1.should women work in night shifts?if yes,why?if no why? 2.if u r given power for one day,what would u eradicate from india?
7 33076Post New Concentrix Interview Questions
Why can't you declare a class as protected?
Identify some of prominent failures of Ideas/projects/business units from corporate sector ( For instances- Subhiksha Retails ,Vishal Mega Mart,Daewoo Matiz in India etc) and critically evaluate the causes for these failures/losses and give your recommendations for possibility of survival or rejuvinate of these failures?
List the three types of input formats accepted by the address cleanse transform?
In customizing company code productive means what? What it denotes?
Tell me how we can manage the user login sessions in maximo?
What would you consider your most difficult assignment?
When a program is created and need to be transported to prodn does selection texts always go with it? If not how do you make sure? Can you change the cts entries? How do you do it?
What is dump destination? What are bdump, cdump and udump?
please send aptitude test papers for reference with answers
How default key is different from primary key?
WHAT IS THE FUNCTION OF SHORT CIRCUIT MAINTENANCE CT
Why extending array is bad idea?
How do you play a powerpoint slideshow?
Explain a Computational Graph.
i develop a web application and i gave security setting i.e autherization and athentication now it work properly on my local system , now question is ,is this security setting ie autherization and athentication which i gave in web.config will it be enough strong to secure my application on internet or i have to use some 3rd party tool or software to get security .if yes --how ? if no--what is the alternate?