Skip to main content

Posts

Showing posts from November, 2014

wi fi host port

Using Windows' Command Prompt, you can create a virtual network and share it to provide internet access to other devices: Launch a Command Prompt with Administrator privileges and enter the following command: netsh wlan set hostednetwork mode=allow ssid=sanjay key=7359977215 Change the SSID value to choose a different name if you want, and use "key" to set a password. This will create a virtual network adapter. Start the new virtual adapter by running the following command: netsh wlan start hostednetwork Go to the Control Panel and open up the Network and Sharing Center. You should see your new virtual adapter listed there (as shown in the screenshot above). Click the "Local Area Connection" link (or whatever shows up next to "Connections"). Click the Properties button in the window that appears. Head to the Sharing tab and then check the "Allow other network users to connect through this computer's Internet connection" box. Use the drop

wi fi host port

Using Windows' Command Prompt, you can create a virtual network and share it to provide internet access to other devices: Launch a Command Prompt with Administrator privileges and enter the following command: netsh wlan set hostednetwork mode=allow ssid=sanjay key=7359977215 Change the SSID value to choose a different name if you want, and use "key" to set a password. This will create a virtual network adapter. Start the new virtual adapter by running the following command: netsh wlan start hostednetwork Go to the Control Panel and open up the Network and Sharing Center. You should see your new virtual adapter listed there (as shown in the screenshot above). Click the "Local Area Connection" link (or whatever shows up next to "Connections"). Click the Properties button in the window that appears. Head to the Sharing tab and then check the "Allow other network users to connect through this computer's Internet connection" box.

If you want to remove oracle manually. follow the following simple steps

If you want to remove oracle manually. follow the following simple steps. 1.               Remove oracle from Registry. 2.               Remove oracle installed folder. 3.               Remove oracle from folder from program file or program files (x86) 4.               Remove oracle services. Setps Ø    Press Windows key + R Then type Ø    services.msc Open the Dialog box show all the  services Then show oracle services This services  you are find  specific secvices after choose a remove services name Press windows key  and search regedit.exe OR Press windows key + R and type regedit.exe Ø   Remove oracle key from HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services.           Delete each oracle key independently.         Ø   Remove folder where oracle is installed. Oracle 10g generally installed with the name oracle. Ø    Remove oracle folder from program files or program files (x86). 8. Now you have manually uninstalled Oracle 10g from your PC.   Ø   Restart your PC. Ø   Then reinsta

If you want to remove oracle manually. follow the following simple steps

If you want to remove oracle manually. follow the following simple steps. 1.               Remove oracle from Registry. 2.               Remove oracle installed folder. 3.               Remove oracle from folder from program file or program files (x86) 4.               Remove oracle services. Setps Ø    Press Windows key + R Then type Ø    services.msc Open the Dialog box show all the  services Then show oracle services This services  you are find  specific secvices after choose a remove services name Press windows key  and search regedit.exe OR Press windows key + R and type regedit.exe Ø   Remove oracle key from HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services.           Delete each oracle key independently.         Ø   Remove folder where oracle is installed. Oracle 10g generally installed with the name oracle. Ø    Remove oracle folder from program files or program files (x86). 8. Now you h

WiFi connection

 Know if your neighbours are stealing your WiFi connection command prompt codesCommand Prompt can let you know if someone is connected to your Local Area Connection and using it. Just follow the steps:- 1) Open your browser and visit http://192.168.1.1 or http://192.168.0.1 depending on your router. 2) Find the tab that mentions “Attached Devices” or something similar. 3) Find the computer name, IP address and MAC Address (sometimes called Physical Address or Hardware Address) of your computer using the previous trick. 4 )Compare it with those displayed by your router in Step 2. If you notice some strange devices, then your neighbour has been sneaking in on your internet connection and it is best to add a password.

WiFi connection

 Know if your neighbours are stealing your WiFi connection command prompt codesCommand Prompt can let you know if someone is connected to your Local Area Connection and using it. Just follow the steps:- 1) Open your browser and visit http://192.168.1.1 or http://192.168.0.1 depending on your router. 2) Find the tab that mentions “Attached Devices” or something similar. 3) Find the computer name, IP address and MAC Address (sometimes called Physical Address or Hardware Address) of your computer using the previous trick. 4 )Compare it with those displayed by your router in Step 2. If you notice some strange devices, then your neighbour has been sneaking in on your internet connection and it is best to add a password.

