Repair Internet Connections
Posted by Rajiv Pandey in Link Building, Meta Tags, Page Rank, Question Papers
he first step is to try to restart your computer. After it reboots double click your browser Icon and try again.
If you are Unable to connect to Internet try the Internet repair tool. If you right click on network icon (looks like two monitors) visible on your computer at the right hand side at the bottom of the screen where you see the clock. When you right click it go to 'repair' and select it. If you can not find the icon then you will have to go to the control panel and access network connections. Then right click on the connection you are trying to repair, the wireless network or the LAN and then select 'repair'. If you are using Windows Vista instead of XP then you will find the steps are the same only wording may be different instead of repair you will find diagnose and repair option. Once you select the correct option Windows will automatically try and repair itself. You will get the message once it is done and you should be able to use internet effectively.
If you are are still unable to connect to the Internet try to reboot your modem that your Service Provider gave you. The problem could be at your internet service provider's end. Make sure to call him and ask him to reset it at his end if you still can't connect. He can also check to see if your connection is good. Generally by taking these steps you can repair your internet connection.
“SEO” my Perception..
Posted by Rajiv Pandey in Business, Career, Future of IT, google, Improve, Keyword Density, Page Rank, Question Papers, Website
Internet surfers use search engines more than any other tool to find things online. Search engines rank their results using a complex formula that considers web page content, link popularity and other details. This is why you should Search Engine Optimization (SEO) your web site.Search engines of use of Net surfers more than any other tool to find things on line. The search engines arrange their results using a complex formula which considers the contents of Web page, the popularity of bond and other details. That’s the SEO of your Web site.
First before you start you need to identify your Keywords. It is critical that you know and understand the search terms surfers will use to find your web site with. If your not sure yet try thinking of search terms you would use to find your site.
Next you need to identify your competitors. Start searching with your site’s targeted keywords and research the top ranked competing sites. Create a list of the top 10 to 15 sites and review each one of these web sites. While reviewing each of the competing sites look at the SEO methods that they use.
Meta tags are thought by most to have little impact, If any at all, on your site’s ranking, but is still recommend to use. It’s better to be safe than sorry! The meta description tag is used to describe a web page’s content to the search engines. Most search engines (Google, Yahoo!, etc) get the web site’s description from the web page’s content and not from the meta description tag. Write a description of your site here and make it short.How To Watch The News
Posted by Rajiv Pandey in Business, Career, Data Flow, Future of IT, google, Improve, Internet, Interview Tips, Keyword Density, Knowledge, Link, Page Rank, Question Papers
The first is to buffer the news. Watch something funny before. Since the news usually ends on upbeat notes, that should keep your mood up. Another technique is to do something while you watch the news, so that you don't spend all of your focus on the news. Read a book or do a crossword while watching the news.
By focusing on the Latest SEO news only, you are more likely that you will allow it to adjust your mood. By giving it only part of your attention, you can stabilize your mood a bit more. You can also watch the news with someone else. That way, you have someone with whom you can talk about what you are seeing which might help you to release any anxiety that you are feeling.
Sometimes, watching the news on television is more harmful than helpful. The internet allows you to get news whenever you want and that might work better. Yahoo and Google both have comprehensive news sites and companies like the New York Times and CNN also maintain extensive web presences. It would allow you to watch the news a little at a time and get headlines without needing to get too much information.
Why We Need Education
Posted by Rajiv Pandey in Business, Career, Data Flow, Future of IT, google, Improve, Internet, Interview Tips, Java, Link, Link Building, Question Papers, Search Engine, SEM, SEO
Education enhances one's knowledge and as the saying goes; Knowledge is Power. However, power that a person posses will be dependent on how an individual uses it. A person could ultimately choose to use knowledge and power for the benefit of themselves, for others or to be simply used in the destruction of mankind. Education is the knowledge of putting one's potentials to maximum use. Education makes man a right thinker. It tells man how to think and how to make decision.
This is where the education should be given importance. As education is geared towards individual development, such development should eventually transform into social development. For individuals and nations, it is key to creating, applying, and spreading knowledge-and thus to the development of dynamic, globally competitive economies.
