300+ [REAL TIME] McAfee ePO Admin Interview Questions

  1. 1. What Is Mcafee Epo ?

    McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.

    A single console for all your security management.

    • Get a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks.
    • Simplify security operations with streamlined workflows for proven efficiencies.
    • Flexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.
    • Leverage your existing third-party IT infrastructure from a single security management console with extensible architecture.
  2. 2. Which Is Latest Version Of Epo ?

    The latest version of McAfee products

    • ePolicy Orchestrator Ver 5.3.1
    • Virus Scan Enterprise VSE 8.8 Patch 6
    • McAfee Agent 5.0.1

    To determine the ePO version number when you are logged on to ePO:

    ePO 5.x:
    The version number is shown on the left pane of the Menu screen.

    You can also determine the version by checking the version information contained within the server.ini file on the ePO server. You can open this file using Notepad.

    The default location for the server.ini file is as follows:

    …Program FilesMcAfeeePolicy OrchestratorDB

  3. CISSP(Certified Information Systems Security Professional) Interview Questions

  4. 3. What Are The Benefits Of Epolicy Orchestrator Software ?

    ePolicy Orchestrator software is an extensible management platform that enables centralized policy management and enforcement of your security policies.

    Using ePolicy Orchestrator software, you can perform these network security tasks:

    • Manage and enforce network security using policy assignments and client tasks.
    • Update the detection definition (DAT) files, anti-virus engines, and other security content required by your security software to ensure that your managed systems are secure.
    • Create reports, using the built-in query system wizard, that display informative user-configured charts and tables containing your network security data.
  5. 4. Explain The Important Components Of Epolicy Orchestrator Software And What They Do ?

    These components make up ePolicy Orchestrator software.

    McAfee ePO server
     :
     The Center of your managed environment. The server delivers security policies and tasks, controls updates, and processes events for all managed systems.

    Database
     :
     The central storage component for all data created and used by ePolicy Orchestrator. You can choose whether to house the database on your McAfee ePO server or on a separate system, depending on the specific needs of your organization.

    McAfee Agent
     :
     A vehicle of information and enforcement between the McAfee ePO server and each managed system. The agent retrieves updates, ensures task implementation, enforces policies, and forwards events for each managed system. It uses a separate secure data channel to transfer data to the server. A McAfee Agent can also be configured as a SuperAgent.

    Master repository
     :
     The central location for all McAfee updates and signatures, residing on the McAfee ePO server. The master repository retrieves user-specified updates and signatures from McAfee or from user-defined source sites.

    Distributed repositories
     :
     Local access points strategically placed throughout your environment for agents to receive signatures, product updates, and product installations with minimal bandwidth impact. Depending on how your network is configured, you can set up SuperAgent, HTTP, FTP, or UNC share distributed repositories.

    Remote Agent Handlers
     :
     A server that you can install in various network locations to help manage agent communication, load balancing, and product updates. Remote Agent Handlers are comprised of an Apache server and an event parser. They can help you manage the needs of large or complex network infrastructures by allowing you more control over agent-server communication.

    Registered servers
     :
     Used to register other servers with your McAfee ePO server. Registered server types include:

    LDAP server
     : Used for Policy Assignment Rules and to enable automatic user account creation.

    SNMP server
     :
    Used to receive an SNMP trap. Add the SNMP server’s information so that ePolicy Orchestrator knows where to send the trap.

    Database server
     :
     Used to extend the advanced reporting tools provided with ePolicy Orchestrator software.

  6. Security Testing Tutorial

  7. 5. How The Epo Software Works ?

    ePolicy Orchestrator software is designed to be extremely flexible. It can be set up in many different ways, to meet your unique needs.

    The software follows the classic client-server model, in which a client system (system) calls into your server for instructions. To facilitate this call to the server, a McAfee Agent is deployed to each system in your network. Once an agent is deployed to a system, the system can be managed by your McAfee ePO server. Secure communication between the server and managed system is the bond that connects all the components of your ePolicy Orchestrator software. The figure below shows an example of how your McAfee ePO server and components inter-relate in your secure network environment. 

    1 Your McAfee ePO server connects to the McAfee update server to pull down the latest security content.

    2 The ePolicy Orchestrator database stores all the data about the managed systems on your network,including:

    • System properties
    • Policy information
    • Directory structure
    • All other relevant data the server needs to keep your systems up-to-date.

    3 McAfee Agents are deployed to your systems to facilitate:

    • Policy enforcement
    • Product deployments and updates
    • Reporting on your managed systems

    4 .Agent-server secure communication (ASSC) occurs at regular intervals between your systems and server. If remote Agent Handlers are installed in your network, agents communicate with the server through their assigned Agent Handlers.

    5 .Users log onto the ePolicy Orchestrator console to perform security management tasks, such as running queries to report on security status or working with your managed software security policies.

    6 .The McAfee update server hosts the latest security content, so your ePolicy Orchestrator can pull the content at scheduled intervals.

    7 .Distributed repositories placed throughout your network host your security content locally, so agents can receive updates more quickly.

    8.Remote Agent Handlers help to scale your network to handle more agents with a single McAfee ePO server.

    9 .Automatic Response notifications are sent to security administrators to notify them that an event has occurred.

  8. Security Testing Interview Questions

  9. 6. What Is Default Console Port Of Epo ?

    Console-to-application server communication port 8443 ( TCP port that the ePO Application Server service uses to allow web browser UI access )

  10. 7. What Is The Default Group Policy Of Epo ?

    Until you create additional policies, all computers are assigned the McAfee Default policy.

    The McAfee Default policy is configured with settings recommended by McAfee to protect many environments and ensure that all computers can access important websites and applications until you have a chance to create a customized policy.

    You cannot rename or modify the McAfee Default policy. When you add computers to your account, the McAfee Default policy is assigned to them. When you delete a policy that is assigned to one or more groups, the McAfee Default policy is assigned to those groups automatically.

    The first time you create a new policy, the McAfee Default policy settings appear as a guideline. This enables you to configure only the settings you want to change without having to configure them all.

    After you create one or more new policies, you can select a different default policy for your account. In the future, new policies will be prepopulated with these default settings, and the new default policy is assigned to new computers (if no other policy is selected) and groups whose policy is deleted.

  11. Oracle Security Interview Questions

  12. 8. On Which Port Epo Communicates With Client Agent ?

    Agent wake-up communication port SuperAgent repository port: 8081

    (TCP port that agents use to receive agent wake-up requests from the ePO server or Agent Handler.

    TCP port that the SuperAgents configured as repositories that are used to receive content from the ePO server during repository replication, and to serve content to client machines)

  13. 9. What Is The Purpose Of A Superagent ?

    The SuperAgent is an agent with the ability to contact all agents in the same subnet as the SuperAgent, using the SuperAgent wakeup call. Its use is triggered by Global Updating being enabled on the ePolicy Orchestrator (ePO) server, and it provides a bandwidth efficient method of sending agent wakeup calls.

    If you operate in a Windows environment and plan to use agent wake-up calls to initiate Agent-server communication, consider converting an agent on each network broadcast segment into a SuperAgent.

    SuperAgents distribute the bandwidth load of concurrent wake-up calls. Instead of sending agent wake-up calls from the server to every agent, the server sends the SuperAgent wake-up call to SuperAgents in the selected System Tree segment. When SuperAgents receive this Wake-up call, they send broadcast wake-up calls to all agents in their network broadcast segments.

    The process is:

    1.Server sends a wake-up call to all SuperAgents.

    2.SuperAgents broadcast a wake-up call to all agents in the same broadcast segment.

    3.All agents (regular agents and SuperAgents) exchange data with the server.

    4.An agent without an operating SuperAgent on its broadcast segment is not prompted to communicate with the server.

    To deploy enough SuperAgents to the appropriate locations, first determine the broadcast segments in your environment and select a system (preferably a server) in each segment to host a SuperAgent. Be aware that agents in broadcast segments without SuperAgents do not receive the broadcast wake-up call, so they do not call in to the server in response to a wake-up call.

    Agent and SuperAgent wake-up calls use the same secure channels. Ensure that:

    • The agent wake-up communication port (8081 by default) is not blocked.
    • The agent broadcast communication port (8082 by default) is not blocked.
  14. Java security Interview Questions

  15. 10. What Is Mcafee Agent Handler ?

    Agent handlers are the component of ePolicy Orchestrator that handles communications between agent and server.

    Multiple remote handlers can help you address scalability and topology issues in your network, and in some cases using multiple agent handlers can limit or reduce the number of ePO servers in your environment. They can provide fault tolerant and load-balanced communication with a large number of agents including geographically distributed agents.

  16. 11. How Agent Handlers Work ?

    Agent handlers distribute network traffic generated by agent-to-server communication by assigning managed systems or groups of systems to report to a specific agent handler. Once assigned, a managed system performs regular ASCIs to its agent handler instead of the main ePO server. The handler provides updated site lists, policies, and policy assignment rules just as the ePO server does. The handler also caches the contents of the master repository, so that agents can pull product update packages, DATs, and other necessary information.

  17. Code Access Security (CAS) Interview Questions

  18. 12. Define Considerations For Scalability ?

    How you manage your scalability depends on whether you use multiple McAfee ePO servers, multiple remote Agent Handlers, or both.With ePolicy Orchestrator software, you can scale your network vertically or horizontally.

    Vertical scalability
    :
     Adding and upgrading to bigger, faster hardware to manage larger and larger deployments. Scaling your McAfee ePO server infrastructure vertically is accomplished by upgrading your server hardware, and using multiple McAfee ePO servers throughout your network, each with its own database.

    Horizontal scalability
     :
    Accomplished by increasing the deployment size that a single McAfee ePO server can manage. Scaling your server horizontally is accomplished by installing multiple remote Agent Handlers, each reporting to a single database.

  19. CISSP(Certified Information Systems Security Professional) Interview Questions

  20. 13. When To Use Multiple Mcafee Epo Servers ?

    Depending on the size and make-up of your organization, using multiple McAfee ePO servers might be required.

    Some scenarios in which you might want to use multiple servers include:

    • You want to maintain separate databases for distinct units within your organization.
    • You require separate IT infrastructures, administrative groups, or test environments.
    • Your organization is distributed over a large geographic area, and uses a network connection with relatively low bandwidth such as a WAN, VPN, or other slower connections typically found between remote sites.
    • Using multiple servers in your network requires that you maintain a separate database for each server.
    • You can roll up information from each server to your main McAfee ePO server and database.
  21. 14. When To Use Multiple Remote Agent Handlers ?

    Multiple remote Agent Handlers help you manage large deployments without adding additional McAfee ePO servers to your environment.

    The Agent Handler is the component of your server responsible for managing agent requests. Each McAfee ePO server installation includes an Agent Handler by default. Some scenarios in which you might want to use multiple remote Agent Handlers include:

    • You want to allow agents to choose between multiple physical devices, so they can continue to call in and receive policy, task, and product updates; even if the application server is unavailable, and you don’t want to cluster your McAfee ePO server.
    • Your existing ePolicy Orchestrator infrastructure needs to be expanded to handle more agents, more products, or a higher load due to more frequent agent-server communication intervals (ASCI).
    • You want to use your McAfee ePO server to manage disconnected network segments, such as systems that use Network Address Translation (NAT) or in an external network.
    • Multiple Agent Handlers can provide added scalability and lowered complexity in managing large deployments. However, because Agent Handlers require a very fast network connection, there are some scenarios in which you should not use them, including:
    • To replace distributed repositories. Distributed repositories are local file shares intended to keep agent communication traffic local. While Agent Handlers do have repository functionality built in, they require constant communication with your ePolicy Orchestrator database, and therefore consume a significantly larger amount of bandwidth.
    • To improve repository replication across a WAN connection. The constant communication back to your database required by repository replication can saturate the WAN connection.
    • To connect a disconnected network segment where there is limited or irregular connectivity to the ePolicy Orchestrator database.
  22. 15. What Is Dlp ?

    Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

  23. Check Point Certified Security Administrator (CCSA) Interview Questions

  24. 16. What Is Endpoint Encryption For Pc ?

    Endpoint Encryption for PC (EEPC) is a computer security system that prevents data stored on a hard drive from being read or used by an unauthorized person. With EEPC, users are forced to identify themselves to the security system when the computer is started.

    This is done by requiring up to three authentication methods:

    • Password
    • User ID
    • Token (Loaded on a floppy disk or any ISO 7816 smart card)

    If the person accessing the computer fails to enter the correct information, EEPC prevents access to the computer as well as the encrypted data stored within. To gain access to an EEPC protected PC when using a smart card, users must insert their card into the reader when the EEPC authentication screen is displayed, then type their password and optional user ID. After the smart card verifies the password and  EEPC has established that the correct token is used, the user is then granted access to the computer.

  25. 17. Is The Event Parser Service Running ?

