Answer Posted /
Is This Answer Correct ? | Yes | No |
Post New Answer View All Answers
What are the steps that need to be done before using the login agent processes(login process and logout process)?
What is the difference between tr and td tags?
anyone please send transformer parameter design formulas & details of tap changer ? plz i have interview this week its more helpful for me ?
what is the function of cpyf command?
Explain how can viscosity affect the design of a mixer?
How do you do exponents in java?
What is cqlsh?
Tell us the difference between the while and for loop. Provide a .net syntax for both loops?
What is an Implicit Intent in Android?
Who was your most difficult customer?
What are the advantages of using wen dynpro?
i develop a web application and i gave security setting i.e autherization and athentication now it work properly on my local system , now question is ,is this security setting ie autherization and athentication which i gave in web.config will it be enough strong to secure my application on internet or i have to use some 3rd party tool or software to get security .if yes --how ? if no--what is the alternate?
How do two computers communicate with each other when they are connected through L2 or L3 switch?
What does the term “business area” refer to and how can it be used?
what is difference between UV - VISIBLE MODEL NO like 1600,1601,1700 etc ? plz explain me