It is one important policy that a state must promote, as education is the only means to understand its history, culture and to some extent their religion. Education is the only means to unite a country, a people as nation. This is to say that education is a must if a nation aspires to achieve growth and development and more importantly sustain it. The importance of education cannot be neglected by any nation. And in today's world, the role of education has become even more vital. It is an absolute necessity for economic and social development of any nation.
How Google Rank BLog!!
Posted by Rajiv Pandey in Business, Career, Creative, Data Flow, google, Improve, Java, Meta Tags, Page Rank, Question Papers, Search Engine, SEM, SEO, Web2.0, Website
Did you know- How google used to rank your blog !!!… Well as for as i know you all might me aware of this feature of Google. Yes you are right- I am gonna share you about a little bit of my reserch on a tool of Google that’s being very popular now a days. That is “Google Blog Search” with this tool we can search the blogs listed in google. If you are getting a high traffic on your blogs, no doubt this will be very profitable for you. But what are the basic factors does Google take into account to elaborate the search results, as for as i know Google used to work on some techniques about the positive and negative factors affecting blog ranking, check it out:—
Positive Factors:
* Popularity of the blog (RSS subscriptions)
* Implied popularity (how many clicks search results get)
* Inclusion in blogrolls
* Inclusion in “high quality” blogrolls
* Tagging of posts (also from users)
* References to the blog by Resource.
* Page rank of Blog.
Negative Factors:
* Predictable frequency of posts (short bursts of posts might indicate spam)
* Content of the blog does not match content of the feed
* Content includes spam keywords
* Duplicated content
* Posts have all the same size
* Link distribution of the blog.
* Posts primarily link to one page or site.
How to Social Bookmark Your Blog Posts
Posted by Rajiv Pandey in Business, Career, Creative, Internet, Interview Tips, Link Building, Meta, On-page optimization, Page Rank, Question Papers, Search Engine, SEO, Tips, Web2.0
Let me first start by explaining what Social bookmarking is and why it is important to social bookmark all of your blog posts. Quite simply stated, social bookmarking will bring your blog more traffic. As internet marketers, that it exactly what we are all after. Social bookmark sites allow us to share our favorite sites with others who might be interested as well as increasing our back links at the same time.
All the links that you leave have the potential to bring traffic back to your blog. As you begin to regularly submit your link to authority social bookmarking sites, like Digg, Twitter, and Stumbleupon, your blog will benefit greatly by moving up rank rapidly in the search engines for your selected keywords.
Now just a quick tutorial on how to easily social bookmark your blog posts.
First, what you need to do is find a list of some social bookmark sites. There are plenty around, just do a Google search or go to SocialMarker.com.
Next you have to sign up at each bookmarking site. This process may take up to an hour but keep in mind that you are only going to have to go through this process one time.
5 Ways to Use Social Media Optimization
Posted by Rajiv Pandey in Meta Tags, News, On-page optimization, Page Rank, Question Papers, Search Engine, SEM, Web2.0, Website
Social media optimization is where you use different ways to generate publicity for your Internet business. These ways center on the social media and online communities of people who have common interests such as yours.
1. One of the most effective ways to use social media optimization to build your Internet business is to combine blogging and search engine optimization. Optimizing a blog post, so that its search engine friendly is no different than optimizing a web page has been in the past.
2. RSS feeds are another excellent way to optimize your blog for social media. Having a large subscriber base to your RSS feed is a great way to instantly keep people up to date on what you are doing in your Internet business every time you post a blog article.
3. Adding a Digg button would be another way that you could optimize your blog for social media purposes. This allows people to vote on the popularity of your blog article and it is one of the largest social directories, so they get a lot of search engine traffic there as well. This can lead to back links to your blog which serve as search engine bait.
4. You Tube videos are an extremely popular way to get your sales message out in a blog post. These can also create viral marketing, which is extremely important when it comes to creating more traffic that you might normally not get. A popular video can be downloaded and watched literally thousands of times as word spreads about it.
