Ques:- What is the syntax of m_dump command?

Ques:- Who was the founder of the capital city Pataliputra inImperial Magadha?(1) Bimbisara(2) Ashoka(3) Ajatasatru(4) Samudra Gupta
Right Answer:
(1) Bimbisara
(1) Bimbisara
Ques:- How do you configure mapping in informatica
Ques:- What is the use of Temp tables in Interface programs ?
Asked In :-
T24 Defence, habile technologies,
Ques:- What are the two basic ways in which classes that can be run as threads may be defined?
Asked In :-
habile technologies,
Ques:- What is JSP scriptlet ?
Asked In :-
Neudesic Technologies, Acuiti Labs (I), davidson kempner capital management, habile technologies, cloudstrats., amadeus software labs india private limited,
Ques:- What is the need of implicit objects?
Asked In :-
Nichi-In Software Solutions, habile technologies,
Ques:- How to track “memory leak” and how to prevent it in java?
Ques:- Given an array and a sum s find all pairs of numbers which whoose sum=s
Asked In :-
cefalo, habile technologies,
Ques:- Do Ajax applications always deliver a better experience than traditional web applications?
Asked In :-
eGain Communications, Thirdware, Acrotrend Solutions, Pocket Pill, DigiQ Solutions, Brokerbay, Blue Yonder, seclore, upgrade, inc., seasia infotech,
Ques:- How to go next field without filling the text? Which function should we use?
Asked In :-
TPF Technologies, Befree, SPB, House of Code, MadoX Technologies, Winman Software India, Turbolab Technologies, itc infotech, etsy, iba group,
Comments
Why dont we use the focus.(frm.txt2.focus()) ???
write a function for onBlur event of ur text field.
Ques:- Can javascript code be broken in different lines?
Asked In :-
Happiest Minds Technologies Pvt., Elsner Technologies, Newt Global India, WebReinvent Technologies, Junior Assistant, IndiaNIC Infotech, Canopus Infosystems, Profound Edutech, KnackForge, Ula Design,
Ques:- What can be the challenges during testing a program or a system?
Asked In :-
BYTEFORZA TECHNOLOGIES, ThinkSys Software, Wingify Software, Webskitters, HuntingCube, Webtech Developers, Digital Info Bytes, FreJun, CEPTES Software, quotient technology inc.,
Ques:- How to provide the security for the mobile applications ?
Asked In :-
Addweb solutions, LiteBreeze Infotech, SWYM, Grid Logic Software, Zyoin Web Pvt., Celestial Systems Pvt., Keka, FOX SOLUTIONS, C E I India, Smart Cube India,
Right Answer:
To provide security for mobile applications, implement the following measures:
1. Use secure coding practices to prevent vulnerabilities.
2. Encrypt sensitive data both in transit and at rest.
3. Implement strong authentication and authorization mechanisms.
4. Regularly update the app to fix security vulnerabilities.
5. Use secure APIs and validate input data.
6. Employ code obfuscation to protect the app's source code.
7. Conduct regular security testing and audits.
To provide security for mobile applications, implement the following measures:
