News:

Latest Movie Updates : Cinebuzz.in
Latest Update on Rajini Movie  Enthiran / Endhiran - Rajini - The Robot

Main Menu
Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - kavee

#1
ya fine the infrmation in this topic was useful.....thanks for it
#2
Chat Box / Re: Vibrant themes at art gallery
Apr 25, 2009, 06:47 PM
the post was  usefull.....and.interestin
#3
hi dwarakesh ......i m also facing the same problem because of the recession

hope this status wil change soon..... :agree

have a nice day
#4
Question 1: what type of basic questions they are asked in Webservices?
 
Answer  1:basic web service questions include:
1)what do you mean by a Web service? what is the advantage
of using a Web service?

2)what is an WSDL?Specifications ?How are they generated?
How do you generate proxies from a WSDL?

3)what is an UDDI? Who takes care of registering
services ,modifying and deleting them?
   
 
 
Answer1:  the term Web Services refers to the technologies that allow
for making connections. Services are what you connect
together using Web Services. A service is the endpoint of a
connection. Also, a service has some type of underlying
computer system that supports the connection offered. The
combination of services - internal and external to an
organization - make up a service-oriented architecture
 
 
 
Answer 2 Basic question related to webservices
SOA
SOAP
WSDL
Service Provider
Service Consumer
XML
UDDI
CORBA/RMI

These are basic step for web services
   
 
 


   
Question :4 What is SOAP and why it is required ?
 
Answer 4: SOAP stands for simple object Access protocol .

SOAP structures a message into two main parts: the headers
and the body.
SOAP is more than just a sender-receiver protocol, although
that, too, is certainly the dominant use today. SOAP
supports the concept of a message passing from a recipient,
possibly through one or more intermediaries, and ending up
at its destination, more precisely known as the ultimate
receiver.
   
 
 
Answer::  SOAP is core part of WEB-SERVICE. Mainly SOAP is an XML
syntax for exchanging message because of XML is language and
platform
indepent.SOAP is use when we are creating web services
because  Web services means publish a method(method resolve
business logic) globally.

Answer  Simple object access protocal
 
 
 
Question5:  About how soap messages are sent and received in web service ?

Answer5:  we can sent and receive soap msg with the help of HTTP, FTP
or SMTP protocols. we need to bind the soap envelope in
protocol and then we can send and receive our msg over the
netwok.
   
 
 
Question6 : How to use SOAP-DSIG and SSL for non-repudiation?

Answer 6: SOAP-DSIG is used to satisfy the message authentication
requirement. It is important to note that you can use SOAP-
DSIG and SSL simultaneously by exchanging


    the above HTTP messages over SSL.     





Technology Satisfied security requirements
SSL Confidentiality, sender/recipient authentication, and
message authentication by MAC
SOAP-DSIG Message authentication by digital signature and
MAC


        SSL provides confidentiality and sender/recipient
authentication. SSL also has functionality for adding MACs
to transmitted messages. On the other hand,


SOAP-DSIG can be used to add not only MACs but also digital
signatures to transmitted messages, but it is not
sufficient for sender/recipient authentication


because it is vulnerable to attacks such as replay attacks.
Therefore, SOAP-DSIG and SSL complement the functionalities
that the other system lacks.

         

         Remember that in order to satisfy the requirement
of non-repudiation, at a minimum you need to simultaneously
guarantee both message authentication by using a

        digital signature and sender authentication.
Therefore, using SOAP-DSIG and SSL (with client
authentication) simultaneously is the first step towards
realizing non-        repudiation. Specifically, you use
SOAP-DSIG for message authentication by using a digital
signature and SSL client/server authentication for
sender/recipient authentication.
   

 
 
Question 7:: What software elements must be assembled to build a SOAP
Server?

Answer 7::; At a minimum, all you really need is an XML processor and
an HTTP server.If you're using Visual Basic 6.0 or VBA,
then you probably want to use either Microsoft SOAP Toolkit
or PocketSOAP. If you're using VB.NET or C#, then you       
probably want to use Visual Studio.NET or the .NET
Framework. If you're using Delphi, then you want to use
Borland's Web services support in Delphi. If you're       
using C++, then you probably want to use Systinet WASP
Server for C++ or gSOAP. If you're using Java, then you
have a choice of about a dozen     implementations (Apache
Axis, Systinet WASP Server for Java, The Mind Electric
GLUE, Cape Clear Cape Connect, IONA XMLBus, BEA Workshop,
etc.)



            Favorite Java environments are WASP, GLUE, and
Axis. All offer excellent tools, they're portable across a
wide range of servlet engines, and they work!WASP and GLUE
can run standalone.
 

 
 
Question 8: What is the difference between a fault and exception in
Apache SOAP?

Answer8:::  The difference lies in where the error occurs - on the
client side (during the generation of the soap request or
the unmarshalling the response) - or on the server side
(when unmarshalling the request, processing the message or
marshalling the response). The client side raises an
exception  whereas the server side sends a SOAP response to
the client indicating an error occured on the server side
(ie. you get a SOAP fault).

        For example, sending a SOAP encoded request for a
method that does not exist results in a SOAP fault whereas
if the server sends a response with a field that does not
exist in a client side class a SOAP exception will be
raised.
   

 
 
Question  9How is SOAP different from traditional RPC?

Answe9r::  In SOAP, procedures take named parameters and order is
irrelevant. In XML-RPC order is relevant and parameters do
not have names.
   

 
 
Question  10:What is SOAP Version 1.2?

Answer10 :: SOAP version 1.2 is a lightweight protocol for exchange of
information in a decentralized, distributed environment. It
is an XML based protocol that consists of four parts: an
envelope that defines a framework for describing what is in
a message and how to process it, a set of encoding rules
for expressing instances of application-defined data types,
a convention for representing remote procedure calls and
responses and a binding convention for exchanging messages
using an underlying protocol. SOAP can potentially be used
in combination with a variety of other protocols; however,
the only bindings defined in this document describe how to
use SOAP in combination with HTTP and the experimental HTTP
Extension Framework.
   

 
 
Question  11What is an ESB?

 
Answer11::  An Enterprise Service Bus (ESB) is a standards-based,
Service Oriented Architecture (SOA) backbone, capable of
connecting applications through service interfaces. By
combining Messaging, Web Services, XML, Data Transformation
and Management, an ESB can reliably connect, mediate and
control all communications and interactions between
services.
 

 
 
Answer:  An esb is a very important component of SOA. Imagine all
your web services built on different technologies
(java,.net,mainframe)..interacting with each other using
xml for data transmission..One doesn't have to worry about
the schema transformation,protocol switching or message
enrichment..the esb does it all for you ..
 
 
Question 12 What is loosely coupled?

Answer12::  it basically means that the services that you use are
reusable.One service does not depend upon the other.A
change in a .net service shall not affect another service
developed in java.All the components that is needed for an
application must not be tightly coupled so that a single
change in some class changes all other parts of the
application.Instead break the whole application into small
components ,expose them as web services and orchestrate .
   
 
 
Question 13: What do you mean by SOAP encoding?
 
