|
by: Adrian |
last post by:
Normalization Question - Please bear with me, hopefully things will be
clear at the end of the question.
Given a treaty table containg treaties; Treaty1, Treaty2 etc and a
benefit table; Benefit1, Benefit2 etc. A treaty can only have certain
benefits:-
For example Treaty 1 can process Benefit1 and Benefit2.
To maintain this relationship a new table TreatyBenefit has been
|
by: Microbof |
last post by:
I am trying to produce a database to keep assessment levels for a group of
students. So in the first database I made a table with a unique pupil
number and 7 assessment boxes.
I then made another table with student details in it.
FamilyName, Forename, unique pupil number etc.
I then made a relationship 1 to 1 on unique number.
I then made another database and linked to the two tables in the first
|
by: phoenix |
last post by:
Hello,
I've got a design question. I need to keep track of some variables and I am
planning to put them inside a class or struct. Basically I'm talking about
10 bools, 20 ints and 2 arrays of ints. The size of the arrays would depend
on some external value (going from 0 to around 1000 max). I would have an
array of max 255 of these classes/structs (in most cases it will be less
then 5 however)
Since there's no real business logic my...
|
by: Exception |
last post by:
I'm preparing to take 70-315 soon.
The skills assessment test on Microsoft's site (by MeasureUp) contains a
question about .NET passport that I always fail to answer. I asked this
question in the more appropriate MCAD newsgroup, but got no reply. I would
really like to know the answer to that question.
The question is:
Your Web application uses Microsoft(R) Passport authentication. You have
|
by: mdonahoe |
last post by:
Hi, I'm pretty novice with javascript but it's coming along. I've got
a form with say 4 radio buttons listed -
option1
option2
option3
other (please specifiy)
then a 25 charachter text box to place your input.
What I want to do is if the option1,2,3 radio button is selected and
then you click in the textbox to type in your own custom option then
|
|
by: Robbie Hatley |
last post by:
Hello, group. I've been doing too much C++ programming lately, and
I'm starting to become rusty at some aspects of the C way of doing
things, esp. efficient low-level data copies.
Specificially, I just wrote the following, but I don't know if this
is safe:
void Func(char* left, char* right)
{
chat temp_left = {'\0'};
|
by: Steve S |
last post by:
Hi,
I have an ASP.NET 2.0 application with an ASP.NET login control in the
master page. The user can only access the home page without logging in, all
the other pages require authentication. Once the user has logged in the
login control is hidden.
To secure the users name and password does this mean my entire web site
should use SSL or can I get away with just using SSL on the home page where
they login?
|
by: jan.chludzinski |
last post by:
Are the variables on the righthand side of an assignment statement
treated strictly as values? That is, if in assigning to an "unsigned
int" I shift a "unsigned char" 24 places to the left, can I trust that
the compiler will use temp storage sufficient to hold the "unsigned
int" and NOT result in an overflow (because I shifted an "unsigned
char" 24 places)?
Using gcc I tried the code below:
#include <stdio.h>
|
by: dorandoran |
last post by:
I was approached by Robert Half about an opportunity. They asked me to come by and take Microsoft's C# and ASP.net assesment test. I have never taken any assesment test. Can anyone point me to the right place for some study before I take the class? Has anyone taken Microsoft's assesment test? I went to some microsoft's link but that link is broken or takes me to a page to buy online course. Please suggest.
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|