Apache-Specific Functions

These functions enable you to access Apache internal features—they form a high-level interface to some Apache API functions. Consequently, these functions are available only if you have compiled PHP as an Apache module. It's important to remember that these functions are case-sensitive. Functions such as apache_note() make a distinction between uppercase and lowercase variables, just like normal PHP variables.

apache_lookup_uri

class apache_lookup_uri(string URI
 
Opens an Apache subrequest to look up status information for a URI (Uniform Resource Identifier).
Returns:
Class containing a list of status information for a URI
Description:
If you have installed PHP as an Apache module, you can use this function to get information about a URI. Just as with virtual() or an SSI-include, the function opens an Apache subrequest; therefore, you can specify only a local document URI as the parameter.
 

apache_note

mixed apache_note(string key, [string value])

Returns:
Value of the Apache note corresponding to the key specified as the first argument; FALSE if no entry was found for the specified key

 

Facebook Page SEO,Setup, Optimization & Promotion

Facebook pages can be easily created for any business or service and are indexed in the search engines like Google, Yahoo, and Bing in much the same way that web pages on a website are (see example below).  Because of this, there are a number of critical factors and strategies that should be followed to create a highly optimized and visible Facebook page in the search engines. These include:
  • Naming, setup and optimization of your Facebook pages and content
  • Growing your fan base to allow for unique and catchy page naming
  • Promoting your page for your business both on and off line
  • Facebook page textual inbound link building for better targeted search engine results

Blog Marketing


Blogging
  • CMS Creation
  • Best SEO coded theme
  • SEO quality plugins
  • Blog domain name research
Social Network Integration
  • Facebook page/group integration
  • Twitter integration
  • Email Feeds integration
Quality SEO copywriting
  • Best-quality SEO copywritten Articles
  • Technical copywriting with internal linking
  • Research and development of articles
  • Keyword density management
  • Article promotion and backlinking management


Google Plus Affect SEO?

People would be driven to use Google Plus due to the fact that it will have more bearing in search engine social signals factor.We know all too well how Facebook affects search rankings with Facebook shares and Likes integrated into almost every website you land on.
Sharing in Google Plus also seems to have an effect – maybe that’s what Google is going to do next? Or perhaps they are already tracking what you’re sharing inside Google Plus?

Google Plus could influence search rankings since social factors are already “baked into” search engines. This was something Google learned from watching how Twitter’s tweets and re-tweets affected page rank. The effect was like turning on a firehose. And although Google has since plugged the Twitter hose, the impact was not totally diminished.
Love to use google plus.Its really nice.

Link Diversity

Research of SEOmoz confirmed what many top SEOs already knew: it’s not just how many links you receive, it’s from how many different websites. Google loves to see link diversity in your backlink profile, so give them what they want to see and try to score links from as many different sites as possible.

Top SEO experts tend to stay away from the forums (they’re too busy running their own firms!), there are still plenty of knowledgeable people who are more than happy to help you succeed in your SEO efforts. There is an absolute goldmine of free SEO tips and tricks available on SEO forums. If you’re paying attention, you’ll be able to recognize the experts from the novices. Once you do, pay extra attention to each of their posts, as they’ve been through it all and back.
 

Top Directories submission

This summary is not available. Please click here to view the post.

Business With SEO

The SEO strategy to be implemented here depends on the web content published on the website itself. The content must have creative, call to action and persuasive content with specific keywords used in a good density within the content which will help in getting good ranks in the SERPs of the search monsters like Google, Bing and Yahoo. With the help of best SEO practices, various business professionals can enhance the hits number on their website which may ultimately result in increasing sales leads to the business.

SEO Tips For Video Content

Video blogging and upload videos on regular basis then you need to choose a right hosting platform.
A Search engine finds it very easy to search videos categorized in a right order.
create sitemap for your videos.
Your videos must remain active for a long period of time.
Therefore, comment regularly and interact with the visitors.

Root Domains, Subdomains, and Microsites

Among the common questions in structuring a website (or restructuring one) are whether to
host content on a new domain, when to use subfolders, and when to employ microsites.
As search engines scour the Web, they identify four kinds of web structures on which to place
metrics:

Individual pages/URLs
These are the most basic elements of the Web—filenames, much like those that have been
found on computers for decades, which indicate unique documents. Search engines assign
query-independent scores—most famously, Google’s PageRank—to URLs and judge them
in their ranking algorithms. A typical URL might look something like http://
www.yourdomain.com/page.html.

