Answer Posted /
| Is This Answer Correct ? | Yes | No |
Post New Answer View All Answers
hi frends,i am studing 2nd b.tech.i am very interested about group 2, Can any one tell me about referrence books for group 2 exam of all three papers individually, any one know plzzzzzzzzz send me to the mail bharathwaj.csc@gmail.com ...............plese friends...................
The server is already having the list of IP addresses of all its authorized clients & if any client is requesting the server to do a task, it is sending its IP address(encapsulated in the packet) to the server.The server can easily match that IP address with that on its list and check if it's authorized client or not, then why we need inverse domain...........
up to which ver of linux using lilo boot loader? last ver of linux.
What is the purpose of cache? : Dot net architecture
Why tcp ip is more reliable?
Explain about the connective abilities of the PHP?
What is kubernetes? How can you integrate jenkins with kubernetes?
Explain test harness?
How do I subscribe to an rss feed on my iphone?
What is the difference between attribute and measure?
What do you mean by tablesample?
What is category in swift?
Which depends on the percepts and actions available to the agent? a) Agent b) Sensor c) Design problem d) None of the mentioned
Define grade?
Explain about .Net products?