December 22, 2005

Linux screensaver for Windows

Link This Linux screensaver is from Nathalie Carrie and Arnaud Verhille, science teachers on Reunion Island, a French colony in the Indian Ocean. This screensaver comes equipped with 700MB of applications to help school children learn their math and physics. Linux screensaver for Windows "This Linux screensaver is from Nathalie Carrie and Arnaud Verhille, science teachers on Reunion Island, a French colony in the Indian Ocean. This screensaver comes equipped with 700MB of applications to help school children learn their math and physics.

December 09, 2005

December 08, 2005

View the Message Source in Outlook 2003

View the Message Source in Outlook 2003 ***New to Outlook 2003*** Outlook doesn't have a View, Source option like you'll find in Outlook Express. It has View, Options which shows you the Internet header in a small text box. But it only includes the Internet header, not the full message source. Using Outlook 2003 you can view the header and source together, if you edit a registry key. This works on mail obtained from Internet mail transports, not Exchange server mailboxes. However, if you access the mailbox using an Internet transport, you'll see the full source. Open the registry editor and navigate to: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\Options\Mail right click on the right pane and choose new DWORD: Parameter: SaveAllMIMENotJustHeaders Value: 1 Note: This works only on new mail received after you create the registry key. You won't be able to see the source on messages already downloaded. "

December 01, 2005

WISER

This is what Java Server Faces should have been from the beginning. A UI framework for generating swing or web interfaces from one set of source code.

November 21, 2005

How To Write Unmaintainable Code

Quidquid latine dictum sit, altum sonatur. - Whatever is said in Latin sounds profound.

November 17, 2005

Metaphor, Morality, and Politics

Metaphor, Morality, and Politics Liberals do not understand what unifies their own worldview and so are helpless to deal effectively with conservatism. Not only is there no unified liberal political structure, but there is no overall effective liberal rhetoric to counter the carefully constructed conservative rhetoric. Where conservatives have carefully coined terms and images and repeated them until they have entered the popular lexicon, liberals have not done the same. Liberals need to go beyond coalitions of interest groups to consciously construct a unified language and imagery to convey their worldview. This will not be easy, and they are 30 years behind.

Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes | Linux Journal

Watch the language. While the one side talks about licenses with verbs like copy, distribute, play, share and perform, the other side talks about rights with verbs like own, protect, safeguard, protect, secure, authorize, buy, sell, infringe, pirate, infringe, and steal. link

November 16, 2005

Type Manager

I would like to introduce you to the future of desktop applications, the Type Manager.

October 21, 2005

DB2 +WAS + Linux on VMware Workstation

DB2 Universal Database (DB2 UDB) is the most scalable and powerful database in production today. DB2, VMware, and Novell SUSE have joined forces to bring you the experience of the data center right to your PC. With the DB2 for Linux images for VMware Workstation - you can quickly and easily deploy your own pre-configured DB2 database. http://www-306.ibm.com/software/data/db2/linux/vmware/

October 20, 2005

Gore on democracy

I came here today because I believe that American democracy is in grave danger. It is no longer possible to ignore the strangeness of our public discourse . I know that I am not the only one who feels that something has gone basically and badly wrong in the way America’s fabled “marketplace of ideas” now functions. http://waterthread.org/?page_id=192

October 17, 2005

Space Elevator Interview

In my mind the Space Shuttle and Space Station are not valuable efforts. It’s not what NASA should be doing. NASA is using technology from commercial enterprises, or very old technology from the 70’s to try and do space exploration. If they are going to be a real premier space agency, they need to be pushing it. They should be doing stuff which looks to us like science fiction… link

October 12, 2005

3D graphics for Java mobile devices, Part 1: M3G's immediate mode

http://www-128.ibm.com/developerworks/wireless/library/wi-mobile1/?ca=dgr-lnxw01Java3DMobile

