what is the exact full form of OOPS,O -> object O ->
oriented P -> programing S-> ? ....
Answer Posted / munish kumar
Most Appropriate
OOPS : Object Oriented Programming System
| Is This Answer Correct ? | 7 Yes | 5 No |
Post New Answer View All Answers
Wrtite a JCL for sorting a file with start from 36 postion lenth 9 excluding a num eq to 98768. for 3 marks mainframe
In OB52 , How to define two open posting period, Like only 5 and 8 posting should be open.. should not open 6 and 7..period..
what is the basic and unique feature of dotnet
we create a pf with 3 fields.2 is defined as keyfields.we lock it with alcobj command.how we find out whether the file is locked or not?is it dspfd??/
they asked me about srs (software requirement specifcation)? how can i get anydocumentation about srs & other documnts infomation like bdd, in testing? its urgent?
design a counter with the following repeated binary sequence: 0, 1, 2, 3, 4, 5, 6, 7, 8 using JK Flip Flop.
Tell me the jobs for the MCA Fresher in delhi, Noida..
WHAT IS THE MEANING OF CONSTANT ...EXEEDS LENGTH LIMIT WHILE COPYING FROM PS FILE TO KSDS
Hi can you please send me recent(present) interview questions and technical qyestions with answers for "BUSSIESS OBJECTS" and "DATA WAREHOUSE".pls its urgent for me my mail id is sekhar.cs82@gmail.com,manjuforgis@gmail.com. thanks in advance
Given: coordinates of rectangle-> left bottom and right top points. the rectangles create a hole.Find the maximum area of the hole. eg. 4 rectangles create a hole in between. find its area.
how much fee for deccan soft institute .how to block seat for sandeep sir class reply soonnnnÂ
how to convert the data from HTML file to SAS dataset?
Hi Guys, This is Rama, right now I am working as a Software Test Engineer in Gurgoan and I have over all 3 years of testing expoeriance. Right now I am looking for a change. Can any body help me out to find a job in south india. Thanks in Advance
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
5.Call by value and Call by reference with program?