300+ [UPDATED] Trademark Interview Questions

  1. 1. What Is A Trademark?

    A trademark is a word, phrase, symbol, or design (or a combination of any of these) that identifies the source of a product or service and distinguishes it from competitors.

  2. 2. What Can Be Trademarked?

    Trademark registration can be granted on distinctive names, logos and slogans. You might want to seek a trademark for a product name, company name, company logo, or tagline.

    For example:
    “Nike”, the Nike swoosh design, and “Just Do It” are all trademarks owned by Nike to distinguish their products from other athletic companies. But keep in mind that trademark protection only applies to a particular category of goods and services. Nike Inc. may own the mark on a variety of shoes, clothing, sporting goods, etc. But there’s also a Nike Corporation in Sweden that’s involved in heavy machinery, like hydraulic lifting jacks.

  3. Business Law Interview Questions

  4. 3. How Do I Know If A Name Is Available For Me To Use For My Company, Product, Or Service?

    Before you incorporate or register your business with your state, you’ll need to check the state’s database of company names and make sure the name you want isn’t already in use. Name conflicts are one of the main reasons many LLC, corporation, or DBA applications get rejected. At this point, you should also conduct a free trademark search to check if your business name is available to use at the federal level.

    It’s also important to know that you can still infringe on someone else’s mark even if they’ve never formally registered it with the USPTO. For this reason, you should also run a comprehensive nationwide trademark search into state and local databases (beyond just your own state). This should include common law and county registrars.

  5. 4. When Should I Or Can I Use The Trademark Symbol? And What’s The Difference Between Tm And ®?

    Before you have registered a trademark with the USPTO, you may use the TM symbol. After a trademark is registered with the USPTO, you have the right to use ® in your trademark. Many companies choose to use the TM or ® symbol with the first appearance of the company or product name in a document, and then drop the symbol for each appearance after that.

  6. Patent law Tutorial

  7. 5. What Are The Benefits Of Registering A Trademark?

    By registering for U.S. Federal Trademark protection, you’ll be eligible for several benefits, including:

    • Treble damages in some cases of infringement
    • The right to use ® in your trademark
    • A streamlined process for securing your domains and usernames at social sites like Facebook, Twitter, and YouTube
    • Significantly stronger protection than ‘common law’ (aka. unregistered) marks. This can make it much easier to recover your property, let’s say if someone happens to use your company name as their Twitter handle.
  8. Corporate Law Interview Questions

  9. 6. If I’ve Already Registered My Name With The State, Do I Still Need A Trademark?

    When you incorporate, form an LLC, or file a DBA (Doing Business As) for your new business, this process registers your business name with your state’s secretary of state. Before approving your application, the state checks that your name is distinguishable from all other business names registered in the state. Once approved, the business name is yours, and yours alone, to use within the state. This prevents anyone else from using your name within your state, but it doesn’t offer any kind of protection in the other 49 states.

    If you’ve started a business that’s physically tied to your state (i.e. a hair salon or restaurant) and have no plans on expanding into other states, registering your name with the state or county might be enough brand protection for you. However, if you’re planning on conducting business outside your own state (i.e. you sell a product or you provide services and some of your clients may live elsewhere), you should look into trademark protection with the USPTO.

  10. 7. How Are Trademarks Registered And How Much Does It Cost?

    To register your business name, you’ll need to file an application with the USPTO: you can file either directly with the USPTO or have an online legal filing service handle it for you. Expect to pay approximately $325 per class in application fees that your mark would fall under and the process can take anywhere from 6-12 months once you submit your application.

    It’s also smart to perform a comprehensive trademark search before starting the application process to make sure your name is available (you won’t get an application refund just because your name isn’t available).

    While the process of registering a trademark is more involved than registering a DBA, rights to your name will be enforced by both the federal and state governments. As you’re getting your company off the ground, remember that your name represents your brand and business, so take the right steps up front to protect your identity.

  11. Information Security Cyber Law Tutorial
    Patent law Interview Questions

  12. 8. How Is The Trademarks Act 1999 Different From The Trade And Merchandising Marks Act 1958?

    Enactment of the Trademarks Act 1999 is a big step forward from the Trade and Merchandise Marks Act 1958 and the Trademark Act 1940. 
    The newly enacted Act has some features not present in the 1958 Act and these are:-

    1. Registration of service marks, collective marks and certification trademarks.
    2. Increasing the period of registration and renewal from 7 years to 10 years.
    3. Allowing filing of single application for registration in more than one class.
    4. Enhanced punishment for offences related to trademarks.
    5. Exhaustive definitions for terms frequently used.
    6. Simplified procedure for registration of registered users and enlarged scope of permitted use.
    7. Constitution of an Appellate Board for speedy disposal of appeals and rectification applications which at present lie before High Court.
  13. 9. How Is “trademark” Defined?

    A trademark is a distinctive sign, which identifies certain goods or services as those produced or provided by a specific person or enterprise. A trademark may be one or a combination of words, letters and numerals. It may also consist of drawings, symbols, three-dimensional colours and combination of colours. It is used by traders/companies/firms etc to distinguish their goods and services from those of their competitors. A consumer associates some level of quality/price/prestige with the goods of a particular trademark. In other words the consumer uses the trademark for making a choice while buying a particular product. There are so many examples in our day to day life such as TATA, BATA, Liberty, Brooke Bond, Dabur, Baidyanath, Park Avenue, AIL and so on. Trademarks do not protect the design or the ideas behind the goods or services from imitation or duplication, but prevent other traders/company/firm from deceiving customers into believing that goods or services actually produced by them were produced by the trademark holder.

  14. Legal Interview Questions

  15. 10. What Are “well-known Trademarks”?

    Well-known trademarks in relation to any goods or services, means a mark which has become known to a substantial segment of the public which uses such goods or receives such services that the use of such mark in relation to other goods or services is likely to be taken as indicating a connection in the course of trade or rendering of services between those goods or services and a person using the mark in relation to the firstmentioned goods or services.

  16. 11. What Is The Meaning Of “service” In The Trademark Act 1999?

    Service means service of any description which is made available to potential users and includes the provision of services in connection with business of any industrial or commercial matters such as banking, communication, education, financing, insurance, chit funds, real estate, transport, storage, material treatment, processing, supply of electrical or other energy, boarding, lodging, entertainment, amusement, construction, repair, conveying of news or information and advertising.

  17. Labour Law Interview Questions

  18. 12. How Are The Terms “certification Trademarks” And “collective Marks” Defined In The Act?

    Certification trade mark means a mark capable of distinguishing the goods or services in connection with which it is used in the course of trade which are certified by the proprietor of the mark in respect of origin, material, mode of manufacture of goods or performance of services, quality and accuracy. Collective Mark means a trademark distinguishing the goods or services of an association of persons (not being a partnership within the meaning of the Indian Partnership Act, 1932)

  19. Business Law Interview Questions

  20. 13. What Is The Term Of A Registered Trademark?

    The initial registration of a trademark shall be for a period of ten years but may be renewed from time to time for an unlimited period by payment of the renewal fees.

  21. 14. What Is The Madrid Agreement?

    The Madrid Agreement was adopted on April 14, 1891 to facilitate protection of a trademark or service mark in several countries by means of a single international registration. As on July15, 1999, 54 countries are party to this Agreement mainly belonging to Europe, countries of Africa and four countries in the Far East namely, China, the Democratic People’s Republic of Korea, Mongolia and Vietnam. The United Kingdom, the United States of America, most Latin American countries, Japan and India are not signatories to this agreement. The Agreement covers both trademarks and service marks.

  22. 15. What Is The Madrid Protocol?

    The Protocol relating to the Madrid Agreement concerning the International Registration of Marks was adopted at Madrid on June27, 1989. The Protocol, which entered into force on December1, 1995, retains the basic features of the Madrid Agreement. As on July15, 1999, 39 countries have acceded to the Protocol. The Protocol was formed to removesome of the features of the Madrid Agreement, which posed some obstacles to accession by several countries.

    These features are:

    1. For an international registration, it is essential to first register a mark at the national level. The time required for obtaining a mark at the       national level varies from country to country. Hence some parties do suffer.
    2. Within one year, a designated member country has to examine and issue a notice of refusal by giving all the grounds for refusal. The period    was considered short.
    3. A uniform fee is paid for the designation of a member country. This was found to be inappropriate for countries with high level of national       fees.
    4. An international registration is linked to the basic registration during the initial five years and the former gets cancelled if latter is cancelled.     The fact, that grounds under which a mark is cancelled in the country of origin need not necessarily exist in every other designated country,      is overlooked.
    5. The only working language of the Madrid Agreement is French.

    Innovations introduced by the Madrid Protocol are:

    1. An international application need not necessarily be based on a registration made by the Office of Origin but can also be based on an application filed with the Office of Origin. This makes it convenient for countries with full examination system where the national registration takes time. It also makes it possible to claim the right of priority of six months under the Paris Convention.
    2. A Contracting Party can receive the fee under the existing Madrid Treaty system through its share in the international fees collected for each designation made as in the Madrid Treaty. Alternatively, the member country can choose “Individual fee” system for each designation made, which should be an amount not more than the national fee for a ten-year registration. The “Individual fee” system makes an attractive proposition for countries with high level of national fees.
    3. It is possible to transform an international registration into national or regional application in the designated Contracting Parties, if the basic registration is cancelled for some reasons, as in the case of “Central Attack”.
    4. An applicant may choose to base an international registration in any of the Contracting States with which he has connection through nationality, domicile or establishment.
  23. Legal Assistant Interview Questions

300+ [UPDATED] Transducer Interview Questions

  1. 1. What Is Instrument?

    It is a device for determining the value or magnitude of a quantity or variable.

  2. 2. List Three Sources Of Possible Errors In Instruments.?

    Gross Error, Systematic or Random errors.

  3. Power Electronics Interview Questions

  4. 3. Define Instrumental Error?

    These are the errors inherent in measuring instrument because of their mechanical structure.

  5. 4. Define Limiting Error?

    Components are guaranteed to be with in a certain percentage of rated value. Thus the manufacturer has to specify the deviations from the nominal value of a particular quantity.

  6. Power Electronics Tutorial

  7. 5. Define Probable Error?

    It is defined as r = ± 0.6745s where s is standard deviation.
    Probable error has been used in experimental work to some extent in past, but standard deviation is more convenient in statistical work.

  8. Switching Interview Questions

  9. 6. Define Environmental Error?

    These are due to conditions in the measuring device, including conditions in the area surrounding the instrument, such as the effects of changes in temperature,humidity.

  10. 7. Define Units.?

    It is necessary to define a physical quantity both in kind and magnitude in order to use this information for further proceedings. The standard measure of each kind of physical quantity is named as the unit.

  11. Control Systems Tutorial
    Pneumatic Interview Questions

  12. 8. Define Standards?

    The physical embodiment of a unit of measurement is a standard. For example, the fundamental unit of mass in the international system is the kilogram and defined as the mass of a cubic decimeter of water at its temperature of maximum density of 4°c.

  13. 9. Mention The Purpose Of The Measurement.?

    • To understand an event or an operation.
    • To monitor an event or an operation.
    • To control an event or an operation.
    • To collect data for future analysis
    • To validate an engineer design.
  14. Mechatronics engineering Interview Questions

  15. 10. What Are The Methods Of Measurement?

    • Direct comparison method
    • Indirect comparison method
  16. Outcome Measurement Tutorial

  17. 11. Define Odds?

    The specification of limiting error is in itself uncertain because the manufacture himself is not sure about the accuracy because of the presence of random errors.

  18. Power Transmission Interview Questions

  19. 12. Define Transducer And Give An Example.?

    Transducer is a device which convert one form of energy into electrical energy. A thermocouple converts heat energy into electrical voltage.

  20. Power Electronics Interview Questions

  21. 13. What Is Primary Transducer?

    Bourdon tube acting as a primary transducer, senses the pressure and convert the pressure into displacement. No output is given to the input of the bourdon tube. So it is called primary transducer. Mechanical device can act as a primary transducer.

  22. 14. What Is Secondary Transducer?

    The output of the Bourdon tube is given to the input of the LVDT. There are two stages of transduction, firstly the pressure is converted into a displacement by the Bourdon tube then the displacement is converted into analog voltage by LVDT. Here LVDT is called secondary transducer. Electrical device can act as a secondary transducer.

  23. 15. What Is Passive Transducer?

    In the absence of external power, transducer cannot work and it is called a passive transducer. Example capacitive , inductive, resistance transducers.

  24. Wireless Sensor Networks Interview Questions

  25. 16. What Is Active Transducer?

    In the absence of external power, transducer can work and it is called active transducer. Example velocity, temperature, light can be transdued with the help of active transducer.

  26. 17. What Is Analog Transducer?

    These transducers convert the input quantity into an analog output which is a continuous function of time. Thus a strain gauge, an LVDT, a thermocouple or a thermistors may be called analog transducer, as they give an output which is a continuous function of time.

