Start learning 50% faster. Sign in now
Let the Cp of Car =100 SP at the 10% Loss =90 ATQ- 90×120/100 =54000 108=54000 1unit =500 then Cp =100×500 =50000 Rs.
What is an effective method to enhance security compliance in data handling practices?
Which web application vulnerability is most commonly exploited through code injection, allowing attackers to manipulate database queries?
What is the purpose of the #define directive in programming languages like C and C++?
Which functional dependency does not holds in given relation and why?
Which of the following statements accurately describes Third Normal Form (3NF) in database normalization?
In a virtual memory system, which of the following techniques is used to maintain the illusion that each process has its own dedicated memory space?
Predict the output
list1 = ['physics', 'chemistry', 1997, 2000]
list2 = [1, 2, 3, 4, 5, 6, 7 ]
print "list1[0]: ", list1[0]
fill the blank for 19.
What is a key characteristic of a star topology in networking?
Which of the following data structures is most suitable for implementing a priority queue with efficient insertion and deletion operations based on prio...