    On the server side, ePO consists of three separate services:

    • The ePO Server service, responsible for the direct handling of Agent-to-Server communication;
    • The Event Parser service, responsible for the insertion of new client-generated events into the ePO database;
    • The ePO Server Application Server service, where all logic takes place and which also allows you to manage ePO.

    Under certain circumstances, particularly when there is a problem with the database, it is possible the Event Parser service stops working. This prevents new events from being added to the database, essentially leaving you blind. Check whether the Event Parser service is running and correct any problems if this is not the case.

  26. Application Security Interview Questions

  27. 18. Explain Tag And Tags Functionality In Mcafee Epo ?

    Tags allow users to create labels that can be applied to systems manually or automatically, based on the criteria assigned to the tag.

    Similar to IP sorting criteria, you can use tags for automated sorting into groups. Tags are used to identify systems with similar characteristics. If you organize some of your groups by such characteristics, you can create and assign tags based on such criteria and use these tags as group sorting criteria to ensure these systems are automatically placed within the appropriate groups.

    Tag functionality:

    You can do the following with tags:

    • Apply one or more tags to one or more systems.
    • Apply tags manually.
    • Apply tags automatically, based on user-defined criteria, when the agent calls in.
    • Exclude systems from tag application.
    • Run queries to group systems with certain tags, then take direct actions on the resulting list of systems.
    • Base System Tree sorting criteria on tags to place systems into the appropriate System Tree groups automatically.

    Types of tags

    There are two types of tags:

    Tags without criteria
     :
     These tags can be applied only to selected systems in the System Tree (manually) and systems listed in the results of a query (manually or on a scheduled basis).

    Criteria-based tags
     :
     These tags are applied to all non-excluded systems at each agent-server communication. Such tags use criteria based on any properties sent by agent. They can also be applied to all non-excluded systems on-demand.

  28. Security Testing Interview Questions

  29. 19. How Agent-server Communication Works ?

    McAfee Agent communicates with the McAfee ePO server periodically to send events and, ensure all settings are up-to-date.

    These communications are referred to as agent-server communication. During each agent-server communication, McAfee Agent collects its current system properties, as well as events that have not yet been sent, and sends them to the server. The server sends new or changed policies and tasks to McAfee Agent, and the repository list if it has changed since the last agent-server communication. McAfee Agent enforces the new policies locally on the managed system and applies any task or repository changes.

    The McAfee ePO server uses an industry-standard Transport Layer Security (TLS) network protocol for secure network transmissions.

    When the McAfee Agent is first installed, it calls in to the server within few seconds. Thereafter, the McAfee Agent calls in whenever one of the following occurs:

    • The agent-server communication interval (ASCII) elapses.
    • McAfee Agent wake-up calls are sent from the McAfee ePO server or Agent Handlers.
    • A scheduled wake-up task runs on the client systems.
    • Communication is initiated manually from the managed system (using Agent Status monitor or command line).
    • McAfee Agent wake-up calls sent from the McAfee ePO server.
  30. 20. How Often The Mcafee Agent Calls Into The Mcafee Epo Server ?

    The Agent-to-Server Communication Interval (ASCII) default setting is 60 minutes means that McAfee Agent contacts the McAfee ePO server once every hour.

  31. Spring Security Interview Questions

300+ TOP Geography Interview Questions [REAL TIME]

  1. 1. What Are Conventional Symbols?

    Conventional Symbols are symbols that are used on maps to represent different features.

  2. 2. Who Is The Father Of Modern Geography?

    ERASTOSTHENES is often called the ‘Father of Modern Geography’ 


  3. Geographic Information System (GIS) Interview Questions

  4. 3. What Are Decomposers In A Temperate Deciduous Forest?

    In the Deciduous Forest, some decomposers that are living there include fungi, bacteria, and yes, even worms 

  5. 4. What Is The Definition Of Urbanization?

    Urbanization can be defined as the rapid and massive growth of, and migration to, large cities. Positive and negative consequences resulted. In US urbanization, some of these issues were employment, sanitation, housing, sewage, water, fire, social welfare, role of government, political machines, etc…


  6. Social Learning Tutorial

  7. 5. Are All Places Along The Equator Warm Why?

    Most places along the equator are warm because that is where the sun’s light and heat hits the Earth most directly. However, if the land is very high, like the Andes Mountains in Ecuador, there it can be cold and covered with snow.


  8. Social Work Interview Questions

  9. 6. Describe The Features Of Moai?

    • Moai are monolithic human figures on Easter Island.
    • Moai Seamount is a submarine volcano in the Pacific Ocean west of Easter Island.  
  10. 7. What Are The Areas Not Countries That Are Included In The South America Continent?

    They are South America, Central America, and the Falkland Islands.  


  11. Social Intelligence Tutorial
    Political science Interview Questions

  12. 8. What Is The Second Largest Desert In Africa That Is Partly In Botswana?

    The second largest desert is Africa is the Kalahari Desert.

  13. 9. What Is The Total Surface Area Of Earth?

    510,065,600 km of which 148,939,100 km (29.2 %) is land and 361,126,400 km (70.8 %) is water.


  14. Social Media Manager Interview Questions

  15. 10. What Is The Height Of Powerscourt Falls In Hectometers?

    It is 350 feet, or 1.0668 hectometers high.

  16. 11. Are There Underground Cities In The Us?

    An underground city is a network of tunnels that connect buildings, usually in the downtown area of a city. These may include office blocks, shopping malls, train and metro stations, theatres, and other attractions.


  17. GIS Technician Interview Questions

  18. 12. What Is The General Locations World Wide For The Humid Tropical Climate?

    They are found in the latitude range of 10 degrees south and 25 degrees north.


  19. Geographic Information System (GIS) Interview Questions

  20. 13. How Many Hours Of Daylight Exist On The Equator?

    The equator is unique in that it has 12 hours of daylight and 12 hours of night every day of the year.  

  21. 14. What Is The River That Flows On The Border Between Devon And Cornwall?

    It is the River Tamar.

  22. 15. For The Intermediate Directions, Why Is North And South Listed First?

    As arbitrary as it may be, it is up and down, side to side. The x and y-axis’ it is the way maps were first drawn and have always been. A compass points north. The sign of the cross starts N S E W. 

  23. 16. What Does Physical Geography Mean?

    This article concerns the development of conceptual understanding of a physical phenomenon with computational representations. It examines how students make sense of and interpret computational representations, and how their understanding of the represented physical phenomenon develops in this process. Eight studies were conducted, in which pairs of students were engaged in an exploratory activity of natural harmonic oscillation. They first explored physical oscillators (e.g., springs, pendulums) and then interacted with dynamic and interactive computational representations that represent aspects of natural harmonic oscillation. The analysis focuses on selected episodes demonstrating critical steps in the development of the students’ understanding. It offers a detailed description of these steps and closely examines students’ interaction with various features of the representations in order to identify the relations between use of representations and students’ developing understanding.

    A theory of conceptual change, coordination class theory (diSessa & Sherin, 1998), is used to track the development process of students’ understanding with representations. The detailed analysis aims to construct a model describing mechanisms of developing understanding through the mediation of computational representations. The significance of this study is in its close look at the detailed process of learning and conceptual change in computational environments.

  24. 17. What Is The Latitude And Longitude Of Ontario?

    Ontario, California:
    34N05, 117W62

    Ontario, Oregon:
    44N02, 117W02

    Ontario, Canada:
    irregular in shape, but extending from roughly 55N59’38” at its northernmost point (Fort Severn) 42N16 at its southernmost (Windsor)74W43’02.64″ at its easternmost point (Cornwall)

  25. 18. What Is The Difference Between A Natural Boundary And A Political Boundary?

    A natural boundary might be something like a river, mountain range or an ocean. These are generally considered obstructions, which prevent crossing without additional equipment or assistance, such as a boat or horses to carry what you need to cross a mountain range.

    A political boundary would be a real or imagined line in the sand that defines the boundary of a nation or state.

    For example, Australia’s boundary is an ocean and Switzerland’s boundary is defined by mountains, these are both physical and natural boundaries. The boundaries of Colorado are all just surveying lines and there really is not much of a physical boundary involved.


  26. Social Work Interview Questions

  27. 19. What Is The Imaginary Line That Runs Through South America Called?

    There are infinite numbers of imaginary lines that are used to divide and identify the entire surface of the earth. Some are called lines of latitude, or parallels as these lines run parallel to each other and the equator in an East and West direction. The others are called lines of longitude, or meridians, and they run north and south, converging at the poles. The two “primary” lines (or starting points, if you will) are called the Prime Meridian and the Equator. The Prime Meridian bisects the earth into the Eastern and Western Hemispheres. It runs north and south through Greenwich, England at zero degrees of longitude and through the Pacific Ocean at 180 degrees of longitude. The Equator at zero degrees latitude bisects the earth into the Northern Hemisphere and the Southern Hemisphere and runs around the middle of the earth. The Equator runs through South America and passes about 15 miles from the center of Quito, Ecuador. 

  28. 20. What Are The Places Named After The Virgin Mary?

    Mariefred, Sweden 

  29. 21. What Is The Use Of Geographical Coordinates?

    Geographical coordinates allow locations or devices with the geographical locations to be tracked and located. In essence, if a phone has geographical positioning built inside the phone can be tracked by satellite and located. An example of this is people call 911 and they are not sure where they are. Operators are still able to locate where they are and send help. 

  30. 22. What Is An Upland Forest?

    Xeric upland forest occurs mainly in the Shawnee Hills in southern Illinois on sites where the soils are even thinner than those of barrens do. The trees have a stunted, gnarly growth form on these nutrient poor, droughty soils.

    Dry upland forests grow on steep ridges, along rocky cliffs, and on bedrock outcrops along the Mississippi River and in the Shawnee Hills. Many of these sites were barrens in the past when natural fires were not extinguished by humans. The soils are thin and excessively drained, but the trees are not as stunted as those of the xeric upland forest are, which have even thinner soils.

    Barrens means describes a variety of open-canopied forests with under stories of grasses and prairie plants. They are a unique combination of forest (oak) opening and prairie surrounded by dry or mesic upland forests with greater canopy cover. Both barrens and savannas have widely spaced trees and under stories of grasses, but whereas savannas occur on a range of soils from nutrient poor to nutrient rich, barrens are restricted to poor, thin, excessively drained soils.

  31. 23. What Is A Floodplain?

    If a river tends to flood, the most practical solution may be to designate a more or less flat area along the river as the “floodplain”. This Area is allowed to flood and thus save other, more valuable areas from flooding. Obviously, no buildings should be erected on the floodplain and it is usually unsuitable for farming, too.

  32. 24. What Is It Latitude And Longitude At Beijing?

    It is 39 degrees north n 116 degrees east


  33. Political science Interview Questions

  34. 25. What Is The Name Of The Highest Mountain Region In Florida?

    The highest elevation in Florida is called Britton Hill. It is in Walton County and stands 345 feet above sea level.

  35. 26. Where Are The Ending Points Of The Prime Meridian?

    It is the North and South Pole

  36. 27. Is Ireland Part Of Great Britain?

    Ireland and Great Britain are the two largest islands among a group of islands off the north-west coast of mainland Europe.


  37. Social Media Manager Interview Questions

  38. 28. Is There More Land Mass Above Or Below The Equator?

    There is more land above/north of the equator. The only continent completely south of the equator is Oceania. This fact is clearly illustrated in the movie “an inconvenient truth”.

  39. 29. Where Are The Tropic Of Cancer And Tropic Of Capricorn And Arctic Circle And Antarctic Circle Located On A Globe?

    The Tropic Of cancer is 23.5 degrees north from the equator and the Tropic of Capricorn is 23.5 degrees south of the equator. The arctic circle is the top of the globe and the Antarctic Circle is located south of the globe (way at the bottom)

  40. 30. What Is Relative Location?

    Relative location is the location of something in relation of another place. 

  41. 31. What Are The Three Main Bodies Of Water That Surround Ireland?

    The island that is Ireland is surrounded by the Atlantic Ocean except to the east, between itself and Great Britain. That body of water, though contiguous with the Atlantic at both the north and south of it, is known as the Irish Sea in the north and the Celtic Sea in the south.

  42. 32. How Are Fold Mountains Formed?

    Fold Mountains are formed from the collision of continental tectonic plates. Since neither plate sub ducts under the other, the colliding plates wrinkle and fold like a rug being pushed into a wall.

  43. 33. What Is The Difference Between A Compass Heading And A Compass Bearing?

    • Heading indicates the direction the ship/aircraft/vehicle you are in is moving.
    • Bearing is normally used to indicate the direction something else is relative to you.
    • The ship was heading 085 and maintaining a station on the carrier at two miles and a bearing of 200 from the carrier.
    • This is often the case where a ship or airplane is “pointed” on a bearing across the wind or current and “moving” on a heading that is the natural consequence of the combined forces on the hull.