  27. Industrial Instrumentation Interview Questions

  28. 18. Give The Classification Of Units.?

    1.Absolute units
    2.Fundamental and derived units
    3.Electromagnetic units
    4.Electrostatic units

  29. Switching Interview Questions

  30. 19. Define Primary Fundamental And Auxiliary Fundamental Units.?

    Fundamental units in mechanics are measures of length,mass and time and those are fundamental to most other physical quantities and hence they are called Primary fundamental units Measures of certain physical quantities in thermal ,electrical and illumination fields are also represented by fundamental units and are used only where those disciplines are involved and hence called auxiliary fundamental units.

  31. 20. Define Static Calibration.?

    It refers to a process in which all the inputs(desired,modifying,interfering) except one are kept at some constant values.

  32. Control Systems Interview Questions

  33. 21. Define Traceability.?

    The ability to trace the accuracy of the standard back to its ultimate source in fundamental standards of National Institute of Science and Technology is termed “Traceability”.

  34. 22. What Are Random Errors Or Residual Errors.?

    The happenings or disturbances about which we are unaware and lumped together are called random errors or residual errors.Since these errors remain even after the systematic errors are taken care of,they are called residual errors.

  35. 23. Give One Property Of Piezo-electric Crystal.?

    When a force is applied to piezo-electric crystals ,they produce an output voltage.

  36. Electric Power Generation Interview Questions

  37. 24. Define An Inverse Transducer.give An Example.?

    A device which converts an electrical quantity into an non-electrical quantity.A piezo-electric crystal acts as a inverse transducer because whwn a voltage is applied across its surfaces ,it changes its dimensions causing a mechanical displacement.

  38. Pneumatic Interview Questions

  39. 25. List The Factors Responsible In Selection Of A Transducer.?

    1.Operating principle
    2.Sensitivity
    3.Operating range.
    4.Accuracy.

  40. 26. Define Static Characteristics.?

    static characteristics of a measurement system are, in general, those that must be considered when the system or instrument is used to measure a condition not varying with time.

  41. Thyristor Interview Questions

  42. 27. What Is Dynamic Characteristics?

    Many measurements are concerned with rapidly varying quantities and , therefore, for such cases we must examine the dynamic relations which exist between the output and the input . This is normally done with the help of differential equations . Performance criteria based upon dynamic relations constitute the Dynamic Characteristics.

  43. Mechatronics engineering Interview Questions

  44. 28. Mention Different Types Dynamic Characteristics?

    1. Zero- order transducers
    2.  First – order transducers
    3. Second-order transducers
    4.  Higher-order transducers
  45. 29. What Are The Test Inputs Of The Transducer?

    1. Impulse input
    2.  Step input
    3.  Ramp input
    4.  Parabolic input 
    5.  Sinusoidal input
  46. Transmission & Distribution Interview Questions

  47. 30. Define- Zero Order Transducer.?

    The input- output relationship of a zero- order transducer is given by

    Y(t) = K r(t)

    Where r(t) is the input, Y(t) is the output and K is the static – sensitivity of the transducer.

    Example for zero- order transducer is a potentiometer.

  48. 31. What Is Frequency Response Of Zot.?

    Frequency response is thus defined as the steady – state output of a transducer When it is excited with sinusoidal input . the frequency response is represented with the help of two plots namely amplitude radio verses frequency and phase angle shift versus frequency.

  49. 32. What Is Damping Ratio?

    The damping ratioV is an important parameter which decides the nature of oscillation in the transducer output . when V =0 , the second – order system is said to be un damped and the system behaves like an oscillator . when V =1 , the second – order system is said to be critical damped and when V >1 , the second – order system is said to be over damped.

  50. Conductivity Analyzer Interview Questions

  51. 33. Compare Accuracy And Precision.?

    Accuracy is the closeness to true value whereas precision is the closeness amongst the readings .

    precision is the degree of closeness with which a given value may be repeatedly measured.

  52. Power Transmission Interview Questions

  53. 34. What Is Threshold?

    When the input to a transducer is increased from zero, there is a minimum value below which no output can be detected .This minimum value of the input is defined as the threshold of the transducer.

  54. 35. What Is Range And Span?

    The range of the transducer is specified as from the lower value of input to higher value of input.

    The span of the transducer is specified as the difference between the higher and lower limits of recommended input values.

  55. 36. What Is Rise Time ?

    It is defined as time required for the system to rise from 0 to 100 percent of its final value.

  56. Wireless Sensor Networks Interview Questions

  57. 37. What Is Potentiometer?

    Basically a resistance potentiometer, or simply a POT, (a resistive potentiometer used for the purposes of voltage division is called a POT) consists of a resistive element provided with a sliding contact. The POT is a passive transducer.

  58. 38. What Are The Advantages And Disadvantages Of Potentiometer?

    Advantages : 

    • Inexpensive
    • Useful for measurement of large amplitudes
    • Efficiency is very high
    • Frequency response of wire wound potentiometers is limited

    Disadvantages :

    Require a large force to move

  59. 39. What Are The Different Types Of Strain Gauge?

    1. Unbonded metal strain gauges
    2. Bonded metal wire strain gauges
    3. Bonded metal foil strain gauges
    4. Vacuum deposited thin metal film strain gauges
    5. Sputter deposited thin metal strain gauges
    6. Bonded semiconductor strain gauges
    7. Diffused metal strain gauges.
  60. 40. What Are The Factors To Be Considered For Bonded Strain Gauge?

    • Filament construction
    • Material of the filament wire
    • Base carrier material or backing material
    • Cement used to bond the filament to the carrier
    • Lead wire connections.
  61. Industrial Instrumentation Interview Questions

  62. 41. What Is Inductance Transducer?

    Transducers based on the variation of inductance are another group of importance devices used in many application. In these transducers self inductance or the mutual of a couple of coils is changed when the quantity to be measured is varied.

  63. 42. Mention Three Principles Of Inductance Transducer.?

    • Change of self inductance
    • Change of mutual inductance
    • Production of eddy currents.
  64. Control Systems Interview Questions

  65. 43. What Is Lvdt?

    The Linear Variable Differential Transformer (LVDT) is the most common mutual inductance element. This can be considered to be a versatile transducer element for most of the electromechanical measuring systems with regards to resolution, hysteresis, dynamic response, temperature characteristics, linearity and life.

  66. 44. What Is Null Voltage?

    Ideally the output voltage at the null position should be equal to zero. However, in actual practice there exists a small voltage at the null position.

  67. 45. Explain The Principle Of Induction Potentiometer?

    The primary is excited with alternating current. This induces a voltage in to the secondary. The amplitude of this output voltage varies with the mutual inductance between the two coils and this varies with the angle of rotation.

  68. 46. Explain The Principle Of Variable Reluctance Accelerometer?

    Another common version of the variable reluctance principle. This is an accelerometer for measurement of accelerometer for measurement of acceleration in the range ± 4g. Since the force required to accelerate a mass is proportional to the acceleration.

  69. 47. What Is The Principle Of Capacitive Transducer?

    Many industrial variables like displacement, pressure, level, moisture, thickness etc can be transduced into an electrical variation using capacitance variation as the primary sensing principle.

  70. 48. What Are The Advantages Of Capacitive Transducers?

    • They require only small force to operate.
    • Have a good frequency response.
    • Extremely sensitive.
    • High input impedance
  71. 49. What Are The Uses Of Capacitive Transducer?

    it Can be used for measurement of linear and angular displacement. Can be used for measurement of force and pressure.  It can be used as pressure transducer.  Measurement of humidity in gases.  Commonly used for measurement of level, density, weight.

  72. 50. What Is Digital Transducer?

    These transducer convert input quantity into an electrical output which is in the form of pulses.

  73. 51. What Is Piezoelectric Transducer?

    They convert pressure or force into electrical charge. These transducers are based upon the natural phenomenon of certain non-metal and di-electric components.

  74. 52. What Are The Suitable Materials For Piezo Electric Transducer?

    Primary quartz, Rochelle salt, ammonium dihydrogen phosphate (ADP), and ceramics with barium titanate, dipotassium tartrate, potassium dihydrogen phosphate and lithium sulfate.

  75. 53. What Are The Suitable Materials For Magnetostrictive Transducer?

    Iron , nickel, 68 permalloy, ferroxcube ect.

  76. 54. What Is Magnetostrictive Transducer?

    The permeability can increase or decrease depending upon the material, type of stress , and the magnetic flux density in the sample.

  77. 55. What Is Fibre Optic Transducer?

    Fibre optic cable consists of outer core and inner cladding.Data is transmitted in the form of light.It is used for measuring displacement,torsion.

  78. 56. Compare Digital Transducer With Analog.?

    Digital transducer give digital outputs. Analog transducers outputs are continuous functions of time. If these analog transducers are to be interfaced with digital devices, then one has to use analog to digital converters.

  79. 57. What Is Piezoelectric Effect?

    A piezoelectric material is one in which an electric potential appears across certain surfaces of a crystal if the dimensions of the crystal are changed by the application of the mechanical force.

  80. 58. What Id Digitiser?

    Digital encoding transducer or digitiser, enable a linear or rotary displacement to be directly converted into digital form without intermediate form of analog to digital (A/D) conversion.

  81. 59. What Is Zero Error Of The Transducer?

    In this case output deviates from the correct value by a constant factor over the entire range of transducer.

  82. 60. What Are The Disadvantages Of Capacitive Transducers?

    1. The metallic parts of the capacitive transducers must be insulated from each other.
    2. Non-linear behaviour.
    3. This leads loading effects.
    4. The cable may be source of loading resulting loss of sensitivity.

300+ [UPDATED] TOGAF Interview Questions

  1. 1. What Is Enterprise Architecture?

    An Enterprise Architecture (EA) is a collection of strategic information that describes a business and the information and technologies necessary to operate the business. This includes descriptions of goals, business processes, roles, organizational structures, information, applications and systems. 

    Enterprise Architecture encapsulates the information necessary to implement new technologies in response to the changing needs of the business. 

    EA is often broken down into four domains:
    business, application, data and technology architecture.

  2. 2. What Is The Value Of Enterprise Architecture?

    1. Enterprise Architecture is a strategic information asset to be used to shape the Enterprise. 
    2. It is key to understanding the current investment in IT and efficiently planning and directing future IT investments. 
    3. Enterprise Architecture is a tool for identifying opportunities to improve key Enterprise metrics related to things like operational efficiency, IT costs and customer satisfaction. 
    4. Enterprise Architecture helps achieve enterprise alignment, manage change, and reduce time-to-market.
  3. Adv Java Interview Questions

  4. 3. What Is The Zachman Framework?

    The Zachman Framework is a framework for Enterprise Architecture developed by IBM in the 1980s. 

    It provides a way of defining an enterprise according to a 6×6 matrix of architecture documentation. The columns of this matrix ask the questions why, how, what, who, where, when. The rows look at these questions from different levels of detail: contextual, conceptual, logical, physical and detailed. 

    The Zachman Framework provides a view for Planners, Owners, Designers, Builders and Subcontractors. The basic idea is that the same thing can be described for different purposes in different ways. This creates a holistic view ― it allows different people to look at the Enterprise from different perspectives. 

    The Zachman Framework has been incorporated into many Enterprise Architecture frameworks. (often as a reference model)

  5. 4. What Is The Togaf Framework?

    1. The Open Group Architecture Framework (TOGAF) is a framework for enterprise architecture. It provides a comprehensive approach to the design, planning, implementation, and governance of an enterprise architecture.  
    2. TOGAF models the enterprise at four levels: Business, Application, Data, and Technology.  
    3. TOGAF includes a methodology for defining IT in terms of a set of building blocks. It also contains a set of tools, a vocabulary, recommended standards and list of TOGAF compliant tools. 
    4. TOGAF includes a iterative process for enterprise architecture called Architecture Development Method (ADM).
  6. Adv Java Tutorial

  7. 5. What Is An Enterprise Architecture Roadmap? What Kind Of Information Does It Contain?

    An EA Roadmap describes a current and target architecture and a transition plan to achieve the target state. 

    An EA Roadmap should include the business, application, data and technical architecture for each state. 

    The Roadmap lists the projects required to implement the proposed architecture. This should include project prioritization, risks and issues, migration strategy, estimated costs, success factors and project measurements. 

  8. Core Java Interview Questions

  9. 6. How Can You Evaluate If A Solution Conforms To The Enterprise Architecture?

    It is important to engage projects during the initiation phase to ensure that architecture compliance processes are included in the project planning. 

    Once the solution architecture has been defined a compliance assessment should be performed. The compliance assessment ensures the project conforms to the defined Enterprise Architecture. It is also an opportunity to engage project members and get feedback for the Enterprise Architecture. 

    The compliance assessment includes checklists for hardware, software, applications, information, security, system management and methods and tools. It also documents an overview of the project architecture / design.

  10. 7. What Is Soa?

