Raj Shah
Raj Shah
-
10
Yellow
Acmeshell India Pvt. Ltd.
Java, J2EE, BigData, WebService
Indian Institute of Technology Mumbai
New Delhi
6506

About Me

JavaTech Solutions Pvt. Ltd.
InfoTally Pvt. Ltd.
BobTech Inc
OCJP (97%), OCEA
JEE Technology Architect, Project Management
Winner of Excellent Coder @ Acmeshell
-
Cricket, Badminton, TT, Novel Reading
India
1
1. Data Delivery Platform using J2EE & WebService.

2. Mobile Billing Software
-
-
-
-
-
-
-
-

Update

Test

Created On: 29.11.2014 09:53:40
Edited By Raj Shah On: 29.11.2014 02:55:14

Its good website

Created On: 27.11.2014 16:16:30
Edited By Raj Shah On: 27.11.2014 11:47:12
Perfect website for software professional.

Great to Having Blog Here

Created On: 22.11.2014 23:19:39

This is My First Blog

Created On: 22.11.2014 23:19:11
HI

My Articles

DateTitleHits
17.02.2018 12:13:39Question 51: You have defined a DATA step, which will be reading a raw file with the 500 records in it. Each record has 5 variables, and you will be reading this 5 variables from the observation. Beginnning of the execution phase, you know the value for a529
17.02.2018 12:13:26Question 50: You have been running a DATA step on a raw file which contain 500 records in it, while execution phase how many time DATA step will be executed676
17.02.2018 12:13:10Question 49: You have written a SAS program, one of your colleague told you that this program will not be compiled successfully, it has compilation error, and what does he mean?609
17.02.2018 12:12:57Question 48: As you know, SAS Data step is executed in two phase compilation and execution phase. During each phase some variables values are assigned or created. Which of the following will not be created in compilation phase?530
17.02.2018 12:12:38Question 45: Which of the variable declaration increase the value of the variable named fee with the 200%?584
17.02.2018 12:12:12Question 40: You have created a fileref as below, now you want to use this fileref and restrict the dataset to be upto first 15 records. Which of the following statement you will be using for this given requirement?626
17.02.2018 12:11:58Question 39: You have created a filref as below. Till when this fileref will be available580
17.02.2018 12:11:43Question 38: Which of the following statement correctly creates a fileref “allhecrs”626
17.02.2018 12:11:28Question 37: Which of the following statement is correct?606
17.02.2018 12:11:14Question 36: You have to write a program such that following conditions are met645
17.02.2018 12:10:52Question 34: What happens when you run the following program?634
17.02.2018 12:10:33Question 32: Which of the following statement is correct when you want Date to appear on top of the page and output should not have page number defined?652
17.02.2018 12:10:18Question 31: You have been given some dataset “HETRAIN.HELR1”, now you need to sort this dataset and sorted data needs to be copied in new dataset named “NEWCOURSES”. Which of the following is correct syntax?562
17.02.2018 12:10:04Question 30. You have been given a data set, which contains all the training courses provided by the HadoopExam.com, now you need to select particular data which has only three courses in output which are Hadoop, SAS, and Spark. Which of the following is 542
17.02.2018 12:09:35Question 29. You have been given a dataset named “hetrain.helr1” , you have been using the PROC PRINT statement to print the dataset, with the labels. However, labels are not stored in the dataset than which of the following is a correct statement PORC 510
17.02.2018 12:09:18Question 27: You have been using SAS program since quite long time and you are always using the SAS PUTLOG statements, in which case it is very helpful?559
17.02.2018 12:09:06Question 26: You have submitted program in SAS window and active window shows that DATA Step running for long time, what does that mean?544
17.02.2018 12:08:53Question 25: What action should you take once you submitted the below SAS program661
17.02.2018 12:08:39Question 24: Which of the following program you see as a syntax error649
17.02.2018 12:08:22Question 23: You have submitted a SAS program, but there seems to be an invalid option given in a statement, How would you identify that?517
17.02.2018 12:08:10Question 22: One of your junior programmer is running SAS program and he is complaining that there is a syntax error in the SAS code, what do you interpret?654
17.02.2018 12:07:56Question 21: You are reviewing the SAS code written by a one of the junior programmer in your team. However, there seems to be a syntax error. What happens when you run a program with a Syntax error?566
17.02.2018 12:07:43Question 20: When you run the below program what will happen (SAS windows environment)543
17.02.2018 12:07:20Question 19: You are a good SAS programmer, hence whenever you write a program you will follow which of the following582
17.02.2018 12:07:06Question 18: You have been given below SAS programming statement534
17.02.2018 12:06:51Question 17: Which of the following statements are correct (Assume you are not using SAS windows environment)561
17.02.2018 12:06:35Question 16: If you have specified the YEARCUTOFF= 1930, which is the correct range of year , whenyou specify 2 digit years.841
17.02.2018 12:06:20Question 15: Which of the following is a correct syntax with regards to referencing a file stored in a SAS permanent library?576
17.02.2018 12:06:02Question 14: You have been given a library named HETRAIN, now you need to find the summary of all the files stored in this SAS library, which of the following option will be best suitable.651
17.02.2018 12:05:47Question 13: You are working in a company named Acmeshell Inc. which has SAS licensed software. However, you have been asked to use specific SAS engine while working on the data set, why?656
17.02.2018 12:05:30Question12: You have been given two dates as 01Dec1955 and 01Jan2046, now you need to make sure that the date read by the SAS system as above, what value you should specify for the YEARCUTOFF= option?563
17.02.2018 12:05:16Question-11: Which of the following is best suitable option on all the SAS platform, so that SAS ouput can be generated in HTML format?580
17.02.2018 12:05:00Question 10: How do you define a SAS library?667
17.02.2018 12:04:30Question 9: You have been given below SAS program, how many statements are there ?689
17.02.2018 12:04:08Question 7: You have been working with the HadoopExam subscriber data. You need to work on some temporary data for the all the subscriber in last one year and named as HESUBSCRIBER. How can you reference a temporary SAS data set named HESUBSCRIBER?575
17.02.2018 12:03:42Question 6: You have been working following SAS files, you need to find which of the following a permanent file is?630
17.02.2018 12:03:20Question 5: You have set a system option like VALIDVARNAME=ANY. Which of the following is a valid variable name?962
17.02.2018 12:02:34Question 2: You have been given below SAS program686
15.12.2017 03:15:41Question 20: You have a non-metered subscription, and you have purchased 4TB of storage capacity and also selected replication policy which replicates the data to a georeplication data center. Which of the following statements are true in this case?611
15.12.2017 03:15:24Question 19: You are working in a startup company as a cloud architect. Your company does not have any storage server. Hence, you decided to go for Non-metered subscription object storage. So that you will know price upfront. However, at the month end you564
15.12.2017 03:15:09Question 18: Which of the following statement is correct with regards to Oracle Object storage?610
15.12.2017 03:14:52Question 17: Please map the below A. Non-metered object storage B. Metered object storage668
15.12.2017 03:14:31Question 16: You want to store data in Object storage, however before storing the data you want to encrypt that. How can you do that?609
15.12.2017 03:14:15Question 15: What all are the possible permissions for accessing data stored in Object storage?690
15.12.2017 03:14:01Question 14: Which of the following are correct ways to manage data using Oracle Cloud Storage Appliance?626
15.12.2017 03:13:44Question 13: Which of the following statement is true with regards to data caching, when data is cached using Oracle Storage Appliance?663
15.12.2017 03:13:26Question 12: Which of the following make sure that data stored in the cloud are protected by the Oracle, when accessed via Oracle Storage appliance.626
15.12.2017 03:12:52Question 11: Which of the following is true, with regards to Oracle Storage Appliance data security?632
15.12.2017 03:12:34Question 10: You want to access data stored in Oracle cloud storage, however you know that every request you make requires authentication token. Which all of the statements are correct with regards to authentication token?721
15.12.2017 03:12:15Question 9: Once you have uploaded your data in Oracle Storage Cloud, how would you make sure that data stored in Cloud storage has not been corrupted?828
15.12.2017 03:11:54Question 8: For your in-house, use you have created a storage in Oracle Storage cloud and many of the applications (in-house) can read and write data in that storage. Which of the following an application developer to use programmatically access the stora730
15.12.2017 03:11:35Question 7: You have done the setup of Oracle Storage Appliance on a server in your in-premise server. Now, before starting the storage activity you have to get connected with the Oracle storage cloud. As soon as you connected with the Oracle Storage Clou684
15.12.2017 03:11:04Question 6: You have setup the Oracle Cloud Storage Software Appliance on a host. Now you need to do a setup of a filesystem on that host. How would you do that? A. Using a command “oscsa create filesystem name”876
15.12.2017 03:10:40Question 5: What all are required, if you want to backup data using Oracle Cloud Infrastructure Storage Software appliance?796
15.12.2017 03:10:19Question 4: You have a Linux instance in your datacenter (in premise). As soon as you back up data on this Linux instance that needs to be stored in Oracle Cloud Storage as well. To solve this requirement you decided to use Oracle Cloud Storage Software a697
15.12.2017 03:09:25Question 3: You are working with a company, who provides end-t-end IOT (Internet of Things) solutions for a wind mill company. Including installation of sensors to analyzing the data. However, data received from sensors are growing fasted and will reach t739
15.12.2017 03:08:49Question 2: You have migrated in-house 10 TB of data to Oracle Cloud object storage, which was being used by a research team. And they (research team) was keep running some analytics jobs (Apache Spark) and batch processing (Hadoop MapReduce, scheduled jo768
15.12.2017 03:05:11Question 1: You are working in a company named Acmeshell Inc. as an Oracle Cloud IaaS specialist. You are in the middle of migrating some in-house solution to Oracle cloud. 912
16.11.2017 11:21:21Q15. You are working in a credit card company, which continuously process the credit card data and its spending. They can use this data for analytics as well, to analyze any fraud or something. Being a very critical and sensitive information, what all the715
16.11.2017 11:21:01Q14. You are in process of developing a read heavy application and write less (e.g. Technical Blogging websites), which is RDS and deployed in Multi-AZ environment. Now, in the backend application, you want to have high read performance. How can you solv703
16.11.2017 11:20:45Q13. For Arinika Inc , mobile wallet transactional data store. You decided to use amazon RDS. You want to set RPO and RTO to define the acceptable amount of data loss and also amount of time to recover from incident. Which of the following option will hel680
16.11.2017 11:20:26Q12. You have been working with a retail company to bring their store to online, they are very popular offline store with a global chain. As soon as they come online, they are expecting a huge customer base. Now, you need to implement database solutions, 716
