Sunday, April 23, 2017

VSAM Interview Questions

VSAM Interview Questions

Virtual Storage Access Method (VSAM) FAQ’s


Q1)     What are the types of VSAM datasets?

A1)     Entry sequenced datasets (ESDS),  key sequenced datasets (KSDS) and relative record dataset (RRDS). 



Q2)     How are records stored in an ESDS, entry sequenced dataset?

A5)     They are stored without respect to the contents of the records and in the order in which they are included in the file.



Q3)     What is a CI, control interval?

A3)     A control interval is the unit of information that  VSAM transfers between virtual and auxiliary storage.



Q4)     What are the distinctive features of a ksds, key sequenced dataset?

A4)     The index and the distributed free space.



Q5)     What is a CA, control area?

A5)     A group of control intervals makes up a control area.



Q6)     What is a sequence set?

A6)     This is the part of the index that points to the CA and CI of the record being accessed.



Q7)     What is the index set?

A7)     This is the other part of the index.  It has multiple levels with pointers that ultimately reach to the sequence set.



Q8)     What is a cluster?

A8)      A cluster is the combination of the index, sequence set and data portions of the dataset.  The operating system gives program access to the cluster, ie. to all parts of the dataset simultaneously.



Q9)     What is the catalog?

Q9)     The catalog contains the names of all datasets, VSAM and non-VSAM. It is used to access these datasets.



Q10)   What is an alternate index?

Q10)   An AIX is a file that allows access to a VSAM dataset by a key other than the primary one.



Q11)   What is a path?

Q11)   A path is a file that allows you to access a file by alternate index - the path provides an association between the AIX and the base cluster.



Q12)   What is the upgrade set?

Q12)   The upgrade set is the list of all AIXes that VSAM must maintain for a specific base cluster, so that when data in the base cluster is updated, the AIX files are also updated.



Q13)   What is free space?

Q13)   Free space is reserved within the data component of a KSDS to accommodate inserting new records.



Q14)   What is a VSAM split?

Q14)   If there isn't enough space in the control interval VSAM performs a control interval split by moving some records to the free control intervals.  If there isn't a free control interval VSAM performs a control area split by allocating a new control area and moving half of the control intervals to it.



Q15)   What is the base cluster?

Q15)   The base cluster consists of the data component and the index component for the primary index of a KSDS.



Q16)   Do primary key values have to be unique?  Do alternate key values have to be unique?

Q16)   Primary key values must be unique; alternate key values need not be.



Q17)   In the COBOL SELECT statement what is the ORGANIZATION for a KSDS?

Q17)   The ORGANIZATION is INDEXED.



Q18)    In the COBOL SELECT statement for a KSDS what are the three possibilities for ACCESS?

Q18)   ACCESS can be SEQUENTIAL, RANDOM or DYNAMIC.



Q19)   What is the COBOL RECORD KEY clause?

Q19)   The RECORD KEY in the SELECT clause identifies the files primary key as it will be known to the program.



Q20)   What is the purpose of the FILE STATUS clause in the SELECT statement?

Q20)   The FILE STATUS field identifies the field that VSAM uses to provide information about each I/O operation for the file.



Q21)   If you wish to use the REWRITE command haw must the VSAM file be opened?

Q21)   It must be opened as I/O.



Q22)   Explain the meaning and syntax for the START command.

Q22)   The START command is used read other than the next VSAM record.  A value must be moved into the RECORD KEY.  The KEY clause is optional, but it can be used to specify a relational (equal, less than, etc.) operator.



Q23)   What is the meaning of dynamic processing?

Q23)   It's rarely used.  It means one program uses both sequential and random processing for a VSAM KSDS file.



Q24)   Name some common VSAM error conditions and codes.

Q24)   They are end of file (10), duplicate key (22), record not found (23), VSAM logic error (90), open problem (92) and space problem (93).



Q25)   What is the VSAM-code field?

Q25)   It is a COBOL II enhancement to VSAM batch processing expanding the FILE STATUS field.  It is defined in WORKING-STORAGE as a six byte group item with three two byte elements, the normal return code, the function code and the feedback code.



Q26)   What is a VSAM slot?

Q26)   A relative record dataset (RRDS) consists of a specified number of areas called slots. Each slot is identified by a relative record number (RRN) which indicates its relative position in the file.



Q27)   What is the utility program closely associated with VSAM?

Q27)   IDCAMS, the access method services utility.



Q28)   There are at least seven IDCAMS commands; name and explain each of them ?.

Q28)    ALTER modifies information for a catalog, alternate index, cluster or path.  BLDINDEX builds the alternate index, of course.  DEFINE is used for ALTERNATEINDEX, CLUSTER or PATH. DELETE removes the catalog entry for a catalog, cluster, alternate index or path. LISTCAT lists information about the dataset.  PRINT prints the dataset contents.  REPRO copies records from one file to another.



Q29)   What are the three levels of definition for the VSAM DEFINE?

Q29)   They are DEFINE CLUSTER, DATA and INDEX.



Q30)   What is the significance of the SHAREOPTIONS parameter?

Q30)   It specifies how the file may be shared between jobs and between batch and CICS environments.



Q31)   What is the meaning of the DEFINE MODEL parameter?

Q31)   It specifies whether Daniela Pestova or Yamila - oops! Wrong models!  The MODEL parameter allows you to model your cluster by modeling it after an existing cluster.



Q32)   What is File Status in VSAM?                                                

Q32)   The FILE STATUS clause of the FILE-CONTROL paragraph  allows  for  each  file  to  be  associated with a file status key (i.e.,  the 2-character  data item specified in the FILE STATUS  clause).  If  the  FILE  STATUS clause is specified for a given file,  a value indicating the status of each I/O operation against that file is placed in the  associated  file  status key.  This value is stored in the file status key as soon as the I/O operation is completed (and before execution of any EXCEPTION/ERROR declarative  or  INVALIDKEY/AT  END phrase associated  with the I/O request).

            Note: This element may behave differently when the CMPR2 compiler option is used. The file status  key  is divided

            into  two  status  keys:  the  first character  is known as file status key 1; the second character is file status key 2.



Q33)   What's a LDS (Linear Data Set) and what's it used for?

Q33)   LDS is a VSAM dataset in name only. It has unstructured 4k (4096 bytes) fixed size CI’s which do not contain control fields and therefore from VSAM's standpoint they do not contain any logical records. There is no free space, and no access from Cobol. Can be accessed by DB2 and IMS fast path datasets. LDS is essentially a table of data maintained on disk. The 'table entries' must be created via a user program and can only be      logically accessed via a user program. When passed, the entire LDS must be mapped into storage, and then data is accessed via base and displacement type processing.



Q34)   What is IDCAMS ?

Q34)   IDCAMS is the Access Method Services program. You run the IDCAMS program and supply AMS commands thru SYSIN. (examples of AMS commands are DELETE, DEFINE, REPRO etc..).



Q35)   Can AMS commands be run from the TSO prompt ?

Q35)   Yes



Q36)   Syntax of  AMS modal commands ?

Q36)   Note: these can be used only under IDCAMS and not from the TSO prompt.

IF LASTCC(or MAXCC)  >(or <,= etc..) value -

THEN -

DO -

     command set (such as DELETE, DEFINE etc..)

ELSE -

DO -

     command set



LASTCC  - Condition code from the last function (such as delete) executed

MAXCC - Max condition code that was returned by any of the prev functions



SET is also a valid AMS command. SET LASTCC (or MAXCC) = value



The maximum condition code is 16. A cond code of 4 indicates a warning. A cond code of 8 is usually encountered on a DELETE of a dataset that is not present.



Q37)   Under IDCAMS , multiple functions can be executed, each of which returns a cond code. What will be the condition code returned to the operating system ?

Q37)   The maximum condition code generated is returned as the condition code of the IDCAMS step.



Q38)   What is Control Interval, Control Area?

Q38)   Control Interval is analogous to a physical block for QSAM files. It is the unit of I/O.  Must be between 512 bytes to 32 k. Usually either 2K or 4K. A larger control interval increases performance for sequential processing while the reverse is true for random access. Under CICS when a record is locked, the entire CI gets locked.

Control Area is a group of control intervals. CA is used during allocation. CA size is calculated based on the

allocation type (cyl, tracks or records) and can be max of 1 cylinder



Q39)   What is FREESPACE ?

Q39)   Coded in the DEFINE as FREESPACE(ci ca) where ci is the percentage of each control interval to be left free for insertions, ca is the percentage of control intervals in each control area to be left empty.



Q40)   How do you decide on optimum values for CI, FREESPACE etc...?

Q40)   CI size should be based on record length, type of processing. Usually CI is 4K. If record length is larger(>1K), chose 6K or 8K. FREESPACE should be large if more number of insertions are envisaged. Usual values are (20 20) when heavy updates are expected. CI size can be calculated.



Q41)   Would you specify FREESPACE for an ESDS?

Q41)   No. Because you cannot insert records in an ESDS, also when you rewrite a record, it must be of the same length. Thus putting any value for freespace does not make any sense.



Q42)   What is SHAREOPTS ?

Q42)   SHAREOPTS is a parameter in the DEFINE and specifies how an object can be shared among users. It is coded as SHAREOPTS(a b), where a is the cross region share option ie how two or more jobs on a single system can share the file, while b is the cross system share option ie how two or more jobs on different MVS’s can share the file. Usual value is (2 3).



Q43)   What is the meaning of each of the values in SHAREOPTS(2 3)?

Q43)    Value of 2 for cross region means that the file can be processed simultaneously by multiple users provided only one of them is an updater. Value of 3 for cross system means that any number of jobs can process the file for input or output (VSAM does nothing to ensure integrity).



