ur using the internet with same bandwidth & others also use internet by sharing the bandwidth there exist the traffic in between how u calculate this?
2079Post New ITC Infotech Load Runner Interview Questions
What are the encryption techniques in php?
How do you drag formulas to the last row?
give the examples of Error of Duplication?and Error of compensatin? with entries
Lets suppose X sold goods to Y on credit basis and after the due date is over Y could not make the payment due to Y became insolvent, so In X books he will show the uncollectible as Bad debts expense but in Y account under which account Y will show this while journalizing this transaction in his books of accounts?
What specialties have you billed or coded for? : insurance health
When you disable the 'Pega-ProCom: Correspondence & SLA events' agent for sending correspondence, where these emails/correspondence is stored?
why we provide bent up reinforcement bars at l/4 ? if it is because of diagonal shear , how does it acts ?
What are the test parameters to check the proper functionlity of TCP/IP protocol.
What are the components of splunk?
What is the difference between l1 and l2 cache? : Dot net architecture
Suppose someone gives a VB dll file (component). How to use that in an ASP file?
what is asynchrony?
Can a trait extend a class php?
Does tapestry work with other other application servers besides jboss?
How to integrate the ssrs reports in application?