Software Interview Questions
Questions Answers Views Company eMail

MY code is: public class P1{ public static void main(String ar[]) { class.forName("java.lang.String"); } } errors i got are :New.java:5: error: expected class.forName("java.lang.String"); ^ New.java:5: error: invalid method declaration; return type required class.forName("java.lang.String"); ^ New.java:5: error: illegal start of type class.forName("java.lang.String"); ^ New.java:7: error: reached end of file while parsing } ^ 4 errors HELP ME>......

3 4340

What is the Use Of Interfaces? For example I have a interface as shown below? Interface IMyInterface { public void MyMethod(); } class MyClass : IMyInterface { public void Mymethod() { Some Code } } class Program { static void Main(string[] args) { MyClass obj = new MyClass(); obj.MyMethod(); } } Here What is My Question is? If i remove Interface and run this code, it will executed then what is the Use of the interface? Can any one give me the solution for this Problem? Thanks in Advance!

HCL,

1 4060

Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.

Infosys,

3681

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

Infosys,

1948

Hi all. I have 2 years exp in manual testing.Now i want to shift.i got so many email from other company that send ur cv .After sending no response from them .whats the reason.

1 3471

How to prepare tracability matrics

1 3690

Smoke testing done by whom

TCS,

7 10569

what is the use of below profile options while configure multiorg? 1. HR: Security Profile 2. MO: Security Profile 3. GL Set of books name 4. MO: Operating Unit 5. HR: User type

IBM,

4 8251

how do you test for runtime error using manual testing

2 3958

How to know actual capacity of Ethernet port by command line? (Sun Fire V480 and some one configured Eth interface as 100mbps and need to change to 1000mbps but How i would know that port is of capacity 1000mbps or not?

Softenger,

7 8573

what is the function of public class main ?

1512

I have a flat file of 10 byte with unknown total record count. Requirement is [using CLIST]: 1. get the record count of the file 2. read first 5 records in 5 different variable

1 2220

how to connect cisco switch uisng perl script

ABC,

3377

How to codify items in Material Master

5 12087

What are links & Segments in Cognos Framework Manager?

Systime,

1 10587


Un-Answered Questions { Software }

What is mean by clustered index and non clustered index, give syntax of creation? : sql server database administration

578


What are the different types of indexes?

602


Can I write some c++ function in same .m file?

1


You have a testing team of 10 members, and now you have to reduce it by 5 member and you dont want to increase risk in your product, you are try to cover all functionality to test. What test Strategy you follow.

2120


What is nsdictionary in swift?

437






How to use subqueries with the in operator using oracle?

598


How to use activex textbox in excel?

408


Explain the use of the $.fn.bind and $.fn.trigger.

491


What are annotations in c#?

513


Explain how do you think google is training data for self-driving cars?

108


Is there any way to find whether software installed in the system is registered by just providing the .exe file? I have tried the following code but its just displaying the directory structure in the registry. Here the code : package com.msi.intaller; import java.util.Iterator; import ca.beq.util.win32.registry.RegistryKey; import ca.beq.util.win32.registry.RootKey; public class RegistryFinder { public static void main(String... args) throws Exception { RegistryKey.initialize(RegistryFinder.class.getResource("jRe gistryKey.dll").getFile()); RegistryKey key = new RegistryKey(RootKey.HKLM, "Software\\ODBC"); for (Iterator subkeys = key.subkeys(); subkeys.hasNext();) { RegistryKey subkey = subkeys.next(); System.out.println(subkey.getName()); // You need to check here if there's anything which matches "Mozilla FireFox". } } }

1340


What is the difference between cost center and work center?

514


What is a collection in backbone.js?

1


Given an unsorted linked list, and without using a temporary buffer, write a method that will delete any duplicates from the linked list?

636


What is diamond problem in c++?

532