Companies across all the industries like Manufacturing, BFSI, Retail, Service, Telecom, ITES, Pharma & Healthcare, Infrastructure & Construction, Automotive, Education, Government, Public Sector, etc can benefit from BI
Technology problems
Search Results
1. What are the different types of assemblies? Explain them in detail.
Correct Answer: The following are the two types of assemblies: => Private Assembly - Refers to the assembly that is used by a single application Private assemblies are kept in a local folder in which the client application has been installed => Public or Shared Assembly - Refers to the assembly that is allowed to be shared by multiple applications A shared assembly must reside in Global Assembly Cache (GAC) with a strong name assigned to it For example, imagine that you have created a DLL containing information about your business logic This DLL can be used by your client application In order to run the client application, the DLL must be included in the same folder in which the client application has been installed This makes the assembly private to your application Now suppose that the DLL needs to be reused in different applications Therefore, instead of copying the DLL in every client application folder, it can be placed in the global assembly cache using the GAC tool These assemblies are called shared assemblies
Correct Answer: Assemblies are the basic building blocks required for any application to function in the NET realm They are partially compiled code libraries that form the fundamental unit of deployment, versioning, activation scoping, reuse, and security Typically, assemblies provide a collection of types and resources that work together to form a logical unit of functionality They are the smallest deployable units of code in NET Compared to the executable files assemblies are far more reliable, more secure, and easy to manage An assembly contains a lot more than the Microsoft Intermediate Language (MSIL) code that is compiled and run by the Common Language Runtime (CLR) In other words, you can say that an assembly is a set of one or more modules and classes compiled in MSIL, and metadata that describes the assembly itself, as well as the functionalities of the assembly classes
3. Describe the situations in which AJAX should not be used.
Correct Answer: You should not use AJAX if: => You want the page to show in a search engine, such as Google, because WebCrawler does not execute JavaScript code => The browser does not support JavaScript => You want to create a secure application
4. How many validation controls are available in ASP.NET AJAX 4.0?
Correct Answer: The following validation controls are available in ASPNET AJAX 40: => FilteredTextBoxExtender - Enables you to apply filtering to a text box => MaskedEditExtender and MaskedEditValidator - Restricts a user to enter only a certain pattern of characters in the TextBox by applying a mask to the input => ValidatorCalloutExtender - Attaches to the ASPNET validators so that the error messages are not displayed as a simple text but as a balloon-style ToolTip => NoBot - Prevents the spam/bot from filling the input forms automatically and uses the Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), which is a type of challenge-response test to ensure that the response is not generated by the computer => PasswordStrengthExtender - Measures the strength of the password text entered within the text box by validating with the different strength specified parameters
Correct Answer: ASPNET AJAX, mostly called AJAX, is a set of extensions of ASPNET It is developed by Microsoft to implement AJAX functionalities in Web applications ASPNET AJAX provides a set of components that enable the developers to develop applications that can update only a specified portion of data without refreshing the entire page The ASPNET AJAX works with the AJAX Library that uses object-oriented programming (OOP) to develop rich Web applications that communicate with the server using asynchronous postback
6. What are the examples of BI Initiatives (Focus Areas)?
Correct Answer: For any member of the company who makes decisions based on transactional systems' data Such systems may be oriented to different levels (analysts, managers, directors, auditors, etc), providing different kinds of information in each case
8. Explain the SQL Server 2005 Business Intelligence components.
Correct Answer: - SQL Server Integration Services:- Used for data transformation and creation Used in data acquisition form a source system - SQL Server Analysis Services: Allows data discovery using data mining Using business logic it supports data enhancement - SQL Server Reporting Services:- Used for Data presentation and distribution access
Correct Answer: Dashboards are real-time business intelligence interfaces They allow a huge amount of data to be read in a single interface in order to analyse the success or failure of the business or project in question
10. Does Business Intelligence (BI) works with existing applications and databases?
Correct Answer: Yes Business Intelligence (BI) solution like 1KEY is designed to interoperate with data that exists in virtually any enterprise data source, such as Oracle, IBM DB2, or Sybase For example, you can use SQL Server 2005 Reporting Services to run reports on data stored in an Oracle database Also, SQL Server 2005 Integration Services can be used to extract data to or from any OLEDB data source 1KEY can connect to multiple database, multiple applications like ERP, CRM, SCM, HRM, financial accounting or any other core transactional application (SAP, Orracle E-Business Suite, PeopleSoft, JD Edwards, Siebel, QAD MFG/Pro, Microsoft Dynamics, Navision, Ramco, TallyERP)