Answer Posted /

Is This Answer Correct ?    Yes No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the steps that need to be done before using the login agent processes(login process and logout process)?

174


What is the difference between tr and td tags?

439


anyone please send transformer parameter design formulas & details of tap changer ? plz i have interview this week its more helpful for me ?

1423


what is the function of cpyf command?

988


Explain how can viscosity affect the design of a mixer?

589






How do you do exponents in java?

524


What is cqlsh?

53


Tell us the difference between the while and for loop. Provide a .net syntax for both loops?

533


What is an Implicit Intent in Android?

553


Who was your most difficult customer?

837


What are the advantages of using wen dynpro?

155


i develop a web application and i gave security setting i.e autherization and athentication now it work properly on my local system , now question is ,is this security setting ie autherization and athentication which i gave in web.config will it be enough strong to secure my application on internet or i have to use some 3rd party tool or software to get security .if yes --how ? if no--what is the alternate?

1498


How do two computers communicate with each other when they are connected through L2 or L3 switch?

2468


What does the term “business area” refer to and how can it be used?

607


what is difference between UV - VISIBLE MODEL NO like 1600,1601,1700 etc ? plz explain me

2207