5. Sharing photos is another way to get people involved. Websites such as Flickr make this very easy to do. Flickr is an image and video hosting website, web services suite, and online community platform that many bloggers use to share photos online.
This is five ways to use social media optimization to get people involved with your Internet business. It is worth spending time learning how to do this because this form of creating publicity is only going to increase in the futureWhat Can Get You Penalized?
Posted by Rajiv Pandey in Keyword Density, Meta, On-page optimization, Page Rank, Question Papers, Search Engine, Tips, Web2.0
Keyword placement, keyword proximity, keyword density is all important factor in a website development. But overdoing those like placing keyword on every part of your page will do no good for you. These is termed as Keyword stuffing by experts and in terms of search engine it is called keyword Spamming.
The consequences are that your website may get penalized by ranking it low in SERP (Search Engine Result Page).
Don't make your page heavy; mean to say one should not over-use the things mentioned below:
* No heavy Images,
* No Heavy Flash,
* No links in Flash.
One can include the images but in an appropriate manner.
Another factor is cloaking which by far is an important issue as far as penalization is concerned.
Cloaking is an unethical SEO tactic which involves serving a specific page to each search engine spider and a different one to human visitors.
There are three types of cloaking:
1) IP based
2) User-agent based and
3) Hybrid
IP based cloaking involves showing different pages (which are highly optimized with fresh content) to the search engine based on their search engine (IP).
User-agent based means where the spiders' User-Agents are recognized at the server and handled accordingly.
Hybrid is a mixture of the both IP and User-agent.
IP based cloaking is by far used more to serve the cloaked pages to SE.
Secret To Getting Indexed In Yahoo
Posted by Rajiv Pandey in Creative, Future of IT, Internet, Interview Tips, Keyword Density, law, Link Building, Meta Tags, On-page optimization, Page Rank, Question Papers, Search Engine, SEM, SEO, Tips, Web2.0, Website
The secret to getting indexed in Yahoo involves constant updates to your site. The updates, however, have to be done on both the site and through Real Simple Syndication (RSS) feeds. Here’s how you go about getting indexed.
The first step is to start a blog for your site. You can build a blog on your site or use a free service. I prefer blogger.com. Once you have the blog up with content posted, you must turn the blog into a real simple syndication feed. Again, you can use your own system. I prefer to use a free service because I really don’t have the time to waste on such things.
If you have a yahoo email account, you need to access you’re My Yahoo page. If you don’t have an account, get one! Once you are on the My Yahoo page, do the following:
1. Click the “add content” link in the upper left hand under the search box.
2. When the new page opens, click the “Add RSS by URL” link on the right of the “Find Content” search box in the upper section of the page.
3. Enter the exact link provided by Feedburner and click “add.” Do NOT add the url for your blog.
4. Click the “My Yahoo” tab at the top of the page and refresh the page.
At this point, you should see your feed at the bottom of the page. If you don’t, be patient. Yahoo is sometimes slow, so just try it again in an hour or so. When the feed is added, you should see the name of your blog and the title of each post under it. Yahoo can take up to a day to add new posts, so don’t panic if they don’t show up immediately.
Once you’ve completed the above, Yahoo will follow the links in the blog and index the pages on your site.
What is Blog Classroom
Posted by Rajiv Pandey in Career, Creative, Data Flow, google, Improve, Internet, Knowledge, Link Building, Meta Tags, Page Rank, Question Papers, Search Engine, SEM, SEO, Tips, Web2.0
Two very well respected marketers, Anik Singal and Rosalind Gardner have finally released a training program, which I think is the easiest way ANYONE can get started blogging online - Blog Classroom.
Their entire goal is to teach you how you can get everything you need set-up in just minutes and then even MAINTAIN your blog in just minutes a day. They recently ran a COMPLETELY free pre-course that had well over 1,000 comments on it from students who were amazed at how easily they were getting their blog businesses started. Now, they’re releasing over 100+ videos and a 4-week Webinar coaching group to basically reveal every detail on how they run their blog businesses.
