Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


DEFINE YOURSELF AT THE TIME OF INTERVIEW IN TELECOM SECTOR?

Answers were Sorted based on User's Feedback



DEFINE YOURSELF AT THE TIME OF INTERVIEW IN TELECOM SECTOR? ..

Answer / apoorv sisodia

Good Morning/Afternoon,

My Name is ........ i had completed my engg. in electronics and communication from .............
I has done my industrial training on ............and work on the project ................
My hobbies is/are........
My positive points are that i can work n every environment dedicated to my work can work in a team and always have positive attitude ahead

Is This Answer Correct ?    4 Yes 3 No

DEFINE YOURSELF AT THE TIME OF INTERVIEW IN TELECOM SECTOR? ..

Answer / vipin singh

SIR myself vipin singh.i have done my B.tech with ECE this
year 2010 through UPTU LUCKNOW and my project was based on
WIRELESS HOME/OFFICE AUTOMATION USING LAPTOP.

Is This Answer Correct ?    5 Yes 10 No

Post New Answer

More Operating Systems AllOther Interview Questions

Can kernel panic be fixed?

0 Answers  


Explain the term kernel.

1 Answers   Verifone,


What is the meaning of slosh login in nfs?

0 Answers   3i Infotech,


What is the next microsoft operating system?

0 Answers  


What happens when I reset my computer?

0 Answers  


Difference Between Jfs & Jfs2?

0 Answers   IBM,


Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree

3 Answers   Hughes, KKR,


Is google an operating system?

0 Answers  


Can I restore my computer to yesterday?

0 Answers  


what is live lock,race condition,starvation?how it work and explain brifly?

3 Answers  


Is 6 cores enough for streaming?

0 Answers  


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


Categories