Answer 13: A.SOAP uses an XML format to encode data. There are two ways
in which it maps high level datatypes like integers, arrays
to a serialized XML format- Section 5 encoding and Literal
encoding. Section 5 encoding, also called SOAP encoding, is
named after the section in the SOAP 1.1 specification that
defines it. Literal encoding on the other hand uses a XML

#5
What is difference between Application Server and Web
Server?

Answer
In web server we can run onyy servlet and jsp but in
application server we can run servlet,jsp and ejb..
WEB-SERVER-Tomcat,resin
App-WEBLOGIC,JBOSS


 
 
Question 2 What is IOC in spring?

Answer 

IOC(Inversion of control)is a technique that allows object
configuration to be moved out of code and into a
configuration file. With Spring IOC, this is typically done
with an XML file.
The steps to use Spring IOC are:

1. Write Java Bean classes, with getter and setter methods
for each property to be configured by Spring.
2. Create an XML file that describes the Java Beans to be
configured.
3. Use an XMLBeanFactory to create configured beans. There
are other ways to read bean descriptions, but using an
XmlBeanFactory is more common.
   
 
 
Question 3
What is the difference between Eclipse and MyEclipse?

Answer  Eclipse needs MyEclipse plugable source
But MyEclipse did not required any plugable source

 
 


   
Question 4
Difference between Spring framework and Struts framework?
 
Answer  STRUTS :
1.Struts framework is based on MVC pattern to develop web
applications and which is used to generate integration logic
dynamically.
2.Struts allows only JSP as a view component.

SPRING:
1.Spring framework is used to develop enterprise applications.
2.Spring framework not only allows JSPs but also other views
such as Velocity,Freemaker etc.,
3.Spring f/w consists of 6 modules which are alternatives
for existing J2ee Technologies.


 
 
Answer  struts framework is a mvc pattern. spring framework is a
mvc pattern and other patterns also include in this.
   
Answer  Spring framework provides dependency injection.Which is
alternative to EJB.Spring framework provides many features
like velocity,Hibernate,Ibatis,PDF,Excel
views,JDO,Interceptors,web services.Whic can be built in
Spring framework very easily.It is a J2EE application
framewrok.


Struts is MVC pattern provides limited features.For
distributed applications it will have to use EJB.
    0  Yugandhar
[Java] 
 
 
Answer  Struts is a web framework which can be used to develop web
applications using MVC pattern. We have to hard code to use
applications like hibernate, jdbc, etc.

Spring is an application framework in which spring MVC is
one of the modules of spring framework. Spring uses the
concept of IOC/DI where the objects are not hard coded in
java but they are injected using construtor/setter
injection. We can use hibernate, jdbc, etc,...with spring
without hard coding in application as spring supports
classes hibernate, jdbc, and many more. This is very little
to say about spring. There are many features to be known.
    0  Anand

 
 
Question 5
What is need of DAO? Write one simple DAO example?

Answer  DAO: Data Access Object. here the main concept of DAO is to
communicate with the database. DAO mainly contains
1.) DAOFactory: this specifies which kind of database
(wether MySQL or ORACLE or MSSQL etc...).

2.) SQLFactory: which extends the DAOFactory. Here we do
all the connection stuffs.deciding te driver, hostname,
URL, username, password etc and also getting the Connection
object.

3.) AdminDAO: this is a interface where we declare all the
methods which we need in our application to perform all the
database related operation.

4.) SQLAdminFactory: this implements the AdminDAO
interface, all its method. this also gets the connection
from SQLFactory.

5.) TransactionControlDAO: here we keep the commit and
roolback methods.

if required...
6) ConnectionConstant: in this file we can mention the file
name (.properties file) where we keep the connection
detals, like hostname, username, password, etc...
   
 
Question 6
What is the use of log4j and how to make use of
that in a application?

Answer  log4j can be used for writing the log messages to various
kinds of destinations like a file, database, console etc...

It is always advisable to use some sort of logging API to
generate the log messages.the log messages helps the end
user as well as the developer of the application, to kow
about what the application has done and why the application
has failed, etc...

It is developed by Apache and this is used as part of
various products like hibernate, struts, strings etc...
 

 
 
Question 7 what is difference between vector and arraylist?.


Answer  vector is synchronized . collection object and variable
slow acess. muntable
array list is never snchronized. collection variable fast
acess


 
 
Answer  Vector is synchronized and compare to array list this slow
access, by defaulst the vector is 10,this is legacy class
Where as arraylist is unsynchronized and fast random
access,in arraylist there is no default size automatically
it is growable once the object is created it will be

 
 
Question  httt method
Rank  Answer Posted By   

Answer  doget,dopost,doput,dohead,dooption,dodelete,dotrace
doget method default method.

Answer  doGet, if the servlet supports HTTP GET requests
doPost, for HTTP POST requests
doPut, for HTTP PUT requests
doDelete, for HTTP DELETE requests
init and destroy, to manage resources that are held for the
life of the servlet
getServletInfo, which the servlet uses to provide
information about itself
   
 
 
Question 8 What is a constructor?

Answer  A constructor is one which is used to initialize the
instance variables of an object.


 
 
Answer  Guarrented intilization of instance variables of an object.
 

 
 
Question 9 which book is the best for preparing for SCWCD 1.5

Answer  SCWCD1.5 by Kathy Sierra is the Best Book


 
 
Answer  Head First Servlets & JSP
 
 
 
Answer  if you want to read just for exam perspective then read
only SCWCD1.5 by Kathy Sierra and if you want to increase
your knowledge then first read Head First Servlets & JSP

   
#6
There is good news for residents of Chennai. The Union Cabinet has approved the Rs 14,600 crore metro rail project for the city.

According to the plan, the metro rail will operate in two corridors. First is the 45-km route from the Chennai Airport to Washermanpet and the other is the 21-km route from Chennai Central to St Thomas Mount.

Both the corridors will be partially underground.

The project will be executed by the Chennai Metro Rail Corporation, which is owned by the Tamil Nadu state as well as Central government. The project is expected to be complete by 2014-1015. ;)
#7
There is good news for residents of Chennai. The Union Cabinet has approved the Rs 14,600 crore metro rail project for the city.

According to the plan, the metro rail will operate in two corridors. First is the 45-km route from the Chennai Airport to Washermanpet and the other is the 21-km route from Chennai Central to St Thomas Mount.

Both the corridors will be partially underground.

The project will be executed by the Chennai Metro Rail Corporation, which is owned by the Tamil Nadu state as well as Central government. The project is expected to be complete by 2014-1015. ;)
#8
Placement Papers / Re: ICICI Placement Papers
Jan 27, 2009, 02:04 AM
hi ...tis is the one i was searchng...thanks for ur post..
#9
hi i find it very new...

thanks for ur infrmatn......
#10

Stocks closed in the red for the third consecutive week, largely triggered by US's worst unemployment numbers in 26 years and dismal housing data. There were also apprehensions that the Reserve Bank of India (RBI) may leave the indicative rates unchanged or tinker just a little with them in the upcoming third quarter review.


The downward rally was led by mainly by IT and banking majors. ICICI Bank, HDFC Bank, State Bank of India, Infosys and TCS fell by over 2 per cent.

