Weblogic,Websphere Training Institute at Hyderabad

CRIMSON DEER is the best training Institute in Hyderabad.

This Institute Provides Training for the following Technologies:

1) Weblogic 9 Administration.

2) Websphere 6.1 Administration.

3) IBM Portal Server.

4) MQ & MB.

5) Solaris Administration.

6) Linux Enterprise Edition 5.

For more details visit www.crimsondeer.com

Group Discussion Topics & Answers

1. Is coalition politics here to stay?

The following points could be discussed under this topic:

Nature of coalition politics. Indecisiveness of elections. No particular party is getting the peoples mandate. Advantage of coalition politics in enabling formation of government. Flipside of coalition politics- a party with a handful of seats become powerful. Government falls before tenure. Fresh elections each time. Suggest a way out of this problem, for e.g.: once a party pledges support to a coalition, it will not withdraw its support until it has watched a governments performance for at least three years...etc The future -will it only have coalitions ,emerging political trends...etc...

2. Does India need a dictator?

The following points could be discussed under this topic:

The current political structure. Drawbacks of it. Bureaucracy, layers in decision making, anarchy. Dictatorship would mean centralized power and faster decision making. But, country run on whims and fancies of an individual. Freedom on individuals could be clamped..etc....Present a balanced argument for and against and take up your position on the issue.

3. Is India moving away from a secularist state?

The following points could be discussed under this topic:

Define secularism.Constitution calls our country such a state, but how things have changed over the last 50 years.Spread of nationalism. Division into majority and minority groups-e.g. benefits given to minority groups perceived as a threat by others. Role of non-tolerant neighbors in fuelling fundamentalism. It is a passing phenomenon. We have the national character to overcome this....Points along these lines can be discussed.

4. Education in India-or the lack of it.

The following points could be discussed under this topic:

Discuss current education system. Discuss our sociological structure.Poverty which forces kids to drop out to supplement family income.Vicious circle-poverty due to lack of education and vice versa.Suggest solutions to get out of this-for e.g., governments are doing a commendable job with the midday meal schemes but we need more of such efforts. Going down further , why restrict it to government alone? why cant private people, NGOs and other voluntary bodies come forward to do the same? How about tapping corporate funds for such causes .....etc.....

5. What ails Indian sports?

The following points could be discussed under this topic:

A nation of 950 million, we fail to produce great champions barring the occasional Vishwanathan Anand or Geet Sethi. Sports system steeped in bureaucracy. Overriding popularity of cricket leading to neglect in other sports.Traditionally , sports not accorded much importance by us as a career. Need to develop sports from the primary school level-"catch em young". Various incentives to be given to budding sportsmen like academic credits, sports in lieu of a few other subjects etc. Development of sports infrastructure, making it amenable and affordable...etc.....

6. The Age of Information.

The following points could be discussed under this topic:

Today a plethora of sources to provide information-Newspapers, radio, Television, Internet etc. Information available at the touch of a button. Greater decision making power to the individual. Also easier decision making for the individual.Information is the key to ones success today. One who is more informed forges ahead. The flipside-information overkill. At times deciding is tough due to too much information ...etc.....

7. Is Philosophy just arm chair theory?

(This is an example of an abstract topic which is thrown up to students once in a while by the examiners)

The following points could be discussed under this topic:
Talk what you know about this topic . Talk of its relevance in day to day life( or irrelevance if you feel so..). Talk of its influence in literature e.g. Influence of Kant on the romantic poets especially Wordsworth or of Bacon , Voltaire et al on the "Enlightenment"period etc. Talk of its influence in politics e.g. Influence of Nietszche on Hitler and subsequent genocide during Nazi regime etc. Talk of ethics and morals and their importance in life. talk of Indian philosophy. the Gita . Discuss whether we use any of these in our lives and their importance in moulding our values...etc...


8. Success is all about human relations

The following points could be discussed under this topic:

The most important skill for success in to have people on your side. One can get a lot of work done by superiority and hierarchy but one cannot be a leader of men unless one maintains excellent human relations.Its importance not only in professional life but personal life too.Knowledge and expertise does one no good if one cannot maintain proper human relations...etc.....

9. Borderless worlds-Dream or reality?

The following points could be discussed under this topic:

Globalization of business. Opening up of the various economies. Cross cultural exchanges. More and more people getting an opportunity to work in different lands among different peoples and absorbing a bit of their values and culture. This leads to greater tolerance and understanding of others' problems. The other side-people despite all this have nationalistic and regionalist chauvinism . A world divided into first, second and third worlds. People still talk of "their" economy and not world economy. Europe has shown a step in this direction with EU but its feasibility remains to be seen. So while people clamor for globalization, they still think only in terms of their national interests...etc...

10. Quality is a myth in India.

The following points could be discussed under this topic:

The Indian products and manufacturing techniques. Why are we unable to sustain against global competition. Our mindset towards quality. Indian attitude of "chalta hai" which leads to an undemanding customer which in turn lets people get away with substandard products and services. Today competition is forcing our industry to adhere to global standards so we are getting there in terms of quality. Examples of our software industry which is recognized for its ability to meet global standards etc. Since the topic is general, we can extrapolate it to our quality of life-the air , the water , the facilities we have, the infrastructure we have, the services we get and put up with etc.

Top 7 Ways to Succeed in the Business of Speaking

How attractive are you as a speaker? No, your looks, but your consistent ability to provide a quality presentation, attract clients, and be irresistibly attractive to meeting planners and speaker bureaus?

1. Presentation – do you have something interesting, inspiring, and useful to share with audiences? Be mindful of your voice (keep it deep and low pitched), your personality and attitude (positive), your tone (soft, loud. Encouraging as needed), your style, your vocabulary.


2. Connection – how quickly do you get to the core of your audience’s problems and challenges? Skip what is between their ears and go straight to their hearts.


3. Passion – do you love what you do? Develop a niche or specialty that you truly enjoy … and are good at.


4. Network – enhance your speaking career by networking with 50 or more other speakers. They become your referral sources. Join the National Speakers Association – a 4,000 member organization that holds conferences and has local chapters to help you with your marketing skills and networking. Call 480-968-2552 (Arizona)


5. Products – write a book, booklet(s), create audio tapes, video tapes, CD/ROM. Having products will catapult your speaking career and make you more valuable to your clients. This “passive” income is like having frosting on the cake.


6. Value added – become known as a value added speaker. Provide handouts, attend the cocktail reception before your program, stay after your speech, offer follow-up teleclasses, offer your consulting services, be a facilitator.


7. Hire a Coach – The Olympic Games remind us that a world-class athlete is surrounded by a number of people whose function is to keep him/her on track. No serious athlete or professional speaker would expect to progress very far without a COACH .

10 Tips for Professional Email Writing

As we observed, students typically lack the skill of email communication. Many a times, they overlook the basics of email etiquette when they email to their potential recruiters for applying a job or when they contact professors as a part of application for admission in universities abroad.

A badly written email can carry a wrong message about you. Many of the recruiter managers and university professors deem you to be unintelligent and naive if they receive a poorly written email from you.

Here are few ground basics to be kept in mind before you hit the send button after composing an email.

1.Use a proper subject:

This is the most common complaint about a bad email. Never write an email with a subject such as “Hi…”, “Hello…”, “Help” etc,. Instead write an appropriate subject with sufficient information that gives a gist of your email. Such as “Job application for Junior developer by XYZ university graduate”, “Request for assistance in application for XYZ college”, “Regarding a correction in science assignment” , etc. Emails with subjects that give little or no information are more likely to be ignored by the reader. Any fairly busy recruiter or professor would receive no less than a hundred emails daily. They usually scan their inbox using the subject to answer the emails that sound important first.

2.Use a new subject for a new mail:

Do not abuse the “reply email” unless the purpose of your new email is relevant to the old one that you are replying to. If you wish to ask a new question or about something else other than you asked in earlier mails, consider writing a new email with a fresh subject using guidelines given above.

3.Avoid SMS lingo:

This is the second frequently committed error by students. How often do you send email such as these?

“Cn u plz consider my profile for d job?”

Such instant messaging shortcuts and sms shortcuts make you sound like a semi literate. Always write full words and complete sentences.

4.Avoid funky email addresses:

Before you send any formal email to an important person, be sure that your email id sounds formal. Never ever write to HR Managers with fancy email ids such as “angelforyou@gmail.com” or “hunkydude.rocks@gmail.com”. Best bet would be to create an email id which includes your first name and last name. If you don’t have one, consider creating an email that sounds decent and formal.

5.Furnish complete information:

Ensure that your email has complete information about who you are and clear explanation about the problem that you would like to bring to the notice of the person that you are emailing. It is a good practice to mention your full name, your college name and its location, years of education in college, college registration number. Proofread your email and ensure that your email gives sufficient information for the person reading your email to be able to take action.

6.Use ‘please’ and ‘thank you’:

Ensure that your tone is formal and humble. Use the magical words “please” and “thank you” where ever possible. As a rule of thumb use “please” to request for action on your problem and thank the reader when they reply back or take action on your problem.

“Please consider my profile.”
“Thank you for your response/action.”
“I’m afraid I won’t be able submit it on time owing to xyz reason.”

7.Follow up promptly:

Don’t take more than a day to respond to an email response from an important person. If you happened to miss reading that person’s email owing to lack of internet access or any other valid reason, promptly apologize for the late reply stating the reason if appropriate.

8.Don’t abuse font:

Always prefer a plain salted email to a colorful and gaudy email filled with fonts of different colors and sizes. Colorful font and design may look juvenile to the reader.

9.Check your spelling & grammar:

Run a basic spell check, manually proof read for misuse of similar sounding words such as their and there, it’s and its. Check your grammar, avoid major grammatical mistakes. Remember that
email is a recorded conversation, it can’t be undone once you send it across.

