Tibco interview questions

 Top most important tibco interview questions and answers by Experts:

Here is a list of Top most important tibco interview questions and answers by Experts.If you want to download tibco interview questions pdf free ,you can register with RVH techguru. Our experts prepared these tibco interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in tibco ,Register for tibco online training here.

 

1.What are the modes of TIBCO BW Installations ?
• GUI mode
• Console mode
• Silent mode
2.If you have installed a particular version of TIBCO software e.g. TIBCO BW X.Y.Z, What are X, Y and Z number stands for?
Integration can be at different application layers:
• X:Patch
• Y:Major
• Z:Minor

3.What is the role of TRA?
TRA stands for TIBCO Runtime Agent.
The TRA has two main functions:
• Supplies an agent that is running in the background on each machine.
1. The agent is responsible for starting and stopping processes that run on a machine according to the deployment information.
2. The agent monitors the machine. That information is then visible via TIBCO Administrator.
• Supplies the run-time environment, that is, all shared libraries including third-party libraries.

4. What are the revision control system options available in TIBCO designer?
• File sharing
• VSS
• Perforce
• XML Canon
• ClearCase
• iPlanet
• CVS
• PVCS
5. What are the different modes of service invocation?
Services can be invoked in several ways.
• A one-way operation is executed once and does not wait for a response.
• A request-response operation is executed once and waits for one response. In a request-response service, communication flows in both directions. The complete interaction consists of two point-to-point messages—a request and a response. The interaction is only considered complete after the response has arrived.
• Publication (notification) means an operation sends information on an as-needed basis, potentially multiple times.
• Subscription means incoming information is processed on an as-needed basis, potentially multiple times.
6.What is vcrepo.dat?
TIBCO Designer creates a file named vcrepo.dat in the project root directory when you first save the project. This file is used to store properties such as display name, TIBCO Rendezvous encoding, and description. This file can be used for identification in place of the project root directory and can be used as the repository locator string (repoUrl).
7.What are the TIBCO BW activities that can participate in transactions?
Not all TIBCO BusinessWorks activities can participate in a transaction. Only the following types of activities have transactional capabilities:
• JDBC activities
• JMS activities
• ActiveEnterprise Adapter activities that use JMS transports
• EJB activities
• TIBCO iProcess BusinessWorks Connector activities

8.What are the different types of Transactions TIBCO provides?
TIBCO BusinessWorks offers a variety of types of transactions that can be used in different situations. You can use the type of transaction that suits the needs of your integration project. When you create a transaction group, you must specify the type of transaction. TIBCO BusinessWorks supports the following types of transactions:
• JDBC
• Java Transaction API (JTA) UserTransaction
• XA Transaction
9.What activities are supported in JTA Transaction?
The Java Transaction API (JTA) UserTransaction type allows:
• JDBC
• JMS
• ActiveEnterprise Adapter (using JMS transports)
• EJB activities
to participate in transactions.

10.What activities are supported in XA Transaction ?
The XA Transaction type allows:
• JDBC activities
• ActiveEnterprise Adapter activities that use the JMS transport
• JMS activities
to participate in transactions.
Note:For JMS activities and ActiveEnterprise Adapter activities, request/reply operations cannot participate in an XA transaction. Also, EJB activities cannot participate in an XA Transaction group.
11.What are the possible Error output’s of Read File activity?
Integration can be at different application layers:
• FileNotFoundException :Thrown when yhe file does not exist.
• UnsupportedEncodingException:Thrown when the text file’s encoding is not valid and the content of the file is read into process data.
• FileIOException :Thrown when an I/O exception occurred when trying to read the file.
12.What is the purpose of the inspector activity ?
The Inspector activity is used to write the output of any or all activities and process variables to a file and/or stdout. This is particularly useful when debugging process definitions and you wish to see the entire schema instead of mapping specific elements to the Write File activity.
13.What are the maximum/minimum of threads available for incoming HTTP ?
The maximum/minimum of threads available for incoming HTTP : 75/10
14. How can unauthorized users be prevented from triggering a process ?
Unauthorized users be prevented from triggering a process by giving ‘write’ access for the process engine to only selected users. Only users with ‘write’ access can do activities like deploying applications, starting/stopping process engines etc.
15.What are the mandatory configuration parameters for FTP Connection & FTP with firewall ?
The mandatory configuration parameters for FTP Connection
• FTP host
• Port
• Username & Password>
If Firewall is enabled in addition the proxy host and port are required.

16.how to design a process such that depending on number of records updated in a database, 3 different sub-processes may be called ?
Define 3 transitions from JDBC update with condition on the no of updates and call appropriate child processes.
17.How to use legacy .data file format with latest designer ?
Convert .dat file to multi file project using Administration tab while starting up Designer(Other one being Project tab) and then open the multi file project in the normal way.

18.What are the encodings supported by designer ?
Encodings supported by designer are
• ISO8859-1(Latin-1)
• UTF-8
19.What are the 4 main panels of the Designer window ?
The 4 main panels of the Designer window are
• Project panel
• Palette panel
• Design panel
• Configuration panel
20.How do you determine if there are broken references in the project?
Project -> Validate for deployment

21.Where are the Designer preferences stored ?
Designer preferences stored are stores in a file called ‘Designer <ver>.prefs’ in the user home directory.
22.Explain the process configuration parameters – Max Jobs, Flow Limit & Activation Limit ?
• Max Jobs :
Max Jobs specifies the number of process instances that are kept in memmory. Once this limit is reached newly created process instances (subject to flow limit) are paged out to disk.0 specifies no limit and is the default.
• Flow Limit :
Flow Limit specifies the maximum number of running process instances that are spawned before the process starter is suspended ie it enters a FLOW_CONTROLLED state and does not accept new events. This can be used to control the number of process instances running simultaneously and when the protocol generating the event can store the event till it is received, like email servers, JMS, RV etc. 0 specifies no limit and is the default.
• Activation Limit :
Activation limit flag specifies that once a process instance is loaded it must be placed in memory till it completes execution. By default it is enabled.
23.What are the options for configuring storage for process engine’s checkpoint repository ?
The options for configuring storage for process engine’s checkpoint repository are:
• Local File
• Database. Fault tolerant engines can recover from a checkpoint only when database is used.
24.Process engines in a fault tolerant group can be configured as peers or master secondary.How do these differ ?
The options for configuring storage for process engine’s checkpoint repository are:
• – Peer means all of them have the same weight. In this case when one engine fails another one takes over and continues processing till it fails.
• – In master secondary configuration weights are unequal, the secondary starts processing when master fails. But when master recovers, secondary stops and master continues processing.
25.What are the uses of grouping activities ?
Uses of grouping activities are:
• Create a set of activities having a common error transition.
• Repeat group of activities based on a condition.
1. – Iterate over a list.
2. – Repeat until condition true.
3. – Repeat on Error until condition true.
• Group activities into a transaction.
• To create a critical section area that synchronizes process instances.
• A ‘Pick First Group’ allows you to wait for the occurrence of multiple events and proceed along a path following the first event to occur.
26.What is the purpose of a Lock shared configuration resource?
A Lock is specified for a ‘Critical Section’ group when the scope is ‘Multiple’. It can be used to ensure synchronization across process instances belonging to multiple processs definitions or for process instances across engines(Check multi engine flag for lock in this case and the BW engine needs to be configured with database persistence while deployment). If synchronization is for process instances belonging to the same processs definition inside one engine, just specify the scope as ‘Single’.
27.How to control the sequence of execution of process instances created by a process starter ?
Use the sequencing key field in the Misc tab of any process starter. Process instances with the same value for this field are executed in the sequence in which they are started.
28.Can there be two error transitions out of an activity ?
No. There can be only one Error and one Success if no matching condition transition out of each activity.
29.When is a ‘No Action’ group used ?
‘No Action’ group used to have a set of activities having a common error transition

30.What activity can be used to set the value of a ‘User defined process variable’ ?
The ‘Assign’ activity can be used to set the value of a ‘User defined process variable’.

31.Which are the two process variables available to all activities with inputs ?
• $_globalVariables
• $_processContext
32.Which mechanism can be used to pass data between a process instance and a called sub process other than mapping from/to the callee’s input/output ?
This can be accomplished using job shared variables, unless in the call process activity the ‘Spawn’ flag is enabled in which case the called sub process is a new job and hence gets a fresh copy of the job shared variable initialized as per its configuration. A shared variable can overcome this limitation as it’s scope is not limited to one job.

33.What are the three scenarios where BW engine has to be configured with database persistence instead of Local File ?
The three scenarios are:
• Shared Variables across BW engines.
• Locking across groups in multiple BW engines.
• Wait Notify across BW engines.
34.If you want a group to be executed if there is some unhandled error but subject to some max number of iterations which group do you use ?
We can use Repeat on Error until true

35.When is a ‘Generate Error’ activity useful?
When you handle an error inside a called subprocess or group and want to rethrow the error to the caller(happens by default if you dont handle the error in the called process)

36.Which activity is used for detecting duplicate message processing?
CheckPoint activity – Specify the uniqueID for the duplicate key field and engine maintains list of these key fields. When a process come to checkpoint activity with the same value for duplicate key which already exists, it throws a DuplicateException. An error transition can then handle this case.
37.Give an example where graceful migration of service from one machine to another is not possible.
HTTP Receiver. In this case the receiver on new machine starts listening on the same port, but you need to redirect requests from the old machine to the new one.
38.What are the types of adapter services ?
Types of adapter services are :
• Subscriber Service
• Publisher Service
• Request-Response Service
• Request-Response Invocation Service
39.If the business process needs to invoke another web service which resource do you use ?
SOAP request reply activity. If the business process needs to be exposed as SOAP service use SOAP Event Source in conjunction with SOAP Send Reply or SOAP Send Fault.

40.What is the functionality of the Retrieve Resources resource?
It can be used to serve the wsdl file of a SOAP Event Source to a (http) client.
Construct a process like: HTTP Receiver -> Retrieve Resources -> Send HTTP Response

Now the WSDL file for a SOAP service can be retreived using the http request

http://://?wsdl

where ‘path’ is the folder path to the SOAP Event Source process and ‘resourceName’ is the name of the process

Example : http://purch:8877/Purchasing/GetPurchaseOrder?wsdl

41.What is the scope of user defined process variables ?
The scope of user defined process variables is only the process in which it is defined.(Not even inside a sub process that is invoked from this process)
42.What is difference between shared variable and job shared variable ?
• Both of them can be manipulated via the palette resources ‘Get shared variable’ and ‘Set shared variable’.
• A job shared variable is private to one instance of job or in other words each job has a fresh copy. In the case of shared variable the same copy is shared across all job instances. It can even be persisted and can survive BW engine restarts and even shared across multiple BW engines(when deployed using DB persistence).

43.How do wait-notify resources work ?
Basically wait and notify should share a common notification configuration which is just a schema definition for data that will be passed from notifier to waiter. Specific instances of waiter & notifier are corrrelated via a key.
For example: when one process is in wait state for key ‘Order-1’, it waits till another process issues a notification with the same key value.

44.What is the default Axis in XPath ?
Child axis- What this means is that when you select “BOOK” from the current context, it selects a child node with that name, not a sibling with that name. Other axes are parent , self , sibling etc.

45.What are the output formats for XSLT?
• XML
• HTML
• Text

46.What is the Purpose of $_error variable ?
$_error variable is available in the node following the error transition. It captures the error message, error code etc.
47.What are the cases where business process cant proceed correctly subsequent to restart from a checkpoint ?
• Sending HTTP response, confirming an email/jms message etc. This is because the confirmation or sending HTTP response has to done in the same session. When engine crashes these sessions are closed at their socket level. In such cases send response/confirm before checkpoint.

48.Which group do you use to wait for multiple events and proceed with the first to occur ?
A ‘Pick First Group’.

 

 

Android interview questions

Top most important android interview questions and answers by Experts:

Here is a list of Top most important android interview questions and answers by Experts.If you want to download android interview questions pdf free ,you can register with RVH techguru. Our experts prepared these android interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in android ,Register for android online training here.

 

1) What is Android?
It is an open-sourced operating system that is used primarily on mobile devices, such as cell phones and tablets. It is a Linux kernel-based system that’s been equipped with rich components that allows developers to create and run apps that can perform both basic and advanced functions.
2) What Is the Google Android SDK?
The Google Android SDK is a toolset that developers need in order to write apps on Android enabled devices. It contains a graphical interface that emulates an Android driven handheld environment, allowing them to test and debug their codes.
3) What is the Android Architecture?
Android Architecture is made up of 4 key components:
– Linux Kernel
– Libraries
– Android Framework
– Android Applications
4) What is the importance of XML-based layouts?
The use of XML-based layouts provides a consistent and somewhat standard means of setting GUI definition format. In common practice, layout details are placed in XML files while other items are placed in source files.
5) What are containers?
Containers, as the name itself implies, holds objects and widgets together, depending on which specific items are needed and in what particular arrangement that is wanted. Containers may hold labels, fields, buttons, or even child containers, as examples.
6) What is Orientation?
Orientation, which can be set using setOrientation(), dictates if the LinearLayout is represented as a row or as a column. Values are set as either HORIZONTAL or VERTICAL.
7) What is the importance of Android in the mobile market?
Developers can write and register apps that will specifically run under the Android environment. This means that every mobile device that is Android enabled will be able to support and run these apps. With the growing popularity of Android mobile devices, developers can take advantage of this trend by creating and uploading their apps on the Android Market for distribution to anyone who wants to download it.
8) What do you think are some disadvantages of Android?
Given that Android is an open-source platform, and the fact that different Android operating systems have been released on different mobile devices, there’s no clear cut policy to how applications can adapt with various OS versions and upgrades. One app that runs on this particular version of Android OS may or may not run on another version. Another disadvantage is that since mobile devices such as phones and tabs come in different sizes and forms, it poses a challenge for developers to create apps that can adjust correctly to the right screen size and other varying features and specs.
9) What is adb?
Adb is short for Android Debug Bridge. It allows developers the power to execute remote shell commands. Its basic function is to allow and control communication towards and from the emulator port.
10) What are the four essential states of an activity?
– Active – if the activity is at the foreground
– Paused – if the activity is at the background and still visible
– Stopped – if the activity is not visible and therefore is hidden or obscured by another activity
– Destroyed – when the activity process is killed or completed terminated
11) What is ANR?
ANR is short for Application Not Responding. This is actually a dialog that appears to the user whenever an application have been unresponsive for a long period of time.
12) Which elements can occur only once and must be present?
Among the different elements, the and elements must be present and can occur only once. The rest are optional, and can occur as many times as needed.
13) How are escape characters used as attribute?
Escape characters are preceded by double backslashes. For example, a newline character is created using ‘\n’
14) What is the importance of settings permissions in app development?
Permissions allow certain restrictions to be imposed primarily to protect data and code. Without these, codes could be compromised, resulting to defects in functionality.
15) What is the function of an intent filter?
Because every component needs to indicate which intents they can respond to, intent filters are used to filter out intents that these components are willing to receive. One or more intent filters are possible, depending on the services and activities that is going to make use of it.
16) Enumerate the three key loops when monitoring an activity
– Entire lifetime – activity happens between onCreate and onDestroy
– Visible lifetime – activity happens between onStart and onStop
– Foreground lifetime – activity happens between onResume and onPause
17) When is the onStop() method invoked?
A call to onStop method happens when an activity is no longer visible to the user, either because another activity has taken over or if in front of that activity.
18) Is there a case wherein other qualifiers in multiple resources take precedence over locale?
Yes, there are actually instances wherein some qualifiers can take precedence over locale. There are two known exceptions, which are the MCC (mobile country code) and MNC (mobile network code) qualifiers.
19) What are the different states wherein a process is based?
There are 4 possible states:
– foreground activity
– visible activity
– background activity
– empty process
20) How can the ANR be prevented?
One technique that prevents the Android system from concluding a code that has been responsive for a long period of time is to create a child thread. Within the child thread, most of the actual workings of the codes can be placed, so that the main thread runs with minimal periods of unresponsive times.
21) What role does Dalvik play in Android development?
Dalvik serves as a virtual machine, and it is where every Android application runs. Through Dalvik, a device is able to execute multiple virtual machines efficiently through better memory management.
22) What is the AndroidManifest.xml?
This file is essential in every application. It is declared in the root directory and contains information about the application that the Android system must know before the codes can be executed.
23) What is the proper way of setting up an Android-powered device for app development?
The following are steps to be followed prior to actual application development in an Android-powered device:
-Declare your application as “debuggable” in your Android Manifest.
-Turn on “USB Debugging” on your device.
-Set up your system to detect your device.
24) Enumerate the steps in creating a bounded service through AIDL.
1. create the .aidl file, which defines the programming interface
2. implement the interface, which involves extending the inner abstract Stub class as well as implanting its methods.
3. expose the interface, which involves implementing the service to the clients.
25) What is the importance of Default Resources?
When default resources, which contain default strings and files, are not present, an error will occur and the app will not run. Resources are placed in specially named subdirectories under the project res/ directory.
26) When dealing with multiple resources, which one takes precedence?
Assuming that all of these multiple resources are able to match the configuration of a device, the ‘locale’ qualifier almost always takes the highest precedence over the others.
27) When does ANR occur?
The ANR dialog is displayed to the user based on two possible conditions. One is when there is no response to an input event within 5 seconds, and the other is when a broadcast receiver is not done executing within 10 seconds.
28) What is AIDL?
AIDL, or Android Interface Definition Language, handles the interface requirements between a client and a service so both can communicate at the same level through interprocess communication or IPC. This process involves breaking down objects into primitives that Android can understand. This part is required simply because a process cannot access the memory of the other process.

29) What data types are supported by AIDL?
AIDL has support for the following data types:
-string
-charSequence
-List
-Map
-all native Java data types like int,long, char and Boolean
30) What is a Fragment?
A fragment is a part or portion of an activity. It is modular in a sense that you can move around or combine with other fragments in a single activity. Fragments are also reusable.
31) What is a visible activity?
A visible activity is one that sits behind a foreground dialog. It is actually visible to the user, but not necessarily being in the foreground itself.
32) When is the best time to kill a foreground activity?
The foreground activity, being the most important among the other states, is only killed or terminated as a last resort, especially if it is already consuming too much memory. When a memory paging state has been reach by a foreground activity, then it is killed so that the user interface can retain its responsiveness to the user.
33) Is it possible to use or add a fragment without using a user interface?
Yes, it is possible to do that, such as when you want to create a background behavior for a particular activity. You can do this by using add(Fragment,string) method to add a fragment from the activity.
34) How do you remove icons and widgets from the main screen of the Android device?
To remove an icon or shortcut, press and hold that icon. You then drag it downwards to the lower part of the screen where a remove button appears.
35) What are the core components under the Android application architecture?
There are 5 key components under the Android application architecture:
– services
– intent
– resource externalization
– notifications
– content providers
36) What composes a typical Android application project?
A project under Android development, upon compilation, becomes an .apk file. This apk file format is actually made up of the AndroidManifest.xml file, application code, resource files, and other related files.
37) What is a Sticky Intent?
A Sticky Intent is a broadcast from sendStickyBroadcast() method such that the intent floats around even after the broadcast, allowing others to collect data from it.
38) Do all mobile phones support the latest Android operating system?
Some Android-powered phone allows you to upgrade to the higher Android operating system version. However, not all upgrades would allow you to get the latest version. It depends largely on the capability and specs of the phone, whether it can support the newer features available under the latest Android version.
39) What is portable wi-fi hotspot?
Portable Wi-Fi Hotspot allows you to share your mobile internet connection to other wireless device. For example, using your Android-powered phone as a Wi-Fi Hotspot, you can use your laptop to connect to the Internet using that access point.
40) What is an action?
In Android development, an action is what the intent sender wants to do or expected to get as a response. Most application functionality is based on the intended action.
41) What is the difference between a regular bitmap and a nine-patch image?
In general, a Nine-patch image allows resizing that can be used as background or other image size requirements for the target device. The Nine-patch refers to the way you can resize the image: 4 corners that are unscaled, 4 edges that are scaled in 1 axis, and the middle one that can be scaled into both axes.
42) What language is supported by Android for application development?
The main language supported is Java programming language. Java is the most popular language for app development, which makes it ideal even for new Android developers to quickly learn to create and deploy applications in the Android environment.
43) What is meaning of Android Word?
it means a robot with a human appearance.

44) What is Android?
an open-source operating system used for smartphones and tablet computers.

45) Inventors of android ?
Andy Rubin, Rich Miner, Nick Sears5. Features of Android OS?
Most of us are aware of features like
Live wallpaper
Camera
Messaging
Bluetooth
WIFI
Web Browsing
Music
Alarm etc. etc….

46) Advance Features of Android OS?
Google now (voice assistant)
NFC (Near Field Communication)
Unlock your phone by your face
Use your phone with joystick to enjoy gaming experience
Connect your phone with LED TV via MHL or micro HDMI cable
Screen Capture
Multitasking Future (Task Switcher)
Data Usages (Check and also set limit from device)

47) Tools Required for Developing Android Apps?
JDK
Eclipse + ADT plugin
SDK Tools.
48) ADT stand for?
Android Developer Tools

49) SDK stand for ?
Software Development Kit

50) Advantages of android?
Open-source
Platform-independent
Supports various technologies (having number of native application like: camera, bluetooth, wifi, speech, EDGE)

51) Describe the Android Framework.
The Android Framework is an important aspect of the Android Architecture. Here you can find all the classes and methods that developers would need in order to write applications on the Android environment.
52) What is AAPT?
AAPT is short for Android Asset Packaging Tool. This tool provides developers with the ability to deal with zip-compatible archives, which includes creating, extracting as well as viewing its contents.
53) What is the importance of having an emulator within the Android environment?
The emulator lets developers “play” around an interface that acts as if it were an actual mobile device. They can write and test codes, and even debug. Emulators are a safe place for testing codes especially if it is in the early design phase.
54) What is the use of an activityCreator?
An activityCreator is the first step towards the creation of a new Android project. It is made up of a shell script that will be used to create new file system structure necessary for writing codes within the Android IDE.
55) Describe Activities.
Activities are what you refer to as the window to a user interface. Just as you create windows in order to display output or to ask for an input in the form of dialog boxes, activities play the same role, though it may not always be in the form of a user interface.
56) What are Intents?
Intents displays notification messages to the user from within the Android enabled device. It can be used to alert the user of a particular state that occurred. Users can be made to respond to intents.
57) Differentiate Activities from Services.
Activities can be closed, or terminated anytime the user wishes. On the other hand, services are designed to run behind the scenes, and can act independently. Most services run continuously, regardless of whether there are certain or no activities being executed.
58) What items are important in every Android project?
These are the essential items that are present each time an Android project is created:
– AndroidManifest.xml
– build.xml
– bin/
– src/
– res/
– assets/

 

 

Pl sql interview questions

Top most important pl sql interview questions and answers by Experts:

Here is a list of Top most important pl sql interview questions and answers by Experts.If you want to download pl sql interview questions pdf free ,you can register with RVH techguru. Our experts prepared these pl sql interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in pl sql ,Register for pl sql online training here.

