More than 3000 questions in repository. There are more than 900 unanswered questions. Click here and help us by providing the answer. Have a video suggestion. Click Correct / Improve and please let us know.
Ans. Yes, Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.
Help us improve. Please let us know the company, where you were asked this question :
Ans. wait() and notify() methods are defined in Object class rather than Thread class.If wait() and notify() were on the Thread instead then each thread would have to know the status of every other thread and there is no way to know thread1 that thread2 was waiting for any resource to access.Hence, notify, wait, notifyAll methods are defined in object class in Java.
Help us improve. Please let us know the company, where you were asked this question :
Ans. Broad question, but if the company need velocity, think about use a NO SQL instead of regular SQL databases.
Also prefers materialized views instead of joins to fetch data quickly.
Regarding the database design, there are very good design tools for professional database (to develop proper indexes and good database design) one of the best is QuickDBD
Help us improve. Please let us know the company, where you were asked this question :
Ans. public List convertAllToUpperCase(List words) {
return words.stream().map(String::toUpperCase).collect(Collectors.toList());
}
@Test
public void testAllToUpperCase() {
List expected = Arrays.asList("JAVA8", "STREAMS");
List result = convertAllToUpperCase(Arrays.asList("java8", "streams"));
assertEquals(expected, result);
}
Help us improve. Please let us know the company, where you were asked this question :
Ans. Open the AWS CloudFormation console at https://console.aws.amazon.com/cloudformation . Create a new stack by using one of the following options: Choose Create Stack. This is the only option if you have a currently running stack.
Help us improve. Please let us know the company, where you were asked this question :
Ans. There are multiple types of security GCP provides to every customer. Data, Network, Compute, and Services. Each service have its own security layer and Google provides clients to build as per the GCP best practices like building VPC, IAM, Firewall rules and so on
Help us improve. Please let us know the company, where you were asked this question :
Ans. AWS Identity And Access Management (IAM) is a webservice provided by AWS platform that provides access control capabilities (authentication and authorization) to AWS resources.
Help us improve. Please let us know the company, where you were asked this question :
Ans. With resource pooling and Pay as per use , Bigger companies like Google and Amazon can buy Large physical hardware and employ economy of scale and hence resulting in cost saving for customers.
Help us improve. Please let us know the company, where you were asked this question :
Ans. 1. Fault Tolerance
2. Better Access by bringing the application closer to the users.
Help us improve. Please let us know the company, where you were asked this question :
LikeDiscussCorrect / Improve  Google Cloud Computing (GCP)  Amazon Web Services (AWS)  Availability Zones  Regions and Zones  Infrastructure
Q147. Which category of services, Amazon Lambda belongs to ?