Q44)   How do you define a KSDS ?

Q44)   DEFINE CLUSTER(cluster name) with the INDEXED parameter. Also specify the ds name for the DATA component & the ds INDEX component. Other important parms are RECORDSIZE, KEYS, SHAREOPTIONS.



Q45)   How do you define an ALTINDX ? How do you use ALTINDXs in batch, CICS pgm’s ?

Q45)   DEFINE ALTERNATEINDEX. Important paramters are RELATE where you specify the base cluster name, KEYS, RECORDSIZE,SHAREOPTIONS,UNIQUEKEY(or NONUNIQUEKEY), DATA(ds name for the data component), INDEX(ds name for the index component). Then DEFINE PATH. Important paramters are NAME (ds name for the path), PATHENTRY (ds name of the alternate index name), UPDATE(or NOUPDATE) which specifies whether an alt index is updated when a update to the base cluster takes place. Then BLDINDEX. Parameters are INDATASET(ds name of base cluster), OUTDATASET(ds name of AIX).



Q46)   Using Alternate Indexes in Batch pgms:

Q46)   In the JCL, you must have DD stmts for the cluster and for the path(s). In the COBOL Program, SELECT .. ASSIGN TO ddname for base cluster RECORD KEY IS... ALTERNATE RECORD KEY IS..



Q47)   Using Alternate Indexes in CICS pgms:

Q47)   FCT entries must be created for both base cluster & the path. To read using the alternate index, use the dd name of the path in CICS file control commands.



Q48)   What happens when you open an empty VSAM file in a COBOL program for input?

Q48)   A VSAM file that has never contained a record is treated as unavailable. Attempting to open for input will fail. An empty file can be opened for output only. When you open for output, COBOL will write a dummy record to the file & then delete it out.



Q49)   How do you initialize a VSAM file before any operation? a VSAM with alternate index?

Q49)   Can write a dummy program that just opens the file for output and then closes it.



Q50)   What does a file status of 02 on a VSAM indicate?

Q50)   Duplicate alternate key . Happens on both input and output operation



Q51)   How do you calculate record size of an alternate cluster?  Give your values for both unique and nonunique.

Q51)   Unique Case:  5 + ( alt-key-length + primary-key )

Non unique Case: 5 + ( alt-key-length + n * primary-key ) where n = number of duplicate records for the alternate key



Q52)   What is the difference between sequential files and ESDS files?

Q52)   Sequential (QSAM) files can be created on tape while ESDS files cannot.  Also, you can have ALTINDEX for an ESDS while no such facility exists for QSAM files.



Q53)   How do you load a VSAM data set with records ?

Q53)   Using the REPRO command.



Q54)   How do you define a GDG ?

Q54)   Use the DEFINE GENERATIONDATAGROUP command. In the same IDCAMS step, another dataset must be defined whose DCB parameters are used when new generations of the GDG are created. This dataset is known as the model dataset. The ds name of this model dataset must be the same as that of the GDG, so use a disp of keep rather than catlg and also specify space=(trk,0)



Q55)   Do all versions of the GDG have to be of the same record length ?

Q55)    No,  the DCB of the model dataset can be overridden when you allocate new versions.



Q56)   How are different versions of GDG named ?

Q56)   base-file-name.GnnnnnV00 where nnnn= generation number (upto 255).  nnnn will be 0000 for the 1st generation.



Q57)   Suppose 3 generations of a GDG exist. How would you reference the 1st generation in the JCL? - GS

Q57)   Use GDG name(-2).



Q58)   Suppose a generation of GDG gets created in a particular step of a proc. How would you refer the current  generation in a subsequent step? What would be the disposition of  this generation now? - GS

Q58)   Relative generation numbers are updated only at the end of the job, not at the end of a step. To allocate a new generation, we would be using (+1) with a DISP of  (NEW,CATLG,DELETE). To refer to this in a subsequent step in the same job, we would again use (+1) but with a DISP of SHR or OLD.



Q59)   What more info you should give in the DD statement while defining the next generation of a GDG? - GS

Q59)   Give (+1) as the generation number, give (new,catlg) for disp, give space parameter, can give the DCB  parameter if you want to override the dcb of the model dataset.



Q60)   Assuming that the DEFINE JCL is not available, how do you get info about a VSAM file's organisation?

Q60)   Use the LISTCAT command.



Q61)   During processing of a VSAM file, some system error occurs and it is subsequently unusable . What do you do ?

Q61)   Run VERIFY.



Q62)   How do you fix the problem associated with VSAM out of space condition?

Q62)   Define new VSAM dataset allocated with more space.

Use IDCAMS to REPRO the old VSAM file to new VSAM dataset.

Use IDCAMS to ALTER / rename the old VSAM dataset or se IDCAMS to DELETE the old VSAM dataset.

Use IDCAMS to ALTER / rename the new VSAM dataset to the name of the original VSAM dataset.



Q63)   What is the meaning of VSAM RETURN-CODE 28?

Q63)   Out of space condition is raised.



Q64)   On which datasets You can have ALT INDEX?.

Q64)   only on KSDS and ESDS - not RRDS



Q65)   How many Alternate Indexes you can have on a dataset?

Q65)   255 - but you must be a nut to have so many ALT Indexes on a dataset!



Q66)   Is it slower if you access a record through ALT INDEX as compared to Primary INDEX?

Q66)   Yes. Why? Because the alternate key would first locate the primary key, which in turn locates the actual record. Needs twice the number of I/Os.



Q67)   What is RECOVERY and SPEED parameters in DEFINE CLUSTER command?

Q67)    RECOVERY (default) and SPEED are mutually exclusive. Recovery preformats the control areas during the initial dataset load, if the job fails, you can restart but you must have a recovery routine already written to restart the job. SPEED does not preformat the CAs. It is recommended that you specify SPEED to speed up your initial data load.



Q68)   Describe SHAREOPTIONS parameter (SHR) in Define Cluster command.

Q68)   It defines the cross-region and cross-system sharing capabilities of the dataset. Syntax is SHR(Crvalue, CSvalue) value 1 means multiple read OR single write (read integrity) 2 means multiple read AND single write  (Write integrity) 3 means Multiple read AND multiple write 4 is same as 3, which refreshes the buffer with every random access. default is SHR(1 3).



Q69)   What does the KEYRANGES parameter in Define Cluster commend do?

A69)   It divides a large dataset into several volumes according to the Key ranges specified. e.g., KEYRANGES ((0000001 2999999) (3000000 5999999)). if the activity on the key ranges are evenly distributed, concurrent access is possible, which is a performance improvement.



Q70)   What are the optional parameters to the input dataset While loading the empty cluster with the data records?

A70)   1)FROMADDRESS(address) 2)TOADDRESS(address) where 'address' specifies the RBA value of the key of the input record. 3)FROMNUMBER(rrn) 4)TONUMBER(rrn) where 'rrn' specifies the relative record number of the RRDS record 5)FROMKEY(key) 6)TOKEY(key) where 'key' specifies the key of the input record 7)SKIP(number) 8)COUNT(number) where 'number' specifies the number of records to skip or copy Ex: REPRO INFILE(DD1) OUTFILE(DD2) SKIP(9000) COUNT(700) - Skips the first 9000 records and begins copying at 9001 and copies 700 records from DD1 to DD2.



Q71)    What is IDCAMS? and what is the purpose of it?.

A71)   IDCAMS is an access method services utility used for creating, deleting, altering VSAM files and copying sequential file to a VSAM file, etc.



Q72)    How to delete a member using JCL.

A72)   Using IDCAMS a member can be deleted. DELETE 'XXX.YYY(member)



Q73)    What is the Difference between LDS & ESDS ?

A73)   These two datasets are VSAM datasets. ESDS maintains control information. But LDS does not maintains the control information.



Q74)    Is a delete operation possible in an ESDS?B. Is rewrite operation possible in ESDS ?

A74)   No delete operation is not possible in VSAM ESDS.B. Yes rewrite operation is possible in an ESDS.



Q75)    What is an alternate index and path ?

A75)   An alternate index is an another way of accessing key sequenced data record stored in a base cluster and path is the linkage which connect alternate index to its base cluster.



Q76)    How many buffers are allotted to VSAM KSDS and ESDS?

A76)   2 data buffers by default for ESDS. For KSDS it allots 2 data buffers and 1 index buffers. each buffer is about 4k.



Q77)    what's the biggest disadvantage of using a VSAM dataset?

A77)   FREE SPACE(FPSC)



Q78)    what's the device independent method to indicate where a Record is Stored?

A78)   By USING RBA(Relative Byte Address).



Q79)   How many times secondary space allocated?

A79)   122 TIMES



Q80)   what is the RRN for the first record in RRDS?

A80)   The answer is : 1



Q81)   what is a Base Cluster?

A81)   The Index and data components of a KSDS



Q82)    If FSPC(100 100) is specified does it mean that both the control interval and control area will be left empty because 100 % of both CI and ca are specified to be empty?

A82)   No, they would not be left empty. one record will be written in each CI and 1 CI will be written for each ca.

Siebel Configuration Interview Questions

Siebel Configuration Interview Questions


Question : How does Primary Id field improves performance of an MVG field?
Answer: By default every MVG field executes a separate query on database to fetch data from child BusComp. When primary id field is specified, Siebel does not execute sub-query and instead uses join to fetch the data.

Question : What are the implications if Primary ID field is not used in MVG?
 Answer: If Primary Id is not specified on an MVG then view will take a lot more time to load as for every record in list applet another subquery will be executed.

Question . Is it possible to deploy SRF on server if objects are not checked in?
Answer:Yes, for Business Service BusComp, BusObject and Applet changes, srf can be deployed on server without checking in the objects, however workflow needs all the BO and BC to be checked in before it is activated.

