The Crash Course in Communication
Talking is very easy, but communication, that means an exchange or communion with the other person, requires the greater skill. An exchange which is the communion demands on the way we listen and do speak skillfully, and just not talk mindlessly. Interacting with the fearful, angry, or the frustrated people will be even more difficult, because we are less skillful when we are caught up in such kind of emotions. Do not despair or resign yourself to the lifetime of miscommunication at the work or at home! Good communicators can honed as well as born.
Here are few of the tips to get you started.
This will remind us how difficult it is to communicate effectively in any of the organization. The problem is not that we have got the bad people, the problem is that we have got the poor systems. This guide will teach how to overcome the communication barriers and also hone the communication skills.
The Communication is the skill and like any other skills it also requires the practice. It is improved through practice which differentiates the skill from other forms of the knowledge. Understanding a theory of the communication and the effective presentation will not make you brilliant communicator or the presenter but should make you aware of how to maximize a impact of the presentations.
Most important thing to remember is a message which you intend to communicate is most likely to be misunderstood by the listeners. Therefore, in addition to the carefully preparing and presenting the message, stay alert for any of the signs which your audience are mis-interpreting it. It is up to you, a presenter, to continually check if your message have been received, understood, interpreted correctly and is filed in the receivers mind.
Next >> Effective Communication Skills
Saturday, July 26, 2008
Friday, July 18, 2008
JAVA Interview Questions Answers - Vol 1
1) What if the main method is declared as private?
The program compiles properly but at runtime it will give "Main method not public." message.
2) What is meant by pass by reference and pass by value in Java?
Pass by reference means, passing the address itself rather than passing the value. Pass by value means passing a copy of the value.
3) If you’re overriding the method equals() of an object, which other method you might also consider?hashCode().
4) What is Byte Code? Or What gives java it’s “write once and run anywhere” nature?All Java programs are compiled into class files that contain bytecodes. These byte codes can be run in any platform and hence java is said to be platform independent.
5) Expain the reason for each keyword of public static void main(String args[])?
public- main(..) is the first method called by java environment when a program is executed so it has to accessible from java environment. Hence the access specifier has to be public. static: Java environment should be able to call this method without creating an instance of the class , so this method must be declared as static. void: main does not return anything so the return type must be void The argument String indicates the argument type which is given at the command line and arg is an array for string given during command line.
6) What if the static modifier is removed from the signature of the main method? OrWhat if I do not provide the String array as the argument to the method?Program compiles. But at runtime throws an error "NoSuchMethodError".
7) Why oracle Type 4 driver is named as oracle thin driver?Oracle provides a Type 4 JDBC driver, referred to as the Oracle “thin” driver. This driver includes its own implementation of a TCP/IP version of Oracle’s Net8 written entirely in Java, so it is platform independent, can be downloaded to a browser at runtime, and does not require any Oracle software on the client side. This driver requires a TCP/IP listener on the server side, and the client connection string uses the TCP/IP port address, not the TNSNAMES entry for the database name.
8) What is the difference between final, finally and finalize?
What do you understand by the java final keyword? OrWhat is final, finalize() and finally? OrWhat is finalize() method? OrWhat is the difference between final, finally and finalize? OrWhat does it mean that a class or member is final?o final - declare constanto finally - handles exceptiono finalize - helps in garbage collectionVariables defined in an interface are implicitly final. A final class can't be extended i.e., final class may not be subclassed. This is done for security reasons with basic classes like String and Integer. It also allows the compiler to make some optimizations, and makes thread safety a little easier to achieve. A final method can't be overridden when its class is inherited. You can't change value of a final variable (is a constant). finalize() method is used just before an object is destroyed and garbage collected. finally, a key word used in exception handling and will be executed whether or not an exception is thrown. For example, closing of open connections is done in the finally method.
9) What is the Java API?
The Java API is a large collection of ready-made software components that provide many useful capabilities, such as graphical user interface (GUI) widgets.
10) What is the GregorianCalendar class?
The GregorianCalendar provides support for traditional Western calendars.
11) What is the ResourceBundle class?
The ResourceBundle class is used to store locale-specific resources that can be loaded by a program to tailor the program's appearance to the particular locale in which it is being run.
12) Why there are no global variables in Java?Global variables are globally accessible. Java does not support globally accessible variables due to following reasons: * The global variables breaks the referential transparency * Global variables creates collisions in namespace.
13) How to convert String to Number in java program?
The valueOf() function of Integer class is is used to convert string to Number.Here is the code example:String numString = "1000";int id=Integer.valueOf(numString).intValue();
14) What is the SimpleTimeZone class?
The SimpleTimeZone class provides support for a Gregorian calendar.
16) What is the difference between a while statement and a do statement?
A while statement (pre test) checks at the beginning of a loop to see whether the next loop iteration should occur.A do while statement (post test) checks at the end of a loop to see whether the next iteration of a loop should occur. The do statement will always execute the loop body at least once.
The program compiles properly but at runtime it will give "Main method not public." message.
2) What is meant by pass by reference and pass by value in Java?
Pass by reference means, passing the address itself rather than passing the value. Pass by value means passing a copy of the value.
3) If you’re overriding the method equals() of an object, which other method you might also consider?hashCode().
4) What is Byte Code? Or What gives java it’s “write once and run anywhere” nature?All Java programs are compiled into class files that contain bytecodes. These byte codes can be run in any platform and hence java is said to be platform independent.
5) Expain the reason for each keyword of public static void main(String args[])?
public- main(..) is the first method called by java environment when a program is executed so it has to accessible from java environment. Hence the access specifier has to be public. static: Java environment should be able to call this method without creating an instance of the class , so this method must be declared as static. void: main does not return anything so the return type must be void The argument String indicates the argument type which is given at the command line and arg is an array for string given during command line.
6) What if the static modifier is removed from the signature of the main method? OrWhat if I do not provide the String array as the argument to the method?Program compiles. But at runtime throws an error "NoSuchMethodError".
7) Why oracle Type 4 driver is named as oracle thin driver?Oracle provides a Type 4 JDBC driver, referred to as the Oracle “thin” driver. This driver includes its own implementation of a TCP/IP version of Oracle’s Net8 written entirely in Java, so it is platform independent, can be downloaded to a browser at runtime, and does not require any Oracle software on the client side. This driver requires a TCP/IP listener on the server side, and the client connection string uses the TCP/IP port address, not the TNSNAMES entry for the database name.
8) What is the difference between final, finally and finalize?
What do you understand by the java final keyword? OrWhat is final, finalize() and finally? OrWhat is finalize() method? OrWhat is the difference between final, finally and finalize? OrWhat does it mean that a class or member is final?o final - declare constanto finally - handles exceptiono finalize - helps in garbage collectionVariables defined in an interface are implicitly final. A final class can't be extended i.e., final class may not be subclassed. This is done for security reasons with basic classes like String and Integer. It also allows the compiler to make some optimizations, and makes thread safety a little easier to achieve. A final method can't be overridden when its class is inherited. You can't change value of a final variable (is a constant). finalize() method is used just before an object is destroyed and garbage collected. finally, a key word used in exception handling and will be executed whether or not an exception is thrown. For example, closing of open connections is done in the finally method.
