Most viewed questions

0 votes
    She cut her finger while she……..vegetables. (a) cutting (b) was cutting (c) cut (d) had cut...
asked Jan 3, 2021 in Education by JackTerrance
0 votes
    what is one way trains and suppliers can be aligned to a shared business and technology mission?...
asked Nov 28, 2020 in Technology by JackTerrance
0 votes
    Which of the following element is a non-relational storage system for large-scale storage? a) Compute b) Application c) Storage d) None of the mentioned...
asked Dec 23, 2020 in Technology by JackTerrance
0 votes
    Which of the following is a components of a Web Service architecture? A - SOAP B - UDDI C - WSDL D - All of the above....
asked Jan 12, 2021 in Technology by JackTerrance
0 votes
    _______ helps in meditating multi-availability zone residency regularly. 1.Chaos Monkey 2.Chaos Gorilla 3.Latency Monkey 4.Conformity Monkey...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Which situation should use the Large Solution Safe configuration...
asked Nov 30, 2020 in Technology by Editorial Staff
0 votes
    One of the main disadvantages of integrating cryptography into applications is: Please select the correct options from below (a ... , as users can no longer modify the source code....
asked Dec 11, 2020 in Education by Editorial Staff
0 votes
    What are connectors in Blue Prism?...
asked Nov 6, 2020 in Technology by JackTerrance
0 votes
    A byte addressable direct-mapped cache with 1024 blocks/lines, and with each block are having 8 32-bit words. How many bits are required ... 32-bit address? (a)10 (b)15 (c)3 (d)5...
asked Oct 6, 2020 in Technology by JackTerrance
0 votes
    A B-tree of order 4 and of height 3 will have a maximum of _______ keys. 1) 255 2) 63 3) 127 4) 188...
asked Dec 23, 2020 in Technology by JackTerrance
0 votes
    The first Network was called ________ CNNET NSFNET ASAPNET ARPANET...
asked Jan 10, 2021 in Technology by JackTerrance
0 votes
    _________ testing strategy involves feeding malformed inputs to a software. 1. Disruption Testing 2. Chaos Testing 3. Fuzz Testing...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Efficient Utilization & Fast Deployment represent which pattern __________________________________ (a)Service Instance per Host ... Host pattern (c)Service Instance per Container...
asked Oct 21, 2020 in Technology by Editorial Staff
0 votes
    What is the Difference Between Treemaps and Heat Maps?...
asked Mar 30, 2021 in Technology by JackTerrance
0 votes
    To get a random variable, ____________. A. (?love|hate|like) B. (*love|hate|like) C. (?:love|hate|like) D. (.*love|hate|like)...
asked Dec 16, 2022 in Education by JackTerrance
0 votes
    Which architecture does NoSQL follow? (1)Shared Memory (2)Shared Disk (3)Shared Nothing...
asked Apr 22, 2021 in Technology by JackTerrance
0 votes
    An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity ... 2) extranet 3) complex network 4) anonymity network...
asked Dec 29, 2020 in Technology by JackTerrance
0 votes
    _________ simulates failure by randomly terminating clusters. 1. Latency Monkey 2. Chaos Gorilla 3. Chaos Monkey 4. Chaos Kong...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Which among the following usually refers to an on-premise solution? 1. Endpoint Protection 2. Endpoint Security...
asked Oct 24, 2020 by JackTerrance
0 votes
    What is the main function of the Bayh-Dole Act of 1980 as it relates to academic institutions?...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    Which of the following class in Bootstrap is used to create a dropdown menu? .dropdown .select .select-list None of the above...
asked Feb 28, 2021 in Technology by JackTerrance
0 votes
    Which of the following is true about servlets? A - Servlets execute within the address space of a Web server. B - Servlets are ... is available to a servlet. D - All of the above....
asked Jan 12, 2021 in Technology by JackTerrance
0 votes
    Which phase involves checking the signature of binaries? 1. Release 2. Operate 3. Deploy 4. Monitor...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    A centrally managed solution that protects networks and all their endpoints against threats with the help of ... Endpoint Protection 3. Endpoint Security 4. Network Security...
asked Oct 24, 2020 by JackTerrance
0 votes
    Among the given options, which is also known as inference rule? Reference Reform Resolution None of the above...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    How many ml is a shot glass in Canada?...
asked Jan 27, 2021 in General by Editorial Staff
0 votes
    int find(int i) { if(>1) j=find(j/10)+(j%10) else j=0; return j; void main() int i=1000 int k k=find(i): printf(“%d”, K) Select the correct answer from above options...
asked Dec 29, 2021 in Education by JackTerrance
0 votes
    What is the practice of testing the production environment continuously with different types of failure scenarios called?...
asked Oct 30, 2020 by anonymous
0 votes
    In two glasses A and B of mix juice, the ratio of pineapple and orange is 4: 3 and 6:1,respectively. If 14 ... the new glass of juice? Select the correct answer from above options...
asked Dec 27, 2021 in Education by JackTerrance
0 votes
    Which of the following class in Bootstrap is used to create basic pagination? .page .pagin .paginate .pagination...
asked Feb 28, 2021 in Technology by JackTerrance
...