Explanation
Its five to ten time
Show/Hide Explanation
A. The food was not been tested by me
B. The food will not been tested by me
C. The food should not been tested by me
D. The food has not been tested by me
Explanation
In the present perfect tense we make passive verb forms by putting has/have + been before the past participle form of the verb.
Show/Hide Explanation
حدیث کی سند کے کتنے طریقے ہیں؟
Explanation
According to the classical science of hadith, there are three primary ways to determine the authenticity (sihha) of a hadith:
1. by attempting to determine whether there are "other identical reports from other transmitters";
2. determining the reliability of the transmitters of the report;
3. "the continuity of the chain of transmission" of the hadith
Show/Hide Explanation
A. Layout View
B. Form View
C. Datasheet View
D. Design View
Explanation
The " Datasheet View " in MS Access is the option
That allows you to add a new record in a tabular form due to its format and functionality designed for efficient data entry and manipulation within tables.
Show/Hide Explanation
کوالٹی اشورینس میں فش بون ڈایاگرام کا مقصد کیا ہے؟
A. To test the performance of the software
B. To identify potential causes of defects
C. None of these
D. To automate test scripts
Explanation
A Fishbone Diagram (Ishikawa diagram) is used to analyze root causes of problems. It helps in organizing and visualizing potential factors contributing to defects.
Show/Hide Explanation
سافٹ ویئر کی ترقی کا طریقہ کار کس قسم کی تکراری ترقی اور مسلسل آراء پر مرکوز ہے؟
A. Waterfall Model
B. Agile Methodology
C. Spiral Model
D. None of these
Explanation
Agile focuses on iterative development, where software is developed in small, manageable increments with regular feedback. It promotes continuous collaboration with stakeholders to adapt to changing requirements throughout the development process.
Show/Hide Explanation
کس قسم کے حملے میں صارف کو حساس معلومات فراہم کرنے کے لیے دھوکہ دینا شامل ہے؟
A. DDoS
B. None of these
C. Phishing
D. SQL Injection
Explanation
Phishing involves deceiving users into revealing sensitive information like passwords or credit card details. It typically uses fake emails, messages, or websites to impersonate trusted entities.
Show/Hide Explanation
A. Macros
B. None of these
C. Word Art
D. Templates
Explanation
In computer programming, a macro (short for "macro instruction") is a rule or pattern that specifies how a certain input should be mapped to a replacement output.
Applying a macro to an input is known as macro expansion.
Show/Hide Explanation
A. A/A
B. The/the
C. No article
D. A/An
Explanation
I have taught English to thousands of students.
Generally no article required before a language (English)
Show/Hide Explanation
A. Out
B. On
C. None of these
D. Up
Explanation
The phrasal verb " carry out " means to perform or execute a task or experiment. Correct sentence: " The teacher asked the students to carry out the experiment. " استاد نے طالب علموں سے تجربہ کرنے کو کہا۔
Show/Hide Explanation
✅ Correct: 0 |
❌ Wrong: 0 |
📊 Total Attempted: 0