|
1. What Is Database Testing?
Date Posted: 07/02/2012
Ans: Data base testing basically include the following.
1) Data validity testing.
2) Data Integrity testing
3) Performance related to data base.
4) Testing of Procedure, triggers and functions.
For doing data validity testing you should be good in SQL queries
For data integrity testing you should know about referential integrity and different constraint.
For performance related things you should have idea about the table structure and design.
For testing Procedure triggers and functions you should be able to understand the same.
|
|
|
2. How Does The System Know Where One Command Ends And Another Begins?
Date Posted: 07/02/2012
Ans: Normally, the newline character, which is generated by the ENTER or RETURN key, acts as the signpost. However, the semicolon and the ampersand characters can also serve as command terminators.
|
|
|
3. What Is Parsing?
Date Posted: 07/02/2012
Ans: Parsing is the process of breaking up of a command line into words. This is made possible by using delimiters and spaces. In the event that tabs or multiple spaces are part of the command, these are eventually replaced by a single space
|
|
|
4. Why Is It That It Is Not Advisable To Use Root As The Default Login?
Date Posted: 07/02/2012
Ans: The root account is very important, and with abusive usage, can easily lead to system damage. That’s because safeguards that normally apply to user accounts are not applicable to the root account.
|
|
|
5. What Is The Standard Convention Being Followed When Naming Files In UNIX?
Date Posted: 07/02/2012
Ans: One important rule when naming files is that characters that have special meaning are not allowed, such as * / & and %. A directory, being a special type of file, follows the same naming convention as that of files. Letters and numbers are used, along with characters like underscore and dot characters.
|
|
|
6. Is It Possible To See Information About A Process While It Is Being Executed?
Date Posted: 07/02/2012
Ans: Every process is uniquely identified by a process identifier. It is possible to view details and status regarding a process by using the ps command.
|
|
|
7. What Is A Super User?
Date Posted: 07/02/2012
Ans: A super user is a special type user who has open access to all files and commands on a system. Note that the super user’s login is usually root, and is protected by a so-called root password.
|
|
|
8. What Is Piping?
Date Posted: 07/02/2012
Ans: Piping, represented by the pipe character “|”, is used to combine two or more commands together. The output of the first command serves as input the next command, and so on.
|
|
|
9. What Is The Use Of -l When Listing A Directory?
Date Posted: 07/02/2012
Ans: -l, which is normally used in listing command like ls, is used to show files in a long format, one file per line. Long format refers to additional information that is associated with the file, such as ownership, permissions, data and file size.
|
|
|
10. Enumerate Some Of The Most Commonly Used Network Commands In UNIX?
Date Posted: 07/02/2012
Ans:
- Telnet – used for remote login
- ping – an echo request for testing connectivity
- su – user switching command
- ftp – file transfer protocol used for copying files
- finger – information gathering command
|
|