Ans : Java Beans are reusable software component model which allow a great flexibility and addition of features in the existing piece of software. You will find it very interesting and useful to use them by linking together the components Read More …
Author: ignougroup
Ques : GET and POST Methods
Ans : The GET methods is a request made by browsers when the user types in a URL on theaddress line, follows a link from a Web page, or makes an HTML form that does notspecify a METHOD. Servlets can Read More …
Ques : What is Complexity Analysis
Ans : In function gcd(m,n), each iteration of while loop has one test condition, one divisionand two assignment that will take constant time. Hence number of times while loopwill execute will determine the complexity of the algorithm. Here it can Read More …
Ques : What is Asynchronous Transfer Mode (ATM)
Ans : ATM is a form of data transmission that allowsvoice, video and data to be sent along the same network. In contrast to ATM, in thepast, voice, video and data were transferred using separate networks. For example,voice was transmitted Read More …
Ques : Advantages of GSM
Ans : • GSM is already used worldwide with millions of subscribers. • International roaming allows subscriber to use a single mobile phone throughoutWestern Europe. CDMA works in Asia, but not in France, Germany, the U.K.and other popular European destinations. Read More …
Ques : Describe Wireless Generations
Ans : Cellular Mobile System has come a long way as at present scenario, every personcarries a cellular phone in his/her hand. This tremendous growth has established thegrowth of cellular technology. From a cordless phone which gave mobility to usersbut Read More …
Ques : Describe Security Services
Ans : ConfidentialityConfidentiality means keeping information secret from unauthorized access and isprobably the most common aspect of information security. It is important to protectconfidential information. An organization needs to guard against those maliciousactions that endanger the confidentiality of its information. Read More …
Ques : Describe Types of Security
Ans : Information Technology (IT) Security – consists of following types: Application security, Computer security, Data security, Information security Network security Application SecurityApplication security prevents attack and vulnerabilities on an application. Thisapplication can be a mobile application or any other Read More …
Ques : Write a simple C program
Ans : From the above sections, you have become familiar with a programming languageand structure of a C program. Its now time to write a simple C program. This programwill illustrate how to print out the message “This is a Read More …
Ques : C Program Structure
Ans : As we have already seen, to solve a problem there are three main things to be takeninto consideration. Firstly, what should be the output? Secondly, what should be theinputs that will be required to produce this output? Thirdly, Read More …