Saturday, February 25, 2017

Cloud Computing Interview Questions

In this post i am sharing Cloud Computing Interview Questions. These questions are helpful for freshers and for final year Students. Now a days,Cloud Computing is one one of the important technology. Cloud Computing is the computing which is completely based on the Internet. The main purpose of the cloud computing is that provides the way to deliver the services whenever and wherever the user of the cloud needs.

Companies use the cloud computing to fulfill the needs of their customers,partners and providers. The cloud computing includes vendors,partners,and business leaders as the three major contributors. Now we will see some important questions and answers

1) What is Cloud?

Ans: A cloud is a combination of hardware,software,storage,services and interfaces that helps in delivering computing as a service.It has broadly three users which are end user,business management user,and cloud service provider. The end user is the one who uses the services provided b the cloud. The business management user in the cloud takes the responsibility of the data and services provided by the cloud. Finally the cloud service provider is the one who takes care or is responsible for the maintenance of the IT assets of the cloud. The cloud acts as a common center for its users to fulfill their computing  needs.

2) What is Cloud Computing?

Ans: The Cloud Computing is the computing which is completely based on the internet.It uses the internet and remote servers to maintain data and applications. A simple example for Cloud computing is Gmail and Yahoo etc...

3) Why Cloud Computing is Important?

Ans: There are many applications of Cloud Computing,for both developers and end users. For developers,cloud computing provides increased amount of storage and processing power to run the applications they develop. Cloud computing also enables new ways to access information,process and analyze data,and connect people and resources from any location anywhere in the world.

For end users,cloud computing offers all those benefits and more. A person using a web-based application isn't physically bound to a single PC,location,or network. His applications and documents can be accessed wherever he is,whenever he wants.No fear of losing data if a computer crashes.Documents hosted in the cloud always exist,no matter what happens to the user's machine. It is a whole new world of collaborative computing all enabled by the notion of cloud computing.

Cloud computing does all this at lower costs because the cloud enables more efficient sharing of resources than does traditional network computing.Cloud infrastructure can be located anywhere,including and especially areas with lower real estate and electricity costs.

4) What are the basic characteristics of cloud computing?

Ans: There are four characteristics of cloud computing as follows:


  1. Elasticity and scalability
  2. Self-service provisioning and automatic de-provisioning
  3. Standardized interfaces
  4. Billing self-service based usage model
5) What is Cloud service?

Ans: A cloud service is a service that is used to build cloud applications. This service provides the facility of using the cloud applications.This service provides the facility of using the cloud application without installing it on the computer. It reduces the maintenance and support of the application as compared  to those applications that are not developed of users can use the application from the cloud service which may be public or private application

6) What are the features of Cloud Services?

Ans: The following are the some important features. They are


  • Accessing and managing the commercial software
  • Centralizing the activities of management of software in the web environment
  • Developing applications that are capable of managing several clients
  • Centralizing the updating feature of software that eliminates the need of downloading the upgrades.
7) What are the advantages of Cloud Service?

Ans: The following are some of the advantages of Cloud service: They are

  • Helps in the utilization of investment in the corporate sector and therefore,is cost saving.
  • Helps in the developing scalable and robust applications. Previously, the scaling took months,but now,scaling takes less time
  • Helps in saving time in terms of deployment and maintenance
8) What are the disadvantage of Cloud Computing?

Ans: The following are the some of the disadvantages of Cloud Computing: They are

  • Requires a constant internet connection
  • Doesn't work well with low speed Connections
  • Can be slow
  • Features might be limited
  • Stored data might not be secure
  • If the cloud loses the data,you are screwed
9) How many types of Cloud Services?

Ans: A cloud Service is any resource that is provided over  the internet. The most common cloud service resources are.

Software as a Service(SaaS)
Platform as a Service(PaaS)
Infrastructure as a Service(IaaS)


10) How many types of deployment models are used in Cloud?

Ans: There are 4 types of deployment models are used in Cloud:

1)public cloud
2)private cloud
3)Community cloud
4)Hybrid Cloud

11) Why does the organization need to manage the workloads?

