Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Software Interview Questions
Questions Answers Views Company eMail

How can I implement the function overloading in Perl ? I read about the operator overloading, I do not know how to implement the function overloading. Thanks in advance ?

2905

my @array=('data1','data2'); my @array1=('data1','data2'); my ($i,$k); $i=7; $k=7; while($i){ $array [++$#array] = 'ree'; $i--; print "@array"; } while($k){ push(@array1,'ree'); $k--; print "@array1"; } Are these two while loop are doing the same functionality ? What may be the difference?

2 4133

Consider the following example #! /bin/perl use strict; sub sample { my @arr=(1,2,3,4); return @arr; } my ($a,$b,$c,$d) = &sample; print "$a\n$b\n$c\n$d\n"; In the above code, How can I get the $c without using the arguments such as $a,$b. I don't want to use any array to get the return values.

2 4043

package MYCALC; use Exporter; our @EXPORT = (); our @ISA = qw(Exporter); our @EXPORT_OK = qw(addition multi); our %EXPORT_TAGS = (DEFAULT => [qw(&addition)],Both => [qw(&addition & +multi)]); sub addition { return $_[0] + $_[1]; } sub multi { return $_[0] * $_[1]; } 1; Program: use strict; use warnings; my @list = qw (2 2); use Module qw(:DEFAULT); print addition(@list),"\n"; Above coding is my module MYCALC and the program which using this module, I have not exported any function using @EXPORT, but I have used the DEFAULT in %EXPORT_TAGS with the function addition, when I call this function from the main it says the error as,

2682

How to compile PL/1 DB2 program? Please provide me details on this process?

SPIC, Verizon,

1 9049

I Am Planning to Write ISTQB foundation level Ceritification of inida. can Any Body let me know how to prepare for it & Any Study material can you provide or Any other E-books i should need to Study. Please Mail to me ajaybe_2004@yahoo.co.in THnaks in advance Ajay

2225

What do you mean by Purchase Price varience, what is its impact, how is this cleared?

2209

Is there any other options to create a site definition for MOSS other than using onet.xml.

Zensar,

2121

how can we import the user defined package without classpath?

CSC, Infosys,

1 7766

hot to set the indian payroll in oracle HRMS? how to integrate the OTL with payroll? if any one have the document or tell me the procedure to set my mail id is ravichandan.g@gmail.com

3i Infotech,

2 7879

hi i m deepak my shedule for NIC pi is 17 Apr please contact me if anybody has interview on same day or give me some idea who have faced

2032

what does dot in .net means

1 4830

What is the technical flow associated with P2P or Procure to Pay cycle like the tables, APIs, concurrent programs involved in this cycle. Only technical please.

TCS,

3934

Hi, I have a requirement for locking the fax field in user master records. As you know user can edit the details using the System>profile>own data (SU3), it is causing some security threat to our model. What i want is users should not be able to change the fax field under communications when they get into su3.I have heard of user Exist functionality but don't know how to implement it. Can you suggest something, it will be greatly appreciated.

1924

what are wrapper classes?

1 6127


Un-Answered Questions { Software }

How do I fix msvcr120 dll missing in windows 7?

790


How to remove tsrs and startup programs?

1103


give me an example for testing a program showing the test path .show how the test is important and complex.

2939


Explain about secure socket layer?

951


How between chaining process works in pega? (Goal seek)?

479


Can primary key be changed?

905


What source databases does hana support for batch loads?

95


How do I password protect an entire wordpress site?

149


What is a forward referencing and when should it be used?

1166


How many bytes is double?

971


What command must you use to include the not null constraint after a table has already been created?

1145


What is printwriter in java?

955


Differentiate regular grammar and regular expression.

842


how are start and xctl different?

966


Why use a database over excel?

660