16.11.2017 11:20:09Q11. You are developing an application, where generally your research team says in morning and evening transactions are in relatively high volume. You will be creating RDS DB instance for storing transactional data. Which of the following storage type you816
16.11.2017 11:19:51Q10. You are having SQL Server enterprise edition, to run your in-house HR application on that. However, you get to know that your only DBA is leaving the organization and on notice period will 30 days and he suggested, he will help you to have some solut971
16.11.2017 11:19:36Q9. You are working with a Bank as a solution architect, to develop their mobile wallet applications and you decide to use all transactions will be stored in Amazon RDS with Multi-AZ deployment. Entire application has been productionized and CloudWatch al958
16.11.2017 11:19:19Q8. You have been working with an e-commerce company, which has its data stored in AWS RDS database. You are at the last stage of productionizing this solution. For resiliency you have enabled multi-Az deployment. Now, your chief architect asked you that 1007
16.11.2017 11:18:57Q7. You are developing a technology blogging website. Where 1000’s of learners will create the blogs on weekly basis. However, more than millions of user will read this blog website. And you decided to use the Amazon RDS, you are confusing which DB engine956
16.11.2017 11:18:42Q6. You are working as an AWS solution architect and you need to have a better solution for mobile wallet to store all the transaction data. Hence, you decided to use Amazon RDS, but now question comes that, you need highly resilient solution. Which of th997
16.11.2017 11:18:24Q5. You have been working in a financial company, which creates indexes based on equity data. Your technical team are in process of creating product based on newly acquired vendor and data stored in Amazon RDS, where automated backup is enabled. During pr1078
16.11.2017 11:17:58Q4. You are working in a bank, Arinika Inc. This bank asked you to implement best solution for commenting and messaging on their mobile applications. You have used DynamoDB to store all this comments and messages. However, now bank want to do some analyti1437
16.11.2017 11:17:37Q3. You are working with a IT Technology blogging company named QuickTechie Inc. They have huge number of blogs on various technologies. They have their infrastructure developed in AWS, using EC2 and MYSQL database, installed on the same EC2 instance loca1063
16.11.2017 11:17:08Q2. You are working with the Arinika Bank, which already have their in house datacenter and entire IT and its banking is handled in that. You have been recently hired for their new investment to develop mobile wallet. Also, it is decided to use AWS cloud 987
16.11.2017 11:15:50Q1. You are working with the Arinika Bank, which already have their in house datacenter and entire IT and its banking is handled in that. You have been recently hired for their new investment to develop mobile wallet. Also, it is decided to use AWS cloud 1597
29.10.2017 12:46:10Question 10 : You have created a Jar for the word count application, code written in Java. Which of the below is a correct command to submit the Job in spark.1285
29.10.2017 12:45:14Question 9 : You are creating a Spark Job and want to build using sbt tool, with following information1254
29.10.2017 12:43:16Question : 8 You have code snippet in Java below for word count application please fill in the name of method and return value1289
29.10.2017 12:41:39Question : 7 You have executed below Python spark code in Spark Shell1345
29.10.2017 12:40:14Question 6 : You have executed below Python spark code1380
29.10.2017 12:38:59Question 5 : In Spark Shell what can you do 1347
29.10.2017 12:38:09Question 4 : Apache Spark can not run with 1615
29.10.2017 12:36:45Question 3 : You have a website with millions of subscriber, and each subscriber can post 250 character message. As soon as message is posted an event is generated which will be sent over the JMS Queue. Now as an Spark expert you have decided to analyse t4274
29.10.2017 12:35:07Question 2 : Which of the following data source can be accessed by Apache Spark1551
29.10.2017 12:33:24Question 1 : Select the correct statement regarding Apache Spark2066
27.09.2017 20:20:46Python Interview Questions 91 to 93980
27.09.2017 20:20:11Python Interview Questions 81 to 901023
27.09.2017 20:19:38Python Interview Questions 71 to 80967
27.09.2017 20:19:11Python Interview Questions 61 to 70995
27.09.2017 20:18:28Python Interview Questions 51 to 60910
27.09.2017 20:17:51Python Interview Questions 41 to 501021
27.09.2017 20:17:06Python Interview Questions 31 to 401052
27.09.2017 20:16:38Python Interview Questions 21 to 301041
27.09.2017 20:16:05Python Interview Questions 11 to 201049
27.09.2017 20:15:10Python Interview Questions 1 to 101382
06.09.2017 11:14:41Question 10: You have been given below table definition1829
06.09.2017 11:14:13Question 9 : Suppose you have following table definition1758
06.09.2017 11:13:43Question 8 : Suppose you have following table definition1726
06.09.2017 11:13:15Question 7 : In Cassandra table , number of columns can vary in different rows?1730
06.09.2017 11:12:47Question 6 : You have been given below table definitions 1684
06.09.2017 11:11:51Question 5 : You have below sample data from a csv file.1916
06.09.2017 11:11:08Question 4 : Which of the following statement is true, with regards to Timestamp datatype in Cassandra ?1834
06.09.2017 11:10:34Question 3 : Which of the following is correct for TIMEUUID ?2181
06.09.2017 11:10:05Question 2 : As you know, in Cassandra tables , must have primary keys. For primary key, you can use either TimeUUID or UUID only? Which of the following you can say is a TimeUUID ?2991
06.09.2017 11:09:14Question 1 : You are working with a financial indexing data company, who had recently acquired a real estate company. This real estate data company is storing their data in excel and they never had a RDBMS in their organization. You already have Cassandr2483
23.07.2017 20:57:22Question 21: Should I create, HDP multi node cluster my own?819
23.07.2017 20:56:59Question 20: Do, I have to create complete script for rack awareness?880
23.07.2017 20:56:41Question 19: How to find NameNode is in safemode or not?884
23.07.2017 20:56:23Question 18: Which all checkpoint parameters, we need to remember or focus?983
23.07.2017 20:56:02Question 17: What kind of tasks will be asked under troubleshooting section?838
23.07.2017 20:55:44Question 16: What, needs to be solved for configuring and managing alerts?908
23.07.2017 20:55:25Question 15: How do I know the fully qualified name of the node?816
23.07.2017 20:55:06Question 14: Should I prefer Ambari or command line?919
23.07.2017 20:54:48Question 13: I have made the changes , but services are still under maintenance mode. Will this be considered as completed task?929
23.07.2017 20:54:29Question 12: Which OS will be given during exam?918
23.07.2017 20:54:11Question 11: Do we need to set up the OS as well in real HDPCA exam?903
23.07.2017 20:53:55Question 10: How to prepare for HDPCA certification?1456
23.07.2017 20:53:09Question 9: Should I change the configuration of Service , while installation to make it optimal?975
23.07.2017 20:52:52Question 8: Are there any possibility of getting question on setting property of services?1043
23.07.2017 20:52:24Question 7: Do we have to configure services in HDPCA exam?1074
23.07.2017 20:52:01Question 6: Are we allowed to use Google search engine during real HDPCA exam?1076
23.07.2017 20:51:34Question 5: In HDPCA exam, which all documentation will be accessible?3295
23.07.2017 20:51:12Question 4: I have some specific question about my HDPCA exam, whom should I contact?1139
23.07.2017 20:50:16Question 3: I have completed all the required configurations, but service is not started properly. Will I get marks for this HDPCA tasks?1030
23.07.2017 20:49:43Question 2: In HDPCA given task will have specific single thing/part?1292
23.07.2017 20:49:02Question 1: In HDPCA, should I perform all the tasks manually, using command line or using Ambari UI?1348
07.06.2017 16:25:51Q25. Which of the following security technologies are not included in WS Security? A. encryption B. handshake for credential exchange and session establishment C. security tokens D. digital signatures Ans: B Exp: WS-Security is a message-level standa845
07.06.2017 16:25:18Q24. Which of the following WS-Security token profiles is not supported in Metro?940
07.06.2017 16:24:22Q23. Consider, for example, that Alice is calling the WebService developed by Bob however data during communication is critical to business. Alice wants to make sure that Bob receives the correct data that she sent and no one else tampered with or modifie803
07.06.2017 16:23:42Q22. You have developed WebService, which will be consumed by your clients. However, you want Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements?767
07.06.2017 16:22:32Q21. You have implemented a WebService, now before responding the WebService client request, you want to encrypt SOAP header, which is the best place to encrypt the header?692
07.06.2017 16:20:32Q20. Which of the following security technology is not covered in Metro project?876
07.06.2017 16:19:07Q19. You are working in QuickTechie Inc., you have developed a WebService using Stateless session bean. Now your business logic is also written in same EJB (Stateless session bean). You have various roles to access this business logic from EJB. Now, you w792
07.06.2017 16:18:23Q18. You have created following WebService828
07.06.2017 16:17:37Q17. You have developed a JAX-WS WebService, You want to make sure that any user logged in to your course page has active sessions and should be timeout after 15 minutes. Which is the right place to configure JAX-WS session timeout configuration?832
07.06.2017 16:16:58Q16. You have been given below code fragment for JAX-RS805
07.06.2017 16:16:25Q15. Select the correct statement, with regards to EJB to be exposed as Restful WebService (JAX-RS) ?877
07.06.2017 16:15:44Q14. All the courses sold over the internet from QuickTechie Inc, uses WebService infrastructure. And you uses servlet container to deploy the web service and wants to enable basic authentication for all web service invocations. Where does the developer c802
07.06.2017 16:14:56Q13. QuickTechie had implemented the course selection logic in an EJB which is secured. However, EJB can be interacted with RMI as well. Current eclipse based workflow clients use container-managed, role-based security to access the business logic using R861
07.06.2017 16:13:46Q12. You have been given below code fragment,857
07.06.2017 16:13:02Q11. You are developing a RESTFul WebService, which of the following methods we can use to make secure RESTful Web services to support authentication, authorization, or encryption?766
07.06.2017 16:12:12Q10. You have developed a Java client application, which upload some user specific data from backend to the QuickTechie server. Below is the code fragment from that Java client.835
07.06.2017 16:11:21Q9. As you know, there is a java.net.URL class, and you have been given below code814
07.06.2017 16:10:06Q8. You are working as a JEE solution architect in QuickTechie Inc., which has various Professionals are registered on QuickTechie.com. You have also developed a Restful WebService which return list of all the user registered today. Now from browser (html864
07.06.2017 16:09:10Q7. Which of the following statement is correct, with regards to Restful WebService?959
07.06.2017 16:08:38Q6. You are working with HadoopExam.com as a JEE architect. Recently HadoopExam.com has signed a partnership program with QuickTechie.com. You have existing restful web service which is capable of Producing and Consuming XML data. However, QuickTechie Inc786
07.06.2017 16:07:58Q5. You are working with HadoopExam Learning Resources and partnered with the QuickTechie Inc. And want to publish all the courses from both QuickTechie as well as HadoopExam.com as a WebService. However, QuickTechie Inc. only publishes XML schema for the762
