Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Microsoft Interview Questions
Questions Answers Views Company eMail

Write an interactive c program that will encode or decode a line of text. To encode a line of text, proceed as follows: Convert each character, including blank spaces, to its ASCII equivalent. Generate a positive random integer. Add this integer to the ASCII equivalent of each character. The same random integer will be used for the entire line of text. Suppose that N1 represents the lowest permissible value in the ASCII code, and N2 represents the highest permissible value. If the number obtained in step 2 above exceeds N2, then subtract the largest possible multiple of N2 from this number, and add the remainder to N1. Hence the encoded number will always fall between N1 and N2, and will therefore always represent some ASCII character. Display the characters that correspond to the encoded ASCII values. The procedure is reversed when decoding a line of text. Be certain, however, that the same random number is used in decoding as was used in encoding.

1 12857

how to create object in plsql

3 8467

Can session variables be accessed from code-behind?

2 9374

write a code for this. serial_number contained in the header of the file will be read , if this serial number is less than a previous serial number within a successfully processed file, or is the same as another serial number within a successfully processed file, or if the field contains anything other than 7 digits, then the file must error with the reason ‘Invalid SERIAL_NUMBER’.

2199

You are given a string which contains some special characters. You also have set of special characters. You are given other string (call it as pattern string). Your job is to write a program to replace each special characters in given string by pattern string. You are not allowed to create new resulting string. You need to allocate some new memory to given existing string but constraint is you can only allocate memory one time. Allocate memory exactly what you need not more not less.

2 6974

What is different between analogous and digital

1 3746

what is meant by marketing mayopia?

6 13819

Technical Interview Questions – Exchange 2003 1. Tell me a bit about the capabilities of Exchange Server. 2. What are the different Exchange 2003 versions? 3. What's the main differences between Exchange 5.5 and Exchange 2000/2003? 4. What are the major network infrastructure for installing Exchange 2003? 5. What is the latest Exchange 2003 Service Pack? Name a few changes in functionality in that SP. 6. What are the disk considerations when installing Exchange (RAID types, locations and so on). 7. You got a new HP DL380 (2U) server, dual Xeon, 4GB of RAM, 7 SAS disks, 64-bit. What do you do next to install Exchange 2003? (you have AD in place) 8. Why not install Exchange on the same machine as a DC? 9. Are there any other installation considerations? 10. How would you prepare the AD Schema in advance before installing Exchange? 11. What type or permissions do you need in order to install the first Exchange server in a forest? In a domain? 12. How would you verify that the schema was in fact updated? 13. What type of memory optimization changes could you do for Exchange 2003? 14. How would you check your Exchange configuration settings to see if they're right? 15. What are the Exchange management tools? How and where can you install them? 16. What types of permissions are configurable for Exchange? 17. How can you grant access for an administrator to access all mailboxes on a specific server? 18. What is the Send As permission? 19. What other management tools are used to manage and control Exchange 2003? Name the tools you'd use. 20. What are Exchange Recipient types? Name 5. 21. You created a mailbox for a user, yet the mailbox does not appear in ESM. Why? 22. You wanted to change mailbox access permissions for a mailbox, yet you see the SELF permission alone on the permissions list. Why? 23. What are Query Based Distribution groups? 24. What type of groups would you use when configuring distribution groups in a multiple domain forest? 25. Name a few configuration options for Exchange recipients. 26. What's the difference between Exchange 2003 Std. and Ent. editions when related to storage options and size? 27. Name a few configuration options related to mailbox stores. 28. What are System Public Folders? Where would you find them? 29. How would you plan and configure Public Folder redundancy? 30. How can you immediately stop PF replication? 31. How can you prevent PF referral across slow WAN links? 32. What types of PF management tools might you use? 33. What are the differences between administrative permissions and client permissions in PF? 34. How can you configure PF replication from the command prompt in Exchange 2003? 35. What are the message hygiene options you can use natively in Exchange 2003? 36. What are the configuration options in IMF? 37. What are virtual servers? When would you use more than one? 38. Name some of the SMTP Virtual Server configuration options. 39. What is a Mail Relay? Name a few known mail relay software or hardware options. 40. What is a Smart Host? Where would you configure it? 41. What are Routing Groups? When would you use them? 42. What are the types of Connectors you can use in Exchange? 43. What is the cost option in Exchange connectors? 44. What is the Link State Table? How would you view it? 45. How would you configure mail transfer security between 2 routing groups? 46. What is the Routing Group Master? Who holds that role? 47. Explain the configuration steps required to allow Exchange 2003 to send and receive email from the Internet (consider a one-site multiple server scenario). 48. What is DS2MB? 49. What is Forms Based Authentication? 50. How would you configure OWA's settings on an Exchange server? 51. What is DSACCESS? 52. What are Recipient Policies? 53. How would you work with multiple recipient policies? 54. What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that? 55. What is the RUS? 56. When would you need to manually create additional RUS? 57. What are Address Lists? 58. How would you modify the filter properties of one of the default address lists? 59. How can you create multiple GALs and allow the users to only see the one related to them? 60. What is a Front End server? In what scenarios would you use one? 61. What type of authentication is used on the front end servers? 62. When would you use NLB? 63. How would you achieve incoming mail redundancy? 64. What are the 4 types of Exchange backups? 65. What is the Dial-Tone server scenario? 66. When would you use offline backup? 67. How do you re-install Exchange on a server that has crashed but with AD intact? 68. What is the dumpster? 69. What are the e00xxxxx.log files? 70. What is the e00.chk file? 71. What is circular logging? When would you use it? 72. What's the difference between online and offline defrag? 73. How would you know if it is time to perform an offline defrag of your Exchange stores? 74. How would you plan for, and perform the offline defrag? 75. What is the eseutil command? 76. What is the isinteg command? 77. How would you monitor Exchange's services and performance? Name 2 or 3 options. 78. Name all the client connection options in Exchange 2003. 79. What is Direct Push? What are the requirements to run it? 80. How would you remote wipe a PPC? 81. What are the issues with connecting Outlook from a remote computer to your mailbox? 82. How would you solve those issues? Name 2 or 3 methods 83. What is RPC over HTTP? What are the requirements to run it? 84. What is Cached Mode in OL2003/2007? 85. What are the benefits and "issues" when using cached mode? How would you tackle those issues? 86. What is S/MIME? What are the usage scenarios for S/MIME? 87. What are the IPSec usage scenarios for Exchange 2003? 88. How do you enable SSL on OWA? 89. What are the considerations for obtaining a digital certificate for SSL on Exchange? 90. Name a few 3rd-party CAs. 91. What do you need to consider when using a client-type AV software on an Exchange server? 92. What are the different clustering options in Exchange 2003? Which one would you choose and why.

