Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Mind Tree ASP.NET Interview Questions
Questions Answers Views Company eMail

Uses of CLR ?

2 11300

if u r projet consist of 4 people means how can u manage the file

10 7536

if i have 1000 records and i want to access 20 ata time from SQL server, what will be the query?

9 9790

If i have 1000 records in dataset, how to do paging?

2 11873

what are the ways to improve performance in .net application?

7 7988





when user is logged on the information is saved in a cookie, what is the name of that cookie?

5 6139

view state data is stored in which format?

15 20042

relacement of websevices in .net 3.0?

1 3794

what are the application layers for a distribute application?

1239

What is the relationship(in oops) between codebehind and inline code(.aspx to .aspx.cs)??? explain

4 4897

Why do we need Web Services?

1 5468

how we Creating a Web Service

1 3438

Difference between viewstate, cache, session

2 8344

How many types of Stored Procedures in SQL Server

4 7881

Post New Mind Tree ASP.NET Interview Questions




Mind Tree ASP.NET Interview Questions


Un-Answered Questions

how to send a sms to a mobile through mainframe mvs?

155


How should i design a 1ph & 3 ph transformer. Kindly let meknow all steps and formulaes related to design from scratch.

1027


What statement is used in python if the statement is required syntactically but no action is required for the program?

100


Write a program using while loop?

112


What is Processor in camel?

1






In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1440


Is the nyquist theorem true for optical fibre or only for copper wire ? Explain.

1977


Is pyspark a framework?

3


Mention what is luw (logical unit of work)?

113


When one party enjoys credit facilities by more than one banks who works in coordination with each other under a formal arrangement, what is the arrangement?

134


Can we use distinct and group by together?

80


How connect mysql to django?

1


How many relationships are present in Salesforce?

3


What is the meaning of executenonquery?

75


How to show before and after in powerpoint?

15