07.06.2017 16:06:39Q4. You are working with HadoopExam Learning Resources and wants to expose all the courses and their detail as WebService. However, you don’t already have schema for the Course object (Shown below) and only Java pojo is there. What all the steps you will 703
07.06.2017 16:06:00Q3. In JAX-RS, it is assumed that resources can have representations, if a resource is going to return content formatted as XML. Then what would be media type in the HTTP message?788
07.06.2017 16:05:10Q2. When you publish, your web service using JAX-RS, it just publishes the resources. Resources are just simple Java classes with some additional JAX-RS annotations. These annotations expresses.803
07.06.2017 16:04:05Q1. Which of the following technology you can use to map between Java Objects and XML Schema?881
07.06.2017 05:13:51Java JEE WebService Interview Questions - 6853
07.06.2017 05:13:25Java JEE WebService Interview Questions - 51000
07.06.2017 05:12:53Java JEE WebService Interview Questions - 4826
07.06.2017 05:12:30Java JEE WebService Interview Questions - 3967
07.06.2017 05:12:03Java JEE WebService Interview Questions - 2895
07.06.2017 05:11:12Java JEE WebService Interview Questions - 11075
09.03.2017 16:19:16CCA175 : Cloudera and Spark Developer Certification Syllabus changed11342
05.03.2017 18:14:54Question 16 : Will there be any exam instructor, who will be there to help in case of any need (HDPCD : Spark) ?1130
05.03.2017 18:12:39Question 15 : Are we allowed to use any other API from internet to solve the HDPCD : Spark problem ?1137
05.03.2017 18:10:55Question 14 : Can somebody tell me more about the test env ?1118
05.03.2017 18:08:49Question 13 : On which particular topic we have to focus more for HDPCD : Spark exam?1083
05.03.2017 18:05:22Question 12 : Are there any specific format being asked in HDPCD Spark exam like json, text, parquet, avro etc ?1197
05.03.2017 18:03:43Question 11 : I am a scala developer and wish to give exam in Spark Scala . So to create application , are they providing SBT build tool ?1139
05.03.2017 17:59:24Question 10 : Do we have to focus or remember all the command line switches in HDPCD : Spark exam?1511
05.03.2017 17:56:23Question 9 : Which solution preferred or they ask explicitly to use Spark functionality like among RDD, DataFrame or SparkSQL to use in HDPCD: Spark Developer exam?1531
05.03.2017 17:51:17Question 8 : Any more detail Spark HDPCD exam, we need to remember ?1598
05.03.2017 17:48:27Question 7 : During HDPCD : Spark real exam, what all materials will be accessible ?1718
05.03.2017 17:21:39Question 6 : Is there will be any access to Internet or Google during HDPCD : Spark exam ?1464
05.03.2017 17:20:08Question 5 : In HDPCD : Spark exam, will there be any IDE provided e.g. Eclipse, IntelliJ etc.1525
05.03.2017 17:17:56Question 4 : In HDPCD : Spark exam, we need to write code in Spark-shell/Pyspark or we have to create entire application?1644
05.03.2017 17:14:30Question 3 : Can you please let us know, which all versions of components are being given during HDPCD:Spark exam ?1406
05.03.2017 17:12:08Question 2 : In HDPCD Spark Exam, if my answer is partially correct , then marks will be considered for the same ?1742
05.03.2017 17:09:34Question 1 : How many Questions are being asked in HDPCD Spark Developer Certifications ?2210
23.02.2017 17:09:14Chapter 6 : Java Multi-threading Questions1530
23.02.2017 17:08:28Chapter 5 : Java Multi-threading Questions1348
23.02.2017 17:07:33Chapter 4 : Java Multi-threading Questions1246
23.02.2017 17:06:02Chapter 3 : Java Multi-threading Questions1243
23.02.2017 17:04:56Chapter 2 : Java Multi-threading Questions1180
23.02.2017 17:02:20Chapter 1 : Java Multi-threading Questions1434
23.02.2017 16:47:39Chapter 7 : Apache Spark Interview Questions2424
23.02.2017 16:46:16Chapter 6 : Apache Spark Interview Questions1919
23.02.2017 16:45:17Chapter 5 : Apache Spark Interview Questions2411
23.02.2017 16:44:32Chapter 4 : Apache Spark Interview Questions2079
23.02.2017 16:43:09Chapter 3 : Apache Spark Interview Questions2127
23.02.2017 16:41:25Chapter 2 : Apache Spark Interview Questions2616
23.02.2017 16:37:19Chapter 1 : Apache Spark Interview Questions3989
22.02.2017 19:54:47Chapter 14: Security Group3912
22.02.2017 19:54:22Chapter 13: AWS Security3812
22.02.2017 19:52:09Chapter 12: Monitoring4297
22.02.2017 19:50:42Chapter 11 : AWS Instance and Types3831
22.02.2017 19:46:55Chapter 10: AWS AMI4174
22.02.2017 19:44:21Chapter 09: EC2 Best Practices & Notes4765
22.02.2017 19:41:46Chapter 08: Consolidated Billing4082
22.02.2017 19:40:49Chapter 07: Admin Permissions and Config4282
22.02.2017 19:38:18Chapter 06: AWS Setup3858
22.02.2017 19:24:01Chapter 05: EC2 Root Device Volume: 4599
22.02.2017 19:16:57Chapter 04: Auto-Scaling and ELB3456
22.02.2017 18:17:36Chapter 03: Region and AZs3632
19.02.2017 20:38:41Chapter 02: Amazon Machine Image5815
19.02.2017 20:29:56Chapter 01: EC2 Introduction9982
14.02.2017 21:04:46Chapter 6 : Advanced Pig Latin Part-61459
14.02.2017 21:03:53Chapter 6 : Advanced Pig Latin Part-51499
14.02.2017 21:02:26Chapter 6 : Advanced Pig Latin Part-41549
14.02.2017 21:00:30Chapter 6 : Advanced Pig Latin Part-31474
14.02.2017 20:59:27Chapter 6 : Advanced Pig Latin Part-21460
14.02.2017 20:58:15Chapter 6 : Advanced Pig Latin Part-11657
14.02.2017 20:53:29Chapter 5 : Pig Latin Part-31536
14.02.2017 20:50:59Chapter 5 : Pig Latin Part-21547
14.02.2017 20:49:14Chapter 5 : Pig Latin Part-11452
14.02.2017 20:47:53Chapter 4 : Pig Data Types IV1385
14.02.2017 20:47:04Chapter 4 : Pig Data Types III1347
14.02.2017 20:46:02Chapter 4 : Pig Data Types -II1273
14.02.2017 20:44:37Chapter 4 : Pig Data Types1551
14.02.2017 20:43:14Chapter 3 : Introduction to Grunt Shell (Continue)1525
14.02.2017 20:41:47Chapter 3 : Introduction to Grunt Shell1292
14.02.2017 20:40:31Chapter 2 : Sample File Load and Word Count1415
14.02.2017 20:39:14Chapter 2 : Sample File Load and Word Count1469
14.02.2017 20:35:29Chapter 1 : Pig Introduction 1490
14.02.2017 18:39:46Apache Pig Cover1529
14.02.2017 18:02:04Chapter 0: Table of Contents1436
14.02.2017 17:59:47About Book1446
07.02.2017 18:24:46AWS Introduction1215
20.10.2016 19:04:19CCA175 :Cloudera Hadoop Certfication Difficulty level2830
20.10.2016 19:01:36CCA175 : Can you give me more detail about questions type in real exam1282
20.10.2016 18:57:43CCA175 : What is the common mistakes people do in this exam.1336
20.10.2016 18:53:28CCA175 :Flume Questions2559
20.10.2016 18:50:50CCA175 : Clouera Hadoop Exam linux env.1187
20.10.2016 18:45:57CCA175 : Hadoop Certification Java Programming knowledge is required ?1315
20.10.2016 18:41:12CCA175 : What is Gateway node and can you please tell me about more detail on exam1331
20.10.2016 18:35:24CCA175 : Cloudera Hadoop and Spark Developer (What is Avro and what type of Questions)1607
20.10.2016 18:28:13CCA175 : Cloudera Hadoop and Spark Developer (Spark Python or Scala) Scenarios1957
20.10.2016 18:19:15CCA175 : How many problems , we need to solve in real HandsOn Exam1476
20.10.2016 18:14:06CCA175 Cloudera Practice Scenario (Cloudera Hadoop and Spark Developers)1752
05.09.2016 16:18:56Question 15: Which activity might be performed in the Operationalize phase of the Data Analytics Lifecycle?962
05.09.2016 16:18:42Question 14: In data visualization, which type of chart is recommended to represent frequency data?1034
05.09.2016 16:18:25Question 13: You are attempting to find the Euclidean distance between two centroids: Centroid A's coordinates: (X = 2, Y = 4) Centroid B's coordinates (X = 8, Y = 10) Which formula finds the correct Euclidean distance?960
05.09.2016 16:18:10Question 12: What is a property of window functions in SQL commands?1018
05.09.2016 16:17:49Question 11: Which word or phrase completes the statement? Business Intelligence is to ad-hoc reporting and dashboards as Data Science is to1075
05.09.2016 16:17:28Question 10: You have been assigned to do a study of the daily revenue effect of a pricing model of online transactions. You have tested all the theoretical models in the previous model planning stage, and all tests have yielded statistically insignifican1030
05.09.2016 16:17:08Question 9: What describes a true property of Logistic Regression method?1432
05.09.2016 16:16:52Question 8: Which word or phrase completes the statement? Structured data is to OLAP data as quasistructured data is to____1151
05.09.2016 16:16:34Question 7 : You are asked to create a model to predict the total number of monthly subscribers for a specific magazine. You are provided with 1 year's worth of subscription and payment data, user demographic data, and 10 years worth of content of the mag1201
05.09.2016 16:16:11Question 6 : You are provided four different datasets. Initial analysis on these datasets show that they have identical mean, variance and correlation values. What should your next step in the analysis be?1600
05.09.2016 16:15:52Question 5 : How does Pig's use of a schema differ from that of a traditional RDBMS? 1238
05.09.2016 16:15:31Question 4 : You are using k-means clustering to classify heart patients for a hospital. You have chosen Patient Sex, Height, Weight, Age and Income as measures and have used 3 clusters. When you create a pair-wise plot of the clusters, you notice that 1509
05.09.2016 16:14:59Question 3 : What is Hadoop?1325
05.09.2016 16:14:25Question 2 : In which lifecycle stage are appropriate analytical techniques determined?1352
05.09.2016 16:14:03Question 1 : You are performing a market basket analysis using the Apriori algorithm. Which measure is a ratio describing the how many more times two items are present together than would be expected if those two items are statistically independent?1333
05.09.2016 15:59:00Question 15: You have been given a social graph of all the learners subscribed on www.HadoopExam.com , Looking at the graph you see it is a finite graph and all the learners (node) are highly connected, which is the best suitable for representing this gra984
05.09.2016 15:58:13Question 14 : You have been given a Social networking graph of all the members at www.QuickTechie.com , where each user is a node and their relation with other user is depicted with edge. Now , you wantd to know if you delete a user (node) from a biggest 919
05.09.2016 15:57:22Question 13 : We have two different sales model for selling Hadoop courses publised on www.HadoopExam.com . Now you are using a simul-ation to compare these two different sales models which yields different results for the same set of input variables in d836
05.09.2016 15:56:48Question 12 : Daily logs from www.HadoopExam.com website first collected at local directory on machine from where you can access Hadoop NameNode. You have writeen one application which copy daily log files from local file-system to HDFS file system. Which948
05.09.2016 15:55:33Question 11 : You are having your profile created at www.QuickTechie.com (Technology professional networking group). And while you extracted your social graph and found the node which represent your profile has a high degree but low betweenness, what does952
05.09.2016 15:54:02Question 10 : You have to store www.HadoopExam.com , web server logs and decided to use HDFS file system. Why, you chose HDFS ?1150
05.09.2016 15:53:02Question 9 : HadoopExam.com is looking for 10 new data scientists for various employers and they floated this requirement on a job portal named QuickTechie.com. You have drawn a graph which best model relationship between all the job seekers and all the993
05.09.2016 15:52:13Question 8 : You have a total 5 team members working in HadoopExam.com and represented as a network with 5 nodes and 10 edges which represent clustering. How many more edges need to be added to make the clustering coefficient of every node equal to 1 ?1083
05.09.2016 15:50:50Question 7 : You have huge volume of logs collected from www.HadoopExam.com website web servers. And wanted to analyze them for recommendations. You selected HDFS files system to store your regularly collected logs. And you asked your HDFS administrator t1112
05.09.2016 15:49:43Question 6 : You have been analyzing comment posted on www.HadoopExam.com , for data analysis you find lot of stop words. Which of the following is a characteristics of stop-words ?1166
