Solaris Certification exam questions

Solaris Certification sample questions
Following are some sample questions . These are some of the representative questions and is meant to demonstrate the type of question you might expect in Solaris Certification examination and plan your study accordingly. No answers are given out of the belief that anyone preparing for the exam should be able to work it out .

Choose all the correct answers.

1) In Solaris how many disk slices a disk can have ?

a) 8 b) 7 c) 6 d)1

2)Which file is used to set the default mask in Solaris ?

a)/etc/profile b) .profile c) /etc/system d) /etc/inittab

3)What are the advantage for making disk partitions ?

a) Easy to maintain b) Easy for backing up
c) Limits problems to one partition only d) Space can be monitored easily.

4 )What does a + sign in /etc/hosts.equiv indicates ?

a) All hosts are allowed b) Only known hosts are allowed c) All users are allowed d) Unknown hosts are also allowed .

5 )Which command is used to mount local file system ?

a) mount -l b) mountall c) mount d) mount -r

6) Which command line option gives a run level and output headings ?

a) who -b b) who -r c) who -rh d) who -rH

7) which command is used to change the auto-boot feature in sun ultra ?

a) eeprom “auto-boot?”=true b) eeprom auto-boot?=true c) eeprom autoboot? true d) eeprom auto-boot = true ..

8 ) If patch id is 123456-10 then its revision number is -

a)123 b)456 c)10 d)6-10

9)Which commands can be used to make a device alias

a) devalias ay OK prompt b) dvalias at root prompt
c) nvram at ok prompt d) drvconfig at root prompt.

10) Where in Solaris encrypted passwords are stored ?

a) /etc/passwd b) /etc/shadow c)/etc/default/passswd d)/etc/initttab

11) What is required in a diskless workstation for Solaris workstation

a) cpu, monitor, keyboard, hard disk b) cpu, monitor, keyboard, cdrom drive
c) cpu, monitor, keyboard, Ethernet card d) cpu and Ethernet card only.

12)Which of the following points to virtual file system ?

a) /dev/dsk/c0t0d0s3 b) /dev/rdsk/c0t0d0s3
c) /dev/md/dsk/c0t0d0s3 d) /dev/vx/rdsk/data/vol1

13) Which Solaris command is used to correct filesystem problems?.

a) newfs b) fssck c) mkfs d) format

14) Which is the configuration file for the tip command

a)/etc/tip.conf b) /etc/remote c) /etc/inittab.d d) .profile

15) When automounter daemon needs to be restarted ?.

a) When direct map is changes b) When indirect map is changes
c) No need to restart d) When a new user is created

16) What is the default configuration cluster in Solaris installation ?.

a) Developer b) Core c) End user d) Entire Distriidution

17) Which utility is used to administer the port monitor ?

a)sacadm b) pmadm c) ttyadm d) admintool

18) What is the command to assign a ip address to qfe network interface ?

Write the command ……………………………………..

19) 10 30 * * 4 /usr/bin/loginfo entry in crontab will execute the program

a) Every Friday at 10.30 b) Every Thursday at 10.30
c) Every Saturday 10.30 d) Every Wednesday at 10.30

20) What do you need for a fresh Solaris Installation ?.

a) Host Name b) IP Address c) Net mask d) Domain name

21) How can you see the prom version ?

a) show version b) prom c) banner d) version

22) Which file enables you to disable root login on terminals ?.

a) /etc/profile b) .profile
c) /etc/default/login d) /etc/system

23 ) Which directory contain run level control scripts ?.

a) /etc/rc2.d b) /etc/init.d c) /etc/rc3.d d) /usr/bin

24) Which command show the patch installed in the system ?

a) patchadd -p b) showrev -p c) showpatch d) patchlist

25) What are the advantage of having a virtual file system ?.

a) Large capacity volumes b) Increased File system size
c) Performance enhancement d) backup becomes easy

26) Which file is used to define default run level for init process at booting time ?.

a) /etc/ttyyab b) /etc//ttyadm
c) /etc/inittab d) /etc/profile

27) Which command shows kernel parameters and and driver module information ?.

a) sysconfig b) prtconfig
c) dmesg d) prtconf

28) A multiuser operating system is one – in which

a) Many users can work simultaneously b) Many Processes can work simultaneously
c) A large number of users can be created d) A number of user home directories can be created.

29) What is true about software packages ?.

a) It is group of files & directories b) They are grouped to form clusters

c) It is standard way of delivering software in Solaris d) They can be installed using pkgadd command.

30)What type of names are used for administering disk drives in Solaris environment

a) Physical b) Logical c) Virtual d) disk instance

Mpls and vpn network interview questions

1. What is the difference between VPN and MPLS?
2. What is MPLS and why it is being so popular in short time?
3. What is the protocol used by MPLS?
4. MPLS works on which layer?
5. What is the difference between P and PE router?
6. Can I make my PE router as P?
7. Two routers are having 4 equal cost links, how many ldp sessions will be established?
8. My LDP router id, OSPF router id and BGP router id is different, will it work to forward the traffic of customers or not?
9. What is Penultimate Hop Popping and why it is required? Which router performs the PHP function?
10. I am receiving aggregate label, what does it mean?
11. What are the different types of labels?
12. How to make customer route unique?
13. What is the difference between RD and RT?
14. Can I assign a same RD to two different customers?
15. Is RD travels in route update?
16. My customer is having three branches and all are attached to three different PEs, In this case can I use the different vrf names?
17. What is downstream on demand?
18. How to filter MPLS labels?
19. What is the default range of MPLS labels in Cisco routers ? How to extend that range?
20. Without route reflector can I implement MPLS?
21. What is the difference between VPNv4 and IPv4 address family?
22. What is MP-iBGP? Can we use normal BGP in lieu of MP- iBGP?
23. What is LIB, LFIB?
24. What is CEF and without enabling CEF, can we make MPLS work?
25. I am receiving end to end customer routes on various PE but not able to ping those routes, what’s could be the problem?
26. What is explicit null and implicit null?
27. Default timers of LDP?
28. Does LDP require OSPF, IS-IS or BGP?
29. In neighbor discovery command, I am receiving only xmit, what does it mean?
30. What is transport address?
31. What is the RFC of MPLS?
32. Why MPLS is called multi protocol?
33. What is the difference between MPLS, SSL and IPSec?
34. I am using different vendor products and want to implement TDP, what type of challenges will you face?
35. Does MPLS support IPv6?
36. Can I use the existing IPv4 MPLS backbone for IPv6?
37. Define various troubleshooting commands in MPLS?
38. What is forward equivalence class aka FEC?
39. What is adjacency table?
40. Difference between MPLS IP and MPLS Label Protocol LDP command?
41. If MPLS get disable, will it harm my IGP or IPv4 traffic?