Question . How to disable new record creation for certain users of Siebel?
Answer: Applet's PreCanInvokeMethod Method can be used to disable new button by setting CanInvoke to false, this can be done conditionally by checking the position or responsibility of the current user.

Question . How to make field editable for certain group of users only?
Answer: Create field read only field user property for the field and use calculated field expression to check the responsibilities of user, return N if user has the responsibility to edit the field and Y if it doesn't

Calculated field expression:


    IIF(InList("Edit Field",GetProfileAttrAsList("User Responsibilities"))='Y','N','Y')


This way user who don't have the responsibility will see the field readonly.

Question . How to access user preference in script?

Question . How to access system preference in escript?
Query System Preferences BC on Name and Value fields to get the value of system preference..

            var boSysPref = TheApplication().GetBusObject("System Preferences");
            var bcSysPref = boSysPref.GetBusComp("System Preferences");
             bcSysPref.ClearToQuery();
             bcSysPref.ActivateField("Value");
             bcSysPref.SetViewMode(AllView);
             bcSysPref.SetSearchSpec("Name", sName);
             bcSysPref.ExecuteQuery( ForwardOnly );
       
             if (bcSysPref.FirstRecord())
             {
                sValue = bcSysPref.GetFieldValue("Value");
             }return(sValue);

   
Question . How to set system preference in Siebel?
Administration Application> System Preference view can be used to set the value of system preference.

Question . What could be reason if Picklist field is not showing the drop down sign?
Picklist name is not set on the field.
Picklist is not compiled or picklist values are not created in Siebel
Control's Runtime property is not set to true.

Question . Is it possible to make calculated field as editable field?
Yes, by setting setting pick map on calculated field and field becomes editable, however it won't be able to save the value and will recalculate the value on refresh record.

Question . How can you get the value of parent field value in browser script?
Only fields displayed on UI are accessible in browser script, it is applicable for all the parent and child bus components.

Questions and answers for the mobile developer

Questions and answers for the mobile developer


 What languages are mobile apps programmed in?

Cisco WebEx develops mobile meeting applications for a host of devices. The apps are developed in the programming language best suited to the device and OS we are approaching. So, we develop using C++ for Apple devices running on iOS, Java for BlackBerry devices, Java for Android devices and so on.

How are mobile applications scoped and specified?

Scoping starts with a long, hard look at the device. Mobile devices offer different form factors, screen size and resolution, computing power and functionality. They run different operating systems and have other methods of retrieving data such as wifi or 3G.

The challenge is to understand the device and how it will be used to the best advantage: focus on the benefits of the device, such as size and portability, and ensure that the user experience will be optimised.

What special skills and roles are required?

The important ones are flexibility, speed, and a keen understanding of the user experience. Mobile development jobs require you to work quickly and be ready to respond to lots of changes, such as hardware and software updates, patches and design changes. The tablet is a great example – we have entered into a ‘post PC era’ and the types of things that a tablet will be used for is still evolving.

How do you port applications to multiple platforms?

We have created a single unified architecture that covers all platforms, so that we can ensure a common user experience across devices. However, different platforms utilise different operating systems and system tools, so we have to create a unique client code base for each platform - iOS, Android, and Blackberry. It is possible to reuse some code across Blackberry and Android.

What’s different about mobile app development?

Some of the unique challenges are: designing for a small screen size and resolution; energy management that focuses on optimisation of battery life; managing data access in an environment of variable and potentially inconsistent network access; working with devices that offer limited processor power and RAM in comparison to a PC.

What are the tech challenges?

Platform fragmentation is the biggest, the need to develop and maintain separate apps on each of the different platforms.

Others include: varying levels of maturity of software developer kit and technical documentation; different user interface guidelines; different specs for processor and RAM; differences between mobile platforms in terms of how security is handled, multi-tasking is supported, and content is rendered.

Any other advice for the app developer?

Pick the platform you want to develop on wisely; focus only on one or two platforms in the beginning; and start simple. Focus on core functionality first and add features in subsequent versions as you gain insight and experience.

Top 50 Android Interiew Questions

Top 50 Android Interiew Questions


 1) What is Android?
It is an open-sourced operating system that is used primarily on mobile devices, such as cell phones and tablets. It is a Linux kernel-based system that’s been equipped with rich components that allows developers to create and run apps that can perform both basic and advanced functions.
2) What Is the Google Android SDK?
The Google Android SDK is a toolset that developers need in order to write apps on Android enabled devices. It contains a graphical interface that emulates an Android driven handheld environment, allowing them to test and debug their codes.
3) What is the Android Architecture?
Android Architecture is made up of 4 key components:
- Linux Kernel
- Libraries
- Android Framework
- Android Applications
4) Describe the Android Framework.
The Android Framework is an important aspect of the Android Architecture. Here you can find all the classes and methods that developers would need in order to write applications on the Android environment.
5) What is AAPT?
AAPT is short for Android Asset Packaging Tool. This tool provides developers with the ability to deal with zip-compatible archives, which includes creating, extracting as well as viewing its contents.
6) What is the importance of having an emulator within the Android environment?
The emulator lets developers “play” around an interface that acts as if it were an actual mobile device. They can write and test codes, and even debug. Emulators are a safe place for testing codes especially if it is in the early design phase.
7) What is the use of an activityCreator?
An activityCreator is the first step towards the creation of a new Android project. It is made up of a shell script that will be used to create new file system structure necessary for writing codes within the Android IDE.
8 ) Describe Activities.
Activities are what you refer to as the window to a user interface. Just as you create windows in order to display output or to ask for an input in the form of dialog boxes, activities play the same role, though it may not always be in the form of a user interface.
9) What are Intents?
Intents displays notification messages to the user from within the Android enabled device. It can be used to alert the user of a particular state that occurred. Users can be made to respond to intents.
10) Differentiate Activities from Services.
Activities can be closed, or terminated anytime the user wishes. On the other hand, services are designed to run behind the scenes, and can act independently. Most services run continuously, regardless of whether there are certain or no activities being executed.
11) What items are important in every Android project?
These are the essential items that are present each time an Android project is created:
- AndroidManifest.xml
- build.xml
- bin/
- src/
- res/
- assets/
12) What is the importance of XML-based layouts?
The use of XML-based layouts provides a consistent and somewhat standard means of setting GUI definition format. In common practice, layout details are placed in XML files while other items are placed in source files.
13) What are containers?
Containers, as the name itself implies, holds objects and widgets together, depending on which specific items are needed and in what particular arrangement that is wanted. Containers may hold labels, fields, buttons, or even child containers, as examples.
14) What is Orientation?
Orientation, which can be set using setOrientation(), dictates if the LinearLayout is represented as a row or as a column. Values are set as either HORIZONTAL or VERTICAL.
15) What is the importance of Android in the mobile market?
Developers can write and register apps that will specifically run under the Android environment. This means that every mobile device that is Android enabled will be able to support and run these apps. With the growing popularity of Android mobile devices, developers can take advantage of this trend by creating and uploading their apps on the Android Market for distribution to anyone who wants to download it.
16) What do you think are some disadvantages of Android?
Given that Android is an open-source platform, and the fact that different Android operating systems have been released on different mobile devices, there’s no clear cut policy to how applications can adapt with various OS versions and upgrades. One app that runs on this particular version of Android OS may or may not run on another version. Another disadvantage is that since mobile devices such as phones and tabs come in different sizes and forms, it poses a challenge for developers to create apps that can adjust correctly to the right screen size and other varying features and specs.
17) What is adb?
Adb is short for Android Debug Bridge. It allows developers the power to execute remote shell commands. Its basic function is to allow and control communication towards and from the emulator port.
18) What are the four essential states of an activity?
- Active – if the activity is at the foreground
- Paused – if the activity is at the background and still visible
- Stopped – if the activity is not visible and therefore is hidden or obscured by another activity
- Destroyed – when the activity process is killed or completed terminated
19) What is ANR?
ANR is short for Application Not Responding. This is actually a dialog that appears to the user whenever an application have been unresponsive for a long period of time.
20) Which elements can occur only once and must be present?
Among the different elements, the and elements must be present and can occur only once. The rest are optional, and can occur as many times as needed.
21) How are escape characters used as attribute?
Escape characters are preceded by double backslashes. For example, a newline character is created using ‘\\n’
22) What is the importance of settings permissions in app development?
Permissions allow certain restrictions to be imposed primarily to protect data and code. Without these, codes could be compromised, resulting to defects in functionality.
23) What is the function of an intent filter?
Because every component needs to indicate which intents they can respond to, intent filters are used to filter out intents that these components are willing to receive. One or more intent filters are possible, depending on the services and activities that is going to make use of it.
24) Enumerate the three key loops when monitoring an activity
- Entire lifetime – activity happens between onCreate and onDestroy
- Visible lifetime – activity happens between onStart and onStop
- Foreground lifetime – activity happens between onResume and onPause
25) When is the onStop() method invoked?
A call to onStop method happens when an activity is no longer visible to the user, either because another activity has taken over or if in front of that activity.
26) Is there a case wherein other qualifiers in multiple resources take precedence over locale?
Yes, there are actually instances wherein some qualifiers can take precedence over locale. There are two known exceptions, which are the MCC (mobile country code) and MNC (mobile network code) qualifiers.
27) What are the different states wherein a process is based?
There are 4 possible states:
- foreground activity
- visible activity
- background activity
- empty process
28) How can the ANR be prevented?
One technique that prevents the Android system from concluding a code that has been responsive for a long period of time is to create a child thread. Within the child thread, most of the actual workings of the codes can be placed, so that the main thread runs with minimal periods of unresponsive times.
29) What role does Dalvik play in Android development?
Dalvik serves as a virtual machine, and it is where every Android application runs. Through Dalvik, a device is able to execute multiple virtual machines efficiently through better memory management.
30) What is the AndroidManifest.xml?
This file is essential in every application. It is declared in the root directory and contains information about the application that the Android system must know before the codes can be executed.
31) What is the proper way of setting up an Android-powered device for app development?
The following are steps to be followed prior to actual application development in an Android-powered device:
-Declare your application as “debuggable” in your Android Manifest.
-Turn on “USB Debugging” on your device.
-Set up your system to detect your device.
32) Enumerate the steps in creating a bounded service through AIDL.
1. create the .aidl file, which defines the programming interface
2. implement the interface, which involves extending the inner abstract Stub class as well as implanting its methods.
3. expose the interface, which involves implementing the service to the clients.
33) What is the importance of Default Resources?
When default resources, which contain default strings and files, are not present, an error will occur and the app will not run. Resources are placed in specially named subdirectories under the project res/ directory.
34) When dealing with multiple resources, which one takes precedence?
Assuming that all of these multiple resources are able to match the configuration of a device, the ‘locale’ qualifier almost always takes the highest precedence over the others.
35) When does ANR occur?
The ANR dialog is displayed to the user based on two possible conditions. One is when there is no response to an input event within 5 seconds, and the other is when a broadcast receiver is not done executing within 10 seconds.
36) What is AIDL?
AIDL, or Android Interface Definition Language, handles the interface requirements between a client and a service so both can communicate at the same level through interprocess communication or IPC. This process involves breaking down objects into primitives that Android can understand. This part is required simply because a process cannot access the memory of the other process.
37) What data types are supported by AIDL?
AIDL has support for the following data types:
-string
-charSequence
-List
-Map
-all native Java data types like int,long, char and Boolean
38) What is a Fragment?
A fragment is a part or portion of an activity. It is modular in a sense that you can move around or combine with other fragments in a single activity. Fragments are also reusable.
39) What is a visible activity?
A visible activity is one that sits behind a foreground dialog. It is actually visible to the user, but not necessarily being in the foreground itself.
40) When is the best time to kill a foreground activity?
The foreground activity, being the most important among the other states, is only killed or terminated as a last resort, especially if it is already consuming too much memory. When a memory paging state has been reach by a foreground activity, then it is killed so that the user interface can retain its responsiveness to the user.
41) Is it possible to use or add a fragment without using a user interface?
Yes, it is possible to do that, such as when you want to create a background behavior for a particular activity. You can do this by using add(Fragment,string) method to add a fragment from the activity.
42) How do you remove icons and widgets from the main screen of the Android device?
To remove an icon or shortcut, press and hold that icon. You then drag it downwards to the lower part of the screen where a remove button appears.
43) What are the core components under the Android application architecture?
There are 5 key components under the Android application architecture:
- services
- intent
- resource externalization
- notifications
- content providers
44) What composes a typical Android application project?
A project under Android development, upon compilation, becomes an .apk file. This apk file format is actually made up of the AndroidManifest.xml file, application code, resource files, and other related files.
45) What is a Sticky Intent?
A Sticky Intent is a broadcast from sendStickyBroadcast() method such that the intent floats around even after the broadcast, allowing others to collect data from it.
46) Do all mobile phones support the latest Android operating system?
Some Android-powered phone allows you to upgrade to the higher Android operating system version. However, not all upgrades would allow you to get the latest version. It depends largely on the capability and specs of the phone, whether it can support the newer features available under the latest Android version.
47) What is portable wi-fi hotspot?
Portable Wi-Fi Hotspot allows you to share your mobile internet connection to other wireless device. For example, using your Android-powered phone as a Wi-Fi Hotspot, you can use your laptop to connect to the Internet using that access point.
48) What is an action?
In Android development, an action is what the intent sender wants to do or expected to get as a response. Most application functionality is based on the intended action.
49) What is the difference between a regular bitmap and a nine-patch image?
In general, a Nine-patch image allows resizing that can be used as background or other image size requirements for the target device. The Nine-patch refers to the way you can resize the image: 4 corners that are unscaled, 4 edges that are scaled in 1 axis, and the middle one that can be scaled into both axes.
50) What language is supported by Android for application development?
The main language supported is Java programming language. Java is the most popular language for app development, which makes it ideal even for new Android developers to quickly learn to create and deploy applications in the Android environment.

