Interview Question VB.NET

What is the different between ASP.NET and VB.NET?
What debugging tools come with the .NET SDK?
What is the difference between structures and enumeration?
What is Value type and refernce type in .Net?
What are the types of assemblies?
What is manifest?
How would you implement inheritance using VB.NET/C#?
What is the difference between repeater over datalist and datagrid?
What are VSDISCO files?
Name two properties common in every validation control?
What namespace does the Web page belong in the .NET Framework class hierarchy?
Advantages of VB.NET?
Are there any third party logging components available?
Does the .NET Framework have in-built support for serialization?
Is it true that objects don’t always get destroyed immediately when the last reference goes away?
How does assembly versioning work?
How do assemblies find each other?
What is the CTS?
Difference Between VB and VB.Net.
What is Structured Exception Handling?
How can we Handle Exception in VB.Net?
Which of the following is NOT supported for .NET Classes?
Which Polymorphism-keyword should be used [within the Child class code] for Method/Function of the Parent Class to be executed?
What is an Interface Class?
Which technique we use to achieve polymorphic behavior of an object?
How do we implement private interfaces?
What is the significance of Shadowing a method in VB.Net?
What is the keyword in VB.Net to create an Abstract Class?
What is a pre-requisite for connection pooling?
Between Windows Authentication and SQL Server Authentication, which one is trusted and which one is untrusted?

SQL Server Question With Answer

What are different normalization forms?
1NF: Eliminate Repeating Groups
Make a separate table for each set of related attributes, and give each table a primary key. Each field contains at most one value from its attribute domain.
2NF: Eliminate Redundant Data If an attribute depends on only part of a multi-valued key, remove it to a separate table.
3NF: Eliminate Columns Not Dependent On Key If attributes do not contribute to a description of the key, remove them to a separate table. All attributes must be directly dependent on the primary key
BCNF: Boyce-Codd Normal Form If there are non-trivial dependencies between candidate key attributes, separate them out into distinct tables.
4NF: Isolate Independent Multiple Relationships No table may contain two or more 1:n or n:m relationships that are not directly related.
5NF: Isolate Semantically Related Multiple Relationships There may be practical constrains on information that justify separating logically related many-to-many
relationships.
ONF: Optimal Normal Form A model limited to only simple (elemental) facts, as expressed in Object Role Model notation.
DKNF: Domain-Key Normal Form A model free from all modification anomalies.
Remember, these normalization guidelines are cumulative. For a database to be in 3NF, it must first fulfill all the criteria of a 2NF and 1NF database.

What is RDBMS?
Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables. Relationships may be created and maintained across and among the data and tables. In a relational database, relationships between data items are expressed by means of tables. Interdependencies among these tables are expressed by data values rather than by pointers. This allows a high degree of data independence. An RDBMS has the capability to recombine the data items from different files, providing powerful tools for data usage.

What is normalization?
Database normalization is a data design and organization process applied to data structures based on rules that help build relational databases. In relational database design, the process of organizing data to minimize redundancy. Normalization usually involves dividing a database into two or more tables and defining relationships between the tables. The objective is to isolate data so that additions, deletions, and modifications of a field can be made in just one table and then propagated through the rest of the database via the defined relationships

What is Stored Procedure?
A stored procedure is a named group of SQL statements that have been previously created and stored in the server database. Stored procedures accept input parameters so that a single procedure can be used over the network by several clients using different input data. And when the procedure is modified, all clients automatically get the new version. Stored procedures reduce network traffic and improve performance. Stored procedures can be used to help ensure the integrity of the database.
e.g. sp_helpdb, sp_renamedb, sp_depends etc.

What is Trigger?
A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs. Triggers are stored in and managed by the DBMS.Triggers are used to maintain the referential integrity of data by changing the data in a systematic fashion. A trigger cannot be called or executed;
the DBMS automatically fires the trigger as a result of a data modification to the associated table.
Triggers can be viewed as similar to stored procedures in that both consist of procedural logic that is stored at the database level. Stored procedures, however, are not event-drive and are not attached to a specific table as triggers are. Stored procedures are explicitly executed by invoking a CALL to the procedure while triggers are implicitly executed. In addition, triggers can also execute stored procedures.
Nested Trigger: A trigger can also contain INSERT, UPDATE and DELETE logic within itself, so when the trigger is fired because of data modification it can also cause another data modification, thereby firing another trigger. A trigger that contains data modification logic within itself is called a nested trigger.

What is View?
A simple view can be thought of as a subset of a table. It can be used for retrieving data, as well as updating or deleting rows. Rows updated or deleted in the view are updated or deleted in the table the view was created with. It should also be noted that as data in the original table changes, so does data in the view, as views are the way to look at part of the original table. The results of using a view are not permanently stored in the database. The data accessed through a view is actually constructed using standard T-SQL select command and can come from one to many different base tables or even other views.

What is Index?
An index is a physical structure containing pointers to the data. Indices are created in an existing table to locate rows more quickly and efficiently. It is possible to create an index on one or more columns of a table, and each index is given a name. The users cannot see the indexes, they are just used to speed up queries. Effective indexes are one of the best ways to improve performance in a database
application. A table scan happens when there is no index available to help a query. In a table scan SQL Server examines every row in the table to satisfy the query results. Table scans are sometimes unavoidable, but on large tables, scans have a terrific impact on performance.
Clustered indexes define the physical sorting of a database table’s rows in the storage media. For this reason, each database table may have only one clustered index.
Non-clustered indexes are created outside of the database table and contain a sorted list of references to the table itself.

What is the difference between clustered and a non-clustered index?
A clustered index is a special type of index that reorders the way records in the table are physically stored. Therefore table can have only one clustered index. The leaf nodes of a clustered index contain the data pages.
A nonclustered index is a special type of index in which the logical order of the index does not match the physical stored order of the rows on disk. The leaf node of a nonclustered index does not consist of the data pages. Instead, the leaf nodes contain index rows.

What are the different index configurations a table can have?
A table can have one of the following index configurations:
No indexes
A clustered index
A clustered index and many nonclustered indexes
A nonclustered index
Many nonclustered indexes

What is cursors?
Cursor is a database object used by applications to manipulate data in a set on a row-by-row basis, instead of the typical SQL commands that operate on all the rows in the set at one time.
In order to work with a cursor we need to perform some steps in the following order:
Declare cursor
Open cursor
Fetch row from the cursor
Process fetched row
Close cursor
Deallocate cursor

What is the use of DBCC commands?
DBCC stands for database consistency checker. We use these commands to check the consistency of the databases, i.e., maintenance, validation task and status checks.
E.g. DBCC CHECKDB - Ensures that tables in the db and the indexes are correctly linked.
DBCC CHECKALLOC - To check that all pages in a db are correctly allocated.
DBCC CHECKFILEGROUP - Checks all tables file group for any damage.


What is a Linked Server?

Linked Servers is a concept in SQL Server by which we can add other SQL Server to a Group and query both the SQL Server dbs using T-SQL Statements. With a linked server, you can create very clean, easy to follow, SQL statements that allow remote data to be retrieved, joined and combined with local data.
Storped Procedure sp_addlinkedserver, sp_addlinkedsrvlogin will be used add new Linked Server.

What is Collation?
Collation refers to a set of rules that determine how data is sorted and compared. Character data is sorted using rules that define the correct character sequence, with options for specifying casesensitivity, accent marks, kana character types and character width.

What are different type of Collation Sensitivity?
Case sensitivity
A and a, B and b, etc.
Accent sensitivity
a and á, o and ó, etc.
Kana Sensitivity
When Japanese kana characters Hiragana and Katakana are treated differently, it is called Kana sensitive.
Width sensitivity
When a single-byte character (half-width) and the same character when represented as a double-byte
character (full-width) are treated differently then it is width sensitive.
What's the difference between a primary key and a unique key?
Both primary key and unique enforce uniqueness of the column on which they are defined. But by default primary key creates a clustered index on the column, where are unique creates a nonclustered index by default. Another major difference is that, primary key doesn't allow NULLs, but unique key allows one NULL only.

How to implement one-to-one, one-to-many and many-to-many relationships while
designing tables?
One-to-One relationship can be implemented as a single table and rarely as two tables with primary and foreign key relationships.
One-to-Many relationships are implemented by splitting the data into two tables with primary key and foreign key relationships.
Many-to-Many relationships are implemented using a junction table with the keys from both the tables forming the composite primary key of the junction table.

What is a NOLOCK?
Using the NOLOCK query optimiser hint is generally considered good practice in order to improve concurrency on a busy system. When the NOLOCK hint is included in a SELECT statement, no locks are taken when data is read. The result is a Dirty Read, which means that another process could be updating the data at the exact time you are reading it. There are no guarantees that your query will retrieve the most recent data. The advantage to performance is that your reading of data will not block updates from taking place, and updates will not block your reading of data. SELECT statements take Shared (Read) locks. This means that multiple SELECT statements are allowed simultaneous access, but other processes are blocked from modifying the data. The updates will queue until all the reads have completed, and reads requested after the update will wait for the updates to complete. The result to
your system is delay(blocking).

