SAS using companies in INDIA
Answer Posted / akshay
Hewitt Associates, IBM, ACS
| Is This Answer Correct ? | 20 Yes | 1 No |
Post New Answer View All Answers
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
You are given a dictionary of all valid words. You have the following 3 operations permitted on a word: delete a character, insert a character, replace a character. Now given two words - word1 and word2 - find the minimum number of steps required to convert word1 to word2. (one operation counts as 1 step.)
Describe the difference between Interface-oriented, Object-oriented and Aspect-oriented programming
Write a program that prints the numbers from 1 to 100. But for multiples of three print "Fit" instead of the number and for the multiples of five print "Bit". For numbers which are multiples of both three and five print "FitBit".
In project we have Documentation phase also,in that what is micro and macro designing?
Iam using Microsoft Visual Studio to create a system for mobile store I want to know how to calculate mobile price that the customer buy and how to reduce quantity from the data base that we have for mobile .And also how to calculate revnue for each mobile and revnue for the total mobile
along with oracle which language will be beneficial to have knowledge with,java,.net,since i m doing oracle have appeared for 8th sem BEIT,plz suggest
Write a program to reverse a number?
What is Negative testing?
what is log files in qtp what is use
Explain polymorphism. Provide an example.
What is the use of Differ interface check box in Ship confirm?
I want sample papers for NIC Examination. Plz send them to my mail Id das.neelam@gmail.com . Plz send it today, tomorrow i've the exam.
design a counter with the following repeated binary sequence: 0, 1, 2, 3, 4, 5, 6, 7, 8 using JK Flip Flop.
how to work search engine? plz detail answer me.