Subfolders
The folder structures that websites use can also inherit or be assigned metrics by search
engines (though there’s very little information to suggest that they are used one way or
another). Luckily, they are an easy structure to understand. In the URL http://
www.yourdomain.com/blog/post17.html, “/blog/” is the subfolder and “post17.html” is the
name of the file in that subfolder. Engines may identify common features of documents
in a given subfolder and assign metrics to these such as how frequently the content
changes, how important these documents are in general, or how unique the content is
that exists in these subfolders.

Subdomains/fully qualified domains (FQDs)/third-level domains
In the URL http://blog.yourdomain.com/page.html, three kinds of domain levels are present.
The top-level domain (also called the TLD or domain extension) is “.com”, the second-level
domain is “yourdomain”, and the third-level domain is “blog”. The third-level domain is
sometimes referred to as a subdomain. Common web nomenclature does not typically apply
the word subdomain when referring to www, although technically, this too is a subdomain.
A fully qualified domain is the combination of the elements required to identify the
location of the server where the content can be found (in this example,
“blog.yourdomain.com”).
These structures can receive individual assignments of importance, trustworthiness, and
value from the engines, independent of their second-level domains, particularly on hosted
publishing platforms such as WordPress, Blogspot, Wetpaint, and so on.

Complete root domains/host domain/pay-level domains (PLDs)/second-level domains
The domain name you need to register and pay for, and the one you point DNS settings
toward, is the second-level domain (though it is commonly improperly called the “toplevel”
domain). In the URL http://www.yourdomain.com/page.html, “yourdomain.com” is the
second-level domain. Other naming conventions may refer to this as the “root” or “paylevel”
domain.

8 Quick Tips for Using Business Social Media

    1.Create or enhance business internet listings.
    2.Research and reserve domain names.
    3.Create, improve, update, or revise a Web site for the business.
    4.Optimize Google services
    5.Create and Publish Successful blog.
    6.Create and use Facebook Fan Page.
    7.Follow industry and social media sites.
    8.Find and understand the analytical data that is available.
   

Use social media marketing

join the appropriate communities on Flickr and post high-quality photos there. If you’re a service-oriented business, use Quora and/or Yahoo Answers to position yourself as an expert in your industry. Any business should also be looking to make use of Twitter and Facebook, as social information and signals from these are being used as part of search engine rankings for Google and Bing. With any social media site you use, the first rule is don’t spam! Be an active

Top Rated social media services

  • Facebook - a social networking site that allows you to have conversations with customers, post photos and videos, promote special offers, and more
  • Twitter - a 'micro-blogging' service that allows you to send and receive short messages from customers and potential customers
  • YouTube - an online video-hosting service that lets people share their videos.
  • Pinterest and Instagram have managed to captivate and transform users into raving fan-addicts.

 

 A social media presence is used as part of an overall online business marketing strategy, one element feeds the other. A Facebook fanpage will help grow your company blog and email lists, which in turn allows you to get your promotions out there. Social media allows you to create meaningful and personal relationships with clients and potential customers in ways that other channels don’t. By remaining active on social media channels, you become part of a community, which encourages people to take interest in your business, and hopefully convert this interest into sales.

Social Media Services develops a work plan that is designed to increase Your customer traffic and product sales.

Applied XML Programming for Microsoft .NET

JasperReports 3.5 for Java Developers

Head First Design Patterns

Adapting Your Site to Different Window Sizes

Modern browsers like Internet Explorer 10 support the width and height properties of the W3C Working Draft CSS Device Adaptation. This gives Web developers a simple tool to control automatic content scaling across various window dimensions. In particular, it enables sites to easily adapt to Windows 8 browsing on touch-enabled tablet devices in the snapped view and in portrait orientation.

Testing Ajax Event Handlers using Jasmine Spies

JavaScript has several methods that execute asynchronously, such as setTimeout(), Ajax calls, as well as event-driven processes. These examples all have to wait until the current execution thread comes to an end and surrenders to the next event, making asynchronous processes hard to test. Fortunately, the Jasmine JS testing library comes equipped with a couple of tools for handling callbacks.