BGP networking Interview questions

1. BGP is IGP or EGP?
2. BGP is link state or distance vector protocol?
3. BGP uses which port?
4. When to use BGP?
5. Can I use BGP instead of any IGP?
6. Can I run two BGP process on single router?
7. What is Autonomous System?
8. Types of BGP routing table?
9. What is the BGP path selection criteria?
10. Define various BGP path attributes.
11. Why weight doesn’t fall under path attribute category?
12. What is confederation?
13. What is route reflector and why it is required?
14. What is no-synchronization rule?
15. Default BGP timers.
16. When does BGP use 0.0.0.0 router id?
17. Does route reflector come in actual path during traffic forwarding?
18. What is Site of origin aka SOO?
19. What is the cost of external and internal BGP routes?
20. Can we use local preference outside the autonomous system?
21. Does it require that BGP router-id should reachable in cloud?
22. What is recursive lookup in BGP and how it works?
23. What is the meaning of update source loopback?
24. If a static route is advertised in BGP without using update source what will be the next hop address in update?
25. Define various types of communities and why they are used?
26. If BGP neighbor state is showing idle what does it mean?
27. In Multihoming scenario if primary link gets fail, after how long traffic will be shifted to secondary link.
28. I am having two routes for remote destination but only single route is installing in routing table, what’s the reason for this?
29. How many links can be assigned for load balancing or sharing?
30. In eBGP I am establishing my neighbourship with loopback address but it’s not coming up. Please specify different reasons for not coming up.
31. Can we redistribute BGP in IGP? Please explain your answers.
32. What is cluster id?
33. I am receiving updates from eBGP peer, will the next hop change or not?
34. I am receiving updates from iBGP peer, will the next hop change or not?
35. A router is receiving same route from two different eBGP peers. The AS information contains in peer 1 is {65500, 65550, 65555} and in peer 2 is {65501, 65501}. But I want to make peer 1 preferred.
36. What is the difference between next-hop-self and update source loopback?
37. Define loop prevention mechanism in BGP.

Switching network interview Questions

Switching network interview Questions
1. Difference between hub, bridge and switch?
2. What is mac address and why it is required?
3. In layer 2 domain do we need ip address for communication?
4. What is arp and why it is required?
5. What is Spanning Tree Protocol aka STP?
6. What is the difference between STP, MSTP, PVST and RSTP?
7. Can we use the two same paths for same vlan?
8. What is the difference between broadcast and collision domain?
9. Define type of lan traffic.
10. What is destination address of broadcast frame?
11. Can we connect a switch to switch with straight cable?
12. Define functions of switch.
13. What is arp timeout?
14. What is aging process?
15. What is BPDU?
16. What is path cost?
17. Define selection criteria of STP root bridge.
18. How to non bridge decide which port will elect as root port?
19. If a nonroot bridge has two redundant ports with the same root path cost, how does the bridge choose which port will be the root port?
20. Port states of spanning tree protocol.
21. If the users face delay during initial login, what you will suggest to implement?
22. Why spanning tree BPDU filter is used?
23. Can I use BPDU filter on trunk ports?
24. What is port security?
25. I want to learn only a single mac from the port, what need to be configured?
26. Can we use spanning port-fast on trunk ports?
27. If management ip address is changed, will user’s traffic will be dropped?
28. Difference between trunk and access port?
29. What is UDLD and why it is required?
30. What is interface vlan on switch?

Network routing interview questions

Network routing interview questions
1.
Difference between RIPv1 and RIPv2?
2. How many number of routes carried by RIP packet?
3. Is OSPF link state or distance vector or path vector protocol?
4. What is the difference between OSPF and IS-IS and which one is preferred?
5. Can we use BGP instead of any IGP?
6. How many network types available in OSPF?
7. Different type of Link State Advertisements aka LSA?
8. LSA 3 and LSA 4 are generated by which router?
9. When to use Stub and Not So Stubby Area?
10. How to get the external routes without making area Not So Stubby?
11. What is the different type of route summarization available in OSPF?
12. What is the requirement of doing summarization?
13. A major network is advertised as summary in one area and few of the routes from that network is configured in another area. What will happen in that case?
14. If any of the OSPF area is not stabilized, does it impact another area?
15. What is the use of forwarding address in LSA 5 and LSA 7?
16. External routes are available in OSPF database but not installing in routing table?
17. If loopback is not configured, what will be the router- id selected by OSPF process?
18. Can we run multiple OSPF process in single router and what is the advantage of using it?
19. What are timers of OSPF?
20. Multicast address of used by OSPF?
21. OSPF works on which layer?
22. What is backbone area in OSPF?
23. Can we use OSPF without backbone area?
24. Is it required that OSPF router-id must reachable in IGP cloud?
25. After configuring new router-id, automatically it will be used or do we need to use some type of command to get it operational.
26. Why the secondary ip address of interface is not advertising in IGP cloud?
27. OSPF neighbourship is not coming up. Please tell the various steps to troubleshoot it.
28. One side MTU is 1500 and another side MTU is 1600. Does it affect neighbourship?
29. Provide process of DR and BDR election.
30. If DR is down and no BDR is configured what will happen?
31. What is the difference between a neighbor and adjacent neighbor?
32. My OSPF neighbourship is showing 2-way, what does it mean?
33. Define different type of OSPF neighbor states?
34. OSPF external routes are not redistributing?

Tcp ip network interview questions

Tcp ip network interview questions
1)Discuss the role of TCP/IP on a data network. Also identify and explain why this is the protocol of choice in networking.
2)What is the port no of TCP?
3)Difference between controlled access & Contention based access in a shared media?
4)Congestion happens in which layer in osi?
5)What type of protocol used in sms sending from mobile?
6)Which is the Smallest protocol?
7)What is the difference of TCP over IP?
8)What is proxy?
9)What is the difference between server and database?

C and Cpp interview questions faqs

  1. What do you understand from C and C++? Explain the difference between both languages?
  2. Which language is better: C and C++? Do you think C++ is the advanced version of C?
  3. Explain the different features of C++ which is better than C language?
  4. Name the same operators and commands used in C and C++?
  5. Explain the advantages of C++ over C language? Can you compile a small program in C and C++?
  6. How do you obtain output from C++ program? What is the use of printf(“”%d)?
  7. State any two differences between C and C++ structure? Does Object Oriented Programming languages are related to C?
  8. What is vector and array? Can you use array with same methods in C and C++ programming languages?
  9. Explain inline functions? What is stream?
  10. What are constructors and destructors? How do you implement them in C language?
  11. Discuss the differences between malloc and calloc? What is the use of RTTI?
  12. How can you write multi-threaded application in C++ programming?

program to detect a loop in a linked list?

typedef struct node
{
void *data;
struct node *next;
}mynode;

mynode * find_loop(NODE * head)
{
mynode *current = head;
while(current->next != NULL)
{
mynode *temp = head;
while(temp->next != NULL && temp != current)
{
if(current->next == temp)
{
printf("\nFound a loop.");
return current;
}
temp = temp->next;
}
current = current->next;
}
return NULL;
}

what pointer type for heterogeneous linked list?