PHP interview questions and answers for freshers

PHP interview questions and answers for freshers


What is PHP?

PHP is a server side scripting language commonly used for web applications. PHP has many frameworks and cms for creating websites.Even a non technical person can cretae sites using its CMS.WordPress,osCommerce are the famus CMS of php.It is also an object oriented programming language like java,C-sharp etc.It is very eazy for learning

What is the use of "echo" in php?

It is used to print a data in the webpage, Example: , The following code print the text in the webpage

How to include a file to a php page?

We can include a file using "include() " or "require()" function with file path as its parameter.
What's the difference between include and require?

If the file is not found by require(), it will cause a fatal error and halt the execution of the script. If the file is not found by include(), a warning will be issued, but execution will continue.

require_once(), require(), include().What is difference between them?

require() includes and evaluates a specific file, while require_once() does that only if it has not been included before (on the same page). So, require_once() is recommended to use when you want to include a file where you have a lot of functions for example. This way you make sure you don't include the file more times and you will not get the "function re-declared" error.
Differences between GET and POST methods ?

We can send 1024 bytes using GET method but POST method can transfer large amount of data and POST is the secure method than GET method .
How to declare an array in php?

Eg : var $arr = array('apple', 'grape', 'lemon');
What is the use of 'print' in php?

This is not actually a real function, It is a language construct. So you can use with out parentheses with its argument list.
Example print('PHP Interview questions');
print 'Job Interview ');
What is use of in_array() function in php ?

in_array used to checks if a value exists in an array
What is use of count() function in php ?

count() is used to count all elements in an array, or something in an object
What’s the difference between include and require?

It’s how they handle failures. If the file is not found by require(), it will cause a fatal error and halt the execution of the script. If the file is not found by include(), a warning will be issued, but execution will continue.
What is the difference between Session and Cookie?

The main difference between sessions and cookies is that sessions are stored on the server, and cookies are stored on the user’s computers in the text file format. Cookies can not hold multiple variables,But Session can hold multiple variables.We can set expiry for a cookie,The session only remains active as long as the browser is open.Users do not have access to the data you stored in Session,Since it is stored in the server.Session is mainly used for login/logout purpose while cookies using for user activity tracking
How to set cookies in PHP?

Setcookie("sample", "ram", time()+3600);
How to Retrieve a Cookie Value?

eg : echo $_COOKIE["user"];
How to create a session? How to set a value in session ? How to Remove data from a session?

Create session : session_start();
Set value into session : $_SESSION['USER_ID']=1;
Remove data from a session : unset($_SESSION['USER_ID'];
what types of loops exist in php?

for,while,do while and foreach (NB: You should learn its usage)
How to create a mysql connection?

mysql_connect(servername,username,password);
How to select a database?

mysql_select_db($db_name);
How to execute an sql query? How to fetch its result ?

$my_qry = mysql_query("SELECT * FROM `users` WHERE `u_id`='1'; ");
$result = mysql_fetch_array($my_qry);
echo $result['First_name'];
Write a program using while loop

$my_qry = mysql_query("SELECT * FROM `users` WHERE `u_id`='1'; ");
while($result = mysql_fetch_array($my_qry))
{
echo $result['First_name'.]."
";
}
How we can retrieve the data in the result set of MySQL using PHP?

    1. mysql_fetch_row
    2. mysql_fetch_array
    3. mysql_fetch_object
    4. mysql_fetch_assoc

What is the use of explode() function ?

Syntax : array explode ( string $delimiter , string $string [, int $limit ] );
This function breaks a string into an array. Each of the array elements is a substring of string formed by splitting it on boundaries formed by the string delimiter.
What is the difference between explode() and split() functions?

Split function splits string into array by regular expression. Explode splits a string into array by string.
What is the use of mysql_real_escape_string() function?

It is used to escapes special characters in a string for use in an SQL statement
Write down the code for save an uploaded file in php.

if ($_FILES["file"]["error"] == 0)
{
move_uploaded_file($_FILES["file"]["tmp_name"],
      "upload/" . $_FILES["file"]["name"]);
      echo "Stored in: " . "upload/" . $_FILES["file"]["name"];
}
How to create a text file in php?

$filename = "/home/user/guest/newfile.txt";
$file = fopen( $filename, "w" );
if( $file == false )
{
echo ( "Error in opening new file" ); exit();
}
fwrite( $file, "This is a simple test\n" );
fclose( $file );
How to strip whitespace (or other characters) from the beginning and end of a string ?

The trim() function removes whitespaces or other predefined characters from both sides of a string.
What is the use of header() function in php ?

The header() function sends a raw HTTP header to a client browser.Remember that this function must be called before sending the actual out put.For example, You do not print any HTML element before using this function.
How to redirect a page in php?

The following code can be used for it, header("Location:index.php");
How stop the execution of a php scrip ?

exit() function is used to stop the execution of a page
How to set a page as a home page in a php based site ?

index.php is the default name of the home page in php based sites
How to find the length of a string?

strlen() function used to find the length of a string
what is the use of rand() in php?

It is used to generate random numbers.If called without the arguments it returns a pseudo-random integer between 0 and getrandmax(). If you want a random number between 6 and 12 (inclusive), for example, use rand(6, 12).This function does not generate cryptographically safe values, and should not be used for cryptographic uses. If you want a cryptographically secure value, consider using openssl_random_pseudo_bytes() instead.
what is the use of isset() in php?