 

1.What special operators does Oracle provide for dealing with NULLs?

NVL – Converts a NULL to another specified value, as in:

my_var := NVL (your_var, ‘Hello’);

IS NULL and IS NOT NULL

You can use this syntax to check specificaly to see if a variable’s value is NULL or NOT NULL.

2.Explain three different rules that apply to NULLs when doing comparisons?

1. For all operators except for concatenation (||), if a value in an expression is a NULL, that expression evaluates to NULL

2. NULL is never equal or not equal to another value

3. NULL is never TRUE or FALSE

3.What command would you use to encrypt a PL/SQL application?

WRAP

4.Explain the difference between a FUNCTION, PROCEDURE and PACKAGE.

A function has a return type in its specification and must return a value specified in that type. A procedure does not have a return type in its specification and should not return any value, but it can have a return statement that simply stops its execution and returns to the caller.

5.What steps are included in the compilation process of a PL/SQL block?

The compilation process includes syntax checking, binding, and p-code generation. Syntax checking involves checking PL/SQL code for compilation errors. After syntax errors have been corrected, a storage address is assigned to the variables that are used to hold data for Oracle. This process is called binding. Next, p-code is generated for the PL/SQL block. P-code is a list of instructions to the PL/SQL engine. For named blocks, p-code is stored in the database, and it is used the next time the program is executed.

6.How does a syntax error differ from a runtime error?

A syntax error can be detected by the PL/SQL compiler. A runtime error occurs while the program is running and cannot be detected by the PL/SQL compiler.

A misspelled keyword is an example of a syntax error. For example, this script:

BEIN
DBMS_OUTPUT.PUT_LINE (‘This is a test’);
END;

contains a syntax error. Try to find it.

A SELECT INTO statement returning no rows is an example of a runtime error. This error can be handled with the help of the exception-handling section of the PL/SQL block.

Define Commit, Rollback and Savepoint.

When a COMMIT statement is issued to the database, the transaction has ended, and the following results are true:

. All work done by the transaction becomes permanent.

. Other users can see changes in data made by the transaction.

. Any locks acquired by the transaction are released.

When a ROLLBACK statement is issued to the database, the transaction has ended, and the following results are true:

. All work done by the transaction is undone, as if it hadn’t been issued.

. Any locks acquired by the transaction are released.

The ROLLBACK statement undoes all the work done by the user in a specific transaction. With the SAVEPOINT command, however, only part of the transaction can be undone.

7.Explain Implicit and Explicit cursors

Oracle automatically declares an implicit cursor every time a SQL statement is executed. The user is unaware of this and cannot control or process the information in an implicit cursor.

The program defines an explicit cursor for any query that returns more than one row of data. This means that the programmer has declared the cursor within the PL/SQL code block. This declaration allows the application to sequentially process each row of data as the cursor returns it.

8.How an Implicit cursor works?

1. Any given PL/SQL block issues an implicit cursor whenever a SQL statement is executed, as long as an explicit cursor does not exist for that SQL statement.
2. A cursor is automatically associated with every DML (data manipulation) statement (UPDATE, DELETE, INSERT).
3. All UPDATE and DELETE statements have cursors that identify the set of rows that will be affected by the operation.
4. An INSERT statement needs a place to receive the data that is to be inserted into the database; the implicit cursor fulfills this need.
5. The most recently opened cursor is called the SQL cursor.

9.How an Explicit cursor works?

The process of working with an explicit cursor consists of the following steps:

1. Declaring the cursor. This initializes the cursor into memory.

2. Opening the cursor. The declared cursor is opened, and memory is allotted.

3. Fetching the cursor. The declared and opened cursor can now retrieve data.

4. Closing the cursor. The declared, opened, and fetched cursor must be closed to release the memory allocation.

10.What are PL/SQL Cursor Exceptions?

Cursor_Already_Open, Invalid_Cursor

11.What is the maximum number of triggers, can apply to a single table?

12 triggers.

12.What is a mutating table error and how can you get around it?

This happens with triggers. It occurs because the trigger is trying to update a row it is currently using. The usual fix involves either use of views or temporary tables so the database is selecting from one while updating the other.

13.What packages (if any) has Oracle provided for use by developers?

Oracle provides the DBMS_ series of packages. There are many which developers should be aware of such as DBMS_SQL, DBMS_PIPE, DBMS_TRANSACTION, DBMS_LOCK, DBMS_ALERT, DBMS_OUTPUT, DBMS_JOB, DBMS_UTILITY, DBMS_DDL, UTL_FILE. If they can mention a few of these and describe how they used them, even better. If they include the SQL routines provided by Oracle, great, but not really what was asked.

Describe the use of PL/SQL tables

PL/SQL tables are scalar arrays that can be referenced by a binary integer. They can be used to hold values for use in later queries or calculations. In Oracle 8 they will be able to be of the %ROWTYPE designation, or RECORD.

14.When is a declare statement needed?

The DECLARE statement is used in PL/SQL anonymous blocks such as with stand alone, non-stored PL/SQL procedures. It must come first in a PL/SQL stand alone file if it is used.

In what order should a open/fetch/loop set of commands in a PL/SQL block be implemented if you use the %NOTFOUND cursor variable in the exit when statement? Why?

OPEN then FETCH then LOOP followed by the exit when. If not specified in this order will result in the final return being done twice because of the way the %NOTFOUND is handled by PL/SQL.

15.What are SQLCODE and SQLERRM and why are they important for PL/SQL developers?

SQLCODE returns the value of the error number for the last error encountered. The SQLERRM returns the actual error message for the last error encountered. They can be used in exception handling to report, or, store in an error log table, the error that occurred in the code. These are especially useful for the WHEN OTHERS exception.

16.How can you find within a PL/SQL block, if a cursor is open?

Use the %ISOPEN cursor status variable.

17.How can you generate debugging output from PL/SQL?

Use the DBMS_OUTPUT package. Another possible method is to just use the SHOW ERROR command, but this only shows errors. The DBMS_OUTPUT package can be used to show intermediate results from loops and the status of variables as the procedure is executed. The new package UTL_FILE can also be used.

18.What are the types of triggers?

There are 12 types of triggers in PL/SQL that consist of combinations of the BEFORE, AFTER, ROW, TABLE, INSERT, UPDATE, DELETE and ALL key words:
BEFORE ALL ROW INSERT
AFTER ALL ROW INSERT
BEFORE INSERT
AFTER INSERT etc.

19.How can I define a two-dimensional array of numbers in PL/SQL?

Although PL/SQL does not natively support the declaration and manipulation of multidimensional arrays, you can emulate these structures using nested collection definitions, which were first supported in Oracle9i Database Release 1.

Here is a brief example to get you started and introduce you to some of the challenges you may encounter as you use collections in this way.

First, create a collection of associative arrays.

CREATE OR REPLACE PACKAGE twodim_aa
IS
TYPE data_t IS TABLE OF NUMBER
INDEX BY PLS_INTEGER;

TYPE array_t IS TABLE OF data_t
INDEX BY PLS_INTEGER;
END twodim_aa;
/

The first, inner collection—data_t—contains the data for each cell in the two-dimensional array. Each row in the outer collection—array_t—contains a collection of the first type.

Now declare a variable based on that outer collection type —array_t—, which will serve as a two-dimensional array. In the following script, I declare such a collection—

DECLARE
l_2d_grid twodim_aa.array_t;

—and then assign values to three cells: (1,1), (1,2), and (200,206). Notice that the syntax is different from that used in traditional array cell specification, namely: (1)(1), (1)(2), and (200)(206). Also, since I am using associative arrays to define my two-dimensional array, I do not have to specify a size for this two-dimensional array.

DECLARE
l_2d_grid twodim_aa.array_t;
BEGIN
l_2d_grid (1) (1) := 100;
l_2d_grid (1) (2) := 120;
l_2d_grid (200) (206) := 200;

IF l_2d_grid (1)(2)

20.What is PL/SQL?
PL/SQL stands for procedural language extension to SQL. It supports procedural features of programming language and SQL both. It was developed by Oracle Corporation in early of 90’s to enhance the capabilities of SQL.

21. What is PL/SQL table? Why it is used?
Objects of type tables are called PL/SQL tables that are modeled as database table. We can also say that PL/SQL tables are a way to providing arrays. Arrays are like temporary tables in memory that are processed very quickly. PL/SQL tables are used to move bulk data. They simplifies moving collections of data.

22. What are the datatypes available in PL/SQL?
There are two types of datatypes in PL/SQL:
1. Scalar datatypes Example are NUMBER, VARCHAR2, DATE, CHAR, LONG, BOOLEAN etc.
2. Composite datatypes Example are RECORD, TABLE etc
23. What is the basic structure of PL/SQL?
PL/SQL uses BLOCK structure as its basic structure. Each PL/SQL program consists of SQL and PL/SQL statement which form a PL/SQL block.
PL/SQL block contains 3 sections.
1. The Declaration Section (optional)
2. The Execution Section (mandatory)
3. The Exception handling Section (optional)

24. What is the difference between FUNCTION, PROCEDURE AND PACKAGE in PL/SQL?
Function: The main purpose of a PL/SQL function is generally to compute and return a single value. A function has a return type in its specification and must return a value specified in that type.
Procedure: A procedure does not have a return type and should not return any value but it can have a return statement that simply stops its execution and returns to the caller. A procedure is used to return multiple values otherwise it is generally similar to a function.
Package: A package is schema object which groups logically related PL/SQL types , items and subprograms. You can also say that it is a group of functions, procedure, variables and record type statement. It provides modularity, due to this facility it aids application development. It is used to hide information from unauthorized users.

25.What is exception? What are the types of exceptions?
Exception is an error handling part of PL/SQL. There are two type of exceptions: pre_defined exception and user_defined exception.
26.How exception is different from error?
Whenever an Error occurs Exception arises. Error is a bug whereas exception is a warning or error condition.

27.What is the main reason behind using an index?
Faster access of data blocks in the table.

28. What are PL/SQL exceptions? Tell me any three.
1. Too_many_rows
2. No_Data_Found
3. Value_error
4. Zero_error etc.

29. What is the maximum number of triggers, you can apply on a single table?
12 triggers.

30.How many types of triggers exist in PL/SQL?
There are 12 types of triggers in PL/SQL that contains the combination of BEFORE, AFTER, ROW, TABLE, INSERT, UPDATE, DELETE and ALL keywords.
• BEFORE ALL ROW INSERT
• AFTER ALL ROW INSERT
• BEFORE INSERT
• AFTER INSERT etc.

31. What is stored Procedure?
A stored procedure is a sequence of statement or a named PL/SQL block which performs one or more specific functions. It is similar to a procedure in other programming languages. It is stored in the database and can be repeatedly executed. It is stored as schema object. It can be nested, invoked and parameterized.

32.How to execute a stored procedure?
There are two way to execute a stored procedure.
From the SQL prompt, write EXECUTE or EXEC followed by procedure_name.
1. EXECUTE or [EXEC] procedure_name;
Simply use the procedure name
1. procedure_name;

33. What are the advantages of stored procedure?
Modularity, extensibility, reusability, Maintainability and one time compilation.

34. What are the cursor attributes used in PL/SQL?
%ISOPEN: it checks whether the cursor is open or not.
%ROWCOUNT: returns the number of rows affected by DML operations: INSERT,DELETE,UPDATE,SELECT.
%FOUND: it checks whether cursor has fetched any row. If yes – TRUE.
%NOTFOUND: it checks whether cursor has fetched any row. If no – TRUE.

35. What is consistency?
Consistency simply means that each user sees the consistent view of the data.
Consider an example: there are two users A and B. A transfers money to B’s account. Here the changes are updated in A’s account (debit) but until it will be updated to B’s account (credit), till then other users can’t see the debit of A’s account. After the debit of A and credit of B, one can see the updates. That?s consistency.

36. What is cursor and why it is required?
A cursor is a temporary work area created in a system memory when an SQL statement is executed.
A cursor contains information on a select statement and the row of data accessed by it. This temporary work area stores the data retrieved from the database and manipulate this data. A cursor can hold more than one row, but can process only one row at a time. Cursor are required to process rows individually for queries.

37. How many types of cursors are available in PL/SQL?
There are two types of cursors in PL/SQL.
1. Implicit cursor, and
2. explicit cursor

38.What is a cursor? Define explicit and implicit cursor.
The oracle engine opens a work area for each SQL’s operations for its internal processing in order to execute SQL statements. This area is private to SQL’s operations and is called as a cursor.

Implicit cursor – If the oracle engine has opened a cursor for its internal processing, then it is implicit cursor.

Explicit cursor – It is also known as user defined cursor. When a user opens a cursor for processing data, the cursor is explicit cursor.
39.Explain about the cursor attributes.
Each cursor or cursor variable has four attributes:

%FOUND, %ISOPEN, %NOTFOUND and %ROWCOUNT

When appended to the cursor, these attributes return useful information about the execution of a data manipulation statement.
40.What are the restrictions of using cursor variables?
-PL/SQL tables cannot store cursor variables.
-Remote subprogram cannot return the value of a cursor variable.
41.What is a trigger in PLSQL?
A trigger is a PLSQL block that is executed whenever an event occurs. It fires implicitly whenever the triggering event happens, a trigger never accepts argument. A trigger cannot be used for a SELECT statement.
42.What are the triggers supported in oracle?
-DML triggers
-Instead of triggers
-DDL triggers
-Database event triggers

DML triggers

It is defined on a table and fires in response to an event like

– When a row is inserted to a table
– When a row is updated
– When a row is deleted

Instead of trigger

This trigger is created on views. You can either use Insert or Update or Delete or all three actions.
What are triggering attributes?
Triggering attributes are used to catch event when you want to identify or to perform certain actions.

They are as follows:

Inserting
Updating
Deleting
43.What is the difference between a function and a procedure in oracle?
A function always returns a value back to the calling block.
44.What are packages?
A package is an encapsulated collection of related schema objects. A package is compiled and then stored in the database’s data dictionary as a schema objects. These objects can be procedure, functions, variables, constants, cursors and exceptions.
45.Explain the difference between GRANT and REVOKE command.
GRANT command is used to allow a user to perform certain activities on the database. The REVOKE command disallows the user from performing certain activities.
Explain the difference between ROLLBACK and COMMIT commands.
The COMMIT command is used to save the modifications done to the database values by the DML commands.

ROLLBACK command is used to undo the changes made by the DML commands. This ensures the values that existed prior to the changes can be achieved.
46.Define Row level trigger.
Row level trigger is fired each time a row is affected by DML statements like Insert, Update and Delete. When no rows affected, the trigger is not executed at all.
47.Define Statement level triggers.
It is fired when statement affects rows in a table but the processing required is completely independent of the number of rows affected.
48.Define Joins and its types.
A join is a query that extracts corresponding rows from two or more tables, views or snapshots.

Types:

Equi-joins
Non-equi joins
Self joins
Outer joins

Equi-join – information from two or more tables are retrieved by using equality conditions.

Self joins – Self join is a join that relates to itself.

Outer joins – Outer join fetch the rows from two tables which matches the join condition and the rows which don’t match the join condition.

 

Python interview questions

Top most important Python interview questions and answers by Experts:

Here is a list of Top most important Python interview questions and answers by Experts.If you want to download Python interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Python interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Python ,Register for Python online training here.

 

1) What is Python? What are the benefits of using Python?
Python is a programming language with objects, modules, threads, exceptions and automatic memory management. The benefits of pythons are that it is simple and easy, portable, extensible, build-in data structure and it is an open source.
2) What is PEP 8?
PEP 8 is a coding convention, a set of recommendation, about how to write your Python code more readable.
3) What is pickling and unpickling?
Pickle module accepts any Python object and converts it into a string representation and dumps it into a file by using dump function, this process is called pickling. While the process of retrieving original Python objects from the stored string representation is called unpickling.
4) How Python is interpreted?
Python language is an interpreted language. Python program runs directly from the source code. It converts the source code that is written by the programmer into an intermediate language, which is again translated into machine language that has to be executed.
5) How memory is managed in Python?
• Python memory is managed by Python private heap space. All Python objects and data structures are located in a private heap. The programmer does not have an access to this private heap and interpreter takes care of this Python private heap.
• The allocation of Python heap space for Python objects is done by Python memory manager. The core API gives access to some tools for the programmer to code.
• Python also have an inbuilt garbage collector, which recycle all the unused memory and frees the memory and makes it available to the heap space.
6) What are the tools that help to find bugs or perform static analysis?
PyChecker is a static analysis tool that detects the bugs in Python source code and warns about the style and complexity of the bug. Pylint is another tool that verifies whether the module meets the coding standard.
7) What are Python decorators?
A Python decorator is a specific change that we make in Python syntax to alter functions easily.
8) What is the difference between list and tuple?
The difference between list and tuple is that list is mutable while tuple is not. Tuple can be hashed for e.g as a key for dictionaries.
9) How are arguments passed by value or by reference?
Everything in Python is an object and all variables hold references to the objects. The references values are according to the functions; as a result you cannot change the value of the references. However, you can change the objects if it is mutable.
10) What is Dict and List comprehensions are?
They are syntax constructions to ease the creation of a Dictionary or List based on existing iterable.
11) What are the built-in type does python provides?
There are mutable and Immutable types of Pythons built in types Mutable built-in types
• List
• Sets
• Dictionaries
Immutable built-in types
• Strings
• Tuples
• Numbers
12) What is namespace in Python?
In Python, every name introduced has a place where it lives and can be hooked for. This is known as namespace. It is like a box where a variable name is mapped to the object placed. Whenever the variable is searched out, this box will be searched, to get corresponding object.
13) What is lambda in Python?
It is a single expression anonymous function often used as inline function.
14) Why lambda forms in python does not have statements?
A lambda form in python does not have statements as it is used to make new function object and then return them at runtime.
15) What is pass in Python?
Pass means, no-operation Python statement, or in other words it is a place holder in compound statement, where there should be a blank left and nothing has to be written there.
16) In Python what are iterators?
In Python, iterators are used to iterate a group of elements, containers like list.
17) What is unittest in Python?
A unit testing framework in Python is known as unittest. It supports sharing of setups, automation testing, shutdown code for tests, aggregation of tests into collections etc.
18) In Python what is slicing?
A mechanism to select a range of items from sequence types like list, tuple, strings etc. is known as slicing.
19) What are generators in Python?
The way of implementing iterators are known as generators. It is a normal function except that it yields expression in the function.
20) What is docstring in Python?
A Python documentation string is known as docstring, it is a way of documenting Python functions, modules and classes. 
21) How can you copy an object in Python?
To copy an object in Python, you can try copy.copy () or copy.deepcopy() for the general case. You cannot copy all objects but most of them.
22) What is negative index in Python?
Python sequences can be index in positive and negative numbers. For positive index, 0 is the first index, 1 is the second index and so forth. For negative index, (-1) is the last index and (-2) is the second last index and so forth.
23) How you can convert a number to a string?
In order to convert a number into a string, use the inbuilt function str(). If you want a octal or hexadecimal representation, use the inbuilt function oct() or hex().
24) What is the difference between Xrange and range?
Xrange returns the xrange object while range returns the list, and uses the same memory and no matter what the range size is.
25) What is module and package in Python?
In Python, module is the way to structure program. Each Python program file is a module, which imports other modules like objects and attributes.
The folder of Python program is a package of modules. A package can have modules or subfolders.
26) What is Python?
Python is an object oriented and open-source programming language, which supports structured and functional built-in data structures. With a placid and easy-to -understand syntax, Python allows code reuse and modularity of programs. The built-in DS in Python makes it a wonderful option for Rapid Application Development (RAD). The coding language also encourages faster editing, testing and debugging with no compilation steps.
27) What are the standard data types supported by Python?
It supports six data types:
1. Number : object stored as numeric value
2. String : object stored as string
3. Tuple : data stored in the form of sequence of immutable objects
4. Dictionary (dicts): associates one thing to another irrespective of the type of data, most useful container (called hashes in C and Java)
5. List : data stored in the form of a list sequence
6. Set (frozenset): unordered collection of distinct objects
28) Explain built-in sequence types in Python Programming?
It provides two built in sequence types-
1. Mutable Type : objects whose value can be changed after creation, example: sets, items in the list, dictionary
2. Immutable type : objects whose value cannot be changed once created, example: number, Boolean, tuple, string
29) Explain the use of iterator in Python?
Python coding uses Iterator to implement the iterator protocol, which enables traversing trough containers and group of elements like list.The two important methods include _iter_() returning the iterator object and next() method for traversal.
30) Define Python slicing ?
The process of extracting a range of elements from lists, arrays, tuples and custom Python data structures as well. It works on a general start and stop method: slice (start, stop, increment)
31) How can you compare two lists in Python?
We can simply perform it using compare function – cmp(rvhtechlist1, rvhtechlist2)
def cmp(rvhtechlist1, rvhtechlist2):
for val in rvhtechlist1:
if val in rvhtechlist2:
returnTrue
returnFalse
32) What is the use of // operator?
‘//’ is a Floor Divisionoperator, which divides two operands with the result as quotient showing only digits before decimal point.For instance, 6//3 = 2 and 6.0//3.0 = 2.0
33) Define docstring in Python with example.
A string literal occurring as the first statement (like a comment) in any module, class, function or method is referred as docstring in Python. This kind of string becomes the _doc_ special attribute of the object and provides an easy way to document a particular code segment. Most modules do contain docstrings and thus, the functions and classes extracted from the module also consist of docstrings.
34) What function randomizes the items of a list in place?
Using shuffle() function
For instance:
import randomize
lst = [2, 18, 8, 4];
randomize.shuffle(lst)
print “Shuffled list : “, lst
random.shuffle(list)
print “Reshuffled list : “, list
35) List five benefits of using Python?
1. Having the built-in data types, Python saves programmer’s time and effort from declaring variables. It has a powerful dict ionary and polymorphic list for automatic declaration. It also ensures better code reusability
2. Highly accessible and easy-to-learn for beginners and a strong ‘glue’ for advanced Professionals consisting fo several high-level modules and operations not performed by other programming languages.
3. Allows easy readability due to use of square brackets for most functions and indexes
4. Python requires no explicit memory management as the interpreter itself allocates the memory to new variables and free them automatically.
5. Python comprises a huge standard library for most Internet platforms like Email, HTML, FTP and other WWW platforms.
36) What are the disadvantages of using Python?
1. Python is slow as compared to other programming languages. Although, this slow pace doesn’t matter much, at times, we need other language to handle performance-critical situations.
2. It is ineffective on mobile platforms; fewer mobile applications are developed using python. The main reason behind its instability on smartphones is Python’s weakest security. There are no good secure cases available for Python until now
3. Due to dynamic typing, Programmers face design restrictions while using the language. The code needs more and more testing before putting it into action since the errors pop up only during runtime.
4. Unlike JavaScript, Python’s features like concurrency and parallelism are not developed for elegant use.
37) Explain the use of split function?
The split() function in Python breaks a string into shorter strings using the defined separator. It renders a list of all words present in the string.
>>> y= ‘true,false,none’
>>> y.split(‘,’)
Result: (‘true’, ‘false’, ‘none’)
What is the use of generators in Python?
Generators are primarily used to return multiple items but one after the other. They are used for iteration in Python and for calculating large result sets. The generator function halts until the next time request is placed.
One of the best uses of generators in Python coding is implementing callback operation with reduced effort and time. They replace callback with iteration. Through the generator approach, programmers are saved from writing a separate callback function and pass it to work-function as it can applying ‘for’ loop around the generator.
38) How to create a multidimensional list in Python?
As the name suggests, a multidimensional list is the concept of a list holding another list, applying to many such lists. It can be one easily done by creating single dimensional list and filling each element with a newly created list.
39) What is lambda?
lambda is a powerful concept used in conjunction with other functions like filter(), map(), reduce(). The major use of lambda construct is
to create anonymous functions during runtime, which can be used where they are created. Such functions are actually known as throw-away functions in Python. The general syntax is lambda argument_list:expression.
For instance:
>>> def rvhtech1 = lambda i, n : i+n
>>> rvhtech(2,2)
4
Using filter()
>> rvhtech= [1, 6, 11, 21, 29, 18, 24]
>> print filter (lambda x: x%3 = = 0, rvhtech)
[6, 21, 18, 24]
40) Define Pass in Python?
The pass statement in Python is equivalent to a null operation and a placeholder, wherein nothing takes place after its execution. It is mostly used at places where you can let your code go even if it isn’t written yet.
If you would set out a pass after the code, it won’t run. The syntax is pass
41) How to perform Unit Testing in Python?
Referred to as PyUnit, the python Unit testing framework-unittest supports automated testing, seggregating test into collections, shutdown testing code and testing independence from reporting framework. The unittest module makes use of TestCase class for holding and preparing test routines and clearing them after the successful execution.
42) Define Python tools for finding bugs and performing static analysis?
. PyChecker is an excellent bug finder tool in Python, which performs static analysis unlike C/C++ and Java. It also notifies the programmers about the complexity and style of the code. In addition, there is another tool, PyLint for checking the coding standards including the code line length, variable names and whether the interfaces declared are fully executed or not.
43) How to convert a string into list?
Using the function list(string). For instance:
>>> list(‘rvhtech’) in your lines of code will return
[‘i’, ‘n’, ‘t’, ‘e’, ‘l’, ‘l’, ‘i’, ‘p’, ‘a’, ‘a’, ‘t’]
In Python, strings behave like list in various ways. Like, you can access individual characters of a string
>> > y = “rvhtech”
>>> s[2]
‘t’
44) What OS do Python support?
Linux, Windows, Mac OS X, IRIX, Compaq, Solaris