October 10, 2005

September 29, 2005

P4 Integration Home Page

Emacs P4 Integration Home Page: "P4-Windows Explorer Integration package (4KB) is also available (ins a rudimentary form) for those who would like to perform P4 operations by right-clicking on a file or a directory. The current version is 1.1. The format of the distribution is a gzipped-tar file (.tar.gz). "

September 28, 2005

Microsoft, JBoss link server software | CNET News.com

http://beta.news.com.com/Microsoft,+JBoss+link+server+software/2100-7344_3-5883498.html

September 27, 2005

Armed and dangerous - Flipper the firing dolphin let loose by Katrina

The Observer | International | Armed and dangerous - Flipper the firing dolphin let loose by Katrina: "It may be the oddest tale to emerge from the aftermath of Hurricane Katrina. Armed dolphins, trained by the US military to shoot terrorists and pinpoint spies underwater, may be missing in the Gulf of Mexico."

September 13, 2005

QOTD

The difference between a Miracle and a Fact is exactly the difference between a mermaid and a seal. -- Mark Twain

September 12, 2005

You Can Use an IPod to Move Music

You Can Use an IPod to Move Music Apple doesn't make it easy to employ your IPod to duplicate your music collection on both your work and home PCs, but you can do it. If you have a Windows machine, simply plug in your IPod, find it listed in Windows Explorer, and make sure your machine can view hidden files. Open the 'IPod_Control' folder and copy the 'My_Music' folder to your PC. Import those tracks into ITunes and put them in order there. Select Edit, Preferences, and choose the Advanced tab. Select a location for your music library by clicking the Change button, and then check Keep iTunes Music folder organized. Utilities such as the $15 IPodRip--available for PCs and Macs from The Little App Factory--can help automate this process."

August 30, 2005

Metadata Evolution Management in Your SOA @ SOA WEB SERVICES JOURNAL

Metadata Evolution Management in Your SOA @ SOA WEB SERVICES JOURNAL: "Doing all of the above correctly gives us the perfect solution to the life-cycle management of metadata-driven Web service development. In a nutshell, when metadata drives evolution, we manage the metadata evolution process by applying a model-driven methodology for exposing, standardizing, and federating the metadata."

August 22, 2005

Disable Auto Reboot after Windows Auto Update

  • In the Start Menu go to Run type “gpedit.msc” and press Enter
  • Now a Group Policy editor will open. In this window navigate to: Computer Configuration -> Administrative Template -> Windows Components -> Windows Update
  • Double click on No auto-restart for scheduled Automatic Updates installations
  • In the settings window Choose Enabled and click OK
  • Close Group Policy Editor 
  

August 10, 2005

August 05, 2005

Joel on Software - Hitting the High Notes

Joel writing about how hiring great developers really does matter: Joel on Software - Hitting the High Notes

July 29, 2005

Olympia Boat Rentals

If you're looking to do it near Olympia, Boston Harbor Marina rents 2 sailboats http://www.bostonharbormarina.com/Rentals.htm I rented a paddle boat there a few weeks ago, but the sailboats were out at the time. (Also rented a really nice speedboat from these guys: http://www.zittelsmarina.com/boatrental.php )

June 03, 2005

Drip: IE Leak Detector

Drip: IE Leak Detector: "Basically, it lets you open an HTML page (or pages, in succession) in a dialog box, mess around with it, then check for any elements that were leaked."

May 27, 2005

New Scientist 11 steps to a better brain - Features

New Scientist 11 steps to a better brain - Features: "There are lots of tricks, techniques and habits, as well as changes to your lifestyle, diet and behaviour that can help you flex your grey matter and get the best out of your brain cells. And here are 11 of them"

May 24, 2005

Science & Technology at Scientific American.com: Bring Back the OTA

Science & Technology at Scientific American.com: Bring Back the OTA: "More than ever, those elected to govern are in need of timely, high-quality, impartial advice on matters of science and technology. Yet for nearly a decade now, one of the most successful agencies for providing just such advice--the Office of Technology Assessment (OTA)--has been defunct."

