Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Aurea Muñoz
Software Engineer at Ritmx
Java

This code aims to calculate the frecuency of names from a collection of names.

452 answers
163 good - 289 bad
 
21.08.2019
Johannes Schöning
Lichtenberg Professor and Professor of Human-Computer Interaction (HCI) at University of Bremen
Java

What will be the output of the following code:

107 answers
15 good - 92 bad
 
09.09.2019
Maud Chiva Rampazzo
Associate - CTO at SoftFluent
Azure

What type(s) of object can be stored in a BlobStorage storage account ?

113 answers
17 good - 96 bad
 
21.08.2019
Lorenzo Adyns
Analist-Developer at FOD Justitie
.NET

Assuming you've written a suitable type called Language, which has appropriate constructors and...

630 answers
24 good - 606 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is not an assumption that needs fixing in digital ethics?

855 answers
562 good - 293 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Agile/Scrum

According to State of Agile, which of the following frameworks are “scaling agile frameworks”:...

590 answers
149 good - 441 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at ECAM
C

Which one of the following instructions must be used to complete the following function so that...

130 answers
86 good - 44 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which attack is designed to steal a person’s login and password details so that cyber criminals...

174 answers
120 good - 54 bad
 
21.08.2019
Olivier Hubaut
Board Member & JUG Leader at Brussels Java User Group & Founder at T.M.P. Solution
Java

What statement(s) about this code is/are true:

282 answers
1 good - 281 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is NOT considered as personally  identifiable information according t

858 answers
46 good - 812 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at ECAM
IT Student

Which one of the following attacks involves the manipulation of the main memory ?

85 answers
53 good - 32 bad
 
21.08.2019
Ludovic Saublains
Senior Java Developer at Groupe Open Belgium
Java

Which of these statements are correct?

232 answers
70 good - 162 bad
 
21.08.2019
Isabelle Boulogne
Maître-Assistant at HELHa
Network & Infrastructure

Which dotted decimal representation corresponds to the CIDR mask /22 ?

250 answers
28 good - 222 bad
 
21.08.2019
Peter De Prins
Professor of Change & Leadership at Vlerick Business School
Operationalizing Big Data

Which of the following technologies is a “NoSQL document store”?

398 answers
199 good - 199 bad
 
21.08.2019
David Hernie
Partner Business Evangelist at Microsoft Belux
.NET

Which aspect of application development does a DevOps organization focus on?

222 answers
159 good - 63 bad
 
01.10.2019
Fabien Dehopré
Senior Frontend Developer at Satellit
TypeScript

What is the goal of control flow-based type analysis?

398 answers
298 good - 100 bad
 
21.08.2019
Olivier Hubaut
Board Member & JUG Leader at Brussels Java User Group & Founder at T.M.P. Solution
Java

What is the printed by the following code?

166 answers
53 good - 113 bad
 
21.08.2019
Jens Krinke
Senior Lecturer at University College London
Java

What is printed by the following code ?

206 answers
31 good - 175 bad
 
21.08.2019
Thomas Anciaux
Senior ICT Cloud Engineer at miaa Guard
Angular

In a template-driven form you need to ‘wait a tick’ before changing any of its controls to avoid...

257 answers
103 good - 154 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

Quatre castors scouts A, B, C et D sont conviés au repaire des castors scouts pour parler...

700 answers
4 good - 696 bad
 
21.08.2019
Maxim Salnikov
Azure Developer Technical Lead at Microsoft
Angular

How to make Angular Service Worker ignore a particular route within its scope?

420 answers
266 good - 154 bad
 
21.08.2019
Raul Martinez
.Net technologies expert at RMMΛConsulting
.NET Core

How can I host an ASP.Net Core application?

364 answers
143 good - 221 bad
 
21.08.2019
Benoit Depaire
Associate Professor at Hasselt University at UHasselt
Business Intelligence

Which is a property of the Type 2 approach (Add a new row) for dealing with slowly changing...

80 answers
9 good - 71 bad
 
21.08.2019
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

Responses to risk threats include all of the following except:

51 answers
19 good - 32 bad
 
21.08.2019
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

The peak point of Maslow’s hierarchy of needs is called:

63 answers
28 good - 35 bad
 
21.08.2019
Thierry Leriche-Dessirier
Architecte, Développeur full stack, Rédacteur pour Developpez.com, Concepteur profil4.com & Professeur de Génie Logiciel at Société Générale
Java

What does it print?

210 answers
177 good - 33 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

Mia speelt een computerspelletje.

738 answers
475 good - 263 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras
Un castor se déplace de façon étrange.
658 answers
207 good - 451 bad
 
21.08.2019
Christophe Jollivet
IT Engineer at Apside TOP
Java

Which package has implicit import ?

240 answers
76 good - 164 bad
 
21.08.2019
Thomas Soumagne
Head of IT Development at Gambit Financial Solutions
.NET

What does this program display?

246 answers
145 good - 101 bad