I have a Webedit object. some text is entered in that object I want to know the font sixe of that text.How could I do this using QTP? This is a requirement for me. I am happy if any one help on this
3 8287Favourite Song that inspired u and explain? Favourite Advt in TV and explain? Is fitness important in day to day life?
2636wat is customer service is according to you is?how good u can satisfy your customer?wat makes u to be a good customer care exceutive?
3 17003Hi dis is sravanthi & me from ECE n i hav learned software testing & m preparing for GE plz send me interview pattern & interview questions.plz help me........
1 5668What is SORT ? How do we eliminate duplicate records ? How do I select some records using SORT ?
9 36631Q1. A. What is unary operator? List out the different operators involved in the unary operator. B. What is an adjust field format flag? Q2. A. Distinguish between a # include and #define. B. Can a list of string be stored within a two dimensional array? Q3. A.Explain how a pointer to function can be declared in C++? B.List the merits and demerits of declaring a nested class in C++? Q4. A. What are the syntactic rules to be avoid ambiguity in multiple inheritence? B. Explain the operation of overloading of an assignment operator. Q5. A. Explain how the virtual base class is different from the conventional base classes of the opps. B. Explain how an exception handler is defined and invoked in a Program. Q6. A. What is a binary file? List the merits and demerits of the binary file usagein C++. B. Write short notes on Text Manipulation Routines. C. Write bites in Turbo c++ Header (“Include”) Files.
2728Post New GE Interview Questions
How do you determine the 'route' in sales and distribution?
what size steel armoured cable is required to support 1500kva capacity. would 70mm squared be enough or would I need 90 or 120mm squared 3c plus earth
What is Federation Root Database?
How do you create a shortcut on windows 10?
What is White Hat Seo?
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
How do I unhide tabs in excel 2016?
What is the block size in Hadoop?
What are different sorting algorithms?
Who defines the account groups and give some tables in sap sd for customer master?
Is a exe a virus?
How to declare a cursor with "declare ... Cursor" in ms sql server?
I am using RedHat 6.3 in I wanna to install and configure zimbra mail. Can anybody tell me what are the RPM packages required for zimbra mail ? Where can I get those RPM packages ?
Describe a time you persuaded someone to buy insurance after having refused at first? : insurance cold calling
Can you place multiple contracts for similar goods in sap srm contract management?