Answer Posted /

Is This Answer Correct ?    Yes No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is database transaction?

483


What happen when namenode enters in safemode in hadoop?

230


What are the three types of websites?

426


How do I keep the rows from breaking across in excel?

308


Did you used crystal reports? Do you have sufficient knowledge on crystal reports?

2149






How do I block port 80 in windows?

484


What is difference between SEDA and VM component in camel?

5


How do I have links of different colors on the same page?

304


What is the correct declaration of main?

663


Information-gathering techniques used in the Risk Identification process include all of the following except: A. Brainstorming B. Delphi technique C. Interviewing D. Kaizen technique

670


Why do we need to code a loop statement in both the pbo and pai events for each table in the screen?

582


What is JDBC API and when do we use it?

564


What is seo job description?

451


explian the 5 main costrain that affect decision making in business organization

1755


What is angular8?

411