Interview Questions in Core Java

1.what is a transient variable?
A transient variable is a variable that may not be serialized.
2.which containers use a border Layout as their default layout?
The window, Frame and Dialog classes use a border layout as their default layout.
3.Why do threads block on I/O?
Threads block on
i/o (that is enters the waiting state) so that other threads may execute while the i/o
Operation is performed.
4. How are Observer and Observable used?
Objects that subclass the Observable class maintain a list of observers. When an Observable object is
updated it invokes the
update() method of each of its observers to notify the observers that it has changed
state. The Observer interface is implemented by objects that observe Observable objects.
5. What is synchronization and why is it important?
With respect to multithreading, synchronization is the capability to control the access of multiple threads to
shared resources. Without synchronization, it is possible for one thread to modify a shared object while
another thread is in the process of using or updating that object's value. This often leads to significant
errors.
6. Can a lock be acquired on a class?
Yes, a lock can be acquired on a class. This lock is acquired on the class's Class object.
7. What's new with the
stop(), suspend() and resume() methods in JDK 1.2?
The
stop(), suspend() and resume() methods have been deprecated in JDK 1.2.
8. Is null a keyword?
The null value is not a keyword.
9. What is the preferred size of a component?
The preferred size of a component is the minimum component size that will allow
the component to displaynormally.
10. What method is used to specify a container's layout?
ThesetLayout method is used to specify a container's layout.
11. Which containers use a FlowLayout as their default layout?
The Panel and Applet classes use the
FlowLayout as their default layout.
12. What state does a thread enter when it terminates its processing?
When a thread terminates its processing, it enters the dead state.
13. What is the Collections API?
The Collections API is a set of classes and interfaces that support operations on collections of objects.
14. Which characters may be used as the second character of an identifier, but not as the first
character of an identifier?
The digits 0 through 9 may not be used as the first character of an identifier but they may be used after the
first character of an identifier.
15. What is the List interface?
The List interface provides support for ordered collections of objects.
16. How does Java handle integer overflows and underflows?
It uses those low order bytes of the result that can fit into the size of the type allowed by the operation.
17. What is the Vector class?
The Vector class provides the capability to implement a
growable array of objects
18. What modifiers may be used with an inner class that is a member of an outer class?
A (non-local) inner class may be declared as public, protected, private, static, final, or abstract.
19. What is an Iterator interface?
The Iterator interface is used to step through the elements of a Collection.
20. What is the difference between the >> and >>> operators?
The >> operator carries the sign bit when shifting right.
The >>> zero-fills bits that have been shifted.
21. Which method of the Component class is used to set the position and size of a component?
setBounds
22. How many bits are used to represent Unicode, ASCII, UTF-16, and UTF-8 characters?
Unicode requires 16 bits and ASCII require 7 bits. Although the ASCII character set uses only 7 bits, it is
usually represented as 8 bits. UTF-8 represents characters using 8, 16, and 18 bit patterns. UTF-16 uses 16-
bit and larger bit patterns.
23What is the difference between yielding and sleeping?
When a task invokes its
yield() method, it returns to the ready state. When a task invokes its
sleep()
method, it returns to the waiting state.
24. Which java.util classes and interfaces support event handling?
The EventObject class and the
EventListener interface support event processing.
25. Is sizeof a keyword?
The sizeof operator is not a keyword.
26. What are wrapped classes?
Wrapped classes are classes that allow primitive types to be accessed as objects.
27. Does garbage collection guarantee that a program will not run out of memory?
Garbage collection does not guarantee that a program will not run out of memory. It is possible for
programs to use up memory resources faster than
they are garbage collected. It is also possible for
programs to create objects that are not subject to garbage collection
28. What restrictions are placed on the location of a package statement within a source code file?
A package statement must appear as the first line in a source code file (excluding blank lines and
mplemented in a language other than Java.
29. What is final?
A final class can't be extended ie., final class may not be subclassed. A final method can't be
overridden when its class is inherited. You can't change value of a final variable is a constant
30. What if the main method is declared as private?
 The program compiles properly but at runtime it will give "Main method not public." message.
31. What if the static modifier is removed from the signature of the main method?
 Program compiles. But at runtime throws an error "NoSuchMethodError".
32. What if I write static public void instead of public static void?
 Program compiles and runs properly.
33.What if I do not provide the String array as the argument to the method?
Program compiles but throws a runtime error "NoSuchMethodError".
34.What is the first argument of the String array in main method?
The String array is empty. It does not have any element.This is unlike C/C++ where the first element by default is the program name.

c-interview-questions-and-answers-11

c types of data?
Int, char, float, void etc. are predefined basic primitive data types.Structures and Unions are user defined data types.

 What is a structure?
Ans: Structure constitutes a super data type which represents several different data types in a single unit. A structure can be initialized if it is static or global.

  What is a union?
Ans: Union is a collection of heterogeneous data type but it uses efficient memory utilization technique by allocating enough memory to hold the largest member. Here a single area of memory contains values of different types at different time. A union can never be initialized.



