Hi Guest 1 HomePage 1 Jobs 1 WalkIn 1Articles  

 :) Latest Topic
general knowledge
ASP.NET
VB.NET
SQL Query
UDDI
CLASS
JavaScript Questions
SharePoint Interview
SilverLight
WCF
 Devops
 :) Topic of Day
 
 :) Hot Jobs
ASP.NET Developer(2-5 years)(Location:-Gurgaon(http://www.amadeus.co.in))

Software Developer(0-3 years)(Location:-ZENITH SERVICE.Plot 2N-67 BUNGALOW PLOT NEAR 2-3 CHOWK, NEAR APOORVA NURSING HOME N.I.T. FARIDABAD)

Dot Net Developer(6-7 years)(Location:-Chennai)

Software Developer(3-8 years)(Location:-Bengaluru/Bangalore)

 :)
 :) Most Searchable
 
cache Interview Questions Part1

Multiple choice questions on Javascript

What is Gulpjs and some multiple choice questions on Gulp

The basic purpose of the toLocaleString() is to _________

More 53 questions on azure

__________ aids in identifying associations, correlations, and frequent patterns in data.

__________ step of KDD process helps in identifying valuable patterns.

Cassandra Interview Questions Part

Which of the following strategies have higher control on sites/pages getting listed in Google SERPs?

What do you think Go is a case sensitive language?

The following are tools offered by deepnet platforms, except __________.

Classification problems aid in predicting __________ outputs.

__________statistics provides the summary statistics of the data.

Descriptive statistics is used in __________ datasets.

Conversation where ordering a Sandwich through a bot and the bot completing the activity successfully is a ____________


 :) Quiz System
Computer Quiz
Science Quiz
Banking Quiz
Sports Quiz
GK Quiz


  

 
_________ testing strategy involves feeding malformed inputs to a software. View:-2577
Question Posted on 17 Feb 2021

_________ testing strategy involves feeding malformed inputs to a software.
Choose the correct option fro....
ADS Posted In : Devops | Devops Security


Which of the following is the desirable characteristic of a useful monitoring framework? View:-2897
Question Posted on 16 Feb 2021

Which of the following is the desirable characteristic of a useful monitoring framework?
Choose the corre....
ADS Posted In : Devops | Devops Security


_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks. View:-2209
Question Posted on 15 Feb 2021

_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.
Choose....
ADS Posted In : Devops | Devops Security


_________ simulates failure by randomly terminating clusters. View:-2706
Question Posted on 08 Feb 2021

_________ simulates failure by randomly terminating clusters.
Choose the correct option from below list <....
ADS Posted In : Devops | Devops Security


________ procedure involves integrating secure development practices and methodologies into development and deployment processes that enforce DevOps. View:-2282
Question Posted on 01 Feb 2021

________ procedure involves integrating secure development practices and methodologies into development and d....
ADS Posted In : Devops | Devops Security


DevSecOps encourages creativity and experimentation. View:-3108
Question Posted on 29 Jan 2021

DevSecOps encourages creativity and experimentation.
Choose the correct option from below list
(1)Fal....
ADS Posted In : Devops | Devops Security


Which is the software development approach that first emphasized on incorporating customer feedback early and often? View:-2537
Question Posted on 28 Jan 2021

Which is the software development approach that first emphasized on incorporating customer feedback early and....
ADS Posted In : Devops | Devops Security


Threat modeling and data flow diagrams are worked upon in the _________ phase. View:-2933
Question Posted on 02 Feb 2021

Threat modeling and data flow diagrams are worked upon in the _________ phase.
Choose the correct option ....
ADS Posted In : Devops | Devops Security


In DevSecOps, security-related activities are the sole responsibility of the security team. View:-2517
Question Posted on 30 Jan 2021

In DevSecOps, security-related activities are the sole responsibility of the security team.
Choose the co....
ADS Posted In : Devops | Devops Security


____________ adds robust security practices and strategies to traditional DevOps practices. View:-2195
Question Posted on 27 Jan 2021

____________ adds robust security practices and strategies to traditional DevOps practices.
Choose the co....
ADS Posted In : Devops | Devops Security


In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test. View:-2252
Question Posted on 21 Jan 2021

In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either....
ADS Posted In : Devops | Devops Security


Which of the following can be used to ensure the security of the CI/CD pipeline? View:-2091
Question Posted on 18 Jan 2021

Which of the following can be used to ensure the security of the CI/CD pipeline?
Choose the correct optio....
ADS Posted In : Devops | Devops Security