05.09.2016 15:49:04Question 5 : You are working on some data sets , which has three features (trivariate). Like assoication of a user with following three portals.1202
05.09.2016 15:46:56Question 4 : You are working on a text-mining project. Where you are trying to find tf-idf for word "HadoopExam" . You have taken all the three blogs content from following blog lists 1647
05.09.2016 15:45:37Question 3 : You have been given a list of all the books in a QuickTechie.com online library. All the data you have stored in an HDFS directory.1130
05.09.2016 15:41:20Question 2 : You are working on a project of some online book library. And you need to classify all the books. For this you have been given following information.1250
05.09.2016 15:38:11Question 1 : You have been given data set of a QuickTechie.com websites professionals and their relationship with other members. And on all the technology details about their 1248
29.06.2016 15:34:27Q50. Put all the steps in order of a Spark program1498
29.06.2016 15:34:01Q49. You have been given following code written in Scala and Spark Below is the content for IBM.csv file1036
29.06.2016 15:33:38Q48. You have been given following code written in Scala and Spark Below is the content for IBM.csv file1078
29.06.2016 15:33:13Q47. Which of the below is a correct statements1198
29.06.2016 15:32:43Q46. Which of the following method we can use to convert existing RDDs into DataFrames1126
29.06.2016 15:32:15Q45. Select correct statement regarding Spark DataFrame1178
29.06.2016 15:31:50Q44. Caching of RDD is depend on available memory on node. If there is not enough memory to cache the data. It will not cache RDD and whenever action will be called it will reload from file instead of from cache.936
29.06.2016 15:31:28Q43. Which of the following is a correct way to cache and RDD. A. rdd.persist(MEMORY_ONLY) B. rdd.cache() C. rdd.cache(MEMORY_ONLY) D. rdd.persist() Ans : A,B Exp : 1082
29.06.2016 15:31:11Q42. You have been given following code written in Scala and Spark Below is the content for IBM.csv file1138
29.06.2016 15:30:47Q41. You have been given following code written in Scala and Spark Below is the sample content for IBM.csv file (This file is very huge almost 100GB in size)1031
29.06.2016 15:30:25Q40. You have been given following code written in Scala and Spark Below is the content for IBM.csv file1035
29.06.2016 15:30:00Q39. You have been given following code written in Scala and Spark1176
29.06.2016 15:29:38Q38. Map the followings1158
29.06.2016 15:29:19Q37. You have been given following code written in Scala and Spark Below is the content for IBM.csv file1090
29.06.2016 15:28:52Q36. You have been given following code written in Scala and Spark Below is the content for IBM.csv file1037
29.06.2016 15:28:14Q35. You have been given a file containing data as below1124
29.06.2016 15:27:49Q34. Select which of the following correctly applies to Spark Actions1110
29.06.2016 15:27:23Q33. You have a flow as below in Spark 1130
29.06.2016 15:26:54Q32. You have been given a file containing data as below1170
29.06.2016 15:26:27Q30. Map below1076
29.06.2016 15:26:04Q29. Which of the following is a transformation method1220
29.06.2016 15:25:39Q28. Select correct statement regarding Spark interactive shell1160
29.06.2016 15:25:20Q27. Which of the following is a correct way to create an RDD , assume sc is an instance of SparkContext (API syntext are given not correct)1299
29.06.2016 15:24:51Q26. You have stored your IBM stock price for last 10 years in a file called IBM.csv, which of the following is correct way to create an RDD using this file. Assume sc is an instance of SparkContext and sqlContext is an instance of SQLContext.973
29.06.2016 15:24:32Q25. Which of the following operation is lazily evaluated by Apache Spark on an RDD?1112
29.06.2016 15:24:13Q24. Which of the following files are supported by Spark?1173
29.06.2016 15:23:44Q23. Which of the following data sources is not supported by Spark1106
29.06.2016 15:23:26Q22. Match the followings1232
29.06.2016 15:23:07Q21. Select correct statement regarding SparkSQL1121
29.06.2016 15:22:47Q20. Which all are the responsibilities of Spark Core2800
29.06.2016 15:22:07Q19. When you perform an operation on an RDD, which of the following operation will generate a new RDD1060
29.06.2016 15:21:43Q18. Which are types of possible operation you can perform on RDD A. Actions B. Transformations C. Generalization D. Mobilization Ans : A,B Exp : You can perform two type of operation on RDD Actions and transformation993
29.06.2016 15:21:24Q17. Select correct statement regarding an RDD1470
29.06.2016 15:20:22Q16. What is an RDD?1143
29.06.2016 15:20:03Q15. Arrange the below steps in proper sequence, for a Spark application.1133
29.06.2016 15:19:45Q14. Which of the following component is responsible for submitting a task to executor process, which needs to be accomplished by your application code.1227
29.06.2016 15:19:26Q13. Which of the following component is responsible to send Scala Jar files or Python code to the executors.1094
29.06.2016 15:19:05Q12. Which of the following is a component which runs computations and stores data for your application?1088
29.06.2016 15:18:45Q11. As part of Spark cluster you are running many applications at the same time, which of the following components will help you to allocates resources1104
29.06.2016 15:18:24Q10. Which of the following Spark programming abstract help Spark Driver , where to access a cluster1265
29.06.2016 15:18:03Q9. Select correct statement which Applies to Spark1284
29.06.2016 15:17:42Q8. A health insurance company is using MapR framework to store patient information, including clinical records, in NoSQL DB. 1358
29.06.2016 15:17:22Q7. Select all the options, which correctly applies to Spark.1296
29.06.2016 15:16:59Q6. Which all processing model can be supported by Apache Spark?1275
29.06.2016 15:16:37Q5. Which all are deployment mode in which Spark can be deployed.1345
29.06.2016 15:16:13Q4. Apache Spark does not perform better when same data needs to be shared for computation across different jobs.1203
29.06.2016 15:15:47Q3. Which of the following algorithm can be better performing using Spark, because it stores data in memory during computation and can not be easily implemented using MapReduce ?1218
29.06.2016 15:15:19Q2. Select correct statements which applies to Apache Spark1344
29.06.2016 15:12:58Q1. Apache Spark is creaed after Hadoop Framework and it is a 1671
26.06.2016 03:37:39Question 1 : Given: System.out.println("5 + 2 = " + 3 + 4 ); System.out.println("5 + 2 = " + (3 + 4) ); What is the result? 1. 5 + 2 = 341863
10.04.2016 08:19:24CCA175 Certification Preparation Tips and Tricks9252
10.04.2016 06:48:14What is Apahe AVRO?1701
08.04.2016 18:36:33Question 2 : The following SAS program is submitted:1458
08.04.2016 18:34:36Question 1 : Which of the following statement(s) in the DATASETS procedure alters the name of a SAS data set stored in a SAS data library?1241
05.04.2016 20:44:19Apache Spark Interview Questions (PDF Download)118
05.04.2016 20:29:28(CCA-500) Question 8 : Table metadata in Hive is:1708
05.04.2016 20:27:59(CCA500)Question 7 : You have a directory named jobdata in HDFS that contains four files: _first.txt, second.txt, .third.txt and #data. txt. How many files will be processed by the FileInputFormat.setInputPaths () command when it's given a path object rep1505
05.04.2016 20:26:30(CCA-500)Question 6 : Identify the tool best suited to import a portion of a relational database every day as files into HDFS, and generate Java classes to interact with that imported data?2334
05.04.2016 20:24:52(CCA-500) Question 5 : Which project gives you a distributed, Scalable, data store that allows you random, realtime read/write access to hundreds of terabytes of data?1450
05.04.2016 20:23:14(CCA-500) Question 4 : In Acmeshell Inc you are configuring a Hadoop Cluster with the disk configuration for a slave node where the each slave datanode has 12 x 1TB drives, select the appropriate disk configuration.1752
05.04.2016 20:21:24(CCA-500)Question 3 : You have to provide the Security on Hadoop Cluster for that you have configured the Kerberos: The Network Authentication Protocol. Select the features which are provided by Kerberos.1863
05.04.2016 20:18:27(CCA-500)Question 2 : In the QuickTechie Inc, You have configured Hadoop MRv2 cluster wih dfs.hosts property to point to a file on your NameNode listing all the DataNode hosts allowed to join your cluster. You add a new node to the cluster and update dfs2283
05.04.2016 20:13:54(CCA-500)Question 1 : You have user profile records in your OLPT database, that you want to join with web logs you have already ingested into the Hadoop file system. How will you obtain these user records?2590
05.04.2016 20:08:22(CCA-175 )Problem scenerio 2 : You have been given below information Avro schema as below4144
05.04.2016 20:05:46(CCA-175) Problem Scenario 1 : You have been given MySQL DB with following details. 14146
02.04.2016 20:03:39Module 4 : AWS Cloudwatch monitoring HandsOn Session 1172
02.04.2016 20:02:25Module 3 : AWS EC2 Instance Status Checks (System and Instance level) AWS Certfication 1247
02.04.2016 20:00:52Module 2 : AWS Cloudwatch Monitoring (AWS Certification) 1144
02.04.2016 19:59:29AWS Module-1 : Understanding Auto Recovery and High Availabilty using CloudWatch1152
17.10.2015 10:46:51Module 6 : Apache Storm for Real-Time Processing in Hadoop1124
17.10.2015 10:45:29Module 5 : Apache Ambari v1.4.1 for Provisioning, Managing and Monitoring a Hadoop 2 Cluster964
17.10.2015 10:43:28Module 4 : Changes in Hadoop 2 that improve Apache Hadoop's Core Stability980
17.10.2015 10:40:47Module 3 : Why YARN is now the Apache Hadoop Operating System1081
17.10.2015 10:38:30Module 2 : Apache Hadoop YARN: How YARN changed Hadoop from v1 to v21033
17.10.2015 10:36:35Module 1 :An Introduction to Hortonworks Data Platform 2.01122
17.10.2015 09:49:54Module 4 : Apache Spark Overview1277
17.10.2015 09:41:30Module 3 : Apache Spark vs. MapReduce1277
17.10.2015 09:38:05Module 2 : Apache Spark Use Case for Better Drug Discovery1200
17.10.2015 09:10:36Module 1 : Apache Spark Streaming vs. Apache Storm1439
10.10.2015 10:15:18Request A Certification or Training Products11580
07.10.2015 19:16:27[PDF] 9A0-127 Adobe® ColdFusion 9 ACE Exam Books2663
07.10.2015 16:36:42All Available QuickTechie Certification and Exam Solutions3725
01.10.2015 10:43:32Microsoft Azure Certifications2119
01.10.2015 09:50:13Question 20 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. The company has a Windows Azure subscription for each of its three offices. The Windows 1529
01.10.2015 09:49:10Question 19 : You work for a company named ABC.com. The company has a main office in New York and branch offices in several countries including UK, Spain, Germany, India and Japan. Your role as Cloud Administrator includes the management of the company's 1332
01.10.2015 09:48:10Question 18 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. You have applications and virtual machines hosted on Windows Azure. An application name1263
01.10.2015 09:47:13Question 17 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. You have applications and virtual machines hosted on Windows Azure. All company employee1553
01.10.2015 09:45:31Question 16 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. You have applications and virtual machines hosted on Windows Azure. An application hoste1496
01.10.2015 09:43:56Question 15 : You work as a network administrator at ABC.com. The corporate network consists of physical and virtual servers located in a datacenter and applications running in Microsoft Azure Cloud Services. One new cloud services application has an HTTP1420
01.10.2015 09:41:50Question 14 : You work as a network administrator at ABC.com. The corporate network consists of physical and virtual servers located in a datacenter and a public cloud hosted on Microsoft Azure. The company has a Development department. Users in the Devel1832
