Documente Academic
Documente Profesional
Documente Cultură
How many types of tables are there in database and what are their differences?
1. System Catalog Tables
2. People Tools Tables
3. Application Data Tables
System Catalog Tables: System Catalog Tables stores physical attributes of the tables and
views. Naming convention for these tables is SYS.
PeopleTools Tables: The objects that we develop using the People Tool Objects are saved in
PeopleTools Tables. Naming convention for these tables prefixed with PS. Once a field is
created it would be stored in PSfield definition table, once a record is created it would be stored
in PSrecdef. (Only definition/structure is stored)
Application Data Tables: stores the data, which is entered by the user through PeopleSoft
application windows and pages. Naming convention for these tables is PS_.
Application Data Tables are divided into 2 types:
1. Control Tables
2. Transaction Tables
What is a Translate Table where are the Translate table values are stored?
It will store values for fields that don't require an individual prompt table, It is also known as
XSLT table. The data we store in the translate table does not change often. Each database
contains one translate table. (blood types, days of the week)
How many Actions are there in the Component Properties dialog (Use Tab)?
Add: Used to add a new high-level key, such as a new employee ID or a new customer. Except
in the case of effective dating Add is used to insert new current row or update future rows. If we
select only Add action then we can’t modify the existing rows. (Doesn’t have any effect with
EFFDT)
Update/Display: Used to update existing rows only.
Update/Display All: Used to update current and future rows in an effective dated record. Only
used with effective dated records.
Correction: Used to update any rows (history, current and future) in an effective dated record.
Only used with effective dated records.
Data Entry: Not supported in PeopleSoft Internet Architecture
What is from search key and through search key in Record properties?
From search key: Gives the values from the specified value to the max values
For ex: if we have to search values after emplid of 100 to the max then we should enter 100 in
the from search key. (total values to be displayed are 300 values)
Through search key: gives values from the given value – 300 values.
What is the difference between key and search key and also alternate search key?
Keys determine the structure that makes a row of data unique. A key may also be a search key,
which makes the field appear on search pages to help users locate rows of data. Alternate key
are only used for search pages and have nothing to do with the table structure. Alternate search
key provides an alternate path into the table data. It will appear to the user whenever he clicks
advanced search option.
What is the difference between record properties and record field properties?
Record properties apply to the entire record definition. Record field properties are not shared
among records, they are specific to a single record definition and are stored with the record.
Each record stores a unique set of record field properties while the primary field definition
remains the same.
What are the three build options available when building a table from a record?
Build script file: which generates a sql script that can be run against the desired database to
build the table.
Execute SQL: which builds the table in the database.
Execute and build script: which both build the table and generates a sql script.
What are multi level pages where should the field at level 0 be getting their data from?
Level 0 fields must be associated with record fields of search record.
Audit Table and their fields? Record and Field Level Audits
Records the information of user actions details as well as the changes or additions or even
modifications done on the table. Audit records are prefixed with Audit_.
Record Level Audit: for creating a record for record level audit we need to have 3 fields
Audit_operid, Audit_stamp, and Audit_action. We can create our own audit records by prefixing
Audit_
Field level Audit: By using delivered PS_AUDIT table we can set field level audit.
What are the considerations that you take while altering a table?
Any time one intends to change an existing object we should always attempt to find out if the
changes are effecting on other system objects. Edit> find definition reference: If a definition
7
reference any other definitions we must research the connection and determine with the
referenced object will have any effects – then we need more follow-up.
Can we use the same Component in 2 Menus?
Yes , we can use same component in any no of menus
What is the difference between primary record and the search record?
Each scroll area and grid is associated with a single primary record. This represents the
application data table the page fields are associated with. All fields in a scroll area or grid must
be associated with one (and only one) record, which is the primary record for that level.
The search record builds the search page for a component and populates all fields at level 0.
The search record is determined at the component level.
What are major tasks that the application server performs in PIA?
The application server maintains a persistent connection to the database, and converts
peopletools and application table data into HTML. The server then provides the HTML to the
web server for delivery to the browser.
The application server also plays a role in connecting development workstations to the database
for three-tier connections.
8
What are the major tasks performed by the web server in PIA?
Web server acts as the front end of the PIA.
The Web server includes Web services software that displays the HTML to the browser. It also
includes java servlets that manage each session’s connection to the application server.
