• Register

Recent posts tagged questions

6 0 1 min.
Db2 dba interview questions and answers for experienced1) What is the difference between Installation and Migration?A). Installation is the process of preparing DB2 to operate as a z/OS subsystem. Migration is the process of upgrading to a more ...
posted May 22 Sanjana Sagar 499 points
3 0 1 min.
Data is not replicated across multiple data centers in Locally Reductant Storage(LRS)type of storage.Three copies of data are maintained in locally reductant storage.These LRS replication options are cheap and durable but major drawback is that these...
posted May 11 sanchi 100 points
0 0 1 min.
Cloud Computing is widely known for providing servers,storage,various computer resources over the internet.This pay-as-you-go metered service in which you have to pay for those things which you are actually using.This technology enhances the organiza...
posted May 10 sanchi 100 points
0 1 2 min.
There are many protocols which can be used to manage a network securely.Generally these protocols are based on cryptography where encryption and decryption uses special keys or complex functions which made the data accessible for the user.Secure soke...
posted May 9 sanchi 100 points
0 0 1 min.
System and user acceptance testing  are the two different types of software testing.In SDLC cycle(Software development Life Cycle) after software development,testing phase of developed software will start and a tester has enough responsiblity to...
posted May 6 sanchi 100 points
0 1 2 min.
IntroductionArtifical Intelligence is a way which provides a computer to think and learn on its own through the programming.It is a simulation of human intelligence into machines to do the stuff which generally a human can do.John McCarthy invented t...
posted May 6 sanchi 100 points
0 1 2 min.
Which of the following is not considered an advantage of hadoop?fault tolerance.cost effectiveness.scalability.relational structure.flexibility.Answer with explainationHadoop is a open source project by Apache that offers a new way of handing and sto...
posted May 5 sanchi 100 points
0 0 2 min.
Windows allows us to create two diffrent types of users based on their work or requirements.Standard User Account.Administrator Account.There are many diffrences between in these accounts in terms of control,restrictions,accessing etc.Let’s see...
posted May 4 sanchi 100 points
0 0 2 min.
In order to create a empty file/file size is zero bytes in linux,the following below command will be used:$touch file_nameTouch command is used for creating empty file in linux.Just replace your file name with file_name.Touch command is used to ...
posted May 4 sanchi 100 points
0 0 1 min.
Answer with explainationIaaS(Infrastructure as a service) layer is responsible for user authentication in cloud computing. Cloud computing is a very powerful/advanced technology which is the on-demand availiblity of computers resources such as d...
posted May 3 sanchi 100 points
0 2 1 min.
Answer with explainationInternet of things(IOT) can be integrated with separate domains like Big data,Cyber physical systems,cloud storage and cloud computing. IOT connects embedded systems like sensors,softwares etc which embedded in robots,sma...
posted May 2 sanchi 100 points
0 0 2 min.
Answer with explainationThere are following two protocols which are mainly used with hyper text tranfer protocol:-SSL(Secure Sockets Layer)TLS(Transport Layer Security)Without using these cryptographic protocols hyper text tranfer protocol becom...
posted May 2 sanchi 100 points
0 0 1 min.
Answer with explainationIt’s correct answer is Collision Domain. A domain is something a sort of region where all computers devices are registered for the network services.All the activites are controlled by domain controller.Now I will ta...
posted May 2 sanchi 100 points
5 0 1 min.
Answer with explainationNotification Hubs is a push notification service of Azure. It is offered under Microsoft Azure’s public cloud service offerings.These software engines are conceived with the aim to alert users about new co...
posted May 1 sanchi 100 points
14 0 1 min.
Answer with explainationService workers are the core technologies used in background of a browser.It is a kind of script running in the background of any browser.It is separate from the web page and opens a door features that don’t require...
posted May 1 sanchi 100 points
0 0 2 min.
MEAN Stack It is an acronym of a web framework. An IT industry professional who works on a collection of JavaScript technologies to develop web applications is called a MEAN stack developer.The core components related to mean stack are :&nb...
posted Apr 30 sanchi 100 points
0 0 1 min.
Answer with explainationThe intersection of a column and row in a table is called Cell.This is also known as spreadsheet.In other words,in a table rows are horizontal collection of cells and column are vertical collection of cells.Every workshee...
posted Apr 29 sanchi 100 points
0 0 1 min.
Answer with explainationThe first line of the function definition is called function header.Rest is called body. Header is the part of the function which the most initial line in a function.It can be assumed as the heading of a function giving a...
posted Apr 29 sanchi 100 points
0 0 4 min.
Q: What type of file which contains the C# code for a web form is the:A). code-behind file  B). aspx file  C). assembly file  D). DLL file.Answer: A). code-behind file.Q: C#, C++, C, and Java use the symbol ____ as ...
posted Feb 8 usman 120 points
0 0 6 min.
Q: Does AJAX allows you to create websites that never need to refresh?Answer: No/False.Q: â€˜Achilles and Ajax playing a dice game‘ is best described as an example of______.Answer: Greek pottery pain...
posted Feb 8 usman 120 points