area, this output area must be compatible with the line type of the internal table.When using LOOP to process a sorted extract (see SORT ), the control total of f at the end of the group appears in the field SUM(f) – – if f is type I , F or P .

COLLECT.
COLLECT is used to create unique or compressed datsets. The key fields are the default key fields of the internal table itab .

If you use only COLLECT to fill an internal table, COLLECT makes sure that the internal table does not contain two entries with the same default key fields.

If, besides its default key fields, the internal table contains number fields,the contents of these number fields are added together if the internal table already contains an entry with the same key fields.

If the default key of an internal table processed with COLLECT is blank, all the values are added up in the first table line.

If you specify wa INTO , the entry to be processed is taken from the explicitly specified work area wa . If not, it comes from the header line of the internal table itab .

After COLLECT , the system field SY-TABIX contains the index of the – existing or new – table entry with default key fields which match those of the entry to be processed.

COLLECT can create unique or compressed datasets and should be used precisely for this purpose. If uniqueness or compression are unimportant, or two values with identical default key field values could not possibly occur in your particular task, you should use APPEND instead. However, for a unique or compressed dataset which is also efficient, COLLECT is the statement to use.

If you process a table with COLLECT , you should also use COLLECT to fill it. Only by doing this can you guarantee that the internal table will actually be unique or compressed, as described above and COLLECT will run very efficiently.

If you use COLLECT with an explicitly specified work area, it must be compatible with the line type of the internal table.

27.How we format the data before before write statement in report ?
We can format the reports output by using the loop events like:

1.at first
2.at new
3.at last
etc check docu

28.What is the difference between Table and Template?
table is a dynamic and template is a static

29.When do we use End-of-selection?
End-of-selection event are mostly used when we are writing HR-ABAP code. In the HR-ABAP code, data is retrived in the Start-of-selection event and Printing on the list and all will be done in End-of-selection event.

30.In events start-of-selection is default event. When we have to use this event explicitly? Why?
The default event in the ABAP is Start-of-selection.We have to call explicitely this event when you are writing other than ths event , that is when you write AT SELECTION-SCREEN EVENTS OR INITIALIZATION EVENT etc,you have to explicitely mention the Start-of-selection event while you are writing the logic.

Before these events called ,all the code you have written come into this default Start-of-selection screen event.

31.What is the differences between ABAP and OOABAP. In which situation we use OOABAP?
OOABAP is used to develop BSP/PCUI applications and also anthing involved object oriented like BADIs, SmartForms..etc.where as ABAP is used to develop traditional programs in R/3.

32.What is table buffer? Which type of tables used this buffer?
buffer is nothing but a memory area. table is buffered means that table information is available on application server. when you call data from database table it will come from application server.

transperent and pooled tables are buffered. cluster tables can not buffered.

33.What is the use of pretty printer ?
Exactly where can we link the functional module to abap coding.

Pretty Printer is used to format the ABAP Code we write in ABAP Editor ,like KEY WORDS in Capitals and remaining are in small letters which is also depend on system settings.

We can call the function module in the ABAP Code .Press the Pattern button on Appl. tool bar then u will get box where u write the function module NAME which u want to call in the code by selecting the radio button CALL FUNCTION. In this way we link function module to ABAP Code.

34.What is the difference between SAP memory and ABAP memory?
data sending between main sessions using get parameter and set parameter is sap memory
data sending between internal sessions using import or export parameters is abap memory

Answer2:
sap memory is a global memory whereas abap memory is local memory.

For example, we have four programs in abap memory and assigned some varibles to a particular program in abap memory then those varibles can’t be used by anyother program in abap memory i.e., the variables are only for that program and also local to that memory,whereas sap memory can access all the abap memory or else it can perform any kind of modifications.

35.What is the difference between Type and Like?

Answer1:
TYPE, you assign datatype directly to the data object while declaring.
LIKE,you assign the datatype of another object to the declaring data object. The datatype is referenced indirectly.

Answer2:
Type is a keyword used to refer to a data type whereas Like is a keyword used to copy the existing properties of already existing data object.

Answer3:
type refers the existing data type
like refers the existing data object

36.What is Tcode SE16. For what is it used. Explain briefly?
Answer1:
SE16 is a T-code for object browser.
Generally used to search the fields of SAP Tables . and respective data.

Answer2:
se16 is a data browse and it is used to view the contents of the table and we cannot change or append new fields to the existing structure of the table as we cannot view the structure level display using the se16

37.What are different ABAP/4 editors? What are the differences?
The 2 editors are se38 and se80 both have the abap editor in place. In se38 you can go create programs and view online reports and basically do all thedevelopmet of objects in this editor. In se80 ( object navigator) there are additional features such as creating packages,module pool , function group ,classes, programs ( where you can create ur programs) and BSP applications .

38.What is difference between dialog program and a report?
Report is a excecutable program
Dialog is a module pool program.It has to be executed via a transaction only.
Dialog programming is used for customization ofscreens

39.How do you connect to the remote server if you are working from the office for the client in remote place.
WAS web application server or ITS are generally used for this purpose. If you are sitting at your office with a server which is in the system and the other server is at the clients place you can generate IDOC, intermidiate documents which carry the data you want to transfer or the documents you want to transfer, these IDOC are interpretted by the system at the recieving end with the message class with which it is bound with. If you want to logon a system which is very distant..then remote login can be used this depends on the internet speed.

40.Explain about roll area , Dispatcher, ABAP-Processor.
Dispatcher recieves the request from client and assigns the request to one of the work process.
Roll area: Each workprocess works in a particular memory that memory is known as Role Area, which consists of User context and session data.
ABAP- Processor :is an interpretor which can execute logic

41.Which one is not an exit comand ? (Exit, cencle, stop, back)
STOP.
Effect :The statement STOP is only to be used in executable programs

EXIT.
Effect :If the EXIT statement is executed outside of a loop, it will immediately terminate the current processing block.

BACK.
Effect : This statement positions the list cursor on the first position of the first line in a logical unit.

So “Cancle” is not an exit command

42.What is Field symbol ?
You can use field symbols to make the program more dynamic. In this example the name of a table control is substituted by a field symbol. Thus you cal call the form with any internal table, using the name of the table control as a parameter.

Example
form insert_row
using p_tc_name.

field-symbols <tc> type cxtab_control. “Table control

assign (p_tc_name) to <tc>.

* insert 100 lines in table control
<tc>-lines = 100.

Answer2:
fieldsymbol has the same concept as pointer in c,
fieldsymbol don’t point to a data type like char, num instead of that it points to the memory block. the syntax for fieldsymbol is
FIELD-SYMBOL <N>.
EG. FOR FIELD SYMBOL.
DATA: DAT LIKE SY-DATUM,
TIM LIKE SY-UZEIT,
CHAR(3) TYPE C VALUE ‘ADF’.
FIELD-SYMBOL : <FS>.
MOVE DAT TO <FS>.
WRITE:/ <FS>.
MOVE TIM TO <FS>.
WRITE:/ <FS>.
MOVE CHAR TO <FS>.
WRITE:/ <FS>.
The output will be
Today’s date
current time

43.What is lock object ?
LockObjects used to synchornize access of several users using same data.

44.Why BAPI need then BDC ?
BAPI”S provide the standard interface to other applications apart from SAP and within differnt vesions of SAP too. Also it is OOD bases so dosen”t depends on screen flow. BDC gets failed if we make changes for screen changes through IMG customization

45.What are the advantages and disadvantages of using views in ABAP programming ?
advantages: view is used to retrieve the data very fastly from the database tables
*memory wastage is reduced
*faster than joins to retrieve the data from database tables
disadvantages:
view is not a container,it will not hold the data
*view memory is not permanent memory

46.How data is stored in cluster table?
A cluster table conatins data from mulitple DDIC tables.
It stores data as a name value pair ( varkey, vardata)

47.Have you used performance tuning? What major steps will you use for these?
First of all tunning can be done
In three ways: disk i/o ,sql tunning , memory tunning,
Before tunning u have to get the status of your database using
Oracle utility called statpack , tkprof, then you should go for tunning

48.How to create client independent tables?
client independent tables:
the table in which the first field is not mandt is the client independent tables
*mandt is the field with mandt as the data element
*automatically client which we login is populated to mandt

49.What type of user exits have you written?
there are four types
1.function exit
2.menu ixit
3.screen exit.
4.field exit.
these are the user exits

50.How can you debug a script form?
SE71 -> give the form name -> utilities -> activate debugger

51.How do we debug sapscript?
First we need to put Break point in Print program where ever you want to stop the execution.
After in SE71 give your form name and go to Utilities–>Active De-bugger.
Then go to your transcation like VF03(for Invoice or Credit memo) etc to see the print preview or print the form execute it.
When you execute it the the form Debugging will get activated and you can see your Form execution step by step.

52.What are the different types of data dictionary objects?
Answer1
Data Dictionary Objects

* Tables
* Views
* Domain
* Data Element
* Type Groups
* Search Helps/Matchcode Objects
* Lock objects
* Structures
* Table Types

Answer2
the dictionary objects are:
domain
dataelements
tables
views
structures
typegroups
search helps
lock objects etc which are data base related objects in sap

 

53.Can a transparent table exist in data dictionary but not in the data base physically?
Answer1
NO. TRANSPARENT TABLE DO EXIST WITH THE SAME STRUCTURE BOTH IN THE DICTIONARY AS WELL AS IN THE DATABASE,EXACTLY WITH THE SAME DATA AND FIELDS.
No,
at the point you will activate your table a same transparent table is going to be create in database

Answer2
Yes, a transparent table(definition) can exist in the data dictionary and not in the database. In this case, it is not activated

54.What are the domains and data elements?

domains:

domains are the dictionary objects that are assigned with constants and data types
data elements:

data elements are dictionary objects that are assigned with the domains.
uses:’
* data elements are used to create relation between tables.
* data elements are used to transfer the data from one R/3 to another R/3.
* to create search helps.

55.What is a collect statement? How is it different from append?
APPEND :
IT IS USED TO GET THE RECORD FROM THE INTERNAL TABLE HEADER TO THE BODY AREA
IT ALLOWS DUPLICATION

COLLECT:
IT IS USED TO A GET A RECORD FROM HEADER TO THE BODY AREA BUT IT WILL NOT ALLOW ANY DUPLICATION EXCEPT IF THERE IS ANY NUMERIC FIELS IT ADDS THAT FIELDS DATA BUT NOT AS A NEW RECORD

56.On ABAP: Did you set up a workflow? Are you familiar with all steps for setting up a workflow?
Yes.
Execute the Txn SWDD(Creating a new Workflow).
In the header of the Workflow, define the Business Object and Event you refer to for triggering the Wf.
Create the Steps required for your workflow(Activity).
Inside the Activity, Create the task and assign the Business Object and the related method for that business object.
Activate the Workflow.

57.In the ‘select’ statement what is “group by”?
Group by clause is used to fetch the data from the table by the specified field
ex.select count (*) from emptable group by deptno where deptno = 1.
It is used to find the number of employees present in the specified department no.

58.How can I copy a standard table to make my own z_table?
WE CAN CREATE A STRUCTURE LIKE THE SAME STRUCTURE AS DATABASE TABLE AND WE CAN USE
SELECT* FROM DATABASE TABLE INTO TABLE ITAB
OR
INSERT INTO ITAB VALUES DATABASE TABLE

59.From Excel to ABAP – Is batch mode possible ?
DATA w_file TYPE string.
* Convert the file path into string
w_file = p_input.

* Internal Table should have same field sequence as EXL File.

CLEAR t_upload.
REFRESH t_upload.

* Call function to upload the data into internal table
CALL FUNCTION ‘GUI_UPLOAD’
EXPORTING
filename = w_file
filetype = ‘ASC’
has_field_separator = ‘X’
TABLES
data_tab = t_upload
EXCEPTIONS
file_open_error = 1
file_read_error = 2
no_batch = 3
gui_refuse_filetransfer = 4
invalid_type = 5
no_authority = 6
unknown_error = 7
bad_data_format = 8
header_not_allowed = 9
separator_not_allowed = 10
header_too_long = 11
unknown_dp_error = 12
access_denied = 13
dp_out_of_memory = 14
disk_full = 15
dp_timeout = 16
OTHERS = 17.
IF sy-subrc NE 0.
* MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
* WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4. ELSE.
* Delete the first row of heading from the uploaded table
DELETE t_upload INDEX 1.
ENDIF. ” IF sy-subrc EQ 0.

SAP HANA Interview Questions

Top most important SAP HANA interview questions and answers by Experts:

Here is a list of Top most important SAP HANA interview questions and answers by Experts.If you want to download SAP HANA interview questions pdf free ,you can register with RVH techguru. Our experts prepared these SAP HANA interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in SAP HANA ,Register for SAP HANA online training here.

 

1.What are the two developer roles in HANA SPS05?
The two developer roles are Modeler and Application Programmer.

Modeler: modeler is concerned with the definition of model and schemas used in the SAP HANA, the specification and definition of tables, views, primary keys, indexes, partitions and inter-relationship of the data, designing and defining authorization and access control through the specification of privileges, roles and users and generally uses the perspective “Administration Console” and “Modeler”.

Application Programmer: Programmer is concerned with building SAP HANA applications which are designed based on MVC (model-view-controller) architecture and generally uses the perspective “SAP HANA Development”.

2.Explain HANA database Architecture (SP05)?
Clients connect to the database system which forms a session within the database in the form of SQL statements. In the HANA database, each SQL statement is processed in the context of a transaction. New sessions are assigned to a new transaction.

Traditional database applications uses JDBC and ODBC interface to communicate with the database management system over a network connection and application uses SQL to manage and query the data stored in the database. In the HANA database Index server is the main component of database management which contains the actual data stores and the engines for processing the data. The index server processes incoming SQL or MDX statements in the context of transaction.

The Transaction manager coordinates database transactions, and keeps track of running and closed transactions. When a transaction is committed or rolled back, the transaction manager informs the involved storage engines about this event so they can execute necessary actions.

The HANA database has its own scripting language called SQLScript that is designed to enable optimization and parallelization. HANA supports the Business Functional Library (BFL) and Predictive Analysis Library (PAL) and can be called directly from within SQLScript. It also supports the development of programs written in R language.

SQL and SQLScript are implemented using a common infrastructure of Built-in functions. That have access to various meta definitions such as definitions of relational tables, columns, views, and indexes, definitions of SQLScript procedures. This Metadata is stored in one common catalog (row store or column store).

The Persistence layer ensures that the database after a restart is restored to the most recent committed state. It uses a combination of write-ahead logs, shadow paging and save points. The persistence layer also contains Logger that manages the transaction log.
The Index server uses the Preprocessor Server for analyzing the text data and extracting the information based on text search capabilities. The Name Server knows where the components are running and which data is located on which server. The Statistics Server collects information about status, performance and resource consumption from other servers in the system.
3.What is SAP XS (Extended Application Service)?
SAP HANA XS provides end-to-end support for web-based applications .

4.What are Development objects?
The building blocks of SAP HANA applications are called development objects.

5.What is Repository?
The HANA Repository is storage system for development objects and is built into SAP HANA.
The repository supports Version control, Transport, and Sharing of objects between multiple developers. We can add objects to the repository, update the objects, publish the objects, and compile these objects into runtime objects.

6.What are the different perspectives available in HANA?
Modeler: used for creating various types of views and analytical privileges.
SAP HANA Development: Used for programming applications for creating development objects to access or update data models such as Server-side Java script or HTML files.
Administration: Used to monitor the system and change settings.
Debug: Used to debug code such as SQLScript (.procedure files) or Server-side Java script (.xsjs files).

To open a perspective, go to Window → Open Perspective.

7.Before starting development work in SAP HANA studio, What are the roles a user should have on SAP HANA server ?
Modeling, Content_Admin.

8.What is a Delivery Unit?
Delivery unit (DU) is a container used by the Life Cycle Manager (LCM) to transport repository objects between the SAP HANA systems. The name of DU must contain only capital letters (A-Z), digits (0-9) and underscores (_).

9.What is a workspace?
The place where you work on project-related objects is called a repository workspace.
10.What is a package and its types?
Package is used to group together related content objects in SAP HANA studio. By default it creates Non-structural.
Type Description
Structural Package only contains sub-packages. It cannot contain repository objects.
Non-Structural Package contains both repository objects and sub-packages.