This function is used to determine if a variable is set and is not NULL
What is the difference between mysql_fetch_array() and mysql_fetch_assoc() ?

mysql_fetch_assoc function Fetch a result row as an associative array, While mysql_fetch_array() fetches an associative array, a numeric array, or both
What is mean by an associative array?

Associative arrays are arrays that use string keys is called associative arrays.
What is the importance of "method" attribute in a html form?

"method" attribute determines how to send the form-data into the server.There are two methods, get and post. The default method is get.This sends the form information by appending it on the URL.Information sent from a form with the POST method is invisible to others and has no limits on the amount of information to send.
What is the importance of "action" attribute in a html form?

The action attribute determines where to send the form-data in the form submission.
What is the use of "enctype" attribute in a html form?

The enctype attribute determines how the form-data should be encoded when submitting it to the server. We need to set enctype as "multipart/form-data" when we are using a form for uploading files
How to create an array of a group of items inside an HTML form ?

We can create input fields with same name for "name" attribute with squire bracket at the end of the name of the name attribute, It passes data as an array to PHP.
For instance :

     

Define Object-Oriented Methodology

Object orientation is a software/Web development methodology that is based on the modeling a real world system.An object is the core concept involved in the object orientation. An object is the copy of the real world enity.An object oriented model is a collection of objects and its inter-relationships
How do you define a constant?

Using define() directive, like define ("MYCONSTANT",150)
How send email using php?

To send email using PHP, you use the mail() function.This mail() function accepts 5 parameters as follows (the last 2 are optional). You need webserver, you can't send email from localhost. eg : mail($to,$subject,$message,$headers);
How to find current date and time?

The date() function provides you with a means of retrieving the current date and time, applying the format integer parameters indicated in your script to the timestamp provided or the current local time if no timestamp is given. In simplified terms, passing a time parameter is optional - if you don't, the current timestamp will be used.
Difference between mysql_connect and mysql_pconnect?

There is a good page in the php manual on the subject, in short mysql_pconnect() makes a persistent connection to the database which means a SQL link that do not close when the execution of your script ends. mysql_connect()provides only for the databasenewconnection while using mysql_pconnect , the function would first try to find a (persistent) link that's already open with the same host, username and password. If one is found, an identifier for it will be returned instead of opening a new connection... the connection to the SQL server will not be closed when the execution of the script ends. Instead, the link will remain open for future use.
What is the use of "ksort" in php?

It is used for sort an array by key in reverse order.
What is the difference between $var and $$var?

They are both variables. But $var is a variable with a fixed name. $$var is a variable who's name is stored in $var. For example, if $var contains "message", $$var is the same as $message.
What are the encryption techniques in PHP

MD5 PHP implements the MD5 hash algorithm using the md5 function,
eg : $encrypted_text = md5 ($msg);

mcrypt_encrypt :- string mcrypt_encrypt ( string $cipher , string $key , string $data , string $mode [, string $iv ] );
Encrypts plaintext with given parameters
What is the use of the function htmlentities?

htmlentities Convert all applicable characters to HTML entities This function is identical to htmlspecialchars() in all ways, except with htmlentities(), all characters which have HTML character entity equivalents are translated into these entities.
How to delete a file from the system

Unlink() deletes the given file from the file system.
How to get the value of current session id?

session_id() function returns the session id for the current session.
What are the differences between mysql_fetch_array(), mysql_fetch_object(), mysql_fetch_row()?

    Mysql_fetch_array Fetch a result row as an associative array, a numeric array, or both.
    mysql_fetch_object ( resource result ) Returns an object with properties that correspond to the fetched row and moves the internal data pointer ahead. Returns an object with properties that correspond to the fetched row, or FALSE if there are no more rows
    mysql_fetch_row() fetches one row of data from the result associated with the specified result identifier. The row is returned as an array. Each result column is stored in an array offset, starting at offset 0.

What are the different types of errors in PHP ?

Here are three basic types of runtime errors in PHP:

    1. Notices: These are trivial, non-critical errors that PHP encounters while executing a script - for example, accessing a variable that has not yet been defined. By default, such errors are not displayed to the user at all - although you can change this default behavior.
    2. Warnings: These are more serious errors - for example, attempting to include() a file which does not exist. By default, these errors are displayed to the user, but they do not result in script termination.
    3. Fatal errors: These are critical errors - for example, instantiating an object of a non-existent class, or calling a non-existent function. These errors cause the immediate termination of the script, and PHP's default behavior is to display them to the user when they take place.

what is sql injection ?

SQL injection is a malicious code injection technique.It exploiting SQL vulnerabilities in Web applications
What is x+ mode in fopen() used for?

Read/Write. Creates a new file. Returns FALSE and an error if file already exists
How to find the position of the first occurrence of a substring in a string

strpos() is used to find the position of the first occurrence of a substring in a string

What is PEAR?

PEAR is a framework and distribution system for reusable PHP components.The project seeks to provide a structured library of code, maintain a system for distributing code and for managing code packages, and promote a standard coding style.PEAR is broken into three classes: PEAR Core Components, PEAR Packages, and PECL Packages. The Core Components include the base classes of PEAR and PEAR_Error, along with database, HTTP, logging, and e-mailing functions. The PEAR Packages include functionality providing for authentication, networking, and file system features, as well as tools for working with XML and HTML templates.
Distinguish between urlencode and urldecode?

This method is best when encode a string to used in a query part of a url. it returns a string in which all non-alphanumeric characters except -_. have replece with a percentege(%) sign . the urldecode->Decodes url to encode string as any %and other symbole are decode by the use of the urldecode() function.

What are the different errors in PHP?

In PHP, there are three types of runtime errors, they are:

Warnings:
These are important errors. Example: When we try to include () file which is not available. These errors are showed to the user by default but they will not result in ending the script.
Notices:
These errors are non-critical and trivial errors that come across while executing the script in PHP. Example: trying to gain access the variable which is not defined. These errors are not showed to the users by default even if the default behavior is changed.

Oracle SQL/PLSQL Interview Questions with Answers

Oracle SQL/PLSQL Interview Questions with Answers


What are joins and Types of join?
Ans. We need retrive data from two or more tables to make our result complete. We need to perform a join.
INNER JOIN
This join returns rows when there is at least one match in both the tables.

OUTER JOIN
There are three different Outer Join methods.

LEFT OUTER JOIN
This join returns all the rows from the left table with the matching rows from the right table. If there are no field matching in the right table then it returns NULL values

RIGHT OUTER JOIN
Right outer join returns all the rows from the right table with the matching rows from the left table. If there are no field matching in the left table then it returns NULL values

FULL OUTER JOIN
Full outer join merge left outer join and right outer join.  this returns row from either table when the conditions are met and returns null value when there is no match

CROSS JOIN
Corss join is  does not necessary any condition to join. The output result contains records that are multiplication of record  from both the tables.

What is DIFFERENCE BETWEEN LEFT, RIGHT OUTER JOIN?
Ans:If there r any values in one table that do not have corresponding values in the other,in an equi join that row will not be selected.Such rows can be forcefully selected by using outer join symbol(+) on either of the sides(left or right)  based on the requirement.

WHAT ARE SET OPERATORS?
Ans: UNION, INTERSECT or MINUS is called SET OPERATORS.

What are different datatypes supported by sql in oracle?
Ans: Char (size), Nchar (size), Varchar2 (size), Nvarchar2 (size) data types for character values, Number (precision, scale), Number, Number (n), Float, Float (binary precision) data types for numerical values, Date data type for date values, Long, Raw (size),  Long Raw,  Clob, Blob, Nclob, Bfile for large objects.

What is difference between long and lob datatypes?
Ans:LOB
1) The maximum size is 4GB. 2) LOBs (except NCLOB) can be attributes of an object type. 3) LOBs support random access to data. 4) Multiple LOB columns per table or LOB attributes in an object type.
LONG
1) The maximum size is 2GB.  2) LONGs cannot.    3) LONGs support only sequential access. 4) Only one LONG column was allowed in a table

How much memory is allocated for date datatype? What is default date format in oracle?
Ans: For Date data type oracle allocates 7 bytes Memory.   Default Date Format is: DD-MON-YY.

What is range for each datatype of sql?
Ans: Datatype Range Char  Varchar2  Number    Float     LONG, RAW, LONGRAW  Large Objects (LOB’s) 2000 bytes  4000 bytes  Precision
1 to 38 Scale -84 to 127  Precision 38 decimals Or 122 binary precision   2 GB  4GB

What is a constraint? What are its various levels?
Ans: Constraint: Constraints are representators of the column to enforce data entity and consistency.There r two levels
1)Column-level constraints 2)Table-level constraints.



Select 3 product which having highest  sale price
 SELECT * FROM ( SELECT * FROM product ORDER BY sales_price DESC) WHERE rownum <= 3

Delete the records from product which having null description
delete from product where product_name is null

Display detail of product which having maximum sale
 SELECT * FROM
( SELECT product_id, count(product_id)as cnt FROM sales group by product_id order by cnt desc) WHERE rownum = 1 
Select customer details and produtct details of cutomer imran
Select p.product_name, c.cutomer_name, p.sale_price from product p, cutomer c, sale s
where p.product_id=s.product_id and c.cutomer_id=s.ccustomer_id and customer_name=’imran’


Difference between DELETE & TRUNCATE statement
Ans. Delete is a DML command. Truncate is a DDL command.
In Delete statement we can use where clause But we can’t use where clause in truncate statement.
Delete activates trigger. Truncate does not activate trigger.
We can rollback delete command. We can not rollback truncate command. Delete does not reset identity of table. Truncate resets identity of table.