Exception Handling

Exception Handling In this section we will discuss about the following, 1) What is Exception Handling. 2) Structure of Exception Handling. 3) Types of Exception Handling. 1) What is Exception Handling? PL/SQL provides a feature to handle the Exceptions which occur in a PL/SQL Block known as exception Handling. Using Exception Handling we can test the code and avoid it from exiting abruptly. When an exception occurs a messages which explains its cause is recieved. PL/SQL Exception message consists of three parts. 1) Type of Exception 2) An Error Code 3) A message By Handling the exceptions we can ensure a PL/SQL block does not exit abruptly. 2) Structure of Exception Handling. The General Syntax for coding the exception section  DECLARE    Declaration section  BEGIN    Exception section  EXCEPTION  WHEN ex_name1 THEN     -Error handling statements  WHEN ex_name2 THEN     -Error handling statements  WHEN Others THEN    -Error handling statements END; General PL/SQL statments can be used

What is a Trigger?

What is a Trigger? A trigger is a pl/sql block structure which is fired when a DML statements like Insert, Delete, Update is executed on a database table. A trigger is triggered automatically when an associated DML statement is executed. Syntax of Triggers The Syntax for creating a trigger is:  CREATE [OR REPLACE ] TRIGGER trigger_name  {BEFORE | AFTER | INSTEAD OF }  {INSERT [OR] | UPDATE [OR] | DELETE}  [OF col_name]  ON table_name  [REFERENCING OLD AS o NEW AS n]  [FOR EACH ROW]  WHEN (condition)   BEGIN    --- sql statements   END; 

PL/SQL Functions

PL/SQL Functions What is a Function in PL/SQL? A function is a named PL/SQL Block which is similar to a procedure. The major difference between a procedure and a function is, a function must always return a value, but a procedure may or may not return a value. The General Syntax to create a function is: CREATE [OR REPLACE] FUNCTION function_name [parameters] RETURN return_datatype;  IS  Declaration_section  BEGIN  Execution_section Return return_variable;  EXCEPTION  exception section  Return return_variable;  END; 

What are Cursors?

What are Cursors? A cursor is a temporary work area created in the system memory when a SQL statement is executed. A cursor contains information on a select statement and the rows of data accessed by it. This temporary work area is used to store the data retrieved from the database, and manipulate this data. A cursor can hold more than one row, but can process only one row at a time. The set of rows the cursor holds is called the active set. There are two types of cursors in PL/SQL: Implicit cursors: These are created by default when DML statements like, INSERT, UPDATE, and DELETE statements are executed. They are also created when a SELECT statement that returns just one row is executed. Explicit cursors: They must be created when you are executing a SELECT statement that returns more than one row. Even though the cursor stores multiple records, only one record can be processed at a time, which is called as current row. When you fetch a row the current row position moves to next row. 

What are Cursors?

What are Cursors? A cursor is a temporary work area created in the system memory when a SQL statement is executed. A cursor contains information on a select statement and the rows of data accessed by it. This temporary work area is used to store the data retrieved from the database, and manipulate this data. A cursor can hold more than one row, but can process only one row at a time. The set of rows the cursor holds is called the active set. There are two types of cursors in PL/SQL: Implicit cursors: These are created by default when DML statements like, INSERT, UPDATE, and DELETE statements are executed. They are also created when a SELECT statement that returns just one row is executed. Explicit cursors: They must be created when you are executing a SELECT statement that returns more than one row. Even though the cursor stores multiple records, only one record can be processed at a time, which is called as current row. When you fetch a row the current row position move

data structure

• A data structure is an organized collection of data with specific aggregate properties • An algorithm is a sequence of program instructions designed to compute a particular result

data structure

• A data structure is an organized collection of data with specific aggregate properties • An algorithm is a sequence of program instructions designed to compute a particular result