Answer Posted /
Is This Answer Correct ? | Yes | No |
Post New Answer View All Answers
What is the difference between the distributed database and the traditional database?
How do make computer faster?
What does quality factor depend on in resonance?
Which of scm applications support use of alert monitor? : supply chain management
How are uuid generated?
Does php support multiple inheritance?
Have you previously held a management position in the Hotel & Catering Field?
Can windows defender remove malware?
What is cost center group? : cost center accounting
What tags are used for action and navigation?
What is SCD (Slowly Changing Dimensions)? What are its types?
i develop a web application and i gave security setting i.e autherization and athentication now it work properly on my local system , now question is ,is this security setting ie autherization and athentication which i gave in web.config will it be enough strong to secure my application on internet or i have to use some 3rd party tool or software to get security .if yes --how ? if no--what is the alternate?
What we need to discuss with designer before starting the universe designing.
Explain the functioning of conditional structures in perl.
Define exec cics retrieve?