 Difference between Primary key and Unique Key
Ans. Primary key and Unique key enforce uniqueness of the column on which they are defined. But by default, the primary key creates a clustered index on the column, where as unique key creates a non-clustered index by default. Another major difference is that primary key does not allow NULL value, but unique key allows one NULL value only.

What are  oracle number, character, date, conversion, other
functions.
Ans.
Oracle Number Functions –
Round (m, [n]),
Trunc (m, [n]),
Power (m, n),
Sqrt,
Abs (m),
Ceil (m),
Floor (m),
Mod (m, n)
  
Oracle Character Functions-
Chr (x)
Concert (string1, string2)
Lower (string)
Upper (string)
Substr (string, from_str, to_str)
ASCII (string)
Length (string)
Initcap (string). 
  
Oracle Date Functions-
sysdate
Months between (d1, d2)
To_char (d, format)
Last day (d)
Next_day (d, day).

Oracle Conversion Functions-
To_char
To_date
To_number
What is syntax of PL/SQL BLOCK
Ans. DECLARE
 
 BEGIN
   
 EXCEPTION
   
 END;

What are different types of oracle PL/SQL BLOCKS?
Ans:
Oracle PL/SQL DECLARE BLOCK – In DECLARE BLOCK all the declarations of the variable used in the program is made. If no variables are used this block will become optional.
Oracle PL/SQL BEGIN BLOCK -  In BEGIN BLOCK all the executable statements are placed. This block is Mandatory.
Oracle EXCEPTION BLOCK – In EXCEPTION BLOCK all the exceptions are handled. this block is optional.

 what is a Oracle PL/SQL cursor? and how to create cursor syntax?
Ans: Cursor is Private SQL area in PL/SQL.
     Declare the Cursor,
     Open the Cursor,
     Fetch values from SQL into the local Variables,
     Close the Cursor.

Type of cursors are supported by oracle pl/sql?
Ans.  There are two types of cursors namely Implicit Cursor, Explicit Cursor.

What is a cursor for loop?
Ans: Cursor For Loop is shortcut process for Explicit Cursors because the Cursor is Open, Rows are fetched once for each iteration and the cursor is closed automatically when all the rows have been processed.

What are cursor attributes?
Ans:  %Found, %NotFound,   %IsOpen, %RowCount are the cursor attributes.

 Use of cursor with “for update of” clause?
Ans: This Clause stop accessing of other users on the particular columns used by the cursor until the COMMIT is issued.

How Exception is different from error?
Ans: Whenever an error occurs Exception raises. Error is a bug whereas the Exception is a warning or error condition.

db2 interview questions with answers

db2 interview questions with answers


Recently the job market for mainframe programmers is improving and keeping in mind the DB2 job opportunities, I thought of coming up with a compilation of db2 interview questions with answers.

    What do you mean by foreign keys?



    Ans:-  Foreign keys are column or combination of columns in a table that have matching value in primary key of another table, thus maintaining relationships between tables.



    What is normalization?



    Ans:-  Normalization is a procedure for reducing redundancy of data and representing data in tabular format.  



    What is a data page?

    

    Ans:-A data page is a unit of data which can be retrieved. It could be either 4K or 32K (depending on the way table is defined).



    What is meant by DB2 bind?



    ANS:-  A DB2 bind is a process that builds an access path of the application to the relational database i.e. DB2 tables.  DB2 bind process does the following

    

    Validates :-Sql statements are validated for valid tables, view and column names. Syntax errors are checked so that these can be corrected.

    

    Verifies :- Bind process verifies that the user or the process is authorized to bind the plan.

    

    Selects :-Selects the access path from the application program to the DB2 objects.





    What is DB2 access path?



    Ans:-  An access path is the method used to access relational data specified in DB2 SQL statements.



    What is a DB2 plan?



; ; ; ;

    Ans:-A DB2 plan is an executable code containing the access path logic produced by the DB2 bind process

    This could  consist of

    

    One or more DBRM or

    One or more packages or

    Combination of DBRM and packages



    What is tablespace and these are of how many types?



    Ans:-  Tablespaces are like containers for storing the tables. Tables are not physical objects while tablespaces are physical objects. There are three types of tablespaces: simple, segmented and partitioned.





    What is cursor stability?



    Ans:-Cursor stability is a type of isolation level which makes sure that the data read by an application program is locked only while its used, as soon as the cursor moves away to another page of data the lock on the previous page is released  so that other programs can access the data for updation. This form of isolation level is high on concurrency but low on integrity of data.





    How to fetch data from more than one table in a single SQL statement?



                    Ans:-For this we can use Joins,  unions or nested selects.



    Define view and Why it is used?



    Ans:- A view is a virtual table containing data from one or more tables, but this data is not stored in a separate spaces.

MAINFRAME - COBOL INTERVIEW QUESTIONS

MAINFRAME - COBOL INTERVIEW QUESTIONS


    Name the divisions in a COBOL program.

    IDENTIFICATION DIVISION, ENVIRONMENT DIVISION, DATA DIVISION, PROCEDURE DIVISION.
    What are the different data types available in COBOL?

    Alpha-numeric (X), alphabetic (A) and numeric (9).
    What does the INITIALIZE verb do? �

    Alphabetic, Alphanumeric fields & alphanumeric edited items are set to SPACES.

    Numeric, Numeric edited items set to ZERO.

    FILLER , OCCURS DEPENDING ON items left untouched.
    What is 77 level used for ?

Elementary level item. Cannot be subdivisions of other items (cannot be qualified), nor can they be subdivided themselves.

    What is 88 level used for ?

    For condition names.
    What is level 66 used for ?

    For RENAMES clause.
    What does the IS NUMERIC clause establish ?

    IS NUMERIC can be used on alphanumeric items, signed numeric & packed decimal items and usigned numeric & packed decimal items. IS NUMERIC returns TRUE if the item only consists of 0-9. However, if the item being tested is a signed item, then it may contain 0-9, + and - .
    How do you define a table/array in COBOL?

    01 ARRAYS.

    05 ARRAY1 PIC X(9) OCCURS 10 TIMES.

    05 ARRAY2 PIC X(6) OCCURS 20 TIMES INDEXED BY WS-INDEX.
    Can the OCCURS clause be at the 01 level?

    No.
    What is the difference between index and subscript?

    Subscript refers to the array occurrence while index is the displacement (in no of bytes) from the beginning of the array. An index can only be modified using PERFORM, SEARCH & SET.

    Need to have index for a table in order to use SEARCH, SEARCH ALL.
    What is the difference between SEARCH and SEARCH ALL?

    SEARCH - is a serial search.

    SEARCH ALL - is a binary search & the table must be sorted ( ASCENDING/DESCENDING KEY clause to be used & data loaded in this order) before using SEARCH ALL.
    What should be the sorting order for SEARCH ALL?

    It can be either ASCENDING or DESCENDING. ASCENDING is default. If you want the search to be done on an array sorted in descending order, then while defining the array, you should give DESCENDING KEY clause. (You must load the table in the specified order).
    What is binary search?

    Search on a sorted array. Compare the item to be searched with the item at the center. If it matches, fine else repeat the process with the left half or the right half depending on where the item lies.
    My program has an array defined to have 10 items. Due to a bug, I find that even if the program access the 11th item in this array, the program does not abend. What is wrong with it?

    Must use compiler option SSRANGE if you want array bounds checking. Default is NOSSRANGE.
    How do you sort in a COBOL program? Give sort file definition, sort statement syntax and meaning.

    Syntax:

    SORT file-1 ON ASCENDING/DESCENDING KEY key....

    USING file-2

    GIVING file-3.

    USING can be substituted by INPUT PROCEDURE IS para-1 THRU para-2

    GIVING can be substituted by OUTPUT PROCEDURE IS para-1 THRU para-2.

    file-1 is the sort workfile and must be described using SD entry in FILE SECTION.

    file-2 is the input file for the SORT and must be described using an FD entry in FILE SECTION and SELECT clause in FILE CONTROL.

    file-3 is the outfile from the SORT and must be described using an FD entry in FILE SECTION and SELECT clause in FILE CONTROL.

    file-1, file-2 & file-3 should not be opened explicitly.

    INPUT PROCEDURE is executed before the sort and records must be RELEASEd to the sort work file from the input procedure.

    OUTPUT PROCEDURE is executed after all records have been sorted. Records from the sort work file must be RETURNed one at a time to the output procedure.
    How do you define a sort file in JCL that runs the COBOL program?

    Use the SORTWK01, SORTWK02,..... dd names in the step. Number of sort datasets depends on the volume of data being sorted, but a minimum of 3 is required.
    What are the two ways of doing sorting in a COBOL program? Give the formats.

    See question 16.
    Give the format of USING and GIVING in SORT statement. What are the restrictions with it?

    See question 16. Restrictions - Cannot massage records, canot select records to be sorted.
    What is the difference between performing a SECTION and a PARAGRAPH?

    Performing a SECTION will cause all the paragraphs that are part of the section, to be performed.

    Performing a PARAGRAPH will cause only that paragraph to be performed.
    What is the use of EVALUATE statement?

    Evaluate is like a case statement and can be used to replace nested Ifs. The difference between EVALUATE and case is that no 'break' is required for EVALUATE i.e. control comes out of the EVALUATE as soon as one match is made.
    What are the different forms of EVALUATE statement?

