Rate yourself from 1-10 what would you give and why? If you had won 1 billion dollars at the lottery or at the casino,where would you like to spend the rest of it except for volunteer works or in charities?715
How would you teach a blind person to withdraw her credit card account on an automated teller machine?889
How would you teach an old customer to browse a file on her desktop or PC, let us consider the person who isn't that good at computers?726
Give me a quality you have that I shouldn't hire you?2 1456
What's confidence and overconfidence?1 1998
Is it possible to refer external styles and scripts in lightning? How?
Define the types of memory used in 8085 microprocessor?
What is a join command?
discus the worst and best case complexity of binary search
How to check a field or column exists in a table or not in codeigniter?
Explain Client and EXplicit Client dupsOK Acknowledge modes in jms?
What are the different kinds of organizational relationships in hrms? Explain each with relevant examples?
How do u implement SLA?
What are the system fields you have worked with? Explain?
What is the difference between Maintenance Order and Production Order. the point is i want to know the affection of Movement type 261 thru maintenance order and Production order. if i change any settings for Maintenance order it will affect to production order process also for 261 movement type ?
How do we modify hibernate configuration file?
What are the possible ways to gain information regarding the control file?
When should a type cast be used?
What are jagged arrarys ?
i develop a web application and i gave security setting i.e autherization and athentication now it work properly on my local system , now question is ,is this security setting ie autherization and athentication which i gave in web.config will it be enough strong to secure my application on internet or i have to use some 3rd party tool or software to get security .if yes --how ? if no--what is the alternate?