Skip to content

NTSEQ:- A IT Infrastructure and Cyber Security Blogs

Author:

How to check if directory is empty or not in PHP

sometimes we need to check if a directory is empty or not before performing an operation on this directory.For this,

Continue reading

Difference Between Checkpoint And Lazy Writer

CHECKPOINT vs LAZY WRITER CHECKPOINT LAZY WRITER Check point runs in only transaction log file Lazy writer operates from buffer

Continue reading

Lazy writer in SQL Server

Lazy writer Lazy writer in SQL Server :- Lazy writer check each page header and verify whether all transactions in

Continue reading

What’s the difference between TRUNCATE and DELETE in SQL

The difference between TRUNCATE, DELETE, and DROP is one of the most common interview questions. Here are some of the

Continue reading

What are the difference between DDL, DML, DCL and TCL commands?

DDL Data Definition Language (DDL) statements are used to define the database structure or schema. Some examples are:- CREATE –

Continue reading

Lock Granularity in SQL Server

Understanding Lock Granularity in SQL Server SQL Server Lock granularity describe which resource is locked by a single lock attempt.

Continue reading

PL/SQL Program for Armstrong Number

Armstrong number is a number that is equal to the sum of cubes of its digits. For example 0, 1,

Continue reading

Pl/SQL Program for Palindrome Number

A palindrome number is a number that remains the same when its digits are reversed. example:- 16461 Pl/SQL Program for

Continue reading

PL/SQL Program for Fibonacci Series

Fibonacci Series is a series of numbers in which each number is the sum of the two preceding numbers. The

Continue reading

PL/SQL Program to Reverse a String

PL/SQL Program to Reverse a String Here we are going to write a pl/sql program to reverse a string. In

Continue reading

Posts pagination

«Previous Posts 1 2 3 4 5 6 … 34 Next Posts»
  • C Programming
  • C++
  • Cyber Security
  • Interview FAQ
  • Java
  • Linux
  • MySQL
  • Netseq.com
  • Oracle
  • PHP
  • Python
  • SQL
  • SQL Server -DBA
  • Active Directory Security: Strategies to Safeguard Your Organization
  • PowerShell scripts for Active Directory (AD)
  • Top 50 Essential Active Directory PowerShell Commands and Administrative Tools
  • Critical Windows Event ID’s to SOC Team Must Monitor
  • Top Cybersecurity Threats in 2025 and How to Protect Yourself
WordPress Theme: Wellington by ThemeZee.