9) What is the Java API?
The Java API is a large collection of ready-made software components that provide many useful capabilities, such as graphical user interface (GUI) widgets.
10) What is the GregorianCalendar class?
The GregorianCalendar provides support for traditional Western calendars.
11) What is the ResourceBundle class?
The ResourceBundle class is used to store locale-specific resources that can be loaded by a program to tailor the program's appearance to the particular locale in which it is being run.
12) Why there are no global variables in Java?Global variables are globally accessible. Java does not support globally accessible variables due to following reasons: * The global variables breaks the referential transparency * Global variables creates collisions in namespace.
13) How to convert String to Number in java program?
The valueOf() function of Integer class is is used to convert string to Number.Here is the code example:String numString = "1000";int id=Integer.valueOf(numString).intValue();
14) What is the SimpleTimeZone class?
The SimpleTimeZone class provides support for a Gregorian calendar.
16) What is the difference between a while statement and a do statement?
A while statement (pre test) checks at the beginning of a loop to see whether the next loop iteration should occur.A do while statement (post test) checks at the end of a loop to see whether the next iteration of a loop should occur. The do statement will always execute the loop body at least once.
SQL Interview Questions Answers - Vol 1
1. What is SQL?
A:SQL stands for 'Structured Query Language'.
2. What is SELECT statement?
A:The SELECT statement lets you select a set of values from a table in a database. The values selected from the database table would depend on the various conditions that are specified in the SQL query.
3. How can you compare a part of the name rather than the entire name?
A:SELECT * FROM people WHERE empname LIKE '%ab%'Would return a recordset with records consisting empname the sequence 'ab' in empname .
4. What is the INSERT statement?
A:The INSERT statement lets you insert information into a database.
5. How do you delete a record from a database?
A:Use the DELETE statement to remove records or any particular column values from a
database.
6. How could I get distinct entries from a table?
A:The SELECT statement in conjunction with DISTINCT lets you select a set of distinct values from a table in a database. The values selected from the database table would of course depend on the various conditions that are specified in the SQL query. ExampleSELECT DISTINCT empname FROM emptable
7. How to get the results of a Query sorted in any order?
A:You can sort the results and return the sorted results to your program by using ORDER BY keyword thus saving you the pain of carrying out the sorting yourself. The ORDER BY keyword is used for sorting.SELECT empname, age, city FROM emptable ORDER BY empname.
8. How can I find the total number of records in a table?
A:You could use the COUNT keyword , exampleSELECT COUNT(*) FROM emp WHERE age>40
9. What is GROUP BY?
A:The GROUP BY keywords have been added to SQL because aggregate functions (like SUM) return the aggregate of all column values every time they are called. Without the GROUP BY functionality, finding the sum for each individual group of column values was not possible.
10. What is the difference among "dropping a table", "truncating a table" and "deleting all records" from a table.
A:Dropping : (Table structure + Data are deleted), Invalidates the dependent objects ,Drops the indexesTruncating: (Data alone deleted), Performs an automatic commit, Faster than deleteDelete : (Data alone deleted), Doesn’t perform automatic commit
11. What are the Large object types suported by Oracle?
A:Blob and Clob.
12. Difference between a "where" clause and a "having" clause.
A:Having clause is used only with group functions whereas Where is not used with.
13. What's the difference between a primary key and a unique key?
A:Both primary key and unique enforce uniqueness of the column on which they are defined. But by default primary key creates a clustered index on the column, where are unique creates a nonclustered index by default. Another major difference is that, primary key doesn't allow NULLs, but unique key allows one NULL only.
14. What are cursors? Explain different types of cursors. What are the disadvantages of cursors? How can you avoid cursors?
A:Cursors allow row-by-row prcessing of the resultsets.Types of cursors: Static, Dynamic, Forward-only, Keyset-driven. See books online for more information.Disadvantages of cursors: Each time you fetch a row from the cursor, it results in a network roundtrip, where as a normal SELECT query makes only one rowundtrip, however large the resultset is. Cursors are also costly because they require more resources and temporary storage (results in more IO operations). Furthere, there are restrictions on the SELECT statements that can be used with some types of cursors.Most of the times, set based operations can be used instead of cursors.
15. What are triggers? How to invoke a trigger on demand?
A:Triggers are special kind of stored procedures that get executed automatically when an INSERT, UPDATE or DELETE operation takes place on a table.Triggers can't be invoked on demand. They get triggered only when an associated action (INSERT, UPDATE, DELETE) happens on the table on which they are defined.Triggers are generally used to implement business rules, auditing. Triggers can also be used to extend the referential integrity checks, but wherever possible, use constraints for this purpose, instead of triggers, as constraints are much faster.
16. What is a join and explain different types of joins.
A:Joins are used in queries to explain how different tables are related. Joins also let you select data from a table depending upon data from another table.Types of joins: INNER JOINs, OUTER JOINs, CROSS JOINs. OUTER JOINs are further classified as LEFT OUTER JOINS, RIGHT OUTER JOINS and FULL OUTER JOINS.
17. How would you find out the total number of rows in a table?
A:Use SELECT COUNT(*) ... in query.
18. How do you eliminate duplicate values in SELECT ?
A:Use SELECT DISTINCT ... in SQL query.
19. How you insert records into a table
A:Using SQL INSERT statement.
20. How do you delete record from a table ?
A:Using DELETE statementExample : DELETE FROM EMP
21. How do you select a row using indexes?
A:Specify the indexed columns in the WHERE clause of query.
22. How do you find the maximum value in a column?
A:Use SELECT MAX(...) .. in query.
23. How do you retrieve the first 5 characters of FIRSTNAME column of table EMP ?
A:SELECT SUBSTR(FIRSTNAME,1,5) FROM EMP.
24. My SQL statement SELECT AVG(SALARY) FROM EMP yields inaccurate results. Why?A:Because SALARY is not declared to have NULLs and the employees for whom thesalary is not known are also counted.
25. How do you concatenate the FIRSTNAME and LASTNAME from EMP table to give a complete name?A:SELECT FIRSTNAME ‘ ‘ LASTNAME FROM EMP
A:SQL stands for 'Structured Query Language'.
2. What is SELECT statement?
A:The SELECT statement lets you select a set of values from a table in a database. The values selected from the database table would depend on the various conditions that are specified in the SQL query.
3. How can you compare a part of the name rather than the entire name?
A:SELECT * FROM people WHERE empname LIKE '%ab%'Would return a recordset with records consisting empname the sequence 'ab' in empname .
4. What is the INSERT statement?
A:The INSERT statement lets you insert information into a database.
5. How do you delete a record from a database?
A:Use the DELETE statement to remove records or any particular column values from a
database.
