Hi Guest 1 HomePage 1 Jobs 1 WalkIn 1Articles  

 :) Latest Topic
general knowledge
ASP.NET
VB.NET
SQL Query
UDDI
CLASS
JavaScript Questions
SharePoint Interview
SilverLight
WCF
 Devops
 :) Topic of Day
 
 :) Hot Jobs
ASP.NET Developer(2-5 years)(Location:-Gurgaon(http://www.amadeus.co.in))

Software Developer(0-3 years)(Location:-ZENITH SERVICE.Plot 2N-67 BUNGALOW PLOT NEAR 2-3 CHOWK, NEAR APOORVA NURSING HOME N.I.T. FARIDABAD)

Dot Net Developer(6-7 years)(Location:-Chennai)

Software Developer(3-8 years)(Location:-Bengaluru/Bangalore)

 :)
 :) Most Searchable
 
50 Latest questions on Azure

__________ aids in identifying associations, correlations, and frequent patterns in data.

What is Gulpjs and some multiple choice questions on Gulp

Derived relationships in Association Rule Mining are represented in the form of __________.

Cassandra Interview Questions Part

More 53 questions on azure

__________statistics provides the summary statistics of the data.

Descriptive statistics is used in __________ datasets.

Classification problems aid in predicting __________ outputs.

Identify the algorithm that works based on the concept of clustering.

Conversation where ordering a Sandwich through a bot and the bot completing the activity successfully is a ____________

Which among the following is/are (an) Ensemble Classifier?

__________ step of KDD process helps in identifying valuable patterns.

BPM interacts through the _______________ layer.

Clustering process works on _________ measure.


  

 
_________ testing strategy involves feeding malformed inputs to a software. View:-138
Question Posted on 17 Feb 2021

_________ testing strategy involves feeding malformed inputs to a software.
Choose the correct option fro....
ADS Posted In : Devops | Devops Security


Which of the following is the desirable characteristic of a useful monitoring framework? View:-261
Question Posted on 16 Feb 2021

Which of the following is the desirable characteristic of a useful monitoring framework?
Choose the corre....
ADS Posted In : Devops | Devops Security


_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks. View:-184
Question Posted on 15 Feb 2021

_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.
Choose....
ADS Posted In : Devops | Devops Security


RASP works as a network device. View:-155
Question Posted on 13 Feb 2021

RASP works as a network device.
Choose the correct option from below list
(1)True
(2)False
<....
ADS Posted In : Devops | Devops Security


In the AppSec pipeline, the first phase, intake process, is also known as ___________. View:-210
Question Posted on 11 Feb 2021

In the AppSec pipeline, the first phase, intake process, is also known as ___________.
Choose the correct....
ADS Posted In : Devops | Devops Security


DAST is independent of programming languages. View:-252
Question Posted on 09 Feb 2021

DAST is independent of programming languages.
Choose the correct option from below list
(1)False
....
ADS Posted In : Devops | Devops Security


_________ simulates failure by randomly terminating clusters. View:-217
Question Posted on 08 Feb 2021

_________ simulates failure by randomly terminating clusters.
Choose the correct option from below list <....
ADS Posted In : Devops | Devops Security


How many distinct areas does the AppSec pipeline comprise? View:-183
Question Posted on 07 Feb 2021

How many distinct areas does the AppSec pipeline comprise?
Choose the correct option from below list
....
ADS Posted In : Devops | Devops Security


Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes? View:-331
Question Posted on 05 Feb 2021

Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment process....
ADS Posted In : Devops | Devops Security


What is the practice of testing the production environment continuously with different types of failure scenarios called? View:-253
Question Posted on 04 Feb 2021

What is the practice of testing the production environment continuously with different types of failure scena....
ADS Posted In : Devops | Devops Security


Which of the following security activities is carried out during the coding phase? View:-214
Question Posted on 03 Feb 2021

Which of the following security activities is carried out during the coding phase?
Choose the correct opt....
ADS Posted In : Devops | Devops Security


Threat modeling and data flow diagrams are worked upon in the _________ phase. View:-325
Question Posted on 02 Feb 2021

