Which Functions Using Integer ==> String's i.e 2 ==> Two... Like that string's ==> integer values ? It is Possible ?
2 5061why should i declare foreign key constraint as self relation instead of binary relation in tables ?
2061What happens internally when the user types userID/password@string in SQL PLUS Thanks-Bhaskar
1 4613i have executed the Delete command after the I have created table whether deletions will be commit or not? if table is successfully created?
5 7832i have a question here... As of my knowledge, when we apply an index (b-tree)on a column, internally it arranges the data in b-tree format and do the fetching process correspondingly... and my quetion is... How a bit-map index arranges the data internally when applied on a column?IS it in b-tree format or whatelse?
1965I have a table called 'test' on source and target with same name, structure and data type but in a different column order. How can you setup replication for this table?
1118Post New Oracle Oracle General Interview Questions
What's the difference between asynchrony and concurrency?
what is purchase life cycle IBM maximo
what is an extent in informix?
Who is the most dangerous hacker?
Have you know the shipment and shipment cost
What are most desktop applications written in?
What is the function of municipal government?
please send me the inteview questions in IOCL
Explain Hybrid And Community Cloud?
What is dynamic alv in web dynpro ?
How to add calendar in java swing using eclipse?
What are the different types of linkage exist in c?
Scenario A year ago we developed a standards compliant website for a client. Their site is very popular resulting in the client wanting to be able to track how it is being used by their users. The first part of this project is to create a Login function so that users can be identified on the website. The data supplied by users would have to be handled securely. You have been allocated this project to work on. You will be responsible for the task from start to finish and will be expected to give feedback to your manager. User expectations The client wants their users to be able to login using a page that fits in with the website design. Tom wants to access the website but doesn’t want his login information to be available to anyone else. Paul doesn’t want to login to the website because he’s not a frequent user. Task Please provide some feedback on how you would do the following:- Being the only Test Engineer on this task, what would your approach be for this requirement? Identify the key areas for testing this page. What tools if any, would you use to perform the testing, bearing in mind that the testing will be done without using an ‘automated test tool’. Provide a sample test case that could be used for testing this page, for example as a word or Excel document.
What is the use of @ in php?
How is failover of the application server set with the delivered Peoplesoft software?