Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Question Stats
26.03.2018
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

McGregor Theory X holds that:

61 answers
23 good - 38 bad
 
04.02.2019
Benoit Donnet
Associate Professor at Université de Liège
Network & Infrastructure

The value of acknowledgment field in a segment defines:

66 answers
27 good - 39 bad
 
27.03.2019
Bebras Community
IT Student

Alex is travelling with his car to go visiting his friend Serge.

112 answers
10 good - 102 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

Alice veut jouer à un jeu avec John.

957 answers
725 good - 232 bad
 
26.03.2018
Pierre-Emmanuel Dautreppe
.Net Evangelist and Agile Coach at Pyxis Belgium
.NET

With the following definition

248 answers
175 good - 73 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

Pour garder le parc propre, Castor Alexandre fait des rondes dans le parc.

367 answers
147 good - 220 bad
 
26.03.2018
Gregoire Mathonet
Engineering Lead at LuxTrust S.A.
Java

Which constructor signature exists on PrintWriter but not on BufferedReader?

139 answers
92 good - 47 bad
 
26.03.2018
Öykü Isik
Professor of Information Systems Management at Vlerick
Business Intelligence

As compared to RDBMS, Hadoop

65 answers
18 good - 47 bad
 
26.03.2018
Nicolas Forêt
CTO at EDITx
Drupal

What’s the main language used in Drupal 7 ?

774 answers
102 good - 672 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Python

Complete the following program in order to compute the sum of the two vectors 'a' and 'b':

178 answers
98 good - 80 bad
 
05.04.2018
Maurice Naftalin
Java Champion, Author, Speaker, Associate at JavaSpecialists.EU & Technical Director at Morningside Light Ltd
Java
135 answers
29 good - 106 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras
...
940 answers
242 good - 698 bad
 
08.03.2019
Jean Bekale
IT System and Project Management at FPS Finance
Linux

What does the fork() system call return to parent process on success?

192 answers
100 good - 92 bad
 
11.02.2019
Agne Brilingaite
Associate Professor at Vilnius University
Data structures

Let us assume that we have three stack data structures: A, B, and C.

849 answers
846 good - 3 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras
...
485 answers
173 good - 312 bad
 
26.03.2018
Dennis Jaamann
Freelance Frontend Architect & Founder at JsBe
Angular

In Angular, we use custom decorators on a daily basis.

529 answers
102 good - 427 bad
 
04.10.2018
Nicolas Mariot
Organizer MUG .NET Nantes & Freelance Consultant at E-nigma
.NET

What is the output of the following code :

135 answers
44 good - 91 bad
 
26.03.2018
Ludovic Saublains
Senior Java Developer at Groupe Open Belgium
Java

How to prevent a class from being inherited?

323 answers
118 good - 205 bad
 
28.02.2019
Mercedes Ruiz Carreira
Associate Professor at University of Cádiz
Database

The difference between an INNER and an OUTER join is:

143 answers
14 good - 129 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which attack is an electronic monitoring for digital networks designed to find out passwords or...

106 answers
32 good - 74 bad
 
05.07.2018
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

A key component of MBO (management by objectives) that is pertinent to project management is:

90 answers
12 good - 78 bad
 
01.04.2019
Philippe Dekimpe
Lecturer at ECAM
Business Analyst

Which one of the following affirmations is not an agile principle?

186 answers
91 good - 95 bad
 
31.03.2019
Bebras Community
Bebras Junior NL

De huizen van negen bevers zijn verdeeld zoals in het volgende plan:

632 answers
90 good - 542 bad
 
02.07.2018
Marc Sevaux
Java

With the following code

454 answers
318 good - 136 bad
 
20.09.2018
Sébastien Combéfis
Lecturer at ECAM
C/C++

How many bits are used in memory to store a pointer?

895 answers
673 good - 222 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

À côté de toi se trouve un panier rempli de pommes de tailles différentes.

491 answers
245 good - 246 bad
 
26.03.2018
Christophe Peerens
Microsoft Technical Advisor at Neomytic
.NET

Which of the following is not true about IoT (Internet of Things)?

223 answers
157 good - 66 bad
 
24.09.2018
Benoit Donnet
Associate Professor at Université de Liège
C

Given the following program:

94 answers
43 good - 51 bad
 
26.03.2018
Carole Dembour
Advisor - Economics at FEB
Excel

I've created this table. Which formula(s) can Excel run ?

188 answers
152 good - 36 bad
 
26.03.2018
Gregory Seront
IT Professor at Institut Paul Lambin
Java

Which of those codes does not use Java autoboxing?

246 answers
84 good - 162 bad