Threat modeling and data flow diagrams are worked upon in the _________ phase.
Choose the correct option ....
ADS Posted In : Devops | Devops Security


________ procedure involves integrating secure development practices and methodologies into development and deployment processes that enforce DevOps. View:-326
Question Posted on 01 Feb 2021

________ procedure involves integrating secure development practices and methodologies into development and d....
ADS Posted In : Devops | Devops Security


In DevSecOps, security-related activities are the sole responsibility of the security team. View:-360
Question Posted on 30 Jan 2021

In DevSecOps, security-related activities are the sole responsibility of the security team.
Choose the co....
ADS Posted In : Devops | Devops Security


DevSecOps encourages creativity and experimentation. View:-527
Question Posted on 29 Jan 2021

DevSecOps encourages creativity and experimentation.
Choose the correct option from below list
(1)Fal....
ADS Posted In : Devops | Devops Security


Which is the software development approach that first emphasized on incorporating customer feedback early and often? View:-357
Question Posted on 28 Jan 2021

Which is the software development approach that first emphasized on incorporating customer feedback early and....
ADS Posted In : Devops | Devops Security


____________ software development approach aims to enhance the collaboration between the software development and the IT operations team. View:-200
Question Posted on 27 Jan 2021

____________ software development approach aims to enhance the collaboration between the software development....
ADS Posted In : Devops | Devops Security


____________ adds robust security practices and strategies to traditional DevOps practices. View:-288
Question Posted on 27 Jan 2021

____________ adds robust security practices and strategies to traditional DevOps practices.
Choose the co....
ADS Posted In : Devops | Devops Security


Which phase of DevSecOps emphasizes reliability, performance, and scaling? View:-494
Question Posted on 26 Jan 2021

Which phase of DevSecOps emphasizes reliability, performance, and scaling?
Choose the correct option from....
ADS Posted In : Devops | Devops Security


SAST is also known as ____________. View:-416
Question Posted on 22 Jan 2021

SAST is also known as ____________.
Choose the correct option from below list
(1)Black box testing
ADS Posted In : Devops | Devops Security


In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application through softwa View:-371
Question Posted on 22 Jan 2021

In ________ type of IT setup, developers or operations teams automatically manage and provision the technolog....
ADS Posted In : Devops | Devops Security


In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities? View:-403
Question Posted on 22 Jan 2021

In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?
Choose the c....
ADS Posted In : Devops | Devops Security


In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test. View:-333
Question Posted on 21 Jan 2021

In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either....
ADS Posted In : Devops | Devops Security


SAST requires the application to be running. View:-367
Question Posted on 21 Jan 2021

SAST requires the application to be running.
Choose the correct option from below list
(1)False
(....
ADS Posted In : Devops | Devops Security


_______ helps in meditating multi-availability zone residency regularly. View:-383
Question Posted on 20 Jan 2021

_______ helps in meditating multi-availability zone residency regularly.
Choose the correct option from b....
ADS Posted In : Devops | Devops Security


The ________ phase highlights the shift left velocity and involves choosing security tools and solutions that integrate within the developer environme View:-742
Question Posted on 20 Jan 2021

The ________ phase highlights the shift left velocity and involves choosing security tools and solutions that....
ADS Posted In : Devops | Devops Security


Static Application security testing can be used to uncover issues related to operational deployment. View:-881
Question Posted on 19 Jan 2021

Static Application security testing can be used to uncover issues related to operational deployment.
Choo....
ADS Posted In : Devops | Devops Security


Which phase involves checking the signature of binaries? View:-455
Question Posted on 19 Jan 2021

Which phase involves checking the signature of binaries?
Choose the correct option from below list
(1....
ADS Posted In : Devops | Devops Security


_________ approach aims to include security in each phase of the development cycle. View:-357
Question Posted on 18 Jan 2021

_________ approach aims to include security in each phase of the development cycle.
Choose the correct op....
ADS Posted In : Devops | Devops Security


Which of the following can be used to ensure the security of the CI/CD pipeline? View:-175
Question Posted on 18 Jan 2021

