What is VTP?26 34070
How many backup types in windows200336 46973
What is DMZ?3 8969
What is the importence of protocols in networking....?5 5701
When a customer starts abusing u how will u deal with him? n what do u do?2 2835
What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.1106
Why DNS use both TCP and UDP ports. And for which purpose it uses TCP and UDP.2 2955
how to hide control panel?in my pc?2 3287
hi i have small confusion while configuring ppp at that time routing protocal is need ro not2 3064
how many mobile subscriber are come under one BTS?? and how many BTS Comes under One BSC?? how many BSC under One MSC??
what is the effect of power factor of machines in starting current
What is miscellaneous expense and when it is used
What is Point-to-Point Approach?
Hi How to retrieve data from web element line by line?
Can any of u help me... How to use Security below listed testing tools 1. XSS Probe 2. SQL Power Injector 3. CAL9000 I have to do security testing using these tools.But I do not have any knowlwdge on this. I am trying to work using Help doc, but use, not able to follow Pls do needful
what are the dis advantages of pub sub model
What are sink processors?
how to reduce size of column 450 x 750 to 230 x.... if it is cut in area of bathroom? means it appears in bathroon any shifting or any other option....building is g + 10 and the bathroom is at first floor...
plz.show development and anchorage length in simple diagram.
is it possible to get u.s visa with 55% in b-tech and 15 backlogs
What is Mondex ?
write the vb script for call to new action in qtp?
Difference between user groups and code groups
HOW MUCH PERCENTAGE WE DEDUCT FOR OUR SUPPLIERS OR OTHER PROFESSIONALS