
Search In

Vendor risk management (VRM) is an essential part of the risk management policy. Vendors play a critical role in the success of the day to day activities of a business. The third parties offer crucial services to a company in a cost-effective manner,
While working with bulk of records in MVC Model View Controller, you need to display it in the grid or repeater.
With binding it with the grid is different thing in MVC for those who have bind it in simple web application before.
&nbs
Encapsulation
Encapsulation is defined as the process of combining the data and functions into one entity, encapsulation is a concept of making fields private and allow the access through public methods.
As we are making field private so it is also
To make Button,TextView,Images and other android components looks better and stylish, we create Gradient drawable.
For using Gradient drawable, we can make shading effects and make better GUI.
We need to create drawable folder inside the res folder
Static Keyword
Static keyword can be applied on
1.Method
2.Variable
3.Class nested within another Class
4.Initialization Block
Static keyword can not be applied to
1.Class (Not Nested)
2.Constructor
3.Interface
4.Method Local Inner Class(Di
SQL Join query is used to join the two tables i.e add or combine two or more tables .
This clause take data from two or more table in database and then combine them to produce new table .
Joining is based upon the common fields from the tables .
Adva
To reset ArrayList we have two options, one is to use clear() method and another is to use removeAll().
We don’t need to worry if size of the ArrayList is small i.e. 10 to 100.
But if ArrayList size becomes huge the difference in the performance of
By following these steps you can be able to generate MD5 and SHA1 fingerprint for your android application using command prompt.(It will surely work in windows7)
First of all you need to get the paths for keytool and keystore.
keytool you can find
Consider an HTML table with multiple rows having radio button in first column of each row. Now, if we want to change the row color when radio button associated with it is clicked, we have to write following code.
// HTML //
Untitled
SQL injection attack can access the sensitive data from the database. The attacker can Insert, Update, Delete and execute the administration operation.
Detection:
Authentication Forms : When user enter the web form, chances are that the user creden