3 12187

How will u find whether a linked list has a loop or not?

8 13911

how configur net and vpn on cisco product

2035

to find out the reverse digit of a given number

6 17819

Tell me CCNA Course + Dump Q/A in chennai?

2 5623

Does APPSC GROUP II Exam has both PRELIMINARY AND MAINS exam ?

1 4603

hello friends, given an expression we have to remove the unwanted brackets in that expression. Eg : (a+b) ---> a+b (a+b)*(c)-----> (a+b)*c. Please mail me if you know the logic. My mail id is : saravana6m@gmail.com. Thank you in advance :-)

1 8465

What is Active Directory Database Location?

2 11376

Post New Microsoft Interview Questions


Microsoft Interview Questions


Un-Answered Questions

What is socket linux?

791


So quantum physics must use probability theory? : quantum physics

886


What is asp according to you?

997


What is enterprise bean?

946


What type of Webparts you are developed in your current project ?

698


How we can call layouts in controller file in yii?

3


Mr. A purchased a machinery costing Rs. 1,00,000 on 1st October, 2005. Transportation and installation charges were incurred amounting Rs. 10,000 and Rs. 4,000 respectively. Dismantling charges of the old machine in place of which new machine was purchased amounted Rs. 10,000. Market value of the machine was estimated at Rs. 1,20,000 on 31st March 2006. While finalising the annual accounts, A values the machinery at Rs. 1,20,000 in his books. Which of the following concepts was violated by A? (a) Cost concept (b) Matching concept (c) Realisation concept (d) Periodicity concept.

2001


What is the purpose of cm measurement unit?

653


Which format specifier is used for printing a pointer value?

1015


What do you mean by balances in local currency only? : fi- general ledger master data

982


Enlist the scenarios in which object privileges are used in SAP HANA.

93


Tell me how to hide directory browsing in wordpress from server using .htaccess file?

153


What is the use of servlet context?

1001


How to determine what records to extract?

1


What is orm tool in hibernate?

339