01.10.2015 09:40:49Question 13 : Your role of Systems Administrator at ABC.com includes the management of the company's private and public clouds. The private clouds are hosted in a data center at the company's headquarters. A physical server named TK-SQL1 runs Windows Serv1711
01.10.2015 09:39:39Question 12 : You work as a network administrator at ABC.com. The corporate network consists of physical and virtual servers located in a datacenter and virtual servers hosted on Microsoft Azure. The company has servers that run Windows Server 2008, Windo1639
01.10.2015 09:38:27Question 11 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's Microsoft Azure subscription. The company has a Development department. Developers have created a new corporate website. Part of 1502
01.10.2015 09:37:33Question 10 : You work for a company named ABC.com. The company has a single Active Directory Domain Services (AD DS) domain and an Azure Tenant. Your role as Systems Administrator includes the management of the Azure Active Directory (Azure AD). A server1474
01.10.2015 09:36:15Question 9 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. The company has an Azure Active Directory (Azure AD) tenant. All users have user accounts1256
01.10.2015 09:35:20Question : 8 You work for a company named ABC.com. Your role as Systems Administrator includes the management of the company's public and private cloud infrastructure and the company's Azure Active Directory (Azure AD). Sales users and Customer Account M1216
01.10.2015 09:34:15Question : 7 You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. The company has an Azure tenant.1458
01.10.2015 09:33:19Question 6 : You work as a Messaging Administrator at ABC.com. The company has a single Active Directory Domain Services (AD DS) domain and has 1,000 employees. The company currently has a Microsoft Exchange Server on-premises environment. The company pla1257
01.10.2015 09:32:24Question 5 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. The company has an Azure Active Directory (Azure AD) tenant. The company has a developmen1263
01.10.2015 09:31:20Question 4 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's Microsoft Azure subscription. You are configuring a web application hosted in Azure. The web application uses files stored in a bl1321
01.10.2015 09:29:38Question 3 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's Microsoft Azure subscription. The company has a corporate web application hosted in Azure. The web application uses files stored 1354
01.10.2015 09:28:41Question 2 : You work as a network administrator at ABC.com. The corporate network consists of physical and virtual servers located in a datacenter and virtual servers hosted on Microsoft Azure. The company has servers that run Windows Server 2008, Window1511
01.10.2015 09:26:34Question 1 : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's Microsoft Azure subscription. The company has a virtual machines (VMs) hosted in Microsoft Azure. The VMs are located in a single 1504
01.10.2015 08:13:03Question : 16 You work as a Software Developer at ABC.com. The company has a Microsoft Azure subscription. You are developing a solution that consists of a sending application that will be hosted on Azure. The second part is a receiving application that c1062
01.10.2015 08:10:58Question : 15 You work as a Software Developer at ABC.com. The company has a Microsoft Azure subscription. The company has a corporate website hosted as an Azure website. The web application was created using ASP.NET and runs in stateless mode. You disco1018
01.10.2015 08:09:05Question : 14 You work as a Software Developer at ABC.com. The company has a Microsoft Azure subscription. The company has an Intranet website named IntranetWeb hosted on Azure. The website is configured to load and cache data at startup. All company user1092
01.10.2015 08:07:41Question : 13 You work as a Software Developer at ABC.com. The company uses Azure for hosting Websites, Web Applications and Virtual Machines. The company's corporate website is hosted as an Azure website and is accessed by connecting to http://www.ABC.c1304
01.10.2015 08:06:17Question : 12 You work as a Software Developer at ABC.com. The company uses Azure for hosting Websites, Web Applications and Virtual Machines. The company's corporate website is hosted as an Azure website and is accessed by connecting to http://www.ABC.c1257
01.10.2015 08:04:36Question : 11 You need to configure the VPN solution for the cross-premise network. Which two of the following will need to be configured first?1315
01.10.2015 08:03:40Question : 10 You need to recommend a solution to meet the SQL Database restore requirement. Which of the following should you recommend?1525
01.10.2015 08:02:37Question 9 : You need to test an update to the website. You create a new SQL server database. You need to copy the customer and holiday provider data to the new database for testing purposes. Which of the following actions should you perform to populate 1280
01.10.2015 08:01:19Question 8 : You need to configure logging for the web role. Which type diagnostic telemetry data should you configure Azure Diagnostics to collect?1588
01.10.2015 07:59:08Question 7 : You need to meet the requirement of replicating errors on a local simula-tion of the Azure solution. How should you simulate the solution?1276
23.09.2015 17:35:05QUESTION NO: 25 Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode? A. No, but you can file a PVR to request support. B. No. it is targeted for a future release of Data ONATP. C. Yes, only with a special license installed. D. Yes,1003
23.09.2015 17:34:46QUESTION NO: 24 Which exportfs command will temporally export the resource while ignoring the options specified in the /etc/exports file? A. exportfs – v B. exportfs –u C. exportfs –a D. exportfs – i Answer: D Explanation: exportfs [ -v ] [ -io o1002
23.09.2015 17:34:28QUESTION NO 23: What is the maximum distance between a standard clustered pair at 2Bbps? A. 100 meters B. 10 meters C. 50 meters D. 500 meters Answer: D Explanation: NetApp TR3548 for MetroCluster shows cabling limits. The limit for a stretch metroc1365
23.09.2015 17:34:10QUESTION NO: 22 For each Open Systems platform directory to be backed up to the SnapVault secondary storage system you must execute _____________. A. An initial baseline copy B. A temporary copy C. An incremental copy D. A scheduled update copy Answe852
23.09.2015 17:33:54QUESTION NO 21: What does it signify if the disks are “not owned” in a FAS2020 system? A. The disks are mailbox disks. B. The disks are spare disks. C. The disks are data disks. D. The disks are not used. Answer: D Explanation: Disks must be assign891
23.09.2015 17:33:36QUESTION NO 20: When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX server, which three valid objects to include in the data set? (Choose three) A. The entire client B. A directory C. A file D. A qtree Answer: A,1246
23.09.2015 17:33:17QUESTION NO: 19 Which NetApp Virtual Storage Tier component works at the host level? A. Flash Pool B. Flash Disk C. Flash Accel D. Flash Cache E. Flash IO Answer: C Explanation: Flash Accel utilizes server-based flash storage as cache for the host. 1505
23.09.2015 17:32:59QUESTION NO 18: An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a ______________ you can have one or more ____________. A. session, session, connections B. connection, session, connections C. connectio1170
23.09.2015 17:32:37QUESTION NO 17 : Which mechanism allows you to make LUNs available to some initiators and unavailable to others? A. LUN masking B. LUN grouping C. LUN cloning D. LUN hiding Answer: A Explanation: Logical Unit Number Masking or LUN masking is an auth1748
23.09.2015 17:32:18QUESTION NO 16 : You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the directory structure no longer exists. Which is the most likely explanation? A. Once the directory structure has been deleted, you 1066
23.09.2015 17:32:03QUESTION NO 15: Which action will cause a currently in-sync SnapMirror relationship to fail out of sync? A. Running snapmirroe update on the source storage system. B. Running snapmirror release on the source storage system. C. Modifying the /etc/snapmi917
23.09.2015 17:31:45QUESTION NO: 14 In a Fiber Channel configuration, the host’s HBA is referred to as the ___________, and the storage system’s HBA to as the _____________. A. Target, initiator B. Primary, secondary C. Initiator, target D. Secondary, primary Answer: C1308
23.09.2015 17:31:23QUESTION NO 13: Which storage system command would display the WWPNs of hosts that have logged into storage system using a Fibre Channel connection? A. fcp config B. fcp initiator show C. fcp show –i D. fcp show initiator Answer: D Explanation: fcp 1027
23.09.2015 17:31:00QUESTION NO 12: Which two operations can be performed with the SnapDrive for windows graphical user interface? A. Create volume B. Create Snapshot copies C. Create File D. Create Disk Answer: B,D Explanation: What SnapDrive does: SnapDrive software 1302
23.09.2015 17:30:41QUESTION NO 11: Identify the two commands that could be entered on the SnapMirror destination storage system. (Choose two) A. Options snapmirror.access on B. Options snapmirror.resync on C. Snapmirror initialize D. Snap mirror resync Answer: C,D Exp3127
23.09.2015 17:30:22QUESTION NO 10: Which two modes support using SnapMirror over multiple network paths?1315
23.09.2015 17:29:52QUESTION NO 9: The root admin on the UNIX box receives an “Access Denied” message when he attempts to access a newly mounted qtree. What’s the most likely cause of this error?1946
23.09.2015 17:29:25QUESTION NO 8: What utility on the storage system will allow you to capture network packet information?1330
23.09.2015 17:28:52QUESTION NO 7: Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?1495
23.09.2015 17:28:28QUESTION NO 6: An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks are available. Data ONTAP will then perform what action.1360
23.09.2015 17:28:02QUESTION NO: 5 Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)1469
23.09.2015 17:27:33Question: 4 Quotas do not count space consumed by snapshots. Doing so could put users into a state where they couldn't create any new files until all snapshots containing their old files expired, which could take a week or more.959
23.09.2015 17:27:11QUESTION NO: 3 In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two) 1681
23.09.2015 17:26:44QUESTION NO 2: Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1’s disk shelves. Which 2515
23.09.2015 17:25:48QUESTION NO 1: How can you “throttle” SnapValue updates and baseline transfers so that the primary or secondary is not transmitting data as it can?1636
21.09.2015 17:45:13EMC Certification Exam6071
21.09.2015 16:20:57Cloudera Certification Exam2169
21.09.2015 15:51:05Amazon (AWS) Certification Exam1374
20.09.2015 13:27:05NetApp Certification Exam Practice Questions (NS0-145, NS0-155, NS0-157, NS0-506, NS)-502, NS0-511)8013
20.09.2015 10:48:45NetApp Certification Exam Practice Questions (NS0-145, NS0-155, NS0-157, NS0-506, NS)-502, NS0-511)26585
10.09.2015 18:03:15Question 4 : Agent Handlers are used to:1188
10.09.2015 18:01:53QUESTION NO: 3 Which of the following is the correct order for creating a query?1276
10.09.2015 18:01:14QUESTION NO: 2 When backing up an ePO server, which of the following security keys is required to restore agent server communication?1272
10.09.2015 18:00:10QUESTION NO: 1 To remove computers from ePO using the Active Directory Synchronization task, it is required that the account has access to the:1059
09.09.2015 19:21:34Question 6 : You work as a Software Developer at ABC.com. The company has a Microsoft Azure subscription. You have an application hosted on Azure. The application is used by users in company depots and distribution centers for ordering stock items.1337
09.09.2015 19:20:01Question 5 : Microsoft Azure Redis Cache is based on the popular open source Redis Cache. It gives you access to a secure, 2083
09.09.2015 19:18:45Question 4: You have created a subnet with the 100's of instances and other resources. And you are planning to use more services but you run out of IP addresses on the only subnet1352
