Technology Questions

Q:

Spyware can result in all of the following except

A) Control over a device B) Tracking users
C) Gathering personal information D) Save duplicate files
 
Answer & Explanation Answer: D) Save duplicate files

Explanation:

Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge

 

Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

Report Error

View Answer Report Error Discuss

Filed Under: Application Development
Exam Prep: AIEEE , Bank Exams
Job Role: Analyst , Bank Clerk , Bank PO

3 9231
Q:

In which of the following we cannot overload the function?

A) return function B) caller
C) called function D) none of the mentioned
 
Answer & Explanation Answer: A) return function

Explanation:

While overloading the return function, it will rise a error, So we can’t overload the return function.

Report Error

View Answer Report Error Discuss

Filed Under: C++

2 9153
Q:

What are the support tickets given in SAP fico module? please give some examples.

Answer

Support tickets are basically the problems that arise in day to day usage of SAP. 


So any sap fico consultant who is resolving the day to day production issues is actually supporting the tickets.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP

7 9095
Q:

What is passive topology?

Answer

When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way.


Example forpassive topology - linear bus.

Report Error

View answer Workspace Report Error Discuss

5 9078
Q:

What is the use of SYSPRINT, SYSIN, DUMMY in JCL ?

Answer

SYSPRINT: All system output will appear under this DD card. Suppose you are copying a VSAM file using IDCAMS. Then, number of records processed, highest condition code etc.. will appear under sysprint. You cannot customise SYSPRINT output.


SYSIN: This is nothing but SYStem INstruction. Suppose, you want to sort a file on certain key. You have to have following command under SYSIN.


SORT FIELDS = (starting-col,length,data-type,A/D)


SUM FIELDS = NONE


DUMMY: Mainly used where user is intended to simulate a program without creating an output file.

Report Error

View answer Workspace Report Error Discuss

3 9070
Q:

The database schema is written in

A) DDL B) HLL
C) DCL D) DML
 
Answer & Explanation Answer: A) DDL

Explanation:

The database schema is written in DDL. A data definition language or data description language (DDL) is a syntax similar to a computer programming language for defining data structures, especially database schemas.

Report Error

View Answer Report Error Discuss

4 9062
Q:

Which of the following navigator object properties is the same in both Netscape and IE?

A) navigator.appCodeName B) navigator.appName
C) navigator.appVersion D) None of the above
 
Answer & Explanation Answer: A) navigator.appCodeName

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Web Technology

2 8986
Q:

Which method names follow the JavaBeans standard?

A) addSize B) putDimensions
C) getCust D) deleteRep
 
Answer & Explanation Answer: C) getCust

Explanation:

C use the valid prefixes 'get' and 'is

Report Error

View Answer Report Error Discuss

Filed Under: Java

0 8578