Logo 
Search:

Search

 
Search:    
 

Resource TypePosted On
Which of the following character literal(s) does use two bytes of memory?Dec 15
Identify the correct syntax for declaring a dynamic array of characters using th...Apr 11
What must be done after closing a cursor to return memory? Dec 21
Which of the following will be used to access the two entries, namely key and va...Apr 21
Steps involved to fetch a byte in 8085Jun 26
Which of the following programming approach used functions as a key concept to p...Jul 28
Basic concepts in memory interfacingFeb 04
What is memory mapping?Apr 06
Will SELECT SUM(LASTNAME) FROM CHARACTERS query work?Dec 21
Which of the following would assigns the string “welcome” to the second construc...Nov 20
How can I find out what the garbage collector is doing?Sep 08
Which of the following can be used to identify the objects in object oriented...Dec 15
Which of the following keyword is used to modify a const object?Dec 15
Which of the following is the general form of using an exception specification? ...Jan 18
Distinguish between the memories mapped I/O peripheral I/O?Oct 03
Which function can retrieve the character stored at a specified location?Jan 24
Which function capitalizes the first letter of a character string and makes the ...Dec 21
What SELECT COUNT(LASTNAME) FROM CHARACTERS; will return?Dec 21
Which header file in C++ does contain function prototypes for memory allocation?Nov 23
List Two types of Priority Queues in dfs (data file structure).Jul 31
What is Doubly or Two-Way Linked List in dfs (data file structure)?Apr 13
What is Two Way Merge Sort in dfs (data file structure)?Jun 18
Name of serial’s name which has been started two year ago.Dec 15
From which two sources can you generate SQL scripts? Dec 21
What are macro actions? Name any two actions provided by Access?Jan 20
What are macro actions? Name any two actions provided by Access?Jan 20
Which function does exchange the contents of two strings?Oct 31
Mention the categories of instruction and give two examples for each category.Jan 12
Which interrupts are generally used for critical events?Aug 12
What is the output modes used in 8279?Feb 09
What are the modes used in keyboard modes?Jan 04
What are the modes used in display modes?Mar 31
What are the various flags used in 8085?Oct 13
Which Stack is used in 8085?Apr 22
Using the CHECKS table, write a query to return all the unique remarksDec 21
Write expression using operator keywords for (a!=b) > (~(a & b)&=(a^b))Dec 15
Functional decomposition technique can be used to implement - Select optionDec 15
Are triggers used with the SELECT statement? Dec 21
Using today's TEAMSTATS table, write a query to determine who is batting under...Dec 21
Which system is used to identify/track/monitor the individual knowledge and skil...Feb 25
Inserting an element into the stack using array in dfs (data file structure)Dec 20
Write an algorithm for Inserting an element into the queue using array in dfsNov 08
Write an algorithm for Deleting an element from the queue using array in dfsNov 28
Write an algorithm for Deleting an element from the circular queue using array i...Oct 11
Identify the drawback of using procedure-oriented programming, if any:Nov 02
Name the library that must be included while using cinNov 13
Which of the following statement(s) is true according to the following statement...Jan 13
Which of the following features that distinguish object oriented programming fro...Jun 09
Which of the following is true about pointers?Jul 03
Which of the following is not a keyword?Aug 27