the word unimpressive was given.they asked us to do change 1st & 2nd,3rd & 4th,so on.then they asked what will be 10th letter from right?
1699there are 76 persons. 53 can read hindu,46 can read times,39 can read deccan and 15 can read all.if 22 can read hindu and deccan and 23 can read deccan and times then what is the number of persons who read only times and hindu………
1607two trees are there. one grows at 3/5 of the other. in 4 years, total growth of trees is 8 ft. what growth will smaller tree will have in 2 years.
1319work can be done by 8 men and 10 women in 25 days, the same work can be done by 10 children and 5 women . in how many days 2 children and 3 men
1215A finishes the work in 10 days & B in 8 days individually. If A works for only 6 days then how many days should B work to complete A's work?
1309A 2D array is declared as A[9,7] and each element requires 2 byte.If A[ 1,1 ] is stored in 3000. Find the memory of A[8,5] ?
1483A finish the work in 10 days. B is 60% efficient than A. So hoW days does B take to finish the work?
1102A is twice efficient than B. A and B can both work together to complete a work in 7 days. Then find in how many days A alone can complete the work?
1207Post New Accenture General Aptitude Interview Questions
How do I get flex to query my database? : adobe flex action script
What is the purpose of using a heap table?
Can you explain the overall architecture of wpf?
I have a parent program and a child program. I want to write a statement in Exception Block of the parent program so that when the statement in the exception block is executed, the control goes to the next statement in the parent block bypassing the child block.How do i do that?
How old is windows7?
I have 2+ years of fake experience,actually i could not answer for project questions..?how can i answer please suggest me..?
How does a 3 tier application differ from a 2 tier one?
What is the purpose of struct-config.xml in struct2?
What are the 5 types of research methods?
Basic Stuff related to Perl?
How long would you stay with Capital One?
What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?
Differentiate between response.expires and response.expiresabsolute?
Are there ribosomes in a plant cell?
what is package level logging in log4j?