Top 100+ questions in Technology

0 votes
    Scala is a pure functional programming language 1. True 2. False...
asked Mar 7, 2023 in Technology by JackTerrance
0 votes
    Functional programming language cannot be an object oriented language too 1. True 2. False...
asked Mar 7, 2023 in Technology by JackTerrance
0 votes
    Which of the following are the key concepts of Functional Programming a. Immutability b. Pure functions c. Inheritance d. Referential Transparency...
asked Mar 7, 2023 in Technology by JackTerrance
0 votes
    var dataset = [ 5, 10, 15, 20, 25 ]; What will be output of d3.extent(data)? -...
asked Mar 7, 2023 in Technology by JackTerrance
0 votes
    Which of the following attribute is being used to put the pen down at (10,25) in SVG?...
asked Mar 7, 2023 in Technology by JackTerrance
0 votes
    Which is not a slider available in d3.js?...
asked Mar 7, 2023 in Technology by JackTerrance
0 votes
    _______is the syntax to read JSON data?...
asked Mar 4, 2023 in Technology by JackTerrance
0 votes
    What does SVG stand for?...
asked Mar 4, 2023 in Technology by JackTerrance
0 votes
    D3 is developed by ________ ?...
asked Mar 4, 2023 in Technology by JackTerrance
0 votes
    What is the full form on D3?...
asked Mar 4, 2023 in Technology by JackTerrance
0 votes
    The _________ allows user to navigate between apps. A. Workspace area B. Me Area C. Notification area...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    IDE stands for ______ A. Integrated Design Environment B. Integrated Development Environment C. Internal Development Environment...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    ________ deployment option is recommended for the SAP front-end server in a productive system landscape. A. SAP Cloud ... B. Embedded deployment C. Hub deployment D. Standalone...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    Business processes are represented as _______ in Fiori launchpad. A. Joints B. Tiles C. Groups...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    List of all available Fiori apps can be explored via _________. A. SAP Fiori apps library B. SAP Fiori apps list C. SAP Fiori apps engine...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    OpenUI5 comes under the Apache 2.0 license. A. True B. False...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    OData Stands for _________. A. Open Data B. Out Data C. Outer Data...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    ___________ protocol is used for SAP Fiori factsheet search. A. OData B. InA C. RFC...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    The ________ gives access to frequently used apps and recent activities. A. Me Area B. Workspace area C. Notification area...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    SAP Fiori apps can be classified based on _____. 1. Line of Business 2. Industry 3. Roles A. 1,2 B. 2,3 C. 1,2,3...
asked Mar 2, 2023 in Technology by JackTerrance
0 votes
    Full form of TTP is ____________. A. Tactics, techniques and process B. Tactics, techniques and procedures C. Tactics, technology and process D. Tactics, technology and procedures...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    Which of the following are the aspects of threat modeling? A. Killing the threats B. Understanding ... strategies E. Identify mitigation strategies Categorizing the threats...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    EDR stands for _______. A. End point Detection and Response B. End point Defect and Response C. End point Defense and detective D. Earlier defense and response...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    Which of the following is an adaptation of the U.S. military’s kill chain process? A. The Cyber Kill Chain ... The Diamond Model of intrusion analysis D. None of the options...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    Which of the following is not a phase in hunting loop? A. Inform and enrich analytics B. Uncover new patterns and TTP’s C. Creating hypothesis D. Innovative approach...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    Which of the following are threat modeling tools? A. Securicor B. Irius Risk C. Threat Modeler D. All the Options...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    The process of designing a security specification and then eventually testing that specification is known as __________ ... hunting C. Threat intelligence D. Threat mitigation...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges. A. True B. False...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    _______ includes the information relevant to protecting an organization from external and internal threats and also the processes ... C. Threat Intelligence D. None of the options...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    ______ is a proactive way of hunting attacks. A. Cyber security B. Threat hunting C. Threat intelligence D. Threat modeling...
asked Feb 27, 2023 in Technology by JackTerrance
...