What is difference between DELETE & TRUNCATE commands?
Delete command removes the rows from a table based on the condition that we provide with a WHERE clause. Truncate will actually remove all the rows from a table and there will be no data in the table after we run the truncate command.
TRUNCATE
TRUNCATE is faster and uses fewer system and transaction log resources than DELETE.
TRUNCATE removes the data by deallocating the data pages used to store the table’s data, and only the page deallocations are recorded in the transaction log.
TRUNCATE removes all rows from a table, but the table structure and its columns, constraints, indexes and so on remain. The counter used by an identity for new rows is reset to the seed for the column.
You cannot use TRUNCATE TABLE on a table referenced by a FOREIGN KEY constraint.
Because TRUNCATE TABLE is not logged, it cannot activate a trigger.
TRUNCATE can not be Rolled back.
TRUNCATE is DDL Command.
TRUNCATE Resets identity of the table.
DELETE
DELETE removes rows one at a time and records an entry in the transaction log for each deleted row.
If you want to retain the identity counter, use DELETE instead. If you want to remove table definition and its data, use the DROP TABLE statement.
DELETE Can be used with or without a WHERE clause DELETE Activates Triggers.
DELETE Can be Rolled back.
DELETE is DML Command.
DELETE does not reset identity of the table.

Difference between Function and Stored Procedure?
UDF can be used in the SQL statements anywhere in the WHERE/HAVING/SELECT section where as Stored procedures cannot be.
UDFs that return tables can be treated as another rowset. This can be used in JOINs with other tables.
Inline UDF's can be though of as views that take parameters and can be used in JOINs and other Rowset operations.

When is the use of UPDATE_STATISTICS command?
This command is basically used when a large processing of data has occurred. If a large amount of deletions any modification or Bulk Copy into the tables has occurred, it has to update the indexes to take these changes into account. UPDATE_STATISTICS updates the indexes on these tables accordingly.

What types of Joins are possible with Sql Server?
Joins are used in queries to explain how different tables are related. Joins also let you select data from a table depending upon data from another table.
Types of joins: INNER JOINs, OUTER JOINs, CROSS JOINs. OUTER JOINs are further classified as LEFT OUTER JOINS, RIGHT OUTER JOINS and FULL OUTER JOINS.

What is the difference between a HAVING CLAUSE and a WHERE CLAUSE?
Specifies a search condition for a group or an aggregate. HAVING can be used only with the SELECT statement. HAVING is typically used in a GROUP BY clause. When GROUP BY is not used, HAVING behaves like a WHERE clause. Having Clause is basically used only with the GROUP BY function in a query. WHERE Clause is applied to each row before they are part of the GROUP BY function in a query.

What is sub-query? Explain properties of sub-query.
Sub-queries are often referred to as sub-selects, as they allow a SELECT statement to be executed arbitrarily within the body of another SQL statement. A sub-query is executed by enclosing it in a set of parentheses. Sub-queries are generally used to return a single row as an atomic value, though they may be used to compare values against multiple rows with the IN keyword.
A subquery is a SELECT statement that is nested within another T-SQL statement. A subquery SELECT statement if executed independently of the T-SQL statement, in which it is nested, will return a result set. Meaning a subquery SELECT statement can standalone and is not depended on the statement in which it is nested. A subquery SELECT statement can return any number of values, and can be found in, the column list of a SELECT statement, a FROM, GROUP BY, HAVING, and/or ORDER BY clauses of a T-SQL statement. A Subquery can also be used as a parameter to a function call. Basically a subquery can be used anywhere an expression can be used. Properties of Sub-Query
A subquery must be enclosed in the parenthesis.
A subquery must be put in the right hand of the comparison operator, and
A subquery cannot contain a ORDER-BY clause.
A query can contain more than one sub-queries.

What are types of sub-queries?
Single-row subquery, where the subquery returns only one row.Multiple-row subquery, where the subquery returns multiple rows,.and Multiple column subquery, where the subquery returns multiple columns.

What is SQL Profiler?
SQL Profiler is a graphical tool that allows system administrators to monitor events in an instance of Microsoft SQL Server. You can capture and save data about each event to a file or SQL Server table to analyze later. For example, you can monitor a production environment to see which stored procedures are hampering performance by executing too slowly.
Use SQL Profiler to monitor only the events in which you are interested. If traces are becoming too large, you can filter them based on the information you want, so that only a subset of the event data is collected. Monitoring too many events adds overhead to the server and the monitoring process and can cause the trace file or trace table to grow very large, especially when the monitoring process takes place over a long period of time.

What is User Defined Functions?
User-Defined Functions allow to define its own T-SQL functions that can accept 0 or more parameters and return a single scalar data value or a table data type.

What kind of User-Defined Functions can be created?
There are three types of User-Defined functions in SQL Server 2000 and they are Scalar, Inline Table- Valued and Multi-statement Table-valued.
Scalar User-Defined Function
A Scalar user-defined function returns one of the scalar data types. Text, ntext, image and timestamp data types are not supported. These are the type of user-defined functions that most developers are used to in other programming languages. You pass in 0 to many parameters and you get a return value. Inline Table-Value User-Defined Function
An Inline Table-Value user-defined function returns a table data type and is an exceptional alternative to a view as the user-defined function can pass parameters into a T-SQL select command and in essence provide us with a parameterized, non-updateable view of the underlying tables.
Multi-statement Table-Value User-Defined Function
A Multi-Statement Table-Value user-defined function returns a table and is also an exceptional alternative to a view as the function can support multiple T-SQL statements to build the final result where the view is limited to a single SELECT statement. Also, the ability to pass parameters into a TSQL select command or a group of them gives us the capability to in essence create a parameterized, non-updateable view of the data in the underlying tables. Within the create function command you must define the table structure that is being returned. After creating this type of user-defined function, It can be used in the FROM clause of a T-SQL command unlike the behavior found when using a stored procedure which can also return record sets.

Which TCP/IP port does SQL Server run on? How can it be changed?
SQL Server runs on port 1433. It can be changed from the Network Utility TCP/IP properties –> Port number.both on client and the server.

What are the authentication modes in SQL Server? How can it be changed?
Windows mode and mixed mode (SQL & Windows).
To change authentication mode in SQL Server click Start, Programs, Microsoft SQL Server and click SQL Enterprise Manager to run SQL Enterprise Manager from the Microsoft SQL Server program group. Select the server then from the Tools menu select SQL Server Configuration Properties, and choose the Security page.

Where are SQL server users names and passwords are stored in sql server?
They get stored in master db in the sysxlogins table.

Which command using Query Analyzer will give you the version of SQL server and operating system?
SELECT SERVERPROPERTY('productversion'), SERVERPROPERTY ('productlevel'), SERVERPROPERTY
('edition')

What is SQL server agent?
SQL Server agent plays an important role in the day-to-day tasks of a database administrator (DBA). It is often overlooked as one of the main tools for SQL Server management. Its purpose is to ease the implementation of tasks for the DBA, with its full-function scheduling engine, which allows you to schedule your own jobs and scripts. Can a stored procedure call itself or recursive stored procedure? How many level SP nesting possible?

Yes. Because Transact-SQL supports recursion, you can write stored procedures that call themselves. Recursion can be defined as a method of problem solving wherein the solution is arrived at by repetitively applying it to subsets of the problem. A common application of recursive logic is to perform numeric computations that lend themselves to repetitive evaluation by the same processing steps.Stored procedures are nested when one stored procedure calls another or executes managed code by
referencing a CLR routine, type, or aggregate. You can nest stored procedures and managed code references up to 32 levels.

What is @@ERROR?
The @@ERROR automatic variable returns the error code of the last Transact-SQL statement. If there was no error, @@ERROR returns zero. Because @@ERROR is reset after each Transact-SQL statement, it must be saved to a variable if it is needed to process it further after checking it.

What is Raiseerror?
Stored procedures report errors to client applications via the RAISERROR command. RAISERROR doesn't change the flow of a procedure; it merely displays an error message, sets the @@ERROR automatic variable, and optionally writes the message to the SQL Server error log and the NT application event log.

What is log shipping?
Log shipping is the process of automating the backup of database and transaction log files on a production SQL server, and then restoring them onto a standby server. Enterprise Editions only supports log shipping. In log shipping the transactional log file from one server is automatically updated into the backup database on the other server. If one server fails, the other server will have the same db can be used this as the Disaster Recovery plan. The key feature of log shipping is that is will automatically backup transaction logs throughout the day and automatically restore them on the standby server at defined interval.

What is the difference between a local and a global variable?
A local temporary table exists only for the duration of a connection or, if defined inside a compound statement, for the duration of the compound statement.
A global temporary table remains in the database permanently, but the rows exist only within a given connection. When connection are closed, the data in the global temporary table disappears. However, the table definition remains with the database for access when database is opened next time.

What command do we use to rename a db?
sp_renamedb ‘oldname’ , ‘newname’
If someone is using db it will not accept sp_renmaedb. In that case first bring db to single user using sp_dboptions. Use sp_renamedb to rename database. Use sp_dboptions to bring database to multi user mode.

What is sp_configure commands and set commands?
Use sp_configure to display or change server-level settings. To change database-level settings, use ALTER DATABASE. To change settings that affect only the current user session, use the SET statement.

