Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Telecommunications Interview Questions
Questions Answers Views Company eMail

Do you know how to measure the earth resistance? if so explain it

42 128828

optical fiber losses.

11 32775

what are the differences between 2.5G BSC and 3G RNC?

1 12806

what type of protection used below 132KV feeders

11 11195

Why do u want join the cell center

3 9815

Why don't connect earth wire to elcb?if earth fault occur,how will detect it

1 2401

Post New Telecommunications Interview Questions

Un-Answered Questions

What is multi-org and mrc?


What is strict mode in javascript?


Why do you generally create a weak reference when using self in a block?


What are the main features of silverlight?


Could I give you some feedback? I would change x, y, and z. Now could you try again? : insurance cold calling


What is a unix shell?


What is moratorium?


Write a program to maintain student’s record. Record should not be available to any unauthorized user. There are three (3) categories of users. Each user has its own type. It depends upon user’s type that which kind of operations user can perform. Their types and options are mentioned below: 1. Admin (Search Record [by Reg. No or Name], View All Records, Insert New Record, Modify Existing Record) 2. Super Admin (Search Record [by Reg. No or Name], View All Records, Insert New Record, Modify Existing Record, Delete Single Record) 3. Guest (Search Record [by Reg. No or Name], View All Records) When first time program runs, it asks to create accounts. Each user type has only 1 account (which means that there can be maximum 3 accounts). In account creation, following options are required: Login Name: <6-10 alphabets long, should be unique> Password: <6-10 alphabets long, should not display characters when user type> Confirm Password: Account Type: Login Name, Password and Account Type should be stored in a separate file in encrypted form. (Encryption means that actual information should be changed and Decryption means that Encrypted information is changed back to the actual information) If any of the above mentioned requirement(s) does not meet then point out mistake and ask user to specify information again. When Program is launched with already created accounts, it will ask for user name and password to authenticate. On successful authentication, give options according to the user’s type.


How we convert private assembly into public assembly?


What is information_schema in mysql?


Explain mysql_error().


How do I fix a name error in excel?


Where is xslt used?


what is booster? and how it is connected in a circuit?


What are some secret sharing schemes ?