what will be the model paper for the post of assistant
programmer in delhi high court

Answer Posted / deepika

Thank you,Javed Akhtar!may I know how you know this?they
haven't published any thing in their advt. any way thanks
once again.

Is This Answer Correct ?    15 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

in teradata level primary in table level allows duplicates why?

1649


Is there any standard procedure to test the application as a whole? Or How can I test complete application right from the requirement gathering?

1478


shall we execute our java programmes in jre

1765


In an customer exit (include Z) program, only the last record is getting fetched. The exit is getting called after pressing save button. What to write for fetching the first record ? Before saved to a SAP table how can i call all these records in an itab in the exit ?

1519


how does database connection using ADO.NET?

1528






how to add Servlet-api.jar file into eclipse 3.3.2 ?

4070


Given: coordinates of rectangle-> left bottom and right top points. the rectangles create a hole.Find the maximum area of the hole. eg. 4 rectangles create a hole in between. find its area.

1987


Write a pseudo code to evaluate a number to any base given (2...16) based on the input. Number greater than 9 should be given as A-F for 10-15.

2088


design a counter with the following repeated binary sequence: 0, 1, 2, 3, 4, 5, 6, 7, 8 using JK Flip Flop.

16254


What is the entry point function of a DLL?

623


hi, all this is shoba m.c.a . i have learned abap but no oppurtunities right now as fresher , right now i want to learn any course on demand any one pls suggest me good course and institute in hyderabad

1402


Given a Binary Search Tree, write a program to print the kth smallest element without using any static/global variable. You can?t pass the value k to any function also.

564


Difference between debugging, running, executing of an application

3490


why we need to take u?

1681


in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?

1531