What is Database Transaction ?

0
Transaction Management In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
Amity-Gif

Amity YOUTH FEST 2017

0
Amity Youth Festival 2017 Amity University’s Computer Science Department cordially invite your college students to participate in a Three-day fest organized bythe University from the...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

Database Transaction

0
Database Transaction Transaction is a Collection of operations that forms a single logical unit of work. A transaction is an atomic unit of work that...

Masking and IP Addressing format

0
Types of Addressing Classful Addressing Classless Addressing Classful Addressing  IPv4 uses concept of classes. This architecture is called classful addressing  Types of Classes                                 Class...

Google Search for Serial Key

0
Serial Key If you want to use any software n software is asking to enter key and you don't have key. What you will do now? Buy         ...
linux

Linux Password Stored Format in /etc/passwd

0
                          This was Linux users file, to understand linux password file /etc/shadow