More than 3000 questions in repository. There are more than 900 unanswered questions. Click here and help us by providing the answer. Have a video suggestion. Click Correct / Improve and please let us know.
Ans. a. Create necessary lzx files( template , object definition and properties ), make config entries and then Build open Laszlo project ( for LOBTools ) so that new promotion type should be displayed in management center.
b. Create a new promotion type xsl ( promotion type template ) and then map it to the promotion type.
Help us improve. Please let us know the company, where you were asked this question :
Ans. Step 1 - Create a new policy definition by adding record in tables POLICY, POLICYDESC.
Step 3 - Associate commands to the new policy by adding records in POLICYCMD.
Step 2 - Associate the new policy with its terms and conditions by adding a record in relationship table POLICYTC.
Step 4 - Add reference to the policy in the repective contract xml file.
Help us improve. Please let us know the company, where you were asked this question :
Catalog business policies define the scope and characteristics of the catalog of products for sale in a store including prices and the categorization of products in a store's catalog.
Payment business policies
Invoicing, payment, and refund business policies define how a store accepts payments, pays refunds, and the format of a store's invoices.
Returns business policies
Returns business policies define if refunds are accepted, the time period they are accepted for, and any re-stocking fees applied to returns.
Shipping business policies
Shipping business policies define the shipping providers a store can use and the charges associated with each type.
Referral interface business policies
Referral interface business policies define the relationship between a proxy store and a remote store.
Help us improve. Please let us know the company, where you were asked this question :
Ans. A media access control address is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi.
Help us improve. Please let us know the company, where you were asked this question :
Ans. Factory Design Patterns is the pattern that recommends creation of separate Factory Object for creation of other object.
So its like saying - If you want to create an object of ClassA, Talk to FactoryObject ( which is an object of FactoryClass ). FactoryObject in itself encapsulates the inputs and logic required to make the decision regarding the creation and construction of object.
Help us improve. Please let us know the company, where you were asked this question :
1.Whenever it is invoked on the same object more than once during an execution of a Java application, the hashCode method must consistently return the same integer,
2.If two objects are equal according to the equals(Object) method, then calling the hashCode method on each of the two objects must produce the same integer result.
3.It is not required that if two objects are unequal according to the equals(java.lang.Object) method, then calling the hashCode method on each of the two objects must produce distinct integer results.
Help us improve. Please let us know the company, where you were asked this question :
Ans. static is the keyword that makes it accessible even without creating any object and using class name only. Making it non static would like creation of object upfront before calling the method.
Help us improve. Please let us know the company, where you were asked this question :
Ans. Spring Security is a powerful and highly customizable authentication and access control framework. It is the de facto standard for securing Spring-based applications.
Help us improve. Please let us know the company, where you were asked this question :