Topic :: CGI Perl





CGI Perl Interview Questions
Questions Answers Views Company eMail

A rich old Arab has three sons. When he died, he willed his 17 camels to the sons, to be divided as follows: First Son to get 1/2 of the camels Second Son to get 1/3rd of the camels Third Son to get 1/9th of the camels. The sons are sitting there trying to figure out how this can possibly be done, when a very old wise man goes riding by. They stop him and ask him to help them solve their problem. Without hesitation he divides the camels properly and continues riding on his way. How did he do it?

2 15296

My images/hyperlinks are coming out all wrong, or don't load! What's up?

2 3076

What advantages do servlets have over CGI programs?

5 12630

I have created a CGI-based page,after entering all the values in to the fields, How to get the output on the web browser using Perl

4 6120

How does CGI work? Can I use 'C' language to write a CGI?

1693

How to find out the version of PERL being installed on your LINUX machine.

Mind Tree,

4 10122

What are the references for Perl scripting language?Is there a software tester should have this knowledge .?

1617

Which line from a show spantree 1 command output indicates that virtual LAN 1 (VLAN1) is functioning properly? A. Root pod is FastEthernet 0/26 B. Port Ethernet 0/1 of VLAN1 is Forwarding C. Designated port is Ethernet 0/1, path cost 10 D. Designated root has priority 0 address 00D0 588F B600 E. VLAN1 is executing the IEEE compatible Spanning Tree Protocol

1 3353

Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 10430

What is hyperlink?

1617

What is the use of Hyperlink control for DHTML applications?

1415

What is the basic difference you find between a shell script and perl?

Yahoo,

3 17952

How to Filter & remove non-sequence data from a FASTA FILE using Perl scripts ?

1778

Which of the following would be the BEST method for ensuring that critical fields in a master record have been updated properly? A. Field checks B. Control totals C. Reasonableness checks D. A before-and-after maintenance report

1 5916

An IS auditor reviewing operating system access discovers that the system is not secured properly. In this situation, the IS auditor is LEAST likely to be concerned that the user might: A. create new users. B. delete database and log files. C. access the system utility tools. D. access the system writeable directories.

1 3919




Related Topics


Un-Answered Questions { CGI Perl }

No New Questions to Answer in this Category !!    You can

Post New Questions

Answer Questions in Different Category