What is C language?
Answers : The C programming language is a standardized programming language developed in the early 1970s by Ken Thompson and Dennis Ritchie for use on the UNIX operating system. It has since spread to many other operating systems, and is one of the most widely used programming languages. C is prized for its efficiency, and is the most popular programming language for writing system software, though it is also used for writing applications. ...
printf() Function

 What is the output of printf("%d")?
Answers :1. When we write printf("%d",x); this means compiler will print the value of x. But as here, there is nothing after �%d� so compiler will show in output window garbage value.
2. When we use %d the compiler internally uses it to access the argument in the stack (argument stack). Ideally compiler determines the offset of the data variable depending on the format specification string. Now when we write printf("%d",a) then compiler first accesses the top most element in the argument stack of the printf which is %d and depending on the format string it calculated to offset to the actual data variable in the memory which is to be printed. Now when only %d will be present in the printf then compiler will calculate the correct offset (which will be the offset to access the integer variable) but as the actual data object is to be printed is not present at that memory location so it will print what ever will be the contents of that memory location.
3. Some compilers check the format string and will generate an error without the proper number and type of arguments for things like printf(...) and scanf(...).

malloc() Function- What is the difference between "calloc(...)" and "malloc(...)"?
Answers :
1. calloc(...) allocates a block of memory for an array of elements of a certain size. By default the block is initialized to 0. The total number of memory allocated will be (number_of_elements * size).
malloc(...) takes in only a single argument which is the memory required in bytes. malloc(...) allocated bytes of memory and not blocks of memory like calloc(...).
2. malloc(...) allocates memory blocks and returns a void pointer to the allocated space, or NULL if there is insufficient memory available.
calloc(...) allocates an array in memory with elements initialized to 0 and returns a pointer to the allocated space.
calloc(...) calls malloc(...) in order to use the C++ _set_new_mode function to set the new handler mode.

printf() Function- What is the difference between "printf(...)" and "sprintf(...)"?
Answers : sprintf(...) writes data to the character array whereas printf(...) writes data to the standard output device.

Compilation How to reduce a final size of executable?
Answers :Size of the final executable can be reduced using dynamic linking for libraries.

 Linked Lists -- Can you tell me how to check whether a linked list is circular?
Answers :Create two pointers, and set both to the start of the list. Update each as follows:
while (pointer1) {pointer1 = pointer1->next;
pointer2 = pointer2->next;
if (pointer2) pointer2=pointer2->next;
if (pointer1 == pointer2) {print ("circular");
}}
If a list is circular, at some point pointer2 will wrap around and be either at the item just before pointer1, or the item before that. Either way, its either 1 or 2 jumps until they meet.

"union" Data Type What is the output of the following program? Why?
Answers :
#include
main() {
typedef union {
int a;char b[10];
float c;
}
Union;
Union x,y = {100};
x.a = 50;
strcpy(x.b,"hello");
x.c = 21.50;
printf("Union x : %d %s %f n",x.a,x.b,x.c);
printf("Union y : %d %s %f n",y.a,y.b,y.c);
}

String Processing --- Write out a function that prints out all the permutations of a string. For example, abc would give you abc, acb, bac, bca, cab, cba.

Answers :
void PrintPermu (char *sBegin, char* sRest)
{
int iLoop;
char cTmp;
char cFLetter[1];
char *sNewBegin;
char *sCur;int iLen;
static int iCount;
iLen = strlen(sRest);
if (iLen == 2) {iCount++;
printf("%d: %s%s\n",iCount,sBegin,sRest);
iCount++;printf("%d: %s%c%c\n",iCount,sBegin,sRest[1],sRest[0]);return;
}
else if (iLen == 1) {iCount++;
printf("%d: %s%s\n", iCount, sBegin, sRest);return;
}
else
{
// swap the first character of sRest with each of
// the remaining chars recursively call debug print
sCur = (char*)malloc(iLen);
sNewBegin = (char*)malloc(iLen);
for (iLoop = 0; iLoop <>
iLoop ++)
{
strcpy(sCur, sRest);
strcpy(sNewBegin, sBegin);
cTmp = sCur[iLoop];
sCur[iLoop] = sCur[0];sCur[0] = cTmp;sprintf(cFLetter, "%c", sCur[0]);
strcat(sNewBegin, cFLetter);
debugprint(sNewBegin, sCur+1);
}}}
void main()
{char s[255];
char sIn[255];
printf("\nEnter a string:");
scanf("%s%*c",sIn);
memset(s,0,255);
PrintPermu(s, sIn);
}

 What is Polymorphism

'Polymorphism' is an object oriented term. Polymorphism may be defined as the ability of related objects to respond to the same message with different, but appropriate actions. In other words, polymorphism means taking more than one form. Polymorphism leads to two important aspects in Object Oriented terminology - Function Overloading and Function Overriding. Overloading is the practice of supplying more than one definition for a given function name in the same scope. The compiler is left to pick the appropriate version of the function or operator based on the arguments with which it is called. Overriding refers to the modifications made in the sub class to the inherited methods from the base class to change their behavior.