45) Define docstring in Python.
A string literal occurring as the first statement (like a comment) in any module, class, function or method is referred as docstring in Python. This kind of string becomes the _doc_ special attribute of the object and provides an easy way to document a particular code segment. Most modules do contain docstrings and thus, the functions and classes extracted from the module also consist of docstrings.
46) Name the optional clauses used in a ‘try-except’ statement in Python?
While Python exception handling is a bit different from Java, the former provides an option of using a try-except clause where the programmer receives a detailed error message without termination the program. Sometimes, along with the problem, this try-except statement offers a solution to deal with the error.
The language also provides try-except-finally and try-except-else blocks.
47)  How to use PYTHOPATH?
PYTHONPATH is the environment variable consisting of directories. $PYTHONPATH is used for searching the actual list of folders for libraries.
48) Define ‘self’ in Python?
self is a reference to the current instance of the class. It is just like ‘this’ in JavaScript. While we create an instance of a class, that instance has its data, which internally passes a reference to it‘self’

49) Define CGI?
Common Gateway Interface support in Python is an external gateway to interact with HTTP server and other information servers. It consists of a series of standards and instructions defining the exchange of information between a custom script and web server. The HTTP server puts all important and useful information concerning the request in the script environment and then run the script and sends it back in the form of output to the client.
50) What is PYTHONSTARTUP and how is it used?
PYTHONSTARTUP is yet another environment variable to test the Python file in the interpreter using interactive mode. The script file is executed even before the first prompt is seen. Additionally, it also allows reloading of the same script file after being modified in the external editor.
51) What is the return value of trunc() in Python?
truc() returns integer value. Uses the _trunc_ method
>>> import rvhtech
rvhtech.trunc(4.34)
4

52) How to convert a string to an object in Python?
To convert string into object, Python provides a function eval(string). It allows the Python code to run in itself
53) Is there any function to change case of all letters in the string?
Yes, Python supports a function swapcase(), which swaps the current letter case of the string. This method returns a copy of the string with the string case swapped.
54) What is pickling and unpickling in Python?
The process of Pickling relates to the Pickle module. Pickle is a general module that acquires a python object and converts it into string. It further dumps that string object into a file by using dump () function.
Pickle comprises two methods:
Dump (): dumps an object to a file object
and Load (): loads an object from a file object
Unpickling is the reacquiring process to perform retrieval of the original Python object from the stored string for reuse.
55) What are the rules for local and global variables in Python?
Local and global variables – If a variable is defined outside function then it is implicitly global. If variable is assigned new value inside the function means it is local…
We will continuously update python interview questions and answers in this site with real time scenarios by python experts.You can request for python interview questions and answers pdf in the Contact us form.

Ios interview questions

 

Top most important ios interview questions and answers by Experts:

Here is a list of Top most important ios interview questions and answers by Experts.If you want to download ios interview questions pdf free ,you can register with RVH techguru. Our experts prepared these ios interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in ios ,Register for ios online training here.

 

1. Where can you test Apple iPhone apps if you don’t have the device?
iOS Simulator can be used to test mobile applications. Xcode tool that comes along with iOS SDK includes Xcode IDE as well as the iOS Simulator. Xcode also includes all required tools and frameworks for building iOS apps. However, it is strongly recommended to test the app on the real device before publishing it.
2. Does iOS support multitasking?
iOS 4 and above supports multi-tasking and allows apps to remain in the background until they are launched again or until they are terminated.
3. Which JSON framework is supported by iOS?
SBJson framework is supported by iOS. It is a JSON parser and generator for Objective-C. SBJson provides flexible APIs and additional control that makes JSON handling easier.
4. What are the tools required to develop iOS applications?
 iOS development requires Intel-based Macintosh computer and iOS SDK.
5. Name the framework that is used to construct application’s user interface for iOS.
The UIKit framework is used to develop application’s user interface for iOS. UIKit framework provides event handling, drawing model, windows, views, and controls specifically designed for a touch screen interface.
6. Name the application thread from where UIKit classes should be used?
UIKit classes should be used only from an application’s main thread. Note: The derived classes of UIResponder and the classes which manipulate application’s user interface should be used from application’s main thread.
7. Which API is used to write test scripts that help in exercising the application’s user interface elements?
UI Automation API is used to automate test procedures. Tests scripts are written in JavaScript to the UI Automation API. This in turn simulates user interaction with the application and returns log information to the host computer.
8. Why an app on iOS device behaves differently when running in foreground than in background?
 An application behaves differently when running in foreground than in background because of the limitation of resources on iOS devices.
9. How can an operating system improve battery life while running an app?
An app is notified whenever the operating system moves the apps between foreground and background. The operating system improves battery life while it bounds what your app can do in the background. This also improves the user experience with foreground app.
10. Which framework delivers event to custom object when app is in foreground?
The UIKit infrastructure takes care of delivering events to custom objects. As an app developer, you have to override methods in the appropriate objects to process those events.
11. When an app is said to be in not running state?
An app is said to be in ‘not running’ state when:
– it is not launched.
– it gets terminated by the system during running.
12. Assume that your app is running in the foreground but is currently not receiving events. In which sate it would be in?
 An app will be in InActive state if it is running in the foreground but is currently not receiving events. An app stays in InActive state only briefly as it transitions to a different state.
13. Give example scenarios when an application goes into InActive state?
An app can get into InActive state when the user locks the screen or the system prompts the user to respond to some event e.g. SMS message, incoming call etc.
14. When an app is said to be in active state?
An app is said to be in active state when it is running in foreground and is receiving events.
15. Name the app sate which it reaches briefly on its way to being suspended.
An app enters background state briefly on its way to being suspended.
16. Assume that an app is not in foreground but is still executing code. In which state will it be in?
Background state.
17. An app is loaded into memory but is not executing any code. In which state will it be in?
An app is said to be in suspended state when it is still in memory but is not executing any code.
18. Assume that system is running low on memory. What can system do for suspended apps?
In case system is running low on memory, the system may purge suspended apps without notice.
19. How can you respond to state transitions on your app?
On state transitions can be responded to state changes in an appropriate way by calling corresponding methods on app’s delegate object.
For example:
applicationDidBecomeActive method can be used to prepare to run as the foreground app.
applicationDidEnterBackground method can be used to execute some code when app is running in the background and may be suspended at any time.
applicationWillEnterForeground method can be used to execute some code when your app is moving out of the background
applicationWillTerminate method is called when your app is being terminated.
20. List down app’s state transitions when it gets launched.
Before the launch of an app, it is said to be in not running state.
When an app is launched, it moves to the active or background state, after transitioning briefly through the inactive state.
21. Who calls the main function of you app during the app launch cycle?
During app launching, the system creates a main thread for the app and calls the app’s main function on that main thread. The Xcode project’s default main function hands over control to the UIKit framework, which takes care of initializing the app before it is run.
22. What is the use of controller object UIApplication?
Controller object UIApplication is used without subclassing to manage the application event loop.
It coordinates other high-level app behaviors.
It works along with the app delegate object which contains app-level logic.

23. Which object is create by UIApplicationMain function at app launch time?
The app delegate object is created by UIApplicationMain function at app launch time. The app delegate object’s main job is to handle state transitions within the app.
24. How is the app delegate is declared by Xcode project templates?
 App delegate is declared as a subclass of UIResponder by Xcode project templates.
25. What happens if IApplication object does not handle an event?
In such case the event will be dispatched to your app delegate for processing.
26. Which app specific objects store the app’s content?
Data model objects are app specific objects and store app’s content. Apps can also use document objects to manage some or all of their data model objects.
27. Are document objects required for an application? What does they offer?
Document objects are not required but are very useful in grouping data that belongs in a single file or file package.
28. Which object manage the presentation of app’s content on the screen?
 View controller objects takes care of the presentation of app’s content on the screen. A view controller is used to manage a single view along with the collection of subviews. It makes its views visible by installing them in the app’s window.
29. Which is the super class of all view controller objects?
UIViewController class. The functionality for loading views, presenting them, rotating them in response to device rotations, and several other standard system behaviors are provided by UIViewController class.
30. What is the purpose of UIWindow object?
The presentation of one or more views on a screen is coordinated by UIWindow object.
31. How do you change the content of your app in order to change the views displayed in the corresponding window?
To change the content of your app, you use a view controller to change the views displayed in the corresponding window. Remember, window itself is never replaced.
32. Define view object.
Views along with controls are used to provide visual representation of the app content. View is an object that draws content in a designated rectangular area and it responds to events within that area.
33. You wish to define your custom view. Which class will be subclassed?
Custom views can be defined by subclassing UIView.
34. Apart from incorporating views and controls, what else an app can incorporate?
Apart from incorporating views and controls, an app can also incorporate Core Animation layers into its view and control hierarchies.
35. What are layer objects and what do they represent?
Layer objects are data objects which represent visual content. Layer objects are used by views to render their content. Custom layer objects can also be added to the interface to implement complex animations and other types of sophisticated visual effects.
36. Enlist the Latest IOS Development Patform?
The recent iOS Development platforms are as follows:
iOS 9.2 beta 2 Build version: 13C5060d
IOS 9.1 Build Version: 13B143
37. Explain Fast Enumeration.
Fast enumeration is a iOS Programming Language feature that enables you to enumerate over the contents of a collection. It will also make your code execute your code faster due to internal implementation which gets reduced message sending overheads and increased pipelining potential.
38. Explain ARC.
ARC represents Automatic Reference Counting. It is a Compiler level feature that simplifies the process of managing the lifetimes of Objects in Objective – C. ARC evaluates the Lifetime requirements of Objects and automatically includes appropriate Methods to be called during Compilation.
39. Explain Mutable and Immutable Types in Objective C Programming Language.
Mutable Types means you can modify the Contents later when you feel the need. However, when an Object is marked as Immutable, it implies that the data cannot be modified later after it has been initialized. Therefore, the stored values are Constant here.
Example:
NSString, NSArray values cannot be altered after initialization.
40. What is Garbage Collection?
Garbage Collection is a Memory Management feature. It manages the allocation and release of the memory to your applications. When the garbage collector performs a collection, it checks for objects in the managed heap that are not executed by the applications.
41. Explain xib.
.xib is a file extension that is associated with Interface Builder files. It is a graphics software that is used to test, develop and design the User Interfaces of different software products. Such extension files also contains development time format files that includes interface files created with the interface builder softwares.
42. Which Programming Languages are used for iOS Development?
The languages used for iOS development are as follows:
1. Objective-C
2. .NET
3. C
4. HTML5
5. JavaScript
6. Swift
49. Explain App ID.
It is primarily used to identify one or more apps from a Unique Development team. It consists of a string divided into two parts. The string includes a Team ID and a Bundle ID Search String with a separator as a period. The Team ID is allocated by Apple and is different for every development team. A Bundle ID Search String is supplied by the App Developer.
50. Explain usage of struct.
struct is a Datatype in C Programming Language that enables encapsulation of other pieces of data into a single cohesive unit. It is similar to an object but in C Programming Language.
51. What is an Object?
Objects are essentially the variables that are of Class types. Objects are basic Run-Time entities in an Object oriented system. They may represent a place, a bank account or a person.
52. Enlist the methods to achieve Concurrency in iOS.
The following listed are the methods to achieve concurrency functionality in iOS:
1. Threads
2. Dispatch Queues
3. Operation Queues
53. What is Cocoa?
Cocoa is an Application Development Environment for Mac OS X Operating System and iOS. It includes Compilations of a Runtime System, Object-Oriented Software Libraries and an Integrated Development Environment.
54. What is a Framework?
It is basically a conceptual structure or a scheme with an intension to support the expansion of the structure into something useful. A Framework is a layered structure indicating what kind of programs can or should be built and how they would interact. Frameworks includes actual programs that mentions programming interfaces and programming tools for working with the frameworks.
55. Explain keywords alloc and new.
The alloc keyword is used to create a New Memory Location in the System. However, it does not initialize it. In case of New keyword, it also helps to create a New Memory Location in the system. However, it can initialize the Contents unlike the alloc keyword.
56. What are Selectors in Objective-C?
A Selector in Objective C can be used to refer the name of a method when it is used in a Source-Code message to an Object. It also refers to the unique identifiers that can replace the Name when the Source Code is being Compiled. All the methods that have the same name have the same selector.
57. Enlist Frameworks for Cocoa.
The Frameworks developed for Cocoa are listed as follows:
1. Foundation
2. Application Kit
58. What is Bundle ID?
The Bundle ID uniquely defines every iOS Application. It is specified in Xcode. It is a Search String which is supplied by the Application Developer to match either the Bundle ID of a Single Application or a Set of Bundle IDs for a Group of Applications.
59. What is a Class?
The entire set of data of an object can be made a user-defined data type using a class. Objects are basically variables of Class type. Once a Class has been defined, it is possible to create multiple Objects of its type. A Class is a collection of Objects of similar type.
60. Explain the difference between Inheritance and Category.
Category enables to add methods only. It does not allow the inclusion of Data Members unlike Inheritance where both the Data and Methods can be added. Category includes Complete Application in its Scope whereas Inheritance’s scope is only within that particular File.
61. Explain App Bundle.
During iOS application development, Xcode packages it as a bundle. A Bundle is a file directory that combines related resources together in one place. It contains the Application Executable File and supports Resource Files such as Localized Content, Image Files and Application Icons.
62. What is Swift?
Swift is a programming language for development of applications for OS X, iOS, watchOS, and tvOS. These applications are developed using C and Objective-C. It does not have the constraints of C Programming. It has features for easier development and provides more flexibility.
63. What is a Protocol in Objective-C Programming Language?
A Protocol is used to define a list of required optional methods that a class needs to implement. If a class adopts a protocol, it must implement all the needed methods in the protocols it adopts. It is identical to an Interface in Java and also to a purely Virtual Class in C++. Cocoa uses protocols to support interprocess communication through Objective-C messages.
64. Explain Formal Protocols.
Formal Protocols enables defining an Interface for a Set of Methods without any implementation. It is useful with DistributedObjects as they allow defining a protocol for communication between objects.
65. What is Polymorphism?
It enables a methods to exhibit different behaviours under different instances. The task of creating a Function or an Operator behave differently in different instances is known as Operator Overloading which is an implementation of Polymorphism.
66. Differentiate between Release and Pool Drain.
The release keyword is used to free a memory location in the system which is not being utilized. The drain keyword is used to release the NSAutoreleasePool.
67. What is a Collection?
A Collection is a Foundation Framework Class that is used to Manage and Store the group of Objects. The primary role of a Collection is to store Objects in the form of either a Set, a Dictionary or an Array.
68. Explain the significance of AutoRelease.
AutoRelease: When you send an Object AutoRelease message, it gets added to the Local AutoRelease Pool. When the AutoRelease Pool gets destroyed, the Object will receive a Release
message. The Garbage Collection functionality will destroy the Object if it has the RetainCount as Zero.
69. What is the First Responder and Responder Chain.
A Responder Chain is a hierarchy of Objects that can respond to the events received. The first object in the ResponderChain is called the First Responder.
70. Explain Web Services?
The Web Services are the Application Components which enables communication using Open Protocols. These Web Services are Self – Describing and Self – Contained. Web Services can be found out by using UDDI. The base for development of Web Services functionality is Extensible Markup Language (XML).

We will continuously update  ios interview questions and answers in this site with real time scenarios by ios experts.You can request for ios interview questions and answers pdf  in the Contact us form.

Devops interview questions

Top most important Devops interview questions and answers by Experts:

Here is a list of Top most important Devops interview questions and answers by Experts.If you want to download Devops interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Devops interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Devops ,Register for Devops online training here.