10.Leftovers:

Don’t type text in all upper case. Upper case is considered shouting in email. Try not to forget attaching the necessary attachments whenever you mention about the attachment that you are going to send along with your email. Read further on email etiquette.

New Tips to tackle the question - Why should I hire you

Here is a tricky Interview question that is almost always asked in every interview: "Why should I hire you?"

The trouble with this question is that this is a trap question. The interviewer evaluates your attitude and self confidence while simultaneously evaluating your honesty and spontaneity.

If you are not prepared with this question prior to the interview, and lack spontaneity, you are in a big trouble. You could end up giving a plain salted bloated answer such as, "Er, Em, I think I should be selected, well... because.... I am a really good programmer. Because, em.... I can code really well."

If you over-prepared for this question, you may end up giving an impressive sounding answer that was probably already given by other applicants. The employer may conclude that you are not honest and are not good at spontaneous answers.

So, what qualifies to be a perfect answer for this question? What kind of answer may impress an employer who is bored of listening to the repetitive flowery answers borrowed from the internet and books?

Dos and Donts in an interview for entry level job

DOs:

•Ask sensible questions related to the job at the end of the interview. Do not ask questions such as "What would be my salary?", "Would I get a leave on the New year day?".

•If you are being asked questions in a subject that you do not know, admit honestly. Try to tell about your strengths so that interviewer asks you questions in your scope of knowledge.

DONTs:

•Do not give negative answers. Always be positive and confident in your reply, no matter how badly the interviewer criticizes you. Sometimes the interviewer deliberately criticizes you to test your attitude.

•If you are a fresh graduate, it is better not to mention about your higher education plans abroad. When companies spend lots of money to train their resources, they expect returns in a long run. Some companies have tie-ups with Universities, only in such cases, it makes sense to discuss about your higher education.

Weblogic Portal Interview Questions



hese are some of the portal questions.. plz have a look..

1. Which process or processes are executed when WebLogic is started?

A. weblogic.exe
B. weblogic.Server
C. weblogic.bin
D. weblogic.Server and a web server process
E. weblogic.Server and a EJB container process

2. Which defines the servers contained in a cluster?

A. machine
B. application deployment descriptor file
C. cluster deployment descriptor file
D. node manager properties file
E. domain

3.Which is used to package a Workshop Application?

A. a JAR
B. a WAR
C. an EJB
D. an EAR
E. a Project

4.Which Portal element defines the collection of services in a portal?

A. a desktop
B. a book
C. a page
D. a portlet
E. a layout

5.Which Portal tool is used to configure a desktop?

A. the Workshop IDE
B. the Admin console
C. the Builder tool
D. the Admin Portal
E. the Configuration Wizard

6.Which Portal element displays portlets?

A. a book
B. a desktop
C. a portlet
D. a page
E. a layout

7.Which Portal element controls menus?

A. a book
B. a page
C. a desktop
D. a portlet
E. a layout

8.From which project type are Portal projects derived?

A. EJB projects
B. Web projects
C. Java projects
D. Portlet projects
E. data projects

9.Which is the first item to be added to a portal project when creating a portal application?

A. a portal
B. a portlet
C. a page
D. a desktop
E. a placeholder

10.Which project type is automatically created when a portal project is created?

A. EJB
B. java
C. web service
D. control
E. data

11.Which controls the layout positioning of elements?

A. placeholders
B. portlets
C. pages
D. segments
E. menus

12.Which element frames a portlet?

A. segment
B. menus
C. book
D. placeholder
E. layout

13.For which is a backing file often used?

A. perform authentication
B. back-up a portal context
C. load resources into the JNDI
D. initialize a database connection
E. manage anonymous user profiles

14.Which element directly wraps a portal?

A. desktop
B. layout
C. placeholder
D. shell
E. application

15.To customize the skeleton of a portal, which type of resource would need to be created?

A. JavaScript
B. JSP
C. CSS
D. control
E. XML

16.To customize the skin of a portal, which type of resource would be created?

A. JavaScript script
B. CSS file
C. JSP page
D. control file
E. XML file

17.Which is used for providing the context for implementing layouts?

A. JavaScript script
B. global application
C. skeleton file
D. control file
E. XML file

18.Which is used to define a shell?

A. a JavaScript script
B. a global application

C. a control file
D. a skeleton file
E. an XML file

19.Which includes Custom CSS and JavaScript resources?

A. skeleton.properties file
B. web.xml file
C. skin.properties file
D. weblogic.xml file
E. wlw-manifest.xml file

20.Which window contains the editable style classes?

A. Property Editor
B. Document Structure
C. LAF editor
D. Palette
E. Data Palette

21.Which mechanism provides access to overriding style definitions?

A. Property Editor
B. Document Structure
C. skin.properties file
D. Palette
E. control window

22.Which, along with a .layout file and a .html.txt file, is used to define a custom layout?

A. CSS
B. custom JavaScript
C. .laf file
D. custom JSP code
E. custom control

23.A JPF file corresponds to which architectural component?

A. model
B. view
C. controller
D. control
E. action

24.The Java objects of which type specify JPF navigation behavior?

A. Action
B. Forward
C. Netuix
D. Route
E. PageRoute

25.A JSP can invoke an action in a JPF with which JSP tag?

A. NetUI:Base
B. NetUI:Connect
C. NetUI:Anchor
D. NetUI:Forward
E. NetUI:Route

26.Which syntactic element combination is used to access data in a NetUI tag?

A. /**@context.variable*/
B. {context.variable}
C. <%= context.variable %>
D.
E. this.getData(context.variable);

27.If JPF variables are stored as session attributes, how do Portal applications prevent namespace collisions among portlets sharing one session context?

A. portlet attributes are not accessible in a shared session
B. portlet attributes are written to unique records in a database
C. the unique name of each portlet is prefixed to that portlet's attributes names
D. a unique session ID is generated and prefixed to a portlet's attribute names
E. portlet attributes are written to unique records in the server's pstore directory

28.In which two ways do Java portlets differ from JPF portlets? Choose two.

A. custom look and feel properties cannot be applied to them
B. they cannot be assembled graphically in Workshop
C. they cannot use controls
D. they are not portable to other portal servers
E. they cannot use title bars or modes (view, edit or help)

29.Which is the preferred mechanism for implementing Inter-portlet communications?

A. Event Handlers
B. Backing files
C. onRefresh method
D. listenTo portlet property
E. there is no preferred option

30.Access to portlet states are available through backing contexts subclassed from which class?

A. PortalBackingContext
B. DesktopBackingContext
C. ApplicationBackingContext
D. WindowBackingContext
E. SessionContext

31.If Portlets are synchronous, which can be used to receive a Callback for a Portlet?

A. the portal application uses the syncAsyncServlet
B. a wrapper control receives and stores the callback
C. the listenTo property targets the source of the callback
D. an EventHandler receives the callback
E. a backing file receives the callback

32.Which provides a mechanism for providing resource information to Federated Portlets?

A. a UDDI entry
B. a WSRP properties file
C. a WSDL file
D. a wsrp-producer.xml file
E. a wsrp-portlet.xml file

33.User Profiles are created in which type of project?

A. Web Services
B. Data
C. Control
D. Portal
E. EJB

34.Which resource is available for access to user profile data from within a JPF?

A. UserManagement taglib
B. ProfileControl
C. Personalization taglib
D. UserManagement EJB
E. UserManagement Control

35.Which is used to implement property managers for accessing UUP data?

A. JSPs
B. controls
C. POJOs
D. JavaScripts
E. EJBs

36.Which does a content repository contain?

A. segments and profiles
B. components and property sheets
C. elements and nodes
D. nodes and resources
E. types and content

37.Metadata for content loaded with the BulkLoader utility is added with which two? Choose two

A. an md.properties file for each content element
B. meta data tags for HTML pages
C. a content-properties.xml file for each content element
D. a resource fork file for each content element
E. a MetadataLoad utility.

38.To determine if a user has certain characteristics, use which tag?

A.
B.
C.
D.
E.

39.Which can trigger Portal events?

A. EventSession control
B. EventMangement control
C. CampaignService control
D. EventService control
E. CampaignSession control

40.Which resource type allows the "remove" entitlement?

A. Desktop
B. Portlet
C. Book
D. Page
E. Look and Feel

Answers :

Question 1 - B
Question 2 - E
Question 3 - D
Question 4 - A
Question 5 - D
Question 6 - D
Question 7 - A
Question 8 - B
Question 9 - D
Question 10 - E
Question 11 - C
Question 12 - D
Question 13 - A
Question 14 - D
Question 15 - B
Question 16 - B
Question 17 - C
Question 18 - E
Question 19 - C
Question 20 - B
Question 21 - A
Question 22 - D
Question 23 - C
Question 24 - B
Question 25 - C
Question 26 - B
Question 27 - C
Question 28 - B, C
Question 29 - A
Question 30 - D
Question 31 - B
Question 32 - C
Question 33 - B
Question 34 - B
Question 35 - E
Question 36 - E
Question 37 - A, B
Question 38 - C
Question 39 - D
Question 40 - B

QUESTION 1
Which statement is true about applying entitlements to a desktop portlet?

A. Entitlements cannot be applied to a portlet.
B. The administrator can set only the view check box.
C. Only portlet titlebar options that are enabled by the developer can be set.
D. The administrator can set only the view, Edit Remove Maximize and Minimize check boxes

Answer: D

QUESTION 2


You created a page flow in which the flow enters an action method, then is forwarded to a
JSP.
What are two ways to bind information into this flow, so that the JSP can access the data
using Xscript? Choose two

A. The action method adds information to the request object.
B. The JSP method reads a value from a pageContext variable.
C. The JSP contains a form for which the action is bound to an action FORM Bean.
public member variable.
D The action method calls private in the page flow class; the method initializes a
E. The action method increments a private member variable for which two private access or
methods are provided.

