task
stringlengths 18
98
| input
stringlengths 5
2.61k
| output
stringlengths 1
9.08k
| options
sequence | pageTitle
stringlengths 0
264
| outputColName
stringlengths 1
242
| url
stringlengths 19
216
| wdcFile
stringlengths 70
75
|
---|---|---|---|---|---|---|---|
98898ee1_Moin_Moin_Install_Docs___Pango__Comment | [Option] user [Default] 'www-data' [Comment] | If you run as root, the server will run as this user | [] | Moin Moin/Install Docs - Pango | Comment | http://www.pango.org/MoinMoin/InstallDocs | 31/1438042988924.75_20150728002308-00012-ip-10-236-191-2_649449345_3.json |
98898ee1_Moin_Moin_Install_Docs___Pango__Comment | [Option] group [Default] 'www-data' [Comment] | If you run as root, the server will run as this group | [] | Moin Moin/Install Docs - Pango | Comment | http://www.pango.org/MoinMoin/InstallDocs | 31/1438042988924.75_20150728002308-00012-ip-10-236-191-2_649449345_3.json |
98898ee1_Moin_Moin_Install_Docs___Pango__Comment | [Option] port [Default] 8080 [Comment] | Port to serve. To serve a privileged port below 1024 you will have to run as root | [] | Moin Moin/Install Docs - Pango | Comment | http://www.pango.org/MoinMoin/InstallDocs | 31/1438042988924.75_20150728002308-00012-ip-10-236-191-2_649449345_3.json |
98898ee1_Moin_Moin_Install_Docs___Pango__Comment | [Option] interfaces [Default] [''] [Comment] | A list of interfaces the server will listen to. If the list contains the entry '' (like for the default configuration), all other entries are ignored and the server will listen to all interfaces. | [] | Moin Moin/Install Docs - Pango | Comment | http://www.pango.org/MoinMoin/InstallDocs | 31/1438042988924.75_20150728002308-00012-ip-10-236-191-2_649449345_3.json |
98898ee1_Moin_Moin_Install_Docs___Pango__Comment | [Option] logPath [Default] 'mointwisted.log' [Comment] | Log file. | [] | Moin Moin/Install Docs - Pango | Comment | http://www.pango.org/MoinMoin/InstallDocs | 31/1438042988924.75_20150728002308-00012-ip-10-236-191-2_649449345_3.json |
98898ee1_Moin_Moin_Install_Docs___Pango__Comment | [Option] profiler [Default] commented python code [Comment] | Useful only if you are a moin developer. | [] | Moin Moin/Install Docs - Pango | Comment | http://www.pango.org/MoinMoin/InstallDocs | 31/1438042988924.75_20150728002308-00012-ip-10-236-191-2_649449345_3.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] the buffer to fill with the url [1] | str | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] the size of the str buffer [1] | size | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] the protocol identifier, if null, the separator after the identifier is left out, too [1] | proto | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] an optional authorization string, may be null [1] | authorization | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] the host name string [1] | hostname | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] the port number, left out from the string if negative [1] | port | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
4d98df91_vformat_utils_c_File_Reference__1 | [2] a generic format string for everything to add after the host/port, may be null [1] | fmt | [
[
"s",
"t",
"r"
],
[
"s",
"i",
"z",
"e"
],
[
"p",
"r",
"o",
"t",
"o"
],
[
"a",
"u",
"t",
"h",
"o",
"r",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"h",
"o",
"s",
"t",
"n",
"a",
"m",
"e"
],
[
"p",
"o",
"r",
"t"
],
[
"f",
"m",
"t"
]
] | FFmpeg: libavformat/utils.c File Reference | 1 | http://www.ffmpeg.org/doxygen/0.6/libavformat_2utils_8c.html | 10/1438042988065.26_20150728002308-00126-ip-10-236-191-2_434378993_125.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Believing Sophie [Author] Hazel Hutchins [Brief Description] Little girl is falsely accused of shoplifting; her hurt and fear is illustrated until she is proven innocent. [Subject] | Obeying Laws | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Gus and Grandpa and the Christmas Cookies [Author] Claudia Mills [Brief Description] Young boy and his grandfather spend the day making Christmas cookies and realize that they can take their surplus cookies to the children in the homeless shelter. [Subject] | Homelessness and giving | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Jamaica Louise James* [Author] Amy Hest [Brief Description] Story of young girl who creates a series of paintings to brighten up the subway station where her grandmother works. As a result of her paintings, everyone becomes friendlier and happier and the mayor recognizes the young girl's efforts. [Subject] | Community Involvement | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Peacebound Trains [Author] Haemi Balgassi [Brief Description] Child misses her mother who is in the South Korean Army fighting the North Korean communists. Discusses sacrifices made by citizens serving in the military. [Subject] | Military duty/civic duty | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Peter's Place [Author] Sally Grindley [Brief Description] An oil tanker spills oil on a part of the beach where Peter loves to play and feed the animals. Peter and others work nonstop for days to save the wildlife. [Subject] | Environmental disaster/community response | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Uncle Willie and the Soup Kitchen [Author] DyAnne DiSalvo-Ryan [Brief Description] Tells the story of a young boy who is frightened by homeless people in his neighborhood until he helps his Uncle Willie out one day at the soup kitchen. The boy gains a new perspective on homelessness [Subject] | Compassion and homelessness | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
