Project Manager Questions


Q:

GUI stands for

A) Graphical Universal Interface B) Graph Use Interface
C) Graphical Unique Interface D) Graphical User Interface
 
Answer & Explanation Answer: D) Graphical User Interface

Explanation:

GUI stands for Graphical User Interface.

 

A Graphical User Interface is a computer interface that allows users to interact with a device through graphical elements such as pictures and animations, as opposed to text-based commands.

Report Error

View Answer Report Error Discuss

9 6256
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

9 6247
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

1 6108
Q:

Explain soundex() and metaphone() ?

Answer

soundex()
The soundex() function calculates the soundex key of a string. A soundex key is a four character long alphanumeric string that represent English pronunciation of a word. he soundex() function can be used for spelling applications.
< ?php
$str = "hello";
echo soundex($str);
? >


metaphone()
The metaphone() function calculates the metaphone key of a string. A metaphone key represents how a string sounds if said by an English speaking person. The metaphone() function can be used for spelling applications.
< ?php
echo metaphone("world");
? >

Report Error

View answer Workspace Report Error Discuss

7 5844
Q:

A line is an undefined term because it

Answer

A line is an undefined term because of it :


 


1. Contains an infinite number of points


2. can be used to create other geometric shapes


3. is a term that does not have a formal definition


 


In Geometry, unless it's stated, a line will extend in one dimension and goes on forever in both ways.

Report Error

View answer Workspace Report Error Discuss

17 5691
Q:

The intersection of a column and a row

A) Cell B) Menu
C) Key D) Field
 
Answer & Explanation Answer: A) Cell

Explanation:

The intersection of a column and a row in a spread sheet is called as a cell or a bon.

Report Error

View Answer Report Error Discuss

5 5606
Q:

The depth of a complete binary tree is given by

A) Dn = log 2 (n+1) B) Dn = log 1/2 (n+1)
C) Dn = log (n+1) D) Dn = log 2 (n-1)
 
Answer & Explanation Answer: A) Dn = log 2 (n+1)

Explanation:

A complete binary tree is a binary tree where all the levels have maximum number of nodes except possibly the last level.

 

The depth of complete binary tree of n nodes will be Dn=log 2 (n+1) where Dn is the height or depth of the tree and n is the number of nodes.

Report Error

View Answer Report Error Discuss

9 5506
Q:

What Does BIOS Stand For

A) Backup Input Output System B) Battery Integrated Operating Setup
C) Basic Input Output System D) Better Integrated Operating System
 
Answer & Explanation Answer: C) Basic Input Output System

Explanation:

BIOS in computers stands for Basic Input Output System.

 

BIOS is a set of computer instructions in firmware which control input and output operations.

Report Error

View Answer Report Error Discuss

25 5503