Answer: A,D

QUESTION 3


The WebLogic Administration Console allows the user to customize (filter) the local server
log based on message fields. Console the code fragment below. A user could display only
"MYApp" messages if a filter was put on which log field?
Mylogger = new
Weblogic.logging.NonCatalogLogger ("MyApp");
Mylogger.info ("Application started.");

A. User
B. Application
C. Subsystem
D. Timestamp
E. CustomSetting

Answer: C

Weblogic Realtime Issues 16.10.2009


1).  How to add new remote managed server to Cluster?

I have a WebLogic Cluster including 2 managed Server and a Admin Server. There are some web applications running on the cluster, all applications deploy to 2 nodes. Now I want to add a new managed Server to the cluster. If I do that, will all applications be automaticly deployed to the new managed server? If not, what can I do to deploy all the applications to the new managed server?

Sol:

Is your applications deployed to Cluster?
If yes it will automatically deploy to new managed servers added to cluster when it comes to running mode.

2). How to create a deployment plan for an existing application?

Sol:


when you make a persisted configuration change to a deployed application that does not have an existing deployment plan, the console automatically creates a deployment plan for you in the plan subdirectory.

If you have an existing deployment plan for an application, simply prepare the application and place the deployment plan in the plan subdirectory of the application root directory. Then install the application. The Administration Console automatically uses a deployment plan named plan.xml in the \plan subdirectory.

Once you have deployment plan "registered" you can use Update button to set a diferent location of your plan.

3). JNDI data source references at deployment time

Sol: 

You can configure in web.xml. To link to this resource to a jndi name, you need to configure in weblogic.xml

http://download.oracle.com/docs/cd/E13222_01/wls/docs100/webapp/weblogic_xml.html

4). Not able to start server using wlst in windows


i am trying to start the weblogic 10.3 server thru wlst using the command
startServer('AdminServer_name','Domain_Name',"............
first it used to give an error saying that it is not able get the encrypted username and password from the boot.properties file.
then i tried copy pasting the username and passwd in the same command and it gives me a error saying

wlst could not start a new jvm for the server process, this might happen if you have provided illegal jvmArgs or the JVM picked up any illegal JVM_OPTIONS from your path.

if i mention the JVM parameters same as obtained from the help('startServer') command parameters. it says

Traceback (innermost last):
File "(console)", line 1, in?
File "(iostream)", line 398 , in startServer
TypeError: startSvr(): 10th arg cant be coerced to int.

i am desperately trying to get through this error
please help....

sol: 


A
nnoying syntax bug:

60000 works
'60000' doesn't

wls:/offline> startServer( 'AdminServer', 'base_domain', 't3://host:7009', 'weblogic', '****'', '/opt/oracle/bea/user_projects/domains/base_domain', 'true', '60000' )
Traceback (innermost last):
File "", line 1, in ?
File "", line 398, in startServer
TypeError: startSvr(): 10th arg can't be coerced to int

wls:/offline> startServer( 'AdminServer', 'base_domain', 't3://host:7009', 'weblogic', '***', '/opt/oracle/bea/user_projects/domains/base_domain', 'true', 60000 )
Starting weblogic server ...
WLST-WLS-1253908409262:

(or)

http://download.oracle.com/docs/cd/E12840_01/wls/docs103/config_scripting/reference.html#wp1060229




Weblogic Interview questions -7

                                          Weblogic Interview questions -7

How do I provide user credentials for starting a server?

When you create a domain, the Configuration Wizard prompts you to provide the username and password for an initial administrative user. If you create the domain in development mode, the wizard saves the username and encrypted password in a boot identity file. A WebLogic Server instance can refer to a boot identity file during its startup process. If a server instance does not find such a file, it prompts you to enter credentials.

If you create a domain in production mode, or if you want to change user credentials in an existing boot identity file, you can create a new boot identity file.

Can I start a Managed Server if the Administration Server is unavailable?

By default, if a Managed Server is unable to connect to the specified Administration Server during startup, it can retrieve its configuration by reading a configuration file and other files directly. You cannot change the server's configuration until the Administration Server is available. A Managed Server that starts in this way is running in Managed Server Independence mode.

What is the function of T3 in WebLogic Server?

T3 provides a framework for WebLogic Server messages that support for enhancements. These enhancements include abbreviations and features, such as object replacement, that work in the context of WebLogic Server clusters and HTTP and other product tunneling. T3 predates Java Object Serialization and RMI, while closely tracking and leveraging these specifications. T3 is a superset of Java Object. Serialization or RMI; anything you can do in Java Object Serialization and RMI can be done over T3.

T3 is mandated between WebLogic Servers and between programmatic clients and a WebLogic Server cluster. HTTP and IIOP are optional protocols that can be used to communicate between other processes and WebLogic Server. It depends on what you want to do. For example, when you want to communicate between a browser and WebLogic Server-use HTTP, or an ORB and WebLogic Server-IIOP.

How do you set the classpath?

WebLogic Server installs the following script that you can use to set the classpath that a server requires:

WL_HOME\server\bin\setWLSEnv.cmd (on Windows)
WL_HOME/server/bin/setWLSEnv.sh (on UNIX)

where WL_HOME is the directory in which you installed WebLogic Server.

How do stubs work in a WebLogic Server cluster?

Clients that connect to a WebLogic Server cluster and look up a clustered object obtain a replica-aware stub for the object. This stub contains the list of available server instances that host implementations of the object. The stub also contains the load balancing logic for distributing the load among its host servers.

What happens when a failure occurs and the stub cannot connect to a WebLogic Server instance?

When the failure occurs, the stub removes the failed server instance from its list. If there are no servers left in its list, the stubb uses DNS again to find a running server and obtain a current list of running instances. Also, the stub periodically refreshes its list of available server instances in the cluster; this allows the stub to take advantage of new servers as they are added to the cluster.

How does a server know when another server is unavailable?

WebLogic Server uses two mechanisms to determine if a given server instance is unavailable.

Each WebLogic Server instance in a cluster uses multicast to broadcast regular "heartbeat" messages that advertise its availability. By monitoring heartbeat messages, server instances in a cluster determine when a server instance has failed. The other server instances will drop a server instance from the cluster, if they do not receive three consecutive heartbeats from that server instance

WebLogic Server also monitors socket errors to determine the availability of a server instance. For example, if server instance A has an open socket to server instance B, and the socket unexpectedly closes, server A assumes that server B is offline.

How are notifications made when a server is added to a cluster?

The WebLogic Server cluster broadcasts the availability of a new server instance each time a new instance joins the cluster. Cluster-aware stubs also periodically update their list of available server instances.

How do clients handle DNS requests to failed servers?

If a server fails and DNS continues to send requests to the unavailable machine, this can waste bandwidth. For a Java client application, this problem occurs only during startup. WebLogic Server caches the DNS entries and removes the unavailable ones, to prevent the client from accessing a failed server twice.

Failed servers can be more of a problem for browser-based clients, because they always use DNS. To avoid unnecessary DNS requests with browser-based clients, use a third-party load-balancer such as Resonate, BigIP, Alteon, and LocalDirector. These products mask multiple DNS addresses as a single address. They also provide more sophisticated load-balancing options than round-robin, and they keep track of failed servers to avoid routing unnecessary requests.

How many WebLogic Servers can I have on a multi-cpu machine?

There are many possible configurations and each has its own advantages and disadvantages. BEA WebLogic Server has no built-in limit for the number of server instances that can reside in a cluster. Large, multi-processor servers such as Sun Microsystems, Inc. Sun Enterprise 10000, therefore, can host very large clusters or multiple clusters.

In most cases, WebLogic Server clusters scale best when deployed with one WebLogic Server instance for every two CPUs. However, as with all capacity planning, you should test the actual deployment with your target web applications to determine the optimal number and distribution of server instances.

How can I set deployment order for applications?

WebLogic Server allows you to select the load order for applications. WebLogic Server deploys server-level resources (first JDBC and then JMS) before deploying applications. Applications are deployed in this order: connectors, then EJBs, then Web Applications. If the application is an EAR, the individual components are loaded in the order in which they are declared in the application.xml deployment descriptor.

Can I refresh static components of a deployed application without having to redeploy the entire application?



Yes. You can use weblogic.Deployer to specify a component and target a server, using the following syntax:


java weblogic.Deployer -adminurl http://admin:7001 -name appname -targets server1,server2 -deploy jsps/*.jsp

When should I use the -nostage option?

Set the staging mode to -nostage (using weblogic.Deployer or the Administration Console) if you don't want to copy deployment files but want to deploy an application from its present location. All target servers must be able to access the same set of deployment files.

When should I use the external_stage option?

Set -external_stage using weblogic.Deployer if you want to stage the application yourself, and prefer to copy it to its target by your own means.

Can I set the deployment order for application modules? For standalone modules?

The Load Order attribute controls the deployment order of standalone modules and applications relative to other modules and applications of the same type. For example, standalone EJBs with smaller Load Order values are deployed before those with higher values.

Modules that are deployed as part of an Enterprise Application (EAR file or directory) are deployed in the order in which they are specified in the application.xml deployment descriptor.

What is the difference between the WL_HOME/config/examples/applications folder and the WL_HOME/config/examples/stage folder?


The applications folder is intended for applications that are not yet ready for a production environment. WebLogic Server dynamically deploys the contents of the applications folder. The stage folder (or a folder that you create for the same purpose) is for storing copies of deployment files that are ready for deployment in a production environment (deployments that use the stage or external_stage deployment modes).

How do I turn the auto-deployment feature off?

The auto-deployment feature checks the applications folder every three seconds to determine whether there are any new applications or any changes to existing applications and then dynamically deploys these changes.

The auto-deployment feature is enabled for servers that run in development mode. To disable auto-deployment feature, use one of the following methods to place servers in production mode:

* In the Administration Console, click the name of the domain in the left pane, then select the Production Mode checkbox in the right pane.
* At the command line, include the following argument when starting the domain's Administration Server:

-Dweblogic.ProductionModeEnabled=true

Production mode is set for all WebLogic Server instances in a given domain.

