
Search In
The Black Hawk is probably most famous for its use by United States forces in Somalia in 1993. christian louboutin pas cher l nike tn requin pas cher
Whatever their history, the fragrant heather honey and slightly tart rhubarb combine beautifully t
This post describes the major differences between CTE, temp table and table variables.
1) CTE
CTE stands for Common Table expressions. These are simple select queries and they do not create physical space in tempDB. Unlike temporary table there
Programming key commands
Action
Android Studio Key Command
Command look-up (autocomplete command name)
CTRL + SHIFT + A
Project quick fix
ALT + ENTER
Reformat code
CTRL + ALT + L (Win)
OPTION
Hello everyone, this article demonstrate some useful PHP functions which can be used to change string case into lowercase and uppercase. The article also demonstrate some other functions which can be used to convert first character of each word in a
Frame
Frames are HTML tag which divides the browser's window into multiple parts where each part can load a separate HTML document.
<frame> tag specifies each frame within a frameset tag.
A collection of frames in the browser window is known
Header Files in C++ are used to provide the functions and facilities that is used in our program to make our task easy to do and better way to perform.
Header files provides the way through which you can print or take input in our prog
Network Addressing
Network refers to the collection of components in a specified network or region.
Network address refers to the number of terminals connected within the network.
The addressing is mainly done to identify t
Project Management, a quite interesting stuff and full of challenges. However, everyone has different view in project management and ways for successful project completion.
Here I have jolted down few points for successful project completion :
Re
Data validation plays an important part in any of the application. It is very important to make ensure that user has input valid Fields or not. For example, passwords are at least eight characters long or more, User Names ,emails are unique,pho
Opening files
fopen() function is used to open the file. It require two arguement first the name and the other the mode.
the different mode are
r- open for read only
r+- open file for read and writing
w- open file for writing
w+- open file for
