Programming Languages (22694)
Scripts (9280)
Networking (2571)
Microsoft Related (21566)
Databases (16615)
Operating Systems (12022)
Testing (17995)
Servers (1375)
MainFrame (6620)
Java Related (15396)
Middleware (526)
Web Related (7038)
Data Warehouse (8975)
HR Questions (2698)
Software Design (1923)
Debugging (73)
Version Control (464)
Editors (229)
Telecom (1164)
ERP CRM (26424)
Embedded Systems (1221)
Client Server (333)
Artificial Intelligence (3276)
Cryptography (718)
EAI (466)
Multimedia (674)
Software Development Life Cycle (303)
Image Processing (170)
Mobile OS (3116)
Security (125)
Big Data (4325)
Cloud Computing (1790)
Automation (2674)
Internet of Things (IoT) (299)
Apache Related (370)
Frameworks Tools (1329)
Oracle Related (0) MY code is: public class P1{
public static void main(String ar[])
{
class.forName("java.lang.String");
}
}
errors i got are :New.java:5: error:
What is the Use Of Interfaces? For example I have a interface as shown below? Interface IMyInterface { public void MyMethod(); } class MyClass : IMyInterface { public void Mymethod() { Some Code } } class Program { static void Main(string[] args) { MyClass obj = new MyClass(); obj.MyMethod(); } } Here What is My Question is? If i remove Interface and run this code, it will executed then what is the Use of the interface? Can any one give me the solution for this Problem? Thanks in Advance!
HCL,
1 4753Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.
4214In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
2483Hi all. I have 2 years exp in manual testing.Now i want to shift.i got so many email from other company that send ur cv .After sending no response from them .whats the reason.
1 4196what is the use of below profile options while configure multiorg? 1. HR: Security Profile 2. MO: Security Profile 3. GL Set of books name 4. MO: Operating Unit 5. HR: User type
IBM,
4 9543How to know actual capacity of Ethernet port by command line? (Sun Fire V480 and some one configured Eth interface as 100mbps and need to change to 1000mbps but How i would know that port is of capacity 1000mbps or not?
7 10529I have a flat file of 10 byte with unknown total record count. Requirement is [using CLIST]: 1. get the record count of the file 2. read first 5 records in 5 different variable
1 2975
What is iformatprovider in c#?
Which data type is a composite type?
Does hair grow back thicker after threading?
What are called c variables?
What is longblob in mysql?
How does hibernate update work?
What xpointer schemes are supported in this release?
tomorrow i have interview in infosys.can someone pour any suggestions or any interview questions. thank you
What is the whole process to send custom idoc from source system to destination system?
What are the three levels that copy controls are set up? And what are the transaction codes through which it could be done?
Is linux illegal?
How hbase handles the write failure?
What is windows modules installer worker?
What is a closure in php?
Can you provide an example of a complex integration scenario you've implemented using SAP PO?