Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Sébastien Combéfis
Lecturer at ECAM
Network & Infrastructure

Regarding Cisco IP Multicasting, what command can be used to debug PIM?

122 answers
70 good - 52 bad
 
21.08.2019
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

All of the following are parts of the team's stakeholder management effort EXCEPT:

251 answers
194 good - 57 bad
 
25.11.2019
Raul Martinez
.Net technologies expert at RMMΛConsulting
.NET

On a .Net Core web application, which one of the following methods must be added to Startup....

707 answers
637 good - 70 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

Le facteur Bebras distribue le courrier en suivant un système particulier.

119 answers
22 good - 97 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at ECAM
Java

What does the execution of the following program produce?

164 answers
20 good - 144 bad
 
21.08.2019
Joris Dieltiens
Network & Infrastructure

You were asked to provide a private ip address range for a network with 94 devices.

931 answers
660 good - 271 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at ECAM
Network & Infrastructure

On which device IGMP snooping can be used to control multicast traffic?

140 answers
61 good - 79 bad
 
21.08.2019
Abraham Otero
Full Professor at Universidad CEU San Pablo
Java

Which is the output of the following code?

712 answers
161 good - 551 bad
 
21.08.2019
Dennis Breuker
Lecturer & College professor at Amsterdam University of Applied Sciences & at Amsterdam University College
Java

How to call the constructor of a subclass ?

237 answers
150 good - 87 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras

Castor l’alchimiste sait convertir des objets en d’autres objets. Il sait convertir :

944 answers
882 good - 62 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick
IT Project Management

(What is the | Is there a) key difference between managing projects and managing programs?

921 answers
534 good - 387 bad
 
01.10.2019
Gilles Meyer
Freelance AI consultant at GMind analytics
Machine Learning .NET

What is the name of the mathematical optimization algorithm that is central to the learning of...

780 answers
81 good - 699 bad
 
21.08.2019
Jean-Christophe Sirot
Software Engineer at Docker
Java

In which file are configured the java cryptographic providers ?

240 answers
49 good - 191 bad
 
21.08.2019
Gilles Flisch
Microsoft Tailor Made Development Manager at Elia
UWP .NET

Uwp x:Load="False"

955 answers
895 good - 60 bad
 
21.08.2019
Raul Martinez
.Net technologies expert at RMMΛConsulting
.NET

Does my ASP.Net website run without IIS?

235 answers
95 good - 140 bad
 
21.08.2019
Gilles Flisch
Microsoft Tailor Made Development Manager at Elia
AI .NET

How does one call the algorithm that tries to partition data into a fixed number of clusters so...

391 answers
370 good - 21 bad
 
21.08.2019
Sylvie Skepi
Program Manager at Intys Consulting
Project Management

What is the role of the project manager on a digital transformation project?

113 answers
112 good - 1 bad
 
21.08.2019
Kris Buytaert
Devops - Linux and Open Source Expert & CoFounder and CTO at Inuits
Linux

Which of the following command to install software is considered the least insecure.

365 answers
352 good - 13 bad
 
21.08.2019
Claude Duvallet
Maître de Conférences at Université du Havre
Computer networking

Quelle est la fibre optique la plus performante ?

138 answers
35 good - 103 bad
 
21.08.2019
Sylvie Skepi
Program Manager at Intys Consulting
Project Management

What are the main responsibilities of the project manager in the Monitoring and controlling...

140 answers
102 good - 38 bad
 
21.08.2019
Ludovic Gasc
IT Senior Solution Architect Web at Orange
Linux

How to destroy your entire root filesystem ?

973 answers
958 good - 15 bad
 
21.08.2019
Louis J. Mercken
Chairman of the Challenge Jury, Co-Founder Threon, Currently Senior Advisor to the Threon CEO & Board of Directors at Threon
Project Management

In a matrix organization, information dissemination is most likely to be effective when:

81 answers
37 good - 44 bad
 
21.08.2019
Benoit Depaire
Associate Professor at Hasselt University at UHasselt
Business Intelligence

Which is a weakness of a data warehouse Architecture that is based on a single enterprise-wide...

81 answers
15 good - 66 bad
 
21.08.2019
Sébastien Combéfis
Lecturer at ECAM
Network & Infrastructure

What can a DMZ be used for?

75 answers
48 good - 27 bad
 
26.03.2018
Sébastien Combéfis
Lecturer at ECAM
Bebras
...
413 answers
1 good - 412 bad
 
21.08.2019
Jean Bekale
IT System and Project Management at FPS Finance
Linux

Which command is used to remove files?

132 answers
2 good - 130 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick
IT Service Management

What is a “problem” according to ITIL?

914 answers
52 good - 862 bad
 
01.10.2019
Fabien Dehopré
Senior Frontend Developer at Satellit
Angular

Which method must be defined in a custom pipe?

289 answers
239 good - 50 bad
 
25.11.2019
Gilles Meyer
Freelance AI consultant at GMind analytics
Machine Learning .NET

In the context of AI models, what is ONNX ?

791 answers
705 good - 86 bad
 
21.08.2019
Christophe Jollivet
IT Engineer at Apside TOP
Java

What is the output of the following code ?

226 answers
29 good - 197 bad