Most viewed questions

0 votes
    The mentors of each of the functional communities are typically (1)Members of the Steerco (2)BG Heads (3)Client CXOs (4)Unit G&T Leaders...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Which of the following is an example of Legacy Modernization? (1)Enterprise Transformation (2)Management Transformation (3)IT Transformation (4)Business Process Transformation...
asked Sep 21, 2021 in Education by JackTerrance
0 votes
    Predict the output of the following JavaScript code. a = 8 + "8"; document.write(a); A) 16 B) Compilation Error C) 88 D) Run Time Error...
asked Feb 27, 2021 in Technology by JackTerrance
0 votes
    Which of the following refers to the violation of the principle if a computer is no more accessible? Access control Confidentiality Availability All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    In a G T engagement, the preferred contracting approach is (1)Input-based contracting (2)Output-based contracting (3)Outcome-based contracting (4)All of the above...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    G T Framework consists of (1)4 Value Themes (2)48 Capabilities (3)8 Functional Areas (4)3 Governance Levels...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Class brush{ private: integer size, rcode function getdata() { }// Statement 1 public: integer name // Statement ... //Statement 4 } Select the correct answer from above options...
asked Dec 21, 2021 in Education by JackTerrance
0 votes
    Which of the following is considered as the unsolicited commercial email? Virus Malware Spam All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Guild is best defined as a (1)Center of Excellence (2)Team of Domain Consultants (3)Subject Matter Experts Pool (4)Community of Practitioners...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Below are the eight actual values of the target variable in the train file. What is the entropy of the target variable?...
asked Apr 27, 2021 in Technology by JackTerrance
0 votes
    Which of the following usually observe each activity on the internet of the victim, gather all information in the ... to someone else? Malware Spyware Adware All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    In the computer networks, the encryption techniques are primarily used for improving the ________ Security Performance Reliability Longevity...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    __________ is a tool that communicates with the hosts and their virtual machines. 1. Virtual machine monitor 2 ... 3. Virtual server 4. Virtual infrastructure management component...
asked Apr 11, 2021 in Technology by JackTerrance
0 votes
    Which of the following tool is used to generate API documentation in HTML format from doc comments in ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
+1 vote
    help in inspecting multiple variables simultaneously by color coding...
asked Oct 11, 2020 in Education by anonymous
0 votes
    Which of the following can be considered as the elements of cyber security? Application Security Operational Security Network Security All of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    The main function of problem-solving agent is to________. Solve the given problem and reach the goal Find out which sequence of ... the goal state. Both a & b None of the above...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    Which is not valid data type in Javascript ? 1. Undefinded 2. Boolean 3. float 4. Number...
asked Dec 24, 2020 by JackTerrance
0 votes
    What does FC mean on my ADT alarm system?...
asked Jan 27, 2021 in General by Editorial Staff
0 votes
    What can be used to script the change to SAFe?...
asked Nov 27, 2020 in Technology by JackTerrance
0 votes
    which of the following mitigation strategies might be effective in handling threats caused by network monitoring?...
asked Mar 19, 2021 by JackTerrance
0 votes
    To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system. Antivirus Firewall Vlc player Script...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    What should be the execution order, if a class has a method, static block, instance block, and ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    _______ is a type of software designed to help the user's computer detect viruses and avoid them. Malware Adware Antivirus Both B and C...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Which of the following refers to exploring the appropriate, ethical behaviors related to the online ... digital media platform? Cyber low Cyberethics Cybersecurity Cybersafety...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Which of the following is an advantage of DevSecOps? 1 Reduction 2. Secure by design 3. Increased speed of recovery 4. All the options...
asked Oct 28, 2020 by JackTerrance
0 votes
    In ________ automation, user intervention is required only for scheduling and managing robot workload. - intellisense ... - autonomous Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
0 votes
    Which one of the following can be considered as the class of computer threats? Dos Attack Phishing Soliciting Both A and C...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Code Red is a type of ________ An Antivirus Program A photo editing software A computer virus A video editing software...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    The external JavaScript file must contain tag. True or False? A. True B. False...
asked Feb 27, 2021 in Technology by JackTerrance
...