    SOA is a set of design principles for building a suite of interoperable, flexible and reusable services. These design principles include discoverable service contract, loose coupling, service abstraction, service reusability, service autonomy, service statelessness and service compos ability. 

    A successful SOA implementation can reduce IT costs by increasing reusability. SOA’s flexible mesh of services can also reduce time to market. SOA also helps to leverage existing investments by wrapping legacy applications in a mesh of reusable services.

  11. Core Java Tutorial
    Cloud Computing Interview Questions

  12. 8. What Is Itil?

    Information Technology Infrastructure Library (ITIL) is a set of best practices for IT service management, development and operations. 

    ITIL gives detailed descriptions of a number of important IT concepts and includes checklists, tasks and procedures that can be tailored for any enterprise. 

    Some major areas ITIL covers are:

    • Service Support
    • Service Delivery
    • ICT Infrastructure Management
    • Security Management
    • Application Management
    • Software Asset Management

    In the Service Support area ITIL covers processes such as Service Desk, Incident and Problem Management, Change Management, Release and Configuration Management. 

    In the Service Delivery area ITIL covers processes such as Service Level Management, Capacity Management and Service Continuity management.

  13. 9. What Are Soa Patterns?

    SOA design patterns are reusable solutions to a commonly occurring SOA design problems. 

    Some common SOA patterns include: 

    Enterprise Service Bus:
     A tool that fosters service communication by providing reliable messaging, message queuing, data transformations and service broker functionality. 

    File Gateway:
     A file gateway is placed between a service and legacy flat file. The gateway acts as a mediator and can perform data transformations. 

    Event Driven Messaging:
     The service notifies its consumers of relevant events with messages. 

    Service Callback:
     A service requires that consumers communicate with it asynchronously. Consumers provide a callback address to which the service can send response messages. 

    Service Grid –
    Service state is stored on a grid of services that support replication and redundancy.

  14. MySQL Interview Questions

  15. 10. What Is An Architecture Vision? What Information Does It Contain?

    The Architecture Vision is created during the project initiation phase of a project. The purpose of the vision is to agree from the start what the desired outcome should be for the architecture. 

    The Architecture Vision is the enterprise architect’s elevator pitch. It needs to simply and powerfully sell the benefits of the proposed architecture to decision-makers. It also needs to show how the proposed architecture will support business goals and strategy and stakeholder concerns and objectives. 

    Typical contents of an Architecture Vision are: 

    • Problem description
    • Objectives
    • Process descriptions
    • Roles and actors
    • Constraints
    • IT principles
    • Architecture overview
    • Mapping of the proposed architecture to processes and requirements.
  16. Cloud Computing Tutorial

  17. 11. What Are The Inputs To The Migration Planning Phase?

    The inputs to the Migration Planning phase include: Architecture reference materials Requests for Architecture Work Capability Assessment Communications Plan Organizational Model for Enterprise Architecture Governance models and frameworks Tailored Architecture Framework Statement of Architecture Work Architecture Vision Architecture Repository Draft Architecture Definition Document Draft Architecture Requirements Specification Change Requests Consolidated Architecture Roadmap Transition Architectures Implementation and Migration Plan.

  18. Hadoop Interview Questions

  19. 12. Define Togaf Architecture?

    The definition of architecture from ISO/IEC 42010:2007 is: The fundamental organization of a system, embodied in its components, their relationships to each other and the environment, and the principles governing its design and evolution. TOGAF supports this definition by remaining consistent with the terminology of the ISO/IEC 42010:2007 but views the meaning of architecture differently based on the context used.  For TOGAF, architectures are: A formal description of a system, or detailed plan of a system at the component level for guiding implementation.

    The structure of components, their relationships to each other, and the principles and guidelines underlining there design and evolution over time.

  20. Adv Java Interview Questions

  21. 13. What Are The Outputs Of The Requirement Management Process?

    The output of the requirements management process consists of: Requirements Impact Assessment Updated Architecture Requirements Specification Updated Requirements Repository.

  22. MySQL Tutorial

  23. 14. What Are The Contents Of The Transition Architecture?

    The contents of the Transition Architecture are: Opportunity portfolio Work package portfolio Milestones Implementation Factor Assessment and Deduction Matrix Consolidated Gaps, Solutions, and Dependencies Matrix.

  24. 15. How Can The Principles Be Applied To The Enterprise?

    Principles can be applied to the enterprise by: Providing a framework to make conscious decisions about IT Establishing relevant evaluation criteria Driving the definitions for functional requirements of the architecture Providing input to assess existing IS/IT systems and future strategic portfolios Highlight the value of the architecture specifically through the Rationale statements Providing an outline of the key tasks, resources, and potential costs specifically through the Implication statements Supporting architecture governance by providing a stake to allow interpretation in compliance assessments and supporting the decision to initiate a dispensation requestPrinciples are related to each other and are applied as a set.  In some cases, one principle will take precedence over another principle to meet certain situations.

  25. MYSQL DBA Interview Questions

  26. 16. What Is Preliminary Phase?

    The Preliminary Phase prepares the organization for development of the architecture, ensuring: Commitment  to the process Principles and constraints are defined Scope and assumptions are defined Development team is established Framework and methodologies identified Criteria set.

  27. Hadoop Tutorial

  28. 17. What Are The Terms Related To Views?

    There are several terms to concepts related to views:
    System a collection of components intended to provide a specific function or set of functions.

    Architecture:
     the systems fundamental organization of components, their relationships to each other, and the principles guiding design and growth.

    Architecture description:
     a collection of artifacts that document architecture.

    Stakeholders:
     people or groups you have key roles and concerns in the system.

    Concerns:
     the key interests of the stakeholders, which determine the acceptability of the system in the environment.

    View:
     a representation of the whole system form the perspective of a set of concerns.

    Viewpoint:
     the perspective from which a view constructed and used.

  29. Microsoft Azure Interview Questions

  30. 18. What Are The Security Related Activities Within The Technology Architecture Phase Of The Adm?

    Security related activities within the Technology Architecture phase of the ADM are: Assessing the security-specific architecture elements for a baseline perspective Revising assumptions about interconnecting systems Identifying and evaluating applicable guidelines and standards Identifying methods for regulating resource consumption Engineering a method for continuously measuring and communicating security measures Identifying the clearance level of users, administrators, and interconnecting systems Identifying minimal privileges required to achieve a technical or business objectives Identifying mitigating security measures Performing threat analysis.

  31. Core Java Interview Questions

  32. 19. Complexity Addressed: The Zachman Togaf Explained?

    Working with TOGAF and the Zachman Framework has always been said to be comparable to the Periodic Table.

    This is because like the atoms that can be found in a periodic table, the same atoms are also the building blocks of the cells which can be found in the Zachman Framework – only this time, the building blocks are used in supporting enterprises.

    In the framework, one will find many columns that really do have no logical order of importance.

    Instead, they serve as somewhat unique abstractions of the actual enterprise itself.

    This is done in order to reduce what complexity there may be in the different models that are built around it.

    The cell models, or the primitive models, are present such that there can only be one variable.

    John Zachman says that these primitive models are highly important in order for the reusability of the enterprise itself.

    Also, the commonalities which can be found in the enterprise are such that the primitive models can also be considered as one of the elements of architecture.

    The astounding detail that is involved in the Zachman Framework is very impressive.

    Not a single cell becomes the sole property of one detail or one row, as all work to make things highly functional.

    The great thing about this is that it gets to ensure the alignment of the different intentions of all owners of the enterprise, which can then be best represented by the second row of such a framework and everything that was implemented as a requirement to building the enterprise itself.

  33. Microsoft Azure Tutorial

  34. 20. Explain The Togaf Trm: Two Recognized Applications?

    There are people scratching their heads on what ;The Open Group Architecture Framework (TOGAF) signifies.

    And while TOGAF is generally known to the people in its industry, the very concept of it makes it something that is worth knowing even if that person is not part of that industry. TOGAF for everyone’s information needs is an existing framework that is meant for Enterprise Architecture, which involves the providing of comprehensive approaches to design, implementation and planning of an enterprise information based on architecture.

    Along with these, it is also involved in its governance, which is vital in keeping the enterprise abreast with the changes and developments in the industry.This is where TOGAF comes in.

    It is a necessary framework provides the users detailed methods as well as supporting tools for improving and developing both IT and Enterprise Architecture.

    And of course, there are many types of architecture frameworks available today, but TOGAF is simply most unique of these as it has within it a very important method for developing architecture.

    And this is the Architecture Development Method (ADM), which is something only available in TOGAF.

    In fact, ADM can be utilized to suit other frameworks, which basically makes it very flexible to use.

    In this, TOGAF is simply is the crowning glory of The Open Group’s Architecture Forum, which was conceptualized through practice.

    Apart from ADM, another factor that makes TOGAF a better architecture framework is that it is non-proprietary, and therefore free for anyone to utilize in their various architecture framework needs.

    In TOGAF, there is a term solely referred to as TRM, which corresponds to the many, and yet different IT architectures frameworks that could be derived from the use of TOGAF.

    Of course, these TRM can differ from others because of its dependence on the power and requirements of the IT, though there are cases when the differences can be very minimal. In reference to the differences, it must always be understood that no architecture is the same with another, though its principles may be the same, even remotely, there will still be many requirements to be wary about.

    Remember that in building architecture, the people using TOGAF should always, as a rule, make assessments and projections on the requirements of their task.

    With these projections, they can now select the interfaces and services that will in the end result to workable and satisfying results.

    Aside from these, careful examination of the standards required by the work will also aid in creating an atmosphere that is best in line with the needs of their business. In speaking of TRM, it basically recognizes at least two categories in the application software.

    The first one is the Business Applications, which is the one who implements the business processes of the vertical industry, and in doing so, it ultimately becomes the an essential factor to consider in application software configuration. The second of the two is the Infrastructure Applications.

    This application aids the user through a process of providing them functionalities that are grounded on the values and principles of Infrastructure services.

  35. Amazon Web Services (AWS) Interview Questions

  36. 21. The Need For Togaf Certification?

    The Open Group has introduced the TOGAF certification program to enable architecture service providers and tools vendors demonstrate that their products and services support the TOGAF Architecture Development Method (ADM).

    A method used in agreement with all major frameworks. The TOGAF Certification ensures customers that TOGAF based product and service offerings are safe, as professional care has been performed to supply commercially these products and services in the market.

    A Statement of Conformance is provided to customers for them to compare freely the product and services to other certified vendors.

  37. 22. Explain View Model – Federal Enterprise Architecture Views?

    In the US Federal Enterprise Architecture organization, section, and resolution design supply dissimilar trade views by means of changing the layer of particular and addressing associated but clearly different worries. Just like businesses are them self hierarchically arranged, thus are the dissimilar perspectives presented by means of any sort of design.

    The Federal Enterprise Architecture Practice Guidance (2006) has described 3 kinds of architecture: Enterprise design, Segment design, and Solution design.

    By description, Enterprise Architecture (EA) is basically worried with recognizing commonplace either split resources – if they are strategic plans, trade actions, ventures, information, structures, either technologies.

    EA is moved by means of strategy; it assists an organization recognize if its assets are correctly lined up to the organization assignment and strategically objectives and aims. From an speculation outlook, EA is applied to drive resolutions regarding the IT speculation Portfolio as a whole. Consequently, the main investors of the EA are the older administrators and top-managers tasked with making sure the organization answers its assignment as successfully and productively like feasible.

    By juxtaposition, section design describes a straightforward roadmap for a central assignment zone, trade facility, either organization facility. Segment design is moved by means of trade administration and provides articles that better the conveyance of facilities to subjects and organization workforce. From an speculation outlook, section design drives resolutions for a trade instance either cluster of trade instances helping a central assignment zone either commonplace either split facility.

    The main investors for section design are trade holders and administrators. Segment design is associated to EA via 3 principles: construction, recycle, and orientation. 

    First, section design inherits the model applied by means of the EA, albeit it might be enlarged and specific to encounter the concrete wants of a central assignment zone either commonplace either split facility. 

    Second, section design reuses essential resources described at the organization layer including: data; commonplace trade actions and investments; and applications and technologies.

    Third, section design aligns with components described at the organization layer, such like trade strategic plans, orders, norms, and performance actions.

  38. CouchDB Tutorial

  39. 23. How Does Enterprise Architecture Provide Competitive Advantage?

    Primarily taking in construction and severity in developing/maintaining organization applications

  40. PRINCE Interview Questions

  41. 24. How Do Enterprise Architects Use The Zachman Framework?

    Zachman is basically a classification somewhat compared to an EA model. You filler in the packs by means of generating the befitting support documents, so it produces a NIC echeck catalog. I notice Zachman further practical for information programs compared to different kinds of EA evaluation actions. It plays well with numerous different EA architectures, like TOGAF (especially eversince TOGAF does not define a taxonomy).

  42. Cloud Computing Interview Questions

  43. 25. What Is An Example Of A Good Enterprise Architecture Vision Or Mission Statement?