The Bombay Stock Exchange Sensitive Index or Sensex fell by 139.49 points to close at 8,674.35 points. The Nifty closed at 2678.55, down 35.25 points.

Yesterday, US indices fell quite sharply on bad unemployment data and reports that Microsoft plans to cut 5,000 jobs. The Dow Jones and S & P 500 were down by 1.28 per cent and 1.52 per cent, respectively.

The market breadth was negative. Out of 2,503 stocks traded, 796 advanced and 1,609 declined.

Deven Choksey, managing director, K R Choksey said that though the initial corporate results were satisfactory, investors are still cautious about committing themselves.

While oil & gas, healthcare and consumer durables indices were up less than one per cent, others fell. Bankex fell 4.16 per cent, metal index fell 3.35 per cent, capital goods (-2.87 per cent), realty (-2.45 per cent) and IT (-2.2 per cent).

#11
Learn word lists early in the morning. That's believed to help you remember the words longer. Also concentrate on word lists starting with A, P, S, R, T, and C if you are short on time.
Get to the word etymology if you have a hard time remembering the word's meaning. Try to read the word in context and use it.
Be prepared with the CAT computer format.
Schedule the test for a day and time that work best for you.
Remember to eat a healthy breakfast, drink plenty of fluids and dress comfortably on exam day.
Pack your exam materials (identification, pencils, directions, etc.) and arrive early at the test site to reduce stress.
Read the GRE website [1] thoroughly and carefully. It includes a wealth of information about what to expect on the test.



General Tips
Use the process of elimination in finalizing an answer choice when you are not sure. Eliminate any answers you know are wrong, then take your best guess as to which of the remaining choices are correct.
Use the scratch paper for calculations.
Look at the display time on the computer occasionally and pace yourself accordingly.
Use abbreviations for names, colors etc.
Do not assume anything until it is explicitly stated.



Analytical Tips
Use an essay template. The Issue Essay should include a summary of the argument, a summary of the opposing side and at least three points supporting your argument choice. The Argument Essay you are evaluating should include conclusion, premises, and assumptions. Practice writing sample essay questions, especially if you have not done thesis style writing or have not done it lately.



Verbal Analogies Tips
Determine the relationship between the two words and use it in a sentence.
Look for common relationships: part to whole, cause to effect, person to occupation, word to definition, and synonyms.
Look for the parts of speech of the words. The answer choice words should have the same parts of speech as the ones in the question.



Verbal Sentence Completion Tips
Come up with your own words for each blank without looking at the answers.
Get rid of answers that don't match your words.
Use the context of the sentence. If the sentence implies that you're looking for a positive word, then your answer should be a positive word also.
If the sentence has more than one blank, make sure all the blanks fit in correctly.



Verbal Antonyms Tips
Come up with your own opposite. Eliminate answers that do not fit in with the mood of the word.



Verbal Reading Comprehension
Do not learn the content. You don't have to understand the passage to get the main idea of the article. Your ability to comprehend the material is tested here.
Answer based on the reading. Do not use existing knowledge on a given topic to answer the questions. Remember, the directions say to choose the best answer and not correct answer.
Read ALL of the choices before you pick an answer.
Quantitative Tips
Use reverse calculation or logic to eliminate unrealistic answers.
Be clear about basic math vocabulary (words like LCM, HCF, integers, etc.).
Review:
Statistics (averages, mean, median, mode, range)
geometry (triangles, area, perimeter, circles, Pythagorean Theorem)
exponents, factorials, fractions, inequalities, proportions
order of operations (ODMAS-brackets, division, multiplication, addition, subtraction)
permutations, probability
quadratic equations, ratios, roots



#12
hi tis is useful i workd out...thanks
#13
Oracle datatype restrictions
See the Mirror Activator for Oracle Release Bulletin for the latest information on datatype restrictions.

Replication Server and Mirror Replication Agent impose the following constraints on the Oracle NUMBER datatype:

In the integer representation:

The corresponding Sybase int datatype has a smaller absolute maximum value.

The Oracle NUMBER absolute maximum value is 38 digits of precision, between 9.9 x 10125 and 1 x 10-130. The Sybase int value is between 231 - 1 and -231 (2,147,483,647 and -2,147,483,648), inclusive.

Oracle NUMBER values greater than the Sybase int maximum are rejected by Replication Server.

To avoid Replication Server restrictions using the int datatype, use the rs_oracle_decimal datatype instead when creating replication definitions for tables with large Number values.

In the floating point representation:

The precision of the floating point representation has the same range limitation as the integer representation.

If the floating point value is outside the Sybase range of 231 - 1 and -231 (2,147,483,647 and -2,147,483,648), Mirror Replication Agent converts the number into exponential format to make it acceptable to Replication Server. No loss of precision or scale occurs.

Replication Server and Mirror Replication Agent impose the following constraints on the Oracle TIMESTAMP WITH [LOCAL] TIME ZONE datatype:

When a timestamp with time zone datatype is replicated, the time zone information is used to resolve the timestamp value to the 'local' time zone and then the resolved value is replicated. The time zone information itself is not replicated.

As an example, if a timestamp with time zone is recorded in Oracle as "01-JAN-05 09:00:00.000000 AM -8:00" and the 'local' timezone is -6:00, the value replicated will be "01-JAN-05 11:00:00.000000." The timestamp value is adjusted for the difference between the recorded timezone of -8:00 and the local time zone of -6:00, and the adjusted value is replicated.

Oracle time zone files are platform-dependent.

If you use a version of Replication Server prior to version 12.5, the following size restrictions are imposed on Oracle datatypes:

Oracle BLOB, CLOB, NCLOB, and BFILE datatypes that contain more than 2GB will be truncated to 2GB.

Oracle CHAR, RAW, ROWID, and VARCHAR2 datatypes that contain more than 255 bytes will be truncated to 255 bytes.

Oracle NCHAR and NVARCHAR2 multibyte character datatypes are replicated as char or varchar single-byte datatypes.

With Replication Server version 12.5 or later, these datatype size restrictions are no longer in effect.