Look - blogging is big business. People are making serious income blogging online. If you’ve always wanted to work from home, if you’ve struggled making money online, or if you’ve never even considered it - give Blog Classroom a try. You’ll be glad that you did.
The Secret to Using Keywords Effectively
Posted by Rajiv Pandey in Business, Career, Improve, Interview Tips, Knowledge, Link Building, On-page optimization, Page Rank, Question Papers, Search Engine, Web2.0
Always keep your keywords as descriptive and as relevant to your subject matter as possible. In other words, the search engines follow whatever you write, they don't know what your article is about. The search engine crawlers will take a snapshot of exactly what you write. If you have used the correct descriptive keywords to make your point, your audience will have no trouble finding what you have written.
Believe me Google and Yahoo want you to find what you're looking for. When deciding on what keywords to use in any situation, I find the best strategy is to put myself in the shoes of my searching customer. I ask myself, what question would I ask, to find what I'm selling, and how would I phrase it. When you can answer that question, your customers should have no problems finding you.
For instance, if you are selling coffee online and you want your customers to find you, you could advertise "coffee for sale", but when your prospective customer types "coffee for sale" into the search engine, they will get millions of results returned, and finding you in the results is a joke. However, if you advertise "Mike's Aroma Blast Kona Coffee", your customers will find you every time.
It doesn't matter whether you are selling something online or searching for something to buy, using relevant keywords makes all the difference between success and failure.
Cisco Ccna, Ccnp, And Ccent Certification Exam Practice
Posted by Rajiv Pandey in Business, Career, Data Flow, Java, Knowledge, law, Link, Question Papers
CCNA And CCENT Exam:
A frame enters a switchport. Which of the following does the switch examine first?
A. Source IP address
B. Destination IP address
C. Source MAC address
D. Destination MAC address
Answer: C. The switch will check the source MAC address first, and then decide whether that particular address and corresponding port number need to be added to the switch's MAC address table.
CCNP Certification / BSCI Exam:
In the following EIGRP configuration, the number 100 appears twice. Describe the purpose of each.
R2(config)#router eigrp 100
R2(config-router)#redistribute ospf 1 metric 1544 100 1 255 1500
Answer: The first "100" is the EIGRP AS number. The second "100" is the delay metric for the OSPF routes redistributed into EIGRP.
CCNP Certification / BCMSN Exam:
What single command can be used to change the speed and/or duplex setting of multiple ports simultaneously?
Answer: interface range.
CCNP Certification / ISCW Exam:
Name and briefly describe three different kinds of recon attacks.
A reconnaissance attack isn't necessarily destructive in itself. Quite the contrary, the attacker really doesn't want to draw your attention to this type of attack. A reconnaissance attack is primarily designed to gather information and test network defenses in preparation for a future - and very destructive - network attack.
Just as a successful ping to a single IP address will tell you if that host is online or not, a ping sweep sends pings to a range of addresses to find out which ones are in use. In a similar fashion, port scans are used to find out what ports are open and can possibly be compromised. Packet sniffers can be used for much the same reason.
And just as asking questions about someone can yield information about that person, queries can help a network attacker gain information about your network. DNS queries, SQL queries, and Internet Information queries are just three query types that can be used to gather information for future attacks.
CCNP Certification / ONT Exam:
You want to run Weighted Fair Queueing on a link that's running faster than 2.048 MBPS. What global configuration command allows this?
Answer: None - WFQ does not work on interfaces running at a speed higher than 2.048 MBPS.
Earning An MCSE Certification Is No Simple Task
Posted by Rajiv Pandey in Career, Data Flow, Future of IT, Improve, Knowledge, Question Papers
In the strongly competing today IT gone, advancing your education is very important. The fact that you rise above other IT of the professionals to keep your competing advantage does not pass inapperçu. The owners of businesses seeking an engineer of art of the car-portrait-motivated to fill position with their company often seek current certifications. Microsoft offers a large variety of professional certifications certified by Microsoft. Certifications of Microsoft carry much influence with owners of businesses. Some certification of Microsoft you continued, you will not be disappointed by the results after you add your certification to your summary.
