Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


how to get second highest salary from a employee table and
how get a 5th highest salary from a employee table by using
proc sql?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Programming Languages AllOther Interview Questions

Write a shell program. Enter basic pay of an employee and calculate DA, HRA, Deduction, Gross pay and Net pay as follows: DA = 75 % of BASIC HRA = 10 % of BASIC DEDUCTION = 15 % of BASIC GROSS PAY = BASIC+DA+HRA NET PAY = GROSS PAY-DEDUCTION.

1 Answers   TCS,


what is meant by trigger?

8 Answers   IBM,


what are the advantages of sap on other software ?

0 Answers  


Explain the types of operations? Draw the figure for shift and rotate operations?

0 Answers  


what is log files in qtp what is use

0 Answers   HSBC,


Piggy backing is a technique for a) Flow control b) sequence c) Acknowledgement d) retransmition

17 Answers   Fast Booking, HCL, Lucent, NIC,


how do i create my own exception class which will restrict IO exception?

0 Answers  


Why multiple inheritance is removed in java?

4 Answers   TCS,


If i have a dataset queried from Sql and I would like to insert the dataset into a specific node in an xml document how do I do this

0 Answers   SGT,


Write a Pseudo Code to fins the LCM of two given numbers

5 Answers   Goldman Sachs,


For a binary tree with n nodes, How many nodes are there which has got both a parent and a child?

0 Answers  


in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?

0 Answers  


Categories