    The EA apparition either assignment declaration ought to actually be equal to that of the organization its normal self. Describing the design of an organization seeks firstly to improve the success either effectiveness of the trade its normal self.

    This includes innovations in the construction of an business, the centralisation or federation of trade actions, the quality and promptness of business information, either making sure that funds consumed on data technics (IT) may be acceptable.

  44. 26. What Are The Skills And Qualities Required To Be A Good Business Analyst?

    The most essential ability for a trade Analyst is information exchange. This is since a trade Analyst behaves as a organizer amid investors in quantities of dissimilar parts, and straddles the business/technology split.

    It’s as well essential to have a definite quantity of understanding in sections external of trade examination its normal self. This contains program administration, change administration, organization design, SDLC and trade procedure modelling.

  45. NoSQL Interview Questions

  46. 27. Why Should One Adopt Togaf?

    The below are some of the reasons to implement TOGAF:

    • Recognized as a comprehensive general method.
    • It is widely adopted in the market.
    • The availability is under a free abstract license.
    • With this, we can easily meet the needs of the organization and the industry.
    • It keeps away from the re-inventing of the wheel.
    • Retailer, tool and technology neutral, open standard.
    • It is based on the best practices.
  47. MySQL Interview Questions

  48. 28. What Are The Architectural Domains Of Togaf?

    The 4 unified regions of interests known as architectural domains are as below:

    Data architecture: the basic task of this domain is to describe the structure of an organization’s logical and physical data possessions and the related data management resources.

    Application architecture: it is responsible for creating the blueprint of each application system that needs to be organized. The communications connecting the request structure, and their interactions with the interior dealing systems with the purposes of amalgamation.

    Business architecture: helps to find the definition for the term governance, business strategy, and key business processes of the organization.

    Technical architecture: the alias name of this domain is technology architecture, used to describe the software, hardware and network communications that help the consumption of main interior claims.

  49. 29. What Are The Architectural Domains Of Togaf?

    The 4 unified regions of interests known as architectural domains are as below:

    Data architecture: the basic task of this domain is to describe the structure of an organization’s logical and physical data possessions and the related data management resources.

    Application architecture: it is responsible for creating the blueprint of each application system that needs to be organized. The communications connecting the request structure, and their interactions with the interior dealing systems with the purposes of amalgamation.

    Business architecture: helps to find the definition for the term governance, business strategy, and key business processes of the organization.

    Technical architecture: the alias name of this domain is technology architecture, used to describe the software, hardware and network communications that help the consumption of main interior claims.

  50. CouchDB Interview Questions

  51. 30. What Are The Architectural Domains Of Togaf?

    The 4 unified regions of interests known as architectural domains are as below:

    Data architecture: the basic task of this domain is to describe the structure of an organization’s logical and physical data possessions and the related data management resources.

    Application architecture: it is responsible for creating the blueprint of each application system that needs to be organized. The communications connecting the request structure, and their interactions with the interior dealing systems with the purposes of amalgamation.

    Business architecture: helps to find the definition for the term governance, business strategy, and key business processes of the organization.

    Technical architecture: the alias name of this domain is technology architecture, used to describe the software, hardware and network communications that help the consumption of main interior claims.

  52. 31. What Are The Architectural Domains Of Togaf?

    The 4 unified regions of interests known as architectural domains are as below:

    1. Data architecture: the basic task of this domain is to describe the structure of an organization’s logical and physical data possessions and the related data management resources.
    2. Application architecture: it is responsible for creating the blueprint of each application system that needs to be organized. The communications connecting the request structure, and their interactions with the interior dealing systems with the purposes of amalgamation.
    3. Business architecture: helps to find the definition for the term governance, business strategy, and key business processes of the organization.
    4. Technical architecture: the alias name of this domain is technology architecture, used to describe the software, hardware and network communications that help the consumption of main interior claims.
  53. 32. What Are The Steps Involved In Architecture Development Method (adm)?

    The 9 steps that help in establishing the architecture are as below:

    1. Choose perspectives, apparatus and orientation figures.
    2. Manufacture baseline production structural design picture.
    3. Assemble intention manufacturing structural design information.
    4. Act upon crack breakdown.
    5. Label nominee roadmap workings.
    6. Determination of collision transversely the infrastructural background.
    7. Demeanor prescribed stakeholder analysis.
    8. Confirm the industry construction.
    9. Plan a structural design description article.
  54. Aws Cloud Architect Interview Questions

  55. 33. Give An Example Of A Situation Where Your Team Or Organization Changed Their Goals Or Resources. How It Affected Your Work? What Was Your Response To The Same?

    Business concerns are constantly in instability. Almost fifty percent of CEB Enterprise structural design associates say that trade’s technique transforms regularly in the earlier period. But a lot of EA teams account that they battle to respond to these adjustments. To prevent lagging at the rear, EA needs engineers that can swiftly adjust as well as adjust to varying conditions.

  56. Hadoop Interview Questions

  57. 34. How The Togaf Creates Importance As A Skeleton For Enterprise Architecture?

    TOGAF has actually been developed via the collective initiatives of over 300 Architecture Forum member firms from some of the world’s leading companies. Making use of TOGAF cause business style that is consistent, mirrors the requirements of stakeholders, uses the optimum technique, as well as offers due factor to consider both to present requirements and also the viewed future requirements of the business.

    Establishing and also sustaining a venture design is a technically complicated procedure which includes several stakeholders and also verdict procedures in the company. TOGAF plays an important duty in standardizing the design growth process. TOGAF provides a best technique skeleton for including a word and makes it possible for the association to construct practicable and also monetary solutions which tackle their trade troubles and also anxieties.

  58. 35. Why Is The Enterprise Architecture So Important?

    The objective of enterprise architecture is to maximize across the venture the usually fragmented heritage of procedures into an incorporated environment that is receptive to transform and encouraging of the delivery of the business method. Today’s Chief executive officers recognize that the effective administration and exploitation of details through IT is a key aspect to business success, as well as a vital method of accomplishing competitive advantage.

    An enterprise architecture addresses this need, by supplying a calculated context for the evolution of the IT system in reaction to the regularly transforming requirements of the business setting. Additionally, a high-quality EA facilitates you to obtain the best symmetry in between IT performance as well as business development. It enables specific company devices to introduce securely in their pursuit of competitive advantage. At the same time, it guarantees the requirements of the company for an incorporated IT approach, allowing the closest possible concord throughout the extensive venture.

  59. 36. Give An Example To Achieve Hold Up For A Disliked Verdict. How Were You Able To Manage? And What Was Your Team’s Response? How Successful Were You To Convince Them To Participate?

    In a planet of unpredictability, architects should have the ability to decide, occasionally based on unfinished data, and afterward promote those conclusions with the groups as well as exterior stakeholders. When assessing prospects, find an aptitude to guide groups, and be clear that the prospect’s headship manner go with your managerial culture.

  60. MYSQL DBA Interview Questions

  61. 37. How Many Parts Are There In Togaf Document? Elaborate Their Roles?

    There are 7 parts in the TOGAF document. They are:

    Introduction-
    this part meant to describe the solution perception of venture structural design and to be particular to the TOGAF loom. It comprises the description of conditions utilized in TOGAF and also has the responsibility of detailing the modifications between the present edition and the former edition of this framework.

    ADM :
    ADM is a gradual method to develop a venture plan.ADM guidelines and procedures- this part blended with strategy and practices obtainable for exercise in implementing TOGAF and its ADM.

    Architecture Content Framework-
    together with a prearranged metamodel for infrastructural objects, the employment of recycled construction, structuring chunks, and an impression of representative construction realizations.

    Enterprise Continuum & Tools-
    in this particular part discussed regarding the suitable classifications and gears to sort out and amass the yields of structural design movement inside a venture.

    TOGAF reference models-
    this part permits you to select the infrastructural orientation figures, which comprises the TOGAF groundwork, and the III-RM model.

    Architecture capability framework-
    It talks about the organization, procedures, abilities, duties, and obligations required to develop as well as operate an architecture function within an enterprise.

  62. 38. Explain A Groundbreaking Thought You Used To Get The Solution Of Any Error In The Project. In What Way, The Concept Fluctuates From Standard Answers?

    Industry privileged people are much more likely to count on modern technology to boost yields and services than possible. CEB statistics demonstrate that approximately most of the technology investing in the ordinary business is exterior to IT, and so planners require to be adaptable sufficient to hold up these fresh ideas, many of which engage newer techniques.

  63. 39. Give An Example Of A Condition In Which You Convinced Someone To Do Your Analysis. How Did You Uphold Peoples’ Assurance?

    The amount of folks concerned in machinery pronouncements is enhanced, indicating that architects need to labor with a unique group of stakeholders, all with their very possessed inspiration as well as goals. Architects need to have powerful effecting capacities to make sure that EA satisfies its purposes. But many do not hit the top. CEB information tells that just 35% of them affect the stakeholders.

     

  64. 40. What Does The Architecture Content Framework Provide?

    • It is capable of providing the model of architectural work products in detail, along with the artifacts, deliverables and the architectural building blocks.
    • It drives for greater reliability in the output of TOGAF.
    • It offers an inclusive proof of structural design results.
    • It encourages improved incorporation of job apparatus.
    • It gives a thorough typical structural design.
    • It comprises of the detailed meta-model.
  65. Microsoft Azure Interview Questions

  66. 41. Define A Circumstance In Which You Worked With Organically Uncontrolled Individuals On A Project. In What Way You Coordinated The Team’s Hard Work With The General Purposes?

    The typical member of staff joins forces with 10 or even more individuals merely to achieve the daily job. Network routing, the ability to exchange in order to obtain a set of objectives, is as significant to industry prosperity as a single entity act. But merely 10% of IT staff members could be identified as network workers. Seek architects that develop worth by functioning mutually in a squad.

300+ TOP PyGTK Interview Questions [UPDATED]

  1. 1. What Is Pygtk?

    PyGTK (a.k.a python-gtk or gtk-python) is a set of bindings to the GTK+ user interface toolkit for the Python language. The main site to look for more information on these bindings is . There, new releases, news, reference docs, tutorials, applications built on top of.

    Python is an interpreted language with a very clean syntax, high-level data structures, dynamic typing, object oriented characteristics and generally acceptable performance.

    GTK+ is a graphical user interface toolkit, which includes user interface components (hereafter called by the usual name widgets) and a framework for handling events that are produced upon these components.

    A binding is code (usually a library) that allows you to access functions that were coded in another language. In our case, GTK+ was written in C, and applications written in C can use native GTK+. For a Python program to be able to create applications using the GTK+ framework, a special library has to be used. This library is PyGTK.

  2. 2. How Do I Get The Very Latest Pygtk Source Code [from Git]?

    PyGTK is kept in gnome git; the module name for PyGTK is “pygtk”. The module name for gnome-python is “gnome-python”, so to check it out, type:

      git clone git://git.gnome.org/pygtk

    and possibly:

      git clone git://git.gnome.org/gnome-python
      git clone git://git.gnome.org/gnome-python-desktop
      git clone git://git.gnome.org/gnome-python-extras

    Please note that to use PyGTK you rely on recent code for GTK+ , GLib, atk, pango, Python. How recent exactly these dependencies need to be depends largely on the current target for the PyGTK development team. In general, CVS HEAD will use the latest CVS, but ask on the mailing list if problems arise.


  3. Python Interview Questions

  4. 3. How Do I Extend Pygtk (or The Art Of Wrapping)?

    In order to make a new wrapper for PyGObject/PyGTK, you can use this FAQ as a guideline or checklist. Don’t miss out FAQ 6.3 which has a link to an online article, additionally.

    Let’s call the library “foo” (how original)

    1) foo.defs.

    • Use h2defs.py found in pyobject/codegen/ on all your _public_ headers for the library.

       h2defs.py /usr/include/foo-1.0/*.h > foo.defs

    2) foomodule.c

    • Use atkmodule.c as a template. Replace all instances of atk with foo.
    • You most probably won’t use any constants (since they require additional work), so just comment out pyatk_add_constants (m, “ATK_”);

    3) foo.override

    • You can also use atkmodule.c as a template for the override file.
    • Remove the only function in there (atk_relation_new) and replace the atk headers with your own.
    • Don’t forget to replace the modulename too.

    4) Makefile.am

      AUTOMAKE_OPTIONS=1.5
      INCLUDES = $(PYTHON_INCLUDES) $(FOO_CFLAGS)
      # foo module
      pyexec_LTLIBRARIES = foomodule.la
      foomodule_la_LDFLAGS = -module -avoid-version -export-symbols-regex initfoo
      foomodule_la_LIBADD = $(FOO_LIBS)
      foomodule_la_SOURCES = foomodule.c
      nodist_foomodule_la_SOURCES = foo.c
      foo.c: foo.defs foo.override
      CLEANFILES = foo.c
      EXTRA_DIST = foo.override
      .defs.c:
            (cd $(srcdir)
             && $(PYTHON) codegen/codegen.py
                –override $*.override
                –prefix py$* $*.defs) > gen-$*.c
            && cp gen-$*.c $*.c
            && rm -f gen-$*.c
     —

     Should be enough for you to get started

    5) configure.in

    • Copy pygobjects configure and remove unnecessary stuff. Should be trivial. Don’t forget to define a FOO_LIBS and FOO_CFLAGS

      PKG_CHECK_MODULES(FOO, foo >= 1.2,,)
      AC_SUBST(FOO_CFLAGS)
      AC_SUBST(FOO_LIBS)

    Finally, copy autogen.sh and hopefully you’ll have most functions wrapped.