After you carried out the certification of MCSE on the operating software of your choice, you will have the occasion to select a speciality to place yourselves independently further from your pars. Specializations of MCSE are a manner so that it them professional with more easily identify their hearth in a particular field. You can choose to specialize you in the transmission of messages or safety with any certification of MCSE which you acquire. The owners of businesses need often an employee with specific specialization in safety. A MCSE: Safety would make the potential employers know to you are MCSE certified with a hearth on safety.
In more of your certificate and other gifts of Microsoft, you will receive great businesses on the industry-specific stores, the Web sites and the data bases of MCP-only. By the Web site of member of MCP, you can reach Microsoft professional store certified on line. The store was regarded as one of the principal stores of development of the career and of the professional of the industry . the regular talks on line with other professionals of Microsoft will maintain to you in the loop and will further help your education and career.
3 Reasons To Buy An Existing Domain Name
Posted by Rajiv Pandey in Career, Data Flow, Link, Question Papers, SEO
Obviously you do not want to buy an existing web site for your new business as you wish to create a web site that accurately reflects your business vision, but there are a number of advantages to buying an existing domain name and if you do not yet have your heart set on a new domain name you will likely find an existing domain name available at a price not much greater than you will pay for a fresh name and an existing domain name brings a number of advantages.
One of the primary advantages of an existing domain name is that it already has traffic flowing toward it. Obviously the amount of traffic will vary greatly depending on what the current owner has done for promotion but any traffic is more than the zero visitors a fresh name will deliver.
Another advantage is from search engine optimization. Many domainers will have at least put in a small amount of time optimizing their domain name portfolio for search engines. Others put in a great deal of time and effort targeting key words and making sure the domain name is listed. It takes time for various domain names to work their way into search engine listings and if someone has already done that work for you then you are ready to capitalize on their groundwork as soon as you take over the name.
Tips To Increase Traffic To Your Blog
Posted by Rajiv Pandey in Business, Career, Data Flow, Future of IT, Improve, Interview Tips, Knowledge, Link, Question Papers, SEO
Just like any web site, it is capital you accept cartage visiting your blog. Once you accept a connected breeze of cartage advancing to your blog it’s abundant easier to run as you will body responses and get acknowledgment for the online autograph that you’ve posted.
A abundant way of accretion cartage to your blog is by announcement in forums and added online communities targeted at your blogs niche. There are actually bags of forums on the internet and award one in your alcove to access cartage to your blog shouldn’t be a problem. Just seek google or one of the added above seek engines.
Targeted cartage is acutely important as it will accompany you added committed readers to your blog. Random hits don’t beggarly annihilation these days, you wish to recruit an admirers and accumulate them absorbed by announcement on affair online autograph that will kepp them advancing back.
Another abundant means of accretion cartage is autograph articles, just like this one. Make abiding your commodity is on affair and gives as abundant advice as possible. You’re your online autograph amid 250-500 words for best results.
Social book appearance is aswell acceptable a abundant way to access cartage to your blog. Website like Digg, De.licio.us and Stumble Upon can accompany hoards of cartage to your website with the actual post.
How to describe yourself?
Posted by Rajiv Pandey in Future of IT, Improve, Interview Tips, Knowledge, Question Papers
"Describe yourself!", This question is almost invariably asked in the majority of interviews, and just as invariably answered dismally!. What does one say and why do we always seem so flustered by the question?. Because we have always been taughtby our parents and respected elders not to boast or talk about ourselves.
With a childhood full of such repressive advice, its not surprising that the majority of us begin the answer with a stammer and a blush, almost instantly changing from flash to foolish and ruining our chances of employment.
So what do we say? Frankly, just answer the question as it comes. Most disconcerted candidates dread this question and begin with a silly "Basically, my name is ...". Why don't we realise that our CV is there right in front of the interviewer, and he knows this already.
By repeating the stuff that fills our CV, we just demonstrate that we are an 'in-the-box' kind of person, with little if any skill in innovation and presentation.