1. How does HTTP work?
The HTTP protocol works in a client and server model like most other protocols. A web browser using which a request is initiated is called as a client and a web server software which responds to that request is called a server. World Wide Web Consortium and the Internet Engineering Task Force are two important spokes in the standardization of the HTTP protocol. HTTP allows improvement of its request and response with the help of intermediates, for example a gateway, a proxy, or a tunnel. The resources that can be requested using the HTTP protocol, are made available using a certain type of URI (Uniform Resource Identifier) called a URL (Uniform Resource Locator). TCP (Transmission Control Protocol) is used to establish a connection to the application layer port 80 used by HTTP.
2. Explain your understanding and expertise on both the software development side and the technical operations side of an organization you’ve worked for in the past.
DevOps engineers almost always work in a 24/7 business critical online environment. I was adaptable to on-call duties and able to take up real-time, live-system responsibility. I successfully automated processes to support continuous software deployments. I have experience with public/private clouds, tools like Chef or Puppet, scripting and automation with tools like Python and PHP, and a background in Agile.
3. Discuss your experience building bridges between IT Ops, QA and development.
DevOps is all about effective communication and collaboration. I’ve been able to deal with production issues from the development and operations sides, effectively straddling the two worlds. I’m less interested in finding blame or playing the hero than I am with ensuring that all of the moving parts come together.
4. What types of testing are needed?
Software teams will often look for the “fair weather” path to system completion; that is, they start from an assumption that software will usually work and only occasionally fail. I believe to practice defensive programming in a pragmatic way, which often means assuming that the code will fail and planning for those failures. I try to incorporate unit test strategy, use of test harnesses, early load testing; network simulation, A/B and multi-variate testing etc.
5. Give me an example of how you would handle projects?
As a professional with managerial responsibilities, I would demonstrate a clear understanding of DevOps project management tactics and also work with teams to set objectives, streamline workflow, maintain scope, research and introduce new tools or frameworks, translate requirements into workflow and follow up. I would resort to CI, release management and other tools to keep interdisciplinary projects on track.
6. What’s your career objective in your role as a DevOps engineer?
My passion is breaking down the barriers and building and improving processes, so that the engineering and operations teams work better and smarter. That’s why I love DevOps. It’s an opportunity to be involved in the entire delivery system from start to finish.
7. How would you make software deployable?
The ability to script the installation and reconfiguration of software systems is essential towards controlled and automated change. Although there is an increasing trend for new software to enable this, older systems and products suffer from the assumption that changes would be infrequent and minor, and so make automated changes difficult. As a professional who appreciates the need to expose configuration and settings in a manner accessible to automation, I will work with concepts like Inversion of Control (IoC) and Dependency Injection, scripted installation, test harnesses, separation of concerns, command-line tools, and infrastructure as code.
8. What is the one most important thing DevOps helps do?
The most important thing DevOps helps do is to get the changes into production as quickly as possible while minimizing risks in software quality assurance and compliance. That is the primary objective of DevOps. However, there are many other positive side-effects to DevOps. For example, clearer communication and better working relationships between teams which creates a less stressful working environment.
9. Which scripting languages do you think are most important for a DevOps engineer?
As far as scripting languages go, the simpler the better. In fact, the language itself isn’t as important as understanding design patterns and development paradigms such as procedural, object-oriented, or functional programming.
10. How do you expect you would be required to multitask as a DevOps professional?
I believe I’ll be expected to:
1. Focus attention on bridging communication gaps between Development and Operations teams.
2. Understand system design from an architect’s perspective, software development from a developer’s perspective,operations and infrastructure from the perspective of a seasoned Systems Administrator.
3. Execute – to be able to actually do what needs to be done.
11. What testing is necessary to ensure that a new service is ready for production?
DevOps is all about continuous testing throughout the process, starting with development through to production. Everyone shares the testing responsibility. This ensures that developers are delivering code that doesn’t have any errors and is of high quality, and it also helps everyone leverage their time most effectively.
12. What’s a PTR in DNS?
Pointer records are used to map a network interface (IP) to a host name. These are primarily used for reverse DNS. Reverse DNS is setup very similar to how normal (forward) DNS is setup. When you delegate the DNS forward, the owner of the domain tells the registrar to let your domain use specific name servers.
13. Describe two-factor authentication?
Two-factor authentication is a security process in which the user provides two means of identification from separate categories of credentials; one is typically a physical token, such as a card, and the other is typically something memorized, such as a security code.
14. Tell us about the CI tools that you are familiar with?
The premise of CI is to get feedback as early as possible because the earlier you get feedback, the less things cost to fix. Popular open source tools include Hudson, Jenkins, CruiseControl and CruiseControl.NET. Commercial tools include ThoughtWorks’ Go, Urbancode’s Anthill Pro, Jetbrains’ Team City and Microsoft’s Team Foundation Server.
15. What are the advantages of NoSQL database over RDBMS?
The advantages are:
1. Less need for ETL
2. Support for unstructured text
3. Ability to handle change over time
4. Breadth of functionality
5. Ability to scale horizontally
6. Support for multiple data structures
7. Choice of vendors
16. What is an MX record in DNS?
MX records are mail exchange records used for determining the priority of email servers for a domain. The lowest priority email server is the first destination for email. If the lowest priority email server is unavailable, mail will be sent to the higher priority email servers.
17. What is the difference between RAID 0 and RAID 1?
RAID 1 offers redundancy through mirroring, i.e., data is written identically to two drives. RAID 0 offers no redundancy and instead uses striping, i.e., data is split across all the drives. This means RAID 0 offers no fault tolerance; if any of the constituent drives fails, the RAID unit fails.
18. How would you prepare for a migration?
Tips to answer: This question evaluates your experience of real projects with all the awkwardness and complexity they bring. Include terms like cut-over, dress rehearsals, roll-back and roll-forward, DNS solutions, feature toggles, branch by abstraction, and automation in your answer. Developing greenfield systems with little or no existing technology in place is always easier than having to deal with legacy components and configuration. As a candidate if you appreciate that any interesting software system will in effect be under constant migration, you will appear suitable for the role.
19. What’s your systems background?
Tips to answer: Some DevOps jobs require extensive systems knowledge, including server clustering and highly concurrent systems. As a DevOps engineer, you need to analyze system capabilities and implement upgrades for efficiency, scalability and stability, or resilience. It is recommended that you have a solid knowledge of OSes and supporting technologies, like network security, virtual private networks and proxy server configuration.
DevOps relies on virtualization for rapid workload provisioning and allocating compute resources to new VMs to support the next rollout, so it is useful to have in-depth knowledge around popular hypervisors. This should ideally include backup, migration and lifecycle management tactics to protect, optimize and eventually recover computing resources. Some environments may emphasize microservices software development tailored for virtual containers. Operations expertise must include extensive knowledge of systems management tools like Microsoft System Center, Puppet, Nagios and Chef. DevOps jobs with an emphasis on operations require detailed problem-solving, troubleshooting and analytical skills.
20. What DevOp tools have you worked with?
Tips to answer: Software configuration management and build/release (version control) tools, including Apache Subversion, Mercurial, Fossil and others, help document change requests. Developers can more easily follow the company’s best practices and policies while software changes.
Continuous integration (CI) tools such as Rational Build Forge, Jenkins and Semaphore merge all developer copies of the working code into a central version. These tools are important for larger groups where teams of developers work on the same codebase simultaneously. QA experts use code analyzers to test software for bugs, security and performance. If you’ve used HP’s Fortify Static Code Analyzer, talk about how it identified security vulnerabilities in coding languages. Also speak about tools like GrammaTech’s CodeSonar that you used to identify memory leaks, buffer underruns and other defects for C/C++ and Java code. It is essential that you have adequate command of the principal languages like Ruby, C#, .NET, Perl, Python, Java, PHP, Windows PowerShell, and are comfortable with the associated OS environments Windows, Linux and Unix.
21. How much have you interacted with cloud based software development?
Tips to answer: Share your knowledge around use of cloud platforms, provisioning new instances, coding new software iterations with the cloud provider’s APIs or software development kits, configuring clusters to scale computing capacity, managing workload lifecycles and so on. This is the perfect opportunity to discuss container-based cloud instances as an alternative to conventional VMs. Event-based cloud computing, such as AWS Lambda offers another approach to software development, a boon for experienced DevOps candidates. In your interview, mention experience handling big data, which uses highly scalable cloud infrastructures to tackle complex computing tasks.
22. What other tools are you familiar with that might help you in this role?
Tips to answer: DevOps is so diverse and inclusive that it rarely ends with coding, testing and systems. A DevOps project might rely on database platforms like SQL or NoSQL, data structure servers like Redis, or configuration and management issue tracking systems like Redmine. Web applications are popular for modern enterprises, making a background with Web servers, like Microsoft Internet Information Services, Apache Tomcat or other Web servers, beneficial. Make sure to bring across that you are familiar with Agile application lifecycle management techniques and tools.
23. Are you familiar with just Linux or have you worked with Windows environments as well?
Tips to answer: Demonstrate as much as you can, a clear understanding of both the environments including the key tools.
24. How can you reduce load time of a dynamic website?
Tips to answer: Talk about Webpage optimization, cached web pages, quality web hosting , compressed text files, Apache fine tuning.
25. Describe your experience implementing continuous deployment?
Tips to answer: Answer with a comprehensive list of all the tools that you used. Include inferences of the challenges you faced and how you tackled them.
26. How would you ensure traceability?
Tips to answer: This question probes your attitude to metrics, logging, transaction journeys, and reporting. You should be able to identify that metric, monitoring and logging needs to be a core part of the software system, and that without them, the software is essentially not going to be able to appear maintained and diagnosed. Include words like SysLog, Splunk, error tracking, Nagios, SCOM, Avicode in your answer.
27. What was your greatest achievement on a recent project?
Tips to answer: Make sure you demonstrate your perfect understanding of both development and operations. Do not let your answer lean towards one particular skillset ignoring the other. Even if you have worked in an environment wherein you had to work more with one skillset, assure the intervewer that you are agile according to the needs of your organization.
28. What problems did you face and how did you solve them in a way that met the team’s goals?
Tips to answer: This questions aims to find out how much you can handle stress and non-conformity at work. Talk about your leadership skills to handle and motivate the team to solve problems together.Talk about CI, release management and other tools to keep interdisciplinary projects on track.
29. Are you more Dev or Ops?
Tips to answer: This is probably the trickiest question that you might face in the interview. Emphasize the fact that this depends a lot on the job, the company you are working for and the skills of people involved. You really have to be able to alternate between both sides of the fence at any given time. Talk about your experience and demonstrate how you are agile with both.
30. What special training or education did it require for you to become a DevOps engineer?
Tips to answer: DevOps is more of a mind-set or philosophy rather than a skill-set. The typical technical skills associated with DevOps Engineers today is Linux systems administration, scripting, and experience with one of the many continuous integration or configuration management tools like Jenkins and Chef. What it all boils down to is that whatever skill-sets you have, while important, are not as important as having the ability to learn new skills quickly to meet the needs. It’s all about pattern recognition, and having the ability to merge your experiences with current requirements. Proficiency in Windows and Linux systems administration, script development, an understanding of structured programming and object-oriented design, and experience creating and consuming RESTful APIs would take one a long way.
31) Explain what is DevOps?
It is a newly emerging term in IT field, which is nothing but a practice that emphasizes the collaboration and communication of both software developers and other information-technology (IT) professionals. It focuses on delivering software product faster and lowering the failure rate of releases.
32) Mention what are the key aspects or principle behind DevOps?
The key aspects or principle behind DevOps is
• Infrastructure as code
• Continuous deployment
• Automation
• Monitoring
• Security
33) What are the core operations of DevOps with application development and with infrastructure?
The core operations of DevOps with
Application development
• Code building
• Code coverage
• Unit testing
• Packaging
• Deployment
With infrastructure
• Provisioning
• Configuration
• Orchestration
• Deployment
34) Explain how “Infrastructure of code” is processed or executed in AWS?
In AWS,
• The code for infrastructure will be in simple JSON format
• This JSON code will be organized into files called templates
• This templates can be deployed on AWS and then managed as stacks
• Later the CloudFormation service will do the Creating, deleting, updating, etc. operation in the stack
35) Explain which scripting language is most important for a DevOps engineer?
A simpler scripting language will be better for a DevOps engineer. Python seems to be very popular.

36) Explain how DevOps is helpful to developers?
DevOps can be helpful to developers to fix the bug and implement new features quickly. It also helps for clearer communication between the team members.
37) List out some popular tools for DevOps?
Some of the popular tools for DevOps are
• Jenkins
• Nagios
• Monit
• ELK (Elasticsearch, Logstash, Kibana)
• io
• Jenkins
• Docker
• Ansible
• Git
• Collectd/Collectl
38) Mention at what instance have you used the SSH?
I have used SSH to log into a remote machine and work on the command line. Beside this, I have also used it to tunnel into the system in order to facilitate secure encrypted communications between two untrusted hosts over an insecure network.
39) Explain how would you handle revision (version) control?
My approach to handle revision control would be to post the code on SourceForge or GitHub so everyone can view it. Also, I will post the checklist from the last revision to make sure that any unsolved issues are resolved.
40) Mention what are the types of Http requests?
The types of Http requests are
• GET
• HEAD
• PUT
• POST
• PATCH
• DELETE
• TRACE
• CONNECT
• OPTIONS

 

We will continuously update devops interview questions and answers in this site with real time scenarios by devops experts.You can request for devops interview questions and answers pdf in the Contact us form.

 

Business analyst interview questions

Top most important Business analyst interview questions and answers by Experts

Here is a list of Top most important Business analyst interview questions and answers by Experts.If you want to download Business analyst interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Business analyst interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Business Analyst,Register for Business Analyst online training here.

 

1) What is a flowchart and why it is important?
Flowchart shows complete flow of system through symbols and diagrams. It is important, because it makes the system easy to understand for developers and all concerned people.
2) Define Use Case Model?
Use case model shows sequence of events and stream of actions regarding any process performed by an actor.
3) What does UML stand for?
It stands for Unified Modeling Language.
4) Do you think Activity Diagram is important and how?
As the name implies, activity diagram is all about system activities. Main purpose of activity diagram is to show various activities taking place in an organization in different departments.
5) Can you name the two types of diagrams heavily used in your field?
The two diagrams are Use Case Diagram and Collaboration Diagram
6) Do you know what is meant by an alternate flow in a use case?
It is the alternative solution or activity in a use case that should be followed in case of any failure in the system.
7) What are exceptions?
These are the unexpected situations or results in an application.
8) What are extends?
Extends are actions that must take place in a use case.
9) Name the two documents related to a use case?
The two documents are FRD (Functional Requirement Document) and SDD (System Design Document).
10) What is the difference between Business Analyst and Business Analysis?
Business Analysis is the process performed by the Business Analyst.
11) As a business analyst, what tools, you think are more helpful?
There are many but I mostly use, Rational Tools, MS Visio, MS Word, MS Excel, Power Point, MS Project.
12) In your previous experience, what kind of documents you have created?
I have worked on, Functional Specification Documents, Technical Specification Documents, Business Requirements Documents, Use Case Diagram etc.
13) What INVEST stands for?
INVEST means Independent, Negotiable, Valuable, Estimable, Sized Appropriately, Testable. It can assist project managers and technical team to deliver quality products/services.
14) Define SaaS?
SaaS means Software as a Service. It is related to cloud computing. It is different from other software as you don’t need this type of software to be installed on your machine. All you need is an Internet connection and a Web Browser to use it.
15) What steps are required to develop a product from an idea?

You have to perform, Market Analysis, Competitor Analysis, SWOT Analysis, Personas, Strategic Vision and Feature Set, Prioritize Features, Use Cases, SDLC, Storyboards, Test Cases, Monitoring, Scalability.
16) What do you think is better, the Waterfall Model or Spiral Model?
It all depends on the type and scope of the project. Also a life cycle model is selected on the basis of organizational culture and various other scenarios to develop the system.
17) How can you explain the user centered design methodology?
It all depends on the end users. In such scenario, we develop the system with a user’s point of view. Who are the end users, what they require etc. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users.
18) How do you define Personas?
Personas are used instead of real users that assist developers and technical team to judge the user behavior in different scenarios, more clearly. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users.
19) Define Application Usability?
Application usability is actually the quality of the system that makes the system useful for its end users. System’s usability is good if it is capable of achieving users’ goals. Personas are basically social roles, performed by any actor or character. It is derived from a Latin word meaning character. In marketing terminology, it represents group of customers/end users.
20) Explain in your words, what is database transaction?
When we perform any activity in a database, such as addition, deletion, modification, searching etc. is said to be a database transaction.
21) Define OLTP Systems?
OLPT stands for On-Line Transaction Processing; such systems are capable to perform database transactions and are meant to provide good speed for database transactions. These systems are mainly used for data entry and retrieving data from the database.
22) Do you have any idea about Pugh Matrix?
Pugh Matrix is used to decide about the most optimal and alternate solutions. This technique is now a standard part of Six Sigma technique. It is also known as problem or design matrix.
23) What FMEA stands for?
It means Failure Mode and Effects Analysis. It is a failure analysis, that is used mainly in product development, system engineering and operations management. This analysis is performed to figure out various failure modes and their severity in any system.
24) What is a 100-point method?
This method is used to assign priority to different steps in a process. Each group member is supposed to assign points to different steps. In the end all the points for each step are calculated. The step having the highest points has the highest priority.
25) Do you know what 8-omega is?
It is a business framework that is mainly being adopted by firms and organizations for the betterment of their business. Its key factors are Strategy, People, Process, Technology.
26) Can you define mis-use case?
It is a term derived from use-case. Unlike use case, a mis-use case is something that shows -what kind of malicious activities can be performed by an actor that may result in system failure.
27) What is SQUARE stands for?
SQUARE stands for Security Quality Requirements Engineering. It is one of the software engineering steps that mainly focus on documenting the security requirements of the system.
28) What is Pareto Analysis?
It is a decision making technique, also known as 80/20 rule. It is used for quality control and defect resolution. It explains few factors that can be responsible for big problems. It is named as 80/20 rule, because as per this rule, 80 % effects in the system, arises from 20 % causes.
29) Do you have any idea about Agile Manifesto?
Agile Manifesto is a guide for software developers about the development principles to ensure iterative solutions.
30) What BPMN stands for?
It is Business Process Model and Notation. It is a graphical representation of business processes.
31) Define BPMN Gateway?
BPMN Gateway is a processing modeling component that is used to control flow of interaction, sequence of processes.
32) Name the five basic elements’ categories in BPMN?
They are Flow Objects, Data, Connecting Objects, Swimlanes and Artifacts.
33) Have you ever used Kano Analysis in your previous jobs and how do you define it?
Yes, I have used Kano Analysis in one of my previous jobs. Kano Analysis is used to analyze a system in terms of its requirements to identify its impact on customers’ satisfaction.
34) How many key areas are there in a Kano Analysis?
They are three in number, namely as Unexpected Delighters, Performance Attributes and Must Have Attributes.
35) Define Pair-Choice Technique?
The pair-Choice Technique is used to give priority to various items in a process. It is mainly used when distinctive stakeholders are involved in the project. This technique asks from the group to compare each item with the other and select the one having highest priority.
36) Do you have suggestions to make an effective use-case model?
Yes, I would suggest making two separate diagrams. One serves as a use-case and the other serves as an actor diagram. So that we can highlight all the possible activities in a use case & in actor diagram and then we can merge both the diagrams to get an effective use-case diagram.
37) How many types of actor can be there in a Use-Case?
There are primary and secondary actors. Primary actors start the process and secondary actors assist them. Moreover, actors can be of four types such as Human, System, Hardware and Timer.
38) Define BCG Matrix?
The Boston Consulting Group (BCG) matrix is developed to analyze several of business processes and new product offerings from companies. It is a useful tool that can be used in portfolio analysis, strategic management, product management, and brand marketing.
39) How can you differentiate between pool and swimlane?
A swimlane is related to group activities on an activity diagram while a pool is dedicated activity to a single person.
40) Differentiate between Fish Model and V Model?
Fish model is comparatively very costly and time consuming, while, V model requires less time and cost. Moreover, Fish model is used when there were no ambiguities in the customers’ requirements. Otherwise, other model is preferred.
41) How do you manage frequently changing customers’ requirements while developing any system?
As a business analyst, I would develop a document stating clearly that no change will be accepted after a certain period of time and get it signed by the user.
42) Define Use Case points?
Use Case points are used to evaluate the cost of work done to develop the system.
43) What does PEST stand for?
It means Political, Economic, Social, and Technological. It is used to analyze business environment, in which it has to be operated.
44) Name the four key phases of business development?
They are Forming, Storming, Norming, and Performing.
45) Define Benchmarking?
Benchmarking is about measuring performance of an organization to compete in the industry. In this process a company may measure its policies, performance, rules and other measures.
46) What do we mean by SWEBOK?
It means Software Engineering Body of Knowledge.
47) What do you know about GAP Analysis?
It is a process of comparing and determining the difference between two things or processes.
48) Define Agile?
Agile is basically a technique that uses several light-weight methodologies such as Rapid Application Development (RAD), Extreme Programming (XP) and SCRUM. All these methodologies focus on the development of iterative solutions.
49) Define Scrum Method?
It is one of the agile methods, used to develop iterative information systems. In this method a small team works on the assigned tasks for a time period of 30 days usually.
50) What does JAD stand for?
It means Joint Application Development.
51) What do you see as the key skills of a business analyst?
There are several skills required to be a successful Business Analyst. They are not just linited to your work. These skills even include your personal qualities and approach towards your clients. Some of the key skills expected from any Business Analyst are:
• Customer Service skills
• Strategic thinking approach
• Good communication skills
• Collaborating with other employees and colleagues
• Analytical skills
• Leadership skills
• Customer oriented
• Ability to drive and adapt to the changes.
52) What is a use case model?
A business analysis presentation of the steps involved in defining the interactions between a user (actor) and a system (computer system) is termed as use case model. It gives details on the interactions and sets the expectations of how the user will work within the system. The use case model consist of 2 main elements:
• Use case diagram – It is a graphical representation that details which actors can operate which use cases
• Use case description – It is a detailed textual step by step presentation of interactions and dialogue between the actor and the system.
53) What is an activity diagram and why is it significant?
An activity diagram is a simple and intuitive type of a flow chart which enables analysts to present a robust and easy visual of the workflow of a business use case. The objective of activity diagram is to show various activities taking place in an organization in different departments. Different departments in any organization like HR, Accounts, Sales, etc. have access to the screens that relate to their fields but activity diagrams highlight the differences in the departments which help the developers when they code and design. The important elements in Activity diagram are initial nodes, control flows, activities, decisions, guard conditions, a fork and join and end nodes.
54) Define SaaS?
SaaS stands for Software as a Service. It is related to cloud computing. It is an online software for which you just need an internet connection and a web browser. Unlike other softwares, you need not have to install it on your machine. SaaS is a software delivery model in which the software, and usually the data, are hosted “in the cloud”.
55) What is a BCG Matrix?
To evaluate and analyze the business units and product offerings of corporations, the Boston Consulting Group developed the BCG Matrix in 1986. Companies use this simple 2 x 2 matrix as an analytical tool in portfolio analysis, strategic management, product management, and brand marketing.

