Logo 
Search:

Search

 
Search:    
 

Resource TypePosted On
Dual table in oracleDec 17
Which of the following will be used to access the two entries, namely key and va...Apr 21
Which statement(s) is true about try block? - Select optionJun 13
What happens when the try block does not throw any exception?May 10
Why do I get errors when I try to serialize a Hashtable?Dec 03
Inserting an element into the stack using array in dfs (data file structure)Dec 20
Write an algorithm for Deleting an element from the circular queue using array i...Oct 11
Which of the following programming approach used functions as a key concept to p...Jul 28
Identify the drawback of using procedure-oriented programming, if any:Nov 02
Name the library that must be included while using cinNov 13
List Two types of Priority Queues in dfs (data file structure).Jul 31
What is Doubly or Two-Way Linked List in dfs (data file structure)?Apr 13
What is Two Way Merge Sort in dfs (data file structure)?Jun 18
Write an algorithm for Inserting an element into the queue using array in dfsNov 08
Write an algorithm for Deleting an element from the queue using array in dfsNov 28
Which of the following would assigns the string “welcome” to the second construc...Nov 20
Identify the correct syntax for declaring a dynamic array of characters using th...Apr 11
Which function does exchange the contents of two strings?Oct 31
Mention the categories of instruction and give two examples for each category.Jan 12
Are triggers used with the SELECT statement? Dec 21
From which two sources can you generate SQL scripts? Dec 21
What are macro actions? Name any two actions provided by Access?Jan 20
What are macro actions? Name any two actions provided by Access?Jan 20
What is the output modes used in 8279?Feb 09
What are the modes used in keyboard modes?Jan 04
What are the modes used in display modes?Mar 31
What are the various flags used in 8085?Oct 13
Which Stack is used in 8085?Apr 22
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b))Dec 15
Functional decomposition technique can be used to implement - Select optionDec 15
Which interrupts are generally used for critical events?Aug 12
Which of the following character literal(s) does use two bytes of memory?Dec 15
Which system is used to identify/track/monitor the individual knowledge and skil...Feb 25
Name of serial’s name which has been started two year ago.Dec 15
Using the CHECKS table, write a query to return all the unique remarksDec 21
Using today's TEAMSTATS table, write a query to determine who is batting under...Dec 21
When using the HAVING clause, do you always have to use a GROUP BY also? Dec 21
Can savepoints be used to "save off" portions of a transaction? Why or why not? Dec 21
Can a COMMIT command be used by itself or must it be embedded? Dec 21
Will using a savepoint in the middle of a transaction save all that happened bef...Dec 21
Which of the following keyword is used to modify a const object?Dec 15
Which can be used to identify the services provided and received by objects?Dec 15
Which of the following can be used to identify the objects in object oriented...Dec 15
Can an RC circuit be used as clock source for 8085?Nov 02
Using the CHECKS table from earlier today, write a query to return just the chec...Dec 21
What are the features used mode 1 in 8255?Apr 07
What are the signals used in input control signal & output control signal?Apr 01
What are the features used mode 2 in 8255?Sep 21
What are the modes of operations used in 8253?Sep 25
What are the different types of write operations used in 8253?Sep 25