Must EJBs be homogeneously deployed across a cluster? Why?

Yes. In WebLogic Server 6.0 and later, EJBs must be homogeneously deployed across a cluster for the following reasons:

* To keep clustering EJBs simple
* To improve performance by avoiding cross-server calls. If EJBs are not deployed on all servers, cross-server calls are more likely.
* To ensure that every EJB is available locall.y
* To ensure that all classes are loaded in an undeployable way. Every server must have access to each EJB's classes so that it can be bound into the local JNDI tree. If only a subset of the servers deploys the bean, the other servers will have to load the bean's classes in their respective system classpaths which makes it impossible to undeploy the beans.

Weblogic Interview questions -6

                                  
                                Weblogic Interview questions -6

Why do I get an exception when trying to find a connection factory?

The exception is usually something like java.io.InvalidClassException or java.lang.NoClassDefFoundError.

Make sure weblogic.jar is in the CLASSPATH of the client. Also make sure you have the correct Java run-time jar files included (i.e., you might need rt.jar).

What can I do when I get java.lang.OutOfMemoryError because producers are faster than consumers?


Quotas can be used to help this situation. Your sender will then receive ResourceAllocationExceptions and the server will stay up. WLS 6.X does not support paging of messages out of memory.

As of WLS 6.1 SP02 or later, you can use the Message Paging feature, which can free up valuable virtual memory during peak message load periods by swapping out messages from virtual memory to persistent storage when message loads reach a specified threshold.

Which of the following is NOT true about deploying EJBs in the WebLogic Server?

a. The weblogic/config/examples/applications directory acts as an automatic deployment directory for EJB 2.0 .jar files and EJB .jar deployment directories
b. The automatic redeployment feature of the WebLogic Server can only redeploy an EJB's implementation classes, you cannot redeploy an EJB's public interfaces
c. Before deploying a packaged jar file containing uncompiled EJB classes and interfaces, we have to use weblogic.ejbc on the packaged .jar file to generate WebLogic Server container classes.

Choice C is correct because it is NOT true. A and B are true about deploying EJBs in the WebLogic server. The weblogic/config/examples/applications directory acts as an automatic deployment directory for EJB 2.0 .jar files and EJB .jar deployment directories. When you start WebLogic Server, it automatically deploys any valid EJB 2.0 .jar files or .jar directories that reside in the applications directory.

WebLogic Server also checks the contents of applications every ten seconds to determine whether an EJB deployment has changed. If a deployment has changed, it is automatically redeployed using the dynamic deployment feature.

If you change the contents of a compiled EJB .jar file in applications, WebLogic Server automatically attempts to redeploy the .jar using the dynamic deployment feature. Since the automatic redeployment feature uses dynamic deployment, WebLogic Server can only redeploy an EJB's implementation classes.

You cannot redeploy an EJB's public interfaces. You create compiled EJB 2.0 .jar files by Compiling your EJB classes and interfaces, packaging the EJB classes and interfaces into a valid .jar file and then Using weblogic.ejbc on the .jar file to generate WebLogic Server container classes. An uncompiled EJB .jar file has the same structure as a compiled file, but you do not have to compile individual class files and interfaces and you do not have to use weblogic.ejbc on the packaged .jar file to generate WebLogic Server container classes. So C is not true.

How do I increase WebLogic Server memory?

Increase the allocation of Java heap memory for WebLogic Server. (Set the minimum and the maximum to the same size.) Start WebLogic Server with the -ms32m option to increase the allocation, as in this example:

$ java ... -ms32m -mx32m ...

This allocates 32 megabytes of Java heap memory to WebLogic Server, which improves performance and allows WebLogic Server to handle more simultaneous connections. You can increase this value if necessary.

What is error "ORA-6502?"

The default length of a string bound to an OUTPUT parameter of a CallableStatement is 128 characters. If the value you assign to the bound parameter exceeds that length, you will get this error.

You can adjust the length of the value of the bound parameter by passing an explicit length with the scale argument to the CallableStatement.registerOutputParameter() method.

How can I control on which WebLogic Server(s) my application will run?

A system administrator can specify on which WebLogic Server(s) applications will run by specifying targets when configuring connection factories. Each connection factory can be deployed on multiple WebLogic servers.

Note: If you use the default connection factory, you have no control over the WebLogic server on which the connection factory may be deployed. If you would like to target a particular WebLogic server, create a new connection factory and specify the appropriate JMS server target(s).

Which of the statements below is true for a web application using session management?

a.) The session object is invalidated, when the session times out.
b.) The session object is invalidated, when sessionInvalidate() method of HttpSession is invoked.
a. Both of the above statements are true.
b. Only statement a.) is true.
c. Only statement b.) is true.
d. None of the above statements is true.

B is the correct choice. The session object will become invalid in either of the following scenarios:
a.) When the session times out.
b.) When invalidate() method of the HttpSession interface is invoked.
Please note that invalidate() and not sessionInvalidate() is the method of HttpSession interface. Thus choice B is correct.

How do I identify the document type of an XML document?

If the XML document has a Public ID, then that is its document type. For example, if an XML document contains the following DOCTYPE declaration:
"http://foo.com/url/to/my/dtd">

then its document type is My public ID String.

If the DOCTYPE declaration does not contain a Public ID, but specifies a System ID, then the document type is the System ID. For example, in the following DOCTYPE declaration:

the document type is http://foo.com/url/to/my/dtd.
Note: The System ID is of the DTD, not of the XML document itself. It can, however, still be used as a way to identify the XML document.
If the XML document does not specify a DOCTYPE declaration, then the document type can be either the root element name or the namespace URI, if it has one.

How can I run multiple instances of the same servlet class in the same WebLogic Server instance?


If you want to run multiple instances, your servlet will have to implement the SingleThreadModel interface. An instance of a class that implements the SingleThreadModel interface is guaranteed not to be invoked by multiple threads simultaneously. Multiple instances of a SingleThreadModel interface are used to service simultaneous requests, each running in a single thread.


When designing your servlet, consider how you use shared resources outside of the servlet class such as file and database access. Because there are multiple instances of servlets that are identical, and may use exactly the same resources, there are still synchronization and sharing issues that must be resolved, even if you do implement the SingleThreadModel interface.

How do I restrict access to servlets and JSPs?

The Java Servlet API Specification v2.2 allows you to declaratively restrict access to specific Servlets and JSPs using the Web Application Deployment descriptor. Section 13.3.2 of the specification has an example deployment descriptor that uses declarative security. For more information, see Programming WebLogic HTTP Servlets.

How do I protect WebLogic Server from security attacks from bogus clients using the WL-Proxy-Client-Cert header?


The WL-Proxy-Client-Cert header can be spoofed (used) by any client which has direct access to WebLogic Server. WebLogic Server takes the certificate information from that header, trusting that is came from a secure source (the plug-in) and use that information to authenticate the user. In previous releases of WebLogic Server, the default behavior was to always trust that header.

Now you need to explicitly define trust of the WL-Proxy-Client-Cert header. A new parameter clientCertProxy allows WebLogic Server to on the implicit trust of the certificate header. If you need an additional level of security, use a connection filter to limit all connections into WebLogic Server (therefore allowing WebLogic Server to only accept connections from the machine on which the plug-in is running).

The clientCertProxy parameter has been added to the HTTPClusterServlet and Web applications.

For the HTTPClusterServlet, add the parameter to the web.xml file as follows:

clientCertProxy
true


For Web applications, add the parameter to the web.xml file as follows:

ServletRequestImpl context-param

weblogic.http.clientCertProxy
true


You can also use this parameter in a cluster as follows:
ClientCertProxyHeader="true"/>

Which XML parser comes with WebLogic Server 6.1?

We bundle a parser, based on Apache's Xerces 1.3.1 parser, in WebLogic Server 6.1. In addition, we include a WebLogic proprietary high-performance non-validating parser that you can use for small to medium sized XML documents. The WebLogic XML Registry allows you to configure the parser you want to use for specific document types.

Weblogic Interview questions - 5

                              Weblogic Interview questions - 5

The Multicast TTL setting for a cluster in the WebLogic Admin console sets which of the following values?


a. Maximum time taken for multicast messages to reach their final destination
b. The number of routers a multicast message can pass through before the packet can be discarded
c. The multicast address to be used by the messages sent from the cluster
d. Minimum time taken for broadcasting a multicast message from the cluster

Choice B is correct. The Multicast TTL(TTL-Time to Live) setting specifies the number of routers a multicast message can pass through before the packet can be discarded. To configure the multicast TTL for a cluster, you should change the Multicast TTL value in the WebLogic Server administration console. This sets the number of network hops a multicast message makes before the packet can be discarded.

If you choose to distribute a cluster over a WAN (or across multiple subnets), you must plan and configure your network topology to ensure that multicast messages are reliably transmitted to all servers in the cluster. One of the requirements to be met by the network is that the multicast

Time To Live (TTL) value must be high enough to ensure that routers do not discard multicast packets before they reach their final destination.

Which of the following algorithms is used by the WebLogic Server as the default load balancing strategy for clustered object stubs when no algorithm is specified ?


a. Round-robin
b. Weight-based
c. Random
d. None of the above

8. Choice A is correct. The basic idea behind load balancing is that by distributing the load proportionally among all the servers in the cluster, the servers can each run at full capacity.

WebLogic Server clusters support several algorithms for load balancing clustered objects. The particular algorithm you choose is maintained within the replica-aware stub obtained for the clustered object. Configurable algorithms for load balancing clustered objects are: Round-robin, Weight-based and Random.

WebLogic Server uses the round-robin algorithm as the default load balancing strategy for clustered object stubs when no algorithm is specified. Round-robin is the only load balancing strategy used by WebLogic proxy plug-ins for HTTP session state clustering.