Which of the following can be used to ensure the security of the CI/CD pipeline?
Choose the correct optio....
ADS Posted In : Devops | Devops Security


An AppSec pipeline applies the principle of _________ into the application security program. View:-511
Question Posted on 18 Jan 2021

An AppSec pipeline applies the principle of _________ into the application security program.
Choose the c....
ADS Posted In : Devops | Devops Security


In modern software development, a large portion of code is reused from open source and third-party libraries. View:-525
Question Posted on 18 Jan 2021

In modern software development, a large portion of code is reused from open source and third-party libraries.....
ADS Posted In : Devops | Devops Security


1 2
 
  
 :) Categoriese
BigData(344)
HDP | CDH | Data Lakes | CouchDB | Hadoop | Cassandra | MongoDB | Hive | Cassandra Data Handling | MapReduce | Riak | NoSQL Database Revolution | Apache NiFi | Cognos | NoSQL Gnosis | Apache Pig | BigData Faq | Power BI | YARN | MongoDB Perpetuus |

Science Techonlogy(10)
Physics | Biology | Chemistry Questions | Fun Facts |

SEO(2)
Ranking | Keywords | SEO Tools | Searches | SEO Tips |

Agile(25)
Beginners | Agile Questions | Scrum | Kanban | Agile manifesto | Agile Teams | Agile methodology | Agile Model | Agile process | Agile Project |

Mathematics(1)
Complex numbers | Problem Solving | Regression | Algebra |

Server(24)
Rack | Nginx | Mainframe | Application | Dedicated | Mail | Blade |

Education(434)
Linear Algebra | Data Visualization | Cybersecurity | Enlightenment Machine Learning | Conversational Systems | Authentication | ML Exploring the Model | docker container orcas | Secure Programming | Wireframing | Birst | Art of Cryptography | Bitcoin | Digital Primer | Redux Async | Service Discovery | Data Analysis | Telemarketing | Full Stack Developer | Ingression Deep Learning | EMC | Kibana Data Exquisites | Statistics and Probability | Threat Modeling |

CMS(6)
CodeIgniter | Typo3 | WordPress | Magento | Joomla | Drupal | Phalcon | Symphony | Laravel | CakePHP | Zend | Opencart | VirtueMart | Kohana | Neos | October | Webmull | SilverStripe |

Software(86)
Easy Git | Fossil | monotone | CVS | Bazaar | Darcs | Perforce | Veracity | TFS | Pijul | BitKeeper | Mercurial | Apache SVN | Git | Secure Code Review | Tibco | Blue Prism |

Microsoft InfoPath(4)
Development | InfoPath Basics |

Repository Questions(99)
Git Questions | Git Slack Integration | Bitbucket | Prodigious Git | Artifactory |

TPF(2)
TPF Questions | Galileo |

Cloud(32)
AWS | Google Cloud | IBM Cloud | Oracle Cloud | SaaS | PaaS | laaS | Private Cloud | Hybrid Cloud | AWS Essentials | Public Cloud |

Frameworks(306)
Bootstrap Framework | Xamarin | JSF | Django Web Framework | Spring | IONIC | Workfusion SPA | Jest | WCF | WPF | Apache Drill | PyTorch | Microsoft Bot Framework | Flutter |

Placement Paper(10)
HCL Papers | TCS Papers | Group Discussion | Wipro Papers | SAP Company | Accenture Paper | CTS | IBM |

Government Private Jobs(5)
SBI Bank PO | IDBI Bank | Bank Interview |

API(36)
Mobile Testing Qsn | PySpark | PouchDB | API Questions |

Tutorial(84)
HTML | C Language | Regex | SQL | AngularJS |

Programming Languages(97)
C | Perl | COBOL | Pascal | FORTRAN | BASIC | Ada | C++ | Scala | Machine Learning Axioms | TypeScript | Swift | Matplotlib | Phython | R Basic | Ruby | Julia | LUA | Go |

