MY code is: public class P1{
public static void main(String ar[])
{
class.forName("java.lang.String");
}
}
errors i got are :New.java:5: error:
What is the Use Of Interfaces? For example I have a interface as shown below? Interface IMyInterface { public void MyMethod(); } class MyClass : IMyInterface { public void Mymethod() { Some Code } } class Program { static void Main(string[] args) { MyClass obj = new MyClass(); obj.MyMethod(); } } Here What is My Question is? If i remove Interface and run this code, it will executed then what is the Use of the interface? Can any one give me the solution for this Problem? Thanks in Advance!
HCL,
1 4067Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.
3687In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
1954Hi all. I have 2 years exp in manual testing.Now i want to shift.i got so many email from other company that send ur cv .After sending no response from them .whats the reason.
1 3480what is the use of below profile options while configure multiorg? 1. HR: Security Profile 2. MO: Security Profile 3. GL Set of books name 4. MO: Operating Unit 5. HR: User type
IBM,
4 8264How to know actual capacity of Ethernet port by command line? (Sun Fire V480 and some one configured Eth interface as 100mbps and need to change to 1000mbps but How i would know that port is of capacity 1000mbps or not?
7 8589I have a flat file of 10 byte with unknown total record count. Requirement is [using CLIST]: 1. get the record count of the file 2. read first 5 records in 5 different variable
1 2235
Explain the informatica workflow?
What is oracle latest version?
What is the instanceof operator in JavaScript?
What is redirect routes?
Why generics are used in java?
what are the differences you see in e-commerce and banking domain in testing point of view Thanks in Advance
How many types of spread spectrum techniques are used in cdma?
How do you generate sequence number in datastage?
Which drush commands you use while development?
What is the advantage of object inheritance?
How can we define a variable accessible in functions of a php script?
In this problem you are to write a program that will cut some number of prime numbers from the list of prime numbers between 1 and N.Your program will read in a number N; determine the list of prime numbers between 1 and N; and print the C*2 prime numbers from the center of the list if there are an even number of prime numbers or (C*2)-1 prime numbers from the center of the list if there are an odd number of prime numbers in the list.
define the functionality of web server in context to Active server page.
Are the any windows shell extensions for SourceSafe?
Where we declare the input parameters?