Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

ISMT Interview Questions
Questions Answers Views Company eMail

what happens when a DC supply is given to AC motor?

9 25451

WHY CAN WE NOT CHAGE SPEED OF SYNCHRONOUS MOTOR...............................JUSTIFY

2 5611

why we calculate only 11kv 33kv and 132kv ... why not 10kv 20kv 45kv?

3 7932

Why the transformers are rating in KVA.?

5 8347

Post New ISMT Interview Questions




Un-Answered Questions

What is technical voice process job in BPO? Please give answer in details. What type of work i have to do?

2310


What are plankton, nekton, and benthos?

361


What tools can help you assure a consistent style?

529


what are Modules in Dojo?

5


Explain the steps for bug cycle?

1065


what versions of sas have you used (on which platforms)? : Sas programming

1131


Explain why nand-nand realization is preferred over and-or realization?

1344


Define oxidation potential and reduction potential? : Electrochemistry Corrosion

1261


What is the use of tlc and hplc? And when and where use?

1211


How would you create properties by using class Builder Wizard?

2050


What does $globals means?

969


What are different bean scopes in spring?

457


What are the different types of expenditures used in accounting?

1057


What is the shortcut key for slide show in ms power point?

382


Explain how you would simulate perimeter security using the amazon web services model?

252