Technology Questions

Q:

File contains 5 records say D,E,F,C,A-I want to copy D and A records only by using file-aid?

Answer

Go to file-aid copy option.Enter the from dataset to be copied and to dataset to which you want to copy.go to options. Enter 0 at Initial records to skip field.Then enter 3 at the no of records to skip field and 1 to no of records to select.press enter and PF3.

Report Error

View answer Workspace Report Error Discuss

0 2041
Q:

What is the concept of Application Cache in HTML5? What are its advantages?

Answer

The Application Cache concept introduced by HTML5 means that a web application is cached, and accessible without an internet connection.


There are three advantages of Application Cache:


1.Offline browsing - users can use the application when they're offline


2.Speed - cached resources load faster


3.Reduced server load - the browser will only download updated/changed resources from the server

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2039
Q:

Explain foreign key constraint.

Answer

A foreign key is a reference to another table. It is used to establish relationships between tables. For example, relationship between employee and professor table. One employee can have multiple professors. The Primary key of employee becomes foreign key of professor.
Example:
create table employee ( id number NOT NULL, professor_id NOT NULL, Name varchar(200) Constraint prim_id Foreign key(id) references professor(professor_id) );

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 2039
Q:

What is the difference between a primary key and a unique key?

Answer

By default, primary key creates a clustered index on the column, whereas a unique key creates a non clustered index by default.

Report Error

View answer Workspace Report Error Discuss

Subject: SQL

0 2038
Q:

Can I call an XLM macro from within Excel VB?

Answer

With the help of Excel App instance. we can execute a Macro in VB code.


EXcelAppInstance.Application.Run("MacroName")

Report Error

View answer Workspace Report Error Discuss

0 2038
Q:

Describe the situations in which AJAX should not be used.

Answer

You should not use AJAX if:



             =>  You want the page to show in a search engine, such as Google, because WebCrawler does not execute JavaScript code.

             =>  The browser does not support JavaScript.

             =>  You want to create a secure application.

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 2035
Q:

What is the Fail-safe approach?

Answer

- Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed.


- The fail safe approach doesn’t allow an attacker to take the advantage by breaking in the system and crashes out.


- This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack. 


- The system in attacks doesn’t skip the access to the control check or it doesn’t skip serving any document requested. 


- Fail safe approach can force the web server to run of the memory and have a DoS attack.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2033
Q:

What is a .htacces file

Answer

 .htaccess is a configuration file running on Apache server.These .htaccess file used to change the functionality and features of apache web  server .

 e.g   .htaccess file used for url rewrite .

         .htaccess file used to make the site password protected.

         .htaccess file can restrict  some ip addresses ,so that on restricted ip adresses  site will not open.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 2033