Resource Type | Posted On |
Using the CHECKS table, write a query to return all the unique remarks | Dec 21 |
Using today's TEAMSTATS table, write a query to determine who is batting under... | Dec 21 |
Select true option for A friend function | Nov 03 |
Which of the following operators cannot use friend functions for overloading? | Nov 17 |
Which of the following programming approach used functions as a key concept to p... | Jul 28 |
Using the CHECKS table from earlier today, write a query to return just the chec... | Dec 21 |
State whether true or false. Give the reasons for your answer. | Jan 20 |
If you have a trigger on a table and the table is dropped, does the trigger stil... | Dec 21 |
What would happen if you created a table and granted select privileges on the ta... | Dec 21 |
If you own a table, who can select from that table? | Dec 21 |
What happens during a full-table scan? | Dec 21 |
How can you avoid a full-table scan? | Dec 21 |
Distinguish between Select query and Action Query, Database and Table, Filter an... | Jan 20 |
How to create table? | Dec 15 |
How to insert records into tables? | Dec 15 |
Provide syntax to rename a table | Dec 17 |
Provide syntax to truncate a table | Dec 17 |
Dual table in oracle | Dec 17 |
Which of the following can be used to identify the objects in object oriented... | Dec 15 |
Which of the following keyword is used to modify a const object? | Dec 15 |
Which of the following will be used to access the two entries, namely key and va... | Apr 21 |
Which of the following is the general form of using an exception specification? ... | Jan 18 |
What is the output modes used in 8279? | Feb 09 |
What are the modes used in keyboard modes? | Jan 04 |
What are the modes used in display modes? | Mar 31 |
|
What are the various flags used in 8085? | Oct 13 |
Which Stack is used in 8085? | Apr 22 |
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b)) | Dec 15 |
Functional decomposition technique can be used to implement - Select option | Dec 15 |
Which interrupts are generally used for critical events? | Aug 12 |
Are triggers used with the SELECT statement? | Dec 21 |
Identify the drawback of using procedure-oriented programming, if any: | Nov 02 |
Inserting an element into the stack using array in dfs (data file structure) | Dec 20 |
Write an algorithm for Inserting an element into the queue using array in dfs | Nov 08 |
Write an algorithm for Deleting an element from the queue using array in dfs | Nov 28 |
Which system is used to identify/track/monitor the individual knowledge and skil... | Feb 25 |
Write an algorithm for Deleting an element from the circular queue using array i... | Oct 11 |
Name the library that must be included while using cin | Nov 13 |
Identify the correct syntax for declaring a dynamic array of characters using th... | Apr 11 |
Which of the following statement(s) is true according to the following statement... | Jan 13 |
In Oracle, how can you find out what tables and views you own? | Dec 21 |
Should tables and their corresponding indexes reside on the same disk? | Dec 21 |
What does the # in front of a temporary table signify? | Dec 21 |
Which of the following SQL statements will work? | Dec 21 |
Explain the following terms giving suitable examples: | Jan 20 |
Identify the correct combination for the following data | Jan 28 |
Which of the following is true about pointers? | Jul 03 |
Identify all the members of the following class xyz: | Jun 16 |
Identify if any error in the following code segment | Jan 04 |
Consider the following code segment and select one of the option | Oct 27 |