    Eventually you’ll have to wrap a few functions by hand, functions that the code generator cannot handle. Mostly functions with inout params (**) and GSList/GList parameters.

  5. 4. How Do I Compile Pygtk Or Gnome-python From Svn?

    You need the GTK+ 2.x libraries, as you’d expect (see FAQ 21.2). There are three packages you want to build:

    • gnome-python/pygtk
    • gnome-python/pyorbit
    • gnome-python/gnome-python

    You should run

     ./autogen.sh
     make
     make install

    in each of these, in that order. If you want to build from SVN, you might want to look at a build script. James recommends jhbuild (also in GNOME svn).

    If you want to install them to a separate prefix, eg if you don’t have write access to /usr/local, use –prefix as an argument to autogen.sh or configure, eg:

      ./configure –prefix /home/user/prefix

    And then, don’t forget to set PYTHONPATH before running the program, eg:

      export PYTHONPATH=/home/user/prefix/lib/python2.3/site-packages

    Then you can finally run your program.


  6. Python Tutorial

  7. 5. How Do I Search Bugzilla For Pygtk Bugs?

    You may then specify the version, OS and any other relevant information.

    If I am trying to do a general query, it helps to “select all” in these boxes by clicking on the first entry and then shift clicking on the last entry. You may also want to activate all the ‘Status’ entries to see resolved bugs, etc.

    Once you have configured all these parameters, go to the Text information section, enter your search terms in the Description or Summary boxes, and click ‘Submit Query’.


  8. PHP Interview Questions

  9. 6. My Programs Configure Says: No Package ‘pygtk-2.0’ Found?

    That’s because the configure script can’t find the installed version of pygtk-2.0.

    If you build pygtk on your own, from source, then you need to write the following before running the configure script:

      export PKG_CONFIG_PATH=/usr/local/lib/pkgconfig

    Or, replace /usr/local with the prefix you installed pygtk to. /usr/local is however the default and most commonly used one.

    If you did not install it from source then it means that you forgot to install the devel/dev package. For Red Hat based distributions (Fedora, SuSe, Mandrake etc) you need to install pygtk2-devel and for debian based distributions you need to install pythonX.Y-gtk2-dev, where X.Y stands for the python version you’re using.

  10. 7. Is There A Pygtk For Macos X?

    There are two ways of running PyGTK on OS X.

    One way is running it with native support, which is still in early stages of development and is not feature complete yet. There are currently (as of June 2008) no available binaries for GTK+ running natively under OSX, so you need to compile GTK+ yourself. The instructions here tell you how to build GTK+, but not PyGTK; after following the steps here you also must do “jhbuild build meta-gtk-osx-python”.

    The second way is using Apple’s X11 server, which is closer to other Unix systems for portability, but won’t integrate very well with the rest of the OS X desktop. If you are running Mac OS X 10.3 (Panther) or above X11 is available as an optional feature from the install CDs.


  11. PHP Tutorial
    Ruby on Rails Interview Questions

  12. 8. Does Pygtk Have Timers?

    yes! The function you are looking for is gobject.timeout_add() (or gobject.timeout_add_seconds() for longer periods).

  13. 9. How Do I Install Pygtk-2 And Pygtk-0 Side By Side In The Same System?

    It used to be that if you installed PyGTK-2 and PyGTK-0.x in a same version of Python, the applications that required PyGTK-0.x would stop working. This happened because Python would import PyGTK-2 preferentially, and the names of the modules are the same: ‘gtk’.

    (There are three different ways detailed to solve this problem, but I will not recommend methods 2 and 3 unless you are unable to upgrade to a version that supports method 1).

    • Method 1 (the “pygtk.pth” method)

    (Note that RedHat 8.0 ships versions PRIOR to these, you will need to either upgrade the system packages, or use method 2 if you want to install PyGTK-0 and PyGTK-2 together on RH8.)

    James has added to pygtk a mechanism that allows installation of both pygtk and pygtk2 to work side by side. This method should be transparent – you can install both versions and simply require one or the other for each program you need (the default being the one you install last), as per faq 2.4. It is implemented by using a pygtk.pth file that indicates which is the default (which one `import gtk’ uses) version.

    Note that pygtk.pth only works if you use the *default python install path* – if you specify a –prefix to configure it will not work and you will *have to use method 2*!

    • Method 2 (PYTHONPATH):

    You can install the two conflicting versions to a different prefix. When configuring pygtk2, use something like:

     ./configure –prefix=/usr/local/gtk2/

    All pygtk2 files will be installed in this case to

     /usr/local/gtk2/lib/pythonX.Y/site-packages/

    With X.Y replaced by the major and minor numbers in your python version. You will then need to adjust PYTHONPATH (or sys.path) to look at the correct version for the program you want to run. If it requires pygtk2, you could use something like:

     export PYTHONPATH=/usr/local/gtk2/lib/pythonX.Y/site-packages/:$PYTHONPATH


  14. Ubuntu Certified Professional Interview Questions

  15. 10. If I Installed Pygtk-0 And Pygtk-2 In Parallel (using Pygtk.pth) How Do I Indicate Which One My Script Should Use?

    The new versions of PyGTK provide a pygtk module in which you can call a method require() that allows you to request one version or the other:

     pygtk.require(“1.2”) # for pygtk-0

    and

     pygtk.require(“2.0”) # for pygtk2

    Note that you should do this before importing the gtk or gnome modules:

     # To require 2.0 
     import pygtk
     pygtk.require(“2.0”)
     import gtk, gtk.glade, gnome, gnome.ui

    or:

     # To require 1.2
     import pygtk
     pygtk.require(“1.2”)
     import gtk, libglade, gnome, gnome.ui


  16. Ruby on Rails Tutorial

  17. 11. Which Versions Of Pygtk Support Parallel Install Using The Pygtk.pth Method?

    James Henstridge and Johan Dahlin implemented parallel install support in versions:

     
    – pygtk-0.6.10
     – gnome-python-1.4.3
     – pygtk2-1.99.13

    So any version equal to or later than that is fine. Note that 0.6.10 and 1.4.3 had bugs in it, and you should upgrade to 0.6.11 and 1.4.4 if possible.


  18. Django Interview Questions

  19. 12. For Some Users Import Libglade (or Gdk) Is Working And For Some Users It’s Not?

    It’s possible that at the top of your script you have #!/usr/bin/env python as the script interpreter line. This searches the path for python, instead of hardcoding it to particular place, which is useful. However, some systems have been found with multiple versions of Python, one of which works with GTK1 and one of which only works with GTK2.

    Figure out which one is working for your users, and change their script interpreter or path to use that one.


  20. Python Interview Questions

  21. 13. How Do I Get My 1.2 Gladefiles To Work With 2.0?

    There is a program included with libglade 2.0.x called libglade-convert that will do a pretty good job at converting the interface file to the new format. You should be able to edit the file in glade 1.1 after that.

    Dave notes that you will probably have to redo all your dialog boxes, since they are going to be converted without some of the GTK 2 things, such as the correct active area interface and GTK 2 button images. You’ll also have to redo your trees and lists to conform with GTK 2. A moderately sized project will take around 8 hours to do this to. Even if you don’t “make install” libglade 2.0.x, you can use the Python file included (but renamed) in the distribution.


  22. Django Tutorial

  23. 14. When I Connect To A Signal, My Handler Gets Called But Reports “xxx Takes No Arguments (1 Given)”?

    Signal callbacks have specific signatures. This means that when a signal is emitted, it will send to the callback function a number of parameters. The first parameter is the widget which generated the event, and the rest vary depending on what signal is being emitted.

    To handle a callback, your function signature, therefore, must take this into account. Often you don’t even want to use any of the arguments, just trigger an action on a certain signal; an easy way to do this is using a variable argument list (*args) and ignoring them in your method:

      def on_win_delete(*args):
        print “Deleted, and who cares why”

      w = gtk.Window()
      w.connect(“delete-event”, on_win_delete)

    If you are attaching to a method, be sure to provide the usual self in the method definition, and specifying self.on_foo_signal as the function to attach to.

  24. 15. How Do I Detect That A Mouse Or Keyboard Event Has Been Triggered?

    The correct way is to hook to some of the basic event signals and then act upon receiving them. The signals you want to look for are:

    • mouse motion
    • key presses
    • button presses

    However, many widgets don’t have their event masks properly set, so they will ignore these events. The following example shows how it should be done for a GtkWindow, adding the necessary event masks, and then hooking to the signals. Note that you would have to alter the wakeup function to handle the timer operations you would need for a screensaver.

     def wakeup(widget, event):
         print “Event number %d woke me up” % event.type

     w = gtk.Window()

     w.add_events(gtk.gdk.KEY_PRESS_MASK |
                  gtk.gdk.POINTER_MOTION_MASK |
                  gtk.gdk.BUTTON_PRESS_MASK | 
                  gtk.gdk.SCROLL_MASK)

     w.connect(“motion-notify-event”, wakeup)
     w.connect(“key-press-event”, wakeup)
     w.connect(“button-press-event”, wakeup)
     w.connect(“scroll-event”, wakeup)

     w.show()

     gtk.main()

    Note that mouse “scroll-wheel” events are implemented as button clicks in the Xorg X11R6 server (button 4 for scroll up, button 5 for scroll down).


  25. GNU Image Manipulation Program(GIMP) Interview Questions

  26. 16. I’ve Fiddled With The Mask But Nothing Happened. Why?

    One common error is to confuse gdk event TYPEs with MASKs. The type number indicates precisely which gdk event was generated, but it is not directly related to the event mask:

    yeah. A number of the masks cover multiple events and some events are selected by different masks

    All event mask constants end with _MASK, and that is a good rule to remember. When doing add_events, you do NOT want (see, no _MASK!):

     widget.add_events(gtk.gdk.MOTION_NOTIFY | gtk.gdk.BUTTON_PRESS)

    This is the correct command:

     widget.add_events(gtk.gdk.POINTER_MOTION_MASK | gtk.gdk.BUTTON_PRESS_MASK)

    (This example is particularly tricky because using BUTTON_PRESS will actually enable the pointer motion mask; this happens because the of the numeric constants used. Remember _MASK.)


  27. TurboGears Tutorial

  28. 17. Which Widgets Are Unable To Receive Events Or Be Styled?

    certain widgets didn’t have associated X windows, and for that reason were unable to handle events or be styled and coloured. These widgets are (add a Gtk in front if they look unfamiliar):

     Alignment
     AspectFrame
     Arrow
     Bin
     HBox
     VBox
     Frame
     Image
     Label
     Pixmap
     ScrolledWindow
     HSeparator
     VSeparator
     Table


  29. TurboGears Interview Questions

  30. 18. I Attach A Callback To A Signal, But I Keep Getting An Error: “typeerror: Object Of Type X Is Not Callable”?

    When connecting an event handler, you must provide the function name. A common mistake is to pass a call instead of the name. In other words, you should not add parenthesis after the function name.

     #
     # WRONG
     button = gtk.Button(label=”Quit”)
     button.connect(“clicked”, gtk.main_quit())

    As you can see, gtk.main_quit() is a call, not the function name. The correct way to do it would be:

     # RIGHT
     button = gtk.Button(label=”Quit”)
     button.connect(“clicked”, gtk.main_quit)

    Always remember to use gtk.main_quit() instead of gtk.mainquit() since the last one is deprecated.


  31. PHP Interview Questions

  32. 19. I Want My Callback To Execute, But Not The Default Callback (or, How To I Stop Gtk From Doing The Default Action When Doing X)?

    Many times, you are customizing behaviour of a widget, or changing a policy in GTK, and the default action it does it not what you want. To get around this, we rely on a fundamental point in GTK: that GTK, as well as applications, mainly uses signals to get things done in the interface.

    The process to disable a default action is:

    • Find out what signal is being emitted and handled by the default handler. Many times you already know the signal since you may be hooking to it already, and observing the default action happen after yours.
    • call widget.emit_stop_by_name(“signal_name”) (to stop the signal emission in the current widget)
    • return True (to make sure that the signal won’t propagate into parent handlers that may be the actual culprits for the default action)

    An example of this usage was reported by Graham Ashton. He had customized a keypress handler for a window, but every time the user triggered the Alt-arrow combination he was handling, the focus moved around between the widgets in the interface (as is the default behaviour).

    The solution was simply calling window.emit_stop_by_name(“key_press_event”) and returning True.