6. How could I get distinct entries from a table?
A:The SELECT statement in conjunction with DISTINCT lets you select a set of distinct values from a table in a database. The values selected from the database table would of course depend on the various conditions that are specified in the SQL query. ExampleSELECT DISTINCT empname FROM emptable
7. How to get the results of a Query sorted in any order?
A:You can sort the results and return the sorted results to your program by using ORDER BY keyword thus saving you the pain of carrying out the sorting yourself. The ORDER BY keyword is used for sorting.SELECT empname, age, city FROM emptable ORDER BY empname.
8. How can I find the total number of records in a table?
A:You could use the COUNT keyword , exampleSELECT COUNT(*) FROM emp WHERE age>40
9. What is GROUP BY?
A:The GROUP BY keywords have been added to SQL because aggregate functions (like SUM) return the aggregate of all column values every time they are called. Without the GROUP BY functionality, finding the sum for each individual group of column values was not possible.
10. What is the difference among "dropping a table", "truncating a table" and "deleting all records" from a table.
A:Dropping : (Table structure + Data are deleted), Invalidates the dependent objects ,Drops the indexesTruncating: (Data alone deleted), Performs an automatic commit, Faster than deleteDelete : (Data alone deleted), Doesn’t perform automatic commit
11. What are the Large object types suported by Oracle?
A:Blob and Clob.
12. Difference between a "where" clause and a "having" clause.
A:Having clause is used only with group functions whereas Where is not used with.
13. What's the difference between a primary key and a unique key?
A:Both primary key and unique enforce uniqueness of the column on which they are defined. But by default primary key creates a clustered index on the column, where are unique creates a nonclustered index by default. Another major difference is that, primary key doesn't allow NULLs, but unique key allows one NULL only.
14. What are cursors? Explain different types of cursors. What are the disadvantages of cursors? How can you avoid cursors?
A:Cursors allow row-by-row prcessing of the resultsets.Types of cursors: Static, Dynamic, Forward-only, Keyset-driven. See books online for more information.Disadvantages of cursors: Each time you fetch a row from the cursor, it results in a network roundtrip, where as a normal SELECT query makes only one rowundtrip, however large the resultset is. Cursors are also costly because they require more resources and temporary storage (results in more IO operations). Furthere, there are restrictions on the SELECT statements that can be used with some types of cursors.Most of the times, set based operations can be used instead of cursors.
15. What are triggers? How to invoke a trigger on demand?
A:Triggers are special kind of stored procedures that get executed automatically when an INSERT, UPDATE or DELETE operation takes place on a table.Triggers can't be invoked on demand. They get triggered only when an associated action (INSERT, UPDATE, DELETE) happens on the table on which they are defined.Triggers are generally used to implement business rules, auditing. Triggers can also be used to extend the referential integrity checks, but wherever possible, use constraints for this purpose, instead of triggers, as constraints are much faster.
16. What is a join and explain different types of joins.
A:Joins are used in queries to explain how different tables are related. Joins also let you select data from a table depending upon data from another table.Types of joins: INNER JOINs, OUTER JOINs, CROSS JOINs. OUTER JOINs are further classified as LEFT OUTER JOINS, RIGHT OUTER JOINS and FULL OUTER JOINS.
17. How would you find out the total number of rows in a table?
A:Use SELECT COUNT(*) ... in query.
18. How do you eliminate duplicate values in SELECT ?
A:Use SELECT DISTINCT ... in SQL query.
19. How you insert records into a table
A:Using SQL INSERT statement.
20. How do you delete record from a table ?
A:Using DELETE statementExample : DELETE FROM EMP
21. How do you select a row using indexes?
A:Specify the indexed columns in the WHERE clause of query.
22. How do you find the maximum value in a column?
A:Use SELECT MAX(...) .. in query.
23. How do you retrieve the first 5 characters of FIRSTNAME column of table EMP ?
A:SELECT SUBSTR(FIRSTNAME,1,5) FROM EMP.
24. My SQL statement SELECT AVG(SALARY) FROM EMP yields inaccurate results. Why?A:Because SALARY is not declared to have NULLs and the employees for whom thesalary is not known are also counted.
25. How do you concatenate the FIRSTNAME and LASTNAME from EMP table to give a complete name?A:SELECT FIRSTNAME ‘ ‘ LASTNAME FROM EMP
How to identify cities in India?
Scenario 1
Two guys are fighting and a third guy comes along, then a fourth and they start arguing about who's right. You are in Kolkata.
Scenario 2
Two guys are fighting and a third guy comes along, sees them and walks on. That's Mumbai.
Scenario 3
Two guys are fighting and a third guy comes along & tries to make peace. The first two get together & beat him up. That's Delhi.
Scenario 4
Two guys are fighting. A crowd gathers to watch. A guy comes along and quietly opens a chai-stall. That's Ahmadabad.
Scenario 5
Two guys are fighting and a third guy comes he writes a software program to stop the fight.But the fight doesn't stop b'cos of a bug in the program. That's Bangalore.
Scenario 6
Two guys are fighting. A crowd gathers to watch. A guy comes and quietly says that "ANNA" doesn't like all this nonsense. Peace comes in. That's Chennai.
Scenario 7
Two guys are fighting. Both of them take time out and call their friends on mobile. Now 50 guys are fighting. You are DEFINITELY IN PUNJAB ( Balle Balle )
Scenario 8
Two guyz are fighting, third one comes and stabs one of them, the two run away, that's Varanasi
Scenario 9
Two guys are fighting on the road and a speeding qualis kills them - you are in gurgaon
Two guys are fighting and a third guy comes along, then a fourth and they start arguing about who's right. You are in Kolkata.
Scenario 2
Two guys are fighting and a third guy comes along, sees them and walks on. That's Mumbai.
Scenario 3
Two guys are fighting and a third guy comes along & tries to make peace. The first two get together & beat him up. That's Delhi.
Scenario 4
Two guys are fighting. A crowd gathers to watch. A guy comes along and quietly opens a chai-stall. That's Ahmadabad.
Scenario 5
Two guys are fighting and a third guy comes he writes a software program to stop the fight.But the fight doesn't stop b'cos of a bug in the program. That's Bangalore.
Scenario 6
Two guys are fighting. A crowd gathers to watch. A guy comes and quietly says that "ANNA" doesn't like all this nonsense. Peace comes in. That's Chennai.
Scenario 7
Two guys are fighting. Both of them take time out and call their friends on mobile. Now 50 guys are fighting. You are DEFINITELY IN PUNJAB ( Balle Balle )
Scenario 8
Two guyz are fighting, third one comes and stabs one of them, the two run away, that's Varanasi
Scenario 9
Two guys are fighting on the road and a speeding qualis kills them - you are in gurgaon
Locker Room.....funnyyyyy
Several men are in the locker room of a golf club.
A cell phone on a bench rings and a man engages the hands free speaker-function and
begins to talk.
Everyone else in the room start listening him.
