At what time after 4.00 p.m. is the minutes hand of a clock exactly aligned with the hour hand?
11 61694If we open CD-ROM drive then the responce is "please insert cd into drive" What is the problem? Is it with CD-ROM problem of some services problem?how can we solve this problem?
8 13789what exactly happens when we execute "Class.forname("Driver class name");"?Explain indetail
10 27234Post New HP Interview Questions
how can we give (ASSIGN) bug privitorirs and seviroty to the bug explain with exanple
What is extern storage class in c?
Why main function is special give two reasons?
What is difference between linq and lambda expression?
Can anyone tell me the new features in Informatica 9 Version?
How do you concatenate in c#?
what precautions or prerequisites do you follow to update a record into database table and how
How can you to add javascript to a page when performing an asynchronous postback?
What is Subversion's client or server interoperability policy?
what are the direct expense of loan department in banks.
How to create thumbnails using Bootstrap?
Difference between forward() method and sendredirect() method ?
What are the two basic modes in which the 555 timer operates?
How the messages are processed in Windows ?
i develop a web application and i gave security setting i.e autherization and athentication now it work properly on my local system , now question is ,is this security setting ie autherization and athentication which i gave in web.config will it be enough strong to secure my application on internet or i have to use some 3rd party tool or software to get security .if yes --how ? if no--what is the alternate?