Most viewed questions

0 votes
    Web Crawler is an example of______. Intelligent Agent Problem-solving agent Simple reflex agent Model-based agent...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    Default HTML template engine in Spring Boot? 1. JSP 2. HTML 3. Thymeleaf 4. None of the Above...
asked Jul 8, 2021 in Education by JackTerrance
0 votes
    In ethical hacking and cyber security, there are _______ types of scanning: 1 2 3 4...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Testing can be done effectively only on a system connected to the internet. 1) False 2) True...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Which is the software development approach that first emphasized on incorporating customer feedback early and often? A. Agile B. DevOps C. Waterfall D. Lean...
asked Oct 27, 2020 by JackTerrance
0 votes
    Which of the following is the most widely used external memory data structure? 1) AVL tree 2) B-tree 3) Red-black tree 4) Both AVL tree and Red-black tree...
asked Dec 23, 2020 in Technology by JackTerrance
0 votes
    Which of the following approaches to testing is most appropriate when the results are expected to be precise? Many at a time One at a time...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Which AI technique enables the computers to understand the associations and relationships between objects and ... Processing Cognitive Science Relative Symbolism Pattern Matching...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    It is Mandatory that the doctype declaration is the first line of every HTML5 Page. 1. True 2. False...
asked Apr 10, 2021 in Education by JackTerrance
0 votes
    Which one of the following usually used in the process of Wi-Fi-hacking? Aircrack-ng Wireshark Norton All of the above...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    _____________ is used to define the instructions for performing a business process. 1. Process recorder 2. Developer Tool 3. Robot Controller...
asked Aug 30, 2021 in Technology by JackTerrance
0 votes
    In the TSP problem of n cities, the time taken for traversing all cities, without having prior knowledge of the length of the minimum tour will be_______. O(n) O(n2) O(n!) O(n/2)...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    An Agile team has two characteristics...
asked Nov 30, 2020 in Technology by Editorial Staff
0 votes
    _______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’. Intrusion Detection Systems Anti-virus Firewall Anti-malware...
asked Oct 25, 2020 by JackTerrance
0 votes
    The PEAS in the task environment is about____________. Peer, Environment, Actuators, Sense Performance, Environment, ... , Environment, Actuators, Sensors None of the above...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    He saw me by chance and……….the car. (a) stop (b) stopped (c) stops (d) was stopping...
asked Jan 3, 2021 in Education by JackTerrance
0 votes
    A decrease in variability leads to an increase in...
asked Nov 30, 2020 in Technology by Editorial Staff
0 votes
    Dynamic Application Security testing is also known as __________. 1.Grey box testing 2. White box testing 3. Black box testing...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    In the AppSec pipeline, the first phase, intake process, is also known as ___________. 1. In point 2. In tunnel 3. Request phase 4. First impression...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    In which of the following, a person is constantly followed/chased by another person or group of several peoples? Phishing Bulling Stalking Identity theft...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines?...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    In system hacking, which of the following is the most crucial activity? Information gathering Covering tracks Cracking passwords None of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Predict the output of the following JavaScript code.
    Choose the correct JavaScript syntax to change the content of the following HTML code.

asked Feb 27, 2021 in Technology by JackTerrance

0 votes
    Which one of the following is not an automation testing framework/tool? 1. Selenium 2. Cypress 3. Protractor 4. Angular...
asked Jul 11, 2021 in Education by JackTerrance
0 votes
    Which one of the following is not a Value Theme? (1)Value Articulation (2)Value Commitment (3)Value Delivery (4)Value Discovery...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    Which of the following security activities is carried out during the coding phase? 1. Security Architecture review 2. All the options 3. Environment hardening 4. Core Inspections...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Which of the following is true about the management of conflicts of interest?...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    For any structured document, _____ defines a standard set of objects 1. XML DOM 2. HTML DOM 3. Core DOM...
asked Feb 26, 2021 in Technology by JackTerrance
...