Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

my name is nani i completed my b-tech in hyd now i want go
for interveiw but i dont know the process of software field
interveiws plz help me anyone how many rouds there n what
rounds plz plz plz help me n where i can get these details

Answer Posted / padma

in some companys three rounds are held so u can prepare technical questions in web sites

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

write a c program thal will find all sequences of length N that produce the sum is Zero, print all possible solutions?

2927


How does struct work in c?

1137


regarding pointers concept

2097


What is use of integral promotions in c?

1208


What is realloc in c?

1168


What is the difference between printf and scanf in c?

1430


How can I check whether a file exists? I want to warn the user if a requested input file is missing.

1214


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

2535


How can a program be made to print the line number where an error occurs?

1134


How does sizeof know array size?

1172


What are the types of pointers in c?

1080


a program that performs some preliminary processing in C, it acts upon certain directives that will affect how the compiler does its work a) compiler b) loader c) directive d) preprocessor

1156


State the difference between realloc and free.

1148


Is flag a keyword in c?

1216


Function which gives a pointer to a binary trees const an integer value at each code, return function of all the nodes in binary tree.?

1132