Answer Posted /

Is This Answer Correct ?    Yes No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the disadvantages of php?

487


what is the role of freeware in middleware solutions?

1808


how we can calculate the air consumption of any system.

1522


how to meas-our losses for L.T & H.T

1662


What is the static variable?

556






How to center align a div tag in css?

280


Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.

2156


Which three organizational elements make up a sales area and briefly explain their function?

589


What is the difference between isblank() and isnull()?

243


Is it possible to create trigger on views?

525


what is broad cast agent? : Sas-bi

572


What is application role in sql server database security? : sql server security

527


What are grep patterns called?

514


What are the file permissions in linux?

427


What propositions should be kept in mind while working with debtors turnover ratio?

551