Some AJAX links

May 12, 2005

Napkin Look & Feel

This is a great swing look and feel! Napkin Look & Feel

May 11, 2005

[print version] Johnny can so program | CNET News.com

[print version] Johnny can so program | CNET News.com No, Johnny's ability to program hasn't slipped. What has slipped, though, is his respect for our cherished major American institutions--industry, academia, Congress and, most sadly, the press.

CVS to Perforce Transition Guide

 
 
 

May 10, 2005

Dual Photography

This is really cool. Really. Dual Photography

April 27, 2005

CM Interview Questions

Here are a bunch of CM interview questions. Most are from here

Q Please describe the purpose of Software Configuration Management?
A The purpose of Software Configuration Management is to establish and maintain the integrity of the products of the software project throughout the project’s software lifecycle.

Q Give me some examples of problems caused by the lack of Software Configuration Management?
A Examples are:
• The latest version of source code cannot be found
• A difficult bug that was fixed at great expense suddenly reappears
• A developed and tested feature is mysteriously missing
• A fully tested program suddenly does not work
• The wrong version of the code was tested
• There is no traceability between the software requirements, documentation and code
• Programmers are working on the wrong version of the code
• The wrong version of the configuration items is being baselined
• No one knows which modules comprise the software system delivered to the customer

Q Please give me your definition of a Baseline.
A A baseline is an approved snapshot of the system at appropriate points in the development lifecycle. A baseline can be a specification, a product that has been formally reviewed and agreed upon or even a partial system under formal change control.

Q What does baselining provide?
A Baselining provides:
• A baseline establishes a formal base for defining subsequent change. Without this line or reference point the notion of change is meaningless
• The items in the baseline form the basis for the work in the next phase of the software development cycle
• The items of the next baseline are measured and verified against previous baselines before they become baselines themselves

Q How can one file compare future dated output files from a program which has change, against the baseline run which used current date for input. The client does not want to mask dates on the output files to allow compares. A Rerun baseline and future date input files same # of days as future dated run of program with change. Now run a file compare against the baseline future dated output and the changed programs' future dated output.

Q Please describe the difference between a configuration item, a version, a variant, a configuration, and a baseline?
A A CONFIGURATION ITEM is a work product (documents, code, unit test, etc...) identified and explicitly placed under configuration control.
A VERSION is a defined state of a configuration item at a particular time. Each time a configuration item is revised and replaced under configuration control, a new VERSION is created.
A VARIANT is one of several versions of a configuration item that exist at the same time.
A CONFIGURATION is a collection of configuration item versions that are put together (to form a module, a subsystem, a product, etc..)
A BASELINE is a configuration whose content has been carefully recorded and verified as coherent

Q Give me some characteristics of a good change control process.
A A process that:
• Specifies who can initiate the change request
• Identifies the individuals, group, or groups who are responsible for evaluating, accepting, and tracking the change proposals for the various baselined products
• The “change impact” analysis expected for each requested change
• How the change history should be kept

Q Please give your reaction to the statement – “Without change control a software engineer could make an important change to a configuration item or its interfaces without a lot of extra work and red tape.”
A This may be true but no record would be kept for:
• What the change was and why the change was requested
• Who wanted the change made
• Who approved the change
• Who made the change
• Who verified the change

Q The term SCCB or CCB comes up often when discussing change control. Please tell me what that term stands for and what its purpose is?
A The term stands for Software Configuration Control Board or Configuration Control Board and it:
• Authorizes the establishment of baselines and the identification of configuration items
• Represents the interests of all groups who may be affected by changes to the baselines
• Authorizes changes to the baselines
• Authorizes creation and release of products
Q Please explain what Configuration Status Accounting is.
A A function that maintains a continuous record of the status and history of all baselined items and proposed changes to them and reports on the metrics and traceability of all changes to the baseline throughout the software lifecycle

Q Give me some examples of what information a configuration status accounting system may include.
A Examples are:
• The time at which each baseline was established
• When each software configuration item and change was included in the baseline
• A description of each configuration item
• All change requests
• The description of each software change
• The status of each software change request
• The changes planned for each identified future baseline
• A configuration item index that lists each configuration item along with its creation date and current released version
• Change logs that show the history of the changes made to the source files as well as their release histories

