how to answer in an interview?when they asking me tell
about your self?hobbies?year gape?strength?weaknees?
Answer Posted / rajja_20@hotmail.com
I am raja under going as Associate trainee in doli systems
pvt ltd. I have completed AIX looking for a job in AIX
system administration.I have completed B.Sc computer
science in 2004.I have an experience as Associate in doli
systems pvt ltd from 2007 to till date.previously i have
worked as a contracter from 2005 to 2007 in tamil nadu
electricity board.I have completed certification in AIX.so
please this my sitiuation i have an non it experience for 2
yrs that is why thay are expecting minimum experience in IT
domain.I don't know how to answer in this sitiuation please
help me i have already attended 3 intrviews but i was not
selected.i am expecting the answer from you as early as
possible.
Is This Answer Correct ? | 8 Yes | 7 No |
Post New Answer View All Answers
what are the effects on the QoS in each layer of OSI model in network security?
i have passed my 10 +2 in 2007 and then i got my 12 certificate .in back of that certificate there is a place where school principal has to sign.but in 2007 i could sign it and later in 2010 i got the principal sign on my 12 passing certificate.will it cause any problem in bank job interview.
For called program components that are of type transaction or report, what is true about the roll area (assuming processing will resume in the calling program). a) They run in their own roll area b) They run in the roll area of the caller c) Share the same roll area Note: I think Answer is C. Any comments?
Please forward me the latest dumps for base and advance SAS. My email id is-- sudhvimal@gmail.com/soumyajit07@gmail.com
Pls help me to know about Teradata V2R6 certification...
Murali Raju I would also be intrested in persuing qtp certification could you send me the tutorial . My email is nikhilaram@gmailcom. Can you also let me know where i can get the certification details like fees and the center information. Thanks Nikhila.
Do you know at least 5 principles of an online system(IMS DC n CICS)?
1. The Write statement was written and suddenly the program
was showing something different what can be the reason WRITE
'MOHAN'(001).
a)User must have choosen a different language
b) User must have made the line inactive at the Runtime.
c)There must something different Written on the Text element .
d)If nothing is mentioned in the Multilingual Table what
will be the output.
2. how the Transaction Variant.will be helpful to the Enduser?
a)hide the screen Field.
b)To change the Flow Logic.
c)To schedule background process
3. Rollback to be done at the dialog work process what will
you write.
a) Rollback work
b) Message A
c) Message E
d) Rollback work at the End of the PAI.
4) Rollback at the LUW concept.
a)You will write the Code at the PAI Block of the Each
Dialog process
b)You will write the Code ROLLBACK work at the End of the
LUW PAI block.
5. Field statement regarding the CHAIN INPUT
If the user has committed any wrong value on the one Field
of the Cain Input.
And what will be the syntax.
a) Field
1. your user want to display the records of the passenger traveling in the train.He can Sort the list either by the train no or by the date of journey how will the list will be displayed in the Control Level Processing in the Extract Dataset. a) The user has to create two separate internal table and sort accordingly and Two Control level Processing Blocks. b) The User has to create one internal Table with different header line and one processing Block. c) The User has to Define one internal Table and define Two control Level Processing Blocks. d) The User has to sort the internal Table Accordigly and create one Control lvel Processing Block. 2. Secondary Index will help in a) fetching the Data faster. b) Storing the of Data. 3.What does the Field statement Does. a) Delay the transport b) Go to the PAI block of the screen c) Make the Field inactive. 15. LDB NODES. a) 00 01 02 21 Get node 02 What will happen? 16. Second Question Regarding the same Context but asked about the Get Node 00 Get node 21 What will happen.? 17. Questions : - Logical Database (LDB) : a) Authorization is performed. At the LDB b)we do not have to explicit write any program to fetch the data. c)put data is used to update the Databse.
List the Basic Steps for MM configuration.
1. What is Active Directory? 2. What is LDAP? 3. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. 4. Where is the AD database held? What other folders are related to AD? 5. What is the SYSVOL folder? 6. Name the AD NCs and replication issues for each NC 7. What are application partitions? When do I use them 8. How do you create a new application partition 9. How do you view replication properties for AD partitions and DCs? 10. What is the Global Catalog? 11. How do you view all the GCs in the forest? 12. Why not make all DCs in a large forest as GCs? 13. Trying to look at the Schema, how can I do that? 14. What are the Support Tools? Why do I need them? 15. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN? 16. What are sites? What are they used for? 17. What’s the difference between a site link’s schedule and interval? 18. What is the KCC? 19. What is the ISTG? Who has that role by default? 20. What are the requirements for installing AD on a new server? 21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link? 22. How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database? 23. What tool would I use to try to grab security related packets from the wire? 24. Name some OU design considerations. 25. What is tombstone lifetime attribute? 26. What do you do to install a new Windows 2003 DC in a Windows 2000 AD? 27. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 28. How would you find all users that have not logged on since last month? 29. What are the DS* commands? 30. What’s the difference between LDIFDE and CSVDE? Usage considerations? 31. What are the FSMO roles? Who has them by default? What happens when each one fails? 32. What FSMO placement considerations do you know of? 33. I want to look at the RID allocation table for a DC. What do I do? 34. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 35. How do you configure a “stand-by operation master†for any of the roles? 36. How do you backup AD? 37. How do you restore AD? 38. How do you change the DS Restore admin password? 39. Why can’t you restore a DC that was backed up 4 months ago? 40. What are GPOs? 41. What is the order in which GPOs are applied? 42. Name a few benefits of using GPMC. 43. What are the GPC and the GPT? Where can I find them? 44. What are GPO links? What special things can I do to them? 45. What can I do to prevent inheritance from above? 46. How can I override blocking of inheritance? 47. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 48. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 49. Name a few differences in Vista GPOs 50. Name some GPO settings in the computer and user parts. 51. What are administrative templates? 52. What’s the difference between software publishing and assigning? 53. Can I deploy non-MSI software with GPO? 54. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?
Can anyone pass on the certification dump for informatica 8.x to prshri@gmail.com ? I appreciate your help
What is antecedent certificate? Which documents come under antecedent certificate?
PMP certification. Please call 9866654045
what is the relationship between the price and volume of securities in share market?