Actually, a question of this kind is an ideal way to plug in everything we want to say about ourselves that we had leave out of the CV. If you have attended a premier institution, say that the institution taught you much more than the degree it awared ypu, mention people who influenced ypu, talk about the books you like reading, your hobbies and your other interests.
Talk about your strengths; perhaps mention an instance when you used your conflict resolution skills or selling skills or whatever. But make certain that it does not sound like blowing your trumpet. Mention these instances as learning.
Tall about your weaknesses, but make sure that they are 'positive' weaknesses. For instance you could say that that you sometimes pay more attention to detail than is warranted. You can openly confess a tendency to be impatient with team members who cannot carry their own weight, or who cannot contribute sufficiently.
But first, think today what you want to say and practice. Remeber, if you hesitate about yourself, your interviewers will doubt whether you fit their bill of requirements. After all, if you don't know about you, who does?
What is Data Flow Diagram
Posted by Rajiv Pandey in Data Flow, Future of IT, Interview Tips, Question Papers
The Data Flow Diagram is commonly used also for the visualization of structured design data processing. The normal flow is represented graphically. A designer typically draws context level DFD first showing interaction between the system and the outside entities. Then this context level DFD will then be exploded in order to further show the details of system being modeled.
A DFD is one of the three essential perspectives of Structured Systems Analysis and Design Method (SSADM). In this method, both the project sponsors and the end users need to collaborate closely throughout the whole stages of the evolution of the system. Having a DFD will make the collaboration easy because the end users will be able to visualize the operation of the system, the will see a better perspective what the system will accomplish and how the whole project will be implemented.
A project implementation can also be made more efficient especially in progress monitoring. The DFD of the old system can be laid side by side with the new system's DFD so that comparisons can be made and weak points can be identified so that the appropriate innovations can be developed.
There are four components of a data flow diagram which are the following:
External Entities / Terminators - These refer or points to the outside parts of the system being developed or modeled. Terminators, depending on whether data flows into or from the system, are often called sinks or sources. They represent the information as wherever it comes from or where it goes.
Processes – The Processes component modifies the inputs and corresponding outputs.
Data Stores – refers to any place or area or storage where data will be placed whether temporarily or permanently.
Data Flows – refers to the way data will be transferred from one terminator to another, or through processes and data stores.
As a general rules, every page in a DFD should not contain more than 10 components. So, if there are more than 10 components in one processes, one or more components should have to be combined and then make another DFD to detail the combination in another page.
Each component needs to be number. Same goes for each subcomponent so that it will be easy to follow visually. For example, a top level DFD must have components numbered 1,2,3,4,5 and next level subcomponent (for instance of number 2) numbered 2.1, 2.2, 2.3 and so on.
There are two approaches to developing a DFD. The first approach is the Top Down Approach where a DFD starts with a context level DVD and then the system is slowly decomposed until the graphical detail goes down to a primitive level.
The other approach, Event Partitioning Approach, was described by Edward Yourdon in Just Enough Structured Analysis. In Event Partitioning Approach, a detailed DFD is constructed all events are made. For every event, a process is constructed and then each process is linked with other processes through data stores. Each process' reaction to a given event is modeled by an outgoing data flow.
There many DFD tools available in the market today. Some of these DFD tools include Microsoft Visio, ConceptDraw, Dia, SmartDraw and SILVERRUN ModelSphere. Most of these tools have drag and drop capabilities and have analysis tools to help a designer see instant potential flaw in the diagram so correction can done immediately.
Visits our Health Blogs:--
Health Plus Pharmacy - Health Related Terms - Health Related Terms - ISO 27001
Java questions for Exams
Posted by Rajiv Pandey in Future of IT, Interview Tips, Java, Question Papers
Q:How can I write a program that takes command line input?
A:Java programs that take input from the command line declare a special static method called main, which takes a String array as an argument and returns void। The example program below loops through any arguments passed to the program on the command line and lists their values. More details available to subscribers:How can I write a program that takes command line input?
Q: What does public static void main(String[]) mean?
