Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

HCL Interview Questions
Questions Answers Views Company eMail

Tell me about yourself?

229 488092

why you used Java Script? Can it use for both client side and server side validation purpose?

12 29801

what are Implode and Explode functions?

8 28953

What is Win32?

14 34988

How to access or modify the const variable in c ?

16 36400

Difference between Top down and bottom up approaches for a given project ?

14 105102

What is difference between initialization and assignment?

12 59574

What is virtual constructor paradigm?

5 13586

when can we use virtual destructor?

7 24366

What is Difference between thread and process?

28 258636

What is the abbreviation of SMILE

12 30381

what sort of things what u put in Bug Report ?

5 12140

Will you write a test plan in all phases?

11 23829

In Dialog program Syntax of Synchronous and Asynchronous?

2 8635

Domain-use?

4 10082

Post New HCL Interview Questions


HCL Interview Questions


Un-Answered Questions

What is the use of trading partner in gl account?

558


Design a web crawler? How will you avoid from getting into infinite loops?

493


What are the various input and output types supported by mapreduce?

359


Which framework is best for php development?

484


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

1946






What are the responsibilities of dentist?

477


What are different objects that you can add to a dataflow?

16


What is a static method in python?

434


What is Azure Cloud Service?

294


what is the Connected Load (kW) or Contract Demand (kVA)of mahindra nasik plant??

8871


What is luw or data base transaction ?

571


What is view routes?

341


Is there any way to find out when one specific table/view/M-view is used last time. i.e. when one specific object is used in any SELECT statement.

851


What are collections in c#?

454


HELLO ALL OF U.I HAVE QUALIFIED IN SBI CLERICAL WRITTEN EXAMINATION AND MY INTERVIEW IS ON 20TH OF THIS MONTH.IAM SOTWARE BACKGROUNDED CANIDIATE SO CAN ANY ANYBODY WHOSE INTERVIEW IS OVER CAN TELL ME THAT WHAT QUESTIONS THEY ASKED RELATING TO COMPUTER SCIENCE.

1386