Logo 
Search:

Search

 
Search:    
 

Resource TypePosted On
Which of the following will be used to access the two entries, namely key and va...Apr 21
Which of the following programming approach used functions as a key concept to p...Jul 28
What are macro actions? Name any two actions provided by Access?Jan 20
What are macro actions? Name any two actions provided by Access?Jan 20
Define a namespace called ‘samplespace’, which includes a member variable,namely...Dec 15
What is memory mapping?Apr 06
What is I/O mapping?Nov 03
What is Key bouncing?May 10
What is meant by key bouncing?Aug 11
How will you assign value ‘5’ to the variable ‘x’ inside a member function using...Aug 11
Which of the following will assign the value to the class member variable num? v...Jul 15
Which overloads a unary minus operator and returns no values - Select optionMar 21
Which of the following would assigns the string “welcome” to the second construc...Nov 20
Which of the following character literal(s) does use two bytes of memory?Dec 15
What do you understand by indexing in Access?Jan 20
Why am I getting an InvalidOperationException when I serialize an ArrayList?Dec 13
What is Code Access Security (CAS)?Nov 04
Which code segments will convert a class object namely sample to type double?Sep 06
What do you mean by primary key? Explain its significance.Jan 20
Which of the following keyword is used to modify a const object?Dec 15
Which of the following can be used to identify the objects in object oriented...Dec 15
map k = map_test; Which of statement(s) does illustrate the above code corr...Nov 22
Distinguish between the memories mapped I/O peripheral I/O?Oct 03
Which of the following is the general form of using an exception specification? ...Jan 18
So I can pass an instance of a value type to a method that takes an object as a...Oct 16
What are the fundamental differences between value types and reference types?Mar 12
How do I prevent concurrent access to my data?Oct 30
List Two types of Priority Queues in dfs (data file structure).Jul 31
What is Doubly or Two-Way Linked List in dfs (data file structure)?Apr 13
What is Two Way Merge Sort in dfs (data file structure)?Jun 18
Which functions can have access to the private and protected members of a class?Dec 02
Which function does exchange the contents of two strings?Oct 31
Mention the categories of instruction and give two examples for each category.Jan 12
Name of serial’s name which has been started two year ago.Dec 15
What is the significance of validation rule and validation test in Access?Jan 20
From which two sources can you generate SQL scripts? Dec 21
What is a ’query’ in Access? State and explain the different kinds of queries...Jan 20
What are the different types of forms that you can create in Access?Jan 20
How does the Auto form feature of Access differ from the Form wizard?Jan 20
Are triggers used with the SELECT statement? Dec 21
Using the CHECKS table, write a query to return all the unique remarksDec 21
Using today's TEAMSTATS table, write a query to determine who is batting under...Dec 21
Which interrupts are generally used for critical events?Aug 12
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b))Dec 15
Functional decomposition technique can be used to implement - Select optionDec 15
What is the output modes used in 8279?Feb 09
What are the modes used in keyboard modes?Jan 04
What are the modes used in display modes?Mar 31
What are the various flags used in 8085?Oct 13
Which Stack is used in 8085?Apr 22