Technical Comprehension

advertisement
Technical Comprehension
questionStat
ement
What does
Ksplice do?
passage
When a Linux kernel updates, a reboot
is required to apply the changes as you
have to boot with the new kernel
features. And in cases when the
system happens to be a server,
rebooting becomes painful as it
contributes to the downtime of the
system. Again when you have
customer SLAs where you have to stick
to 5 nines or 7 nines, this small little
upgrade can cause you face
tremendous pressure. At the same
time security updates or even for that
matter any kernel update is not
something you can afford to
ignore.</br>Ksplice converts the
updates into hot updates which are
prepared at object code level instead
of source code level, thus minimizing
programmer's involvement. Existing
practices of updating Kernel rely on
programmer writing a source code
files for changing certain properties or
require a manual inspection of running
binaries to ensure safety guarantees.
Ksplice, however, updates the legacy
binaries based on existing information
(a source code patch) and so it doesn't
require a system reboot.</br>Ksplice
replaces the whole function if any part
of the code in the function is to be
modified by applying patch. It links the
function to its newer replacement
code into the Kernel by placing a jump
instruction which redirects the path to
replacement code. Also ksplice while
applying an update the system
disrupts for 0.7 milliseconds; however
no network connections or any open
application is affected. A small amount
of memory is used in storing
replacement code. The software
verifies the safety of updates before
installing them. An alternative to
reduce downtime is Ksplice. To give it
a try, you can download the 30-day
trial version for your Linux distribution
(if you are using Ubuntu 9.04 or
Ubuntu 9.10, then a free version is
also available with graphical manager).
answer
A
Ksplice
does
away
with
the
need to
update
the
kernel
answerB
answerC
answer
D
Ksplice is
used to
change
the source
code of
the kernel
Ksplice
allows to
update the
kernel
without
rebooting
the system
Ksplice
replace
s the
kernel
with its
own
code
answ
erE
Technical Comprehension
Bing is a
________.
What does
the author
mean by the
term 'social
engineering'?
You will get an access key on
registering with Ksplice on your email
Id.</br>
Unethical tactics employed by
companies utilizing search engine
optimization (SEO) tactics such as link
farms and loading Web pages filled
with irrelevant keywords, are not
welcomed by search engine operators.
This declaration was issued by
Microsoft and Google.Asked if
organizations such as content farms
are outsmarting its system by flooding
the Web with low-quality content to
earn high-click rates, a Microsoft
spokesperson said the company
"prefers quality over quantity" to
manage its Bing search
engine."Backlinks, also known as
'inbound links', should be relevant to
the page being linked to, or relevant
to an SEO's domain if they are being
linked to the homepage," he told
ZDNet Asia in an e-mail interview. He
pointed out that backlinks from sites
considered to be authoritative in their
field are rated to be of higher value
than those from "junk sites".Bing does
prevent Web sites from appearing in
its search results if they use
techniques such as using hidden text
or links within their Web page or
create link farms to artificially increase
the number of links, the Microsoft
spokesman added. However, he did
not elaborate on how the checks were
implemented and executed.Google
adopts a similar stance. A Google
spokesman explained that a site's
ranking in its search results is
automatically determined by
computer algorithms that incorporate
hundreds of parameters. "Our
algorithms are effectively designed to
prevent people from manipulating the
rankings of competitors in our search
results," he added.
An exploit is a piece of software, a
chunk of data, or sequence of
commands that take advantage of a
bug, glitch or vulnerability in order to
cause unintended or unanticipated
New
search
engine
by
Google
Enginee
ring a
piece of
softwar
e which
New
search
engine by
Microsoft
A branch
of
engineerin
g which
prevents
Name of
the
algorithm
used for
SEO
Using
persuasive
methods to
get the user
to help
Name
of the
algorit
hm to
counte
ract
SEO
Spreadi
ng
exploit
s to
other
Technical Comprehension
behavior to occur on computer
software, hardware, or something
electronic (usually computerised). This
frequently includes such things as
violently gaining control of a computer
system or allowing privilege escalation
or a denial of service attack.There are
several methods of classifying exploits.
The most common is by how the
exploit contacts the vulnerable
software. A 'remote exploit' works
over a network and exploits the
security vulnerability without any prior
access to the vulnerable system. A
'local exploit' requires prior access to
the vulnerable system and usually
increases the privileges of the person
running the exploit past those granted
by the system administrator. Exploits
against client applications also exist,
usually consisting of modified servers
that send an exploit if accessed with
client application. Exploits against
client applications may also require
some interaction with the user and
thus may be used in combination with
social engineering method.Another
classification is by the action against
vulnerable system: unauthorized data
access, arbitrary code execution,
denial of service. Many exploits are
designed to provide superuser-level
access to a computer system.
