Tibco Consultant
10+ Tibco Consultant Interview Questions and Answers

Asked in Infosys

Q. What group is used to ensure a process instance visits the first, second, and third activities in an orderly manner?
The group used for orderly process instance activities is called a 'Process Flow' or 'Workflow'.
A process flow defines the sequence of activities in a business process.
Each activity in the process flow is executed in a specific order.
For example, in an order processing system, the flow might be: Order Received -> Order Processed -> Order Shipped.
TIBCO provides tools like TIBCO BusinessWorks to design and manage these workflows.

Asked in Infosys

Q. What are the differences between 'pick first', 'iterate', 'while true', and 'repeat until true'?
These are different types of loops used in programming.
Pick first: Selects the first element in a collection.
Iterate: Loops through each element in a collection.
While true: Continues to loop as long as a specified condition is true.
Repeat until true: Repeats a block of code until a specified condition is true.

Asked in Infosys

Q. What XPath function is used in the mapper to change the date format from dd-mm-yyyy to dd/mm/yyyy?
The function used in xpath of mapper for date format conversion from dd-mm-yyyy to dd/mm/yyyy is translate()
Use the translate() function in xpath to replace the '-' with '/' in the date format
Syntax: translate(string, 'find', 'replace')
Example: translate('25-12-2021', '-', '/') will output '25/12/2021'

Asked in Infosys

Q. What are the data files present in an EAR deployed in TEA?
Datafiles present in EAR deployed in TEA include configuration files, libraries, and resources.
Configuration files (e.g. web.xml)
Libraries (e.g. JAR files)
Resources (e.g. images, properties files)
Asked in Multinet Technologies

Q. What are the destination modes in EMS?
Destination modes in EMS are the different ways in which messages can be delivered to their intended destinations.
EMS supports three destination modes: PERSISTENT, NON_PERSISTENT, and RELIABLE
PERSISTENT mode ensures that messages are stored in the EMS server until they are consumed
NON_PERSISTENT mode delivers messages immediately without storing them in the server
RELIABLE mode guarantees message delivery by using acknowledgments and retransmissions
Example: A PERSISTENT mode c...read more

Asked in Infosys

Q. What archive is present in EAR?
EAR file contains a JAR file which is an archive of Java classes, resources, and metadata.
EAR file stands for Enterprise Archive
Contains one or more Java EE modules (WAR, JAR, etc.)
Used for packaging and deploying enterprise applications
Tibco Consultant Jobs


Asked in Multinet Technologies

Q. What is an exclusive property?
Exclusive property refers to a unique attribute or characteristic that is owned or possessed by a specific individual or entity.
Exclusive property is something that is not shared or accessible by others.
It can be a physical object, such as a house or a car, that is owned by only one person.
It can also be an intangible asset, like a patent or a trademark, that grants exclusive rights to its owner.
Exclusive property is protected by laws and regulations to prevent unauthorized u...read more
Asked in Multinet Technologies

Q. What is persistence mode?
Persistence mode refers to the method of storing data in a way that allows it to be retrieved and used even after the system or application is restarted.
Persistence mode is used to ensure data durability and availability.
It involves storing data in a way that allows it to survive system failures or restarts.
Common persistence modes include database storage, file systems, and caching mechanisms.
Persistence mode is important for applications that require data to be retained acr...read more
Share interview questions and help millions of jobseekers 🌟
Asked in Multinet Technologies

Q. What is the purge command?
The purge command is used to delete or remove data or records from a system or database.
The purge command is typically used to free up storage space by permanently deleting unnecessary data.
It can be used to delete specific records or data that meet certain criteria.
The purge command is irreversible and should be used with caution.
Examples of purge commands include 'PURGE TABLE' in SQL to delete all records from a table, or 'PURGE BINARY LOGS' in MySQL to delete binary log fi...read more

Asked in Infosys

Q. What is the spawn function in the subprocess module?
Spawn in subprocess is a method used in Python to create a new process and run a new program within the existing program.
Spawn in subprocess is used to create a new process in Python.
It allows running a new program within the existing program.
Subprocess module in Python is used for spawning new processes.

Asked in Infosys

Q. What is the for-each-group by activity?
For-each-group by is a data transformation operation that groups elements based on a specified key or criteria.
Used in data processing to group items for aggregation or transformation.
Syntax: for-each-group by <key> in <collection>.
Example: Grouping orders by customer ID to calculate total sales per customer.
Can be used in XSLT, SQL, and various programming languages for data manipulation.
Interview Questions of Similar Designations
Interview Experiences of Popular Companies




Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary


Reviews
Interviews
Salaries
Users

