Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Software Interview Questions
Questions Answers Views Company eMail

what is the Tcode BD87?

Cibernetix Business Systems, Intel, SAP Labs,

5 30545

Tcode for create Basic ALE settings?

Intel,

1 7764

what is the IDOC status code?

Intel,

5 13201

what is project system Landscape?

ITC Infotech, MSG Global, TCS,

6 16340

what is OSS notes..what it contains?

Cap Gemini, TCS,

14 85998

What is the Tcode for System Dump?

TCS,

4 15039

what is the default event that is triggers in report?

TCS, Unilogic Software, Unilogic Technologies,

9 16974

control break statements in ABAP?

TCS,

10 36244

If I code parameters and selection events without writing the start-of-selection, will the report runs?

TCS,

4 11577

will the messages in the call tr. Will be stored in the database?

TCS,

3 8559

what is Delivery? In which tables delivery data will be stored?

Accenture,

2 14386

Is it possible to write code in LSMW if so when will you write?

Accenture,

3 22493

what is the way to find out user exits?

Accenture,

4 18990

what is message type?

Accenture, IBM,

10 41178

what is the way to precide search helps in POV?

Accenture,

3 12517


Un-Answered Questions { Software }

What are the advantages/disadvantages of the various style methods?

593


Explain what is the standard property when a component interface is created?

832


Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.

2653


What is Kotlin’s target platform? Is Java-kotlin interoperability possible?

225


What are the jdbc drivers in java?

1072


What is the default batch size if we enable bulk api?

514


How to find the UNIT and VOLUME of a (a) KEPT (b) UNCATALOGED and (c) CATALOGED dataset - using (i) JCL and using (ii) ISPF ?

2676


What isan abstract class and when do you use it?

1604


What is the difference between pp and pp-pi? Which one is better and how ?

1411


How do you capture tooltip using QTP?

1091


how many sql dml commands are supported by 'mysql'? : Sql dba

1122


What is code complete?

1060


Does there exist any other function which can be used to convert an integer or a float to a string?

1083


How to run a test using quicktest professional (qtp)?

1158


Does sql backup shrink transaction log?

979