_________ approach aims to include security in each phase of the development cycle. View:-2920
Question Posted on 18 Jan 2021

_________ approach aims to include security in each phase of the development cycle.
Choose the correct op....
ADS Posted In : Devops | Devops Security


____________ software development methodology characterizes security as a primary consideration throughout the processes of development and delivery o View:-3029
Question Posted on 18 Jan 2021

____________ software development methodology characterizes security as a primary consideration throughout th....
ADS Posted In : Devops | Devops Security


An AppSec pipeline applies the principle of _________ into the application security program. View:-2825
Question Posted on 18 Jan 2021

An AppSec pipeline applies the principle of _________ into the application security program.
Choose the c....
ADS Posted In : Devops | Devops Security


Which phase involves checking the signature of binaries? View:-2993
Question Posted on 19 Jan 2021

Which phase involves checking the signature of binaries?
Choose the correct option from below list
(1....
ADS Posted In : Devops | Devops Security


In modern software development, a large portion of code is reused from open source and third-party libraries. View:-3117
Question Posted on 18 Jan 2021

In modern software development, a large portion of code is reused from open source and third-party libraries.....
ADS Posted In : Devops | Devops Security


What is the practice of testing the production environment continuously with different types of failure scenarios called? View:-2696
Question Posted on 04 Feb 2021

What is the practice of testing the production environment continuously with different types of failure scena....
ADS Posted In : Devops | Devops Security


In the DevSecOps, during which phase of the development cycle are the security aspects considered? View:-2855
Question Posted on 17 Jan 2021

In the DevSecOps, during which phase of the development cycle are the security aspects considered?
Choose....
ADS Posted In : Devops | Devops Security


Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes? View:-2819
Question Posted on 05 Feb 2021

Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment process....
ADS Posted In : Devops | Devops Security


In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities? View:-4268
Question Posted on 22 Jan 2021

In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?
Choose the c....
ADS Posted In : Devops | Devops Security


SAST is also known as ____________. View:-2871
Question Posted on 22 Jan 2021

SAST is also known as ____________.
Choose the correct option from below list
(1)Black box testing
ADS Posted In : Devops | Devops Security


RASP works as a network device. View:-2605
Question Posted on 13 Feb 2021

RASP works as a network device.
Choose the correct option from below list
(1)True
(2)False
<....
ADS Posted In : Devops | Devops Security


In the AppSec pipeline, the first phase, intake process, is also known as ___________. View:-4936
Question Posted on 11 Feb 2021

In the AppSec pipeline, the first phase, intake process, is also known as ___________.
Choose the correct....
ADS Posted In : Devops | Devops Security


DAST is independent of programming languages. View:-2685
Question Posted on 09 Feb 2021

DAST is independent of programming languages.
Choose the correct option from below list
(1)False
....
ADS Posted In : Devops | Devops Security


How many distinct areas does the AppSec pipeline comprise? View:-2304
Question Posted on 07 Feb 2021

How many distinct areas does the AppSec pipeline comprise?
Choose the correct option from below list
....
ADS Posted In : Devops | Devops Security


____________ software development approach aims to enhance the collaboration between the software development and the IT operations team. View:-1596
Question Posted on 27 Jan 2021

____________ software development approach aims to enhance the collaboration between the software development....
ADS Posted In : Devops | Devops Security


_______ helps in meditating multi-availability zone residency regularly. View:-2671
Question Posted on 20 Jan 2021

_______ helps in meditating multi-availability zone residency regularly.
Choose the correct option from b....
ADS Posted In : Devops | Devops Security


In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application through softwa View:-2376
Question Posted on 22 Jan 2021

In ________ type of IT setup, developers or operations teams automatically manage and provision the technolog....
ADS Posted In : Devops | Devops Security


SAST requires the application to be running. View:-2632
Question Posted on 21 Jan 2021

SAST requires the application to be running.
Choose the correct option from below list
(1)False
(....
ADS Posted In : Devops | Devops Security


Which of the following security activities is carried out during the coding phase? View:-2636
Question Posted on 03 Feb 2021

Which of the following security activities is carried out during the coding phase?
Choose the correct opt....
ADS Posted In : Devops | Devops Security


The ________ phase highlights the shift left velocity and involves choosing security tools and solutions that integrate within the developer environme View:-3671
Question Posted on 20 Jan 2021

The ________ phase highlights the shift left velocity and involves choosing security tools and solutions that....
ADS Posted In : Devops | Devops Security


