What is a disadvantage of dynamic arrays?
Memory Leak
It is created by Google, is one of the most commonly installed mobile OS for mobile devices, with support from various device manufacturers. It is an open source OS, which means developers are given access to unlocked hardware to develop new programs.
Android
Which library in Python is commonly used for predictive analysis?
sklearn
MCAfee is an example of
Antivirus
What is DevOps is an extension of?
Agile
What is the time complexity of prefix to infix conversion
O(n)
What is the name given to Internet technologies supporting user collaboration and data exchange?
Web 2.0
If the model performs the task correctly, it gets +1 reward, but if it does a task wrong, then it gets -1 reward. Which type of learning is used here?
Reinforcement Learning
What was the name of the first computer virus?
Creeper
Name any two of the most popular DevOps tools?
Jenkins, Git, Selenium
Name the different types of data Compression?
Lossless and Lossy
In HTML what tag can be used for a multi-line text input control?
TextArea tag
A search algorithm that tries to reduce the number of nodes that are searched by the minimax algorithm in the search tree. It can be applied to ‘n’ depths and can prune the entire subtrees and leaves.
Alpha-Beta Pruning
Which of the following is an independent malicious program that does not need any host program?
Worm
Which statement best describes the relationship between DevOps and Continuous Delivery?
A) DevOps and Continuous Delivery are the same thing.
B) DevOps and Continuous Delivery are not related and are mutually exclusive.
C) DevOps and Continuous Delivery share a background in Agile methods and LEAN thinking.
D) DevOps and Continuous Delivery share common processes.
C) DevOps and Continuous Delivery share a background in Agile methods and LEAN thinking.
Hashing technique which allocates a fixed number of buckets is classified as?
External Hashing
What are the main two types of threads in Android?
UI thread and Worker Thread
A statistical hypothesis test for randomizing experiments with two variables. It is usually used to compare two models that used different predictor variables in order to check which fits the data best. Which test are we talking about here?
A/B Testing
Which framework made cracking of vulnerabilities easy like point and click?
Metasploit
Which of these statements are correct about DevOps?
A) DevOps and ITIL® don’t mix
B) DevOps won’t work in regulated industries
C) DevOps won’t work with Outsourced Development
D) You must use cloud technologies
All are incorrect
What is the recurrence for the worst case of QuickSort and what is the time complexity in Worst case?
a. Recurrence is T(n) = T(n-2) + O(n) and time complexity is O(n^2)
b. Recurrence is T(n) = T(n-1) + O(n) and time complexity is O(n^2)
c. Recurrence is T(n) = 2T(n/2) + O(n) and time complexity is O(nLogn)
d. Recurrence is T(n) = T(n/10) + T(9n/10) + O(n) and time complexity is O(nLogn)
b. Recurrence for Worst Case of Quick Sort is T(n) = T(n-1) + O(n) and
time complexity in Worst Case O(n^2)
What does PCDATA AND CDATA stand for?
A PCDATA is a Parsed Character Data (XML parsers usually parse all the text in an XML document).
While CDATA is an Unparsed Character Data,(the term CDATA is used about text data that should not be parsed by the XML parser).
List any four activation neurons or functions.
Linear neuron
Binary threshold neuron
Stochastic binary neuron
Sigmoid neuron
Tanh function
Rectified linear unit (ReLU)
What type of attack uses a fraudulent server with a relay address?
MITM
The development teams that support the Agile approach to DevOps must include staff from the operations teams to ensure:
Operational considerations are taken into account
OR
The resultant designs of the systems will fit nicely into the business as usual environment