Ans: The workload can be defined as an independent service or a set of code that can be executed.
The organization manages workloads because of the following reasons:


  • To know how their applications are running
  • To know what functions they are performing
  • To know the charges of the individual department according to  the use of the service
12) Which services are provided by window Azure operating System?

Ans: Windows Azure provides three core services which are given as follows:


  • Compute
  • storage
  • Management
13) Explain Public and private cloud?

Ans: The public cloud(or external cloud) is freely available for access. You can use a public cloud to collect data of the purchasing of items from a web site on the internet. You can also use public cloud for the reasons which are given as follows:


  • Helps when an application is to be used by a large number of people,such as an e-mail application on the internet.
  • Helps when you want to test the application and also needs to develop the application code
  • Helps when you want to implement the security for the application
  • Helps when you want to increase the computing capacity
  • Helps when you are developing the project on an ad-hoc basis by using PaaS

The Private cloud allows the usage of services by a single client on a private network. The benefits of this model are data security,corporate governance,and reliability concerns. It offers a well managed environment. It provides capability to internal users allows provision of services.






Saturday, February 18, 2017

Tips to crack Toughest Interview

In this article we will know some important tips to crack toughest interviews. These tips useful for all either IT or NON-IT. For any given vacancy,at least hundreds,if not thousands of candidates apply for the job. It takes only a few seconds for interviewer to reject you. It is important to succinctly outline your career objective,work experience,projects,training's, personal strengths and so on.

The following steps help you to crack toughest interview:

Evaluate the nature of the question:

Evaluate whether the question demands a factual answer and is meant to test your general knowledge and awareness. A factual questions like - who developed Java? This type of question demands correct answer.

However, a subjective one, like what are your thoughts "whether tablets replace text books?". In this type of questions,give a balanced answer by including as many perspectives as one can.

My conclusion is  first understand the question what kind of answer interviewer expecting. In the case of factual questions,if you do not know the answer it is better to accept your ignorance and say: I'm sorry i do not know the answer.In case of subjective questions,give a balanced answer by including as many perspective as one can.

Your answer reflects who you are:

Interviewers ask tricky questions just so that they could gauge the candidate's  personality.

For example, a question like - Do you think it was right on the part of our company to introduce the new employee policy?

If you are going to consciously make an attempt to sound positive or agreeable just so that the company hiring you will consider you application,you could be mistaken.

It is important to be honest and at the same time,sound relevant and important.

You could say- I think what the company did was right. But if i were in your place, I would..depending on what you think is right.



Stay calm,Think:

  When faced with a tough interview or a tough question,it is important to stay calm.

Sometimes the questions is just to test the ability of the candidate to handle pressure and difficult situations.

Under pressure,one must not say anything, that could betray anxiety,nervousness,anger,
thoughtlesseness, biases and such other negative emotions.

Difficult situations are the true test of one's abilities. One must view these as opportunities and not threats.

Your positive attitude,confidence and presence of mind will alone help you cruise through a tough interview.






Wednesday, February 15, 2017

What is C Language

In this article we will learn the introduction of C programming Language. This is basic Programming Language who want become Programming Developer then he/she should learn C programming Language. C is a programming language developed at AT & T’s BellLaboratories of USA in 1972. It was designed and written by a man named Dennis Ritchie.

Ritchie seems to have been rather surprised that so many programmers preferred C to older languages like FORTRAN or PL/I, or the newer ones like Pascal and APL. But, that's what happened. Possibly why C seems so popular is because it is reliable, simple and easy to use. Moreover, in an industry where newer languages, tools and technologies emerge and vanish day in and day out, a language that has survived for more than 3 decades has to be really good.  



C has been already superceded by languages like C++, C# and Java, so why bother to 
learn C Language.Though many C++ and Java based programming tools and frameworks have evolved over the years the importance of C is still unchallenged because knowingly or unknowingly while using these frameworks and tools you would be still required to use the core C language elements—another good reason why one should learn C before C++, C# or Java. 

