Download - AMD Sample Technical Placement Paper
-
7/28/2019 AMD Sample Technical Placement Paper
1/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
AMD Technical Latest Sample Placement Paper1. What is Dataware Control?
ANS: Any control bound to Data Control.
Ex:- Textbox, Check Box, Picture Box, Image Control, Label, List box,
Combo Box, DB Combo
2. Record set types and Number available in VB?
ANS: 3. =>1- Dynaset, 0 Table, 2 Snap Shot.
3. What is the max size allowed for Max Text box length?
ANS: 32,00
4. What is ADO? What are its objects?
ANS: ActiveX Data Object. ADO can access data from both flat files as
well as the databases. I.e., It is encapsulation of DAO, RDO, and OLE
that is why we call it as OLE-DB Technology. Objects are Connection,
Record Set, Command, Parameter, field, Error, Property.
5. What methods are used for DBGrid in unbound mode?
ANS: AddData, EditData, Readdata, WriteData.
6.What is the basic difference between transparent bridges and
source-route bridges relative to the forwarding processes?
ANS: In a transparent bridged environment, bridges determine whether
a frame needs to be forwarded, and through what path based upon
local bridge tables. In an SRB network, the source device prescribes the
route to the destination and indicates the desired path in the RIF.
7. What is the difference between TRUNCATE and DELETE commands?
ANS: TRUNCATE is a DDL command whereas DELETE is a DML
command. Hence DELETE operation can be rolled back, but TRUNCATE
operation cannot be rolled back. WHERE clause can be used with
DELETE and not with TRUNCATE.
-
7/28/2019 AMD Sample Technical Placement Paper
2/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
8.What is a spanning Tree?
ANS: A spanning tree is a tree associated with a network. All the nodes
of the graph appear on the tree once. A minimum spanning tree is aspanning tree organized so that the total edge weight between nodes is
minimized.
9. What is Data-Link Switching?
ANS: Data-link switching (DLSw) provides a means of transporting IBM
Systems Network Architecture (SNA) and network basic input/output
system (NetBIOS) traffic over an IP network. It serves as an alternative
to source-route bridging (SRB), a protocol for transporting SNA and
NetBIOS traffic in Token Ring environments that was widely deployed
before the introduction of DLSw. In general, DLSw addresses some of
the shortcomings of SRB for certain communication requirements
particularly in WAN implementations. This chapter contrasts DLSw with
SRB, summarizes underlying protocols, and provides a synopsis of
normal protocol operations. The three primary functions of DLSw are :
The Switch-to-Switch Protocol (SSP) is the protocol maintained
between two DLSw nodes or routers.The termination of SNA data-link control (DLC) connections helps to
reduce the likelihood of link layer timeouts across WANs.
The local mapping of DLC connections to a DLSw circuit.
10.What is Parser Bug?
ANS: It is difficult to use database objects declared in a module from
within a form.
11.What is Seek Method which type of record set is available this?
ANS: Only in DbOpenTables.
Syntax: rs.index = "empno"
rs.seek "=" , 10
If with our setting the rs.index then run time error will occur.
-
7/28/2019 AMD Sample Technical Placement Paper
3/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
12. What is Static Variable?
ANS: Its Scope will be available throughout the life time.
13. Diff type of Datatypes?
ANS: LOB (Large Object Data type).
CLOB (Stores Character Objects).
BLOB (Store Binary Objects such as Graphic, Video Chips and Sound
files).
BFILE (Store file pointers to LOB It may Contain filename for photos
store on CD_ROM).
14. Does the minimum spanning tree of a graph give the shortestdistance between any 2 specified nodes?
ANS: No. Minimal spanning tree assures that the total weight of the
tree is kept at its minimum. But it doesnt mean that the distance
between any two nodes involved in the minimum-spanning tree is
having minimum.
15.Describe and In Process vs. Out of Process component. Which is
faster?
ANS: An in-process component is implemented as a DLL, and runs in the
same process space as its client app, enabling the most efficient
communication between client and component. Each client app that
uses the component starts a new instance of it. An out of process
component is implemented as an EXE, and unlike a dll, runs in its own
process space. As a result, exes are slower than dlls because
communications between client and component must be marshalled
across process boundaries. A single instance of an out of process
component can service many clients.
16. What are the main components of the ADO object model? How are
they used?
ANS: Connection: Used to make a connection between your app and an
external data source, i.e., sql server.Command: Used to build queries,
-
7/28/2019 AMD Sample Technical Placement Paper
4/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
including user-specific parameters, to access records from a data
source (which are returned in a Recordset) Recordset: Used to access
records returned from an SQL query. With a recordset, you can
navigate returned records. You can also add, modify or delete records.
17. Can We create CGI scripts in VB??
ANS: Yes.
18. What is Centralization Error Handling?
ANS: Writing function and calling it when error occurs.
