Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Most viewed questions
Home
Questions
Most Viewed Questions
0
votes
Q: Evaluate the following Java expression, if x=3, y=5, and z=10:
Evaluate the following Java expression, if x=3, y=5, and z=10: ++z + y - y + z + x ... 🔗Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following for loop declaration is not valid?
Which of the following for loop declaration is not valid? a) for ( int i = 99; i >= 0; ... ;Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: G T Guild Charter involves
G T Guild Charter involves (1)Facilitation of G&T engagements (2)Building organization-level repository of G&T assets ( ... people capability on G&T (4)Formation of G&T workgroups...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Each G T capability is listed under which of the following?
Each G T capability is listed under which of the following? (1)One Business Group (2)One Value Theme (3)One Functional Area (4)One Governamce Layer...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is not a Java features?
Which of the following is not a Java features? a) Dynamic b) Architecture Neutral c) Use of pointers d ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is a valid long literal?
Which of the following is a valid long literal? a) ABH8097 b) L990023 c) 904423 d) 0xnf029L 🔗 ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Given E = 40xyi + 20x^2j + 2k. Calculate the potential between two points (1,-1,0) and (2,1,3).
Given E = 40xyi + 20x^2j + 2k. Calculate the potential between two points (1,-1,0) ... theory proposed by,electromagnetic theory engineering physics,electromagnetic theory nptel...
asked
Nov 11, 2021
in
Education
by
JackTerrance
electromagnetic-theory-interview-questions
electromagnetic-theory-interview-questions-answers
electromagnetic-theory-multiple-choice-questions
electromagnetic-theory-mcq-with-answers
electromagnetic-theory-mcq
electromagnetic-theory-questions
0
votes
Q: Which of the following is a valid declaration of a char?
Which of the following is a valid declaration of a char? a) char ch = '\utea'; b) char ca ... ;Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: G T Guild consists of
G T Guild consists of (1)Functional Communities (2)Governance Leads (3)Program Team (4)Steering Committee...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The \u0021 article referred to as a
The \u0021 article referred to as a a) Unicode escape sequence b) Octal escape c) Hexadecimal d) Line ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: What is the return type of the hashCode() method in the Object class?
What is the return type of the hashCode() method in the Object class? a) Object b) int c) ... Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: What does the expression float a = 35 / 0 return?
What does the expression float a = 35 / 0 return? a) 0 b) Not a Number c) Infinity d) ... ;Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:
It can be a software program or a hardware device that filters all data packets coming through the internet, a ... . it is known as the_______: Antivirus Firewall Cookies Malware...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following option leads to the portability and security of Java?
Which of the following option leads to the portability and security of Java? a) Bytecode is executed by ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Education
by
Editorial Staff
java-mcq-questions
java
java-interview-questions
0
votes
Q: Hackers usually used the computer virus for ______ purpose.
Hackers usually used the computer virus for ______ purpose. To log, monitor each and every user's stroke To gain access ... 's data stored in the computer system All of the above...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is not a type of scanning?
Which of the following is not a type of scanning? Xmas Tree Scan Cloud scan Null Scan SYN Stealth...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following statements is correct about the firewall?
Which of the following statements is correct about the firewall? It is a device installed at the boundary of a ... prevent files form damaging the corporate. None of the above....
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which one of the following is a type of antivirus program?
Which one of the following is a type of antivirus program? Quick heal Mcafee Kaspersky All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: _____ is used to find and fix bugs in the Java programs.
_____ is used to find and fix bugs in the Java programs. a) JVM b) JRE c) JDK d) JDB 🔗Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is true about the anonymous inner class?
Which of the following is true about the anonymous inner class? a) It has only methods b) Objects can' ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: The mentors of each of the functional communities are typically
The mentors of each of the functional communities are typically (1)Members of the Steerco (2)BG Heads (3)Client CXOs (4)Unit G&T Leaders...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is an example of Legacy Modernization?
Which of the following is an example of Legacy Modernization? (1)Enterprise Transformation (2)Management Transformation (3)IT Transformation (4)Business Process Transformation...
asked
Sep 21, 2021
in
Education
by
JackTerrance
growth-and-transformation-questions-answers
0
votes
Q: Predict the output of the following JavaScript code. <script type="text/javascript"> a = 8 + "8"; document.write(a); </script>
Predict the output of the following JavaScript code. a = 8 + "8"; document.write(a); A) 16 B) Compilation Error C) 88 D) Run Time Error...
asked
Feb 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following refers to the violation of the principle if a computer is no more accessible?
Which of the following refers to the violation of the principle if a computer is no more accessible? Access control Confidentiality Availability All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In a G T engagement, the preferred contracting approach is
In a G T engagement, the preferred contracting approach is (1)Input-based contracting (2)Output-based contracting (3)Outcome-based contracting (4)All of the above...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: G T Framework consists of
G T Framework consists of (1)4 Value Themes (2)48 Capabilities (3)8 Functional Areas (4)3 Governance Levels...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Class brush{private:integer size,rcodefunction getdata() { … }// Statement 1public:
Class brush{ private: integer size, rcode function getdata() { }// Statement 1 public: integer name // Statement ... //Statement 4 } Select the correct answer from above options...
asked
Dec 21, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which of the following is considered as the unsolicited commercial email?
Which of the following is considered as the unsolicited commercial email? Virus Malware Spam All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Guild is best defined as a
Guild is best defined as a (1)Center of Excellence (2)Team of Domain Consultants (3)Subject Matter Experts Pool (4)Community of Practitioners...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Below are the eight actual values of the target variable in the train file. What is the entropy of the target variable?
Below are the eight actual values of the target variable in the train file. What is the entropy of the target variable?...
asked
Apr 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
Page:
1
2
3
4
...
667
next »
...