The following Oracle datatypes are not supported:

ORDDoc

BFILE

UnType

DBUnType

HttpUriType

FTPUriType

ORDAudio

ORDImage

ORDVideo

Opaque

XML types

Oracle UDD Ref Type

Oracle UDD Varray Type

Oracle UDD Nested Table Type

Supplied types

#14
Jokes & Funny Images / 10 Things to Know
Jan 25, 2009, 01:40 AM

10 Things to Know - Will and Guy's Insights
The most powerful force in the universe is gossip.
Will and I have yet to find anybody who can give us a clear and compelling reason why we put the clocks forward every spring.
There is a very fine line between 'hobby' and 'mental illness.'
There comes a time when you should stop expecting other people to make a big deal about your birthday.  That time is age 11.
If you had to identify, in one word, the reason why the human race has not achieved, and never will achieve, its full potential, that word would be 'meetings.'
You should not confuse your career with your life
(i.e., never confuse having a career with having a life!).
A person who is nice to you, but rude to the waiter, is not a nice person.
No matter what happens, somebody will find a way to take it too seriously.
You should never say anything to a woman that even remotely suggests you think she's pregnant unless you can see an actual baby emerging from her.
When trouble arises and things look bad, there is always one individual who perceives a solution and is willing to take command.  Very often, that individual is crazy.  (Your friends love you, anyway!)
10 Things to Know - Wisdom from the Famous
Take everything you like seriously, except yourselves.
Rudyard Kipling
Nothing is really work unless you would rather be doing something else.
James M. Barrie
Idleness is not doing nothing. Idleness is being free to do anything.
Floyd Dell
It is impossible to defeat an ignorant man in argument.
William G. McAdoo
That's the secret to life... replace one worry with another....
Charles M. Schulz
We don't see things as they are, we see things as we are.
Anais Nin
Talent hits a target no one else can hit;
Genius hits a target no one else can see.
Arthur Schopenhauer
Some things have to be believed to be seen.
Ralph Hodgson
Idealism is what precedes experience; cynicism is what follows.
David T. Wolf
The old believe everything, the middle-aged suspect everything, the young know everything.
See more of Oscar Wilde's Wit  :yes
:agree
#15
The 14-year-old left her home in Idaho Springs, Colorado, about 10 a.m. August 16, 1983. When she wasn't back that afternoon, her family called police.

Miller normally jogged in a nearby park. Investigators say she may have been seen last talking with a man who was behind the wheel of a red pickup with a white camper top and out-of-state license plates.

Immediately after Miller's disappearance, many red pickups were stopped, but none could be linked to Miller's disappearance.

Miller was not carrying any cash or personal belongings. Family and friends say she always left a note for her parents if she planned to be gone long.

But on the day she vanished, Miller left no note, her family told police. She didn't take the money she earned babysitting. Her parents insisted she would not have left intentionally for such a long time.

Over the years, the Beth Miller case has taken many twists and turns. Most recently, a grand jury investigation was called in 2007, but no indictments were returned.

Several theories are still being investigated, but over the years, no clues have surfaced. No remains have been found that could be identified as Miller's.

Police had suspicions that an Ohio man may have been involved in Miller's abduction, but he was never charged.

A serial killer from Mississippi claimed he had killed Beth Miller, but police dismissed the lead because his story didn't add up.

The most credible lead focused on a New Mexico man named Edward Apodaca, who is now dead. His former girlfriend claimed that she had helped him bury Miller in the mountains near Idaho Springs, but when police searched with cadaver dogs and excavated the area, no remains were found.

Several sightings of women thought to be Beth Miller have been reported. In 1995, a woman who was picked up by police in Tampa, Florida, claimed she was Beth Miller. Miller's family flew down to meet the woman, only to find that she was not their daughter. :(
#16
In a bid to widen its geographical coverage, Norton, the consumer arm of Symantec, plans to appoint a large network of sub-distributors across the country.

"To meet our objective of wider market coverage, we plan to appoint at least one sub-distributor in each of the state capitals of the country. We have recently appointed three new sub-distributors for Rajasthan, Punjab and Madhya Pradesh and one for the entire North-Eastern region. All these sub-distributors will promote the entire Norton product line-up to the home, SOHO and SMB segments through their networks of resellers, retailers, and assemblers," said Gaurav Kanwal, Country Sales Manager (Norton), Symantec India.

Norton's plan is to double its market coverage to 360 cities and towns from the existing 180 and thus also double its registered reseller base from 1,800 to 3,600.

Another area, where Symantec plans to increase  >:( its footprint is the retail segment. "We are extremely bullish about retail and are looking at expanding our retail presence across India. Currently, we have tie-ups with major retail chains like Croma, Staples and Reliance Digital. We will now concentrate on selling our products through alternate channels too," Kanwal added.

While, the vendor already has Ingram Micro and Redington as its national distributors, it has appointed Aladdin Multimedia as its exclusive distributor for the retail segment. Aladdin Multimedia mainly deals with LFRs like Croma and Staples.

The vendor is also planning to add more layers to its Norton Champs partner program. It plans to add training and an online test. "We plan to start a newsletter for our partners. This newsletter will not only feature new products but would feature articles sent in by partners. They can write about topics like threat management, self-made businesses and their experiences while dealing with Symantec," informed Kanwal.


#17
The version of Windows 7 Beta 1 that Microsoft made available for download on its Technet site Thursday does not support upgrades from systems running its Windows XP operating system, according to a first look at the available code in the CRN Test Center.

It does, however, permit upgrades from Vista SP1 to Windows 7.



A Microsoft spokesman said that no final decisions have yet been made about what will be included or not included in the generally available version of Windows 7, but that the company as a practice advises only clean installations of operating systems during the beta phase anyway.

For now, the beta version of Windows 7 only permits upgrades from Vista SP1 -- meaning there is at the moment no way to test or evaluate a straight XP-to-Windows 7 migration.

"We've just been telling people like we always do, conduct a clean install. That's the safest bet anyway," the spokesman said. "It shouldn't be too much of a surprise."

Microsoft announced late Wednesday night in Las Vegas that it was making its first beta version of its next generation desktop OS available via Technet and MSDN, and CEO Steve Ballmer said the general public would have access to the beta -- for free-- as of Friday. The beta will work through August of this year, giving virtually the entire market an opportunity to play around with it and evaluate Windows 7 before they have to pay for it.

The Test Center's first look at Windows 7 in beta form found:

-- Attempts to upgrade from XP were met by a warning that: "To upgrade to Windows 7, the computer needs to be running Vista with Service Pack 1 (SP1) or later. Upgrading from Windows XP to any edition of Windows 7 is not supported;"

-- On the same PC test bed, performance measured by Primate Labs' Geekbench 2.1 benchmarking software indicates that performance deteriorates slightly on the same PC from Windows XP to Windows Vista Ultimate to Windows 7 Ultimate;

-- Once Vista SP1 is installed and running, the upgrade from Vista Ultimate to Windows 7 Ultimate took an hour and 16 minutes. It is an extremely smooth upgrade -- something that could be a relief to a channel and a market that suffered extreme headaches in trying to go from XP to Vista. Compared to complaints from the market during previous OS upgrades, Vista-to-Windows 7 is a breeze, introduces subtle-but-nice interface changes and provides refreshingly strong support for several basic drivers and applications.

Our test bed was built with an AMD Phenom 9550 Quad-Core processor at 2.20GHz, 4 GB of RAM, an Nvidia 6100 nForce 4300 card. In our upgrade from Vista Ultimate to Windows 7 Ultimate, we included, among other applications, Firefox 3.0, Google Chrome and Safari browsers; Microsoft Office 2007; WordPerfect Office X4; Skype; the Digsby IM client; a FireFox plug-in, Ubiquity; and a new, free application made available this week, from Tech Smith, called "Jing," which provides for image and video desktop screen captures. Adobe Flash player was also on the Vista system.

Following the upgrade, every single application worked as it should. Skype in Windows 7 did come with a compatibility warning, but upon opening it up and trying it out, it worked just fine.

