Answer Posted / krishna99
Security
| Is This Answer Correct ? | 15 Yes | 1 No |
Post New Answer View All Answers
How do edit/modify the property/configuration files?
Which method is invoked in the data bean for calling an access bean?
Why is SWAM usage discouraged?
Where is your web server hosted?
how to import jaxp package in ibm wsad?
what is cryptography? Why do we need it?
List me the steps involved in building a release in websphere portal ?
can you use iim for installing application server 8 over system i?
how do you test your message flows and design test case?
What is the difference between full and partial repositories?
what is the default log size in the log target? What happens when that log size is reached?
What is CellDiscoveryAddress
What is acugload?
difference between mca and mqi channels?
Why use the bootstrap port number?