Others Interview Questions and Answers (265) - Page 11

What is DNA storage ?

DNA storage is the process of encoding and decoding binary data onto and from synthesized strands of DNA (deoxyribonucleic acid). In nature, DNA molecules contain genetic blueprints for living cells and organisms. To store a binary digital file as DNA, the individual bits (binary digits) are converted from 1 and 0 to the letters A, C, G, and T. These letters represent the four main compounds in DNA: adenine, cytosine, guanine, and thymine. To recover the data, the sequence A, C, G, and T representing the DNA molecule is decoded back into the original sequence of bits 1 and 0.
What is Electronics disposal efficiency (EDE) ?

Electronics disposal efficiency (EDE) is the percentage of decommissioned information technology electronics and electrical equipment that is disposed of through known responsible entities. The EDE metric was developed by a non-profit industry organization called the Green Grid. The eventual goal is for an organization to transfer 100% of its decommissioned IT equipment to a third party that has been certified to meet electronics recycling standards.Calculating EDE requires an organization to know the weight of the equipment that has been decommissioned and its destination when it leaves the organization's control.
What is Linear Tape File System ?

LTFS (Linear Tape File System) is a file system specification that allows tape storage technology to be indexed.
LTFS has sparked new interest in tape storage. Applying a file system to tape allows users to organize and search contents on tape just as they would on hard disk. In addition to improving retrieval time for data stored on tape, LTFS also simplifies management tasks by making it possible to drag and drop files to tape in the same way that files might be dragged and dropped to disk.
LTFS partitions LTO-5 or LTO-6 tapes into two segments called partitions. Partition 0 holds the file system metadata. The data itself, which is stored in Partition 1, can be viewed by a browser or any application that has the tape attached to it
What is physical to virtual?

P2V (physical to virtual) is the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine or a disk partition.Migration can be a tedious and uncertain process, especially if the new environment contains substantially different hardware than the old. To streamline the operation, part or all of the migration can be carried out automatically by means of specialized programs known as migration tools. Many virtualization platforms today include built-in P2V tools
What is flash array ?

A flash array, also called an all-flash array, is a solid state storage system that contains multiple flash memory drives instead of spinning hard disk drives. Flash memory, which has no moving parts, is a type of nonvolatile memory that can be erased and reprogrammed in units of memory called blocks. It is a variation of erasable programmable read-only memory (EEPROM) and got its name because the memory blocks can be erased in a single action or "flash." A flash array can transfer data to and from solid state drives (SSDs) much faster than electromechanical disk drives, however, flash is more expensive than spinning disk
What is Gamification ?

Gamification is the application of game theory concepts and techniques to non-game activities. Game theory is a branch of mathematics that seeks to understand why an individual makes a particular decision and how the decisions made by one individual affect others.
What is Decision management ?

Decision management is a process or set of processes for improving and streamlining action items. An action item defines work that needs to be completed.
The goal of decision management is to improve the decision making process by using all available information to increase the precision, consistency and agility of decisions in order to make make good choices, taking known risks and time constraints into consideration.
Decision management systems treat decisions as reusable assets and introduce technology at decision points to automate the decision-making process. Decisions may be fully automated or they may be presented as possible choices for a human to select
What is esProc ?

esProc is a brand new script to simplify the complex database computation with step-by-step mode. It can deal with tentative and occasional problems without data-modeling beforehand, releasing you from heavy data process work. esProc can also integrate complex and various datasource as a database, keeping you away from tedious and complex SQL and stored procedure. esProc runs as a desktop application, it can be utilized easily by business professionals without highly skilled technology background or extra training, which could greatly improve your productivity by minimizing the purchase and learning costs.
What is Mobile device management ?

Mobile device management (MDM) is the administrative area dealing with securing, monitoring, integrating and managing mobile devices, such as smartphones, tablets and laptops, in the workplace. The intent of MDM is to optimize the functionality and security of mobile devices within the enterprise, while simultaneously protecting the corporate network.
Mobile device management software allows distribution of applications, data and configuration settings and patches for such devices. Ideally, MDM software allows administrators to oversee mobile devices as easily as desktop computers and provides optimal performance for users. MDM tools should include application management, file synchronization and sharing, data security tools, and support for either a corporate-owned or personally owned device.
What is CloudStack ?

Apache CloudStack is an open source cloud management platform for delivering Infrastructure-as-a-Service (IaaS) in cloud computing environments.
CloudStack is being developed to help managed service providers and enterprise IT departments create and operate public cloud, private cloud or hybrid clouds with capabilities equivalent to Amazon's Elastic Compute Cloud (Amazon EC2).
CloudStack competes with OpenStack and Eucalyptus in the cloud orchestration market
What is Bitcoin?