Question Marks: These are the business having low market share in a fast growing market. As the market growth is strong, there is a potential for Question Marks to grow. They require large amounts of capital to gain in market share.
Stars: These businesses enjoy large market share in fast growing market. Stars boast a prominent market position for the time. They require investment of resources to maintain or increase their market share if the market continues to grow.
Dogs: These businesses have a low market share in a slow growing and mature market. They are small projects with small amount of capital allocated to support them. They barely make enough to sustain themselves and are the weakest of situations.
Cash Cows: These businesses enjoy a relatively high market share with a low market growth. It represents the already matured market and the business is well established and positioned in the market. These businesses generate revenue which is in excess of what is required for sustenance.
56) What is PEST analysis and what is its importance?
PEST basically stands for Political, Economic, Social and Technological. PEST analysis is used to assess the above four external factors in relation to your business situation. It is beneficial for your business as them help in understanding how these 4 factors will affect your business in the long term. A detailed understanding of PEST analysis can be obtained from our blog.
57) What do you know about GAP Analysis and what is its importance?
GAP analysis is the process of comparing the current state and the proposed state of any business and its functionalities. It comes under the Enterprise Analysis which is a knowledge area of a business Analyst. It helps in determining what steps need to be taken to meet the proposed state requirements for the business. In simple language it can be defined as a gap between 2 questions – ‘Where we are?’ and ‘Where we want to be?’
This analysis can be conducted for:
• How the Current business process activities and steps are vs how will be the future business process activities and steps.
• How the data that a system provides to an interface is now vs how the data needs to be provided in the future
• How well a business meets certain goals and metrics now versus the targeted goals and metrics in the future.
58) What is UML modeling?
UML is Unified Modeling Language. UML is the standard that the industry uses for visualizing, documenting and constructing various components of a system. It is a modeling standard used primarily for software development, but can also be used for other conceptual models such as describing job roles, business processes and organizational functions. For Business Analysts UML is being able to represent requirements with use cases, class diagram and state diagrams. For Business Analysts, the important part of understanding UML is in understanding the diagram tools and when and how to use them best.
59) What is the importance of a flow chart?
A flow chart is a tool that provides a graphical representation of a process. This chart will make a system easy to understand for everyone that is involved with the project that is underway. If you have a massive and complex project with many entities, data, data sources, data destinations and processes involved, a data flow chart is one of the most effective ways of making sense of all that data. The flowchart mostly concerns itself with the flow of data through the system. It is popularly used in Structured Systems Analysis and Design.

 

Sharepoint Interview Questions

Top most important Sharepoint interview questions and answers by Experts:

Here is a list of Top most important Sharepoint interview questions and answers by Experts.If you want to download Sharepoint interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Sharepoint interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Sharepoint ,Register for Sharepoint online training here.

 

1) What is the difference between method activity and event activity in WF ?

A method activity is one that performs an action, such as creating or updating a task. An event activity is one that runs in response to an action occurring.

2) What does SPWeb.EnsureUser method do?

Checks whether the specified login name belongs to a valid user of the Web site, and if the login name does not already exist, adds it to the Web site. e.g SPUser usr = myWeb.EnsureUser(“mmangaldas”);

3) While creating a Webpart, which is the ideal location to Initialize my new controls ?

Override the CreateChildControls method to include your new controls. To make sure that the new controls are initialized.. call ‘EnsureChildControls’ in the webparts Render method. You can control the exact Rendering of your controls by calling the .Render method in the webparts Render method.

4) How to query from multiple lists ?

Use SPSiteDataQuery to fetch data from multiple lists. more details..

5) How Does SharePoint work?

The browser sends a DAV packet to IIS asking to perform a document check in. PKMDASL.DLL, an ISAPI DLL, parses the packet and sees that it has the proprietary INVOKE command. Because of the existence of this command, the packet is passed off to msdmserv.exe, who in turn processes the packet and uses EXOLEDB to access the WSS, perform the operation and send the results back to the user in the form of XML

6) What is the difference between Syncronous & Asyncronous events?

Syncronous calls ending with ‘ing’ E.g. ItemDeleting Event Handler code execute BEFORE action is committed WSS waits for code to return Option to cancel and return error code
Asyncronous calls ending with ‘ed’ E.g. ItemDeleted Event Handler code executes AFTER action is committed WSS does not wait for code to return Executed in its own Worker thread.

7) What is ServerUpdate() ?

Any changes in the list, i.e. new addition or modification of an item.. the operation is complete by calling the Update method.But if a List is set to maintain versions .. and you are editing an item, but don’t want to save it as a new version, then use the SystemUpdate method instead and pass in ‘false’ as the parameter.

8) What is query.ViewAttributes OR How can you force SPQuery to return results from all the folders of the list?

If you use SPQuery on any SPlist .. it will bring back results from the current folder only. If you want to get results from all the folders in the list.. then you need to specify the scope of the query by the use of ViewAttributes..
e.g. query.ViewAttributes = “Scope=\”Recursive\””;

9) What are the two base classes a WebPart you are going to use within SharePoint 2007 can inherit from?

There are two base classes that a WebPart which is going to be consumed by SharePoint can inherit from, either the SharePoint WebPart Base class or the ASP.NET 2.0 WebPart base class. When inheriting from the SharePoint WebPart Base class your derived WebPart class will inherit from Microsoft.SharePoint.WebPartPages.WebPart. When inheriting from the ASP.NET 2.0 WebPart base class your derived WebPart class will inherit from System.Web.UI.WebControls.WebParts.WebPart. It is considered good practice to use the ASP.NET WebPart base class since the old base class is meant for backwards compatibility with previous version of SharePoint, however there are four exception when it is better to leverage functionality from the SharePoint WebPart base class:

Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure

10) What are the differences between the two base classes and what are the inherit benefits of using one over another?

The difference is the Microsoft.SharePoint.WebPartPages.WebPart base class is meant for backward compatibility with previous versions of SharePoint. The benefit of using the SharePoint WebPart base class is it supported:

Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure

ASP.NET 2.0 WebParts are generally considered better to use because SharePoint is built upon the ASP.NET 2.0 web architecture. Inheriting from the ASP.NET 2.0 base class offers you features that inherit to ASP.NET 2.0, such as embedding resources as opposed to use ClassResources for deployment of said types.

11) What is the GAC?

The GAC stands for the global assembly cache. It is the machine wide code cache which will give custom binaries place into the full trust code group for SharePoint. Certain SharePoint assets, such as Feature Receivers need full trust to run correctly, and therefore are put into the GAC. You should always try to avoid deployment to the GAC as much as possible since it will possibly allow development code to do more than it was intended to do.

12) What is strong naming (signing) a WebPart assembly file mean?

Signing an assembly with a strong name (a.k.a strong naming) uses a cryptographic key pair that gives a unique identity to a component that is being built. This identity can then be referred throughout the rest of the environment. In order to installassemblies into the GAC, they must be strongly named. After signing, the binary will have a public key token identifier which can be use to register the component in various other places on the server.

13) What are safe controls, and what type of information, is placed in that element in a SharePoint web.config file?

When you deploy a WebPart to SharePoint, you must first make it as a safe control to use within SharePoint in the web.config file. Entries made in the safe controls element of SharePoint are encountered by the SharePointHandler object and will be loaded in the SharePoint environment properly, those not will not be loaded and will throw an error.

In the generic safe control entry (this is general, there could be more), there is generally the Assembly name, the namespace, the public key token numeric, the typename, and the safe declaration (whether it is safe or not). There are other optional elements.

14) What is the CreateChildControls() method? How can you use it to do something simple like displaying a Label control?

The CreateChildControls method in WebParts is used to notify the WebPart that there are children controls that should be output for rendering. Basically, it will add any child ASP.NET controls that are called instantiating each control with its relevant properties set, wire any relevant event handlers to the control, etc. Then the add method of the control class will add the control to the controls collection. In the relevant WebPart render method, the EnsureChildControls method can be called (or set to false if no child controls should be called) to ensure that the CreateChildControls method is run. When using CreateChildControls it implies that your WebPart contains a composition of child controls.

In order to create something like a label control in Create, you would create a new label control using the new keyword, set the various properties of the control like Visible=True and ForeColor = Color.Red, and then use Controls.Add(myLabelControl) to add the control to the controls collection. Then you can declare EnsureChildControls in the Render method of the WebPart.

15) What does the RenderContents method do in an ASP.NET 2.0 WebPart?

The render contents method will render the WebPart content to the writer, usually an HtmlTextWriter since WebParts will output to an HTML stream. RenderContents is used to tell how the controls that are going to be displayed in the WebPart should be rendered on the page.

*** Side Question: I got asked what the difference between CreateChildControls and the RenderContents method. The CreateChildControls method is used to add controls to the WebPart, and the RenderContents method is used to tell the page framework how to render the control into HTML to display on a page.

16) What is the WebPartManager sealed class? What is its purpose?

The WebPartManager sealed class is responsible for managing everything occurring on a WebPart page, such as the WebParts (controls), events, and misc. functionality that will occur in WebPartZones. For example, the WebPartManager is responsible for the functionality that is provided when you are working with moving a WebPart from WebPartZone to WebPartZone. It is known as the “the central class of the Web Part Control Set.”

*** Side Question: I got asked how many WebPartManager controls should be on a page. In order to have WebParts on a page there has to be just one WebPartManager control to manage all the WebParts on the page.

17) What is a SPSite and SPWeb object, and what is the difference between each of the objects?

The SPSite object represents a collection of sites (site collection [a top level sites and all its subsites]). The SPWeb object represents an instance SharePoint Web, and SPWeb object contains things like the actual content. A SPSite object contains the various subsites and the information regarding them.

18) How would you go about getting a reference to a site?

oSPSite = new  SPSite(“http:/server”);
oSPWeb = oSPSite.OpenWeb();

19) What does a SPWebApplication object represent?

The SPWebApplication objects represents a SharePoint Web Application, which essentially is an IIS virtual server. Using the class you can instigate high level operations, such as getting all the features of an entire Web Application instance, or doing high level creation operations like creating new Web Applications through code.

20) Would you use SPWebApplication to get information like the SMTP address of the SharePoint site?

Yes, since this is a Web Application level setting. You would iterate through each SPWebApplication in the SPWebApplication collection, and then use the appropriate property calls (OutboundMailServiceInstance) in order to return settings regarding the mail service such as the SMTP address.

Side Question: I got asked if there are other ways to send emails from SharePoint. The answer is yes, there is. You can use the SendMail method from the SPutility class to send simple emails, however it is not as robust as using the System.Net.Mail functionality since it doesn’t allow things like setting priorities on the email.

21) How do you connect (reference) to a SharePoint list, and how do you insert a new List Item?

[csharp]
using(SPSite mySite = new SPSite(“yourserver”))
{
using(SPWeb myWeb = mySite.OpenWeb())
{
SPList interviewList = myWeb.Lists[“listtoinsert”];
SPListItem newItem = interviewList.Items.Add();
newItem[“interview”] = “interview”;
newItem.Update();
}
}
[/csharp]

22) How would you loop using SPList through all SharePont List items, assuming you know the name (in a string value) of the list you want to iterate through, and already have all the site code written?

SPList interviewList = myWeb.Lists[“listtoiterate”];
foreach (SPListItem interview  in interviewList)
{
// Do Something
}

23) How do you return SharePoint List items using SharePoint web services?

In order to retrieve list items from a SharePoint list through Web Services, you should use the lists.asmx web service by establishing a web reference in Visual Studio. The lists.asmx exposes the GetListItems method, which will allow the return of the full content of the list in an XML node. It will take parameters like the GUID of the name of the list you are querying against, the GUID of the view you are going to query, etc.

Side Question: I got asked how I built queries with the lists.asmx web service. In order to build queries with this service, one of the parameters that the GetListItems method exposes is the option to build a CAML query. There are other ways to do this as well, but that was how I answered it.

24) What is the difference between an Internet and an intranet site?

An internet site is a normal site that anyone on the internet can access (e.g., www.msn.com, www.microsoft.com, etc.). You can set up a site for your company that can be accessed by anyone without any user name and password.

An intranet (or internal network), though hosted on the Web, can only be accessed by people who are members of the network. They need to have a login and password that was assigned to them when they were added to the site by the site administrator

25) What are the various kinds of roles the users can have?

A user can be assigned one of the following roles
Reader – Has read-only access to the Web site.
Contributor – Can add content to existing document libraries and lists.
Web Designer – Can create lists and document libraries and customize pages in the Web site.
Administrator – Has full control of the Web site.

26) How customizable is the user-to-user access?

User permissions apply to an entire Web, not to documents themselves. However, you can have additional sub webs that can optionally have their own permissions. Each user can be given any of four default roles. Additional roles can be defined by the administrator.

27) Can each user have access to their own calendar?

Yes there are two ways to do this,
by creating a calendar for each user, or
by creating a calendar with a view for each user

28) Can SharePoint be linked to a SQL database?

This is possible via a custom application, but it not natively supported by SharePoint or SQL Server.

29) What does partial trust mean the Web Part developer?

If an assembly is installed into the BIN directory, the code must be ensured that provides error handling in the event that required permissions are not available. Otherwise, unhandled security exceptions may cause the Web Part to fail and may affect page rendering on the page where the Web Part appears

30) When retrieving List items using SharePoint Web Services, how do you specify explicit credentials to be passed to access the list items?

In order to specify explicit credentials with a Web Service, you generally instantiate the web service, and then using the credentials properties of the Web Service object you use the System.Net.NetworkCredential class to specify the username, password, and domain that you wish to pass when making the web service call and operations.

*** Side Question: I got asked when you should state the credentials in code. You must state the credentials you are going to pass to the web service before you call any of the methods of the web service, otherwise the call will fail.

31) What is CAML, and why would you use it?

CAML stands for Collaborative Application Markup Language. CAML is an XML based language which provides data constructs that build up the SharePoint fields, view, and is used for table definition during site provisioning. CAML is responsible for rending data and the resulting HTML that is output to the user in SharePoint. CAML can be used for a variety of circumstances, overall is used to query, build and customize SharePoint based sites. A general use would be building a CAML query in a SharePoint WebPart in order to retrieve values from a SharePoint list.

32) What is impersonation, and when would you use impersonation?

Impersonation can basically provide the functionality of executing something in the context of a different identity, for example assigning an account to users with anonymous access. You would use impersonation in order to access resources on behalf of the user with a different account, that normally, that wouldn’t be able to access or execute something.

33) What is the IDesignTimeHtmlProvider interface, and when can you use it in WebParts?

The IDesignTimeHtmlProvider interface uses the function GetDesignTimeHtml() which can contain your relevant render methods. It was helpful to use in 2003 since it allowed your WebPart to have a preview while a page was edited in FrontPage with the Webpart on it, because the GetDesignTimeHtml() method contains the HTML for the designer to render.

34) What are WebPart properties, and what are some of the attributes you see when declaring WebPart properties in code?

WebPart properties are just like ASP.NET control properties, they are used to interact with and specify attributes that should be applied to a WebPart by a user. Some of the attributes you see with ASP.NET 2.0 properties are WebDescription, WebDisplayName, Category, Personalizable, and WebBrowsable. Although most of these properties come from the System.Web.UI.WebControls.WebParts class, ones like Category come out of System.ComponentModel namespace.

35) Why are properties important in WebPart development, and how have you exploited them in past development projects? What must each custom property have?

Properties are important because WebParts allow levels of personalization for each user. WebPart properties make it possible for a user to interact, adjust, and increase overall experience value with the programmatic assets that you develop without having the need to use an external editor or right any code. A very simple example of exploiting a property would be something like allowing the user to change the text on the WebPart design interface so that they can display whatever string of text they desire.

Each custom property that you have must have the appropriate get and set accessor methods.

36) What are ClassResources? How do you reference and deploy resources with an ASP.NET 2.0 WebPart?

ClassResources are used when inheriting from the SharePoint.WebPart.WebPartPages.WebPart base class, and are defined in the SharePoint solution file as things that should be stored in the wpresources directory on the server. It is a helpful directory to use in order to deploy custom images. In ASP.NET 2.0, typically things such as images are referenced by embedding them as resources within an assembly. The good part about ClassResources is they can help to eliminate recompiles to change small interface adjustments or alterations to external JavaScript files.

37) What is a SharePoint Solution File? How does it differ from WebPart .cab files in legacy development? What does it contain?

A SharePoint solution file is essentially a .cabinet file with all a developers ustom componets suffixed with a .wsp extension that aids in deployment. The big difference with SharePoint solution files is is that a solution:

allows deployment to all WFE’s in a farm is highly manageable from the interface allowing deployment, retraction, and versioning

38) What is a .ddf file and what does it have to do with SharePoint Solution creation?

A .ddf file is a data directive file and is used when building the SharePoint solution bundle specifying the source files and their destination locations. The important thing for someone to understand is that the .ddf file will be passed as a parameter to the MAKECAB utility to orchestrate construction of the SharePoint solution file.

39) What file does a SharePoint solution package use to orchestrate (describe) its packaged contents?

The solution Manifest.XML file.

40) What deployment mechanism can you use to instigate Code Access Security attributes for your WebParts?

SharePoint solution files can add in order to handle code access security deployment issues. This is done in the element in the SharePoint solution manifest.XML, which makes it easier to get assemblies the appropriate permissions in order to operate in the bin directory of the web application.

41) What is a SharePoint Feature? What files are used to define a feature?

A SharePoint Feature is a functional component that can be activated and deactivate at various scopes throughout a SharePoint instances, such as at the farm, site collection, web, etc. Features have their own receiver architecture, which allow you to trap events such as when a feature is installing, uninstalling, activated, or deactivated. They are helpful because they allow ease of upgrades and versioning.

The two files that are used to define a feature are the feature.xml and manifest file. The feature XML file defines the actual feature and will make SharePoint aware of the installed feature. The manifest file contains details about the feature such as functionality.

Side Question: I got asked how the introduction of features has changed the concept of site definitions. SharePoint features are important when understanding the architecture of site definitions, since the ONET.XML file has been vastly truncated since it has several feature stapled on it.

42) What types of SharePoint assets can be deployed with a SharePoint feature?

Features can do a lot. For example, you could deploy

Simple site customizations
Custom site navigation
WebParts
pages
list types
list instances
event handlers
workflows
custom actions

43) What are event receivers?

Event receivers are classes that inherit from the SpItemEventReciever or SPListEventReciever base class (both of which derive out of the abstract base class SPEventRecieverBase), and provide the option of responding to events as they occur within SharePoint, such as adding an item or deleting an item.

44) When would you use an event receiver?

Since event receivers respond to events, you could use a receiver for something as simple as canceling an action, such as deleting a document library by using the Cancel property. This would essentially prevent users from deleting any documents if you wanted to maintain retention of stored data.

45) What base class do event receivers inherit from?

Event receivers either inherit from the SPListEventReciever base class or the SPItemEventReciever base class, both which derive from the abstract base class SPEventReceiverBase.

 

46) How could you append a string to the title of a site when it is provisioned?

In the OnActivated event:

SPWeb site = siteCollection.RootWeb;

site.Title += “interview”;

site.Update();

47) Can an event receiver be deployed through a SharePoint feature?      

Yes.

48) What is a content type?

A content type is an information blueprint basically that can be re-used throughout a SharePoint environment for defining things like metadata and associated behaviors. It is basically an extension of a SharePoint list, however makes it portable for use throughout an instance regardless of where the instantiation occurs, ergo has location independence. Multiple content types can exist in one document library assuming that the appropriate document library settings are enabled. The content type will contain things like the metadata, listform pages, workflows, templates (if a document content type), and associated custom written functionality.

49) Can a content type have receivers associated with it?

Yes, a content type can have an event receiver associated with it, either inheriting from the SPListEventReciever base class for list level events, or inheriting from the SPItemEventReciever base class. Whenever the content type is instantiated, it will be subject to the event receivers that are associated with it.

50) What two files are typically (this is kept generally) included when developing a content type, and what is the purpose of each?

There is generally the main content type file that holds things like the content type ID, name, group, description, and version. There is also the ContentType.Fields file which contains the fields to include in the content type that has the ID, Type, Name, DisplayName, StaticName, Hidden, Required, and Sealed elements. They are related by the FieldRefs element in the main content type file.

51) What is an ancestral type and what does it have to do with content types?

An ancestral type is the base type that the content type is deriving from, such as Document (0×0101). The ancestral type will define the metadata fields that are included with the custom content type.

52) Can a list definition be derived from a custom content type?

Yes, a list definition can derive from a content type which can be seen in the schema.XML of the list definition in the element.

 

53) What is a Field Control?

Field controls are simple ASP.NET 2.0 server controls that provide the basic field functionality of SharePoint. They provide basic general functionality such as displaying or editing list data as it appears on SharePoint list pages.

54) What base class do custom Field Controls inherit from?

This varies. Generally, custom field controls inherit from the Microsoft.SharePoint.WebControls.BaseFieldControl namespace, but you can inherit from the default field controls.

55) How does one deploy new SharePoint site definitions so that they are made aware to the SharePoint system?

The best way to deploy site definitions in the SharePoint 2007 framework is to use a SharePoint solution file, so that the new sitedefinition is automatically populated to all WFE’s in the SharePoint farm.

56) What is an ancestral type and what does it have to do with content types?

An ancestral type is the base type that the content type is deriving from, such as Document (0×0101). The ancestral type will define the metadata fields that are included with the custom content type.

57) Can a list definition be derived from a custom content type?

Yes, a list definition can derive from a content type which can be seen in the schema.XML of the list definition in the element.

58) When creating a list definition, how can you create an instance of the list?

You can create a new instance of a list by creating an instance.XML file

59) What is a Field Control?

Field controls are simple ASP.NET 2.0 server controls that provide the basic field functionality of SharePoint. They provide basic general functionality such as displaying or editing list data as it appears on SharePoint list pages.

60) What base class do custom Field Controls inherit from?

This varies. Generally, custom field controls inherit from the Microsoft.SharePoint.WebControls.BaseFieldControl namespace, but you can inherit from the default field controls.

61) Can multiple SharePoint installs point to the same DB?

Multiple SharePoint installs can use the same database server. Not literally the same database on that server. That server must be SQL Server 2000 or SQL Server 2005. It cannot be Oracle or another vendor.

62) How to create links to the mapped network drives?

Creating links to mapped drives in WSS v3 or MOSS 2007 can be done via the new content type for .lnk files.

63) What does AllowUnsafeUpdates do ?
If your code modifies Windows SharePoint Services data in some way, you may need to allow unsafe updates on the Web site, without requiring a security validation. You can do by setting the AllowUnsafeUpdates property.