    EVALUATE EVALUATE SQLCODE ALSO FILE-STATUS

    WHEN A=B AND C=D WHEN 100 ALSO '00'

    imperative stmt imperative stmt

    WHEN (D+X)/Y = 4 WHEN -305 ALSO '32'

    imperative stmt imperative stmt

    WHEN OTHER WHEN OTHER

    imperative stmt imperative stmt

    END-EVALUATE END-EVALUATE

    EVALUATE SQLCODE ALSO A=B EVALUATE SQLCODE ALSO TRUE

    WHEN 100 ALSO TRUE WHEN 100 ALSO A=B

    imperative stmt imperative stmt

    WHEN -305 ALSO FALSE WHEN -305 ALSO (A/C=4)

    imperative stmt imperative stmt

    END-EVALUATE END-EVALUATE
    How do you come out of an EVALUATE statement?

    After the execution of one of the when clauses, the control is automatically passed on to the next sentence after the EVALUATE statement. There is no need of any extra code.
    In an EVALUATE statement, can I give a complex condition on a when clause?

    Yes.
    What is a scope terminator? Give examples.

    Scope terminator is used to mark the end of a verb e.g. EVALUATE, END-EVALUATE; IF, END-IF.
    How do you do in-line PERFORM?

    PERFORM ... ...

    END PERFORM
    When would you use in-line perform?

When the body of the perform will not be used in other paragraphs. If the body of the perform is a generic type of code (used from various other places in the program), it would be better to put the code in a separate para and use PERFORM paraname rather than in-line perform.

27. What is the difference between CONTINUE & NEXT SENTENCE ?

CONTINUE is like a null statement (do nothing) , while NEXT SENTENCE transfers control to the next sentence (!!) (A sentence is terminated by a period)

    What does EXIT do ?

    Does nothing ! If used, must be the only sentence within a paragraph.
    Can I redefine an X(100) field with a field of X(200)?

    Yes. Redefines just causes both fields to start at the same location. For example:

    01 WS-TOP PIC X(1)

    01 WS-TOP-RED REDEFINES WS-TOP PIC X(2).

    If you MOVE '12' to WS-TOP-RED,

    DISPLAY WS-TOP will show 1 while

    DISPLAY WS-TOP-RED will show 12.
    Can I redefine an X(200) field with a field of X(100) ?

    Yes.
    What do you do to resolve SOC-7 error?

    Basically you need to correcting the offending data.

    Many times the reason for SOC7 is an un-initialized numeric item. Examine that possibility first.

    Many installations provide you a dump for run time abends ( it can be generated also by calling some subroutines or OS services thru assembly language). These dumps provide the offset of the last instruction at which the abend occurred. Examine the compilation output XREF listing to get the verb and the line number of the source code at this offset. Then you can look at the source code to find the bug. To get capture the runtime dumps, you will have to define some datasets (SYSABOUT etc ) in the JCL.

    If none of these are helpful, use judgement and DISPLAY to localize the source of error.

    Some installtion might have batch program debugging tools. Use them.
    How is sign stored in Packed Decimal fields and Zoned Decimal fields?

    Packed Decimal fields: Sign is stored as a hex value in the last nibble (4 bits ) of the storage.

    Zoned Decimal fields: As a default, sign is over punched with the numeric value stored in the last bite.
    How is sign stored in a comp-3 field?

    It is stored in the last nibble. For example if your number is +100, it stores hex 0C in the last byte, hex 1C if your number is 101, hex 2C if your number is 102, hex 1D if the number is -101, hex 2D if the number is -102 etc...
    How is sign stored in a COMP field ?

    In the most significant bit. Bit is on if -ve, off if +ve.
    What is the difference between COMP & COMP-3 ?

    COMP is a binary storage format while COMP-3 is packed decimal format.
    What is COMP-1? COMP-2?

    COMP-1 - Single precision floating point. Uses 4 bytes.

    COMP-2 - Double precision floating point. Uses 8 bytes.
    How do you define a variable of COMP-1? COMP-2?

    No picture clause to be given. Example 01 WS-VAR USAGE COMP-1.
    How many bytes does a S9(7) COMP-3 field occupy ?

    Will take 4 bytes. Sign is stored as hex value in the last nibble.

    General formula is INT((n/2) + 1)), where n=7 in this example.
    How many bytes does a S9(7) SIGN TRAILING SEPARATE field occupy ?

    Will occupy 8 bytes (one extra byte for sign).
    How many bytes will a S9(8) COMP field occupy ?

    4 bytes.
    What is the maximum value that can be stored in S9(8) COMP?

    99999999
    What is COMP SYNC?

    Causes the item to be aligned on natural boundaries. Can be SYNCHRONIZED LEFT or RIGHT.

    For binary data items, the address resolution is faster if they are located at word boundaries in the memory. For example, on main frame the memory word size is 4 bytes. This means that each word will start from an address divisible by 4. If my first variable is x(3) and next

    one is s9(4) comp, then if you do not specify the SYNC clause, S9(4) COMP will start from byte 3 ( assuming that it starts from 0 ). If you specify SYNC, then the binary data item will start from address 4. You might see some wastage of memory, but the access to this

    computational field is faster.
    What is the maximum size of a 01 level item in COBOL I? in COBOL II?

    In COBOL II: 16777215
    How do you reference the following file formats from COBOL programs:

    Fixed Block File - Use ORGANISATION IS SEQUENTIAL. Use RECORDING MODE IS F, BLOCK CONTAINS 0 .

    Fixed Unblocked - Use ORGANISATION IS SEQUENTIAL. Use RECORDING MODE IS F, do not use BLOCK CONTAINS

    Variable Block File - Use ORGANISATION IS SEQUENTIAL. Use RECORDING MODE IS V, BLOCK CONTAINS 0. Do not code the 4 bytes for record length in FD ie JCL rec length will be max rec length in pgm + 4

    Variable Unblocked - Use ORGANISATION IS SEQUENTIAL. Use RECORDING MODE IS V, do not use BLOCK CONTAINS. Do not code 4 bytes for record length in FD ie JCL rec length will be max rec length in pgm + 4.

    ESDS VSAM file - Use ORGANISATION IS SEQUENTIAL.

    KSDS VSAM file - Use ORGANISATION IS INDEXED, RECORD KEY IS, ALTERNATE RECORD KEY IS

    RRDS File - Use ORGANISATION IS RELATIVE, RELATIVE KEY IS

    Printer File - Use ORGANISATION IS SEQUENTIAL. Use RECORDING MODE IS F, BLOCK CONTAINS 0. (Use RECFM=FBA in JCL DCB).
   
What are different file OPEN modes available in COBOL?

    Open for INPUT, OUTPUT, I-O, EXTEND.
    What is the mode in which you will OPEN a file for writing?

    OUTPUT, EXTEND
    In the JCL, how do you define the files referred to in a subroutine ?

    Supply the DD cards just as you would for files referred to in the main program.
    Can you REWRITE a record in an ESDS file? Can you DELETE a record from it?

    Can rewrite(record length must be same), but not delete.
    What is file status 92?

    Logic error. e.g., a file is opened for input and an attempt is made to write to it.
    What is file status 39 ?

    Mismatch in LRECL or BLOCKSIZE or RECFM between your COBOL pgm & the JCL (or the dataset label). You will get file status 39 on an OPEN.
    What is Static,Dynamic linking ?

    In static linking, the called subroutine is link-edited into the calling program , while in dynamic linking, the subroutine & the main program will exist as separate load modules. You choose static/dynamic linking by choosing either the DYNAM or NODYNAM link edit option. (Even if you choose NODYNAM, a CALL identifier (as opposed to a CALL literal), will translate to a DYNAMIC call).

    A statically called subroutine will not be in its initial state the next time it is called unless you explicitly use INITIAL or you do a CANCEL. A dynamically called routine will always be in its initial state.
    What is AMODE(24), AMODE(31), RMODE(24) and RMODE(ANY)? ( applicable to only

MVS/ESA Enterprise Server).

These are compile/link edit options.

AMODE - Addressing mode. RMODE - Residency mode.

AMODE(24) - 24 bit addressing. AMODE(31) - 31 bit addressing. AMODE(ANY) - Either 24 bit or 31 bit addressing depending on RMODE.

RMODE(24) - Resides in virtual storage below 16 Meg line. Use this for 31 bit programs that call 24 bit programs. (OS/VS Cobol pgms use 24 bit addresses only).

RMODE(ANY) - Can reside above or below 16 Meg line.

    What compiler option would you use for dynamic linking?

    DYNAM.
    What is SSRANGE, NOSSRANGE ?

    These are compiler options w.r.t subscript out of range checking. NOSSRANGE is the default and if chosen, no run time error will be flagged if your index or subscript goes out of the permissible range.
    How do you set a return code to the JCL from a COBOL program?

    Move a value to RETURN-CODE register. RETURN-CODE should not be declared in your program.
    How can you submit a job from COBOL programs?

    Write JCL cards to a dataset with

    //xxxxxxx SYSOUT=(A,INTRDR) where 'A' is output class, and dataset should be opened for output in the program. Define a 80 byte record layout for the file.
    What are the differences between OS VS COBOL and VS COBOL II?

    OS/VS Cobol pgms can only run in 24 bit addressing mode, VS Cobol II pgms can run either in 24 bit or 31 bit addressing modes.

    Report writer is supported only in OS/VS Cobol.

    USAGE IS POINTER is supported only in VS COBOL II.

    Reference modification eg: WS-VAR(1:2) is supported only in VS COBOL II.

    EVALUATE is supported only in VS COBOL II.

    Scope terminators are supported only in VS COBOL II.

    OS/VS Cobol follows ANSI 74 stds while VS COBOL II follows ANSI 85 stds.

    Under CICS Calls between VS COBOL II programs are supported.
    What are the steps you go through while creating a COBOL program executable?

    

    DB2 precompiler (if embedded sql used), CICS translator (if CICS pgm), Cobol compiler, Link editor.