MAN: "Hello.
"WOMAN: "Honey, it's me.
Are you at the club?
"MAN: "Yes.
"WOMAN:
"I am at the mall now and found this beautiful leather coat.
It's only $1,000. Is it OK if I buy it?
"MAN: "Sure, go ahxead if you like it that much.
"WOMAN: "I also stopped by the Mercedes dealership and saw the new 2005 models. I saw one I really liked.
"MAN: "How much?
"WOMAN: "$90,000.
"MAN: "OK, but for that price, I want it with all the options.
"WOMAN: "Great! Oh, and one more thing .....the house I wanted last year is back on the market. They're asking $950,000.
"MAN: "Well, then go ahead and give them an offer of $900,000. They will probably take it. If not, we can go the extra 50 thousand. It is really a pretty good price.
"WOMAN: "OK. I'll see you later! I love you so much!!
"MAN: "Bye! I love you, too."
The man hangs up.
The other men in the locker room are staring at him in astonishment, mouths agape.....
Then he smiles and asks:
"Anyone know who this phone belongs to?"
A cell phone on a bench rings and a man engages the hands free speaker-function and
begins to talk.
Everyone else in the room start listening him.
MAN: "Hello.
"WOMAN: "Honey, it's me.
Are you at the club?
"MAN: "Yes.
"WOMAN:
"I am at the mall now and found this beautiful leather coat.
It's only $1,000. Is it OK if I buy it?
"MAN: "Sure, go ahxead if you like it that much.
"WOMAN: "I also stopped by the Mercedes dealership and saw the new 2005 models. I saw one I really liked.
"MAN: "How much?
"WOMAN: "$90,000.
"MAN: "OK, but for that price, I want it with all the options.
"WOMAN: "Great! Oh, and one more thing .....the house I wanted last year is back on the market. They're asking $950,000.
"MAN: "Well, then go ahead and give them an offer of $900,000. They will probably take it. If not, we can go the extra 50 thousand. It is really a pretty good price.
"WOMAN: "OK. I'll see you later! I love you so much!!
"MAN: "Bye! I love you, too."
The man hangs up.
The other men in the locker room are staring at him in astonishment, mouths agape.....
Then he smiles and asks:
"Anyone know who this phone belongs to?"
Unix Interview Questions Answers - Vol 1
1. How are devices represented in UNIX?
All devices are represented by files called special files that are located in/dev directory. Thus, device files and other files are named and accessed in the same way. A 'regular file' is just an ordinary data file in the disk. A 'block special file' represents a device with characteristics similar to a disk (data transfer in terms of blocks). A 'character special file' represents a device with characteristics similar to a keyboard (data transfer is by stream of bits in sequential order).
2. What is 'inode'?
All UNIX files have its description stored in a structure called 'inode'. The inode contains info about the file-size, its location, time of last access, time of last modification, permission and so on. Directories are also represented as files and have an associated inode. In addition to descriptions about the file, the inode contains pointers to the data blocks of the file. If the file is large, inode has indirect pointer to a block of pointers to additional data blocks (this further aggregates for larger files). A block is typically 8k.
Inode consists of the following fields:
Ø File owner identifier
Ø File type
Ø File access permissions
Ø File access times
Ø Number of links
Ø File size
Ø Location of the file data
3. Brief about the directory representation in UNIX
A Unix directory is a file containing a correspondence between filenames and inodes. A directory is a special file that the kernel maintains. Only kernel modifies directories, but processes can read directories. The contents of a directory are a list of filename and inode number pairs. When new directories are created, kernel makes two entries named '.' (refers to the directory itself) and '..' (refers to parent directory).
System call for creating directory is mkdir (pathname, mode).
4. What are the Unix system calls for I/O?
Ø open(pathname,flag,mode) - open file
Ø creat(pathname,mode) - create file
Ø close(filedes) - close an open file
Ø read(filedes,buffer,bytes) - read data from an open file
Ø write(filedes,buffer,bytes) - write data to an open file
Ø lseek(filedes,offset,from) - position an open file
Ø dup(filedes) - duplicate an existing file descriptor
Ø dup2(oldfd,newfd) - duplicate to a desired file descriptor
Ø fcntl(filedes,cmd,arg) - change properties of an open file
Ø ioctl(filedes,request,arg) - change the behaviour of an open file
The difference between fcntl anf ioctl is that the former is intended
for any open file, while the latter is for device-specific operations.
5. How do you change File Access Permissions?
Every file has following attributes:
Ø owner's user ID ( 16 bit integer )
Ø owner's group ID ( 16 bit integer )
Ø File access mode word
'r w x -r w x- r w x'
(user permission-group permission-others permission)
r-read, w-write, x-execute
To change the access mode, we use chmod(filename,mode).
Example 1:
To change mode of myfile to 'rw-rw-r--' (ie. read, write permission for user - read,write permission for group - only read permission for others) we give the args as:
chmod(myfile,0664) .
Each operation is represented by discrete values
'r' is 4
'w' is 2
'x' is 1
Therefore, for 'rw' the value is 6(4+2).
Example 2:
To change mode of myfile to 'rwxr--r--' we give the args as:chmod(myfile,0744).
6. What are links and symbolic links in UNIX file system?
A link is a second name (not a file) for a file. Links can be used to assign more than one name to a file, but cannot be used to assign a directory more than one name or link filenames on different computers.
Symbolic link 'is' a file that only contains the name of another file.Operation on the symbolic link is directed to the file pointed by the it.Both the limitations of links are eliminated in symbolic links.Commands for linking files are:Link ln filename1 filename2Symbolic link ln -s filename1 filename2
7. What is a FIFO?
FIFO are otherwise called as 'named pipes'. FIFO (first-in-first-out) is a special file which is said to be data transient. Once data is read from named pipe, it cannot be read again. Also, data can be read only in the order written. It is used in interprocess communication where a process writes to one end of the pipe (producer) and the other reads from the other end (consumer).
8. How do you create special files like named pipes and device files?
The system call mknod creates special files in the following sequence.
1. kernel assigns new inode,
2. sets the file type to indicate that the file is a pipe, directory or special file,
3. If it is a device file, it makes the other entries like major, minor device numbers.
For example:If the device is a disk, major device number refers to the disk controller and minor device number is the disk.
9. Discuss the mount and unmount system calls
The privileged mount system call is used to attach a file system to a directory of another file system; the unmount system call detaches a file system. When you mount another file system on to your directory, you are essentially splicing one directory tree onto a branch in another directory tree. The first argument to mount call is the mount point, that is , a directory in the current file naming system. The second argument is the file system to mount to that point. When you insert a cdrom to your unix system's drive, the file system in the cdrom automatically mounts to /dev/cdrom in your system.
10. How does the inode map to data block of a file?
Inode has 13 block addresses. The first 10 are direct block addresses of the first 10 data blocks in the file. The 11th address points to a one-level index block. The 12th address points to a two-level (double in-direction) index block. The 13th address points to a three-level(triple in-direction)index block. This provides a very large maximum file size with efficient access to large files, but also small files are accessed directly in one disk read.