11.What are the default packages delivered with the repository?
Sap
System-local
System-local.generated
System-local.private

12.What can be the maximum length of a package name?
190 characters including dots. Example: RajKumar.pkg123

13.What are package privileges?
REPO.READ: Read access to the selected package and design-time objects (both native and imported).
REPO.EDIT_NATIVE_OBJECTS: Authorization to modify design-time objects in packages originating in the system the user is working in.
REPO.ACTIVATE_NATIVE_OBJECTS: Authorization to activate/reactivate design-time objects in package originating in the system the user is working in.
REPO.MAINTAIN_NATIVE_PACKAGES: Authorization to update or delete native packages or create sub-packages of packages originating in the system in which the user is working.

14.How each object is uniquely identified in the repository?
Each object is uniquely identified by the combination of package name, object name and object type.

15.Can multiple objects of the same type can have the same object name?
Yes, only when they belong to different packages.

16.What are the different tasks you can perform in setting up the basis persistence model for SAP HANA XS?
Creating Schema, Creating Table, Creating View, Creating Sequence and Importing table content.

17.What are the different tasks you can perform in modeler perspective?
Import metadata, Load data, Create packages, Create information views, Create Procedures, Create Analytical privileges, Import SAP NetWeaver BW objects, Create Decision Tables, Import and Export objects.

18.What are the supported object types in modeler perspective?
Attribute views, Analytical views, Calculation views, Analytical privileges, Procedures, Decision tables, Process Visibility Scenario.

19.What are the different modeler preferences and how do you set?
You can set the modeler preferences by choosing the menu Window → Preferences → Modeler (or) Quick launch → Manage Preferences.

20.Why to configure Import server?
In order to load data data from external sources to SAP HANA we need to establish a connection with the server. To connect, we need to provide details of Business Objects Data Services repository and ODBC drivers. Once the connection is established, we can import the tables definition and then load data into table definitions.

Quick launch – Configure Import Server
Enter the IP address of the server from which you want to import data
Enter the repository name
Enter the ODBC data source, and choose OK.

21.How to Import table definitions?
If you want to import all table definitions, Go to
File menu → Choose Import
Expand the SAP HANA Content node
Choose “Mass Import of Metadata” and choose next
Select the target system where you want to import all the table definitions, and choose next
In the Connections Details Dialog , enter the user name and password of the target system
Select the required source system and choose Finish.
Note: If you want to import selective table definitions use “Selective Import of Metadata”.
22.How to load data into tables?
Quick Launch → Data Provisioning
Choose Source
Choose Load (for Initial load) or Replicate (for data replication)
Select the required tables to load or replicate
Click Finish.

23.How to upload data from Flat files?
File menu → Import
In ‘Select an Import Source’ section, expand the ‘SAP HANA Content’ node
Select ‘Data from Local file’ and choose Next
Select the Target system to which you want to import the data using Flat file, choose Next
In ‘Define Properties Import Page’ browse the file containing the data
Select ‘New’ option (If you want to load the data into a new table) or
Select the ‘Existing’ option (If you want to append the data to an existing table)
Click Finish.

24.How to copy standard content delivered by SAP?
Quick Launch → Mass Copy
Create a mapping between source package and target package
Choose Next to view the summary
Click Finish to confirm content copy.

25.What is Schema mapping? How do you do Schema mapping?
Schema mapping is done when the physical schema in the target system is not the same as the physical
schema in the source system.

Quick Launch → Schema Mapping
Choose Add
Create a mapping in the Target system between the Authoring schema and Physical schema
Click OK.

Note: Schema mapping only applies to references from repository objects to catalog onjects. It is not intended to be used for repository to repository references.

26.In which configuration table, the mapping between authoring and physical schema is stored?
SYS_BI.M_SCHEMA_MAPPING

27.What’s the purpose of Generating Time Data?
If you model a time attribute view without generating time data, an empty view will be shown when you use data preview. To generate Time Data go to
Quick Launch → Generate Time Data
If your financial year is from January to December, Choose ‘Calender Type’ as Gregorian else Fiscal
Click Generate.

28.In which configuration table the generated time data information will be stored?
For Gregorian calendar type (SYS_BI)
M_TIME_DIMENSION_YEAR M_TIME_DIMENSION_MONTH
M_TIME_DIMENSION_WEEK M_TIME_DIMENSION
For Fiscal
M_FISCAL_CALENDAR

29.What is an Attribute?
Attribute represents the descriptive data used in modeling. Example: City, Country, etc.

30.What is a Simple Attribute?
Simple attributes are individual analytical elements that are derived from the data foundation. For example Product_ID, Product_Name are attributes of a Product subject area.

31.What is a Calculated Attribute?
Calculated attributes are derived from one or more existing attributes or constants. For example deriving the full name of a customer (first name and last name), assigning a constant value to an attribute that can be used for arithmetic calculations.

32.What is a Private Attribute?
Private attributes used in an analytical view allow you to customize the behavior of an attribute for only that view. For example if you create an analytical view and you want a particular attribute to behave differently than it does in the attribute view to which it belongs, you can define it as a private attribute.

33.What is a Measure?
Measures are simple measurable analytical elements and are derived from Analytic and Calculation views.

34.What is a Simple Measure?
Simple Measure is a measurable analytical element that is derived from the data foundation.

35.What is a Calculated Measure?
Calculated Measures are defined based on a combination of data from OLAP cubes, arithmetic operators, constants, and functions.

36.What is a Restricted Measure?
Restricted measures are used to filter the value for an output field based on the user-defined rules For example you can restrict the revenue column only for Region = APJ, Year = 2013.

37.What are Counters?
Counters add a new measure to the Calculation view definition to count the recurrence of an attribute. For example, to count how many times Product appears.

38.What is an Attribute View?
Attribute views are used to model entity based on the relationships between attribute data contained in multiple source tables. You can model Columns, Calculated columns and Hierarchies.

Also you can fine-tune the attributes of an Attribute view:
Can apply filter to restrict values
Can be defined as Hidden so that they can be processed but not visible to end users
Can be defined as key attributes and used when joining multiple tables
Can be further drill down by ‘Drill Down Enable’ property.

39.What are the tables to be imported for creating attribute view of type Time?
T009 and T009B.

40.What is Label Mapping?
We can choose to associate an attribute with another attribute description. Label mapping is also called as Description mapping. For example if A1 has a label column B1, then you can rename B1 to A1.description. The related columns appear side by side during data preview.

41.What happens when one of the table in Attribute view has modified column with data type?
It reflects the previous state of the columns, even if you remove and add it again. It is referring to the cache. To resolve this issue close the editor and reopen it.

42.What happens when you open an attribute view with a missing column in the required object?
An error will be shown “column is not found in table schemaname.tablename” and the editor does not open. To make it consistent

Open the required object and add the missing column/attribute/measure temporarily
Now open the object which was previously giving error
Find all references to this column, Save the object
Now go ahead and delete the column from the required object.

43.What is an Analytic view?
Analytic views are used to model data that includes measures. In case of multiple tables, measures must originate from only one of these tables (central table). You can model Columns, Calculated columns, Restricted columns, Variables, and Input parameters.

Also you can fine-tune the attributes of an Analytic view:
Can apply filter to restrict values
Can be defined as Hidden so that they can be processed but not visible to end users
Can be defined as key attributes and used when joining multiple tables
Can be further drill down by ‘Drill Down Enable’ property
You can model Aggregation type on measures
You can model Currency and Unit of Measure.

44.Can we include Attribute views in Analytic view definition?
Yes

45.What does the Scenario panel of Analytic view editor contains?
Data Foundation: represents the tables used for defining the fact table of the view. You can specify the central table by selecting a value in ‘Central Entity’ property.
Logical Join: represents the relation between fact table and attribute views to create start schema.
Semantics: represents the output structure of the view.

46.What does the aggregation type ‘Calculate Before Aggregation’ mean?
If you select ‘Calculate Before Aggregation’, the calculation happens as per the expression specified and then the results are aggregated as SUM, MAX, MIN, or COUNT. If it is NOT selected, the calculation happens as per the expression specified but the data is not aggregated but shown as FORMULA.

47.How to activate the other objects (required or impacted objects) along with current object?
By using ‘Save and Activate All’ option in the toolbar.

48.Can you add column views to Analytic view and Calculation view?
We can add column views in a Calculation view but not in the Analytic view.

49.Consider there is a table that contains product ID’s with no product description and you have a text table for products that has language specific description for each product? How can you get the language specific data?
Create a text join between these two tables. The right table should be the text table and is mandatory to specify the “Language Column” in the ‘Properties’ view.

50.What are the restrictions while creating the join between the views and fact table?
A table should not appear twice in any join path, i.e. Self join is not supported.
While creating join between Analytic view and Attribute view the same table cannot be used in both the views.

51.What is Calculation view?
Calculation view is more advanced slice of the data and can include measures from multiple source of tables, can include advanced SQL logic. The data foundation of the calculation view can include any combination of tables, column views, attribute views and analytic views. We can create joins, unions, projections, and aggregation levels on the sources. You can model Attributes, Measures, Calculated measures, Counters, Hierarchies (created outside of the attribute view), Variables and Input parameters.

52.Calculation views are modeled based on what?
Graphical views or Scripted views but not as SQLScript. However there are exceptions to this rule. SQLScript with the following properties can be used in Calculation view:
No input parameters
Always Read-only (do not make changes to database)
Side-effect free.

53.What are the option available in ‘Run With’ while creating calculation view?
Definer’s Right, Invoker’s Right.
Definers right: System uses the rights of the definer while executing the view or procedure for any user.
Invokers right: System uses the rights of the current user while executing the view or procedure.

54.While creating a Graphical Calculation view, what are the options available in Tools palette?
Union, Join, Projection, and Aggregation.
Note: You can have only one source of input for Projection and Aggregation views.
You can create filters on Projection and Aggregation view attributes.

55.How to create Counters in Graphical Calculation view?
For example to get the number of distinct values of an attribute:
Go to the Output pane, right click Counters
From the context menu, choose New
Choose Attribute
Click ok.

56.Is it mandatory to include measures for Calculation view?
No. Calculation view containing no measures works like an attribute view and is not available for reporting purposes.

57.How do you debug the Calculation view with lot of complexity at each level?
By previewing the data of an intermediate node.

58.What is Mapping input parameter in Calculation view?
It is used for mapping the input parameters in the underlying data sources of the calculation view with calculation view parameters.

59.In calculation view, What is the option ‘Auto Map by Name’ used for?
It automatically creates the input parameters corresponding to the source and perform a 1:1 mapping.

60.What are the options available in Source input parameter?
Create New Map 1:1
Map by Name
Remove Mapping

61.Consider there are two tables (Actual sales and Planned sales) with similar structures. I want to see the combined data in a single view but at the same time how can I differentiate the data between these two tables

Create a union view (Graphical) between the two tables and have a ‘Constant column’ indicating constant values like ‘A’ for Actual sales and ‘P’ for Planned sales. The default value for the constant column is NULL.

62.What is a Constant column and how to create it?
In a Union view, a Constant column is created for the output attributes for which there is no mapping to the source attributes. To create Constant column:
Right click the attribute in the target list
Choose Manage Mappings
To map the source to the target column, select the required source from the dropdown list
To assign a default value to the constant column, enter a value in the Constant value field
Select the required data type, length and scale as required
Click ok.

63.What is the difference between HANA Variable and Input parameter?
HANA Variables do not impact the execution and used to filter the attributes, for example we can filter a result to a specific country or product and are applied in the WHERE clause of the SQL query.
HANA Input parameters used to manipulate the execution of the information model, for example currency codes or dates when exchange rates have to be calculated and are passed as PLACEHOLDER in the FROM clause of the SQL query.

64.In which configuration table you can find the variables information?
You can find in _SYS_BI schema
BIMC_VARIABLE BIMC_VARIABLE_ASSIGNMENT
BIMC_VARIABLE_VIEW BIMC_VARIABLE_VALUE
65.What are the different types of Input parameters supported?
Attribute value/Column
Currency (Available in Calculation view only)
Date (Available in Calculation view only)
Static list
Derived from Table (Available in Analytic and Graphical Calculation view)
Empty
Direct Type (Available in Analytic view)

66.How can you check whether an input parameter is mandatory or not?
From the properties of Input parameter in the Properties pane.

67.What is Hierarchy?
We create hierarchies between attributes to improve analysis by displaying attributes according to their defined relationships. There are two types of hierarchies:

Level Hierarchy: The root and child nodes are accessed only in the defined order. It consists of one or more levels of aggregation.
Example: We can drill down from Country to State and to City etc.

Parent/Child Hierarchy: This hierarchy contains a parent attribute and constructed from a single parent attribute.
Example: Employee master (employee and manager).

68.How to create an hierarchy for Analytic view?
Hierarchy is not supported in Analytic view but can be used only in Attribute view and Calculation view.

69.While creating hierarchy, what does the option ‘Aggregate All Nodes’ mean?
For example there is a member A with value 100, A1 with value 10, A2 with value 20 where A1 and A2 are children of A. By default the option ‘Aggregate All Nodes’ is set to false and you will see a value of 30 for A. When this option is set to true, you will count the posted value 100 for A as well and see a result of 130.

70.How can you generate a Sales report for a region in a particular currency where you have the sales data in a database table in a different currency?
Create an Analytic view by selecting the table column containing the sales data and currency and perform currency conversion. Once the view is activated, we can use it to generate reports.

71.What are the factors that affect currency conversion?
Currency conversion is performed based on source currency, target currency, exchange rate, and date of conversion. You can select currency from the attribute data used in the view. Currency conversion is enabled for Analytic view and Calculation views.

72.What is the prerequisite for doing the currency conversion?
You need to import tables TCURC, TCURF, TCURN, TCURR, TCURT, TCURV, TCURW & TCURX.

73.What is the prerequisite for Unit of Measure?
You need to import the tables T006 & T006A.

74.What happens when you activate an object?
The object is exposed to repository and for analysis.

75.What is the difference between Activate and Redeploy?
Activate – It deploys the inactive objects.
Redeploy – It deploys the active objects. You do this when run-time object is corrupted or deleted and you want to create it again. OR when the object goes through client-level activation and server-level activation but fails at MDX, and the object status is still active.

76.What are the supported activation modes?
Activate and Ignore the inconsistencies in impacted objects
Stop activation in case of inconsistencies in impacted objects.

Irrespective of the activation mode, if even one of the selected objects fails (either during validation or during activation), the complete activation job fails and none of the selected objects will be activated.
77.Can you explain the behavior of activation job?
The status of the activation job indicates whether the activation of the objects is successful or failed.
In case of failure (status is completed with errors) the process is rolled back and none of the objects are activated
In the summary part the job log shows success, even in the case of failure. This is to help the user to indicate that those objects were successfully activated without any issues.
When you open the job log, the summary list only shows those objects that are submitted for activation. It does not list all the affected objects. They are listed in detail section.

78.What is a Decision table?
It creates related business rules in a tabular format for automating the decisions. It helps in managing business rules, data validation, data quality rules without any language knowledge. The active version of the decision table can be used in applications.

You create decision table in a package just like any attribute view. You can create from scratch or from an existing decision table.

79.Where to see the detailed report of the decision table?
In the ‘Job Log’ section you can see the validation status and detailed report of the decision table.

80.How to execute the decision table?
The decision table is executed by calling the procedure.

CALL “<schema name>”.”<procedure name>”;

CALL “<schema name>”.”<procedure name>”(<IN parameter>, …… , <IN parameter>, ?);
for Condition as parameters and Action as parameters.

On execution of the procedure, if no parameters are used then physical table is updated based on the data you enter in the form of condition values and action values.

81.Are there any restrictions on Decision table to preview the data?
Data preview is supported only if:
Decision table is based on physical table and has at-least one parameter as action
Decision table is based on Information view and parameter(s) as action.

82.How can you change the layout of a decision table?
You can change the layout by arranging the condition and action columns. By default all the conditions appear as vertical columns in the decision table and you can mark a condition as a horizontal condition under the Decision table editor, choose ‘Change Layout’.

83.Can you switch ownership of objects?
We can take the ownership of objects from other user’s workspace only if it is inactive version of the object Authorization required is “Work in Foreign Workspace”. The active version is owned by the user who created and activated the object.

84.What is the difference between Switch Ownership and Take Over?
Switch Ownership: To take multiple inactive objects from other users.
Take Over: To take single inactive object from another workspace.

85.You are working on a inactive version of a object. How can you view changes made to the active version?
Select the required object in a package you are working
From the context menu, choose ‘open’
In the editor pane, choose ‘Show Active Version’
Compare the active and inactive versions of the object.