What are the different types of replication? Explain.
The SQL Server 2000-supported replication types are as follows:
· Transactional
· Snapshot
· Merge
Snapshot replication distributes data exactly as it appears at a specific moment in time and does not monitor for updates to the data. Snapshot replication is best used as a method for replicating data that changes infrequently or where the most up-to-date values (low latency) are not a requirement. When synchronization occurs, the entire snapshot is generated and sent to Subscribers.
Transactional replication, an initial snapshot of data is applied at Subscribers, and then when data modifications are made at the Publisher, the individual transactions are captured and propagated to Subscribers.
Merge replication is the process of distributing data from Publisher to Subscribers, allowing the Publisher and Subscribers to make updates while connected or disconnected, and then merging the updates between sites when they are connected.

What are the OS services that the SQL Server installation adds?
MS SQL SERVER SERVICE, SQL AGENT SERVICE, DTC (Distribution transac co-ordinator)

What are three SQL keywords used to change or set someone’s permissions?
GRANT, DENY, and REVOKE.

What does it mean to have quoted_identifier on? What are the implications of having it off?

When SET QUOTED_IDENTIFIER is ON, identifiers can be delimited by double quotation marks, and literals must be delimited by single quotation marks. When SET QUOTED_IDENTIFIER is OFF, identifiers cannot be quoted and must follow all Transact-SQL rules for identifiers.

What is the STUFF function and how does it differ from the REPLACE function?
STUFF function to overwrite existing characters. Using this syntax, STUFF(string_expression, start, length, replacement_characters), string_expression is the string that will have characters substituted, start is the starting position, length is the number of characters in the string that are substituted, and replacement_characters are the new characters interjected into the string.
REPLACE function to replace existing characters of all occurance. Using this syntax
REPLACE(string_expression, search_string, replacement_string), where every incidence of search_string found in the string_expression will be replaced with replacement_string.

What is the basic functions for master, msdb, model, tempdb databases?
The Master database holds information for all databases located on the SQL Server instance and is the glue that holds the engine together. Because SQL Server cannot start without a functioning master database, you must administer this database with care. The msdb database stores information regarding database backups, SQL Agent information, DTS packages, SQL Server jobs, and some replication information such as for log shipping.

The tempdb holds temporary objects such as global and local temporary tables and stored procedures. The model is essentially a template database used in the creation of any new user database created in the instance.

What are primary keys and foreign keys?
Primary keys are the unique identifiers for each row. They must contain unique values and cannot be null. Due to their importance in relational databases, Primary keys are the most fundamental of all keys and constraints. A table can have only one Primary key. Foreign keys are both a method of ensuring data integrity and a manifestation of the relationship between tables.

What is data integrity? Explain constraints?
Data integrity is an important feature in SQL Server. When used properly, it ensures that data is accurate, correct, and valid. It also acts as a trap for otherwise undetectable bugs within applications.
A PRIMARY KEY constraint is a unique identifier for a row within a database table. Every table should have a primary key constraint to uniquely identify each row and only one primary key constraint can be created for each table. The primary key constraints are used to enforce entity integrity.
A UNIQUE constraint enforces the uniqueness of the values in a set of columns, so no duplicate values are entered. The unique key constraints are used to enforce entity integrity as the primary key constraints.
A FOREIGN KEY constraint prevents any actions that would destroy links between tables with the corresponding data values. A foreign key in one table points to a primary key in another table. Foreign keys prevent actions that would leave rows with foreign key values when there are no primary keys with that value. The foreign key constraints are used to enforce referential integrity.
A CHECK constraint is used to limit the values that can be placed in a column. The check constraints are used to enforce domain integrity.
A NOT NULL constraint enforces that the column will not accept null values. The not null constraints are used to enforce domain integrity, as the check constraints.

What are the properties of the Relational tables?
Relational tables have six properties:
· Values are atomic.
· Column values are of the same kind.
· Each row is unique.
· The sequence of columns is insignificant.
· The sequence of rows is insignificant.
· Each column must have a unique name.

What is De-normalization?
De-normalization is the process of attempting to optimize the performance of a database by adding redundant data. It is sometimes necessary because current DBMSs implement the relational model poorly. A true relational DBMS would allow for a fully normalized database at the logical level, while providing physical storage of data that is tuned for high performance. De-normalization is a technique to move from higher to lower normal forms of database modeling in order to speed up database access.

How to get @@error and @@rowcount at the same time?
If @@Rowcount is checked after Error checking statement then it will have 0 as the value of @@Recordcount as it would have been reset.
And if @@Recordcount is checked before the error-checking statement then @@Error would get reset. To get @@error and @@rowcount at the same time do both in same statement and store them in local variable. SELECT @RC = @@ROWCOUNT, @ER = @@ERROR

What is Identity?
Identity (or AutoNumber) is a column that automatically generates numeric values. A start and increment value can be set, but most DBA leave these at 1. A GUID column also generates numbers, the value of this cannot be controled. Identity/GUID columns do not need to be indexed.

What is a Scheduled Jobs or What is a Scheduled Tasks?
Scheduled tasks let user automate processes that run on regular or predictable cycles. User can schedule administrative tasks, such as cube processing, to run during times of slow business activity.
User can also determine the order in which tasks run by creating job steps within a SQL Server Agent job. E.g. Back up database, Update Stats of Tables. Job steps give user control over flow of execution.
If one job fails, user can configure SQL Server Agent to continue to run the remaining tasks or to stop execution.


Can SQL Servers linked to other servers like Oracle?
SQL Server can be lined to any server provided it has OLE-DB provider from Microsoft to allow a link. E.g. Oracle has a OLE-DB provider for oracle that Microsoft provides to add it as linked server to SQL Server group.

How to know which index a table is using?
SELECT table_name,index_name FROM user_constraints
How to copy the tables, schema and views from one SQL server to another?
Microsoft SQL Server 2000 Data Transformation Services (DTS) is a set of graphical tools and programmable objects that lets user extract, transform, and consolidate data from disparate sources into single or multiple destinations.

What is Self Join?
This is a particular case when one table joins to itself, with one or two aliases to avoid confusion. A self join can be of any type, as long as the joined tables are the same. A self join is rather unique in that it involves a relationship with only one table. The common example is when company have a hierarchal reporting structure whereby one member of staff reports to another.

What is Cross Join?
A cross join that does not have a WHERE clause produces the Cartesian product of the tables involved in the join. The size of a Cartesian product result set is the number of rows in the first table multiplied by the number of rows in the second table. The common example is when company wants to combine each product with a pricing table to analyze each product at each price.

Which virtual table does a trigger use?
Inserted and Deleted.
List few advantages of Stored Procedure.
· Stored procedure can reduced network traffic and latency, boosting application performance.
· Stored procedure execution plans can be reused, staying cached in SQL Server's memory, reducing server overhead.
· Stored procedures help promote code reuse.
· Stored procedures can encapsulate logic. You can change stored procedure code without affecting clients.
· Stored procedures provide better security to your data.

What is DataWarehousing?
· Subject-oriented, meaning that the data in the database is organized so that all the data elements relating to the same real-world event or object are linked together;
· Time-variant, meaning that the changes to the data in the database are tracked and recorded so that reports can be produced showing changes over time;
· Non-volatile, meaning that data in the database is never over-written or deleted, once committed, the data is static, read-only, but retained for future reporting;
· Integrated, meaning that the database contains data from most or all of an organization's operational applications, and that this data is made consistent.

What is OLTP(OnLine Transaction Processing)?
In OLTP - online transaction processing systems relational database design use the discipline of data modeling and generally follow the Codd rules of data normalization in order to ensure absolute data integrity. Using these rules complex information is broken down into its most simple structures (a table) where all of the individual atomic level elements relate to each other and satisfy the normalization rules.

UML Question

1. What is UML?
2. How many types of diagrams are there in UML ?
3. Explain in short all types of diagrams in UML ?
4. What are advantages of using UML?
5. What is Modeling and why UML ?
6. What is the sequence of UML diagrams in project?
7. How did you implement UML in your project?
8. Do I need all UML diagrams in a project?
9. Give a small brief explanation of all Elements in activity diagrams?
10. Explain Different elements of a collaboration diagram ?
11. Explain Component diagrams ?
12. Explain all parts of a deployment diagram?
13. Describe the various components in sequence diagrams?
14. What are the element in State Chart diagrams ?
15. Describe different elements in Static Chart diagrams ?
16. Explain the different elements of a Use Case ?