09.09.2015 19:17:40Question 3 : Event Hubs is a service that processes large amounts of event data from connected devices and applications. After you collect data into Event Hubs, you can store the data using a storage cluster or transform it using a real-time analytics p1813
09.09.2015 19:16:24Question 2 : Microsoft Azure Service Bus supports a set of cloud-based, message-oriented-middleware technologies including reliable message queuing and durable publish/subscribe messaging. These brokered messaging capabilities can be thought of as async1413
09.09.2015 19:15:00Question 1: The Service Bus relay service enables you to build hybrid applications that run in both an Azure datacenter and your own on-premises enterprise environment. 1683
25.08.2015 19:18:47Win AWS Certification Practice Pack worth $5506307
25.08.2015 18:57:14AWS Training Lab-3 :You have a website called www.QuickTechie.com and configured with the Auto Scalling to handle peak load. Which of the following CloudWatch matric will be helpful to get matric about Auto Scalling instances. 1. Detailed monitoring4314
25.08.2015 18:56:52AWS Training Lab-2 :Which of the following you can do ? 1. give a user access to CloudWatch data for only a specific set of instances 2. give a user access to CloudWatch data for only a specific LoadBalancer 3. use IAM roles with the Amazon CloudWat3498
25.08.2015 18:56:26AWS Training Lab- 3 :You have a website www.QuickTechie.com, there seems to be some problem in the website because static pages of the website is being migrated and visitor faces a problem with 404 page not found. Now you want to monitor how many times yo3044
25.08.2015 18:55:45AWS Training Lab-4 :You are creating a CloudWatch Alarm on your AWS resources to check the health and performance of your QuickTechie.com website. If you observe there are some alarms which indicate some problems and need some attention. However, there ar3714
25.08.2015 18:55:23AWS Training Lab-5 :You have in total 5 offices, and all the employee related information is stored under AWS VPC instances. Now all the offices wants to connect the instances in VPC using VPN. Which of the below help you to implement this ?3339
25.08.2015 18:54:53AWS Training Lab-6 : You have in total 15 offices, and all the employee related information is stored under AWS VPC instances. Now all the offices wants to connect the instances in VPC using VPN. What problem do you see in this scenerio ? 1. You can not c3505
25.08.2015 18:54:25AWS Training Lab-7 : You have a website called QuickTechie.com which has their own datacenter in Geneva, And you webserver is deployed in AWS VPC. Now you wish to make a VPN connection between DataCenter and AWS VPC so that your technical team can connect3253
25.08.2015 18:52:25AWS Training Lab-8 :To serve Web traffic for a popular product your chief financial officer and IT director have purchased 10 ml large heavy utilization Reserved Instances (RIs) evenly spread across two availability zones: Route 53 is used to deliver the 6802
25.08.2015 18:51:29AWS Training Lab-9 :You have a periodic Image analysis application that gets some files In Input analyzes them and tor each file writes some data in output to a ten file the number of files in input per day is high and concentrated in a few hours of the d7585
25.08.2015 18:50:05AWS Training Lab-10 :Your company currently has a 2-tier web application running in an on-premises data center. You have experienced several infrastructure failures in the past two months resulting in significant financial losses. Your CIO is strongly a5820
25.08.2015 18:48:50AWS Training Lab-11 : You are implementing a URL whitelisting system for a company that wants to restrict outbound HTTP'S connections to specific domains from their EC2-hosted applications you deploy a single EC2 instance running proxy software and conf6275
25.08.2015 18:47:41AWS Training Lab-2 : You are designing a multi-platform web application for AWS The application will run on EC2 instances and will be accessed from PCs. tablets and smart phones Supported accessing platforms are Windows. MACOS. IOS and Android Separate5390
25.08.2015 18:46:33AWS Training Lab-1 : You have launched an EC2 instance with four (4) 500 GB EBS Provisioned IOPS volumes attached The EC2 Instance Is EBS-Optimized and supports 500 Mbps throughput between EC2 and EBS The two EBS volumes are configured as a single RAID o 6999
25.08.2015 18:45:16AWS Training Lab- 14 : A benefits enrollment company is hosting a 3-tier web application running in a VPC on AWS which includes a NAT (Network Address Translation) instance in the public Web tier. There is enough provisioned capacity for the expected work6135
25.08.2015 18:44:01AWS Training Lab- 15 : A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC. How should they archite10032
25.08.2015 18:43:15AWS Training Lab- 16: You are the new IT architect in a company that operates a mobile sleep tracking application When activated at night, the mobile app is sending collected data points of 1 kilobyte every 5 minutes to your backend The backend takes care7184
25.08.2015 18:42:10AWS Training Lab- 17 : Your department creates regular analytics reports from your company's log files All log data is collected in Amazon S3 and processed by daily Amazon Elastic MapReduce (EMR) jobs that generate daily PDF reports and aggregated tables 6882
25.08.2015 18:41:21AWS Training Lab- 18 : You are migrating a legacy client-server application to AWS The application responds to a specific DNS domain (e g www example com) and has a 2-tier architecture, with multiple application servers and a database server Remote client5739
25.08.2015 18:40:05AWS Training Lab-19 : You are responsible for a legacy web application whose server environment is approaching end of life You would like to migrate this application to AWS as quickly as possible, since the application environment currently has the follow4635
25.08.2015 18:39:13AWS Training Lab- 20 : A customer has a 10 GB AWS Direct Connect connection to an AWS region where they have a web application hosted on Amazon Elastic Computer Cloud (EC2). The application has dependencies on an on-premises mainframe database that uses a8651
25.08.2015 18:38:22AWS Training Lab-21 : You are designing an intrusion detection prevention (IDS/IPS) solution for a customer web application in a single VPC. You are considering the options for implementing IOS IPS protection for traffic coming from the Internet. Which of6537
25.08.2015 18:37:45AWS Training Lab- 22 : You are designing a connectivity solution between on-premises infrastructure and Amazon VPC Your server's on-premises will De communicating with your VPC instances You will De establishing IPSec tunnels over the internet You will be5889
25.08.2015 18:37:04AWS Training Lab-23 : You need a persistent and durable storage to trace call activity of an IVR (Interactive Voice Response) system. Call duration is mostly in the 2-3 minutes timeframe. Each traced call can be either active or terminated. An external ap5517
25.08.2015 18:36:02AWS Training Lab- 24 : Your company has HQ in Tokyo and branch offices all over the world and is using a logistics software with a multi-regional deployment on AWS in Japan, Europe and USA. The logistic software has a 3-tier architecture and currently use4838
25.08.2015 18:35:06AWS Training Lab- 25 : Your company hosts a social media site supporting users in multiple countries. You have been asked to provide a highly available design tor the application that leverages multiple regions tor the most recently accessed content and l6218
25.08.2015 18:33:31AWS Training Lab- 26 : You have deployed a web application targeting a global audience across multiple AWS Regions under the domain name.example.com. You decide to use Route53 Latency-Based Routing to serve web requests to users from the region closest to5066
25.08.2015 18:32:20AWS Training Lab- 27 : You are looking to migrate your Development (Dev) and Test environments to AWS. You have decided to use separate AWS accounts to host each environment. You plan to link each accounts bill to a Master AWS account using Consolidated B4607
25.08.2015 18:31:27AWS Training Lab- 28 : Your company is in the process of developing a next generation pet collar that collects biometric information to assist families with promoting healthy lifestyles for their pets Each collar will push 30kb of biometric data In JSON f4917
25.08.2015 18:30:04AWS Training Lab- 29 : A large real-estate brokerage is exploring the option o( adding a cost-effective location based alert to their existing mobile application The application backend infrastructure currently runs on AWS Users who opt in to this service7227
25.08.2015 18:28:32AWS Training Lab-30: You deployed your company website using Elastic Beanstalk and you enabled log file rotation to S3. An Elastic Map Reduce job is periodically analyzing the logs on S3 to build a usage dashboard that you share with your CIO. You recentl5584
25.08.2015 18:27:02AWS Training Lab-31: Your team has a tomcat-based Java application you need to deploy into development, test and production environments. After some research, you opt to use Elastic Beanstalk due to its tight integration with your developer tools and RDS 5238
25.08.2015 18:26:00AWS Training Lab-32 : You are running a news website in the eu-west-1 region that updates every 15 minutes. The website has a world-wide audience it uses an Auto Scaling group behind an Elastic Load Balancer and an Amazon RDS database Static content resid5958
25.08.2015 18:24:31AWS Training Lab- 33 : A web company is looking to implement an external payment service into their highly available application deployed in a VPC Their application EC2 instances are behind a public lacing ELB Auto scaling is used to add additional instan5804
25.08.2015 18:23:12AWS Training Lab-34 : Your company previously configured a heavily used, dynamically routed VPN connection between your on-premises data center and AWS. You recently provisioned a DirectConnect connection and would like to start using the new connection. 5640
25.08.2015 18:21:59AWS Training Lab-35 : Your company has recently extended its datacenter into a VPC on AVVS to add burst computing capacity as needed Members of your Network Operations Center need to be able to go to the AWS Management Console and administer Amazon EC2 in8174
25.08.2015 18:21:00AWS Training Lab-36 : You've been hired to enhance the overall security posture for a very large e-commerce site They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static asse4795
25.08.2015 18:19:45AWS Training Lab-37 : You are designing an SSUTLS solution that requires HTTPS clients to be authenticated by the Web server using client certificate authentication. The solution must be resilient. Which of the following options would you consider for con7950
25.08.2015 18:18:51AWS Training Lab-38 : A customer has established an AWS Direct Connect connection to AWS. The link is up and routes are being advertised from the customer's end, however the customer is unable to connect from EC2 instances inside its VPC to servers residi6163
25.08.2015 18:17:01AWS Training Lab-39 : A web-startup runs its very successful social news application on Amazon EC2 with an Elastic Load Balancer, an Auto-Scaling group of Java/Tomcat application-servers, and DynamoDB as data store. The main web-application best runs on m6126
25.08.2015 18:04:29AWS Training Lab-40 :You are designing the network infrastructure for an application server in Amazon VPC Users will access all the application instances from the Internet as well as from an onpremises network The on-premises network is connected to you6860
23.08.2015 19:14:14Amazon AWS Developer Certification Quick Book4176
23.08.2015 19:14:14Amazon AWS Developer Certification Quick Book Download76
16.07.2015 18:42:36Hadoop Training 1 : Introduction to BigData, Hadoop, HDFS, MAPReduce HadoopExam.com 2198
16.07.2015 18:42:12Hadoop Training 2 : Deep Dive In HDFS (What is Hadoop ?) | What is HDFS ? | What is Hive ? 2008
16.07.2015 18:38:35Hadoop Training : Hadoop Counters and Distributed Cache 1615
