Technology Questions

Q:

PHP allows you to send emails directly from a script.

php allows you to send emails directly from a script

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:

The mail() function allows you to send emails directly from a script.


 

Report Error

View Answer Workspace Report Error Discuss

Subject: PHP
Exam Prep: Bank Exams
Job Role: IT Trainer , Project Manager , Software Architect

2 2708
Q:

Which HTML attribute is used to define inline styles?

 

A) <header> B) <strong>
C) <style> D) <alt>
 
Answer & Explanation Answer: C) <style>

Explanation:

The style attribute specifies an inline style for an element. The style attribute will override any style set globally,

 

e.g. styles specified in the <style> tag or in an external style sheet.

 

Report Error

View Answer Report Error Discuss

Filed Under: Web Technology
Exam Prep: Bank Exams

2 2498
Q:

Comments are

A) Explain program logic B) Non Executable statements in program
C) Both A & B D) Executable statements in program
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Comments are Non Executable statements in program & Explain program logic.

Report Error

View Answer Report Error Discuss

Filed Under: Application Development
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO

2 1306
Q:

What is meant by a dedicated computer?

A) Which is assigned one and only one task B) Which is meant for application software
C) Which is used by one person only D) Which uses one kind of software
 
Answer & Explanation Answer: A) Which is assigned one and only one task

Explanation:

What_is_meant_by_a_dedicated_computer1560341069.jpg image

It is a single computer in a network reserved for serving the needs of the network.

Report Error

View Answer Report Error Discuss

0 1233
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

0 2664
Q:

A data warehouse is composed of

A) current data B) internal and external data sources
C) historical data from legacy systems D) historical & current data
 
Answer & Explanation Answer: C) historical data from legacy systems

Explanation:

A data warehouse is a relational database that is designed for query and analysis rather than transaction processing. It usually contains historical data that is derived from transaction data, but it can include data from other sources. Data warehouses are designed to help you analyze your data.

Report Error

View Answer Report Error Discuss

Filed Under: Oracle
Job Role: Database Administration , IT Trainer

0 1784
Q:

Which command displays memory usage in linux?

A) Top B) Free
C) Buffer D) Swap
 
Answer & Explanation Answer: B) Free

Explanation:

Free command displays memory usage in linux.

Report Error

View Answer Report Error Discuss

3 1737
Q:

Which input type defines a slider control?

A) type B) source
C) aside D) body
 
Answer & Explanation Answer: A) type

Explanation:

The input type attribute TYPE defines the slider control.

Report Error

View Answer Report Error Discuss

Filed Under: Application Development
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO

0 1502