Major parts of popular operating systems like Windows, UNIX, Linux is still written in C. This is because even today when it comes to performance (speed of execution) nothing beats C

Mobile devices like cellular phones and palmtops are becoming increasingly popular. Also, common consumer devices like microwave oven, washing machines and digital cameras are getting smarter by the day. This smartness comes from a microprocessor, an operating system and a program embedded in this devices. These programs not only have to run fast but also have to work in limited amount of memory. No wonder that such programs are written in C

You must have seen several professional 3D computer games where the user navigates some object, like say a spaceship and fires bullets at the invaders. The essence of all such games is speed. Needless to say, such games won't become popular if they takes a long time to move the spaceship or to fire a bullet. To match the expectations of the player the game has to react fast to the user inputs. This is where C language scores over other languages. Many popular gaming frameworks have been built using C language

At times one is required to very closely interact with the hardware devices. Since C provides several language elements that make this interaction feasible without compromising the performance it is the preferred choice of the programmer.

I hope that these are very convincing reasons why one should adopt C as the first and the very important step in your quest for learning programming languages










Monday, February 13, 2017

what is Hacking

In this post we will discuss about Hacking and how hackers employ a variety of techniques for hacking. Now a days, data networks became by far the most common target of hackers and hacking.

In computer networking,hacking is any technical effort to manipulate the normal behavior of network. The term "hacking" historically referred to constructive,clever technical work that was not necessarily related to computer systems.Now a days,hacking and hackers are most commonly associated with malicious programming attacks on the internet and other networks.

Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose.

Hackers employ a variety of techniques for hacking: They are

  1. password cracking: The process of recovering passwords from data stored or transmitted by computer systems
  2. Vulnerability scanner: Checks computers on networks for known weaknesses 
  3. Packet Sniffer: applications that capture data packets in order to view data and passwords in transit over networks.
  4. Trojan horse: Serves as a back door in a computer system to allow an intruder to gain access to the system later
  5. Viruses:  self-replicating programs that spread by inserting copies of the same program into other executable code files or documents
  6. Key loggers: This a tool designed to record every keystroke on the affected machine for later retrieval.
  7. Root kit: It represents a set of programs which work to subvert control of an OS from legitimate operators.
 Common networking Hacking Techniques:

Hacking on computer networks is often done through scripts and other network software. These specially designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. More advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms,hired to protect that company's software and data from outside hacking. 

                            Cracking techniques on networks include creating worms,initiating denial of service(Dos)attacks,or in establishing unauthorized remote access connections to a device.



Requirements for effective hacking the combination of technical skills and personality traits:

  • Ability to work with numbers and a background in mathematics. Hacking often requires sorting through large amounts of data,code and computer algorithms
  • Memory recall and logical reasoning,Hacking involves assembling small facts and details into a plan of attack based on the logic of how computer systems work.
  • patience.Hacks tend to get very complex and require large amounts of time to plan and execute.
 

Sunday, February 12, 2017

Operating System Interview Questions

In this post we will learn Operating System(OS) Interview Questions which every IT developer must have knowledge on these Q & A. These questions and answers come across Technical Written Test also. Let us see what are those Questions and Answers as follows..

1) What is Operating System?

Ans:  An Operating System is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer Operating system, a computer would be useless.

2) What are the different Operating Systems?

Ans: There are different types OS they are

1) Multi-programming OS
2) Distributed OS
3)Batched OS
4)Time-sharing OS
5)Real-time OS

3) Why paging is used in OS?

Ans: Paging is solution to external fragmentation problem which is to permit the logical address space of a process to be noncontinuous,thus allowing a process to be allocating physical memory wherever the latter is available.

4) What is the state of the processor,when a process is waiting for some event to occur?

Ans: The state of the processor is : Waiting state

5) What is Virtual Memory?

Ans: Virtual Memory is hardware technique where the system appears to have more memory that it actually does. This is done by time-sharing ,the physical memory and storage parts of the memory one disk when they are not actively being used.

6) What is fragmentation?

Ans:  Fragmentation occurs in a dynamic memory allocation system when many of the free blocks are too small to satisfy any request.

7) What is the cause of thrashing? How does the system detect thrashing?

Ans:  Once it detects thrashing,what can the system do to eliminate this problem? Thrashing is caused by under allocation of the minimum number of pages required by a process,forcing it to continuously page fault. The system can detect thrashing by evaluating the level of CPU utilization as compared to the level of multi programming. It can be eliminated by reducing the level of multi programming.



