Software Interview Questions
Questions Answers Views Company eMail

MY code is: public class P1{ public static void main(String ar[]) { class.forName("java.lang.String"); } } errors i got are :New.java:5: error: expected class.forName("java.lang.String"); ^ New.java:5: error: invalid method declaration; return type required class.forName("java.lang.String"); ^ New.java:5: error: illegal start of type class.forName("java.lang.String"); ^ New.java:7: error: reached end of file while parsing } ^ 4 errors HELP ME>......

3 4346

What is the Use Of Interfaces? For example I have a interface as shown below? Interface IMyInterface { public void MyMethod(); } class MyClass : IMyInterface { public void Mymethod() { Some Code } } class Program { static void Main(string[] args) { MyClass obj = new MyClass(); obj.MyMethod(); } } Here What is My Question is? If i remove Interface and run this code, it will executed then what is the Use of the interface? Can any one give me the solution for this Problem? Thanks in Advance!

HCL,

1 4067

Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.

Infosys,

3687

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

Infosys,

1954

Hi all. I have 2 years exp in manual testing.Now i want to shift.i got so many email from other company that send ur cv .After sending no response from them .whats the reason.

1 3480

How to prepare tracability matrics

1 3692

Smoke testing done by whom

TCS,

7 10602

what is the use of below profile options while configure multiorg? 1. HR: Security Profile 2. MO: Security Profile 3. GL Set of books name 4. MO: Operating Unit 5. HR: User type

IBM,

4 8264

how do you test for runtime error using manual testing

2 3965

How to know actual capacity of Ethernet port by command line? (Sun Fire V480 and some one configured Eth interface as 100mbps and need to change to 1000mbps but How i would know that port is of capacity 1000mbps or not?

Softenger,

7 8589

what is the function of public class main ?

1516

I have a flat file of 10 byte with unknown total record count. Requirement is [using CLIST]: 1. get the record count of the file 2. read first 5 records in 5 different variable

1 2235

how to connect cisco switch uisng perl script

ABC,

3377

How to codify items in Material Master

5 12117

What are links & Segments in Cognos Framework Manager?

Systime,

1 10596


Un-Answered Questions { Software }

Explain the informatica workflow?

582


What is oracle latest version?

577


What is the instanceof operator in JavaScript?

507


What is redirect routes?

410


Why generics are used in java?

546






what are the differences you see in e-commerce and banking domain in testing point of view Thanks in Advance

1035


How many types of spread spectrum techniques are used in cdma?

424


How do you generate sequence number in datastage?

623


Which drush commands you use while development?

115


What is the advantage of object inheritance?

578


How can we define a variable accessible in functions of a php script?

547


In this problem you are to write a program that will cut some number of prime numbers from the list of prime numbers between 1 and N.Your program will read in a number N; determine the list of prime numbers between 1 and N; and print the C*2 prime numbers from the center of the list if there are an even number of prime numbers or (C*2)-1 prime numbers from the center of the list if there are an odd number of prime numbers in the list.

1372


define the functionality of web server in context to Active server page.

1701


Are the any windows shell extensions for SourceSafe?

821


Where we declare the input parameters?

176