AMD Sample Technical Placement Paper

download AMD Sample Technical Placement Paper

of 7

Transcript of AMD Sample Technical Placement Paper

  • 7/28/2019 AMD Sample Technical Placement Paper

    1/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    AMD Technical Latest Sample Placement Paper1. What is Dataware Control?

    ANS: Any control bound to Data Control.

    Ex:- Textbox, Check Box, Picture Box, Image Control, Label, List box,

    Combo Box, DB Combo

    2. Record set types and Number available in VB?

    ANS: 3. =>1- Dynaset, 0 Table, 2 Snap Shot.

    3. What is the max size allowed for Max Text box length?

    ANS: 32,00

    4. What is ADO? What are its objects?

    ANS: ActiveX Data Object. ADO can access data from both flat files as

    well as the databases. I.e., It is encapsulation of DAO, RDO, and OLE

    that is why we call it as OLE-DB Technology. Objects are Connection,

    Record Set, Command, Parameter, field, Error, Property.

    5. What methods are used for DBGrid in unbound mode?

    ANS: AddData, EditData, Readdata, WriteData.

    6.What is the basic difference between transparent bridges and

    source-route bridges relative to the forwarding processes?

    ANS: In a transparent bridged environment, bridges determine whether

    a frame needs to be forwarded, and through what path based upon

    local bridge tables. In an SRB network, the source device prescribes the

    route to the destination and indicates the desired path in the RIF.

    7. What is the difference between TRUNCATE and DELETE commands?

    ANS: TRUNCATE is a DDL command whereas DELETE is a DML

    command. Hence DELETE operation can be rolled back, but TRUNCATE

    operation cannot be rolled back. WHERE clause can be used with

    DELETE and not with TRUNCATE.

  • 7/28/2019 AMD Sample Technical Placement Paper

    2/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    8.What is a spanning Tree?

    ANS: A spanning tree is a tree associated with a network. All the nodes

    of the graph appear on the tree once. A minimum spanning tree is aspanning tree organized so that the total edge weight between nodes is

    minimized.

    9. What is Data-Link Switching?

    ANS: Data-link switching (DLSw) provides a means of transporting IBM

    Systems Network Architecture (SNA) and network basic input/output

    system (NetBIOS) traffic over an IP network. It serves as an alternative

    to source-route bridging (SRB), a protocol for transporting SNA and

    NetBIOS traffic in Token Ring environments that was widely deployed

    before the introduction of DLSw. In general, DLSw addresses some of

    the shortcomings of SRB for certain communication requirements

    particularly in WAN implementations. This chapter contrasts DLSw with

    SRB, summarizes underlying protocols, and provides a synopsis of

    normal protocol operations. The three primary functions of DLSw are :

    The Switch-to-Switch Protocol (SSP) is the protocol maintained

    between two DLSw nodes or routers.The termination of SNA data-link control (DLC) connections helps to

    reduce the likelihood of link layer timeouts across WANs.

    The local mapping of DLC connections to a DLSw circuit.

    10.What is Parser Bug?

    ANS: It is difficult to use database objects declared in a module from

    within a form.

    11.What is Seek Method which type of record set is available this?

    ANS: Only in DbOpenTables.

    Syntax: rs.index = "empno"

    rs.seek "=" , 10

    If with our setting the rs.index then run time error will occur.

  • 7/28/2019 AMD Sample Technical Placement Paper

    3/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    12. What is Static Variable?

    ANS: Its Scope will be available throughout the life time.

    13. Diff type of Datatypes?

    ANS: LOB (Large Object Data type).

    CLOB (Stores Character Objects).

    BLOB (Store Binary Objects such as Graphic, Video Chips and Sound

    files).

    BFILE (Store file pointers to LOB It may Contain filename for photos

    store on CD_ROM).

    14. Does the minimum spanning tree of a graph give the shortestdistance between any 2 specified nodes?

    ANS: No. Minimal spanning tree assures that the total weight of the

    tree is kept at its minimum. But it doesnt mean that the distance

    between any two nodes involved in the minimum-spanning tree is

    having minimum.

    15.Describe and In Process vs. Out of Process component. Which is

    faster?

    ANS: An in-process component is implemented as a DLL, and runs in the

    same process space as its client app, enabling the most efficient

    communication between client and component. Each client app that

    uses the component starts a new instance of it. An out of process

    component is implemented as an EXE, and unlike a dll, runs in its own

    process space. As a result, exes are slower than dlls because

    communications between client and component must be marshalled

    across process boundaries. A single instance of an out of process

    component can service many clients.

    16. What are the main components of the ADO object model? How are

    they used?

    ANS: Connection: Used to make a connection between your app and an

    external data source, i.e., sql server.Command: Used to build queries,

  • 7/28/2019 AMD Sample Technical Placement Paper

    4/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    including user-specific parameters, to access records from a data

    source (which are returned in a Recordset) Recordset: Used to access

    records returned from an SQL query. With a recordset, you can

    navigate returned records. You can also add, modify or delete records.

