Answer Posted /

Is This Answer Correct ?    Yes No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to publish a process to control room?

203


define yourself? What is the meaning of your name?

636


Can I use multiple html form elements with the same name?

566


Is it possible to connect two computers for file sharing without using a hub or router?

542


What is rs.exe utility?

118






What is the convex function in machine learning?

59


What is the order of precedence for logical operators.

476


Can a master page have more than one contentplaceholder?

499


Tell something you know about the dimension in the warehouse and how it can be optimized?

488


what is the reproductive cycle of non flowering plants?

1740


How you find which is the latest record in SCD type2 transformation?

293


Explain bean in spring?

145


Is overriding possible in java?

493


The server is already having the list of IP addresses of all its authorized clients & if any client is requesting the server to do a task, it is sending its IP address(encapsulated in the packet) to the server.The server can easily match that IP address with that on its list and check if it's authorized client or not, then why we need inverse domain...........

1355


Is there anything I can do to prevent my LTPA keys from becoming out of sync between my cells?

486