Number of null pointers in any binary tree
Post New Answer View All Answers
what is integration testing in real time applications?
How does the type system works when there is interoperability between a COM and .Net, i mean what exactly happens there
You are given some denominations of coins in an array (int denom[])and infinite supply of all of them. Given an amount (int amount), find the minimum number of coins required to get the exact amount. What is the method called?
what are the 3 forms of a prolog term
Given an array all of whose elements are positive numbers, find the maximum sum of a subsequence with the constraint that no 2 numbers in the sequence should be adjacent in the array. So 3 2 7 10 should return 13 (sum of 3 and 10) or 3 2 5 10 7 should return 15 (sum of 3, 5 and 7)
What are the tasks performed by a Team Lead
V2 SOLUTIONS APTI paper is very easy there are 3 sections 1'st is quant problem on age train traveling speed is given length of train is given we have to find out length of bridge then prob on calender one date is given on Friday hv to find out day of othe date ans is Friday then there was 1 prob on percentage which was very easy ans was 21340 then 2’nd section was english grammer had has been being like that hv to fill in the blanks was very wasy then last section was find relative words there was five Q 1 pant ANS:-breath 2inquire ans :- ask And 3 more out of that 1 ‘s ans was:- body 4 And others ans was :-through THEN THEY HAVE GD There was three topics 1 should we allow india’s talent to go to abrod 2 protest against seperate state is justify 3 inturuption of politics in cricket Thats all guys i cleared both the rounds now preparing 4 interview best of luck
Describe the difference between Interface-oriented, Object-oriented and Aspect-oriented programming
What is the first message line that any language learning prints on the screen? and why?
Difference between debugging, running, executing of an application
What's the difference b/w Table & Templete in Smartform?
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
I need source code for Enrollment System using Visual Basic 6.0/2008 database MS Access 2007 for my school thesis project...please help me..kindly send in my email jpinedamcp@gmail.com
Can any one give an example (Source Code) on virtual function implemetation in Java?
what are the things i had to say in personal introduction in hr round mail me to prasanna.1867@rediff.com