Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Most viewed questions
Home
Questions
Most Viewed Questions
0
votes
Q: Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
Which of the following usually observe each activity on the internet of the victim, gather all information in the ... to someone else? Malware Spyware Adware All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In the computer networks, the encryption techniques are primarily used for improving the ________
In the computer networks, the encryption techniques are primarily used for improving the ________ Security Performance Reliability Longevity...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: __________ is a tool that communicates with the hosts and their virtual machines.
__________ is a tool that communicates with the hosts and their virtual machines. 1. Virtual machine monitor 2 ... 3. Virtual server 4. Virtual infrastructure management component...
asked
Apr 11, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following tool is used to generate API documentation in HTML format from doc comments in source code?
Which of the following tool is used to generate API documentation in HTML format from doc comments in ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
+1
vote
Q: help in inspecting multiple variables simultaneously by color coding
help in inspecting multiple variables simultaneously by color coding...
asked
Oct 11, 2020
in
Education
by
anonymous
#multiple-variables
#color-coding
0
votes
Q: Which of the following can be considered as the elements of cyber security?
Which of the following can be considered as the elements of cyber security? Application Security Operational Security Network Security All of the above...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The main function of problem-solving agent is to________.
The main function of problem-solving agent is to________. Solve the given problem and reach the goal Find out which sequence of ... the goal state. Both a & b None of the above...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which is not valid data type in Javascript?
Which is not valid data type in Javascript ? 1. Undefinded 2. Boolean 3. float 4. Number...
asked
Dec 24, 2020
by
JackTerrance
java-script
0
votes
Q: What does FC mean on my ADT alarm system?
What does FC mean on my ADT alarm system?...
asked
Jan 27, 2021
in
General
by
Editorial Staff
#fc-mean
adt-alarm-system
alarm-system
0
votes
Q: What can be used to script the change to SAFe?
What can be used to script the change to SAFe?...
asked
Nov 27, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: which of the following mitigation strategies might be effective in handling threats caused by network monitoring?
which of the following mitigation strategies might be effective in handling threats caused by network monitoring?...
asked
Mar 19, 2021
by
JackTerrance
threat-modeling
0
votes
Q: To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system. Antivirus Firewall Vlc player Script...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: What should be the execution order, if a class has a method, static block, instance block, and constructor, as shown below?
What should be the execution order, if a class has a method, static block, instance block, and ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: _______ is a type of software designed to help the user's computer detect viruses and avoid them.
_______ is a type of software designed to help the user's computer detect viruses and avoid them. Malware Adware Antivirus Both B and C...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
Which of the following refers to exploring the appropriate, ethical behaviors related to the online ... digital media platform? Cyber low Cyberethics Cybersecurity Cybersafety...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is an advantage of DevSecOps?
Which of the following is an advantage of DevSecOps? 1 Reduction 2. Secure by design 3. Increased speed of recovery 4. All the options...
asked
Oct 28, 2020
by
JackTerrance
#devsecops
0
votes
Q: In ________ automation, user intervention is required only for scheduling and managing robot workload.– intellisense– assisted– unassisted– cognitive
In ________ automation, user intervention is required only for scheduling and managing robot workload. - intellisense ... - autonomous Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which one of the following can be considered as the class of computer threats?
Which one of the following can be considered as the class of computer threats? Dos Attack Phishing Soliciting Both A and C...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The external JavaScript file must contain <script> tag. True or False?
The external JavaScript file must contain tag. True or False? A. True B. False...
asked
Feb 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Code Red is a type of ________
Code Red is a type of ________ An Antivirus Program A photo editing software A computer virus A video editing software...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which one of the following refers to the technique used for verifying the integrity of the message?
Which one of the following refers to the technique used for verifying the integrity of the message? Digital signature Decryption algorithm Protocol Message Digest...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
Which of the following refers to stealing one's idea or invention of others and use it for their own benefits? Piracy Plagiarism Intellectual property rights All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: The Three Horizons of Purpose led Growth are
The Three Horizons of Purpose led Growth are (1)Build digital core (2)Drive growth & transformation (3)Transform and Grow around Purpose-led Ecosystem (4)Innovate business models...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which two statement describes an Agile Release Train
Which two statement describes an Agile Release Train...
asked
Nov 30, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: .Retargeting platforms enable advertisers to __________.
.Retargeting platforms enable advertisers to __________. All the options Allocate budget to right keywords Retarget based on location View keyword performance...
asked
Sep 5, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?
A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory ... a consent form is an example of exculpatory language?...
asked
Mar 1, 2021
in
Education
by
Editorial Staff
#research
release
0
votes
Q: In which process, a local variable has the same name as one of the instance variables?
In which process, a local variable has the same name as one of the instance variables? a) Serialization ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is not a business growth impact measure?
Which of the following is not a business growth impact measure? (1)Sales Growth (2)Cost Savings (3)Productivity Improvement (4)Increased Market Share...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which package contains the Random class?
Which package contains the Random class? a) java.util package b) java.lang package c) java.awt package ... : stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked
Dec 19, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following can be used to ensure the security of the CI/CD pipeline?
Which of the following can be used to ensure the security of the CI/CD pipeline? 1. Authentication to push ... storage of build artifacts 4. Login tracking 5. Key management...
asked
Oct 28, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
Page:
« prev
1
2
3
4
5
...
667
next »
...