Networking Questions

· What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?
· What is the difference between an unspecified passive open and a fully specified passive open
· Explain the function of Transmission Control Block
· What is a Management Information Base (MIB)
· What is anonymous FTP and why would you use it?
· What is a pseudo tty?
· What is REX?
· What does the Mount protocol do ?
· What is External Data Representation?
· What is the Network Time Protocol?
· What is a DNS resource record?
· What protocol is used by DNS name servers?
· What is the difference between interior and exterior neighbor gateways?
· What is the HELLO protocol used for?
· What are the advantages and disadvantages of the three types of routing tables?
· What is source route?
· What is RIP (Routing Information Protocol)?
· What is SLIP (Serial Line Interface Protocol)?
· What is Proxy ARP?
· What is OSPF?
· What is Kerberos?
· What is a Multi-homed Host?
· What is NVT (Network Virtual Terminal)?
· What is Gateway-to-Gateway protocol?
· What is BGP (Border Gateway Protocol)?
· What is autonomous system?
· What is EGP (Exterior Gateway Protocol)?
· What is IGP (Interior Gateway Protocol)?
· What is Mail Gateway?
· What is wide-mouth frog?
· What are Digrams and Trigrams?
· What is silly window syndrome?
· What is region?
· What is multicast routing?
· What is traffic shaping?
· What is packet filter?
· What is virtual path?
· What is virtual channel?
· What is logical link control?
· Why should you care about the OSI Reference Model?
· What is the difference between routable and non- routable protocols?
· What is MAU?
· Explain 5-4-3 rule.
· What is the difference between TFTP and FTP application layer protocols?
· What is the range of addresses in the classes of internet addresses?
· What is the minimum and maximum length of the header in the TCP segment and IP datagram?
· What is difference between ARP and RARP?
· What is ICMP?
· What are the data units at different layers of the TCP / IP protocol suite?
· What is Project 802?
· What is Bandwidth?
· Difference between bit rate and baud rate?
· What is MAC address?
· What is attenuation?
· What is cladding?
· What is RAID?
· What is NETBIOS and NETBEUI?
· What is redirector?
· What is Beaconing?
· What is terminal emulation, in which layer it comes?
· What is frame relay, in which layer it comes?
· What do you meant by “triple X” in Networks?
· What is SAP?
· What is subnet?
· What is Brouter?
· How Gateway is different from Routers?
· What are the different type of networking / internetworking devices?
· What is mesh network?
· What is passive topology?
· What are the important topologies for networks?
· What are major types of networks and explain?
· What is Protocol Data Unit?
· What is difference between baseband and broadband transmission?
· What are the possible ways of data exchange?
· What are the types of Transmission media?
· What are the types of Transmission media?
· What is point-to-point protocol?
· What are the two types of transmission technology available?
· Difference between the communication and transmission?
· What is a different between switch and Hub?
· What are the Advantages and Disadvantages of DHCP?
· What is Recovery Console?
· What is ERD(Emergency Repair Disk)?
· What is the difference between POP3 and IMAP Mail Server?
· what is .ost file?
· Whatz the difference between DNS and WINS?
· How can we create VPN to connect to branch office of the same office.what would be the priliminary requirment?
· Why should we care about the OSI Reference Model ? What is the main purpose for creating this osi model? why it is a layered model?
· What is layer-3 switch?
· What is an email client? what is differnce between email client and web mail?
· what is the vlan ? how it is work?
· Name three network tools used to determine where a network connectivity is lost between two sites A&B.
· Which protocol is used for retrieving mails?
· What is piggy backing?
· What is the default subnet mask for an ipv6 address ?
· What is fragmentation of a packet ?
· What is MTU of a link ?
· Name any field of IP header that can prevent a packet to loop infinitely ?
· Under what situations a packet can go into infinite loop in a network ?
· Describe a 3-way TCP/IP Handshake.

C Question

· Difference between arrays and pointers?
· What is the purpose of realloc( )?
· What is static memory allocation and dynamic memory allocation?
· How are pointer variables initialized?
· Are pointers integers?
· What is a pointer variable?
· What is a pointer value and address?
· What is a method?
· What are the advantages of the functions?
· What is the purpose of main( ) function?
· What is an argument? differentiate between formal arguments and actual arguments?
· What is a function and built-in function?
· What is modular programming?
· When does the compiler not implicitly generate the address of the first element of an array?
· What are the characteristics of arrays in C?
· Differentiate between a linker and linkage?
· What are advantages and disadvantages of external storage class?
· Diffenentiate between an internal static and external static variable?
· What are the advantages of auto variables?
· What is storage class and what are storage variable?
· Which expression always return true? Which always return false?
· Write the equivalent expression for x%8?
· Why n++ executes faster than n+1?
· What is a modulus operator? What are the restrictions of a modulus operator?
· What is the difference between a string and an array?
· Is it better to use a pointer to navigate an array of values,or is it better to use a subscripted array name?
· Can the sizeof operator be used to tell the size of an array passed to a function?
· Is using exit() the same as using return?
· Is it possible to execute code even after the program exits the main() function?
· What is a static function?
· Why should I prototype a function?
· How do you print an address?
· Can math operations be performed on a void pointer?
· How can you determine the size of an allocated portion of memory?
· What is a “null pointer assignment” error? What are bus errors, memory faults, and core dumps?
· What is the difference between NULL and NUL?
· What is the heap?
· Can the size of an array be declared at runtime?
· What is the stack?
· When should a far pointer be used?
· What is the difference between far and near?
· Is it better to use malloc() or calloc()?
· Why should we assign NULL to the elements (pointer) after freeing them?
· When would you use a pointer to a function?
· How do you use a pointer to a function?
· Can you add pointers together? Why would you?
· What does it mean when a pointer is used in an if statement?
· Is NULL always defined as 0?
· What is a void pointer?
· What is a null pointer?
· How many levels of pointers can you have?
· What is indirection?
· How do you print only part of a string?
· How can I convert a string to a number?
· How can I convert a number to a string?
· What is the difference between a string copy (strcpy) and a memory copy (memcpy)? When should each be used?
· How can you check to see whether a symbol is defined?
· How do you override a defined macro?
· What is #line used for?
· What is a pragma?
· What are the standard predefined macros?
· How can type-insensitive macros be created?
· How many levels deep can include files be nested?
· Can include files be nested?
· Can you define which header file to include at compile time?
· What is the difference between #include and #include “file”?
· Is it better to use a macro or a function?
· How are portions of a program disabled in demo versions?
· What is the benefit of using an enum rather than a #define constant?
· What is the benefit of using #define to declare a constant?
· Can a file other than a .h file be included with #include?
· How can you avoid including a header more than once?
· What will the preprocessor do for a program?
· What is a macro, and how do you use it?
· What is Preprocessor?
· How can I make sure that my program is the only one accessing a file?
· How can I open a file so that other programs can update it at the same time?
· How do you determine whether to use a stream function or a low-level function?
· What is the difference between text and binary modes?
· How can you restore a redirected standard stream?
· How do you redirect a standard stream?
· How can I search for data in a linked list?
· How can I sort a linked list?
· What is hashing?
· What is the quickest searching method to use?
· What is the easiest searching method to use?
· How can I sort things that are too large to bring into memory?
· What is the quickest sorting method to use?
· What is the easiest sorting method to use?
· What is the benefit of using const for declaring constants?
· Can static variables be declared in a header file?
· What is the difference between declaring a variable and defining a variable?
· Is it acceptable to declare/define a variable in a C header?
· When should a type cast not be used?
· When should a type cast be used?
· How can you determine the maximum value that a numeric variable can hold?
· How reliable are floating-point comparisons?
· Can a variable be both const and volatile?
· When should the volatile modifier be used?
· When should the register modifier be used? Does it really help?

