Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Question Stats
26.03.2018
Jean-François Henrard
Senior Analyst Developer at Groupe Open Belgium
Java

In Java 8, the value of 'a' variable is …

232 answers
81 good - 151 bad
 
26.03.2018
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

In rolling wave planning:

71 answers
16 good - 55 bad
 
26.03.2018
Olivier Hubaut
Board Member & JUG Leader at Brussels Java User Group & Founder at T.M.P. Solution
Java

In Java, parameters are passed:

171 answers
32 good - 139 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, aggregation entity set’s primary key is composed of :

64 answers
3 good - 61 bad
 
26.03.2018
Vincent Lycoops
Java

In Java 8, HashMap has received an update to counter hash collisions.

110 answers
56 good - 54 bad
 
26.03.2018
Geoffrey Vandiest
Chief Technical Architect Gas Flow Management at Fluxys
DevOps

In PowerShell, what is the correct way to list all services ?

364 answers
96 good - 268 bad
 
26.03.2018
Jean-François Henrard
Senior Analyst Developer at Groupe Open Belgium
Java

In Java 8, in what order are the elements of this collection ?

194 answers
95 good - 99 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, weak entity set’s primary key is composed of :

68 answers
8 good - 60 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, a model composed of entity types and relationships that can exist...

68 answers
34 good - 34 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, foreign key (FK), represents a column or multiple columns that :

69 answers
23 good - 46 bad
 
26.03.2018
Geoffrey Vandiest
Chief Technical Architect Gas Flow Management at Fluxys
DevOps

In PowerShell DSC, what is the file extension of the configuration document that is applied by...

656 answers
250 good - 406 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, primary key is used to :

57 answers
35 good - 22 bad
 
26.03.2018
Frédéric Hubin
Senior Java Architect at ING Belgium
Java

In order to do efficient asynchronous socket based communications with several parties but...

225 answers
141 good - 84 bad
 
26.03.2018
David Litvak Bruno
Ruby & Python Developer Evangelist at Contentful
Python

In Python, which of the following is not a correct way of instantiating an object of class 'Foo...

320 answers
142 good - 178 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, the physical data model derives from :

56 answers
17 good - 39 bad
 
26.03.2018
Jean-Christophe Sirot
Software Engineer at Docker
Java

In which file are configured the java cryptographic providers ?

240 answers
49 good - 191 bad
 
26.03.2018
Anne Tasso
Auteur et Maître de conférence at IUT de Marne la Vallée (Université Paris-Est)
Java

In the case of a heritage, in what order are the constructors executed ?

241 answers
81 good - 160 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, the entity-relationship model that establishes the overall scope of...

52 answers
16 good - 36 bad
 
26.03.2018
Gilles Flisch
Microsoft Tailor Made Development Manager at Elia
.NET

In Universal Windows Platform, we can delay the load of the visual tree by specifying the...

91 answers
13 good - 78 bad
 
26.03.2018
David Hernie
Partner Business Evangelist at Microsoft Belux
.NET

In Windows 10, What are two built-in adaptive triggers for state transition?

104 answers
63 good - 41 bad
 
26.03.2018
David Hernie
Partner Business Evangelist at Microsoft Belux
.NET

In Windows10, Which API can you use to identify the device family?

87 answers
16 good - 71 bad
 
26.03.2018
Carole Dembour
Advisor - Economics at FEB
Excel

In the list of the 20 most popular boys' names in 2015, I want to highlight (cells in yellow

556 answers
222 good - 334 bad
 
26.03.2018
Oliver Sturm
Microsoft MVP & Training Director at Developer Express, Inc.
.NET

In this generic

577 answers
541 good - 36 bad
 
26.03.2018
Öykü Isik
Expert in Business Intelligence and Privacy, Professor of Information Systems Management at Vlerick
Big data management

In which organizational structure of analytical teams do analytical talent report the lowest...

294 answers
57 good - 237 bad
 
26.03.2018
Carole Dembour
Advisor - Economics at FEB
Excel

In which order are embedded the functions of the formula applied in cells B5:B7 ?

431 answers
181 good - 250 bad
 
26.03.2018
Fabian Vilers
Software Craftsman at Dev One
.NET

In the following example, what will be displayed?

101 answers
68 good - 33 bad
 
26.03.2018
Christophe Verschuere
Expert at Biztalk
.NET

In the BizTalk Mapper you can use the scripting function to do some complex transformations.

233 answers
76 good - 157 bad
 
26.03.2018
David Hernie
Partner Business Evangelist at Microsoft Belux
.NET

In Windows10, Which class should you use to create a custom adaptive trigger to change the...

104 answers
23 good - 81 bad
 
26.03.2018
Jean-François Henrard
Senior Analyst Developer at Groupe Open Belgium
Java

In swing, which thread can change the JLabel text ?

283 answers
61 good - 222 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, which model is normally developed to be instantiated as a database ?

74 answers
8 good - 66 bad