64) What does RunWithElevatedPrivileges do?
There are certain object model calls model that require site-administration privileges. To bypass access-denied error, we use RunWithElevatedPrivileges property when request is initiated by a nonprivileged user. We can successfully make calls into the object model by calling the RunWithElevatedPrivileges method provided by the SPSecurity class.

65)  What does SPWeb.EnsureUser method do?
Checks whether the specified login name belongs to a valid user of the Web site, and if the login name does not already exist, adds it to the Web site.

e.g SPUser usr = myWeb.EnsureUser(“hitenders”);

66) What is a SPSite and SPWeb object, and what is the difference between each of the objects?
The SPSite object represents a collection of sites (site collection [a top level site and all its subsites]). The SPWeb object represents an instance SharePoint Web, and SPWeb object contains things like the actual content. A SPSite object contains the various subsites and the information regarding them.

67) What does a SPWebApplication object represent?
The SPWebApplication objects represents a SharePoint Web Application, which essentially is an IIS virtual server. Using the class you can instigate high level operations, such as getting all the features of an entire Web Application instance, or doing high level creation operations like creating new Web Applications through code.

68) Would you use SPWebApplication to get information like the SMTP address of the SharePoint site?
Yes, since this is a Web Application level setting. You would iterate through each SPWebApplication in the SPWebApplication collection, and then use the appropriate property calls (OutboundMailServiceInstance) in order to return settings regarding the mail service such as the SMTP address.

69) How do you return SharePoint List items using SharePoint web services?
In order to retrieve list items from a SharePoint list through Web Services, you should use the lists.asmx web service by establishing a web reference in Visual Studio. The lists.asmx exposes the GetListItems method, which will allow the return of the full content of the list in an XML node. It will take parameters like the GUID of the name of the list you are querying against, the GUID of the view you are going to query, etc.
Side Question: I got asked how I built queries with the lists.asmx web service. In order to build queries with this service, one of the parameters that the GetListItems method exposes is the option to build a CAML query. There are other ways to do this as well, but that was how I answered it.

70) When retrieving List items using SharePoint Web Services, how do you specify explicit credentials to be passed to access the list items?
In order to specify explicit credentials with a Web Service, you generally instantiate the web service, and then using the credentials properties of the Web Service object you use the System.Net.NetworkCredential class to specify the username, password, and domain that you wish to pass when making the web service call and operations.

71) What is CAML, and why would you use it?
CAML stands for Collaborative Application Markup Language. CAML is an XML based language which provides data constructs that build up the SharePoint fields, view, and is used for table definition during site provisioning. CAML is responsible for rending data and the resulting HTML that is output to the user in SharePoint. CAML can be used for a variety of circumstances, overall is used to query, build and customize SharePoint based sites. A general use would be building a CAML query in a SharePoint WebPart in order to retrieve values from a SharePoint list.

72) What is impersonation, and when would you use impersonation?
Impersonation can basically provide the functionality of executing something in the context of a different identity, for example assigning an account to users with anonymous access. You would use impersonation in order to access resources on behalf of the user with a different account, that normally, that wouldn’t be able to access or execute something.

73) What are WebPart properties, and what are some of the attributes you see when declaring WebPart properties in code?
WebPart properties are just like ASP.NET control properties, they are used to interact with and specify attributes that should be applied to a WebPart by a user. Some of the attributes you see with ASP.NET 2.0 properties are WebDescription, WebDisplayName, Category, Personalizable, and WebBrowsable. Although most of these properties come from the System.Web.UI.WebControls.WebParts class, ones like Category come out of System.ComponentModel namespace.

74) Why are properties important in WebPart development, and how have you exploited them in past development projects? What must each custom property have?
Properties are important because WebParts allow levels of personalization for each user. WebPart properties make it possible for a user to interact, adjust, and increase overall experience value with the programmatic assets that you develop without having the need to use an external editor or right any code. A very simple example of exploiting a property would be something like allowing the user to change the text on the WebPart design interface so that they can display whatever string of text they desire.

Each custom property that you have must have the appropriate get and set accessor methods.

75) What are ClassResources? How do you reference and deploy resources with an ASP.NET 2.0 WebPart?
ClassResources are used when inheriting from the SharePoint.WebPart.WebPartPages.WebPart base class, and are defined in the SharePoint solution file as things that should be stored in the wpresources directory on the server. It is a helpful directory to use in order to deploy custom images. In ASP.NET 2.0, typically things such as images are referenced by embedding them as resources within an assembly. The good part about ClassResources is they can help to eliminate recompiles to change small interface adjustments or alterations to external JavaScript files.

76) What is a SharePoint Solution File? How does it differ from WebPart .cab files in legacy development? What does it contain?
A SharePoint solution file is essentially a .cabinet file with all a developers ustom componets suffixed with a .wsp extension that aids in deployment. The big difference with SharePoint solution files is is that a solution:

allows deployment to all WFE’s in a farm
is highly manageable from the interface allowing deployment, retraction, and versioning
Can package all types of assets like site definitions, feature definitions (and associated components), Webparts, etc.
Can provide Code Access Security provisioning to avoid GAC deployments
And much more..

77) What is a .ddf file and what does it have to do with SharePoint Solution creation?
A .ddf file is a data directive file and is used when building the SharePoint solution bundle specifying the source files and their destination locations. The important thing for someone to understand is that the .ddf file will be passed as a parameter to the MAKECAB utility to orchestrate construction of the SharePoint solution file.

78) What file does a SharePoint solution package use to orchestrate (describe) its packaged contents?
The solution Manifest.XML file.

79) What deployment mechanism can you use to instigate Code Access Security attributes for your WebParts?
SharePoint solution files can add in order to handle code access security deployment issues. This is done in the element in the SharePoint solution manifest.XML, which makes it easier to get assemblies the appropriate permissions in order to operate in the bin directory of the web application.

80) What are event receivers?
Event receivers are classes that inherit from the SpItemEventReciever or SPListEventReciever base class (both of which derive out of the abstract base class SPEventRecieverBase), and provide the option of responding to events as they occur within SharePoint, such as adding an item or deleting an item.

81) When would you use an event receiver?
Since event receivers respond to events, you could use a receiver for something as simple as canceling an action, such as deleting a document library by using the Cancel property. This would essentially prevent users from deleting any documents if you wanted to maintain retention of stored data.

82) What base class do event receivers inherit from?
Event receivers either inherit from the SPListEventReciever base class or the SPItemEventReciever base class, both which derive from the abstract base class SPEventReceiverBase.

83) If I wanted to not allow people to delete documents from a document library, how would I go about it?
You would on the ItemDeleting event set: properties.Cancel= true.

84) What is the difference between an asynchronous and synchronous event receivers?
An asynchronous event occurs after an action has taken place, and a synchronous event occurs before an action has take place. Forexample, an asynchronous event is ItemAdded, and its sister synchronous event is ItemAddin.

85) What does AllowUnsafeUpdates do ?

If your code modifies Windows SharePoint Services data in some way, you may need to allow unsafe updates on the Web site, without requiring a security validation. You can do by setting the

AllowUnsafeUpdates property. C#: using(SPSite mySite = new SPSite(“yourserver”))
{
using(SPWeb myWeb = mySite.OpenWeb())
{
myWeb.AllowUnsafeUpdates = true;
SPList interviewList = myWeb.Lists[“listtoinsert”];
SPListItem newItem = interviewList.Items.Add();
newItem[“interview”] = “interview”;
newItem.Update();
}
}

86) What does RunWithElevatedPrivileges do?

Assume that you have a Web Part in which you want to display information obtained through the Windows SharePoint Services object model, such as the name of the current site collection owner, usage statistics, or auditing information. These are examples of calls into the object model that require site-administration privileges. Your Web Part experiences an access-denied error if it attempts to obtain this information when the current user is not a site administrator. The request is initiated by a nonprivileged user. you can still successfully make these calls into the object model by calling the RunWithElevatedPrivileges method provided by the SPSecurity class. C#:

SPSite siteColl = SPContext.Current.Site;
SPWeb site = SPContext.Current.Web;
SPSecurity.RunWithElevatedPrivileges(delegate()
{
using (SPSite ElevatedsiteColl = new SPSite(siteColl.ID))
{
using (SPWeb ElevatedSite = ElevatedsiteColl.OpenWeb(site.ID))
{
string SiteCollectionOwner = ElevatedsiteColl.Owner.Name;
string Visits = ElevatedsiteColl.Usage.Visits.ToString();
string RootAuditEntries = ElevatedSite.RootFolder.Audit.GetEntries().Count.ToString();
}
}
});

87) What is a SharePoint Feature? What files are used to define a feature?

A SharePoint Feature is a functional component that can be activated and deactivate at various scopes throughout a SharePoint instances:
Scopes include:
Farm, WebApplication, Site (site collection), Web (site)

Features have their own receiver architecture, which allow you to trap events such as when a feature is:
installing, uninstalling, activated, deactivated

The element types that can be defined by a feature include:
menu commands, link commands, page templates, page instances,list definitions,
list instances,event handlers,workflows

The two files that are used to define a feature are:
feature.xml, manifest file(elements.xml)

The feature XML file defines the actual feature and will make SharePoint aware of the installed feature. The manifest file contains details about the feature such as functionality.

Common stsadm commands associated with feature are

stsadm -o installfeature
stsadm -o uninstallfeature
stsadm -o activatefeature
stsadm -o deactivatefeature.

88) What are content types ?

A content type is a flexible and reusable WSS type definition that defines the columns and behavior for an item in a list or a document in a document library.
For example,
-you can create a content type for a customer presentation document with a unique set of columns, an event handler, and its own document template.
-You can create a second content type for a customer proposal document with a different set of columns, a workflow, and a different document template.
Then you can attach both the contenttypes to a document library, which allows you to capture metadata based on the contenttype selected during creation of the document.
Content type can be created by the following
from the rootweb of a site collection, go to Site Action > Site Settings > Galleries > Site content types
using a feature

89) Workflow can be applied to what all elements of SharePoint ?

While workflow associations are often created directly on lists and document libraries, a workflow association can also be created on a content type that exists within the Content Type Gallery for the current site or content types defined within a list.
In short, it can be applied …
At the level of a list (or document library)
At the level of a content type defined at site scope
At the level of a site ( Sharepoint 2010 )

90) What are the ways to initiate the workflow ?

Automatic (on item added or item deleted)
Manual (standard WSS UI interface)
Manual (Custom UI Interface)
Programatically through custom code

91) What are the types of input forms that can be created for a workflow ?

You can create four different types of input forms including an association form, an initiation form, a modification form, and a task edit form. Note that these forms are optional when you create a workflow template.

92) What are ways to create input forms for workflow ?

Two different approaches can be used to develop custom input forms for a WSS workflow template.
You can create your forms by using custom application pages, which are standard .aspx pages deployed to run out of the _layouts directory. ( disadv: lot of code required when compared to Infopath approach)
using Microsoft Office InfoPath 2007 (disadv: picks up a dependenct on MOSS, i.e. it cannot run in a standalone WSS environment).

93) What is the relationship between Microsoft SharePoint Portal Server and Microsoft Windows Services?
Microsoft SharePoint Products and Technologies (including SharePoint Portal Server and Windows SharePoint Services) deliver highly scalable collaboration solutions with flexible deployment and management tools. Windows SharePoint Services provides sites for team collaboration, while Share Point Portal Server connects these sites, people, and business processes-facilitating knowledge sharing and smart organizations. SharePoint Portal Server also extends the capabilities of Windows SharePoint Services by providing organizational and management tools for SharePoint sites, and by enabling teams to publish information to the entire organization.

94) What is a SharePoint Feature? What files are used to define a feature?
A SharePoint Feature is a functional component that can be activated and deactivate at various scopes throughout a SharePoint instances, scope of which are defined as
1. Farm level 2. Web Application level 3. Site level 4. Web level
Features have their own receiver architecture, which allow you to trap events such as when a feature is
Installing, Uninstalling, Activated, or Deactivated.

The element types that can be defined by a feature include
menu commands, link commands, page templates, page instances, list definitions, list instances,
event handlers, and workflows.

The two files that are used to define a feature are the feature.xml and manifest file(elements.xml). The feature XML file defines the actual feature and will make SharePoint aware of the installed feature. The manifest file contains details about the feature such as functionality.

95) Workflow can be applied to what all elements of SharePoint ?
Workflow associations are often created directly on lists and libraries, a workflow association can also be created on a content type that exists within the Content Type Gallery for the current site or content types defined within a list. In short, it can be applied …
At the level of a list/library
At the level of a content type defined at site scope
At the level of a content type defined at list scope

96) What are the types of input forms that can be created for a workflow ?
You can create four different types of input forms including
1. An association form
2. An initiation form
3. A modification form
4. A task edit form.

Note that these forms are optional when you create a workflow template.

97) What are ways to create input forms for workflow ?
Two
1. You can create your forms by using custom application pages, which are standard .aspx pages deployed to run out of the _layouts directory. ( disadv: lot of code required when compared to Infopath approach)
2. Using Microsoft Office InfoPath 2007 (disadv: picks up a dependenct on MOSS, i.e. it cannot run in a standalone WSS environment)

98) What is the difference between method activity and event activity in WorkFlow ?
A method activity is one that performs an action, such as creating or updating a task. An event activity is one that runs in response to an action occurring.

99) What are content types?
A content type is a flexible and reusable WSS type definition (or we can a template) that defines the columns and behavior for an item in a list or a document in a document library. For example, you can create a content type for a leave approval document with a unique set of columns, an event handler, and its own document template and attach it with a document library/libraries.
100) Can a content type have receivers associated with it?
Yes, a content type can have an event receiver associated with it, either inheriting from the SPListEventReciever base class for list level events, or inheriting from the SPItemEventReciever base class. Whenever the content type is instantiated, it will be subject to the event receivers that are associated with it.

101) What two files are typically (this is kept generally) included when developing a content type, and what is the purpose of each?
There is generally the main content type file that holds things like the content type ID, name, group, description, and version. There is also the ContentType.Fields file which contains the fields to include in the content type that has the ID, Type, Name, DisplayName, StaticName, Hidden, Required, and Sealed elements. They are related by the FieldRefs element in the main content type file.

102) What is an ancestral type and what does it have to do with content types?
An ancestral type is the base type that the content type is deriving from, such as Document (0×0101). The ancestral type will define the metadata fields that are included with the custom content type.

103) Can a list definition be derived from a custom content type?
Yes, a list definition can derive from a content type which can be seen in the schema.XML of the list definition in the element.

104) When creating a list definition, how can you create an instance of the list?
You can create a new instance of a list by creating an instance.XML file

105) What is a Field Control?
Field controls are simple ASP.NET 2.0 server controls that provide the basic field functionality of SharePoint. They provide basic general functionality such as displaying or editing list data as it appears on SharePoint list pages.

106) What base class do custom Field Controls inherit from?
This varies. Generally, custom field controls inherit from the Microsoft.SharePoint.WebControls.BaseFieldControl namespace, but you can inherit from the default field controls.

107) Can multiple SharePoint installs point to the same DB?
Multiple SharePoint installs can use the same database server. Not literally the same database on that server. That server must be SQL Server 2000 or SQL Server 2005. It cannot be Oracle or another vendor.

108) How to create links to the mapped network drives?
Creating links to mapped drives in WSS v3 or MOSS 2007 can be done via
the new content type for .lnk files.

109) While creating a Web part, which is the ideal location to Initialize my new controls?
Override the CreateChildControls method to include your new controls. You can control the exact rendering of your controls by calling the .Render method in the web parts Render method.

110) What are the two base classes a WebPart you are going to use within SharePoint 2007 can inherit from?
There are two base classes that a WebPart which is going to be consumed by SharePoint can inherit from, either the
SharePoint WebPart Base class
or the
ASP.NET 2.0 WebPart base class.
When inheriting from the SharePoint WebPart Base class your derived WebPart class will inherit from Microsoft.SharePoint.WebPartPages.WebPart. When inheriting from the ASP.NET 2.0 WebPart base class your derived WebPart class will inherit from System.Web.UI.WebControls.WebParts.WebPart. It is considered good practice to use the ASP.NET WebPart base class since the old base class is meant for backwards compatibility with previous version of SharePoint, however there are four exception when it is better to leverage functionality from the SharePoint WebPart base class:
Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure

111) What are the differences between the two base classes and what are the inherit benefits of using one over another?
The difference is the Microsoft.SharePoint.WebPartPages.WebPart base class is meant for backward compatibility with previous versions of SharePoint. The benefit of using the SharePoint WebPart base class is it supported:
Cross page connections
Connections between Web Parts that are outside of a Web Part zone
Client-side connections (Web Part Page Services Component)
Data caching infrastructure
ASP.NET 2.0 WebParts are generally considered better to use because SharePoint is built upon the ASP.NET 2.0 web architecture. Inheriting from the ASP.NET 2.0 base class offers you features that inherit to ASP.NET 2.0, such as embedding resources as opposed to use ClassResources for deployment of said types.

112) What is the WebPartManager sealed class? What is its purpose?
The WebPartManager sealed class is responsible for managing everything occurring on a WebPart page, such as the WebParts (controls), events, and misc. functionality that will occur in WebPartZones. For example, the WebPartManager is responsible for the functionality that is provided when you are working with moving a WebPart from WebPartZone to WebPartZone. It is known as the “the central class of the Web Part Control Set”.

 

 

Salesforce Interview Questions

Top most important Salesforce interview questions and answers by Experts:

Here is a list of Top most important Salesforce interview questions and answers by Experts.If you want to download Salesforce interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Salesforce interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Salesforce ,Register for Salesforce online training here.

 

1) For which criteria in workflow “time dependent workflow action” cannot be created?
Created, and every time it’s edited

2) What is the advantage of using custom settings?
You dont have to query in apex (fire select query) to retrieve the data stored in custom settings.

3) What are the different workflow actions available in workflows?
     1. Field update

     2. Email alert

     3. send Outbound messages

     4. Create new task

4) What is whoid and whatid in activities?
    Whoid is the id of either contact or Lead. Whatid is the id of the related to record in   activity record(standard or custom object)

5) What is the difference between a standard controller and custom controller
Standard controller inherits all the standard object properties, standard button functionalities can be directly used. Custom controller defines custom functionalities, a standard controller can be extended to develop custom functionalities using keyword “extenssions”

6) Can you have more than one extenssions associated with a single page?
     Yes we can have more than extenssions.

7) If page is having multiple extenssions and if two extenssions have methods of same name.Then which method out of these two will be called upon calling from vf page ?
  The one which is present in the controller defined on the left side will be called.

8) What are governer limits ?
Governer limits are the limits imposed by salesforce so as to avoid monopoly by orgs in using salesforce shared resources.

9)how can we implement pagination in visualforce ?
Use standardset controllers for implementing pagination.

10) What is the difference between force.com and salesforce.com

Force.com is paas(platform as a service) and salesforce.com is Saas(software as a service)

11) What is a externalid in salesforce

It is a field which can be used to store a value that is used as a refernce for that record in other system. For example if you have a record in system ‘xyz’ where it is referenced by some value then that value can be used as external id in salesforce for that record. External id can be used for upsert operation in data loader

12) What happens upon lead conversion ?

When lead is converted a contact, account and optionally an opportunity is created.

13) What are different ways of deployment in salesforce ?

 Change sets, eclipse and ANT

14) How can you override a list button with a visuaflorce page?

Visualforce page should be a list controller that is it should have “recordsetVar” attribute defined in page tag.

15) Is it possible to bypass Grant Access Using Hierarchies in case of standard objects ?

 No. This is default and cannot be changed.

16) How can you call a controller method from java script ?

Use action function component to call controller method from java script.

17) How can you call a visualforce page from a controller method?

 Use pagereference object for calling a visualforce page from controller method

18) How can you sort a select SOQl query ?

Use order by clause in select query for sorting a list of records

19) How much code coverage is needed for deployment?

Each trigger should have minimum of 1%. Class can have 0%. But, the total code covergae of 75%.

20) Can ‘set’ store duplicate values in it?

No. Set only stores unique values. List can have duplicate values in it.

21) Can two users have same profiles?

Yes

22) How can you refresh a particular section of a  visualforce page?

This can be done using reRender attribute

23) How can you create a many to many relationship in salesforce

This can be done by creating junction object between the two objects.

24) What happens to detail record when a master record is deleted?

Detail record gets deleted.

25) What happens to child record when a parent record is deleted(look up relationship)?

Child record remains undeleted

26) How to get current logged in users id in apex ?

Use Userinfo.getuserid() to get the current logged in user’s id in apex.

27) How to convert a csv file  browsed in visualforce page into a string.

Use csvfilecontents.tostring(). method to convert blob to string

28) How many records can a select query return ?
 As of now it can return upto 50000 records.

29) How many records can a sosl query return ?

As of now it can return upto 2000 records

30)How to fire dynamic query in soql?

Using database.query
Example: List<account> accList = Database.query(‘select name from account’);

31) What is a bucket field in reports?

This field is used for custom grouping of values in a field. This can be used in summarising the report.

32) What are dynamic dashboards ?

Dashboards which run for logged in user are dynamic dashboards

33) Can the dynamic dashboards be scheduled?

No they cannot be scheduled.

34) How can you use custom label; in visualforc page?
Use this syntex for accessing custom albel in visualforce page – {!$Label.Samplelabel}

35) What are the types of custom settings in salesforce?
List type and Heirarchy type

36) What are the different types of collections in apex?
Ans: There are three types of collections in apex language

1. Set
2. List
3. Map

37) What are maps in apex?

Map has keys and values. A key points to a single value. Map can be used to store realationship between two entities. Keys in map are unique. Values can be duplicated.

38) What are the different types of object relations in salesforce ?

1. One to many
2. Many to many
3. Master detail

39) Can you have roll up summary fields in case of parent child relationship?
No. These are present only in case of master details relationship.

40) Can you see a lead which is converted in saleforce UI

The detail record is not seen. But a page, wherein it shows the links for formed account, contact and opportunity.

41) What is the difference between action function and action support ?

Action functions can call controller method from java script, action support adds support to other components.

42) What is action poller in visualforce ?

Action poller sends AJAX request with a specified time interval.

