Logo 
Search:

Search

 
Search:    
 

Resource TypePosted On
Which of the following programming approach used functions as a key concept to p...Jul 28
Identify the drawback of using procedure-oriented programming, if any:Nov 02
What are the various programmed data transfer methods?Jan 05
Which OOP feature can be enabled by using private declaration for the class...Feb 20
Does C# support multiple inheritance (MI)?Oct 16
Which can be used to identify the services provided and received by objects?Dec 15
Which object-oriented relationship can provide this information? Dec 15
Provide syntax to rename a tableDec 17
Provide syntax to truncate a tableDec 17
Inserting an element into the stack using array in dfs (data file structure)Dec 20
return is an example of which option Jul 21
Example of CMMINov 05
Explain sysdate with exampleDec 17
COUNT(field_name) with exampleDec 17
Give examples for Maskable interrupts?Sep 29
Give example for Non-Maskable interrupts?Jul 25
Explain the different instruction formats with examplesOct 21
Give an example of one address microprocessor?Nov 26
Explain the following terms giving suitable examples: Jan 20
What is Program counter?Nov 12
Can I write IL programs directly?Sep 20
Can I use COM components from .NET programs?Sep 21
Can I use .NET components from COM programs?Dec 15
A C++ program structure is based on the concept ofMar 25
Which of the following features that distinguish object oriented programming fro...Jun 09
Which is not associated with Object-oriented programming?Feb 25
Object-based programming languages do not supportNov 12
Which of the following OOP concepts is supported by Inheritance?Dec 25
Which functions can have access to the private and protected members of a class?Dec 02
Which feature of C++ does allow you to handle such kind of mulitpath...Aug 04
What is the difference between a private assembly and a shared assembly?Nov 03
Which of the following function calls is correct while providing default...Feb 25
Write an algorithm for deleting an element from stack using array in dfs (data f...Nov 17
Write an algorithm for Inserting a Node using Singly Linked List in dfs (data fi...Jan 18
Write an algorithm for Deleting a Node using Singly Linked List in dfs (data fil...Dec 12
What are macro actions? Name any two actions provided by Access?Jan 20
What are macro actions? Name any two actions provided by Access?Jan 20
Are triggers used with the SELECT statement? Dec 21
How can you create a style by example? Explain.Jan 20
Which Stack is used in 8085?Apr 22
Mention the categories of instruction and give two examples for each category.Jan 12
What are the various flags used in 8085?Oct 13
List out categories of the 8085 instructions. Give examples of the instructions ...Jan 08
What is the output modes used in 8279?Feb 09
What are the modes used in keyboard modes?Jan 04
What are the modes used in display modes?Mar 31
Which interrupts are generally used for critical events?Aug 12
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b))Dec 15
Functional decomposition technique can be used to implement - Select optionDec 15
Using the CHECKS table, write a query to return all the unique remarksDec 21