The heterogeneous linked list contains different data types in its nodes and we need a link, pointer, to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.

C program to compare two linked lists?

int compare_linked_lists(struct node *q, struct node *r) {
    static int flag;
   
    if((q==NULL ) && (r==NULL))
    {
         flag=1;
    }
    else
    {
        if(q==NULL || r==NULL)
        {
            flag=0;
        }
        if(q->data!=r->data)
        {
            flag=0;
        }
        else
        {
           compare_linked_lists(q->link,r->link);
        }
    }
    return(flag); }

Program to a copy of a linked list?

copy_linked_lists(struct node *q, struct node **s) {
    if(q!=NULL)
    {
        *s=malloc(sizeof(struct node));
        (*s)->data=q->data;
        (*s)->link=NULL;
        copy_linked_list(q->link, &((*s)->link));
    } }

C program to find the depth or height of a tree?

Solution:
  
tree_height(mynode *p) {
   if(p==NULL)return(0);
   if(p->left){h1=tree_height(p->left);}
   if(p=>right){h2=tree_height(p->right);}
   return(max(h1,h2)+1); }



The degree of the leaf is zero. The degree of a tree is the max of its element degrees. A binary tree of height n, h > 0, has at least h and at most (2^h -1) elements in it. The height of a binary tree that contains n, n>0, elements is at most n and atleast log(n+1) to the base 2.

Log(n+1) to the base 2 = h

n = (2^h - 1)

Program to determine the number of elements (or size) in a tree.

Solution:

int tree_size(struct node* node)  {
  if (node==NULL)
  {
    return(0);
  }
  else
  {
    return(tree_size(node->left) + tree_size(node->right) + 1);
  }  }

C program to delete a tree?

Solutions:
 
clear(struct node* pNode)
{
if (pNode != NULL)
{
clear(pNode->left);
clear(pNode->right);
delete pNode;
}
}

How to check if a binary tree is balanced?

Solution:


A tree is considered balanced when the difference between the min depth and max depth does not exceed 1.
Recursive algorithms always work well on trees, so here’s some code.
int min_depth( Node * root ) {
    if( !root ) {
        return 0;
    }
    return 1 + min( min_depth( root->left ),
                    min_depth( root->right ));
}

int max_depth( Node * root ) {
    if( !root ) {
        return 0;
    }
    return 1 + max( max_depth( root->left ),
                            max_depth( root->right ));
} 

bool is_balanced( Node * root ) {
    return ( max_depth( root ) - min_depth( root ) ) <= 1

Structure of a Daemon

Structure of a Daemon
Daemons typically have the same structure, regardless of their functionality. A daemon starts off by initializing its variables. It then sets its IPC interface up, which could simply be signal handlers. The daemon then executes its body, which is almost always an infinite loop.

Most daemons start off by forking. Forking is a method that allows a process to clone itself, creating an identical child. A daemon, as a parent process, usually forks off and terminates (or dies), while its child is left executing the main loop. The child is usually called an orphan process. In Unixes, orphan processes are automatically adopted by the "init" process, and this action is known as re-parenting.

For a more practical approach, the following sections dissect the two previously mentioned daemons. Links to their sources are found at the end of the tutorial

How Daemons can be used

How Daemons can be used

 Daemons usually handle tasks that require no user intervention, and consume low CPU power. CPU-intensive background tasks are not typically termed daemons, as bringing down computers to a sluggish performance can be hardly satisfying for any user, but decreasing the priority of these tasks can qualify them for that without sacrificing their performance, since CPUs are normally idle more than 90% of their time.

A daemon usually handles a single task, and accepts commands through means of IPC (Inter-Process Communication), which you will be briefly exposed to in this tutorial. Tasks handled by daemons include serving web pages, transferring emails, caching name service requests, logging, and for the purposes of this site, serving game clients.

Daemon game servers handle incoming game requests through a network, process these requests, update its persistent storage (database or flat files), and finally sends back responses to the clients. A major issue with game servers, among other servers, is that clients cannot be trusted, since a modified or reverse engineered version of the client can wreck havoc if the server is not ready to handle it. This enforces that clients should not keep a copy of the current game data, they should only send actions, not states, to the server, which would in turn validate those actions, and update the game status.

What is daemon

Every multitasking operating system supports a special type of process, a process that is usually kept a lower priority, performing a specific task over and over. Those processes are kept out of sight, performing their function in the background, without any direct intervention by the user. In the Unix operating system terminology, among other operating systems as well, background processes are called daemons.

This tutorial will introduce you to daemon programming. You will first write a simple BASH script daemon, just to get a grip on what daemons are, and what they are capable of, only to move on to coding your first daemon in C. Daemons can be easily created under GNU/Linux, they mostly follow a specific convention. To begin coding your first daemon, you will need to find a use for it. Daemons can handle many tasks that could otherwise bother users and affect their productivity, which brings us to t

Ways Linux can swich from Kernel Space to User Space

Ways  Linux can swich from  Kernel Space to User Space?
Linux can switch from kernel Space to User space:-
1) process in kernel mode is preempted.
2) After completion  of Interrupt handler / System call

Ways Linux can swich from User Space to Kernel Space

Ways  Linux can swich from User Space to Kernel Space
There are 2 situations when Linux can switch from user Spaceto Kernel Space:-
1) by doing System calls
2) When interrupt comes (to handle interrupt)

insmod & rmmod in Linux Device Drivers?

What heppens when insmod & rmmod in Linux Device Drivers ?
At time of insmod required o's brings in ram or updated the kernel with the 
perticular device driver. At the time of rmmod removes the o's by kmod 
it kills the process and refresh the kernel.
 

Information linux driver modules (.ko )files has ?

What Information does linux driver modules (.ko )files has ?
kernel 2.6 introduces a new file naming convention: kernel modules now have a .ko extension (in place of the old .o extension) which easily distinguishes them from conventional object files. The reason for this is that they contain an additional .modinfo section that where additional information about the module is kept. Linux program modpost can be used to convert .o files into .ko files.

What is Device driver?

What is Device driver?
A device driver is a code that performs device control operations specific to the device being addressed.It is software layer that lies between applications and the actual device.
or
A more formal definition would be Device drivers are distinct black boxes that make a particular piece of hardware respond to a well defined internal programming interface.
or
Device Driver lies between the Hardware & operating system.Through this layer only all the request/response between the OS & H/w are happening.  

