Technology Questions

Q:

What is the security mechanism used in java?

Answer

Java uses sand box security model.

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2029
Q:

What is the purpose of pseudo-elements?

Answer

Pseudo elements allow the use of the part of element and not the element itself. They are applied to block level element, which is used for the complete block for which the CSS is being written. This allow the subpart of an element to be styled like paragraphs and headings. For example:


selector:pseudo-element {property:value;}


p: first-line {text-transform: lowercase;}


It adds the style to the first line of the code in the paragraph.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2028
Q:

Why cannot you run standard Java byte code on Android ?

Answer

Android uses Dalvik Virtual Machine (DVM) which requires a special bytecode. We need to convert Java class files into Dalvik Executable files using an Android tool called "dx". In normal circumstances, developers will not be using this tool directly and build tools will care for the generation of DVM compatible files.

Report Error

View answer Workspace Report Error Discuss

1 2027
Q:

What is website?

Answer

Basically website is an information provider, It provides information globally using internet protocols.


 

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2026
Q:

What are meta tags used for?

Answer

-To store information usually relevant to browsers and search engines.


-To only store information usually relevant to browsers


-To only store information about search engines.


-To store information about external links

Report Error

View answer Workspace Report Error Discuss

0 2024
Q:

What are the built-ins used for finding Object ID function?

Answer

FIND_GROUP(function) FIND_COLUMN(function)

Report Error

View answer Workspace Report Error Discuss

2 2024
Q:

What are Cursors? Explain Types of cursors in PL/SQL

Answer

Cursors help you manipulate the information retrieved by select statements. This can be done by assigning a name to the cursor.


Example:


CURSOR emp_cur 


IS 


SELECT emp_number from employee_tbl where employee_name = name_in;


Types of Cursors:


Implicit cursors- These cursors are not declared by the programmer. They are issued when the SQL statement is executed. The open, close and fetching is done by itself.


Example:


UPDATE employee SET salary = salary * 2.1;


Here, an implicit cursor is issued to identify the set of rows in the table which would be affected by the update.


 


Explicit cursors- These cursors are defined by programmer. They are used in queries that return multiple rows.


Example:


CURSOR emp_cur 


IS 


SELECT emp_number from employee_tbl where employee_name = name_in;

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

1 2024
Q:

What are the 3main tasks of JVM?

Answer

The JVM performs three main tasks:


• Loads code


• Verifies code


• Executes code

Report Error

View answer Workspace Report Error Discuss

Subject: Java

0 2024