Give me one example of a functional specification and explain what information we will get from that?
How is security handled in the weblogic j2ee connector architecture? : BEA Weblogic
What is fragmentation? Different types of fragmentation?
Where is the setting files placed in drupal?
What is the use of immutability?
Write a program to maintain student’s record. Record should
not be available to any unauthorized user. There are three
(3) categories of users. Each user has its own type. It
depends upon user’s type that which kind of operations user
can perform. Their types and options are mentioned below:
1. Admin
(Search Record [by Reg. No or Name], View All Records,
Insert New Record, Modify Existing Record)
2. Super Admin
(Search Record [by Reg. No or Name], View All Records,
Insert New Record, Modify Existing Record, Delete Single Record)
3. Guest
(Search Record [by Reg. No or Name], View All Records)
When first time program runs, it asks to create accounts.
Each user type has only 1 account (which means that there
can be maximum 3 accounts). In account creation, following
options are required:
Login Name: <6-10 alphabets long, should be unique>
Password: <6-10 alphabets long, should not display
characters when user type>
Confirm Password:
What is the need of a destructor?
What key cost components are there for the product or service? - Venture Capitalists
What was your biggest mistake?
In which header file is the null macro defined?
Does razor engine supports for tdd?
In c#, what will happen if you do not explicitly provide a constructor for a class?
How much extra message length is caused by using RSA?
What is a singleton c++?
What is the use of the underscore variable in repl?