Posts

IBM Interview Questions

Qu1: What is hashing and how it works??? Answer : Hashing means using some function or algorithm to map object data to some representative integer value. This so-called hash code (or simply hash ) can then be used as a way to narrow down our search when looking for the item in the map . How hashing works Purely as an example to help us grasp the concept, let's suppose that we want to map a list of string keys to string values (for example, map a list of countries to their capital cities). So let's say we want to store the data in Table 1 in the map. Key Value Cuba Havana England London France Paris Spain Madrid Switzerland Berne Table 1: Example data to put in a map And let's suppose that our hash function is to simply take the length of the string. For simplicity, we'll have two arrays: one for our keys and one for the values. So to put an item in the hash table, we compute its hash code (in this case, simply count the number of characters), then put the ke...

IBM Interview Questions

Image
Question: Java Supports Pass By Value or Pass by Reference????? Pass-by-Value So if a Java variable is a cup, with a value in it, what does it mean to "pass" a variable to a method? And are primitives and references treated the same way? We'll get there, but first let's start with simple assignment. What does it mean to say: 1) int x = 3; 2) int y = x; In line 1, a cup called x, of size int, is created and given the value 3. In line 2, a cup called y, of size int, is created and given the value... 3. The x variable is not affected! Java COPIES the value of x (which is 3) and puts that COPY into y. This is PASS-BY-VALUE. Which you can think of as PASS-BY-COPY. The value is copied, and that's what gets shoved into the new cup. You don't stuff one cup into another one. Saying int y = x does NOT mean "put the x cup into y". It means "copy the value inside x and put that copy into y". If I later change y: y ...

Confonet Project Details

CONFONET (Computerization and Computer Networking of Consumer Forums in Country) Client Government of India Place National Informatics Centre (NIC), New Delhi Technologies Java, J2EE, Struts 1.2, DB2 8.2, Linux, WAS(Web Sphere Application Server) Application Type Web Based (Intranet) Description: Objectives of CONFONET: To set up Information Communication Technology (ICT) infrastructure at Consumer Redressal forums all over India to provide IT solution at each level in order to provide: 1. E-governance 2. Transparency and efficiency 3. Systematizing of working To achieve time bound delivery of justice to the consumers. There are 635 (approx) District forum and 34 state commissions and NCDRC in the country. Case Monitoring System Case Monitoring system is an intranet based application to record the proceedings of cases registered by complainants or appellants in consumer courts an...

Linux IP address problem

Question1 : How to set ip address in a Linux machine if it's network card is configured... Answer: First give command to see the network card and default ip address of system... Login as a root user and then give ifconfig Now you will get some information etch0 ..................... ..................... ...................... lo .............. ............... Now give--------------- ifconfig eth0 ip-address netmask 255.255.255.0 up (This will set the ip-address)

DB2 Problem::: SQL0750N The source table cannot be renamed because it is referenced in a view, materialized query table, trigger, SQL function, SQL m

Problem: SQL0750N The source table cannot be renamed because it is referenced in a view, materialized query table, trigger, SQL function, SQL method, check constraint, or referential constraint ............... Solution: First please see all referential constraint on a table using following command db2 constname, tabname, refkeyname, reftabname, colcount, deleterule, updaterule from syscat.references ---------------------------------------------------------- CONSTNAME TABNAME REFKEYNAME REFTABNAME ...

DB2 Query::SQL 0973N

Question1:: SQL0973N Not enough storage is available in the "PCKCACHESZ" heap to process the request.. Solution: 1. db2 disconnect DATABASENAME 2. db2 "update db cfg for DATABASENAME using app_ctl_heap_sz 25000" 3. db2 "update db cfg for DATABASENAME using applheapsz 25000" 4. db2 "update db cfg for DATABASENAME using locklist 60000" 5. db2 "update db cfg for DATABASENAME using LOGFILSIZ 10000" // DATABASENAME is your database name....Please edit these SQL Commands by replacing DATABASENAME with your actual database name now Go to path cd /opt/IBM/db2/V8.1/bnd then run the command as it is. 6. db2 connect to DATABASENAME 7. db2 "bind db2clipk.bnd blocking all grant public clipkg 30" 8. db2 "commit" Now ........ db2 terminate db2stop force db2start Now you will not find this problem............................

Suse Linux Problems........

1. How to make full permission to a file in Suse Linux.......... 2. Access denied, can't create a directory................ Solution: First login as a root user in linux and the go the location where you want to create a directory with full permission::::: chmod u+rwx,o+rwx,g+rwx DIRECTORYNAME/FILENAME