Microsoft did provide a warning to back up any .mp3 files before upgrading from Vista to Windows 7; however, the upgrade went through and the .mp3 files we had on the system survived just fine.

Once installed, Windows 7 found easy access to a shared drive on the Test Center network. Once the driver for the Oki Data printer in the lab was installed, printing from the Windows 7 PC over the network was happily uneventful.

A note of caution, though: If you try to upgrade a Vista PC and you haven't yet installed SP 1 and all essential updates from Microsoft, the process could take an additional two hours. It did for us, so keep that in mind if you're planning to try the Vista to Windows 7 Beta 1 upgrade.

More testing on Windows 7 will be needed to evaluate its security, network management and support for more applications and drivers. But at first blush, the upgrade that caused so many tempers to flare during the last OS release seems to have been alleviated greatly this time around.

It remains to be seen, however, how the market will respond if Microsoft continues to deny an upgrade from XP to Windows 7.
#18
Intel will be cutting prices on select processors on January 18th. The price cut which ranges from 5 percent to 24 percent is not as aggressive as some of the price cut seen last year

While there are minor price cuts on many processors, and larger cuts on some of the slow moving ones, the focus will be on the newly positioned Intel Core2Duo E7400 and Pentium Dual Core 5200.

This quarter the fastest moving processor in the system builder market is expected to the Pentium DualCore 5200 which will be available at Rs 3,500.

In other news, Intel is also expected to debut three new Core 2 Quad processors with a 65W rating compared to around 95 W for most of the current processors. These processors are Q8200s, Q9400s, and Q9550s, and are not expected to be launched in Indian market immediately. These processors which are prefixed with 'S' will be priced at a premium of Rs 3,000 and Rs 5,000 over their 95W cousins.

Processor
Old Price
New Price effective January 18 2009

Core 2 Quad Q8200  2.34 GHz

4 MB cache
10000
9450

Core 2 Duo E7400             2.8 GHz

2 MB cache

7050
6000

Pentium Dual Core E5300

2.6 GHz
2 MB cache

4740
4150

Pentium Dual Core 5200   
2.5 GHz

4600
3500

Pentium Dual Core E2200
2.4 GHz

3850
3350





#19
hi hi...its mind blowing topic thanks for it....its consious abt the future...tatleads me to plan
#20
hi its a nice and interesting topic....its rediculous ..
#21
1. Introduction
The first document in this set, RFC 2045, defines a number of header fields, including Content-Type. The Content-Type field is used to specify the nature of the data in the body of a MIME entity, by giving media type and subtype identifiers, and by providing auxiliary information that may be required for certain media types. After the type and subtype names, the remainder of the header field is simply a set of parameters, specified in an attribute/value notation. The ordering of parameters is not significant.

In general, the top-level media type is used to declare the general type of data, while the subtype specifies a specific format for that type of data. Thus, a media type of "image/xyz" is enough to tell a user agent that the data is an image, even if the user agent has no knowledge of the specific image format "xyz". Such information can be used, for example, to decide whether or not to show a user the raw data from an unrecognized subtype -- such an action might be reasonable for unrecognized subtypes of "text", but not for unrecognized subtypes of "image" or "audio". For this reason, registered subtypes of "text", "image", "audio", and "video" should not contain embedded information that is really of a different type. Such compound formats should be represented using the "multipart" or "application" types.

Parameters are modifiers of the media subtype, and as such do not fundamentally affect the nature of the content. The set of meaningful parameters depends on the media type and subtype. Most parameters are associated with a single specific subtype. However, a given top-level media type may define parameters which are applicable to any subtype of that type. Parameters may be required by their defining media type or subtype or they may be optional. MIME implementations must also ignore any parameters whose names they do not recognize.

MIME's Content-Type header field and media type mechanism has been carefully designed to be extensible, and it is expected that the set of media type/subtype pairs and their associated parameters will grow significantly over time. Several other MIME facilities, such as transfer encodings and "message/external-body" access types, are likely to have new values defined over time. In order to ensure that the set of such values is developed in an orderly, well-specified, and public manner, MIME sets up a registration process which uses the Internet Assigned Numbers Authority (IANA) as a central registry for MIME's various areas of extensibility. The registration process for these areas is described in a companion document, RFC 2048. The initial seven standard top-level media type are defined and described in the remainder of this document.

#22
fine .....not bad....i cant understand this...
#23
hey its much useful...i tried it..it works well...gud my frnd.
#24
* TOEFL = Test of English as a Foreign Language
* 80 multiple-choice synonym questions; 4 choices per question
* TOEFL questions available from [http://www.pearsonkt.com/bioLandauer.shtml Thomas Landauer]
* introduced in Landauer and Dumais (1997) as a way of evaluating algorithms for measuring degree of similarity between words
* subsequently used by many other researchers


== Sample question ==
::{| border="0" cellpadding="1" cellspacing="1"
|-
! Stem:
|
| levied
|-
! Choices:
| (a)
| imposed
|-
|
| (b)
| believed
|-
|
| (c)
| requested
|-
|
| (d)
| correlated
|-
! Solution:
| (a)
| imposed
|-
|}


== Table of results ==

{| border="1" cellpadding="5" cellspacing="1" width="100%"
|-
! Algorithm
! Reference for algorithm
! Reference for experiment
! Type
! Correct
! 95% confidence
|-
| RES
| Resnik (1995)
| Jarmasz and Szpakowicz (2003)
| Hybrid
| 20.31%
| 12.89–31.83%
|-
| LC
| Leacock and Chodrow (1998)
| Jarmasz and Szpakowicz (2003)
| Lexicon-based
| 21.88%
| 13.91–33.21%
|-
| LIN
| Lin (1998)
| Jarmasz and Szpakowicz (2003)
| Hybrid
| 24.06%
| 15.99–35.94%
|-
| Random
| Random guessing
| 1 / 4 = 25.00%
| Random
| 25.00%
| 15.99–35.94%
|-
| JC
| Jiang and Conrath (1997)
| Jarmasz and Szpakowicz (2003)
| Hybrid
| 25.00%
| 15.99–35.94%
|-
| LSA
| Landauer and Dumais (1997)
| Landauer and Dumais (1997)
| Corpus-based
| 64.38%
| 52.90–74.80%
|-
| Human
| Average non-English US college applicant
| Landauer and Dumais (1997)
| Human
| 64.50%
| 53.01–74.88%
|-
| DS
| Pado and Lapata (2007)
| Pado and Lapata (2007)
| Corpus-based
| 73.00%
| 62.72-82.96%
|-
| PMI-IR
| Turney (2001)
| Turney (2001)
| Corpus-based
| 73.75%
| 62.72–82.96%
|-
| PairClass
| Turney (2008)
| Turney (2008)
| Corpus-based
| 76.25%
| 65.42-85.06%
|-
| HSO
| Hirst and St.-Onge (1998)
| Jarmasz and Szpakowicz (2003)
| Lexicon-based
| 77.91%
| 68.17–87.11%
|-
| JS
| Jarmasz and Szpakowicz (2003)
| Jarmasz and Szpakowicz (2003)
| Lexicon-based
| 78.75%
| 68.17–87.11%
|-
| PMI-IR
| Terra and Clarke (2003)
| Terra and Clarke (2003)
| Corpus-based
| 81.25%
| 70.97–89.11%
|-
| CWO
| Ruiz-Casado et al. (2005)
| Ruiz-Casado et al. (2005)
| Web-based
| 82.55%
| 72.38–90.09%
|-
| PPMIC
| Bullinaria and Levy (2006)
| Bullinaria and Levy (2006)
| Corpus-based
| 85.00%
| 75.26-92.00%
|-
| GLSA
| Matveeva et al. (2005)
| Matveeva et al. (2005)
| Corpus-based
| 86.25%
| 76.73-92.93%
|-
| LSA
| Rapp (2003)
| Rapp (2003)
| Corpus-based
| 92.50%
| 84.39-97.20%
|-
| PR
| Turney et al. (2003)
| Turney et al. (2003)
| Hybrid
| 97.50%
| 91.26–99.70%
|-
|}