 What is Operator overloading
When an operator is overloaded, it takes on an additional meaning relative to a certain class. But it can still retain all of its old meanings.Examples:1) The operators >> and <<>Dynamic Binding :The address of the functions are determined at runtime rather than @ compile time. This is also known as "Late Binding".

Static Binding :The address of the functions are determined at compile time rather than @ run time. This is also known as "Early Binding"

What is Difference Between C/C++

C does not have a class/object concept.
C++ provides data abstraction, data encapsulation, Inheritance and Polymorphism.
C++ supports all C syntax.
In C passing value to a function is "Call by Value" whereas in C++ its "Call by Reference"File extension is .c in C while .cpp in C++.(C++ compiler compiles the files with .c extension but C compiler can not!)
In C structures can not have contain functions declarations. In C++ structures are like classes, so declaring functions is legal and allowed.
C++ can have inline/virtual functions for the classes.
c++ is C with Classes hence C++ while in c the closest u can get to an User defined data type is struct and union

 What will be the output of the following code?

void main ()
{ int i = 0 , a[3] ;
a[i] = i++;
printf ("%d",a[i]) ;

} The output for the above code would be a garbage value. In the statement a[i] = i++; the value of the variable i would get assigned first to a[i] i.e. a[0] and then the value of i would get incremented by 1. Since a[i] i.e. a[1] has not been initialized, a[i] will have a garbage value.

 Why doesn't the following code give the desired result?

int x = 3000, y = 2000 ;

long int z = x * y ;
Here the multiplication is carried out between two ints x and y, and the result that would overflow would be truncated before being assigned to the variable z of type long int. However, to get the correct output, we should use an explicit cast to force long arithmetic as shown below: long int z = ( long int ) x * y ;
Note that ( long int )( x * y ) would not give the desired effect.

 Why doesn't the following statement work?

char str[ ] = "Hello" ;
strcat ( str, '!' ) ;
The string function strcat( ) concatenates strings and not a character. The basic difference between a string and a character is that a string is a collection of characters, represented by an array of characters whereas a character is a single character. To make the above statement work writes the statement as shown below:
strcat ( str, "!" ) ;

 How do I know how many elements an array can hold?

The amount of memory an array can consume depends on the data type of an array. In DOS environment, the amount of memory an array can consume depends on the current memory model (i.e. Tiny, Small, Large, Huge, etc.). In general an array cannot consume more than 64 kb. Consider following program, which shows the maximum number of elements an array of type int, float and char can have in case of Small memory model.

main( )
{
int i[32767] ;
float f[16383] ;
char s[65535] ;
}

10. How do I write code that reads data at memory location specified by segment and offset?

Use peekb( ) function. This function returns byte(s) read from specific segment and offset locations in memory. The following program illustrates use of this function. In this program from VDU memory we have read characters and its attributes of the first row. The information stored in file is then further read and displayed using peek( ) function.
#include
#include
main( )
{

char far *scr = 0xB8000000 ;
FILE *fp ;
int offset ;
char ch ;

if ( ( fp = fopen ( "scr.dat", "wb" ) ) == NULL )
{

printf ( "\nUnable to open file" ) ;
exit( ) ;

}

// reads and writes to file
for ( offset = 0 ; offset < fp =" fopen" offset =" 0">

how do you find out if a linked-list has an end?
You can find out by using 2 pointers. One of them goes 2 nodes each time. The second one goes at 1 nodes each time. If there is a cycle, the one that goes 2 nodes each time will eventually meet the one that goes slower. If that is the case, then you will know the linked-list is a cycle.

What is the difference between realloc() and free()?
The free subroutine frees a block of memory previously allocated by the malloc subroutine. Undefined results occur if the Pointer parameter is not a valid pointer. If the Pointer parameter is a null value, no action will occur. The realloc subroutine changes the size of the block of memory pointed to by the Pointer parameter to the number of bytes specified by the Size parameter and returns a new pointer to the block. The pointer specified by the Pointer parameter must have been created with the malloc, calloc, or realloc subroutines and not been deallocated with the free or realloc subroutines. Undefined results occur if the Pointer parameter is not a valid pointer.