In Java hashtable vs hashmaps difference

This question oftenly asked in interview to check whether candidate understand correct usage of collection classes and aware of alternative solutions available.

1. The HashMap class is roughly equivalent to Hashtable, except that it is non synchronized and permits nulls. (HashMap allows null values as key and value whereas Hashtable doesn't allow nulls).
2. HashMap does not guarantee that the order of the map will remain constant over time.
3. HashMap is non synchronized whereas Hashtable is synchronized.
4. Iterator in the HashMap is  fail-fast  while the enumerator for the Hashtable is not and throw ConcurrentModificationException if any other Thread modifies the map structurally  by adding or removing any element except Iterator's own remove()  method. But this is not a guaranteed behavior and will be done by JVM on best effort.

Note on Some Important Terms
1)Synchronized means only one thread can modify a hash table at one point of time. Basically, it means that any thread before performing an update on a hashtable will have to acquire a lock on the object while others will wait for lock to be released.

2)Fail-safe is relevant from the context of iterators. If an iterator has been created on a collection object and some other thread tries to modify the collection object "structurally", a concurrent modification exception wjavascript:void(0)ill be thrown. It is possible for other threads though to invoke "set" method since it doesn't modify the collection "structurally". However, if prior to calling "set", the collection has been modified structurally, "IllegalArgumentException" will be thrown.

3)Structurally modification means deleting or inserting element which could effectively change the structure of map.

HashMap can be synchronized by

Map m = Collections.synchronizeMap(hashMap);

Hope this will be useful.

What is International Telecommunications Union and what are its functions?

  • ITU is an intergovernmental organization
  • Telecommunications are developed by using ITU by public and private organizations.
  • ITU is responsible for adopting regulations, international treaties and standards that governs telecommunications
Functions of International Telecommunications Union:
  • Maintaining and extending the international cooperation for the improvement
  • Rational usage of telecommunications, for promoting efficient use of technical facilities
  • To harmonize the actions of nations. 

What is 4g technology interview questions

  • What is 4g technology interview questions
  • A short name for Fourth Generation
  • A stage of broadband mobile communications that supersede 3G
  • 4G is expected to use radio spectrum in an efficient manner, and as a result, provides cable-modem transmission speeds to the end users.
  • This feature enables high-quality streaming video
  • Simultaneous connections to multiple high-speed networks, known as pervasive computing, are expected by 4G.
  • Thus seamless handoffs are provided throughout a geographical area.
  • Coverage enhancement technologies, like femtocell and picocell are expected to develop for addressing various needs of mobile users in homes, public buildings etc.. 

What is UMTS Protocol interview question

What is  UMTS Protocol?

  • UMTS stands for Universal Mobile Telecommunications Systems
  • One of the emerging mobile technologies for 3G mobile phones.
  • The main benefit of UMTS is, undoubtedly, its speed
  • Current rates of broadband data transfer is 2MBits / second
  • The speed of UMTS makes it possible to stream video that supports movie downloads and video conferencing.
  • In a nut shell, UMTS provides almost all the facilities of a home computer system while on the move.
  • UMTS combines the technologies like wireless, satellite which provides seamless transitions between Wi-Fi and satellite. 

Explain i-appli protocol Interview question

i-appli
  • i-appli is a Java environment based on CLDC.
  • Handsets of NTT DoCoMos are utilizing i-appli
  • It is similar to MIDP, however both APIs are incompatible. 

Explain IDEN Protocol interview question

iDEN(Integrated Digital Enhanced Network)
  • A wireless technology for Motorola
  • It has the capabilities of digi-cellular phone, 2 way radio, alphanumeric pager and data modem / fax modem in a single network
  • Operational bands are 800 MHz, 900 MHz and 1.5 GHz
  • iDEN is based on TDMA(Time Division Multiple Access) and GSM architecture
  • For voice compression it uses Motorola’s Vector Sum Excited Linear Predictors vocoder
  • For delivering 64KBPS over a 25 KHz channel, it uses QAM modulation.
  • iDEN is designed to serve the mobile user for accessing information quickly without carrying several devices.

Explain HLR Protocol interview question

HLR (Home Location Register)
  • For GSM and CDMA wireless networks
  • It’s responsibility is to authenticate and authorize subscribers and their services

Explain GPRS protocol Interview question

Wireless Interview questions
GPRS ( General Packet Radio Service)
  • Packet oriented mobile data service available to the users of 2G cellular systems.
  • It is global system for communicating through mobile phones using GSM as well as in 3G systems.
  • GPRS data transfer is charged per MB of traffic transferred, where as in circuit switching, data transfer is charged per minute of connection time
  • GPRS is better packet switching service, as opposed to circuit switching.
  • 2G cellular systems are combined with GPRS and known as 2.5G.
  • Provides moderate speed data transfer by using unused TDMA channels, such as GSM.

Explain GSM ? Interview question

Wireless Interview question
GSM (Global System for Mobile Communications)
  • Most popular standard for mobile telephony systems, originated from Groupe Special Mobile
  • The ubiquity of GSM enables the international roaming arrangements among mobile phone operators.
  • Both signaling and speech channels are digital, and thus GSM is considered as 2G mobile phone system.
  • GSM standard benefited customers the ability to roam and switch carriers without replacing the hand sets and network operators.
  • GSM implements low-cost implementation of Short Message Service

3g and 2g technology difference

Wireless interview 2g and 3g
3g and 2g technology difference?

  • Packet data speed is higher in 3G, and it is up to 384 KBPS
  • Voice and sms speed is also 384 KBPS in 3G
  • 2G utilizes different switching techniques for voice and data, where as 3G uses single switching, irrespective of data
  • 3G has at least 2MB of data link of a mobile, where in 2G the data rate is in KBPS
  • 3G has WiMAX facility for faster VOIP and internet
  • 2G uses GSM TDMA technology with narrowband 200Khz.
  • 3G uses CDMA technology with broadband 5Mhz, with same frequency carrier and time. 

Advantages disadvantages of 3g technology?

3g interview questions wireless
Advantages disadvantages of 3g technology?
Advantages of 3G:
  • Overcrowding is relieved in existing systems with radio spectrum
  • Bandwidth, security and reliability are more
  • Provides interoperability among service providers
  • Availability of fixed and variable rates
  • Support to devices with backward compatibility with existing networks
  • Always online devices – 3G uses IP connectivity which is packet based
  • Rich multi media services are available
Disadvantages of 3G:
  • The cost of cellular infrastructure , upgrading base stations is very high
  • Needs different handsets.
  • Roaming and data/voice work together has not yet been implemented
  • Power consumption is high
  • Requires closer base stations and are expensive
  • Spectrum-license costs, network deployment costs and handset subsidies subscribers are tremendous.