11. What is a shell?
A shell is an interactive user interface to an operating system services that allows an user to enter commands as character strings or through a graphical user interface. The shell converts them to system calls to the OS or forks off a process to execute the command. System call results and other information from the OS are presented to the user through an interactive interface. Commonly used shells are sh,csh,ks etc.
12. Brief about the initial process sequence while the system boots up.
While booting, special process called the 'swapper' or 'scheduler' is created with Process-ID 0. The swapper manages memory allocation for processes and influences CPU allocation. The swapper inturn creates 3 children:
Ø the process dispatcher,
Ø vhand and
Ø dbflushwith IDs 1,2 and 3 respectively.
This is done by executing the file /etc/init. Process dispatcher gives birth to the shell. Unix keeps track of all the processes in an internal data structure called the Process Table (listing command is ps -el).
13. What are various IDs associated with a process?
Unix identifies each process with a unique integer called ProcessID. The process that executes the request for creation of a process is called the 'parent process' whose PID is 'Parent Process ID'. Every process is associated with a particular user called the 'owner' who has privileges over the process. The identification for the user is 'UserID'. Owner is the user who executes the process. Process also has 'Effective User ID' which determines the access privileges for accessing resources like files.
getpid() -process id
getppid() -parent process id
getuid() -user id
geteuid() -effective user id
14. What is 'ps' command for?
The ps command prints the process status for some or all of the running processes. The information given are the process identification number (PID),the amount of time that the process has taken to execute so far etc.
15. What Happens when you execute a command?
When you enter 'ls' command to look at the contents of your current working directory, UNIX does a series of things to create an environment for ls and the run it: The shell has UNIX perform a fork. This creates a new process that the shell will use to run the ls program. The shell has UNIX perform an exec of the ls program. This replaces the shell program and data with the program and data for ls and then starts running that new program. The ls program is loaded into the new process context, replacing the text and data of the shell. The ls program performs its task, listing the contents of the current directory.
All devices are represented by files called special files that are located in/dev directory. Thus, device files and other files are named and accessed in the same way. A 'regular file' is just an ordinary data file in the disk. A 'block special file' represents a device with characteristics similar to a disk (data transfer in terms of blocks). A 'character special file' represents a device with characteristics similar to a keyboard (data transfer is by stream of bits in sequential order).
2. What is 'inode'?
All UNIX files have its description stored in a structure called 'inode'. The inode contains info about the file-size, its location, time of last access, time of last modification, permission and so on. Directories are also represented as files and have an associated inode. In addition to descriptions about the file, the inode contains pointers to the data blocks of the file. If the file is large, inode has indirect pointer to a block of pointers to additional data blocks (this further aggregates for larger files). A block is typically 8k.
Inode consists of the following fields:
Ø File owner identifier
Ø File type
Ø File access permissions
Ø File access times
Ø Number of links
Ø File size
Ø Location of the file data
3. Brief about the directory representation in UNIX
A Unix directory is a file containing a correspondence between filenames and inodes. A directory is a special file that the kernel maintains. Only kernel modifies directories, but processes can read directories. The contents of a directory are a list of filename and inode number pairs. When new directories are created, kernel makes two entries named '.' (refers to the directory itself) and '..' (refers to parent directory).
System call for creating directory is mkdir (pathname, mode).
4. What are the Unix system calls for I/O?
Ø open(pathname,flag,mode) - open file
Ø creat(pathname,mode) - create file
Ø close(filedes) - close an open file
Ø read(filedes,buffer,bytes) - read data from an open file
Ø write(filedes,buffer,bytes) - write data to an open file
Ø lseek(filedes,offset,from) - position an open file
Ø dup(filedes) - duplicate an existing file descriptor
Ø dup2(oldfd,newfd) - duplicate to a desired file descriptor
Ø fcntl(filedes,cmd,arg) - change properties of an open file
Ø ioctl(filedes,request,arg) - change the behaviour of an open file
The difference between fcntl anf ioctl is that the former is intended
for any open file, while the latter is for device-specific operations.
5. How do you change File Access Permissions?
Every file has following attributes:
Ø owner's user ID ( 16 bit integer )
Ø owner's group ID ( 16 bit integer )
Ø File access mode word
'r w x -r w x- r w x'
(user permission-group permission-others permission)
r-read, w-write, x-execute
To change the access mode, we use chmod(filename,mode).
Example 1:
To change mode of myfile to 'rw-rw-r--' (ie. read, write permission for user - read,write permission for group - only read permission for others) we give the args as:
chmod(myfile,0664) .
Each operation is represented by discrete values
'r' is 4
'w' is 2
'x' is 1
Therefore, for 'rw' the value is 6(4+2).
Example 2:
To change mode of myfile to 'rwxr--r--' we give the args as:chmod(myfile,0744).
6. What are links and symbolic links in UNIX file system?
A link is a second name (not a file) for a file. Links can be used to assign more than one name to a file, but cannot be used to assign a directory more than one name or link filenames on different computers.
Symbolic link 'is' a file that only contains the name of another file.Operation on the symbolic link is directed to the file pointed by the it.Both the limitations of links are eliminated in symbolic links.Commands for linking files are:Link ln filename1 filename2Symbolic link ln -s filename1 filename2
7. What is a FIFO?
FIFO are otherwise called as 'named pipes'. FIFO (first-in-first-out) is a special file which is said to be data transient. Once data is read from named pipe, it cannot be read again. Also, data can be read only in the order written. It is used in interprocess communication where a process writes to one end of the pipe (producer) and the other reads from the other end (consumer).
8. How do you create special files like named pipes and device files?
The system call mknod creates special files in the following sequence.
1. kernel assigns new inode,
2. sets the file type to indicate that the file is a pipe, directory or special file,
3. If it is a device file, it makes the other entries like major, minor device numbers.
For example:If the device is a disk, major device number refers to the disk controller and minor device number is the disk.
9. Discuss the mount and unmount system calls
The privileged mount system call is used to attach a file system to a directory of another file system; the unmount system call detaches a file system. When you mount another file system on to your directory, you are essentially splicing one directory tree onto a branch in another directory tree. The first argument to mount call is the mount point, that is , a directory in the current file naming system. The second argument is the file system to mount to that point. When you insert a cdrom to your unix system's drive, the file system in the cdrom automatically mounts to /dev/cdrom in your system.
10. How does the inode map to data block of a file?
Inode has 13 block addresses. The first 10 are direct block addresses of the first 10 data blocks in the file. The 11th address points to a one-level index block. The 12th address points to a two-level (double in-direction) index block. The 13th address points to a three-level(triple in-direction)index block. This provides a very large maximum file size with efficient access to large files, but also small files are accessed directly in one disk read.
