what is the use of check point
. With the help of above table EMP, perform the following operation is sql. a) Add the new column “DEPTNO” b) Rename the table c) Update table d) Modify the table if column ‘SAL’ whose data type is number (10) and you want to enter varchar2 (15) . For example $USD 20 etc.
I m Abdullah Ansari compleated MCA from Jamia Hamdard,i have appeared the test of IBM on 2 august at oxford college of engineering Bangalore.waiting for hr round.. This is the first round for IBM.02/08/08 Paper consists of 4 sections 15 questions from matrices(time very less but no negative marking). 25 questions from series completion section (this section is very easy but negative marking) 15 questions from aptitude(little bit tough time limit 15 minute negative marking) 4th section is from computer science (c,c++,operating system,digital electronics ,basic question..) result came at 3 o'clock.i was selected... In interview they asked questions like 1 they asked about final yr project.. 2 what are dynamic and static memory location? 3 linked list and array difference between them. 4 what is function ? what is difference betwen function and inline function? 5 about structure 6 about binary tree, traversal, call by value. 7 storage class and many more basic questions..
what is the difference between primary key and unique key?
What is the difference between procedure -oriented language and object oriented language?
22 Answers IBM, Infosys, TCS,
what are other resources are needed for this mantis?
Can we write a method in JSP.If so how?
Write a program to reverse a number?
how can i apply validation without using errorprovider in C# windows application
how sap is different from other software ?
what is the purpose of checked Menu options
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
Hello Experts, What is the difference between move and move corresponding exactly? please post me asap