eaabcfcf_Primary_Civics__K_2___Subject | [Title] Where Once there was a Wood** [Author] Denise Fleming [Brief Description] Tells the story of the loss of wildlife habitat to human homes and what people can do to create new wildlife habitats. [Subject] | Loss of environment/community projects | [] | Primary Civics (K-2) | Subject | http://www.udel.edu/dssep/civicslit/chart5_k-2.htm | 28/1438042989301.17_20150728002309-00105-ip-10-236-191-2_801683622_2.json |
011406d5_op_connectivity___The_Register__Capability | [Pros] Email is an easy and efficient way for users to keep track of project news, communicate needs to team members, stay abreast of company new and happenings Email access on laptops is readily available, and securely deployable [Cons] Always available email can be seen as obtrusive, cutting in on time away from work Just because a worker can access email on a laptop doesnt mean he has the time to respond or act; limited battery and uncertain bandwidth when on the go magnifies the issue [Capability] | Email | [
[
"E",
"m",
"a",
"i",
"l"
],
[
"W",
"e",
"b",
"-",
"b",
"a",
"s",
"e",
"d",
" ",
"a",
"p",
"p",
"l",
"i",
"c",
"a",
"t",
"i",
"o",
"n",
"s"
],
[
"W",
"e",
"b",
" ",
"c",
"o",
"n",
"f",
"e",
"r",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"V",
"o",
"i",
"c",
"e",
" ",
"o",
"v",
"e",
"r",
" ",
"I",
"P"
],
[
"I",
"n",
"s",
"t",
"a",
"n",
"t",
" ",
"m",
"e",
"s",
"s",
"a",
"g",
"i",
"n",
"g"
],
[
"B",
"l",
"o",
"g",
"g",
"i",
"n",
"g"
]
] | Exploiting laptop connectivity • The Register | Capability | http://www.theregister.co.uk/2009/02/02/laptop_connectivity/ | 7/1438042988860.4_20150728002308-00110-ip-10-236-191-2_788578344_0.json |
011406d5_op_connectivity___The_Register__Capability | [Pros] Good web connectivity on portable devices can allow access to intranet and Internet-based information, serving as an on-the-go research tool Internet access on the go allows employees to input data, such as expenses, or sales leads, while on the road [Cons] itself, web access does not ensure communications, let alone efficient processes Laptops are dependent on a data connection, which may not be available [Capability] | Web-based applications | [
[
"E",
"m",
"a",
"i",
"l"
],
[
"W",
"e",
"b",
"-",
"b",
"a",
"s",
"e",
"d",
" ",
"a",
"p",
"p",
"l",
"i",
"c",
"a",
"t",
"i",
"o",
"n",
"s"
],
[
"W",
"e",
"b",
" ",
"c",
"o",
"n",
"f",
"e",
"r",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"V",
"o",
"i",
"c",
"e",
" ",
"o",
"v",
"e",
"r",
" ",
"I",
"P"
],
[
"I",
"n",
"s",
"t",
"a",
"n",
"t",
" ",
"m",
"e",
"s",
"s",
"a",
"g",
"i",
"n",
"g"
],
[
"B",
"l",
"o",
"g",
"g",
"i",
"n",
"g"
]
] | Exploiting laptop connectivity • The Register | Capability | http://www.theregister.co.uk/2009/02/02/laptop_connectivity/ | 7/1438042988860.4_20150728002308-00110-ip-10-236-191-2_788578344_0.json |
011406d5_op_connectivity___The_Register__Capability | [Pros] Web conferencing gives far-flung teams a chance to virtually work together Web conferencing with video can (nearly) give the perception of actually having met and interacted in person [Cons] Deploying web conferencing is still a challenge across multiple platforms; uncertain bandwidth, different devices and not always available data connections create hassle [Capability] | Web conferencing | [
[
"E",
"m",
"a",
"i",
"l"
],
[
"W",
"e",
"b",
"-",
"b",
"a",
"s",
"e",
"d",
" ",
"a",
"p",
"p",
"l",
"i",
"c",
"a",
"t",
"i",
"o",
"n",
"s"
],
[
"W",
"e",
"b",
" ",
"c",
"o",
"n",
"f",
"e",
"r",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"V",
"o",
"i",
"c",
"e",
" ",
"o",
"v",
"e",
"r",
" ",
"I",
"P"
],
[
"I",
"n",
"s",
"t",
"a",
"n",
"t",
" ",
"m",
"e",
"s",
"s",
"a",
"g",
"i",
"n",
"g"
],
[
"B",
"l",
"o",
"g",
"g",
"i",
"n",
"g"
]
] | Exploiting laptop connectivity • The Register | Capability | http://www.theregister.co.uk/2009/02/02/laptop_connectivity/ | 7/1438042988860.4_20150728002308-00110-ip-10-236-191-2_788578344_0.json |
011406d5_op_connectivity___The_Register__Capability | [Pros] VoIP allows for cost-effective global voice communications, and is widely available [Cons] VoIP quality can be an issue, especially for the laptop user with substandard speakers and microphone [Capability] | Voice over IP | [
[
"E",
"m",
"a",
"i",
"l"
],
[
"W",
"e",
"b",
"-",
"b",
"a",
"s",
"e",
"d",
" ",
"a",
"p",
"p",
"l",
"i",
"c",
"a",
"t",
"i",
"o",
"n",
"s"
],
[
"W",
"e",
"b",
" ",
"c",
"o",
"n",
"f",
"e",
"r",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"V",
"o",
"i",
"c",
"e",
" ",
"o",
"v",
"e",
"r",
" ",
"I",
"P"
],
[
"I",
"n",
"s",
"t",
"a",
"n",
"t",
" ",
"m",
"e",
"s",
"s",
"a",
"g",
"i",
"n",
"g"
],
[
"B",
"l",
"o",
"g",
"g",
"i",
"n",
"g"
]
] | Exploiting laptop connectivity • The Register | Capability | http://www.theregister.co.uk/2009/02/02/laptop_connectivity/ | 7/1438042988860.4_20150728002308-00110-ip-10-236-191-2_788578344_0.json |
011406d5_op_connectivity___The_Register__Capability | [Pros] IM allows for real time "conversations" which may be more efficient than back and forth emails [Cons] IM conversations, especially detailed ones, can take much longer than the same conversation carried out on voice [Capability] | Instant messaging | [
[
"E",
"m",
"a",
"i",
"l"
],
[
"W",