43) What are the different types of reports available in salesforce?

1. tabular report
2. Summary Report
3. Matrix Report
4. Joined Report

44) How many active assignments rule can you have in lead/Case?

You can have only one active assignment rule at a time

45) How do we access static resource in visualforce?

Use this syntex for accessing static resource {!$Resource.Testresourcename}

46) How to embed a visaulflow in a visualforce page ?

Use this syntex to embed flow in vf page : <flow:interview />

47) How to enable inline editing in visauflorce page ?

You can enable inline editing in visualforce page by using <apex:inlineEditSupport> component.

48) What is trigger.new in trigger ?

Trigger.new is a list of records that are in the context of trigger or becuase of these records(modification,Creation, deletion) the trigger has been called

49) How do we bulkify the trigger ?

Bulkfification requires iterating over all the records in trigger context
for example : for(account ac: trigger.new){
// your logic here
}

50) How can we get the old value in trigger ?
Use trigger.old map for getting previous values of fields.

51) Can we modify records directly in trigger.new ?

Trigger.new is a read only list, but field values can be changed in case of before trigger

52) What does the error “list has no rows for assignment” mean?

It means the list you are trying to access has no values in it.

53) Why should we not write select query within for loop?

Writing select query within for loop may hit the governer limit of 100 select queries.

54) What should we do to avoid view state error in visualforce page?

Clear unused collections, define variable as transient.

55) What is a sandbox org?

It is the exact copy of your production org.

56) What is sosl?

Select query that can return records of multiple objects as list of lists

57) How many records a select query soql can return?

As of now the limit is 50000

58) What is the full form of AJAX?

It stands for assynchronous java and XML

59) Why do we need to write test classes?

Salesforce does not allow deployment in production if the test coverage is less than 75%

60) How can you show a custom error message in trigger?
This can be done using addError() method in trigger

61) What is the use of future annotation?

Future method starts execution when Salesforce has resources available.That is for asynchronous execution.

62) How to identify if a class is a test class?

Test class always begins with @isTest

63) How to convert a blob variable into a string?

Use to String to convert blob into string.

64) What are the different methods of batch apex class?
Start method, execute method and finish method

65) What is’ with sharing’ in apex class code?
When you use ‘with sharing’, user’s permissions and field-level security are respected. In case of ‘without sharing’ code runs in system mode.

66) How many records can a sosl return ?

It can return 2000 records as of now as per governers limit

67) Can you use dml statement in visualforce compoenent controller ?

To use dml in visualforce component you have to declare allowdml=true in visualforce component otherwise you will get an exception
“DML is currently not allowed”

68) Can you write sosl in trigger>?

Earlier this was not allowed but now sosl are allowed in triggers.

69) Which are the different access modifiers in apex?

1. Private

2. Public

3. Protected

4.Global are the four access modifiers allowed in apex

70) Can you change the master of a detail record in salesforce ?

Yes provided you have ticked marked “Allow reparenting” in field setting otherwise the field is read only and master cannot be changed.

71) How can you lock records in apex?

Use For update in query to lock the record. For example: [select id,name from contact limit 10 For update];

72) IS there any limit on the number of items that can be stored in apex collections?

There is ni such limit but we need to consider heap size limit 6mb (6 MB as of now)

73) How can you monitor future actions of time based workflow?

setup –> administration set up –> monitoring –> time based workflow

74) What is visaulforce component ?

It is a piece of code that can be reused. It can be encapsulated in other visualforce pages.

75) Ho can you display the status of an AJAX update request in a visualforce page ?

To display AJAX request status we can use <apex:actionstatus> component.

76) How can you access custom label in apex:

Example –> string custLabelstr = System.Label.LabelNamehere

77) How can you get all the keys of a map variable ?
 USe method keyset() for this

78) What are the different types of sandboxes in salesforce ?
Developer, Developer Pro, Partial Data and Full are the 4 types of sandboxes in salesforce.

79) With what frequency can you refresh a full copy sandbox?

Full copy sandbox can be refreshed every 29 days from production.

80) How can you make fields required on a visualforce page?

mark required = true as done in the example below:
<apex:inputfield value=”{!account.Description}” required=”true”/>

81) What is minimum coverage for every trigger for deployment?

Every trigger should have a minimum coverage of 1%. Total coverage should be 75%

82) What is minimum coverage for every class for deployment?

There is no such requirement. A class can have 0% but the total coverage should be >75%

83) How can you implement custom functionality for a standardcontroller visualforce page?

This can be done by associating a controller class with that standard controller using “Extenssions”

84) How can you get the current record id in a visualforce page ?

Use ApexPages.CurrentPage().getparameters().get(‘id’) to get the current record id in visaulforce page.

85) Can a user change his own profile in salesforce ?

No, a user cannot change change his own profile !!

86) Can a user change his own role?

Yes this can be done !!

87) Reset security token option is unavailabel in set up. What could be the reason?

If in the profile setting “login ip ranges” have been set up then the option of “reset security token” is uanvailbale.

88) How can you skip record type selection page(and take up default record type) while creating new record of a aprticular object ?

Just tickmark against the object by navigating to following :
set up –> my personal information — > Record type selection –> check against the required object

89) What are the different data types that a standard field record name can have?

Record name field can have either of the two data types : Auto Number or Text data type

Example = Set<id> idSet = mapname.keyset();

90) How can you compare values of a picklist field in validation rule?

For comparing picklist value use ispickval
ISPICKVAL(picklist_field, text_to_compare)

91) Can you edit a apex trigger/apex class in production environment ?

No apex trigger /class cannot be edited in production.

92) Can you edit a visuaflorce apge in production environment ?

Yes this can be done.

93)How can you deliver a visualforce page in excel form ?
Use contentType=”application/vnd.ms-excel#Contacts.xls” in page component of visualforce page

94) What is trigger.new?

It is a list of records in current context in a trigger.

95) What does it mean when you get the error “too many soql queries 101 salesforce”

 It means you are hitting the limit of 100 soql queries as per governers limit

96) How can you create a input field for date on a visualforce page ?

 To create a input date field on vf page you will have to bind it with a existing date field on any object.

97) How can you convert a text to upper string ?

stringname.toUppercase();

98) How can you convert a integer into a string ?

string.valueof(integerName);

99) What are the different types of email templates that can be created in salesforce?

Test, HTML (using Letterhead), Custom (without using Letterhead) and Visualforce.

100) How can you display different picklist values for picklist fields in different page layouts?

This can be done using record types.

 

 

CCNA Interview Questions

Top most important CCNA interview questions and answers by Experts:

Here is a list of Top most important CCNA interview questions and answers by Experts.If you want to download CCNA interview questions pdf free ,you can register with RVH techguru. Our experts prepared these CCNA interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in CCNA ,Register for CCNA online training here.

 

1) What is Routing?

Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.

2) What is the purpose of the Data Link?

The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.

3) What is the key advantage of using switches?

When a switch receives a signal, it creates a frame out of the bits that was extracted from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.

4) When does network congestion occur?

Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.

5) What is a Window in networking terms?

A Window refers to the number of segments that is allowed to be sent from source to destination before an acknowledgement is sent back.

6) Does a bridge divide a network into smaller segments?

Not really. What a bridge actually does is to take the large network and filter it, without changing the size of the network.

7) Which LAN switching method is used in CISCO Catalyst 5000?

This model uses the Store-and-forward switching method. It stores the entire frame to its buffers and performs a crc check before deciding whether or not to forward that data frame.

8 ) What is the role of the LLC sublayer?

The LLC sublayer, short for Logical Link Control, can provide optional services to an application developer. One option is to provide flow control to the Network layer by using stop/start codes. The LLC can also provide error correction.

9) How does RIP differ from IGRP?

RIP relies on the number of hops in order to determine the best route to a network. On the other hand, IGRP takes consideration many factors before it decides the best route to take, such as bandwidth, reliability, MTU and hop count.

10) What are the different memories used in a CISCO router?

– NVRAM stores the startup configuration file
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.

11) What is BootP?

BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as the IP address of the server PC.

12) What is the function of the Application Layer in networking?

The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchonizes applications on the server and client.

13) Differentiate User Mode from Privileged Mode

User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.

14) What is 100BaseFX?

This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed.

15) Differentiate full-duplex from half-duplex.

In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.

16) What is MTU?

MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be sent out onto the data line without the need to fragment it.

17) How does cut-through LAN switching work?

In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out again and forward it to the next network segment after reading the destination address.

18) What is latency?

Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.

19) Utilizing RIP, what is the limit when it comes to number of hops?

The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is considered unreachable.

20) What is a Frame Relay?

Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical Layers.

21) How do you find valid hosts in a subnet?

The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets.

22) What is DLCI?

DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order to uniquely identify each virtual circuit that exists on the network.

23) Briefly explain the conversion steps in data encapsulation.

From a data transmitter’s point of reference, data from the end user is converted to segments. Segments are then passed on to the other layers and converted into packets or datagrams. These packets are then converted into frames before passing on to the network interface. Finally, frames are converted to bits prior to actual data transmission.

24) What are the different types of passwords used in securing a CISCO router?

There are actually five types of passwords that can be used. These are enable secret, enable, virtual terminal, console, and auxiliary.

25) Why is network segmentation a good idea when managing a large network?

For a network administration, segmenting a network would help ease network traffic and ensures that high bandwidth is made available at all times for all users. This translates to better performance especially for a growing network.

26) What are the things that can be accessed in a CISCO router’s identifying information?

The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed configurations that refer to the router ports.

27) Differentiate Logical Topology from Physical Topology

Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual layout of the network medium.

28) What causes a triggered update to reset the router hold-down timer?

This may happen when the hold-down timer has already expired, or when the router received a processing task that incidentally was proportional to the number of links in the inter-network.

29) In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?

  1. erase running-config
    B. erase startup-config
    C. erase nvram
    D. delete nvram
    Correct Answer: B. erase startup-config

30) Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?

Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit

Correct Answer: (config-if)# dialer-group 1

31) When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?

  1. The highest IP address of any physical interface.
    B. The lowest IP address of any logical interface.
    C. The middle IP address of any logical interface..
    D. The lowest IP address of any physical interface.
    E. The highest IP address of any interface.
    F. The highest IP address of any logical interface.
    G. The lowest IP address of any interface.

Correct Answer: A. The highest IP address of any physical interface.

 

32) Mention what is the difference between the switch, hub, and router?

 

 

Hub Switch Router
Hub has single broadcast domain and collision domain. Anything comes in one port is sent out to the others.  It is a device that filters and forwards packets between LAN segments. Switches have single broadcast domain and multiple collision domains. It supports any packet protocol, as such it operates at the data link layer 2 and layer 3  Router is a device which transmits data packets along networks.

 

33) Mention what is the size of IP address?

Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

34) Mention what does data packets consist of?

A data packet consists of sender’s information, recipient’s information, and the data contained.  It also has the numeric identification number that defines the packet number and order.  When data is send across the network, that information is segmented into data packets.  In short, data packets carry the information and routing configuration for your transferred message.

35) Mention what is DHCP?

DHCP stands for Dynamic Host Configuration Protocol.  DHCP assigns an IP address automatically to a given workstation client.  You can also make static IPS for machines like printers, servers, routers and scanners.

36) Mention what is BOOTP?

BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server.

37) Explain why is UDP lease favored when compared to TCP?

It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and acknowledgments

38) Mention what is the difference between dynamic IP and static IP addressing?

Dynamically IP addresses are provided by DHCP server and static IP address are given manually.

39) Mention what are the ranges for the private IPS?

Ranges for private IPS are

  • Class A: 10.0.0.0 – 10.0.0.255
  • Class B: 172.16.0.0 – 172.31.0.0
  • Class C: 192.168.0.0 – 192.168.0.255

40) In how many ways you can access router?

You can access it in three ways

  • Telnet (IP)
  • AUX (Telephone)
  • Console (Cable)

41) Explain what is EIGRP?

EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco Systems.  It is availed on a router to share routes with other routers within the same autonomous system. Unlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the router and the amount of data that needs to be transferred.

42) Mention what is the matric of EIGRP protocol?

EIGRP protocol consists of

  • Bandwidth
  • Load
  • Delay
  • Reliability
  • MTU
  • Maximum Transmission Unit

43) Mention what does the clock rate do?

Clockrate enables the routers or DCE equipment to communicate properly.

44) Mention what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

Erase startup- coding is the command you must use if you want to delete the configuration data that is stored in the NVRAM

45) Mention what is the difference between TCP and UDP?

 TCP and UDP both are protocols for sending files across computer network 

TCP (Transmission Control Protocol)               UDP (User Datagram Protocol)
TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part.  While transferring a message, there is no corruption while transferring a message  UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage
The message will deliver in the order it is sent  The message you sent may not be in the same order
Data in TCP is read as a stream, where one packet ends, and another begins  Packets are transmitted individually and are guaranteed to be whole if they arrive
Example of TCP includes World Wide Web, file transfer protocol, e-mail,  Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),

46) Explain the difference between half-duplex and full-duplex?

Full duplex means that the communication can occur in both directions at the same time, while half duplex means that the communication can occur in one direction at time.

 47) Mention the conversion steps of data encapsulation?

Conversion steps of data encapsulation includes

Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted into Data

  • Layer Four (Transport): Data is converted into small segments
  • Layer Five (Network): Data converted into packets or datagrams and Network header is added
  • Layer Six (Data Link): Datagrams or packets are built into frames
  • Layer Seven (Physical): Frames are converted into bits

48) What command do we give if router IOS is stucked?

Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.

 49) Explain what is route poisoning?

Route poisoning is a technique of preventing a network from transmitting packets through a route that has become invalid.

50) What route entry will be assigned to dead or invalid route in case of RIP?

In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it unreachable.

51) How do you configure a Cisco router to route IPX?

The initial thing to do is to enable IPX routing by using the “ipx routing” command. Each interface that is used in the IPX network is then configured with a network number and encapsulation method.

52) What are the different IPX access lists?

There are two access lists: Standard and Extended. Standard Access List can only filter the source or destination IP address. An Extended Access List uses the source and destination IP addresses, port, socket and protocol when filtering a network.

53) Explain the benefits of VLANs.

VLANs allow the creation of collision domains by groups other than just physical location. Using VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others. This is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location.

54) What is subnetting?

Subnetting is the process of creating smaller networks from a big parent network. Being a part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.

55) What are the advantages of a layered model in the networking industry?

A layered network offers many advantages. It allows administrators to make changes in one layer without the need to make changes in the other layers. Specialization is encouraged, allowing the network industry to make progress faster. A layered model also lets administrators troubleshoot problems more efficiently.

56) Why is UDP lease favored when compared to TCP?

It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits and acknowledgements.

57) What are some standards supported by the Presentation layer?

Presentation layer supports many standards, which ensures that data is presented correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.

58) What’s the simplest way to remotely configure a router?

In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.

59) What does the show protocol display?

– routed protocols that is configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface

60) How do you depict an IP address?

It can be done in three possible ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1

61) How do you go to privileged mode? How do you switch back to user mode?

To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user mode, enter the command “disable”

62) What is HDLC?

HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.

63) How are internetworks created?

Internetworks are created when networks are connected using routers. Specifically, the network administrator assigns a logical address to every network that connects to the router.

64) What is Bandwidth?

Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and is measured in Kbps.

65) How does Hold-downs work?

Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer.

66) What are packets?

Packets are the results of data encapsulation. These are data that has been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.

67) What are segments?

Segments are sections of a data stream that comes from the upper OSI layers and ready for transmission towards the network. Segments are the logic units at the Transport Layer.

68) Give some benefits of LAN switching.

– allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration

69) What is Route Poisoning?

Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.

 

Bigdata Interview Questions

Top most important Bigdata interview questions and answers by Experts:

Here is a list of Top most important Bigdata interview questions and answers by Experts.If you want to download Bigdata interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Bigdata interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Bigdata ,Register for Bigdata online training here.
1) What is Big Data?
Big data is data that exceeds the processing capacity of traditional database systems. The data is too big, moves too fast, or doesn’t fit the strictures of your database architectures. To gain value from this data, you must choose an alternative way to process it.

Name any org. who is generating Big Data?
Facebook,Google

2) What is NoSQL?
NoSQL is a whole new way of thinking about a database. NoSQL is not a relational database. The reality is that a relational database model may not be the best solution for all situations. The easiest way to think of NoSQL, is that of a database which does not adhering to the traditional relational database management system (RDMS) structure. Sometimes you will also see it revered to as ‘not only SQL’.

3) We have already SQL then Why NoSQL?
NoSQL is high performance with high availability, and offers rich query language and easy scalability.
NoSQL is gaining momentum, and is supported by Hadoop, MongoDB and others. The NoSQL Database site is a good reference for someone looking for more information.

4) What is Hadoop and where did Hadoop come from?
By Mike Olson: The underlying technology was invented by Google back in their earlier days so they could usefully index all the rich textural and structural information they were collecting, and then present meaningful and actionable results to users. There was nothing on the market that would let them do that, so they built their own platform. Google’s innovations were incorporated into Nutch, an open source project, and Hadoop was later spun-off from that. Yahoo has played a key role developing Hadoop for enterprise applications.

5) What problems can Hadoop solve?
By Mike Olson: The Hadoop platform was designed to solve problems where you have a lot of data — perhaps a mixture of complex and structured data — and it doesn’t fit nicely into tables. It’s for situations where you want to run analytics that are deep and computationally extensive, like clustering and targeting. That’s exactly what Google was doing when it was indexing the web and examining user behavior to improve performance algorithms.

6) What is the Difference between Hadoop and Apache Hadoop?
There is no diff, Hadoop, formally called Apache Hadoop, is an Apache Software Foundation project.

7) What is the difference between SQL and NoSQL?

Is NoSQL follow relational DB model?
No

8) Why would NoSQL be better than using a SQL Database? And how much better is it?
It would be better when your site needs to scale so massively that the best RDBMS running on the best hardware you can afford and optimized as much as possible simply can’t keep up with the load. How much better it is depends on the specific use case (lots of update activity combined with lots of joins is very hard on “traditional” RDBMSs) – could well be a factor of 1000 in extreme cases.

9) Name the modes in which Hadoop can run?
Hadoop can be run in one of three modes:
i. Standalone (or local) mode
ii. Pseudo-distributed mode
iii. Fully distributed mode

10) What do you understand by Standalone (or local) mode?
There are no daemons running and everything runs in a single JVM. Standalone mode is suitable for running MapReduce programs during development, since it is easy to test and debug them.

11) What is Pseudo-distributed mode?
The Hadoop daemons run on the local machine, thus simulating a cluster on a small scale.

12) What does /var/hadoop/pids do?
It stores the PID.

13) What is the full form of HDFS?
Hadoop Distributed File System

14) What is the idea behind HDFS?
HDFS is built around the idea that the most efficient approach to storing data for processing is to optimize it for write once, and read many approach.

15) Where does HDFS fail?
Cannot support large number of small files as the file system metadata increases with every new file, and hence it is not able to scale to billions of files. This file system metadata is loaded into memory and since memory is limited, so is the number of files supported.

16) What are the ways of backing up the filesystem metadata?
There are 2 ways of backing up the filesystem metadata which maps different filenames with their data stored as different blocks on various data nodes:
Writing the filesystem metadata persistently onto a local disk as well as on a remote NFS mount.
Running a secondary namenode.

17) What is Namenode in Hadoop?
Namenode is the node which stores the filesystem metadata i.e. which file maps to what block locations and which blocks are stored on which datanode.

18) What is DataNode in Hadoop?
Namenode is the node which stores the filesystem metadata i.e. which file maps to what block locations and which blocks are stored on which datanode.

19) What is Secondary NameNode?
The Secondary NameNode (SNN) is an assistant daemon for monitoring the state of the cluster HDFS, Like the NameNode, Each cluster has one SNN, and it typically resides on its own machine as well.

20) What is JobTracker in Hadoop?
The JobTracker is the service within Hadoop that farms out MapReduce tasks to specific nodes in the cluster, ideally the nodes that have the data, or at least are in the same rack.

21) What are the functions of JobTracker in Hadoop?
Once you submit your code to your cluster, the JobTracker determines the execution plan by determining which files to process, assigns nodes to different tasks, and monitors all tasks as they are running.
If a task fail, the JobTracker will automatically relaunch the task, possibly on a different node, up to a predefined limit of retries.
There is only one JobTracker daemon per Hadoop cluster. It is typically run on a server as a master node of the cluster.

22) What is MapReduce in Hadoop?
Hadoop MapReduce (Hadoop Map/Reduce) is a software framework for distributed processing of large data sets on compute clusters of commodity hardware. It is a sub-project of the Apache Hadoop project. The framework takes care of scheduling tasks, monitoring them and re-executing any failed tasks.

23) What are the Hadoop configuration files?
1. hdfs-site.xml
2. core-site.xml
3. mapred-site.xml

24) Name the most common Input Formats defined in Hadoop? Which one is default?

The two most common Input Formats defined in Hadoop are:

  • TextInputFormat
  • KeyValueInputF5ormat
  • SequenceFileInputFormat

TextInputFormat is the Hadoop default.

25) What is the difference between TextInputFormat and KeyValueInputFormat class?

TextInputFormat: It reads lines of text files and provides the offset of the line as key to the Mapper and actual line as Value to the mapper.

KeyValueInputFormat: Reads text file and parses lines into key, Val pairs. Everything up to the first tab character is sent as key to the Mapper and the remainder of the line is sent as value to the mapper.

26) What is InputSplit in Hadoop?

When a Hadoop job is run, it splits input files into chunks and assign each split to a mapper to process. This is called InputSplit.

27) How is the splitting of file invoked in Hadoop framework?

It is invoked by the Hadoop framework by running getInputSplit()method of the Input format class (like FileInputFormat) defined by the user.

28) Consider case scenario: In M/R system, – HDFS block size is 64 MB

– Input format is FileInputFormat

–We have 3 files of size 64K, 65Mb and 127Mb

29) How many input splits will be made by Hadoop framework?

Hadoop will make 5 splits as follows:

– 1 split for 64K files

– 2 splits for 65MB files

– 2 splits for 127MB files

30) What is the purpose of RecordReader in Hadoop?

