Programming Languages (22694)
Scripts (9280)
Networking (2571)
Microsoft Related (21566)
Databases (16615)
Operating Systems (12022)
Testing (17995)
Servers (1375)
MainFrame (6620)
Java Related (15396)
Middleware (526)
Web Related (7038)
Data Warehouse (8975)
HR Questions (2698)
Software Design (1923)
Debugging (73)
Version Control (464)
Editors (229)
Telecom (1164)
ERP CRM (26424)
Embedded Systems (1221)
Client Server (333)
Artificial Intelligence (3276)
Cryptography (718)
EAI (466)
Multimedia (674)
Software Development Life Cycle (303)
Image Processing (170)
Mobile OS (3116)
Security (125)
Big Data (4325)
Cloud Computing (1790)
Automation (2674)
Internet of Things (IoT) (299)
Apache Related (370)
Frameworks Tools (1329)
Oracle Related (0) in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
2068hi friends i am Manohar from hyderabad.i have recently completed MBA+SAP SD -now i am looking for a job-what is best way to get job? can get job as fresher? or with fake experience? i am in a confusion plz help how to approach companys or consultancy which can provide sap job? plzzzzzzzzzzz
2033what is the main field of bugzilla which we fill to report bug to any developers???give some brief description??
1 3894
Is sql microsoft?
What exactly do you know about the security of a block?
What does four address field signifies?
What is oops in python?
What are three main elements of unix operating system?
Why to use char instead of varchar in the database?
If I replace my Sqlserver with XML files and how about handling the same ?
How do I connect my outlook to office 365?
What is the difference between jsf-1 and jsf-2?
What happens when you post to year 2006 when you are in 2007?
What are the types of indexes that are present inside a database?
How do we access static members in java?
What did you dislike about your old job?
How do I combine two names in excel?
What is raw datatype in sql?