  33. Lisp programming Tutorial

  34. 20. When Creating A New Signal, How Do I Define One Of The Signal Arguments As Python Data?

    When you add your signal using gobject.signal_new(), use gobject.TYPE_PYOBJECT as the type for the argument being passed in:

        gobject.signal_new(“signal”, ClassName,
                           gobject.SIGNAL_RUN_LAST,
                           gobject.TYPE_NONE,
                           (gobject.TYPE_PYOBJECT,))

    And then you can emit the signal with Python objects:

        mydict = {}
        mydict[“foo”] = “bar”
        class_instance.emit(“signal”, mydict)

    And get them when you connect on the other side:

        def signal_cb(instance, mydict):
            print mydict[“foo”]

        class_instance.connect(“signal”, signal_cb)


  35. Lisp programming Interview Questions

  36. 21. How Do I Specify User Data To A Signal?

     widget.connect(“my_signal”, handler, userdata [, …])

    As you can see, you can pass as many items as userdata; the function will receive the same number of user data arguments.

  37. 22. Why Does Handling Expose Events Break Drag-n-drop?

    If you are calling

      queue_draw_area(x_beg, y_beg, x_end, y_end) 

    in your expose_event handler, don’t. It seems to break event propagation which causes drag and drop to not work any more.


  38. wxPython Tutorial

  39. 23. How Do I Pass Extra Data To A Signal Handler?

    The signal connection methods connect() and connect_after() take an optional third parameter that can be used to supply extra data to a signal handler callback. Any Python object can be passed so you can use a list, tuple or dictionary if you want to pass multiple extra values. Since the signal handler function will receive the widget that emitted the signal as its first parameter, often it’s convenient to pass a second related widget as the extra data.

    Suppose you have a dialog with an entry widget. If you want the dialog response handler to do something with the entry value, you could connect to the response signal like this

         dialog.connect(‘response’, on_dialog_response, entry)

    This lets you easily access methods of the entry widget in the signal handler, perhaps to get the text in the entry

         def on_dialog_response(widget, response, entry):
             if response == gtk.RESPONSE.ACCEPT:
                 print ‘Accepting’, entry.get_text()

    Something that might trip you up especially if you are new to Python programming is that you probably don’t want to try to pass the entry text to the signal handler like this

        # probably wrong!
        dialog.connect(‘response’, on_dialog_response, entry.get_text())

    The get_text() method is executed when the signal is connected so this would pass a constant value as the extra data. Usually you will want the signal handler to see the current state of the entry widget.


  40. wxPython Interview Questions

  41. 24. How To Construct My Own “fake” Gtk.gdk.event?

    It’s very easy. Let’s go create a keypress event that is the same as if the user has pressed Ctrl+Enter:

     event = gtk.gdk.Event(gtk.gdk.KEY_PRESS)
     event.keyval = gtk.keysyms.Return
     event.state = gtk.gdk.CONTROL_MASK
     event.time = 0 # assign current time
     widget_that_should_accept_signal.emit(‘key_press_event’, event)

    the last line “passes” the signal to the widget we want to handle this fake event.


  42. Ruby on Rails Interview Questions

  43. 25. How Do I Pass Data To A Signal Handler In Glade?

    In theory, you should fill in the Object column when specifying a callback to connect to the signal. In GtkBuilder mode, you may only specify objects that Glade knows about. This is sufficient for implementing such things as the encapsulation pattern demonstrated elsewhere in iit, used to provide a callback everything it needs to function in, for example, a cell renderer callback, by passing the TreeModel as user data.

    In practice, don’t even try. Pygtk 2 and Glade are both too buggy to attempt this. Manually connect any signals that need user data.

  44. 26. How Do I Change Font Properties On Gtk.labels And Other Widgets?

     label = gtk.Label(“MyLabel”)
     label.modify_font(pango.FontDescription(“sans 48”))

    This method applies to all widgets that use text, so you can change the text of gtk.Entry and other widgets in the same manner.

    Note that, some widgets are only containers for others, like gtk.Button. For those you’d have to get the child widget. For a gtk.Button do this:

      if button.get_use_stock():
         label = button.child.get_children()[1]
      elif isinstance(button.child, gtk.Label):
         label = button.child
      else:
         raise ValueError(“button does not have a label”)


  45. Basic C Interview Questions

  46. 27. Why Don’t My Style Changes Apply Only To The Widget I Requested It From?

    Ricardo Lenzi writes:

    get_style() returns an object what aways have the current style of widget. If you want to save an static style, use get_style().copy() instead:

     style = widget.get_style().copy()

    This has some pretty odd effects. If you are creating a window with many gtk.Label’s, for instance, and you alter the actual style object (not a copy() if it), all widgets will eventually change style (when they are redrawn by GTK+).


  47. Ubuntu Certified Professional Interview Questions

  48. 28. How Do I Use The Style Object?

    Each widget has an associates style object that can be manipulted. The basic method is get_style(), which returns a GtkStyle object, and the associated set_style(style_object).

    The style is shared between widgets of the same type (XXX: is this true?). To change the style of only one widget in your application, the style object offers a copy() method, which returns a new copy of the GdkStyle, which can me changed and set_style() back to the desired widget.

    All attributes of a style can be get and set independently by direct access. The most important attributes of style are the colours (see faq 4.6):

    • fg
    • bg
    • light
    • dark
    • mid
    • text
    • base
    • black
    • white

    And the font and bg_pixmap attributes.

  49. 29. How Do I Change The Colour Of A Widget (or How Do I Get A Gdkcolor)?

    There is some confusion about GdkColor and how it is created. There are both the GdkColor() class and colour_alloc() that seem to do the right thing, but they are both duds (as far as I can tell).

    The right way of creating a colour is getting the colormap from the widget and using it to allocate a new colour using the GtkColorMap’s alloc method:

     e = gtk.Entry()
     map = e.get_colormap()
     colour = map.alloc_color(“red”) # light red

    This way you end up with a red GdkColor in the variable colour. Apart from the X11 rgb.txt names, you can also use hex triplets:

     colour = map.alloc_color(“#FF9999”) # light red

    The next step is understanding how to manipulate GtkStyle’s colour attributes, which are actually dictionaries: each attribute maps a number of different gtk constants that indicate states:

    • gtk.STATE_NORMAL, the normal state of the widget.
    • gtk.STATE_ACTIVE, a clicked button or checkbutton, etc.
    • gtk.STATE_INSENSITIVE, when the widget is insensitive (set_sensitive(0))
    • gtk.STATE_PRELIGHT, when onmouseovered
    • gtk.STATE_SELECTED, when part of the widget is selected (text in a GtkEntry, or a selected radiobutton)

    So, to change the default border of our entry above to red:

     style = e.get_style().copy()
     style.bg[gtk.STATE_NORMAL] = colour
     e.set_style(style)

    Final hint: the default colour for a GtkEntry background is gray84.


  50. Python Automation Testing Interview Questions

  51. 30. How Do I Get A Graphics Context, Or Gdkgc?

    Use the new_gc() method of GdkWindow (not GtkWindow, notice):

     gdkwin = widget.window
     gc = gdkwin.new_gc()

  52. 31. How Does The Alloc() Method To The Gdkcolormap Work?

    gdk.Colormap.alloc_color can take a number of formats:

     cmap = widget.get_colormap()
     color = cmap.alloc_color(“#FFCCAA”)
     color = cmap.alloc_color(“red”)
     color = cmap.alloc_color(0, 0, 65535)

    Note that the third format uses a tuple to specify the individual values for Red, Green and Blue (RGB), each item being an integer from 0 to 65535 (corresponding, therefore, to 0x0-0xFF).

  53. 32. How Do I Use Pango Instead Of Gdkfont For Font Handling In A Gtkdrawingarea?

    Create a font description with pango. You will then need a pango layout for the text you want to display. You have to tell the layout which font description to use and draw it with the draw_layout() method instead of the draw_text() method.

     import pango

     # create a font description
     font_desc = pango.FontDescription(‘Serif 12’)

     # create a layout for your drawing area
     layout = darea.create_pango_layout(‘hello pango!’)

     # tell the layout which font description to use
     layout.set_font_description(font_desc)

     # draw the text with the draw_layout method
     darea.window.draw_layout(gc, x, y, layout)

    You can find out about the size of the text by using the get_pixel_size() method from your pango layout object. e.g.:

     # get the pixel size of a layout
     text_width, text_height = layout.get_pixel_size()

  54. 33. How Do I Get Antialiased Fonts In Gtk+?

    The original core font rendering engine in XFree86 didn’t support AA fonts. However, for GTK+ 2.0 onwards, the Xft font rendering backend can be used to render antialiased fonts. To select it using GTK+2.0, use:

     export GDK_USE_XFT=1 

    It’s on by default on 2.2 onwards, and in 2.4 the core engine is no longer used by GTK+.

    Note that the Xft backend is much better at producing scaled versions of the fonts. The reason is that the core X font system, when you use scalable fonts, will render the entire set of glyphs as bitmaps at the requested size when you open the font (which isn’t fast or a good use of memory — it quite large for big point sizes or fonts with large coverage, such as with Asian fonts).


  55. Django Interview Questions

  56. 34. Does Pygtk Support Truetype Fonts?

    If your X server does, the answer is yes. X requires the freetype module be loaded to be able to handle TTF fonts, but all post-4.0 servers include the module by default.

  57. 35. What Units Does Pango Use To Define Sizes And Widths?

    Pango uses a constant called pango.SCALE to convert between pixels and pango’s native unit. You can use pango.PIXELS() to convert from the native unit back to pixels, or just divide.

  58. 36. Can I Find Out How Long (wide) A String Is In A Certain Font?

    In PyGTK2, you can use pango calls to find out how wide a string will be, using the pango context of the widget that contains (or that will contain) your text:

       context = widget.get_pango_context()
       metrics = context.get_metrics(‘font name, 12’)
       width = pango.PIXELS(metrics.get_approximate_char_width() * n_chars)

    For a monospaced font, this should be quite accurate. You can then use widget.set_size_request() if you would like to set that width as the minimum width for the widget/view.

    In PyGTK-0.6, you can ask the font directly how long a given string is going to be, as well as how high. Retrieve the font object from the style, and then query it with the string in question:

      font = widget.get_style().font

      h = font.height(my_string)
      w = font.width(my_string)

    The methods return pixel counts. You can then set the size manually to any function of those parameters. For instance, to make a widget twice as wide and as high as the string you measured with, use:

      widget.set_usize(w*2, h*2)


  59. GNU Image Manipulation Program(GIMP) Interview Questions

  60. 37. Why Does Fontselection’s Set_font_name Return False?

    It needs to be added to a window before the font lists are populated.

      >>> w = gtk.Window()
      >>> f = gtk.FontSelection()
      >>> f.get_font_name()
      ‘Sans 10’
      >>> f.set_font_name(‘Sans 12’)
      False
      >>> w.add(f)
      >>> f.set_font_name(‘Sans 12’)
      True

    Once added to the window, the result will indeed be True.

  61. 38. Can I Pass Strings Of Unicode Instance To Gtk Or Do I Need To Convert Them To Utf8?

    No you don’t have do manually convert your strings in utf8. PyGTK will do this for you.

        label.set_text(u’abc’)

    So the above is indeed valid and not only to labels but to any widget.

  62. 39. How Do I Check If A Widget Is Currently Sensitive?

    In pygtk, you get properties by calling the get_property() method:

     
    if widget.get_property(‘sensitive’) == 0:
        print “I’m insensitive!”

    Note:
    In ancient versions of pygtk (0.6.x) you could access them using a dictionary interface, this was removed in the 2.x series.

    More recently (since PyGTK 2.8) the following method can be used:

      if not widget.props.sensitive:

        print “I’m insensitive!”

  63. 40. Where Is Get_state() In Pygtk 0.6.x?

    James Henstridge points out that there is no get_state() function in gtk 1.2.

    And therefore no way to wrap it in pygtk. There are actually a number of state constants defined in gtk:

     gtk.STATE_ACTIVE
     gtk.STATE_NORMAL
     gtk.STATE_SELECTED
     gtk.STATE_INSENSITIVE
     gtk.STATE_PRELIGHT     

    but they are to be used with set_state(). In pygtk2, get_state() is implemented and wrapped.


  64. TurboGears Interview Questions

300+ TOP Web Icons Interview Questions – Answers

    1. 1. What Is Web Icon?
      Web Icon is a symbol that is used to represent a specific action or a capability on a webpage. It is used in documents as well as applications.

 

    1. 2. How Can We Link The Font Library?
      We can link the font library in HTML head sections.
      Example:
       
       
      href=”https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/font-awesome.min.css”>
       

 
HTML Interview Questions

    1. 3. What Are The Web Icons Fonts?
      Web Icons fonts are:

      • Font Awesome
      • Bootstrap Glyphicons
      • Google’s Material Icons

 
 

    1. 4. What Are The Advantages Of Web Icons?
      There are following features of Web Icons:

      • It is easy to use.
      • We have to download only Library font files.
      • It helps to web developers to build an Icon.
      • All web icons used within HTML tag.