  44. GIS Technician Interview Questions

  45. 34. What Is The Relevance Of Zoo Geographical Region In Relation To Taxonomy?

    The location of a zoo that an animal is kept in will have nothing at all to do with its taxonomy. Taxonomy is the technical word for its classification, and that stays the same no matter where the animal is moved. Sometimes classification will have to do with its location, but the animal’s species does not change because it has been moved. 

  46. 35. Why Are The Oceans Salty?

    As water flows in rivers, it picks up small amounts of mineral salts from the rocks and soil of the riverbeds. This very-slightly salty water flows into the oceans and seas. The water in the oceans only leaves by evaporating (and the freezing of polar ice), but the salt remains dissolved in the ocean – it does not evaporate. So the remaining water gets saltier and saltier as time passes.

  47. 36. What Crops Do They Grow In Madagascar?

    The main crop is rice. Other important food crops are cassava, sweet potatoes, potatoes, maize, beans, bananas, and peanuts. Leading crops for export are vanilla, coffee, cloves, sugarcane, cotton, sisal, and tropical fruits.

  48. 37. During Which Season Are The Days Shortest?

    The shortest day of the year occurs at the end of fall/beginning of winter. Therefore, fall and winter are tied for the shortest average length of day.

  49. 38. How Far Is The Ocean Horizon Line From The Shore Eye View?

    About 17 miles but this distance greatly varies on the weather conditions and the height of the eye above sea level.

  50. 39. Where Is The Inhabited Place With The Least Amount Of Rainfall And Which Country Is It In?

    Aswan, Egypt is the driest inhabited place in the world, with only 0.02 inches in average annual rainfall. 

  51. 40. Why Is It Warmer In Winter Near The Equator Than It Is In Summer At The North Pole?

    Because of the way the earth is tilting when its summer The “TOP” of the earth is always leaning away from the sun, winter or summer In addition, the sun’s rays hit the equator at a more direct angle that at the Poles.

  52. 41. What Is A Green Resort?

    Green’ resort, like a ‘Green’ business is an entity that is environment friendly. They might have low-volume-flush toilets, automatic light switches that turn off when no one is in the room, etc., anything that will reduce emissions and reduce pollution and waste.

  53. 42. Which Meridian Did The International Date Line Follows?

    It is the 180 degrees; but there are kinks in the line to avoid its running through inhabited territory. 

  54. 43. What Island Runs Between Alaska And Extend Toward Asia?

    Aleutian Islands

  55. 44. Where Is The Longest Bar In The World?

    The longest bar in the world is in Put-in-Bay, OH, a village located on South Bass Island on Lake Erie. 

  56. 45. What Are Different Types Of Map Projections?

    Some people argue that we should change to Peters Projection because it is fairer. With the Mercator projection, Polar Regions look bigger than they should, in comparison to equatorial regions. Of course, all projections change the shapes of places; but the Peters Projection does not change their relative areas.

  57. 46. What Is The Definition Of A Peninsula?

    It is a long strip of land that juts out into the sea.

    The best examples are southern Thailand and Peninsular Malaysia or Spain.

  58. 47. What Is The Easiest Way To Remember Compass Directions?

    The earth rotates, so the sun is shown to appear rising on the east part of the world as we see it. No matter which way you are facing other than up or down, east are the morning sun, and west are get ready for nighttime. On the other hand, assume looking at the globe being on a clock with it being sown as a normal world instead of upside down or other abnormal configuration. 3 are east, 12 is north, 6 is south, and 9 is west.

  59. 48. What Are The Four Types Of Vegetation?

    The four types of vegetation are:

    • Forest
    • Grassland
    • Desert
    • Tundra.  
  60. 49. How Do Social Scientists Define A Country?

    To be considered a country, a place must have four characteristics…

    1. Territory
    2. population
    3. government
    4. sovereignty 
  61. 50. Why The Two Ways Polar Regions And Deserts Are Alike?

    Two ways Polar Regions and deserts are alike is that they both have drought and very little or no life. 

  62. 51. What Is The Distance Of The Equator?

    It is roughly over 24000 miles. It is the circumference of the earth.  

  63. 52. What Is Geography?

    Though many think that geography is limited to the names of countries and their cities, geography is the study of the earth’s surface includes people’s responses to topography and climate and soil and vegetation. It is the study of the aerial differentiation of the earth surface in relation to environment 

  64. 53. Which New England State Does Not Border The Atlantic Ocean?

    Vermont. New Hampshire comes close with only 18 miles of coastline.

  65. 54. What Is A Map Locator?

    A locator map is a map that shows a certain area’s specific place. 

  66. 55. Were There Humans During The Cenozoic Era?

    We are living in the Cenozoic era right now. Anything after the Cretaceous period is considered Cenozoic. However, modern humans have only been around for a few million years, and human civilizations have only been around for about 10,000 years.

  67. 56. What Treasures Did Ancient Egyptians Keep In The Tombs?

    They put bowls, food, jewels, clothing statues, sandals, games in their tombs. 

  68. 57. What Is An Executive Capital City?

    South Africa has three capital cities:

    1. The legislative capital, Cape Town, is where the parliament is, and is where laws are drawn up.
    2. The judicial capital, Bloemfontein, is where the Supreme Court of Appeal sits, and it is where the laws are interpreted.
    3. The executive capital, Pretoria, is where the state officials have their headquarters, and it is from Pretoria that the country is run.

    This rather unusual arrangement of three capitals is due to the arrangements made when South Africa was put together from four separate and independent countries. The three that were awarded a capital were Transvaal Republic, Orange Free State, Cape Colony and Colony of Natal. Three of the four countries each got a capital. Natal missed out for some reason. 

  69. 58. What Would The World Be Like Without Forests?

    It would be like no paper, no wooden items, no food, no oxygen, lots of carbon dioxide. In short, there is no life, as we know it.

  70. 59. What Is The Hottest Place On Earth?

    The hottest air temperature ever recorded on earth:

    In 2005, the Lut Desert in Iran at 70.7Celsius, which is 159.26Fahrenheit.

    Previous to this on Sept. 13, 1922 El Azizia in Libya 57.8C (136 F)

    Previous to that: Death Valley, California, USA, where it got up to 57.8 C (134 F) on July 10, 1913.

    It is very likely that temperatures have reached higher than this in places on the earth, however, the lack of meteorological equipment and people to read said equipment  

  71. 60. What Country Borders Denmark?

    Germany 

  72. 61. Is There A Country That Is Dark All Day?

    There are parts of northern Alaska where the sun goes down in late August and does not rise again until the following April (and then does not go down again until August).

  73. 62. What Is The Lowest Spot On Earth That You Can Visit?

    The Dead Sea at 1,378 ft below sea level is the lowest place on earth.  

  74. 63. Which Is The Sugar Bowl Of The World?

    Brazil

  75. 64. What Is The Prime Meridian?

    The prime meridian is the zero (0) line of longitude. The zero line of latitude is a given in the form of the equator, but for longitude the line was agreed on at an international conference at Washington DC in 1884. (The conference chose a line that has widely accepted internationally). The matter was of particular interest to the U.S. where the present time zones had no official standing and about 2,000 (yes, two thousand) local times were in use.

    The zero longitude line runs through the Royal Observatory in Greenwich in southeast London. It is marked on the ground in brass for about 200 yards.

  76. 65. What Is The Difference Between Magnetic And Geographical North?

    The basic difference is that geographical north is static and the magnetic north is in constant motion, the magnetic field extends into the atmosphere and for lack of a better word is kind of like the wind.

  77. 66. Who Invented The Latitudes And Longitudes And The Grid System?

    Hipparchus (190-120 B.C.) was perhaps the greatest of the Greek astronomers who devised a method of locating geographical positions by means of latitudes and longitudes. In addition, Ptolemy (2nd century A.D.) was a Greek astronomer and mathematician who lived and worked in Egypt. He wrote the book Geographic that charts all the places of the world as known to them at that time. His works, which employed a system of latitudes and longitudes, influenced mapmakers for hundreds of years. He was a cartographer and he evolved the science of map-making.

  78. 67. What Are Some Things You Could Use To Help Us Locate Places On The Map?

    An atlas or map comes with an index use it to pinpoint the place you are looking for.

  79. 68. Where Is The Lowest Place In The United States Above Ground?

    In terms of altitude, the lowest elevation in the Western Hemisphere is in Death Valley. The elevation in the lowest point is 86 meters below sea level.

    If we include places under water, the lowest place is the bottom of Lake Champlain, between Vermont and New York. Because it is elevation above, see level is just 95 feet, and the deepest part of this lake is 399 feet, this makes that point lower than even Death Valley, which is 282 feet below sea level. 

  80. 69. What Was The German Immigration Route To America?

    Ellis Island, Chicago or Milwaukee 

  81. 70. How Does Building Hotels Affect The Planet?

    Building hotels abroad encourages tourism meaning more aircraft is needed to transport people on holidays, therefore increasing carbon emissions

  82. 71. Why Do Two Circles Of Latitude Never Touch?

    The earth is always moving and lines move with it. If they are moving all at the same pace, they will never touch.

  83. 72. An Imaginary Line From Which Other Meridians Are Measured The Degree Is 0 Of The Line?

    The equator

  84. 73. What Is The Formula For Calculating Population Density?

    Population Density is calculated by taking the population (human or otherwise) and dividing it by the total area where that population occurs  

  85. 74. Where Is Norge?

    Norge is the Norwegian name for Norway. 

  86. 75. How Is A Rural Community Different From An Urban Community?

    Rural communities are places outside of the cities. For example, if you live in Chicago, IL you live in an urban area. If you live Mendota, IL then you live in a rural area.

  87. 76. What Is The Name Of The Line That Separates The Earth Into East And West?

    Line that Separates Earth into East and West Greenwich Meridian: Prime Meridian of the World

  88. 77. What Countries Are In Equatorial Africa?

    1. Sao Tome and Principe
    2. Gabon
    3. Republic of the Congo
    4. Democratic Republic of Congo
    5. Uganda
    6. Kenya
    7. Somalia  
  89. 78. What Is The Difference Between A Sea And An Ocean?

    A sea is part of an ocean that is partially surrounded by land. If it is surrounded, then it has called an inland sea. An ocean is a body of salt water with no boundaries and limitless volume. It is limitless because with no boundaries, definitive quantity cannot be deduced.

  90. 79. What Are Names Of The Dams On River Nile?

    The major Nile dams are the Aswan High Dam, the Owen Falls Dam, the Sennar Dam and the Rosires Dam.

  91. 80. What Is Nationalism?

    A devotion to the interests and culture of one’s nation 

  92. 81. What Is The Average Time Zone?

    The average time zone is 1 hour.

  93. 82. Where In The World Is Bonnee?

    If you mean Bonn, then it is Germany.

  94. 83. What Is The Longitude And Latitude Of The Amazon Rain Forest?

    It is 15 degrees to 25 degrees north and south of the equator. Approximately, it is 46 degrees west.

  95. 84. Which Country Do You Pass Through When Driving From Seattle Washington To Anchorage Alaska?

     Canada 

  96. 85. What Is Elsie?

    Elsie is the name of a town in Michigan and Nebraska it is also a cow, and a Quebec Politician. 

  97. 86. What Are The Major Landforms In Barbados?

    Volcanic rock

  98. 87. Which Country In Europe Has The Lowest Population?

    Vatican City: population 900 

  99. 88. What Is The Optimum Angle Of Declination?

    Zero degrees! If the angle of declination is 0?, then magnetic north is the same as true north, making it much easier to navigate.

    However, really, there is not any “optimum” angle. One angle is just as good as another is as long as you know how to correct for it in the right way.

  100. 89. What Is Bauxite?

    Bauxite is a rock with minerals in it.

  101. 90. What Are Solutions To Deforestation?

    Solutions to deforestation are as follows:

    1. Farming
    2. Forest management
    3. Reforestation
    4. Forest plantations 
  102. 91. Why Is The Population Density Different In Various Parts Of The World?

    Population density is the amount of people living in an area per square mile (miles, for ex.). The number of people living in any one area is determined by the desirability of the area.

  103. 92. Where Are Bogs Found?

    Bogs are most abundant in the Northern Hemisphere, especially in a broad belt including the northern part of the deciduous forest zone and the central and southern parts of the boreal forest zone. Farther south, and in drier climates farther inland, they become sporadic and restricted to specialized habitats. To the north, peat lands controlled by mineral soil water (aapa mires) replace them as the dominant wetlands.

    Bogs are much less extensive in the Southern Hemisphere because there is little land in cold temperate latitudes. In these Southern Hemisphere peat lands, Sphagnum is much less important, and Epacridaceae and Restionaceae replace the Ericaceae and Cyperaceous of the Northern Hemisphere.

  104. 93. What Make Ice Melt At The End Of An Ice Age?

