Answer Posted /

Is This Answer Correct ?    Yes No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are two examples of dos attacks?

275


What is the find function in excel?

281


What is rootscope in angular 2?

435


7,12,40,222,1744,?

3138


What is Green Channel?

697






Explain what is project meta data?

561


What is protocol overhead?

938


Explain the difference between forward and sendredirect?

468


oral glucode tolerance test????

1777


plz tell me short cut method in maths for clerck post in bank

1519


Write short notes on Epidemiology of gall bladder cancer (GBC) in India and its etiopathogenetic factors?

516


which two sets the x position of the instance my_mc to that of the mouse cursor? : Adobe flash

494


How do I remove cropped area in powerpoint?

115


How to navigate documents by using the browse buttons in ms word?

327


1.Dandgling Reference refer to? 2.Encryption used in IEEE 802.11? 3.Version of Advanced Enryption Standard(AES) and cipher Key? 4.No.of vertex of odd degree is ? 5.Slowest Sorting Algorathim? 6.Complexity to delete a node from Linked LIST? 7.EBCDIC can code upto how many charcter? 8.estimation equation of cocomo model for organic project? 9.need for the extended ER Model? 10.Infrastructure component for the DATA Center? 11.which type of memory device has Min. cost of storing one bit information ? 12.color combination for printer? 13.father of computer? 14.thrashing affect? 15.preemptive version of FCFS? 16.c is a ..............Language? 17.object based language? 18.whicj memory can not be interface with procesor? 19.input for linker? 20.preprocesor starts functioning when....?

1860