11. What is a shell?
A shell is an interactive user interface to an operating system services that allows an user to enter commands as character strings or through a graphical user interface. The shell converts them to system calls to the OS or forks off a process to execute the command. System call results and other information from the OS are presented to the user through an interactive interface. Commonly used shells are sh,csh,ks etc.
12. Brief about the initial process sequence while the system boots up.
While booting, special process called the 'swapper' or 'scheduler' is created with Process-ID 0. The swapper manages memory allocation for processes and influences CPU allocation. The swapper inturn creates 3 children:
Ø the process dispatcher,
Ø vhand and
Ø dbflushwith IDs 1,2 and 3 respectively.
This is done by executing the file /etc/init. Process dispatcher gives birth to the shell. Unix keeps track of all the processes in an internal data structure called the Process Table (listing command is ps -el).
13. What are various IDs associated with a process?
Unix identifies each process with a unique integer called ProcessID. The process that executes the request for creation of a process is called the 'parent process' whose PID is 'Parent Process ID'. Every process is associated with a particular user called the 'owner' who has privileges over the process. The identification for the user is 'UserID'. Owner is the user who executes the process. Process also has 'Effective User ID' which determines the access privileges for accessing resources like files.
getpid() -process id
getppid() -parent process id
getuid() -user id
geteuid() -effective user id
14. What is 'ps' command for?
The ps command prints the process status for some or all of the running processes. The information given are the process identification number (PID),the amount of time that the process has taken to execute so far etc.
15. What Happens when you execute a command?
When you enter 'ls' command to look at the contents of your current working directory, UNIX does a series of things to create an environment for ls and the run it: The shell has UNIX perform a fork. This creates a new process that the shell will use to run the ls program. The shell has UNIX perform an exec of the ls program. This replaces the shell program and data with the program and data for ls and then starts running that new program. The ls program is loaded into the new process context, replacing the text and data of the shell. The ls program performs its task, listing the contents of the current directory.
HR Interview Questions - Answers Vol -1
Question 1 Tell me about yourself.
TRAPS: Beware; about 80% of all interviews begin with this “innocent” question. Many candidates, unprepared for the question, skewer themselves by rambling, recapping their life story, delving into ancient work history or personal matters.BEST ANSWER: Start with the present and tell why you are well qualified for the position. Remember that the key to all successful interviewing is to match your qualifications to what the interviewer is looking for. In other words you must sell what the buyer is buying. This is the single most important strategy in job hunting.So, before you answer this or any question it's imperative that you try to uncover your interviewer's greatest need, want, problem or goal.To do so, make you take these two steps:
1. Do all the homework you can before the interview to uncover this person's wants and needs (not the generalized needs of the industry or company)
2. As early as you can in the interview, ask for a more complete description of what the position entails. You might say: “I have a number of accomplishments I'd like to tell you about, but I want to make the best use of our time together and talk directly to your needs. To help me do, that, could you tell me more about the most important priorities of this position? All I know is what I (heard from the recruiter, read in the classified ad, etc.)”Then, ALWAYS follow-up with a second and possibly, third question, to draw out his needs even more. Surprisingly, it's usually this second or third question that unearths what the interviewer is most looking for.You might ask simply, "And in addition to that?..." or, "Is there anything else you see as essential to success in this position?:This process will not feel easy or natural at first, because it is easier simply to answer questions, but only if you uncover the employer's wants and needs will your answers make the most sense. Practice asking these key questions before giving your answers, the process will feel more natural and you will be light years ahead of the other job candidates you're competing with. After uncovering what the employer is looking for, describe why the needs of this job bear striking parallels to tasks you've succeeded at before. Be sure to illustrate with specific examples of your responsibilities and especially your achievements, all of which are geared to present yourself as a perfect match for the needs he has just described.
Question 2 What are your greatest strengths?
TRAPS: This question seems like a softball lob, but be prepared. You don't want to come across as egotistical or arrogant. Neither is this a time to be humble.BEST ANSWER: You know that your key strategy is to first uncover your interviewer's greatest wants and needs before you answer questions. And from Question 1, you know how to do this.Prior to any interview, you should have a list mentally prepared of your greatest strengths. You should also have, a specific example or two, which illustrates each strength, an example chosen from your most recent and most impressive achievements.You should, have this list of your greatest strengths and corresponding examples from your achievements so well committed to memory that you can recite them cold after being shaken awake at 2:30AM.Then, once you uncover your interviewer's greatest wants and needs, you can choose those achievements from your list that best match up.As a general guideline, the 10 most desirable traits that all employers love to see in their employees are:
1. A proven track record as an achiever...especially if your achievements match up with the employer's greatest wants and needs.
2. Intelligence...management "savvy".
3. Honesty...integrity...a decent human being.
4. Good fit with corporate culture...someone to feel comfortable with...a team player who meshes well with interviewer's team.
5. Likeability...positive attitude...sense of humor.
6. Good communication skills.
7. Dedication...willingness to walk the extra mile to achieve excellence.
8. Definiteness of purpose...clear goals.
9. Enthusiasm...high level of motivation.
10. Confident...healthy...a leader.
Question 3 What are your greatest weaknesses?
TRAPS: Beware - this is an eliminator question, designed to shorten the candidate list. Any admission of a weakness or fault will earn you an “A” for honesty, but an “F” for the interview.PASSABLE ANSWER: Disguise a strength as a weakness.Example: “I sometimes push my people too hard. I like to work with a sense of urgency and everyone is not always on the same wavelength.”
Drawback: This strategy is better than admitting a flaw, but it's so widely used, it is transparent to any experienced interviewer.BEST ANSWER: (and another reason it's so important to get a thorough description of your interviewer's needs before you answer questions): Assure the interviewer that you can think of nothing that would stand in the way of your performing in this position with excellence. Then, quickly review you strongest qualifications.Example: “Nobody's perfect, but based on what you've told me about this position, I believe I' d make an outstanding match. I know that when I hire people, I look for two things most of all. Do they have the qualifications to do the job well, and the motivation to do it well? Everything in my background shows I have both the qualifications and a strong desire to achieve excellence in whatever I take on. So I can say in all honesty that I see nothing that would cause you even a small concern about my ability or my strong desire to perform this job with excellence.”
Alternate strategy (if you don't yet know enough about the position to talk about such a perfect fit): Instead of confessing a weakness, describe what you like most and like least, making sure that what you like most matches up with the most important qualification for success in the position, and what you like least is not essential.Example: Let's say you're applying for a teaching position. “If given a choice, I like to spend as much time as possible in front of my prospects selling, as opposed to shuffling paperwork back at the office. Of course, I long ago learned the importance of filing paperwork properly, and I do it conscientiously. But what I really love to do is sell (if your interviewer were a sales manager, this should be music to his ears.)
Question 4 Tell me about something you did – or failed to do – that you now feel a little ashamed of.
TRAPS: There are some questions your interviewer has no business asking, and this is one. But while you may feel like answering, “none of your business,” naturally you can’t. Some interviewers ask this question on the chance you admit to something, but if not, at least they’ll see how you think on your feet.
