Technology Questions

Q:

What are the differences between mysql_fetch_array(), mysql_fetch_object(), mysql_fetch_row()?

Answer

mysql_fetch_array:
Fetch a result row as an associative array and a numeric array.

mysql_fetch_object:
Returns an object with properties that correspond to the fetched row and moves the internal data pointer ahead. Returns an object with properties that correspond to the fetched row, or FALSE if there are no more rows.

mysql_fetch_row():
Fetches one row of data from the result associated with the specified result identifier. The row is returned as an array. Each result column is stored in an array offset, starting at offset 0.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2095
Q:

What are the differences between GET and POST methods in form submitting?

Answer

On the server side, the main difference between GET and POST is where the submitted is stored. The $_GET array stores data submitted by the GET method. The $_POST array stores data submitted by the POST method.

On the browser side, the difference is that data submitted by the GET method will be displayed in the browser’s address field. Data submitted by the POST method will not be displayed anywhere on the browser.

GET method is mostly used for submitting a small amount and less sensitive data.
POST method is mostly used for submitting a large amount or sensitive data.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2094
Q:

why protected modifier?

Answer

Outside the package if any other class other than JVM calls the finalize method our class then it is not allowed

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2094
Q:

Warning implicit declaration of function?

Answer

Function: A Function is a block of statement which perform some operation.



Declaring the function before using the function in program is known as implicit declaration of the function.



For Example::


int bar(void); // function (forward) declaration



int main(void) {


bar(); // bar was declared, the compiler has all the info


return foo(123); // foo not yet known; impl. decl. warning


}



// not previously declared function definition


int foo(int a) {


return a;



// previously declared function definition


int bar() {


return 321;


}

Report Error

View answer Workspace Report Error Discuss

Subject: Java
Job Role: IT Trainer , Analyst

1 2093
Q:

What role does Dalvik play in Android development ?

Answer

Dalvik serves as a virtual machine, and it is where every Android application runs. Through Dalvik, a device is able to execute multiple virtual machines efficiently through better memory management.

Report Error

View answer Workspace Report Error Discuss

3 2093
Q:

Define authentication and authorization.

Answer

Authorization: The process of granting access privileges to resources or tasks within an


application.


Authentication: The process of validating the identity of a user.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET
Job Role: Software Architect

0 2092
Q:

What are the CICS commands available for program control?

Answer

The following commands are available for the Program Control services:


LINK: To pass control to another program at the lower level, expecting to be returned. XCTL: To pass control to another program at the same level, not expecting to be returned.


RETURN:  To return to the next higher-level program or CICS. 


LOAD: To load a program. 


RELEASE: To release a program.

Report Error

View answer Workspace Report Error Discuss

0 2090
Q:

What is Wi-Fi technology and over which frequency band it operates?

Answer

Wi-Fi technology is a technology used for transmitting a signal using the 802.11 specifications works a lot like it does with a basic Ethernet hub: They’re both two-way forms of communication, and they both use the same frequency to both transmit and receive, often referred to a half-duplex. WLANs used radio frequencies (RFs) that are radiated into the air from an antenna that creates radio waves. These waves can be absorbed, refracted, or reflected by walls, water, and metal surfaces, resulting in low signal strength. So because of this vulnerability to surrounding environmental factors, it’s pretty apparent that wire-less will never offer us the same robustness as a wired network can, but that still doesn’t mean we’re not going to use or run the wireless or Wi-Fi.

Report Error

View answer Workspace Report Error Discuss

0 2089