What is Tuxedo/Jolt?
Tuxedo manages the multiple connections to the database. Jolt is a java based communication
protocol. The assembled HTML is sent to the web server.
What is a metadata?
Software that resides on a web server and displays HTML for a Browser.
When you select a row of data from a search page where you are taken to?
The search page takes you to a component the component is made up of one or more pages
with each page containing several fields that hold the data.
What is the difference between adding a row of data and inserting a row of data?
When you use the add action a new high level key is created at level 0, when you insert a row of
data you are adding information that has a one to many relationship with the key at level 0.
Generally you insert rows within scroll areas are grids.
When exporting a project to a file in what format is the definition data stored?
Projects are stored in XML files.
What 2 methods are available for transporting definitions in a project between the
databases?
Projects can be exported directly to another database or they can be exported to a file. When
you export to a file you must take the extra step of importing the file from the target database.
By using import and export commands we can transfer.
What is Setid?
Setid's are key to linking business units to record control groups. It is the key on all control
tables in tableset sharing Every row in a control table includes a setid as its key. Setids partition
the data into groups or sets of data that are appropriate for each business unit.
A SetID is a link to Table Set Sharing. Table set sharing simply consists of assigning specific
SetIDs to specific record groups for individual business units to restrict the view of rows of data
within control tables. It’s a way of organizing your data in the system.
SECURITY
What is a Role?
A role is an intermediate object that links the user profiles to the permission lists. Roles enable
you to add permissions to users dynamically.
Can we add the Process Profile Permission List directly to the User Profile?
Yes. We can add the Process Profile Permission List directly to the User Profile, not to an
intermediary Role.
14
At what level we can setup the PeopleSoft application security?
User Level
Row-Level
Field-Level
Object level.
How can we implement the Row-Level Security? What is the use of Row-Level Security?
For this we don’t have any PeopleTool. Row-Level Security is implemented by using the SQL
Views.
Using the Row-Level Security we can controls the rows of data that can be accessed by each
user.
How we implement the Field-Level security? What is the use of Field-Level security?
By assigning the PeopleCode to the field. Like Hide Unhide, Gray, Ungray.
Using the Field-Level security we can control the user access to specific data filed.
What is the difference between Maintain security and Object Security (Definition)?
By using the Maintain Security we can restricts the users to access the particular functions like
some pages, some records, but using the Object security we restrict the total objects.
Ex: if we don't want a developer to touch Application Engine programs, don't allow them to
access Application Engine.
What is Batch Environment Security? or How do you give security to batch programs like
SQR and A.E?
There are three levels of security for batch programs:
• Each batch program has a run control that we define before we can run the batch
program. The run controls are set up using PeopleSoft Process Scheduler
• Also using PeopleSoft Process Scheduler, you set up Process Groups, which are groups
of batch processes. Then in PeopleTools Security you add Process Groups to a security
15
profile. Users can run processes that belong to the Process Groups assigned to their
security profile.
• In your RDBMS environment, you can restrict off-line access to batch processes using
the security tools described in your platform manuals.
Note: You add the Process Profile Permission List directly to the User Profile, not to an
intermediary Role.
The PeopleSoft Internet Architecture is in the category of PeopleSoft online security, also known
as runtime security. Only authorized users can connect to the web and application server, and
only authorized application servers can connect to a given database.
COMPONENT INTERFACE
16
Properties are 2 types
1. Standard properties
2. User defined properties
Standard properties exists for every component interfaces.
What is Collections?
Collections are referred as scrolls(level based controls will be having a primary record) in
component for component interface.
CreateKeyInfoCollection: Returns a set of items that describes the create keys.
Can we map more than one component at a time from the Component Interface?
No. A component interface maps to one, and only one, PeopleSoft component.
17
search record definition for the underlying component.
Why should we write in save post change only, why not in other event?
Because component interface object data will not be in component buffer and student
information component data will not be in component buffer so we are updating/inserting the
data in the data base not in the component buffer tables.
Whenever we create a component interface ,we will give a name to CI to access.
CONFIGURATION MANAGER
The Configuration Manager contains a variety of setting controls that allow you to set up your
workstations for connecting to the database, using workflow, and so on. It enables you to define
separate "profiles" for connecting to different PeopleSoft databases.
20