in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
How to display questions one by one in jsp and I wants to store the answers in my database?
what is the difference between rename and label
There are 2 tables: EMP : EmpId, Ename, Sal, DeptId DEPT : DeptId, Dname Write a query to find out emp names and their department names. if any emp has null in Deptid the it shows ?No Department?. Write a query to find out those department names which has no employee. Write a query to find out those employees whose salary is greater than their department?s average salary.
When will you use shell script/Perl ahead of C/C++?
I was try to insert 120000 records into the orcle table using the stroed proceeder. But it was stop the 9999. What can I do insert all the records.
Can anyone send me NIC question papers alongwith answers on nidhi1485@yahoo.co.in? Urgently needed.. Thanks in advance
I want Ada programming language books. Could anyone post me any link for that?
What is the use of sas software? Is sas and sap are different?
what is runtime exception and compiletime exception ?
i am getting the error while compiling my cics program with including db2 dclgen member it is showing that ur dclgen member not including and all the host variables are undeclared
What language / script is used to validate web page
could u please also write an example of a code that involves instances from an abstract class just as u did for interfaces because u said it could also work which i really doubt. thanks