8) While running DOS on PC,which command would be used to duplicate the entire diskette?

Ans: This command will be use to duplicate the entire diskette diskcopy.

9) What is cache-memory?

Ans: Cache memory is random access memory(RAM) that a computer microprocessor can access more quickly that it can access regular RAM. As the microprocessor process data,it looks first in the cache memory and if if finds the data there(from the previous reading of data). It does not have to do the more time-consuming reading of data from larger memory.

10) What is Kernal?

Ans: Kernal is the core and essential part of computer operating system that provides basic services for all parts of OS.

11) What is a process?

Ans: A program in execution is called a process or it may be called unit of work. A process needs some system resources as CPU time,memory,files and I/O devices to accomplish the task.

12) What is semaphore?

Ans: Semaphore is a variable,whose status reports common resources,Semaphore is of two types one is Binary semaphore and other is Counting semaphore.

13) What is deadlock?

Ans: Deadlock is a situation or condition where two processes are waiting for each other to complete so that they can start. This result both the processes to hang

14) What are system calls?

Ans: System calls provide the interface between process and the OS. System calls for modern Microsoft windows platforms are part of the win 32 API. Which is available for all the compilers written for Microsoft Windows.

15) What are the states of Process?

Ans: There are 5 states of Process. They are

1) NEW
2) Running
3) Waiting
4) Ready
5) Terminated


Thursday, February 9, 2017

PHP Interview Questions

In this page i am sharing frequently asked PHP interview Questions for Freshers and experienced candidates. These questions are frequently asked when you attend technical round in the companies.

1) What is PHP?

Ans: PHP is a server-side scripting language that is widely used for web development. By using we can write dynamic web pages efficiently and quickly. PHP is exectued on the server. It is open source scripting language,so it is free to download and use.It is very easy for learning.

2) Which Programming lanugage does PHP resemble to?

Ans: PHP programming language syntax is borrowed from perl,c. Thus PHP programming language looks same perl and C language. 

3) How do you execute a PHP script from the command line?

Ans: Just use the PHP command line interface(CLI) and specify the file name of the script to be executed as follows:
PHP

1
php script.php


4) what is meant by PEAR in PHP?

Ans: PEAR is short for "PHP extension and Application Repository". The main purpose of PEAR is to provides all kinds of php code snippets and libraries. Since PEAR is framework and repository for reusable PHP components. It also offers Command Line Interface(CLI) that can be used to automatically install "packages". A website,mailing lists and download mirrors to support the PHP/Pear community.

5) Is PHP a case sensitive programming Language?

Ans: PHP is a partially case sensitive programming language. We can use function names,class names in case sensitive manner.

6)Difference Between Echo and print statement in PHP?

Ans: Echo() and print() both are used to output strings. The speed of both statements is almost same. But the main difference is Echo() can take multiple expressions whereas print can not take multiple expression. Print() return true or false based on success or failure whereas Echo() does not return true or false.

7) How to include a file to a php page?

Ans: we can include a file using "include() or "require()" function with file path as its parameter.

8) What is difference between include() and require()?

Ans: If the file is not found by the require(),it will cause a fatal error and halt the execution of the script. If the file is not found by include() a warning will be issued but execution will continue.

9)What are the different types of errors in PHP?

Ans: There are three types of errors in PHP. They are Notices,Warnings and fatal errors.

10) How can we display the output directly to the browser?

Ans: To display the output directly to the browser,we have to use the special tags<?=and?>

11) What is the main difference between PHP 4 and PHP 5?

Ans: PHP 5 presents many additional Object Oriented Programming Features.

12) What are difference between GET and POST methods?

Ans: We can send 1024 bytes using GET method but POST method can transfer large amount of data and POST is the secure method than GET method.

13) How can we submit form without a submit button?

Ans: we can use a simple java script code linked to an event trigger of any form filed. In the java script code,we can call the document.form.submit() function to submit the form.

14) How can we encrypt the username and password using PHP?

Ans: You can encrypt a password with the following:
Mysql>SET PASSWORD=PASSWORD(\"Password\");

we can encode data using
base64_encode($string) and 

we can decode data using 
base64_decode($string);

15) How can we register the variables into a session?