However, it is also possible to use
several exploits, first to gain low-level
access, then to escalate privileges
repeatedly until one reaches
root.Normally a single exploit can only
take advantage of a specific software
vulnerability. Often, when an exploit is
published, the vulnerability is fixed
through a patch and the exploit
becomes obsolete for newer versions
of the software. This is the reason why
some blackhat hackers do not publish
their exploits but keep them private to
themselves or other crackers. Such
exploits are referred to as 'zero day
exploits' and to obtain access to such
exploits is the primary desire of
unskilled attackers, often nicknamed
script kiddies.
takes
advanta
ge of an
exploit
vulnerable
systems
from
getting
exploited
triggering
the exploit
compu
ters by
means
of the
user's
social
networ
k
Technical Comprehension
How does
unit testing
ensure
effectiveness
of delivered
software?
As a developer, testing is so important
that you should be doing it all of the
time. It should not be relegated to a
specific stage of the development
cycle. It definitely shouldn't be the last
thing done before giving your system
to a customer. How else are you going
to know when you're done? How else
are you going to know if your fix for a
minor bug broke a major function of
the system? How else will the system
be able evolve into something more
than is currently envisioned? Testing,
both unit and functional, needs to be
an integrated part of the development
process.Unit tests should become
central to how you write code,
especially if the project you are
working on has tight time constraints
and you'd like to keep it under control.
Unit tests are so important that you
should write your tests before you
write the code.Unit tests constitute
design documentation that evolves
naturally with a system. Read that
again. This is the Holy Grail of software
development, documentation that
evolves naturally with a system. What
better way to document a class than
to provide a coded set of use cases.
That's what these unit tests are: a set
of coded use cases that document
what a class does, given a controlled
set of inputs. As such, this design
document is always up-to-date
because the unit tests always have to
pass.You should write tests before you
write code. Doing so provides a design
for the class that the test will exercise,
allowing you to focus on small chunks
of code. This practice also keeps the
design simple. You aren't trying to
look into the future, implementing
unnecessary functionality. Writing
tests first additionally lets you know
when the class is complete. When all
the tests pass, the task is
complete.Lastly, unit tests provide you
with a high degree of confidence,
which translates into developer
satisfaction. If you run unit tests
whenever you make changes to code,
you'll find out immediately if your
One
carefull
y thinks
about
the
structur
e of
code
before
writing
it
One
writes
extensive
document
ation of
the
software
being
developed
One creates
a set of
inputs to
the
program
and
expected
outputs
It
cannot
be
inferre
d from
the
passag
e
Technical Comprehension
changes broke something.
How does a
webserver
accesses a
cookie?
Which of the
following is
NOT a part of
sixth sense?
In computing, a cookie (also tracking
cookie, browser cookie, and HTTP
cookie) is a small piece of text stored
on a user's computer by a web
browser. A cookie consists of one or
more name-value pairs containing bits
of information such as user
preferences, shopping cart contents,
the identifier for a server-based
session, or other data used by
websites.It is sent as an HTTP header
by a web server to a web browser and
then sent back unchanged by the
browser each time it accesses that
server. A cookie can be used for
authenticating, session tracking (state
maintenance), and remembering
specific information about users, such
as site preferences or the contents of
their electronic shopping carts. The
term "cookie" is derived from "magic
cookie", a well-known concept in UNIX
computing which inspired both the
idea and the name of browser cookies.
Some alternatives to cookies exist;
each has its own uses, advantages,
and drawbacks.Being simple pieces of
text, cookies are not executable. They
are neither spyware nor viruses,
although cookies from certain sites are
detected by many anti-spyware
products because they can allow users
to be tracked when they visit various
sites.Most modern browsers allow
users to decide whether to accept
cookies, and the time frame to keep
them, but rejecting cookies makes
some websites unusable. For example,
shopping carts or login systems
implemented using cookies do not
work if cookies are disabled.
Basically, Sixth Sense is a miniprojector coupled with a camera and a
cellphone-which acts as the computer
and your connection to the Cloud, all
the information stored on the web.
Sixth Sense can also obey hand
gestures, like in the infamous Minority
Report. However, instead of requiring
you to be in front of a big screen like
Tom Cruise, Sixth Sense can do its
The
server
itself
stores
the
cookie
Cookie
data is
sent to
the server
with each
page
request
A
screen
A
projector
The server
requests
the cookie
from the
browser
None
of the
above
A camera
A
cellpho
ne
Technical Comprehension
magic-and a lot more-everywhere,
even while you are jumping hysteric
over Oprah's sofa.The camera
recognizes objects around you
instantly, with the micro-projector
overlaying the information on any
surface, including the object itself or
your hand. Then, you can access or
manipulate the information using your
fingers. Need to make a call? Extend
your hand on front of the projector
and numbers will appear for you to
click. Need to know the time? Draw a
circle on your wrist and a watch will
appear. Want to take a photo? Just
make a square with your fingers,
highlighting what you want to frame,
and the system will make the photowhich you can later organize with the
others using your own hands over the
air.But those are just novelty
applications. The true power of Sixth
Sense lies on its potential to connect
the real world with the Internet, and
overlaying the information on the
world itself. Imagine you are at the
supermarket, thinking about what
brand of soap is better. Or maybe
what wine you should get for tonight's
dinner. Just look at objects, hold them
on your hands, and Sixth Sense will
show you if it's good or bad, or if it fits
your preferences or not.Now take this
to every aspect of your everyday life.