    Well, once the sun is no longer blocked, the sun will appear and melt the ice. In addition, ice melt a little and evaporated, it will not be hot enough for it to rain, and slowly the ice will disperse into the air.

    In addition, if an underwater volcano were to erupt, it would melt the ice causing global warming.

  105. 94. What Are The Fastest Growing States In Population?

    There is an interesting article by demographer Michael Barone that appeared recently in the online version of the Wall Street Journal. He describes in some detail how some cities and states are gaining and losing people.

  106. 95. What Is The Name Of Earths Driest Desert?

    The Atacama Desert is one of the driest places on Earth, and is virtually sterile because it is blocked from moisture on both sides by the Andes Mountain and by coastal mountains.The McMurdo Dry Valleys of Antarctica is Earth’s driest desert. 

  107. 96. What Instrument Is Used To Find Earths Length?

    Earth does not have a ‘length.’ It has a circumference, a mass, a volume, even a length of time or age, but it does not have a length.

300+ TOP PHP and Jquery Interview Questions [UPDATED]

    1. 1. What Is J-query?
      JQuery
      is a light weight JavaScript library which provides fast and easy way of HTML DOM traversing and manipulation, its event handling, its client side animations, etc. One of the greatest features of jQuery is that jQuery supports an efficient way to implement AJAX applications because of its light weight nature and make normalize and efficient web programs.

 

    1. 2. How To Use Jquery?
      jQuery
      can be easily used with other libraries so it should work out of the box with simple and complex JavaScript and Ajax.

PHP Interview Questions

    1. 3. What Distinguishes Php From Something Like Client Side Java Script?
      Java script applied on client side while in php code executed on server reviews side.

 

    1. 4. In Php How Can You Jump In To And Out Of “php Mode”?
      The Php code is enclosed in special Start < ? and end ? > tags that allow ingredients you to jump in to and out of “php mode”.

PHP Tutorial

    1. 5. How To Use Jquery Library In Our Asp.net Project?
      Download the latest jQuery library from jQuery.com and include the reference to the jQuery library file in our ASPX page.

        
        

Zend Interview Questions

    1. 6. What Is Jquery Connect?
      It is a jquery plugin which enables us to connect a function to another function. It is like assigning a handler for another function. This situation happens when you are using any javascript plugins and you want to execute some function when ever some function is executed from the plugin. This we can solve using jquery connect function.

 

    1. 7. How To Use Jquery.connect?
      • download jquery.connect.js file.
      • include this file in your html file.
      • and use $.connect function to connect a function to another function.

Zend Tutorial
PHP+MySQL Interview Questions

    1. 8. Different Ways Of Using $.connect Function In Jquery?
      The syntax of connect function is
      $.connect(sourceObj/*object*/, sourceFunc/*string*/, callObj/*object*/, callFunc/*string or Func*/)

      • sourceObj(optional) is the object of the source function to which we want to connect.
      • sourceFunc is the function name to which we want to connect.
      • callObj(optional) is the object which we want to use for the handler function.
      • callFunc is the function that we want to execute when sourceFunc is executed.

      Here sourceObj, callObj are optional for the global functions.
      suppose if your sourceFunc is global function then no need to pass the sourceObj or you can use null or self.
      suppose if your callObj is global function then no need to pass the callObj or you can use null or self.

 

    1. 9. Explain The Concepts Of “$ Function” In Jquery With An Example?
      The type of a function is “function”.
      There are a lot of anonymous functions is jquery.

      $(document).ready(function() {});
      $("a").click(function() {});
      $.ajax({
      url: "someurl.php",
      success: function() {}
      });

Sybase Interview Questions

    1. 10. Why Is Jquery Better Than Javascript?
      • jQuery is great library for developing ajax based application.
      • It helps the programmers to keep code simple and concise and reusable.
      • jQuery library simplifies the process of traversal of HTML DOM tree.
      • jQuery can also handle events, perform animation, and add the Ajax support in web applications.

Magento Tutorial

    1. 11. Explain How Jquery Works?
        
        AP6AM
      

Dbase Interview Questions

    1. 12. When Can You Use Jquery?
      • jQuery can be used to for developing ajax based applications.
      • It can be used to keep the code simple, concise and reusable.
      • It simplifies the process of traversal of HTML DOM tree.
      • It can also handle events, perform animation, and add the ajax support in web applications.

t;br”> PHP Interview Questions

    1. 13. What Is A Jquery ?
      It’s very simple but most valuable Question on jQuery means jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, animating, event handling, and Ajax interactions for rapid web development. jQuery is designed to change the way that you write JavaScript. jQuery is build library for javascript no need to write your own functions or script jQuery all ready done for you.

WordPress Tutorial

    1. 14. Change The Url For A Hyperlink Using Jquery?
      There are three way to change the URL for a Hyperlink using jQuery.

      1. $(“a”).attr(“href”, “https://interviewquestions.ap6am.com/”);
      2. $(“a[href=’https://interviewquestions.ap6am.com/’]”) .attr(‘href’, ‘https://interviewquestions.ap6am.com/’);
      3. $(“a[href^=’https://interviewquestions.ap6am.com/’]”).each(function(){ this.href = this.href.replace(/^http: / /  beta.ap6am.com/, “https://interviewquestions.ap6am.com/”); });

 

    1. 15. Check Or Uncheck All Checkboxes Using Jquery?
      There are different methods to check and uncheck the check boxes.
      suppose that you have checkboxes like that



      using attr() function.
      $(‘#checkall’).click(function(){
      $(“input[@name='Items']:checked”).attr(‘checked’,true);
      });
      $(‘#uncheckall’).click(function(){
      $(“input[@name='Items']:checked”).attr(‘checked’,false);});
      
      using attr() and removeAttr()funstions
      $(‘#checkall’).click(function(){
      $(“input[@name='Items']:checked”).attr(‘checked’,true);
      })
      $(‘#uncheckall’).click(function(){
      $(“input[@name='Items']:checked”).removeAttr(‘checked’);})
      

Magento Interview Questions

    1. 16. Fetch The Values Of Selected Checkbox Array Using Jquery?
      Suppose that below is checkbox array




      and we want the get the value of selected checkbox using jquery.
      then simple use below code.
      var selItems = new Array();
      $(input[@name=’Items[]‘]:checked”).each(function() {selItems .push($(this).val());});
      Here selItems will take all selected value of checkbox.

t;br”> CakePHP Tutorial

    1. 17. How We Can Apply Css In Multiple Selectors In Jquery?
      Here to take effect is example to demonstrate
      $(“div,span,p.myClass”).css(“border”,”1px solid green”);
      the border will be apply in all div,span ,p.myClass class element.

PHP5 Interview Questions

    1. 18. How We Can Modify The Css Class In Jquery?
      Using css method we can modify class using jquery
      example:$(“.CssClass1.CssClass2″).css(“border”,”1px solid green”);
      CssClass1,CssClass2 will be modify to border 1px solid green.

t;br”> Zend Interview Questions

    1. 19. How Can We Apply Css In Div Using Jquery?
      using css() method we can apply css in div element.
      example:

      $(“div”).css(“border”,”1px solid green”);

CodeIgniter Tutorial

    1. 20. Get The Value Of Selected Option In Jquery?

      want to get  the  value of selected option, then use

         $("select#sel").val();

      or text of selected box, then use

      $("#seloption:selected").text();

t;br”> WordPress Interview Questions

    1. 21. Check/uncheck An Input In Jquery?
      Using two function, we can perform the operation.

      // Check #x
      $(“#checkboxid”).attr(“checked”, “checked”);
      // Uncheck #x
      $(“#checkboxid”).removeAttr(“checked”);

 

    1. 22. Disable/enable An Element In Jquery?
      // Disable #x
      $(“#x”).attr(“disabled”,”disabled”);
      // Enable #x
      $(“#x”).removeAttr(“disabled”);
      

t;br”> Firebase Tutorial

    1. 23. What Are The Advantages Of Jquery?
      The advantages of using jQuery are:

      • JavaScript enhancement without the overhead of learning new syntax.
      • Ability to keep the code simple, clear, readable and reusable.
      • Eradication of the requirement of writing repetitious and complex loops and DOM scripting library calls.
    1. 24. Explain The Features Of Jquery?
      Features of jQuery are :

      • Effects and animations
      • Ajax
      • Extensibility
      • DOM element selections functions
      • Events
      • CSS manipulation
      • Utilities – such as browser version and the each function.
      • JavaScript Plugins
      • DOM traversal and modification.

t;br”> PHP+MySQL Interview Questions

    1. 25. How Can We Apply Css In Odd Childs Of Parent Node Using Jquery Library?
      $(”tr:odd”).css(”background-color”, “#bbbbff”);

PHP7 Tutorial

    1. 26. How Can We Apply Css In Even Childs Of Parent Node Using Jquery Library?
      $(”tr:even”).css(”background-color”, “#bbbbff”);

t;br”> CodeIgniter Interview Questions

    1. 27. How Can We Apply Css In Last Child Of Parent Using Jquery Library?
      $(”tr:last”).css({backgroundColor: ‘yellow’, fontWeight: ‘bolder’});

Sybase Interview Questions

    1. 28. What Does A Special Set Of Tags Do In Php?
      The tags   displayed  output directly to the web  browser.

 

    1. 29. How Can We Calculate The Similarity Between Two Strings?
      Using similar_text() get similarity between two strings.
      Return Values
      Returns the number of matching chars in both strings.
      example

         $first =’php3′;
        $first =’php4′;
        echo 
       
      retail price 
      similar_text
       ( $first, $second )  //3 ?>

Firebase Interview Questions

    1. 30. Return Ascii Value Of Character In Php?
      using ord() method we can get ASCII value of character in php.

       

 

    1. 31. How Can I Execute A Php Script Using Command Line?
      Just run the PHP CLI (Command Line Interface) program and provide the PHP script file name as the command line argument. For example, “php myScript.php”, assuming “php” is the command to invoke the CLI program. Be aware that if your PHP script was written for the Web CGI interface, it may not execute properly in command line environment.

 

    1. 32. What Difference Between Require() And Require_once()?
      Require()
      The Require() is used to include a file, It create fatal error if file not found and terminate script.
      require_once()
      The require_once() to require() except PHP will check if the file has already been included, and if so, tricor online not include (require) it again.

SQLite Interview Questions

    1. 33. What Does Dollar Sign ($) Means In Jquery?
      Dollar Sign is nothing but it’s an alias for JQuery. Take a look at below jQuery code

      $(document).ready(function(){
      });

      Over here $ sign can be replaced with “jQuery ” keyword.

      jQuery(document).ready(function(){
      });

Dbase Interview Questions

    1. 34. Mac, Windows Or Linux? Why Do You Love This Platform While Using Jquery?
      I switched to Mac hardware around a year ago and I’m totally in love with it. All components work together nicely, and so far, I never had to return my Mac book Pro to the Apple Store because of an issue. However, I’m still using Windows through Parallels because OSX, while visually nice and stable, has fundamental usability flaws.
      One of these flaws is the Finder. I recently worked on the jQuery UI Selectables in the labs version, and once again saw that the Finder had great flaws when it comes down to selection. For instance, if you select multiple items and click on one of them, the multiple selection isn’t cleared. Also, my tools that I love for windows simply don’t have an alternative yet .

 

    1. 35. How Is Body Onload() Function Is Different From Document.ready() Function Used In Jquery?
      Document.ready() function is different from body onload() function because off 2 reasons.

      1. We can have more than one document.ready() function in a page where we can have only one onload function.
      2. Document.ready() function is called as soon as DOM is loaded where body.onload() function is called when everything gets loaded on the page that includes DOM, images and all associated resources of the page.

 

    1. 36. What Is Jquery Ui?
      JQuery UI is a library which is built on top of JQuery library. JQuery UI comes with cool widgets, effects and interaction mechanism.

Magento Interview Questions

    1. 37. Name Some Of The Methods Of Jquery Used To Provide Effects?
      Some of the common methods are :

      1. Show()
      2. Hide()
      3. Toggle()
      4. FadeIn()
      5. FadeOut().

 

    1. 38. What Are The Different Type Of Selectors In Jquery?
      There are 3 types of selectors in Jquery

      1. CSS Selector
      2. XPath Selector
      3. Custom Selector.

 

    1. 39. How Can You Select All Elements In A Page Using Jquery?
      To select all elements in a page, we can use all selectors, for that we need to use *(asterisk symbol).

        

 

    1. 40. Which Version Of Jquery File Should Be Used?
      In most of the recent releases so far, the core functionality of jQuery remains same however some more cool and better features are added. Ideally you should use the latest jQuery files available. By doing this you ensure that your earlier functionality will still work and you can use new features available as part of the new release.