What is 3g technology?

Wireless technology interview question
What is 3g technology?
Definition: 3G, known as 3rd Generation, is a standard for mobile / cellular phones. It provides the services that fulfill the International Telecommunication Union specifications.
The application services of 3G include wireless voice telephone, mobile internet access, video calls and mobile television – all in a mobile environment.
3G allows simultaneous use of speech and data services
3G provides peak data rates of at least 200 KBits according to the IMT-2000 specification.
Mobile broadband access of several MBits to laptop computer systems, smart phones is provided by latest 3.5G, 3.75G versions.
3G standards:
UMTS:
  • Universal Mobile Telecommunications System – One of the 3G mobile telecommunications technologies, also being developed into a 4G technology.
  • Most common form of UMTS uses W-CDMA as an underlying air interface.
  • UMTS also covers Radio Access Network – UMTS Terrestrial Radio Access Network (UTRAN), and Mobile Application Part (MAP).
  • Users are authenticated via USIM cards (Universal Subscriber Identity Module).
CDMA2000
  • Also known as IMT Multi-Carrier (IMT-MC), uses CDMA channel access for sending voice, data and signaling data between mobile phones and cell sites.
  • The standards are CDMA2000 IX, CDMA2000 EV-DOR Rev.0, CDMA2000 EV-DO Rev.A and CDMA2000 EV-Rev.B. They are approved radio interfaces for the ITU’s IMT-2000.

Wireless 3g Interview questions

Wireless 3g Interview Questions
1)What is 3G?
2)What are the advantages and disadvantages of 3G?
3)How is 3g different from 2g?
4)What advance feature does 4g have?
5)Explain GSM,GPRS,HLR?
6)What is International Telecommunications Union and what are its functions?

Algorithm Definition

Algorithm Definition:
An algorithm is an effective method for solving a problem using a finite sequence of instructions. Algorithms are used for calculation, data processing, and many other fields.
An algorithm is a sequence of unambiguous instructions for solving a problem
Each algorithm is a list of well-defined instructions for completing a task. Starting from an initial state, the instructions describe a computation that proceeds through a well-defined series of successive states, eventually terminating in a final ending state.
A formula or set of steps for solving a particular problem.Algorithms can be expressed in any language, from natural languages like English or French to programming languages like FORTRAN.
Algorithms are only as good as the instructions given, however, and the result will be incorrect if the algorithm is not properly defined
An Algorithm is  a step by step method for solving a problem.
It’s purpose is to break a larger task down so that each step can be carried out without creativity

Characteristics of an algorithm:

Characteristics of an algorithm:
1. Input-It May accept zero or more inputs
2. Output –it should produce at least one output.
3. Definiteness –Each instruction must be clear ,well defined .there should not be any ambiguity.
4. Finiteness-it should be sequence of finite instruction .That is ,it should end after a fixed time.
5. Effectiveness: This  means that operation must be simple and carried out in a finite time.

what is Algorithm Example

What is Algorithm Example 
Example:  Algorithm for counting the digits in a positive integer N.
Step 1.  Set the Count to 0.
Step 2.   Divide N by 10 (dropping any remainder).
Step 3.  Add 1 to the Count.
Step 4.  If N is greater than 0, repeat steps 2-4.
Step 5.Print N.
Step 6:Stop.

Computer definition what is ?

What is a Computer definition ?
Computer word come from compute .A computer is electronic device that take data and instruction as an input from user and perform operation or process on data ,give the result . result is know as out put.
1-A computer is a machine that manipulates data according to a set of instructions
2-A computer is defined as ‘an automatic electronic apparatus for making calculations or controlling operations that are expressible is numerical or logical terms.
3-A machine for performing calculations automatically.
4-”computer” is a collection of devices that function as a unit. The most basic collection includes a Computer CPU, a Monitor, a Keyboard, and a Mouse.
5-A computer is a machine for manipulating data according to a list of instructions know as a program.
Data: Data means raw facts
Example;-mark sheets of student
Information : information is processed data that contains meaningful message.
Data Process Information
Process can be of mathematical example addition ,subtraction or logical example sorting ,searching .
Note-
1-Data is raw facts such as phone numbers or addresses, and information is the organization of these raw facts into a meaningful manner.
2-The relationship between data and information is very much interconnected and without data there could be no information.

c interview question bank

C interview question bank
1-what is modular programming? Give advantage with the of diagram and example?
2-what is call by reference? Explain using example.
3-explain between switch statement .what is the difference between if and switch statement ?
4-write a c program to calculate the sum of digit  of a number given by the user using recursion ?
5-How to a pointer initialized ?explain it ?
6-how does function definition differ from function declaration?
7- What is storage class in c? Explain type of storage class.
8-write a function to find the sum of digits of a given number?
9-differentiate between p and *p?
10-write a program to find the gcd(greatest common dividing ) of two number . using recursion?
11-Differentiate between the standard functions and user defined function?
12-what is call by value? Explain using example.
13-what is recursion?
14-explain nested loop with example?
15-write a program to check whether a number is a krisnamurty number or not. A Krishnamurty number is one whose sum of factorial of digits equals the number.
16-write a program of Fibonacci series using recursion.
17-what is pointer? Why are they important? Explain the features of pointer.
18-explain the relation between an array and a pointer.
19-deffine type of pointer? and also give example .
20-write a program to check whether a number is prime number or not?
21-what is purpose of if statement? Describe the different forms of if statement.
22-whatis the purpose of while and do while loops?
23-diffrence between call by value and call by reference? give example
24-write a program to print the second largest number among a list ?
25-differentitate between a for loop and a while loop ?
26-write a program to  find the mean of two integer number. Using call by value .
27-which arithmetic operation are possible with pointer ?
28-explain function and type of function?
29- what is the result of adding an integer to a pointer ? and give example ?
30-write a program using pointer to read in an array of integer and print its elements in reverse order.
31- what is an operating system? Explain its components.
32- write short notes on: (1) UNIX    (2) WINDOWS
33- explain the structure of a C program in brief.
34- what do you understand by stepwise refinement? Explain SDLC in brief.
35- write a program to reverse a given integer number and check whether it is a palindrome . output the given number with suitable messages.
36- what is storage classes? Explain automatic and register storage class in brief.
37- write a program to find sum of odd and even numbers from 1 to N. Output the computed sums on two different lines with suitable heading.
38- write syntaxes of if-else ladder, for, while and do-while loop with their flow charts.
39- explain the scope rule. Also explain the advantages of modular programming.
40- Write a C program that shows the concept of call by value and cll by reference.
41- WAP in C to read two strings and concatenate them (without using library function) .
42-Perform the following conversions: (i) (6820)10=()2 (ii) (CDFE)16 = ()2 (iii) (2489)10 = ()8 (iv) (1010.001)16 =()10
43- WAP in C to read a string and write it in reverse order.
44- WAP in C to find the roots of quadratic equation using function and switch statement.
45- Explain stack operation in detail. Support your answer by code segments.
46- what do you mean by linked list? Explain any one operation on linked list with a program.
47-what do you mean by dynamic memory allocation? Explain its function.
48- What is the use of macros? Explain conditional compilation in brief.
49- Explain difference between array and structure with the help of a program.
50- explain searching and sorting in brief supported by code segment for each.