The round-robin algorithm cycles through a list of WebLogic Server instances in order. For clustered objects, the server list consists of WebLogic Server instances that host the clustered object. For proxy plug-ins, the list consists of all WebLogic Servers that host the clustered servlet or JSP.

Which of the following attributes in the Monitoring tab for a JDBC connection pool in the Administrative console tell us how many clients are currently waiting for a connection?

a. Waiters high
b. Waiters
c. Connections high
d. Clients
e. Wait seconds high

Choice B is correct. JDBC subsystem resources can also be monitored via the Administration Console. The Monitoring tab for a JDBC connection pool allows you to access a table listing statistics for the instances of that pool. These attributes provide important information for managing client database access.

The Waiters High field indicates the highest number of clients waiting for a connection at one time. The Waiters field tells you how many clients are currently waiting for a connection. The Connections High field indicates the highest number of connections that have occurred at one time.

The Wait Seconds High field tells you the longest duration a client has had to wait for a database connection. These attributes allow you to gauge the effectiveness of the current configuration in responding to client requests.

How do I do HTTP tunneling?

If you want to use HTTP tunneling (wrap every message in HTTP to get through a firewall), you need to add TunnelingEnabled="true" into your &lr;ver> definition in the config.xml file or check the appropriate box on the console.

Then use a URL like http://localhost:7001 instead of t3://localhost:7001 for Context.PROVIDER_URL when getting your InitialContext. If you want HTTP tunneling with SSL, use https://localhost:7002 (where https uses HTTP tunneling with SSL and 7002 is the secure port that you configured).

You will pay a performance penalty for doing this, so only use tunneling it if you really need to (i.e., need to go through a firewall).

The MaxPostTimeSecs attribute set in the Administration console under Servers or virtual hosts section corresponds to which of the following?


a. The amount of time that WebLogic Server waits between receiving chunks of data in an HTTP
POST.
b. The total amount of time that WebLogic Server spends receiving HTTP POST data.
c. The time spent by WebLogic server to post data to other servers in the cluster.
d. The number of bytes of data received in a POST from a single request.

Choice B is correct. Web servers may face denial-of-service attacks, which is usually carried out by sending huge amounts of data in an HTTP POST method. You can set three attributes in WebLogic Server that help prevent this type of attack. These attributes are set in the console, under Servers or virtual hosts. You can limit the amount of time that WebLogic Server waits between receiving chunks of data in an HTTP POST by setting the attribute PostTimeoutSecs.

The MaxPostTimeSecs attribute limits the total amount of time that WebLogic Server spends receiving post data. If this limit is triggered, a PostTimeoutException is thrown and a message is sent to the server log. MaxPostSize attribute limits the number of bytes of data received in a POST from a single request. If this limit is triggered, a MaxPostSizeExceeded exception is thrown and a message is sent to the server log.

How do I get a thread dump to help track down a problem?

Ways to get a thread dump:
* Try running this from the command line (after running the setEnv script in /bea/wlserver6.1/config/mydomain/):

java weblogic.Admin -url t3://localhost:7001 THREAD_DUMP

* On Windows, from the console window, enter Ctrl+Break.
* On UNIX, signal the server using kill -3.

Weblogic Interview questions -4

                                               Weblogic Interview questions -4


Why do I get the following exception when viewing the JNDI tree?

isSerializable(class.javax.naming.Binding)
java.io.NotSerializableException:
java.io.PrintWriter at
java.io.ObjectOutputStream.OutputObject

The Weblogic Server JNDI implementation requires objects to be serializable, not referencable. A PrintWriter cannot be serialized and therefore should be declared transient.

When deploying a resource adapter (.rar) to WebLogic Server, are its classes placed in the WebLogic classpath?


For instance, I am deploying an EJB and a resource adapter (.rar), the EJB has no dependencies on the .rar because the EJB is writing to the common client interface (CCI). The EJB client application has sends/marshals as parameter classes that are defined in the .rar. For some reason the EJB's class loader hierarchy cannot find the definition of this .rar-specific class, even though the .rar is deploying successfully. I receive the following error on the EJB client:
java.rmi.UnmarshalException: error unmarshalling arguments; nested
exception
is:
java.lang.ClassNotFoundException:
com.mycompany.InteractionSpecImpl

When you pass an instance of com.myclientcompany.server.eai.InteractionSpecImpl as an argument to your EJB, the appServer needs to de-serialize (unmarshal) the object under the EJB context, and it needs the required class for unmarshalling, inside the ejb-jar(raTester.jar). So if you include the interactionspecimpl class in your ejb-jar file, then you do not need to include those classes in your server's classpath.

How is security handled in the WebLogic J2EE Connector Architecture?

Due to the fact that the current configuration and packaging requirements for resource adapters in WebLogic Server require the hand-editing of the weblogic-ra.xml file, any new passwords specified in the security-principal-map entries are done in clear-text.

BEA understands the importance of protecting security passwords. Hence, we provide a Converter Tool that allows for the encryption of all passwords present in the weblogic-ra.xml file. The Converter Tool is shipped in the standard weblogic.jar file.

Can I enable requests to a JDBC connection pool for a database connection to wait until a connection is available?

No, there's no way to allow a request to wait for a pool connection, and from the system point of view there should not be. Each requests that waits for a connection ties up one of the fixed number of execute threads in the server, which could otherwise be running another server task. Too many waiting requests could tie up all of the execute threads and freeze the server.

How do I use multibyte character sets with WebLogic jDriver for Informix?

Currently, multibyte character sets are not supported for the WebLogic jDriver for Informix driver.


How do I connect to an SQL Server instance that is running on a machine with multiple instances of SQL Server 2000?


Each instance of MS SQL Server must be listening on a different port. So, you can use the port number in the properties that you pass to the getConnection() method or, in case of connection pools, you can specify the port property in the following properties:

server=machineName
port=instancePort

To find the port number where each MS SQL Server instance is running, run the server network utility (in the Microsoft SQL Server program group), select the server instance, select TCP/IP, and click the properties button.

How do I limit the number of Oracle database connections generated by WebLogic Server?

You can use connection pools to limit the number of Oracle database connections generated by WebLogic Server in response to client requests. Connection pools allow T3 applications to share a fixed number of database connections. For information on how to set up connection pools,

How do I call Oracle stored procedures that take no parameters?

Here is what we use that works:
CallableStatement cstmt = conn.prepareCall("Begin procName;
END;");
cstmt.execute();

where procName is the name of an Oracle stored procedure. This is standard Oracle SQL syntax that works with any Oracle DBMS. You might also use the following syntax:

CallableStatement cstmt = conn.prepareCall("{call procName};");
cstmt.execute();

This code, which conforms to the Java Extended SQL spec, will work with any DBMS, not just Oracle.

Why do I get unexpected characters from 8-bit character sets in WebLogic jDriver for Oracle?

If you are using an Oracle database with an 8-bit character set on Solaris, make sure you set NLS_LANG to the proper value on the client. If NLS_LANG is unset, it defaults to a 7-bit ASCII character set, and tries to map characters greater than ASCII 128 to a reasonable approximation (for example, á, à, â would all map to a). Other characters are mapped to a question mark (?).

How many deployment descriptor files does a CMP entity bean deployed on the WebLogic Server have?


a. One J2EE specific deployment descriptor and two WebLogic specific deployment descriptors
b. One J2EE specific deployment descriptor and one WebLogic specific deployment descriptors
c. One J2EE specific deployment descriptor only
d. One WebLogic specific deployment descriptor only

Choice A is correct. Deployment descriptors are text documents formatted with XML tags. The J2EE specifications define standard, portable deployment descriptors for J2EE components and applications. BEA defines additional WebLogic-specific deployment descriptors required to deploy a component or application in the WebLogic Server environment.

When packaging an enterprise bean, we need to create an ejb-jar.xml deployment descriptor in the META-INF subdirectory and add entries for the bean. We also need to create a weblogic-ejb-jar.xml deployment descriptor in the META-INF subdirectory and add entries for the bean. If the bean is an entity bean with container-managed persistence, first we create a weblogic-rdbms-cmp-jar-bean_name.xml deployment descriptor in the META-INF directory with entries for the bean. Then we map the bean to this CMP deployment descriptor with a attribute in the weblogic-ejb-jar.xml file.

Why do I get an error while trying to retrieve the text for ORA-12705?

This error occurs when you have not set the ORACLE_home environment variable properly — a common mistake. In order to use WebLogic jDriver for Oracle, the Oracle client software needs to be installed and ORACLE_home must be set.

You may also see this error message if you try to use WebLogic jDriver for Oracle's internationalization capabilities with a language/codeset combination that is not installed on your system. If you get the ORA-12705 error with the correct error text, then either you have set NLS_LANG improperly, or you do not have the right codesets installed on your system.

Why do I run out of resources during updates with Oracle's database link?

When you use Oracle's database link to update your database, you may get error "maximum number of temporary table locks exceeded" even if you close your result sets and statements when you finish.

The database link is an object in the local database that allows you to access tables, views, and such in a remote database. The database link is controlled by the Oracle server, so the driver has no control over its use of resources.

The link appears to perform the commit (since other processes could see the records that were
being created), but it doesn't free any resources until the connection is closed. The solution is to remove the database link and use the JDBC driver to do your selects, inserts, and updates.

Why am I getting an "ORA-01000: maximum open cursors exceeded" error, even though I closed all ResultSet, Statement, and Connection objects?

This is an Oracle issue. According to Oracle's documentation, dynamic cursors can remain open from run to run in a session and are not closeable when a procedure closes. To work around this issue, you can increase the number of open cursors allowed in the database or you can reset the connection pool (close and reopen database connections in the connection pool).

To reset the connection pool, you can untarget and retarget the connection pool using the Administration Console. You can also use the reset() method through the JMX API or the RESET_POOL command on the WebLogic Server command line interface.

Weblogic Interview questions -3

                                           Weblogic Interview questions -3

What is BEA Weblogic?