Q Please give some examples of configuration status reports.
A Examples are:
• SCCB meeting minutes
• Change request summary and status
• Trouble report summary and status
• Summary of changes made to the software baselines and their frequency
• Revision history of all configuration items
• Results of software baseline audits

Q Give some examples of questions that a comprehensive configuration status report may answer?
A Examples are:
• What is the status of an item? (Specification approved? Subsy
stem been tested? State of a project item – Developed, reviewed, tested, …)
• Has a change request been approved or rejected by the SCCB?
• Which version of an item implements an approved change request?
• What is different about a new version of a system?
• How many faults are detected each month and how many are fixed?
• What is the cause of the trouble report?

Q What is the configuration auditing function?
A The configuration audit verifies that the software product is built according to the requirements, standards, or contractual agreement. It verifies that all software products have been produced, correctly identified and described, and that all change requests have been resolved.

Q The term “FCA” is often seen when configuration audits are described. What does it stand for and what is its purpose?
A The term stands for Functional Configuration Audit. It is the formal examination of functional characteristics of a configuration item, or system to verify that the item has achieved the requirements specified in its functional and/or allocated configuration documentation.

Q The term “PCA” is often seen when configuration audits are described. What does it stand for and what is its purpose?
A The term stands for Physical Configuration Audit. It is the formal examination of the "as-built" configuration of a configuration item against its technical documentation to establish or verify the configuration item's product baseline.

Q What is the purpose of a Software Configuration Management Plan?
A The Software Configuration Management Plan documents how configuration management is to be applied to the project. It describes all aspects of configuration management including identifying SCM roles and responsibilities, SCM procedures and practices to be followed, libraries to be established, change authorities, backup and archiving.

Q What distinguishes one SCMP from another?
A Each plan must take into account the specific needs and characteristics of the project.

Hiring Technical People

Hiring Technical People

April 25, 2005

Scientific American: His Brain, Her Brain

Scientific American: His Brain, Her Brain

Playing partisan politics with international telecom standards

Playing partisan politics with international telecom standards: "ated money to the minority party candidate in this past presidential election, regardless of their level of technical expertise, is now, according to a White House spokesman, unfit for participation in the international standards setting process. The Bush administration may deny that they pressure scientists politically, but engineers are apparently fair game not just for ideologically driven political pressure, but for partisan political pressure. Instead of offering my opinion on this--anyone who reads the site can guess what I think about it--I'd like to open the topic for discussion. But before we dive into what may be a flame war on the merits, or lack thereof, of playing partisan politics with the international te"

Programming with COME FROM

Best of DATAMATION: GOTO-less: "Although it is clear that the COME FROM statement fulfills most of the requirements of the advocates of GOTO-less programming, it remains for the practitioners of automatic programming to evaluate just how much this construct contributes to the development of automatic proofs of program correctness. Having at last put to rest to GOTO controversy, we now may enter the era of the COME FROM conundrum."

Institute for Backup Trauma

Institute for Backup Trauma

April 21, 2005

kidlinks

kidlinks Dvorak Kids

The Becker-Posner Blog

I'm adding this blog to my reading list. 2 guys debating in essay form. The Becker-Posner Blog

April 13, 2005

Transgressing the Boundaries: An Afterword

Transgressing the Boundaries: An Afterword: "The displacement of the idea that facts and evidence matter by the idea that everything boils down to subjective interests and perspectives is -- second only to American political campaigns -- the most prominent and pernicious manifestation of anti-intellectualism in our time." (explaining this parody.

April 08, 2005

Building Gab: Part One: Corante > The Loom >

Building Gab: Part One: Corante > The Loom >: "In 1990, Steven Pinker (now at Harvard) and Paul Bloom (now at Yale) published a paper called 'Natural Selection and Natural Language.' They laid out a powerful argument for language as being an adaptation produced by natural selection. In the 1980s some pretty prominent scientists, such as Stephen Jay Gould, had claimed that the opposite was the case--namely, that language was merely a side effect of other evolutionary forces, such as an increase in brain size. Pinker and Bloom argued that the features of language show that Gould must be wrong. Instead, they maintained, language shows all the classic hallmarks of an adaptation produced by natural selection."