The InputSplit has defined a slice of work1, but does not describe how to access it. The RecordReader class actually loads the data from its source and converts it into (key, value) pairs suitable for reading by the Mapper. The RecordReader instance is defined by the Input Format.

31) After the Map phase finishes, the Hadoop framework does “Partitioning, Shuffle and sort”. Explain what happens in this phase?

Partitioning: It is the process of determining which reducer instance will receive which intermediate keys and values. Each mapper must determine for all of its output (key, value) pairs which reducer will receive them. It is necessary that for any key, regardless of which mapper instance generated it, the destination partition is the same.

Shuffle: After the first map tasks have completed, the nodes may still be performing several more map tasks each. But they also begin exchanging the intermediate outputs from the map tasks to where they are required by the reducers. This process of moving map outputs to the reducers is known as shuffling.

Sort: Each reduce task is responsible for reducing the values associated with several intermediate keys. The set of intermediate keys on a single node is automatically sorted by Hadoop before they are presented to the Reducer.

32) If no custom partitioner is defined in Hadoop then how is data partitioned before it is sent to the reducer?

The default partitioner computes a hash value for the key and assigns the partition based on this result.

33)  What is a Combiner?

The Combiner is a ‘mini-reduce’ process which operates only on data generated by a mapper. The Combiner will receive as input all data emitted by the Mapper instances on a given node. The output from the Combiner is then sent to the Reducers, instead of the output from the Mappers.

34) What is JobTracker?

JobTracker is the service within Hadoop that runs MapReduce jobs on the cluster.

35) What are some typical functions of Job Tracker?

The following are some typical tasks of JobTracker:-

– Accepts jobs from clients

– It talks to the NameNode to determine the location of the data.

– It locates TaskTracker nodes with available slots at or near the data.

– It submits the work to the chosen TaskTracker nodes and monitors progress of each task by receiving heartbeat signals from Task tracker.

36) What is TaskTracker?

TaskTracker is a node in the cluster that accepts tasks like MapReduce and Shuffle operations – from a JobTracker.

37) What is the relationship between Jobs and Tasks in Hadoop?

One job is broken down into one or many tasks in Hadoop.

38) Suppose Hadoop spawned 100 tasks for a job and one of the task failed. What will Hadoop do?

It will restart the task again on some other TaskTracker and only if the task fails more than four (default setting and can be changed) times will it kill the job.

39) Hadoop achieves parallelism by dividing the tasks across many nodes, it is possible for a few slow nodes to rate-limit the rest of the program and slow down the program. What mechanism Hadoop provides to combat this?

Speculative Execution.

40) How does speculative execution work in Hadoop?

JobTracker makes different TaskTrackers pr2ocess same input. When tasks complete, they announce this fact to the JobTracker. Whichever copy of a task finishes first becomes the definitive copy. If other copies were executing speculatively, Hadoop tells the TaskTrackers to abandon the tasks and discard their outputs. The Reducers then receive their inputs from whichever Mapper completed successfully, first.

41) Using command line in Linux, how will you

– See all jobs running in the Hadoop cluster

– Kill a job?

Hadoop job – list

Hadoop job – kill jobID

42)  What is Hadoop Streaming?

Streaming is a generic API that allows programs written in virtually any language to be used as Hadoop Mapper and Reducer implementations.

43) What is the characteristic of streaming API that makes it flexible run MapReduce jobs in languages like Perl, Ruby, Awk etc.?

Hadoop Streaming allows to use arbitrary programs for the Mapper and Reducer phases of a MapReduce job by having both Mappers and Reducers receive their input on stdin and emit output (key, value) pairs on stdout.

44) What is Distributed Cache in Hadoop?

Distributed Cache is a facility provided by the MapReduce framework to cache files (text, archives, jars and so on) needed by applications during execution of the job. The framework will copy the necessary files to the slave node before any tasks for the job are executed on that node.

45) What is the benefit of Distributed cache? Why can we just have the file in HDFS and have the application read it?

This is because distributed cache is much faster. It copies the file to all trackers at the start of the job. Now if the task tracker runs 10 or 100 Mappers or Reducer, it will use the same copy of distributed cache. On the other hand, if you put code in file to read it from HDFS in the MR Job then every Mapper will try to access it from HDFS hence if a TaskTracker run 100 map jobs then it will try to read this file 100 times from HDFS. Also HDFS is not very efficient when used like this.

46) What mechanism does Hadoop framework provide to synchronise changes made in Distribution Cache during runtime of the application?

This is a tricky question. There is no such mechanism. Distributed Cache by design is read only during the time of Job execution.1

47) Have you ever used Counters in Hadoop. Give us an example scenario?

Anybody who claims to have worked on a Hadoop project is expected to use counters.

48) Is it possible to provide multiple input to Hadoop? If yes then how can you give multiple directories as input to the Hadoop job?

Yes, the input format class provides methods to add multiple directories as input to a Hadoop job.

49) Is it possible to have Hadoop job output in multiple directories? If yes, how?

Yes, by using Multiple Outputs class.

50) What will a Hadoop job do if you try to run it with an output directory that is already present? Will it

– Overwrite it

– Warn you and continue

– Throw an exception and exit

The Hadoop job will throw an exception and exit.

51) How can you set an arbitrary number of mappers to be created for a job in Hadoop?

You cannot set it.

52) How can you set an arbitrary number of Reducers to be created for a job in Hadoop?

You can either do it programmatically by using method setNumReduceTasks in the Jobconf Class or set it up as a configuration setting.

53) How will you write a custom partitioner for a Hadoop job?

To have Hadoop use a custom partitioner you will have to do minimum the following three:

– Create a new class that extends Partitioner Class

– Override method getPartition

– In the wrapper that runs the Mapreduce, either

– Add the custom partitioner to the job programmatically using method set Partitioner Class or – add the custom partitioner to the job as a config file (if your wrapper reads from config file or oozie)

54)  How did you debug your Hadoop code?

There can be several ways of doing this but most common ways are:-

– By using counters.

– The web interface provided by Hadoop framework.

55) How will you add/delete a Node to the existing cluster?
Add: Add the host name/Ip address in dfs.hosts/slaves file and refresh the cluster with $hadoop dfsamin -refreshNodes
Delete: Add the hostname/Ip address to dfs.hosts.exclude/remove the entry from slaves file and refresh the cluster with $hadoop dfsamin -refreshNodes

56) What is SSH? What is the use of it In Hadoop?
Secure Shell.
57) How will you setup Password-less SSH?
Search in this sitess
58) How will you format the HDFS? How frequently it will be done?
$hadoop namnode -format.
Note: Format had to be done only once that to during initial cluster setup.

59) Do you know about cron jobs? How will you Setup?
 In Ubuntu, go to the terminal and type:
$ crontab -e

this will open our personal crontab (cron configuration file), the first line in that file explains it all, In every line we can define one command to run, and the format is quite simple. So the structure is:

minute hour day-of-month month day-of-week command

For all the numbers you can use lists eg, 5,34,55 in the first field will mean run at 5 past 34 past and 55 past what ever hour is defined.

60) What is the role of /etc/hosts file in setting up of HDFS cluster?
For hostname to Ip address maping
61) What is dfsadmin command in Hadoop?
Via HDFS web UI, we can see no of decommissioned nodes and we need to rebalance the cluster now

62) What is the impact if namenode fails and what are the necessary action items now?
 Entire hdfs will be down and we need to restart the namenode after copying fsimage and edits from secondaryNN
63) What is Log4j?
Logging Framework
64) How do we set logging level for hadoop daemons/commands?
In log4j.properties or in hadoop-env.sh file, hadoop.root.logger=INFO,console (WARN,DRFA)
Is there any impact on mapreduce jobs if there is no mapred-site.xml file created in HADOOP_HOME/conf directory but all

65) the necessary properties are difined in yarn-site.xml?
No
66) How does Hadoop’s CLASSPATH plays vital role in starting or stopping in hadoop daemons.
Classpath will contain list of directories containing jar files required to start/stop daemons for example HADOOP_HOME/share/hadoop/common/lib contains all the common utility jar files.

67) What is the default logging level in hadoop?
hadoop.root.logger=INFO,console.
68) What is the ‘hadoop.tmp.dir’ configuration parameter default to ?
It is user.name. We need a directory that a user can write and also not to interfere with other users. If we didn’t include the username, then different users would share the same tmp directory. This can cause authorization problems, if folks’ default umask doesn’t permit write by others. It can also result in folks stomping on each other, when they’re, e.g., playing with HDFS and re-format their filesystem.
69) How do we verify the status and health of the cluster?
If there is no configuration error at client machine or namenode machine, a common cause for this is the Hadoop service isn’t running. If there is problem with Check that there isn’t an entry for our hostname mapped to 127.0.0.1 or 127.0.1.1 in /etc/hosts.
70) How do we set a configuration property to be unique/constant across the cluster nodes and no slave nodes should override this?
We can achive this by defining this property in core/hdfs/mapred/yarn-site.xml file on namenode with final tag as shown below.
<name>mapreduce.task.io.sort.mb</name>

<value>512</value>

<final>true</final>

71) Does the name-node stay in safe mode till all under-replicated files are fully replicated?
No. The name-node waits until all or majority of data-nodes report their blocks. But name-node will stay in safe mode until a specific percentage of blocks of the system is minimally replicated. minimally replicated is not fully replicated.

 

 

Web Design Interview questions

Top most important Web Design interview questions and answers by Experts:

Here is a list of Top most important Web Design interview questions and answers by Experts.If you want to download Web Design interview questions pdf free ,you can register with RVH techguru. Our experts prepared these Web Design interview questions to accommodate freshers level to most experienced level technical interviews.

If you want to become an expert in Web Design ,Register for Web Design online training here.

 

1) What do you mean by CSS File? What is the use of this file ?
     CSS stands for “Cascading Style Sheets”, and are used to control and manage font styles, font sizes, and web site colour        combinations that are used in a web page. In order to retain continuity of “look and feel” throughout a website, all pages within a website will often refer to a single CSS file. The CSS file is typically contained in a separate file from the website, and the various web pages retrieve the CSS file each time a web page is displayed. CSS files make global appearance changes easy — a single change in a CSS file will mean that any pages using that CSS file will automatically display the change
2) How do I make a Image as a background on my web pages?
     Point the body background to the name of your image you wish to use as the background as shown below. This body line should be the first line after your
< / head> tag.
< body background=”picture.gif” >
You can also have the background image fixed, so it does not move when using the scroll bar in the browser. To do this add the BGPROPERTIES tag as shown below.
< body background=”picture.gif” bgproperties=”fixed” >
3) How to add scrolling text to my page?
     Keep in mind not all browsers support scrolling text. however to do this add a tag similar to the below example. < marquee >THIS WOULD SCROLL< /marquee> The above example would create the below scrolling text. If your browser supports scrolling text the below example should be scrolling. More examples can be found on our main HTML page that lists most of the HTML commands.
4) How do I make it so that someone can mail me by just clicking on text with subject?
     Use the mailto command in your A HREF link tag as shown below.
< A HREF=”mailto:support@computerhope.com?Subject=Enquiry” “>Click here to mail Computer Hope< / A> .
5) How do I align pictures so that one may be higher or lower than the other?
     Use the align statement in your IMG SRC tag as shown below. < IMG SRC=”http://www.computerhope.com/chguy.gif” align=top > Also, instead of align=top you can do align=middle, and align=bottom. .
6) What is external Style Sheet? How to link?
     External Style Sheet is a template/document/file containing style information which can be linked with any number of HTML documents. This is a very convenient way of formatting the entire site as well as restyling it by editing just one file. The file is linked with HTML documents via the LINK element inside the HEAD element. Files containing style information must have extension .css, e.g. style.css.
< HEAD > < LINK REL=STYLESHEET HREF=”style.css” TYPE=”text/css”> < / HEAD>
7) Is CSS case sensitive?
     Cascading Style Sheets (CSS) is not case sensitive. However, font families, URLs to images, and other direct references with the style sheet may be. The trick is that if you write a document using an XML declaration and an XHTML doctype, then the CSS class names will be case sensitive for some browsers. It is a good idea to avoid naming classes where the only difference is the case, for example: div.myclass { …} div.myClass { … } If the DOCTYPE or XML declaration is ever removed from your pages, even by mistake, the last instance of the style will be used, regardless of case.
8) What are the five possible values for “position”?
      Values for position: static, relative, absolute, fixed, inherit
9) What are JavaScript types?
      Number, String, Boolean, Function, Object, Null, Undefined.
10) What does is NaN function do?
       Return true if the argument is not a number.
11) How do you convert numbers between different bases in JavaScript?
       Use the parseInt() function, that takes a string as the first parameter, and the base as a second parameter. So to convert hexadecimal 3F to decimal, use parseInt (“3F”, 16);
12) What is negative infinity?
        It’s a number in JavaScript, derived by dividing negative number by zero.
13) What does “1”+2+4 evaluate to?
        Since 1 is a string, everything is a string, so the result is 124.
14) What is the difference between an alert box and a confirmation box?
        An alert box displays only one button which is the OK button whereas the Confirm box displays two buttons namely OK and cancel.
15) What is a prompt box?
        A prompt box allows the user to enter input by providing a text box.

16) Have you learned something new or interesting lately?
        Make sure you know all the relevant news and blogs. You should be reading them regardless, but doing so on a daily basis during your job search is important. Be ready to talk casually and fluently about the latest web trends.
17) Why did you get into coding, programming, etc.?
       “Because I can make good $,” “I don’t like to dress up or shave,” and “because I loved the movie Hackers,” are not good enough answers. Well… a comment about Hackers might fly but make sure you have a real backstory that describes your “Aha!” moment.
18) What is your preferred development environment?
        This is your chance to talk shop and demonstrate some industry knowledge. Be prepared to talk about your favorite editor, browser, plug-ins, operating system, and other tools. Freshen up on your lingo.
19) What is the coolest thing you ever coded? Do you have any personal projects you are working on?
       These two questions are interchangeable. Any developer worth his weight had to practice somewhere or on something before they landed their first gig. If not, how did you get this interview anyway?! Review your past experiences, and even if they were boring to you, figure out a new frame of reference that demonstrates passion and a zest for learning.
20) How do you optimize a website’s assets?
        There are a number of answers to this question: File concatenation, file compression, CDN Hosting, offloading assets, re-organizing and refining code, etc. Have a few ready.
21) What are three ways to reduce page load time?
        Again there are many answers here: Reduce image sizes, remove unnecessary widgets, HTTP compression, put CSS at the top and script references at the bottom or in external files, reduce lookups, minimize redirects, caching, etc.
22) What kind of things must you be wary of when design or developing for multilingual sites?
         Another problem with many solutions: setting the default language, using Unicode encoding, using the ‘lang’ attribute, being aware of standard font sizes and text direction, and language word length (may affect layout).
23) What is HTML?
         HTML stands for HyperText Markup Language. It is the dominant markup language for creating websites and anything that can be viewed in a web browser. If you want to get some extra bonus points, you can learn the history of HTML and throw in some obscure facts.
24) What is the difference between HTML elements and tags?
        HTML elements communicate to the browser how to render text. When surrounded by angular brackets <> they form HTML tags. For the most part, tags come in pairs and surround text.
25) What is “Semantic HTML?”
        Semantic HTML is a coding style where the tags embody what the text is meant to convey. In Semantic HTML, tags like <b></b> for bold, and <i></i> for italic should not be used, reason being they just represent formatting, and provide no indication of meaning or structure. The semantically correct thing to do is use <strong></strong> and <em></em>. These tags will have the same bold and italic effects, while demonstrating meaning and structure (emphasis in this case).
26) What does DOCTYPE mean?
        The term DOCTYPE tells the browser which type of HTML is used on a webpage. In turn, the browsers use DOCTYPE to determine how to render a page. Failing to use DOCTYPE or using a wrong DOCTYPE may load your page in Quirks Mode. See example:
<!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.01 Transitional//EN” “http://www.w3.org/TR/html4/loose.dtd”>.
27) What’s the difference between standards mode and quirks mode?
        Quirks Mode is a default compatibility mode and may be different from browser to browser, which may result to a lack of consistency in appearance from browser to browser.
28) What are the limitations when serving XHTML pages?
        Perhaps the biggest issue is the poor browser support XHTML currently enjoys. Internet Explorer and a number of other user agents cannot parse XHTML as XML. Thus, it is not the extensible language it was promised to be. There are many other issues. Take your pick.

29) How many HTML tags are should be used for the most simple of web pages?
        8 total. 4 pairs of tags.
<HTML>
<HEAD>
<TITLE>Simplest page ever!</TITLE>
</HEAD>
<BODY>
Doesn’t get simpler than this.
</BODY>
</HTML>
30) How do you make comments without text being picked up by the browser?
         Comments are used to explain and clarify code or to prevent code from being recognized by the browser. Comments start with “*<!–” and end with ” –>“.
<!– Insert comment here. –>
31)  What is the difference between linking to an image, a website, and an email address?
         To link an image, use <img> tags. You need specify the image in quotes using the source attribute, src in the opening tag. For hyperlinking, the anchor tag, <a>, is used and the link is specified in the href attribute. Text to be hyperlinked should be placed between the anchor tags. Little known fact: href stands for “hypertext reference.” When linking to an email, the href specification will be “mailto:send@here.com.” See examples below:
<img src=”HTMLrocks.jpg”></img>
<a href=”skilprelaunch2.wpengine.com”>Skilledup</a>
<a href=”brad@skilledup.com”>Email Me</a>
32) My hyperlink or image is not displaying correctly, what is wrong with it?
        It could be any number of things, but the most common mistakes are leaving out a tag bracket or quote missing for href, src, or alt text may be the issue. You should also verify the link itself.
33) What is the syntax difference between a bulleted list and numbered list?
         Bulleted lists use the <ul> tag, which stands for “unordered,” whereas <ol> is used to create an ordered list.
34) What is the difference between <div> and <frame>?
         A <div> is a generic container element for grouping and styling, whereas a<frame> creates divisions within a web page and should be used within the <frameset> tag. The use of <frame> and <frameset> are no longer popular and are now being replaced with the more flexible <iframe>, which has become popular for embedding foreign elements (ie. Youtube videos) into a page.
35) What is the difference between the application model of HTML and HTML5?
         Trick question, there is no difference. HTML5 is a continuum of HTML and just a souped up version of the original HTML. There has been no major paradigm shift.
36) what’s the real difference between HTML and HTML5?
        There are many. From a broader perspective, HTML was a simple language for laying out text and images on a webpage, whereas HTML5 can be viewed as an application development platform that does what HTML does that and more, including better support for audio, video, and interactive graphics. It has a number of new elements, supports offline data storage for applications, and has more robust exchange protocols. Thus, proprietary plug-in technologies like Adobe Flash, Microsoft Silverlight, Apache Pivot, and Sun JavaFX are no longer needed, because browsers can now process these elements without additional requirements.
37) What is the new DOCTYPE?
        Instead of typing out a ridiculously long DOCTYPE statement to tell the browser how to render your webpage, this long line of code has been truncated to <!doctype html>.
38) What are some new HTML5 markup elements?
        There are several: <article>, <aside>, <bdi>, <command>, <details>, <figure>, <figcaption>, <summary>, <header>, <footer>, <hgroup>, <mark>, <meter>, <nav>, <progress>, <ruby>, <rt>, <section>, <time>, and <wpr>.

39) What are the new media-related elements in HTML5?

         HTML5 has strong support for media. There are now special <audio> and <video> tags. There are additional A/V support tags as well: <embed> is a container for 3rd party applications. <track> is for adding text tracks to media. <source> is useful for A/V media from multiple sources.
40) What are the new image elements in HTML5?
Canvas and WebGL. <Canvas> is a new element that acts as a container for graphical elements like images and graphics. Coupled with JavaScript, it supports 2D graphics. WebGL stands for Web Graphics Language, a free cross-platform API that is used for generating 3D graphics in web browsers.
41) What is the difference between SVG and <Canvas>?
       <Canvas> is an element that manipulates two-dimensional (2D) pixels while Scalable Vector Graphics works in 2D and three-dimensional (3D) vectors. Essentially, <Canvas> is to SVG as Photoshop is to Illustrator.
42) What are some new input attributes in HTML5?
        There are many new form elements including: datalist, datetime, output, keygen, date, month, week, time, number, range, email, and url.
43) What are data- attributes good for?
        The HTML5 data- attribute is a new addition that assigns custom data to an element. It was built to store sensitive or private data that is exclusive to a page or application, for which there are no other matching attributes or elements.
44) What is the difference between HTML5 interaction in Sencha and Twitter/Bootstrap?
        Sencha and Twitter/Bootstrap are both HTML development frameworks that integrate HTML5, CSS3, and JavaScript. The major difference is that in Sencha, the three languages are all comingled together in code, whereas in Bootstrap, HTML and CSS and decoupled.
45) What purpose do Work Workers serve and what are some of their benefits?
        Web Workers are background scripts that do not interfere with the user interface or user interactions on a webpage, allowing HTML to render uninterrupted while JavaScript works in the background.
46) Describe the difference between cookies, sessionStorage, and localStorage.
        Cookies are small text files that websites place in a browser for tracking or login purposes. Meanwhile, localStorage and sessionStorage are new objects, both of which are storage specifications but vary in scope and duration. Of the two, localStorage is permanent and website-specific whereas sessionStorage only lasts as long as the duration of the longest open tab.
47) What are some of the major new API’s that come standard with HTML5?
        To name a few: Media API, Text Track API, Application Cache API, User Interaction, Data Transfer API, Command API, Constraint Validation API, and the History API.
48) What is the difference in caching between HTML5 and the old HTML?
        An important feature of HTML5 is the Application Cache. It creates an offline version of a web application. and stores website files such as HTML files, CSS, images, and JavaScript, locally. It is a feature that speeds up site performance.

49) What elements have disappeared?
As mentioned above, <frame> and <frameset> have been eliminated. Other elements that are no longer supported include: <noframe>, <applet>, <bigcenter> and<basefront>.