1 2
 
  
 :) Categoriese
BigData(353)
HDP | CDH | Data Lakes | CouchDB | Hadoop | Cassandra | MongoDB | Hive | Cassandra Data Handling | MapReduce | Riak | NoSQL Database Revolution | Apache NiFi | Cognos | NoSQL Gnosis | Apache Pig | BigData Faq | Power BI | YARN | MongoDB Perpetuus |

Science Techonlogy(38)
Science Quiz | Physics | Biology | Chemistry Questions | Fun Facts |

SEO(4)
Ranking | Keywords | SEO Tools | Searches | Keyword Research | Mobile SEO | Technical SEO | SEO Tips |

Agile(52)
Beginners | Agile Questions | Scrum | Kanban | Agile manifesto | Agile Teams | Agile methodology | Agile Model | Agile process | Agile Project |

Mathematics(12)
Complex numbers | Problem Solving | Regression | Algebra | Math Quiz |

Server(24)
Rack | Nginx | Mainframe | Application | Dedicated | Mail | Blade |

Education(525)
Linear Algebra | Data Visualization | Cybersecurity | ML Exploring the Model | Enlightenment Machine Learning | Conversational Systems | Authentication | docker container orcas | Secure Programming | Wireframing | Birst | Art of Cryptography | Bitcoin | Redux Async | Digital Primer | Service Discovery | Service Deployment Concepts | Digital for Industries | Security Assessment | Leading And Managing Teams | Kibana Data Exquisites | Data Analysis | English Quiz | ServiceNow | Salesforce | EMC | Ingression Deep Learning | Statistics and Probability | Threat Modeling | Apache Druid | Telemarketing | Full Stack Developer | Digital Marketing Primer |

CMS(9)
CodeIgniter | Typo3 | Magento | WordPress | Joomla | Drupal | CakePHP | Zend | Opencart | VirtueMart | Kohana | Neos | October | Webmull | SilverStripe | Phalcon | Symphony |

Software(87)
Perforce | Veracity | TFS | Pijul | BitKeeper | Easy Git | Fossil | monotone | CVS | Bazaar | Darcs | Mercurial | Apache SVN | Git | Secure Code Review | Tibco | Kibana | Blue Prism |

Microsoft InfoPath(4)
Development | InfoPath Basics |

Repository Questions(136)
Rhodecode | SourceForge | Launchpad | Phabricator | Gogs | Beanstalk | GitKraken | Launchpad | AWS CodeCommit | Gitea | GitLab | Git Slack Integration | Git Questions | Bitbucket | Artifactory | Prodigious Git | Interstellar Git |

TPF(2)
TPF Questions | Galileo | Apache Allura |

Cloud(32)
AWS | Google Cloud | IBM Cloud | SaaS | PaaS | laaS | Private Cloud | Hybrid Cloud | AWS Essentials | Public Cloud |

Frameworks(364)
Jest | Workfusion SPA | IONIC | Spring | Xamarin | JSF | Django Web Framework | Laravel | WCF | WPF | RichFaces | Flutter | Spring Boot | Bootstrap Framework | Apache Drill | PyTorch | Seam | Apache Storm | Microsoft Bot Framework |

Placement Paper(10)
HCL Papers | TCS Papers | Group Discussion | Wipro Papers | SAP Company | Accenture Paper | IBM | CTS |

Government Private Jobs(29)
SBI Bank PO | IDBI Bank | Bank Interview | Banking Quiz |

API(37)
API Questions | PySpark | GraphQL | Web API | Mobile Testing Qsn | PouchDB |

Tutorial(84)
C Language | HTML | Regex | SQL | AngularJS |

Programming Languages(177)
C | Perl | COBOL | Pascal | FORTRAN | BASIC | Ada | C++ | Scala | Machine Learning Axioms | TypeScript | Matplotlib | Phython | Swift | Ruby | Go | Julia | LUA | R Basic | Octave |

PowerShell(13)
PowerShell | Powershell Script |

Operating System(1)
Linux | Unix |

Tools(418)
Tableau The Prequel | Tableau The Sequel | Automation with Grunt | APIGEE API Services | Gradle | K8s | JIRA | UI Design | Automatix | Maven | ECMAScript | Hcatalog | Terraform |

DotNet(417)
Entity Framework | ASP.NET | VB.NET | RDLC | MVC | LINQ | C# | Cache | ADO.NET |