19. Different type of Instantiation?
ANS: Private Only for the Specific Module.
Public not creatable Private & Public
Multi-Use - Variable we have to declare.
Single Use Not possible through dll.
Global Multiuse Have variable not Required to Declare.
Global Single Use - Only for exe.
20. What is frx?
ANS: When some controls like grid and third party control placed in ourapplication then it will create frx in run time.
21. What are the scopes of the class?
ANS: Public, private, Friend.
22. Diff types of Lock Types?
ANS: RdConcurReadOnly 0 (Default)
RdConcurLock 1 (Pessimistic Locking)
RdConcurRowver 2 (Optimistic Locking)RdConcurValues 3
RdConcurBatch 4
23. What is Friend Variable?
ANS: Scope sharable between projects.
-
7/28/2019 AMD Sample Technical Placement Paper
5/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
24. Which is the subset of SQL commands used to manipulate Oracle
Database structures, including tables?
ANS: Data Definition Language (DDL).
25.What operator performs pattern matching?
ANS: LIKE operator.
26. What are the wildcards used for pattern matching?
ANS: For single character substitution and % for multi-character
substitution.
27. Will the outputs of the above two commands differ?
ANS: Both will result in deleting all the rows in the table EMP.
28. What will be the output of the following query?
ANS: SELECT REPLACE (TRANSLATE (LTRIM (RTRIM ('!! ATHEN !!','!'), '!'),
'AN', '**'),'*','TROUBLE') FROM DUAL;
TROUBLETHETROUBLE
29. What command is used to create a table by copying the structure of
another table?ANS: CREATE TABLE... AS SELECT command
Explanation: To copy only the structure, the WHERE clause of the
SELECT command should contain a FALSE statement as in the following.
CREATE TABLE NEWTABLE AS SELECT * FROM EXISTINGTABLE WHERE
1=2; If the WHERE condition is true, then all the rows or rows satisfying
the condition will be copied to the new table.
30. Which command displays the SQL command in the SQL buffer, and
then executes it?ANS: RUN
31. What is the parameter substitution symbol used with INSERT INTO
command?
ANS: &
-
7/28/2019 AMD Sample Technical Placement Paper
6/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
32. Which system table contains information on constraints on all the
tables created?
ANS: USER_CONSTRAINTS
TRUNCATE TABLE EMP;
DELETE FROM EMP;
33. What is Enhanced Interior Gateway Routing Protocol?
ANS: The Enhanced Interior Gateway Routing Protocol (EIGRP)
represents an evolution from its predecessor IGRP. This evolution
resulted from changes in networking and the demands of diverse,
large-scale internetworks. EIGRP integrates the capabilities of link-state
protocols into distance vector protocols. Additionally, EIGRP containsseveral important protocols that greatly increase its operational
efficiency relative to other routing protocols. One of these protocols is
the Diffusing update algorithm (DUAL). DUAL enables EIGRP routers to
determine whether a path advertised by a neighbor is looped or loop-
free, and allows a router running EIGRP to find alternate paths without
waiting on updates from other routers. EIGRP provides compatibility
and seamless interoperation with IGRP routers. An automatic-
redistribution mechanism allows IGRP routes to be imported intoEIGRP, and vice versa, so it is possible to add EIGRP gradually into an
existing IGRP network. Because the metrics for both protocols are
directly translatable, they are as easily comparable as if they were
routes that originated in their own autonomous systems (ASs). In
addition, EIGRP treats IGRP routes as external routes and provides a
way for the network administrator to customize them.
34. What are the privileges that can be granted on a table by a user to
others?ANS: Insert, update, delete, select, references, index, execute, alter, all.
35.What operator tests column for the absence of data?
ANS: IS NULL operator.
-
7/28/2019 AMD Sample Technical Placement Paper
7/7
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
Visit www.latestoffcampus.com for placement papers, interview tips & job updates. Toget
freeupdates tomail http://groups.google.com/group/latestoffcampus/subscribeLive updates on
Facebook @ www.facebook.com/LatestOffCampus
36. What command is used to get back the privileges offered by the
GRANT command?
ANS: REVOKE
37.What protocol is used by DNS name servers?
ANS: DNS uses UDP for communication between servers. It is a better
choice than TCP because of the improved speed a connectionless
protocol offers. Of course, transmission reliability suffers with UDP.
38. Which system tables contain information on privileges granted and
privileges obtained?
ANS: USER_TAB_PRIVS_MADE, USER_TAB_PRIVS_RECD.39.What is logical link control?
ANS: One of two sublayers of the data link layer of OSI reference
model, as defined by the IEEE 802 standard. This sublayer is responsible
for maintaining the link between computers when they are sending
data across the physical network connection.
40. Which command executes the contents of a specified file?
ANS: START or @