== Explanation of table ==

* '''Algorithm''' = name of algorithm
* '''Reference for algorithm''' = where to find out more about given algorithm
* '''Reference for experiment''' = where to find out more about evaluation of given algorithm with TOEFL questions
* '''Type''' = general type of algorithm: corpus-based, lexicon-based, hybrid
* '''Correct''' = percent of 80 questions that given algorithm answered correctly
* '''95% confidence''' = confidence interval calculated using [http://www.quantitativeskills.com/sisa/statistics/onemean.htm Binomial Exact Test]
* table rows sorted in order of increasing percent correct
* several WordNet-based similarity measures are implemented in [http://www.d.umn.edu/~tpederse/ Ted Pedersen]'s [http://www.d.umn.edu/~tpederse/similarity.html WordNet::Similarity] package
* LSA = Latent Semantic Analysis
* PMI-IR = Pointwise Mutual Information - Information Retrieval
* PR = Product Rule
* PPMIC = Positive Pointwise Mutual Information with Cosine
* GLSA = Generalized Latent Semantic Analysis
* CWO = Context Window Overlapping
* DS = Dependency Space

== Caveats ==


* the performance of a corpus-based algorithm depends on the corpus, so the difference in performance between two corpus-based systems may be due to the different corpora, rather than the different algorithms
* the TOEFL questions include nouns, verbs, and adjectives, but some of the WordNet-based algorithms were only designed to work with nouns
* some of the algorithms may have been tuned on the TOEFL questions


== References ==


Bullinaria, J.A., and Levy, J.P. (2006). [http://www.cs.bham.ac.uk/~jxb/PUBS/BRM.pdf Extracting semantic representations from word co-occurrence statistics: A computational study]. To appear in ''Behavior Research Methods'', 38.

Hirst, G., and St-Onge, D. (1998). [http://mirror.eacoss.org/documentation/ITLibrary/IRIS/Data/1997/Hirst/Lexical/1997-Hirst-Lexical.pdf Lexical chains as representation of context for the detection and correction of malapropisms]. In C. Fellbaum (ed.), ''WordNet: An Electronic Lexical Database''. Cambridge: MIT Press, 305-332.

Jarmasz, M., and Szpakowicz, S. (2003). [http://www.csi.uottawa.ca/~szpak/recent_papers/TR-2003-01.pdf Roget's thesaurus and semantic similarity], ''Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP-03)'', Borovets, Bulgaria, September, pp. 212-219.

Jiang, J.J., and Conrath, D.W. (1997). [http://wortschatz.uni-leipzig.de/~sbordag/aalw05/Referate/03_Assoziationen_BudanitskyResnik/Jiang_Conrath_97.pdf Semantic similarity based on corpus statistics and lexical taxonomy]. ''Proceedings of the International Conference on Research in Computational Linguistics'', Taiwan.

Landauer, T.K., and Dumais, S.T. (1997). [http://lsa.colorado.edu/papers/plato/plato.annote.html A solution to Plato's problem: The latent semantic analysis theory of the acquisition, induction, and representation of knowledge]. ''Psychological Review'', 104(2):211–240.

Leacock, C., and Chodorow, M. (1998). Combining local context and WordNet similarity for word sense identification. In C. Fellbaum (ed.), ''WordNet: An Electronic Lexical Database''. Cambridge: MIT Press, pp. 265-283.

Lin, D. (1998). [http://www.cs.ualberta.ca/~lindek/papers/sim.pdf An information-theoretic definition of similarity]. ''Proceedings of the 15th International Conference on Machine Learning (ICML-98)'', Madison, WI, pp. 296-304.

Matveeva, I., Levow, G., Farahat, A., and Royer, C. (2005). [http://people.cs.uchicago.edu/~matveeva/SynGLSA_ranlp_final.pdf Generalized latent semantic analysis for term representation]. ''Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP-05)'', Borovets, Bulgaria.

Pado, S., and Lapata, M. (2007). [http://www.coli.uni-saarland.de/~pado/pub/papers/cl07_pado.pdf Dependency-based construction of semantic space models]. ''Computational Linguistics'', 33(2), 161-199.

Rapp, R. (2003). [http://www.amtaweb.org/summit/MTSummit/FinalPapers/19-Rapp-final.pdf Word sense discovery based on sense descriptor dissimilarity]. ''Proceedings of the Ninth Machine Translation Summit'', pp. 315-322.

Resnik, P. (1995). [http://citeseer.ist.psu.edu/resnik95using.html Using information content to evaluate semantic similarity]. ''Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI-95)'', Montreal, pp. 448-453.

Ruiz-Casado, M., Alfonseca, E. and Castells, P. (2005) [http://alfonseca.org/pubs/2005-ranlp1.pdf Using context-window overlapping in Synonym Discovery and Ontology Extension]. ''Proceedings of the International Conference Recent Advances in Natural Language Processing (RANLP-2005)'', Borovets, Bulgaria.

Terra, E., and Clarke, C.L.A. (2003). [http://acl.ldc.upenn.edu/N/N03/N03-1032.pdf Frequency estimates for statistical word similarity measures]. ''Proceedings of the Human Language Technology and North American Chapter of Association of Computational Linguistics Conference 2003 (HLT/NAACL 2003)'', pp. 244–251.

Turney, P.D. (2001). [http://arxiv.org/abs/cs.LG/0212033 Mining the Web for synonyms: PMI-IR versus LSA on TOEFL]. ''Proceedings of the Twelfth European Conference on Machine Learning (ECML-2001)'', Freiburg, Germany, pp. 491-502.

Turney, P.D., Littman, M.L., Bigham, J., and Shnayder, V. (2003). [http://arxiv.org/abs/cs.CL/0309035 Combining independent modules to solve multiple-choice synonym and analogy problems]. ''Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP-03)'', Borovets, Bulgaria, pp. 482-489.

Turney, P.D. (2008). [http://arxiv.org/abs/0809.0124 A uniform approach to analogies, synonyms, antonyms, and associations]. ''Proceedings of the 22nd International Conference on Computational Linguistics (Coling 2008)'', Manchester, UK, pp. 905-912.

