Technology Questions

Q:

Explain the use of keyword WITH ENCRYPTION. Create a Store Procedure with Encryption

Answer

It is a way to convert the original text of the stored procedure into encrypted form. The stored procedure gets obfuscated and the output of this is not visible to


CREATE PROCEDURE Abc


WITH ENCRYPTION


AS


<< SELECT statement>>


GO

Report Error

View answer Workspace Report Error Discuss

Subject: SQL

0 2912
Q:

Describe the Basic Steps used to create a tiles application in DHTML.

Answer

- Create a template that designs a layout for your application.


- Create the composing pages.


- Create a definition which means that suppose that you configured Tiles, in web.xml, to startup using the TilesServlet, we need to specify which files will contain the Tiles definitions to load.


- Render the definition.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

2 2906
Q:

What are the restrictions when overriding a method ?

Answer

Overridden methods must have the same name, argument list, and return type (i.e., they must have the exact signature of the method we are going to override, including return type.)


The overriding method cannot be less visible than the method it overrides( i.e., a public method cannot be override to private).


The overriding method may not throw any exceptions that may not be thrown by the overridden method

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2906
Q:

What are the privacy and security features being provided by web browsers?

Answer

- Web browser supports HTTP secure method that allows more security for the sites that are involved in day to day basis transaction. 


- Security offers quick and easy way to remove the unwanted material or the things that are stored without permission like cache, cookies and history. 


- Security is being provided by the use of blockers that blocks unwanted access to the websites from the outside. 


- Web browser uses other features like disabling of JavaScript and pop up blockers to block any unwanted scripts or messages to run on the system.


- Web browser also uses the security concerns in regard of blocking the access to the secure sites that provides money transfer facilities, etc.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

3 2903
Q:

Which among the following validators checks if entered data matches a specific format

A) Compare validator B) RegularExpressionValidator
C) CustomValidator D) None
 
Answer & Explanation Answer: B) RegularExpressionValidator

Explanation:

RegularExpressionValidator checks if entered data matches a specific format

Report Error

View Answer Report Error Discuss

Filed Under: .NET
Job Role: Software Architect

0 2898
Q:

What are storage qualifiers in C++ ?

Answer

ConstKeyword indicates that memory once initialized, should not be altered by a program.
Volatile keyword indicates that the value in the memory location can be altered even though nothing in the program.
Mutable keyword indicates that particular member of a structure or class can be altered even if a particular structure variable, class, or class member function is constant.

Report Error

View answer Workspace Report Error Discuss

Subject: C++

0 2888
Q:

What do you understand by MapReduce?

Answer

MapReduce is a software framework that was created by Google. It`s prime focus was to aid in distributed computing, specifically large sets of data on a group of many computers. The frameworks took its inspiration from the map and reduce functions from functional programming.

Report Error

View answer Workspace Report Error Discuss

Subject: Cloud Computing

1 2882
Q:

What command-line tool would help you discover for which port numbers your computer is listening?

Answer

netstat -n  (on Dos prompt)

Report Error

View answer Workspace Report Error Discuss

1 2880