Ans: we can use the session_register($ur_session_var)function


16) Is multiple inheritance supported in PHP?

Ans:  PHP includes only single inheritance, it means that a class can be extended from only one single class using the keyword ? extended ?


17) How can PHP and HTML interact?

Ans: It is possible to generate HTML through PHP scripts,and it is possible to pass information from HTML to PHP.

18) What is session?

Ans: A PHP session is no different from a normal session. It can be used to store information on the server for future use.

19) How to declare an array in PHP?

Ans: var $arr=array('apple','banana','grape');

20) What is use of in_array() function in PHP?

Ans: in_array() is used to checks if a value exists in an array.

21) What is Cookies in PHP?

Ans: Cookies are used to track user information.

22) How to set cookies in php?

Ans: cookies are used to track the information.
Syntax: Setcookie(name,value,expire,path,domain);

Example: Setcookie(\"demo\",\"mahesh\",\time()+4000);

23) How we can connect to a MySql database from a PHP script?

Ans: To connect to MySql database from PHP script,we must use mysql_connect() function as follows:

PHP

1
<!--?php $database=mysql_connect("HOST","USER_NAME","PASSWORD");
mysql_select_db("DATABASE_NAME",$databse)?--


24) How can we access the data sent through the URL with the GET method?

Ans:  In order to access the data sent via the GET method,we use $_GET array like this:

www.url.com?var=value
$vairable=$_GET[?var?];this will now contain ?value?

25) What is the meaning of a persistent Cookies?

Ans: A persistent cookie is permanently stored in a cookie file on the browser's computer. By default,cookies are temporary and are erased if we close the browser.

26) How to initiate a session in PHP?

Ans: To activate a session we have to use a function as follows:
session_start();

27) What is the difference between session_unregister() and session_unset()?

Ans: The session_unregister() function unregister a global variable from the current session and the session_unset() function free all session variables.

28) How can we change the maximum size of the files to be uploaded?

Ans: we can change the maximum size of files to be uploaded by changing upload_max_filesize in php.ini.

29) Is it possible to submit a form with a dedicated button?

Ans:  It is possible to use the document.form.submit() function to submit the form.

For Example: <input type=button value=?SUBMIT?onClick=?document.form.submit()?>

30) How do you create sub domains using PHP?

Ans: To create domains using php Wild card domains can be used. Sub domains can be created by first creating.

31) When session ends?

Ans: Session automatically ends when the PHP script finishes executing,but can be manually ended using the session_write_close()

32) What is SSL?

Ans: SSL stands for Secure Sockets Layer. This is cryptographic protocols which provide secure communications on the internet.

33) What is difference between mysql_connect and mysql_pconnect?

Ans: Mysql_connect opens up a database connection every time a page is loaded whereas mysql_pconnect opens up a connection and keeps it open across multiple requests.

mysql_pconnect uses less resources,because it does not need to establish a database connection every time a page is loaded.

34) How do you make one way encryption for your passwords in PHP?

Ans:  By using md5 function or sha1 function

35) How can we repair Mysql table?

Ans: The syntax for repairing table is:

REPAIR TABLE tablename
REPAIR TABLE tablename QUICK
REPAIR TABLE tablename EXTENDED

This command will repair the table specified. If QUICK is given,Mysql will do a repair of only the index tree. If EXTENDED is given,it will create index row by row.

Tuesday, February 7, 2017

WIPRO Company Profile

In this article we will know about WIPRO Company History,Technologies used in Wipro and what is the basic salary in India and their placement procedure.This is good to know for Tech developers for their Company Profiles.

 WIPRO is one of the largest IT company. It was established in the year 1945,December by Amalner. It has 46 development centers across globe. When company was established,it is used to produce sunflower oil and different soaps.

History:

In the year 1966 Azim Premji took over Wipro as its chairman after his father death.In 1980, Wipro entered into IT domain. Then Wipro name is changed from Wipro product Limited to Wipro Limited. In 1988, Wipro become certified as SEI-CMM Level 5. In 2002, It has launched BPO business.