A: This is a special static method signature that is used to run Java programs from a command line interface (CLI)। There is nothing special about the method itself, it is a standard Java method, but the Java interpreter is designed to call this method when a class reference is given on the command line, as below. More details available to subscribers:What does public static void main(String[]) mean?
Q: Why are command line arguments passed as a String?
A: Command line arguments are passed to the application's main method by the Java runtime system before the application class or any supporting objects are instantiated। It would be much more complex to define and construct arbitrary object types to pass to the main method and primitive values alone are not versatile enough to provide the range of input data that strings can. String arguments can be parsed for primitive values and can also be used for arbitrary text input, file and URL references.
Q: Why doesn't the main method throw an error with no arguments?
A: When you invoke the Java Virtual Machine on a class without any arguments, the class' main method receives a String array of zero length। Thus, the method signature is fulfilled. Provided the main method does not make any reference to elements in the array, or checks the array length before doing so, no exception will occur.
Q: Why do we only use the main method to start a program?
A: The entry point method main is used to the provide a standard convention for starting Java programs। The choice of the method name is somewhat arbitrary, but is partly designed to avoid clashes with the Thread start() and Runnable run() methods, for example.
Q: Can the main method be overloaded?
A: Yes, any Java method can be overloaded, provided there is no final method with the same signature already। The Java interpreter will only invoke the standard entry point signature for the main method, with a string array argument, but your application can call its own main method as required. Main method modifiers Q: Can the main method be declared final? A: Yes, the static void main(String[]) method can be declared final.
Q: I get an exception if I remove the static modifier from main!
A: The static void main(String[]) method is a basic convention of the Java programming language that provides an entry point into the runtime system। The main method must be declared static because no objects exist when you first invoke the Java Virtual Machine (JVM), so there are no references to instance methods. The JVM creates the initial runtime environment in which this static method can be called, if you remove the static modifier, it will throw a NoSuchMethodException. Application start up
Q: What is threaded programming and when is it used?
A: Threaded programming is normally used when a program is required to do more than one task at the same time। Threading is often used in applications with graphical user interfaces; a new thread may be created to do some processor-intensive work while the main thread keeps the interface responsive to human interaction. The Java programming language has threaded programming facilities built in, so it is relatively easy to create threaded programs. However, multi-threaded programs introduce a degree of complexity that is not justified for most simple command line applications.
Q: Why are wait(), notify() and notifyall() methods defined in the Object class?
A: These methods are detailed on the Java Software Development Kit JavaDoc page for the Object class, they are to implement threaded programming for all subclasses of Object.
Q: Why are there separate wait and sleep methods?
A: The static Thread।sleep(long) method maintains control of thread execution but delays the next action until the sleep time expires। The wait method gives up control over thread execution indefinitely so that other threads can run. More details available to subscribers:Why are there separate wait and sleep methods? Threads and runnable types
Q: What's the difference between Thread and Runnable types?
A: A Java Thread controls the main path of execution in an application। When you invoke the Java Virtual Machine with the java command, it creates an implicit thread in which to execute the main method. The Thread class provides a mechanism for the first thread to start-up other threads to run in parallel with it. The Runnable interface defines a type of class that can be run by a thread. The only method it requires is run, which makes the interface very easy to to fulfil by extending existing classes. A runnable class may have custom constructors and any number of other methods for configuration and manipulation.
Latest Seo Services By Seo SupportJava, the language- is a high-level object-oriented programming language, influenced in various ways by C, C++, and Smalltalk, with ideas borrowed from other languages as well (see O'Reilly's History of Programming Languages). Its syntax was designed to be familiar to those familiar with C-descended "curly brace" languages, but with arguably stronger OO principles than those found in C++, static typing of objects, and a fairly rigid system of exceptions that require every method in the call stack to either handle exceptions or declare their ability to throw them. Garbage collection is assumed, sparing the developer from having to free memory used by obsolete objects.
