Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

  • CSC aptitute test questions (17)
  • CSC interview questions (317)
  • CSC placement papers (3)
  • CSC technical test questions (21)



CSC Crystal Reports Interview Questions
Questions Answers Views Company eMail

Can we create report using more than one database?

3 13884

how can we convert crystal dictionary dc5 file to another datasource format like mdb or xml schema

1881

How can we improve the performance of a crystal report? OR What all performance improvement techniques used in crystal reports? (particularly CR XI)

9 20744

Post New CSC Crystal Reports Interview Questions



Un-Answered Questions

Bimetal strip used in overload relay what is that,which types of material used for that & percentage.

1015


How to prove a new block cipher, is resistant against differential cryptanalysis attack

1879


defference between menu and context menu in vb.net?

1661


1. Tell us about a specific time when you became frustrated in an administrative role and how you resolved your frustration. 2.How do you envision your role in relation to the role of your principal? Describe your vision of a functional administrative team.

778


I need to pull the data from the page which in row, column vice into excel sheet, how can it be done using QTP? eg: Name Dept xyz gdty i need the same data to be exported in excel sheet.

1090






What is Big Data?

41


Can any one explain the basic things about RLU and Printer Files and their Definitions for both and why are they used,i'm a newbee so please help me out

2149


Agonistic behavior, or aggression, is exhibited by most of the more than three million species of animals on this planet. Animal behaviorists still disagree on a comprehensive definition of the term, hut aggressive behavior can be loosely described as any action that harms an adversary or compels it to retreat. Aggression may serve many purposes, such as Food gathering, establishing territory, and enforcing social hierarchy. In a general Darwinian sense, however, the purpose of aggressive behavior is to increase the individual animal’s—and thus, the species’—chance of survival. Aggressive behavior may he directed at animals of other species, or it may be conspecific—that is, directed at members of an animal’s own species. One of the most common examples of conspecific aggression occurs in the establishment and maintenance of social hierarchies. In a hierarchy, social dominance is usually established according to physical superiority; the classic example is that of a pecking order among domestic fowl. The dominance hierarchy may be viewed as a means of social control that reduces the incidence of attack within a group. Once established, the hierarchy is rarely threatened by disputes because the inferior animal immediately submits when confronted by a superior. Two basic types of aggressive behavior are common to most species: attack and defensive threat. Each type involves a particular pattern of physiological and behavioral responses, which tends not to vary regardless of the stimulus that provokes it. For example, the pattern of attack behavior in cats involves a series of movements, such as stalking, biting, seizing with the forepaws and scratching with tile hind legs, that changes very little regardless of the stimulus—that is, regardless of who or what the cat is attacking. The cat’s defensive threat response offers another set of closely linked physiological and behavioral patterns. The cardiovascular system begins to pump blood at a faster rate, in preparation for sudden physical activity. The eves narrow and the ears flatten against the side of the cat’s head for protection, and other vulnerable areas of the body such as the stomach and throat are similarly contracted. Growling or hissing noises and erect fur also signal defensive threat. As with the attack response, this pattern of responses is generated with little variation regardless of the nature of the stimulus. Are these aggressive patterns of attack and defensive threat innate, genetically programmed, or are they learned? The answer seems to be a combination of both. A mouse is helpless at birth, but by its l2th day of life can assume a defensive threat position by backing up on its hind legs. By the time it is one month old, the mouse begins to exhibit the attack response. Nonetheless, copious evidence suggests that animals learn and practice aggressive behavior; one need look no further than the sight of a kitten playing with a ball of string. All the elements of attack—stalking, pouncing, biting, and shaking—are part of the game that prepares the kitten for more serious situations later in life. 7) The passage asserts that animal social hierarchies are generally stable because: a) the behavior responses of the group are known by all its members. b) the defensive threat posture quickly stops most conflicts. c) inferior animals usually defer to their physical superior. d) the need for mutual protection from other species inhibits conspecific aggression. 8) According to the author, what is the most significant physiological change undergone by a cat assuming the defensive threat position? a) An increase in cardiovascular activity b) A sudden narrowing of the eyes c) A contraction of the abdominal muscles d) The author does not say which change is most significant 9) Based on the information in the passage about agonistic behavior, it is reasonable to conclude that: I. the purpose of agonistic behavior is to help ensure the survival of the species. II. agonistic behavior is both innate and learned. III. conspecific aggression is more frequent than i aggression. a) I only b) II only c) I and II only d) I,II and III only 10) Which of the following would be most in accord with the information presented in the passage? a) The aggressive behavior of sharks is closely inked to their need to remain in constant motion. b) fine inability of newborn mice to exhibit the attack response proves that aggressive behavior must be learned. c) Most animal species that do riot exhibit aggressive behavior are prevented from doing so by environmental factors. d) Members of a certain species of hawk use the same method to prey on both squirrels and gophers. 11) The author suggests that the question of whether agonistic behavior is genetically programmed or learned: a) still generates considerable controversy among animal behaviorists. b) was first investigated through experiments on mice. c) is outdated since most scientists now believe the genetic element to be most important. d) has been the subject of extensive clinical study. 12) Which of the following topics related to agonistic behavior is NOT explicitly addressed in the passage? a) The physiological changes that accompany attack behavior in cats b) The evolutionary purpose of aggression c) Conspecific aggression that occurs in dominance hierarchies d) The relationship between play and aggression 13) The author of this passage is primarily concerned with: a) analyzing the differences between attack behavior and defensive threat behavior. b) introducing a subject currently debated among animal behaviorists. c) providing a general overview of aggressive behavior in animals. d) illustrating various manifestations of agonistic behavior among mammals.

