Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Infosys Interview Questions
Questions Answers Views Company eMail

Integraton testing

6 7848

what is the difference between String and StringBuffer classes?

2 5529

java support which type of polymorphism??runtym or compile tym or both??

1 2592

What is the difference between linux server and solaris server?

2382

what is race around condition? in which flop it will occur? how to remove?

4 7647

what is performance testing

4 6882

what is integral of body?

2274

WHAT IS MECHANICAL ENGINEERING

2 6066

sample & previous year papers of sta & je (electronics 0

3744

What are d uses of a diode . What is diode equation . And what is its use

2 7394

Write a program to replace n bits from the position p of the bit representation of an inputted character x with the one's complement. Method invertBit takes 3 parameters x as input character, p as position and n as the number of positions from p. Replace n bits from pth position in 8 bit character x. Then return the characters by inverting the bits.

4222

In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2489

At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with these names could be kept in that shelf as in this example: bottom of shelf ---> [AAAJKRDFDEWAAYFYYKK]-----Top of shelf. All these packets are to be loaded on cars. The cars are lined in order, so that the packet could be loaded on them. The cars are also named [A, B, C, D, E,………….]. Each Car will load the packet with the same alphabet. So, for example, car ‘A’ will load all the packets with name ‘A’. Each particular car will come at the loading point only once. The cars will come at the loading point in alphabetical order. So, car ‘B’ will come and take all the packets with name ‘B’ from the shelf, then car ‘C’ will come. No matter how deep in the shelf any packet ‘B’ is, all of the ‘B’ packets will be displaced before the ‘C’ car arrives. For that purpose, some additional shelves are provided. The packets which are after the packet B, are kept in those shelves. Any one of these shelves contains only packets, having the same name. For example, if any particular shelf is used and if a packet with name X is in it, then only the packets having names X will be kept in it. That shelf will look like [XXXXXXX]. If any shelf is used once, then it could be used again only if it is vacant. Packets from the initial shelf could be unloaded from top only. Write a program that finds the minimum total number of shelves, including the initial one required for this loading process.

2257

which of the following is non incremental testing??? a)big bang b)top down c)bottom up d)agile

4 9258

What are the different ways to check LED light/bulb?

3 6042

Post New Infosys Interview Questions


Infosys Interview Questions


Un-Answered Questions

in a pump, impeller wear ring is harder or casing ring? why?

2660


How to define a data source name (dsn) in odbc manager?

1040


What are the Agent running time intervals?

651


How would you login to Active Directory from a Linux or Mac box?

1793


what is an informix instance?

80


What causes a file to become corrupt?

955


What is the molecule responsible for the absorption of photic energy for photosynthesis?

918


What is the use of teradata system software?

1044


What is the default value of session attribute in jsp?

881


'A' is running a manufacturing set up. 'B' sends raw material (after paying CST) to 'A' for manufacutre of his specified product and 'A' keeps 'B's stock in his godown. Can 'A' buy this material from 'B' by raising a CREDIT MEMO and in the books regularises by passing Journal Entry Dr.Raw material inventory and Cr. 'B's Account.

2341


What is a content provider? How is it implemented?

894


how does sap hana support massively parallel processing?

86


Explain me how do I change the site admin name?

166


With which modules in sap is the inventory management integrated?

1136


wht did you apply at teletech? why not in tanscom, convergy's, ventus, etc.?

2848