Explain FIX protocol and FIX Engine

What is FIX protocol and FIX Engine?
FIX protocol is Industry standard protocol for electronic trading , with evolution with computer technology Trading also getting Electronic and now most of the exchanges in the world are fully electronic and concept of trading floor is taken over by computers. 

When I was new to FIX protocol I have searched net to find a good FIX protocol tutorial but not much is available so I am trying to write my own experience in form of short  FIX protocol tutorial.

In this blog post I would like to share my thoughts, experience and knowledge about FIX protocol which I had acquired by working on different areas of FIX.

FIX protocol is a tag value protocol where every field has a unique tag name and signify something e.g. Price (tag 44) denotes the price of a particular shares , OrderQty denotes quantity of order.
FIX protocol specify different types of messages for different trading purposes e.g. for Sending an Order to exchange they used NewOrderSingle message (MsgType=35) or for Sending a Cancel to exchange they used CancelOrder message (MsgType=F). MsgType (tag 35) and they message for all purpose of trade life cycle e..g they have pre trade message ( e.g. News , Indication of Interest ) , trade message (NewOrderSingle, OrderCancelReplaceRequest , OrderCancelRequest) and post trade message (e.g. Allocation messages).

To understand these FIX message client and broker, the two party involved in trading has a piece of software called FIX Engine. There are many commercial FIX engine available which is used in Industry e.g. Cameron FIX Engine, NYFIX's Appia etc.

Messages on FIX protocol can be broadly classified into two type’s first Session level message also called Admin messages and Second Application level messages. Session level messages is uesd to establish FIX session between two FIX engine and Application messages are messages which is meant for some purpose e..g NewOrderSingle message which is used to send order via FIX.

MsgType (tag 35) is an important tag in FIX protocol which is used to uniquely identify a FIX message. Every single message in FIX protocol must have corresponding MsgType otherwise FIX engine will reject those messages saying it’s not a valid FIX message.

As per FIX protocol connection between two FIX engine is called FIX session and every FIX session has pre agreed host/port and comp id. Since a single FIX engine can be used to server multiple clients on broker side every client is uniquely identified  by combination of IP , port and there Comp IDs , Comp IDs are combination of SenderCompID and TargetCompID which are two separate tag in FIX protocol.
Once FIX Session established now client can send Orders via FIX and broker then send it exchange for execution.

I will try to keep it updated with relevant information, please ask if you have any questions, doubt etc.

Happy learning and welcome to FIX protocol world :)



What is a stop or stop loss order?

What is a stop or stop loss order?
In FINANCIAL INFORMATION EXCHANGE (FIX)  protocol A stop order ( also stop loss order) is an order to buy ( or sell) a security once the price of the security has  reached  above ( or fall below) a specified stop price. When the specified stop price is breached, the stop order is entered as a market order ( no limit).

What is a market order?

What is a market order?
In FINANCIAL INFORMATION EXCHANGE (FIX) protocol a market order is a buy or sells order to be executed by the broker immediately at current market prices. This could prove very dangerous in terms of price because it doesn't care at what price its buying or selling securities.

What is limit order?

What is limit order?
As per FINANCIAL INFORMATION EXCHANGE (FIX)  protocol A limit order is an order to buy a security at no more  than a specific Price (can be bought lower price) or sell at not less than a specific price (can be sold at higher price). This gives the customer some control over the price at which the trade is executed, but may prevent the order from being executed. a limit orders can be executed at on price or better price.

Financial Information exchange What is?

Financial Information exchange What is?
The Financial Information exchange (FINANCIAL INFORMATION EXCHANGE (FIX)  protocol is an electronic communications protocol for international real-time exchange of information related to securities transactions and markets. most of the electronic trading is done in FINANCIAL INFORMATION EXCHANGE (FIX)  , though different exchanges has there own native protocol but most of the broker supports FINANCIAL INFORMATION EXCHANGE (FIX)  protocol.

Difference between an ECN and an exchange?

What is the difference between an ECN and an exchange?
ECN is an Electronic Communication Network ,An electronic system that attempts to eliminate the role of a third party in the execution of orders entered by an exchange market maker or an over the counter market maker, and permits such orders to be entirely or partly executed.
An ECN connects major brokerages and individual traders so that they can trade directly between themselves without having to go through a middleman. Sometimes ECNs are also referred as dark pool.

What is naked short and what is covered short?

What is naked short and what is covered short?
Naked short is when trader sells one stock which they don’t own at that moment. Covered Short Sell means that trader owns stock which they are shorting.

Difference between Sell Orders and Short Sell Orders?

Difference between Sell Orders and Short Sell Orders?
Sell means selling your own securities , short selling means selling securities without owning them normally broker lend securities to user.there are
two kinds of short sell e.g. Covered Short Sell and naked Short Sell, most of the stock exchanges doesn't allow naked short sell because its normally abused to take stock price downward.

What is the difference between a Stock and a Bond?

What is the difference between a Stock and a Bond?
Stock is equity instrument while Bond is debt asset. Since equity is more risky associated with Market Risk it can provide more returns while Bond is
relatively safer instrument so it provide predefined interest called "coupon" though Bond is also associated with Counter Party Risk.

What is an Exchange?

What is an Exchange?Exchange – An exchange is a highly organized market where (especially) tradeble securities, commodities, foreign exchange, futures and options contracts are sold and bought. Exchange brings together brokers and dealers who buy and sell these objects.
Examples of exchanges are Bombay Stock Exchange, NeyWork Stock Exchange (NYSE), Tokyo Stock Exchange (TSE)  


Financial information exchange Java Interview Questions

Financial information exchange Java Interview Questions
1)What is an Exchange?
2)What is the difference between a Stock and a Bond?
3)What is the difference between Sell Orders and Short Sell Orders?
4)What is naked short and what is covered short?
5)What is the difference between an ECN and an exchange?
6)What is FINANCIAL INFORMATION EXCHANGE (FIX) Protocol?
7)What is limit order?
8)What is a market order?
9)What is a stop or stop loss order?


