If I am in a room with 5 people and guess all their birthdays what is the probability of getting (only) one correct?
1334Post New Engineering AllOther Questions
why we use conio.h in c programming?
hi , anyone plz end nic model papers to my id
What is the difference between command line argument and input taking from the user?
iam from engineering information technology ... can i write group 1 exams??
how to use two diffirent gatway in one system
what is b tree
Hi manikandhan, my name is ruby. Can u pls forward the conduct/character certificate on my Id. ruby_cse07@yahoo.co.in what details shall i require for this certificate. pls help me out with this..its really very urgent.. let me know soon bcoz my interview is on 19th septemper in mumbai...
boolean isBadBoy(boolean hasGirlFriend , boolean isMarried, int age , String middleName , String lastName , String[] brotherName);
Explain different parts of an instruction. What does the addressing mode bit specifies?
Draw the diagram showing the function stack, illustrating the variables that were pushed on the stack at the point when function f2 has been introduced . type def struct { double x,double y} point; } main( int argc, char *arg[3]) { double a; int b,c; f1(a,b); } f1(double x, int y) {point p; stack int n; f2(p,x,y) } f2(point p, double angle) { int i,j,k,int max;
i opt cse branch in engineering.which subject i have choose in civil service preliminary examination
Whay we use gigabite ethernt
Hi All... PLease send me if anyone have "Information Security Officer" Aptitude papers. Please Mail me at mannusanghi@gmail.com
HTML tag for bulleted list is--------------
Please help to write testcase for ECG machine