PHP5 Interview Questions

    1. 41. What Are Selectors In Jquery Mean ?
      Generally in HTML, if we need to work with any control on a web page we need to find the control. For that we use document.getElementByID or document.getElementByName. But in jquery we do it using Selectors.
      Using this selectors we can select all the controls as well using a symbol (* )
      A sample code snippet can be of this form

      
      

 

    1. 42. Do We Need To Add The Jquery File Both At The Master Page And Content Page As Well?
      No, if the Jquery file has been added to the master page then we can access the content page directly without adding any reference to it.
      This can be done using this simple example

WordPress Interview Questions

    1. 43. What Is The Advantage Of Using The Minified Version Of Jquery Rather Than Using The Conventional One?
      • The advantage of using a minified version of JQuery file is Efficiency of the web page increases.
      • The normal version jQuery-x.x.x.js has a file size of 178KB but the minified version jQuery.x.x.x-min.js has 76.7 KB.
      • The reduction in size makes the page to load more faster than you use a conventional jQuery file with 178KB.

 

    1. 44. What Is Cdn And How Jquery Is Related To It?
      CDN
      – It stands for Content Distribution Network or Content Delivery Network.
      Generally, a group of systems at various places connected to transfer data files between them to increase its bandwidth while accessing data. The typical architecture is designed in such a way that a client access a file copy from its nearest client rather than accessing it from a centralized server.
      So we can load this jQuery file from that CDN so that the efficiency of all the clients working under that network will be increased.
      Example :

      We can load jQuery from Google libraries API

 

    1. 45. Can We Select A Element Having A Specific Class In Jquery ?
      Yes, we can select an element with a specific class, we use the class selector.The class name must contain the prefix as “.” (dot).

 

    1. 46. What Are Features Of Jquery Or What Can Be Done Using Jquery?
      Features of Jquery:

      1. One can easily provide effects and can do animations.
      2. Applying / Changing CSS.
      3. Cool plugins.
      4. Ajax support
      5. DOM selection events
      6. Event Handling.

 

    1. 47. What Are The Advantages Of Jquery ?
      There are many advantages with JQuery. Some of them are :

      • It is more like a JavaScript enhancement so there is no overhead in learning a new syntax.
      • It has the ability to keep the code simple, readable, clear and reusable.
      • It would eradicate the requirement for writing complex loops and DOM scripting library calls.

 

    1. 48. Why Jquery?
      jQuery is very compact and well written JavaScript code that increases the productivity of the developer by enabling them to achieve critical UI functionality by writing very less amount of code.
      It helps to

      • Improve the performance of the application
      • Develop most browser compatible web page
      • Implement UI related critical functionality without writing hundreds of lines of codes
      • Fast
      • Extensible – jQuery can be extended to implement customized behavior.

      Other advantages of jQuery are

      • No need to learn fresh new syntax’s to use jQuery, knowing simple JavaScript syntax is enough.
      • Simple and Cleaner code, no need to write several lines of codes to achieve complex functionality.

 

    1. 49. What Is The Use Of Delegate() Method In Jquery?
      The delegate() method can be used in two ways.
      1) If you have a parent element, and you want to attach an event to each one of its child elements, this delegate() method is used.
      Ex:Un-ordered
      2) When an element is not available on the current page, this method is used.
      .live() method is also used for the same purpose but, delegate() method is a bit faster.

 

    1. 50. What Is The Name Of Jquery Method Used For An Asynchronous Http Request?
      jQuery.ajax().

 

300+ TOP Polo Interview Questions & Answers

  1. 1. How Many Players Are There In A Polo Team?

    4

  2. 2. How Many Players Are There In A Team Of Indoor (arena) Polo?

    3


  3. Football Interview Questions

  4. 3. What Is The Term Penalty 1?

    Automatic goal.

  5. 4. What Is The Duration Of One Round In Polo Called?

    Chukka/chukker.


  6. Football Tutorial

  7. 5. How Long Is A Chukka?

    7 minutes.


  8. Cricket Interview Questions

  9. 6. Which Is The Oldest Polo Club In The World Still In Existence?

    Calcutta Polo Club.

  10. 7. Which British Regiment Introduced The Game Of Polo To England In The 19th Century?

    10th Hussars.


  11. Cricket Tutorial
    Badminton Interview Questions

  12. 8. In Which Iranian City Would You Find The Oldest Polo Square?

    Isfahan.

  13. 9. From Which Indian Princely State Did The British Pick Up The Game Of Polo?

    Manipur.


  14. Volleyball Interview Questions

  15. 10. Ferdowsi, The Most Famous Iranian Poet-historian, Gives A Number Of Accounts Of Royal Polo Tournaments In His 9th Century Epic. Name The Epic?

    Shahnameh.


  16. Badminton Tutorial

  17. 11. It Is Now Generally Accepted That Modern Polo Originated In Manipur. By What Name Do The People Of Manipur Call The Game Of Pool?

    Sagol Kangjei.


  18. Boxing Interview Questions

  19. 12. Which Indian Cricketer And Field Hockey Player Died Playing Polo?

    Iftikharali Khan Pataudi.


  20. Football Interview Questions

  21. 13. Are Polo Ponies Horses Or Ponies?

    Originally, no horse higher than thirteen hands and two inches (54″) was allowed to play in the game of polo, so the horses were of “pony” size. Today there is no size limit and the horses used range from 14 to 16+ hands. Most polo horses are between 5 and 15 years of age, and are thoroughbreds, or cross breeds of thoroughbred and quarter horses.

    The ideal polo pony combines speed, agility, courage, temperament and intelligence, and players acknowledge that a good pony contributes 50-80% of the pony/rider team’s ability. This is why you will see “Best Playing Pony” honors being awarded after important games and tournaments.


  22. Volleyball Tutorial

  23. 14. How Big Is The Polo Field?

    The polo field is 300 yards by 160 yards (about the area of nine football fields). The goal posts are set eight yards apart.

  24. 15. What Are The Boards That Run The Length Of The Field?

    Sideboards help to keep the ball in play. Standing no more than 11 inches high and made of wood, sideboards are generally painted red or green.


  25. Karate Interview Questions

  26. 16. How Do You Score The Game?

    When the ball crosses the line between the goal posts, it is a goal, regardless of who knocked it through (including the horse). In order to even out the affects of wind and turf conditions, teams switch goals (ends of the field) after each point is scored.


  27. Boxing Tutorial

  28. 17. How Many Players On Each Team?

    Four per team outdoors, three indoors (where four would be a crowd).


  29. Running Interview Questions

  30. 18. How Many Periods In A Game?

    There are six periods, called “chukkers,” in a polo game (four in Indoor/Arena Polo), each lasting 7 minutes. At the end of the 6 1/2 minutes, a bell sounds to let the players know 30 seconds remain. At 7 minutes, a horn sounds to end the period.

    In the event of a tie at the end of the final chukker, there is a 5-minute intermission to allow the players to catch their breath and change to a fresh mount before beginning a chukker in which the first team to score wins the match.


  31. Cricket Interview Questions

  32. 19. How Does The Player Handicap System Work?

    Players are rated on a scale of -1 to 10, determined by a player’s horsemanship, hitting, and quality of horses, team play, game sense, and sportsmanship. The team handicap is the sum of its players’ handicaps. In handicap matches, the team with the higher handicap gives the difference in goals to the other team. For example, a 6-goal team will give two goals to a 4-goal team.


  33. Karate Tutorial

  34. 20. What Do The Player’s Numbers Mean?

    Number 1 is a forward, and attacking offensive player similar to a wing in hockey or a forward in soccer. Number 1 is also expected to “ride-off” the opposing defensive player allowing a trailing teammate the opportunity to score, similar to a blocking back in football.

    Number 2 is also an offensive player, expected to be able to turn quickly and follow the lead of the Number 1 in order to be in position to pick up a pass or pick up a missed or blocked shot. His or her defensive responsibility is the opposing Number 3.

    Number 3 is the field general. He or she attacks the opposing offense and turns the ball up field, usually with a pass ahead to Number 1 or Number 2. The Number 3 must be able to hit long with accuracy. The Number 3 also aids in defense, taking the opposing Number 2 or offering defensive support to his or her Number 4.

    Number 4 (also called the “Back”) defends the goal and sends the ball back towards the opponents’ goal.

    These roles are flexible, however, and in the rapid course of a game players may swap positions until they have a chance to return to their place on the field.


  35. Basketball Interview Questions

  36. 21. Besides The Horse, What Kind Of Equipment Do You Need?

    The mallet, known as a “stick,” is made from a shaft of bamboo with a head that is either bamboo root or a hard wood such as maple. Mallets vary in length from 48 to 54 inches and are very flexible in comparison to a golf club or hockey stick.

    The ball is usually plastic. It weighs 4 1/2 ounces and is 3 1/2 inches in diameter. In play, the ball travels about three times faster than the horse and rider who last hit it.

    A polo helmet provides safety and is designed to remain comfortable during play, and knee pads protect the player’s knees when “riding off” or “bumping” an opponent.

  37. 22. Is There More Than One Way To Hit The Ball?

    Yes, many ways. Players can swing the mallet on either side of the horse (“near side” = left hand side, “off side” = right-hand side). A backshot is a backhand swing sending the ball in the opposite direction. A neck shot is the ball hit under the horse’s neck from either side. A tailshot is hitting the ball behind and across the horse’s rump.


  38. Carrom Tutorial

  39. 23. Why Do The Players Keep Changing Horses?

    Polo ponies run the equivalent of one to two miles during a seven-and-a-half-minute chukker, so they must be rested frequently. At the high-goal level, players ideally will have a fresh horse every period although many will “double” on their best ponies.

  40. 24. Why Do The Horse’s Manes And Tails Look The Way They Do?

    To prevent the mane and tail becoming tangled with the reins or mallet during play, the man is trimmed (“roached”) and the tail is tied.


  41. Badminton Interview Questions

  42. 25. Is It True You Can’t Play Left-handed?

    Yes. For safety reasons, lefties were banned from polo in the mid-1930s; the restriction was relaxed after World War II when polo players of any persuasion were scarce, but the USPA reinstated the ban in 1974.


  43. Running Tutorial

  44. 26. I’ve Never Been To A Match. Is There Some Sort Of Etiquette For Spectators?

    Apparel for spectators varies from club to club, and runs from casual to fashionable. If you are unsure, call or check the club’s website before your first visit.

    When the match begins, keep your eye on the ball and horses; both travel at high speeds. Stay back from the sideboards & end lines – the ball and horses do not always stop at these boundaries. Keep children close at hand and pets on a leash.

    And do enjoy the halftime “divot stomp” – stroll out onto the field to replace divots and get a firsthand understanding of the size of the field.

300+ TOP Photon Interview Questions [UPDATED]

  1. 1. What Is Photon ?

    It is the quantum of electromagnetic radiation, such as light.

  2. 2. What Is Electron ?

    Small, negatively charged subatomic particle, every electrically neutral atom has as many orbiting electrons as protons in nucleus.


  3. Sound Interview Questions

  4. 3. Who Discovered Photoelectric Effect ?

    Hall Wachs 

  5. 4. Who First Explained The Phenomena Of Photo Electric Effect ?

    Albert Einstein

  6. 5. Who Discovered Positive Rays ?

    Gold Stein


  7. Electronics Interview Questions

  8. 6. What Is An Electron Microscope ?

    It is an instrument that uses beam of electrons to produce magnified images of extremely small objects, beyond range of optical microscope .

  9. 7. Who Was The First Scientist To Measure The Charge Of An Electron ?

    Robert Millikan


  10. Physics Interview Questions

  11. 8. Ratio Of Charge To Mass Of An Electron Is Called What ?

    Specific charge

  12. 9. What Helped The Discovery Of Isotopes ?

    The study of positive rays.


  13. Thermodynamics Interview Questions

  14. 10. Which Is Known As Cathode Rays ?

    The invisible rays coming from the cathode of discharge tube are known as cathode rays.

  15. 11. The Specific Charge For Cathode Rays?

    Constant


  16. Dimensions Interview Questions

  17. 12. What Converts Light Energy Into Electric Energy ?

    A photo electric cell.


  18. Sound Interview Questions

  19. 13. Which Branch Of Physics Can Be Set To Have Begin With The Study Of The Conduction Of The Electricity Through Gasses ?

    Atomic physics

  20. 14. What Is Based Upon The Conservation Of Energy ?

    The photoelectric effect.

  21. 15. The Maximum Energy Of The Electrons Released In Photocell Is Independent Of ?

    Intensity of incident light.


  22. Unit of Measurement Interview Questions

  23. 16. Which Device Is Used To Measure Light Intensity ?

    Photocell.

  24. 17. What Is The Rest Mass Of Photon ?

    Zero


  25. Machine Dynamics Interview Questions

  26. 18. Which Are The Different Type Of Photo Electric Cell ?

    Photo emissive cell, photovoltaic cell and photo – conductive cell. 


  27. Electronics Interview Questions

  28. 19. What Is A Cathode Ray Oscilloscope ( Cro ) ?