Services Provided by Wipro:

Wipro provides many services the following are the important ones:

Cloud services
Infrastructure Services
Business application
Product Engineering Solutions
Consulting Services

Branches across world:

In India:
Bangalore
Chennai
Hyderabad
Pune
Kolkatta
Mumbai
Noida
Cochin
Delhi
Gurgon

in Abroad:
North America -> canada
Suoth America -> Brazil
Africa
Asia pacific -> Japan
Europe  -> Uk



The company Tagline: Applying thoughts

Basic Salary in India:

Sr.S/W Engineer --->Rs 5,41,953 - Rs 7,45,567
Project Engineer ----> Rs 7,50,234 --Rs 9,26,833
Software Engineer   ----> Rs 199,183 ---Rs 393,921

Number of Employees:

The employee strength As per the statistics of 2016 is 1,73,863 employees

Official website:
http://www.wipro.com/

Placement Procedure:

1.written Exam:
Total 50 questions in 1 hour
paper1:
Quantitative Ability(20 questions)
paper2:
Verbal Ability(20 Questions)
Paper3:
Technical Ability(10 Questions)

2.Group Discussion Round

3. HR cum Technical Interview

Basic Networking Interview Questions

In this page i am sharing networking interview questions for freshers.These questions will ask in written test when you attend in off-campus interviews.The following are the few of the Basic networking Interview Questions.

1) What is Network?

Ans: A network is a set of devices connected by physical media links. It is used to share resources such as  data, printers,CD-ROM and exchanging files. The main purpose of the networking is to share information.

2) What is Node?

Ans: A network can consists of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and computer it connects is called as Nodes.

3) What is Protocol?

Ans: A Protocol is a set of rules that govern all aspects of information communication.

4) Define Routing?

Ans: The process of determining systematically Hoe to forward messages toward the destination nodes based on its address is called routing?

5) What is gateway?

Ans: A node that is connected two or more networks is commonly called gateway. It generally forwards message from one network to another.

6)  What is difference between Gateway and Router?

Ans:  The Gateway operates at the upper levels of the OSI model and translates information between two completely different network architecture or data formats.

7) What is Bandwidth?

Ans: Every line has an upper limit and a lower limit on the frequency of signals it can carry.This limited range is called the bandwidth.

8) What is MAC address?

Ans: The address for a device as it is identified at the Media Access Control(MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

9) What is SMTP?


Ans: SMTP stands for Simple Mail Transfer Protocol. It is used to exchanges mail between servers.

10) Define Proxy Server?

Ans: A proxy Server speaks the client side of a protocol to another server. This is often required when clients have certain restrictions on which servers they can connect to. When several users are hitting a popular website, a proxy server can get the contents of the web server's popular pages once,saving expensive inter network transfers while providing faster access to those pages to the clients. Also,we can get multiple connections for a single server.


11) What is difference between TCP and UDP?

Ans: These two protocols differ in the way they carry out the action of communicating. A TCP protocol establishes a two way connection between a pair of computers whereas the UDP protocol is one way message sender. The common analogy is that TCP is like making a phone call and carrying on a two-way communication,while UDP is like mailing a letter.

12) What are the seven layers of OSI model?

Ans:

Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
DataLink Layer
Physical Layer

13)What is DHCP?

Ans: DHCP stands for Dynamic Host Configuration Protocol,a piece of the TCP/IP protocol suite that handles the automatic assignment of IP address to clients.

14) Is it possible to get the Local host IP?

Ans: YES. By using InetAddress getLocolHost method.

15)What is peet-peer process?

Ans: The process on each machine that communicate at a given layer are called peer-peer process.

16) What is Checksum?

Ans: Checksum is used by the higher layer protocol(TCP/IP) for error detection.

17) What is subnet?

Ans: A generic term for section of a large networks usually separated by a bridge or router.

18) Define Encoder?

Ans: A device or program that uses predefined algorithms to encode,or compress audio or video data for storage or transmission use. It is a process to convert between digital audio and analog video.

19) Define Decoder?

Ans: A device or program that translates encoded data into its original format. The term is often used in reference to MPEG-2 video and sound data,which must be decoded before it is output.

20) What is RAID?

Ans:  It is a method for providing fault tolerance by using multiple hard disk drives.