pls send me who r clients to ibm,wipro ,tcs at present1 2755
what is the application you are using in your company and what you are doing with that application.1 2518
Name two types of leak detectors and the method of application for each?
How do i perform grounding of star point of Genset (400V) for making connection with step up transformer of DELTA-DELTA (400V to 20KV) ? while Genset itself has its own neutral and grounding bus bar inside genset breaker box whereas we have another neutral and grounding busbar in synchronizing panel next to genset at maximum distance of 6meter, would someone pls advice if we can only perform neutral grounding in synchronizing panel or should we ground neutral on both places inside genset breaker box and synchronizing panel.
What are different types of protocols used in transportation and session layers of SAN?
1.what is the entry of petrol of payment made by credit card of owner? 2.what is the entry of petrol of payment made by credit card of Company?
Name the components that are termed to be Heavy-weight component but available in Light-weight components?
Desirability of TCP/IP STANDARDS
In an applet one custom button is created on clicking that button all the fields get validated and then message should be displayed on the other applet as the corresponding field values are empty
i measured a 3-ph capacitor with a multimeter which is not connected to supply... but i could get the phase to phase voltage... how tis is possible..????
an upper layer message is split into 10 frames each of which has an 80 percent chance of arriving undamaged.if no error control is done by the data link protocol,how many times must the message be sent on the average to get the entire thing through?
if u want to delete all these detail block etc what will happen in form
what are the basic insulation levels & what its Unit
if i am running a tank lorry and the income of the tank lorry comes under haryana VAT 2003?
What are the causes of turbine vibration
why and where we use early make & late break contacts in protection?
Does VB support pointers to functions?