Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Most viewed questions
Home
Questions
Most Viewed Questions
0
votes
Q: Which of the following is considered as the world's first antivirus program?
Which of the following is considered as the world's first antivirus program? Creeper Reaper Tinkered Ray Tomlinson...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: their computer comes under __________.
Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to ... Detection and prevention of deployment of malicious exploitables...
asked
Oct 25, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following element allows you to create and manage virtual machines that serve either in a Web role and a Worker role?
Which of the following element allows you to create and manage virtual machines that serve either in a Web role and a ... Compute 2) Application 3) Storage 4) None of the mentioned...
asked
Dec 23, 2020
by
JackTerrance
azure-interview-questions-answers
0
votes
Q: Endpoint security solutions provide a decentralized solution to protect endpoints.
Endpoint security solutions provide a decentralized solution to protect endpoints. 1. False 2. True...
asked
Oct 24, 2020
by
JackTerrance
#endpoint
0
votes
Q: _________ approach aims to include security in each phase of the development cycle.
_________ approach aims to include security in each phase of the development cycle. 1. Shift Left security 2. Continuous Security 3. Shift Right Security 4.Consistent Security...
asked
Oct 28, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Automatic Reasoning tool is used in_____.
Automatic Reasoning tool is used in_____. Personal Computers Microcomputers LISP Machines All of the above...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following plugin in Bootstrap is used to create a modal window?
Which of the following plugin in Bootstrap is used to create a modal window? popup alert modal window...
asked
Feb 28, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: It is safest to test ransomware by using one-at-a-time approach.
It is safest to test ransomware by using one-at-a-time approach. False True...
asked
Oct 25, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
+1
vote
Q: Which of the following services allow creation and management of virtual machines that serve either in a Web role and a Worker role?
Which of the following services allow creation and management of virtual machines that serve either in a Web role and a Worker role?...
asked
Oct 20, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Select the 3 graphics files from the list belowChoose all of the correct answers (multiple possibilities).Untitled oggUntitled bmpUntitled nfoUntitled.jpg
Select the 3 graphics files from the list below Choose all of the correct answers (multiple possibilities). Untitled ... jpg Unulled of Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which method of the Class.class is used to determine the name of a class represented by the class object as a String?
Which method of the Class.class is used to determine the name of a class represented by the class ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: In which search problem, to find the shortest path, each city must be visited once only?
In which search problem, to find the shortest path, each city must be visited once only? Map coloring ... path between a source and a destination Travelling Salesman problem...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:
The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:...
asked
Nov 29, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: What is the output for the following code (function f(){ function f(){ return 1; } return f(); function f() { return 2; } })();
What is the output for the following code (function f(){ function f(){ return 1; } return f(); function f() { return 2; } })(); a) NaN b) 1 c) 2 d) Error...
asked
Oct 9, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Marionette is the former name of ___________
Marionette is the former name of ___________ 1. Chef 2. CloudFormation 3. Ansible 4. Puppet...
asked
Sep 18, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Testing can readily be done in production environment.
Testing can readily be done in production environment. False True...
asked
Oct 25, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which one of the following is actually considered as the first computer virus?
Which one of the following is actually considered as the first computer virus? Sasser Blaster Creeper Both A and C...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: What is the output of L[2] if L = [1,2,3]?
What is the output of L[2] if L = [1,2,3]?...
asked
Nov 26, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________
In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ Application layer Transport layer Link layer Session layer...
asked
Jan 10, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?
Which one of the following principles of cyber security refers that the security mechanism must be as small and ... Economy of the Mechanism Least privilege Fail-safe Defaults...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?
The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?...
asked
Mar 1, 2021
in
Education
by
Editorial Staff
#agile-research
agile
0
votes
Q: Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit?
Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit? Reliability Performance Security Longevity...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: What is the HTML tag under which one can write the JavaScript code? A) <javascript> B) <scripted> C) <script> D) <js>
What is the HTML tag under which one can write the JavaScript code? A)
B)
C)
Which of the following layers is an addition to OSI model when compared with TCP IP model? Application layer Presentation layer Session layer Session and Presentation layer...
asked
Jan 10, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: B-tree of order n is a order-n multiway tree in which each non-root node contains __________
B-tree of order n is a order-n multiway tree in which each non-root node contains __________ a) at most (n – 1)/2 keys ... ) at least 2n keys d) at least (n – 1)/2 keys...
asked
Dec 23, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: An attack technique that forces a user’s session credential or session ID to an explicit value
An attack technique that forces a user’s session credential or session ID to an explicit value 1. Brute Force Attack 2. Session Hijacking 3. Session Fixation...
asked
Mar 20, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which statement is true Pair Work in the scaled Agile Framework?
Which statement is true Pair Work in the scaled Agile Framework?...
asked
Nov 30, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is an example of Changing Operating Model?
Which of the following is an example of Changing Operating Model? (1)Enterprise Transformation (2)Management Transformation (3)IT Transformation (4)Business Process Transformation...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?
In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities? 1. Testing and deployment 2. ... testing 3. Al the phases 4. Analysis and coding...
asked
Oct 28, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
Page:
« prev
1
2
3
4
5
6
7
8
...
667
next »
...