SAP Question

· A table is buffered. By select statement i dont want to get the data from table buffer. i want to get the data from database. how?
· What is the diff b/w start_form and open_form in scripts?.why is it necessary to close a form always once it is opened?
· What is difference between ON Change of & At New Field?? Select Single * from & select Upto 1 rows
· Can we create Bar Chart in abap reports and how?
· CASE-1 : there are two clients using one Application Server . q1) Are pgms and tables client-dependent/independent CASE-2 : There are two clients using different Application Servers q1) Are pgms and tables client-dependent/independent
· When u create sales report what u can see in that report ?what rthose field names or data element names? 2.when u create material movement report what u can see in that reports ?what rthose field names or data element names? 3.what are the idoc names for material master,vendor master,customer master? 4.when u create purchase order details report what u can see in that report ?what rthose fieldnames or dataelements? 5.when u create material stock report in material master grouped by material type and plant what u can see in report ?what rthose field names or dataelement ? 6.what r the views for creating idoc in material master,vendor master and customer master? 7.when u create interactive report for displaying vendor information /customer information what u can see in that report ?what rthose dataelements or field names? 8.when u create shipping forecast report what u can see in that report ?what rthose data elements or field names? 9.when u create report for material analysis for purchasing organisation plant/vendor wise? what u can see in report ?what rthose field names or data elements?
· How to assign multiple transaction codes in a session method to BDC_Insert function module?
· “Check” and “Continue”. What is the difference?
· At-Line selection, At user-command etc..,
· “Exit” and “Stop”. What is the difference?
· What is the reserve command?
· Double click function on the lists, identifying the line selected by the user on the list.
· What are event keywords in reports?
· How can validate input values in selection screen and which event was fired?
· BDC Transaction code?
· What is the transaction code SM 31?
· How to navigate basic list to secondary list?
· If I am in 15th Secondary List how to navigate to 5th Secondary List?
· Which is the First character of creating LockObject?
· What is the Difference between Data Element and Domain?
· How many types of standard SAP Internal Tables?
· What is the Difference Between Tablecontrols and Step Loops?
· What are the Events in Dialog Programs?
· How many ways you can create Table?
· What are the Cluster Tables?
· How can you create push buttons in the MenuPainter?
· How many Layout sets u can create at a time?
· What are the Paragraph and character format?
· What are function modules in LDB?
· How can u create your own Function Module?
· What are Difference Between Classical Batch Input and Call Transaction?
· How can u call the Sessions?
· Can u call Report in Sap Script?
· How to Upload Logo to Layout Set and what is Program Name?
· What are the SET Parameter and GET Parameter?
· What are Text Elements?
· What are Dictionary Objects?
· What is an Interactive Report?
· How to Upload Logo to Layout Set?
· What are Layout set Elements?
· Distinguish between setscreen and call screen?
· What is ABAP Memory and SAP Memory?
· Explain Check Table and Value Table ?
· What is an Internal Table?
· How many types of Standard Internal Tables?
· What is Refresh in Internal Table?
· What is the Difference Between Collect and Sum?
· What are the ways of creating Tables?
· What are Function Modules?
· What is CAT?
· What is Search Help?
· Transaction Code for Recording Technique?
· What is LDB?
· What are the EVENTS in Report Program?
· Explain Call Transaction?
· What are EVENTS In Interactive Report & Explain?
· What are Text Elements?
· I have my Subroutine in one Report and that I want to Use that one in another Report, How is it possible?
· What are the various techniques of BDC?
· How many pushbuttons u can create in application toolbar in selection screen?
· Suppose I call one subroutine for another report , but that is not exists what will be the result?
· What are Control Break Commands?
· What are different Modes of displays in Call Transaction in BDC?
· How many secondary Lists u can create in a Report?
· What is SQL Trace?
· What is LUW?
· Have you worked with reading and writing data on to files?
· Have you created tables in SAP? What are client dependent and independent tables? How do you create independent tables?
· Have you used client dependent ABAP programs?
· Have you used SM30 and SM31 transactions?
· Have you used WS Upload? Difference between WS Upload and Upload.
· What is the syntax for eliminating the duplicates in Internal table.
· In dialog programming how many events are there
· What is the difference between report program and dialog program
· How many secondary lists can be made thro a report program
· How do you identify a line from the basic list.
· What is meant by a client
· How many dictionary objects are there and list all
· What is the function module used to print in a layout set
· How do you execute a layout set in a program
· What is the difference between transparent and non transparent database tables
· How many select statements are there and list those.
· What is meant by development class
· What is meant by BDC. How many methods of BDC are there
· What is the transaction to log the errors in BDC
· How many sessions can be opened max. in SAP
· How many secondary lists can be made in interactive report
· What are the difference between table controls and step loops in dialog programming
· What is the difference between Function module and Sub routine.
· What is initialization.
· What is ALE, IDOC , EDI , RFC. Explain briefly.
· What is a binary search
· What does SM35 transaction do?
· Types of User Exits, what kind of work is done on these exits?
· How will you find out where the user exits are available?
· SMOD and CMOD transactions
· Difference between Table-Controls and Step-loops
· Have you created any transactions?
· Import & Export
· How many interactive reports did you write?

Web Services

Q1. what is Protocols that helps Web Services ?
Answer: Web Services used three protocols for interacting with the clients.Http-Post,Http-Get,SOAP.

Q2. what is functioning of Web Services Protocols ?
Answer: Http-Get:- This is standard protocol that helps client to communicate with server with HTTP.When client send a request to server via HTTP request and reuired parameter are attached with the querystring.

Http-Post:-This is same as Http-Get but the diffrence is that in place of sending parameters onto the URL information is send with HTTP request message with some extra information which contains Parameters and their values.This Protocols is limited to sending name/value pairs.

SOAP:-The only diffrence that its relies on XML as compares to Http-Get,Http-Post.SOAP can send not only name/value pairs but also some complex object also as for example datatypes,class,objects.SOAP can also uses request/reponse model as Http-Get,Http-post but it is not limited to Request/Response it can also send types of message.Because its uses XML that is pure text so firewalls not created so much problem because its easily converted in to HTML. .

Q3. Why do some web service classes derive from System.Web.WebServices while others do not ?
Answer: Those Web Service classes which employ objects like Application, Session, Context, Server, and User have to derive from System.Web.WebServices. If it does not use these objects, it is not necessary to be derived from it.

Q. What do you mean is WSDL ?
Answer: WSDL is an XML format for describing network services as set of endpoints operating on messages containing either document-oriented or procedure-oriented information. The operations and messages are described abstractly, and then bound to a concrete network protocol and message format to define an endpoint. Related concrete endpoints are combined into abstract endpoints (services). (Source: www.w3.org).

Q5. What is the standard you use to wrap up a call to a Web service ?
Answer: HTTP with SOAP.

Q6. Explain Web Services ?
Answer: Web services are programmable business logic components that provide access to functionality through the Internet. Standard protocols like HTTP can be used to access them. Web services are based on the Simple Object Access Protocol (SOAP), which is an application of XML. Web services are given the .asmx extension..

Q7. What are VSDISCO files ?
Answer: VSDISCO files are DISCO files that enable dynamic discovery of Web Services. ASP.NET links the VSDISCO to a HTTP handler that scans the host directory and subdirectories for ASMX and DISCO files and returns a dynamically generated DISCO document. A client who requests a VSDISCO file gets back what appears to be a static DISCO document.

Q8. What is UDDI ?
Answer: UDDI stands for Universal Description, Discovery, and Integration. It is like an "Yellow Pages" for Web Services. It is maintained by Microsoft, IBM, and Ariba, and is designed to provide detailed information regarding registered Web Services for all vendors. The UDDI can be queried for specific Web Services.

Q9. Is it possible to generate the source code for an ASP.NET Web service from a WSDL ?
Answer: The Wsdl.exe tool (.NET Framework SDK) can be used to generate source code for an ASP.NET web service with its WSDL link.
Example: wsdl /server http://api.google.com/GoogleSearch.wsdl.

Assembly

Q1.What do you understand Satellite Assemblies ?
Answer: This assembly is used to get language specific resources for an application.These language-specific assemblies work in side-by-side execution because the application has a separate product ID for each language and installs satellite assemblies in a language-specific subdirectory for each language.

Q2.What do you know about dot NET assemblies?
Answer: Assemblies are the smallest units of versioning and deployment in the dot NET application. Assemblies are also the building blocks for programs such as Web services, Windows services, serviced components, and dot NET remoting applications.

Q3.What is difference private and shared assembly?
Answer: Privateassembly used inside an application only and does not have to be identified by a strong name.
Shared assembly can be used by multiple applications and has to have a strong name.

Q4.What is strong name ?
Answer: A strong name includes name of assembly, version number, culture identity, and a public key token.

Q5.What is assembly ?
Answer: Assemblies are the building blocks of dot NET Framework applications; they form fundamental unit of deployment and version control and reuse and activation scoping, and security permissions. An assembly is a collection of types and resources that are built to work together and form a logical unit of functionality. An assembly provides the common language runtime with the information it needs to be aware of type implementations. To the runtime, a type does not exist outside the context of an assembly.

Q6. How can you debug failed assembly binds ?
Answer: Use the Assembly Binding Log Viewer (fuslogvw.exe) to find out the paths searched.

Q7. Where are shared assemblies stored ?
Answer: Global assembly cache.

Q8. How can you tell the application to look for assemblies at the locations other than its own install ?
Answer: Use the directive in the XML .config file for a given application.

should do the trick. Or you can add additional search paths in the Properties box of the deployed application.

Q9.Where is global assembly cache located on the system ?
Answer: Usually C:\winnt\assembly or C:\windows\assembly.

Q10. How do you specify a custom attribute for the entire assembly (rather than for a class) ?
Answer: Global attributes must appear after any top-level using clauses and before the first type or namespace declarations. An example of this is as follows:
using System;
[assembly : MyAttributeClass] class X {}

QA Testing

1. What is SQA Activities?
2. How can we perform testing without expected results?
3. Which of the following statements about regression testing are true?
a. Regression Testing must consist of a fixed set of tests to create a baseline
b. Regressoin Testing should be used to detect defects in new features
c. Regression Testing can be run on every build
d. Regression Testing should be targeted to areas of high risk and known code change
e. Regression Testing, when automated, is highly effective in preventing defects
4. How do you conduct boundary analys testing for "ok"pushbutton
5. What is an exit and entry criteria in a Test Plan ?
6. To whom you send test deliverables?
7. What is configuration Management?
8. Who writes the Business requirements? What you do when you have the BRD?
9. What we normally check for in the Database Testing?
10. What is walkthrough and inspection?
11. What are the key elements for creating test plan?
12. How do you ensure the quality of the product?
13. What is the job of Quality assurance engineer? Difference between the testing & Quality Assurance job.
14. Can any one send information regarding manual testing. I know just how to use winrunner load runner tool with sample flight reservation application. can any one send me the information how to test web logic and web sphere.
15. What are the demerits of winrunner?
16. How you used whitebox and block box technologies in your application?
17. What is the role of QA in a project developement?
18. How can u test the white page ?
19. How do you scope, organize, and execute a test project?
20. What is the role of QA in a company that produces software?
21. Describe to me when you would consider employing a failure mode and defect analysis?
22. In general, how do you see automation fitting into the overall process of testing?
23. How do you decide when you have 'tested enough?'
24. Describe to the basic elements you put in a defect report?
25. What is use case? What is the diffrence between test cases and use cases?
26. What is the importance of a requirements traceability in a product testing?
27. If the actual result doesn't match with expected result in this situation what should we do?
28. Explain about Metrics and types of metrics like schedule variance , effort variance?
29. What is the diffence between functional testing & black box testing?
30. What is heuristic checklist used in Unit Testing?
31. What is the difference between System Testing,Integration Testing & System Integration Testing?
32. How to calculate the estimate for test case design and review?
33. What is Requirements Traceability ? What is the purpose of it ? Explain types of traceability matrices ?
34. What are the contents of Risk management Plan? Have you ever prepared a Risk Management Plan ?
35. What metrics used to measure the size of the software?