16.07.2015 18:38:05Hadoop Input and Output format 1846
16.07.2015 18:37:33Nosql database : Key-Value, Documet and Column Family with Polygot Persitence 1118
16.07.2015 18:37:04HBase Inroduction Part 1 1201
16.07.2015 18:35:14What is Apache Sqoop (Sqoop Tutorial) 1707
16.07.2015 18:32:11What is Apache Hadoop ? & Solves a BigData Problem 1530
16.07.2015 18:31:42Hadoop Security : Kerberos Authentication 1884
16.07.2015 18:31:11AWS Sysops Certification Practice Questions 1259
16.07.2015 18:30:39AWS (Amazon Webservice) Solution Architect Certification Practice Questions for Lifetime Access 1297
16.07.2015 18:30:16HBase Regions and HBase RegionServers 1146
16.07.2015 18:29:46AWS Professional Level Certification : Solutions Architect 1390
16.07.2015 18:29:11EMC DATA Science Certification (E20-007) Practice Questions: EMCDSA 1888
16.07.2015 18:27:43Module-1 : EMC Data Science Certification Tutorial (E20-007) 1328
16.07.2015 18:26:57Data Science and Machine Learning (EMC and Cloudera Certification) : Module 2 1314
16.07.2015 18:26:10Hadoop and HBase Professional training 1133
16.07.2015 18:21:40HBase Hot Spot Detection and Resolution 1189
16.07.2015 17:13:47What all are Machine learning applications ?1289
16.07.2015 17:13:04What is Euclidean distance ?1546
16.07.2015 17:12:05What is Moving average1348
16.07.2015 17:11:18Define : A clickstream1543
16.07.2015 17:10:24Define : Stemming 1478
16.07.2015 17:09:30What i Online Analytical Processing (OLAP) 1255
16.07.2015 17:08:08Defien : The loess () function3468
16.07.2015 17:06:50Define : A decision tree1533
16.07.2015 17:05:50Area under the Receiver Operating Characteristic Curve)1804
16.07.2015 17:05:02Define : The ROLLUP, CUBE, and GROUPING SETS 1939
16.07.2015 17:04:10Define : Hypothesis testing1303
16.07.2015 17:03:11Define : Autoregressive-moving-average (ARMA)1561
16.07.2015 17:02:13Define : ROC curve 1396
16.07.2015 17:01:47Define Apriori Algorithm1303
16.07.2015 16:59:21Define : A confusion matrix (Kohavi and Provost, 1998) 3748
16.07.2015 16:58:06Data science and Using visualization1418
16.07.2015 16:55:51What is Apache Pig and Apache Sqoop1295
16.07.2015 16:55:02Define : Ratio Data1468
16.07.2015 16:53:02Define : Interval Data1299
16.07.2015 16:52:28Define : Ordinal Data:1460
16.07.2015 16:51:46Define : A regular expression1407
16.07.2015 16:51:08Define : Autocorrelation 1404
16.07.2015 16:48:54Define : Box Plots1414
16.07.2015 16:48:24Define : A heat map1472
16.07.2015 16:47:51Define : Scatter plots1269
16.07.2015 16:46:34Define : A line chart or line graph1213
16.07.2015 16:45:29Define : Box-and-whisker plots1320
16.07.2015 16:44:54Define : Apache Hive1243
16.07.2015 16:44:29Define : Highly processed data1322
16.07.2015 16:40:50What all are An effective Data Scientist skills1597
16.07.2015 16:40:06What is MADlib ?2239
16.07.2015 16:39:21What is Apache Mahout? 1270
16.07.2015 16:37:24Define : MapReduce and Text Parsing2094
16.07.2015 16:36:17Define : A window function1315
16.07.2015 16:35:09Define : Kmeans Clustering1505
16.07.2015 16:33:08Define : One-way ANOVA and What is this test for2578
16.07.2015 16:31:46What are the Key outputs from a successful analytics project1933
16.07.2015 16:29:45Who all are the Analytics project and stakeholders2308
16.07.2015 16:27:10Define : Logistic regression 1489
16.07.2015 16:25:20Defne : Linear Regression2448
16.07.2015 16:24:16Phases of Data Analytics Lifecycle:60815
16.07.2015 16:22:13Define: A naïve Bayes classifier2559
16.07.2015 16:21:08Define : Clustering1642
16.07.2015 16:19:59Define : Regression1880
16.07.2015 16:19:12Define : Classification1688
16.07.2015 16:16:11Define : Project Sponsor1537
16.07.2015 16:07:33Apache Pig Interview Questions PDF Download 3360
16.07.2015 16:07:03HBase Interview Questions PDF Download (51 Questions)3102
16.07.2015 16:05:54Hadoop Interview Questions PDF Download (60 Questions)4286
16.07.2015 16:01:39Data Science QuickBooks (Download PDF) : 25 Pages Only2789
02.07.2015 16:50:39Which three statements are benefits of encapsulation? A. Allows a class implementation to change without changing t he clients B. Protects confidential data from leaking out of the objects C. Prevents code from causing exceptions D. Enables the class impl5033
02.07.2015 16:50:22Which two statements are true for a two-dimensional array? A. It is implemented as an array of the specified element type. B. Using a row by column convention, each row of a two-dimensional array must be of the same size. C. At declaration time, the n4602
02.07.2015 16:49:52public class StringReplace { public static void main(String[] args) { String message = "Hi everyone!"; System.out.println("message = " + message.replace("e", "X")); } } What is the result? A. message = Hi everyone! B. message = Hi XvXryonX! C. A compile t2647
02.07.2015 16:49:33Given the for loop construct: for ( expr1 ; expr2 ; expr3 ) { statement; } Which two statements are true? A. This is not the only valid for loop construct; there exits another form of for loop constructor. B. The expression expr1 is optional. it ini4361
02.07.2015 16:49:03Which two are Java Exception classes? A. SercurityException B. DuplicatePathException C. IllegalArgumentException D. TooManyArgumentsException Answer: A,C5344
02.07.2015 16:48:48What is the proper way to defined a method that take two int values and returns their sum as an int value?2849
02.07.2015 16:48:21Given the code fragment: int b = 3; if ( !(b > 3)) { System.out.println("square "); }{ System.out.println("circle "); } System.out.println("..."); What is the result?3107
02.07.2015 16:48:01Given: public class SampleClass { public static void main(String[] args) { AnotherSampleClass asc = new AnotherSampleClass(); SampleClass sc = new SampleClass(); sc = asc; System.out.println("sc: " + sc.getClass()); System.out.println("asc: " + asc.3262
02.07.2015 16:47:27Which three are valid replacements for foo so that the program will compiled and run?2405
02.07.2015 16:46:59A method is declared to take three arguments. A program calls this method and passes only two arguments. What is the results?3098
02.07.2015 16:46:42Given: public class ScopeTest { int j, int k; public static void main(String[] args) { ew ScopeTest().doStuff(); } void doStuff() { nt x = 5; oStuff2(); System.out.println("x");2972
02.07.2015 16:46:16Given: public class MainMethod { void main() { System.out.println("one"); } static void main(String args) { System.out.println("two"); } public static void main(String[] args) { System.out.println("three"); } void mina(Object[] args) { System.2351
02.07.2015 16:45:49public static void main(String[] args) { new Overloading().x(4.0); } } What is the result? A. one B. two C. three D. Compilation fails. Answer: D Explanation:3124
02.07.2015 16:45:22Which two are valid array declaration? A. Object array[]; B. Boolean array[3]; C. int[] array; D. Float[2] array; Answer: A,C Explanation:6005
02.07.2015 16:45:07Class StaticField { static int i = 7; public static void main(String[] args) { StaticFied obj = new StaticField(); obj.i++; StaticField.i++; obj.i++; System.out.println(StaticField.i + " "+ obj.i); } } What is the result? A. 10 10 B. 8 9 C. 9 8 D. 7 103090
02.07.2015 16:44:54Which statement will empty the contents of a StringBuilder variable named sb? A. sb.deleteAll(); B. sb.delete(0, sb.size()); C. sb.delete(0, sb.length()); D. sb.removeAll(); Answer: C Explanation:4984
02.07.2015 16:44:43boolean log3 = ( 5.0 != 6.0) && ( 4 != 5); boolean log4 = (4 != 4) || (4 == 4); System.out.println("log3:"+ log3 + \nlog4" + log4); What is the result? A. log3:false log4:true B. log3:true log4:true C. log3:true log4:false D. log3:false log4:false Answer:2670
02.07.2015 16:44:17int [] array = {1,2,3,4,5}; for (int i: array) { if ( i { keyword2 ; }} What should keyword1 and keyword2 be respectively, in oreder to produce output 2345?3143
02.07.2015 16:43:52QUESTION NO: 78 View the exhibit: public class Student { public String name = ""; public int age = 0; public String major = "Undeclared"; public boolean fulltime = true; public void display() { System.out.println("Name: " + name + " Major: " + maj2629
02.07.2015 16:43:28Given: public class Main { public static void main(String[] args) { try {doSomething(); }5177
02.07.2015 16:42:49Given the code fragment: String name = "Spot"; int age = 4; String str ="My dog " + name + " is " + age; System.out.println(str); And3039
02.07.2015 16:42:31View the exhibit: public class Student { public String name = ""; public int age = 0; public String major = "Undeclared"; public boolean fulltime = true; public void display() { System.out.println("Name: " + name + " Major: " + major); } public bo3158
02.07.2015 16:42:04Which is a valid abstract class? A. public abstract class Car { protected void accelerate(); } B. public interface Car { protected abstract void accelerate(); } C. public abstract class Car { protected final void accelerate(); } D. public abstract class C3667
02.07.2015 16:41:501. class StaticMethods { 2. static void one() { 3. two(); 4. StaticMethods.two(); 5. three(); 6. StaticMethods.four(); 7. } 8. static void two() { } 9. void three() { 10. one(); 11. StaticMethods.two(); 12. four(); 13. StaticMethods.four(); 12750
02.07.2015 16:41:17What is the result? A. aa cc B. aa bb cc C. cc dd D. cc E. Compilation fails. Answer: A3180
02.07.2015 16:40:47Given the code fragment: int [][] array2d = new int[2][3]; System.out.println("Loading the data."); for ( int x = 0; x tln(" y = " + y); // insert load statement here. } } System.out.println("Modify the data. "); for ( int x = 0; x t.println(" y = " + y);2462
02.07.2015 16:40:22Given: public class MyFor { public static void main(String[] args) { for (int ii = 0; ii 3118
02.07.2015 16:39:52public class Two { public static void main(String[] args) { try { doStuff(); system.out.println("1"); } catch { system.out.println("2"); }} public static void do Stuff() { if (Math.random() > 0.5) throw new RunTimeException(); doMoreStuff(); Sy3690
02.07.2015 16:39:24View the Exhibit. public class Hat { public int ID =0; public String name = "hat"; public String size = "One Size Fit All"; public String color=""; public String getName() { return name; } public void setName(String name) { this.name = name;3087
02.07.2015 16:38:56Given the code fragment: 1. ArrayList list = new ArrayList(1); 2. list.add(1001); 3. list.add(1002); 4. System.out.println(list.get(list.size()));4626
02.07.2015 16:38:28The catch clause argument is always of type__________.4080
02.07.2015 16:37:53Which two statements are true? A. An abstract class can implement an interface. B. An abstract class can be extended by an interface. C. An interface CANNOT be extended by another interface. D. An interface can be extended by an abstract class. E. An abst6199
02.07.2015 16:37:22Give: Public Class Test { } Which two packages are automatically imported into the java source file by the java compiler? A. Java.lang B. Java.awt C. Java.util D. Javax.net E. E. Java.* F. The package with no name4943
02.07.2015 16:36:55Given the code fragment: Boolean b1 = true; Boolean b2 = false; int i = 0; while (foo) { } Which one is valid as a replacement for foo?3650
02.07.2015 16:36:33Which three are valid types for switch?4458
02.07.2015 16:36:10Identify two benefits of using ArrayList over array in software development. A. reduces memory footprint B. implements the Collection API C. is multi.thread safe D. dynamically resizes based on the number of elements in the list Answer: A,D Explanation: A5074
02.07.2015 16:35:50You are writing a method that is declared not to return a value. Which two are permitted in the method body? A. omission of the return statement B. return null; C. return void; D. return; Answer: A,D Explanation: Any method declared void doesn't return a 4858
02.07.2015 16:35:25Which declaration initializes a boolean variable? A. boolean h = 1; B. boolean k = 0; C. boolean m = null; D. boolean j = (1 which evaluates to true.3341
02.07.2015 16:34:59Which three are advantages of the Java exception mechanism? A. Improves the program structure because the error handling code is separated from the normal program function B. Provides a set of standard exceptions that covers all the possible errors C. Imp6319