"e",
"b",
"-",
"b",
"a",
"s",
"e",
"d",
" ",
"a",
"p",
"p",
"l",
"i",
"c",
"a",
"t",
"i",
"o",
"n",
"s"
],
[
"W",
"e",
"b",
" ",
"c",
"o",
"n",
"f",
"e",
"r",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"V",
"o",
"i",
"c",
"e",
" ",
"o",
"v",
"e",
"r",
" ",
"I",
"P"
],
[
"I",
"n",
"s",
"t",
"a",
"n",
"t",
" ",
"m",
"e",
"s",
"s",
"a",
"g",
"i",
"n",
"g"
],
[
"B",
"l",
"o",
"g",
"g",
"i",
"n",
"g"
]
] | Exploiting laptop connectivity • The Register | Capability | http://www.theregister.co.uk/2009/02/02/laptop_connectivity/ | 7/1438042988860.4_20150728002308-00110-ip-10-236-191-2_788578344_0.json |
011406d5_op_connectivity___The_Register__Capability | [Pros] Engages participants in informal conversations about important topics, in near real time, getting information to people when it's fresh and actionable Can level the playing field by encouraging active contributions by all parties, either by posting or commenting [Cons] Often is taken over by executives or PR, losing the voice of the people Employees might need training to learn appropriate content and blogging etiquette, and be encouraged to start and maintain use of the tool [Capability] | Blogging | [
[
"E",
"m",
"a",
"i",
"l"
],
[
"W",
"e",
"b",
"-",
"b",
"a",
"s",
"e",
"d",
" ",
"a",
"p",
"p",
"l",
"i",
"c",
"a",
"t",
"i",
"o",
"n",
"s"
],
[
"W",
"e",
"b",
" ",
"c",
"o",
"n",
"f",
"e",
"r",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"V",
"o",
"i",
"c",
"e",
" ",
"o",
"v",
"e",
"r",
" ",
"I",
"P"
],
[
"I",
"n",
"s",
"t",
"a",
"n",
"t",
" ",
"m",
"e",
"s",
"s",
"a",
"g",
"i",
"n",
"g"
],
[
"B",
"l",
"o",
"g",
"g",
"i",
"n",
"g"
]
] | Exploiting laptop connectivity • The Register | Capability | http://www.theregister.co.uk/2009/02/02/laptop_connectivity/ | 7/1438042988860.4_20150728002308-00110-ip-10-236-191-2_788578344_0.json |
398f3a2e_ken_by_IPv4_users___HTML_Remix__Notation | [Value] 192.0.2.235 [Conversion from dot-decimal] N/A [Notation] | Dot-decimal notation | [
[
"D",
"o",
"t",
"-",
"d",
"e",
"c",
"i",
"m",
"a",
"l",
" ",
"n",
"o",
"t",
"a",
"t",
"i",
"o",
"n"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"O",
"c",
"t",
"a",
"l"
],
[
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"O",
"c",
"t",
"a",
"l"
]
] | IPv6 – Sample IP address and precautions to be taken by IPv4 users | HTML Remix | Notation | http://www.htmlremix.com/review/ipv6-sample-ip-address-and-precautions-to-be-taken-by-ipv4-users/comment-page-1 | 40/1438042988305.14_20150728002308-00261-ip-10-236-191-2_508036224_0.json |
398f3a2e_ken_by_IPv4_users___HTML_Remix__Notation | [Value] 0xC0.0x00.0x02.0xEB [Conversion from dot-decimal] Each octet is individually converted to hexadecimal form [Notation] | Dotted Hexadecimal | [
[
"D",
"o",
"t",
"-",
"d",
"e",
"c",
"i",
"m",
"a",
"l",
" ",
"n",
"o",
"t",
"a",
"t",
"i",
"o",
"n"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"O",
"c",
"t",
"a",
"l"
],
[
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"O",
"c",
"t",
"a",
"l"
]
] | IPv6 – Sample IP address and precautions to be taken by IPv4 users | HTML Remix | Notation | http://www.htmlremix.com/review/ipv6-sample-ip-address-and-precautions-to-be-taken-by-ipv4-users/comment-page-1 | 40/1438042988305.14_20150728002308-00261-ip-10-236-191-2_508036224_0.json |
398f3a2e_ken_by_IPv4_users___HTML_Remix__Notation | [Value] 0300.0000.0002.0353 [Conversion from dot-decimal] Each octet is individually converted into octal [Notation] | Dotted Octal | [
[
"D",
"o",
"t",
"-",
"d",
"e",
"c",
"i",
"m",
"a",
"l",
" ",
"n",
"o",
"t",
"a",
"t",
"i",
"o",
"n"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"O",
"c",
"t",
"a",
"l"
],
[
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"O",
"c",
"t",
"a",
"l"
]
] | IPv6 – Sample IP address and precautions to be taken by IPv4 users | HTML Remix | Notation | http://www.htmlremix.com/review/ipv6-sample-ip-address-and-precautions-to-be-taken-by-ipv4-users/comment-page-1 | 40/1438042988305.14_20150728002308-00261-ip-10-236-191-2_508036224_0.json |
398f3a2e_ken_by_IPv4_users___HTML_Remix__Notation | [Value] 0xC00002EB [Conversion from dot-decimal] Concatenation of the octets from the dotted hexadecimal [Notation] | Hexadecimal | [
[
"D",
"o",
"t",
"-",
"d",
"e",
"c",
"i",
"m",
"a",
"l",
" ",
"n",
"o",
"t",
"a",
"t",
"i",
"o",
"n"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"O",
"c",
"t",
"a",
"l"
],
[
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"O",
"c",
"t",
"a",
"l"
]
] | IPv6 – Sample IP address and precautions to be taken by IPv4 users | HTML Remix | Notation | http://www.htmlremix.com/review/ipv6-sample-ip-address-and-precautions-to-be-taken-by-ipv4-users/comment-page-1 | 40/1438042988305.14_20150728002308-00261-ip-10-236-191-2_508036224_0.json |
398f3a2e_ken_by_IPv4_users___HTML_Remix__Notation | [Value] 3221226219 [Conversion from dot-decimal] The 32-bit number expressed in decimal [Notation] | Decimal | [
[
"D",
"o",
"t",
"-",
"d",
"e",
"c",
"i",
"m",
"a",
"l",
" ",
"n",
"o",
"t",
"a",
"t",
"i",
"o",
"n"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"O",
"c",
"t",
"a",
"l"
],
[
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"O",
"c",
"t",
"a",
"l"
]
] | IPv6 – Sample IP address and precautions to be taken by IPv4 users | HTML Remix | Notation | http://www.htmlremix.com/review/ipv6-sample-ip-address-and-precautions-to-be-taken-by-ipv4-users/comment-page-1 | 40/1438042988305.14_20150728002308-00261-ip-10-236-191-2_508036224_0.json |
