Technology Questions

Q:

What are the security laws which take care of the data in the cloud?

Answer

The security laws which are implements to secure data in the cloud are as follows:


- Input validation : controls the input data which is being to any system.


- Processing  : control that the data is being processed correctly and completely in an application.


- File : control the data being manipulated in any type of file.


- Output reconciliation : control the data that has to be reconciled from input to output.


- Backup and recovery: control the security breaches logs and the problems which has occurred while creating the back.

Report Error

View answer Workspace Report Error Discuss

Subject: Cloud Computing

2 3392
Q:

What is personal oracle lite?

Answer

Personal Oracle lite is single user database for distributed and mobile computing. It supports a full range of Java database features as well as advanced replication. Or in other words it is Oracle's lightweight, fully-functional, single-user object- relational database. A small, zero administration embedded database.


Some of the features supported:


- Java Support


- Java Store Procedure Support


- Java triggers Supported


- Multi-column indexing and outer joins.


- Easy to use graphical user interface


- Supports both object and relational database models


- Simultaneous viewing of classes and relational tables

Report Error

View answer Workspace Report Error Discuss

Subject: Oracle

0 3388
Q:

Explain about Blackberry Enterprise Server.

Answer

BlackBerry Enterprise Server: The BlackBerry handhelds are integrated into the e-mail system of the organization through software BlackBerry Enterprise Server. The BES versions are available for MS Exchange, Novell GroupWise and Lotus Domino. A connector was made by Google for BES for making BES available for Google Apps. A new feature is added which enables to track the current location of an individual through trailateration.

BES provides handhelds with the connectivity of TCP/IP which can be accessed through a component known as “Mobile Data Service – Connection Service – MDS-CS. This allows the development of custom application development using data streams on BlackBerry devices which are based on the Sun JME platform.

BES also provides network security in the form of Triple DES or AES encryption standard of all data including e-mail and MDS traffic, which travels between the BlackBerry hand held devices and a BES.

Report Error

View answer Workspace Report Error Discuss

1 3380
Q:

Explain the difference between data mining and data warehousing.

Answer

Data mining is a method for comparing large amounts of data for the purpose of finding patterns. Data mining is normally used for models and forecasting. Data mining is the process of correlations, patterns by shifting through large data repositories using pattern recognition techniques.


Data warehousing is the central repository for the data of several business systems in an enterprise. Data from various resources extracted and organized in the data warehouse selectively for analysis and accessibility.

Report Error

View answer Workspace Report Error Discuss

0 3379
Q:

How can we get the browser properties using PHP?

Answer

By using
$_SERVER['HTTP_USER_AGENT']
variable.

Report Error

View answer Workspace Report Error Discuss

Subject: PHP

0 3363
Q:

What does FMEA stand for?

Answer

FMEA is Failure Mode and Effects Analysis. It is an analysis used to determine failure modes and how severe they are in a system or process.


 

Report Error

View answer Workspace Report Error Discuss

0 3346
Q:

Record set types and Number available in VB?

Answer

3.


1- Dynaset, 0 Table, 2 Snap Shot. 

Report Error

View answer Workspace Report Error Discuss

11 3338
Q:

The EIB field which gives the last CICS command executed is?

Answer

EIBRCODE

Report Error

View answer Workspace Report Error Discuss

0 3317