
Search In
These statement consist of queries that retrieve data from tables in database and statements that change the data in the database
Statement under this category are:
SELECT
INSERT
UPDATE
DELETE
LOCK TABLE etc.
Insert command
It is used to add
Many times I stuck in an issue of getting parent elements or specific elements to build a specific functionality over it. So that I went through the jquery library, where I found 2 relevant methods to get the specific elements or parent elements. The
Marker Interface in java:
Marker Interface is an interface in which there are no members. i.e we don't define any methods or data members inside the marker interface. It is also called tag interface. A very obvious question comes in mind th
PHP is a server side scripting language which is used to create dynamic web pages.
PHP5 ia an updated version of PHP. PHP4 is no longer developed.
There are some additional features in PHP5 due to which it is used widely.
Some features are below:-
Ever pondered what's that something unique that makes a leader stand out amongst thousands around? Why do people feel polarized by that spirit who you feel bound to call a leader? What's that moxy/charisma such an identity holds which keeps o
It is based on Divide and conquer approach. We first partition the list and then sort it and after sorting we combine the final list or array
It is being merged and sort using the merge sort algorithm.
This
GTP protocol is designed for the tunneling and for the encapsulation of control messages in GPRS
GTP is available in two variants, control and user plane. GTP-C manages the control plane signaling, and it is important for the dat
If we are required to show a popup in our Magento page for say we want to show the details of the product from the list of products in a popup we can do it using Magento 1.9.x features.
In Magento 1.9.x we have window.js file, the file can be f
When we connect a terminal to the network, it will get an IP address and all the communication will be based on that particular IP address.
When the terminal changes its physical position , then the IP address associated to that changes acco
Hi guys, I want to tell you the use of NOLOCK with simple example but before this lets discuss some terms
Lock:-
When multiple users or applications access the non-shareable resource at the same time, Locking allows to access the resource s