02.07.2015 16:34:35A method is declared to take three arguments. A program calls this method and passes only two arguments. What is the result?8217
02.07.2015 16:34:07Which statement initializes a stringBuilder to a capacity of 128? A. StringBuilder sb = new String ("128"); B. StringBuilder sb = StringBuilder.setCapacity (128); C. StringBuilder sb = StringBuilder.getInstance (128); D. StringBuilder sb = new StringBuild4546
02.07.2015 16:33:43Given: class X {} class Y { Y ( ) { } } class Z { Z (int i ) { } } Which class has a default constructor? A. X only B. Y only C. Z only D. X and Y E. Y and Z F. X and Z G. X, Y and Z Answer: A Explanation:4671
02.07.2015 16:33:22Which three are bad practices? A. Checking for ArrayIndexoutofBoundsException when iterating through an array to determine when all elements have been visited B. Checking for Error and. If necessary, restarting the program to ensure that users are unaware3166
02.07.2015 16:33:04Which two may precede the word ‘class’ in a class declaration? A. local B. public C. static D. volatile E. synchronized Answer: B,C Explanation: B: A class can be declared as public or private. C: You can declare two kinds of classes: top-level classes an8459
02.07.2015 16:32:34A method doSomething () that has no exception handling code is modified to trail a method that throws a checked exception. Which two modifications, made independently, will allow the program to compile?6471
02.07.2015 16:32:10Given the code fragment: System.out.printIn ("Result: " +3+5); System.out.printIn ("Result: " + (3+5)); What is the result?2240
02.07.2015 16:31:41Which two are valid declarations of a two-dimensional array?3533
02.07.2015 16:31:22Given the code fragment: String h1 = "Bob"; String h2 = new String ("Bob"); What is the best way to test that the values of h1 and h2 are the same?2814
02.07.2015 16:30:02Given the code fragment: System.out.printIn("Result: " + 2 + 3 + 5); System.out.printIn("Result: " + 2 + 3 * 5); What is the result?4499
02.07.2015 16:29:08Given the code fragment: Int [] [] array = {{0}, {0, 1}, {0, 2, 4}, {0, 3, 6, 9}, {0, 4, 8, 12, 16}}; Systemout.printIn(array [4] [1]); System.out.printIn (array) [1] [4]); What is the result? A. 4 Null B. Null 4 C. An IllegalArgumentException is thrown a2996
02.07.2015 16:28:04An unchecked exception occurs in a method dosomething() Should other code be added in the dosomething() method for it to compile and execute? A. The Exception must be caught B. The Exception must be declared to be thrown. C. The Exception must be caug5237
01.07.2015 19:01:18The following SAS program is submitted: data work.flights; destination = 'CPH'; select(destination); when('LHR') city = 'London'; when('CPH') city = 'Copenhagen'; otherwise; end; run; Which one of the following is the value of the CITY vari2565
01.07.2015 19:01:06The following SAS program is submitted: data work.flights; destination = 'cph'; select(destination); when('LHR') city = 'London'; when('CPH') city = 'Copenhagen'; otherwise city = 'Other'; end; run; Which one of the following is the value of2910
01.07.2015 19:00:52The following SAS program is submitted: libname sasdata 'SAS-data-library'; data test; set sasdata.chemists; if jobcode = 'Chem2' then description = 'Senior Chemist'; else description = 'Unknown'; run; A value for the variable JOBCODE is lis2784
01.07.2015 19:00:38The contents of the raw data file EMPLOYEE are listed below: --------10-------20-------30 Ruth 39 11 Jose 32 22 Sue 30 33 John 40 44 The following SAS program is submitted: data test; infile 'employee'; input employee_name $ 1-4; if employee2632
01.07.2015 19:00:23The contents of the raw data file EMPLOYEE are listed below: --------10-------20-------30 Ruth 39 11 Jose 32 22 Sue 30 33 John 40 44 The following SAS program is submitted: data test; infile 'employee'; input employee_name $ 1-4; if employee4055
01.07.2015 19:00:06Question 25: A SAS PRINT procedure output of the WORK.LEVELS data set is listed below: Obs name level 1 Frank 1 2 Joan 2 3 Sui 2 4 Jose 3 5 Burt 4 6 Kelly . 7 Juan 1 The following SAS program is submitted: data work.expertise; set work.levels; if level =3643
01.07.2015 18:59:48Question 24: The contents of the raw data file SIZE are listed below: --------10-------20-------30 72 95 The following SAS program is submitted: data test; infile 'size'; input @1 height 2. @4 weight 2; run; Which one of the following is the value of the 2592
01.07.2015 18:59:28Question 23: When creating a format with the VALUE statement, the new format's name - cannot end with a number - cannot end with a period - cannot be the name of a SAS format, and... 1. cannot be the name of a data set variable. 2. must be at least two 1807
01.07.2015 18:59:15Question 22: Which of the following FORMAT procedures is written correctly? 1. proc format lib=library value colorfmt; 1='R' 2='G' 3='B' run; 2. proc format lib=library; value colorfmt 1='R' 2='G1718
01.07.2015 18:58:57Question 21 : Which of these is false? Ranges in the VALUE statement can specify...2132
01.07.2015 18:58:40Question 20: How many characters can be used in a label? 1. 40 2. 96 3. 200 4. 256 Correct Answer : 4 Exp : When specifying a label, enclose it in quotation marks and limit the label to 256 characters.11609
01.07.2015 18:58:25Question 19 : Which keyword can be used to label missing numeric values as well as any values that are not specified in a range?2123
01.07.2015 18:58:06Question 18 : You can place the FORMAT statement in either a DATA step or a PROC step. What happens when you place it in a DATA step?2123
01.07.2015 18:57:45Question 17 : The format JOBFMT was created in a FORMAT procedure. Which FORMAT statement will apply it to the variable JobTitle in the program output?2279
01.07.2015 18:57:21Question 16 : Which keyword, when added to the PROC FORMAT statement, will display all the formats in your catalog?2809
30.06.2015 18:13:04Question 15: The following SAS program is submitted:data work.accounting;5944
30.06.2015 18:11:51Question 14:The following SAS program is submitted:data work.empsalary;5601
30.06.2015 18:11:08Question 13: The SAS data set SASUSER.HOUSES contains a variable PRICE which has been assigned a permanent label of "Asking Price5874
30.06.2015 18:10:26Question : 12 Suppose you need to create the variable FullName by concatenating the values of FirstName, 3191
30.06.2015 18:09:49Question : 11 Due to growth within the 919 area code, the telephone exchange 555 is being reassigned to the 920 area code. 3001
30.06.2015 18:06:29Question 10 : Which one of the following is true when SAS encounters a data error in a DATA step?5251
30.06.2015 18:05:53Question 9 : Which one of the following statements is true regarding the SAS automatic _ERROR_ variable?5453
30.06.2015 18:05:14Question 8 : The contents of the raw data file NAMENUM are listed below:3374
30.06.2015 18:04:30Question 7 : The contents of the raw data file AMOUNT are listed below:4048
30.06.2015 18:03:00Question 6 : The following SAS program is submitted:3308
30.06.2015 17:58:48Question : 5 The following SAS program is submitted:3359
30.06.2015 17:56:31Question 4 : The following SAS program is submitted:3064
30.06.2015 17:49:01Question 3 : The following SAS program is submitted:3455
30.06.2015 17:46:35Question 2 : The contents of the raw data file CALENDAR are listed below:3437
30.06.2015 17:44:22Question 1 : A SAS program is submitted and the following SAS log is produced:3429
30.06.2015 14:15:28Java Deadlock, Starvation and Livelock9251
30.06.2015 14:12:34Java Thread Pool4433
30.06.2015 14:07:45Java Heap Memory versus Stack Memory 3961
30.06.2015 14:06:27Java : Synchronized versus Concurrent Collections6053
23.06.2015 09:18:41Training (HandsOn Lab) : AWS SysOps Certification Practical Sessions with HandsOn6458
18.06.2015 18:18:01Amazon WebService Security : – Glossary of Terms4289
09.06.2015 19:36:50Question 10. Select the correct statement regarding RDD4206
09.06.2015 19:36:11Question 9. Select the correct statement regarding RDD5494
09.06.2015 19:35:21Question 8. You are creating a Spark Job and want to build using sbt tool, with following information2565
09.06.2015 19:34:47Question 7. You have executed below Python spark code in Spark Shell3175
09.06.2015 19:32:06Question 6. You have executed below Python spark code2714
09.06.2015 19:31:39Question 5. In Spark Shell what can you do2724
09.06.2015 19:30:23Question 4. Apache Spark can not run with3713
09.06.2015 19:29:54Question 3. You have a website with millions of subscriber, and each subscriber can post 250 character message. As soon as message is posted an event is generated which will be sent over the JMS Queue. Now as an Spark expert you have decided to analyse th1972
09.06.2015 19:28:45Question 2. Which of the following data source can be accessed by Apache Spark3237
09.06.2015 19:27:02Question 1. Select the correct statement regarding Apache Spark3067
08.06.2015 17:58:17Terms and Conditions3060
13.04.2015 07:44:32Oracle/PLSQL: Execute a SQL script file in SQLPlus2635
12.04.2015 15:24:27Altimetrik: Review3768
12.04.2015 15:20:19Payoda Technologies : Review2814
12.04.2015 15:15:54Three Tel Network Services : Review2412
12.04.2015 15:12:40Sysbiz Technologies : Review2264
12.04.2015 15:10:15Xerago E-Biz Services : Review1869
12.04.2015 15:06:31Ugam Solutions : Review1973
12.04.2015 15:03:48Wolters Kluwer ELM Solutions : Review2463
12.04.2015 15:00:38Xoriant Solutions : Review1958
12.04.2015 14:53:26In-Solutions Global : Review1951
12.04.2015 14:30:37WNS Global Services : Review2265
11.04.2015 21:03:25Q5 : You have a website www.QuickTechie.com, there seems to be some problem in the website because static pages of the website is being migrated and visitor faces a problem with 404 page not found. Now you want to monitor how many times your Apache serve1509
11.04.2015 21:01:48Q4. You are creating a CloudWatch Alarm on your AWS resources to check the health and performance of your QuickTechie.com website. If you observe there are some alarms which indicate some problems and need some attention. However, there are some resource2151
11.04.2015 21:00:03Q3. You have in total 5 offices, and all the employee related information is stored under AWS VPC instances. Now all the offices wants to connect the instances in VPC using VPN. Which of the below help you to implement this ?1942
11.04.2015 20:52:31Q2. You have in total 15 offices, and all the employee related information is stored under AWS VPC instances. Now all the offices wants to connect the instances in VPC using VPN. What problem do you see in this scenerio ?1715
11.04.2015 20:46:33Q1. You have a website called QuickTechie.com which has their own datacenter in Geneva, And you webserver is deployed in AWS VPC. Now you wish to make a VPN connection between DataCenter and AWS VPC so that your technical team can connect with VPC So wha2581
11.04.2015 20:31:16Hadoop Tutorial (Basics of Hadoop learn through Video)2716
11.04.2015 20:21:32Apache Kafka Tutorial3476
05.03.2015 18:37:56Hive Interview Questions3543
05.03.2015 18:34:50Hadoop Interview Questions in PDF Format4213
05.03.2015 18:27:39HBase Interview Questions7574
28.02.2015 18:09:11HBase Data Persist Tutorial4388
28.02.2015 18:06:13Apache Flume Tutorial5377
28.02.2015 18:02:43Understand the Struts 2 & Spring MVC2834
28.02.2015 17:58:32Hadoop Security : Kerberos Tutorial3536

Connections

Raj Shah's connections

  HadoopExam Learning Resources
 

Viewed

The last 10 views
AvatarNameTime
are dadaare dada23/07/2020 01:06
tez blogtez blog02/01/2020 10:18
Roger BRoger B20/07/2019 18:49
santosh kumarsantosh kumar11/07/2018 14:49
Vipul PatelVipul Patel05/06/2018 16:10
vinay dwhvinay dwh22/05/2018 19:58
sufeeyan ahmedsufeeyan ahmed24/02/2018 18:58
Veera KVeera K24/08/2017 16:48
S@ndE£P KS@ndE£P K14/07/2017 01:29
Laurentiu VLaurentiu V07/04/2016 13:34
 
2385 Guest have visited this profile.

Groups

My Groups

Apache Hadoop 22.11.2014 - BigData
9 Users | Open
Apache Pig 22.11.2014 - BigData
7 Users | Open
Apache Spark 22.11.2014 - BigData
8 Users | Open

Joined Groups

This user has not joined any Groups.