what is postback implementation?when pre-render event n init event is fired?2 10977
Give an example of high severity and high priority bug, and low severity and low priority bug.2 17818
What is R T T I ?6 10781
What is late bound function call and early bound function call? Differentiate.2 12238
What is the difference between and interface and an abstract class ?4 31584
What is polymorphism ? Explain with examples8 20935
features of OOPS22 45530
what is multi level inheritance give n example ?13 56996
Can we have a private constructor ?12 40998
Can we have a private virtual method ?8 11158
How would you stop a class from class from being derived or inherited.18 14576
What is multiple inheritance ?17 16018
does .NET support multiple inheritance ?13 16582
how do u achieve multilevel inheritance in .NET ?9 15786
What are the options when defining aggregates?
What is are "proprietary" and "public" cryptographic algorithms?
Can u explain an Examples of 2D signals and transforms?
Explain the difference between string, stringbuffer and stringbuilder in java?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
do you work well under pressure?
What is automatic error handling in perl?
Define database lock and its types.
what is chunk in informix?
Explain the master class and the output class do?
Define loam soil?
What are books to be referred for KPTCL exam?
What are the different data structures?
Tell me what are the different types of buses used by the embedded systems?
for what voltage will reactive power be largest in 380 kv line : a) 375kv b)380kv c)385kv