BEA WebLogic is a J2EE application server and also an HTTP web server by BEA Systems of San Jose, California, for Unix, Linux, Microsoft Windows, and other platforms. WebLogic supports Oracle, DB2, Microsoft SQL Server, and other JDBC-compliant databases. WebLogic Server supports WS-Security and is compliant with J2EE 1.3.

BEA WebLogic Server is part of the BEA WebLogic Platform™. The other parts of WebLogic Platform are:

* Portal, which includes Commerce Server and Personalization Server (which is built on a BEA-produced Rete rules engine),
* WebLogic Integration,
* WebLogic Workshop, an IDE for Java, and
* JRockit, a JVM for Intel CPUs.

WebLogic Server includes .NET interoperability and supports the following native integration capabilities:

* Native enterprise-grade JMS messaging
* J2EE Connector Architecture
* WebLogic/Tuxedo Connector
* COM+ Connectivity
* CORBA connectivity
* IBM WebSphere MQ connectivity

BEA WebLogic Server Process Edition also includes Business Process Management and Data Mapping functionality.
WebLogic supports security policies managed by Security Administrators. The BEA WebLogic
Server Security Model includes:

* Separate application business logic from security code
* Complete scope of security coverage for all J2EE and non-J2EE components

Which of the following statements are true regarding MDBs (Message Driven Beans) on version 6.0 of WebLogic App Server?

a. MDBs support concurrent processing for both Topics and Queues.
b. MDBs support concurrent processing for only Topics.
c. MDBs support concurrent processing for only Queues.
d. MDBs support concurrent processing neither Topics nor Queues.
Choice A is correct. MDBs support concurrent processing for both Topics and Queues. Previously, only concurrent processing for Queues was supported. To ensure concurrency, change the weblogic-ejb-jar.xml deployment descriptor max-beans-in-free-pool setting to >1. If this element is set to more than one, the container will spawn as many threads as specified. WebLogic Server maintains a free pool of EJBs for every stateless session bean and message driven bean class.
The max-beans-in-free-pool element defines the size of this pool. By default, max-beans-in-free-pool has no limit; the maximum number of beans in the free pool is limited only by the available memory.

he two primary cluster services provided by WebLogic Server are?

a. Http Session State Clustering
b. File Service Clustering
c. Time Service Clustering
d. Object Clustering
e. Event Clustering

Choices A and D are correct.

A WebLogic Server cluster is a group of servers that work together to provide a more scalable and reliable application platform than a single server. A clustered service is an API or interface that is available on multiple servers in the cluster. HTTP session state clustering and object clustering are the two primary cluster services that WebLogic Server provides. WebLogic Server also provides cluster support for JMS destinations and JDBC connections. WebLogic Server provides clustering support for servlets and JSPs by replicating the HTTP session state of clients that access clustered servlets and JSPs. To benefit from HTTP session state clustering, you must ensure that the session state is persistent, either by configure in-memory replication, file system persistence, or JDBC persistence. If an object is clustered, instances of the object are deployed on all WebLogic Servers in the cluster. The client has a choice about which instance of the object to call. This is Object Clustering. The APIs and internal services that cannot be clustered in WebLogic Server version6.0 are File services, Time services, WebLogic Events, Workspaces and ZAC.

How do stubs work in a WebLogic Server cluster?

Clients that connect to a WebLogic Server cluster and look up a clustered object obtain a replica-aware stub for the object. This stub contains the list of available server instances that host implementations of the object. The stub also contains the load balancing logic for distributing the load among its host servers.

What happens when a failure occurs and the stub cannot connect to a WebLogic Server instance?

When the failure occurs, the stub removes the failed server instance from its list. If there are no servers left in its list, the stub uses DNS again to find a running server and obtain a current list of running instances. Also, the stub periodically refreshes its list of available server instances in the cluster; this allows the stub to take advantage of new servers as they are added to the cluster.

Why did my JDBC code throw a rollback SQLException?

Your JDBC code may throw the following exception:
"The coordinator has rolled back the transaction.
No further JDBC access is allowed within this transaction."
The WebLogic JTS JDBC driver throws this exception when the current JDBC connection transaction rolls back prior to or during the JDBC call. This exception indicates that the transaction in which the JDBC connection was participating was rolled back at some point prior to or during the JDBC call.
The rollback may have happened in an earlier EJB invoke that was part of the transaction, or the rollback may have occurred because the transaction timed out. In either case, the transaction will be rolled back, the connection returned to the pool and the database resources released. In order to proceed, the JTS JDBC connection must be closed and reopened in a new transaction.

Must my bean-managed persistence mechanism use the WebLogic JTS driver?

Use the TxDataSource for bean-managed persistence.

Why is there no polymorphic-type response from a create() or find() method?
The EJB Specification prohibits this behavior, and the weblogic.ejbc compiler checks for this behavior and prohibits any polymorphic type of response from a create() or find() method.
The reason the create() and find() methods are not polymorphic is similar to the reason constructors are not polymorphic in Java. The derived classes generally do not know or cannot initialize the base class properly.


Must EJBs be homogeneously deployed across a cluster? Why?

Yes. Beginning with WebLogic Server version 6.0, EJBs must be homogeneously deployed across a cluster for the following reasons:
* To keep clustering EJBs simple
* To avoid cross server calls which results in more efficiency. If EJBs are not deployed on all servers, cross server calls are much more likely.
* To ensure that every EJB is available locally
* To ensure that all classes are loaded in an undeployable way
* Every server must have access to each EJB's classes so that it can be bound into the local JNDI tree. If only a subset of the servers deploys the bean, the other servers will have to load the bean's classes in their respective system classpaths which makes it impossible to undeploy the beans.

Which of the following are recommended practices to be performed in the ejbPassivate() method of a stateful session bean?

a. Close any open resources, like database connections
b. All non-transient, non-serializable fields(except some special types) should be set to null.
c. All transient fields should be set to null
d. Make all database connection reference fields transient
e. All primitive type fields should be set to null

Choices A, B and D are correct. When a bean is about to be passivated, its ejbPassivate() method is invoked, alerting the bean instance that it is about to enter the Passivated state. At this time, the bean instance should close any open resources and set all non transient, non serializable fields to null. This will prevent problems from occurring when the bean is serialized. Transient fields will simply be ignored.Serializable fields will be saved. Open resources such as sockets or JDBC connections must be closed whenever the bean is passivated. In stateful session beans, open resources will not be maintained for the life of the bean instance. When a stateful session bean is passivated, any open resource can cause problems with the activation mechanism.

A bean's conversational state may consist of only primitive values, objects that are serializable, and the following special types-SessionContext, EJBhome, EJBObject, UserTransaction and Context (only when it references the JNDI ENC) . The types in this list (and their subtypes) are handled specially by the passivation mechanism. They don't need to be serializable; they will be maintained through passivation and restored automatically to the bean instance when it is activated

While packaging the Web Application DefaultWebApp for deployment into the WebLogic server, the home and remote interfaces of the enterprise beans used by the servlets should reside in which directory?

a. DefaultWebApp/META_INF/classes
b. DefaultWebApp/META_INF/lib
c. DefaultWebApp/WEB_INF/lib
d. DefaultWebApp/WEB_INF/classes
e. DefaultWebApp/classes
Choice D is correct. When packaging a web application create META-INF and WEB-INF subdirectories in the application directory to hold deployment descriptors and compiled Java classes. All servlet classes and helper classes should reside in the WEB-INF/classes subdirectory. The home and remote interface classes for enterprise beans used by the servlets into the WEB-INF/classes subdirectory.
All the HTML files, JSP files, images, and any other files that these Web pages reference should exist in the application directory, maintaining the directory structure for referenced files. The META_INF directory contains the deployment descriptors for the enterprise beans, but not the classes.

How do I set up my CLASSPATH?

Setting up your CLASSPATH correctly depends on what you are trying to do. The most common tasks are described below:
* Starting WebLogic Server. See Setting the Classpath Option in the Starting and Stopping WebLogic Servers section of the Administration Guide. In addition, your WebLogic distribution includes shell scripts that you can use to start the server. These scripts, which are located in the domain directories under the config directory of your WebLogic Server distribution, automatically set up the CLASSPATH variable in the shell before starting the server.

Weblogic Interview Questions - 2

                                          Weblogic Interview Questions - 2


1)Can I refresh static components of a deployed application without having to redeploy the entire application?


Yes. You can use weblogic.Deployer to specify a component and target a server, using the following

syntax:


java weblogic.Deployer -adminurl http://admin:7001 -name appname -targets server1,server2 -deploy jsps/*.jsp

2)When should I use the -nostage option?

Set the staging mode to -nostage (using weblogic.Deployer or the Administration Console) if you don't want to copy deployment files but want to deploy an application from its present location. All target servers must be able to access the same set of deployment files.

3)When should I use the external_stage option?

Set -external_stage using weblogic.Deployer if you want to stage the application yourself, and prefer to copy it to its target by your own means.

4)Can I set the deployment order for application modules? For standalone modules?

The Load Order attribute controls the deployment order of standalone modules and applications relative to other modules and applications of the same type. For example, standalone EJBs with smaller Load Order values are deployed before those with higher values.

Modules that are deployed as part of an Enterprise Application (EAR file or directory) are deployed in the order in which they are specified in the application.xml deployment descriptor.

What is the difference between the WL_HOME/config/examples/applications folder and the WL_HOME/config/examples/stage folder?
The applications folder is intended for applications that are not yet ready for a production environment. WebLogic Server dynamically deploys the contents of the applications folder. The stage folder (or a folder that you create for the same purpose) is for storing copies of deployment files that are ready for deployment in a production environment (deployments that use the stage or external_stage deployment modes).

5)How do I turn the auto-deployment feature off?

The auto-deployment feature checks the applications folder every three seconds to determine whether there are any new applications or any changes to existing applications and then dynamically deploys these changes.