1. Use secure coding practices to prevent vulnerabilities.
2. Encrypt sensitive data both in transit and at rest.
3. Implement strong authentication and authorization mechanisms.
4. Regularly update the app to fix security vulnerabilities.
5. Use secure APIs and validate input data.
6. Employ code obfuscation to protect the app's source code.
7. Conduct regular security testing and audits.
Ques:- What are the different types of cloud deployment models in Azure
Asked In :-
Travanleo Info Solutions India, Helical It Solutions, Apttus Software, FOX SOLUTIONS, Talent Smart Soft Solutions (OPC), Solugenix India, Koenig Solutions, Systematix Infotech, CloudMoyo, Inc, Cybrosys Technologies,
Right Answer:
The different types of cloud deployment models in Azure are:
1. Public Cloud
2. Private Cloud
3. Hybrid Cloud
4. Multi-Cloud
The different types of cloud deployment models in Azure are:
1. Public Cloud
2. Private Cloud
3. Hybrid Cloud
4. Multi-Cloud
Ques:- What are service endpoints and private endpoints in Azure networking
Asked In :-
SenecaGlobal IT Services, Anlage Infotech (I), Fulcrum Logic (I), Stridely Solutions, PreludeSys India, Savantis, 159 Solutions, Astoria Technologies, Solunus, Accucia,
Right Answer:
Service endpoints in Azure networking allow you to secure your Azure services to your virtual network by providing direct connectivity to Azure services over an optimized route, enhancing security and performance.
Private endpoints, on the other hand, are a network interface that connects you privately and securely to a service powered by Azure Private Link. This allows you to access Azure services over a private IP address within your virtual network, ensuring that traffic does not traverse the public internet.
Service endpoints in Azure networking allow you to secure your Azure services to your virtual network by providing direct connectivity to Azure services over an optimized route, enhancing security and performance.
Private endpoints, on the other hand, are a network interface that connects you privately and securely to a service powered by Azure Private Link. This allows you to access Azure services over a private IP address within your virtual network, ensuring that traffic does not traverse the public internet.
Ques:- What is a Network Security Group and how do you use it to secure traffic
Asked In :-
Evolvus Solutions, Talent Smart Soft Solutions (OPC), Anlage Infotech (I), ARMIA SYSTEMS, CAFS, ESDS Software Solution, Cybrosys Technologies, BluePi, NovoInvent, Goavega,
Right Answer:
A Network Security Group (NSG) is a set of security rules that controls inbound and outbound traffic to Azure resources. You use it to secure traffic by defining rules that allow or deny specific IP addresses, ports, and protocols, effectively managing access to your Azure resources.
A Network Security Group (NSG) is a set of security rules that controls inbound and outbound traffic to Azure resources. You use it to secure traffic by defining rules that allow or deny specific IP addresses, ports, and protocols, effectively managing access to your Azure resources.
Ques:- How does Azure Load Balancer differ from Azure Application Gateway
Asked In :-
Trigent Software, infobell IT solutions, Bhanguz, PrimeSoft Solutions, EY GDS, Statestreet HCL Services, iProgrammer, Knot Solutions, FlyNava Technologies, RND Softech,
Right Answer:
Azure Load Balancer operates at the transport layer (Layer 4) and distributes incoming network traffic across multiple servers, while Azure Application Gateway operates at the application layer (Layer 7) and provides features like URL-based routing, SSL termination, and Web Application Firewall (WAF) capabilities.
Azure Load Balancer operates at the transport layer (Layer 4) and distributes incoming network traffic across multiple servers, while Azure Application Gateway operates at the application layer (Layer 7) and provides features like URL-based routing, SSL termination, and Web Application Firewall (WAF) capabilities.
Ques:- What are service endpoints and private endpoints in Azure networking
Asked In :-
Trigent Software, Coviam Technologies, Shipmnts, Talent Smart Soft Solutions (OPC), Anlage Infotech (I), Khoj Information Technology, ANR Software, Sanitation Districts of Los Angeles County, LPG, ESDS Software Solution,
Right Answer:
Service endpoints in Azure networking allow you to secure your Azure services by enabling direct connectivity to them from your virtual network, enhancing security by restricting access to the service from only your VNet.
Private endpoints, on the other hand, provide a private IP address from your VNet to an Azure service, allowing you to access the service over a private link, ensuring that traffic remains within the Azure backbone network and is not exposed to the public internet.
Service endpoints in Azure networking allow you to secure your Azure services by enabling direct connectivity to them from your virtual network, enhancing security by restricting access to the service from only your VNet.
Private endpoints, on the other hand, provide a private IP address from your VNet to an Azure service, allowing you to access the service over a private link, ensuring that traffic remains within the Azure backbone network and is not exposed to the public internet.