Java System Design & Analysis Patterns

1. What is an analysis pattern?
2. What are the differences between analysis patterns and design patterns?
3. How does "Extreme Programming" (XP) fit with patterns?
4. What is the disadvantage of using the Singleton pattern? It is enticing to use this pattern for all the classes as it makes it easy to get the reference of the singleton object.
5. How do you write a Thread-Safe Singleton?
6. What is the Reactor pattern?
7. What are Process Patterns?
8. How and where did the concept of design patterns get started?
9. Where can I find good examples of the Prototype pattern?
10. What are Anti-Patterns?
11. What is a software design pattern?
12. Why is the study of patterns important?
13. How do I document a design pattern?
14. Where can I learn more about design patterns?
15. What is an example of a design pattern?
16. Calendar is an abstract class. The getInstance() method tries to instantiate GregorianCalendar() i.e., parent instantiating a derived class. This looks Non-OO? Ex: Calendar a=Calendar.getInstance(); Can somebody explain why is it so?
17. What major patterns do the Java APIs utilize?
18. How can I make sure at most one instance of my class is ever created?
19. When would I use the delegation pattern instead of inheritence to extend a class's behavior?
20. Which patterns were used by Sun in designing the Enterprise JavaBeans model?
21. What patterns are particularly useful in building networked applications?
22. Are there any good Java-specific patterns books available?
23. What are Collaboration Patterns?
24. Is it correct from a design point of view to make an object both an Observer and Observable at the same time?
25. How can I maintain a single instance of an object in an applet?
26. What is the best way to generate a universally unique object ID? Do I need to use an external resource like a file or database, or can I do it all in memory?
27. Is there some kind of Design pattern which would make it possible to use the Same code base in EJB and non EJB context?
28. What is session facade?
29. How is JDO different from VO ?
30. How can I implement the MVC design pattern using JSP?

Software Testing Question

1. What is Software Testing?A. Testing involves operation of a system or application under controlled conditions and evaluating the results,The controlled conditions should include both normal and abnormal conditions.
Testing is a process of executing a program with the intend of finding the errors.

2. What is the Purpose of Testing?
A. The purpose of testing is
1· To uncover hidden errors
2· To achieve the maximum usability of the system
3· To Demonstrate expected performance of the system


3. What types of testing do testers perform?
A. Two types of testing 1.White Box Testing 2.Black Box Testing.

4. What is the Outcome of Testing?
A. The outcome of testing will be a stable application which meets the customer Req's.

5. What kind of testing have you done?
A. Usability,Functionality,System testing,regression testing,UAT
(it depends on the person).

6. What is the need for testing?
A. The Primary need is to match requirements get satisfied with the functionality
and also to answer two questions
1· Whether the system is doing what it supposes to do?
2· Whether the system is not performing what it is not suppose to do?


7. What are the entry criteria for Functionality and Performance testing?A. Entry criteria for Functionality testing is Functional Specification /BRS (CRS)/User Manual.An integrated application, Stable for testing.

Entry criteria for Performance testing is successfully of functional testing,once all the requirements related to functional are covered and tested, and approved or validated.

8. What is test metrics?A.

9. Why do you go for White box testing, when Black box testing is available?A. A benchmark that certifies Commercial (Business) aspects and also functional (technical)aspects is objectives of black box testing. Here loops, structures, arrays, conditions,files, etc are very micro level but they arc Basement for any application, So White box takes these things in Macro level and test these things

Even though Black box testing is available,we should go for White box testing also,to check the correctness of code and for integrating the modules.


10.What are the entry criteria for Automation testing?
A. Application should be stable. Clear Design and Flow of the application is needed.




11.When to start and Stop Testing?
A. This can be difficult to determine. Many modern software applications are so complex,and run in such an interdependent environment, that complete testing can never be done.
Common factors in deciding when to stop are:

Deadlines (release deadlines, testing deadlines, etc.)
Test cases completed with certain percentage passed
Test budget depleted
Coverage of code/functionality/requirements reaches a specified point
Bug rate falls below a certain level
Beta or alpha testing period ends

12.What is Quality?
A. It ensures that software is a Bug free,delivered in time,with in budget,meets customer requirements and maintainable.Quality standards are different in various areas like accounting department might define quality in terms of Profit.

13.What is Baseline document?
A. The review and approved document is called as baseline document (i.e)Test plan,SRS.

14.What is verification?
A. To check whether we are developing the right product according to the customer
requirements r not.It is a static process.

15.What is validation?
A. To check whether we have developed the product according to the customer requirements r not.It is a Dynamic process.

16.What is quality assurance?
A. Quality Assurance measures the quality of processes used to create a quality product.
1.It is a system of management activities.
2.It is a preventive process.
3.It applies for entire life cycle.
4.Deals with Proces.

17.What is quality control?
A. Quality control measures the quality of a product
1.It is a specific part of the QA procedure.
2.It is a corrective process.
3.It applies for particular product.
4.Deals with the product.

18.What is SDLC and TDLC?
A. Software development life cycle(SDLC) is life cycle of a project from starting to ending of the project.
1.Requiremnts Specification. 2.Analysis
3.Design 4.Coding
5.Testing 6.User acceptance test(UAT)
7.Maintainance

Software Test Life Cycle(STLC) is a life cycle of the testing process.
1.Requiremnts Specification. 2.Planning
3.Test case Design. 4.Execution
5.Bug Reporting. 6.Maintainance


19.What are the Qualities of a Tester?
A. Tester should have qualities like
1.ability to break 2.paitence 3.communication
4.Presentation 5.team work. 6.negative thinking with good judgment skills

20.When to start and Stop Testing?
A. repeat

21.What are the various levels of testing?
A. The various levels of testing like
1· Ad - Hoc testing
2. Sanity Test
3. Regression Testing
4. Functional testing
5· Web Testing

22.What are the types of testing you know and you experienced?
A. I am experienced in Black Box testing.

24.After completing testing, what would you deliver to the client?A. It is depend upon what you have specified in the test plan document.
the contents delivers to the clients is nothing but Test Deliverables.
1.Test plan document 2.Master test case document 3.Test summary Report.
4.Defect Reports.

25.What is a Test Bed?A. Test bed means under what test environment(Hardware,software set up) the
application will run smoothly.

26.What is a Data Guidelines?
27.Why do you go for Test Bed?A. We will prepare test bed bcoz first we need to identify under which
environment (Hardware,software) the application will run smoothly,then
only we can run the application smoothly without any intereptions.

28.What is Severity and Priority and who will decide what?A. Severity and priority will be assigned for a particular bug to know the importance of the bug.
Severity:How sevierly the bug is effecting the application.
Priority:Informing to the developer which bug to be fix first.

29.Can Automation testing replace manual testing? If it so, how?A. Yes,it can be done manually when the project is small,having more time.
we can test with minimum number of users.

30.What is a test case?A. A test case is a document that describes an input, action, or event and an expected response, to determine if a feature of an application is working correctly.

31.What is a test condition?A. The condition required to test a feature.(pre condition)

32.What is the test script?A. Test script is the script which is generated by an automation tool while recording a application features.

33.What is the test data?A. Test data means the input data(valid,invalid data) giving to check the feature
of an application is working correctly.

34.What is an Inconsistent bug?A. the bug which is occurring

35.What is the difference between Re-testing and Regression testing?A Re-testing:Executing the same test case by giving the no. of inputs on same build.
Regression testing:Executing the same test case on a modified build.

36.What are the different types of testing techniques?A. 1.white Box testing 2.Black Box testing.

37.What are the different types of test case techniques?A. 1.Equilance Partition. 2.Boundary Value Analysis. 3.Error guesing.

38.What are the risks involved in testing?
39.Differentiate Test bed and Test Environment?A. Both are same.

40.What ifs the difference between defect, error, bug, failure, fault?A. Defect:While executing the test case if u found any mismatch,the u will report
it to the development team,that is called defect.

Bug:Once the developer accepts your defect,the it is called as a bug.

error:it may be program error or syntax error.

41.What is the difference between quality and testing?A. QA is more a preventive thing, ensuring quality in the company and therefore
the product rather than just testing the product for software bugs?

TESTING means "quality control"
Quality control measures the quality of a product
Quality Assurance measures the quality of processes used to create a
quality product.

42.What is the difference between White & Black Box Testing?A. White Box Testing:Based on the knowledge of the internal logic of an application's code.Tests are based on coverage of code statements, branches, paths, conditions.

