chevron_left

Recent posts tagged quiz

3 0 2 min.
Which of the following are methods traffic manager uses to pick endpoints?a) Round Robinb) Performancec) Failover Answer:The answer is : a) Round RobinThe method that Traffic Manager uses to pick endpoints is Round-robin.It is one of the known C...
posted May 22 Tasnia Sultana 73 points
0 1 2 min.
IntroductionArtifical Intelligence is a way which provides a computer to think and learn on its own through the programming.It is a simulation of human intelligence into machines to do the stuff which generally a human can do.John McCarthy invented t...
posted May 6 sanchi 0 points
0 1 2 min.
Which of the following is not considered an advantage of hadoop?fault tolerance.cost effectiveness.scalability.relational structure.flexibility.Answer with explainationHadoop is a open source project by Apache that offers a new way of handing and sto...
posted May 5 sanchi 0 points
0 0 1 min.
Answer with explainationIaaS(Infrastructure as a service) layer is responsible for user authentication in cloud computing. Cloud computing is a very powerful/advanced technology which is the on-demand availiblity of computers resources such as d...
posted May 3 sanchi 0 points
0 2 1 min.
Answer with explainationInternet of things(IOT) can be integrated with separate domains like Big data,Cyber physical systems,cloud storage and cloud computing. IOT connects embedded systems like sensors,softwares etc which embedded in robots,sma...
posted May 2 sanchi 0 points
9 0 1 min.
Answer with explainationNotification Hubs is a push notification service of Azure. It is offered under Microsoft Azure’s public cloud service offerings.These software engines are conceived with the aim to alert users about new co...
posted May 1 sanchi 0 points
14 0 1 min.
Answer with explainationService workers are the core technologies used in background of a browser.It is a kind of script running in the background of any browser.It is separate from the web page and opens a door features that don’t require...
posted May 1 sanchi 0 points
0 0 2 min.
MEAN Stack It is an acronym of a web framework. An IT industry professional who works on a collection of JavaScript technologies to develop web applications is called a MEAN stack developer.The core components related to mean stack are :&nb...
posted Apr 30 sanchi 0 points
0 0 1 min.
Answer with explainationThe intersection of a column and row in a table is called Cell.This is also known as spreadsheet.In other words,in a table rows are horizontal collection of cells and column are vertical collection of cells.Every workshee...
posted Apr 29 sanchi 0 points
0 0 1 min.
Answer with explainationThe first line of the function definition is called function header.Rest is called body. Header is the part of the function which the most initial line in a function.It can be assumed as the heading of a function giving a...
posted Apr 29 sanchi 0 points
0 0 4 min.
Q: What type of file which contains the C# code for a web form is the:A). code-behind file  B). aspx file  C). assembly file  D). DLL file.Answer: A). code-behind file.Q: C#, C++, C, and Java use the symbol ____ as ...
posted Feb 8 usman 0 points
0 0 6 min.
Q: Does AJAX allows you to create websites that never need to refresh?Answer: No/False.Q: â€˜Achilles and Ajax playing a dice game‘ is best described as an example of______.Answer: Greek pottery pain...
posted Feb 8 usman 0 points
0 0 6 min.
Q: ________ can be used as pointers?A). Array names B). Numeric constants C). Punctuation marks D.) All of these E). None of theseAnswer: A). Array names.Q: Pointers cannot be used to____ ?A). Find the address of a variable in memory. B). R...
posted Feb 3 usman 0 points
0 0 2 min.
Click Here For Part 1Q46. Which of the following translates and executes instructions in a programming language? A. A compiler B. A text editor C. A loader D. An interpreterAnswer:An interpreterQ47. The following pseudocode algorithm has an error. Th...
posted Jan 21 Lalit Kumar 0 points
0 0 7 min.
Q1. Which of the following characteristics relates to the term algorithm?Answer:A set of rules and procedures-usually mathematical in nature-that can define how the encryption and decryption processes operateQ2. Which type of symmetric algorithm oper...
posted Jan 21 Lalit Kumar 0 points
0 0 9 min.
Q1. Which of the following provides a visual representation of the patterns of an algorithm? a) Flow analysis b) Flowchart c) Pseudocode d) Gantt chartAnswers:FlowchatQ2. If using the MD5 hashing algorithm, what is the length to which each message is...
posted Jan 21 Lalit Kumar 0 points
0 0 4 min.
Q1. What is the simplest and least expensive of external drive arrays?Answer:JBODQ2.The ____ loop is particularly useful when processing arrays.Answer:forQ3. By using the same ________ you can build relationships between data stored in two or more ar...
posted Jan 21 Lalit Kumar 0 points
0 0 8 min.
Q1. Which of the following commands lets you display a label on multiple lines within a cell?Answer:Wrap TextQ2. In the formula =ROUND(D4:F4,0), what does the zero indicate?Answer:The number of the decimal places in the rounded numberQ3. You can edit...
posted Jan 21 Lalit Kumar 0 points
0 0 7 min.
Q1. Which of the following happens when you enter the formula =G15 into a cell? Excel recalculates all formulas in the worksheet Excel assigns the sum of the values in the previous 15 cells to the active cell Excel assigns the value in cell G15 to th...
posted Jan 21 Lalit Kumar 0 points
0 0 9 min.
Q1. What would you enter at the command prompt to start a new Bourne-again shell (bash) session?Answer:bash Explanation The bash command opens a Bourne-again sheel (bash) session. The Bourne-again shell (bash) is the standard shell used in most Linux...
posted Jan 21 Lalit Kumar 0 points