Why java string is immutable

 Why java string is immutable?
This is one of the most popular interview question on String in Java which starts with discussion of What is immutable object , what are the benefits of immutable object , why do you use it and which scenarios do you use it.

It can also come once interviewee answers some preliminarily strings questions e.g. What is String pool , What is the difference between String and StringBuffer , What is the difference between StringBuffer and StringBuilder etc.

Though there could be many possible answer for this question and only designer of String class can answer this , I think below two does make sense

1)Imagine StringPool facility without making string immutable , its not possible at all because in case of string pool one string object/literal e.g. "Test" has referenced by many reference variables , so if any one of them change the value others will be automatically gets affected i.e. lets say

String A = "Test"
String B = "Test"

Now String B called "Test".toUpperCase() which change the same object into "TEST" , so A will also be "TEST" which is not desirable.

2)String has been widely used as parameter for many java classes e.g. for opening network connection you can pass hostname and port number as stirng , you can pass database URL as string for opening database connection, you can open any file by passing name of file as argument to File I/O classes.

In case if String is not immutable , this would lead serious security threat , I mean some one can access to any file for which he has authorization and then can change the file name either deliberately or accidentally and gain access of those file.

3)Since String is immutable it can safely shared between many threads ,which is very
important for multithreaded programming.

I believe there could be some more very convincing reasons also , Please post those reasons as comments and I will include those on this post.

Nanny Caretaker Interview questions

Nanny Caretaker Interview questions
1)What Questions Should I ask a Provider or Day Care Centre Director?
2)How can I Tell Good Day Care from Bad Day Care?
3)What Types of Day Care are Available?
4)Where do I Begin to look for Day Care?
5)Do you have any Dietary or other Restrictions?
6)Can you Drive?
7)Do you Smoke?
8)Was the Applicants Childhood Stable?
9)What Qualities are you Looking for in a Family?
10)What are your Hobbies Interests?
11)These are the Job Requirements. Does this sound like something you can handle?
12)Personal recommendations from Teachers or Clergy Members. What are your child-rearing philosophies?
13)What are your Child Care Experiences?
14)Why do you Wish to be a Nanny?

Bookkeeper Interview questions

Bookkeeper Interview questions
1)Why should I hire you?
2)Why do you want this position?
3)Why did you leave your last job?
4)Tell me about your greatest weakness?
5)What are your greatest strengths?
6)What do you know about our company?
7)We have met several candidates. Why are you the one we should hire?
8)How do you handle stress and pressure?
9)What are your goals for the future?
10)Tell me why are you considering leaving your present job?
11)Do you have any questions for me?
12)Where do you see yourself in 5 years?
13)What do you like in a Boss or Supervisor?
14)What are your Salary Expectations?
15)What is your Greatest Weakness?

Day Child caretaker Interview Questions

Day Child caretaker Interview Questions
1)If you could do so how would you plan your college career differently?
2)At What Point did you Choose this Career?
3)What other things should I know about Day Care?
4)How Can I improve the odds of Finding Quality Care for my Family?
5)Dont day care Rules and Regulations ensure my Child Safe, Quality Child Care?
6)Does Quality Child Care actually make a Difference? Why should I be so Concerned?
7)When choosing a Centre or Provider is it best to go with my Gut Feelings instead of doing all that Reference-Checking?
8)Is it important to Check References? How do I do that? What Questions do I ask?
9)What Parents should know about a Baby Sitter?
10)How to find a Baby sitter?
11)How to Write a Babysitter Job Description ?
12)Four Good Reasons To Check References Before Hiring A Babysitter ?

TIBCO Rendezvous EMS and JMS Interview Questions

1) What do you mean by TIBCO RVD (Rendezvous Daemon)?
2) How does TIBCO RVD (Rendezvous Daemon) works?
3) What is the difference between Tibco RVD and Tibco RVRD?
4) What is the bus architecture and what is hub spoke architecture?
5) Difference between Tibco RV and Tibco EMS?
6) If want to ensure that no message lost by using Tibco RV, how do you achieve it?
7) How does Tibco Certified messaging works?
8) What will happen if you delete Tibco ledger file while your process is still running using certified transport?
9) What do you mean by transport? Do you make topic as certified or transport as certified?
10) What are the main benefits of using Tibco RV?
11) What is the fundamental difference between working of Tibco RVD and JMS Queue?
12) What is the advantage and disadvantage of using Tibco EMS?
13) What do you mean by subject based filtering or subject based addressing?
14) What do you mean by JMS Selector?
15) How does JMS Selector works?
16) When should you use Tibco RV and when should you prefer Tibco EMS?
17) What do you mean by durable topic/queue?
18) What will happen if you kill the Tibco rvd and your process is running?
19) Can you bind one service to same tibco transport in case of tibco RV?
20) What are the benefits and drawback of using tibco RV?
21) You have your GUI application and running on windows machine and server is running on linux machine? How do you communicate between server and GUI?
22) What are the advantage and disadvantage between TCP and multicast?
23) Which protocol tibco RV is based upon?
24) What do you mean by service, daemon and network in tibco RV?
25) What do you mean by remote daemon in case of tibco RV? When do you use remote daemon? What are disadvantage of using tibco RV remote daemon?
26) What do you mean by tibco RV (Rendezvous) storm?
27) What do you mean by DATALOSS? What are inbound and outbound dataloss?
28) What is tibco rv reliability parameter? how does it affect working of tibco rv ?
29) What is request reply messaging, in which condition we should use tibco RV request reply messaging.
30) What is difference between request/reply and publish/subscribe?
31) How do you find out whether tibco rvd is running or not in both windows machine and linux machine?
32) How do you find out on which topics your tibco rvd has made subscription?
33) How do you publish message on a topic and how do you receive message from a topic ?
34) What are Inbox topics?
35) What is tibco hawk?
36) How does tibco helps in terms of monitoring application?
37) How does tibco hawk works?
38) What are main components of tibco hawk?
39) What is ledger file?
40) When should we use file based ledger and when should we use in memory ledger?
41) How do you view message form ledger file?
42) What do you mean by pre registration in case of tibco RV certified messaging?
43) How do you ensure a message will not be lost between two process even if one of them is not up and running?
44) What are tibco advisory messages?
45) What will happen if a application tries to create a tibco rv transport and tibco rvd is not running on that host?