April 06, 2005

Gödel's incompleteness theorem -

G�del's incompleteness theorem - Wikipedia, the free encyclopedia: "Gödel's second incompleteness theorem, which is proved by formalizing part of the proof of the first within the system itself, states: No consistent system can be used to prove its own consistency."

Ivars Peterson's MathTrek - Calculus Made Easy

Ivars Peterson's MathTrek - Calculus Made Easy

How To Ace Calculus

How To Ace

April 05, 2005

TomsNetworking Product Reviews : TomsNetworking :

TomsNetworking Product Reviews : TomsNetworking :: "The folks at Moser Informatik have cooked up their Auditor Security Collection (ASC) CD, which has 300 network security programs pre-installed. Here is the best part, it's FREE."

April 04, 2005

Netzstaub: iPod-surgery

Netzstaub: iPod-surgery I figured the only solution would be to map the defective sectors by hand. A program would read a block, see if the ipod locked up by getting a timeout, reset the ipod, and try the next block. This way, I could get a pretty good image of which block were defective. The second tool would then take these sector numbers, add a few blocks of padding, and mark them as defective in the FAT (and in the FAT backup copy). The ipod would then handle these sectors as defective from the start.

The word of the day is "Portmanteau"

Portmanteau - Wikipedia, the free encyclopedia: "A portmanteau (plural: portmanteaus or portmanteaux) is a word that is formed by combining two words"

SchoolTool - The SchoolTool Project

SchoolTool - The SchoolTool Project: "SchoolTool is a project to develop a common global school administration infrastructure that is freely available under an Open Source licence."

The Free (and 99.9% foolproof) way of ridding your computer of Spyware

The Free (and 99.9% foolproof) way of ridding your computer

April 01, 2005

All I want for Christmas is...

So, it turns out there really was a StarWars Christmas Special:

LucasFan and Oh, The Humanity have commentary.

pairon


pairon, originally uploaded by infoslave.

http://www.cenqua.com/pairon/

untitled

A couple new products that look promising:  Commentator for automatic source code comment generation, and The PairOn Chair for efficient pair programming.

 

--Mike

 

P2P Revolution: Opera Announces Platform-Independent Real-Time Speech Technology

P2P Revolution: Opera Announces Platform-Independent Real-Time Speech Technology

March 30, 2005

PP5020 - WikiPodLinux

PP5020 - WikiPodLinux

PortalPlayer, Inc. -- Technical Information

PortalPlayer, Inc. -- Technical Information

/k/ Embedded Java Solutions - Mi|k|a(TM) Datasheet

/k/ Embedded Java Solutions - Mi|k|a(TM) Datasheet

The simple Real Time Java

The simple Real Time Java

Folklore.org: Macintosh Stories: Reality Distortion Field

Folklore.org: Macintosh Stories: Reality Distortion Field

Slashdot | 2005 Star Wars Fan Film Entries Online

Slashdot | 2005 Star Wars Fan Film Entries Online

Wired 13.04: La Vida Robot

This is really an amazing story: Wired 13.04: La Vida Robot: "Ever since his younger sister demanded her own room four years ago, Cristian Arcega had been living in a 30-square-foot plywood shed attached to the side of his parents' trailer. He liked it there. It was his own space. He was free to contemplate the acceleration of a raindrop as it leaves the clouds above him. He could hear it hit the roof and slide toward the puddles on the street outside. He imagined that the puddles were oceans and that the underwater robot he was building at school can explore them"

March 28, 2005

Somebody else's Java Interview Questions

Java Interview Questions

Java Interview Questions for Java Programmers

This is the short version of the java interview questions I use each time I interview a potential java developer. In person, I'll always add 'Diagram the complete lifecycle of how a request becomes a response in the enterprise architecture of your choosing', but that one is tough over the phone!