86.How can you view the version history of content objects?
Select the required object from the package
From the context menu choose ‘History’.

87.What is Refactoring Object?
Restructuring the Content objects without changing their behavior is call Refactoring.

88.What are the objects eligible for Refactoring?
Packages, Attribute views, Analytic views, Graphical Calculation views, and Analytical Privileges.

89.How do you validate models?
Quick launch menu → Validate
From the ‘Available’ list, select the required models that system must validate.
Choose Add
Click Validate.

90.How do you generate the documentation for the objects you created?
By using ‘Auto Documentation’ which captures the details of an information model or a package in a single document. Process to create is:
Quick Launch → Auto Documentation
In ‘Select Content Type’ choose ‘Model Details’ OR ‘Model List’
Add the required objects to the Target list
Browse the location where you want to save the file
Click finish.

91.How to identify whether an information model is referenced by any other information model?
We can check the model references by using ‘Where Used’. Process is:
Go to the package
Select the required object
From the context menu, choose ‘Where Used’.

92.What is the difference among Raw Data, Distinct values and Analysis while doing the Data Preview?
Raw Data : It displays all attributes along with data in tabular format.
Distinct Values: It displays all attributes along with data in graphical format.
Analysis : It displays all attributes and measures in graphical format.

93.What are the different types of functions can be used in expressions?
Conversion, String, Mathematical, Date and Misc functions.

if(”SCORE” > 7, “SELECTED”, IF(”SCORE” > 4, “ONHOLD”, “REJECTED”));
returns REJECTED if the SCORE is <= 4.

case(“CODE”,1,’NEW’,2,’VENDOR REBUILT’,3,’SHOP REBUILT’,’INVALID’);
if the value of CODE is other than 1/2/3 then a default value of ‘INVALID’ will be selected.

94.How to search Tables, Models, and Column views?
In the Modeler search field, enter the object you want
Select the system in dropdown
Click search.

The matching objects are listed in results pane with 3 tab pages: Tables, Models, and Column views.

95.Is it possible to Import SAP Netweaver BW objects?
Yes it is possible to import SAP BW objects.

96.How to Import BW models?
The process to Import BW models:
File menu → Import
Expand SAP HANA Content node, choose ‘Import SAP NetWeaver BW Models’
In ‘Source System’ enter BW credentials
Select the target system
Select BW InfoProviders
If you want to import selected models along with display atributes for IMO Cube and IMO DSO, select ‘Include Display Attributes’
We can select analysis authorizations associated with InfoProviders/Role based.
Click finish.

97.What is the reason for going In-memory?
One reason is the number of CPU cycles per second is increasing and the cost of processors is decreasing. For managing the data in memory, there is five-minute rule which is based on the suggestion that it costs more to wait for the data to be fetched from disk than it costs to keep data in memory so it depends on how often you fetch the data.
For example there is a table and no matter how large it is and this table is touched by a query at least once every 55 minutes, it is less expensive (in hardware costs) to keep it in memory than to read it from memory and if it is frequently accessed it is less expensive to store it in memory.

98.What is a Five-minute rule?
It is a rule of thumb for deciding whether a data item should be kept in memory, or stored on disk and read back into memory when required. The rule is “randomly accessed disk pages of cache are re-used every 5 minutes”.

99.What is multi-core CPU?
Multiple CPU’s on one chip or in one package is called multi-core CPU. .

Traditional databases for online transaction processing (OLTP) do not use current hardware efficiently.

100.What is Stall?
Waiting for data to be loaded from main memory into the CPU cache is called as Stalls.

101.What is SAP In-Memory Appliance (SAP HANA)?
HANA is an in-memory technique to store data that is particularly suited for handling very large amounts of tabular, or relational, data with extra ordinary performance. Common databases store tabular data row-wise. Reorganizing the data in memory column-wise brings a tremendous speed increase when accessing a subset of the data in each table row.

102.What are the components or products of HANA?
SAP HANA contains the following components.

• SAP HANA DATABASE
• SAP HANA Studio SAP HANA CLIENT
SAP HOST AGENT 7.2
• SAP HANA INFORMATION COMPOSER
• DIAGNOSTIC AGENT 7.3
SAP HANA client package for MS excel
SAP HANA UI for Information Access (INA)
SAP HANA AFL 1.0
Software Update Manager for SAP HANA
SAP LT Replication AddOn
SAP LT Replication Server
SAP HANA Direct Extractor Connection (DXC)
SAP Data Services 4.0

103..What are the different editions available in HANA appliance software?
Platform and Enterprise edition.

Platform edition is intended for customers who want to use ETL-based replication and already have a license for SAP BO Data Services.
Enterprise edition is intended for customers who want to use either trigger-based replication or ETL-based replication and do not already have all of the necessary licenses for SAP BO Data Services.

104..What is columnar and Row-Based Data Storage?

Fig: Row and Column-based storage
A database table contains data in the form of rows and columns. However Computer memory is organized as a linear structure. To store a table in linear memory, there are two options. A row-based storage stores a table as a sequence of records, each of which contains the fields of one row. In a columnar storage the entries of a column are stored in contiguous memory locations.

The SAP HANA database allows to specify whether a table is to be stored column-wise or row-wise. It is also possible to alter an existing table from columnar to row-based and vice versa.
Search operations in tabular data can be accelerated by organizing data in columns instead in rows.

105..What are the advantages of Column based tables?
Calculations are typically executed on single or a few columns only.
The table is searched based on values of a few columns.
The table has a large number of columns.
The table has a large number of rows and columnar operations are required (aggregate, scan, etc.).
High compression rates can be achieved because the majority of the columns contain only few distinct values (compared to number of rows).
106..What are the advantages of Row-based tables?
The application needs to only process a single record at one time (many selects and/or updates of single records).
The application typically needs to access a complete record (or row).
The columns contain mainly distinct values so that the compression rate would be low.
Neither aggregations nor fast searching are required.
The table has a small number of rows (e. g. configuration tables).

107.In which case the data to be stored in columnar storage?
To enable fast on-the-fly aggregations, ad-hoc reporting, and to benefit from compression mechanisms it is recommended that transaction data to be stored in a column-based table.

108.Is it possible to join tables of row-based with column-based tables?
Yes

109.What are the advantages of Columnar tables?

Higher Data Compression Rates
Higher Performance for Column Operations
Elimination of Additional Indexes
Parallelization
Elimination of Materialized Aggregates

110..What are the different Compression Techniques you know?
Run-length encoding
Cluster encoding
Dictionary encoding

111.Why materialized aggregates are not required?
With a scanning speed of several gigabytes per millisecond, in-memory column stores, make it possible to calculate aggregates on large amounts of data on the fly with high performance. This is expected to eliminate the need for materialized aggregates in many cases.

112.What are the advantages of Eliminating materialized aggregates?
No additional tables for storing aggregate results means:
Simplified data model
Simplified application logic
Higher level of concurrency and
With the fly Aggregation we have aggregated values up to date

113.What is parallelization?
Column-based storage makes it easy to execute operations in parallel using multiple processor cores. In a column store data is already vertically partitioned means that operations on different columns can easily be processed in parallel. If multiple columns need to be searched or aggregated, each of these operations can be assigned to a different processor core. In addition operations on one column can be parallelized by partitioning the column into multiple sections that can be processed by different processor cores (core 3 and 4 below).
SAP Landscape Transformation

114.What are the different types of replication techniques?
1.ETL based replication using BODS
2.Trigger based replication using SLT
3.Extractor based data acquisition using DXC

115.What is SLT?
SLT stands for SAP Landscape Transformation which is a trigger based replication. SLT replication server is the replication technology to pass data from source system to the target system. The source can be either SAP or non-SAP. Target system is SAP HANA system which contains HANA database.

116.Is it possible to load and replicate data from one source system to multiple target database schemas of HANA system?
Yes. It is possible for up to 4.

117.Is it possible to specify the type of data load and replication?
Yes either in real time, or scheduled by time or by interval.

118.What is Configuration in SLT?
The information to create the connection between the source system, SLT system, and the SAP HANA system is specified within the SLT system as a Configuration. You can define a new configuration in Configuration & Monitoring Dashboard (transaction LTR).

119.Is there any pre-requisite before creating the configuration and replication?
For the SAP source systems DMIS add-on is installed in SLT replication server. User for RFC connection has the role IUUC_REPL_REMOTE assigned but not DDIC.
For non-SAP source systems DMIS add-on is not required and grant a database user sufficient authorization for data replication.

120.What is Configuration and Monitoring Dashboard?
It is an application that runs on SLT replication server to specify configuration information (such as source system, target system, and relevant connections) so that data can be replicated. It can also use it to monitor the replication status (transaction LTR).
Status Yellow: It may occur due to triggers which are not yet created successfully.
Status Red: It may occur if master job is aborted (manually in transaction SM37).

121.What is advanced replication settings?
A transaction that runs on SLT replication server to specify advanced replication settings like
Modifying target table structures,
Specifying performance optimization settings
Define transformation rules

122.What is Latency?
It is the length of time to replicate data (a table entry) from the source system to the target system.

123.What is logging table?
A table in the source system that records any changes to a table that is being replicated. This ensures that SLT replication server can replicate these changes to the target system.

124.What are Transformation rules?
A rule specified in the Advanced Replication settings transaction for source tables such that data is transformed during the replication process. Example you can specify rule to
Convert fields
Fill empty fields
Skip records

125.What happens when you set-up a new configuration?
The database connection is automatically created along with GUID and Mass transfer id (MT_ID).

A schema GUID ensures that configurations with the same schema name can be created.
The Mass transfer ID is used in the naming of SLT jobs and the system can uniquely identify a schema.

126.What factors influence the change/increase the number of jobs?
Number of configurations managed by the SLT replication server
Number of tables to be loaded/replicated for each configuration
Expected speed of initial load
Expected replication latency time. As a rule of thumb, one BDG job should be used for each 10 tables in replication to achieve acceptable latency times.

127.When to change the number of Data Transfer jobs?
If the speed of the initial load/replication latency time is not satisfactory
If SLT replication server has more resources than initially available, we can increase the number of data transfer and/or initial load jobs
After the completion of the initial load, we may want to reduce the number of initial load jobs

128.What are the jobs involved in replication process?
1. Master Job (IUUC_MONITOR_<MT_ID>)
2. Master Controlling Job (IUUC_REPLIC_CNTR_<MT_ID>)
3. Data Load Job (DTL_MT_DATA_LOAD_<MT_ID>_<2digits>)
4.Migration Object Definition Job (IUUC_DEF_MIG_OBJ_<2digits>)
5.Access Plan Calculation Job (ACC_PLAN_CALC_<MT_ID>_<2digits>)

129.What is the relation between the number of data transfer jobs in the configuration settings and the available BGD work processes?
Each job occupies 1 BGD work processes in SLT replication server. For each configuration, the parameter Data Transfer Jobs restricts the maximum number of data load job for each mass transfer ID (MT_ID).

A mass transfer ID requires at least 4 background jobs to be available:
One master job
One master controller job
At least one data load job
One additional job either for migration/access plan calculation/to change configuration settings in “Configuration and Monitoring Dashboard”.

130.If you set the parameter “data transfer jobs” to 04 in a configuration “SCHEMA1”, a mass transfer ID 001 is assigned. Then what jobs should be in the system?
1 Master job (IUUC_MONITOR_SCHEMA1)
1 Master Controller job (IUUC_REPL_CNTR_001_0001)
At most 4 parallel jobs for MT_ID 001 (DTL_MT_DATA_LOAD_001_ 01/~02/~03/~04)

Performance: If lots of tables are selected for load / replication at the same time, it may happen that there are not enough background jobs available to start the load procedure for all tables immediately. In this case you can increase the number of initial load jobs, otherwise tables will be handled sequentially.

For tables with large volume of data, you can use the transaction “Advanced Replication Settings (IUUC_REPL_CONT)” to further optimize the load and replication procedure for dedicated tables.

 

 

OBIEE Interview Questions

Top most important OBIEE interview questions and answers by Experts:

Here is a list of Top most important OBIEE interview questions and answers by Experts.If you want to download OBIEE interview questions pdf free ,you can register with RVH techguru. Our experts prepared these OBIEE interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in OBIEE ,Register for OBIEE online training here.

 

 

1.Suppose I have report which is running for about 3 minutes typically. What is the first step you take to improve the performance of the query?
Find the SQL query of the report in Admin->manage Session-> view log then run the SQL query on toad if it takes the same time even in TOAD then modify the query to reduce the query time. If the query runs normally in TOAD then we need to make changes in the repository.

2.What is aggregate navigation? How do you configure the Aggregate tables in OBIEE?
Aggregate tables store pre-computed results, which are measures that have been aggregated (typically summed) over a set of dimensional attributes. Using aggregate tables is a very popular technique for speeding up query response times in decision support systems.
Ex: If you observe that most of the queries are fired on aggregated values like yearly or monthly data rather that day level data then to speed up the report we can create an aggregate table containing month level and year level data and map it to the respective logical table and set the aggregation levels in the content tab of LTS.

3.We have 4 dimension tables, in that 2 tables need to have hierarchies then in such a case is it mandatory to create hierarchies for all the dimension tables?
No, it is not mandatory to define hierarchies to other Dimension tables.

4.Can you have multiple data sources in OBIEE?
Yes, we can have multiple data sources of different types.

5.Do you know about Initialization Blocks? Can you give me an example where you used them?
Initialization blocks are used for instantiating the value of a variable.
To create dynamic variable you have to create IB to write SQL statement. The result of the query would be assigned as value to the variable.

6.What is query repository tool?
It is utility of OBIEE Admin tool
It allows you to examine the repository metadata
Examine relationship between metadata objects like which column in the presentation layer maps to which table in physical layer
Ex: we can search for objects based on name, type.

7.Can you migrate the presentation layer to a different server.
No, we cannot migrate only one particular layer to another server, we have to migrate the complete repository or the web catalog.

8.How do you identify what are the dimension tables and how do you decide them during the Business/Data modeling?
Dimension tables contain descriptions that data analysts use as they query the database. Ex: the Product table contains product packaging information; and the Period table contains month, quarter, and year values. The tables which contain numeric values used for calculations are used as Fact tables.

9.Why do we have multiple LTS in BMM layer? What is the purpose?
To improve the performance and query response time.

10.How do i disable cache for only 2 particular tables?
In the physical layer, double click on a table on the general tab we have an option Cachable we can either enable it or disable it for that particular table.

11. Explain the Architecture of OBIEE and what each components do?

OBIEE Consists of Presentation Services(Web),Oracle BI (Analytics Engine) Server
The client (Answers) constructs sql and passes it to the Analytic Engine and then the Oracle BI (Analytic Engine) parses the physical sql to the Datasources and retrieve the data back to the Engine and presents to the presentation Services .
12. How to get sql from obiee for reports?
 There are many ways to get the sql
a. Modify the request and click Advanced in that you get xml code and also the actual sql.
b. In the catalog Manager click Tools –>Create Report .In the Create Report Window –> Click Request SQL and save the sql to the physical path in your PC.
c. Enable Loglevel to 2 in the OBIEE Admin Tool from Mange-> Security and enable the log level to 2 by clicking properties for the user, then go to the NQQuery.log in BI_HOME/OracleBI/Server/Logs.You will find the SQL for that User.
d. By clcking Administration->Manage sessions-> view sql.
13. How will you do sort in Reports in OBIEE Answers.
Click modify and then click sort (order by icon) on the relevant column in the criteria pane.
14. How will you do different types of narrative Reports in OBIEE?
By clicking modify request and Narrative View and by giving @1 for the first column result and @2 for the 2nd column and son on and we can also give a heading for No Results by clicking the Narrative view.
15. How will you create Interactive Dashboards ?
By clicking Administration and Manage dashboards and by adding column selector also by using view selector etc.and also by using prompts.
16. What is write-back in obiee ?
In Reports of Answer you can give a column as updatebale and then view the reports,this option is called write back.
17. How will you execute Direct SQL in OBIEE?
By clicking Direct Database Request below the subject area in Answers.
18. How will you create report from two subject areas
From the Criteria Pane of the Report Created from First Subject Area
come to the bottom of the page and click combine request. but the options are limited for combining like union etc..
19. How will you Port changes for dashboards,reports,rpd from development to production?
For the RPD use the Merge option in Admin Tool and for dashboards and reports use Content Accelerator Framework.
20.Define repository in terms of OBIEE?
Repository stores the Meta data information. The extension of the repository file is “.rpd”. With OBIEE Server, all the rules needed for security, data modeling, aggregate navigation, caching, and connectivity is stored in metadata repositories. Each metadata repository can store multiple business models. OBIEE Server can access multiple repositories
Repository is divided into three layer,
1. Physical – Represents the data Sources
2. Business – model the Data sources into Facts and Dimension and apply business logic
3. Presentation – Specifies the user’s view of the data rendered in OBIEE answers client

21.What is the end to end life cycle of OBIEE?
OBIEE life cycle:
1. Gather Business Requirements
2. Identify source systems
3. Design ETL to load data to the Data Warehouse
4. Build a repository
5. Build dashboards and reports
6. Define security (LDAP or External table)
7. Based on performance, decide on aggregations and/or caching mechanism.
8. Testing and QA.

