Ask
Search
Ask Question
Login
×
×
Welcome back.
and 4 others joined a min ago.
Continue with Google
Continue with email
Read
Write
Sort by: updates
updates
views
bookmarks
followers
votes
answers
0
votes
1
answer
1.9k
views
1
answer
prove that in metal cutting. How velocity = cutting velocity x chip thickness coefficient ?
production process
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
2.0k
views
1
answer
Quadratic Probing 28 55 71 67 11 10 90 44
data structures and algorithms
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
2.1k
views
1
answer
Structure of the Agents.
artificial intelligence
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
4.0k
views
1
answer
Write a short note on Structure of Intelligent Agents
artificial intelligence
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
929
views
1
answer
What is meant by business continuity, information availability, disaster recovery and recovery point objective?
storage network management and retrieval
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
2.0k
views
1
answer
Explain collector to base ckt with its stability factor.
digital logic design
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
3.3k
views
1
answer
Laser beam machining
production process
updated
3.9 years ago
by
krithikkm200
•
10
1
vote
1
answer
2.9k
views
1
answer
What are the different models for organizing a thread?
distributed computing
updated
3.9 years ago
by
krithikkm200
•
10
1
vote
1
answer
2.3k
views
1
answer
Linear probing: 28 55 71 67 11 10 90 44
data structures and algorithms
updated
3.9 years ago
by
krithikkm200
•
10
0
votes
1
answer
1.1k
views
1
answer
Explain logical components of connectivity in storage system environment
storage network management and retrieval
updated
3.9 years ago
by
krithikkm200
•
10
3
votes
1
answer
1.3k
views
1
answer
Briefly Explain Mapping of a Standard SOP and POS Expression.
digital fundamentals
updated
3.9 years ago
by
thambisrilalith126
•
20
3
votes
1
answer
13k
views
1
answer
What is Karnaugh map? Explain The 3-Variable and 4-Variable Karnaugh map.
digital fundamentals
updated
3.9 years ago
by
thambisrilalith126
•
20
3
votes
1
answer
12k
views
1
answer
What is Decision Making Process? and also explain Steps of Decision Making Process.
economics and management
updated
3.9 years ago
by
thambisrilalith126
•
20
0
votes
1
answer
2.1k
views
1
answer
What is the difference between Management by Objectives (MBO) and Management by Exception (MBE)?
economics and management
updated
3.9 years ago
by
thambisrilalith126
•
20
3
votes
1
answer
2.1k
views
1
answer
What is Management by Exception, Process and Importance of Management By Exception.
economics and management
updated
3.9 years ago
by
thambisrilalith126
•
20
0
votes
1
answer
1.4k
views
1
answer
Give the advantages of Wireless local loop (WLL) over wired systems
wireless technology
updated
3.9 years ago
by
sudhirkumarro878
•
10
0
votes
1
answer
2.5k
views
1
answer
Write short note on Adaptive Differential Pulse Code Modulation (ADPCM). Give Advantages and Disadvantages of ADPCM
wireless technology
updated
3.9 years ago
by
sudhirkumarro878
•
10
2
votes
1
answer
2.0k
views
1
answer
Write short note on Minor losses in pipe.
fluid mechanics
updated
3.9 years ago
by
19bcs3866
•
10
2
votes
2
answers
3.2k
views
2
answers
What is Kismet in Vulnerability Scanning? Explain it's separate parts and it'sfeatures.
cyber security and laws
updated
3.9 years ago
by
pragatipandey623
•
20
2
votes
1
answer
1.6k
views
1
answer
What is Wireshark? Explain it's functionality.
cyber security and laws
updated
3.9 years ago
by
19bcs3866
•
10
1
vote
1
answer
1.2k
views
1
answer
What is Ettercap? Explain it's operations and features.
cyber security and laws
updated
3.9 years ago
by
19bcs3866
•
10
2
votes
1
answer
1.1k
views
1
answer
Differentiate Mutable Data types and Immutable Data types.
python programming
updated
3.9 years ago
by
19bcs3866
•
10
2
votes
1
answer
4.2k
views
1
answer
Explain Tcpdump and WinDump in Vulnerability Scanning.
cyber security and laws
updated
3.9 years ago
by
pragatipandey623
•
20
2
votes
1
answer
748
views
1
answer
Explain Network Sniffers and how to Network Sniffers?
cyber security and laws
updated
3.9 years ago
by
pragatipandey623
•
20
1
vote
1
answer
1.4k
views
1
answer
Explain Conditional statement structure in python with example.
python programming
updated
3.9 years ago
by
19bcs3866
•
10
<prev
• 28,287 results • page 134 of 1132 •
next >
×
Top contributors for
*** MISSING ***
×
Merge
*** MISSING ***
to
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money