Most viewed questions

0 votes
    How are component dependencies injected in a workflow...
asked Mar 7, 2021 in Technology by JackTerrance
0 votes
    Process of improving the accuracy of a Neural Network is called _______________. (a) Forward Propagation (b) Cross Validation (c) Random Walk (d) Training...
asked Oct 19, 2020 in Technology by Editorial Staff
0 votes
    How can we convince the customer to recognize us as a G T Partner in their testimonials? (1)By ensuring that ... governance meetings (4)By promoting the customer in various forums...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    What is the main function of a Technology Transfer Office with respect to collaborative research?...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    Top 30 Microservices Architecture Questions Answers...
asked Oct 27, 2020 in Technology by Editorial Staff
0 votes
    In state-space, the set of actions for a given problem is expressed by the_____. Intermediate States Successor function ... and returns next state Initial States None of the above...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    High values of threshold are good for the classification problem. True False...
asked Aug 28, 2021 in Technology by JackTerrance
0 votes
    The search algorithm which is similar to the minimax search, but removes the branches that don't affect the final ... Breadth-first search Alpha-beta pruning None of the above...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    Which one of the following is not a function of the FMS? a) Flight guidance and control of flight path b ... different types of communication d) Automatic control of engine thrust...
asked Dec 24, 2020 in Technology by JackTerrance
0 votes
    What is the output of [1, 2, 3] + [4, 5, 6]?...
asked Nov 26, 2020 in Technology by JackTerrance
0 votes
    What is the basic difference between BASH and DOS?...
asked Jan 24, 2021 in Technology by JackTerrance
0 votes
    __________ provides a snapshot of threats over time, encouraging the maintenance of up-to-date ... monitoring Threat analysis Vulnerability Scanning Endpoint activity monitoring...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Which among the following is most useful to protect complete networks? 1. Antivirus 2. Endpoint Security...
asked Oct 24, 2020 in Technology by JackTerrance
0 votes
    The main focus of NIH's conflict of interest policy is:...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    Which of the following feature of endpoint security solutions involves real time monitoring of network topology ... Centralized Security Management All of these Continous Detection...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    How will you find out what all files have been changed in a particular Git commit?...
asked Nov 4, 2020 in Technology by JackTerrance
0 votes
    What happens when an application takes user inputted data and sends it to a web browser without proper validation ... 2. Insecure direct object reference 3. Cross Site Scripting...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    Which of the following is the correct order of servlet life cycle phase methods? A - init(), service(), destroy() B - ... execute(), destroy() D - init(), service(), delete()...
asked Jan 12, 2021 in Technology by JackTerrance
0 votes
    Which of the following port and IP address scanner famous among the users? Cain and Abel Angry IP Scanner Snort Ettercap...
asked Mar 4, 2021 in Technology by JackTerrance
+1 vote
    What is the value of C? var a = 100; var b = "10"; var c = a + b; a)10010 b)110 c) None d)10100...
asked Oct 8, 2020 in Technology by JackTerrance
0 votes
    A Shallow Neural Network has only one hidden layer between Input and Output layers. (a) False (b) True...
asked Oct 19, 2020 in Technology by Editorial Staff
+1 vote
    What is the desire in the organization to push things to production termed as? (1)Operation Readiness (2)Evidence Gathered in Production (3)Team Autonomy (4)Live Site Culture...
asked Oct 13, 2020 in Technology by JackTerrance
0 votes
    Which of the following is the correct syntax of creating a standard navigation tab?
asked Feb 28, 2021 in Technology by JackTerrance
0 votes
    Which of the following is not a valid Hadoop config file? 1. core-default.xml 2. hdfs-default.xml 3. hadoop-default.xml 4. mapred-default.xml...
asked Apr 13, 2021 in Technology by JackTerrance
0 votes
    In a Neural Network, all the edges and nodes have the same Weight and Bias values. (a) True (b) False...
asked Oct 19, 2020 in Technology by Editorial Staff
0 votes
    Which of the following statements is true regarding authorship practices?...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    He…….suffering from fever since the last week. (a) is (b) was (c) has been (d) has...
asked Jan 3, 2021 in Education by JackTerrance
0 votes
    Which of the following are features of Endpoint Security solutions? 1. All of these 2. Incident investigation ... . Integration with other security solutions 5. Endpoint Detection...
asked Oct 24, 2020 in Technology by JackTerrance
0 votes
    Endpoints security solutions leverage a _____________ model for protecting various endpoints. 1. Client/server 2. Non-interference model 3. Peer-to-peer...
asked Oct 24, 2020 in Technology by JackTerrance
0 votes
    What will be the output of the following Java program? public class Test { public static void main( ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
...