22.If you have 3 facts and 4 dimension and you need to join would you recommend joining fact with fact? If no than what is the option? Why you won’t join fact to fact?
Instead of joining fact with fact we can create one logical table (fact) and add the 3 fact tables as logical table source in the BMM layer.

23.What is connection pool and how many connection pools did you have in your last project?
Connection pool is needed for every physical database.
It contains information about the connection to the database, not the database itself.
Can use either shared user accounts or can use pass-through accounts
We can have multiple connection pools for each group to avoid waiting

24.What is the purpose of Alias Tables?
An Alias table is a physical table with the type of Alias. It is a reference to a physical table, and inherits all its column definitions and some properties from the physical table. A logical table source shows how the logical objects are mapped to the physical layer and can be mapped to physical tables, stored procedures and select statements. An alias table can be a reference to any of these logical table source types. Alias Tables can be an important part of designing a physical layer. The following is a list of the main reasons to create an alias table:
1. To reuse an existing table more than once in your physical layer (without having to import it several times)
2. To set up multiple alias tables, each with different keys, names, or joins
3. To help you design sophisticated star or snowflake structures in the business model layer. Alias tables are critical in the process of converting ER Schemas to Dimensional Schemas.

25.How do you define the relationship between facts and dimensions in BMM layer?
Using complex join we can define relationship between facts and dimensions in BMM layer.

26.Did you create any new logical column in BMM layer, how?
Yes. We can create new logical column in BMM layer.
Example: Right click on fact table> select new logical column>give name for new logical column like Total cost.
27.Can you use physical join in BMM layer?
Yes we can use physical join in BMM layer.

28.Can you use outer join in BMM layer?
Yes we can. When we are doing complex join in BMM layer in the join properties we have an option to change the type of join to left outer, right outer, full outer or inner.

29.What is level based metrics?
Level based metrics means, having a measure pinned at a certain level of the dimension.
A LBM is a metric that is defined for a specific level or intersection of levels.
Monthly Total Sales or Quarterly Sales are the examples.
Ex: if you have a measure called “Dollars”, you can create a “Level Based Measure” called “Yearly Dollars” which is Dollars for a Year. This measure will always return the value for the year even if you drill down to a lower level like quarter, month, etc. To create a level based measure, create a new logical column based on the original measure (like Dollars in the example above). Drag and drop the new logical column to the appropriate level in the Dimension hierarchy in the above example you will drag and drop it to Year in Time Dim.

30.What is logging level? Where can you set logging levels?
You can enable logging level for individual users.
We can set the logging level based on the amount of logging you want to do. In normal operations, logging is generally disabled (the logging level is set to 0). If you decide to enable logging, choose a logging level of 1 or 2. These two levels are designed for use by Siebel Analytics Server administrators.
Set Logging Level:
1. In the Administration Tool, select Manage > Security.
2. The Security Manager dialog box appears.
3. Double-click the user’s user ID.
4. The User dialog box appears.
5. Set the logging level by clicking the up or down arrows next to the Logging Level field

31.What are different types of variables? Explain each.
There are two classes of variables:
1. Repository variables
2. Session variables
Repository variables-
A repository variable persists from the time the repository is started.
Static: This value does not change until a Siebel Analytics Server administrator decides to change it.
Dynamic: The values of these variables change with the values returned by queries. These variables are linked to an initialization block. An initialization block contains a SQL query. When the repository is started the value returned by the query in the initialization block will be assigned to the dynamic variable.
Session Variables-
Session variables are created and assigned a value when each user logs on(when a new session is started). There are two types of session variables:
1. System: System variables have reserved names, which cannot be used for other kinds of variables (such as static or dynamic repository variables, or for non-system session variables).
Ex: To filter a column on the value of the variable LOGLEVEL set the filter to the Variable NQ_SESSION.LOGLEVEL.
2. Non-system: A common use of non-system variables is for setting user filters.
Ex: you could define a non-system variable called ‘SalesRegion’ that would be initialized to the name of the user’s sales region. You could then set a security filter for all members of a group that would allow them to see only data pertinent to their region. For example, to filter a column on the value of the variable ‘SalesRegion’ set the filter to the Variable NQ_SESSION.SalesRegion.

32.What is Authentication? How many types of authentication do we have in OBIEE?
Authentication is the process by which a system verifies a user with the help of a user ID and password. It checks if user has the necessary permissions and authorizations to log in and access data. There are 4 main types of Authentication in OBIEE:
Operating system authentication
External table authentication
Database authentication
LDAP authentication

33.What is object level security?
There are two types of object level security: Repository level and Web level
Repository level: In presentation layer we can set Repository level security by giving permission or deny permission to users/groups to see particular table or column.
Web level: this provides security for objects stored in the OBIEE web catalog, such as dashboards, dashboards pages, folder, and reports you can only view the objects for which you are authorized. For example, a mid-level manager may not be granted access to a dashboard containing summary information for an entire department.

34.What is data level security?
This controls the type or amount of data that you can see in a report. When multiple users run the same report the results that are returned to each depend on their access rights and roles in the organization. For example a sales vice president sees results for all regions, while a sales representative for a particular region sees data for that region.

35.What is the difference between Data Level Security and Object Level Security?
Data level security controls the type and amount of data that you can see in a report. Object level security provides security for objects stored in the OBIEE web catalog like dashboards, dashboards pages, folder and reports.

36.How do you implement security using External Tables and LDAP?
Instead of storing user IDs and passwords in a OBIEE Server repository, you can maintain lists of users and their passwords in an external database table and use this table for authentication purposes. The external database table contains user IDs and passwords, and could contain other information, including group membership and display names used for Siebel Analytics Web users.
Instead of storing user IDs and passwords in a OBIEE Server repository, you can have the OBIEE Server pass the user ID and password entered by the user to an LDAP(Lightweight Directory Access Protocol ) server for authentication. The server uses clear text passwords in LDAP authentication. Make sure your LDAP servers are set up to allow this.

37.If you have 2 fact and you want to do report on one with quarter level and the other with month level how do you do that with just one time dimension?
Using level base metrics.

38.If you want to create new logical column where will you create (in repository or dashboard) why?
It would be better if we create a new logical column in repository because if it is in repository you can use it for any report. If you create new logical column in dashboard then it is going to affect only those reports which are on that dashboard. We cannot use that new logical column for other dashboards.

39.What is complex join, and where it is used?
To join a dimension table and fact table in BMM layer we use a complex join.

40.If you want to limit the users by the certain region to access only certain data, what would you do?
Using data level security.
In the Admin tool: go to Manage -> Security in left hand pane u will find the user, groups, LDAP server, Hierarchy
What you can do is select the user and right click and go to properties, you will find two tabs named as users and logon, go to user tab and click at permission button in front of user name you have selected as soon as u click at permission you will get a new window with user group permission having three tabs named as general ,query limits and filter and you can specify your condition at filter tab, in which you can select presentation table ,presentation columns ,logical table and logical columns where you can apply the condition according to your requirement for the selected user or groups.

41.If there are 100 users accessing data, and you want to know the logging details of all the users, where can you find that?
Set the user’s logging level
1. In the Administration Tool, select Manage > Security.
The Security Manager dialog box appears.
2. Double-click the user’s user ID. The User dialog box appears.
3. Set the logging level by clicking the Up or Down arrows next to the Logging Level field

42.How do implement event polling table?
In OBIEE Server event polling tables store information about updates in the underlying databases. These tables are used for cache management. An application that loads data into a data mart could be configured to add rows to an event polling table each time a database table is updated. The Analytics server polls this table at set intervals and invalidates cache entries corresponding to the updated tables.

43.Define pipeline. Did you use it in your projects?
Yes, pipelines are the stages in a particular transaction, assessment, finance, etc.

44.How do you work in a multi user environment? What are the steps?
Create a shared directory on the network for Multi-user Development (MUD).
Open the rpd to use in MUD. From Tools->Options, setup the MUD directory to point to the above directory.
Define projects within the rpd to allow multiple users to develop within their subject area or Facts.
Save and move the rpd to the shared directory setup in point 1.
When users work in the MUD mode, they open the admin tool and start with
MUD ->Checkout to check-out the project they need to work on (not use the File open as you would usually do).
After completing the development, users check-in the changes back to the network and merge the changes.

45.Can you bypass siebel analytics server security ?if so how?
Yes we can by-pass by setting authentication type in NQSCONFIG file in the security section as:authentication_type=bypass_nqs.instanceconfig.xml.

46.What are the things you can do in the BMM layer?
We apply the business login in the BMM layer like creating new logical columns, Aggregation navigation, level based metrics, time series wizard, complex join.

47.What is the difference between Single Logical Table Source and Multiple Logical Table Sources?
If a logical table in BMM layer has only one Table as the source table then it is Single LTS.
If the logical table in BMM layer has more than one table as the sources to it then it is called Multiple LTS.
Ex: Usually Fact table has Multiple LTSs, for which sources will be coming from different Physical tables.

48.How do you bring/relate the aggregate tables into the Siebel analytics Logical layer?
One way of bringing the Aggregate Tables into the BMM layer is by bringing them as Logical Table sources for the corresponding Fact table.
This is done by dragging and dropping the aggregate table into the corresponding fact table. After doing that establish the column mappings and the set the aggregation levels in the content tab of the LTS.

49.How do you know which report is hitting which table, either the fact table or the aggregate table?
After running the report, go to “Administration” tab and go to click on “Manage Sessions”. There you can find the queries that are run and in the “View Log” option in the Session Management you can find which report is hitting which table.

 

Informatica Interview Questions

Top most important Informatica interview questions and answers by Experts:

Here is a list of Top most important Informatica interview questions and answers by Experts.If you want to download Informatica interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Informatica interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Informatica ,Register for Informatica online training here.

 

1) What is Data warehouse?

In 1980, Bill Inmon known as father of data warehousing. “A Data warehouse is a subject

oriented, integrated ,time variant, non volatile collection of data in support of

management’s decision making process”.

  • Subject oriented : means that the data addresses a specific subject such as sales, inventory etc.
  •  Integrated : means that the data is obtained from a variety of sources.
  • Time variant : implies that the data is stored in such a way that when some data is changed.
  •  Non volatile : implies that data is never removed. i.e., historical data is also kept.

2) What is the difference between database and data warehouse?

A database is a collection of related data.

A data warehouse is also a collection of information as well as a supporting system.

3) What are the benefits of data warehousing?

Historical information for comparative and competitive analysis.

Enhanced data quality and completeness.

Supplementing disaster recovery plans with another data back up source.

4) What are the types of data warehouse?

There are mainly three type of Data Warehouse are :

  •  Enterprise Data Warehouse
  •  Operational data store
  •  Data Mart

5) What is the difference between data mining and data warehousing?

Data warehouse is the base for Data Mining. Data Mining basically extract the knowledge

from Data warehouse. It means by analyzing data in data warehouse, will predict trend in

business.

6)What are the applications of data warehouse?

  • Datawarehouse are used extensively in banking and financial services, consumer goods.
  •  Datawarehouse is mainly used for generating reports and answering predefined queries.
  • Datawarehouse is used for strategic purposes, performing multidimensional analysis.
  •  Datawarehouse is used for knowledge discovery and strategic decision making using datamining tools.

7) What is mapping?

A mapping is a set of source and target definitions linked by transformation objects that define the rules for data transformation.

8) What is Datadriven?

The informatica server follows instructions coded into update strategy transformations with in the session maping determine how to flag records for insert,update,delete or reject. If u do not choose data driven option setting, the informatica server ignores all update strategy transformations in the mapping.

9) What are the three major types of metadata in a data warehouse?

Metadata in a data warehouse fall into three major categories :

  • Operational Metadata
  • Extraction and Transformation Metadata
  • End–User Metadata

10) What is OLAP?

  • Allow users to run complex dimensional queries.
  • Enable users to generate canned queries.
  • Two categories of online analytical processing are multidimensional online analytical processing (MOLAP) and relational online analytical processing (ROLAP).

11) What is meant by geographic information system(GIS)?

A software system that allows users to define, create, maintain, and control access to a geographic database.

12) What is dimension table?

A relational table that contains dimension data.

13) What is the difference between OLTP and OLAP?

The main differences between OLTP and OLAP are:

  • OLTP systems are for doing clerical/operational processing of data whereas OLAP systems are for carrying out analytical processing of the data.
  • OLTP systems look at data in one dimension; whereas in OLAP systems, data can be viewed in different dimensions and hence interesting business intelligence can be extracted from the data.
  • Operational personnel of an organization use the OLTP systems whereas management uses OLAP systems, though operational personnel may also use portions of OLAP system.
  • OLTP systems contain the current data as well as the details of the transactions. OLAP systems contain historical data, and also data in summarized form.
  • OLTP database size is smaller as compared to OLAP systems. If the OLTP database occupies Gigabytes (GB) of storage space, OLAP database occupies Terabytes (TB) of storage space.

14) What is DTM?

DTM transform data received from reader buffer and its moves transformation to transformation on row by row basis and it uses transformation caches when necessary.

15) What is meant by spatial data warehouse?

A data warehouse that manipulates spatial data, thus allowing spatial analysis. This is to be contrasted with conventional and temporal data warehouses.

16) What is a Batch?

Batches provide a way to group sessions for either serial or parallel execution by the Informatica Server.

17) What are the types of batch?

There are two types of batches are :

  • Sequential batch : Runs sessions one after the other.
  • Concurrent batch : Runs sessions at the same time.

18) What is Rolap?

Relational OLAP (ROLAP) servers store data in relational databases and support extensions to SQL and special access methods to efficiently implement the multidimensional data model and the related operations.

19) What is Molap?

Multidimensional OLAP (MOLAP) servers directly store multidimensional data in special data structures (for instance, arrays) and implement the OLAP operations over those data structures. While MOLAP systems offer less storage capacity than ROLAP systems, MOLAP systems provide better performance when multidimensional data is queried or aggregated.

20) What is Holap?

Hybrid OLAP (HOLAP) servers combine both technologies, benefiting from the storage capacity of ROLAP and the processing capabilities of MOLAP.

21) Describe Informatica Architecture?

Informatica consist of client and server. Client tools such as Repository manager, Designer, Server manager. Repository data base contains metadata it read by informatica server used read data from source, transforming and loading into target.

22) What is fact?

A central component of a multidimensional model that contains the measures to be analyzed. Facts are related to dimensions.

23) What are the types of dimensional table?

There are three types of dimensional table are :

  • Conformed dimensional table
  • Junk dimensional table
  • Degenerate dimensional model

24) What are the types of fact table?

There are three types of fact table are :

  • Additive fact
  • Semi additive fact
  • Non additive fact.

25) What are the types of data mart?

There are two types of data mart are :

  • Dependent data mart
  • Independent data mart

26) What is data source view?

Data source view (DSV) allows one to define the relational schema that will be used in the analysis services database. This schema is derived from the schemas of the various data sources. Cubes and dimensions are created from data source views rather than directly from data source objects.

27) What are the different threads in DTM process?

  • Master thread
  • Maping thread
  • Pre and post session threads
  • Reader thread
  • Writer thread
  • Transformation thread

28) What are the types of datawarehouse applications?

  • Info processing
  • Analytical processing
  • Data mining.

29) What is metadata?

Metadata is defined as the data about data. Metadata describes the entity and attributes description.

30) What are the benefits of Datawarehousing?