== See also ==

* [[Attributional and Relational Similarity (State of the art)]]
* [[ESL Synonym Questions (State of the art)|ESL Synonym Questions]]
* [[SAT Analogy Questions]]
* [[State of the art]]


[[Category:State of the art]]
#25
Database and SQL / Re: ALTER ROLE
Jan 24, 2009, 11:03 PM
hey its new .....informatve for me..thank u for it ....da
#26
Database and SQL / Re: Teach Yourself SQL
Jan 24, 2009, 11:01 PM
Source Code Listings for the Delphi Program Used on Day 14
program Tyssql;
uses
  Forms,
  Unit1 in 'UNIT1.PAS' {Form1},
  Unit2 in 'UNIT2.PAS' {Form2};
{$R *.RES}
begin
  Application.CreateForm(TForm2, Form2);
  Application.CreateForm(TForm1, Form1);
  Application.Run;
end.
unit Unit1;
interface
uses
  SysUtils, WinTypes, WinProcs, Messages, Classes, Graphics, Controls,
  Forms, Dialogs;
type
  TForm1 = class(TForm)
  private
    { Private declarations }
  public
    { Public declarations }
  end;
var
  Form1: TForm1;
implementation
{$R *.DFM}
end.
unit Unit2;
interface
uses
  SysUtils, WinTypes, WinProcs, Messages, Classes, Graphics, Controls,
  StdCtrls, Forms, DBCtrls, DB, DBGrids, DBTables, Grids, Mask, ExtCtrls;
type
  TForm2 = class(TForm)
    ScrollBox: TScrollBox;
    Label1: TLabel;
    EditPARTNUM: TDBEdit;
    Label2: TLabel;
    EditDESCRIPTION: TDBEdit;
    Label3: TLabel;
    EditPRICE: TDBEdit;
    DBGrid1: TDBGrid;
    DBNavigator: TDBNavigator;
    Panel1: TPanel;
    DataSource1: TDataSource;
    Panel2: TPanel;
    Panel3: TPanel;
    Query1: TQuery;
    Query2: TQuery;
    DataSource2: TDataSource;
    procedure FormCreate(Sender: TObject);
  private
    { private declarations }
  public
    { public declarations }
  end;
var
  Form2: TForm2;
implementation
{$R *.DFM}
procedure TForm2.FormCreate(Sender: TObject);
begin
  Query1.Open;
  Query2.Open;
end;
end.
#27
Database and SQL / Teach Yourself SQL
Jan 24, 2009, 10:58 PM
Books
Developing Sybase Applications
Imprint: Sams
Author: Daniel J. Worden
ISBN: 0-672-30700-6
Sybase Developer's Guide
Imprint: Sams
Author: Daniel J. Worden
ISBN: 0-672-30467-8
Microsoft SQL Server 6.5 Unleashed, 2E
Imprint: Sams
Author: David Solomon, Ray Rankins, et al.
ISBN: 0-672-30956-4
Teach Yourself Delphi in 21 Days
Imprint: Sams
Author: Andrew Wozniewicz
ISBN: 0-672-30470-8
Delphi Developer's Guide
Imprint: Sams
Authors: Steve Teixeira and Xavier Pacheco
ISBN: 0-672-30704-9
Delphi Programming Unleashed
Imprint: Sams
Author: Charlie Calvert
ISBN: 0-672-30499-6
Essential Oracle 7.2
Imprint: Sams
Author: Tom Luers
ISBN: 0-672-30873-8
Developing Personal Oracle7 for Windows 95 Applications
Imprint: Sams
Author: David Lockman
ISBN: 0-672-31025-2
Teach Yourself C++ Programming in 21 Days
Imprint: Sams
Author: Jesse Liberty
ISBN: 0-672-30541-0
Teach Yourself Tansact-SQL in 21 Days
Imprint: SAMS
Author: Bennett Wm. McEwan and David Solomon
ISBN: 0-672-31045-7
Teach Yourself PL/SQL in 21 Days
Imprint: SAMS
Author: Tom Luers, Timothy Atwood, and Jonathan Gennick
ISBN: 0-672-31123-2
Please check the Information SuperLibrary at www.mcp.com for further information and new releases.

Magazines
DBMS
P.O Box 469039
Escondido, CA 92046-9039
800-334-8152
Oracle Magazine
500 Oracle Parkway
Box 659510 Redwood Shores, CA 94065-1600
415-506-5304
Internet URLs for the Keyword SQL
http://www.aslaninc.com/
Aslan Computing Inc.: Specializes in SQL databases, Windows development tools, Windows NT networking, and Web services.

http://www.radix.net/~ablaze/
Ablaze Business Systems, Inc.: A leading Microsoft Solution Provider specializing in Visual Basic, MS Server, PowerBuilder, and the Internet.

http://www.fourgen.com/
FourGen: Open systems software supporting Windows, 4GL, UNIX, SQL, and OLE standards.

http://www.innovision1.com/steelep4/ddi.html
Digital Dreamshop: Providers of innovative client/server applications, computer graphics services, and commercial software programming in Visual Basic, Access, Transact-SQL, C++, and Delphi.

http://www.novalink.com/bachman/index.html
Bachman Information Systems: Vendor of database design tools for Sybase and Microsoft SQL Server databases and other development tools.

http://www.everyware.com/
EveryWare Development Corp.: Developers of Butler SQL, the SQL database server for Macintosh.

http://www.edb.com/nb/index.html
Netbase: Netbase provides a low-cost client/server SQL database for UNIX.

http://www.quadbase.com/quadbase.htm
Quadbase: Quadbase-SQL is a high-performance, full-featured, industrial-strength SQL relational DBMS.

http://www.sagus.com/
Software AG of North America (SAGNA): Develops and markets open, multiplatform product solutions in the areas of distributed computing (ENTIRE), application engineering (NATURAL), SQL querying and reporting (ESPERANT), database management (ADABAS), and data warehousing.

http://www.nis.net/sqlpower/
Sql Power Tools: Second-generation tools for SQL developers and database administrators.

http://world.std.com/~engwiz/
English Wizard: English Wizard translates plain English into SQL for access to your database.

http://www.microsoft.com/SQL/
Microsoft.

http://www.jcc.com/sql_stnd.html
SQL Standards: The central source
#28
customer support officer
Company  Pixzan Info Solutions Private Limited 
Job Location  Chennai 
Experience  0  - 1  yr/s
Contact Person  S. Vamsi Deepak
3/ 50, 2nd cross street, Ekattuthangal
chennai
contact:
9841576472
Salary  6500-12000 per month 
No. of Job Positions  3 

  Job Description
To work for an U. S banking process. They should be willing to work in night shifts. Incentives and growth will depend upon the competency of the candidate. People should be interested in the call center industry and should be able to stay with the company for a minimum six months.

Candidate Profile
Excellent communication skills, 1+ years experience in international call centers, 18 to 32 years of age, Preferably located in chennai

#29
Jobs Ended / job-chennai
Jan 24, 2009, 01:13 AM
system admin
Company  US based concern 
Job Location  Chennai 
Experience  1  - 2  yr/s
Contact Person  Anand
c7 paramount park, velacherry
chennai
9841348359
Salary  1.8 - 3.5 Lacs per annum 
No. of Job Positions  3 
Reference Code  SA (34292) - Posted on 21-01-2009
  Jobs in Chennai 
System Administration Jobs   
Job Description
Windows server 2003, storage domain

#30
A Transient variable is

  A) the one which does not serialize its value.