1107


where are the log files generally stored.Can you change the path of the file.what can the path be?

1127


How to calculate mf when meter equipment and meter are connected

523


WHEN WILL GUJRAT GOVERNMENT ANNOUNCES DRUG INSPECTOR POSTS AND WHEN WILL BE THE EXAM CONDUCTED? INFORM ME AND ALSO EAMINATION DATE

3132


is below 2 ohms earth resistance is good for mobile tower

1036


Please send any one latest 3+ years of experience testing tools resumes my mail id is krishnavenimodaliar26@gmail.com

2115


what is a vortex flow meter,mass flow meter and electromagnetic flow meter.particular use of this.means in which condition particular meter is used.

1077


Can you create a Updatecascade, Deletecascade relation in Ms- Access?

1063






CSC Crystal Reports Interview Questions
  • C (13)
  • OOPS (2)
  • C++ General (3)
  • VB Script (4)
  • SS7 (1)
  • Protocols AllOther (1)
  • Networking Administration (3)
  • ASP.NET (8)
  • IIS (1)
  • Crystal Reports (3)
  • Dot Net Framework (2)
  • Dot Net General (1)
  • Exchange Server (1)
  • Microsoft Related AllOther (1)
  • Oracle General (2)
  • Database Management (1)
  • SQL Server (7)
  • MySQL (1)
  • DB Administration (7)
  • Databases AllOther (1)
  • Linux Commands (1)
  • Linux Socket Programming (1)
  • Linux AllOther (2)
  • Unix Commands (1)
  • Solaris General (2)
  • Solaris AllOther (2)
  • Data Structures (1)
  • Load Runner (1)
  • QTP (4)
  • Test Director (1)
  • Automation Testing AllOther (1)
  • Manual Testing (31)
  • QA Concepts (2)
  • Test Cases (1)
  • COBOL (13)
  • JCL (14)
  • CICS (3)
  • DB2 (2)
  • IMS (1)
  • IDMS (1)
  • Assembler (3)
  • VSAM (3)
  • IBM MainFrame AllOther (2)
  • RPG400 (12)
  • DB400 (1)
  • IBM AS400 AllOther (2)
  • Core Java (9)
  • Struts (1)
  • J2EE (1)
  • Java Related AllOther (1)
  • XML XSLT RSS (1)
  • Web Related AllOther (2)
  • Teradata (1)
  • Business Objects (3)
  • Cognos (2)
  • Informatica (18)
  • Ab Initio (1)
  • Data Stage (5)
  • Data Warehouse General (1)
  • UML (1)
  • OOAD (1)
  • SAP Basis (5)
  • SAP ABAP (48)
  • SAP SD (6)
  • SAP PM (1)
  • SAP FI CO (5)
  • SAP HR (2)
  • SAP Security (1)
  • SAP Netweaver (1)
  • PeopleSoft HRMS (1)
  • Oracle Apps Technical (1)
  • Oracle Apps Financial (1)
  • Client Server Architecture (1)
  • Client Server General (3)
  • WebMethods (2)
  • SeeBeyond (3)
  • JCAPS (2)
  • Civil Engineering (1)
  • Electrical Engineering (1)
  • Electronics Communications (2)
  • Banking Finance (1)
  • IT Management (1)
  • Audit (1)
  • Accounting General (1)
  • Accounting AllOther (1)
  • Call Centre AllOther (10)
  • SSC AllOther (1)
  • POs (1)
  • Group I (1)
  • APPSC AllOther (1)
  • General Knowledge_Current Affairs (3)
  • Law AllOther (1)
  • General Aptitude (15)
  • Placement Papers (3)
  • L1 Visa (1)
  • C Code (8)
  • C++ Code (1)
  • Oracle Errors (1)