Black Box testing:- not based on any knowledge of internal design or code.
Tests are based on requirements and functionality.

43.What is the difference between Quality Assurance and Quality Control?A. Refer Question no.16 & 17
Quality Assurance measures the quality of processes used to create a
quality product.
Quality control measures the quality of the product.

44.What is the difference between Testing and debugging?A. The Purpose of testing is to show the program has bugs.
The Purpose of debugging is find the error/ misconception that led to failure and implement program changes that correct the error.

45.What is the difference between bug and defect?A. Defect:While executing the test case if u found any mismatch,the u will report
it to the development team,that is called defect.

Bug:Once the developer accepts your defect,the it is called as a bug.

46.What is the difference between verification and validation?A. Refer Question no.14 & 15

47.What is the difference between functional spec. and Business requirement specification?
A.
48.What is the difference between unit testing and integration testing?
A. Unit Testing:It is a testing activity typically done by the developers not by testers,as it requires detailed knowledge of the internal program design and code. Not always easily done unless the application has a well-designed architecture with tight code.

integration testing:testing of combined parts of an application to determine if they function together correctly. The 'parts' can be code modules, individual applications,client and server applications on a network, etc. This type of testing is especially relevant to client/server and distributed systems.

49. What is the diff between Volume & Load?A. Load,stress testing comes under performance testing.
Load Testing:To test the performance of the application by gradually
increasing the user loads.

Stress Testing:TO test the performance of the application and to find the server break down or where the server crashes.

Volume Testing:To test whether it can able to send max data according to client req's.

50. What is diff between Volume & Stress?A. Refer Question no.49

51. What is the diff between Stress & Load Testing?A. Refer Question no.49

52. What is the Diff between Two Tier & Three tier Architecture?A. Two Tier Architecture:It is nothing but client server Architecture,where client will hit request directly to server and client will get response directly from server.

Three tier Architecture:It is nothing but Web Based application,here in between client and server middle ware will be there,if client hits a request it will go to the middle ware and middle ware will send to server and vise-versa.

53. What is the diff between Client Server & Web Based Testing?A. Refer Question no.52

54. What is the diff between Integration & System Testing?A. integration testing:testing of combined parts of an application to determine if they function together correctly. The 'parts' can be code modules, individual applications,client and server applications on a network, etc. This type of testing is especially relevant to client/server and distributed systems.


System Testing:system testing will conducted on the entire system to check whether
it is meeting the customer requirements r not.

55. What is the Diff between Code Walk through & Code Review?
56. What is the diff between walk through and inspection?
A. walk through:A 'walk through' is an informal meeting for evaluation or informational purposes. Little or no preparation is usually required

inspection:Inspection is an formal meeting,here every thing discussed will be documented such as a requirements spec or a test plan, and the purpose is to find problems and see what's missing,The result of the inspection meeting should be a written report.

57. What is the Diff between SIT & IST?
58. What is the Diff between static and dynamic?A. Static Testing:Test activities that are performed without running the software is called Static Testing,it includes inspections,walk throughs and desk checks.

dynamic testing:Test activities that are performed by running the software is called dynamic Testing.

59. What is the diff between alpha testing and beta testing?
A. Alpha Testing:alpha testing will be performed by client in our environment with dummy data,In this phase some major bugs can be allowed,later which will be solved by our development team.

beta testing:beta testing will be performed by client in his environment with real data,In this phase no bugs can be allowed.

70-215 Installing, Configuring, and Administering Microsoft Windows 2000 Server

Q1. To install Windows 2000 Server from MS-DOS you should run?

A. setup.exe from I386 folder on your CD
B. setup32.exe from I386 folder on your CD
C. winnt.exe from I386 folder on your CD
D. winnt32.exe from I386 folder on your CD

Q2. You want to install Windows 2000 Server on an older computer to be used as a print server. The computer is a Pentium 166 with 128mb of RAM. You have installed a new 20GB hard drive that hasn`t been formatted. The computer has a CD-ROM drive, but you`re unable to boot from the CD. How can you install Windows 2000 Server on this computer?

A. Replace the CD-ROM drive with one that supports bootable CDs.
B. Use the boot disk that shipped with Windows 2000
C. On another computer, run makeboot.exe to create the setup boot disks.
D. On another computer, run winnt.exe with the /ox option to create a set of bootable floppy disks.

Q3.You were asked to upgrade the following machines to Windows 2000 Servers:
1. Windows NT 3.51
2. Windows NT 3.51 with Citrix
3. Windows NT 4.0
4. Microsoft BackOffice Small Business Server
How many machines will be successfuly upgraded?

A. 1
B. 2
C. 3
D. 4

Q4. Is it possible to specify third-party drivers during unattended installation of Windows 2000 Server?

A. Yes
B. No

Q5. You want to install Windows 2000 Server on one of your servers and make it a Domain Controller.
How can you do that?

A. Run install as following: setup /mode dc
B. Run install as following: setup /mode pdc
C. Run install as following: setup /type dc
D. Run install as following: setup /type pdc
E. Perform regular installation and run dcpromo from the command line


Q6.How could you check that your existing system software and hardware are compatible for Windows 2000 Upgrade? (Choose all that apply)

A. Run winnt32 /chkupg
B. Run winnt32 /checkupgradeonly
C. Run chkupgrd.exe
D. Run chkupg.exe


Q7. You need to upgrade your Windows NT 4.0 Server to Windows 2000 Server. The Windows 2000 server setup files are on one of the network servers in your LAN.
How should you perform this upgrade?

A. While in Windows NT 4.0 run winnt.exe from network server
B. While in Windows NT 4.0 run winnt32.exe from network server
C. Start up your server in MS-DOS mode and run winnt.exe from network server
D. Start up your server in MS-DOS mode and run winnt32.exe from network server

Q8. Which of the following services must run on Windows 2000 Server to enable Internet Printing feature?


A. Microsoft Printing Services
B. Microsoft IIS
C. Microsoft SMTP Service
D. None of the above

Q9. Mike is a member of Special_Operators group on MachineA.
Special_Operators granted "Full Control" on folder c:\special. "Full Control" permissions on Special.txt file found in c:\special folder granted to Administrators group.
What will happen when Mike will try to delete c:\special folder?

A. Folder will be deleted
B. Error message will pop up, notifying that Mike doesn`t have enough permissions to delete Special.txt file
C. All files except Special.txt will be deleted from c:\special folder
D. Folder will be deleted, Special.txt will be moved to Recycle Bin


Q10. One of Win95-based clients tries to access a Distributed File System on a Windows 2000 Server, but he unable to see the DFS at all. Why?

A. Windows 95 clients can not use DFS
B. DFS Client should be installed on Windows 95
C. Special patch should be installed on Windows 2000 Server to accomodate Windows 95 clients
D. Distributed File System on Windows 2000 Server is domain-based. Windows 95 clients may only stand-alone DFS`s

Q11. If you move a file aaa.txt which has Full Control permissions for Administrator from c:\test1 to c:\test2, the file keeps its original permissions, while moving it to d:\test2 file assigned new permissions, which is Read for Administrator. Why?

A. c:\test2 has Full Control permissions while d:\test2 doesn`t have Full Control permissions, so the file assigned Read permissions by default
B. c:\test2 is on the same partition as c:\test1 while d:\test2 is not
C. It`s not possible. aaa.txt file will keep its original permissions anyway


Q12.Windows 2000 Domain-based Distributed File System is fault-tolerant.

A. True
B. False


Q13. You are configuring your Telnet Service on Windows 2000 Server, trying to allow 3 simultaneous users to use Telnet services. You change value of MaxConnections to 3 under HKEY_LOCAL_MACHINE\Software\Microsoft\TelnetServer\1.0 key in the registry, and then stop and restart Telnet Service. Now 3 users try to connect to the Telnet Server but only two of them succeed. Why?

A. You should change the value of MaxConnections under HKEY_LOCAL_MACHINE\Software\Microsoft\TelnetServer\1.0\Performance key
B. Windows 2000 Telnet Server is limited to two simultaneous connections
C. MaxConnections is not a value considered by Telnet Server


Q14. Fixprnsv utility shipping with Windows 2000 Server is used to: (Choose all that apply)

A. Scan the Print Server for Incompatible Printer Drivers
B. Install Printer Drivers
C. Replace Incompatible Printer Drivers

D. None of the above


Q15.You moved aaa.txt file which is encrypted from c:\test1 to c:\test2. After that you noticed, that the file is not encrypted anymore. Why?

A. c:\test2 is not encrypted folder
B. moving encrypted files makes them not encrypted
C. c:\test2 is a compressed folder
D. None of the above


Q16. You are trying to share c:\test folder on your computer, but unable to do that. Why?

A. This folder is marked as hidden on your computer
B. This folder is encrypted
C. This folder is compressed
D. This folder is marked as system on your computer
E. None of the above


Q17.Is it possible to logon to Windows 2000 Telnet Server using encrypted password?

A. Yes
B. No


Q18. You just added a second CPU to your Windows 2000 Server. You open task manager and notice that it looks like you have only one CPU on your Server. Why?

