in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
2066What is abstract Method i want the exact definition and is there any possibility to declare class as abstract without any abstract methods in that class?If it is possible then tell me why and how?
1922what is the main usage of an abstract keyword?please follow the program class A { void display() { System.out.println("hai"); } void print() { } } class B extends A { void print() { System.out.println("Hello"); } } In this program i was gives the implementation of print() according to my requirements in subclass.And there is no definition in superclass then why we can use abstract keyword before a method that i want to gives definition in other classes,is any mistakes in the above usage of method?
1988I would like to know what is Intellimatch and some interview questions which could be asked related to Intellimatch.
3 26043write a program on c(or)c++(or)java language i.e if i have 5 numbers like (10,24,3,9,15) i want to display highest number from these numbers
2 4030Post New Programming Languages AllOther Questions
how do i add a column dynamically in a table by using java application?
Need provab technical test questions
what is radio button? Plz show code this! how will select radio buttons to go next window Forms? Supose o radio button1 o radio button2 o radio button3 o radio button4 how will coding this? Plz explain this!
sample and simple coding where we get?
Which CRM is better to opt, Sebiel CRM or Salesforce CRM or sap CRM? which institute is best one in hyderabad
how many types of operating system are avaliable?
You are given a dictionary of all valid words. You have the following 3 operations permitted on a word: delete a character, insert a character, replace a character. Now given two words - word1 and word2 - find the minimum number of steps required to convert word1 to word2. (one operation counts as 1 step.)
What is web.configuration? how is it work? & wht is use this?
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
will it allow to add same value in HashMap class.
5. Which of the following can you do with DB2 Express- C? Query databases with SQL Query databases with XML using XQuery and XPath Use SQL in Xquery and Xquery in SQL All of the above
How to connect the .accdb database file of microsoft access to the Visual Basic 6.0 forms?
What ports must be open for DCOM over a firewall? What is the purpose of Port 135?
What is the difference between CLEAR & RESET and OPEN & CLOSE OPCOEDS(USING RPG/400).wheare we can use this?can any body tell me in real time senario with example please?
what is web configuration file