in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
Given: coordinates of rectangle-> left bottom and right top points. the rectangles create a hole.Find the maximum area of the hole. eg. 4 rectangles create a hole in between. find its area.
how to run servlets in eclipse 3.3.2....if we choose file->new->servlet then after that it is showing javax.servlet.* ...cannot be resolved.......to avoid this error any external jar file is to be added? please help me regarding this issue........thank u
1. How many jobs can we write in a single file? 2. How many maximum members can exist in a single partition data set(pds) in jcl?
What are the Advantages of HashMap over Vector?
WHAT IS MAIN IMPORTANT THING IN SOFTWARE?
what is the software to run the GSM gate opener program
if heap sort contains n elements, no of comparsions required are
One boy has to climb steps. He can climb 1 or 2 steps at a time. Write a function that will returns number of way a boy can climb the steps. Int WaytoSteps(int n) (eg:- suppose number of steps is n=4 ,the function will return 5 (one-one-one-one ,one-one-two, one-two-one-,two-one-one, two-two)
how to hide prompts
Piggy backing is a technique for a) Flow control b) sequence c) Acknowledgement d) retransmition
17 Answers Fast Booking, HCL, Lucent, NIC,
When we have two versions of the dot net installed how does the compiler know which version of DLL it has to select to an application.
4.Write a program to get the string in array and print that? or Without using loop print the array.