Welcome -
Guest!
Login
/
Register Now
|
Search:
Home
Articles
Forum
Interview FAQ
Activities
News
Videos
Poll
Links
People
Groups
Search
Search:
*
All Categories
Assembly Language
Artificial Intelligence
C Programming
C++ Programming
Visual C++
OOAD
Cobol
Java
SQL Server
Asp.net MVC
Rest and WCF Services
Entity Framework
Knockout.Js
Unix / Linux / Ubuntu
Networking
OOPs Concept
HTML
Dos
SQL
System Analysis & Design
Gadgets
Internet
CSS
Javascript
.Net Framework
Asp.net
C#
VB.Net
Python
Perl
Oracle
Software Engineering
RDBMS Terms
AJAX Framework
Design Pattern
UML
WPF
WCF
SEO
PowerShell
Visual Studio
WWF
BizTalk Server
Azure
General
Testing
Online Certifications
PHP
My SQL
LinQ
Project Management
Silverlight
XML
MS Office
Windows OS
DHTML
All Section
Forum
Article
Interview
Hotlink
Video
News
Resource Type
Posted On
Which of the following will be used to access the two entries, namely key and va...
Apr 21
What is a ’query’ in Access? State and explain the different kinds of queries...
Jan 20
What are the different types of forms that you can create in Access?
Jan 20
What are macro actions? Name any two actions provided by Access?
Jan 20
What are macro actions? Name any two actions provided by Access?
Jan 20
Name the process that separates data into distinct, unique sets
Dec 21
Can I create my own permission set?
Feb 25
What is Code Access Security (CAS)?
Nov 04
What do you understand by indexing in Access?
Jan 20
Name 5 different addressing modes?
Nov 19
What is the different between SUM and SUMIF?
Jan 20
Explain the different instruction formats with examples
Oct 21
What is the use of addressing modes, mention the different types
Feb 20
How many operations are there in the instruction set of 8085 microprocessor?
Mar 03
How do I change the permission set for a code group?
Nov 03
What is Reachable Set in dfs (data file structure)?
Oct 14
What is the function of mode set register in 8257?
Mar 10
What is the significance of validation rule and validation test in Access?
Jan 20
Which of the following character literal(s) does use two bytes of memory?
Dec 15
Name of serial’s name which has been started two year ago.
Dec 15
Do the following statements return the same or different output.
Dec 21
From which two sources can you generate SQL scripts?
Dec 21
What are the different types of charts available in Excel?
Jan 20
How does the Auto form feature of Access differ from the Form wizard?
Jan 20
List Two types of Priority Queues in dfs (data file structure).
Jul 31
What is Doubly or Two-Way Linked List in dfs (data file structure)?
Apr 13
What is Two Way Merge Sort in dfs (data file structure)?
Jun 18
Which of the following would assigns the string “welcome” to the second construc...
Nov 20
Which functions can have access to the private and protected members of a class?
Dec 02
How do I prevent concurrent access to my data?
Oct 30
If C# destructors are so different to C++ destructors, why did MS use the same...
Nov 21
Mention the categories of instruction and give two examples for each category.
Jan 12
Which function does exchange the contents of two strings?
Oct 31
What are the different types of write operations used in 8253?
Sep 25
Give the different types of command words used in 8259a?
Oct 10
What is a cell reference? How many different types of cell references exist?...
Jan 20
Assembly Language
Artificial Intelligence
C Programming
C++ Programming
Visual C++
OOAD
Cobol
Java
SQL Server
Asp.net MVC
Rest and WCF Services
Entity Framework
Knockout.Js
Unix / Linux / Ubuntu
Networking
OOPs Concept
HTML
Dos
SQL
System Analysis & Design
Gadgets
Internet
CSS
Javascript
.Net Framework
Asp.net
C#
VB.Net
Python
Perl
Oracle
Software Engineering
RDBMS Terms
AJAX Framework
Design Pattern
UML
WPF
WCF
SEO
PowerShell
Visual Studio
WWF
BizTalk Server
Azure
General
Testing
Online Certifications
PHP
My SQL
LinQ
Project Management
Silverlight
XML
MS Office
Windows OS
DHTML
Sharepoint