The main external threat to the Sultanate of Delhi was posed by the (a) Mughals (b) Afghans (c) Iranians (d) None of these
1 9266. The term nishka which meant an ornament in the Vedic period was used in later times to denote a/an (a) Weapon (b) Agricultural implement (c) Script (d) Coin
1 12778How to know message id (errorid) in msgfile when error is occurred on screen ? WRKMSF will display all error id but i want to know error id based on error msg only?
1 4961Post New SSR Interview Questions
What is the difference between good receipts inspection and source inspection?
What is a Key Date?
What are the types of important programs that are used in the cics?
What is the difference between arrays and pointers?
What are the major features in different versions of spring?
Hi, This is Laila. I am selected for syndicate bank interview. Could you please share your views and the questions asked if you have faced the interview My email id is laila_honey09@yahoo.com Please send as fast as u can.Thank You Thanks... Laila.
Where the data is transferred in a DMA write operation?
Is purchasing information (vendor, date of purchase, etc.) Copied from mm to the equipment when it is being created ?
any one provide me mm & fi configration steps
What is the asp.net mvc folder conventions? : asp.net mvc
What is actioncontext?
What is catalog profile?
what is bts ,what is e1 what is fifa card ,what is rri ,what is e1t1
Can I learn java in 3 months?
describe the lewis dot structure of Mg2+?