Resource Type | Posted On |
Which of the following programming approach used functions as a key concept to p... | Jul 28 |
Identify the drawback of using procedure-oriented programming, if any: | Nov 02 |
What are the various programmed data transfer methods? | Jan 05 |
Which OOP feature can be enabled by using private declaration for the class... | Feb 20 |
Does C# support multiple inheritance (MI)? | Oct 16 |
Which can be used to identify the services provided and received by objects? | Dec 15 |
Which object-oriented relationship can provide this information? | Dec 15 |
Provide syntax to rename a table | Dec 17 |
Provide syntax to truncate a table | Dec 17 |
Inserting an element into the stack using array in dfs (data file structure) | Dec 20 |
return is an example of which option | Jul 21 |
Example of CMMI | Nov 05 |
Explain sysdate with example | Dec 17 |
COUNT(field_name) with example | Dec 17 |
Give examples for Maskable interrupts? | Sep 29 |
Give example for Non-Maskable interrupts? | Jul 25 |
Explain the different instruction formats with examples | Oct 21 |
Give an example of one address microprocessor? | Nov 26 |
Explain the following terms giving suitable examples: | Jan 20 |
What is Program counter? | Nov 12 |
Can I write IL programs directly? | Sep 20 |
Can I use COM components from .NET programs? | Sep 21 |
Can I use .NET components from COM programs? | Dec 15 |
A C++ program structure is based on the concept of | Mar 25 |
Which of the following features that distinguish object oriented programming fro... | Jun 09 |
|
Which is not associated with Object-oriented programming? | Feb 25 |
Object-based programming languages do not support | Nov 12 |
Which of the following OOP concepts is supported by Inheritance? | Dec 25 |
Which functions can have access to the private and protected members of a class? | Dec 02 |
Which feature of C++ does allow you to handle such kind of mulitpath... | Aug 04 |
What is the difference between a private assembly and a shared assembly? | Nov 03 |
Which of the following function calls is correct while providing default... | Feb 25 |
Write an algorithm for deleting an element from stack using array in dfs (data f... | Nov 17 |
Write an algorithm for Inserting a Node using Singly Linked List in dfs (data fi... | Jan 18 |
Write an algorithm for Deleting a Node using Singly Linked List in dfs (data fil... | Dec 12 |
What are macro actions? Name any two actions provided by Access? | Jan 20 |
What are macro actions? Name any two actions provided by Access? | Jan 20 |
Are triggers used with the SELECT statement? | Dec 21 |
How can you create a style by example? Explain. | Jan 20 |
Which Stack is used in 8085? | Apr 22 |
Mention the categories of instruction and give two examples for each category. | Jan 12 |
What are the various flags used in 8085? | Oct 13 |
List out categories of the 8085 instructions. Give examples of the instructions ... | Jan 08 |
What is the output modes used in 8279? | Feb 09 |
What are the modes used in keyboard modes? | Jan 04 |
What are the modes used in display modes? | Mar 31 |
Which interrupts are generally used for critical events? | Aug 12 |
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b)) | Dec 15 |
Functional decomposition technique can be used to implement - Select option | Dec 15 |
Using the CHECKS table, write a query to return all the unique remarks | Dec 21 |