    17. Can We create CGI scripts in VB??

    ANS: Yes.

    18. What is Centralization Error Handling?

    ANS: Writing function and calling it when error occurs.

    19. Different type of Instantiation?

    ANS: Private Only for the Specific Module.

    Public not creatable Private & Public

    Multi-Use - Variable we have to declare.

    Single Use Not possible through dll.

    Global Multiuse Have variable not Required to Declare.

    Global Single Use - Only for exe.

    20. What is frx?

    ANS: When some controls like grid and third party control placed in ourapplication then it will create frx in run time.

    21. What are the scopes of the class?

    ANS: Public, private, Friend.

    22. Diff types of Lock Types?

    ANS: RdConcurReadOnly 0 (Default)

    RdConcurLock 1 (Pessimistic Locking)

    RdConcurRowver 2 (Optimistic Locking)RdConcurValues 3

    RdConcurBatch 4

    23. What is Friend Variable?

    ANS: Scope sharable between projects.

  • 7/28/2019 AMD Sample Technical Placement Paper

    5/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    24. Which is the subset of SQL commands used to manipulate Oracle

    Database structures, including tables?

    ANS: Data Definition Language (DDL).

    25.What operator performs pattern matching?

    ANS: LIKE operator.

    26. What are the wildcards used for pattern matching?

    ANS: For single character substitution and % for multi-character

    substitution.

    27. Will the outputs of the above two commands differ?

    ANS: Both will result in deleting all the rows in the table EMP.

    28. What will be the output of the following query?

    ANS: SELECT REPLACE (TRANSLATE (LTRIM (RTRIM ('!! ATHEN !!','!'), '!'),

    'AN', '**'),'*','TROUBLE') FROM DUAL;

    TROUBLETHETROUBLE

    29. What command is used to create a table by copying the structure of

    another table?ANS: CREATE TABLE... AS SELECT command

    Explanation: To copy only the structure, the WHERE clause of the

    SELECT command should contain a FALSE statement as in the following.

    CREATE TABLE NEWTABLE AS SELECT * FROM EXISTINGTABLE WHERE

    1=2; If the WHERE condition is true, then all the rows or rows satisfying

    the condition will be copied to the new table.

    30. Which command displays the SQL command in the SQL buffer, and

    then executes it?ANS: RUN

    31. What is the parameter substitution symbol used with INSERT INTO

    command?

    ANS: &

  • 7/28/2019 AMD Sample Technical Placement Paper

    6/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    32. Which system table contains information on constraints on all the

    tables created?

    ANS: USER_CONSTRAINTS

    TRUNCATE TABLE EMP;

    DELETE FROM EMP;

    33. What is Enhanced Interior Gateway Routing Protocol?

    ANS: The Enhanced Interior Gateway Routing Protocol (EIGRP)

    represents an evolution from its predecessor IGRP. This evolution

    resulted from changes in networking and the demands of diverse,

    large-scale internetworks. EIGRP integrates the capabilities of link-state

    protocols into distance vector protocols. Additionally, EIGRP containsseveral important protocols that greatly increase its operational

    efficiency relative to other routing protocols. One of these protocols is

    the Diffusing update algorithm (DUAL). DUAL enables EIGRP routers to

    determine whether a path advertised by a neighbor is looped or loop-

    free, and allows a router running EIGRP to find alternate paths without

    waiting on updates from other routers. EIGRP provides compatibility

    and seamless interoperation with IGRP routers. An automatic-

    redistribution mechanism allows IGRP routes to be imported intoEIGRP, and vice versa, so it is possible to add EIGRP gradually into an

    existing IGRP network. Because the metrics for both protocols are

    directly translatable, they are as easily comparable as if they were

    routes that originated in their own autonomous systems (ASs). In

    addition, EIGRP treats IGRP routes as external routes and provides a

    way for the network administrator to customize them.

    34. What are the privileges that can be granted on a table by a user to

    others?ANS: Insert, update, delete, select, references, index, execute, alter, all.

    35.What operator tests column for the absence of data?

    ANS: IS NULL operator.

  • 7/28/2019 AMD Sample Technical Placement Paper

    7/7

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget

    freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on

    Facebook @ www.facebook.com/LatestOffCampus

    36. What command is used to get back the privileges offered by the

    GRANT command?

    ANS: REVOKE

    37.What protocol is used by DNS name servers?

    ANS: DNS uses UDP for communication between servers. It is a better

    choice than TCP because of the improved speed a connectionless

    protocol offers. Of course, transmission reliability suffers with UDP.

    38. Which system tables contain information on privileges granted and

    privileges obtained?

    ANS: USER_TAB_PRIVS_MADE, USER_TAB_PRIVS_RECD.39.What is logical link control?

    ANS: One of two sublayers of the data link layer of OSI reference

    model, as defined by the IEEE 802 standard. This sublayer is responsible

    for maintaining the link between computers when they are sending

    data across the physical network connection.

    40. Which command executes the contents of a specified file?

    ANS: START or @