    It is an instrument used for plotting one varying physical quantity, potential difference, sound pressure, heart – beat against another current, displacement and time respectively.

  29. 20. Who First Attempted To Find The Mass Of An Electron ?

    J.J.Thomson in 1897.


  30. Gravitational Interview Questions

  31. 21. What Is Called As The Work Function Of A Metal ?

    The work function of metal is the amount of energy needed by an electron to cross over the surface barrier of the metal.

  32. 22. What Is Vacuum Diode ?

    It is an electrostatic device in which the source of electrons is a hot cathode and the manipulation of the current is achieved through the adjustment of potential of the cathode.

  33. 23. What Is Space Charge ?

    The negatively charged cloud of electrons near the cathode is called space charge. 


  34. Light Interview Questions

  35. 24. Who Discovered The Photoelectric Effect ?

    Heinrich Hertz in 1887.


  36. Physics Interview Questions

  37. 25. The Phenomenon Of Emission Of Electrons By Light Is Known As?

    Photo electric effect.

  38. 26. Who Presented The Quantum Theory Of Radiation ?

    Max Planck in 1901.

  39. 27. What Is A Photo Emission Cell ?

    It consist of a photo cathode and anode mounted in an evacuated glass tube. The cathode is usually a semi – cylindrical plate while anode is a wire ring.


  40. Thermodynamics Interview Questions

  41. 28. What Is A Photo Conductive Cell ?

    It is a device whose resistance decreases when illuminated. 

  42. 29. Explain Why A Discharge Tube Appears Dark, When Evacuated To Very Low Pressure ?

    No discharge passes through the discharge tube as there is no carrier of charge due to very low density at that pressure no collision take place hence no light is emitted. As a result, the discharge tube appears dark.

  43. 30. Why Is The Sunlight Not Deflected When Passed Through Either Electric Field Or Magnetic Field ?

    The sun light does not contain any charged particles. It is made up of electro magnetic waves hence it is not deflected either by  electric or magnetic field.

  44. 31. What Is The Difference Between Thermionic Emission And Photo Electronic Emission ?

    The thermionic emission is due to heat, i.e., electrons acquire energy by heat. On the other hand, in photo electric emission, the free electrons in metals observe light photons and acquire energy.

  45. 32. Does Each And Every Incident Photon Essentially Effect An Electron ?

    No, it may be observed in some other way. Only about 1% of incident photons eject electrons.

300+ TOP Function Point Analysis Interview Questions [REAL TIME]

  1. 1. What Is Function Point Analysis? What Is Function Point?

    Function Point Analysis (FPA) is a software measurement technique based on the users point of view. It measures the software functions and Function Point (FP) is its measuring unit. The method has as an objective to become independent of the technology being used to build the software. In other words, FPA looks to measure what the software does and not how the software was developed.

    This being said, the measurement process (also called function point counting) is based on a standard evaluation of the user’s functional requirements. This standard procedure is described by IFPUG in the Counting Practices Manual.

    The main estimation techniques used for software development projects assume that the software size is an important driver for the estimation of its development effort. Thus, knowing its size is one of the first steps in the effort, duration and cost estimation. 

    At this point it is important to know that function points do not measure effort, productivity nor cost directly. It is exclusively a software functional size unit. This size, along with other variables, is what could be used to derive pro-ductivity, estimate effort and cost of software projects.

  2. 2. Who Created Function Points Analysis (fpa)? Why It Was Created?

    Function Point Analysis (FPA) was invented in 1970’s as a result of a project develo-ped by the researcher Allan Albrecht of IBM. His job involved a productivity analisys for software projects developed by a service unit of IBM. To do this he developed a method to measure software independently of the programming language used, checking only the external aspects of the software, primarly based on the user’s vision.

    You can read the complete and original work in which Function Point Analysis was presented in October of 1979:  Measuring Application Development Productivity — Allan J. Albrecht. This article is much more than just a historical curiosity, and is still applicable today.


  3. SAP CRM Functional Interview Questions

  4. 3. Is The Function Point Analysis (fpa) Technique Owned By Some Company?

    No. Despite having emerged in IBM, the result of this project was opened to the whole software community.

    Nowadays, the standard recognized for Function Point Analysis (FPA) is defined in Counting Practices Manual (CPM) mantained by the IFPUG — International Function Point Users Group.

    The IFPUG is a nonprofit entity composed by people and companies from all over the world, with the purpose of promoting a better management of the development proces-ses and software maintenance by the use of the Function Point Analysis.

  5. 4. What Are Function Point Analysis (fpa) Benefits?

    We can highlight several benefits on applying function point analysis in organizations:

    • A tool for determining the size of a purchased package by counting all the functions included.
    • Provides assistance to users in determination of benefits of a package for their organization, by counting the functions that specifically match their requirements. When assessing the cost of the package, the size of the functions that will be effecti-vely used, the productivity and cost of the staff is possible to perform a “make or buy” analysis.
    • Supports the analysis of productivity and quality, either directly or in conjunction with other metrics such as effort, cost and defects. But if the development method of the organization is chaotic (each project is developed in a different way), even if the func-tion points counting of the project and the effort record have been made correctly, the analysis of productivity among the projects would have been impaired.
    • Supports the project scope management. A challenge of any project manager is to control “scope creep”, or the increase of the scope. To make estimates and measure-ments of function points of the project at every stage of its life cycle is possible to deter-mine whether the functional requirements increased or decreased, and whether this variation corresponds to new requirements or requirements that already exist and were just more detailed.
    • Complements requirements management to assist in verifying the soundness and completeness of the specified requirements. The process of counting function points favors a structured and systematic analysis of the requirements specification and brings similar benefits to a peer review process.
    • A tool for estimating costs and resources for software development and maintanance. By carrying out a count or estimate function points early in the lifecycle of a software project, it’s possible to determine its functional size. This measurement can be used as input for many models of effort, time and cost estimation.
    • A tool to support contract negotiation. Function points can be used to generate seve-ral service level indicators (SLA – Service Level Agreement) in software development and maintenance contracts. Besides that, it allows contract establishments by using unit price – function points – where a unit represents a tangible asset to the client. This modality allows for a better risk distribution between the client and provider.
    • A normalization factor for software comparison or for comparison of productivity in the use of differents methods. Several organizations, such as ISBSG, provide a data repo-sitory of software projects that enable the implementation of benchmarking with similar projects in the market.

  6. System Analysis and Design Tutorial

  7. 5. Is It Necessary To Be A Software Developer (systems Analyst, Programmer, Etc.) To Use The Function Point Analysis (fpa)?

    No. The great advantage of the Function Point Analysis is that it is based on the USERS POINT OF VIEW, allowing its concepts to be understood by the developer and the user. The aim of the technique is to measure the functiona-lity that the software provides to the user regardless of technology used for its implementation. This measurement is based only on the requirements that the software must attend to.


  8. System Analysis and Design Interview Questions

  9. 6. Is There An Entity Or Organization Responsible For The Standardization Of Fpa?

    The standard recognized by the software industry for FPA is the Counting Practice Manual (CPM) maintained by the IFPUG (International Function Point Users Group).

    The IFPUG is a non-profit entity composed of people and companies of various countries whose purpose is to promote better development process management and maintenance of software through FPA.

  10. 7. Has There Been Any Enhancements In Function Point Analysis (fpa) After Its Creation?

    Yes, since the first publication of Function Point Analysis proposed in 1979, several refinements were incorporated to the technique over the years. -And this process conti-nues. But the gist of the technique has changed very little. This results from the fact that the technique is oriented to measure the functionality that the software provides to the user, regardless of the technological platform on which the software, development methodology or programming language used for its construction.

    After the founding of IFPUG in 1986, systematic and consistent development of the Function Point Analysis was created. IFPUG has a committee responsible for the editing and updating of the Counting Practices Manual, which currently is at version 4.3, this version was published in January 2010.

    There is no defined frequency for the IFPUG to publish updates to its manual, and the updates do not seek radical changes. They have the intention to provide further clarifi-cations regarding the definitions and counting rules, thus improving the consistency of measurements and reducing the subjectivity in the interpretations.


  11. Object Oriented Analysis and Design Tutorial
    SQL Interview Questions

  12. 8. Who Uses Function Point Analysis (fpa) In The World?

    The IFPUG has affiliates in more than 40 countries around the world, having a strong presence in Germany, Australia, Brazil, Canada, Korea, United States, India, England, Italy, Colombia, Uruguay, Mexico, Argentina and the Netherlands.

    Companies such as IBM, Unisys, Xerox, HP, CitiGroup, Tata Consulting Services, Lockheed Martin EIS, Booz Allen & Hamilton, Nielsen Media Research, Banco do Brasil, Citibank, HSBC, Indra , Bank of Canada, Ralston Purina Co., Banco de la República (Central Bank of Colombia), Northrop Grumman Corp, Samsung SDS Co Ltd, BASF Corporation, Banco Central de Chile, Accenture, IBM, Petrobras, Pepsi Co, Compuware, Pricewaterhouse Cooper, Vale, Banco Santander, Petrobras and Telefonica, among others, are using function points for software project management.

  13. 9. Is It Possible To Use Function Point Analysis (fpa) In An Object-oriented Design?

    Yes. Function Point Analysis (FPA) is an independent technology technique used to model or implement software. Therefore, a piece of software has the same funcational size in function points, whether it´s developed using OO technology or another appro-ach.

    What may be different between the two approaches is that in OO design, productivity (hours/FP) may be better due to reuse. Making an analogy with a construction building: we can build a house of 100m2 in the conventional way or using prefabricated modu-les. In both cases, the size of the house will be the same, the only differing factors will be the construction time or cost.


  14. SQL Server Analysis Services (SSAS) Interview Questions

  15. 10. What’s The Size To Consider That A Software Project Is Small, Medium Or Large?

    It is desirable within an organization that the project management process be scalable in accordance with the project size. Big projects need more rigorous and formal on its management than small projects. Using the same approach for any size project means burdening smaller projects with a relatively high cost of management, ie, waste of resources.

    There is no industry standard definition to define if a project is small, medium or large. This is a relative concept and it must be solved by each organization. In fact, it’s not usually necessary to define a project in 3 levels (small, medium and large). For organi-zations that usually work in a similar way, that classification could be unnecessary and using the same management process for all projects might be the best approach. Some organizations have a management tactics for just two types of projects (small and large). Also, it is not prohibited if an organization wants to define more than 3 levels for the project size; (for example: small, medium, large and extra large). But this is not usual. 

    In summary, the concept of small, medium or large is very relative; each organization can establish it own criteria to appoint a project in relation to its size.


  16. Functional Programming Tutorial

  17. 11. What Is The Price Of One Function Point ($/fp)?

    The value of $/FP will vary in accordance with the work required for the delivery of soft-ware functionality, in accordance with the technical standard and quality required by customers, as well as the amount of deliverables (artifacts, documents, models, etc) required by the customer. In summary, everything that affects significantly the cost but has no direct relation to the size measured by the Function Point Analysis (FPA), is computed on the function point price.

    Example 1: when you hire a company just for coding and testing a system, it is expec-ted that the function point price would be lower than if you hire the same firm to con-duct the entire lifecycle of software development, from requirements gathering through development.

    Example 2: the function point price only for software delivery is certainly lesser than the function point price where, besides the software, several papers must be delive-red (subproducts) as : UML models, user’s manual, online helpdesk, prototypes, test plans and cases, etc.

    Example 3: Nowadays the range of available technologies for developing systems is huge, and each one can directly influence in the productivity (either positively or nega-tively) of the work to be done. Thus it is quite common in the market to have differentia-tion of $/FP in regards to the technological platform (mainframe, web, client-server, etc) and/or programming language (COBOL, C, Java,. Net, etc).

    Example 4: Function Point Analysis, according to the IFPUG standard, measures the maintenance ignoring the size of the maintenance that the function will go through. Usually, the effort to maintain a function tends to be lower than to develop it. Thus, there may be a function point price differentiation in improvement projects for new, modified and deleted features.

    In summary, there is not one price for a function point and also there is no public and updated price list available, where the function point price could be seen. Also because this information is considered proprietary or strategic for most organizations. But it is possible to obtain price information from government contracts through a rese-arch on the biddings that occurred in the past, through the official brazilian gazette or directly with the government organanization.

    Another possibility to get this price list is using organizations that maintain the histori-cal data of software projects (e.g. ISBSG — www.isbsg.org) and provide a delivery rate indi-cators conversion (H/PF) to price ($/FP). But even if we could get a list of the $/FP value, the variation in numbers is so significant that it is easy to find a range of values whose variation between minimum and maximum can be up to 10 times, for example $ 100/FP to $ 1.000/FP.