JCL Practice interview questions (Practical)

  1. JCL Practice interview questions (Practical)
  2. Create a PDS and 5 Memebers
  3. Create a PS and 5 members
  4. Write COBOL program for Addtion of 2 numbers (ADDPRG)
  5. Write COBOL program for subtraction of 2 numbers (SUB PRG)
  6. Write COBOL program for multiplication of 2 numbers (MULPRG)
  7. Write COBOL program for division of 2 numbers (DIVPRG)
  8. Write a JCL program to excute ADDPRG using DD *
  9. Write a JCL program to excute ADDPRG using DD Dummy..
  10. Write a JCL program to excute ADDPRG,SUBPRG,MULPRG and DIVPRG.
  11. Write a JCL prgram to set TIME for above program and watch.
  12. Write a JCL program to create a PS
  13. Write a JCL program to create a PDS.
  14. Write a JCL catalog procedure for ADDPRG and call it from other JCL program.
  15. Write a JCL instream procedure for ADDPRG and call it.
  16. Write a JCL procedure with Symbolic Parameter.
  17. Write a JCL procedure with Overriding Parameter
  18. Write a COBOL Program to copy records from one file to other file.
18. Write a JCL program to copy data from PS to PS using IEBGENER.
19. Write a JCL program to copy all data from PDS to PDS using IEBCOPY.
20. Write a JCL program to copy selected data from PDS to PDS using IEBCOPY.
21. Write a JCL program to copy other than selected data from PDS to PDS using IEBCOPY.
22. Write a JCL program to print all data from PS using IEBPTPCH
23. Write a JCL program to Rename a Dataset using IEHPROGM
24. Write a JCL program to Delete a Dataset using IEHPROGM
25. Write a JCL program to Catalog a Dataset using IEHPROGM
26. Write a JCL program to Un-Catalog a Dataset using IEHPROGM
27. Write a JCL program to sort records in Ascending order using SORT
28. Write a JCL program to sort records in Descending order using SORT
29. Write a JCL program to sort records with atleast 2 fields order using SORT

Mainframes JCL Interview Questions

Mainframes JCL Interview Questions
  1. What is JCL?
  2. Difference between JCL and COBOL-II
  3. What is JOB?
  4. What is PROC?
  5. What are the difference between JOB and PROC?
  6. List all JCL statements
  7. What is EXEC statement?
  8. What is DD statement?
  9. What is meant by // and /* and //*
  10. What is PROC and PEND statement?
  11. What is OUTPUT statement?
  12. How many EXEC statement allowed in a single JCL? (255)
  13. How many DD statement allowed in a single JCL? (3273)
  14. Explain JCL coding format
  15. What is Parameter? Tell its 2 types.
  16. What is POSITIONAL PARAMETER?
  17. What is KEYWORD PARAMETER?
  18. What is JOBNAMEs? Explain its rules.
  19. What is 2 parts of POSITIONAL PARAMETER?
  20. Explain Accounting Information in POSITIONAL PARAMETER
  21. Explain Programmer Information in POSITIONAL PARAMETER
  22. What is KEYWORD PARAMETER? How do u find it ? (By = sign)
  23. What is CLASS Parameter?
  24. What is PRTY Parameter?
  25. What is MSGCLASS Parameter?
  26. What is MSGLEVEL Parameter?
  27. Explain MSGLEVEL(0,1), MSGLEVEL(0,2), MSGLEVEL(1,1),
MSGLEVEL(1,2), MSGLEVEL(2,1),MSGLEVEL(2,2).
  1. What is COND Parameter?
  2. What is meant by Return code?
  3. RC=0, RC=8 , RC>8 , RC=3000 explain it
  4. What is the range of the RC (0-4095)
  5. Explain TIME Parameter
  1. How do terminate a job? (3 methods COND, // , TIME)
  2. Explain RESTART Parameter
  3. Explain TYPERUN Parameter
  4. What is HOLD and SCAN ?
  5. Explain ADDRSPC Parameter
  6. What is REAL and VIRT? (Default is VIRT)
  7. Explain REGION Parameter
  8. Explain NOTIFY Parameter
  9. List all JOB Parameters.
  10. What is EXEC Statement? How many EXEC statement allowed in a JCL?
  11. What is PGM, PROC, PARM, COND and TIME Parameters?
  12. Explain ONLY / EVEN in COND Parameter.
  13. What is the difference between JOB COND and EXEC COND parameters?
  14. What us PARM Parameter? Can u explain it with a COBOL Program?
  15. What is DD Stands for?
  16. Explain the DD statement rules
  17. What is the difference between DD Statement and PARM statement (3 points)
  18. What is the difference between DD * , DD Data and DUMMY statement.
  19. What is DLM? Can we use // or /* in DLM statement?
  20. What is meant by DSN?
  21. What is DISP? What are its parameters? (D1,D2.D3)
  22. Explain about NEW, OLD, SHR and MOD.
  23. Explain about KEEP, DELETE, PASS, CATLG and UNCATLG.
  24. Explain about third parameter in DISP Parameter. (D3)
  25. What is UNIT ? Explain its parameters.
  26. What is VOL? Explain its parameters
  27. What is LABEL Parameters?
  28. What is SPACE Parameters?
  29. What is Load Data Set?
  30. What is JOBLIB?
  31. What is STEPLIB?
  32. What is the difference between JOBLIB and STEPLIB?
  33. What is SYSIN and SYSOUT?
  34. What is OCB. Explain its 5 parameters
  1. What is LRECL. Explain it with COBOL statement.
  2. What is BLKSIZE. Explain it with COBOL statement.
  3. What is RECFM. Explain it with COBOL statement.
  4. What is DSORG. Explain it with COBOL statement.
  5. What is EROPT. Explain it with COBOL statement.
  6. What is V, F, U, VB, VF, VBA and FBA?
  7. What is PROCEDURE? What are its 2 types?
  8. What is Instream procedure?
  9. What is catalog procedure?
  10. Explain the coding rules for a Procedure? (4 points)
  11. Explain the coding rules for a Instream Procedure.(4 points)
  12. What is IIP, DIP, ICP, DCP and IAP?
  13. How many types of Parameters are in Procedure.
  14. What is Symbolic Parameters?
  15. What is Overriding Parameter?
  16. Explain filecopy method in Mainframe
  17. What is meant by JCL Utilities?
  18. What are the rules for JCL Utilities?
  19. What is IEBGENER?
  20. What is IEBCOPY?
  21. What is IEBPTPCH?
  22. How do u copy all members from one DSN to other DSN?
  23. How do u copy a particular members from one DSN to other DSN?
  24. How do u copy other than selected members from one DSN to other DSN?
  25. What is meant by System Utilities?
  26. What is IEHPROGM?
  27. What are the rules for System Utilities?
  28. Explain RENAME, NEWNAME, UNCATLG, CATLG and DELETE
  29. What are the differece between System Utilities and JCL Utilities
  30. Explain about Other Utilities?
  31. Explain SORT Utility
  32. Explain SORT FIELDS parameter.
  33. Explain if SORT Parameter CH has the value BI or X or PD or ZD or AC or CH.