Some unprepared candidates, flustered by this question, unburden themselves of guilt from their personal life or career, perhaps expressing regrets regarding a parent, spouse, child, etc. All such answers can be disastrous.
BEST ANSWER: As with faults and weaknesses, never confess a regret. But don’t seem as if you’re stonewalling either.Best strategy: Say you harbor no regrets, then add a principle or habit you practice regularly for healthy human relations.Example: Pause for reflection, as if the question never occurred to you. Then say, “You know, I really can’t think of anything.” (Pause again, then add): “I would add that as a general management principle, I’ve found that the best way to avoid regrets is to avoid causing them in the first place. I practice one habit that helps me a great deal in this regard. At the end of each day, I mentally review the day’s events and conversations to take a second look at the people and developments I’m involved with and do a doublecheck of what they’re likely to be feeling. Sometimes I’ll see things that do need more follow-up, whether a pat on the back, or maybe a five minute chat in someone’s office to make sure we’re clear on things…whatever.”
“I also like to make each person feel like a member of an elite team, like the Boston Celtics or LA Lakers in their prime. I’ve found that if you let each team member know you expect excellence in their performance…if you work hard to set an example yourself…and if you let people know you appreciate and respect their feelings, you wind up with a highly motivated group, a team that’s having fun at work because they’re striving for excellence rather than brooding over slights or regrets.”
TRAPS: Beware; about 80% of all interviews begin with this “innocent” question. Many candidates, unprepared for the question, skewer themselves by rambling, recapping their life story, delving into ancient work history or personal matters.BEST ANSWER: Start with the present and tell why you are well qualified for the position. Remember that the key to all successful interviewing is to match your qualifications to what the interviewer is looking for. In other words you must sell what the buyer is buying. This is the single most important strategy in job hunting.So, before you answer this or any question it's imperative that you try to uncover your interviewer's greatest need, want, problem or goal.To do so, make you take these two steps:
1. Do all the homework you can before the interview to uncover this person's wants and needs (not the generalized needs of the industry or company)
2. As early as you can in the interview, ask for a more complete description of what the position entails. You might say: “I have a number of accomplishments I'd like to tell you about, but I want to make the best use of our time together and talk directly to your needs. To help me do, that, could you tell me more about the most important priorities of this position? All I know is what I (heard from the recruiter, read in the classified ad, etc.)”Then, ALWAYS follow-up with a second and possibly, third question, to draw out his needs even more. Surprisingly, it's usually this second or third question that unearths what the interviewer is most looking for.You might ask simply, "And in addition to that?..." or, "Is there anything else you see as essential to success in this position?:This process will not feel easy or natural at first, because it is easier simply to answer questions, but only if you uncover the employer's wants and needs will your answers make the most sense. Practice asking these key questions before giving your answers, the process will feel more natural and you will be light years ahead of the other job candidates you're competing with. After uncovering what the employer is looking for, describe why the needs of this job bear striking parallels to tasks you've succeeded at before. Be sure to illustrate with specific examples of your responsibilities and especially your achievements, all of which are geared to present yourself as a perfect match for the needs he has just described.
Question 2 What are your greatest strengths?
TRAPS: This question seems like a softball lob, but be prepared. You don't want to come across as egotistical or arrogant. Neither is this a time to be humble.BEST ANSWER: You know that your key strategy is to first uncover your interviewer's greatest wants and needs before you answer questions. And from Question 1, you know how to do this.Prior to any interview, you should have a list mentally prepared of your greatest strengths. You should also have, a specific example or two, which illustrates each strength, an example chosen from your most recent and most impressive achievements.You should, have this list of your greatest strengths and corresponding examples from your achievements so well committed to memory that you can recite them cold after being shaken awake at 2:30AM.Then, once you uncover your interviewer's greatest wants and needs, you can choose those achievements from your list that best match up.As a general guideline, the 10 most desirable traits that all employers love to see in their employees are:
1. A proven track record as an achiever...especially if your achievements match up with the employer's greatest wants and needs.
2. Intelligence...management "savvy".
3. Honesty...integrity...a decent human being.
4. Good fit with corporate culture...someone to feel comfortable with...a team player who meshes well with interviewer's team.
5. Likeability...positive attitude...sense of humor.
6. Good communication skills.
7. Dedication...willingness to walk the extra mile to achieve excellence.
8. Definiteness of purpose...clear goals.
9. Enthusiasm...high level of motivation.
10. Confident...healthy...a leader.
Question 3 What are your greatest weaknesses?
TRAPS: Beware - this is an eliminator question, designed to shorten the candidate list. Any admission of a weakness or fault will earn you an “A” for honesty, but an “F” for the interview.PASSABLE ANSWER: Disguise a strength as a weakness.Example: “I sometimes push my people too hard. I like to work with a sense of urgency and everyone is not always on the same wavelength.”
Drawback: This strategy is better than admitting a flaw, but it's so widely used, it is transparent to any experienced interviewer.BEST ANSWER: (and another reason it's so important to get a thorough description of your interviewer's needs before you answer questions): Assure the interviewer that you can think of nothing that would stand in the way of your performing in this position with excellence. Then, quickly review you strongest qualifications.Example: “Nobody's perfect, but based on what you've told me about this position, I believe I' d make an outstanding match. I know that when I hire people, I look for two things most of all. Do they have the qualifications to do the job well, and the motivation to do it well? Everything in my background shows I have both the qualifications and a strong desire to achieve excellence in whatever I take on. So I can say in all honesty that I see nothing that would cause you even a small concern about my ability or my strong desire to perform this job with excellence.”
Alternate strategy (if you don't yet know enough about the position to talk about such a perfect fit): Instead of confessing a weakness, describe what you like most and like least, making sure that what you like most matches up with the most important qualification for success in the position, and what you like least is not essential.Example: Let's say you're applying for a teaching position. “If given a choice, I like to spend as much time as possible in front of my prospects selling, as opposed to shuffling paperwork back at the office. Of course, I long ago learned the importance of filing paperwork properly, and I do it conscientiously. But what I really love to do is sell (if your interviewer were a sales manager, this should be music to his ears.)
Question 4 Tell me about something you did – or failed to do – that you now feel a little ashamed of.
TRAPS: There are some questions your interviewer has no business asking, and this is one. But while you may feel like answering, “none of your business,” naturally you can’t. Some interviewers ask this question on the chance you admit to something, but if not, at least they’ll see how you think on your feet.
Some unprepared candidates, flustered by this question, unburden themselves of guilt from their personal life or career, perhaps expressing regrets regarding a parent, spouse, child, etc. All such answers can be disastrous.