The implementation of a data warehouse can provide many benefits to an organization. A data warehouse can :

  • Facilitate integration in an environment characterized by un–integrated applications.
  • Integrate enterprise data across a variety of functions.
  • Integrate external as well as internal data.
  • Support strategic and long–term business planning.
  • Support day–to–day tactical decisions.
  • Enable insight into business trends and business opportunities.
  • Organize and store historical data needed for analysis.
  • Make available historical data, extending over many years, which enables trend analysis.
  • Provide more accurate and complete information.
  • Improve knowledge about the business.
  • Enable cost–effective decision making.
  • Enable organizations to understand their customers, and their needs, as well competitors.
  • Enhance customer service and satisfaction.
  • Provide competitive advantage.
  • Provide easy access for end–users.
  • Provide timely access to corporate information.

31) What is the difference between dimensional table and fact table?

A dimension table consists of tuples of attributes of the dimension. A fact table can be thought of as having tuples, one per a recorded fact. This fact contains some measured or observed variables and identifies them with pointers to dimension tables.

32) What is data mart?

A data mart can contain one fact table to address one subject. In such a case,when a number of data marts are integrated to create a data warehouse, it is important that the facts in each table mean the same thing. Such facts (i.e., measures or metrics) that have the same meaning in different data marts are called conformed facts.

33) What are the different types of datasmarts?

  • Stand–alone Data Marts :Data marts that do not interact with other data marts are called stand–alone data marts. On the other hand, data marts can be integrated to create a data warehouse.
  • Multi–source Data Mart : A data mart for which the input data is obtained from multiple sources is called a multi–source data mart.
  • Personal Data Mart :A data mart for use by individuals such as Chief Executive Officer (CEO), Chief Technology Officer (CTO) or Chief Financial Officer (CFO) is called Personal Data Mart.
  • Operational Data Store : ODS is a database system that obtains data from different sources, consolidates it and keeps it at a single location. However, it does not have the sophistication of a data mart or a data warehouse for analytical processing. ODS is generally developed as a pre-cursor for ERP systems.

34) What is fact table?

A fact table is the central table that contains the measures or facts of a business process.

35) What is the mapplet?

Mapplet is a set of transformations that you build in the mapplet designer and you can use in multiple mappings.

36) What is meant by grain?

Granularity of data is a very important factor in the design of fact table. In fact table, we can represent data at different atomic levels, called grains.

37) What is difference between view and materialized view?

Views contains query whenever execute views it has read from base table.
A view which is physically stored in a database. Materialized views allow query performance to be enhanced by precalculating costly operations.

38) What is surrogate key?

A system generated artificial primary key that is not derived from any data in the database. It is similar to the object identifier in an object oriented system.

39) What is a folder?

Folder contains repository objects such as sources, targets, mappings, transformation which are helps logically organize our data warehouse.

40) What is pivot?

The pivot (or rotate) operation rotates the axes of a cube to provide an alternative presentation of the data.

41) What is the difference between mapping and session?

Maping : It is a set of source and target definitions linked by transformation objects that define the rules for transformation.
Session : It is a set of instructions that describe how and when to move data from source to targets.

42) What is meant by ETL?

The overall data acquisition process, called ETL (extraction, transformation,and loading), is generally grouped into three main components :

  • Extraction : Involves obtaining the required data from the various sources.
  • Transformation :Source data undergoes a number of operations that prepare it for import into the data warehouse (target database). To perform this task, integration and transformation programs are used which can reformat, recalculate, modify structure and data elements, and add lime elements. They can also perform calculations, summarization, de-normal-ization, etc.
  • Loading : Involves physically placing extracted and transformed data in the target database. The initial loading involves a massive data import into the data warehouse. Subsequently, an extraction procedure periodically loads fresh data based on business rules and a pre–determined frequency.

43) What are the types of dimensional schema?

There are two types of dimensional schema :

  • Star schema
  • Snowflake schema

44) What is star schema?

Star schema, there is only one central fact table, and a set of dimension tables, one for each dimension. In star schema, each dimension is represented by only one table, and each table contains a set of attributes.

45) What is snowflake schema?

A snowflake schema avoids the redundancy of star schemas by normalizing the dimension tables. Therefore, a dimension is represented by several tables related by referential integrity constraints.

46) What is meant by starflake schema?

A starflake schema is a combination of the star and the snowflake schemas where some dimensions are normalized while others are not.

47) What is Operational Data Store?

Operational Data Store (ODS) is a hybrid data architecture to cover the requirements for both analytical and operational tasks.

48) What is the difference between star schema and snowflake schema?

The star schema consists of a fact table with a single table for each dimension. The snowflake schema is a variation on the star schema in which the dimensional tables from a star schema are organized into a hierarchy by normalizing them. A fact constellation is a set of fact tables that share some dimension tables.

49) What is data staging?

Data staging is the process of transferring the data from the data sources (operational systems) into the target database of the data warehouse.

50) What is a session?

A session is a set of instructions that describes how and when to move data from sources to targets.

51) What is a transformation?

A transformation is a repository object that generates, modifies, or passes data. The Designer provides a set of transformations that perform specific functions.

52) What are the types of transformations?

There are two types of transformations.

  • Active
  • Passive

53) What parameters can be tweaked to get better performance from a session?

DTM shared memory, Index cache memory, Data cache memory, by indexing, using persistent cache, increasing commit interval etc

54) What are the different types of transformations available in Informatica?

  • Aggregator
  • Application Source Qualifier
  • Custom
  • Expression
  • External Procedure
  • Filter
  • Input
  • Joiner
  • Lookup
  • Normalizer
  • Output
  • Rank
  • Router
  • Sequence Generator
  • Sorter
  • Source Qualifier
  • Stored Procedure
  • Transaction Control
  • Union
  • Update Strategy
  • XML Generator
  • XML Parser
  • XML Source Qualifier

55) What is a transformation language?

It is a language which is similar to SQL functions so, one can write expressions to modify the data or test the data.

56) Is Aggregator a passive/active transformation?

Active

57) What are the constants used in update strategy?

  • DD_INSERT
  • DD_UPDATE
  • DD_DELETE
  • DD_REJECT

58) What are the benefits of DWH?

  • Immediate information delivery
  • Data Integration from across, even outside the organization
  • Future vision of historical trends
  • Tools for looking at data in new ways
  • Enhanced customer service.

59) Explain informatica repository?

The Informatica repository is a relational database that stores information, or metadata, used by the Informatica Server and Client tools. Metadata can include information such as mappings describing how to transform source data, sessions indicating when you want the Informatica Server to perform the transformations, and connect strings for sources and targets.

60) What is power centre repository?

The Informatica repository is a relational database that stores information, or metadata, used by the Informatica Server and Client tools. Metadata can include information such as mappings describing how to transform source data, sessions indicating when you want the Informatica Server to perform the transformations, and connect strings for sources and targets.

61) What is power centre repository?

The Power center repository allows you to share metadata across repositories to create a data mart domain. In a data mart domain, you can create a single global repository to store metadata used across an enterprise, and a number of local repositories to share the global metadata as needed.

62) What are the types of Informaica client tools?

  • Designer
  • Server Manager
  • Repository Manager

63) What are the types of designer tools?

The Designer provides the following tools are :

  • Source Analyzer
  • Warehouse Designer
  • Transformation Developer
  • Mapplet Designer
  • Mapping Designer

64) What is Aggregator Transformation?

  • Aggregator transformation is an Active and Connected transformation.
  • The Aggregator transformation allows you to perform aggregate calculations, such as averages and sums.
  • The Aggregator transformation is unlike the Expression transformation, in that you can use the Aggregator transformation to perform calculations on groups.
  • The Expression transformation permits you to perform calculations on a row-by-row basis only.

65) What is filter transformation?

  • Filter transformation is an Active and Connected transformation.
  • The Filter transformation provides the means for filtering rows in a mapping. You pass all the rows from a source transformation through the Filter transformation, and then enter a filter condition for the transformation.

66) What is Joiner transformation?

Joiner Transformation is an Active and Connected transformation. This can be used to join two sources coming from two different locations or from same location. The Joiner transformation to join two sources with at least one matching port. The Joiner transformation uses a condition that matches one or more pairs of ports between the two sources.

67) What is clustering?

Clustering is the process of grouping the data into classes or clusters so that objects with in a cluster have high similarity in comparison to one another, but are very dissimilar to objects in other clusters.

68) What is difference between aggregator and expression?

Aggregator is active transformation and Expressionis passive transformation. Aggregator transformation used to perform aggregate calculation on group of records Where as expression used perform calculation with single record.

69) What are the types of cache?

  • Static cache
  • Dynamic cache
  • Persistent cache
  • Recache from lookup
  • Shared cache

70) What are the costly transformation in informatica?

  • L : Look up
  • A : Aggregator
  • R : Rank
  • J : Joiner

71) What are the transformation having cache concept?

  • Data Cache – 2GB
  • Index Cache – 1GB

72) How does the recovery mode work in informatica?

In case of load failure an entry is made in OPB_SERV_ENTRY(?) table from where the extent of loading can be determined.

73) What is a command that used to run a batch?

pmcmd is used to start a batch.

74) What are the main difference between Data Warehousing and Business Intelligence?

Data Warehousing : is a way of storing data and creating information through leveraging data marts. DM’s are segments or categories of information and/or data that are grouped together to provide ‘information’ into that segment or category. DW does not require BI to work. Reporting tools can generate reports from the DW.

Business Intelligence : is the leveraging of DW to help make business decisions and recommendations. Information and data rules engines are leveraged here to help make these decisions along with statistical analysis tools and data mining tools.

75) What are the advantages of Dimensional modelling?

  • Ease of use
  • High performance
  • Predictable,standard framework
  • Understandable
  • Extensible to accomodate unexpected new data elements and new design decisions

76) What transformations are used for variable port?

  • Expression Transformation
  • Aggregated transformation
  • Rank Transformation

77) What is the difference between OLTP and OLAP?

  • OLTP is nothing but OnLine Transaction Processingwhich contains a normalised tables. But OLAP Online Analtical Programming contains the history of OLTP data which is non-volatile acts as a Decisions Support System.
  • OLTP systems are for doing clerical / operational processing of data whereas OLAP systems are for carrying out analytical processing of data.
  • OLAP system contains the current data as well as the details of the transactions.
  • OLTP system contains historical data, and also data in summarized form.

78) What are the various aggregate calculations?

Aggregate functions are :

  • AVG
  • COUNT
  • FIRST
  • LAST
  • MAX
  • MEDIAN
  • MIN
  • PERCENTILE
  • STDDEV
  • SUM
  • VARIANCE

79) What are designer objects?

  • Source
  • Target
  • Transformation
  • Mapping
  • Mapplet

80) What are Expression transformation?

Expression transformation is a Passive and Connected transformation. This can be used to calculate values in a single row before writing to the target.

81) What are the types of joiner transformation?

Joiner transformation supports four types of joins at Informatica level are :

  • Normal join
  • Master Outer
  • Detail Outer
  • Full Outer

82) What is filter transformation?

Filter transformation is an Active and Connected transformation. This can be used to filter rows in a mapping that do not meet the condition.

83) What are the tools of workflow manager?

  • Task developer
  • Workflow designer
  • Worklet designer

84) What is router transformation?

Router transformation is an Active and Connected transformation. A Router transformation is similar to a Filter transformation because both transformations allow you to use a condition to test data. The only difference is, filter transformation drops the data that do not meet the condition whereas router has an option to capture the data that do not meet the condition. It is useful to test multiple conditions.

85) What is lookup transformation?

Lookup transformation is Passive and it can be both Connected and UnConnected as well. It is used to look up data in a relational table, view, or synonym. Lookup definition can be imported either from source or from target tables.

86) What is source qualifier transformation?

Source Qualifier transformation is an Active and Connected transformation. When adding a relational or a flat file source definition to a mapping, it is must to connect it to a Source Qualifier transformation. The Source Qualifier performs the various tasks such as overriding default SQL query, filtering records; join data from two or more tables etc.

87) what is update strategy transformation ?

Update strategy transformation is an active and connected transformation. It is used to update data in target table, either to maintain history of data or recent changes.

88) What is the functionality of Repository manager?

Repository manager is used to navigate through multiple folders and perform the basic repository tasks.

89) What is normaliser transformation?

Normaliser Transformation is an Active and Connected transformation. It is used mainly with COBOL sources where most of the time data is stored in renormalized format. Also, Normaliser transformation can be used to create multiple rows from a single row of data.

90) What is rank transformation?

Rank transformation is an Active and Connected transformation. It is used to select the top or bottom rank of data.

91) What is sorter transformation?

Sorter transformation is a Connected and an Active transformation. It allows to sort data either in ascending or descending order according to a specified field.

92) what is stored procedure transformation?

Stored Procedure transformation is an Passive & Connected or Unconnected transformation. It is useful to automate time-consuming tasks and it is also used in error handling, to drop and recreate indexes and to determine the space in database, a specialized calculation.

93) What is the difference between lookup and fact tables?

A lookup table contains information about the entities. In general the Dimension and details objects are derived from lookup tables.
A fact table contains the statistical information about transactions.

94) What is the functionality of Repository server administration console?

Repository server administration console is used to create and administer the repository through the repository server.

95) What is the difference between OLTP and ODS?

  • OLTP is online transaction processing systems and ODS os operational database system. In OLTP we can save the current data, it depends on the day to day transactions and it stores the day to day data.
  • In ODS we can store data for a month also and it is not restricted to a specific day or transaction.

96) What is sequence generator transformation?

Sequence Generator transformation is a Connected and an Passive transformation. The Sequence Generator transformation generates numeric values. You can use the Sequence Generator to create unique primary key values, replace missing primary keys, or cycle through a sequential range of numbers.

97) what is SCD?

SCD means Slowly Changing Dimension. If the values of attributes in a dimension table change over a period of time, then these dimensions are called slowly changing dimension.

98) What are the types of SCD?

  • Type 1 : In the dimensional table, the new data replaces the old data. In other words, the historical data is not preserved.
  • Type 2 : New records are added to the dimension table. The old data is retained and the new records contain the new data.
  • Type 3 : New fields are added to the dimension table so that the table can hold both old values and new values in the same record.

 

MSBI Interview Questions

Top most important MSBI interview questions and answers by Experts:

Here is a list of Top most important MSBI interview questions and answers by Experts.If you want to download MSBI interview questions pdf free ,you can register with RVH techguru. Our experts prepared these MSBI interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in MSBI ,Register for MSBI online training here.
1.What do we mean by dataflow in SSIS?
Data flow is nothing but the flow of data from the corresponding sources to the referred destinations. In this process, the data transformations make changes to the data to make it ready for the data warehouse.
2•What is a breakpoint in SSIS? How is it setup? How do you disable it?
A breakpoint is a stopping point in the code. The breakpoint can give the Developer\DBA an
opportunity to review the status of the data, variables and the overall status of the SSIS package.
10 unique conditions exist for each breakpoint.
Breakpoints are setup in BIDS. In BIDS, navigate to the control flow interface. Right click on the
object where you want to set the breakpoint and select the ‘Edit Breakpoints…’ option.
3•Can you name 5 or more of the native SSIS connection managers?
1) OLEDB connection – Used to connect to any data source requiring an OLEDB connection (i.e.,
SQL Server 2000)
2) Flat file connection – Used to make a connection to a single file in the File System. Required for reading information from a File System flat file
3) ADO.Net connection – Uses the .Net Provider to make a connection to SQL Server 2005 or other
connection exposed through managed code (like C#) in a custom task
4) Analysis Services connection – Used to make a connection to an Analysis Services database or project. Required for the Analysis Services DDL Task and Analysis Services Processing Task
5) File connection – Used to reference a file or folder. The options are to either use or create a file or folder
6) Excel
4• What is the use of Bulk Insert Task in SSIS?
Bulk Insert Task is used to upload large amount of data from flat files into Sql Server. It supports only OLE DB connections for destination database.
5• What is Conditional Split transformation in SSIS?
This is just like IF condition which checks for the given condition and based on the condition evaluation, the output will be sent to the appropriate OUTPUT path. It has ONE input and MANY outputs. Conditional Split transformation is used to send paths to different outputs based on some conditions. For example, we can organize the transform for the students in a class who have marks greater than 40 to one path and the students who score less than 40 to another path.
6• How do you eliminate quotes from being uploaded from a flat file to SQL Server?
This can be done using TEXT QUALIFIER property. In the SSIS package on the Flat File Connection Manager Editor, enter quotes into the Text qualifier field then preview the data to ensure the quotes are not included.
7• Can you explain how to setup a checkpoint file in SSIS?
The following items need to be configured on the properties tab for SSIS package:
CheckpointFileName – Specify the full path to the Checkpoint file that the package uses to save the value of package variables and log completed tasks. Rather than using a hard-coded path as shown above, it’s a good idea to use an expression that concatenates a path defined in a package variable and the package name.
CheckpointUsage – Determines if/how checkpoints are used. Choose from these options: Never(default), IfExists, or Always. Never indicates that you are not using Checkpoints. IfExists is the typical setting and implements the restart at the point of failure behavior. If a Checkpoint file is found it is used to restore package variable values and restart at the point of failure. If a Checkpoint file is not found the package starts execution with the first task. The Always choice raises an error if the Checkpoint file does not exist.
SaveCheckpoints – Choose from these options: True or False (default). You must select True to implement the Checkpoint behavior.
8• What are the different values you can set for CheckpointUsage property ?
There are three values, which describe how a checkpoint file is used during package execution:
1) Never: The package will not use a checkpoint file and therefore will never restart.
2) If Exists: If a checkpoint file exists in the place you specified for the CheckpointFilename property, then it will be used, and the package will restart according to the checkpoints written.
3) Always: The package will always use a checkpoint file to restart, and if one does not exist, the package will fail.
9• What is the ONLY Property you need to set on TASKS in order to configure CHECKPOINTS to RESTART package from failure?
The one property you have to set on the task is FailPackageOnFailure. This must be set for each task or container that you want to be the point for a checkpoint and restart. If you do not set this property to true and the task fails, no file will be written, and the next time you invoke the package, it will start from the beginning again.
10• Where can we set the CHECKPOINTS, in DataFlow or ControlFlow ?
Checkpoints only happen at the Control Flow; it is not possible to checkpoint transformations or restart inside a Data Flow. The Data Flow Task can be a checkpoint, but it is treated as any other task.
11• Can you explain different options for dynamic configurations in SSIS?
1) XML file
2) custom variables
3) Database per environment with the variables
4) Use a centralized database with all variables
12• What is the use of Percentage Sampling transformation in SSIS?
Percentage Sampling transformation is generally used for data mining. This transformation builds a random sample of set of output rows by choosing specified percentage of input rows. For example if the input has 1000 rows and if I specify 10 as percentage sample then the transformation returns 10% of the RANDOM records from the input data.
13• What is the use of Term Extraction transformation in SSIS?
Term Extraction transformation is used to extract nouns or noun phrases or both noun and noun phrases only from English text. It extracts terms from text in a transformation input column and then writes the terms to a transformation output column. It can be also used to find out the content of a dataset.
14• What is Data Viewer and what are the different types of Data Viewers in SSIS?
A Data Viewer allows viewing data at a point of time at runtime. If data viewer is placed before and after the Aggregate transform, we can see data flowing to the transformation at the runtime and how it looks like after the transformation occurred. The different types of data viewers are:
1. Grid
2. Histogram
3. Scatter Plot
4. Column Chart.
15• What is Ignore Failure option in SSIS?
In Ignore Failure option, the error will be ignored and the data row will be directed to continue on the next transformation. Let’s say you have some JUNK data(wrong type of data or JUNK data) flowing from source, then using this option in SSIS we can REDIRECT the junk data records to another transformation instead of FAILING the package. This helps to MOVE only valid data to destination and JUNK can be captured into separate file.
16• Which are the different types of Control Flow components in SSIS?
The different types of Control Flow components are: Data Flow Tasks, SQL Server Tasks, Data Preparation Tasks, Work flow Tasks, Scripting Tasks, Analysis Services Tasks, Maintenance Tasks, Containers.
17• What are containers? What are the different types of containers in SSIS?
Containers are objects that provide structures to packages and extra functionality to tasks. There are four types of containers in SSIS, they are: Foreach Loop Container, For Loop Container, Sequence Container and Task Host Container.
18• What are the different types of Data flow components in SSIS?
There are 3 data flow components in SSIS.
1. Sources
2. Transformations
3. Destinations
19• What are the different types of data sources available in SSIS?
There are 7 types of data sources provided by SSIS: a.) Data Reader source b.) Excel source c.) Flat file source d.) OLEDB source e.) Raw file source f.) XML source g.) Script component
20• What is SSIS Designer?
It is a graphical tool for creating packages. It has 4 tabs: Control Flow, Data Flow, Event Handlers and Package Explorer.
21• What is Control Flow tab?
It is the tab in SSIS designer where various Tasks can be arranged and configured. This is the tab where we provide and control the program flow of the project.
22• What is Data Flow tab?
This is the tab where we do all the work related to ETL job. It is the tab in SSIS Designer where we can extract data from sources, transform the data and then load them into destinations.
23• What is the function of control flow tab in SSIS?
On the control flow tab, the tasks including dataflow task, containers and precedence constraints that connect containers and tasks can be arranged and configured.
24• What is the function of Event handlers tab in SSIS?
On the Event handlers tab, workflows can be configured to respond to package events.
For example, we can configure Work Flow when ANY task Failes or Stops or Starts ..
25• What is the function of Package explorer tab in SSIS?
This tab provides an explorer view of the package. You can see what is happening in the package. The Package is a container at the top of the hierarchy.
26• What is Solution Explorer?
It is a place in SSIS Designer where all the projects, Data Sources, Data Source Views and other miscellaneous files can be viewed and accessed for modification.
27• How do we convert data type in SSIS?
The Data Conversion Transformation in SSIS converts the data type of an input column to a different data type.
28• How are variables useful in ssis package?
Variables can provide communication among objects in the package. Variables can provide communication between parent and child packages. Variables can also be used in expressions and scripts. This helps in providing dynamic values to tasks.
29• Explain Aggregate Transformation in SSIS?
It aggregates data, similar you do in applying TSQL functions like Group By, Min, Max, Avg, and Count. For example you get total quantity and Total line item for each product in Aggregate Transformation Editor. First you determine input columns, then output column name in Output Alias table in datagrid, and also operations for each Output Alias in Operation columns of the same datagrid. Some of operation functions listed below :
• Group By
• Average
• Count
• Count Distinct : count distinct and non null column value
• Min, Max, Sum
In Advanced tab, you can do some optimization here, such as setting up Key Scale option (low, medium, high), Count Distinct scale option (low, medium, high), Auto Extend factor and Warn On Division By Zero. If you check Warn On Division By Zero, the component will give warning instead of error. Key Scale option will optimize transformation cache to certain number of key threshold. If you set it low, optimization will target to 500,000 keys written to cache, medium can handle up to 5 million keys, and high can handle up to 25 million keys, or you can specify particular number of keys here. Default value is unspecified. Similar to number of keys for Count Distinct scale option. It is used to optimize number of distinct value written to memory, default value is unspecified. Auto Extend Factor is used when you want some portion of memory is used for this component. Default value is 25% of memory.
30• Explain Audit Transformation ?
It allows you to add auditing information as required in auditing world specified by HIPPA and Sarbanes-Oxley (SOX). Auditing options that you can add to transformed data through this transformation are :
1. Execution of Instance GUID : ID of execution instance of the package
2. PackageID : ID of the package
3. PackageName
4. VersionID : GUID version of the package
5. Execution StartTime
6. MachineName
7. UserName
8. TaskName
9. TaskID : uniqueidentifier type of the data flow task that contains audit transformation.
31• Explain Character Map Transformation?
It transforms some character. It gives options whether output result will override the existing column or add to new column. If you define it as new column, specify new column name. Operations available here are:
1. Uppercase
2. Lowercase
3. Byte reversal : such as from 0×1234 to 0×4321
4. Full width
5. Half width
6. Hiragana/katakana/traditional Chinese/simplified Chinese
7. Linguistic casing
32• Explain Conditional split Transformation ?
It functions as if…then…else construct. It enables send input data to a satisfied conditional branch. For example you want to split product quantity between less than 500 and greater or equal to 500. You can give the conditional a name that easily identifies its purpose. Else section will be covered in Default Output Column name.
After you configure the component, it connect to subsequent transformation/destination, when connected, it pops up dialog box to let you choose which conditional options will apply to the destination transformation/destination.
33• Explain Copy column Transformation?
This component simply copies a column to another new column. Just like ALIAS Column in T-Sql.
34• Explain Data conversion Transformation?
This component does conversion data type, similar to TSQL function CAST or CONVERT. If you wish to convery the data from one type to another then this is the best bet. But please make sure that you have COMPATABLE data in the column.
35• Explain Data Mining query Transformation?
This component does prediction on the data or fills gap on it. Some good scenarios uses this component is:
1. Take some input columns as number of children, domestic income, and marital income to predict whether someone owns a house or not.
2. Take prediction what a customer would buy based analysis buying pattern on their shopping cart.
3. Filling blank data or default values when customer doesn’t fill some items in the questionnaire.
36• Explain Derived column Transformation?
Derived column creates new column or put manipulation of several columns into new column. You can directly copy existing or create a new column using more than one column also.
37• Explain Merge Transformation?
Merge transformation merges two paths into single path. It is useful when you want to break out data into path that handles errors after the errors are handled, the data are merge back into downstream or you want to merge 2 data sources. It is similar with Union All transformation, but Merge has some restrictions :
1. Data should be in sorted order
2. Data type , data length and other meta data attribute must be similar before merged.
38• Explain Merge Join Transformation?
Merge Join transformation will merge output from 2 inputs and doing INNER or OUTER join on the data. But if you the data come from 1 OLEDB data source, it is better you join through SQL query rather than using Merge Join transformation. Merge Join is intended to join 2 different data source.
39• Explain Multicast Transformation?
This transformation sends output to multiple output paths with no conditional as Conditional Split does. Takes ONE Input and makes the COPY of data and passes the same data through many outputs. In simple Give one input and take many outputs of the same data.
40• Explain Percentage and row sampling Transformations?
This transformation will take data from source and randomly sampling data. It gives you 2 outputs. First is selected data and second one is unselected data. It is used in situation where you train data mining model. These two are used to take the SAMPLE of data from the input data.
41• Explain Sort Transformation?
This component will sort data, similar in TSQL command ORDER BY. Some transformations need sorted data.
42• Explain Union all Transformation?
It works in opposite way to Merge transformation. It can take output from more than 2 input paths and combines into single output path.
43• What r the possible locations to save SSIS package?
You can save a package wherever you want.
SQL Server
Package Store
File System
44• What is a package?
A discrete executable unit of work composed of a collection of control flow and other objects, including data sources, transformations, process sequence, and rules, errors and event handling, and data destinations.
45• What is a workflow in SSIS?
A workflow is a set of instructions on how to execute tasks.
(It is a set of instructions on how to execute tasks such as sessions, emails and shell commands. a workflow is created form work flow mgr.
46• What is the diff between control flow Items and data flow Items?
The control flow is the highest level control process. It allows you to manage the run-time process activities of data flow and other processes within a package.
When we want to extract, transform and load data within a package. You add an SSIS dataflow task to the package control flow.
47• What are the main component of SSIS(project-architecture)?
SSIS archItecture has 4 main components
1.ssis service
2.ssis runtime engine & runtime executables
3.ssis dataflow engine & dataflow components
4.ssis clients
48• Different components in SSIS package?
Control flow
Data flow
Event handler
Package explorer
49• What are Connection Managers?
It is a bridge b/w package object and physical data. It provides logical representation of a connection at design time the properties of the connection mgr describes the physical connection that integration services creates when the package is run.
50• What is environment variable in SSIS?
An environment variable configuration sets a package property equal to the value in an environment variable.
Environmental configurations are useful for configuring properties that are dependent on the computer that is executing the package.
51• How to provide securIty to packages?
We can provide security in two ways
1. Package encryption
2. Password protection.
52• What are Precedence constraints?
Constraints that link executable, container, and tasks wIthin the package control flow and specify condItion that determine the sequence and condItions for determine whether executable run.
53• What is Design time Deployment in SSIS ?
When you run a package from with in BIDS,it is built and temporarily deployed to the folder. By default the package will be deployed to the BIN folder in the Package’s Project folder and you can configure for custom folder for deployment. When the Package’s execution is completed and stopped in BIDS,the deployed package will be deleted and this is called as Design Time Deployment.

54. Explain architecture of SSIS?
SSIS architecture consists of four key parts:
a) Integration Services service: monitors running Integration Services packages and manages the storage of packages.
b) Integration Services object model: includes managed API for accessing Integration Services tools, command-line utilities, and custom applications.
c) Integration Services runtime and run-time executables: it saves the layout of packages, runs packages, and provides support for logging, breakpoints, configuration, connections, and transactions. The Integration Services run-time executables are the package, containers, tasks, and event handlers that Integration Services includes, and custom tasks.
d) Data flow engine: provides the in-memory buffers that move data from source to destination.
55.How would you do Logging in SSIS?
Logging Configuration provides an inbuilt feature which can log the detail of various events like onError, onWarning etc to the various options say a flat file, SqlServer table, XML or SQL Profiler.

56. How would you do Error Handling?
A SSIS package could mainly have two types of errors
a) Procedure Error: Can be handled in Control flow through the precedence control and redirecting the execution flow.
b) Data Error: is handled in DATA FLOW TASK buy redirecting the data flow using Error Output of a component.

57. How to pass property value at Run time? How do you implement Package Configuration?
A property value like connection string for a Connection Manager can be passed to the pkg using package configurations.Package Configuration provides different options like XML File, Environment Variables, SQL Server Table, Registry Value or Parent package variable.

58. How would you deploy a SSIS Package on production?
A) Through Manifest
1. Create deployment utility by setting its propery as true .
2. It will be created in the bin folder of the solution as soon as package is build.
3. Copy all the files in the utility and use manifest file to deply it on the Prod.
B) Using DtsExec.exe utility
C)Import Package directly in MSDB from SSMS by logging in Integration Services.

59. Difference between DTS and SSIS?
Every thing except both are product of Microsoft.

60. What is Execution Tree?

Execution trees demonstrate how package uses buffers and threads. At run time, the data flow engine breaks down Data Flow task operations into execution trees. These execution trees specify how buffers and threads are allocated in the package. Each tree creates a new buffer and may execute on a different thread. When a new buffer is created such as when a partially blocking or blocking transformation is added to the pipeline, additional memory is required to handle the data transformation and each new tree may also give you an additional worker thread.

61. Difference between Unionall and Merge Join?

a) Merge transformation can accept only two inputs whereas Union all can take more than two inputs

b) Data has to be sorted before Merge Transformation whereas Union all doesn’t have any condition like that.

62. May get question regarding what X transformation do?

Lookup, fuzzy lookup, fuzzy grouping transformation are my favorites.
For you.

63.How would you restart package from previous failure point?What are Checkpoints and how can we implement in SSIS?
When a package is configured to use checkpoints, information about package execution is written to a checkpoint file. When the failed package is rerun, the checkpoint file is used to restart the package from the point of failure. If the package runs successfully, the checkpoint file is deleted, and then re-created the next time that the package is run.

64. Where are SSIS package stored in the SQL Server?
MSDB.sysdtspackages90 stores the actual content and ssydtscategories, sysdtslog90, sysdtspackagefolders90, sysdtspackagelog, sysdtssteplog, and sysdtstasklog do the supporting roles.

65.How would you schedule a SSIS packages?
Using SQL Server Agent. Read about Scheduling a job on Sql server Agent

66. Difference between asynchronous and synchronous transformations?
Asynchronous transformation have different Input and Output buffers and it is up to the component designer in an Async component to provide a column structure to the output buffer and hook up the data from the input.

67. How to achieve parallelism in SSIS?
Parallelism is achieved using MaxConcurrentExecutable property of the package. Its default is -1 and is calculated as number of processors + 2.

-More questions added-Sept 2011
68. How do you do incremental load?
Fastest way to do incremental load is by using Timestamp column in source table and then storing last ETL timestamp, In ETL process pick all the rows having Timestamp greater than the stored Timestamp so as to pick only new and updated records

69. How to handle Late Arriving Dimension or Early Arriving Facts.

Late arriving dimensions sometime get unavoidable ‘coz delay or error in Dimension ETL or may be due to logic of ETL. To handle Late Arriving facts, we can create dummy Dimension with natural/business key and keep rest of the attributes as null or default. And as soon as Actual dimension arrives, the dummy dimension is updated with Type 1 change. These are also known as Inferred Dimensions.