What is function overloading and operator overloading?
Function overloading: C++ enables several functions of the same name to be defined, as long as these functions have different sets of parameters (at least as far as their types are concerned). This capability is called function overloading. When an overloaded function is called, the C++ compiler selects the proper function by examining the number, types and order of the arguments in the call. Function overloading is commonly used to create several functions of the same name that perform similar tasks but on different data types
Does c++ support multilevel and multiple inheritance?
Yes.

What is the difference between class and structure?
Structure: Initially (in C) a structure was used to bundle different type of data types together to perform a particular functionality. But C++ extended the structure to contain functions also. The major difference is that all declarations inside a structure are by default public.
Class: Class is a successor of Structure. By default all the members inside the class are private.

What do you mean by inheritance?
Inheritance is the process of creating new classes, called derived classes, from existing classes or base classes. The derived class inherits all the capabilities of the base class, but can add embellishments and refinements of its own.

What are 2 ways of exporting a function from a DLL?
1.Taking a reference to the function from the DLL instance.
2. Using the DLL ’s Type Library.

What are virtual functions?
A virtual function allows derived classes to replace the implementation provided by the base class. The compiler makes sure the replacement is always called whenever the object in question is actually of the derived class, even if the object is accessed by a base pointer rather than a derived pointer. This allows algorithms in the base class to be replaced in the derived class, even if users don’t know about the derived class.

What is a scope resolution operator?
A scope resolution operator (::), can be used to define the member functions of a class outside the class.


What’s the best way to declare and define global variables?
The best way to declare global variables is to declare them after including all the files so that it can be used in all the functions.

What’s the auto keyword good for?
Not much. It declares an object with automatic storage duration. Which means the object will be destroyed at the end of the objects scope. All variables in functions that are not declared as static and not dynamically allocated have automatic storage duration by default.
For example
int main()
{
int b; //this is the same as writing “auto int b;”
}

What does extern mean in a function declaration?
It tells the compiler that a variable or a function exists, even if the compiler hasn’t yet seen it in the file currently being compiled. This variable or function may be defined in another file or further down in the current file.

hat are the differences between a C++ struct and C++ class?
The default member and base-class access specifiers are different.

Virtual Destructor – What is the need for Virtual Destructor?
Destructors are declared as virtual because if do not declare it as virtual the base class destructor will be called before the derived class destructor and that will lead to memory leak because derived class̢۪s objects will not get freed.Destructors are declared virtual so as to bind objects to the methods at runtime so that appropriate destructor is called.

Advantages of auto variables?
auto variable have initial value as garbage.
auto int and int are  one and the same. 



Common Job Interview Questions

Tell me about yourself?
This question or something similar usually starts every interview.  Your answer should be well-rehearsed, confidently delivered and last between 3-5 minutes.  It should also:
Focus on the areas of most relevance to the job in question
Include some impressive achievements e.g. improvements made
Convey your enthusiasm for the job
Avoid personal or irrelevant information e.g. your children, un-related jobs

What are your key skills/strengths?
Focus on what you know they are looking for, even if it has been a smaller part of what you have been doing to date.  The job advert or person specification form will give you the information you need about their requirements.

What are your weaknesses?
Choose a weakness that: Doesn't matter for the job e.g. languages for a UK firm.  Is a positive e.g. "I like to make things happen and get frustrated if too long is spent sitting around discussing it without action"
Used to be a weakness but which you have improved upon e.g. presentations

Why did you leave your last job?
Your answer should be positive and upbeat even if the circumstances were difficult.  If you were made redundant, depersonalise it by talking about company restructuring rather than your individual circumstance.  Never criticise a previous employer no matter how tempting.

Why do you want this job?
Your answer should reinforce why you are such a good fit for the job and then convey your enthusiasm for the role e.g.
  • Good match between your skills and their requirements
  • Interested in the product/market/sector
  • Company's excellent reputation, exciting challenge etc.
  • Do not say (even if it's true) that you just need a job, or you want it because it's local.
Tell me about a difficult scenario at work and how you dealt with it
They are testing how you cope under pressure as well as your problem-solving and communication skills.  Good examples are where you:
  • Helped resolve or improve a difficult situation
  • Were resilient in adverse conditions
  • Showed emotional intelligence and cool-headedness
  • Avoid any examples which still feel sensitive, because in a high-pressure interview situation, old emotions can easily resurface and throw you off balance.
Tell me about an achievement of which you are proud?
Choose work-related examples that shows a tangible benefit to the business.   Personal achievements should only be included if they are very impressive or prestigous. More experienced candidates looking for a specific roles eg Sales Director Jobs should focus on closely related areas eg driving an increase in sales or building a successful sales team

What are your career goals?
They are checking if you are likely to stay and if so, for how long.  Reassure the employer that the role you are applying for fits your career plan and your longer term commitment to the company.