Bitcoin is a digital currency (also called crypto-currency or virtual asset) that is not backed by any country's central bank or government. Bitcoins can be traded for goods or services with vendors who accept them as payment. As of this writing, one Bitcoin (also called a BTC) is worth $104 -- but just as with stocks, the value of Bitcoins can fluctuate quickly.
Bitcoins can be spent by initiating a transfer request from a Bitcoin address in the customer's digital wallet to a Bitcoin address in the vendor's wallet. Transactions are conducted through anonymous, heavily encrypted hash codes across a peer-to-peer (P2P) network
What is Eucalyptus?

Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
The Eucalyptus cloud platform pools together existing virtualized infrastructure to create cloud resources for infrastructure as a service, network as a service and storage as a service. The name Eucalyptus is an acronym for Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems.
Eucalyptus was founded out of a research project in the Computer Science Department at the University of California, Santa Barbara, and became a for-profit business called Eucalyptus Systems in 2009. Eucalyptus Systems announced a formal agreement with AWS in March 2012 allowing administrators to move instances between a Eucalyptus private cloud and the Amazon Elastic Compute Cloud to create a hybrid cloud.
What is REST?

REST (REpresentational State Transfer) is a simple stateless architecture that generally runs over HTTP.
REST, which retrieves content from a Web site by reading a designated Web page that contains an XML file, is often used in mobile applications, social networking Web sites, mashup tools and automated business processes.
The REST style emphasizes that interactions between clients and services is enhanced by having a limited number of operations (verbs). Flexibility is provided by assigning resources (nouns) their own unique universal resource indicators (URIs). Because each verb has a specific meaning (GET, POST, PUT and DELETE), REST avoids ambiguity
What is incident response plan ?

An incident response plan is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident).
An incident response plan defines, in specific terms, what constitutes an incident and provides a step-by-step process that should be followed when an incident occurs. The goal of an incident response plan is to handle the incident in a way that limits damage and reduces recovery time and costs.
An organization's incident response plan is typically put together by the computer incident response team, a carefully selected group that, in addition to security and general IT staff, may include representatives from legal, human resources and public relations departments. Incident response plans may also be called incident management plans or emergency management plans
What is infonomics?

Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it. Simply put, infonomics is the economics of information.
Infonomics is based on the idea that information is an enterprise asset and should be counted and managed as such. Just as with economics, there are two main types of infonomics: micro and macro. Microinfonomics focuses on information related to private individuals or businesses. Macroinfornomics focuses on the information ecosystem as a whole.
What is virtual private cloud?

A virtual private cloud (VPC) is the logical division of a service provider's public cloud multi-tenant architecture to support private cloud computing in a public cloud environment.
Just as a virtual private network (VPN) provides secure data transfer over the public Internet, a VPC provides secure data transfer between a private enterprise and a public cloud provider, ensuring that each customer's data remains isolated from every other customer's data both in transit and inside the cloud provider's network.
This can be accomplished through the use of security policies requiring some -- or all -- of the following elements: encryption, tunneling, private IP addressing or allocating a unique VLAN to each customer
What is endpoint security management?

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoint devices can include PCs, laptops, smartphones and tablets.
Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Endpoints that do not comply with policy can be controlled by the system to varying degrees. For example, the system may remove local administrative rights or restrict Internet browsing capabilities
What is Snapchat?

Snapchat is a mobile app that allows users to send and receive "self-destructing" photos and videos. Photos and videos taken with the app are called Snaps.
Snapchat uses the device's camera to capture Snaps and Wi-fi technology to send them. The app allows the sender to draw or insert text on the Snap and determine how many seconds (1-10) the recipient can view it before the file disappears from the recipient's device. Messages can only be viewed once -- and during the viewing period, the recipient must maintain contact with the device's touchscreen or the Snap disappears.
What is Google BigTable?

Google BigTable is a distributed, column-oriented data store created by Google Inc. to handle very large amounts of structured data associated with the company's Internet search and Web services operations.
BigTable was designed to support applications requiring massive scalability; from its first iteration, the technology was intended to be used with petabytes of data. The database was designed to be deployed on clustered systems and uses a simple data model that Google has described as "a sparse, distributed, persistent multidimensional sorted map." Data is assembled in order by row key, and indexing of the map is arranged according to row, column keys and timestamps. Compression algorithms help achieve high capacity.
Google BigTable serves as the database for applications such as the Google App Engine Datastore, Google Personalized Search, Google Earth and Google Analytics.
DB2 - FIND THE NEXT LEAP YEAR using single SELECT statement?

Method1:
********
SELECT (YEAR (CURRENT_DATE) + 4)-(MOD (YEAR (CURRENT_DATE), 4))
FROM SYSIBM.SYSDUMMY1;

Method2:
********
SELECT
CASE MOD (YEAR (CURRENT DATE), 4)
WHEN 0 THEN YEAR CURRENT DATE) +4
WHEN 1 THEN YEAR (CURRENT DATE) +3
WHEN 2 THEN YEAR (CURRENT DATE) +2
WHEN 3 THEN YEAR (CURRENT DATE) +1
END
FROM SYSIBM.SYSDUMMY1;
Found this useful, bookmark this page to the blog or social networking websites. Page copy protected against web site content infringement by Copyscape

 Interview Questions and Answers Categories