how to set the hostname or username at commamd promt ? where to set password length,max and min ?
3 9440i this is balaji from chennai i have 4 yrs exp in testing and my qualification is bsc computers i completed in correspondace in which companiies accept the correspondace plz let me know
1 3375What is the difference b/w Smoke and Sanity Testing? I heard that Sanity testing will be done by developers. Is that so?
17 22914Hi, Can u pls answer me When we run the APP We will get the document,,that document in which tabel its getting save.
4 14976I have two internal tables itab1 and itab2 and I had move the content of the itab1 to itab2 and then itab1 had to deleted
4 19034Post New Accenture Interview Questions
When a person whirls a rock on the end of a string and maintains it in uniform circular motion, the force exerted on the rock is most accurately referred to as?
What is the difference between reader/writer and inputstream/output stream?
Whats s or c mean?
How will you verify if maven is installed on windows?
Looking for good Oracle Fusion HCM training institute in HYDERABAD.. classroom training not online training
How does cas works?
Is lambda functional programming?
What happens when the extern "c" char func (char*,waste) executes?
You're developing a boss encounter in a 3D platformer game, and the boss has 15 different attacks. The game designers have asked you to make sure that the player sees as many of those 15 attacks as possible during the encounter, and that he seldom or never sees the same attack twice in a row. What are some ways you can do this? What does the attack selection algorithm look like in this case? Keep in mind that not all attacks are possible all the time -- for example, the boss has a melee attack that he can only do when the player is very close, and a bombardment attack he can only do when the player is far away.
How do you post on a website?
What is the significance of “having” clause in sql statement?
What is the command to check the maven version?
What specific mechanism regulates cyclic vs noncyclic electron transfer during light reactions of photosynthesis?
After applying date prompt and when we run the report we
fet from date and todate prompts..so when we enter
todate What are the security measures that are taken to make android secure?