 
HTML Tutorial

    1. 5. How Can We Use Font Awesome Icons?
      We can use web icons by using HTML element.
      Example:
       
       
       
      href = “https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/font-awesome.min.css”>
       
       
       
       
       

 
HTML 5 Interview Questions

    1. 6. How Can We Define The Font Awesome Icons Size?
      We can define the size of Icons by using following codes:
      Example:
       
       
       
      href = “https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/font-awesome.min.css”>

       
       
       
       
       

 
 

    1. 7. What Are The Icons Provide By Font Awesome?
      Font Awesome provides 519 Icons.
      There are some following categories:

      • Web Application Icons
      • Hand Icons
      • Transportation Icons
      • Gender Icons
      • File Type Icons
      • Spinner Icons
      • Form Control Icons
      • Payment Icons etc

 
HTML 5 Tutorial
Flash Interview Questions

    1. 8. What Are The Various Form Control Icons And Their Use?
      There are various from control icons:

      • etc.

 
 

    1. 9. What Are Material Icons?
      Material Icons are simple and support all modern web browsers. It is based on vector. It uses font (Library) class material-icons.
      Example:
       
       
       

 
Graphic Design Interview Questions

    1. 10. How Many Icons Font Provided By Material?
      Material provides 519 icons, following are given below:

      • Action Icons
      • Alert Icons
      • AV Icons
      • Communication Icons
      • Content Icons
      • Image Icons
      • Maps Icons
      • Navigation Icons
      • Notification Icons
      • Social Icons
      • Toggle Icons etc.

 
Flash Tutorial

    1. 11. What Is Bootstrap Glyphicons And How To Load The Font (library)?
      Bootstrap Glyphicons is a library of monochromatic icons. It provides 250 glyphs in font format. It is loaded the font with head HTML tag.
      Example:
       
       
      href = http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/bootstrap.min.css>
       

 
Illustrator Interview Questions

    1. 12. How Can We Define The Size Of Glyphicons Icons In Bootstrap?
      We can define the size of Glyphicons Icons in Bootstrap by using following codes:
      Example:
       
       
       
      href = “http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/bootstrap.min.css”>
      i.mysize {font-size: 6em;}
       
       
       
       
       

 
 
HTML Interview Questions

    1. 13. What Are The Types Of Material Social Icons And Its Use?
      There are following types of Material Social Icons:

      • cake
      • group
      • public
      • school
      • share etc

 
CSS Advanced Tutorial

    1. 14. How Can We Use Payment Icons By Using Font Awesome?
      We can use payment icons by using Font Awesome:

      • etc.

 
 

300+ TOP VSAM Interview Questions – Answers

  1. 1. What Is Vsam?

    VSAM stands for Virtual Storage Access Method. It’s a Data Management method used to organize, store, catalog, retrieve and delete the datasets in mainframe system (VSAM and Non-VSAM). This access method makes it easier for an application to execute an I/O operation (moving data between an I/O device and memory). In fact VSAM is the first access method designed for Virtual Storage Environment.

    VSAM supports fixed as well as variable length records. These records are placed in blocks of Control Intervals and these control intervals are further placed as Control Area (CA consists of multiple CIs).

  2. 2. What Are The Advantages Of Vsam?

    • Accessing the data is faster and easier.
    •  VSAM supports more dataset types.
    • Supports variety of I/O Techniques.
    • Improves Efficiency.
    • Records can be accessed sequentially or randomly.

  3. IBM – VSAM Interview Questions

  4. 3. What Are The Disadvantages Of Vsam?

    • VSAM Datasets require more storage space compared to other type of datasets due to Control information(CI) present in them.
    • VSAM can’t be stored in TAPE Volume i.e., VSAM Stored only in DASD.
    • VSAM is not a database like DB2, IMS DB & IDMS.
  5. 4. What Is Purpose Of Vsam?

    VSAM acts as an interface between Application program & Operating System.


  6. File Maker Tutorial

  7. 5. What Is The Maximum Record Length For The Vsam Dataset?

    Max size of a record in VSAM is cylinder = 2880 bytes approx.


  8. JCL Interview Questions

  9. 6. What Is File Status In Vsam?

    The File STATUS clause of the FILE-CONTROL paragraph allows for each file to be associated with afile status key (i.e., the 2-character data item specified in the FILE STATUS clause). If the FILE STATUS clause is specified for a given file, a value indicating the status of each I/O operation against that file is placed in the accociated file status key. This value is stored in the file statuskey as soon as the I/O operation is completed (and before execution of any EXCEPTION/ERROR declarative or INVALIDKEY/AT END phrase associated with the I/O request).
    Note:
    This element may behave differently when the CMPR2 compiler option is used. The file statuskey is divided into two status keys: the first character is known as file status key1; the second character is file status key 2.

  10. 7. What Is The Length Of A Rdf?

    3 Bytes


  11. IBM DB2 Tutorial
    File Maker Interview Questions

  12. 8. What Is The Length Of A Cidf?

    4 Bytes

  13. 9. What Is The Maximum Size Of A Ci (control Interval)?

    32 KBytes (32 * 1024* 8)


  14. IBM DB2 Interview Questions

  15. 10. What Are The Different Types Of Vsam Files Available?

    ESDS: Entry Sequence Data Set
    KSDS: Key Sequence Data Set
    RRDS: Relative Data Set


  16. COBOL Tutorial

  17. 11. What Is Idcams ?

    IDCAMS is the Access Method Services program. You run the IDCAMS program and supply AMS commands thru SYSIN. (examples of AMS commands are DELETE, DEFINE, REPRO etc..).


  18. COBOL Interview Questions

  19. 12. Can Ams Commands Be Run From The Tso Prompt ?

    Yes


  20. IBM – VSAM Interview Questions

  21. 13. Under Idcams , Multiple Functions Can Be Executed, Each Of Which Returns A Cond Code. What Will Be The Condition Code Returned To The Operating System ?

    The maximum condition code generated is returned as the condition code of the IDCAMS step.


  22. IBM-JCL Tutorial

  23. 14. What Is Control Interval, Control Area ?

    Control Interval is analogous to a physical block for QSAM files. It is the unit of i/o. Must be between 512 bytes to 32 k. Usually either 2K or 4K. A larger control interval increases performance for sequential processing while the reverse is true for random access. Under CICS when a record is locked, the entire CI gets locked. Control area is a group of control intervals. CA is used during allocation. CA size is calculated based on the allocation type (cyl, tracks or records) and can be max of 1 cylinder.

  24. 15. What Is Freespace ?

    Coded in the DEFINE as FREESPACE(ci ca) where ci is the percentage of each control interval to be left free for insertions, ca is the percentage of control intervals in each control area to be left empty.


  25. IBM-JCL Interview Questions

  26. 16. How Do You Decide On Optimum Values For Ci, Freespace Etc..?

    CI size should be based on record length, type of processing. Usually CI is 4K. If record length is larger(>1K), chose 6K or 8K. FREESPACE should be large if more number of insertions are envisaged. Usual values are (20,20) when heavy updates are expected. CI size can be calculated.


  27. DB2 Using SQL Tutorial

  28. 17. Would You Specify Freespace For An Esds?

    No. Because you cannot insert records in an ESDS, also when you rewrite a record, it must be of the same length. Thus putting any value for freespace does not make any sense.


  29. DB2 Using SQL Interview Questions

  30. 18. What Is Shareopts ?

    SHAREOPTS is a parameter in the DEFINE and specifies how an object can be shared among users. It is coded as SHAREOPTS(a b), where a is the cross region share option ie; how two or more jobs on a single system can share the file, while b is the cross systemshare option ie how two or more jobs on different MVSes can share the file. Usual value is (2 3).


  31. JCL Interview Questions

  32. 19. What Is The Meaning Of Each Of The Values In Shareopts(2 3)?

    Value of 2 for cross region means that the file can be processed simultaneously by multiple users provided only one of them is an updater. Value of 3 for cross system means that any number of jobs can process the file for input or output (VSAM does nothing to ensure integrity).


  33. IBM Mainframe Tutorial

  34. 20. How Do You Define A Ksds ?

    DEFINE CLUSTER(cluster name) with the INDEXED parameter. Also specify the ds name for the DATA component & the ds INDEX component. Other important parms are RECORDSIZE, KEYS, SHAREOPTIONS.


  35. IBM-JCL&VSAM Interview Questions

  36. 21. What Happens When You Open An Empty Vsam File In A Cobol Program For Input?

    A VSAM file that has never contained a record is treated as unavailable. Attempting to open for input will fail. An empty file can be opened for output only. When you open for output, COBOL will write a dummy record to the file & then delete it out.

  37. 22. How Do You Initialize A Vsam File Before Any Operation? A Vsam With Alternate Index?

    Can write a dummy program that just opens the file for output & then closes it.


  38. IMS/DB Tutorial

  39. 23. What Does A File Status Of 02 On A Vsam Indicate?

    Duplicate alternate key . Happens on both input and output operation.


  40. IBM Mainframe Interview Questions

  41. 24. What Is The Difference Between Sequential Files And Esds Files?

    Sequential(QSAM) files can be created on tape while ESDS files cannot. Also, you can have ALTINDEX for an ESDS while no such facility exists for QSAM files.


  42. File Maker Interview Questions

  43. 25. How Do You Load A Vsam Data Set With Records ?

    Using the REPRO command.

  44. 26. How Do You Define A Gdg ?

    Use the DEFINE GENERATIONDATAGROUP command. In the same IDCAMS step, another dataset must be defined whose DCB parameters are used when new generations of the GDG are created. This dataset is known as the model dataset. The ds name of this model dataset must be the same as that of the GDG, so use a disp of keep rather than catlg and also specify space=(trk,0).


  45. COBOL, CICS, JCL, VSAM, DB2 Interview Questions

  46. 27. Do All Versions Of The Gdg Have To Be Of The Same Record Length ?

    No, the DCB of the model dataset can be overridden when you allocate new versions.


  47. IBM DB2 Interview Questions

  48. 28. How Are Different Versions Of Gdg Named ?

    base-file-name.GnnnnnV00 where nnnn= generation number (upto 255). nnnn will be 0000 for the 1st generation.

  49. 29. Suppose 3 Generations Of A Gdg Exist. How Would You Reference The 1 St Generation In The Jcl?

    Use GDG name(-2).


  50. Cisco Interview Questions

  51. 30. Suppose A Generation Of Gdg Gets Created In A Particular Step Of A Proc. How Would You Refer The Current Generation In A Subsequent Step? What Would Be The Disposition Of This Generation Now?

    Relative generation numbers are updated only at the end of the job, not at the end of a step. To allocate a new generation, we would be using (+1) with a DISP of (NEW,CATLG,DELETE). To refer to this in a subsequent step in the same job, we would again use (+1) but with a DISP of SHR or OLD.

  52. 31. What More Info You Should Give In The Dd Statement While Defining The Next Generation Of A Gdg?

    Give (+1) as the generation number, give (new,catlg) for disp, give space parameter, can give the dcb parameter if you want to override the dcb of the model dataset.

  53. 32. Assuming That The Define Jcl Is Not Available, How Do You Get Info About A Vsam File’s Organisation ?

    Use the LISTCAT command.


  54. IMS/DB Interview Questions

  55. 33. During Processing Of A Vsam File, Some System Error Occurs And It Is Subsequently Unusable .what Do You Do ?

    Run VERIFY.


  56. COBOL Interview Questions

  57. 34. If Fspc(100 100) Is Specified Does It Mean That Both The Control Interval And Control Area Will Be Left Empty Because 100 % Of Both Ci And Ca Are Specified To Be Empty?

    No, they would not be left empty. one record will be written in each CI and 1 CI will be written for each CA.

  58. 35. What Is A Base Cluste?

    The Index and data components of a KSDS.

  59. 36. What Is The Rrn For The First Record In Rrds?

    1


  60. IBM-JCL Interview Questions

  61. 37. How Many Times Secondary Space Allocated?

    122 TIMES

  62. 38. What Is The Device Independent Method To Indicate Where A Record Is Stored?

    By USING RBA (Relative Byte Address).

  63. 39. What Is The Biggest Disadvantage Of Using A Vsam Dataset?

    FREE SPACE ( FPSC )

  64. 40. How Many Buffers Are Allotted To Vsam Ksds And Esds?

    2 data buffers by default for ESDS. For KSDS it allots 2 data buffers and 1 index buffers. each buffer is about 4K.


  65. DB2 Using SQL Interview Questions

  66. 41. What Is An Alternate Index And Path?

    An alternate index is an another way of accessing key sequenced data record stored in a base cluster and path is the linkage which connect alternate index to its base cluster.

  67. 42. Is A Delete Operation Possible In An Esds? B, Is Rewrite Operation Possible In Esds?

    No delete operation is not possible in VSAM ESDS.B. yes rewrite operation is possible in an ESDS.


