Monday 27 April 2015

Oracle Application Interview Questions and Answers-4


                                 Page-4
46: What is adsplice utility ?
A: adsplice in oracle apps is utility to add a new product.

47: Can you enable diagnostics for EBS?
A: Yes. Enable profile option FND: Diagnostics.

48: adident utility is used for what ?
A: adident utility in oracle apps is used to find version of any file . AD Identification. for ex. "adident Header

49: Why do you need GUEST/ORACLE To connect to database?
A:  The GUEST user account is used in the application internally (it is an application user). One of the major needs of this account is when there is a need to decrypt the APPS password (which is stored in an encrypted format in the apps tables). In order to decrypt the APPS password, the GUEST username/password is used to accomplish this task (using “Guest User Password” profile option). GUEST account is used to obtain the decrypted value of the apps password for internal processes (i.e. when there is a need to connect as apps internally). when the account gets locked/end dated then you will see a blank page when you try to login to the instance.In that scenario you will have to correct this situation from the backend as you will not be able to login to the application. You will not find much details about the GUEST account documented anywhere ( may be coz of security reasons).

50: Does the Internal manager schedule requests to be run or does it put requests into queues to be run by other managers?
A: This is a very common misconception. The ICM really does not have any such scheduling responsibilities. It has NOTHING to do with scheduling requests, or deciding which manager will run a particular request. Its function is only to run 'queue control' requests, which are requests to startup or shutdown other managers. It is responsible for startup and shutdown of the whole concurrent processing facility, and it also monitors the other managers periodically, and restarts them if they should go down. It can also take over the Conflict Resolution manager's job, and resolve incompatibilities. If the ICM itself should go down, requests will continue to run normally, except for 'queue control' requests. You can restart it with 'startmgr', you do not need to kill the other managers first.

51: I hit the Restart button to start the Standard manager, but it still did not start?
A: Telling a manager to restart just sets the status to Restart. The ICM will start it the next process monitor session or the next time the ICM starts. Use Activate to start a manager immediately. When a manager is deactivated manually, the ICM will not restart it, you will need to set it to Restart, or activate it manually

52: What is your day to day activity as an Apps DBA?
A:  As an Apps DBA we monitor the system for different alerts (Enterprise Manager or third party tools used for configuring the Alerts) Tablespace Issues, CPU consumption Database blocking sessions..etc Regular maintenance activities like cloning,patching,custom code migrations (provided by developers) Working with user issues.

53: How often Do you patch?
A: Usually for non-production the patching request comes around weekly 4-6 and the same patches will be applied to Production in the outage or maintenance window. Production has weekly maintenance window (Eg Sat 6PM to 9PM) where all the changes (patches) will applied on production.

54: How often Do you clone?
A: Cloning happens biweekly or monthly depending on the organization requirement.

55: What is the meaning QA,CRP,SIT,DEV,UAT,PRE-PROD,PROD Instance?
A:
QA - Testing Instance
CRP - Conference Room Pilot
SIT - System Integration Testing
DEV - Development
UAT- User Acceptance Testing
STAGE - Pre-production Instance
Prod - Production/actual instance where the business is running


55: What do we have in FND_NODES?
A:  FND_NODES table contains information about node_names and services enabled on a node. In multinode instance if you want to know which node is running what services, You can query the fnd_nodes and get that information.


56: when do we run FND_CONC_CLONE.SETUP_CLEAN ?
A: FND_NODES table contains node information, If you have cloned test instance from production still the node information of production will be present after clone in the test instance. we use FND_CONC_CLONE.SETUP_CLEAN to cleanup FND_NODES table in the target to clear source node information as part of cloning.
Below syntax to execute:
SQL> sho user
USER is "APPS"
SQL> EXEC FND_CONC_CLONE.SETUP_CLEAN;
PL/SQL procedure successfully completed.
SQL> commit;
Commit complete.
This will delete all the entries in the fnd_nodes table, to populate it with target system node information, Run autoconfig on DB node and Applications node.

57: What is contex t file?
A: Contex t file is a central repository , which stores all application configuration information. The name is like _ .xml



<< page-3 >>

Saturday 25 April 2015

Oracle Application R12 Course Content

  • Application Architecture
  • File Structure
  • Installation
  • Patching
  • Cloning
  • Concurrent Manager
  • ADutilities
  • Autoconfig
  • Administration

Oracle 11g DBA Online Training

  • INTRODUCTION TO ORACLE DBA
  • DATABASE ARCHITECTURE
  • DATABASE CREATION
  • TABLESPACE MANAGEMENT
  • STORAGE PARAMETERS
  • USER MANAGEMENT
  • UNDO MANAGEMENT
  • PFILE and SPFILE
  • NETWORKING IN ORACLE
  • REDO-LOG & CONTROLFILE MANAGEMENT
  • LOGICAL BACKUP (DATAPUMP)
  • PHYSICAL BACKUP
  • CLONING
  • RMAN


SQL Course Content

  • Database concept
  • Database Object
  • DML
  • Operators
  • Functions
  • Tables
  • Constraints


Linux Course Contents


  • Introduction of Unix, Linux.
  • Directory structure and booting process.
  • Basic Linux commands.
  • User Management.
  • File Permission.
  • Mount Point Creation.
  • Networking.
  • FTP, NFS, SCP.
  • Package management.
  • Crontab.
  • Links.
  • Backup.