What are your salary expectations?
Salary negotiations are best handled at the job offer stage so try to avoid this at interview if you can.  If forced to name a price, give a realistic but wide salary range and say that you feel that salary won't be an issue if you decide to work together.
What do you know about our organisation?
You need to know the following:
  • Company structure, finances, products and services, key staff
  • Customers and competitors
  • Market trends and challenges

Salary Questions:
  • What salary are you seeking?
  • What's your salary history?
  • If I were to give you this salary you requested but let you write your job description for the next year, what would it say?
Career Development Questions:

  • What are you looking for in terms of career development? 
  • How do you want to improve yourself in the next year?
  • What kind of goals would you have in mind if you got this job? 
  • If I were to ask your last supervisor to provide you additional training or exposure, what would she suggest?

SQL Interview Answers



1.Default constraints:
Default constraints enable the SQL Server to write default value to a column when user doesn’t specify a value.
Unique constraints:
A unique constraint restricts a column or combination of columns from allowing duplicate values.
Primary key constraints:
Primary key constraints will allow a row to be uniquely identified. This will perform by primary key on the table.
Foreign key constraints:
Foreign keys constraints will ensure that the values that can be entered in a particular column exist in a specified table.


 2.What are the tradeoffs with having indexes?
(a) Faster selects, slower updates. (b) Extra storage space to store indexes. Updates are slower because in addition to updating the table you have to update the index


 3.    What is SQL?
SQL stands for Structured Query Language , and it is used to communicate with the Database. This is a standard language used to perform tasks such as retrieval, updation, insertion and deletion of data from a database.
Standard SQL Commands are Select.

4.       What is a Database?
Database is nothing but an organized form of data for easy access, storing, retrieval and managing of data. This is also known as structured form of data which can be accessed in many ways.
Example: School Management Database, Bank Management Database.

 5.       What are tables and Fields?
A table is a set of data that are organized in a model with Columns and Rows. Columns can be categorized as vertical, and Rows are horizontal. A table has specified number of column called fields but can have any number of rows which is called record.


6.       What is a primary key?
A primary key is a combination of fields which uniquely specify a row. This is a special kind of unique key, and it has implicit NOT NULL constraint. It means, Primary key values cannot be NULL.

7.       What is a unique key?
A Unique key constraint uniquely identified each record in the database. This provides uniqueness for the column or set of columns.
A Primary key constraint has automatic unique constraint defined on it. But not, in the case of Unique Key.
There can be many unique constraint defined per table, but only one Primary key constraint defined per table.

 8.       What is a foreign key?
A foreign key is one table which can be related to the primary key of another table. Relationship needs to be created between two tables by referencing foreign key with the primary key of another table.

9.       What is a join?
This is a keyword used to query data from more tables based on the relationship between the fields of the tables. Keys play a major role when JOINs are used.

 10.   What are the types of join and explain each?
There are various types of join which can be used to retrieve data and it depends on the relationship between tables.
Inner join.
Inner join return rows when there is at least one match of rows between the tables.
Right Join.
Right join return rows which are common between the tables and all rows of Right hand side table. Simply, it returns all the rows from the right hand side table even though there are no matches in the left hand side table.
Left Join.
Left join return rows which are common between the tables and all rows of Left hand side table. Simply, it returns all the rows from Left hand side table even though there are no matches in the Right hand side table.
Full Join.
Full join return rows when there are matching rows in any one of the tables. This means, it returns all the rows from the left hand side table and all the rows from the right hand side table.

11.   What is normalization?
Normalization is the process of minimizing redundancy and dependency by organizing fields and table of a database. The main aim of Normalization is to add, delete or modify field that can be made in a single table.

 12.   What is Denormalization.
DeNormalization is a technique used to access the data from higher to lower normal forms of database. It is also process of introducing redundancy into a table by incorporating data from the related tables.

13.   What are all the different normalizations?
The normal forms can be divided into 5 forms, and they are explained below -.
First Normal Form (1NF):.
This should remove all the duplicate columns from the table. Creation of tables for the related data and identification of unique columns.
Second Normal Form (2NF):.
Meeting all requirements of the first normal form. Placing the subsets of data in separate tables and Creation of relationships between the tables using primary keys.
Third Normal Form (3NF):.
This should meet all requirements of 2NF. Removing the columns which are not dependent on primary key constraints.
Fourth Normal Form (3NF):.
Meeting all the requirements of third normal form and it should not have multi- valued dependencies.