  68. IBM-JCL&VSAM Interview Questions

  69. 43. What Is The Difference Between Lds And Esds?

    There two datasets are VSAM datasets. ESDS maintains control information. But LDS does not maintains the control information.

  70. 44. How To Delete A Member Using Jcl?

    Using IDCAMS a member can be deleted. DELETE XXX.YYY (member)

  71. 45. What Is Idcams? And What Is The Purpose Of It?

    IDCAMS is an access method services utility used for creating, deleting, altering VSAM files and copying sequential file to a VSAM file, etc.

  72. 46. What Are The Optional Parameters To The Input Dataset While Loading The Empty Cluster With The Data Records?

    1) FROMADDRESS(address)
    2) TOADDRESS(address) where ‘address’ specifies the RBA value of the key of the input record.
    3) FROMNUMBER (rrn)
    4)TONUMBER (rrn) where ‘rrn’ specifies the relative record number of the RRDS record
    5) FROMKEY (key)
    6) TOKEY (key) where ‘key’ specifies the key of the input record
    7) SKIP (number)
    8) COUNT (number) where ‘number’ specifies the number of records to skip or copy Ex: REPRO INFILE(DD1) OUTFILE(DD2) SKIP(9000) COUNT(700)-Skips the first 9000 records and begin copying at 9001 and copies 700 records from DD1 to DD2.

  73. 47. What Does The Keyranges Parameter In Define Cluster Commends Do?

    It divides a large dataset into several volumes according to the Key ranges specified. e.g. KEYRANGES ((0000001 2999999) (3000000 5999999)). if the activity on the key ranges are evenly distributed, concurrent access is possible, which is a performance inprovement.

  74. 48. Describe Shareoptions Parameter (shr) In Define Cluster Command?

    It define the cross-region and cross-system sharing capabilities of the dataset. Syntax is SHR (Crvalue, CSvalue) value 1 means multiple read OR single write (read integrity ) 2 means multiple read AND single write ( Write integrity ) 3 means Multiple read AND multiple write 4 is same as 3, which refreshes the buffer with every random access defualt is SHR(1 3).

  75. 49. What Is Recovery And Speed Parameters In Define Cluster Command?

    RECOVERY (default ) and SPEED are mutually exclusive. Recovery performats the control areas during the initial dataset load, if the job fails, you can restatt but you must have a recovery routine already written to restart the job. SPEED does not preformat the CAs. It is recommended that you specify SPEED to speed up your initial data load.

  76. 50. Is It Slower If You Access A Record Through Alt Index As Compared To Primary Index?

    Yes. Why? Because the alternate key would first locate the primary key, which in turn locates the actual record. Needs twice the number of I/Os.

  77. 51. How Many Alternate Indexes You Can Have On A Dataset?

    255 – but you must be a nut to have so many ALT Indexes on a dataset !

  78. 52. On Which Dataset You Can Have Alt Index?

    only on KSDS and ESDS – not RROS

  79. 53. What Is The Meaning Of Vsam Return-code 28?

    Out of space condition is raised.

  80. 54. How Do You Fix The Problem Associated With Vsam Out Of Space Condition?

    Define new VSAM dataset allocated with more space.
    Use IDCAMS to REPRO the old VSAM file to new VSAM dataset.
    Use IDCAMS to ALTER / rename the old VSAM dataset or se IDCAMS to DELETE the old VSAM datset.
    Use IDCAMS to ALTER / rename the new VSAM dataset to the name of the original VSAM dataset.

  81. 55. During Processing Of A Vsam File, Some System Error Occurs And It Is Subsequently Unusable What Do You Do?

    Run VERIFY.

  82. 56. How Are Different Versions Of Gdg Named?

    base-file-name. GnnnnnnV00 where nnnn=generation number (upto 255). nnnn will be 0000 for the 1st generation.

  83. 57. How Do You Define A Gdg?

    Use the DEFINE GENERATIONDATAGROUP command. In the same IDCAMS step, another dataset must be defined whose DCB parameters are used when new generations of the GDG are created. This dataset is known as the model dataset. The DS name of this model dataset must be the same as that of the GDG, so use a disp of keep rather than catlg and also specify space = (trk,0).

  84. 58. How Do You Calculate Record Size Of An Alternate Cluster? Give Your Values For Both Unique And Nonunique?

    UniqueCase: 5 + (alt-key-length + primary – key )
    Non unique Case: 5 + (alt-key-length + n * primary – key ) where n = number of duplicate records for the alternate key.

  85. 59. How Do You Load A Vsam Data Set With Records?

    Using the REPRO command.

  86. 60. Do All Versions Of The Gdg Have To Be Of The Same Record Length?

    No, the DCB of the model dataset can be overridden when you allocate new versions.

  87. 61. Suppose 3 Generations Of A Gdg Exist. How Would You Reference The 1st Generation In The Jcl?

    Use GDG name(-2).

  88. 62. Assuming That The Define Jcl Is Not Available, How Do You Get Info About A Vsam Files Organisation?

    Use the LISTCAT command.

  89. 63. Using Alternate Indexes In Cics Program?

    FCT entires must be created for both base cluster and the path. To read using the alternate index, use the DD name of the path in CICS file control commands.

  90. 64. Using Alternate Indexes In Batch Program?

    In the JCL, you must have DD statements for the cluster and for the path9s). In the COBOL program, SELECT … ASSIGN TO ddname for base cluster RECORD KEY IS… ALTERNATE RECORD KEY IS.

  91. 65. What Is A Lds (linear Data Set) And What Is It Used For?

    LDS is a VSAM dataset in name only. It has unstructured 4k (4096 bytes ) fixed size CT’s which do not contain control fields and therefore from VSAM’s standpoint they do not contain any logical records. There is no free space, and no access from Cobol. Can be accessed by DB2 and IMS fast path datasets. LDS is essentially a table of data maintained on disk. The ‘table entries’ must be created via a user program and can only be logically accessed via a user program. When passed, the entire LDS must be mapped into storage, and then data is accessed via base and displacement type processing.

  92. 66. What Is The Meaning Of The Define Model Parameter?

    It specifies whether Daniela Pestova or Yamila – oops! Wrong models! The MODEL parameter allows you to model your cluster by modeling it after an existing cluster.

  93. 67. What Are The Three Levels Of Definition For The Vsam Define?

    They are DEFINE CLUSTER, DATA and INDEX.

  94. 68. What Is The Utility Program Closely Associated With Vsam?

    IDCAMS, the access mehtod services utility.

  95. 69. What Is The Vsam-code Field?

    It is a COBOL II enhancement to VSAM batch processing expanding the FILE STATUS field. It is defined in WORKING-STORAGE as a six byte group item with three two byte elements, the normal return code, the function code and the feedback code.

  96. 70. What Is The Meaning Of Dynamic Processing?

    It’s rarely used. It means one program uses both sequential and random processing for a VSAM KSDS file.

  97. 71. Under Idcams, Multiple Functions Can Be Executed, Each Of Which Returns A Condition Code. What Will Be The Condition Code Returned To The Operating System?

    The maximum condition code generated is returned as the condition code of the IDCAMS step.

  98. 72. Would You Specify Freespace Ce For An Esds?

    No. Because you cannot insert records in an ESDS, also when you rewrite a record, it must be of the same length. Thus putting any value for FREESPACE does not make any sense.

  99. 73. What Is The Meaning Of Each Of The Values In Shareopts (2 3)?

    Value of 2 for cross region means that the file can be processed simultaneously by multiple users provided only one of them is an updater. Value of 3 for cross system means that any number of jobs can process the file for input or output (VSAM does nothing to ensure integrity).

  100. 74. How Do You Define An Altindx? How Do You Use Altindxs In Batch, Cics Programs?

    DEFINE ALTERNATEINDEX. Important parameters are RELATE where you specify the base cluster name, KEYS, RECORDSIZE, SHAREOPTION, UNIQUEKEY (or NONUNIQUEKEY), DATA (DS NAME for the data component), INDEX(DS name for the index component). Then DEFINE PATH. Important paramters are NAME (DS name for the path). PATHENTRY (DS name of the alternate index name). UPDATE (or NOUPDATE) which specifies whether an ALT index is updated when a update to the vase cluster takes place. Then BLDINDEX. Paramters are INDATASET (DS name of base cluster), OUTDATASET (DS name of AIX).

  101. 75. Name Some Common Vsam Error Conditions And Codes?

    They are end of file (10), duplicate key (22), record not found (23), VSAM logic error (90), open problem (92) and space problem (93).

  102. 76. What Is A Vsam Slot?

    A relative record dataset (RRDS) consists of a specified number of areas called slots. Each slot is identified by a relative record number (RRN) which indicates its relative position in the file.

  103. 77. There Are At Least Seven Idcams Commands Name And Explain Each Of Them?

    ALTER modifies information for a catalog, alternate index, cluster or path. BLDINDEX builds the alternate index, of course. DEFINE is used for ALTERNATEINDEX, CLUSTER or PATH. DELETE removes the catalog entry for a catalog, cluster, alternate index or path. LISTCAT lists information about the dataset. PRINT prints the dataset contents. REPRO copies records from one file to another.

  104. 78. What Is The Significance Of The Shareoptions Parameter?

    It specifies how the file may be shared between jobs and between batch and CICS environments.

  105. 79. If You Wish To Use The Rewrite Command How Must The Vsam File Be Opened?

    It must be opened as I/O.

  106. 80. What Is The Cobol Record Key Clause?

    The RECOED KEY in the SELECT clause identifies the files primary key as it will be known to the program.

  107. 81. In The Cobol Select Statement What Is The Organization For A Ksds?

    The ORGANIZATION is INDEXED.

  108. 82. What Is The Base Cluster?

    The base cluster consists of the data component and the index component for the primary index of a KSDS.

  109. 83. What Is Free Space?

    Free space is reserved within the data component of a KSDS to accommodate inserting new records.

  110. 84. What Is A Path?

    A path is a file that allows you to access a file by alternate index – the path provides an association between the AIX and the base cluster.

  111. 85. What Is A Ci, Control Interval?

    A control interval is the unit of information that VSAM transfers between virtual and auxilliary storage.

  112. 86. What Is A Ca, Control Area?

    A group of control intervals makes up a control area.

  113. 87. What Is The Index Set?

    This is the other part of the index. It has multiple levels with pointers that ultimately reach to the sequence set.

  114. 88. What Is The Catalog?

    The catalog contains the name of all datasets. VSAM and non-VSAM. It is used to access these datasets.

  115. 89. What Is The Purpose Of The File Status Clause In The Select Statement?

    The FILE STATUS field identifies the field that VSAM uses to provide information about each I/O operation for the file.

  116. 90. In The Cobol Select Statement For A Ksds What Are The Three Possibilities For Access?

    ACCESS can be SEQUENTIAL, RANDOM or DYNAMIC.

  117. 91. Do Primary Key Values Have To Be Unique? Do Alternate Key Values Have To Be Unique?

    Primary key values must be unique; alternate key values need not be.

  118. 92. What Is A Vsam Split?

    If there isn’t enough space in the control interval VSAM performs a control interval split by moving some records to the free control intervals. If there isn’t a free control interval VSAM performs a control area split by allocating a new control area and moving half of the control intervals to it.

  119. 93. What Is The Upgrade Set?

    The upgrade set is the list of all AIXes that VSAM must maintain for a specific base cluster, so that when data in the base cluster is updated, the AIX files are also updated.

  120. 94. What Is An Alternate Index?

    An AIX is a file that allows access to a VSAM dataset by a key other than the primary one.

  121. 95. What Is A Cluster?

    A cluster is the combination of the index, sequence set and data portions of the dataset. The operating system gives program access to the cluster, ie; to all parts of the dataset simultaneously.

  122. 96. What Is A Sequence Set?

    This is the part of the index that points to the CA and CI of the record being accessed.

  123. 97. What Are The Distinctive Features Of A Ksda, Key Sequenced Dataset?

    The index and the distributed free space.

  124. 98. How Are Records Stored In An Esds, Entry Sequenced Dataset?

    They are stored without respect to the contents of the records and in the order in which they are included in the file.

  125. 99. What Are The Types Of Vsam Datasets?

    Entry sequenced dataset (ESDS), key sequenced datasets (KSDS) and relative record dataset (RRDS).

  126. 100. Syntax Of Ams Modal Commands?

    Note:
    these can be used only under IDCAMS and not from the TSO prompt.

    IF LASTCC(or MAXCC) >(or <,= etc..) value -
    THEN –
    DO –
    command set (such as DELETE, DEFINE etc..)
    ELSE –
    DO –
    command set.

    LASTCC – Condition code from the last function(such as delete) executed.
    MAXCC – Max condition code that was returned by any of the prev functions.
    SET is also a valid AMS command. SET LASTCC (or MAXCC) = value.
    The maximum condition code is 16. A cond code of 4 indicates a warning. A cond code of 8 is usually encountered on a DELETE of a dataset that is not present.