Online Training


Hi,

We are going to start online training in Oracle Applications DBA. We have experience in offline Oracle training now we are going to launch our Online program of Oracle Applications DBA. We will provide you materials related to the course, In depth knowledge of day-to-day activities, Guest Lecturers of working DBAs, Mock Interviews etc. We have divided the Course into 4 steps

1: Linux  

   .........................................Course content

2: SQL

............................................Course content

3: Oracle Core DBA 11g

...........................................Course content

4: Oracle Apps DBA R12

..........................................Course Content

Course Duration: 4 months

Contact us on:   appsdba.class@gmail.com                             08983402661







Wednesday 15 April 2015

Shell Scripting 1 (Introduction)


The first version of UNIX was created in 1969 by Kenneth Thompson and Dennis Ritchie, system engineers at AT&T's Bell Labs., and has since grown to become the most widely used operating system.

General Characteristics of UNIX as an Operating System (OS):

Multi-user & Multi-tasking:-
most versions of UNIX are capable of allowing multiple users to log onto the system, and have each
run multiple tasks. This is standard for most modern OSs.

Over 30 Years Old :- 
UNIX is over 30 years old and it's popularity and use is still high. Over these years, many variations
have spawned off and many have died off, but most modern UNIX systems can be traced back to the original versions.
It has endured the test of time. For reference, Windows at best is half as old (Windows 1.0 was released in the mid 80s, but it was not stable or very complete until the 3.x family, which was released in the early 90s).

Large Number of Applications :–  There are an enormous amount of applications available for UNIX operating systems. They range from commercial applications such as CAD, Maya, WordPerfect, to many free applications. 

Free Applications and Even a Free Operating System:-

of all of the applications available under UNIX, many of them are free. The compilers and interpreters that we use in most of the programming courses here at UMBC can be downloaded free of charge. Most of the development that we do in programming courses is done under the Linux OS.

Less Resource Intensive :- In general, most UNIX installations tend to be much less demanding on system resources. In many cases, the old family computer that can barely run Windows is more than sufficient to run the latest version of Linux.

Internet Development :- Much of the backbone of the Internet is run by UNIX servers. Many of the more general web servers run UNIX with the Apache web server - another free application.

Unix Family (Flavors):

Linux: Red Hat Linux (RedHat Softwares)
Solaris: By Sun Microsystems
Fedora: Owned by Redhat Softwares.
IBM-AIX: IBM
HP-UX: HP
OEL Oracle enterprise Linux: Oracle
And many more.

History Of Linux:

The History of Linux began in 1991 with the commencement of a personal project by a second year student of Computer Science at the University of Helsinki , Linus Torvalds, to create a new free operating system kernel. Since then, the resulting Linux kernel has been marked by constant growth throughout its history.


Features of Linux (Why Linux?):

Free:
A Linux Distribution has thousands of dollars worth of software for no cost.

Open Source:
Free software along with the Source Code and Documentation.

Multitasking:
Capable of Running multiple application and process at same time.

Multiuser:
Allow multi users to login and user the resources at same time

Reliability:
Large Servers are running successfully without any down time (Reboot).

Difference between Microsoft Windows and Linux:

Open Source:
Windows : No access to the Source code.
Linux : Full access to the Source code

GUI (Graphical User Interface):
Windows : User Friendly
Linux : GUI but less User Friendly.

Price:
Windows : Price $50 to $150 Per each license copy.
Linux : Its Free or Much lower Price than Windows.

Reliability:
Windows : Reliable but cannot match the reliability of Linux.
Linux : Reliability (Can run for Month and Years without reboot)

Publishing:
Windows : Licensing restrictions.
Linux : Licensing Freedom.

Security:
Windows: Although Microsoft has made great improvements over the years with security on their operating system, their operating system continues to be the most vulnerable to viruses and other attacks.
Linux : Linux is and has always been a very secure operating system. Although it still can be attacked when compared to Windows, it much more secure.

File System:
Windows: Windows typically uses FAT32 or NTFS file systems.
Linux : Linux typically uses the ext2 or ext3 file systems

Directory Structure:
Windows : Flat Directory structure
Linux : Hierarchy or root Based Directory Structure