DataBase(523)
sql questions | MySQL | DataWarehousing | DBMS | SQL Certification | SQL DBA Questions | SQL Query | SQLite | Data Mining Nostos | Redis | Blockchain | NoSQL | Data Mining | SSIS | Storytelling with Data | Database Security | Teradata | Structured Data Classification | ArangoDB | DataBase Term |

WebServices(44)
Amazon Storage (S3) | UDDI | WebServices |

OOPS(9)
Functions | oops questions | CLASS |

WEB(323)
AJAX | VBScript | IIS Questions | JQuery | Cloud Computing | Regex Questions | HTML5 | Node.js | JSON | Wamp Server | Onsen UI | NativeScript | HTML Questions | Web Security | | Handlebars.js | Bundling With Webpack | BackboneJS | Styling With CSS3 |

SharePoint(41)
Powershell Questions | SharePoint SourceCode | SharePoint Interview |

SilverLight(7)
SilverLight |

Artificial Intelligence(26)
MFDM | Automation Anywhere |

Java(103)
JSP | Java Questions | Java8 Innards | Swing | Struts | Servlet | J2EE | EJB | Hibernate | JDBC | Core Java | beans |

Gernal Knowledge(163)
general knowledge | Interview Questions | Logical Puzzle | Number Puzzle | Verbal Analogies | Sports Quiz | GK Quiz | Aviation |

PHP(37)
Example | PHP Questions |

Biztalk(0)
Biztalk Questions |

Testing(95)
Testing Questions | Manual | Automation | Selenium | Bugzilla | JS Qualis | SonarQube | SAP Testing | Agile Testing | Mobile Testing | Database Testing | LoadRunner Testing | Manual Testing | JMeter | API Testing | TestNG | Risk Based Testing | Jenkins |

SAP(39)
SAP FICO | SAP BODS | SAP Basic | HBase | SAP Hana | SAP HR | SAP Payroll | SAP BI | SAP ABAP | FICO | SAP MM | SAP | SAP Interview |

HR(11)
HR Questions | Interview Tips |

XML(8)
Xml Questions | SVG | XPath |

Test and Papers(188)
Continuous Integration with Jenkins | Blockchain Potentes Nexus | Continuous deployment | Weaveworks | IAS Panel | Ansible Automation Sibelius | Aptitude Test | Puzzle | Logical Reasoning | Mathematical Rules | Continuous Integration | Ansible | Bower | Deep Learning | Docker | Microservices | Spark SQL | Gulp | Azure |

Android(24)
Android Interview Questions |

Python Programming(80)
Stats with Python | NLP Using Python | Python Pandas | Python 3 | Python Questions |

Applications(43)
Kafka Premiera Ola |

Trending Technologies(0)
CAT |

iOS(7)
PhoneGap |

Computer(33)
Robotics | RPA |

Apache Hadoop(49)
Hadoop Security | Apache Knox |

Angular(110)
AngularJS Packaging and Testing | Angular 2 Building Blocks | Angular 8 | Angular Routes and Forms | Angular FAQ |

JavaScript(155)
ReactJS | JavaScript Questions | React Native | JavaScript Quiz | Javascript Code |

Networking(2)
DevOps Culture | DevOpsSec | Devops Security | DevSecOps | Devops |

Style Sheet(11)
Firewall | Network Security |

Quantitative Aptitude(27)
iOS Questions |

BigQuery(39)
SASS | CSS |

Protocol(0)
Average Aptitude | Aptitude Quiz | Reasoning Quiz | Number Quiz |

Application Server(0)
Computer Quiz |

Roles and Responsibilities(0)
Google BigQuery |

Oracle(4)
FTP |

Competitive Exams(1)
Talend |

Mobile APP(29)
JBoss |

Devops(107)
Business Analyst |

ETL(4)
OBIEE | Oracle Faq | Oracle Cloud |

 :) Most Visited Questions

Deep Learning Questions Answers
Below are the different Deep Leaning Questions and answer a More...


Continuous Integration Questions Answers
Below are the 20 odd questions for CI or Continuous Integra More...


Derived relationships in Association Rule Mining are represented in the form of __________.
Derived relationships in Association Rule Mining are repres More...


Microservices Architecture Questions Answers
Below are the different questions on Microservices Architec More...


50 Latest questions on Azure
Below are the latest 50 odd questions on azure. These are m More...

Top Searches:asp net questions vb net questions sql query uddl questions class javascript Questions sharepoint interview questions and concept silverlight questions and concept wcf questions beans general knowledge ajax questions
PHP | Biztalk | Testing | SAP | HR |