398f3a2e_ken_by_IPv4_users___HTML_Remix__Notation | [Value] 030000001353 [Conversion from dot-decimal] The 32-bit number expressed in octal [Notation] | Octal | [
[
"D",
"o",
"t",
"-",
"d",
"e",
"c",
"i",
"m",
"a",
"l",
" ",
"n",
"o",
"t",
"a",
"t",
"i",
"o",
"n"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"o",
"t",
"t",
"e",
"d",
" ",
"O",
"c",
"t",
"a",
"l"
],
[
"H",
"e",
"x",
"a",
"d",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"D",
"e",
"c",
"i",
"m",
"a",
"l"
],
[
"O",
"c",
"t",
"a",
"l"
]
] | IPv6 – Sample IP address and precautions to be taken by IPv4 users | HTML Remix | Notation | http://www.htmlremix.com/review/ipv6-sample-ip-address-and-precautions-to-be-taken-by-ipv4-users/comment-page-1 | 40/1438042988305.14_20150728002308-00261-ip-10-236-191-2_508036224_0.json |
d8498772_ences___Similarities_Revisited__Phase | [S. No.] 1 Requirements gathering is done by business analyst. Development team analyze the requirements from the design, architecture & coding perspective. Testing team also review & analyze the requirements. Testing team identifies the testing requirements like what types of testing will be required and review the requirements for logical functional relationship between various features / modules, so that any gaps can be caught at an early stage. [Phase] | Requirements Gathering | [
[
"R",
"e",
"q",
"u",
"i",
"r",
"e",
"m",
"e",
"n",
"t",
"s",
" ",
"G",
"a",
"t",
"h",
"e",
"r",
"i",
"n",
"g"
],
[
"D",
"e",
"s",
"i",
"g",
"n"
],
[
"C",
"o",
"d",
"i",
"n",
"g",
" ",
"o",
"r",
" ",
"d",
"e",
"v",
"e",
"l",
"o",
"p",
"m",
"e",
"n",
"t"
],
[
"T",
"e",
"s",
"t",
"i",
"n",
"g"
],
[
"D",
"e",
"p",
"l",
"o",
"y",
"m",
"e",
"n",
"t"
],
[
"M",
"a",
"i",
"n",
"t",
"e",
"n",
"a",
"n",
"c",
"e"
]
] | SDLC vs STLC–Differences & Similarities Revisited | Phase | http://www.softwaretestingstuff.com/2011/09/sdlc-vs-stlcdifferences-similarities.html | 11/1438042988048.90_20150728002308-00229-ip-10-236-191-2_713621736_1.json |
d8498772_ences___Similarities_Revisited__Phase | [S. No.] 2 Technical architect works for the high level & low design of the software. Business analyst works for the UI design of the application Here, test architect generally the test lead/manager, does the test planning, identify high level testing points. Basically, requirement detailing is done in this phase. [Phase] | Design | [
[
"R",
"e",
"q",
"u",
"i",
"r",
"e",
"m",
"e",
"n",
"t",
"s",
" ",
"G",
"a",
"t",
"h",
"e",
"r",
"i",
"n",
"g"
],
[
"D",
"e",
"s",
"i",
"g",
"n"
],
[
"C",
"o",
"d",
"i",
"n",
"g",
" ",
"o",
"r",
" ",
"d",
"e",
"v",
"e",
"l",
"o",
"p",
"m",
"e",
"n",
"t"
],
[
"T",
"e",
"s",
"t",
"i",
"n",
"g"
],
[
"D",
"e",
"p",
"l",
"o",
"y",
"m",
"e",
"n",
"t"
],
[
"M",
"a",
"i",
"n",
"t",
"e",
"n",
"a",
"n",
"c",
"e"
]
] | SDLC vs STLC–Differences & Similarities Revisited | Phase | http://www.softwaretestingstuff.com/2011/09/sdlc-vs-stlcdifferences-similarities.html | 11/1438042988048.90_20150728002308-00229-ip-10-236-191-2_713621736_1.json |
d8498772_ences___Similarities_Revisited__Phase | [S. No.] 3 Development team does the actual coding based on the designed architecture. Testing team write the detailed test cases. [Phase] | Coding or development | [
[
"R",
"e",
"q",
"u",
"i",
"r",
"e",
"m",
"e",
"n",
"t",
"s",
" ",
"G",
"a",
"t",
"h",
"e",
"r",
"i",
"n",
"g"
],
[
"D",
"e",
"s",
"i",
"g",
"n"
],
[
"C",
"o",
"d",
"i",
"n",
"g",
" ",
"o",
"r",
" ",
"d",
"e",
"v",
"e",
"l",
"o",
"p",
"m",
"e",
"n",
"t"
],
[
"T",
"e",
"s",
"t",
"i",
"n",
"g"
],
[
"D",
"e",
"p",
"l",
"o",
"y",
"m",
"e",
"n",
"t"
],
[
"M",
"a",
"i",
"n",
"t",
"e",
"n",
"a",
"n",
"c",
"e"
]
] | SDLC vs STLC–Differences & Similarities Revisited | Phase | http://www.softwaretestingstuff.com/2011/09/sdlc-vs-stlcdifferences-similarities.html | 11/1438042988048.90_20150728002308-00229-ip-10-236-191-2_713621736_1.json |
d8498772_ences___Similarities_Revisited__Phase | [S. No.] 4 In SDLC, actual testing is carried out in this phase. It includes unit testing, integration testing & system testing etc.. Test Execution and bug reporting, manual testing, automation testing is done, defects found are reported. Re-testing and regression testing is also done in this phase. But, I don't agree with this statement. So, if I want to relate the testing phase with STLC, I would say it it is testing of test cases & test plans i.e. is basically review of test cases, test scenarios etc.. [Phase] | Testing | [
[
"R",
"e",
"q",
"u",
"i",
"r",
"e",
"m",
"e",
"n",
"t",
"s",
" ",
"G",
"a",
"t",
"h",
"e",
"r",
"i",
"n",
"g"
],
[
"D",
"e",
"s",
"i",
"g",
"n"
],
[
"C",
"o",
"d",
"i",
"n",
"g",
" ",
"o",
"r",
" ",
"d",
"e",
"v",
"e",
"l",
"o",
"p",
"m",
"e",
"n",
"t"
],
[
"T",
"e",
"s",
"t",
"i",
"n",
"g"
],
[
"D",
"e",
"p",
"l",
"o",
"y",
"m",
"e",
"n",
"t"
],
[
"M",
"a",
"i",
"n",
"t",
"e",
"n",
"a",
"n",
"c",
"e"
]
] | SDLC vs STLC–Differences & Similarities Revisited | Phase | http://www.softwaretestingstuff.com/2011/09/sdlc-vs-stlcdifferences-similarities.html | 11/1438042988048.90_20150728002308-00229-ip-10-236-191-2_713621736_1.json |
d8498772_ences___Similarities_Revisited__Phase | [S. No.] 5 Application is deployed on production environment for real end users. Final testing and implementation is done is this phase and final test report is prepared. For this statement as well, I don't agree. For software / application deployment is basically, when it is installed for real use. So, this way, STLC, deployment would be when test when test cases getting used i.e. execution of test cases. [Phase] | Deployment | [