    If DB2 program, create plan by binding the DBRMs.
    Can you call an OS VS COBOL pgm from a VS COBOL II pgm ?

In non-CICS environment, it is possible. In CICS, this is not possible.

Top 50 Informatica Interview Questions with Answers

Top 50 Informatica Interview Questions with Answers


1.  What do you mean by Enterprise Data Warehousing?

When the organization data is created at a single point of access it is called as enterprise data warehousing. Data can be provided with a global view to the server via a single source store.  One can do periodic analysis on that same source. It gives better results but however the time required is high.

2. What the difference is between a database, a data warehouse and a data mart?

Database includes a set of sensibly affiliated data which is normally small in size as compared to data warehouse. While in data warehouse there are assortments of all sorts of data and data is taken out only according to the customer’s needs. On the other hand datamart is also a set of data which is designed to  cater the needs of different domains. For instance an organization having different chunk of data for its different departments i.e. sales, finance, marketing etc.

3. What is meant by a domain?

When all related relationships and nodes are covered by a sole organizational point,  its called domain. Through this data management can be improved.

4. What is the difference between a repository server and a powerhouse?

Repository  server controls the complete repository which includes tables, charts, and various procedures etc. Its main function is to assure the repository  integrity and consistency. While a powerhouse server governs the implementation of various processes among the factors of server’s database repository.

5.  How many repositories can be created in informatica?

There can be any number of repositories in informatica but eventually it depends on number of ports.

6. What is the benefit of partitioning a session?

Partitioning a session means solo implementation sequences within the session. It’s main purpose is to improve server’s operation and efficiency. Other transformations including extractions and other outputs of single partitions are carried out in parallel.

7. How are indexes created after completing the load process?

For the purpose of creating indexes after the load process, command tasks at session level can be used. Index creating scripts can be brought in line with  the session’s workflow or the post session implementation sequence. Moreover this type of index creation cannot be controlled after the load process at transformation level.

8. Explain sessions. Explain how batches are used to combine executions?

A teaching set that needs to be implemented to convert data from a source to a target is called a session. Session can be carried out using the session’s manager or pmcmd command. Batch execution can be used to combine sessions executions either in serial manner or in a parallel. Batches can have different sessions carrying forward in  a parallel or serial manner.

9. How many number of sessions can one group in batches?

One can group any number of sessions  but it would be easier for migration if the number of sessions are lesser in a batch.

10. Explain the difference between mapping parameter and mapping variable?

When  values  change during the session’s execution it’s called a mapping variable. Upon completion the Informatica server stores the end value of a variable and is reused when session restarts. Moreover those values that do not change during the sessions execution are called mapping parameters.  Mapping procedure explains mapping parameters and their usage. Values are allocated to these parameters before starting the session.

11.What is complex mapping?

Following are the features of complex mapping.

    Difficult requirements
    Many numbers of transformations
    Complex business logic

12. How can one identify whether mapping is correct or not without connecting session?

One can find whether the session is correct or not without connecting the session is with the help of debugging option.

13. Can one use mapping parameter or variables created in one mapping into any other reusable transformation?

Yes, One can do because reusable transformation does not contain any mapplet or mapping.

14. Explain the use of aggregator cache file?

Aggregator transformations are handled in chunks of instructions during each run. It stores  transitional values which are found  in local buffer memory. Aggregators provides extra cache files for storing the transformation values if extra memory is required.

15. Briefly describe lookup transformation?

Lookup transformations are those transformations which have admission right to RDBMS based data set. The server makes the access faster by using the lookup tables to look  at explicit table data or the database. Concluding data is achieved by matching the look up condition for all look up ports delivered during transformations.

16. What does role playing dimension mean?

The dimensions that are utilized for playing diversified roles while remaining in the same database domain are called role playing dimensions.

17. How can repository reports be accessed without SQL or other transformations?

Ans:Repositoryreports are established by metadata reporter. There is no need of SQL or other transformation since it is a web app.

18. What are the types of metadata that stores in repository?

The types of metadata includes Source definition, Target definition, Mappings, Mapplet, Transformations.

19. Explain the code page compatibility?

When data moves from one code page to another provided that both code pages have the same character sets then data loss cannot occur. All the characteristics of source page must be available in the target page. Moreover if  all the characters of source page are not present in the target page then it would be a subset and data loss will definitely occur during transformation due the fact the two code pages are not compatible.

20. How can you validate all mappings in the repository simultaneously?

All the mappings cannot be validated simultaneously because each time only one mapping can be validated.

21. Briefly explain the Aggregator transformation?

It allows one to do aggregate calculations such as sums, averages etc. It is unlike expression transformation in which  one can do calculations in groups.

22. Describe Expression transformation?

Values can be calculated in single row before writing on the target in this form of transformation. It can be used to perform non aggregate calculations. Conditional statements can also be tested before output results go to target tables.

23. What do you mean by filter transformation?

It is a medium of filtering rows in a mapping. Data needs to be transformed through filter transformation and then filter condition is applied.  Filter transformation contains all ports of input/output, and the rows which meet  the condition can only pass through that filter.

24. What is Joiner transformation?

 Joiner transformation combines two affiliated heterogeneous sources living in different locations while a source qualifier transformation can combine data emerging from a common source.

25. What is Lookup transformation?

 It is used for looking up data in a relational table through mapping. Lookup definition from any relational database is imported from a source which has tendency of connecting client and server. One can use multiple lookup transformation in a mapping.


26. How Union Transformation is used?

 Ans: It is a diverse input group transformation which can be used to combine data from different sources. It works like UNION All statement in SQL that is used to combine result set of two SELECT statements.

27. What do you mean Incremental Aggregation?

  Option for incremental aggregation is enabled  whenever a session is created for a mapping aggregate. Power center performs incremental aggregation through the mapping and historical cache data to perform new aggregation calculations incrementally.

28. What is the difference between a connected look up and unconnected look up?

  When the inputs are taken directly from other transformations in the pipeline it is called connected lookup. While unconnected lookup doesn’t take inputs directly from other transformations, but it can be used in any transformations  and can be raised as a function using LKP expression. So it can be said that an unconnected lookup can be called multiple times in mapping.

29. What is a mapplet?

 A recyclable object that is using mapplet designer is called a mapplet. It permits one to reuse the transformation logic in multitude mappings moreover it also contains set of transformations.

30.Briefly define reusable transformation?

 Reusable transformation is used numerous times in mapping. It is different from other mappings which use the transformation since it is stored as a metadata. The transformations will be nullified in the mappings whenever any change in the reusable transformation is made.

31. What does update strategy mean, and what are the different option of it?

 Row by row processing is done by informatica.  Every row is inserted in the target table because it is marked as default. Update strategy is used whenever the row has to be updated or inserted based on some sequence. Moreover the condition must be specified in update strategy for the processed row to be marked as updated or inserted.

32. What is the scenario which compels informatica server to reject files?

This happens when it faces DD_Reject in update strategy transformation.  Moreover it disrupts the database constraint filed in the rows was condensed.

33. What is surrogate key?

Surrogate key is a replacement for the natural prime key. It is a unique identification for each row in the table.  It is very beneficial because the natural primary key can change which eventually makes update more difficult. They are always used in form of a digit or integer.

34.What are the prerequisite tasks to achieve the session partition?

 In order to perform session partition one need to configure the session to partition source data and then installing the Informatica server machine in multifold CPU’s.

35. Which files are created during the session rums by informatics server?

During session runs, the files created are namely Errors log, Bad file, Workflow low and session log.

 36. Briefly define a session task?

It is a chunk of instruction the guides Power center server about how and when to transfer data from sources to targets.

 37,What does command task mean?

This specific task permits one or more than one shell commands in UNIX or DOS in windows to run during the workflow.

38. What is standalone command task?

This task can be used anywhere in the workflow to run the shell commands.

39. What is meant by pre and post session shell command?

Command task can be called as the pre or post session shell command for a session task. One can run it as pre session command r post session success command or post session failure command.

40.What is predefined event?

It is a file-watch event. It waits for a specific file to arrive at a specific location.

41. How can you define user defied event?

User defined event can be described as a flow of tasks in the workflow. Events can be created and then raised as need arises.

42. What is a work flow?

Ans: Work flow is a bunch of instructions that communicates server about how to implement tasks.

43. What are the different tools in workflow manager?

Following are the different tools in workflow manager namely

    Task Designer
    Task Developer
    Workflow Designer

 44. Tell me any other tools for scheduling purpose other than workflow manager pmcmd?

The tool for scheduling purpose other than workflow manager can be a third party tool like ‘CONTROL M’.

45. What is OLAP (On-Line Analytical Processing?

A method by which multi-dimensional analysis occurs.

46. What are the different types of OLAP? Give an example?

ROLAP eg.BO, MOLAP eg.Cognos, HOLAP, DOLAP

47. What do you mean by worklet?

When the workflow tasks are grouped in a set, it is called as worklet. Workflow tasks includes timer, decision, command, event wait, mail, session, link, assignment, control etc.

48. What is the use of target designer?

Target Definition is created with the help of target designer.

49. Where can we find the throughput option in informatica?

Throughput option can be found in informatica in workflow monitor. In workflow monitor, right click on session, then click on get run properties and under source/target statistics we can find throughput option.

50. What is target load order?

Ans: Target load order is specified on the basis of source qualifiers in a mapping. If there are multifold source qualifiers linked to different targets then one can entitle order in which informatica server loads data into targets.

Jobs in india

IT / Software Jobs,Core Technical Jobs, Government Jobs,Defence Jobs,Research Jobs,BPO Jobs,Bank Jobs, Tech Support Jobs,Health Care Job...