The auto-deployment feature is enabled for servers that run in development mode. To disable auto-deployment feature, use one of the following methods to place servers in production mode:

* In the Administration Console, click the name of the domain in the left pane, then select the Production Mode checkbox in the right pane.
* At the command line, include the following argument when starting the domain's Administration Server:

-Dweblogic.ProductionModeEnabled=true

Production mode is set for all WebLogic Server instances in a given domain.

6)Must EJBs be homogeneously deployed across a cluster? Why?

Yes. In WebLogic Server 6.0 and later, EJBs must be homogeneously deployed across a cluster for the following reasons:

* To keep clustering EJBs simple
* To improve performance by avoiding cross-server calls. If EJBs are not deployed on all servers, cross-server calls are more likely.
* To ensure that every EJB is available locall.y
* To ensure that all classes are loaded in an undeployable way. Every server must have access to each EJB's classes so that it can be bound into the local JNDI tree. If only a subset of the servers deploys the bean, the other servers will have to load the bean's classes in their respective system classpaths which makes it impossible to undeploy the beans.
 

Weblogic Interview Questions - 1



                                          Weblogic Interview Questions - 1


1)How do I provide user credentials for starting a server?

When you create a domain, the Configuration Wizard prompts you to provide the username and password for an initial administrative user. If you create the domain in development mode, the wizard saves the username and encrypted password in a boot identity file. A WebLogic Server instance can refer to a boot identity file during its startup process. If a server instance does not find such a file, it prompts you to enter credentials.
If you create a domain in production mode, or if you want to change user credentials in an existing boot identity file, you can create a new boot identity file.

2)Can I start a Managed Server if the Administration Server is unavailable?

By default, if a Managed Server is unable to connect to the specified Administration Server during startup, it can retrieve its configuration by reading a configuration file and other files directly. You cannot change the server's configuration until the Administration Server is available. A Managed Server that starts in this way is running in Managed Server Independence mode.

3)What is the function of T3 in WebLogic Server?

T3 provides a framework for WebLogic Server messages that support for enhancements. These enhancements include abbreviations and features, such as object replacement, that work in the context of WebLogic Server clusters and HTTP and other product tunneling. T3 predates Java Object Serialization and RMI, while closely tracking and leveraging these specifications. T3 is a superset of Java Object. Serialization or RMI; anything you can do in Java Object Serialization and RMI can be done over T3. T3 is mandated between WebLogic Servers and between programmatic clients and a WebLogic Server cluster. HTTP and IIOP are optional protocols that can be used to communicate between other processes and WebLogic Server. It depends on what you want to do. For example, when you want to communicate between a browser and WebLogic Server-use HTTP, or an ORB and WebLogic Server-IIOP.

4)How do you set the classpath?

WebLogic Server installs the following script that you can use to set the classpath that a server requires:
WL_HOME\server\bin\setWLSEnv.cmd (on Windows)
WL_HOME/server/bin/setWLSEnv.sh (on UNIX)

5)How do stubs work in a WebLogic Server cluster?

Clients that connect to a WebLogic Server cluster and look up a clustered object obtain a replica-aware stub for the object. This stub contains the list of available server instances that host implementations of the object. The stub also contains the load balancing logic for distributing the load among its host servers.

What happens when a failure occurs and the stub cannot connect to a WebLogic Server instance?
When the failure occurs, the stub removes the failed server instance from its list. If there are no servers left in its list, the stubb uses DNS again to find a running server and obtain a current list of running instances. Also, the stub periodically refreshes its list of available server instances in the cluster; this allows the stub to take advantage of new servers as they are added to the cluster.

6)How does a server know when another server is unavailable?

WebLogic Server uses two mechanisms to determine if a given server instance is unavailable.

Each WebLogic Server instance in a cluster uses multicast to broadcast regular "heartbeat" messages that advertise its availability. By monitoring heartbeat messages, server instances in a cluster determine when a server instance has failed. The other server instances will drop a server instance from the cluster, if they do not receive three consecutive heartbeats from that server instance

WebLogic Server also monitors socket errors to determine the availability of a server instance. For example, if server instance A has an open socket to server instance B, and the socket unexpectedly closes, server A assumes that server B is offline.

7)How are notifications made when a server is added to a cluster?

The WebLogic Server cluster broadcasts the availability of a new server instance each time a new instance joins the cluster. Cluster-aware stubs also periodically update their list of available server instances.

8)How do clients handle DNS requests to failed servers?

If a server fails and DNS continues to send requests to the unavailable machine, this can waste bandwidth. For a Java client application, this problem occurs only during startup. WebLogic Server caches the DNS entries and removes the unavailable ones, to prevent the client from accessing a failed server twice.

Failed servers can be more of a problem for browser-based clients, because they always use DNS. To avoid unnecessary DNS requests with browser-based clients, use a third-party load-balancer such as Resonate, BigIP, Alteon, and LocalDirector. These products mask multiple DNS addresses as a single address. They also provide more sophisticated load-balancing options than round-robin, and they keep track of failed servers to avoid routing unnecessary requests.

9)How many WebLogic Servers can I have on a multi-cpu machine?

There are many possible configurations and each has its own advantages and disadvantages. BEA WebLogic Server has no built-in limit for the number of server instances that can reside in a cluster. Large, multi-processor servers such as Sun Microsystems, Inc. Sun Enterprise 10000, therefore, can host very large clusters or multiple clusters.

In most cases, WebLogic Server clusters scale best when deployed with one WebLogic Server instance for every two CPUs. However, as with all capacity planning, you should test the actual deployment with your target web applications to determine the optimal number and distribution of server instances.

10)How can I set deployment order for applications?

WebLogic Server allows you to select the load order for applications. WebLogic Server deploys server-level resources (first JDBC and then JMS) before deploying applications. Applications are deployed in this order: connectors, then EJBs, then Web Applications. If the application is an EAR, the individual components are loaded in the order in which they are declared in the application.xml deployment descriptor.

Software Quality Assurance Interview Questions and Answers

--------------------------------------------------------------------------------

1. What is Acceptance Testing?

Testing conducted to enable a user/customer to determine whether to accept a software product. Normally performed to validate the software meets a set of agreed acceptance criteria.

2. What is Accessibility Testing?

Verifying a product is accessible to the people having disabilities (deaf, blind, mentally disabled etc.).

3. What is Ad Hoc Testing?

A testing phase where the tester tries to 'break' the system by randomly trying the system's functionality. Can include negative testing as well. See also Monkey Testing.

4. What is Agile Testing?

Testing practice for projects using agile methodologies, treating development as the customer of testing and emphasizing a test-first design paradigm. See also Test Driven Development.

5. What is Application Binary Interface (ABI)?

A specification defining requirements for portability of applications in binary forms across different system platforms and environments

6. What is Application Programming Interface (API)?

A formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services.

7. What is Automated Software Quality (ASQ)?

The use of software tools, such as automated testing tools, to improve software quality.

8. What is Automated Testing?

Testing employing software tools which execute tests without manual intervention. Can be applied in GUI, performance, API, etc. testing. The use of software to control the execution of tests, the comparison of actual outcomes to predicted outcomes, the setting up of test preconditions, and other test control and test reporting functions.

9. What is Backus-Naur Form?

A metalanguage used to formally describe the syntax of a language.

10. What is Basic Block?

A sequence of one or more consecutive, executable statements containing no branches.

11. What is Basis Path Testing?

A white box test case design technique that uses the algorithmic flow of the program to design tests.

12. What is Basis Set?

The set of tests derived using basis path testing.

13. What is Baseline?

The point at which some deliverable produced during the software engineering process is put under formal change control.

14. What you will do during the first day of job?

What would you like to do five years from now?

15. What is Beta Testing?

Testing of a rerelease of a software product conducted by customers.

16. What is Binary Portability Testing?

Testing an executable application for portability across system platforms and environments, usually for conformation to an ABI specification.



17. What is Black Box Testing?

Testing based on an analysis of the specification of a piece of software without reference to its internal workings. The goal is to test how well the component conforms to the published requirements for the component.

18. What is Bottom Up Testing?

An approach to integration testing where the lowest level components are tested first, then used to facilitate the testing of higher level components. The process is repeated until the component at the top of the hierarchy is tested.

19. What is Boundary Testing?

Test which focus on the boundary or limit conditions of the software being tested. (Some of these tests are stress tests).

20. What is Bug?

A fault in a program which causes the program to perform in an unintended or unanticipated manner.

20. What is Defect?

If software misses some feature or function from what is there in requirement it is called as defect.

21. What is Boundary Value Analysis?

BVA is similar to Equivalence Partitioning but focuses on "corner cases" or values that are usually out of range as defined by the specification. his means that if a function expects all values in range of negative 100 to positive 1000, test inputs would include negative 101 and positive 1001.

22. What is Branch Testing?

Testing in which all branches in the program source code are tested at least once.

23. What is Breadth Testing?

A test suite that exercises the full functionality of a product but does not test features in detail.

24. What is CAST?

Computer Aided Software Testing.

25. What is Capture/Replay Tool?

A test tool that records test input as it is sent to the software under test. The input cases stored can then be used to reproduce the test at a later time. Most commonly applied to GUI test tools.

26. What is CMM?

The Capability Maturity Model for Software (CMM or SW-CMM) is a model for judging the maturity of the software processes of an organization and for identifying the key practices that are required to increase the maturity of these processes

27. What is Cause Effect Graph?

A graphical representation of inputs and the associated outputs effects which can be used to design test cases.

28. What is Code Complete?

Phase of development where functionality is implemented in entirety; bug fixes are all that are left. All functions found in the Functional Specifications have been implemented.

29. What is Code Coverage?

An analysis method that determines which parts of the software have been executed (covered) by the test case suite and which parts have not been executed and therefore may require additional attention.

30. What is Code Inspection?

A formal testing technique where the programmer reviews source code with a group who ask questions analyzing the program logic, analyzing the code with respect to a checklist of historically common programming errors, and analyzing its compliance with coding standards.

