Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Accenture SharePoint Interview Questions
Questions Answers Views Company eMail

When configuring Enterprise Search?

423

Did you ever worked in Web Services ? How you called Webmethods ?

405

How many types of Event Handlers in Sharepoint ? where did you use these event handlers in your project ?

432

How many ways we can deploy the webpart ? Which is the best method to deploy the Webpart ?

477

Tell me about your sharepoint experiences ?

478

Post New Accenture SharePoint Interview Questions


Accenture SharePoint Interview Questions


Un-Answered Questions

What is primality testing ?

1370


Explain what is the difference between siebel 7.5 and 7.8? If we upgarde the application to 7.8 from 7.5 what are the areas we need to give importance fromqa(testing) point of view?

504


Are php variables global?

555


What does stateless mean?

636


What are action filters in mvc?

1






Ow to communicate between two webservers in two diff systems?

443


What is lilo how is it useful in linux?

452


How does the odor of flower petals help pollination?

572


Name some Infectious diseases.

321


What is method overloading with type promotion?

577


what is cause of static electricity? I experience shock when i touch metal equipment in a room ,furher check shows earth leakage showing 80ma at the DB near to the 400 MCCB?

1454


Why do users of accounting information need accounting information?

598


What is Dynamic finders ?

507


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2387


what is sql profiler? : Sql dba

585