Search...

Friday, October 16, 2015

TERMS RELATED TO .NET

CLR(COMMON LANGUAGE RUNTIME)-It is the heart of .Net framework which is responsible for 
  • Converting source code into MSIL(Microsoft Intermediate Language )
  • Automatic memory management
  • Framework efficiency and effectively does he memory management.
  • Garbage collection
  • Overall execution of the .net source code and error management.
 .Net framework acts as a middle layer between OS and program language.

Thursday, October 15, 2015

What is SQL? Why we use SQL? SQL Process?

SQL

SQL is Structured Query Language, which is a computer language for storing, manipulating and retrieving data stored in relational database.

INTRODUCTION TO .NET

.NET  is a technology of Microsoft which is used to develop different kinds of application oriented software. It is not an operating system but a technology which supports more than 70 languages in current scenarios to develop application oriented software, this is done by its language independent framework( redirected from Next Generation Windows Service).

Wednesday, June 17, 2015

HTML & CSS The Complete Reference

Title : HTML & CSS - The Complete Reference
eBook format : pdf


About the book

HTML has been on a wild ride. Sure, HTML started as a mere markup language, but more recently HTML's put on some major muscle. Now we've got a language tuned for building web applications with Web storage, 2D drawing, offline support, sockets and threads, and more. And to speak this language you've got to go beyond HTML5 markup and into the world of the DOM, events, and JavaScript APIs.

What are the types of lookup caches?What is Dynamic lookup Transformation? when we use?

Static, Dynamic, Persistent, Re-cache. 

Dynamic lookup updates cache before writes data into the target, first it will update cache then only it updates target table. Generally we are using it in SCD's. 

Tuesday, April 28, 2015

What is Tunneling (VPN)?

Virtual Private Networks creates a tunnel for using a public network (such as Internet) to transfer information between client's PC and office's network. To initiate tunnel in client PC it must have VPN software to connect the ISP router (RAS). After verification of validity of user, software establishes the connection between ISP and use client machine. 

What is Network Security Threats?

• Computer Security means to protect information. It deals with prevention and detection of unauthorized actions by users of a computer.
In simple words security is defined as "Protecting information system from unintended access"

What is Network Security? Explain Basic Requirements of Network Security.

Network security is a broad topic with multilayered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively.

Explain Types of Firewall Architectures

Internet provides a two-way flow of traffic that may be undesirable in many organizations where some information may concern exclusively within the organization or for Intranet. Intranet is aTCP/IP network that is modeled after the Internet that only works within the organization. In order to delineate information meant only for the benefit of the organization or its Intranet and the other open to all or meant for Internet, some sorts of security measures need to be employed to control two-way flow of traffic. The measure known, as firewall is simply used for this purpose.

What is Firewall?

A firewall is a device installed between the internet network of an organization and the rest of Internet. When a computer is connected to Internet, it can create many problems for corporate companies. Most companies put a large amount of confidential information online. Such an information should not be disclosed to the unauthorized persons. Second problem is that the virus, worms and other digital pests can breach the security and can destroy the valuable data.

Types of Servers

File servers. -With a file server, the Computer Network client passes requests for computer network files or file records over a computer network to the file server. This form of computer network data service requires large bandwidth and can slow a computer network with many users down considerably. Traditional LAN (Local area Network) computing allows users to share resources, such as data files and peripheral devices, by moving them from standalone PCUs onto a Networked File Server (NFS).

What is packet

packet is the unit of data that is routed between an origin of  computer  network and a destination of computer network on the Internet or any other packet-switched computer network. When any file (e-mail message, HTML file, Graphics Interchange Format file, Uniform Resource Locator request, and so forth) is sent from one place of computer network to another place of computer network on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP of computer network.

What is Switching? What is Network Switch?

Switching: Every time in computer network you access the internet or another  computer network outside your immediate location, your messages are sent through a maze of transmission media and connection devices. The mechanism for moving information between different computer network and network segment is called switching in computer network.

What is Router

Router: Routers are devices (computers) containing software that help in determining the best path out of the available paths, for a particular transmission. They consist of a combination of hardware and software. The hardware includes the physical interfaces to the various networks in the internet work. The two main pieces of software in a router are the operating system and the routing protocol.

What is a Modem? Types of Modems

Modem is abbreviation for Modulator – Demodulator. Modems are used for data transfer from one computer network to another computer network through telephone lines. The computer network works in digital mode, while analog technology is used for carrying massages across phone lines.

MAC Address - What do you understand by MAC address?

In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.)

SubNetting - What is Subnetting?

The process of subnetting involves dividing a network up into smaller networks called subnets or sub networks. Each of these subnets has its own specific address. To create these additional networks we use a subnet mask. The subnet mask simply determines which portion of the IP address belongs to the host. The subnet address is created by dividing the host address into network address and host address.

