what is sql override?what is the use of it?4 11332
how the data will be loaded while desiging the schema?which one first (for e.g.-dimesions and facts)2 3662
Is snow flake or star schema used? If star schema means why?4 5628
How do you declare delegates and are delegates and events one and the same and explain how do you declare delegates and invoke them ?
when a pure dc signal is sent through a moving iron meter, what will it read?? dc or rms?? when a variable dc signal is sent through a moving iron meter, what will it read?? dc or rms??
Reinforcement details at hinged joint
How Work Manager works in wls 9.2 and above versions?
i need to invoke an external web service from siebel CRM using as input to the web service a value in business component field, i need to display the results in another applet asociated with a virtual business component, does anyone know how to do this? thanks
Tell me some Adhoc testing scenarios of ebay (online auction product)?
Difference between SMTP & FTP ???
What are the benefits of creating multiple actions within any virtual user script?
hi experts, i was asked to write down the requirement description,test scenario, and test cases for gmail login and send email and then to check the email was sent in the sent mails.the format given to me was like this: Req ID, Req description, Test Scenario, Test cases....Can anybody please help me out with this..
Expalin LaGrange Interpolation Polynomial Scheme?
I WANT TO KNOW THE INTERVIEW PROCEDURE IN GE COMPANY AND TECHNICAL INTERVIEW QUETIONS
3. Differentiate between ultrasonic flowmeter and radar type flow meter.
I completed my BE EEE degree 2006 .... which license should i apply .... ?????
Why can't I use an index with my VB accessed database?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?