[
"R",
"e",
"q",
"u",
"i",
"r",
"e",
"m",
"e",
"n",
"t",
"s",
" ",
"G",
"a",
"t",
"h",
"e",
"r",
"i",
"n",
"g"
],
[
"D",
"e",
"s",
"i",
"g",
"n"
],
[
"C",
"o",
"d",
"i",
"n",
"g",
" ",
"o",
"r",
" ",
"d",
"e",
"v",
"e",
"l",
"o",
"p",
"m",
"e",
"n",
"t"
],
[
"T",
"e",
"s",
"t",
"i",
"n",
"g"
],
[
"D",
"e",
"p",
"l",
"o",
"y",
"m",
"e",
"n",
"t"
],
[
"M",
"a",
"i",
"n",
"t",
"e",
"n",
"a",
"n",
"c",
"e"
]
] | SDLC vs STLC–Differences & Similarities Revisited | Phase | http://www.softwaretestingstuff.com/2011/09/sdlc-vs-stlcdifferences-similarities.html | 11/1438042988048.90_20150728002308-00229-ip-10-236-191-2_713621736_1.json |
d8498772_ences___Similarities_Revisited__Phase | [S. No.] 6 Basically, it includes, post production / deployment support & enhancements. Most of people say - Maintenance testing is carried out in this phase. My definition for this is - updation & maintenance of test plans, test case required for the testing of support requests & enhancements as a part of maintenance. [Phase] | Maintenance | [
[
"R",
"e",
"q",
"u",
"i",
"r",
"e",
"m",
"e",
"n",
"t",
"s",
" ",
"G",
"a",
"t",
"h",
"e",
"r",
"i",
"n",
"g"
],
[
"D",
"e",
"s",
"i",
"g",
"n"
],
[
"C",
"o",
"d",
"i",
"n",
"g",
" ",
"o",
"r",
" ",
"d",
"e",
"v",
"e",
"l",
"o",
"p",
"m",
"e",
"n",
"t"
],
[
"T",
"e",
"s",
"t",
"i",
"n",
"g"
],
[
"D",
"e",
"p",
"l",
"o",
"y",
"m",
"e",
"n",
"t"
],
[
"M",
"a",
"i",
"n",
"t",
"e",
"n",
"a",
"n",
"c",
"e"
]
] | SDLC vs STLC–Differences & Similarities Revisited | Phase | http://www.softwaretestingstuff.com/2011/09/sdlc-vs-stlcdifferences-similarities.html | 11/1438042988048.90_20150728002308-00229-ip-10-236-191-2_713621736_1.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to install the PowerShell cmdlets and find cmdlet help and examples. [Name] | How to Load the PowerShell Cmdlets and Get Cmdlet Help | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to manage the client package lifecycle on a stand-alone computer using PowerShell. [Name] | How to Manage App-V 5.0 Packages Running on a Stand-Alone Computer by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to manage connection groups using PowerShell. [Name] | How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to modify the client using PowerShell. [Name] | How to Modify Client Configuration by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to apply a user configuration file using PowerShell. [Name] | How to Apply the User Configuration File by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to apply a deployment configuration file using PowerShell. [Name] | How to Apply the Deployment Configuration File by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to create a new package using PowerShell. [Name] | How to Sequence a Package by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to create a package accelerator using PowerShell. You can use package accelerators automatically sequence large, complex applications. [Name] | How to Create a Package Accelerator by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to enable the computer running the App-V 5.0 to send reporting information. [Name] | How to Enable Reporting on the App-V 5.0 Client by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
284e9d36_ring_App_V_by_Using_PowerShell__Name | [Description] Describes how to take an array of account names and to convert each of them to the corresponding SID in standard and hexadecimal formats. [Name] | How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell | [] | Administering App-V by Using PowerShell | Name | https://technet.microsoft.com/en-us/library/jj713419.aspx | 42/1438042989018.40_20150728002309-00105-ip-10-236-191-2_895535289_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] DBMS_NAME [Return type] string [Description] | The name of the database server to which you are connected. For DB2 servers this is a combination of DB2 followed by the operating system on which the database server is running. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] DBMS_VER [Return type] string [Description] | The version of the database server, in the form of a string "MM.mm.uuuu" where MM is the major version, mm is the minor version, and uuuu is the update. For example, "08.02.0001" represents major version 8, minor version 2, update 1. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] DB_CODEPAGE [Return type] int [Description] | The code page of the database to which you are connected. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] DB_NAME [Return type] string [Description] | The name of the database to which you are connected. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] DFT_ISOLATION [Return type] string [Description] | The default transaction isolation level supported by the server: UR Uncommitted read: changes are immediately visible by all concurrent transactions. CS Cursor stability: a row read by one transaction can be altered and committed by a second concurrent transaction. RS Read stability: a transaction can add or remove rows matching a search condition or a pending transaction. RR Repeatable read: data affected by pending transaction is not available to other transactions. NC No commit: any changes are visible at the end of a successful operation. Explicit commits and rollbacks are not allowed. