Answer Posted /
| Is This Answer Correct ? | Yes | No |
Post New Answer View All Answers
What is the use of modules in dojo?
what command is used to create the credential store?
Explain the Working of a 2-stage OPAMP?
What will happen if a field is hidden through field level security and user search a values in that field? : salesforce sharing and security
Can hibernate be used with mongodb?
Explain system functions or built-in functions? What are different types of system functions?
Which protocol can do load balancing on unequal cost also?
If I rename an account, what must I do to make sure the renamed account has the same permissions as the original one ?
plz sumbody help me. I want list of ques wid ans which z generally askd in the mangement entrance exam.
Difference between flat files and relational sources?
What is pg_hba conf file?
Explain request life cycle in yii2 framework.
Explain what is the heterogenous?
What is stl containers in c++?
What language is ios written?