Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Most viewed questions
Home
Questions
Most Viewed Questions
0
votes
Q: Web Crawler is an example of______.
Web Crawler is an example of______. Intelligent Agent Problem-solving agent Simple reflex agent Model-based agent...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Default HTML template engine in Spring Boot?
Default HTML template engine in Spring Boot? 1. JSP 2. HTML 3. Thymeleaf 4. None of the Above...
asked
Jul 8, 2021
in
Education
by
JackTerrance
spring-boot-interview-questions
0
votes
Q: In ethical hacking and cyber security, there are _______ types of scanning:
In ethical hacking and cyber security, there are _______ types of scanning: 1 2 3 4...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Testing can be done effectively only on a system connected to the internet.
Testing can be done effectively only on a system connected to the internet. 1) False 2) True...
asked
Oct 25, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which is the software development approach that first emphasized on incorporating customer feedback early and often?
Which is the software development approach that first emphasized on incorporating customer feedback early and often? A. Agile B. DevOps C. Waterfall D. Lean...
asked
Oct 27, 2020
by
JackTerrance
#devops
0
votes
Q: Which of the following is the most widely used external memory data structure?
Which of the following is the most widely used external memory data structure? 1) AVL tree 2) B-tree 3) Red-black tree 4) Both AVL tree and Red-black tree...
asked
Dec 23, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following approaches to testing is most appropriate when the results are expected to be precise?
Which of the following approaches to testing is most appropriate when the results are expected to be precise? Many at a time One at a time...
asked
Oct 25, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which AI technique enables the computers to understand the associations and relationships between objects and events?
Which AI technique enables the computers to understand the associations and relationships between objects and ... Processing Cognitive Science Relative Symbolism Pattern Matching...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: It is Mandatory that the doctype declaration is the first line of every HTML5 Page.
It is Mandatory that the doctype declaration is the first line of every HTML5 Page. 1. True 2. False...
asked
Apr 10, 2021
in
Education
by
JackTerrance
html5
html
0
votes
Q: Which one of the following usually used in the process of Wi-Fi-hacking?
Which one of the following usually used in the process of Wi-Fi-hacking? Aircrack-ng Wireshark Norton All of the above...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: _____________ is used to define the instructions for performing a business process.
_____________ is used to define the instructions for performing a business process. 1. Process recorder 2. Developer Tool 3. Robot Controller...
asked
Aug 30, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In the TSP problem of n cities, the time taken for traversing all cities, without having prior knowledge of the length of the minimum tour will be_______.
In the TSP problem of n cities, the time taken for traversing all cities, without having prior knowledge of the length of the minimum tour will be_______. O(n) O(n2) O(n!) O(n/2)...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: An Agile team has two characteristics
An Agile team has two characteristics...
asked
Nov 30, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: _______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’.
_______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’. Intrusion Detection Systems Anti-virus Firewall Anti-malware...
asked
Oct 25, 2020
by
JackTerrance
#endpoint
0
votes
Q: The PEAS in the task environment is about____________.
The PEAS in the task environment is about____________. Peer, Environment, Actuators, Sense Performance, Environment, ... , Environment, Actuators, Sensors None of the above...
asked
Mar 8, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: He saw me by chance and……….the car.
He saw me by chance and……….the car. (a) stop (b) stopped (c) stops (d) was stopping...
asked
Jan 3, 2021
in
Education
by
JackTerrance
general-english-questions-and-answers-for-competitive-exam
0
votes
Q: A decrease in variability leads to an increase in
A decrease in variability leads to an increase in...
asked
Nov 30, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: Dynamic Application Security testing is also known as __________.
Dynamic Application Security testing is also known as __________. 1.Grey box testing 2. White box testing 3. Black box testing...
asked
Oct 28, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In the AppSec pipeline, the first phase, intake process, is also known as ___________.
In the AppSec pipeline, the first phase, intake process, is also known as ___________. 1. In point 2. In tunnel 3. Request phase 4. First impression...
asked
Oct 28, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: In which of the following, a person is constantly followed/chased by another person or group of several peoples?
In which of the following, a person is constantly followed/chased by another person or group of several peoples? Phishing Bulling Stalking Identity theft...
asked
Mar 4, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines?
Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines?...
asked
Nov 29, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: In system hacking, which of the following is the most crucial activity?
In system hacking, which of the following is the most crucial activity? Information gathering Covering tracks Cracking passwords None of the above...
asked
Mar 6, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Predict the output of the following JavaScript code. <script type="text/javascript" language="javascript"> var x=5; var y=6; var res=eval("x*y"); document.write(res); </script>
Predict the output of the following JavaScript code.
Choose the correct JavaScript syntax to change the content of the following HTML code.
asked
Feb 27, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which one of the following is not an automation testing framework/tool?
Which one of the following is not an automation testing framework/tool? 1. Selenium 2. Cypress 3. Protractor 4. Angular...
asked
Jul 11, 2021
in
Education
by
JackTerrance
automa
0
votes
Q: Which one of the following is not a Value Theme?
Which one of the following is not a Value Theme? (1)Value Articulation (2)Value Commitment (3)Value Delivery (4)Value Discovery...
asked
Sep 21, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following security activities is carried out during the coding phase?
Which of the following security activities is carried out during the coding phase? 1. Security Architecture review 2. All the options 3. Environment hardening 4. Core Inspections...
asked
Oct 28, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is true about the management of conflicts of interest?
Which of the following is true about the management of conflicts of interest?...
asked
Nov 29, 2020
in
Technology
by
Editorial Staff
interview-question-answer
technology-questions-answers
0
votes
Q: For any structured document, _____ defines a standard set of objects
For any structured document, _____ defines a standard set of objects 1. XML DOM 2. HTML DOM 3. Core DOM...
asked
Feb 26, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
Page:
« prev
1
2
3
4
5
6
7
...
667
next »
...