One of Java's more controversial aspects--widely accepted at the time of its release but increasingly criticized today--is its incomplete object-orientation. Specifically, Java primitives such as int, char, boolean, etc. are not objects, and require a completely different treatment from the developer: as int is not a class, you cannot subclass and declare new methods on it, cannot pass it to a method that expects a generic Object, and so on. The inclusion of primitives increases Java performance, but at the arguable expense of code clarity, as anyone who's had to work with the so-called "wrapper classes" (Integer, Character, and Boolean) will attest. Java 5.0 introduces an "autoboxing" scheme to eliminate many uses of the wrapper classes, but in some ways it obscures what is really going on.
Frequently asked questions about Java...
1. What are the primitive types in Java?
2. How do you declare constant values in java?
3. Do primitive types have a class representation?
4. What does a static inner class mean? How is it different from any other static member?
5. What are the different kinds of exceptions? How do you catch a Runtime exception?
6. What are the disadvantages of reference counting in garbage collection?
7. What is the sweep and paint algorithm?
8. What is reflection API? How are they implemented?
9. What is the primary advantage of XML driven Java Beans?
10. In Java,how are objects/values passed around?
11. What are the differences between AWT and Swing?
12. What is phantom memory?
13. What are the differences between EJB and Java beans?
14. What are STRUTS?
15. How can you do multiple inheritance in Java?
16. What is data encapsulation? What does it buy you?
17. What are the differences between ArrayList and a Vector?
18. How are memory leaks possible in Java?
19. why multiple inheritance using classes is disadvantage in java?
20. What is the basic difference between Java and .Net?
21. What is the difference between an object and an instance? And give me a real time example to differ?
22. why java does not support Multiple Inheritance?
23. Why java does not support Multiple Inheritance?Why java is not pure Object Oriented?
24. Whether a Class,Method can be garbage collected or not?How?
25. Whether private,protected method can be overloaded,overrided or not?Tell me reason?
26. Why ArrayList is faster than Vector?
27. Meaning - Abstract classes, abstract methods?
28. please tell me about oops?
29. what is main difference between jsp and servlets?
30. what is jdbc?
31. what is difference between procedure and functions?
32. What is run time polymorpism and complie time polymmorpism?
33. what is differents between object and static object?
34. what is a concrete classes? is java object class is concrete class?
35. What are java archives?
36. what is the difference between call by value, call by reference, call by address?
37. Can an exception be rethrown?
38. Which class is the immediate superclass of the Container class?
39. If a method is declared as protected, where may the method be accessed?
40. What is the return type of a program's main() method?
41. What class of exceptions are generated by the Java run-time system?
42. What is the difference between a field variable and a local variable?
43. Under what conditions is an object's finalize() method invoked by the garbagecollector?
44. What is a void return type?
45. What is the purpose of the enableEvents() method?
46. What is the purpose of garbage collection?
47. What restrictions are placed on method overriding?
48. What happens if an exception is not caught?
49. How can a dead thread be restarted?
50. What methods are used to get and set the text label displayed by a Button object?
Snow Effect

Contact


Contributors

- Rajiv Pandey
- Visit here to know more about me - http://www.rajivweb.com/about-me/
Recent Posts
Blog Archive
- September 2012 (1)
- February 2009 (3)
- January 2009 (3)
- December 2008 (4)
- November 2008 (2)
- October 2008 (2)
- September 2008 (3)
- August 2008 (4)
- July 2008 (3)
- June 2008 (5)
- May 2008 (2)
- April 2008 (3)
- March 2008 (1)
- February 2008 (3)
- January 2008 (2)
- December 2007 (5)
- November 2007 (6)
- October 2007 (8)
Categories
- Bidding Directory
- Business
- Career
- Creative
- Data Flow
- Deep Bidding Directory
- Free Online Games
- Future of IT
- Improve
- Internet
- Interview Tips
- Java
- Keyword Density
- Knowledge
- law
- Link
- Link Building
- List of Blogs
- Meta
- Meta Tags
- News
- On-page optimization
- Page Rank
- Question Papers
- Search Engine
- SEM
- SEO
- Tips
- Web2.0
- Website