Media and Topologies

  • Centralized computing is an environment in which a mainframe computer provides data storage and computational abilities.
  • Bus topology uses a 10Base2 cable.
  • Bus topology is the easiest to implement.
  • Bus and Ring are zero fault tolerant topologies.
  • Full-mesh topology is the most fault tolerant topology.
  • Mesh topology is a type of physical network design where all devices in a network are connected to each other with many redundant connections.
  • In star topology, when a single connection to one of the network hosts fails, the failed connection will be down and the host will not have network connectivity.
  • LEDs on a network card of a client computer indicates the sending and receiving of data.
  • Continue reading

E-Commerce Site Development

  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The number of hits per page will help you rank the Web pages in your site according to their popularity. The number of hits per page denotes the number of clicks on that particular page. The more the number of hits, the more popular is the page.
  • Electronic commerce (E-Commerce) includes the buying and selling of goods and services, and the transfer of funds, through digital communications.
  • E-Commerce increases efficiency, opens new markets, and can be used to communicate directly with the customer.
  • A Web site that is created should be efficient and easy to use. This is the main idea behind usability.
  • AutoComplete is a feature of a browser in which the user is provided with the options he has previously used.
  • The integration that can be used to manage data, security, etc., for the sales of goods and services conducted through the Internet is known as e-commerce.
  • Continue reading

uCertify (Nov 21, 2008). uCertify, a leading provider of exam preparation software for IT certification exams, today announced huge discount of 37.23% on the entire range of its practice tests. This discount offer is valid only until Sunday, November 30th, 2008. uCertify also offers unconditional 100% money back guarantee, on all its products. You will pass or we will return your money.

“You can now purchase uCertify practice tests for MCSE, MCITP, MCTS, SCJP, A+, CIW, OCP and other certifications and save 37.23% on the regular price. This is the lowest price of the year and you are advised to take advantage of this limited period opportunity now,”said Mark Smith, Director, Product Management, uCertify. Continue reading

Configuring Recovery Manager

  • The control file, target database catalog, and Recovery catalog is used to store the RMAN’s persistent settings.
  • The alert log file is used to find out the values of the changed parameters at the time of instance startup.
  • The NLS_LANG parameter must be set to specify the language, territory, and character set used in an application.
  • CONFIGURE RETENTION POLICY CLEAR is a command that will configure the retention policy to the default of REDUNDANCY 1.
  • CONFIGURE is an RMAN command that configures an RMAN environment.
  • The rman target/ command is used to maintain backup copies by connecting to the target database and returns the RMAN prompt to issue further backup commands.
  • The redo files are opened after executing the ALTER DATABASE OPEN command on a database when it is in MOUNT mode.

Understanding Globalization Support
Continue reading

Retrieving data using the SQL SELECT statement and using single row functions to customize the output

  • /*…*/ and — are used to put comments in an Oracle program.
  • The CREATE TABLE does not end immediately with a semicolon, and a column name cannot start with a numeric value. However, a numeric value can be used in between a column name.
  • Name of a table cannot start with @ special character.
  • Knowing about the GROUP BY clause.

Using sub queries and set operators to solve queries, as well as DDL statements to create and manage tables

  • + (unary), – (unary), *, /, ||, =, !=, <, >, <=, >=, IS NULL, LIKE, BETWEEN, IN, NOT, AND, OR is the correct order of operators precedence.
  • Continue reading

muhanad-younis
muhanad-younis

Muhanad is a Microsoft.NET purist and an MCP,MCAD,MCSD and he is working as a Senior Developer and Technical Leader at TurkSat Turkey.In the Past Muhanad has worked as a Senior Developer at Sentim.He had also worked as an Export Expert at Motali. In addition to this He had been associated with REEM Network and worked there as a CEO of the company.

He has specialized in E-Government and Entreprise projects,specialized in framework development and projects infrastructure preparation to give developers more stable and consistent platform.

