Search results
Results from the WOW.Com Content Network
Indian Railway Catering and Tourism Corporation (IRCTC) is an Indian public sector undertaking that provides ticketing, catering, and tourism services for the state-owned Indian Railways. It was established in 1999 by the Government of India and operated under the administrative control of the Ministry of Railways .
0 Segment (flight) information, including number of seats booked, status code (for example HK1 - confirmed for one passenger) and fare class; 1 Related PNR record ids. 2 PNR owner identification (airline, CRS user name and role) 3 Other airline Other Service Information (OSI) or Special Service Request (SSR) items; 4 Host airline OSI or SSR items
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
Tatkal tickets can be booked over the counter in a railway station and on the internet at IRCTC. Ticket booking opens at 10:00 AM on the day before the day of the train at origin station. The day of the journey is defined as the day of chart preparation. For APP based booking TATKAL window opens 1 day in advance excluding the day of journey.
This page was last edited on 3 December 2013, at 11:38 (UTC).; Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply.
Upon receiving the user ID and PIN, the system looks up the PIN based upon the user ID and compares the looked-up PIN with the received PIN. The user is granted access only when the number entered matches the number stored in the system. Hence, despite the name, a PIN does not personally identify the user. [24]
Identity correlation is, in information systems, a process that reconciles and validates the proper ownership of disparate user account login IDs that reside on systems and applications throughout an organization and can permanently link ownership of those user account login IDs to particular individuals by assigning a unique identifier (also called primary or common keys) to all validated ...
Unix-like operating systems identify a user by a value called a user identifier, often abbreviated to user ID or UID. The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can access.