What do you meant by "triple X" in Networks?2 9353
What is Beaconing?3 8559
What is NETBIOS and NETBEUI?3 5719
What is cladding?1 1864
How Gateway is different from Routers?4 11325
What is Project 802?2 7469
What is difference between ARP and RARP?6 24405
What is the difference between TFTP and FTP application layer protocols?8 16871
What are the important topologies for networks?6 13176
Explain 5-4-3 rule?1 6351
What is packet filter?1 3585
What is wide-mouth frog?3 5102
What is Kerberos?3 6351
Expand IDEA?1 5446
If a person is working in R&D organisation but he has not been involved in R&D activities. So Which types of questions may be asked if he wants to get opporunity in mechanical R&D activities?2699
What is the difference between a port address a logical address and a physical address?
Hello, I am PRAVEEN, working with start-up company as design, I don have any sap experience. but I wanted to join mm course in atos. Is it good change domain?
What is the use of model spi?
what are differences b/w EIA 449 and EIA 530?
cavium networks written test pattern ..
What is cross docking in sap ewm system? Why do we use cross docking?
I’m not a developer but I am being hacked and I see same stuff in my browser how can I use my browser info to determine who has my identity Here is the browser information https://search.yahoo.com/search?p=date+camp&fr=iphone&.tsrc=apple&pcarrier=TFW&pmcc=311&pmnc=480&vm=r Please help this is on going for 6 years
How do you rename a database?
where cascade loop use ?
What is the function in PHP do not return a timestamp?
List the five important v’s of big data.
You get a call from you backup dba while you are on vacation. He has corrupted all of the control files while playing with the alter database backup controlfile command. What do you do?
Can u provided all the dues date and depositing date which are used in general manner or Income tax..
HOW I CAN PREPARE A BALANCE SHEET OF A COMPANY ?
Can we assign integer value to char in c?