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] IDENTIFIER_QUOTE_CHAR [Return type] string [Description] | The character used to delimit an identifier. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] INST_NAME [Return type] string [Description] | The instance on the database server that contains the database. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] ISOLATION_OPTION [Return type] array [Description] | An array of the isolation options supported by the database server. The isolation options are described in the DFT_ISOLATION property. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] KEYWORDS [Return type] array [Description] | An array of the keywords reserved by the database server. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] LIKE_ESCAPE_CLAUSE [Return type] bool [Description] | TRUE if the database server supports the use of % and _ wildcard characters. FALSE if the database server does not support these wildcard characters. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_COL_NAME_LEN [Return type] int [Description] | Maximum length of a column name supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_IDENTIFIER_LEN [Return type] int [Description] | Maximum length of an SQL identifier supported by the database server, expressed in characters. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_INDEX_SIZE [Return type] int [Description] | Maximum size of columns combined in an index supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_PROC_NAME_LEN [Return type] int [Description] | Maximum length of a procedure name supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_ROW_SIZE [Return type] int [Description] | Maximum length of a row in a base table supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_SCHEMA_NAME_LEN [Return type] int [Description] | Maximum length of a schema name supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_STATEMENT_LEN [Return type] int [Description] | Maximum length of an SQL statement supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] MAX_TABLE_NAME_LEN [Return type] int [Description] | Maximum length of a table name supported by the database server, expressed in bytes. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] NON_NULLABLE_COLUMNS [Return type] bool [Description] | TRUE if the database server supports columns that can be defined as NOT NULL, FALSE if the database server does not support columns defined as NOT NULL. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] PROCEDURES [Return type] bool [Description] | TRUE if the database server supports the use of the CALL statement to call stored procedures, FALSE if the database server does not support the CALL statement. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] SPECIAL_CHARS [Return type] string [Description] | A string containing all of the characters other than a-Z, 0-9, and underscore that can be used in an identifier name. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
8538f76f_PHP__db2_server_info___Manual_Database_server_properties_Description | [Property name] SQL_CONFORMANCE [Return type] string [Description] | The level of conformance to the ANSI/ISO SQL-92 specification offered by the database server: ENTRY Entry-level SQL-92 compliance. FIPS127 FIPS-127-2 transitional compliance. FULL Full level SQL-92 compliance. INTERMEDIATE Intermediate level SQL-92 compliance. | [] | PHP: db2_server_info - Manual | Description | http://www.php.net/manual/fa/function.db2-server-info.php | 14/1438042988860.88_20150728002308-00128-ip-10-236-191-2_650985029_0.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide the ingredient name. | What is the name of the nominated ingredient? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide an explanation for why it is considered an active ingredient when it is used in specific compounded drug products, and provide citations to specific sources that describe its active properties. | Is the ingredient an active ingredient that meets the definition of “bulk drug substance” in § 207.3(a)(4)? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Chemical name. | What is the chemical name of the substance? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Common name. | What is the common name of the substance? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | UNII code. | Does the substance have a UNII Code? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide the chemical grade. | What is the chemical grade of the substance? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide the strength, quality, stability, and purity information. | What is the strength, quality, stability, and purity of the ingredient? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Describe how the ingredient is supplied (e.g., powder, liquid). | How is the ingredient supplied? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | List the foreign pharmacopeias or other countries in which it is registered. | Is the substance recognized in foreign pharmacopeias or registered in other countries? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Put yes, no, or unknown. If yes, state the status of the monograph, if known. | Has information been submitted about the substance to the USP for consideration of monograph development? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Describe the medical condition(s) that the drug product compounded with the bulk drug substances is intended to treat. | What medical condition(s) is the drug product compounded with the bulk drug substances intended to treat? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | List the other approved treatments. | Are there other drug products approved by FDA to treat the same medical condition? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide a justification for clinical need, including an estimate of the size of the population that would need the compounded drug. | If there are FDA-approved drug products that address the same medical condition, why is there a clinical need for a compounded drug product? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide a bibliography of safety and efficacy data for the drug compounded using the nominated substance, if available, including any relevant peer-reviewed medical literature. | Are there safety and efficacy data on compounded drugs using the nominated substance? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide an explanation of why it is necessary to compound from the bulk drug substance. | If there is an FDA-approved drug product that includes the bulk drug substance nominated, is it necessary to compound a drug product from the bulk drug substance rather than from the FDA-approved drug product? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | State the dosage form(s). | What dosage form(s) will be compounded using the bulk drug substance? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | List the strength(s) of the drug product(s) that will be compounded from the nominated substance, or a range of strengths, if known. | What strength(s) will be compounded from the nominated substance? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | List the route(s) of administration of the compounded drug product(s). | What are the anticipated route(s) of administration of the compounded drug product(s)? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Describe previous uses of the bulk drug substance in compounding. | Has the bulk drug substance been used previously to compound drug product(s)? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
3f315306_evised_Request_for_Nominations__What_information_is_requested_ | Provide any other information you would like FDA to consider in evaluating the nomination. | Is there any other relevant information? | [] | Federal Register | Bulk Drug Substances That May Be Used To Compound Drug Products in Accordance With Section 503B of the Federal Food, Drug, and Cosmetic Act, Concerning Outsourcing Facilities; Revised Request for Nominations | Column A—What information is requested? | https://www.federalregister.gov/articles/2014/07/02/2014-15373/bulk-drug-substances-that-may-be-used-to-compound-drug-products-in-accordance-with-section-503b-of | 0/1438042988458.74_20150728002308-00233-ip-10-236-191-2_911794572_4.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The musicLibrary capability provides programmatic access to the user's Music, allowing the app to enumerate and access all files in the library without user interaction. This capability is typically used in jukebox apps that make use of the entire Music library. The file picker provides a robust UI mechanism that lets users open files for use with an app. Declare the musicLibrary capability only when the scenarios for your app require programmatic access and can't be realized by using the file picker. For an example of how to access files in a library, see Quickstart: Accessing files programmatically. [Capability scenario] | Music | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The picturesLibrary capability provides programmatic access to the user's Pictures, allowing the app to enumerate and access all files in the library without user interaction. This capability is typically used in photo apps that make use of the entire Pictures library. The file picker provides a robust UI mechanism that lets users open files for use with an app. Declare the picturesLibrary capability only when the scenarios for your app require programmatic access and can't be realized them by using the file picker. For an example of how to access files in a library, see Quickstart: Accessing files programmatically. [Capability scenario] | Pictures | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The videosLibrary capability provides programmatic access to the user's Videos, allowing the app to enumerate and access all files in the library without user interaction. This capability is typically used in movie-playback apps that make use of the entire Videos library. The file picker provides a robust UI mechanism that lets users open files for use with an app. Declare the videosLibrary capability only when the scenarios for your app require programmatic access and can't be realized by using the file picker. For an example of how to access files in a library, see Quickstart: Accessing files programmatically. [Capability scenario] | Videos | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The removableStorage capability provides programmatic access to files on removable storage, like USB keys and external hard drives, filtered to the file-type associations declared in the package manifest. For example, if a document-reader app declares a .doc file-type association, it can open .doc files on the removable storage device, but not other types of files. Be careful when