Interview Questions

General (tell them you want 10 sec. answers)

  1. What is inheritance?

Re-using the implementation of one class to make a new class. Also might mention subclassing, ‘is-a relationships’, parent/child relationships.

  1. What is polymorphism?

Allowing the same code to be used with different types, resulting in more general and abstract implementations.

  1. What is encapsulation?

Information hiding of design details. Protecting data and private methods, and only exposing the attributes or operations that are necessary.

Java (tell them you want 10 sec. answers)

  1. What kinds of literals/primitives does java provide? (Or, what in java is NOT an object)

boolean, char, byte, short, int, long, float, double

  1. What does the ‘static’ keyword do?

Makes an attribute or method a ‘class’ attribute or method. There exists exactly one incarnation of the field, no matter how many instances (possibly zero) of the class may eventually be created

  1. Describe the different java protection levels.

Private – The member is accessible only within the class that defines it.

Default (aka package) – The member is accessible only within the package in which it is defined.

Protected – The member is accessible only within the package in which it is defined and within subclasses.

Public – The member is accessible anywhere its class is.

  1. What are the differences between checked and unchecked exceptions?

Only checked exceptions need to be explicitly ‘caught’. Unchecked exceptions are subclasses of Error, while checked exceptions are subclasses of Exception.

  1. What are the differences between abstract classes and interfaces?

Anything except visible forehead sweat. Single vs. Multiple inheritance; interfaces are entirely abstract; abstract classes provide partial implementation; etc.

  1. How do you sort a collection?

Call the java.util.Collections.sort() method, passing in the collection you need sorted, and optionally, a comparator

Database (tell them you want 30 sec. answers)

  1. Describe database normalization, including when it’s appropriate.

Database normalization is the process of removing redundant data to improve integrity, scalability, and storage efficiency. Normalization tends to trade off with performance, so it's a question of balancing data redundancy and integrity against performance. Normalize less if you want simple queries, archival quality records, online reporting, or good performance.

Bonus points for definitions of different normal forms:

1NF: tables have no internally redundant columns, and are rows are uniquely identifiable by a unique column or columns

2NF: every non-key column is dependent on the primary key

3NF/BCNF: every non-key column is only dependent on the primary key, and no other columns

4NF: No multi-value dependencies

  1. When would you create an index?

To speed up queries on a non-key column. If a table is large enough that a sequential scan takes too long to filter by some column(s), create an index.

  1. When would you create a view?

To simplify queries. Maybe also to present a part of a table with different names or permissions.

  1. Describe inner, outer and full joins.

An inner join returns only records which satisfy the join condition.

An outer join returns all records from one table, and matching records from the other where the join condition is satisfied.

A full outer join returns all records from both tables, matching where the join condition is satisfied.

Bonus points for mentioning the difference between left/right, or cross joins/cartesian products.

Front End (tell them you want 30 sec. answers)

  1. Describe techniques for updating a page without the browser flashing or redrawing the whole thing.

Use javascript or vbscript to modify the DOM directly. (Bonus for mentioning loading the data in a background iframe)

  1. What is the difference between a Java Server Page and a Servlet?

A JSP is translated into a servlet by a precompiler that converts non-java text into write or print statements. Other than that THEY ARE THE SAME THING.

  1. How do you get data from a FORM in the browser to a servlet?

A browser action (click or Enter) SUBMITs an html form. The servlet accesses the data by calling getParameter on the Request object.

J2EE (tell them you want 30 sec. answers)

  1. Contrast Stateless vs. Statefull Session Beans.

A stateless session bean does not maintain a conversational state with the client it is servicing. A stateful session bean is dedicated to the one client it is servicing for the life of the bean instance, so data about the client can be cached between method invocations.

  1. Contrast CMP vs. BMP.

Container Managed Persistence means all persistence is handled by the EJB container. A developer doesn’t have to worry about writing persistence code that is specific to the database because it is automatically generated by the EJB container. In Bean Managed Persistence developers write all of the code to manage persistence.

