Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Yantro Software Interview Questions
Questions Answers Views Company eMail

Difference between abstract class and Interfaces in Java

9 17843

How the Action Trigger works? and what is full syntex of srw.run_report?

1 8107

Tell me the flow of Field service from the user's prespective?

3 9218

How is oracle istore and oracle inventory related?

3 9605

Post New Yantro Software Interview Questions




Un-Answered Questions

What is a core dimension?

614


What’s the benefit of azure sla?

292


What is the replace tool in word?

368


What are the unary operations in Relational Algebra?

502


What is spring mvc framework?

179






Define rsa algorithm?

687


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1962


How do I check if a cell has a value match in excel?

298


Explain manual secondary cost planning? : co- cost center accounting

587


1. What is maximum permissible distance between smoke detectors ? 2. How do we decide number of smoke detectors required in a large office, warehouse, hall etc ? 3. What should be maximum height of smoke detectors ? 4. Where do we use heat detector, optical smoke detector, temperature sensitive detector ?

2385


Explain what are the different functions of internal audit?

679


Explain spring mvc architecture.

169


why centrifugal pump used in I.D.fan and axial pump in F.D. fan

1957


Hey frens! I want to work in call centre as fresher; as such these days I could not find any advertisement for international call centre and I am planning to go through the guides of consultant. Would it do?

1772


How to you make a python script executable on unix?

425