70. WHAT is SQL Server Reporting Services(SSRS)?
SQL Server Reporting Services is a server-based reporting platform that you can use to create and manage tabular, matrix, graphical, and free-form reports that contain data from relational and multidimensional data sources. The reports that you create can be viewed and managed over a World Wide Web-based connection
71. What are the three stages of Enterprise Reporting Life Cycle ?
a. Authoring
b. Management
c. Access and Delivery

72. What are the components included in SSRS?
1. A Complete set of Tools that can be used to create, manage and view reports
2. A Report Server component that hosts and processes reports in a variety of formats. Output formats include HTML, PDF, TIFF, Excel, CSV, and more.
3.An API that allows developers to integrate or extend data and report processing in custom applications, or create custom tools to build and manage reports.

73. What is the benefit of using embedded code in a report?
1. Reuseability of Code: function created in embedded code to perform a logic can be then used in multiple expressions
2. Centralized code: helps in better manageability of code.
74. Which programming language can be used to code embedded functions in SSRS?
Visual Basic .NET Code.

75. Important terms used in the reporting services?

1. Report definition: The blueprint for a report before the report is processed or rendered. A report definition contains information about the query and layout for the report.

2. Report snapshot: A report that contains data captured at a specific point in time. A report snapshot is actually a report definition that contains a dataset instead of query instructions.

3. Rendered report: A fully processed report that contains both data and layout information, in a format suitable for viewing (such as HTML).

4. Parameterized report: A published report that accepts input values through parameters.

5. Shared data source: A predefined, standalone item that contains data source connection information.

6. Shared schedule: A predefined, standalone item that contains schedule information.

7. Report-specific data source: Data source information that is defined within a report definition.

8. Report model: A semantic description of business data, used for ac hoc reports created in Report Builder.

9. Linked report: A report that derives its definition through a link to another report.

10. Report server administrator: This term is used in the documentation to describe a user with elevated privileges who can access all settings and content of a report server. If you are using the default roles, a report server administrator is typically a user who is assigned to both the Content Manager role and the System Administrator role. Local administrators can have elevated permission even if role assignments are not defined for them.

11. Folder hierarchy: A bounded namespace that uniquely identifies all reports, folders, report models, shared data source items, and resources that are stored in and managed by a report server.
12. Report Server: Describes the Report Server component, which provides data and report processing, and report delivery. The Report Server component includes several subcomponents that perform specific functions.

13. Report Manager: Describes the Web application tool used to access and manage the contents of a report server database.

14. Report Builder: Report authoring tool used to create ad hoc reports.

15. Report Designer: Report creation tool included with Reporting Services.

16. Model Designer: Report model creation tool used to build models for ad hoc reporting.

17. Report Server Command Prompt Utilities: Command line utilities that you can use to administer a report server.
a) RsConfig.exe, b) RsKeymgmt.exe, c) Rs.exe

76. what are the Command Line Utilities available In Reporting Services?
• Rsconfig Utility (Rsconfig.exe): encrypts and stores connection and account values in the RSReportServer.config file. Encrypted values include report server database connection information and account values used for unattended report processing
• RsKeymgmt Utility: Extracts, restores, creates, and deletes the symmetric key used to protect sensitive report server data against unauthorized access
• RS Utility: this utility is mainly used to automate report server deployment and administration tasks.Processes script you provide in an input file.

77. What is difference between Tablular and Matrix report?

Tablular report: A tabular report is the most basic type of report. Each column corresponds to a column selected from the database.

Matrix report: A matrix (cross-product) report is a cross-tabulation of four groups of data:
a. One group of data is displayed across the page.
b. One group of data is displayed down the page.
c. One group of data is the cross-product, which determines all possible locations where the across and down data relate and places a cell in those locations.
d. One group of data is displayed as the “filler” of the cells.
Martix reports can be considered more of a Pivot table.

78. How to create Drill-through reports?
Using Navigation property of a cell and setting child report and its parameters in it.

79. How to create Drill-Down reports?
To cut the story short:
– By grouping data on required fields
-Then toggle visibility based on the grouped filed

81. What is Query parameter in SSRS?
Query parameters is mentioned in the query of the datasources that are to be included into the SQL script’s WHERE clause of the SQL that can accept parameters. Query parameters begin with the symbol @.The name should not contain spaces and can not begin with numeral. For clarity, we use only letters.
82. What are the Reporting Service Components in SSRS?
Report Designer: A place where we can create report. Report Server: Provides services for implementation and delivery of reports. Report Manager: A Web-based administration tool for managing the Report Server.
83. What is a matrix in SSRS?
 A matrix is a data region linked to a report set. Matrix allows us to create crosstab reports with the report variables displaying on rows and columns. It allows us to drag and drop fields into it.
84. What are sub reports and how to create them?
A sub report is like any other reports which can be called in main report and can be generate through main report. Parameters can be passed from main report to sub report and basis of that report can be generated.
85. What is the report model project?
Report model project is for creating Adhoc reporting. You can create the adhoc reports through report builder. Report model project can be created on bids or report server. This model can have simple view. And using
86. What is report server project?
Report Server Project contains the RDL file and it need to be deployed on report server to view the report files to application and user. It a solution where we design our reports. You can add it by going into BIDS clicking on new item and then selecting reports server project. Once the solution is created you can start creating reports.
87. What is the report builder?
Report builder is used to create small reports and it a define interface. You can’t change the report interface in report builder it pre designed. You can just drag columns in the report. Report builder creates reports on database objects available with report model project.
88.In which SQL Server version report builder introduced?
Report builder introduced in SQL Server 2005. While creating or deploying report model project on report server you can get error or it might not get created. For this you need to check whether the service pack 22 is installed or not.

89. How to deploy the Report?
Report can be deployed in three ways.
1. Using visual studio: In visual studio you can directly deploy the report through solution explorer by providing the report server URL in project properties at Target Server URL. This will deploy entire project or single report as per you selection.
2. Using report server: Can directly go to the report server and deploy the report by browsing the report from the disk location on server.
3. Creating the utility: SQL server provides the utility using that which can be used to create a customize utility for your report deployment in bulk.
90. What is RS.exe utility?
Rs.exe utility is used for deploying the report on report server. It comes with the report server and can be customize accordingly.
91. What is the name of reporting services config file and what’s it’s used for?
Reporting service config file is used for report configuration details. It contains the report format and also the report import types. Report service config reside at ISS.
92.What are the three different part of RDL file explain them?
In visual studio RDL files has three parts.
1. Data: It contains the dataset on which we write the query. Data set is connected with data source.
2. Design: In design you can design report. Can create tables and matrix reports. Drag columns values from source.
3. Preview: to check the preview after the report run.
93. Which language rdl files made of?
RDL files are written in XML.
94.What is the chart in report?
 Chart reports are for graphical representation. You can get pie charts columns harts and various other options. 3d charts are also available in reporting services.
95. What is Data Set in report?
Data set are the set of data which we want to show in report. Data creates on data source. Data source is the source of data from where we are getting this data i.e. database server and database name connection string.
96. What are the different types of data sources in SSRS?
SSRS use different data source. Some of them are listed below.
1. Microsoft SQL Server
2. OLEDB
3. Oracle
4. ODBC
5. SQL Server Analysis Service
6. Report Server Model
7. SAP Net weaver BI
8. Hyperion
9. Teradata
10. XML
97. What is the web service used for reporting services?
Reporting Service Web Service used in SSRS. By accessing this web service you can access all report server component and also get the report deployed on report server.
98. How to add the custom code in Report?
To add the custom codes in report go to report tab on top then properties and there you will find the options for custom code.
99. What is a cache in SSRS?
Report server can lay up a copy of processed report in a memory and return the copy when a user opens the report. This server memory is known as cache and the process is called caching.

 

 

Ab Initio Interview Questions

Top most important Ab Initio interview questions and answers by Experts:

Here is a list of Top most important Ab Initio interview questions and answers by Experts.If you want to download Ab Initio interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Ab Initio interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Ab Initio ,Register for Ab Initio online training here.

 

1. What does dependency analysis mean in Ab Initio?

Dependency analysis will answer the questions regarding datalinage.That is where does the data come from,what applications prodeuce and depend on this data etc.

We can retrieve the maximum (surrogate key) from the existing data,the by using scan or next_in_sequence/reformat we can generate further sequence for new records.

2. When using multiple DML statements to perform a single unit of work, is it preferable to use implicit or explicit transactions, and why?

Because implicit is using for internal processing and explicit is using for user open data requied.
3. Explain what is the architecture of Abinitio?
Architecture of Abinitio includes

GDE (Graphical Development Environment)
Co-operating System
Enterprise meta-environment (EME)
Conduct-IT

4. What is MAX CORE of a component?
MAX CORE is the space consumed by a component that is used for calculations
Each component has different MAX COREs
Component performances will be influenced by the MAX CORE’s contribution
The process may slow down / fasten if a wrong MAX CORE is set

5. Explain what is de-partition in Abinitio?
De-partition is done in order to read data from multiple flow or operations and are used to re-join data records from different flows. There are several de-partition components available which includes Gather, Merge, Interleave, and Concatenation.

6. How do you add default rules in transformer?
The following is the process to add default rules in transformer

Double click on the transform parameter in the parameter tab page in component properties
Click on Edit menu in Transform editor
Select Add Default Rules from the dropdown list box.
It shows Match Names and Wildcard options. Select either of them.

7. Mention what is the role of Co-operating system in Abinitio?
The Abinitio co-operating system provide features like Manage and run Abinitio graph and control the ETL processes
Provide Abinitio extensions to the operating system
ETL processes monitoring and debugging
Meta-data management and interaction with the EME

8. Describe the Grant/Revoke DDL facility and how it is implemented?

Basically,This is a part of D.B.A responsibilities GRANT means permissions for example GRANT CREATE TABLE ,CREATE VIEW AND MANY MORE .

REVOKE means cancel the grant (permissions).So,Grant or Revoke both commands depend upon D.B.A.

9. State the first_defined function with an example.
This function is similar to the function NVL() in Oracle database
It performs the first values which are not null among other values available in the function and assigns to the variable
Example: A set of variables, say v1,v2,v3,v4,v5,v6 are assigned with NULL.
Another variable num is assigned with value 340 (num=340)
num = first_defined(NULL, v1,v2,v3,v4,v5,v6,NUM)
The result of num is 340

10.Explain what is SANDBOX?
A SANDBOX is referred for the collection of graphs and related files that are saved in a single directory tree and behaves as a group for the purposes of navigation, version control, and migration.

11. How to run a graph infinitely?
To run a graph infinitely…The .ksh graph file should be called by the end script in the graph.
If the graph name is abc.mp then the graph should call the abc.ksh file.

12. Explain what does dependency analysis mean in Abinitio?
In Abinitio, dependency analysis is a process through which the EME examines a project entirely and traces how data is transferred and transformed- from component-to-component, field-by-field, within and between graphs.

13. Explain PDL with an example?
To make a graph behave dynamically, PDL is used
Suppose there is a need to have a dynamic field that is to be added to a predefined DML while executing the graph
Then a graph level parameter can be defined
Utilize this parameter while embedding the DML in output port.
For Example : define a parameter named myfield with a value “string(“ | “”) name;”
Use ${mystring} at the time of embedding the dml in out port.
Use $substitution as an interpretation option

14. Describe the elements you would review to ensure multiple scheduled batch jobs do not collide with each other?

Because every job depend upon another job for example if you first job result is successfull then another job will execute otherwise your job doesn’t work.
15. What is a local lookup?
• Local lookup file has records which can be placed in main memory
• They use transform function for retrieving records much faster than retrieving from the disk.
16. Mention how can you connect EME to Abinitio Server?
To connect with Abinitio Server, there are several ways like
• Set AB_AIR_ROOT
• Login to EME web interface- http://serverhost:[serverport]/abinitio
• Through GDE, you can connect to EME data-store
• Through air-command

17.Describe the Evaluation of Parameters order.
Following is the order of evaluation:
• Host setup script will be executed first
• All Common parameters, that is, included , are evaluated
• All Sandbox parameters are evaluated
• The project script – project-start.ksh is executed
• All form parameters are evaluated
• Graph parameters are evaluated
• The Start Script of graph is executed

18. Explain what is Sort Component in Abinitio?
The Sort Component in Abinitio re-orders the data. It comprises of two parameters “Key” and “Max-core”.
• Key: It is one of the parameters for sort component which determines the collation order
• Max-core: This parameter controls how often the sort component dumps data from memory to disk
19. Describe the process steps you would perform when defragmenting a data table. This table contains mission critical data?

There are several ways to do this:

1) We can move the table in the same or other tablespace and rebuild all the indexes on the table.

alter table <table_name> move <tablespace_name> this activity reclaims the defragmented space in the table

analyze table table_name compute statistics to capture the updated statistics.

2)Reorg could be done by taking a dump of the table, truncate the table and import the dump back into the table.
20. What is a ramp limit?
• A limit is an integer parameter which represents a number of reject events
• Ramp parameter contain a real number representing a rate of reject events of certain processed records
• The formula is – No. of bad records allowed = limit + no. of records x ramp
• A ramp is a percentage value from 0 to 1.
• These two provides the threshold value of bad records.

21. Mention what information does a .dbc file extension provides to connect to the database?
The .dbc extension provides the GDE with the information to connect with the database are
• Name and version number of the data-base to which you want to connect
• Name of the computer on which the data-base instance or server to which you want to connect runs, or on which the database remote access software is installed
• Name of the server, database instance or provider to which you want to link

22. Explain the methods to improve performance of a graph?
The following are the ways to improve the performance of a graph :
• Make sure that a limited number of components are used in a particular phase
• Implement the usage of optimum value of max core values for the purpose of sorting and joining components.
• Utilize the minimum number of sort components
• Utilize the minimum number of sorted join components and replace them by in-memory join / hash join, if needed and possible
• Restrict only the needed fields in sort, reformat, join components
• Utilize phasing or flow buffers when merged or sorted joins
• Use sorted join, when two inputs are huge, otherwise use hash join

23. How can you force the optimizer to use a particular index?

Use hints /*+ <hint> */, these acts as directives to the optimizer

24. Have you used rollup component? Describe how?

If the user wants to group the records on particular field values then rollup is best way to do that. Rollup is a multi-stage transform function and it contains the following mandatory functions.
1. initialise
2. rollup
3. finalise
Also need to declare one temporary variable if you want to get counts of a particular group.

For each of the group, first it does call the initialise function once, followed by rollup function calls for each of the records in the group and finally calls the finalise function once at the end of last rollup call.

25. We know rollup component in Abinitio is used to summarize group of data record then why do we use aggregation?
• Aggregation and Rollup, both are used to summarize the data.
• Rollup is much better and convenient to use.
• Rollup can perform some additional functionality, like input filtering and output filtering of records.
• Aggregate does not display the intermediate results in main memory, where as Rollup can.
• Analyzing a particular summarization is much simpler compared to Aggregations.

26. Mention what is Abinitio?
“Abinitio” is a latin word meaning “from the beginning.” Abinitio is a tool used to extract, transform and load data. It is also used for data analysis, data manipulation, batch processing, and graphical user interface based parallel processing.

27. What are the operations that support avoiding duplicate record?
Duplicate records can be avoided by using the following:
• Using Dedup sort
• Performing aggregation
• Utilizing the Rollup component

28. Mention what is Rollup Component?
Roll-up component enables the users to group the records on certain field values. It is a multiple stage function and consists initialize 2 and Rollup 3.

29. What kind of layouts does Abinitio support?
• Abinitio supports serial and parallel layouts.
• A graph layout supports both serial and parallel layouts at a time.
• The parallel layout depends on the degree of the data parallelism
• A multi-file system is a 4-way parallel system
• A component in a graph system can run 4-way parallel system.

30. Have you used rollup component? Describe how?
Post Your Answer
If the user wants to group the records on particular field values then rollup is best way to do that. Rollup is a multi-stage transform function and it contains the following mandatory functions.
1. initialise
2. rollup
3. finalise
Also need to declare one temporary variable if you want to get counts of a particular group.

For each of the group, first it does call the initialise function once, followed by rollup function calls for each of the records in the group and finally calls the finalise function once at the end of last rollup call.

31. What is $mpjret? Where it is used in ab-initio?

You can use $mpjret in endscript like

if 0 -eq($mpjret)

then

echo “success”

else

mailx -s “[graphname] failed” mailid

32. What is local and formal parameter?

Two are graph level parameters but in local you need to initialize the value at the time of declaration where as globle no need to initialize the data it will promt at the time of running the graph for that parameter.