declaring this capability, because users may include a variety of info in their removable storage devices, and will expect your app to provide a valid justification for programmatic access to the removable storage for all files of the declared type. Users will expect your app to handle any file associations that you declare. So don't declare file associations that your app cannot handle responsibly. The file picker provides a robust UI mechanism that lets users open files for use with an app. Declare the removableStorage capability only when the scenarios for your app require programmatic access and can't be realized by using the file picker. [Capability scenario] | Removable Storage | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] There are two capabilities that provide different levels of access to the Internet and public networks. These capabilities grant different access depending on if the app is running on Windows or Windows Phone. On Windows, the internetClient capability indicates that apps can receive incoming data from the Internet. Cannot act as a server. No local network access. On Windows, the internetClientServer capability indicates that apps can receive incoming data from the Internet. Can act as a server. No local network access. On Windows Phone, the internetClient capability indicates that apps have full local and Internet access and can act as a server. Inbound access to critical ports is always blocked. On Windows Phone, the internetClientServer capability indicates that apps have full local and Internet access and can act as a server. Inbound access to critical ports is always blocked. On Windows, most apps that have a web service component will use internetClient. Apps that enable peer-to-peer (P2P) scenarios where the app needs to listen for incoming network connections should use internetClientServer. The internetClientServer capability includes the access that the internetClient capability provides, so you don't need to specify internetClient when you specify internetClientServer. Note Windows Phone Store apps have a single network capability that enables all network access for the app. The internetClientServer capability enables complete access to the network for both client operations (outbound access) and server operations (inbound access). However, if any of the network capabilities (internetClient, internetClientServer, or privateNetworkClientServer) are specified in the Package.appxmanifest file, a Windows Phone Store app has complete access to the network at run time for both client and server operations. While you’re developing and testing your Windows Phone Store app app in Visual Studio, you get the networking capability (Internet (Client & Server)) when you run the app, even if you haven’t specified this capability in the app manifest file. When you publish your app, however, your app does not automatically get the networking capability. Make sure you check the Internet (Client & Server) capability on the Capabilities page of Manifest Designer if your app requires network connectivity. [Capability scenario] | Internet and public networks | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The privateNetworkClientServer capability provides inbound and outbound access to home and work networks through the firewall. This capability is typically used for games that communicate across the local area network (LAN), and for apps that share data across a variety of local devices. If your app specifies musicLibrary, picturesLibrary, or videosLibrary, you don't need to use this capability to access the corresponding library in a Home Group. On Windows, this capability does not provide access to the Internet. On Windows Phone, this capability provides the same access as internetClient or internetClientServer. [Capability scenario] | Homes and work networks | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The appointments capability provides access to the user’s appointment store. This capability allows read access to appointments obtained from the synced network accounts and to other apps that write to the appointment store. With this capability, your app can create new calendars and write appointments to calendars that it creates. [Capability scenario] | Appointments | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The contacts capability provides access to the aggregated view of the contacts from various contacts stores. This capability gives the app limited access (network permitting rules apply) to contacts that were synced from various networks and the local contact store. [Capability scenario] | Contacts | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The codeGeneration capability allows apps to generate code dynamically. [Capability scenario] | Code generation | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
fe3b4a3c_ions___Windows_app_development__Capability_scenario | [Capability usage] The allJoyn capability allows AllJoyn-enabled apps and devices on a network to discover and interact with each other. All apps that access APIs in the Windows.Devices.AllJoyn namespace must use this capability.. [Capability scenario] | AllJoyn | [] | App capability declarations - Windows app development | Capability scenario | https://msdn.microsoft.com/en-us/library/hh464936.aspx | 44/1438042988399.65_20150728002308-00328-ip-10-236-191-2_870026404_0.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.