
Search In
While using ADO.NET classes we perform manipulations with data and tables.
But if in any case we first want to know the table structure or want to get the schema structure then we can also use this classes for that.
This is to insta
Here is small example which will give you a basic idea about CakePHP find & save operation.
<?php
class PagesController extends AppController {
public $name = 'Pages';
public $uses = array('User');
public function show() {
i
In MVC everything is based on the concept of action contained in the controller and the view that is being generated for that action.
While performing deletion in the gridview you first need to make the model class that will access the detai
The SELECT TOP clause is used to return specific number of records with thousands of records. It is used to select top N number of records from a table. We can use number or percent to select record.
TOP clause is not supported by all the databases.
While performing the CRUDE operations like insert delete update in the database we make use of the functions provided by the SQL classes.
Mostly we use ExecuteNonQuery function for the CRUDE operations but we need to unders
Hash Conditions in Active Records (Rails)
Active records allows us to to pass in array conditions to our query to fetch a single record or all the records matching
the key value pair. In these hash conditions we pass the key as the name of th
Do you have lots of data of an employee and you want to filter it without using database query then you can use predicates that also provides you queries on beans or model class.
Basically predicates comes from predicate function that returns true o
Magento handles the setting and getting values of the fields with the set and get methods.
To understand how it handles using these methods lets see :
the set method in magento works as setter method, which sets to the value of the attributes and th
The modern epoch has significantly augmented our lifestyle but the fact that the security breach is still a major challenge of the system can’t be neglected!
Whether it is phishing attacks or data theft, one cannot be sure enough about
Java applications are not unknown to the world and it has completely transformed the way how business enterprises interact with their potential customers. Java Apps are quite user-friendly and interesting to use. Further, the amazing user interface i
