Resource Type | Posted On |
Algorithm for Deleting a particular node in Circular Doubly Linked List in dfs | Sep 10 |
Write an algorithm for Deleting an element from the circular queue using array i... | Oct 11 |
Write an algorithm for Deleting an element from the queue using array in dfs | Nov 28 |
Write an algorithm for Deleting a Node using Singly Linked List in dfs (data fil... | Dec 12 |
Name the library that must be included while using cin | Nov 13 |
Write an algorithm for deleting an element from stack using array in dfs (data f... | Nov 17 |
What is the general format of calling a static member function using a class... | Nov 02 |
Name of serial’s name which has been started two year ago. | Dec 15 |
How do we define name in Excel? What is the use of defining names? | Jan 20 |
Write an algorithm for Creating Stack (lifo) using Singly Linked List in dfs. | Apr 03 |
Write an algorithm for Pushing a Node above the top of stack using Singly Linked... | May 25 |
Write an algorithm for Poping the Topmost element of stack using Singly Linked L... | Dec 24 |
Write an algorithm for Creating Queue(fifo) using Singly Linked List in dfs. | Dec 04 |
Write an algorithm for Pushing a Node at the end of queue using Singly Linked Li... | Dec 12 |
Write an algorithm for Poping the Topmost element of queue using Singly Linked L... | Nov 10 |
Write an algorithm for Inserting a Node using Singly Linked List in dfs (data fi... | Jan 18 |
Name the implementation of Requirements Development PA in Infosys | Jan 18 |
Name the metrics that is associated with Requirements Management PA in CMM | Jan 06 |
Identify the valid variable name from which options | Aug 16 |
The insertion operator is another name for which operator | Sep 16 |
Identify which function prototype exhibits the following: Name of the function i... | Feb 25 |
Name the process that separates data into distinct, unique sets | Dec 21 |
Which functions are also known by the name ? | Dec 21 |
In 8085 name the 16 bit registers? | Dec 01 |
Name 5 different addressing modes? | Nov 19 |
|
What is the output of the below code? | Dec 06 |
What is the output of the following code? | Feb 24 |
Write an algorithm for Deleting a node from a Binary Tree in dfs (data file... | Mar 05 |
Identify if any error in the following code segment | Jan 04 |
Consider the following code segment and select one of the option | Oct 27 |
Can source code be reverse-engineered from IL? | Jan 28 |
What is Code Access Security (CAS)? | Nov 04 |
Who defines the CAS code groups? | Mar 02 |
How do I define my own code group? | Mar 23 |
List Advantages of Linked Lists in dfs (data file structure). | Apr 01 |
List Disadvantages of Linked Lists in dfs (data file structure). | Nov 18 |
List Types of Linked List in dfs (data file structure). | Nov 13 |
List the Factors considered for project estimation in CMM | Jan 04 |
List all activities required as part of requirements management | Jan 23 |
List the operation modes of 8255 | Nov 20 |
List applications of microprocessor-based system. | Jan 20 |
List 16 – bit registers of 8085 microprocessor | Oct 01 |
List the allowed register pairs of 8085 | May 15 |
Algorithm for Inserting a node after or before particular node in Circular Doubl... | Jul 14 |
Using the CHECKS table, write a query to return all the unique remarks | Dec 21 |
Using today's TEAMSTATS table, write a query to determine who is batting under... | Dec 21 |
Are triggers used with the SELECT statement? | Dec 21 |
What is the output modes used in 8279? | Feb 09 |
What are the modes used in keyboard modes? | Jan 04 |
What are the modes used in display modes? | Mar 31 |