Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Most viewed questions
Home
Questions
Most Viewed Questions
0
votes
Q: The mentors of each of the functional communities are typically
The mentors of each of the functional communities are typically (1)Members of the Steerco (2)BG Heads (3)Client CXOs (4)Unit G&T Leaders...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is an example of Legacy Modernization?
Which of the following is an example of Legacy Modernization? (1)Enterprise Transformation (2)Management Transformation (3)IT Transformation (4)Business Process Transformation...
asked
Sep 21, 2021
in
Education
by
JackTerrance
growth-and-transformation-questions-answers
0
votes
Q: Predict the output of the following JavaScript code. <script type="text/javascript"> a = 8 + "8"; document.write(a); </script>
Predict the output of the following JavaScript code. a = 8 + "8"; document.write(a); A) 16 B) Compilation Error C) 88 D) Run Time Error...
asked
Feb 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following refers to the violation of the principle if a computer is no more accessible?
Which of the following refers to the violation of the principle if a computer is no more accessible? Access control Confidentiality Availability All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In a G T engagement, the preferred contracting approach is
In a G T engagement, the preferred contracting approach is (1)Input-based contracting (2)Output-based contracting (3)Outcome-based contracting (4)All of the above...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: G T Framework consists of
G T Framework consists of (1)4 Value Themes (2)48 Capabilities (3)8 Functional Areas (4)3 Governance Levels...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Class brush{private:integer size,rcodefunction getdata() { … }// Statement 1public:
Class brush{ private: integer size, rcode function getdata() { }// Statement 1 public: integer name // Statement ... //Statement 4 } Select the correct answer from above options...
asked
Dec 21, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which of the following is considered as the unsolicited commercial email?
Which of the following is considered as the unsolicited commercial email? Virus Malware Spam All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Guild is best defined as a
Guild is best defined as a (1)Center of Excellence (2)Team of Domain Consultants (3)Subject Matter Experts Pool (4)Community of Practitioners...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Below are the eight actual values of the target variable in the train file. What is the entropy of the target variable?
Below are the eight actual values of the target variable in the train file. What is the entropy of the target variable?...
asked
Apr 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
Which of the following usually observe each activity on the internet of the victim, gather all information in the ... to someone else? Malware Spyware Adware All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In the computer networks, the encryption techniques are primarily used for improving the ________
In the computer networks, the encryption techniques are primarily used for improving the ________ Security Performance Reliability Longevity...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: __________ is a tool that communicates with the hosts and their virtual machines.
__________ is a tool that communicates with the hosts and their virtual machines. 1. Virtual machine monitor 2 ... 3. Virtual server 4. Virtual infrastructure management component...
asked
Apr 11, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following tool is used to generate API documentation in HTML format from doc comments in source code?
Which of the following tool is used to generate API documentation in HTML format from doc comments in ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
+1
vote
Q: help in inspecting multiple variables simultaneously by color coding
help in inspecting multiple variables simultaneously by color coding...
asked
Oct 11, 2020
in
Education
by
anonymous
#multiple-variables
#color-coding
0
votes
Q: Which of the following can be considered as the elements of cyber security?
Which of the following can be considered as the elements of cyber security? Application Security Operational Security Network Security All of the above...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The main function of problem-solving agent is to________.
The main function of problem-solving agent is to________. Solve the given problem and reach the goal Find out which sequence of ... the goal state. Both a & b None of the above...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which is not valid data type in Javascript?
Which is not valid data type in Javascript ? 1. Undefinded 2. Boolean 3. float 4. Number...
asked
Dec 24, 2020
by
JackTerrance
java-script
0
votes
Q: What does FC mean on my ADT alarm system?
What does FC mean on my ADT alarm system?...
asked
Jan 27, 2021
in
General
by
Editorial Staff
#fc-mean
adt-alarm-system
alarm-system
0
votes
Q: What can be used to script the change to SAFe?
What can be used to script the change to SAFe?...
asked
Nov 27, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: which of the following mitigation strategies might be effective in handling threats caused by network monitoring?
which of the following mitigation strategies might be effective in handling threats caused by network monitoring?...
asked
Mar 19, 2021
by
JackTerrance
threat-modeling
0
votes
Q: To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system. Antivirus Firewall Vlc player Script...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: What should be the execution order, if a class has a method, static block, instance block, and constructor, as shown below?
What should be the execution order, if a class has a method, static block, instance block, and ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: _______ is a type of software designed to help the user's computer detect viruses and avoid them.
_______ is a type of software designed to help the user's computer detect viruses and avoid them. Malware Adware Antivirus Both B and C...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
Which of the following refers to exploring the appropriate, ethical behaviors related to the online ... digital media platform? Cyber low Cyberethics Cybersecurity Cybersafety...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is an advantage of DevSecOps?
Which of the following is an advantage of DevSecOps? 1 Reduction 2. Secure by design 3. Increased speed of recovery 4. All the options...
asked
Oct 28, 2020
by
JackTerrance
#devsecops
0
votes
Q: In ________ automation, user intervention is required only for scheduling and managing robot workload.– intellisense– assisted– unassisted– cognitive
In ________ automation, user intervention is required only for scheduling and managing robot workload. - intellisense ... - autonomous Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which one of the following can be considered as the class of computer threats?
Which one of the following can be considered as the class of computer threats? Dos Attack Phishing Soliciting Both A and C...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Code Red is a type of ________
Code Red is a type of ________ An Antivirus Program A photo editing software A computer virus A video editing software...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The external JavaScript file must contain <script> tag. True or False?
The external JavaScript file must contain tag. True or False? A. True B. False...
asked
Feb 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
Page:
1
2
3
4
...
667
next »
...