in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
shall we execute our java programmes in jre
what is difference between IF-ELSE-ENDIF and IIF.
What is the maximum amount of memory any single process on Windows can address? Is this different than the maximum virtual memory for the system? How would this affect a system design?
what are wrapper classes
could you please tell me how to draw the calibration curve for HPLC {the software which we are using}?
How do you pass variables forwrd to future CECI sessions
Java is called as pure objerct oriented programming language, where as c++ is not completely object oriented.can any explain the detailed differenec between these two
When you deliver your C++ headers and C++ library of a class (what all can you change in the class so that application using your class does not need to recompile the code)
What is a singleton linked list?
what is difference between scripts, smartforms and adobe forms
1.how to deploy the Maven application in weblogic server? 2.In Real time projects all classes are singleton or some classes only singleton explain? 3.what are the major uses of the designpatterns? 4.explain restful &Soap based services explain?
Given an array of size n+1 which contains all the numbers from 1 to n.Find the number which is repeated in O(n) time.How do you proceed with the same with floating numbers from 0 to 1 instead of 1 to n?