14.   What is a View?
A view is a virtual table which consists of a subset of data contained in a table. Views are not virtually present, and it takes less space to store. View can have data of one or more tables combined, and it is depending on the relationship.

15.   What is an Index?
An index is performance tuning method of allowing faster retrieval of records from the table. An index creates an entry for each value and it will be faster to retrieve data.

 16.   What are all the different types of indexes?
There are three types of indexes -.
Unique Index.
This indexing does not allow the field to have duplicate values if the column is unique indexed. Unique index can be applied automatically when primary key is defined.
Clustered Index.
This type of index reorders the physical order of the table and search based on the key values. Each table can have only one clustered index.
NonClustered Index.
NonClustered Index does not alter the physical order of the table and maintains logical order of data. Each table can have 999 nonclustered indexes
.
17.   What is a Cursor?
A database Cursor is a control which enables traversal over the rows or records in the table. This can be viewed as a pointer to one row in a set of rows. Cursor is very much useful for traversing such as retrieval, addition and removal of database records.

 18.   What is a relationship and what are they?
Database Relationship is defined as the connection between the tables in a database. There are various data basing relationships, and they are as follows:.
  • One to One Relationship.
  • One to Many Relationship.
  • Many to One Relationship.
  • Self-Referencing Relationship.
19.   What is a query?
A DB query is a code written in order to get the information back from the database. Query can be designed in such a way that it matched with our expectation of the result set. Simply, a question to the Database.

 20.   What is subquery?
A subquery is a query within another query. The outer query is called as main query, and inner query is called subquery. SubQuery is always executed first, and the result of subquery is passed on to the main query.

21.   What are the types of subquery?
There are two types of subquery – Correlated and Non-Correlated.
A correlated subquery cannot be considered as independent query, but it can refer the column in a table listed in the FROM the list of the main query.
A Non-Correlated sub query can be considered as independent query and the output of subquery are substituted in the main query.

 22.   What is a stored procedure?
Stored Procedure is a function consists of many SQL statement to access the database system. Several SQL statements are consolidated into a stored procedure and execute them whenever and wherever required.

23.   What is a trigger?
A DB trigger is a code or programs that automatically execute with response to some event on a table or view in a database. Mainly, trigger helps to maintain the integrity of the database.
Example: When a new student is added to the student database, new records should be created in the related tables like Exam, Score and Attendance tables.

24.   What is the difference between DELETE and TRUNCATE commands?
DELETE command is used to remove rows from the table, and WHERE clause can be used for conditional set of parameters. Commit and Rollback can be performed after delete statement.
TRUNCATE removes all rows from the table. Truncate operation cannot be rolled back.

25.   What are local and global variables and their differences?
Local variables are the variables which can be used or exist inside the function. They are not known to the other functions and those variables cannot be referred or used. Variables can be created whenever that function is called.
Global variables are the variables which can be used or exist throughout the program. Same variable declared in global cannot be used in functions. Global variables cannot be created whenever that function is called.

 26.   What is a constraint?
Constraint can be used to specify the limit on the data type of table. Constraint can be specified while creating or altering the table statement. Sample of constraint are.
  • NOT NULL.
  • CHECK.
  • DEFAULT.
  • UNIQUE.
  • PRIMARY KEY.
  • FOREIGN KEY.
27.   What is data Integrity?
Data Integrity defines the accuracy and consistency of data stored in a database. It can also define integrity constraints to enforce business rules on the data when it is entered into the application or database.

 28.   What is Auto Increment?
Auto increment keyword allows the user to create a unique number to be generated when a new record is inserted into the table. AUTO INCREMENT keyword can be used in Oracle and IDENTITY keyword can be used in SQL SERVER.
Mostly this keyword can be used whenever PRIMARY KEY is used.

 29.   What is the difference between Cluster and Non-Cluster Index?
Clustered index is used for easy retrieval of data from the database by altering the way that the records are stored. Database sorts out rows by the column which is set to be clustered index.
A nonclustered index does not alter the way it was stored but creates a complete separate object within the table. It point back to the original table rows after searching.

30.   What is Datawarehouse?
Datawarehouse is a central repository of data from multiple sources of information. Those data are consolidated, transformed and made available for the mining and online processing. Warehouse data have a subset of data called Data Marts.

entertainment

Amitabh Bachchan is excited to meet Steven SpielbergAmitabh Bachchan is excited to meet Steven Spielberg
Megastar Amitabh Bachchan is looking forward to welcoming acclaimed Hollywood director Steven Spielberg who is said to be visiting the country to celebrate the success of his Oscar-winning film "Lincoln".