Piggy backing is a technique for a) Flow control b) sequence c) Acknowledgement d) retransmition
17 40298In which data structure, elements can be added or removed at either end, but not in the middle?
42 106035Graduate Aptitude Test in Engineering ( GATE ) Question Paper - 1999 COMPUTER SCIENCE & ENGINEERING
1 14148. Ram and Shyam work on a job together for four days and complete 60% of it. Ram taken leave then and Shyam work for eight more days to complete the job. How long would Ram take to complete the entire job alone? (a) 6 days (b) 8 days (c) 10 days (d) 11 days
3 13584i want model questions which will be asked in hindustan aeronautics online test for the post of managenent trainee
2426Which Mughal emporer also known as "Zinda Pir"? (a) Aurangzeb; (b) Akbar; (c) Shahjahan; (d) Babar
48 68928hi This is Aseet.Can anyone help me to know the question papers of NATIONAL INFORMATICS CENTRE?
20 21538Post New NIC Interview Questions
What is processor cycle (machine cycle)?
how to create a scrollable cursor with the scroll option? : Sql server database administration
what is the use of Auto re-closer?
Mention what is the difference between olap and data mining?
Do you have warehouses with stock of different plants?
Describe a subquery.
How to open a presentation in powerpoint shortcut key?
How do in-process and cross-process communication work in the common language runtime?
What type of function is main ()?
Information-gathering techniques used in the Risk Identification process include all of the following except: A. Brainstorming B. Delphi technique C. Interviewing D. Kaizen technique
How do I delete multiple rows in word?
What are the different types of constructor?
Which intel processor is 64 bit?
What is the Model?
How do you cite in ieee format?