Logo 
Search:

Search

 
Search:    
 

Resource TypePosted On
Which of the following will be used to access the two entries, namely key and va...Apr 21
Consider the following code segment and select one of the optionOct 27
Give an example of one address microprocessor?Nov 26
Rewrite the query from exercise 1 so that the remarks will appear as the first c...Dec 21
Can you use ORDER BY on a column that is not one of the columns in the SELECT st...Dec 21
Which function capitalizes the first letter of a character string and makes the ...Dec 21
Which of the following statement defines more than one generic data type in a cl...Apr 08
Which one of the following OOP concepts enables reusability of components?May 28
Which one of the following options is true on the topic of Simula67?Nov 21
What is BFS (Breadth First Search) in dfs (data file structure)?Oct 12
What is DFS (Depth First Search) in dfs (data file structure)?May 06
List Two types of Priority Queues in dfs (data file structure).Jul 31
What is Doubly or Two-Way Linked List in dfs (data file structure)?Apr 13
What is Two Way Merge Sort in dfs (data file structure)?Jun 18
Which system is used to identify/track/monitor the individual knowledge and skil...Feb 25
Inserting an element into the stack using array in dfs (data file structure)Dec 20
Write an algorithm for Inserting an element into the queue using array in dfsNov 08
Write an algorithm for Deleting an element from the queue using array in dfsNov 28
Write an algorithm for Deleting an element from the circular queue using array i...Oct 11
Which of the following programming approach used functions as a key concept to p...Jul 28
Identify the drawback of using procedure-oriented programming, if any:Nov 02
Name the library that must be included while using cinNov 13
Identify the correct syntax for declaring a dynamic array of characters using th...Apr 11
Which function does exchange the contents of two strings?Oct 31
Mention the categories of instruction and give two examples for each category.Jan 12
Using today's TEAMSTATS table, write a query to determine who is batting under...Dec 21
Which of the following would assigns the string “welcome” to the second construc...Nov 20
Are triggers used with the SELECT statement? Dec 21
From which two sources can you generate SQL scripts? Dec 21
What are macro actions? Name any two actions provided by Access?Jan 20
What are macro actions? Name any two actions provided by Access?Jan 20
Using the CHECKS table, write a query to return all the unique remarksDec 21
Name of serial’s name which has been started two year ago.Dec 15
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b))Dec 15
Functional decomposition technique can be used to implement - Select optionDec 15
Which interrupts are generally used for critical events?Aug 12
Which of the following character literal(s) does use two bytes of memory?Dec 15
What is the output modes used in 8279?Feb 09
What are the modes used in keyboard modes?Jan 04
What are the modes used in display modes?Mar 31
What are the various flags used in 8085?Oct 13
Which Stack is used in 8085?Apr 22
Which of the following keyword is used to modify a const object?Dec 15
Can an RC circuit be used as clock source for 8085?Nov 02
Which can be used to identify the services provided and received by objects?Dec 15
Which of the following can be used to identify the objects in object oriented...Dec 15
Using the CHECKS table from earlier today, write a query to return just the chec...Dec 21
Can savepoints be used to "save off" portions of a transaction? Why or why not? Dec 21
Can a COMMIT command be used by itself or must it be embedded? Dec 21
Will using a savepoint in the middle of a transaction save all that happened bef...Dec 21