You can be in a taxi going to the
airport, and just by taking out your
boarding pass, Sixth Sense will grab
real time information about your flight
and display it over the ticket. You
won't need to do any action. Just hold
it in front of your and it will work. The
key here is that Sixth Sense recognizes
the objects around you, displaying
information automatically and letting
you access it in any way you want, in
the simplest way possible.Clearly, this
has the potential of becoming the
ultimate "transparent" user interface
for accessing information about
everything around us. If they can get
rid of the colored finger caps and it
ever goes beyond the initial
development phase, that is. But as it is
Technical Comprehension
What is the
use of
annotations
in 'Simple'?
now, it may change the way we
interact with the real world and truly
give everyone complete awareness of
the environment around us.
Simple is a Java framework used to
simplify the process of serializing and
deserializing Extensible Markup
Language(XML) objects. Using Simple,
developers can simplify (hence the
name) the process of translating plain
old Java objects (POJOs) into XML
documents-a process known as
serialization. Simple also facilitates the
reverse: Developers can translate XML
documents into POJOs-a process
known as deserialization.Simple lives
up to its by name using annotations to
enable the serialization or
deserialization process. POJOs are
annotated according to how the
corresponding XML document should
appear. Some fields are annotated as
attributes. Other fields are annotated
as elements. The class is usually
annotated as the root element. The
framework handles the tedious
process of interpreting the
annotations and producing a
corresponding XML document during
the serialization process. Not
surprisingly, the annotations are also
interpreted during the deserialization
process when an XML document is
translated into a POJO.The use of
Simple has several advantages. First, it
facilitates rapid application
development. Because Simple is so
simple, it enables developers to
quickly implement robust applications
that use XML serialization and
deserialization without committing to
an excessive learning curve or
development overhead. Next, Simple
requires no configuration. As
mentioned previously, Simple uses
annotations. These annotations are in
lieu of the XML-based configuration
files that typically accompany
frameworks of this nature.Finally,
Simple adds only minimally to the
footprint of applications that use it.
The Java Archive (JAR) file is only 239
kilobytes. Simple is also not
To
annotat
e the
XML
objects
To convert
the root
classes
into root
elements
It reduces
the
overhead to
configure
'Simple'
None
of the
above
Technical Comprehension
Which field
of study is
used to study
models and
theories of
brain?
dependent upon a series of other JAR
files, as is frequently the case with
competing frameworks.
In general a biological neural network
is composed of a group or groups of
chemically connected or functionally
associated neurons. A single neuron
may be connected to many other
neurons and the total number of
neurons and connections in a network
may be extensive. Connections, called
synapses, are usually formed from
axons to dendrites, though
dendrodendritic microcircuits and
other connections are possible. Apart
from the electrical signaling, there are
other forms of signaling that arise
from neurotransmitter diffusion,
which have an effect on electrical
signaling. As such, neural networks are
extremely complex.Artificial
intelligence and cognitive modeling try
to simulate some properties of neural
networks. While similar in their
techniques, the former has the aim of
solving particular tasks, while the
latter aims to build mathematical
models of biological neural systems.In
the artificial intelligence field, artificial
neural networks have been applied
successfully to speech recognition,
image analysis and adaptive control, in
order to construct software agents (in
computer and video games) or
autonomous robots. Most of the
currently employed artificial neural
networks for artificial intelligence are
based on statistical estimation,
optimization and control theory.The
cognitive modelling field involves the
physical or mathematical modeling of
the behaviour of neural systems;
ranging from the individual neural
level (e.g. modelling the spike
response curves of neurons to a
stimulus), through the neural cluster
level (e.g. modelling the release and
effects of dopamine in the basal
ganglia) to the complete organism
(e.g. behavioural modelling of the
organism's response to stimuli).
Artificial intelligence, cognitive
modelling, and neural networks are
Cognitiv
e
modelin
g
Artificial
Neural
Networks
Neurotrans
mitter
Diffusion
Electric
al
Signali
ng
Technical Comprehension
information processing paradigms
inspired by the way biological neural
systems process data.
Download