A. Computer Driver must be updated in Device Manager in order to let Windows know, you have now 2 CPU`s
B. Uptomp.exe should be executed in order to let Windows know, you have now 2 CPU`s
C. Computer must be rebooted
D. This motherboard doesn`t support 2 CPU`s


Q19. You`ve just installed network adapter on your Windows 2000 Server machine. At the end of the NIC installation you were asked to reboot your machine. After that the machine couldn`t boot. What is the easiest way to boot your machine?

A. You have to repair the installation of Windows 2000 Server, using the setup CD-ROM
B. Boot in safe mode
C. Boot in safe mode with network support
D. Remove the NIC

Q20. Windows 2000 supports Asymetric Multiprocessing

A. True
B. False


Q21. You want your system protected files to be checked by System File Checker tool at the next system boot. How should you run the scf.exe?

A. scf /scannow
B. scf /scanonce
C. scf /scanboot
D. scf /enable


Q22. How can you check that system files weren`t corrupted, modified or affected by a virus?

A. By running scandisk.exe
B. By running Norton AntiVirus
C. By running sigverif.exe


Q23. Which of the following will improve overall system performance?

A. Create additional pagefile on boot partition
B. Create additional pagefile on non-boot partition
C. Create additional pagefile on its own partition
D. Move pagefile to non-boot partition
E. Move pagefile to its own partition


Q24. Using Preformance monitor, which of the following pairs (object->counter) indicate you should consider faster or additional CPU for your Single-CPU Windows 2000 Server? (Choose all that apply)

A. Processor -> %Processor Time
B. System -> %Processor Time
C. Server -> Pool Nonpaged Failures
D. Server -> Pool Paged Failures
E. System -> Processor Queue Length
F. Processor -> Interrupts/sec


Q25. Which of the following counters in Preformance monitor may indicate physical disk failures?

A. Physical Disk -> Average Disk sec/Transfer
B. Physical Disk -> %Disk Time
C. Physical Disk -> Disk Bytes/sec


Q26. You want to create a performance alert that will notify you each time Processor -> %Processor Time counter equals 95%. How should you do that?

A. Using Performance Tool. Create new alert, add Processor -> %Processor Time counter and choose Limit to 95.
B. Using Performance Tool. Add Processor -> %Processor Time counter to the System Monitor. Then right click it and set Limit to 95.
C. It is not possible

Q27. When a damaged version of system protected file is detected by WFP, it`s replaced by original file from the following folder:

A. winnt\system32\origdll
B. winnt\system32\sysbackup
C. winnt\system32\sysdll
D. winnt\system32\dllcache

Q28. Using Preformance monitor, which of the following pairs (object->counter) indicate you need to increase to your Windows 2000 Server Paging File (Virtual Memory)? (Choose all that apply)

A. Memory -> Pages/sec
B. Server -> Pool Nonpaged Failures
C. Server -> Pool Paged Failures
D. Server -> Pool Nonpaged Peak


Q29. What is the highest thread priority level?

A. 0
B. 1
C. 16
D. 31
E. 64

Q30. Which of the following may be set to run when an alert is triggered? (Choose all that apply)

A. Send Email
B. Send Page
C. Send Network Message
D. Run an external program
E. Log entry in Application Event Log
F. Log entry in System Event Log

Q31. When performing a system state backup in Windows 2000 Server. Which of the following backed up on a Domain controller but are not on a Non-Domain controller Servers? (Choose all that apply)

A. Active Directory (NTDS)
B. Boot Files
C. COM+ class registration database
D. Registry
E. System Volume (SYSVOL)


Q32. Using Preformance monitor, which of the following pairs (object->counter) indicate you need to add more Physical Memory to your Windows 2000 Server? (Choose all that apply)

A. Memory -> Pages/sec
B. Server -> Pool Nonpaged Failures
C. Server -> Pool Paged Failures
D. Server -> Pool Nonpaged Peak


Q33. You have created a Performance Alert using Preformance Tool. You want to get counter data every 100 ms.
How can you do that?

A. In the General page choose sample data every: Interval = 100 , Units = ms
B. In the General page choose sample data every: Interval = 0.1 , Units = s
C. In the Schedule page choose sample data every: Interval = 100 , Units = ms
D. In the Schedule page choose sample data every: Interval = 0.1 , Units = s
E. It is not possible


Q34. You want to move file c:\uncompressed\test.txt to c:\compressed folder. Test.txt is uncompressed file, while c:\compressed is a NTFS compressed folder. What will be the reaction of operating system, when you move this file?

A. test.txt will be compressed once in c:\compressed folder
B. test.txt will remain uncompressed after the move
C. You will be asked to compress the file before moving it to compressed folder
D. Operating system will first compress the file and then move it into compressed folder

Q35. How can you upgrade a Basic Disk to Dynamic Disk in Windows 2000 installed on your laptop computer?

A. Only during installation of Windows 2000
B. Using Disk Management Snap-In
C. It`s not possible


Q36. Which of the following volumes support Disk Quotas? (Choose all that apply)

A. FAT16
B. FAT32
C. NTFS
D. CDFS


Q37. You want to move file d:\uncompressed\test.txt to c:\compressed folder. Test.txt is uncompressed file, while c:\compressed is a NTFS compressed folder. What will be the reaction of operating system, when you move this file?

A. test.txt will be compressed once in c:\compressed folder
B. test.txt will remain uncompressed after the move
C. You will be asked to compress the file before moving it to compressed folder

Q38. What is faster. Copying a file from a compressed or not compressed NTFS volume?

A. Compressed
B. Not Compressed

C. The same


Q39. You were asked to set Disk Quotas to all users of Marketing group in your Domain. How should you do that?

A. Enable Quota Management and assign Disk Quota to Marketing group
B. Assign Disk Quota to Marketing group
C. Enable Quota Management and assign Disk Quota to each member of Marketing group
D. Assign Disk Quota to each member of Marketing group


Q40. When you add a new hard disk to Windows 2000 it is added by default as?

A. Basic Disk
B. Dynamic Disk
C. Extended Disk
D. Logical Drive


Q41. Which of the following statements are true for L2TP protocol? (Choose all that apply)

A. Has header compression
B. Has tunnel authentication

C. Has Built-in encryption
D. May transmit data over UDP connections


Q42. What does PPTP stand for?

A. Peer to Peer Transfer Protocol
B. Point to Point Transfer Protocol
C. Point to Point Tunneling Protocol
D. Peer to Peer Tunneling Protocol

Q43. You have installed corporate Win2K RAS server. Users dial-up to the server, and then server calls them back and establishes connection. Users of the RAS server complain when they connect to the server using multiple modems (Multilink), the RAS server calls back and establishes the connection, but only one modem is used. What is the problem? You create a new dial-up connection on your Win2K Pro to connect to a RAS server. You configure this connection to use both of your external modems and to use multilink to bind the modems together. When establishing connection to the RAS server, you notice that only one of the modems is used. What should you do? (Choose all that apply)

A. Multilink disabled on RAS Server
B. Callback disables multilink
C. None of the above


Q44. Which of the following IP addresses may be assigned by Automatic Private IP Addressing to a DHCP client, when the client is unable to obtain IP address? (Choose all that apply)

A. 127.0.0.1
B. 192.255.255.255
C. 169.254.224.224
D. 128.232.230.12


Q45. You install a second modem on a Windows 2000 Server computer configured with Routing and Remote Access. Dial-in users report that they are unable to connect to the server by using this new modem. What can you do to help find out the cause of the problem? (Choose Three)

A. Use the Diagnostics tab in Phone and Modem Options in Control Panel to query the modem
B. From a command prompt, run the Net Config Server command
C. Use the Routing and Remote Access snap-in to find out whether the ports for both modems are operational
D. From a command prompt, run the Net Statistics command
E. Use Device Manager to identify any port resource conflicts

Q46. How can you identify the IP address assigned to a machine SERVER_A by a DHCP server? (Choose all that apply)

A. ping localhost
B. ipconfig
C. ping server_a
D. ping SERVER_A


Q47. Which of the following settings may be provided by DHCP Server to DHCP clients in addition to IP Address and subnet mask? (Choose all that apply)

A. DNS Servers
B. Exchange Servers
C. Proxy Servers
D. WINS Servers
E. Default Gateways

F. SMTP Servers


Q48. You configure several Group Policies to restrict user`s desktop settings. You want them to be applied immediately. What should you do?

A. Run secedit /refreshpolicy USER_POLICY
B. Run secedit /refreshpolicy MACHINE_POLICY
C. Run refresh /DOMAIN_POLICY
D. Run net config /refreshpolicy DOMAIN_POLICY


Q49. You`re the system administrator in a financial company. Currently all software developers are running Windows 98. Your IT manager decides to upgrade developers machines to Windows 2000 Server. Developers will need to test their code in both Windows 98 environment and Windows 2000 environment. What file system would be optimal and will enable developers to test their code in both environments?

A. FAT32
B. FAT16
C. NTFS 4
D. NTFS 5


Q50. Is it possible to encrypt a compressed file?

A. Yes
B. No


Q51.
The default encryption key in Win2K EFS is?

A. 16 bit
B. 32 bit
C. 56 bit
D. 128 bit