PowerShell(8)
PowerShell | Powershell Script |

Operating System(0)
Linux | Unix |

Tools(343)
JIRA | UI Design | Automatix | Tableau The Prequel | Tableau The Sequel | Automation with Grunt | APIGEE API Services | Hcatalog | Gradle | K8s | Maven | ECMAScript |

DotNet(408)
Entity Framework | RDLC | MVC | LINQ | C# | Cache | ADO.NET | ASP.NET | VB.NET |

DataBase(414)
SQL Query | sql questions | MySQL | DBMS | DataWarehousing | SQL DBA Questions | Oracle Faq | SQL Certification | SQLite | Blockchain | Data Mining Nostos | Redis | NoSQL | Data Mining | SSIS | Structured Data Classification | DataBase Term |

WebServices(3)
WebServices | UDDI |

OOPS(9)
CLASS | Functions | oops questions |

WEB(292)
CSS | JQuery | VBScript | IIS Questions | Cloud Computing | AJAX | Wamp Server | Onsen UI | NativeScript | Regex Questions | HTML5 | JSON | Node.js | Bundling With Webpack | BackboneJS | HTML Questions | Web Security | | Handlebars.js | Styling With CSS3 |

SharePoint(41)
SharePoint Interview | Powershell Questions | SharePoint SourceCode |

SilverLight(7)
SilverLight |

Artificial Intelligence(25)
MFDM |

Java(72)
Java Questions | Java8 Innards | Core Java | beans | Swing | Struts | Servlet | J2EE | EJB | Hibernate | JDBC | JSP |

Gernal Knowledge(22)
general knowledge | Interview Questions | Logical Puzzle | Verbal Analogies | Number Puzzle |

PHP(35)
Example | PHP Questions |

Biztalk(0)
Biztalk Questions |

Testing(76)
Testing Questions | Manual | Automation | Selenium | Bugzilla | SonarQube | JS Qualis | SAP Testing | Agile Testing | Mobile Testing | Database Testing | LoadRunner Testing | Manual Testing | JMeter | Jenkins |

SAP(23)
SAP FICO | SAP BODS | SAP Basic | HBase | SAP Hana | SAP HR | SAP Payroll | SAP BI | SAP ABAP | FICO | SAP MM | SAP | SAP Interview |

HR(11)
HR Questions | Interview Tips |

XML(8)
Xml Questions | SVG |

Test and Papers(185)
Continuous deployment | Weaveworks | IAS Panel | Continuous Integration with Jenkins | Blockchain Potentes Nexus | Ansible Automation Sibelius | Aptitude Test | Puzzle | Logical Reasoning | Mathematical Rules | Continuous Integration | Ansible | Bower | Deep Learning | Docker | Microservices | Spark SQL | Gulp | Azure |

Android(16)
Android Interview Questions |

Python Programming(18)
Stats with Python | NLP Using Python | Python Pandas |

Applications(43)
Kafka Premiera Ola |

Trending Technologies(0)
CAT |

Apache Hadoop(49)
PhoneGap |

Angular(94)
Robotics |

JavaScript(92)
Apache Knox | Hadoop Security |

Networking(1)
AngularJS Packaging and Testing | Angular 2 Building Blocks | Angular Routes and Forms | Angular FAQ |

Competitive Exams(1)
ReactJS | JavaScript Questions | React Native |

Mobile APP(29)
DevOps Culture | Devops Security | Devops |

Devops(62)
Firewall | Network Security |

 :) Most Visited Questions

Continuous Integration Questions Answers
Below are the 20 odd questions for CI or Continuous Integra More...


Deep Learning Questions Answers
Below are the different Deep Leaning Questions and answer a More...


Microservices Architecture Questions Answers
Below are the different questions on Microservices Architec More...


cache Interview Questions Part1
cache Interview Questions (1)A cache is a ______________. More...


Multiple choice questions on Javascript
Below are the most common JavaScript questions that are ask More...

Top Searches:asp net questions vb net questions sql query uddl questions class javascript Questions sharepoint interview questions and concept silverlight questions and concept wcf questions beans general knowledge ajax questions
PHP | Biztalk | Testing | SAP | HR |