Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

CDS Civil Engineering Interview Questions
Questions Answers Views Company eMail

Can anybody help me by attaching files , formats for quality checks of common building materials like cement , concrete , bricks , sand and aggregates? Regards,

45 25091

1) what is the difference between development length & overlap length ? 2) why extras are provided at top and bootom in a beam of slab? 3) why stirrups are provided at 0.3l at supports and 0.4l at center? 4) is column a compression memeber if yes how & beam is which type of memeber?

4 26847

What do you mean by "M-30"?

6 12892

Post New CDS Civil Engineering Interview Questions




Un-Answered Questions

how many types of survey and what are levelling instrument?

1483


Which is the best place to learn Loadrunner performance testing in hyderabad ?

1003


What is hole theory

1622


What is the difference between wealth, cash & money?

556


What is ai according to the survey results?

482






What is the use of exists command?

162


What is node js event loop?

215


What are XML files? How can you load XML files into QlikView?

3


with the aid of schematic and block diagram describe the control system involved in a student passing a control system engineering examination.use standard terminologies and specify all the system component involved.

1773


how many edges are there in 3d cube, 4d cube and 2d cube?(Puzzle based questions)

795


An object is non standard object, i mapped it to standard object, eventhogh on mapping to standard object i cannot use the methods available on the standard object with the mapped object. How i can use those standard object methods with these mapped object. (((Note : dont tell that we can use virtual object as virtual object is to map nonstandard obj to standard obj)))

1488


What all the types of jobs you developed?

610


Is it possible to restrict permission for users using permission set? : salesforce sharing and security

195


What are the steps required to avoid context related memory leaks?

425


How to Access a FIFO?

1176