Logo 
Search:

Search

 
Search:    
 

Resource TypePosted On
Which of the following programming approach used functions as a key concept to p...Jul 28
Identify the drawback of using procedure-oriented programming, if any:Nov 02
Name the process that separates data into distinct, unique setsDec 21
What are the various programmed data transfer methods?Jan 05
Can I create my own permission set?Feb 25
Which of the following will be used to access the two entries, namely key and va...Apr 21
Inserting an element into the stack using array in dfs (data file structure)Dec 20
What is Reachable Set in dfs (data file structure)?Oct 14
List Two types of Priority Queues in dfs (data file structure).Jul 31
What is Doubly or Two-Way Linked List in dfs (data file structure)?Apr 13
What is Two Way Merge Sort in dfs (data file structure)?Jun 18
Which is not associated with Object-oriented programming?Feb 25
Object-based programming languages do not supportNov 12
Which of the following features that distinguish object oriented programming fro...Jun 09
A C++ program structure is based on the concept ofMar 25
Can I write IL programs directly?Sep 20
Can I use COM components from .NET programs?Sep 21
Can I use .NET components from COM programs?Dec 15
What is Program counter?Nov 12
What is the function of mode set register in 8257?Mar 10
How do I change the permission set for a code group?Nov 03
How many operations are there in the instruction set of 8085 microprocessor?Mar 03
Write an algorithm for Inserting a Node using Singly Linked List in dfs (data fi...Jan 18
Write an algorithm for Deleting a Node using Singly Linked List in dfs (data fil...Dec 12
Write an algorithm for deleting an element from stack using array in dfs (data f...Nov 17
Which function does exchange the contents of two strings?Oct 31
Which of the following would assigns the string “welcome” to the second construc...Nov 20
Mention the categories of instruction and give two examples for each category.Jan 12
Which of the following character literal(s) does use two bytes of memory?Dec 15
From which two sources can you generate SQL scripts? Dec 21
What are macro actions? Name any two actions provided by Access?Jan 20
What are macro actions? Name any two actions provided by Access?Jan 20
Name of serial’s name which has been started two year ago.Dec 15
Are triggers used with the SELECT statement? Dec 21
Using the CHECKS table, write a query to return all the unique remarksDec 21
Using today's TEAMSTATS table, write a query to determine who is batting under...Dec 21
What is the output modes used in 8279?Feb 09
What are the modes used in keyboard modes?Jan 04
What are the modes used in display modes?Mar 31
What are the various flags used in 8085?Oct 13
Which Stack is used in 8085?Apr 22
Which interrupts are generally used for critical events?Aug 12
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b))Dec 15
Functional decomposition technique can be used to implement - Select optionDec 15
Identify the correct syntax for declaring a dynamic array of characters using th...Apr 11
Name the library that must be included while using cinNov 13
Write an algorithm for Inserting an element into the queue using array in dfsNov 08
Write an algorithm for Deleting an element from the queue using array in dfsNov 28
Write an algorithm for Deleting an element from the circular queue using array i...Oct 11
Which system is used to identify/track/monitor the individual knowledge and skil...Feb 25