Most viewed questions

0 votes
    Evaluate the following Java expression, if x=3, y=5, and z=10: ++z + y - y + z + x ... 🔗Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    Which of the following for loop declaration is not valid? a) for ( int i = 99; i >= 0; ... ;Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    G T Guild Charter involves (1)Facilitation of G&T engagements (2)Building organization-level repository of G&T assets ( ... people capability on G&T (4)Formation of G&T workgroups...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Each G T capability is listed under which of the following? (1)One Business Group (2)One Value Theme (3)One Functional Area (4)One Governamce Layer...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Which of the following is not a Java features? a) Dynamic b) Architecture Neutral c) Use of pointers d ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    Which of the following is a valid long literal? a) ABH8097 b) L990023 c) 904423 d) 0xnf029L 🔗 ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    Which of the following is a valid declaration of a char? a) char ch = '\utea'; b) char ca ... ;Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    G T Guild consists of (1)Functional Communities (2)Governance Leads (3)Program Team (4)Steering Committee...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    The \u0021 article referred to as a a) Unicode escape sequence b) Octal escape c) Hexadecimal d) Line ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    What is the return type of the hashCode() method in the Object class? a) Object b) int c) ... Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    What does the expression float a = 35 / 0 return? a) 0 b) Not a Number c) Infinity d) ... ;Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    It can be a software program or a hardware device that filters all data packets coming through the internet, a ... . it is known as the_______: Antivirus Firewall Cookies Malware...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Which of the following option leads to the portability and security of Java? a) Bytecode is executed by ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Education by Editorial Staff
0 votes
    Hackers usually used the computer virus for ______ purpose. To log, monitor each and every user's stroke To gain access ... 's data stored in the computer system All of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Which of the following is not a type of scanning? Xmas Tree Scan Cloud scan Null Scan SYN Stealth...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Which of the following statements is correct about the firewall? It is a device installed at the boundary of a ... prevent files form damaging the corporate. None of the above....
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Which one of the following is a type of antivirus program? Quick heal Mcafee Kaspersky All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    _____ is used to find and fix bugs in the Java programs. a) JVM b) JRE c) JDK d) JDB 🔗Reference: stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    Which of the following is true about the anonymous inner class? a) It has only methods b) Objects can' ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    The mentors of each of the functional communities are typically (1)Members of the Steerco (2)BG Heads (3)Client CXOs (4)Unit G&T Leaders...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Which of the following is an example of Legacy Modernization? (1)Enterprise Transformation (2)Management Transformation (3)IT Transformation (4)Business Process Transformation...
asked Sep 21, 2021 in Education by JackTerrance
0 votes
    Predict the output of the following JavaScript code. a = 8 + "8"; document.write(a); A) 16 B) Compilation Error C) 88 D) Run Time Error...
asked Feb 27, 2021 in Technology by JackTerrance
0 votes
    Which of the following refers to the violation of the principle if a computer is no more accessible? Access control Confidentiality Availability All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    In a G T engagement, the preferred contracting approach is (1)Input-based contracting (2)Output-based contracting (3)Outcome-based contracting (4)All of the above...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    G T Framework consists of (1)4 Value Themes (2)48 Capabilities (3)8 Functional Areas (4)3 Governance Levels...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Class brush{ private: integer size, rcode function getdata() { }// Statement 1 public: integer name // Statement ... //Statement 4 } Select the correct answer from above options...
asked Dec 21, 2021 in Education by JackTerrance
0 votes
    Which of the following is considered as the unsolicited commercial email? Virus Malware Spam All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Guild is best defined as a (1)Center of Excellence (2)Team of Domain Consultants (3)Subject Matter Experts Pool (4)Community of Practitioners...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Below are the eight actual values of the target variable in the train file. What is the entropy of the target variable?...
asked Apr 27, 2021 in Technology by JackTerrance
...