  1. What is a Home Interface, Local Interface, and a Remote Interface.

Home Interface –Home interfaces are used to create, locate, and remove objects from EJB containers (and sometimes databases).

Local Interface – Used when calling the business methods by clients that reside in the same JVM. Parameters are passed by reference.

Remote Interface – Used when calling the business methods by clients that reside in another JVM. Parameters are passed by value.

Subjective

  1. How do you get started coding when you don’t have good documentation for your task?

Just looking for some answer that says they’ll get along here. Anything except “I won’t start coding until the BAs give me good UML diagrams”

  1. You are given requirements to create a new screen that allows the user to input customer contact information. What are the steps you would take to implement it? What would you consider when designing and implementing the code?

The key is asking for more information. Anything except “just start coding”.

  1. Talk about design diagrams and what you find useful.

Looking for anything that sounds compatible with the status quo here. Nice to have, good tool for developers to use to communicate, etc.

  1. When you need to learn something new, where do you go for information?

Google. Books. Anything that demonstrates that they can learn new things.

  1. How do you feel about working on projects in an Agile environment vs. a linear methodology?

Must like agile.

  1. How do you feel about pair programming?

Must be ok with pairing and think it at least ‘has its place.’

Grand Total:

And the scoresheet I use for each candidate:

Interview Questions

Name_________________________________

General (tell them you want 10 sec. answers)

bad great

  1. What is inheritance?

0 1 2 3 4 5

  1. What is polymorphism?

0 1 2 3 4 5

  1. What is encapsulation?

0 1 2 3 4 5

total

Java (tell them you want 10 sec. answers)

0 1 2 3 4 5

  1. What kinds of literals/primitives does java provide? (Or, what in java is NOT an object)

0 1 2 3 4 5

  1. What does the ‘static’ keyword do?

0 1 2 3 4 5

  1. Describe the different java protection levels.

0 1 2 3 4 5

  1. What are the differences between checked and unchecked exceptions?

0 1 2 3 4 5

  1. What are the differences between abstract classes and interfaces?

0 1 2 3 4 5

  1. How do you sort a collection?

0 1 2 3 4 5

total

Database (tell them you want 30 sec. answers)

  1. Describe database normalization, including when it’s appropriate.

0 1 2 3 4 5

  1. When would you create an index?

0 1 2 3 4 5

  1. When would you create a view?

0 1 2 3 4 5

  1. Describe inner, outer and full joins.

0 1 2 3 4 5

total

Front End (tell them you want 30 sec. answers)

  1. Describe techniques for updating a page without the browser flashing or redrawing the whole thing.

0 1 2 3 4 5

  1. What is the difference between a Java Server Page and a Servlet?

0 1 2 3 4 5

  1. How do you get data from a FORM in the browser to a servlet?

0 1 2 3 4 5

total

J2EE (tell them you want 30 sec. answers)

  1. Contrast Stateless vs. Statefull Session Beans.

0 1 2 3 4 5

  1. Contrast CMP vs. BMP.

0 1 2 3 4 5

  1. What is a Home Interface, Local Interface, and a Remote Interface.

0 1 2 3 4 5

total

Subjective

  1. How do you get started coding when you don’t have good documentation for your task?

0 1 2 3 4 5

  1. You are given requirements to create a new screen that allows the user to input customer contact information. What are the steps you would take to implement it? What would you consider when designing and implementing the code?

0 1 2 3 4 5

  1. Talk about design diagrams and what you find useful.

0 1 2 3 4 5

  1. When you need to learn something new, where do you go for information?

0 1 2 3 4 5

  1. How do you feel about working on projects in an Agile environment vs. a linear methodology?

0 1 2 3 4 5

  1. How do you feel about pair programming?

0 1 2 3 4 5

total

Grand Total:

cellphonewithprojector


cellphonewithprojector, originally uploaded by infoslave.

http://www.physorg.com/news3505.html