Tell me about yourself?224 334726
what are eicosanoids?name the three subclasses of eicosanoids?3 7229
what is the different between sales and marketing..?11 12545
Which was termed as the ?Magna Carta of India?13 33857
The Name Benzene was Proposed By?21 11565
Number of Sigma Bonds Present in Benzene are same as ..?12 10091
What are the two drugs available for treating AIDS?8 8008
why u want to work for us?4 9772
why should we hire u?24 44325
Tell us about your qualifications for the position of Associate Director in the Industrial Research Office.816
What are the input and output of the septal area?1 2745
If a drug possesses zwitter ionic nature then can it plays any important role in pharmacy?3 4929
How many members are nominate to the Lok Sabha by the President of India? (a) Ten (b) Two (c) Three (d) Twelve10 12994
What is entire principle involved in karl fischer titration7 46288
What is your weekness? I am confuse what to say about this question. so can u give some answer which can be yur strenght.1 1042
How to Configure Open JMS?
How are the activation URLs different in case of SAO and CAO in .NET remoting?
whats means of joint & by product ?
speak about joint family v/s nuclear family
npa is either person or account
How to create a liability for Service Tax in SAP
how to make test case for anolog voice logger?
what diff. between Account ,Commerce and Finance?
Could anyone help me for the below scenario: i am using the descriptive programming for my account, in which we have to generate the contract in the MS-word. when i generate this doc, we need to click on enable macros to continue further. but i am unable to make qtp to click on this. if anybody faced the problem like this??? pls help to get it resolved? Thanks in advance
What is the difference between Risk, Threat & Hazard?
1.tell about urself? 2.wt is BRS? 3.VAT? 4.Golden principle of accounting?
What is Debit Memo & Credit Memo in Payables?
Is form 38 mandatory to issue c form in up. thru online mode
Critical Path Method is...
What are the most important attacks on stream ciphers ?