We provide simple language & easy understandable notes for IT students. Not only IT students for others We will post helpful things. Our authors are trying to help you in IT subjects, you are requested to comment for the same.
Search...
Friday, October 16, 2015
Thursday, October 15, 2015
What is SQL? Why we use SQL? SQL Process?
SQL
SQL is Structured Query Language, which is a computer language for storing, manipulating and retrieving data stored in relational database.
Labels:
process,
SQL,
SQL process,
use of SQL,
what is sql?,
what?,
Why SQL
INTRODUCTION TO .NET
.NET is a technology of Microsoft which is used to develop different kinds of application oriented software. It is not an operating system but a technology which supports more than 70 languages in current scenarios to develop application oriented software, this is done by its language independent framework( redirected from Next Generation Windows Service).
Wednesday, June 17, 2015
HTML & CSS The Complete Reference
Title : HTML & CSS - The Complete Reference
eBook format : pdf
About the book
eBook format : pdf
About the book
HTML has been on a wild ride. Sure, HTML started as a mere markup language, but more recently HTML's put on some major muscle. Now we've got a language tuned for building web applications with Web storage, 2D drawing, offline support, sockets and threads, and more. And to speak this language you've got to go beyond HTML5 markup and into the world of the DOM, events, and JavaScript APIs.
What are the types of lookup caches?What is Dynamic lookup Transformation? when we use?
Static, Dynamic, Persistent, Re-cache.
Dynamic lookup updates cache before writes data into the target, first it will update cache then only it updates target table. Generally we are using it in SCD's.
Tuesday, April 28, 2015
What is Tunneling (VPN)?
Virtual Private Networks creates a tunnel for using a public network (such as Internet) to transfer information between client's PC and office's network. To initiate tunnel in client PC it must have VPN software to connect the ISP router (RAS). After verification of validity of user, software establishes the connection between ISP and use client machine.
What is Network Security Threats?
• Computer Security means to protect information. It deals with prevention and detection of unauthorized actions by users of a computer.
In simple words security is defined as "Protecting information system from unintended access"
What is Network Security? Explain Basic Requirements of Network Security.
Network security is a broad topic with multilayered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively.
Explain Types of Firewall Architectures
Internet provides a two-way flow of traffic that may be undesirable in many organizations where some information may concern exclusively within the organization or for Intranet. Intranet is aTCP/IP network that is modeled after the Internet that only works within the organization. In order to delineate information meant only for the benefit of the organization or its Intranet and the other open to all or meant for Internet, some sorts of security measures need to be employed to control two-way flow of traffic. The measure known, as firewall is simply used for this purpose.
What is Firewall?
A firewall is a device installed between the internet network of an organization and the rest of Internet. When a computer is connected to Internet, it can create many problems for corporate companies. Most companies put a large amount of confidential information online. Such an information should not be disclosed to the unauthorized persons. Second problem is that the virus, worms and other digital pests can breach the security and can destroy the valuable data.
Types of Servers
File servers. -With a file server, the Computer Network client passes requests for computer network files or file records over a computer network to the file server. This form of computer network data service requires large bandwidth and can slow a computer network with many users down considerably. Traditional LAN (Local area Network) computing allows users to share resources, such as data files and peripheral devices, by moving them from standalone PCUs onto a Networked File Server (NFS).
What is packet
A packet is the unit of data that is routed between an origin of computer network and a destination of computer network on the Internet or any other packet-switched computer network. When any file (e-mail message, HTML file, Graphics Interchange Format file, Uniform Resource Locator request, and so forth) is sent from one place of computer network to another place of computer network on the Internet, the Transmission Control Protocol (TCP) layer of TCP/IP of computer network.
What is Switching? What is Network Switch?
Switching: Every time in computer network you access the internet or another computer network outside your immediate location, your messages are sent through a maze of transmission media and connection devices. The mechanism for moving information between different computer network and network segment is called switching in computer network.
What is Router
Router: Routers are devices (computers) containing software that help in determining the best path out of the available paths, for a particular transmission. They consist of a combination of hardware and software. The hardware includes the physical interfaces to the various networks in the internet work. The two main pieces of software in a router are the operating system and the routing protocol.
What is a Modem? Types of Modems
Modem is abbreviation for Modulator – Demodulator. Modems are used for data transfer from one computer network to another computer network through telephone lines. The computer network works in digital mode, while analog technology is used for carrying massages across phone lines.
MAC Address - What do you understand by MAC address?
In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.)
SubNetting - What is Subnetting?
The process of subnetting involves dividing a network up into smaller networks called subnets or sub networks. Each of these subnets has its own specific address. To create these additional networks we use a subnet mask. The subnet mask simply determines which portion of the IP address belongs to the host. The subnet address is created by dividing the host address into network address and host address.
Public IP Address - What Is a Public IP Address?ARP
An IP address is considered public if the IP number is valid and falls outside any of the IP address ranges reserved for private uses by Internet standards group. Public IP addresses are used by servers (including those for Web sites and DNS servers), network routers or any computer connected directly to the Internet via a modem.
IP Address Classes or Classful addressing
• IP addressing supports five different address classes: A, B, C, D and E. Only classes A, Band C are available for commercial use.
• We can find the class of an address when given the address in binary notation or dotted decimal notation.