Out of his interest and curiosity in learning more and more about latest technologies, Muhanad writes about various new technologies and certifications. His articles can be read on http://weblogs.asp.net/muhanadyounis/

After reviwing the uCertify PrepKit 70-553, Muhanad said “I did not think that studying for IT exams could come that much easy, but after I saw the uCertify package, I believed that there is no way to FAIL!”

Continue reading

Creating User Services

  • The identity object that implements the IIdentity interface, is used during the authentication process, when a user’s identity is verified. It contains information about a user who is being validated, such as username and password.
  • The principal object that implements the IPrincipal interface, is used during the authentication process when the application determines the data that can be accessed by a user and the code to be executed. It contains information about a user’s identity, such as username and password, as well as information about a user’s role, such as manager or associate.
  • Setting the MinimizeBox property of a Windows form to false prevents the minimize button from being displayed in the caption bar of the form.
  • Continue reading

Creating and Managing Microsoft Windows(r) Services, Serviced Components, .NET Remoting Objects, and XML Web Services

  • The SessionID property of the HttpSessionState class identifies an active ASP.NET session by using a unique session ID.
  • The Process.Start method is used to start a Windows application and is registered in the system registry on a computer.
  • The Status property of the ServiceController class specifies the status of the current instance of a Windows service.
  • If a class derives from the ServiceBase class, the OnCustomCommand method is executed when the Service Control Manager (SCM) passes a custom command to the service. This method is used to specify actions when a command with the specified parameter value occurs.
  • The AutoLog property of the ServiceBase class is used to determine whether or not a service automatically logs the entries in the event log when events such as Start, Stop, Pause, and Continue occur.
  • The CreateEventSource method of the EventLog class establishes an application as a valid event source for writing event information to a particular event log on a computer.
  • The Imports statement is used to import namespace names from referenced projects and assemblies.
  • Continue reading

General high availability technologies in 10g

  • The ORDER BY clause sorts the records in ascending order and it comes last in the SELECT statement.
  • The Online redo log files and the operating system flat file are used to store a copy of a data dictionary.
  • RMAN can be used to take an incremental backup for tablespaces and data files.
  • The rman target/ command is used to maintain backup copies by connecting to the target database and returns the RMAN prompt to issue further backup commands.
  • The NLS_LANG parameter must be set to specify the language, territory, and character set used in an application.
  • CONFIGURE is an RMAN command that configures an RMAN environment.
  • CONFIGURE RETENTION POLICY CLEAR is a command that will configure the retention policy to the default of REDUNDANCY 1.
  • RMAN is used to migrate the database files from conventional file system storage to ASM storage.
  • The control file, target database catalog, and Recovery catalog are used to store the RMAN’s persistent settings.
  • The redo files are opened after executing the ALTER DATABASE OPEN command on a database when it is in MOUNT mode.
  • RMAN can be used to move database objects from a non-ASM disk location to an ASM disk group.
  • The V dynamic performance view includes the status, the location where the block change tracking file is stored, and the size in bytes of the file.
  • Continue reading

e-business Infrastructure

  • File Transfer Protocol (FTP) is an Internet service that helps in transferring files from one computer to another over the Internet.
  • Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to-Point Tunneling Protocol (PPTP). It provides tunneling, address assignment, and authentication.
  • Virtual private network (VPN) uses a tunneling protocol to span public networks, such as the Internet, without security risk. VPN enables remote users to access corporate networks securely by using a tunneling protocol such as PPTP or L2TP.
  • TCP/IP is the primary protocol of the Internet.
  • SMTP uses port 25 by default.
  • Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol suite. It is responsible for the resolution of IP addresses to media access control (MAC) addresses of a network interface card (NIC).
  • FTP uses port 20 and 21 by default.
  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The TCP/IP protocol should be bound to the dial-up adapter for Internet access on a Windows 98 computer.
  • Continue reading