Technology Questions

Q:

What are the security features being provided in web security?

Answer

Security features are very essential in the system as it provides an overall security of the system by applying the patches and the services that keeps the unwanted access away. 


The security features included are as follows:


- Use of algorithms in relation to, the security and the system to, solve the problem of the security. 


- Use of SSL or any encryption method to, protect the system from intrusion or any other attack. 


- Use of SSL in the SimpleWebServer that doesn’t provides the protection against the DoS attack and doesn’t allow the accessing to, be done using the /etc/shadow.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1903
Q:

What are the different new form element types in HTML 5?

Answer

These are the new form elements introduced in HTML 5:


Color


Date


Datetime-local


Email


Time


Url


Range


Telephone


Number


Search

Report Error

View answer Workspace Report Error Discuss

0 1897
Q:

What is the procedure to configure the web browser to accept or reject cookies?

Answer

- The web browser visits a website using the HTTP and then it keeps the track of the identity of the user visiting the web page.


- The cookies of HTTP get stored with the personal information of the user and it doesn’t accept the information. 


- Users accept the cookies as by rejecting all the cookies will load the web page in longer time and it will not be desired by the users. 


- Even if the cookie is being rejected a session cookie is being kept for use as it is the provision given to the web browser to use it. 


- The cookies gets stored temporary basis depending on the user of accepting or rejecting it and it basically saves the session so that the duration of the page load can be reduced.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1890
Q:

What is the impact of declaring a method as final?

Answer

A method declared as final can't be overridden. A sub-class can't have the same method signature with a different implementation.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 1888
Q:

How to Accessing Elements using javascript?

Answer

The elements of JavaScript are accessed by their names. By default the browser is accessed by the element ‘windows’ and the page by ‘document’. The corresponding element has user defined names for forms and its elements. For example


var pwd = windows.document.frmLogin.password.value;


assigns the value of the password field of the form fromLogin in the current document, where password is the name of the element and frmLogin is the name of the form. Like wise any form element is accessed.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1886
Q:

What documents should be delivered by a Business Analyst should deliver?

Answer

The documents that a business analyst should deliver are functional specification documents, technical specification documents, Requirements traceability, BRD (business requirements document), Use case diagrams and Business flow documents.

Report Error

View answer Workspace Report Error Discuss

0 1886
Q:

What is an ABAP/4 Query?

Answer

ABAP/4 Query is a powerful tool to generate simple reports without any coding. ABAP/4 Query can generate the following 3 simple reports: Basic List: It is the simple reports. Statistics: Reports with statistical functions like Average, Percentages. Ranked Lists: For analytical reports. - For creating a ABAP/4 Query, programmer has to create user group and a functional group. Functional group can be created using with or without logical database table. Finally, assign user group to functional group. Finally, create a query on the functional group generated.

Report Error

View answer Workspace Report Error Discuss

Subject: ABAP

0 1885
Q:

What are the security measures that are taken to make Android secure?

Answer

Android uses many security measures to keep them away from the hackers. They have designed by making changes to the devices or installing a software service on the mobile. Android application uses sandbox that is very popular and allow limited access to the information that is very private and sensitive for the user. It allows the permissions to be set for the use of the information. The security measures that are provided by android is the use of the encryption of the messages that allow user to remain without worry about there phone security. They also consists of user terms and agreements that also taken care of. Most of the time android doesn't allow other applications to run on their system but it can be done by using different resources that are available on-line. As, android is open source it is not fully secure but lots of security issues are being solved for make it more popular and bug free.

Report Error

View answer Workspace Report Error Discuss

0 1882