31. What is Code Walkthrough?

A formal testing technique where source code is traced by a group with a small set of test cases, while the state of program variables is manually monitored, to analyze the programmer's logic and assumptions.

32. What is Coding?

The generation of source code.

33. What is Compatibility Testing?

Testing whether software is compatible with other elements of a system with which it should operate, e.g. browsers, Operating Systems, or hardware.



34. What is Component?

A minimal software item for which a separate specification is available

35. What is Component Testing?

Testing of individual software components (Unit Testing).

JAVA Questions

JAVA



What is the purpose of Void class?

The Void class is an uninstantiable placeholder class to hold a reference to the Class object representing the primitive Java type void.

What is reflection?

Reflection allows programmatic access to information about the fields, methods and constructors of loaded classes, and the use reflected fields, methods, and constructors to operate on their underlying counterparts on objects, within security restrictions.

What is the base class for Error and Exception?

Throwable

What is the byte range?

128 to 127

What is the implementation of destroy method in java.. is it native or java code?

This method is not implemented.

What is a package?

To group set of classes into a single unit is known as packaging. Packages provides wide namespace ability.


What are the approaches that you will follow for making a program very efficient?

By avoiding too much of static methods avoiding the excessive and unnecessary use of synchronized methods Selection of related classes based on the application (meaning synchronized classes for multiuser and non-synchronized classes for single user) Usage of appropriate design patterns Using cache methodologies for remote invocations Avoiding creation of variables within a loop and lot more.

What is a DatabaseMetaData?

Comprehensive information about the database as a whole.

What is Locale?

A Locale object represents a specific geographical, political, or cultural region

How will you load a specific locale?

Using ResourceBundle.getBundle(…);

What is JIT and its use?

Really, just a very fast compiler… In this incarnation, pretty much a one-pass compiler — no offline computations. So you can’t look at the whole method, rank the expressions according to which ones are re-used the most, and then generate code. In theory terms, it’s an on-line problem.

Is JVM a compiler or an interpreter?

Interpreter

When you think about optimization, what is the best way to findout the time/memory consuming process?

Using profiler

What is the purpose of assert keyword used in JDK1.4.x?

In order to validate certain expressions. It effectively replaces the if block and automatically throws the AssertionError on failure. This keyword should be used for the critical arguments. Meaning, without that the method does nothing.

How will you get the platform dependent values like line separator, path separator, etc., ?

Using Sytem.getProperty(…) (line.separator, path.separator, …)

What is skeleton and stub? what is the purpose of those?

Stub is a client side representation of the server, which takes care of communicating with the remote server. Skeleton is the server side representation. But that is no more in use… it is deprecated long before in JDK.

What is the final keyword denotes?

final keyword denotes that it is the final implementation for that method or variable or class. You can’t override that method/variable/class any more.

What is the significance of ListIterator?

You can iterate back and forth.

What is the major difference between LinkedList and ArrayList?

LinkedList are meant for sequential accessing. ArrayList are meant for random accessing.

What is nested class?

If all the methods of a inner class is static then it is a nested class.

What is inner class?

If the methods of the inner class can only be accessed via the instance of the inner class, then it is called inner class.

What is composition?

Holding the reference of the other class within some other class is known as composition.

What is aggregation?

It is a special type of composition. If you expose all the methods of a composite class and route the method call to the composite method through its reference, then it is called aggregation.

What are the methods in Object?

clone, equals, wait, finalize, getClass, hashCode, notify, notifyAll, toString

Can you instantiate the Math class?

You can’t instantiate the math class. All the methods in this class are static. And the constructor is not public.

What is singleton?

It is one of the design pattern. This falls in the creational pattern of the design pattern. There will be only one instance for that entire JVM. You can achieve this by having the private constructor in the class. For eg., public class Singleton { private static final Singleton s = new Singleton(); private Singleton() { } public static Singleton getInstance() { return s; } // all non static methods … }

What is DriverManager?

The basic service to manage set of JDBC drivers.

What is Class.forName() does and how it is useful?

It loads the class into the ClassLoader. It returns the Class. Using that you can get the instance ( “class-instance”.newInstance() ).



What is QTP?

Quick Test is a graphical interface record-playback automation tool. It is able to work with any web, java or windows client application. Quick Test enables you to test standard web objects and ActiveX controls. In addition to these environments, Quick Test Professional also enables you to test Java applets and applications and multimedia objects on Applications as well as standard Windows applications, Visual Basic 6 applications and.NET framework applications

What are the Features & Benefits of Quick Test Pro (QTP 8.0)?

Operates stand-alone, or integrated into Mercury Business Process Testing and Mercury Quality Center. Introduces next-generation zero-configuration Keyword Driven testing technology in Quick Test Professional 8.0 allowing for fast test creation, easier maintenance, and more powerful data-driving capability. Identifies objects with Unique Smart Object Recognition, even if they change from build to build, enabling reliable unattended script execution. Collapses test documentation and test creation to a single step with Auto-documentation technology. Enables thorough validation of applications through a full complement of checkpoints.

How to handle the exceptions using recovery scenario manager in QTP?

There are 4 trigger events during which a recovery scenario should be activated. A pop up window appears in an opened application during the test run: A property of an object changes its state or value, A step in the test does not run successfully, An open application fails during the test run, These triggers are considered as exceptions.You can instruct QTP to recover unexpected events or errors that occurred in your testing environment during test run. Recovery scenario manager provides a wizard that guides you through the defining recovery scenario. Recovery scenario has three steps: 1. Triggered Events 2. Recovery steps 3. Post Recovery Test-Run

What is the use of Text output value in QTP?

Output values enable to view the values that the application talks during run time. When parameterized, the values change for each iteration. Thus by creating output values, we can capture the values that the application takes for each run and output them to the data table.
How to use the Object spy in QTP 8.0 version?
There are two ways to Spy the objects in QTP: 1) Thru file toolbar, In the File Toolbar click on the last toolbar button (an icon showing a person with hat). 2) True Object repository Dialog, In Object repository dialog click on the button object spy. In the Object spy Dialog click on the button showing hand symbol. The pointer now changes in to a hand symbol and we have to point out the object to spy the state of the object if at all the object is not visible. or window is minimized then, hold the Ctrl button and activate the required window to and release the Ctrl button.

How Does Run time data (Parameterization) is handled in QTP?

You can then enter test data into the Data Table, an integrated spreadsheet with the full functionality of Excel, to manipulate data sets and create multiple test iterations, without programming, to expand test case coverage. Data can be typed in or imported from databases, spreadsheets, or text files.

What is keyword view and Expert view in QTP?

Quick Test’s Keyword Driven approach, test automation experts have full access to the underlying test and object properties, via an integrated scripting and debugging environment that is round-trip synchronized with the Keyword View. Advanced testers can view and edit their tests in the Expert View, which reveals the underlying industry-standard VBScript that Quick Test Professional automatically generates. Any changes made in the Expert View are automatically synchronized with the Keyword View.

Explain about the Test Fusion Report of QTP?

Once a tester has run a test, a Test Fusion report displays all aspects of the test run: a high-level results overview, an expandable Tree View of the test specifying exactly where application failures occurred, the test data used, application screen shots for every step that highlight any discrepancies, and detailed explanations of each checkpoint pass and failure. By combining Test Fusion reports with Quick Test Professional, you can share reports across an entire QA and development team.

Which environments does QTP support?

Quick Test Professional supports functional testing of all enterprise environments, including Windows, Web,..NET, Java/J2EE, SAP, Siebel, Oracle, PeopleSoft, Visual Basic, ActiveX, mainframe terminal emulators, and Web services.

Explain the QTP Tool interface.?

It contains the following key elements: Title bar, displaying the name of the currently open test, Menu bar, displaying menus of Quick Test commands, File toolbar, containing buttons to assist you in managing tests, Test toolbar, containing buttons used while creating and maintaining tests, Debug toolbar, containing buttons used while debugging tests. Note: The Debug toolbar is not displayed when you open Quick Test for the first time. You can display the Debug toolbar by choosing View — Toolbars — Debug. Action toolbar, containing buttons and a list of actions, enabling you to view the details of an individual action or the entire test flow. Note: The Action toolbar is not displayed when you open Quick Test for the first time. You can display the Action toolbar by choosing View — Toolbars — Action. If you insert a reusable or external action in a test, the Action toolbar is displayed automatically. Test pane, containing two tabs to view your test-the Tree View and the Expert View ,Test Details pane, containing the Active Screen. Data Table, containing two tabs, Global and Action, to assist you in parameterizing your test. Debug Viewer pane, containing three tabs to assist you in debugging your test-Watch Expressions, Variables, and Command. (The Debug Viewer pane can be opened only when a test run pauses at a breakpoint.) Status bar, displaying the status of the test

How does QTP recognize Objects in AUT?

Quick Test stores the definitions for application objects in a file called the Object Repository. As you record your test, Quick Test will add an entry for each item you interact with. Each Object Repository entry will be identified by a logical name (determined automatically by Quick Test), and will contain a set of properties (type, name, etc) that uniquely identify each object. Each line in the Quick Test script will contain a reference to the object that you interacted with, a call to the appropriate method (set, click, check) and any parameters for that method (such as the value for a call to the set method). The references to objects in the script will all be identified by the logical name, rather than any physical, descriptive properties.

What are the types of Object Repositories in QTP?

Quick Test has two types of object repositories for storing object information: shared object repositories and action object repositories. You can choose which type of object repository you want to use as the default type for new tests, and you can change the default as necessary for each new test. The object repository per-action mode is the default setting. In this mode, Quick Test automatically creates an object repository file for each action in your test so that you can create and run tests without creating, choosing, or modifying object repository files. However, if you do modify values in an action object repository, your changes do not have any effect on other actions. Therefore, if the same test object exists in more than one action and you modify an object’s property values in one action, you may need to make the same change in every action (and any test) containing the object.
Powered by Blogger