Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Mind Tree ASP.NET Interview Questions
Questions Answers Views Company eMail

Uses of CLR ?

2 11300

if u r projet consist of 4 people means how can u manage the file

10 7536

if i have 1000 records and i want to access 20 ata time from SQL server, what will be the query?

9 9790

If i have 1000 records in dataset, how to do paging?

2 11873

what are the ways to improve performance in .net application?

7 7988

when user is logged on the information is saved in a cookie, what is the name of that cookie?

5 6139

view state data is stored in which format?

15 20042

relacement of websevices in .net 3.0?

1 3794

what are the application layers for a distribute application?


What is the relationship(in oops) between codebehind and inline code(.aspx to .aspx.cs)??? explain

4 4897

Why do we need Web Services?

1 5468

how we Creating a Web Service

1 3438

Difference between viewstate, cache, session

2 8344

How many types of Stored Procedures in SQL Server

4 7881

Post New Mind Tree ASP.NET Interview Questions

Mind Tree ASP.NET Interview Questions

Un-Answered Questions

how to send a sms to a mobile through mainframe mvs?


How should i design a 1ph & 3 ph transformer. Kindly let meknow all steps and formulaes related to design from scratch.


What statement is used in python if the statement is required syntactically but no action is required for the program?


Write a program using while loop?


What is Processor in camel?


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]


Is the nyquist theorem true for optical fibre or only for copper wire ? Explain.


Is pyspark a framework?


Mention what is luw (logical unit of work)?


When one party enjoys credit facilities by more than one banks who works in coordination with each other under a formal arrangement, what is the arrangement?


Can we use distinct and group by together?


How connect mysql to django?


How many relationships are present in Salesforce?


What is the meaning of executenonquery?


How to show before and after in powerpoint?