B) variable that can change its value.

C) the one whose value is constant.

D) the variable

   

2)What is Iterator?
A) is a variable.

B) is an interface.

C) is a Class.

D is a method.



 

3)class PrintTest{

public static void main(String[] args) {

double d=222.4578;
System.out.printf("% .2f",d);

}

}

A) Throws IllegalFormatConversionException
B) Prints 222.46
C) Prints 222.45
D) Prints .2224578


 

4) What is the result of compiling and running the following code, assuming that the file bb.txt does not exist?

class WriterTest{

public static void main(String[] args) throws IOException{

Writer w=new BufferedWriter(new FileWriter("bb.txt")); // Line1
w.write(1); // Line2
w.close();

}

}


A.Compiler error
B.FileNotFoundException thrown at line 1
C.IOException thrown at line 2
D.None of these

   

5) How can I multiply two double numbers without loss of precision?

  A. wrap the doubles in a   Integer object.

B. using roundoff operations in doubles

C. wrap the doubles in a BigDecimal object.

D. misses floating point values.

 



6) How you can force the garbage collection?


A. By using the method finalize().

B. Garbage collection is automatic process and can't be forced.

C. Using System.gc().

D. Using Runtime.gc().



 

7) Which are not Access Specifiers in Java given below?


i. Volatile.   ii. Private. iii. Protected. iv. Transient.

  A. i and ii.

B. ii and iv.

C. i and iv.

D. iii and iv.

How do threads communicate with each other?


A. wait().

B. notify().

C. notifyAll().

D. all the above.

E. none of the above.





16) Which class provides the capability to implement a growable array of objects?
A. Array.

B. Vector.

C. Object.

D. None of the above.

E. All the above.



 

17) How many bits are used to represent Unicode?

  A. 8 bits.

B. 16 bits.

C. 32 bits.

D. 4 bytes.





18) Which class is the superclass for every class.
A. Collection.

B. Array.

C. Object.

D. Util.



 

19) Identify the advantages of JSP over Servlet.
A. Embedding of Java code in HTML pages
B. Platform independence
C. Creation of database-driven Web applications
D. Server-side programming capabilities


 

20) Which is not an implicit Object available in the JSP Page?


A. out.

B. session.

C. printwriter.

D. application.



 

21) Which life-cycle methods of JSP cannot be overridden?


A. jspInit().

B. jspService().

C. jspDestroy().

D. none of the above.

E. all the above.


22) Which of the following are   the call back methods in Session bean?
  A. ejbCreate().

B. ejbPassivate().

C. ejbActivate().

D. all the above.

E. none of the above.

#31
Interview FAQ's in Java / swing in java
Jan 24, 2009, 12:49 AM
Java Swing is a GUI toolkit for Java. Swing is one part of the Java Foundation Classes (JFC). Swing includes graphical user interface (GUI) widgets such as text boxes, buttons, split-panes, and tables.


Swing widgets provide more sophisticated GUI components than the earlier Abstract Window Toolkit. Since they are written in pure Java, they run the same on all platforms, unlike the AWT which is tied to the underlying platform's windowing system. Swing supports pluggable look and feel – not by using the native platform's facilities, but by roughly emulating them. This means you can get any supported look and feel on any platform. The disadvantage of lightweight components is possibly slower execution. The advantage is uniform behavior on all platforms.


History

The Internet Foundation Classes (IFC) were a graphics library for Java originally developed by Netscape Communications Corporation and first released on Dec 16, 1996.

On April 2, 1996, Sun Microsystems and Netscape Communications Corporation announced their intention to combine IFC with other technologies to form the Java Foundation Classes. In addition to the components originally provided by IFC, Swing introduced a mechanism that allowed the look and feel of every component in an application to be altered without making substantial changes to the application code. The introduction of support for a pluggable look and feel allowed Swing components to emulate the appearance of native components while still retaining the benefits of platform independence. This feature also makes it easy to have an individual application's appearance look very different from other native programs.


Originally distributed as a separately downloadable library, Swing has been included as part of the Java Standard Edition since release 1.2. The Swing classes are contained in the javax.swing package hierarchy.


Example

The following is a Hello World program using Swing.

import javax.swing.JFrame;
import javax.swing.JLabel;

public final class HelloWorld extends JFrame {
private HelloWorld() {
setDefaultCloseOperation(JFrame.DISPOSE_ON_CLOSE);
getContentPane().add(new JLabel("Hello, World!"));
pack();
setLocationRelativeTo(null);
}

public static void main(String[] args) {
new HelloWorld().setVisible(true);
}
}

#32


Give one Example of static Synchronized method in JDBC API?
A. getConnection() method in DriverManager class.Which is used to get object of Connection interface.

What is a Connection?A. Connection is an interface, which is used to make a connection between client and Database (ie opening a session with a particular database).

What is the difference between execute() ,executeUpdate() and executeQuery() ? where we will use them?
Ans:
execute() method returns a boolean value (ie if the given query  returns a resutset then it returns true else false), so depending upon  the return value we can get the ResultSet object (getResultset()) or  we can know how many rows have bean affected by our query (getUpdateCount()).That is we can use this method for Fetching queries and Non-Fetching queries.
Fetching queries are the queries which are used to fetch the records from database (ie which returns resutset)   ex: Select * from emp.

Non-Fetching queries are the queries which are used to update,insert,create or delete the records from database    ex: update emp set sal=10000 where empno=7809.
executeUpdate() method is used for nonfetching queries.which returns int value.
executeQuery() method is used for fetching queries which returns ResulSet object ,Which contains methods to fetch the values.

How is jndi useful for Database connection?
Ans: Server identified the object with JDNI name
JNDI (java naming directory interface)

What are the uses of jndi?
Ans: The role of the JNDI API in the J2EE platform is two fold.
a) It provides the means to perform standard operations to a directory service resource such as LDAP (Lightweight Directory Access Protocol),Novell Directory Services, or Netscape Directory Services.
  b) A J2EE application utilizes JNDI to look up interfaces used to create, amongst other things, EJBs, and JDBC connection.

How vendor Naming registry supports JNDI?


What is the difference between JDBC and ODBC?
Ans:  a) OBDC is for Microsoft and JDBC is for Java applications.
b)   ODBC can't be directly used with Java because it uses a C interface.
c)   ODBC  makes use of pointers which have been removed totally from Java.
d)   ODBC mixes simple and advanced features together and has complex options for simple queries. But JDBC is designed to keep things simple while allowing advanced capabilities when required.
e)   ODBC requires manual installation of the ODBC driver manager and driver on all client machines. JDBC drivers are written in Java and JDBC code is automatically installable, secure, and portable on all platforms.
#33
thanks for the progrm this s the one i searchin
#34
this is a useful topic .......thanks for the post
#35
Sony tv
#36
it was useful thank u.. :educated