33. What is m_dump?

m_dump command prints the data in a formatted way.

m_dump <dml> <file.dat>

34. What is AB_LOCAL expression where do you use it in ab-initio?

ablocal_expr is a parameter of itable component of Ab Initio.ABLOCAL() is replaced by the contents of ablocal_expr.Which we can make use in parallel unloads.There are two forms of AB_LOCAL() construct, one with no arguments and one with single argument as a table name(driving table).

The use of AB_LOCAL() construct is in Some complex SQL statements contain grammar that is not recognized by the Ab Initio parser when unloading in parallel. You can use the ABLOCAL() construct in this case to prevent the Input Table component from parsing the SQL (it will get passed through to the database). It also specifies which table to use for the parallel clause.
35. What is the latest version that is available in Ab-initio?

The latest version of GDE ism1.15 AND Co>operating system is 2.14

 

36. What are differences between different versions of Co-op?
1.10 is a non key version and rest are key versions.

There are lot of components added and revised at following versions.
37. What is the importance of EME in abinitio?

EME is a repository in Ab Inition and it used for checkin and checkout for graphs also maintains graph version.

38. How to get DML using Utilities in UNIX?

If your source is a cobol copybook, then we have a command in unix which generates the required in Ab Initio. here it is:

 

 

Java top Interview Questions and latestanswers by RVH Techguru experts

Top most important Java interview questions and answers by Experts:

Here is a list of Top most important Java interview questions and answers by Experts.If you want to download Java interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Java interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Java ,Register for Java online training here.

 

 

1) What is difference between JDK,JRE and JVM?
JVM
JVM is an acronym for Java Virtual Machine, it is an abstract machine which provides the runtime environment in which java bytecode can be executed. It is a specification.
JVMs are available for many hardware and software platforms (so JVM is platform dependent).
JRE
JRE stands for Java Runtime Environment. It is the implementation of JVM.
JDK
JDK is an acronym for Java Development Kit. It physically exists. It contains JRE + development tools.
2) How many types of memory areas are allocated by JVM?
Many types:
1. Class(Method) Area
2. Heap
3. Stack
4. Program Counter Register
5. Native Method Stack
3) What is JIT compiler?.
Just-In-Time(JIT) compiler:It is used to improve the performance. JIT compiles parts of the byte code that have similar functionality at the same time, and hence reduces the amount of time needed for compilation.Here the term “compiler” refers to a translator from the instruction set of a Java virtual machine (JVM) to the instruction set of a specific CPU.
4) What is platform?

A platform is basically the hardware or software environment in which a program runs. There are two types of platforms software-based and hardware-based. Java provides software-based platform.
5) What is the main difference between Java platform and other platforms?
The Java platform differs from most other platforms in the sense that it’s a software-based platform that runs on top of other hardware-based platforms. It has two components:
1. Runtime Environment
2. API(Application Programming Interface)
6) What gives Java its ‘write once and run anywhere’ nature?
The bytecode. Java is compiled to be a byte code which is the intermediate language between source code and machine code. This byte code is not platform specific and hence can be fed to any platform.
7) What is class loader?
The classloader is a subsystem of JVM that is used to load classes and interfaces.There are many types of classloaders e.g. Bootstrap classloader, Extension classloader, System classloader, Plugin classloader etc.
8) Is Empty .java file name a valid source file name?
Yes, save your java file by .java only, compile it by javac .java and run by java yourclassname Let’s take a simple example:
1. //save by .java only
2. class A{
3. public static void main(String args[]){
4. System.out.println(“Hello java”);
5. }
6. }
7. //compile by javac .java
8. //run by java A
compile it by javac .java
run it by java A
9) Is delete,next,main,exit or null keyword in java?
No.
10) If I don’t provide any arguments on the command line, then the String array of Main method will be empty or null?.
It is empty. But not null.
11) What if I write static public void instead of public static void?
Program compiles and runs properly.
12) What is the default value of the local variables?
The local variables are not initialized to any default value, neither primitives nor object references.
13) What is difference between object oriented programming language and object based programming language?
Object based programming languages follow all the features of OOPs except Inheritance. Examples of object based programming languages are JavaScript, VBScript etc.
14) What will be the initial value of an object reference which is defined as an instance variable?
The object references are all initialized to null in Java.
15) What is constructor?
• Constructor is just like a method that is used to initialize the state of an object. It is invoked at the time of object creation.
16) What is the purpose of default constructor?
• The default constructor provides the default values to the objects. The java compiler creates a default constructor only if there is no constructor in the class.

17) Does constructor return any value?
yes, that is current instance (You cannot use return type yet it returns a value)
18)Is constructor inherited?
No, constructor is not inherited.

19) Can you make a constructor final?
No, constructor can’t be final.
20) What is static variable?
• static variable is used to refer the common property of all objects (that is not unique for each object) e.g. company name of employees,college name of students etc.
• static variable gets memory only once in class area at the time of class loading.
21) What is static method?
• A static method belongs to the class rather than object of a class.
• A static method can be invoked without the need for creating an instance of a class.
• static method can access static data member and can change the value of it.

22) Why main method is static?
because object is not required to call static method if It were non-static method,jvm creats object first then call main() method that will lead to the problem of extra memory allocation 
23) What is static block?
• Is used to initialize the static data member.
• It is executed before main method at the time of classloading.
24) Can we execute a program without main() method?
Yes, one of the way is static block.
25) What if the static modifier is removed from the signature of the main method?
Program compiles. But at runtime throws an error “NoSuchMethodError”.

26) What is this in java?
It is a keyword that that refers to the current object.
27)What is Inheritance?
Inheritance is a mechanism in which one object acquires all the properties and behaviour of another object of another class. It represents IS-A relationship. It is used for Code Resusability and Method Overriding.
28) Which class is the super class for every class.
Object class.
29) Why multiple inheritance is not supported in java?
• To reduce the complexity and simplify the language, multiple inheritance is not supported in java in case of class.
30) What is composition?
Holding the reference of the other class within some other class is known as composition.
31) What is difference between aggregation and composition?
Aggregation represents weak relationship whereas composition represents strong relationship. For example: bike has an indicator (aggregation) but bike has an engine (compostion).
32) Why Java does not support pointers?
Pointer is a variable that refers to the memory address. They are not used in java because they are unsafe(unsecured) and complex to understand.
33) What is super in java?
It is a keyword that refers to the immediate parent class object.
34) Can you use this() and super() both in a constructor?
No. Because super() or this() must be the first statement.
35)What is object cloning?
The object cloning is used to create the exact copy of an object.
36) What is method overloading?
If a class have multiple methods by same name but different parameters, it is known as Method Overloading. It increases the readability of the program.
37) Why method overloading is not possible by changing the return type in java?
Because of ambiguity.
38) Can we overload main() method?
Yes, You can have many main() methods in a class by overloading the main method.
39) What is method overriding:
If a subclass provides a specific implementation of a method that is already provided by its parent class, it is known as Method Overriding. It is used for runtime polymorphism and to provide the specific implementation of the method.

40) Can we override static method?
No, you can’t override the static method because they are the part of class not object.
41) Why we cannot override static method?
It is because the static method is the part of class and it is bound with class whereas instance method is bound with object and static gets memory in class area and instance gets memory in heap.
42) Can we override the overloaded method?
Yes.
43) Difference between method Overloading and Overriding.

Method Overloading Method Overriding
1) Method overloading increases the readability of the program. Method overriding provides the specific implementation of the method that is already provided by its super class.
2) method overlaoding is occurs within the class. Method overriding occurs in two classes that have IS-A relationship.
3) In this case, parameter must be different. In this case, parameter must be same.
44) Can you have virtual functions in Java?
Yes, all functions in Java are virtual by default.
45) What is covariant return type?
Now, since java5, it is possible to override any method by changing the return type if the return type of the subclass overriding method is subclass type. It is known as covariant return type.
46) What is Runtime Polymorphism?
Runtime polymorphism or dynamic method dispatch is a process in which a call to an overridden method is resolved at runtime rather than at compile-time.
In this process, an overridden method is called through the reference variable of a super class. The determination of the method to be called is based on the object being referred to by the reference variable.

47) What is the difference between static binding and dynamic binding?
In case of static binding type of object is determined at compile time whereas in dynamic binding type of object is determined at runtime.
48) What is abstraction?
Abstraction is a process of hiding the implementation details and showing only functionality to the user.

49) What are the advantages of JdbcTemplate in spring?
Less code: By using the JdbcTemplate class, you don’t need to create connection,statement,start transaction,commit transaction and close connection to execute different queries. You can execute the query directly.

50) Multiple inheritance is not supported through class in java but it is possible by interface, why?
As we have explained in the inheritance chapter, multiple inheritance is not supported in case of class. But it is supported in case of interface because there is no ambiguity as implementation is provided by the implementation class. For example:
1. interface Printable{
2. void print();
3. }
4. interface Showable{
5. void print();
6. }
7.
8. class TestTnterface1 implements Printable,Showable{
9. public void print(){System.out.println(“Hello”);}
10. public static void main(String args[]){
11. TestTnterface1 obj = new TestTnterface1();
12. obj.print();
13. }
14. }
Test it Now
Hello
As you can see in the above example, Printable and Showable interface have same methods but its implementation is provided by class TestTnterface1, so there is no ambiguity.

Interface inheritance
A class implements interface but one interface extends another interface .
1. interface Printable{
2. void print();
3. }
4. interface Showable extends Printable{
5. void show();
6. }
7. class Testinterface2 implements Showable{
8.
9. public void print(){System.out.println(“Hello”);}
10. public void show(){System.out.println(“Welcome”);}
11.
12. public static void main(String args[]){
13. Testinterface2 obj = new Testinterface2();
14. obj.print();
15. obj.show();
16. }
17. }
Test it Now
Hello
Welcome

51) What is marker or tagged interface?
An interface that have no member is known as marker or tagged interface. For example: Serializable, Cloneable, Remote etc. They are used to provide some essential information to the JVM so that JVM may perform some useful operation.
1. //How Serializable interface is written?
2. public interface Serializable{
3. }

Nested Interface in Java
Note: An interface can have another interface i.e. known as nested interface. We will learn it in detail in the nested classes chapter. For example:
1. interface printable{
2. void print();
3. interface MessagePrintable{
4. void msg();
5. }
6. }
More about Nested Interface
Next TopicDifference between Abstract class and interface
52) Can there be any abstract method without abstract class?
No, if there is any abstract method in a class, that class must be abstract.
53) Can you use abstract and final both with a method?
No, because abstract method needs to be overridden whereas you can’t override final method.
54) Is it possible to instantiate the abstract class?
No, abstract class can never be instantiated.
55) What is interface?
Interface is a blueprint of a class that have static constants and abstract methods. It can be used to achieve fully abstraction and multiple inheritance.
56) Can you declare an interface method static?
No, because methods of an interface is abstract by default, and static and abstract keywords can’t be used together.
57) Can an Interface be final?
No, because its implementation is provided by another class.

58) Why use java finally
o Finally block in java can be used to put “cleanup” code such as closing a file, closing connection etc.
Usage of Java finally
Let’s see the different cases where java finally block can be used.
Case 1
Let’s see the java finally example where exception doesn’t occur.
1. class TestFinallyBlock{
2. public static void main(String args[]){
3. try{
4. int data=25/5;
5. System.out.println(data);
6. }
7. catch(NullPointerException e){System.out.println(e);}
8. finally{System.out.println(“finally block is always executed”);}
9. System.out.println(“rest of the code…”);
10. }
11. }
Test it Now
Output:5
finally block is always executed
rest of the code…
Case 2
Let’s see the java finally example where exception occurs and not handled.
1. class TestFinallyBlock1{
2. public static void main(String args[]){
3. try{
4. int data=25/0;
5. System.out.println(data);
6. }
7. catch(NullPointerException e){System.out.println(e);}
8. finally{System.out.println(“finally block is always executed”);}
9. System.out.println(“rest of the code…”);
10. }
11. }
Test it Now
Output:finally block is always executed
Exception in thread main java.lang.ArithmeticException:/ by zero
Case 3
Let’s see the java finally example where exception occurs and handled.
1. public class TestFinallyBlock2{
2. public static void main(String args[]){
3. try{
4. int data=25/0;
5. System.out.println(data);
6. }
7. catch(ArithmeticException e){System.out.println(e);}
8. finally{System.out.println(“finally block is always executed”);}
9. System.out.println(“rest of the code…”);
10. }
11. }
Test it Now
Output:Exception in thread main java.lang.ArithmeticException:/ by zero
finally block is always executed
rest of the code…

59) What is the basic difference between string and stringbuffer object?
String is an immutable object. StringBuffer is a mutable object.

60) What is the difference between StringBuffer and StringBuilder ?
StringBuffer is synchronized whereas StringBuilder is not synchronized.

61) What is the purpose of toString() method in java ?
The toString() method returns the string representation of any object. If you print any object, java compiler internally invokes the toString() method on the object. So overriding the toString() method, returns the desired output, it can be the state of an object etc. depends on your implementation.
62) How many objects of a servlet is created?
Only one object at the time of first request by servlet or web container.
63) What is the life-cycle of a servlet?
1. Servlet is loaded
2. servlet is instantiated
3. servlet is initialized
4. service the request
5. servlet is destroyed
64) What is difference between PrintWriter and ServletOutputStream?
PrintWriter is a character-stream class where as ServletOutputStream is a byte-stream class. The PrintWriter class can be used to write only character-based information whereas ServletOutputStream class can be used to write primitive values as well as character-based information.

65) What is difference between GenericServlet and HttpServlet?
The GenericServlet is protocol independent whereas HttpServlet is HTTP protocol specific. HttpServlet provides additional functionalities such as state management etc.

66) What is servlet collaboration?
When one servlet communicates to another servlet, it is known as servlet collaboration. There are many ways of servlet collaboration:
• RequestDispacher interface
• sendRedirect() method etc.
67) What is the purpose of RequestDispatcher Interface?
The RequestDispacher interface provides the facility of dispatching the request to another resource it may be html, servlet or jsp. This interceptor can also be used to include the content of antoher resource.
68) Can you call a jsp from the servlet?
Yes, one of the way is RequestDispatcher interface for example:
1. RequestDispatcher rd=request.getRequestDispatcher(“/login.jsp”);
2. rd.forward(request,response);

69) What is difference between ServletConfig and ServletContext?
The container creates object of ServletConfig for each servlet whereas object of ServletContext is created for each web application.
70) What is Session Tracking?
Session simply means a particular interval of time.
Session Tracking is a way to maintain state of an user.Http protocol is a stateless protocol.Each time user requests to the server, server treats the request as the new request.So we need to maintain the state of an user to recognize to particular user.
71) What are Cookies?
A cookie is a small piece of information that is persisted between the multiple client requests. A cookie has a name, a single value, and optional attributes such as a comment, path and domain qualifiers, a maximum age, and a version number.
72) What is difference between Cookies and HttpSession?
Cookie works at client side whereas HttpSession works at server side.
73) What is filter?
A filter is an object that is invoked either at the preprocessing or postprocessing of a request. It is pluggable.
74) How can we perform any action at the time of deploying the project?
By the help of ServletContextListener interface.
75) What is the disadvantage of cookies?
It will not work if cookie is disabled from the browser.

76) How can we upload the file to the server using servlet?
One of the way is by MultipartRequest class provided by third party.

77) What is load-on-startup in servlet?
The load-on-startup element of servlet in web.xml is used to load the servlet at the time of deploying the project or server start. So it saves time for the response of first request.

HTML

HyperText Markup Language, commonly abbreviated as HTML, is the standard markup language used to create web pages. Along with CSS, and JavaScript, HTML is a cornerstone technology used to create web pages,[1] as well as to create user interfaces for mobile and web applications. Web browsers can read HTML files and render them into visible or audible web pages. HTML describes the structure of a website semantically and, before the advent of Cascading Style Sheets (CSS), included cues for the presentation or appearance of the document (web page), making it a markup language, rather than a programming language.

HTML elements form the building blocks of HTML pages. HTML allows images and other objects to be embedded and it can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. HTML elements are delineated by tags, written using angle brackets. Tags such as <img /> and <input /> introduce content into the page directly. Others such as <p>...</p> surround and provide information about document text and may include other tags as sub-elements. Browsers do not display the HTML tags, but use them to interpret the content of the page.

HTML can embed scripts written in languages such as JavaScript which affect the behavior of HTML web pages. HTML markup can also refer the browser to Cascading Style Sheets (CSS) to define the look and layout of text and other material. The World Wide Web Consortium (W3C), maintainer of both the HTML and the CSS standards, has encouraged the use of CSS over explicit presentational HTML since 1997.[2]