What is IP (Internet Protocol)? IPV4 & IPV6 (Internet Protocol Versions)
In order to provide computer to computer communication via Internet, we need a global addressing scheme. Such an addressing is provided by Internet Protocol (IP) at the network layer.
JDBC operations - SELECT, INSERT, UPDATE, DELETE
- How to insert new records/rows in database tables (INSERT operation)
- How to find a record/row in database tables (SELECT operation)
- How to update records/rows in tables (UPDATE operation)
- How to delete a record/row from tables (DELETE operation)
Implementation of 0/1 Knapsack problem using Dynamic Programming in Java
What is 0/1 Knapsack problem ?The knapsack or rucksack problem is a problem in combinatorial optimization. Here there are a set of items(n) which has a profit value(v) and weight(w).
Saturday, April 4, 2015
SQL Interview Questions
SQL Queries Interview Questions - Oracle
Part 1
As a database
developer, writing SQL queries, PLSQL code is part of daily life. Having a good
knowledge on SQL is really important. Here i am posting some practical examples
on SQL queries.
To solve these interview questions on SQL queries you have to create the products, sales tables in your oracle database. The "Create Table", "Insert" statements are provided below.
To solve these interview questions on SQL queries you have to create the products, sales tables in your oracle database. The "Create Table", "Insert" statements are provided below.
SQL Queries
1.
To
fetch ALTERNATE records from a table. (EVEN NUMBERED)
select * from emp
where rowid in (select decode(mod(rownum,2),0,rowid, null) from emp);
2.
To
select ALTERNATE records from a table. (ODD NUMBERED)
select * from emp
where rowid in (select decode(mod(rownum,2),0,null ,rowid) from emp);
3.
Find
the 3rd MAX salary in the emp table.
select distinct sal
from emp e1 where 3 = (select count(distinct sal) from emp e2 where e1.sal
<= e2.sal);
4.
Find
the 3rd MIN salary in the emp table.
select distinct sal
from emp e1 where 3 = (select count(distinct sal) from emp e2where e1.sal >=
e2.sal);
5.
Select
FIRST n records from a table.
select * from emp
where rownum<= &n;
Informatica Important Questions?
What are the differences between Connected and
Unconnected Lookup?
The differences are illustrated in
the below table
Connected Lookup
|
Unconnected Lookup
|
Connected lookup participates in
dataflow and receives input directly from the pipeline
|
Unconnected lookup receives input
values from the result of a LKP: expression in another transformation
|
Connected lookup can use both
dynamic and static cache
|
Unconnected Lookup cache can NOT be
dynamic
|
Connected lookup can return more
than one column value ( output port )
|
Unconnected Lookup can return only
one column value i.e. output port
|
Connected lookup caches all lookup
columns
|
Unconnected lookup caches only the
lookup output ports in the lookup conditions and the return port
|
Supports user-defined default values
(i.e. value to return when lookup conditions are not satisfied)
|
Does not support user defined
default values
|
Friday, April 3, 2015
Power Exchange, Power Center, Power mart
PowerCenter===========PowerCenter can have many repositories. It supports the Global Repository and networked local repositories.PowerCenter can connect to all native legacy source systems such as Mainframe, ERP, CRM, EAI (TIBCO, MSMQ, JMQ) High Availability and Load sharing on multiple servers in the grid.Informatica Session level Partioning is available.Informatica Pushdown Optimizer is available.
Friday, March 27, 2015
Difference between win XP,7,8
1. No Start Button – Metro UI
2. Simpler Task Manager
3. Improvements to Copy, Move, Rename and Delete
4. The New Windows Explorer
5. Fast Startup Mode
6. Plug-in Free Browsing
7. Reengineered Boot Experience
8. Sign in using Windows Live ID
9. Refresh/Reset Your PC
10. Scaling for Different Screen Sizes
Recovery Console? not in windows 7,8
The Recovery Console is acommand line based, advanced diagnostic feature available in some versions of the Windows operating system.
The Recovery Console is used to help resolve a number of major system problems.
Labels:
recover windows,
Recovery console
Location:
Bengaluru, Karnataka, India
How to convert MBR partition to GPT while installing windows 7,8?
MBR stands for Master Boot Record
GPT stand s for GUID partition Table
GPT is not recognized by all previous version of windows require disk space more than 2TB.
GPT stand s for GUID partition Table
GPT is not recognized by all previous version of windows require disk space more than 2TB.
What is boot.ini?How to find it in new windows? NTLDR?
Boot.ini lists all the Operating Systems present in the computer and provide information about which partitions they are located on.
Monday, March 23, 2015
Data Warehouse, Data Mart, ETL, OLAP, OLTP, Dimensions, Schema, Star & snowflake schema
1.
Definition of data warehousing?
ΓΌ Data warehouse is a Subject oriented, Integrated, Time variant, Non volatile collection of data in support of management's decision making
process.
Labels:
Data Mart,
Data Warehouse,
Dimensions,
DWH,
ETL,
OLAP,
OLTP,
Schema,
snow flake schema,
star schema
Location:
Bengaluru, Karnataka, India
Difference between forward and sendRedirect
forward
Control can be forward to resources available within the server from where the call is made.
Labels:
Advance Java,
java
Location:
Bengaluru, Karnataka, India
Subscribe to:
Posts (Atom)