Public IP Address - What Is a Public IP Address?ARP

An IP address is considered public if the IP number is valid and falls outside any of the IP address ranges reserved for private uses by Internet standards group. Public IP addresses are used by servers (including those for Web sites and DNS servers), network routers or any computer connected directly to the Internet via a modem.

IP Address Classes or Classful addressing

• IP addressing supports five different address classes: A, B, C, D and E. Only classes A, Band C are available for commercial use.
• We can find the class of an address when given the address in binary notation or dotted decimal notation.

What is IP (Internet Protocol)? IPV4 & IPV6 (Internet Protocol Versions)

In order to provide computer to computer communication via Internet, we need a global addressing scheme. Such an addressing is provided by Internet Protocol (IP) at the network layer.

JDBC operations - SELECT, INSERT, UPDATE, DELETE

  • How to insert new records/rows in database tables (INSERT operation)
  • How to find a record/row in database tables (SELECT operation)
  • How to update records/rows in tables (UPDATE operation)
  • How to delete a record/row from tables (DELETE operation)

Implementation of 0/1 Knapsack problem using Dynamic Programming in Java

What is 0/1 Knapsack problem ?The knapsack or rucksack problem is a problem in combinatorial optimization. Here there are a set of items(n) which has a profit value(v) and weight(w). 

Saturday, April 4, 2015

SQL Interview Questions

SQL Queries Interview Questions - Oracle Part 1
As a database developer, writing SQL queries, PLSQL code is part of daily life. Having a good knowledge on SQL is really important. Here i am posting some practical examples on SQL queries.

To solve these interview questions on SQL queries you have to create the products, sales tables in your oracle database. The "Create Table", "Insert" statements are provided below.

SQL Queries


1.     To fetch ALTERNATE records from a table. (EVEN NUMBERED)
select * from emp where rowid in (select decode(mod(rownum,2),0,rowid, null) from emp);


2.     To select ALTERNATE records from a table. (ODD NUMBERED)
select * from emp where rowid in (select decode(mod(rownum,2),0,null ,rowid) from emp);


3.     Find the 3rd MAX salary in the emp table.
select distinct sal from emp e1 where 3 = (select count(distinct sal) from emp e2 where e1.sal <= e2.sal);


4.     Find the 3rd MIN salary in the emp table.
select distinct sal from emp e1 where 3 = (select count(distinct sal) from emp e2where e1.sal >= e2.sal);


5.     Select FIRST n records from a table.
select * from emp where rownum<= &n;

Informatica Important Questions?

What are the differences between Connected and Unconnected Lookup?
The differences are illustrated in the below table
Connected Lookup
Unconnected Lookup
Connected lookup participates in dataflow and receives input directly from the pipeline
Unconnected lookup receives input values from the result of a LKP: expression in another transformation
Connected lookup can use both dynamic and static cache
Unconnected Lookup cache can NOT be dynamic
Connected lookup can return more than one column value ( output port )
Unconnected Lookup can return only one column value i.e. output port
Connected lookup caches all lookup columns
Unconnected lookup caches only the lookup output ports in the lookup conditions and the return port
Supports user-defined default values (i.e. value to return when lookup conditions are not satisfied)
Does not support user defined default values

Friday, April 3, 2015

Power Exchange, Power Center, Power mart

PowerCenter===========PowerCenter can have many repositories. It supports the Global Repository and networked local repositories.PowerCenter can connect to all native legacy source systems such as Mainframe, ERP, CRM, EAI (TIBCO, MSMQ, JMQ) High Availability and Load sharing on multiple servers in the grid.Informatica Session level Partioning is available.Informatica Pushdown Optimizer is available.

Friday, March 27, 2015

Difference between win XP,7,8

1. No Start Button – Metro UI

2. Simpler Task Manager

3. Improvements to Copy, Move, Rename and Delete

4. The New Windows Explorer

5. Fast Startup Mode

6. Plug-in Free Browsing

7. Reengineered Boot Experience

8. Sign in using Windows Live ID

9. Refresh/Reset Your PC

10. Scaling for Different Screen Sizes

Recovery Console? not in windows 7,8

The Recovery Console is acommand line based, advanced diagnostic feature available in some versions of the Windows operating system.
The Recovery Console is used to help resolve a number of major system problems.

How to convert MBR partition to GPT while installing windows 7,8?

MBR stands for Master Boot Record
GPT stand s for GUID partition Table

GPT is not recognized by all previous version of windows require disk space more than 2TB.

What is boot.ini?How to find it in new windows? NTLDR?

Boot.ini lists all the Operating Systems present in the computer and provide information about which partitions they are located on.

Monday, March 23, 2015

Data Warehouse, Data Mart, ETL, OLAP, OLTP, Dimensions, Schema, Star & snowflake schema

1.             Definition of data warehousing?
ΓΌ   Data warehouse is a Subject oriented, Integrated, Time variant, Non volatile collection of data in support of management's decision making process.
                                                                                     

Difference between forward and sendRedirect

forward

Control can be forward to resources available within the server from where the call is made.