How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Jonathan Slenders
Python Expert at Cisco
Python

What's Python's answer to 'interfaces'?

195 answers
26 good - 169 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at EPHEC
Python

Which one of the following rules is a good practice regarding pythonic conventions?

140 answers
81 good - 59 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at EPHEC
Python

Which one of the following statements is wrong:

695 answers
446 good - 249 bad
 
21.08.2019
Guillaume de Moffarts
Master in Computer Science in Software Engineering at Université catholique de Louvain
Python

What does the following program print after execution?

200 answers
7 good - 193 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at EPHEC
Python

Complete the following program in order to compute the sum of the two vectors 'a' and 'b':

178 answers
98 good - 80 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at EPHEC
Python

What is PyPI?

171 answers
117 good - 54 bad
 
21.08.2019
Jakub Krajniak
Python programmer at AppTension
Python

Assume that you have two lists A, B of lengths Na, Nb.

316 answers
212 good - 104 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at EPHEC
Python

Which mechanism should be used to rewrite the following function to make it more pythonic?

144 answers
95 good - 49 bad
 
21.08.2019
Guillaume de Moffarts
Master in Computer Science in Software Engineering at Université catholique de Louvain
Python

What does the following program print after execution?

343 answers
95 good - 248 bad
 
21.08.2019
David Litvak Bruno
Ruby & Python Developer Evangelist at Contentful
Python

Given the following statement [x + 1 for x in range(10) if x % 2 == 0], what is the result:

330 answers
193 good - 137 bad
 
21.08.2019
Sébastien d'Oreye
Professor at ECAM
Python

Given the s = "0123456789" declaration, what expression is a subsequence of 's' only containing...

150 answers
95 good - 55 bad
 
21.08.2019
Claude Duvallet
Maître de Conférences at Université du Havre
Real-time computing

Dans un système temps réel, quelles sont les conséquences du non-respect d'une contrainte...

578 answers
303 good - 275 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How is the software robots configured?

234 answers
178 good - 56 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How does the robot interpret screen displays?

543 answers
318 good - 225 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

Which of these is not a characteristic of RPA software?

634 answers
71 good - 563 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What did the early form of RPA exist as?

446 answers
356 good - 90 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What can a software robot be likened to?

843 answers
463 good - 380 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

In the work environment, what are the robots related to as?

122 answers
18 good - 104 bad
 
21.08.2019
Kevin Curran
Professor in Cyber Security at Ulster University
Security

A useful command to obtain information from the target once you have uploaded a webshell is...

178 answers
46 good - 132 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which attack is designed to steal a person’s login and password details so that cyber criminals...

174 answers
120 good - 54 bad
 
21.10.2019
Mahmoud Hashem Eiza
Lecturer in Computing at University of Central Lancashire
Security

Which of these passwords is the strongest? 

401 answers
155 good - 246 bad
 
21.08.2019
Kevin Curran
Professor in Cyber Security at Ulster University
Security

In security, the difference between CPUs and GPUs is that GPUs __________________________

806 answers
712 good - 94 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which attack is an electronic monitoring for digital networks designed to find out passwords or...

106 answers
32 good - 74 bad
 
21.08.2019
Olivier Blazy
Maitre de Conférence at Université de Limoges
Security

Quel type d'attaque est illustré par la requête suivante

308 answers
130 good - 178 bad
 
21.08.2019
Kevin Curran
Professor in Cyber Security at Ulster University
Security

An “online” password attack involves the automation of the guessing process in order to speed...

498 answers
90 good - 408 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which term is used to describe a program that self-replicates after hooking itself onto...

79 answers
14 good - 65 bad
 
11.09.2019
Olivier Blazy
Maitre de Conférence at Université de Limoges
Security

Trying to inject “ ‘ or 1=1 # “ in an SQL request could be used to:

78 answers
38 good - 40 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which term is used to describe all of the hostile and intrusive program codes that are designed...

89 answers
30 good - 59 bad
 
21.08.2019
Olivier Blazy
Maitre de Conférence at Université de Limoges
Security

Qu'est-ce qu'une vulnérabilité XSS

585 answers
527 good - 58 bad
 
21.08.2019
Olivier Blazy
Maitre de Conférence at Université de Limoges
Security

Quelles sont les principales sources d'informations exploitables lors de Social Engineering

663 answers
292 good - 371 bad