Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


HTML is a subset of

Answers were Sorted based on User's Feedback



HTML is a subset of..

Answer / bgg

SGML-Standard Generalized Markup Language

Is This Answer Correct ?    126 Yes 2 No

HTML is a subset of..

Answer / sudesh

SGML

Is This Answer Correct ?    38 Yes 3 No

HTML is a subset of..

Answer / rajvir

Sgml

Is This Answer Correct ?    21 Yes 4 No

HTML is a subset of..

Answer / rajan bajalia

SGML MEAN standard General Markup Language

Is This Answer Correct ?    8 Yes 0 No

HTML is a subset of..

Answer / dean

xml

Is This Answer Correct ?    27 Yes 21 No

HTML is a subset of..

Answer / veena

sgml

Is This Answer Correct ?    7 Yes 5 No

HTML is a subset of..

Answer / rajiv

HTML is not a subset of any other language

Is This Answer Correct ?    18 Yes 26 No

HTML is a subset of..

Answer / sahil

xm1

Is This Answer Correct ?    8 Yes 19 No

Post New Answer

More Programming Languages AllOther Interview Questions

what is the basic and unique feature of dotnet

0 Answers   HCL,


Write a shell program. Enter number of days from keyboard. Find out the number of years, month and days it contains

0 Answers  


Please describe an example where you used object orientation in one of your programs.

0 Answers  


What are the compilers of JAVA and .NET Programming languages?

1 Answers   HCL, Microsoft,


Definition of Singleton Class? what is the Purpose of it? what is the advantage?

0 Answers   Cognizant,


in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?

0 Answers  


Hi can you please send me recent(present) interview questions and technical qyestions with answers for "BUSSIESS OBJECTS" and "DATA WAREHOUSE".pls its urgent for me my mail id is sekhar.cs82@gmail.com,manjuforgis@gmail.com. thanks in advance

0 Answers  


Write 5 differences between Memory Reference Instruction and Register Reference Instruction.

1 Answers   TCS, TJM,


What is the merger sort principle and its time complexity.

0 Answers   Verifone,


It is possible to take number of controls added to form at run-time.ex-when user enter 6, 6 text boxes get added to form,next time number of controls get change as per user number enter. What is code for that?

0 Answers   Honeywell,


THERE ARE 4 SOURCE FILES WHICH CONTAINS SAME METADATA CREATE A TARGET THAT SHOULD DISPLAY THE FILE NAME ALONG WITH THE RECORD PLEASE SEND THE ANSWERFOR THIS QUESTION WITH MAPPING

0 Answers   Wipro,


which one is the best practice using synchronization method or synchronization block

1 Answers   TCS,


Categories