Technology Questions

Q:

What are the challenges faced while successfully implementing Business intelligence?

Answer

Most companies grasp the potential value of successful business intelligence applications. However, a common challenge that IT professionals encounter is how to find successful BI application that are adopted by users and make a positive impact on the organization and on the bottom line. It can be difficult to structure effective BI project teams, select the right BI application, manage business-IT communications and measure BI success. BI is robust application, developing and optimizing successful BI application is always a challenge which involves structuring BI teams and managing business-IT communication.

Report Error

View answer Workspace Report Error Discuss

2 1568
Q:

What is the difference between class selector and ID selector?

Answer

- Class selector can be given to an overall block. This is sometimes termed as block element as well, whereas ID selector identifies a unique name and a style for a specific element. 


- ID selector declares the style for only one particular element which can be differentiated from other element, whereas Class selector is being given for the whole complete block.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1566
Q:

What are the security features being provided in web security?

Answer

Security features are very essential in the system as it provides an overall security of the system by applying the patches and the services that keeps the unwanted access away. 


The security features included are as follows:


- Use of algorithms in relation to, the security and the system to, solve the problem of the security. 


- Use of SSL or any encryption method to, protect the system from intrusion or any other attack. 


- Use of SSL in the SimpleWebServer that doesn’t provides the protection against the DoS attack and doesn’t allow the accessing to, be done using the /etc/shadow.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1565
Q:

What are the security measures that are taken to make Android secure?

Answer

Android uses many security measures to keep them away from the hackers. They have designed by making changes to the devices or installing a software service on the mobile. Android application uses sandbox that is very popular and allow limited access to the information that is very private and sensitive for the user. It allows the permissions to be set for the use of the information. The security measures that are provided by android is the use of the encryption of the messages that allow user to remain without worry about there phone security. They also consists of user terms and agreements that also taken care of. Most of the time android doesn't allow other applications to run on their system but it can be done by using different resources that are available on-line. As, android is open source it is not fully secure but lots of security issues are being solved for make it more popular and bug free.

Report Error

View answer Workspace Report Error Discuss

0 1565
Q:

What is an ABAP/4 Query?

Answer

ABAP/4 Query is a powerful tool to generate simple reports without any coding. ABAP/4 Query can generate the following 3 simple reports: Basic List: It is the simple reports. Statistics: Reports with statistical functions like Average, Percentages. Ranked Lists: For analytical reports. - For creating a ABAP/4 Query, programmer has to create user group and a functional group. Functional group can be created using with or without logical database table. Finally, assign user group to functional group. Finally, create a query on the functional group generated.

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

0 1563
Q:

Which standard govern parallel communications?

A) CAT 5 B) RS232
C) RS-232a D) IEEE 1284
 
Answer & Explanation Answer: D) IEEE 1284

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Network Administration
Exam Prep: AIEEE , Bank Exams
Job Role: Analyst , Bank Clerk , Bank PO

0 1562
Q:

What are the different objects used in JavaScripts?

Answer

JavaScripts uses a hierarchical structure that applies to the objects in a document. There are some objects that show the relationship of one object to another using the language.

Window object: This is the topmost object in the hierarchy. It represent the content area of browser window that consists of HTML documents. Each frame is also a window that has some actions inside it.


Document object: This object gets loaded in a window and consists of objects of different kind in the model. It consists of the content that will be written in the script.

Form object: Form objects are used for more interaction with the users. It represents the form elements inside <FORM>...</FORM> tag.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1557
Q:

What is the use of providing web hosting services?

Answer

- Web hosting services provide internet hosting and its services that provide organization to build the websites. 


- The web hosting services also allow the individuals to access the websites through the World Wide Web. 


- Web hosting provides the space to put their content and allow the clients to provide the Internet connectivity. 


- It provides the data center that allows the use of higher space and connectivity properties for the Internet users. 


- It provides tools to allow the website to run on the servers and easily accessible from the outside world using the browser.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1557