BEST ANSWER: As with faults and weaknesses, never confess a regret. But don’t seem as if you’re stonewalling either.Best strategy: Say you harbor no regrets, then add a principle or habit you practice regularly for healthy human relations.Example: Pause for reflection, as if the question never occurred to you. Then say, “You know, I really can’t think of anything.” (Pause again, then add): “I would add that as a general management principle, I’ve found that the best way to avoid regrets is to avoid causing them in the first place. I practice one habit that helps me a great deal in this regard. At the end of each day, I mentally review the day’s events and conversations to take a second look at the people and developments I’m involved with and do a doublecheck of what they’re likely to be feeling. Sometimes I’ll see things that do need more follow-up, whether a pat on the back, or maybe a five minute chat in someone’s office to make sure we’re clear on things…whatever.”
“I also like to make each person feel like a member of an elite team, like the Boston Celtics or LA Lakers in their prime. I’ve found that if you let each team member know you expect excellence in their performance…if you work hard to set an example yourself…and if you let people know you appreciate and respect their feelings, you wind up with a highly motivated group, a team that’s having fun at work because they’re striving for excellence rather than brooding over slights or regrets.”
AAJ MERA INSANIYAT SE VISHWAS UTH GAYA
ek Chor ek ghar me chori karne gaya,
Tijori par likha tha
" TIJORI KO TODNE KI JARURAT NAHI,
452 No. LAGAO AUR SAMNE WALA LAAL BUTTON DABAO,
TIJORI KHUL JAYEGI "
Jaise hi button dabaya alarm baja aur police aayi.
Jate waqt chor Seth se bola
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
"AAJ MERA INSANIYAT SE VISHWAS UTH GAYA"
Tijori par likha tha
" TIJORI KO TODNE KI JARURAT NAHI,
452 No. LAGAO AUR SAMNE WALA LAAL BUTTON DABAO,
TIJORI KHUL JAYEGI "
Jaise hi button dabaya alarm baja aur police aayi.
Jate waqt chor Seth se bola
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
"AAJ MERA INSANIYAT SE VISHWAS UTH GAYA"
Madam Tell Me - My Name.
A college student needed a small two-hour course to fill his schedule
and the only one available was wildlife Zoology. So he joined in and
after one week of study, a test was held.
The professor passed out a sheet of small paper where in each square
was a carefully drawn picture of a bird's legs. No bodies, no feet,
just legs.The test asked each student to identify the birds from their
legs. Our student sat and stared at the test getting angrier every minute.
Finally he stomped up to the front of the classroom and threw the test on the teacher's desk.
"This is the worst test I have ever written."The teacher looked up and said: "Young man, you have not filled in anything and you definitely have failed the test. Tell me, what's your name?"The student pulled up his trousers to the knee showing his legs and said, "You tell me..."
and the only one available was wildlife Zoology. So he joined in and
after one week of study, a test was held.
The professor passed out a sheet of small paper where in each square
was a carefully drawn picture of a bird's legs. No bodies, no feet,
just legs.The test asked each student to identify the birds from their
legs. Our student sat and stared at the test getting angrier every minute.
Finally he stomped up to the front of the classroom and threw the test on the teacher's desk.
"This is the worst test I have ever written."The teacher looked up and said: "Young man, you have not filled in anything and you definitely have failed the test. Tell me, what's your name?"The student pulled up his trousers to the knee showing his legs and said, "You tell me..."
Ek Chutki code ki keemat
Ek Chutki code ki keemat tum kya jaano HR Babu?
Ishwar ka ashirwaad hota hai ek chutki code
Developer ke sar ka taj hota hai ek chutki code
Har bench resource ka khwaab hota hai ek chutki code
Bugs ka bhandaar hota hai ek chutki code
TL ki shikayat ka adhar hota hai ek chutki code
Release ke samay ninde udne ka karan hota hai ek chutki code
Nanhe se logic ke liye 1000 line ka hota hai ek chutki code
Nanhe se logic ke liye 1000 line ka hota hai ek chutki code
Tension se takla kar deta hai ek chutki code
Per phir bhi hume salary dilata hai Yeh ek chutki code
Ishwar ka ashirwaad hota hai ek chutki code
Developer ke sar ka taj hota hai ek chutki code
Har bench resource ka khwaab hota hai ek chutki code
Bugs ka bhandaar hota hai ek chutki code
TL ki shikayat ka adhar hota hai ek chutki code
Release ke samay ninde udne ka karan hota hai ek chutki code
Nanhe se logic ke liye 1000 line ka hota hai ek chutki code
Nanhe se logic ke liye 1000 line ka hota hai ek chutki code
Tension se takla kar deta hai ek chutki code
Per phir bhi hume salary dilata hai Yeh ek chutki code
Bench People Jame Raho - Taare Zameen Par
yahaan alag andaz hai
jaise chidta koi saaz hai
har kaam ko taala karte hain
ye sapne paala karte hain
ye hardum socha karte hain
ye khud se poocha karte hain
kyon project ka naara jame raho...
ye project ke kabhi ghulam nahin
inhe kisi baat ka dhyan nahin
Girlfriend se milne jaate hain
Mobile par batiyate hainye
mails forward karte hain
novels saare padhte hai
aur company k discussion forum pe
ye kalakariyan karte hain
Bench ka naara jame raho..
jaise chidta koi saaz hai
har kaam ko taala karte hain
ye sapne paala karte hain
ye hardum socha karte hain
ye khud se poocha karte hain
kyon project ka naara jame raho...
ye project ke kabhi ghulam nahin
inhe kisi baat ka dhyan nahin
Girlfriend se milne jaate hain
Mobile par batiyate hainye
mails forward karte hain
novels saare padhte hai
aur company k discussion forum pe
ye kalakariyan karte hain
Bench ka naara jame raho..
Project People Jame Raho - Taare Zameen Par
Kas ke joota Kas ke belt
khons ke andar apni shirt
Office ko chali sawaari
kandhon pe hai zimmedari
haath mein notebook man mein dum
Aaj to CR execute karenge hum
har issue se takrayenge
Migration k baad hi ghar jayenge hum
Project ka naara jame raho
TL ka ishaara jame raho
Project ka naara jame raho
TL ka ishaara jame raho
ye sote bhee hain attention
Testing karne ki hai tension
mehnat inko pyari hai
ekdum aagyakari hain
ye Cafeteria par hi jeete hain
ye Chai Coffee peete hain
bewaqt sote bewaqt khate
taan ke seena badhte jate
Project ka naara jame raho...
khons ke andar apni shirt
Office ko chali sawaari
kandhon pe hai zimmedari
haath mein notebook man mein dum
Aaj to CR execute karenge hum
har issue se takrayenge
Migration k baad hi ghar jayenge hum
Project ka naara jame raho
TL ka ishaara jame raho
Project ka naara jame raho
TL ka ishaara jame raho
ye sote bhee hain attention
Testing karne ki hai tension
mehnat inko pyari hai
ekdum aagyakari hain
ye Cafeteria par hi jeete hain
ye Chai Coffee peete hain
bewaqt sote bewaqt khate
taan ke seena badhte jate
Project ka naara jame raho...
Subscribe to:
Comments (Atom)