    For a more realistic price information (or cost) of the FP, it is better to derive this from projects that have already been undertaken. For projects already completed, informa-tion that is certainly available is how much was paid or charged for each project and what activities were included. If the projects functional size (FP) is not available, it could be attained through a measurement or an estimate, just by reviewing the require-ments. Having the price of the project and its size in function points,  the price per func-tion point ($/FP) can be attained. However, it is likely that your organization undertakes projects of different types. In this case, an analysis of the $/FP should be done for each category of projects, because a single price point is hardly representative for projects of different types.


  18. Rational Functional Tester Interview Questions

  19. 12. Is It Possible To Apply The Function Point Analysis (fpa) On Tasks That Are Not Organized As Projects?

    In general, this kind of work involves a very limited scope. As a result, it is difficult to establish a relationship between the functional size and others metrics such as effort, time and cost. However, it´s important to remember that Function Point Analysis (FPA) is not simply a tool for generating estimates, used in project planning. The nature of the work involved in this question is characterized not as a project, but as a continuous operation.

    Take as an example the systems maintenance with estimated effort up to 200 hours. Separately, the sizing of orders that represent the requirements (not always functional) object maintenance may not have a linear relationship with the effort involved for its achievement. However, taking into account the knowledge with all of the requests in a given period of time, we can arrive at different conclusions.

    For example, a given maintenance request did not involve the addition, modification or elimination of certain system features. In this case, it is useless to know that the main-tenance functional size will have no function points. But the system that gives mainte-nance has a functional size. You can monitor the amount of maintenance hours per function points of this system. This trend helps to evaluate whether or not it is time to replace this system with a new one.

    Suppose that there is a process in this organization where, after the service order has been served by the maintenance team, the product goes through an approval process. The feature set in the approval may be scaled in terms of function points. Likewise, the amount of identified defects in the process can be documented. Monitoring the interaction of these two metrics — Function Point and Defects — during a period of time can bring out problems in the maintenance process. Based on this trend it is pos-sible to take actions to reduce this relation.


  20. SAP CRM Functional Interview Questions

  21. 13. Two Functions, That Are Significantly Different In The Implementation Effort, Are Scaled With The Same Number Of Function Points. Doesn´t It?

    Function Point measures the functional size of the software and not the effort involved in its design and construction. The higher the linearity found between functional size and this effort (productivity), higher the practical value of the measurement obtained. The more this relationship is linear, more easily other measures can be extrapolated from the functional size, as the cost and effort, for example.

    If it’s looked at a micro level, in assessing the size of two specific transactions, certainly the potential deviation in derived productivity is high, but as we expand our sample size, we realize that the extreme situations compensate themselves and, on average, we can observe higher linearity in the relationship between effort and functional size.

    Let’s think about some alternative metrics to the function point, evaluating the impact of these considerations on these metrics, for example, Lines Of Code. In the Organization as a whole, or even in a specific project, there are also situations where the counting of lines of code number is not directly related to the effort involved in the specification, documentation and testing of the project. In other words, there are two projects with dif-ferent quality requirements or increased demand in the specification, where in spite of one being more “complex” and requiring more development effort, the resulting soft-ware has fewer code lines than the other. Not to mention the other limitations inherent in the LOC metric.

  22. 14. Why Are There No Tools For Automatic Function Points Counting Of A System?

    There are several software products that from a program model or its source code, cal-culate its size in function points. However, comparisons between the results produced by different tools for the same system, frequently have an unacceptable variation. These numbers, also often differ greatly from a manual count.

    The answer to this variation is in how these tools calculate the number of function points. Some are based on files, screens, reports and other elements to derive a num-ber. Although there is often a direct relationship between these objects and data functi-ons and transactions functions of Function Point Analysis (FPA), it must be remembe-red that the technique measures only the logical functions of the system. And these tools have difficulties in differentiating logic functions from physical functions. For example, not every file or table from a program file corresponds to an internal logical file or external interface file. Or even an elementary process can be implemented through multiple screens. To do the measurement in a correct way, the software should have enough intelligence to make this judgment. That is, this software would have to have the skill to read the program and interpret the user´s requirements. However, there is no software with this artificial intelligence.

    Other tools are based on the backfiring technique, which is to derive the number of function points from the program number of lines of code, based on a previous relati-onship established between LOC and FP. However, this is a technique that has been widely criticized, and whose application is restricted.

    There are software products to support the process of counting function points that automate a part of the process, but the decision and analysis of that should be consi-dered, remains as the responsibility of the human user who enters the data, and not of the software.

  23. 15. What Is Backfiring?

    This method consists in deriving the number of function points according to the application from its physical size, measured in lines of code (LOC), using a constant conversion factor depending on the programming language. The idea has much appeal, since the counting of lines of code can be done through automatic tools and consequently, the number of function points could be derived immediately. For example, using a conversion factor of 80 LOC / FP for Java and having an application written in 80,000 lines of Java code, we get to 1,000 function points for that same application.

    However, often, this technique has considerable errors when confronted with a manual count of function points of an application. This is because it assumes a linear relationship between functional size (in function points) and the physical size of the program (in lines of code), which are different concepts. Another aspect is that there is no consensus in the various organizations that publish these relationships. The numbers shown may differ as much as 100%. 

    When you have a developed system scenario with a mix of programming languages, the issue is more complicated. 

    Some of the reasons for this wide variation are: different assumptions in defining what is a line of code, and projects databases with many different features. Hence the necessity to calibrate the conversion factor for the reality of the projects developed by the organization. However, to make this adjustment, there must be a representative sample of projects developed by the organization in a particular language and an experienced and qualified professional to interpret the results and understand the reasons for this possible distortion for this conversion factor.

    Due to these factors, applying backfiring to obtain the size in function points from lines of code is a risky technique and characterized by a large margin of error. Hence, IFPUG highlights in their FAQ, that it can even be used (with caution) in legacy systems, where a manual count is unworkable in practice and accuracy is not a critical factor. Some professionals argue that backfiring is a quick and cheap way to get the size in function points of an organization applications portfolio. Others, argue that cheap comes out expensive: it is better to invest in a manual counting of function points and have reliability of these data, with compensation in the long term.

    On the other hand, many models of software estimating such as COCOMO II, use as primary data their size in lines of code. In these cases, it is very often to do the opposite: get the number of lines of code from the size in function points. This is because in the early stages of a software project, is easier to estimate or measure its size in function points than in lines of code. Even then, the above considerations remain valid on backfiring.


  24. Object Oriented Analysis and Design Interview Questions

  25. 16. What Does Functional Size Mean In Relation To The Iso/iec Standard?

    Aiming to solve the inconsistencies between various methods arising from the model of Function Point Analysis, proposed by Allan Albrecht, and to establish a more rigorous method of measuring functional size, a group called WG12 (Working Group 12) was formed, subject to SC7 ( SubCommittee Seven) of JTC1 (Joint Technical Committee One) established by ISO (International Organization for Standardization) in conjunction with the IEC (International Engineering Consortium).

    As a result of the work of WG12, the standard 14.143 was established, which is split into five parts:

    14143–1: Concepts Definition 

    14143–2: Conformity Assessment of Software Measurement Methods in Relation to ISO/ IEC 14.143–1

    14143–3: Verification of a Functional Size Measurement Method

    14143–4: Reference Model for Functional Size Measurement

    14143–5: Determination of Functional Domains for use with Functional Size Measurement

    ISO / IEC 14.143 was developed to ensure that all the functional size measurement methods are based on similar concepts and can be tested to ensure that they behave similarly and as expected by a method of measurement, depending on the functional domains that they are applied.

    At the end of 2002 the technique of Function Point Analysis, as defined in version 4.x of the IFPUG manual, was approved (under the standard 20.926) as a Functional Size Measurement Method, adhering to ISO / IEC 14143.

  26. 17. In Addition To The Ifpug Function Points, Are There Any Other Methods Of Functional Measurement?

    Yes, there are three others standard methods of functional measurement:

    NESMA — The association of metrics from Netherlands has its own counting manual, currently at version 2.0, whose the first version in 1990 was based on IFPUG manual. It uses the same philosophy, concepts, terms and rules of IFPUG, with some different guidelines. The measurement of a development project or an application produces results very similar under both approaches – IFPUG and NESMA. However, both organizations have different approaches to function point analysis application in software improvement projects.

    Mark II — was created by Charles Symons in the mid80s. Its spread has been hampered initially because the method was owned by KPMG consultant for several years. Today is a public domain metrics method maintained by the UK Association of Metrics —UKSMA. It’s a method wich its application is restricted to the UK.

    COSMIC — In 1997 a group of researchers from the University of Quebec developed a new method for measuring functional realtime systems, called Full Function Points (FFP). In 1998 a group of experts in software measurement constituted the COSMIC (Common Software Measurement International Consortium) in order to develop a new method of measuring functional size based on the best features of existing methods and incorporating new ideas. This new method proposed in 2000, called COSMICFFP, in practice was a refinement of the FFP method. It is not a technique as widespread as the IFPUG, but there is much research being conducted on this method.


  27. Oracle Apps Functional Interview Questions

  28. 18. What Are The First Steps Towards Implementation Of The Function Point Analysis (fpa) In My Organization?

    The first step is to clearly identify what are the goals of the organization. Function Point Analysis can be used for several purposes: estimation of software projects, unit of contracts measurement, support for quality and productivity control, benchmarking and metrics program.

    Each approach has its specific peculiarities; however there are aspects common to all them, highlighted below:

    1. Gain the support of the organization’s direction. Keep in mind that the results of the use of Function Point Analysis in the organization are not always immediate and that the success of its use will depend on the dedication and use of human and financial resources, as well as any program that focuses on processes improvement.
    2. Take advantage of existing opportunities in the organization that may have some common goals. Examples of these initiatives are: ISO, Six Sigma, CMM, PMI, Balanced Scorecard. Taking these initiatives and knowing how to relate (and show to sponsors) Function Point Analysis may contribute to some of the organization´s goals, and will make it easier to accept.
    3. Empower yourself. Knowing the correct technique is essential. It’s amazing the number of cases that Function Point Analysis has being applied incorrectly, and that, invariably ends in failure. The official reference of the technique is the IFPUG — CPM (Counting Practices Manual). Interesting actions in this regard can be:

      Hire a closed class for the whole team involved, so you can adjust the load or summary of the course with the objectives of the process and the reality of the organization. In this case, FATTO usually holds a service package with one week duration: two days to teach the course Training Function Point Analysis; and three days for consulting the beginning of the process and mentoring on the application of the technique in organization’s practical cases.

      Sign up key people that are involved in the process in open Function Point classes. FATTO regularly teaches open courses in several cities in Brazil. See our course schedule for more information.

    4. Set modest initial goals. Start with a pilot project in a simple system. Evaluate the results, make adjustments, review the objectives and move on.
    5. Be aware of technique limitations. There are domains where Function Point Analysis is is restricted. For example, in systems optimization, the technique is not suitable for measuring parts with high algorithmic complexity.
    6. In doubt, make an analogy with the square meter. In general, it is sufficient to solve the issue.
    7. Seek help if necessary. An outside consultant can avoid unnecessary troubles, hasting the process, bringing experience and helping to correct the directions.
    8. Do not compare apples with oranges. Comparisons should only be made between projects that have similarities (development process, technology platform, business area, etc).

  29. System Analysis and Design Interview Questions

  30. 19. What Is The Initial Guidance For The Application Of Function Point Analysis (fpa) In Software Projects Estimations?

    Besides the general considerations presented in the previous post, the following are some specific guidelines to use the function point in estimates.

    Although some authors quote the use of function points directly to derive initial estimates of duration, defects and team size, the most common use is for effort estimation (usually amount of hours).

    The process to estimate effort is very simple: Given a productivity (hours per function point) in a given development environment, simply multiply it by the functional size of software to obtain the desired estimate.

    However, the key question is: which productivity should be employed? Many people use market indicators published by various organizations. But many of these people are frustrated with the outcome.

    The answer is: there are no magic numbers. The productivity to be employed is specific to each organization and not a market average. It must reflect the reality of the development process of the organization in a particular context: development tool, business area or technology platform.

    To obtain its own numbers, the organization may use the data from previous projects and recover information such as effort and size in function points. Grouping similar projects, it is possible to obtain a reliable indicator of productivity.

  31. 20. What Is The Initial Guidance For The Application Of Function Point Analysis (fpa) In Systems Development Contracts?

    Besides the general considerations presented in previous posts, below are presented some specific guidelines for the use of function points in the three main models used for hiring: ManHour, Global Fixed Price and Unit Price.

    In case the contracting model used is that of manhour, where the provider remuneration is not based on presented results, yet in the quantity of work hours in an established period, FPA can be used, for example, for monitoring productivity for the team. To do so, just measure the result data (function points) and the effort data (hours) together and make evaluations relating to both pieces of information.

    When hiring is based on global fixed price, the Function Point Analysis (FPA) can be used as a normalization factor of price in order to ensure that the amount charged for additional functionality not provided, or during the maintenance phase, is consistent with the amount charged at the time that the service was hired.

    The project’s size is measured in function points and, from the total amount charged by the supplier for the project, the value of the function point is calculated. The new proposals are measured regarding its size and then the value of the function point to obtain the amount of new features is applied . Then this value can be compared to the value proposed by the supplier.

    However, the model that can better balance the deficiencies in hiring manhours and the global fixed price is based on unit price (function points). If the supplier delivers a low productivity, he will not be paid for the extra time consumed. Otherwise they will incur more profit in regards to the service provided. If there is an increase in  the scope of service, stressful negotiations will not be required to establish the value for the additional service.

    In this mode, an important factor is to properly define the value of the function point, as we can see in this post.

    In any of the types of contracts adopted, we must be careful with interest conflicts: the measurement of service in function points should never be performed only by the supplier, because it will be paid precisely by the measuring result! You can observe this undesirable practice in some organizations (including government). Internal staff can be used to perform the measurement, or worst case scenario, validate the measurements made by sampling. Another option is to hire an outside company for this service.


  32. Data Analysis Expressions (DAX) Interview Questions

  33. 21. In What Situations Can Be Interesting To Outsource The Function Points Counting?

    The evaluation made to outsource the function point counting services involves basically the same questions to outsource any other activity. Specific situations are highlighted below where the outsourcing may be favorable to the contracting organization:

    In the initial period of implementation of the technique in the organization, the counting of some projects by an experienced professional with the shadowing by the client team can haste the process and also help in absorption of practical knowledge by the team. Its a type of mentoring of sorts.

    An experienced professional has more agility in the counting process. If the organization does not have anyone with this profile and when the counting scope is too large and the time to do it is restricted, it could be beneficial to hire an outside expert in counting. This would be done with interaction with a professional from inside the organization that knows the systems to be counted.

    When the counting needs are sporadic, the costbenefit to train a professional inhome and keep him updated may be disadvantageous in regards to hiring an experienced professional.

    When the function point counting is a systematic need, is important to have internal professionals trained for the task. In this case, outsourcing can be convenient during a peak demand for this activity.

    When it is necessary that the counting must be done (or audited) by a certified professional (CFPS).

    FATTO has a team of certified experts that can help your organization not only in the process of function point counting , but also in the correct application of the Function Point Analysis (FPA) on estimates, the measurement program and contracting software. Please contact us for more information.

  34. 22. What Are The Use Case Points?

    Until a few years ago (early 90s) there was a false notion that Function Point Analysis (FPA) was not adequate to measure objectoriented systems. Those who shared this concept, in practice, don´t really know Function Point Analysis.

    With the spread of construction and design of objectoriented systems, there was also a change in the way in which specifying and modeling systems was done. The UML and Use Cases quickly became industry standard of software.

    Within this context, in 1993 Gustav Karner proposed the methodology of the Use Case Points (based on Function Point Analysis) in an academic article  with a view of estimating resources for software projects using objectoriented development and using the Objectory process.

    The PCU measurement process is summarized in:

    1 — Count the Actors and identify their complexity
    2 — Count the Use Cases and identify their complexity
    3 — Calculate the unadjusted PCU
    4 — Determine the Technical Complexity Factor
    5 — Determine the Environmental Complexity Factor
    6 — Calculate the adjusted PCU

    With the results of these measurements and knowing the average productivity of the organization to produce a PCU, the total effort for the project could be estimated.

  35. 23. What Kind Of Software Can Be Measured By Function Points?

    FPA is a technique to measure the functionalities given by a software to the users; and this measurement is always made on an external perspective, the users’ perspective. However, it is important to say that the concept of user for FPA is not only the one of the enduser of the software. The user for the FPA is any person or thing that interacts with the software at any time. In other words, the user for FPA can be both the person acting as enduser to the software and another software that uses the services of the software in analysis.

    Considering that every and any software exists to offer one or more services (functions) to someone (person or thing); it is concluded that every and any software can be measured by Function Points.

    A common mistake for beginners with FPA is to only consider the endusers´point of view. In this case some types of software will be partially (or completely) “invisible” to this user. Then they mistakenly conclude that FPA does not work for that kind of software. The most common is for the person to learn the principles of the FPA applied to systems with screens and reports. However, when this person faces some software domain which do not have screens, like batch processing, middlewares, basic softwares, it is natural to have some difficulties on measuring it.

    Let’s imagine that the goal was to measure a printer’s driver. Well, there is no enduser (person) for this kind of software. In this perspective, the printer’s driver is invisible to the enduser. However it exists to offer services to someone; in this case, the operating system. Thus, analyzing the printer’s driver in the perspective of the operating system, it is possible to see functions, for example: to start the the printer, inform the general situation of the device, eject a sheet of paper, print, alert the level of the ink, etc…


  36. Informatica Data Quality Interview Questions

  37. 24. Can Fpa Be Used To Produce Estimates For Acceptance And System Testing?

    In some articles, we frequently face many distorted statements and questions regarding the technique of function point analysis, which does not show anything besides a lack of knowledge about the subject. Who has not heard the false statement “function point analysis doesn’t serve to measure objectoriented systems”?

    More recently, with the consolidation of the UML as the standard market language for analysis and objectoriented design, another frequent false claim is that the function point analysis is not meant to measure systems whose requirements were expressed according to specifications of use cases. A specific discussion of this issue was presented in the March 2004 Bulletin.

    Since the late 90’s a test management technique that originated in Holland, called “TMap — Test Management Approach” is gaining traction, driven by the wave of process improvement initiatives based on quality standards such as ISO and CMM. Its implementation is supported by a test estimation technique called Test Point Analysis (TPA) which, in turn, is based on Function Point Analysis (FPA).

    TPA is used specifically to estimate the effort requiredin the execution of acceptance and system testing. For this, the TPA considers relevant, besides the functional size determined by function points, two other elements: the testing strategy and the productivity. Even when the element is “size”, it adds more factors that have more influence on the effort than specifically on functional size, as algorithmic complexity,  degree of integration with other functions and functional uniformity.

    Although it is a consistent and useful technique for increasing the quality of the process and software product, TPA preaches one more fuzzy concept on the analysis of function points when it says that this cannot be used to estimate the effort in activities involving acceptance and system testing. Nevertheless , this means that the Function Point Analysis (FPA) considers the particularities of the development process while applying the technique of counting. Which is not true.

    The result of TPA application is measured in a unit of effort (hours), unlike the function point analysis, which measures the functional size of software project. Thus, as indeed does not directly measure the effort used in the tests, the FPA also does not measure the effort used in the analysis phase, design or construction of the software. Its main function is to measure the functionality delivered by the software project. However, function points can be used perfectly well as an input to a process of effort estimation of different stages of development, as discussed in the January 2004 Bulletin.

    The biggest benefit of TPA is being able to gather, in a systematic way, the factors that influence the effort of a specific stage of the development process, producing more accurate results.


  38. SQL Interview Questions

  39. 25. What Does The Term “user” Mean In Terms Of Function Point Analysis (fpa)?

    When it comes to the information technology area the term “user” is usually referring to the person who uses or interacts with software.

    Being that Function Point Analysis (FPA) is a standard method for measuring software from the user’s point of view, in this context, the term “user” has a broader meaning. According to the Counting Practices Manual, a user is any person or thing that communicates or interacts with the software at any time. That is, beyond one person, a user may be a group of people who have a specific role during their interaction with the software, the department manager, another software or equipment. And for the Function Point Analysis (FPA), interacting with the software means sending data to the application or receiving data from it.

    It should be noted that this definition of user has a meaning very close to the concept of an actor in a use case: any person or thing that interacts with the system and expects an observable value result produced by executing one or more cases of use.

    Taking this widely defined user concept into consideration, during a function point count, it is appropriate to look at the set of possible users whose vision better represents the functions that the application provides. For example, an ATM application has the following users: the bank customer, the agency official, the department manager. Base the count of this application only from the point of view of the end customer and the bank’s selfservice user is to have a limited view of the application. Also It is essential to consider the view of the user who specifies the requirements and business rules, in this case, the department manager.

  40. 26. How Does Function Point Analysis (fpa) Define The Term “application”?

    In the information technology field in general, the term “application” is used to appoint an executable program that meets a set of specific objectives or one objective for the users. As classical example that we can quote is the Windows Calculator, Word, etc.

    Developers, in turn, tend to determine the scope of applications under the physical segmentation of the software. Thus, a single set of related functions is separate according to the following technological issues:

    1. The physical implementation methods. For example, batch or online performed functions
    2. The physical platform on which subsets of functions reside. For example, mainframe or PC (low deck)
    3. The architectures under which the applications are designed. For example, desktop, clientserver, web, or 3tier.

    On Function Point Analysis (FPA) , an application is defined according to the user’s view and according to business considerations and not to technical components. According to the Counting Practices Manual (CPM), an application is a cohesive set of data and automated procedures that support a business objective, which may consist of one or more components, modules or subsystems. Often, the term “application” is used as a synonym for system, application system or information system.

    For the function points analysis the correct understanding of the term and, in turn, the correct identification of an application (enclosed by its boundary) is the basis for the consistent use of the technique, avoiding oversizing or undersizing during the counts.


  41. Structural Analysis Interview Questions

  42. 27. What Are The Objectives Of The Ifpug’s Counting Practices Manual (cpm)?

    The Counting Practices Manual  CPM, of the IFPUG has the following objectives:

    • Provide a clear and detailed description on how to count function points.
    • Ensure that the counts are consistent with the practices of counting reached by IFPUGaffiliated members.
    • Provide guidance on how to perform function points counts based on artifacts of the techniques and methodologies commonly used in software development.
    • Provide a common understanding so that developers of tools provide automated suppport to the function points counting.
    • Be compliant to the ISO / IEC 14143–1 Measurement of functional software.

  43. SQL Server Analysis Services (SSAS) Interview Questions

  44. 28. What Tools Are Suitable For Support And/or Automate The Use Of Function Point Analysis (fpa)?

    The first point to note in this issue is that there are no tools available that automatically count function points reliably. However there are tools available that can support and partially automate the process of function point counts and also to store and manage the results of the counts.

    The simplest tool to be used to record a function point count is a spread sheet. In the “resources” section of our website, there is a free and formatted spreadsheet for function point counts available for download. Despite being the first and simplest tool to be used by many professionals, its use begins to be impractical as the number of counts increases. The control of the count repository is usually manual, and with the increasing amount of data, the task becomes costly.

    When the organization realizes that the spreadsheet no longer meets it needs, a natural course of action is to search tools with more capabilities on the market. The IFPUG has a certification process for the tools to support the function point counts. The list of tools currently certified can be viewed here: http://www.ifpug.org/?page_id=316. According to this process, the tools can be classified into three categories:

    Type 1: The user does the function points count manually and the software provides functionalities for data collection and calculations.

    Type 2: The software provides the functionalities for data collection and calculations, and the user and the system do the interactive function points count, using questions submitted by the system and actions being taken automatically depending on the answers provided.

    Type 3: The software automatically produces a function point count using various sources of information such as the database application, the application itself and artifacts of the development tools. The user can enter the data interactively, but his involvement is minimal during the count. It is important to note that there are no such tools certified.

    Although there are several options of tools on the market to support the use of function points, many organizations choose to develop an inhouse tool integrated with its systems of internal control. Some reasons for this may be:

    • The cost to develop an internal solution is less than the cost of acquisition and maintenance of packages available on the marke.
    • Lack of local support for the solution, due to the fact that most tools on the market are foreign
    • Needs to integrate with internal systems
  45. 29. Is The Size Of A Software’s Unadjusted Function Points Determinant For The Specification Of The Hardware Needed For Its Execution? Why?

    When it comes to hardware requirements for the execution environment of a particular software, the focus of the issue is on the technical or quality requirements, as processing power, volume and transaction data, number of users, security, etc… The functional requirements do not affect anything in this regard. Therefore, there is no direct relationship between the size of a software in function points (whether it’s adjusted or not) with the necessary hardware required for its implementation.

    But the adjustment factor, analyzed by itself from the functional size, includes many general system features  (Distributed Processing, Performance, Heavily Used Configuration, Volume Transaction) that could assist in the  definition  of the hardware requirements of a  software, but it would be an insufficient analysis to define the hardware.

  46. 30. Is It Possible To Apply Function Point Analysis (fpa) For System Maintenance Projects?

    Yes, but not all of the software maintenances are likely to be measured with Function Point Analysis (FPA). Only the maintenances that change the software functional requirements can be measured by the Function Point Analysis (FPA), in this case IFPUG uses the term “improvement” instead of “maintenance”, exactly to make the point that the improvement is not any kind of maintenance. In IFPUG’s concept, the improvement measures all the functions that will be added, changed or excluded from the application, as well as eventual functions of data conversion.

    Maintenance for correction of defects or to keep only nonfunctional requirements are not measured by Function Point Analysis (FPA).